DHS’s Commitment to Innovation

Under its umbrella mission of "securing the nation from the many threats we face," the Department of Homeland Security (DHS) defines several mission areas critical to meeting this goal. These include countering terrorism and preventing threats, securing and managing borders, administering immigration, securing cyberspace, building resilience, and responding to incidents, as well as combating crimes of exploitation. To support these areas, the DHS Innovation, Research & Development Strategic Plan defines eight scientific areas as focal points for research:

  • Advanced sensing
  • AI and autonomous systems
  • Biotechnology
  • Climate change
  • Communications and networking
  • Cybersecurity
  • Data integration, analytics, modeling, and simulation
  • Digital identity and trust

In a previous post, we looked at DHS's work with artificial intelligence (AI), digital identity, and climate change. In this post, we'll take a look at the activity happening in more of these eight areas. Continue reading

A Look at Homeland Security Innovation Strategy

The mission of the Department of Homeland Security (DHS) is to "secure the nation from the many threats we face." An underlooked key to this statement is the word "many." Agencies under the Department are responsible for managing our borders, protecting the nation from cyber and physical threats, and supporting recovery from natural disasters and cyber attacks. To meet this mission, DHS has been embracing innovative approaches and emerging technology to supplement the efforts of the workforce charged with meeting these varied threats.

The DHS Innovation, Research & Development Strategic Plan laid out eight scientific areas as focal points for research to support national security:

  • Advanced sensing
  • AI and autonomous systems
  • Biotechnology
  • Climate change
  • Communications and networking
  • Cybersecurity
  • Data integration, analytics, modeling, and simulation
  • Digital identity and trust

As part of its work in each of these areas, DHS will be researching how emerging technology can support mission efforts as well as the risks technology poses to national security. In this blog, we'll take a look at the activity in a couple of these areas. Continue reading

How Government is Acquiring AI

Just as cloud computing upended how government buys technology, agencies are now having to adapt to acquire fast-evolving artificial intelligence (AI) technology. AI is proving to be a key tool in helping government improve the efficiency and connection of its workforce and deliver improved service to citizens, but the promises of this new technology come with risks. To ensure AI solutions are secure and ethically designed, agencies are implementing a number of guardrails to ensure the safe and effective use of powerful technology.

How to Use AI

The Office of Management and Budget (OMB) developed a policy document to harness the benefits and mitigate the risks of AI for Federal agencies. This guidance provides details on how to use AI securely and effectively with a focus on five key areas: risk management, transparency, responsible innovation, workforce, and governance. Continue reading

The Changing Identity of Identity Management

A key element of the move to zero trust is the use of "strong multi-factor authentication (MFA) throughout their enterprise." While identity management has been indicated by many as the "low hanging fruit" of a zero-trust journey, it is by no means easy. In fact, recent guidance from the Cybersecurity and Infrastructure Security Agency (CISA) and the National Security Agency (NSA) called it "notoriously difficult."

Key challenges to implementing MFA include:

  • Lack of standards - the CISA/NSA guidance pointed to confusion over MFA terminology and vague policy instructions as primary challenges to implementing more secure access. A joint committee of European Union (EU) and U.S. experts addressed this same issue in the Digital Identity Mapping Exercise Report, which aimed to define specific digital identity technical terminology. For example, the group found some definitions, such as "authoritative source" and "authentication factor," are identical between the U.S. and EU, whereas others, like "identity" and "signature," remain only partially matched.
  • Phishing - bad actors do not always hack the system; they hack the process, gaining entry through social-engineering tactics that grow more sophisticated by the day. The CISA/NSA report called on the vendor community to provide MFA services with additional investments and greater defenses against sophisticated attacks.
  • Rise of Generative AI - The Department of Homeland Security (DHS) is working to ensure technologies can determine if a submitted image is legitimate or a hacker's spoof. This "liveness detection" is needed to ensure that a submitted selfie is really a photo of a person, not a mask, photo of a photo, or other technique to try to get past the check.

Continue reading

How CX Is Driving Government Modernization

Improving the "customer" experience (CX) for citizens interacting with the government has been a focus for several administrations. The reason is that better experience equals improved trust in government. It's critical that our systems live up to the promise of government for the people.

Defining the Pieces of CX

A critical part of getting experience right is understanding the different pieces that make up a customer experience. Words like "experience" and "service" are often used interchangeably when talking about CX efforts, but it is important to understand some key differentiators. Continue reading