Top Banner
December 2013/January 2014 Vol. 10, No. 10 $5.95 USD INSIGHT & ANALYSIS FOR GOVERNMENT DECISION MAKERS H omeland Security TODAY www. HSToday .us In five years, many access control systems will be legend No Vacancy Terrorists, criminals are ever present concern for travelers Preserving Counter-IED Institutional Knowledge Not doing so will be a big mistake Emergency Preparedness The technological revolution in incident response System Shutdown INSIDE I See You The advantages of GPS tracking for mobile surveillance
44

kmd_hst_201312

Aug 18, 2015

Download

Documents

Samuel Boyle
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: kmd_hst_201312

December 2013/January 2014 Vol. 10, No. 10 $5.95 USD INSIGHT & ANALYSIS FOR GOVERNMENT DECISION MAKERS

HomelandSecurityTODAY

www.HSToday.us

In five years, many access control systems will be legend

No VacancyTerrorists, criminals are ever present concern for travelers

Preserving Counter-IED Institutional KnowledgeNot doing so will be a big mistake

Emergency PreparednessThe technological revolution in incident responseSystem

Shutdown

INSIDE

I See YouThe advantages ofGPS tracking formobile surveillance

Page 2: kmd_hst_201312

©2013 Dell Inc. All rights reserved.

Dell Connected Security. Out-Connect The Threat. In today’s highly connected world, the threats are evolving faster than ever. Keeping security in individual silos just isn’t enough anymore. Now you can out-connect the threat with Dell Connected Security, a new approach that shares intelligence between solutions for comprehensive protection across your IT environment. There may be thousands of scary-sounding threats out there, but Dell can help you out-connect them all. Visit Dell.com/security.

Out-Connect the Spear-Phishers.

Page 3: kmd_hst_201312

1Go online today for exclusive online content and eNewsletters Homeland Security Today Magazine | December 2013/January 2014

DEPARTMENTS2 Editor’s Letter

Fill All the Leadership Positions at DHS

4 Updates & ResponsesWithdrawing from Jihad: The ConsequencesBy Anthony Kimery

5 Opinion & PoliticsWho Should Protect Your Data in the Cloud?By Jonas Falck

6 Emergency Preparedness The Technological Revolutionin Incident ResponseBy Kylie Bull

8 Agency SpotlightDoD: Toward a ComprehensiveCybersecurity StrategyBy Richard Wright and Mike Anders

10 Borders & Intel Social Media Has Intelligence Value for Border AgenciesBy Sylvia Longmire

12 Global Watch News from Around the WorldBy Kylie Bull

16 Industry Newsl Industry Roster

36 Tools & Technology

40 Leadership ProfileStephanie C. HillPresident, Lockheed MartinInformation Systems & GlobalSolutions – Civil

RESOURCES38 Tradeshow circuit38 Advertiser index

Read more articles onlineat www.HSToday.us

18

System Shutdown

Preserving Counter-IEDInstitutional MemoryBy Patrick S. McGlynn and Godfrey Garner

24

By Jerry “Dutch” Forstater

Obsolescence through time will proceed to shut down manyexisting security systems from further product or technicalsupport by 2018.

By Timothy W. Coleman Threats from terrorists and villains of all kindsare an ever present concern for travelers,particularly those who expect security fromtheir hotel.

28

32

I See You

If we don’t protect the institutionalcounter-IED knowledge gleanedfrom foreign battlefields, it will be oneof the most significant intelligencelosses in our history.

By Philip A. Becnel IVGPS trackers allow investigators to tracksomeone’s movements far more affordablyand safer than would be practical usingphysical surveillance.

Page 4: kmd_hst_201312

EDITOR’S LETTER

They include the heads of Customs and Bor-der Protection, Immigration and CustomsEnforcement, the National Protection and

Programs Directorate, the Science and TechnologyDirectorate, the Office of Health Affairs, the undersecre-tary for management and DHS’s chief financial officer.

There are also four vacancies, including the UnderSecretary, Office of Intelligence and Analysis; AssistantSecretary, Office for State and Local Law Enforcement;Assistant Secretary, Policy Implementation and Inte-gration; and Inspector General.

The absence of so many top leaders is damaging thedepartment’s self-esteem, said Tom Ridge, the firsthomeland security secretary. Testifying before theHouse Committee on Homeland Security on December12, he said it “impacts morale more severely than youthink,” adding, “How unimportant are we that we canhave so many vacancies and so many acting membersfor so long? There’s a subtle signal there that I think iscorrosive.”

The skills and capabilities of DHS’s place-holderleadership isn’t what is in question. What is in questionis that as place-holders it’s nearly impossible for themto embark on intrepid initiatives or to express far-sighted missions. Because they — and everyone else atDHS — don’t know how long they will be around, theytypically will not take on piloting high-minded policyships or engaging in necessarily risky decisions. Con-versely, the longer they are around, the longer such ini-tiatives and missions are never put on the stove.

“I describe this as executive branch Swiss cheese,”said Sen. Tom Carper (D-Del), chairman of the SenateCommittee on Homeland Security and GovernmentalAffairs.

His counterpart over in the House, Rep. MichaelMcCaul (R-Texas), chairman of the House Committeeon Homeland Security, agreed that the number ofvacancies in the department’s top leadership postsimpacts management.

These posts need to be filled, and soon. Morale hasbeen plummeting and there are too many “high-risk”areas long in need of urgent attention by permanentDHS leadership.

The third-largest cabinet-level department, DHSadmits it has a morale problem. The GovernmentAccountability Office (GAO) said it’s because DHS’sability to assess and address employee morale prob-lems is limited.

GAO said “DHS employee job satisfaction declined infiscal years 2012 and 2013 Federal Employee ViewpointSurvey [FEVS] results. Specifically, 2013 FEVS data showthat DHS employee satisfaction decreased seven per-centage points since 2011, which is more than the gov-ernment-wide decrease of four percentage points overthe same time period. As a result, the gap between aver-age DHS employee satisfaction and the government-wide average widened to seven percentage points.”

GAO also said “DHS has consistently scored lowerthan the government-wide average on the FEVS Leader-ship and Knowledge Management index, which indi-cates the extent to which employees hold theirleadership in high regard. Since 2011, DHS’s scores forthis index have decreased five percentage points, widen-ing the gap between the DHS average and the govern-ment-wide average to nine percentage points.

DHS came in last among the largest federal agencieswhose leadership inspires the workforce and spurs theircommitment. Slightly more than half of the workforcebelieves leadership is effective, and 48 percent said thedepartment has the necessary talent to achieve its over-all goals.

“It is critical that the numerous senior vacancies inthe Department of Homeland Security are filled with tal-ented leadership as soon as possible,” said Carper.

And they need to move quickly to address workermorale and dissatisfaction and all the high risk areasGAO determined are in need of urgent attention byDHS’s top brass.

Indeed. GAO regards government operations to behigh risk when they present substantive vulnerabilitiesto traditional Washington, DC problems like fraud,waste, abuse, mismanagement and the need for trans-formation to address economy, efficiency and effective-ness challenges.

“My concern is that DHS may become hamstrung byits own long tail and politicization,” said a Washington,DC insider who was on a short list for a senior DHS billet.“I probably do not know enough about it, but I see a verylarge organization spread thin in too many areas, andwithout a strong rudder, and deficient in the articulationof a meaningful strategy. I am sure there is one, but itseems to have been lost to the voice of politics.”

A DHS official similarly expressed that there needs tobe a top-to-bottom review of DHS’s organization … andorganizational focus.

But before these processes can begin, the new secre-tary must work with the administration to forcefully rec-ommend the strongest possible candidates for all thesenior posts that need permanent leaders. With press-ing concerns like cybersecurity and a growing Al Qaedainspired movement, the time is now … not later. HST

But beforetheseprocessescan begin,the newsecretarymust workwith theadministra -tion toforcefullyrecommendthestrongestpossiblecandidatesfor all theseniorposts thatneedpermanentleaders.

ANTHONY KIMERYFill All the LeadershipPositions at DHSAS OF THIS WRITING IN MID-DECEM-BER, 14 SENIOR DEPARTMENT OFHOMELAND SECURITY (DHS) POSTSARE STILL MANNED BY “ACTING”SECRETARIES.

2 December 2013/January 2014 | Homeland Security Today Magazine Go online today for exclusive online content and eNewsletters

Page 5: kmd_hst_201312

Go online today for exclusive online content and eNewsletters Homeland Security Today Magazine | December 2013/January 2014 3

Many security companies think twice before getting involved with the complexities of protecting the public sector. We run to it. From emergency notification systems to sophisticated access control, video surveillance to complete system integration, we have unmatched expertise in helping secure public facilities. Every federal courthouse in the country and many of the nation’s largest airports rely on Tyco Integrated Security. Whether you’re a DOD installation, a defense contractor or a civilian agency, we can help you find smarter ways to advance your business security – and we always start by listening. We’re more than a security company. We’re your Tyco Team.

Thinking about security 24 hours a day? You’re not alone.

1.800.2.TYCO.IS / Safer. Smarter. Tyco.™

Download a free White Paper at TycoIS.com/gov

Steve Young Football Legend

y companies think ty securitManrom emergency notification syun to it. Fr

e haintegration, w

hinking about securitTe not alone.rou’YYo

ore getwice befy companies think tstems to sophisticated access control, video surrom emergency notification sy

xpertise in helping secure public fhed ee unmatcve ha

y 24 hours a dahinking about securite not alone.

ed with the compleolvvting inore getstems to sophisticated access control, video sur

acilities. Evxpertise in helping secure public f

y?y 24 hours a da

xities of protecting the public sectored with the compleeillance to complete syvstems to sophisticated access control, video sur

ederal courthouse in the country feracilities. Ev

y?

eW. xities of protecting the public sectorstemeillance to complete sy

yederal courthouse in the countr

e haintegration, wy of the nationand man

contractor or a civilian agencyy art bst listening

xpertise in helping secure public fhed ee unmatcve has largest airports rely on ’y of the nation

ou find smarter we can help y, wcontractor or a civilian agencylistening. ity compane than a secure morr’eW

acilities. Evxpertise in helping secure public fWhether y. yco Integrated SecurityTTys largest airports rely on

ance ys to advyaou find smarter wco yTTyour e yr’eW.yity compan

ederal courthouse in the country feracilities. Evallation, a defOD instre a Dou’Whether y

y – and wour business securitance yeam.TTe

yederal courthouse in the countrenseallation, a def

syae alwy – and w

.ISCOYYC0.2.T.801

White Pwnload a free Do

All rights reserco. yTTy4 1©20ed use is strictly prohibited.Unauthoriz

r/ .coyTTy.ertSmar.erSafe ™

aper at White P vo.com/gcoISyTTy

co is a registered trademarkyTTyed. vAll rights resered use is strictly prohibited.

ounge YYoevStegendootball LF

Page 6: kmd_hst_201312

™™

2007 Central-Southeast Region

Bronze Special Supplement

2005 Central- Southeast Region

Bronze Regular Department

2005 Central- Southeast Region

Silver Special Section

2007 Central-Southeast Region

BronzeSpecial Section

JOURNALISMTHAT

MATTERS

2012 RegionalSILVER

EDITORIALAward Winner

2012 NationalSILVER

EDITORIALAward Winner

BRONZE

2012 RegionalSILVERDESIGN

Award Winner

2010 NationalGOLD

4 December 2013/January 2014 | Homeland Security Today Magazine Go online today for exclusive online content and eNewsletters

UPDATES & RESPONSES

In his November report, “Withdrawing from Jihad,” God-frey Garner warned that America’s unilateral retreatfrom Afghanistan could result in “the return of a venge-

ful Taliban — and with them, a potential return of Al Qaeda.”“Arguments aside,” he wrote, “most analysts agree that as

a nation we will never achieve our goal of defeating Al Qaedaand protecting America from further Al Qaeda-sponsoredterrorism without a secure Afghanistan.”

Since his report, Afghan President Hamid Karzai was suc-cessful in rejecting the Loya Jirga’s pleas to accept a US agreement thatwould maintain a minimal American presence in the country.

“There will, in effect, be no meaningful American or allied presence in Afghanistan,” God-frey told Homeland Security Today.

“Though analysts disagree on specific points,” Godfrey said, “one thing that is rarely dis-puted is the fact that the ripple effect of events following our departure will be immediate andwill negatively impact most of the free world.

