- Cybercrime & attacks to critical infrastructures are weapons of future
- Big Data analytics driving electronic intelligence & surveillance
- Security entities need to know more and share more
- Mobile technology & power of communities bring completely new threats
- 4x more megacities with >10m citizens in 2050 bring new security challenges
- 85% of population growth in high-income countries driven by migration
- Number of people killed by terror attacks increased 10X since 2000
- Cybersecurity jobs projected to grow by more than 35% by 2020
- CUSTOMER EXPERIENCE
- Worldwide, homeland security organizations keep citizens safe, secure and resilient against today’s myriad of threats. The police, border control, emergency response, crisis management and infrastructure protection organizations are also key to the economic success of their nation.
- BUSINESS REINVENTION
- The changing behaviors and asymmetric security threats of the twenty-first century require a complete rethink for security organizations. From how they analyze data to how they judge threat levels, their processes must be continually evolved to keep ahead of the ever-changing, ever more connected world.
- OPERATIONAL EXCELLENCE
- From availability, stability, reliability, interoperability and adaptability to capability, affordability and resource efficiency, homeland security has always been a question of juggling priorities and maximizing synergy. New threat scenarios are simply complicating the picture.
- TRUST AND COMPLIANCE
- People want to feel their homeland is a safe place to live. Securing assets, information and identities across all physical as well as virtual infrastructures is now an imperative. Shifting security agendas due to local or global events demands the required quantity and quality of information.
Senior Vice President, Head of Big Data and Security Central and Eastern Europe
People want to have confidence in homeland security; they want to feel their homeland is a safe place to live and that businesses feel likewise and invest in its economic stability. To deliver, security organizations need to be able to guarantee the availability, reliability and stability of their services and the technology that supports them.
|Technology||x||y||x (phone)||y (phone)||Impact||Range||Section||Keys||Description|
|82||65||86||52||Emerging||2019+||Low||trust||Quantum cryptography will help ensure the security of high end transmissions and assure secured interoperability and collaboration for highly sensitive data. Encryption technology will be used end-to-end across public, hybrid and private cloud solutions with a common encryption standard ensuring secure cross organization, and even cross country, communications.|
|Augmented reality||64||45||63||56||Adolescent||2018||Medium||experience,business||Smart glasses leverage augmented reality technologies to render virtual images in the line of sight. They improve situational awareness by allowing officers to access additional background information – for example about a suspect or location – in real time.
Facial recognition enhances these systems further, providing recognizable scenarios to help detect persons of interest. In situations where radio silence must be maintained they provide the perfect medium for sending commands.
|Biometrics||91||6||75||21||Mainstream||2016||High||experience,trust||Biometric technologies are continuing to help homeland security organizations establish a person’s true identity. Border control has been using fingerprint and vein scanning technologies for some time to ensure identification documents belong to the person presenting them.
Facial recognition technologies, meanwhile, have a much broader application, particularly in identifying known or suspected terrorists, criminals and immigration violators. Combined with media surveillance, they help pick well-known faces out from the crowd and control movement around secure zones. Biometric electronic ID from Match on Card allows the biometric identification of individuals when connectivity it not available.
|57||60||68||50||Emerging||2019+||Medium||experience,excellence||Novel interfaces promise to enable faster and better neural communications in complex environments. Furthermore, they also promise to help automated threat detection by improving outcomes from imagery analysis.|
|Cloud Service Integration||66||24||44||57||Early Adoption||2017||High||business,excellence||Already on the landscape, cloud allows homeland security information and services, such as exit/entry services, to be provided centrally. Personnel can access the resources they need from anywhere and on any device.
The diverse processes that run across clouds need to be able to connect seamlessly, mash-up services and aggregate both human centric processes and the IoE. Cloud Service Integration plays a crucial role in accomplishing this.
Within the IoT, the identities of people and things are managed through electronic identification (e-ID) technologies. Cloud-based federated identity services simplify the extension of identity and access management across new IoT-based services. In doing so they help protect personal and sensitive systems and data. In the future, trusted information brokers will act as the central verification service, eliminating the need for individuals to register and authenticate themselves with each distinct cloud service.