Godfrey warned that, “while there is no firm indication that Taliban or Al Qaeda elementswill fill the void when we leave Afghanistan, most experts lean toward this probability. Whileit is true Taliban elements enjoy more support in areas other than the north, it is also truethat the vast majority of those within the government in any position of power in the north(the primary location for drug production labs and points of illicit exportation) benefit fromillicit drug activity.”

“The most negative impact resulting from our drawdown in Afghanistan will be a huge andimmediate flood of opium-based products into Europe, Russia and America,” Godfrey said,adding “While it’s true many among the Afghan Security Forces have worked diligently to stemthe flow of drugs, these individuals have always fought an uphill battle, politically and practi-cally, and with their only real ally now packing to leave, the will to continue this fight under-standably will not be there.”

Garner pointed out that poppy cultivation in Afghanistan in 2013 reached a record high,with 209,000 hectares cultivated, surpassing the record in 2007 of 193,000 hectares. This rep-resents a 36 percent increase over 2012.

Consequently, Garner said, “opium production for 2013 increased by 49 percent over 2012.The only thing left for vast amounts of profit to be realized is smuggling the product out of thecountry.” And “with the primary smuggling interdiction apparatus in the process of beingseverely hampered or outright dismantled, those who ultimately profit, including Talibaninsurgents, will realize an immediate and vast injection of profit.”

The minimal security gains made in the north during the past decade “will mostassuredly vanish as Taliban insurgents and the opium dealers and smugglers who profitfrom an alliance with them once again begin operating with little interference,” Garnerwarned. “Throughout history,” he explained, “Afghanistan has dominated the world’s opiumproducing countries, accounting for a steady 75 percent of global production.” And “the Tal-iban have been the greatest beneficiaries of this dubious title, using profits to finance insur-gency and terrorism worldwide.”

The UN Office on Drugs and Crime’s executive director, Yury Fedotov, said Afghanistancould soon become a “full-fledged narco-state” without stronger assistance and support fromthe global community. “But the open door for such assistance is closing fast, and is being shutand urged by those who benefit most directly,” Garner said.

“Our one chance to continue interdiction efforts,” Garner said, “rests in the fact that Amer-ica and its allies will be called upon to continue and possibly increase aid to Afghanistan.”

The “Taliban and corrupt Afghan officials realize that the next few months and years areopen season for reaping profits from opium distribution,” he continued, warning “The worldwill soon feel the severe negative effects of the flood of narcotics to their doorstep.”

“Until then, several things will happen,” Garner concluded. “The doors will open andopium-based products will flow into the rest of the world. Taliban coffers will bulge from theprofit, allowing them to finance more and more devastating acts of terrorism around the world.And those Afghan government officials who have gotten fat off the drug trade will get fatter,faster, until the door closes.” HST

— Anthony Kimery, Executive Editor

Withdrawing from Jihad: The ConsequencesP.O. Box 9789, McLean, Va. 22101-3611

PHONE: 540-854-0910 FAX: 540-854-0912

WWW.HSToday.US

PUBLISHERKimberley S. Hanson-Brown

PHONE: [email protected]

EXECUTIVE EDITORAnthony Kimery

[email protected]

EDITOR-AT-LARGETimothy Coleman

CONTRIBUTING EDITORSKylie Bull — Europe

Joe Charlaff — Middle EastSylvia Longmire — Border Security

Michael Paddock — Grants & Funding Issues

CONTRIBUTING WRITERSMike Anders

Philip A. Becnel IVJonas Falck

Jerry “Dutch” ForstaterGodfrey Garner

Patrick S. McGlynnRichard Wright

COPY EDITORChristopher Prawdzik

ART DIRECTORSue Stott

SUBSCRIBER SERVICESSpecialized Fulfillment Services

PHONE: 800-607-4410FAX: 1-937-890-0221

[email protected]

HSToday is published monthly with combined Dec/Jan and June/July issues by KMD Media LLC,

6800 Fleetwood Road, Suite 1114, McLean, Va. 22101-3611. Annual subscription rates: $49.95 for

10 issues U.S. domestic mail; $69.95 Canada; $99.95 international mail.Periodicals postage paid at McLean, VA, and additional mailing offices.

POSTMASTER: Send address change to HSToday, P.O. Box 292995, Dayton, OH 45429-8995.

© Copyright 2013 HSToday. All rights reserved

Page 7: kmd_hst_201312

5Go online today for exclusive online content and eNewsletters Homeland Security Today Magazine | December 2013/January 2014

BY JONAS FALCK

EDWARD SNOWDEN’S LEAK OF CLASSIFIEDNATIONAL SECURITY AGENCY (NSA) DOCUMENTSHAS OPENED A NATIONAL DEBATE IN THE US ANDABROAD OVER PRIVACY, NATIONAL SECURITY ANDTHE BREADTH AND JURISDICTION OF THE AMERI-CAN GOVERNMENT’S SURVEILLANCE PROGRAM.

As The Guardian reported this summer, NSA is col-lecting the communication records of millions of Veri-zon customers in the United States, including e-mailmetadata. Because it is categorized as “transactionaldata,” it does not require an individual warrant, pro-vided the NSA believes the target is not a US citizen andis not located in the United States. While end-to-endencryption like PGP or S/MIME should always be usedto encrypt an e-mail’s body data, users also need to pro-tect their e-mail metadata from being interceptedthrough wiretaps. AES-256 tunnels should always beused between mail transfer agents.

So, if end-to-end encryption solves both of theseissues, then why not encrypt everything? If it’s as easyas it sounds, why haven’t the big cloud providers doneanything about it?

The short answer is that many cloud providers arein the business of personal information. It allows themto serve customers better with targeted advertising,beef up their analytics platforms and, most important,make money. End-to-end encryption would get in theway of profit, and we know that profit is what drivesdecisionmaking.

I have heard providers ask (assuming users encrypttheir own data via separate software or a new plugin),“what if they lose the key?” That seems like a betteroption than handing it over to someone else. But a “for-got your password” option would defeat the purposeof the whole exercise.

The NSA’s pressure on companies like Microsoft,Google and Facebook has been widely reported. Detailsof the top-secret NSA program, PRISM, were leaked toshow the government was collecting information like e-mails, search history and file transfers directly from theservers of major US service providers.

Other companies, like the encrypted e-mail serviceLavabit, which counted Snowden among its users, choseto shut down rather than hand over its users’ encryptionkeys when it anticipated a court order from NSA.

If users accept responsibility for their own data —and that means setting up their own encryption keysand use end-to-end encryption without exposing theirsecret keys — then they’ve done their due diligence. It’snot the easiest process, but for users that take securityseriously, it’s the only option. HST

Jonas Falck is CEOand co-founder ofHalon Security, adeveloper of e-mailsecurity and firewallsused by large hostingproviders, non-commercial andgovernmentorganizations,municipalities andcompanies of all sizes.

OPINION & POLITICS

NSA Public Surveillance Issues: Who Should Protect Your Data in the Cloud?

In the last few months, we have learned thatNSA successfully tapped into the private linksthat connect the data centers of companies like

Google and Yahoo through operation MUSCULAR.They have also allegedly hacked the emails of Ameri-can allies, including the president of Mexico and thechancellor of Germany. With all the stories of NSAspying on private data, the question has to be asked:Are e-mail providers and cloud services doing all theycan to keep our data away from prying eyes?

With new revelations suggesting that there are fewencryption systems that cannot be cracked by theNSA, can Americans truly protect their data? How canAmerican companies practice due diligence and keeptheir users safe?

The answer comes down to this: The onus is on theend user, not the provider to protect their own data. Thesolution is end-to-end encryption, where data isencrypted locally and remains unreadable to third-par-ties until it is decrypted at the end point by someonewith the correct keys. Most cloud-based providers (doc-ument sharing, social networks, e-mail platforms, etc.)use keys that are provided either by themselves or by acertificate authority (CA), so either the provider or theCA ultimately hold the security keys.

This becomes an issue when the NSA comes knock-ing, as providers are often pressured to hand over thoseencryption keys, or are legally obligated to comply withsecret court orders. If companies can’t access theirusers’ encryption keys, though, then how can the NSAforce them to give over something they don’t have?

Cloud providers that handle any type of sensitivedata could also implement a local client AES-256 encryp-tion/decryption layer that reads and writes data directlyfrom the provider in encrypted format and thendecrypts for the user to read. This would be donedirectly in the local web browser using HTML andJavaScript. Cloud providers would not be able to accessthose users’ data. Wiretaps also cannot intercept datathrough SSL (Secure Sockets Layer) proxies using man-in-the-middle attacks or intercepting fake certificates.

The standard security protocols provided by most e-mail services also don’t prevent a third party from view-ing the metadata, which includes the sender, recipient,subject line, date, time and other details.

Page 8: kmd_hst_201312

izers also used EMTrack to manage basic triage, asvolunteers already had mobile units in place.

The Massachusetts Hospital Association pointedto the use of WebEOC at various hospitals in the areaas an important factor contributing to their success-ful response.

Not all regions and situations though are able tomake use of automated and sophisticated systems.The recent Typhoon Haiyan disaster in the Philip-pines highlighted the difficulties in sharing informa-tion and facilitating coordination and cooperationamong various national and international organiza-tions. Responders on the ground found that informa-tion and communications were often delayed anddistorted — if communication was possible at all.

Despite the sophistication of the information sys-tems and liaison protocols that organizations haveput in place, Paul Gardner-Stephen, the HumanitarianTelecommunications Fellow at Flinders University,Australia, said the most effective communications insuch situations are more often than not communica-tions between people on the ground, very often medi-ated by mobile phone and Internet. The problem withthis approach, Gardner-Stephen said, is that it putsincreased pressure on the already strained communi-cations infrastructure in disaster zones.

“The challenge, then, is to create communicationssystems that allow resilient horizontal communica-tions in a disaster zone, without contributing to con-gestion,” Gardner-Stephen explained. “This shouldideally make use of the smart phones and computersthat people are already familiar with, rather thanrequiring the deployment of new hardware. Such asystem should allow horizontal transfer of the tech-nology itself from device to device so that it can bedeployed as needed in the field, without imposing anydemand on logistics.”

The Serval Project, also based at Flinders Univer-sity, is working with the New Zealand Red Cross tocreate one solution to this challenge in the form ofopen-source mesh networking software for smartphones and computers that is as easy to use as a tele-phone, and which is easily installed on other portablecommunications devices, allowing the network to be

Emergency Operations Center (EOC) per-sonnel would sit in a room equipped withnothing more than a notepad and a

phone; each person would write down the informa-tion they gathered. If the information needed to beshared with other individuals within that EOC, it waswritten on a chalkboard. If the information needed tobe shared with individuals outside the EOC, a phonecall was made or a fax was sent.

Thankfully, today’s emergency response technol-ogy provides far superior tools to prepare for andrespond to emergency incidents. But just how big apart can technology play in preventing and mitigatingloss resulting from man-made or natural disasters?

During Hurricane Sandy in October 2012, Inter-medix Corporation’s resource management tool,EMResource, was used by agencies outside theaffected area to mobilize medical strike teams andaccess mutual aid partners from states across thecountry. Intermedix told Homeland Security Today thatonce emergency response units arrived, those using itsFleeteyes vehicle tracking application were able toimmediately connect to the New Jersey EMS task forcesystem, improving coordination and vehicle trackingfor EMS responders and allowing the closest vehiclesto be redirected to where they were needed.

Meanwhile, the Federal Emergency ManagementAgency (FEMA) used the company’s WebEOC inci-dent management solution to coordinate communica-tions with local jurisdictions and to visualize theoverall response. FEMA and its federal partners usedthe incident management software for activities rang-ing from supporting resource requests from the fieldto coordinating the activities of the Energy Restora-tion Task Force.

Similarly, in the aftermath of the Boston Marathonbombings, emergency response agencies demon-strated exemplary disaster preparedness throughtheir efficient and effective reaction. Because many ofthese agencies were already using Intermedix solu-tions to provide event support when the bombingsoccurred, they were well positioned to provide sup-port. For example, every year, local Boston EMS agen-cies used Fleeteyes to position vehicles around theperimeter of the race. After the first explosion, crewswere able to easily navigate to the scene and trans-port victims to the closest hospital. Marathon organ-

PRIOR TO THE EXISTENCE OF INFORMATIONSHARING TOOLS AND TECHNOLOGY, THERE WAS ALACK OF ACCOUNTABILITY AND CONTINUITY WHENIT CAME TO SHARING ESSENTIAL INFORMATION.

FEMA andits federalpartnersused theincidentmanagementsoftwarefor activitiesranging fromsupportingresourcerequestsfrom thefield tocoordinatingthe activitiesof theEnergyRestorationTask Force.

BY KYLIE BULL, CONTRIBUTING EDITOR

The Technological Revolution in Incident Response

6 December 2013/January 2014 | Homeland Security Today Magazine Go online today for exclusive online content and eNewsletters

Page 9: kmd_hst_201312

EMERGENCY PREPAREDNESS

including homeland security and emergencyresponse, has been developing a public-privateintegrated planning model that facilitates pre-incident operating relationships with the privatesector, with a strong initial focus on powerrestoration.

Dennis Schrader, an AHD regional advisor, formerdeputy administrator of FEMA's National Prepared-ness Directorate and Maryland’s first Director ofHomeland Security, told Homeland Security Today that

digital technology applied in open architecture is keyto cost-effective network development and informa-tion sharing. He pointed to the First Responder Net-work Authority (FirstNet) as a critical factor in success.

FirstNet is an independent authority charged byCongress with creation of a nationwide, interoperablewireless broadband network that will enable FirstNetto more effectively communicate.

“The architecture for FirstNet is still to be deter-mined,” Schrader said, “but the most important issuefor interoperability for data and voice remains gover-nance. FirstNet has the possibility of providing someof the governance options, but it may be a bumpyroad to get there.” HST

deployed and expanded on the flyin the field.

The technology is at the capability demonstrationstage and has been tested in field exercises with theNew Zealand Red Cross where it facilitated the shar-ing of a variety of information, ranging from areamaps and local assessment data, to secure text mes-saging between individuals.

Despite such advances, however, there is no singlepanacea to the information sharing challenge in theemergency preparedness and response environment.While technology has improved, effective human sup-port and operational guidance is imperative. The AllHazards Consortium (AHC), a state-sanctioned 501 c3non-profit organization that provides an “enablingframework” for project collaboration in various fields,

7Go online today for exclusive online content and eNewsletters Homeland Security Today Magazine | December 2013/January 2014

Kylie Bull is the formereditor of IHS Jane’sHomeland SecurityReview and GlobalResponse. She also is acontributor to IHS Jane’sDefence Weekly, IHSJane’s Airport Reviewand other IHS Jane’s ref-erence and news titles.

DHS smart phone app showing an IED incident.

Over 1,700 strong and growingAre you ?

According to LinkedIn, our social media community is:

“Making an impact”Join the discussion at linkedin.com/groups/Homeland-Security-Today-4364804.

HomelandSecurityTODAY

DHS

IMAG

E

Page 10: kmd_hst_201312

including “issuance of several strategy documentsand other initiatives that address aspects of thesechallenge areas,” there nevertheless “is no overarch-ing national cybersecurity strategy that synthesizesthese documents or comprehensively describes thecurrent strategy. In addition, the government’s exist-ing strategy documents do not always incorporate keydesirable characteristics [GAO] identified that canenhance the usefulness of national strategies.”

GAO’s audit identified three particular areas that rep-resent challenges to establishing an effective cyberse-curity strategy:• Designing and implementing risk-based cyberse-

curity programs at federal agencies.• Establishing and identifying cybersecurity stan-

dards for critical infrastructure.• Detecting, responding to and mitigating cyber inci-

dents.

Overall, GAO’s audit found that although therewere goals and subordinate objectives established inseveral government or government sponsoredpapers, they lack specific details and clear-cut imple-mentation guidance.

Remarkably, three years earlier, Arlington, Va.-based CACI, a major player in the government’scybersecurity business, came to conclusions nearlyidentical to those arrived at by GAO. In the fall of 2010,CACI convened the symposium, “Cyber Threats toNational Security.” It concluded that there are redun-dancies, little coordination and a lack of clarity amongthe various government agencies, organizations andmilitary command posts that do cyber work. Thesymposium’s proceedings further illuminated that“agencies have overlapping and uncoordinatedresponsibilities for cybersecurity activities.”

THERE’S LITTLE DOUBT THAT CYBERSECURITY ISHIGH ON THE AGENDAS OF BOTH THE DEPART-MENT OF DEFENSE (DOD) AND DEPARTMENT OFHOMELAND SECURITY (DHS). YET BOTH HAVEFAILED TO ESTABLISH EITHER A CLEAR OR PRAC-TICAL STRATEGY TO GUIDE THE IMPLEMENTATIONOF CYBERSECURITY ACTIVITIES.

But in order to cogently discuss a nationalcybersecurity strategy, we first have tounderstand what we’re talking about.

The terms “cybersecurity” and “cyberspace” are notjust inside-the-Beltway buzzwords; rather, both termsare valid technical words that have specific meanings.It’s widely accepted that cybersecurity refers to thetechnologies, protocols and practices applied to pro-tect US cyberspace. But there is also wide consensusthat “cyberspace” is most accurately defined as oper-ational domains that are characterized by the use ofelectronic and digital technology to create, store,modify, transfer/exchange and exploit information.

This definition of cyberspace incorporates not onlycomputer systems (e.g.: processors, servers, routers,etc.), but also the telecommunication systems (such assatellite and optical fiber) that link these computersinto networks. Protecting cyberspace, then, is a com-plex operation involving three inter-connected con-cepts of security, protection and resilience.

Security is focused on computer firewalls, encryp-tion, record-level classification and so forth. Protectionis a matter of tempested computers, hardened ortightly controlled communication systems and physicalsecurity. Resilience is based on redundancies, such asuse of multiple remote storage sites (cloud computing)and multiple telecommunications systems.

In addition to this triad, cybersecurity is alsodependent on a rigorous program of risk assessmentand mitigation. And finally, cybersecurity also involvesthe all-source intelligence that is essential to cyberthreat detection and analysis, as discussed in the 2001book, Cyber Power and National Security, published byNational Defense University.

Strategic challenges to implementing cybersecurityThe Government Accountability Office (GAO)reported in March 2013 that the federal governmentcontinues to face serious challenges in developing anational, comprehensive cybersecurity strategy.GAO’s audit report noted that while “federal cyberse-curity strategy has evolved over the past decade,”

8 December 2013/January 2014 | Homeland Security Today Magazine Go online today for exclusive online content and eNewsletters

DoD

TheGovernmentAccounta -bility Office(GAO)reported inMarch 2013that thefederalgovernmentcontinues toface seriouschallengesin developinga national,comprehen -sive cyber- securitystrategy.

BY RICHARD WRIGHT AND MIKE ANDERS

Toward a Comprehensive Cybersecurity Strategy

Page 11: kmd_hst_201312

The symposium’s proceedings further noted thatthe Obama administration’s Comprehensive NationalCybersecurity Initiative (CNCI) “faces substantialchallenges that cannot be overcome unless roles andresponsibilities of all key CNCI participants are fullycoordinated.” And this includes the Departments ofCommerce, Defense and Homeland Security, the Intel-ligence Community and other executive branch enti-ties, all of which have “various overlapping andpotentially competing responsibilities.”

Clearly, then, there are serious systemic impedi-ments to developing a comprehensive strategy forimplementing cybersecurity for the entire US cyber-space. In addition to the issues raised by GAO and theCACI symposium, DHS’s Office of Cybersecurity andCommunications (CS&C) appears to have its ownunique set of challenges.

Created in 2006, CS&C is responsible for enhancingthe security, resilience and reliability of the nation’scyber and communications infrastructure. It works toprevent or minimize disruptions to critical informationinfrastructure in order to protect the public, the econ-omy and government services. But while this missionappears to be straightforward, in practice, the officehas proved unable to execute its mission during thepast seven years.

From the outset, the office has had a high turnoverof top managers and difficulty recruiting workers. InAugust 2013, the latest under secretary, Phyllis Sch-neck, was appointed. At the time, Schneck was a vicepresident and chief technology officer for the globalpublic sector at McAfee. According to press reports,she faces a challenge in confronting a leadership mud-dle in Washington over how to govern Internet secu-rity. Her predecessor, cybersecurity veteran MarkWeatherford, stayed on the job for less than 18months — he left in April. His interim replacement,

Bruce McConnell, announced his departure from DHSin July.

Schneck will also have to deal with the fact that heroffice routinely operates at an average of 22 percentbelow its authorized strength. David Maurer, GAO’sdirector of Homeland Security and Justice Issues, saidinformation technology (IT) security recruitment at DHSis hampered by the lack of clearly defined skill sets and aunique occupational series. Maurer said DHS officialstold congressional auditors they’re working to betterdefine and strengthen the required skill sets for cyberse-curity personnel, including pursuing a specific cyberse-curity personnel jobs series that could help improverecruiting and hiring.

But the failure of this office to determine what sortof skills its workforce should posses after seven yearsof operation suggests an organization that does notunderstand its basic function — cybersecurity.

AnalysisThere are two national US cyber authorities: DHSCS&C, and DoD’s Cyber Command.

On June 23, 2009, Secretary of Defense RobertGates directed the commander of the US StrategicCommand to establish a sub-unified command, theUnited States Cyber Command (USCYBERCOM). Fulloperational capability was achieved on Oct. 31, 2010.The command is located at Fort Meade, Md. CYBER-COM is responsible for providing cyber security forall DoD entities and installations. DoD also issued itsown strategy for operating in cyberspace — the firstDoD unified strategy for cyberspace that officiallyencapsulates a new way forward for the Pentagon’smilitary, intelligence and business operations.

But a point of fact is relevant here. GAO observedthat the strategy is much too vague to have any prac-tical value. DHS’s cybersecurity strategy is a visionstatement, not a practical strategy. And while bothauthorities claim to be willing to share informationand to work closely together, the evidence doesn’tsupport this.

What is needed is an individual — or a group ofindividuals — from both DoD and DHS who have theknowledge and dedication, as well as the time andenergy — to develop a real national cybersecuritystrategy that will incorporate specific actions, goalsand programs that will enhance security for all of UScyberspace. HST

9Go online today for exclusive online content and eNewsletters Homeland Security Today Magazine | December 2013/January 2014

AGENCY SPOTLIGHTThe US Army RDECOM CERDEC Integrated Cyber and Electronic Warfare, or ICE, programlooks to leverage both cyber and electronic warfare capabilities as an integrated systemto increase the commander's situational awareness. CERDEC is focusing its science andtechnology efforts on researching solutions to address specific cyber and electronicwarfare threats and developing the architecture onto which scientists and engineers canrapidly develop and integrate new more capable solutions.

US A

RMY

RDEC

OM C

ERDE

C IM

AGE

Mike Anders is anindependentconsultant providingprofessional technicalinformation servicesand cybersecuritysupport to a variety ofcustomers in the publicand private sector inthe Washington, DCarea. Anders was anintelligence analyst fora variety of privatefirms, includingNorthrup-Grummanand BDM.

Richard Wright is a 42-year veteran of theIntelligenceCommunity (IC) and ICcontractor industry.

Page 12: kmd_hst_201312

BY SYLVIA LONGMIRE, CONTRIBUTING EDITOR

Meet “Broly,” a supposed member of theMexico-based Knights Templartransnational criminal organization

(TCO), whose come-hither expressions are plasteredall over social media. You can find images of Brolywith his gold-plated AK-47s, masked and armed TCOfriends and plenty of others portraying him and hisbuddies as a force to be reckoned with.

For years, Mexican TCOs, such as the KnightsTemplar, Gulf Cartel and Los Zetas, have exploited thepublic relations value of social media for reasonsranging from the most gruesome to the more noble. InJune 2012, Gulf Cartel members posted a video onYouTube of four individuals purportedly working forLos Zetas being beheaded. Then, in August 2013, LosZetas beheaded a young woman and posted the videoof her savage murder on YouTube.

At the opposite end of the spectrum, after Hurri-cane Ingrid laid waste to parts of northeastern Mexicoin September 2013, the Matamoros-based Gulf Cartelposted videos online of its members distributingrelief supplies to local residents. The video went viraland quickly was viewed by more than half a million.Benign announcements and speeches by TCO leaders

are also broadcast via YouTube and can sometimesattract an enormous audience.

So, why would TCO members publicize their iden-tities and criminal activities and expose themselvesto vulnerability and capture?

Alix Levine is the owner of WEBehavior, a securityconsulting firm, and she follows the social mediaactivities of Al Qaeda and other extremists in order toglean valuable intelligence for her clients.