|Crowdsourcing||82||10||49||40||Mainstream||2016||High||business||Civilians are also increasingly contributing to the intelligence that homeland security organizations need to keep their people safe. On the U.S.-Mexico border, for example, homeland security organizations are leveraging crowdsourcing to gather intelligence. Anyone with an internet connection can patrol that border.|
|Distributed analytics||62||19||34||45||Adolescent||2017||High||experience,business,excellence||With the diversity of information sources growing too, distributed analytics is also accelerating the creation of intelligence. This technology allows information on known or suspected criminals, terrorists and immigration to be analyzed alongside information from social media, biometric surveillance and other sources in real time. Furthermore the integration of multiple information sources (data from sensors, first responders, GIS, social networks and more) improves crisis management and rescue operations.|
|Edge computing||74||33||56||65||Adolescent||2017||Medium||excellence||Agencies are also leveraging edge computing to index and analyze data close to the point of capture to help them make real-time assessments about what actions they need to take. Constantly processing sensor and environmental data in the background, edge analytics have proved particularly useful in emergency situations where they adjust activities on the fly as events unfold, requesting the expert resources needed or reprioritizing activities.|
|High performance computing||72||14||72||23||Early Adoption||2017||High||business,excellence||With the volumes, variety and velocity of data accelerating, high performance computing (HPC) allows complex simulations and analyses to deliver vital intelligence rapidly. By combining HPC with computation infrastructures, networks and the latest mathematical models, they help predict behaviors, prevent cyber or terrorist attacks, and more.|
|Hybrid cloud||92||21||88||81||Mainstream||2016||Low||experience,excellence||Agencies often need to combine resources on internal private clouds with external cloud-based environments such as those of certified security companies. Hybrid cloud allows selected on-premises, private cloud and public cloud services to unite in a heterogeneous environment of clouds.|
|Internet of things||59||7||26||15||Early Adoption||2017||Transformational||business,excellence||The internet of things (IoT) connects everything from sensors and unmanned systems to wearable computer technologies and smart clothing. The networks and data that flow from them have significantly enhanced situational awareness, command and control.|
|LPWAN||76||35||67||76||Adolescent||2017||Medium||business,excellence||In the future data will be sent over a combination of low power, extended range 5G and IoT-optimized Low-Power Wide- Area Networks (LPWAN).|
|Self-adaptive security||64||5||48||10||Early Adoption||2017||Transformational||trust||While traditionally crimes are responded to after they have been committed, agencies are now putting proactive security controls in place to prevent cyberattacks. Advanced Security Operations Centers (SOC) and Security Information and Event Management (SIEM) are integral to their new security strategies.
Trusted probes are being deployed in trusted environments to detect for the minutest of evidence of specific suspicious behaviors amongst millions of events. These self-adaptive security technologies not only help agencies anticipate threats as attackers try to hide. Behind the scenes streaming analytics and HPC play a key role in enabling the real-time analysis that also helps to keep personal and sensitive data and systems secure.
|Privacy-enhancing technologies||70||26||49||54||Early Adoption||2017||High||excellence,trust||As agencies gather more and more data about the civilians they protect, privacy-enhancing technologies are managing privacy risk, ensuring compliance with data protection legislation and regulation. They help ensure information that is shared amongst the homeland security ecosystem is anonymized or pseudonymized where appropriate.|
|Robotics||68||16||50||36||Early Adoption||2017||High||business,excellence||Advanced security robotics, support surveillance, protection, detection, rescue and immigration violation activities. They undertake dangerous actions without jeopardizing personnel and are deployed in areas that are either extremely difficult or impossible for humans to access to enhance situational awareness.|
|Sentiment analytics||94||8||86||34||Mainstream||2016||Low||experience,business||Now the primary channel for engaging with civilians during a disaster scenario, social media is also a channel individuals can use to let their families know they’re safe or even call for help. Homeland security organizations are employing social media and network analytics, with its sentiment analytics, to gain additional insight into how situations – from floods and earthquakes to criminal, migration and terrorist activities – are developing and how people are reacting. This will also provide additional Open Source Intelligence to complement established methods already in place.|
|Software-defined technologies||68||51||70||58||Early Adoption||2018||Medium||excellence||In any disaster scenario, multiple agencies must work closely together: organizing, coordinating and commanding in a rapidly-evolving and complex environment. Effective collaboration, shared situational awareness and informed decision support require the timely distribution of information. Software-defined networking (SDN) allows agencies to create dynamic links between locations.|
|State-of-the-art jamming products||78||11||35||42||Early Adoption||2016||High||experience,excellence||Next-generation communications are now able to transmit video as well as voice in even the remotest of locations, is now critical. State-of-the-art jammers not only block these communications to protect convoys but also detect and locate suspects, and support Explosive Ordnance Disposal (EOD) teams by preventing remote detonations. Telephony eavesdropping devices, meanwhile, intercept and record communications to enhance situational awareness.|
|Streaming analytics||84||5||61||12||Mainstream||2016||Transformational||business,excellence||Growing volumes of data are being rapidly turned into critical security intelligence thanks to advanced analytics. Streaming analytics, for example, provides organizations with real-time intelligence on the movement of cars or boats. This enhanced situational awareness allows agencies to be more proactive.|
|Swarm computing||37||40||47||40||Emerging||2019+||High||excellence||Intelligent dust comprising sensors, robots and other devices detects minute changes in light, temperature, vibration, magnetism, chemicals and more. Operating wirelessly as part of the IoT, it helps gather critical intelligence.|
|Unmanned aerial vehicles||87||18||66||67||Early Adoption||2016||Medium||trust||While unmanned aerial vehicles (UAVs) support surveillance, protection, detection, rescue and immigration violation activities, drone-shielding technologies allow security forces to protect themselves against remotely piloted aerial vehicles that may be used to deliver destructive payloads or used for surveillance purposes.|
|Wearable computing||80||27||77||33||Early Adoption||2017||Medium||experience,excellence||One of the vital tools of modern policing, wearables gather and store a wide array of incoming and outgoing data. Examples include smart glasses, watches, wristbands, helmets, socks, vests and more. In an emergency situation these devices help track individuals – their location and vital signs – while streaming video from the scene to a remote location where it can be analyzed and stored.
All devices must be ruggedized and capable of withstanding the rigors of police work – in particular the extreme environments that often accompany emergency situations. These new technologies enable rapid training solutions that can be accessed by a government officer wherever they are.