“Extremists of nearly every ideology exploit socialmedia in order to recruit, radicalize and ultimatelymobilize their grassroots followers,” Levineexplained. For TCO members, as well as extremists,part of the allure of posting “glamour shots” online isthe attention and notoriety it brings them. There’s anelement of competition to see which individual, groupor video can gain the most followers or views —something Levine calls the “gamification” of socialmedia. “The result is increased engagement, meaningpeople spend more time posting on the forums andsocial networking sites, despite the risk of detectionby law enforcement,” she said.

A considerable sum of valuable intelligence can begleaned from the information that’s posted on Facebookand Twitter by terrorists and TCO members.

“Scrutinizing an extremist’s [or ‘narco’s’] life priorto carrying out or attempting to carry out a terrorist[or criminal] act is an important task that can providelaw enforcement with crucial data on behaviors, com-

10 Go online today for exclusive online content and eNewsletters

Social Media Has Intelligence Value for Border Agencies

Benignannounce -ments andspeeches byTCO leadersare alsobroadcastvia YouTubeand cansometimesattract anenormousaudience.

December 2013/January 2014 | Homeland Security Today Magazine

IT’S NOT JUST PRETTY YOUNGGIRLS WHO LOVE TO POSE WITHTHE POUTY “DUCK FACE” FOR THEIRFACEBOOK PROFILE PHOTOS.

Page 13: kmd_hst_201312

with the city’s hashtag (eg: #reynosafollow or #mon-terreyfollow) is one of the only ways to collect intelli-gence on what is happening on the ground.

Despite TCOs’ general sense of invulnerability,these violent and PR-related posts can be success-fully exploited by both Mexican and US law enforce-ment agencies. In November 2013, Antoine Nouvet,from the Canadian research organization SecDevFoundation, told Britain’s Daily Mail that, “Technol-ogy that benefits the cartels suddenly turns out to beone of their key vulnerabilities. And that could be thecase in Mexico if the government adopts better skillsand laws to counter them in cyberspace.”

But, Nouvet cautioned, TCOs also have analystsworking for them, monitoring social media “to findout what Mexicans are saying and keeping an eye onthe movement of troops in and out of a city.”

US and Mexican agencies need to be just as savvyabout the potential uses — and intelligence value —of social media if they ever want to get ahead of TCOcross-border activities. HST

11Go online today for exclusive online content and eNewsletters Homeland Security Today Magazine | December 2013/January 2014

Sylvia Longmire is theauthor of the bookCartel: The ComingInvasion of Mexico’sDrug Wars. She is a for-mer special agent forthe US Air Force and aformer intelligenceanalyst for the stateof California.

BORDERS

munities and activities that tend to propel someoneinto the radicalization process,” Levine said. “Studyingthis information allows analysts to understand warn-ing signs and mitigate radicalization in communities.”

The use of social media by TCOs for recruitment isone of the most dangerous uses of the medium. Thenarco lifestyle is glamorized in Mexico, and photos ofTCO members with expensive clothes, stacks of cash,customized cars, jewelry and beautiful women furtherpropagate the idea that being part of the narco cultureis something to aspire to. Many American teenagers liv-ing in US border communities who are social mediasavvy are being targeted for recruitment because theirsocioeconomic situation leaves them with few options.

It’s relatively easy for US border agencies and theiranalysts to find and follow this information. Posts byTCO members are often made on publicly viewableFacebook pages or on metroFLOG, Mexico’s versionof Facebook. When there are violent incidents in Mex-ican border cities, TCOs often shut down news out-lets and a news blackout ensues. Following tweets

“AMU IS A TRUSTED AUTHORITYin the intelligence community.”

Supervisory Special Agent Michael Collett | Graduate, School of Security & Global Studies

Michael Collett knows the value of career-relevant education and chose AMU based on its reputation in the U.S. Intelligence Community. After serving in the U.S. Marine Corps Reserve, Army Special Forces, and California National Guard, Command Sergeant Major Collett embarked on a 20+ year career with the Drug Enforcement Administration. Today, he leads counter narcoterrorism operations and recently received the prestigious American Military University President’s Award.

Learn More at www.AMUonline.com/hstoday

Art & Humanities | Business | Education | Management | Public Service & Health | Science & Technology | Security & Global Studies

Page 14: kmd_hst_201312

12 December 2013/January 2014 | Homeland Security Today Magazine Go online today for exclusive online content and eNewsletters

Agreement Helps Secure 2016 Olympic GamesAn agreement was signed by INTERPOL and the Rio2016 Olympic Organizing Committee for the worldpolice body to provide additional support to Brazilianauthorities to help ensure the safety and security ofthe event.

As part of the agreement, an INTERPOL MajorEvents Support Team (IMEST) will be deployed toBrazil to provide onsite support through their connec-tion to INTERPOL’s tools, services and databases suchas Stolen and Lost Travel Documents, DNA, stolenmotor vehicles and internationally wanted persons.

“The agreement establishes the support of theintelligence service in the fight against all actionsthat could affect the integrity of sports and its signingthree years before the games allows it to start to beimplemented for the test events,” said Luiz FernandoCorrêa, Rio 2016 security director.

INTERPOL will also assist national authorities toaddress other crime issues linked to major sportingevents by providing training and investigative sup-port in illegal betting and match-fixing prevention,and combating counterfeiting and illicit trade.

The agreement was signed during the 82nd INTER-POL General Assembly in Colombia, where delegatesalso endorsed a resolution for a memorandum ofunderstanding with the International Olympic Com-mittee (IOC).

The memorandum will provide a formal structurefor enhanced cooperation between the two organiza-tions, particularly in relation to promoting integrity insports. It also provides for INTERPOL to work with the

BY KYLIE BULL, CONTRIBUTING EDITOR

IOC to identify and address issues which could affectthe integrity and security of matches and competitionssuch as doping, match-fixing and corruption.

Australian GovernmentWarned of Muslim RetaliationUthman Badar, spokesman for Hizb Ut Tahrir Australia,reacted to the Australian government’s intervention inthe Muslim community by warning that counterterror-ism policies are “begging for reactions.”

Hizb Ut Tahrir (Party of Liberation) is an interna-tional pan-Islamic political organization that’s associ-ated with the goal of all Muslim countries unifying as anIslamic state ruled by Islamic law and with a head ofstate elected by Muslims.

The organization is very active in the West, particu-larly in the United Kingdom, and is also active in sev-eral Arab and Central Asian countries, despite beingbanned by some governments. The group also has agrowing presence in North America, where it is knownas Hizb Ut Tahrir America, or HTA.

In a video issued to the press, Badar said “a warningto government is in order here. Because of your poli-cies, Muslims are being disenfranchised twice over:first by constant demonization of their faith generally,and then again by counterterrorism and counter-extremism policies which target them specifically. Thisapproach is calling — nay, begging — for reactions.One must ask: Is this being done with intent? Is thisbeing done to solicit a reaction in order to justify thegovernment narrative and policy?”

Badar called for the Muslim community in Australiato “understand and expose the counterterrorism policyof government for what it is, challenging and critiquingit, along with the flawed narrative on which it rests,propagating a counter-narrative reflective of the truth;and, more broadly, adopting an independent agendainstead of falling in line with the government agenda.”

Attorney General George Brandis responded bywarning the terrorist organization that the governmentwill not tolerate organizations that incite violence, andrejected its claim that Australia’s counterterrorismlaws target the Muslim community.

In an interview with The Australian, Brandis accusedthe previous government of downgrading national secu-rity concerns and said former Prime Minister JuliaGillard committed a “serious error of judgment” by sug-gesting the 9/11 decade had come to an end.

Referring to Gillard’s statement, in which she saidAustralia was entering a period dominated by tradi-tional, state-based threats, Brandis said the terror men-ace had become more, not less, sophisticated.

News from Around the World

Theagreementestablishesthe supportof theintelligenceservice inthe fightagainst allactions thatcouldaffect theintegrity ofsports ...

RIO

2016

/ALE

X FE

RRO

Page 15: kmd_hst_201312

GLOBAL

13Go online today for exclusive online content and eNewsletters Homeland Security Today Magazine | December 2013/January 2014

India, Russia to Hold FirstJoint Exercises as Part ofCounterterrorism CooperationIndia and Russia agreed to expand the range of theirstrategic partnership in a “significant manner” at the13th meeting of the India-Russia Inter-GovernmentalCommission on Military Technical Cooperation co-chaired by India Defense Minister Shri AK Antony andhis Russian counterpart, Sergey Shoigu.

At the meeting, the two countries agreed to holdjoint air force exercises for the first time in 2014. Inaddition, the two nations agreed to conduct a jointnaval exercise in the Peter the Great Bay in the Sea ofJapan. The armies of the two countries recently heldExercise Indra in Rajasthan with a focus on counterter-rorism. The two ministers agreed that there is a needfor further cooperation at all levels, especially in viewof mutual regional and global challenges and thethreats from terrorism.

In order to give a new impetus to the relationship,which has gathered momentum in recent years, thetwo sides agreed the time has come to expand cooper-ation in product design and development — which hasmade significant progress over the years — and to“involve various echelons of the defense establish-ments in strategizing policies and cooperation in thefast changing global security scenario.”

The situation in West Asia, especially in Syria andAfghanistan, was also discussed at the meeting.

Hungary Safely RemovesNuclear Reactor FuelHungary completed the transfer of its highly enricheduranium (HEU) research reactor fuel to the Russian Fed-eration, becoming the ninth nation to completelyremove HEU from its territory since the Tripartite (Inter-national Atomic Energy Agency-United States-RussianFederation) Initiative known as the Russian ResearchReactor Fuel Return program, which began in 2002.

The latest batch of 49.2 kilograms of HEU containedin spent nuclear fuel (SNF) that was irradiated in theBudapest Research Reactor was flown to Russia bythree air-shipment operations over six weeks in Octo-ber and November. The SNF was transported toBudapest International Airport where it was loaded onboard an Antonov-124 cargo plane and flown to Russia.

Earlier, 154.5 kg of HEU SNF was transferred to Russiain October 2008, and 35.4 kg of HEU fuel was repatriatedin 2009 and 2012. The three recent shipments bring thetotal amount of HEU removed from Hungary to 239.1 kg.

International Funding Call toRid Montenegro of Ammunitionand Toxic FuelIn November, Organization for Security and Co-opera-tion in Europe (OSCE) Secretary General LambertoZannier launched a bid for more international fundingfor an on-going project to clear Montenegro of surplusammunition and toxic rocket fuel.

Celebrating™

HomelandSecurityTODAY www.HSToday.us

The threerecentshipmentsbring thetotalamount ofHEUremovedfromHungary to239.1 kg.

ADVERTISERS: CONTACT [email protected] FOR OUR 2014 MEDIA KIT

10 YEARS OF EDITORIAL EXCELLENCE

Page 16: kmd_hst_201312

Speaking at a donor’s conference organized by thecountry’s Defence Ministry aimed at finding funding forthe MONDEM demilitarization program, Zannier reaf-firmed the OSCE’s on-going commitment to the pro-gram, calling it “one of the best examples of governmentand international cooperation to date.”

“This project has resulted in a safer environmentfor Montenegro’s citizens and the whole region,” Zan-nier said. “It has helped eliminate a constant threat ofexplosion from unstable ammunition stores and frompoisoning by toxic materials that leaked into theground and the water.”

Stressing that funding is needed to complete theproject, Zannier said “There is still over a thousandtons of unstable and obsolete ammunition that mustbe destroyed by the end of 2014, and the infrastructureof Montenegro’s largest military ammunition depotmust be upgraded.”

Established in 2006, the MONDEM project led thedestruction of 3,300 tons of heavy weapons, 60 battletanks, 900 artillery pieces and rocket launchers, and120 tons of toxic hazardous mélange oxidizer androcket fuel in its first year. Funding is provided by theMontenegrin government, United Nations DevelopmentProgram and the OSCE participating states of Belgium,Denmark, Hungary, Italy, Liechtenstein, Luxembourg,Norway, Slovakia, Slovenia, Spain and Turkey.

Situation in Bosnia and Herzegovina ‘Continues toWorsen’In his Nov. 12 address to the United Nations SecurityCouncil, High Representative for Bosnia and Herzegov-ina Valentin Inzko warned the 15-member body that“the situation in Bosnia and Herzegovina still meritsclose watch if we are to ensure that the gains made

after the war in terms of stability, rebuilding the coun-try and reconciling its peoples are not lost.”

In May, Inzko told the council that the political situ-ation had reverted to the negative trends of the lastseven years and the country’s elected leadership hadfailed to make a serious effort toward progress onEuro-Atlantic integration.

“I regret to say that six months later, and with lessthan a year left until the next general elections, this isstill the case, and in many ways the situation has con-tinued to worsen,” Inzko said.

Referring to the country’s recent first populationcensus since 1991, Inzko said “This is a significant devel-opment and vitally important for providing statisticalinformation on social and economic issues. It will beimportant that the results of the census not be used topromote divisions or exacerbate ethnic tensions.”

In a unanimously adopted resolution, the securitycouncil authorized the peacekeeping force known asEUFOR ALTHEA to continue its “peace stabilizationrole” in Bosnia and Herzegovina for another 12months, beginning Nov. 12. The European Unionassumed peacekeeping responsibilities in 2004 whenit took over from a stabilization force led by the NorthAtlantic Treaty Organization (NATO), which contin-ues to have a presence in Bosnia and Herzegovina.

United Nations Official IssuesWarning about Israel on Settlement ActivityA senior United Nations official voiced growing con-cern over the series of settlement announcementsmade by Israel in November and stressed the need toavoid actions that negatively impact ongoing Israeli-Palestinian peace talks.

“At this sensitive moment, it is imperative to avoidnegative actions and support ongoing talks to pre-serve the remaining chances of achieving a two-statesolution in the interest of Israelis and Palestiniansalike,” said the Special Coordinator for the MiddleEast Peace Process, Robert Serry.

The previous day, Israel reportedly announcedplans to build more than 20,000 new settler homes inthe West Bank, prompting Palestinian PresidentMahmoud Abbas to threaten an end to peace talksthat resumed a few months ago after a three-yearhiatus.

Serry said settlement activity cannot be recon-ciled with the goal of a negotiated two-state solution,and reiterated the UN position that settlements areagainst international law and an obstacle to peace.

14 December 2013/January 2014 | Homeland Security Today Magazine Go online today for exclusive online content and eNewsletters

This project has resulted in a safer environmentfor Montenegro’s citizens and the whole region. Ithas helped eliminate a constant threat of explosionfrom unstable ammunition stores and frompoisoning by toxic materials that leaked into the ground and the water.

OSCE

/SAV

E PR

ELEV

IC

Page 17: kmd_hst_201312

15Go online today for exclusive online content and eNewsletters Homeland Security Today Magazine | December 2013/January 2014

Against this backdrop, the special coordinator metseparately with Israeli and Palestinian negotiators.

“[Serry] understands from his discussion withchief negotiator [Tzipi] Livni and other Israeli officialsthat yesterday’s decision to plan a large number ofsettlement units has been stopped,” the UN said in astatement.

Direct talks between Israeli and Palestiniansresumed this past August after stalling in 2010 overIsrael’s refusal to extend its freeze on settlementactivity in the occupied Palestinian territory.

Meanwhile, Israeli and international mediareported that Israeli Prime Minister BenjaminNetanyahu is planning to build a security barrierbetween the West Bank and Jordan in a move aimed atasserting Israel’s control over the borders of a futurePalestinian state.

The Israeli newspaper Maariv reported thatNetanyahu ordered work to begin as soon as anotherfence currently being built on the country’s southernborder with Egypt’s Sinai Peninsula is completed.However, an Israeli official confirmed to the Britishnewspaper, The Telegraph, that the barrier was underconsideration but that a final decision had yet to betaken.

Republic of Korea Builds onEuropean Security CooperationKim Kwanjin, Minister of National Defense of the Repub-lic of Korea, opened the Seoul Defense Dialogue confer-ence on Nov. 12 by asserting that multilateralco-operation on security on the basis of respect, under-standing and trust between nations is “essential inproactively tackling complicated security threats.”

UN Organization for Security and Co-operation inEurope (OSCE) Secretary General Lamberto Zanniersaid the Republic of Korea is one of the longest-stand-ing Asian Partner countries of the OSCE, and that theinteraction between the country and OSCE is rich.

“This ongoing sharing of experiences responds tothe desire of our Korean partners to gain a betterunderstanding of the OSCE’s model of comprehensive,co-operative security,” Zannier said.

Referring to the Republic of Korea’s concept of theNortheast Asia Peace and Cooperation Initiative, Zan-nier encouraged the nation’s efforts to build trust,noting that OSCE’s broad and inclusive model of secu-rity co-operation served as “a catalyst for profoundchanges in East-West relations.” He also highlightedthe need for OSCE to adapt its work in confrontingevolving security challenges of transnational nature.

“Our model, which is so much a product of theEuro-Atlantic and Eurasian security conditions of thelast forty years, is only a single model,” Zannier saidin his address to the participants of the Seoul confer-ence. “Your eventual success will come from borrow-ing only those elements from the OSCE toolbox thatare suited to your political and security context,adapting them to your specific needs.” He stressedthat OSCE was ready to offer its expertise to theKorean authorities.

China, Japan and Nigeria Lookto Strengthen Security The Central Committee of the Communist Party ofChina (CPC Central Committee) will establish a statesecurity committee to improve the national securitysystem and national security strategies.

It will be a high-level national security organizationtasked with coordinating both domestic and foreignissues covering the areas of defense, diplomacy, intel-ligence, public security, armed police, foreign tradeand publicity. The move will bring China’s military,intelligence, public security and foreign policy agen-cies under President Xi Jinping’s direct control.

The CPC Central Committee announcement cameas Japan prepared to pass a bill on the establishmentof its own National Security Council (NSC). JapanTimes reported that the NSC bill went hand-in-handwith a secrecy bill giving heads of administrative bod-ies discretionary power to designate informationrelated to security, diplomacy, counterintelligenceand counterterrorism as special secrets, potentiallylimiting public access to government information.The bill also mandated harsh penalties for thosefound guilty of leaking special secrets.

The United States set up the National SecurityCouncil as early as 1947 to advise and assist the pres-ident on national security and foreign policies. Othercountries, including Brazil, Chile, South Africa,Turkey, Thailand, Russia and Malaysia have also setup similar security councils.

In Africa, the Nigeria Governors Forum recentlyemphasized the need to develop a national securityframework for the country, as contained in a commu-niqué issued at the end of a two-day retreat in Sokoto.

The Nov. 16 communiqué said the frameworkshould include trans-national security cooperation,human security and environmental security. It alsoreiterated the demand for state police as a require-ment of a federal system of government and for multi-level policing to improve the security of citizens. HST

GLOBAL

Kylie Bull is the formereditor of IHS Jane’sHomeland SecurityReview and GlobalResponse. She also is acontributor to IHS Jane’sDefence Weekly, IHSJane’s Airport Reviewand other IHS Jane’s ref-erence and news titles.

Page 18: kmd_hst_201312

16

INDUSTRY NEWS

TCOM Aerostat System Provides Real-Time ‘Eye In The Sky’ Intelligence to CBPTCOM, a manufacturer of airborne persistent surveillance solutions, announced that US Cus-toms and Border Patrol agents in key operational environments along US-Mexico border areevaluating multiple aerostat systems.

According to TCOM, Border Patrol is deploying its 17M and 22M tactical class aerostatsand 38M operational class aerostats “to aid in detection and tracking efforts throughout themost highly trafficked areas along the US-Mexico border.”

“Each aerostat system carries a payload of advanced sensor equipment, the same typeof sensor equipment that Border Patrol agents use elsewhere,” the company said, addingthat the aerostats “can typically remain aloft for two weeks to one month at a time. With op-erational altitudes of up to 5,000 feet, the aerostats provide comprehensive monitoring of thou-sands of square miles. This extensive range and detailed data provide the actionable intel-ligence Border Patrol agents need to make mission critical security decisions and keep theNation’s border region safe.” (Source: TCOM, www.tcomlp.com)

u

INDUSTRY ROSTERXerox appointed Michael Bowers as

president of Xerox Federal Solutions …

ManTech named H. Chris Goodrich as

chief operating officer and executive vice

president of its Mission, Cyber &

Intelligence Solutions Group … Eddie

Schwartz joined Verizon as vice president

of global security solutions … Integrated

Microwave Technologies LLC names

Brian Rowe as business development

manager … Christian S. Alexander has

b e e n a p p o i n t e d g l o b a l b u s i n e s s

development (BD) director of Parsons

Government Services Inc. … ARA’s Larry

Hull received a Cardia Draconis Award—

the highest honor that can be bestowed

upon an Air Force Emergency Manager.

First Responders can Share Incident DataInstantly with DHS FiRST App UpdateThe Department of Homeland Security (DHS) Science and Technology Directorate (S&T)announced the release of a “major sharing service update to its First Responder Sup-port Tools (FiRST) mobile application,” which was first released in 2011.

“The FiRST app provides first responders with useful information and response re-sources, such as information on safe distances for cordoning off in response to potentialimprovised explosive device or hazardous material incidents, on their smart phones,tablets or laptop computers,” S&T said.

S&T said it “worked with first responders who used the tool in the field to devel-op the new FiRST Sharing Service — allowing response agencies to create defined usergroups to share incident data and photos with colleagues directly through the app.”

The FiRST app — currently available for Apple, Android and Windows PC devices— was developed in partnership with the DHS National Protection and Programs Directorate Offices of Infrastructure Protection and BombingPrevention, as well as Applied Research Associates Inc.

The FiRST application is available for download at www.firstsupporttools.com. (Source: The Department of Homeland Security Science and Technology Directorate, www.dhs.gov)

December 2013/January 2014 | Homeland Security Today Magazine

uAP

PLIE

D RE

SEAR

CH A

SSOC

IATE

S IN

C.

TCOM

Page 19: kmd_hst_201312

17Homeland Security Today Magazine | December 2013/January 2014

INDUSTRY NEWS

u

CBP’s Global Entry Program AchievesMilestoneUS Customs and Border Protection (CBP) announced that one million peoplehave been given the designation of a “trusted traveler” through the Global En-try program. The program, which was launched five years ago, provides arrivingtravelers with a quicker, more efficient and more secure entry process into theUnited States.

“I commend the commitment and efforts of CBP and our government and in-dustry partners who have made Global Entry the success that it is today,” saidCBP Acting Commissioner Thomas S. Winkowski. “Global Entry is a vital part ofCBP’s efforts to maximize resources to facilitate the thousands of travelers thatenter the country every day while enhancing border security at airports.”

Global Entry was launched on June 6, 2008, as a pilot program at Houston’sGeorge Bush Intercontinental Airport, Washington’s Dulles International Airportand New York City’s John F. Kennedy International Airport. Currently, Global En-try services are available at 44 airport locations.

(Source: US Customs and Border Protection, www.cbp.gov)

DHS and White House OfficialsParticipate in CybersecurityWorkforce RoundtableAs part of the Obama administration’s ongoing focus on recruitingthe next generation of cybersecurity professionals, on Nov. 5, sen-ior leaders from the Department of Homeland Security (DHS) joinedsenior leaders from the White House for a roundtable discussion withstudents studying in cybersecurity-related fields.

During the event, participants were able to hear firsthand thegroundbreaking work happening at schools across the country anddiscuss the value of public service in this area. Officials also un-derscored the department’s efforts to build a cybersecurity talentpipeline working with secondary and post-secondary institutions na-tionwide and other key partners.

DHS has created a number of highly competitive scholarship, fel-lowship and internship programs to attract top talent seeking to pur-sue a career in cybersecurity and public service.

(Source: Department of Homeland Security, www.DHS.gov)

u

u

Thales to Enhance UK NuclearPower Station Emergency ResponseThales UK announced Nov. 28 that it will provide a Deployable Commu-nication and Information System (DCIS) capability for EDF‐Energy NuclearGeneration Limited (EDF‐Energy NGL) in a contract worth £5 million.

The DCIS will provide a deployable containerized capability to mon-itor critical plant systems and relay essential data through a resilientcommunications network. The system will allow operators to access,monitor, communicate, analyze and act upon the critical data. Ultimately,the system will provide emergency response decisionmakers with theinformation that they need to make the best possible decisions.

Thales will enable EDF-Energy NGL to deliver the regulatory re-quirement to deploy resilient communications as part of wider rang-ing capabilities to recover from an extreme natural event in the Unit-ed Kingdom. (Source: Thales UK, www.thalesgroup.com)

CBP

PHOT

O BY

LAR

RY P

ANET

TA

Page 20: kmd_hst_201312

18 December 2013/January 2014 | Homeland Security Today Magazine

Shut System

In five years … or less, many access control systems will be legend … and the security issues could be legion.

Page 21: kmd_hst_201312

19Homeland Security Today Magazine | December 2013/January 2014

bsolescence through time is proceeding to shut down existing securitysystems from further product or technical support right before our veryeyes. By 2015, the computerization of electronics will have increased thecapacity of integrated circuits one million fold in just 30 years’ time.

Electronic chips are already more than three million times lighter and10,000 times cheaper than an equivalent device 30 years ago. But even with

this substantial increase in miniaturization, memory management, memory capacity,cloud services and virtualization of the legacy personal computer (PC), the basic X86processor is still the same old device of 40 years ago. This will pose serious and fun-damental problems for access control and other security systems by 2018 because ofthis simple reality of life cycle and the consequent costs to continue interim softwaredevelopment until the next X86 version processor is developed.

By 2018, more than 50 percent of all card access systems deployed today will haveno support. Nor will replacement parts be available. Nor will the licensing model of In-ternet protocol (IP) cameras be the same as it is today. IP cameras, encoders and net-work video recorders/storage area networks (NVRs/SANs) will all be changed and mayno longer be supported. And if that isn’t enough, the networks required to supportthese systems will evermore change, become evermore secure, evermore hardenedand evermore apt for a failure to occur network-wide.

In this same short time span, a paradigm shift in public safety technologies willoccur. And little has been done — or is being done — to warn about these importantchanges. By 2018, 3-D satellite modeling, geo-located infrastructure, a quadrupling ofavailable field sensors, identification credentialing, biometrics and physical securityintegration management will outpace our physical ability to manage alarms and in-cidents on a knowledge-based level the same way we do today.

OBY JERRY “DUTCH” FORSTATER, CONTRIBUTING WRITER

Down

C R I T I C A L I N F R A S T R U C T U R E S E C U R I T Y

Page 22: kmd_hst_201312

The AFCEA Homeland Security Conference is the premier event in the National Capital area to learn about our nation’s most significant homeland security issues. The conference offers an opportunity for you to engage with key Government and Industry leaders on these critical matters.

The Conference will address these and other current Homeland Security IT issues:

• Doing Business in Homeland Security – Procurement Executives Roundtable

• IT Priorities in Homeland Security – CIO Roundtable

• Information Sharing – Fusion Centers• Mobility and Interoperability• Professionalization of Cyber Security –

Human Resources• Role of Laboratories in Homeland Security• Screening and Vetting Processes• Secure Supply Chain

The AFCEA Homeland Security Conference agenda is designed to attract Government and Industry IT professionals, CIOs, and Program Managers involved in operations, policy and procurement issues. The agenda will incorporate viewpoints that cross government lines — federal, state and local — and merge industry’s perspective on solutions to the unique Homeland Security challenges.

Confirmed Opening Keynote Speaker:

ADM Thad Allen, USCG (Ret.)Senior Vice President, Booz Allen Hamilton

23rd Commandant of the Coast Guard

RETURNING IN 2014: Homeland Security Small Business Symposium Monday, March 10Open to all full conference registrants; Separate registration available.

Program details and registration: www.afcea.org/events/homeland

For exhibit information: Ben Smith, 703-631-6126 or [email protected]

For sponsorship information: Theresa Fox, 703-631-6170 or [email protected]

Page 23: kmd_hst_201312

21Go online today for exclusive online content and eNewsletters Homeland Security Today Magazine | December 2013/January 2014

Others

>80%

Others

>80%Access Devices Using Wiegand CommunicationProtocol

Critical System Security Components Still Using 1970’s Technologies

X86 BasedProcessors

Source: G. I. Forstater©, 2013

Major access control systems manufacturers today are pittedagainst managing old data gathering panels, multiplexed electronics,legacy software, Weigand-based wiring, positive identification, digitalcommunications and cyber constraints with mounting technicalchallenges. Many analog switch-based — and now vintage 2005-eradigital closed-circuit TV systems — will also find themselves islandsin a non-interoperable world, at least in part because of hardware,but more often because of rewriting of software code that preventsoptimization. And it’s entirely due to software that’s designed for thelegacy X86 microprocessor manufactured continuously since 1979.

The X86 is the heart of most machines. The microprocessorpumps, regulates, synchronizes and generally acts like the con-ductor of a micro-miniature orchestra with 64 instruments, con-ducting up to 20 or more scores at once, at a speed that 20 yearsago seemed a far-flung reality.

If you’ve ever touched a computer — no matter what brand ormodel — this tiny machine no bigger than a silver dollar has in-tertwined its reputation into your soul. It’s known by many aliases,such as 286, 386, Pentium and the server’s X86 version — the Xeon.All the while, though, newer PCs and mobile devices still base thei3, i5, i7 and even 2006 Core Duo technology on the X86. The X86is, essentially, the ‘79 vintage Ford Mustang of the industry.

And it needs software to complement it — lots of it — and allcoded as in the old days. While normally not written in DOS (itsold “shell”) the shadow of this workhorse still resides inside —tamed but now restless from relentless improvement.

By 2025, machine knowledge will exceed human knowledge.With life expectancy approaching almost 90 years by this time, itwill mean an increase in the workforce and an increase in humantransportation needs. This could mean an average three-fold in-crease in ridership on public transportation in less than 15 years.

It will also mean inherent security and safety risks, because by2050, one in three people in the world will live in areas prone tonatural or manmade disaster. Urbanization, migration and geo-pol-itics will continuously influence public safety, corporate and home-land security’s systems capabilities to comprehensively managerising oceanographic waters, severe temperatures, earthquakes,storm effects, nuclear disaster, fossil fuel damage, clean water andfood shortages.

The concept of Big Brother watching us is now entirely ele-mentary. We’re actually installing sophisticated sensors, whetherthey are video cameras or monitors, of endless varieties. Andthey’re all computers. And the relative number of them using so-phisticated technologies has risen by the millions since 1975.

Yet, even with the X86 microprocessor that’s used in 80 percentof computers, production of the microprocessor leveled off for PCsby almost 5 percent in 2013 as a result of mobile devices. Mean-while, pure IP platform video and/or sensor production has multi-plied dramatically. It may well be that for each PC/server deployed,more than 10 times that number will be deployed as IP-based videocameras or microcomputer sensor devices with the capability todecipher critical scene or environmental data in its microproces-sor without forwarding irrelevant, spurious “noise.”

From bad to worseFew want change. It’s like the mechanic who says fixing it willcause more problems. Well, if that’s the case, then it’s probablytime for a complete overhaul. The following are a few case studiesthat illustrate the extant problem of technology “sunsets.”

As recently as 2010, a nuclear power plant was recording 30,000false alarms per month, with a tendency to lock up its 1987 com-puter when a history query was performed. Its memory — the size

THE CONCEPT OF BIG BROTHER WATCHING US IS NOW ENTIRELY ELEMENTARY. WE’REACTUALLY INSTALLING SOPHISTICATED SENSORS, WHETHER THEY ARE VIDEO CAMERAS OR

MONITORS, OF ENDLESS VARIETIES. AND THEY’RE ALL COMPUTERS. AND THE RELATIVE NUMBER OFTHEM USING SOPHISTICATED TECHNOLOGIES HAS RISEN BY THE MILLIONS SINCE 1975.“

Page 24: kmd_hst_201312

22 December 2013/January 2014 | Homeland Security Today Magazine Go online today for exclusive online content and eNewsletters

Life CycleAsset Analysis ClassificationExisting

AssetsRedefined

Assets

New Aquisition

New Life Cycle

Forward Compatible

No EOL in Near Future

In-But-OutEOL < 4 Years

EOL > 3 Years Ago

EOL > 10 Years Ago

Escalation of Assets Replacement Model (EARM)

Legacy

Terminal

Terminal

Existing System Assets

Redefined SystemAssets

X

Source: G. I. Forstater©, 2013

of a large microwave with LP record-type spinning platters — wasso old it was considered an eBay collectable in 2000.

There’s the police department that had two-dozen digital videorecorders all lacking time synchronization, making evidentiarychain of custody evidence questionable.

Consider the government agency with thousands of card holderswho basically didn’t exist anymore, and whose administrative ac-cess control system will be a thing of the past in a matter of years.Moreover, the manufacturer is “declining” any usable or sensible mi-gration paths, abandoning them with no life raft … or preserver.

Finally, when trying to incorporate a myriad of technologies,there’s the airport that loaded the latest patch and security up-date for its switches, but failed to realize the update was not codedcorrectly and lost particular settings that were necessary for op-eration, bringing the system to a slow grind.

Contrast these obstacles with what the near future has in store.By 2020, small “drone” probes — flying video cameras — will eco-nomically and silently patrol critical infrastructure, pre pro-grammed for the inside of buildings, corridors, offices andmechanical spaces. They may even sense fire, water, temperature,

Page 25: kmd_hst_201312

23Go online today for exclusive online content and eNewsletters Homeland Security Today Magazine | December 2013/January 2014

smoke, people, pests and obstacles. They’ll be launched at eachlocation from a “home base” where they’re charged and receivemaintenance and upgrades. They’ll even diagnose their own healthand replace their own batteries. They’ll be a force multiplier if everthere was one.

Virtual alarm rooms will also appear more frequently. Theserooms will envelop operators and provide a uniform video struc-ture that is seemingly endless, with true visual perspective. Seam-less and up to 100 inches tall, the wraparound polymer screenswill be able to dimensionally show the corporate enterprise orcityscape as virtual video. It’ll provide a fly-by-wire approach tovirtualization, incorporating commands through verbal and non-verbal communication with the computer. Most important, thecomputer will now be the analytical tool used to determine alarmsand processing of information.

Now imagine a neural network of computers — actually cam-eras with the power of computers 1,000 times more powerful thanthose on Apollo 11, the first manned spacecraft to land on themoon — all connected to a stream filter that not only connects thedots, but learns from us and then teaches us. Massachusetts-basedWorcester Polytechnic Institute’s Database Systems ResearchGroup (DSRG) is investigating how these technologies can prepareus for stream filtering information.

Elke Rundensteiner, a DSRG professor, said “We’ve got to filterdown through the fire hose of data” to “scale to big data streamsand on the other hand not miss any critical nugget.”

Will we be able to fix legacy problems, incorporate more tech-nically diverse applications and drink from the fire hose of datawhile still relying on older microprocessor designs?

AnalysisWith the advent of newer, more reliable and improved sensors andthe need to manage sustainable security or public safety systems,the next five years is the right time to exercise the planning of asustainable migration path — whatever the microprocessor, chipor computer’s new name or namesake.

Important decisions need to be made about evaluating supportand funding of existing systems or software before acquiring newtechnology. Any legacy system greater than 15 years old needs tobe identified as to whether it’s nearing its end of life and will ter-minate in the immediate future. End of life for a potentially termi-nated system could also exist for anything that has not receiveddirect original equipment manufacturer support for three years orlonger. These are the two most significant decisions with costlycontinued support issues.

The next two decisions involve supported and forward-compatiblesystems — systems that have an end of life greater than four yearsfrom now or no determination for end of life. Investing additionalmoney into technology for these systems makes the most sense.

But be forewarned: Even new acquisitions can have a downsidewhen manufacturers merge, are acquired by larger corporate

takeovers or lose the strategic edge due to market climate. In manyinstances, high technology investments have faltered due to sup-port or manufacturers’ corporate disintegration.

When can we expect new operating systems and software to bedeveloped? When the labor required to produce the hardware withall the sensor, input, output, communications and security codesand tightly embed them into easily programmable and expandablechips — is close to zero. Perhaps a consortium that has the money,willpower and desire to use artificial intelligence will provide thenext design. It will be sometime before computers design new cir-cuits, “grow” silicon and nanotube circuits, assemble the compo-nents and program themselves.

It’s in the nation’s fundamental interest to develop this nextprocessor and programming masterwork in the United States. Thiswill provide us with manufacturing preeminence, stiff security andencryption code development with the intrinsic ability to incor-porate a sensor-driven world onto our own — saving lives, reduc-ing crime and helping us prepare to maintain our technologyleadership into the 21st century. HST

Jerry “Dutch” Forstater is CEO, COO andchief engineer of Professional SystemsEngineering LLC, which he founded in1986 and which is nationally known for itsexpertise in design and engineering ofintegrated systems for complex criticalinfrastructure projects. He is boardmember of the International Association

of Professional Security Consultants (IAPSC) and secretary ofthe Philadelphia chapter of ASIS International.

u Learn more on this subject at www.HSToday.us

WITH THE ADVENT OF NEWER, MORERELIABLE AND IMPROVED SENSORS AND

THE NEED TO MANAGE SUSTAINABLE SECURITYOR PUBLIC SAFETY SYSTEMS, THE NEXT FIVEYEARS IS THE RIGHT TIME TO EXERCISE THEPLANNING OF A SUSTAINABLE MIGRATION PATH— WHATEVER THE MICROPROCESSOR, CHIP ORCOMPUTER’S NEW NAME OR NAMESAKE.

PHOT

O BY

ALL

EN S

TOCK

, CDI

/KIM

BALL

ARC

HITE

CTS

Recently completedPhiladelphia DelawareValley Intelligence Center.

Page 26: kmd_hst_201312

CounterPreserving

INSTITUTIONAL 24 December 2013/January 2014 | Homeland Security Today Magazine

Page 27: kmd_hst_201312

-IED

ome of the most imperative technical training and knowledge that emerged from theconflicts in Iraq and Afghanistan were defense tactics against the improvised explosivedevice (IED) threat. While IEDs were one of the biggest threats to troops during the con-flicts, the biggest threat today is losing the lessons we learned. If we don’t protect insti-tutional counter-IED knowledge, it will be one of the most significant intelligence lossesin our nation’s history.

Throughout history, nations have emerged from military conflicts pledging to learn from theirmistakes and vowing not to repeat them. Unfortunately, many continue to make a mistake thatwastes the vast sources of intelligence and practical knowledge gained during times of conflict.

Far too often, countries suffer from an institutional knowledge drain after the end of war. Forexample, soldiers returning from combat trained in the operation and maintenance of the very besttechnologies find themselves unemployed and idle for long periods of time. Those fortunateenough to find work rarely continue in the field in which their nation spent untold amounts ofmoney and resources to train them.

The US military first experienced this loss to a noticeable degree following World War II and paida huge price in battlefield losses early in the Korean conflict; however, this problem is not unique tothe United States. Israel suffered a similar institutional “memory loss” after Arab armies attackedacross the Sinai Peninsula and Golan Heights in the Six-Day War in 1967 and the Yom Kippur War in1973. These losses most often occur following large, hastily undertaken military operations. Andafterward, armies simply forget how they fought the last war.

If this issue of institutional memory loss is not considered after our nation’s recent militaryoperations in Iraq and Afghanistan, we will once again lose the hard-won, expensive body of analyt-ical and institutional knowledge associated with many aspects of Operation Enduring Freedom andOperation Iraqi Freedom. Only this time, the impact could be far more costly to our nation. UnlikeWorld War I, World War II, Korea and Vietnam, we will likely continue to be involved in the GlobalWar on Terrorism for decades to come — in fact, the threat may never completely end. That’s whymaintaining and growing our counter-IED efforts has never been more crucial, but they appear tobe moving in a dangerous direction.

BY PATRICK S. McGLYNN AND GODFREY GARNER, CONTRIBUTING WRITERS

S

MEMORY25Homeland Security Today Magazine | December 2013/January 2014

Page 28: kmd_hst_201312

26 December 2013/January 2014 | Homeland Security Today Magazine Go online today for exclusive online content and eNewsletters

This past fall, James Craft, deputy director, information enter-prise management at the Joint IED Defeat Organization (JIEDDO),acknowledged that the organization is rapidly shrinking.

JIEDDO’s budget has been reduced from a high of $4 billion in2008 to $2 billion today, and it’s facing much deeper cuts as it plansfor its fiscal year 2015 budget cycle. While Craft said the organiza-tion will maintain capabilities, he conceded that there will come atime when it will not be able to do everything it’s been doing.

The United States cannot afford to continue to pay this steepprice of avoidable losses. We owe it to our military service mem-bers in harm’s way to preserve this institutional memory, and wemust take every precaution to protect them on the battlefield. Inpreserving institutional memory, we may also stave off the signifi-cant economic troubles that have plagued our nation followingmany of our recent military engagements.

So what’s being done?Although the news media focuses on the war in Afghanistan, IEDsare not confined to this far off battlefield. Many analysts predictthat the use of IEDs, as we experienced during the Boston Marathon

In response to the detonation of Improvised Explosive Devices(IEDs) during the Boston Marathon, the Federal EmergencyManagement Agency (FEMA) compiled a collection of lessons

learned for first responders to help deal with the use of IEDs andother weapons of mass destruction (WMDs) at highly populatedevents.

The materials “include a variety of documents, plans and afteraction reports that can help emergency managers, law enforce-ment officers and other responders prepare for, respond to andrecover from a terrorist attack or related incident,” FEMA said.“These resources can help the whole community safely cope andrecover from a terrorism situation before as well as after lawenforcement and other responders arrive on the scene.”

The information can be accessed through FEMA’s LessonsLearned Information Sharing (LLIS) program available to regis-tered users online at LLIS.gov.

“I think the best application and reason these resources [were]released so quickly is so that others within our field have access tothe most relevant and contemporary information possible,” saidenGenius Consulting Group emergency management analystSamuel Boyle.

“In what is considerably the most prevalent and likely onlysuccessful ‘terrorist’ attack to occur on United States soil since9/11, it sits at the front of our minds as we move forward and planpublic events and other operations moving forward,” Boyle said.

“This case shows the value of crowd sourcing and investiga-tion, the value and integration of social media and the threat posedto domestic security through the rise of fourth- and fifth-genera-tion warfare concepts,” Boyle said. “Lessons to be learned includewhy an individual under a terrorism advisory for over three yearswas not arrested or even extensively questioned, and as moreinformation becomes available, it demonstrates the mindset andresources of these individuals who have as far as we can tell rightnow acted without the formal support in terms of logistics or intel-ligence from a terrorist cell.”

In announcing its IED lessons learned collection, FEMA cited aHomeland Security Today report disclosing that since November1994, terrorists had attacked seven marathons around the world,killing at least 14 people.

FEMA said, “these resources can help the whole communitysafely cope and recover from a terrorism situation before as wellas after law enforcement and other responders arrive on thescene.”

Among the resources FEMA has made available include:

• Boston, Massachusetts’ Medical Consequence ManagementPlan for the 2004 Democratic National Convention

• The 2004 Democratic National Convention After Action Briefing

• DHS Bomb Threat Stand-Off Chart• Protective Measures for Improvised Explosive Devices (IED) at

Mass Gatherings December 2010• Medical Response Planning and Triage for Mass Casualty

Ter ror ist Bombings

FEMA’s IED LessonsLearned Collection for First RespondersBY ANTHONY KIMERY, EXECUTIVE EDITOR

BOSTON, USA - APRIL 21: Local visiting one of the several memorials ofthe Boylston St. to leave mementos and pray for the victims of the BostonMarathon 2013 bombing on April 21, 2013.

MAR

CIO

JOSE

BAS

TOS

SILV

A / S

HUTT

ERST

OCK.

COM

Page 29: kmd_hst_201312

27Go online today for exclusive online content and eNewsletters Homeland Security Today Magazine | December 2013/January 2014

bombing, will be a standard ongoing operational tactic utilized byjihadists in America for the foreseeable future. The technologyinvolved in the construction and deployment of these devastatingdevices is constantly evolving; the use of IEDs remains our numberone threat — on and off the battlefield. Thus it is imperative that wecontinue developing innovative solutions and countermeasures.

The Pentagon’s JIEDDO, established in 2006, was one of the firstmajor organizations created to develop a body of knowledge tocombat IEDs. It reviews and analyzes all aspects of counter-IEDattacks using data collected by military and law enforcement agen-cies in an effort to identify and thwart the adversarial networksbehind them. The process of “attacking the network” is arguablythe most critical of JIEDDO imperatives. It reduces IED effects andinterrupts the enemy IED threat by identifying and exploiting keythreat vulnerabilities, directs offensive actions to slow and/or dis-rupt enemy’s IED innovation cycle (thus prolonging effectiveness ofcurrent counter-IED efforts), buys time to create new IED counter-measures and forces the enemy to pay a price.

According to JIEDDO, from January to November 2011 — exclud-ing Afghanistan and Iraq — there were 7,000 IED events reportedglobally, averaging 621 per month. Of these totals, 490 events and28 casualties were in the United States. These events resulted in12,000 casualties in 111 countries and were conducted by individu-als supported by 40 regional and transnational threat networks.

IEDs are cheap, simple and made from readily available materi-als that may be easily adapted to other environments. Social mediahas encouraged IED capability and training and allowed it to spreadthrough urban communities all over the world. Common IED con-struction and deployment techniques have been identified by ana-lysts in urban locations on every continent. The basic knowledgethat conceives a radio-controlled, cellphone-triggered IED in Chech-nya could later manifest itself on the battlefields of Iraq and then bepassed to terror groups in the Levant, finally finding its way to thenarco-cartels of Mexico.

Small two- or three-person elements made up of criminals, insur-gents and/or terrorists, transnationally have converged to becomea nexus of highly trained illicit networks. These illicit networkscross all borders and manifest within all levels of society. At thevery least, this validates the urgency of a continued, increasedcounter-IED effort in the United States. It also points to a greaterneed to pool the intelligence resources of multiple transnational,military, law enforcement and government customs and diplomaticagencies to better defend against future IED attacks.

So, what needs to be done?The US government is making strides in preserving the institutionalmemory associated with the IED threat. In addition to JIEDDO, theFBI stood up the Terrorist Explosive Device Analytical Center(TEDAC) in 2004. However, much more must be done to prevent theloss of institutional knowledge and tradecraft that resides withinthe soldiers who served on the frontlines — and experienced thesuccesses and failures of this intelligence first hand.

While some of this counter-IED knowledge is translated into pro-cedures, policies and military “lessons learned,” most of it isretained in the heads, hands and hearts of individual officers, sol-diers, analysts and functional experts. Over time, much of this insti-tutional knowledge is lost as troops leave the service or retire.

Future battlefields, whether international or local, will remaincomplex, dynamic and unforgiving. Those who are intent on thedestruction of the American way of life will continue to adapt,employing unsophisticated, low-cost capabilities and techniques todeliver murder and desolation. It is imperative that the defenseindustry, national military, law enforcement and their respectiveintelligence organizations continue to collaborate and develop new

systems and processes that allow us to stay ahead of these emerg-ing, complex hybrid threats.

At the regional level, examples such as the Asia-Pacific Counter-Improvised Explosive Device Center are a good start, but counter-ing the IED threat must truly be transnational. As we continue toadapt in order to make ourselves an ever increasingly intercon-nected and effective network, we must cross all borders to denysafe havens and sanctuaries to illicit networks.

Government institutions around the globe must expeditiouslyface the transnational IED threat and deal with it effectively. The onlyworkable end game is one where criminals and terror organizationscannot escape pursuit by crossing a border. Otherwise, there willcontinue to be failed nation states and pirate organizations support-ing IED production networks plaguing the civilized world.

In addition to military and government initiatives, we also mustnot overlook the importance of the defense industry. The defenseindustry develops new sensors to locate IEDs, builds the equipmentto defeat the device and creates the analytical tools that are used toattack the IED threat networks. The commercial sector is alsouniquely positioned to bridge gaps between nations that military anddiplomatic entities are somehow unable — or unwilling — to over-come. Like military and law enforcement, industry is a full-partner inthe fight, and it must be totally integrated into this counter-IED ana-lytical skills/knowledge retention and expansion effort.

AnalysisIt has taken many years and millions of dollars for intelligenceorganizations to develop and refine the proactive analytic trade-craft to be decidedly effective in attacking terror and criminal net-works. The ability to conceptualize the threat network and attack itat critical upstream nodes largely lies in the minds of intelligenceanalysts and the soldiers on the ground who gained their skills inthe line of fire on battlefields around the world.

That knowledge must be continuously captured, preserved andused to pollinate other military and law enforcement organizations.

As budgets decrease and priorities change, efforts to preserveand expand this institutional counter-IED analytic knowledge hope-fully will continue, and the painful battlefield lessons of the lastdecade will not have been in vain. HST

Godfrey Garner retired from US SpecialForces in 2006. He served two military toursand six civilian government related tours inAfghanistan. His work there most recentlywas as a counter-corruption analyst. He’s afrequent contributor to Homeland SecurityToday and Foreign Policy Journal on issuesrelated to Afghanistan.

u Learn more on this subject at www.HSToday.us

Patrick S. McGlynn is a retired US Army mil-itary intelligence officer who served in theAfghanistan and Iraq combat theaters. As anemployee of BAE Systems, he recently per-formed multiple deployments to Afghanistan,where he provided intelligence support to USand other ISAF Forces.

Page 30: kmd_hst_201312

28 December 2013/January 2014 | Homeland Security Today Magazine

hether for business or pleasure, travelers oftenfind themselves allocating significant sums of dis-cretionary and nondiscretionary income tosecure the best home away from home — a tem-porary abode that serves as a warm blanket andprovides well-deserved peace of mind.

However, keeping security tight can be a daunting challenge forhoteliers; guest expectations run high, and the sheer volume of visi-tors can give any seasoned security expert enough to worry aboutin spades.

Threats from criminals, terrorists and other villains are an ever-present concern for travelers, particularly those who expect a sig-nificant buffer of security from their hotel. Most travelers, however,often become unsuspecting victims. They fairly easily can becomeprey due to their confined, predictable and largely controlled space.

The operating landscapeAccording to the American Hotel and Lodging Association, anational association that represents all sectors and stakeholders inthe lodging industry, the typical lodging customer in 2012 traveled60 percent for leisure and 40 percent for business. More than 40 per-cent of leisure and business travelers spent at least one night in ahotel during that time.

Additionally, AAA, formerly the American Automobile Associa-tion, a nonprofit member services organization with more than 53million members, projected in its AAA 2012/2013 Year-End HolidaysTravel Forecast, that “93.3 million Americans would journey 50 milesor more from home during the year-end holidays — an increase of

1.6 percent over the 91.8 million people who traveled [the previous]year. This increase brings holiday travel figures to within half a mil-lion of the decade-high mark seen during the 2006/2007 season.”

Hotels and hoteliers strive to provide a safe place for travelers,but they do not guarantee your security — nor can they legitimatelydo so. Targeting victims for devious exploitation in hotels is a sys-temic landscape for the ill intentioned. Generally, criminals andthieves seek victims of opportunity, and hotels offer plenty ofopportunity. Further, terrorists take population density and likeli-hood of success into consideration when identifying a site for masscasualty targets, and hotels are a formidable preference.

Anthony Roman, president of Roman & Associates, a globalinvestigation, risk management and security consulting firm con-ceded to Homeland Security Today that the security landscape israther poor for the hotel industry.

“They are underfunded, minimally trained and there is theexpected poor execution of security programs,” he said. “As anindustry, they remain an attractive and vulnerable terrorist andhigh-crime target that will garnish global media attention.”

With 35 years of insurance, criminal, corporate and fraud investi-gation experience, Roman said, “The real shame is executive man-agement’s failure to recognize security as having the real potentialto lower enterprise expenses, become a profit center and to be aprominent guardian of the enterprise brand. Professional security,by all metrics, is good for business.”

Roman’s observations are not a blanket indictment, and henoted a caveat: “There are exceptions,” he said. “For example,hotels within high-risk municipalities or venues often have former

WBY TIMOTHY W. COLEMAN, EDITOR-AT-LARGE

Page 31: kmd_hst_201312

29Homeland Security Today Magazine | December 2013/January 2014

The Daunting Challengeof Hotel Security

Page 32: kmd_hst_201312

30 December 2013/January 2014 | Homeland Security Today Magazine Go online today for exclusive online content and eNewsletters

ranking police, military or well-trained and experienced security man-agement, executing proper high-level enterprise management logisticsand deploying state-of-the-art supporting security hardware.”

The complex realityMost major hotel chains and hotel operators are cognizant of the com-plex security realities of their industry. Many industry leaders deter-minedly strive — often behind the scenes — to ensure that thesecurity of hotel guests and properties remain an unflinching priority.

“As one of the 10 largest hotel companies worldwide, Carlson Rezi-dor Hotel Group works tirelessly to develop expert insights on the geo-political environment, severe weather procedures and onsite safetypolicies,” Chris Gernetz, director of safety and security for CarlsonRezidor Hotel Group Americas, told Homeland Security Today.

It’s not just expert insight that helps propel security efforts atmajor hotel chains, either. As Gernetz explained, “Carlson RezidorHotel Group has over 1,300 hotels in operation and under develop-ment in 81 countries. It’s imperative we are employing the mostadvanced technology available in order to successfully monitorwhat is being said about each hotel as well as what is happening inthe areas our hotels are located.”

Leveraging monitoring technology is only part of the equation,as that information must be transferred into action. “If there is athreat or a potential threat, we are able to notify the respectivehotel within minutes and advise best practices to handle the givensituation in order to provide the highest level of safety for ourguests and employees,” Gernetz said.

Public-private partnershipsExpert insight, monitoring and notification technologies help toenhance the threat detection landscape and improve situationalawareness of hotel security efforts. Some hotels use public-private

partnerships to further the implementation of industry best prac-tices and stay abreast of emerging threats.

“Carlson Rezidor has partnered with the Department of HomelandSecurity to train workers on what to do if they spot suspicious behav-ior,” Gernetz said. “Potential threats can cover a wide range of issues,from riots to hostage situations to data protection issues.”

The importance of working in tandem with respective securityand law enforcement elements should not be overlooked.

“Establishing public-private programs that further the coordina-tion and communication of police, fire department and emergencyservices and private security in the protection of people and prop-erty helps to enhance the safety and security of the hotel commu-nity,” said George Anderson, vice president of operations forAlliedBarton Security Services.

“From an operational standpoint, it is vital for hotel manage-ment to have cooperation between all primary public and privatesectors,” said Anderson, who retired from the New York City PoliceDepartment as assistant chief. “This cooperation is a mutually ben-eficial, reciprocal relationship.”

“For example,” Anderson pointed out, “police officers appreci-ate the role hotel security officers play, as they are an extra set ofeyes on the street and can share observations and monitor trends.Police officers, in turn, can communicate with security personnelabout possible threats in the area, and give them photos of wantedindividuals to look for.”

Hotel security and public security services improve when theywork together.

The servicescapeThough ensuring guest security is a paramount concern in the hos-pitality industry, it can be tricky to do so without impairing cus-tomer service and comfort. The happy medium between creating a

Page 33: kmd_hst_201312

31Go online today for exclusive online content and eNewsletters Homeland Security Today Magazine | December 2013/January 2014

secure environment and ensuring that the environment remainsinviting is one of the most difficult tasks hoteliers face in their secu-rity efforts.

“Hotels are held to a higher standard than other businesses withregards to safety and liability,” Anderson said. “It is critical that secu-rity procedures and personnel training for all critical traffic areas ofthe hotel, including the lobby, front desk, baggage storage area, guestentry points and the parking lot and receiving dock area be intensiveand comprehensive for contract security and hotel staff.”

These higher standards, though, make hotel security more com-plicated. “Each hotel, which is unique based on its location, facilitydesign and guest profile, needs to have a security plan that isdesigned around the functional areas of the hotel,” Anderson said.

Extending to aesthetics, Anderson said, “The late-night lounge,the on-site restaurant, on-site convention halls, parking lots, hall-ways, elevator access paths and meeting rooms need to be moni-tored and patrolled — around the clock — to provide a safe andwelcoming environment for all guests.”

The so-called “servicescape” of a hotel includes the visual com-ponents of a hotel that help to determine its overall look, feel andstyle. While hoteliers work to ensure that safety and security are apriority, they do so without making guests feel as though they areinside a fortress. But finding the right balance of security and cozi-ness is tricky, as hoteliers do not want to turn off potential or cur-rent guests off. Consequently, hotels often sacrifice security infavor of curb appeal and comfort.

Hotel hazardsMyriad potential hazards threaten an individual’s personal securitywhen they stay at a hotel; thus it’s important that travelers are ascautious as they hope their hotel’s security is. In turn, it’s vital toobtain as much information as possible about your destinationprior to traveling or upon arrival.

“You can’t make over the hotel, but a traveler can make securitya personal responsibility,” said Lynn Knapp Walters, an executivewith Escape the Wolf, a preemptive security solutions company,told Homeland Security Today.

“Always be aware of your surroundings and, most important,vary the times and routes of your comings and goings in case some-one is watching and plotting a crime or corporate espionage,” Wal-ters added. “No matter the hotel, it pays to take a few minutes tolearn the security features.”

Nevertheless, the list of potential hazards in a hotel can startwith the mundane and quickly escalate to lethal dangers. Hotel rob-beries can be commonplace, especially when the location and typeof hotel, the preventative measures in place and the traveler’s levelof awareness are not optimal.

They usually happen when a room is unoccupied and the perpe-trator is able to gain access unimpeded. Perpetrators can includehotel staff, maids, maintenance personnel and others associatedwith hotel activities. While reducing the ease of opportunitydecreases the probability that a hotel robbery will occur, it does lit-tle to minimize the threat by individuals intent on stealing fromhotel guests. Even the best preparations and efforts to hide orsecure valuables may only delay a determined criminal from locat-ing and making off with their loot.

A more serious threat comes from the possibility of hotel roominvasions when they are occupied. Armed or overpowering intrud-ers are less common in major hotel chains — domestically andabroad — but they do occur. In general, guests staying at smallerhotels in rural settings are more likely to encounter this situation.

In a hotel room invasion scenario, a criminal may be audaciousand confrontational. By entering a room unannounced and unin-vited, the perpetrator has the element of surprise. Robberies —

even kidnappings — can occur in an ambush-style attack. Being vig-ilant and aware of people following or keeping close tabs on guestsis vital to ensuring visitors do not become an easy target.

Another thievery situation can occur directly in a hotel’s lobby.Usually teeming with staff, the lobby can become a target-rich envi-ronment for a robbery or snatch-and-grab theft. Exit routes andtransportation are feet away from the lobby, so a well-planned rob-bery has a good chance of success in this environment. This isespecially true if security is lax at the point of attack and theassailants move quickly.

TerrorismMoving into more severe waters, the danger of terrorism is a globalphenomenon and is an exceedingly serious concern for travelers. In2008, Islamic terrorists, supposedly trained by Pakistani intelli-gence and members of the Al Qaeda-tied Lashkar-e-Taiba, carriedout a deadly attack against multiple targets in Mumbai, India. Overthe course of three days, 10 terrorists armed with assault rifles andexplosives wreaked havoc in the city, killing 164 people leavingmore than 300 wounded.

Christopher Burgess, a CIA veteran with more than threedecades of service and a recipient of the CIA’s Distinguished Intelli-gence Medal, told Homeland Security Today, “While one will be hardpressed to individually determine whether a terrorist group targetsa hotel, one can take some basic steps to be knowledgeable inadvance. Critical information should be factored into your travelplans ahead of time.”

Now CEO of Prevendra, a security consulting firm, Burgessstressed the need for travelers to be cognizant of local conditionsthat may adversely impact the peripheral security environment ofthe hotel where they’re staying.

“Conduct a search for civil unrest, political disputes or the like,”he said. “Where are such events occurring or likely to take place inthe city in which you are visiting? In many cities, the rabble rousingand crowd forming occurs in predictable and well-documentedlocales; choose a hotel that isn’t on this path. Travelers need toanticipate the potential threat before it appears, as an after-the-factthreat realization limits an individual’s options as well as their abil-ity to identify the safest exit.”

The threat terrorism poses to travelers is perennial and wide-spread. Even so, there are some higher risk areas than others, andthere are several mitigation strategies that can be employed to reduceexposure and avoid victimization in the event of a terrorist attack.

AnalysisHopping on an airplane to travel across the country or getting intothe family sedan to head on down the road is a normative routine fornearly 100 million Americans. So it’s no wonder that the issue of hotelsecurity should always be at the forefront of industry leaders’ minds.

While hotel security may not be priority number one for travel-ers, there’s little doubt that it’s a dynamic concern for those in theindustry and those who are tasked with the responsibility of ensur-ing the security of customers and properties around the world.

Ultimately, hotelier satisfaction may be achieved when a traveler’sutmost gripe is only a horrid story about traffic jams and assortedtravel delays. For security experts and hoteliers, though, there will belate nights as they strive to reduce, mitigate and rebuff the multitude ofrisks — all the while maintaining uncompromising service. HST

Timothy Coleman is Homeland Security Today’s Editor-at-Large

u Learn more on this subject at www.HSToday.us

Page 34: kmd_hst_201312

32 December 2013/January 2014 | Homeland Security Today Magazine

I SeeYou

Page 35: kmd_hst_201312

33Homeland Security Today Magazine | December 2013/January 2014

The New Eyeballs of Modern Mobile SurveillanceBY PHILIP A. BECNEL IV, CONTRIBUTING WRITER

n many ways, it was a typical child custody case. A woman hired a private investigatorto conduct surveillance on her sister, who was the mother of the woman’s 10-month-oldniece. The mother was unemployed and had a history of drug abuse. Worried about thewellbeing of her niece, the woman was seeking full custody of the child.

Michael Youlen was the investigator hired by the concerned aunt. He placed aglobal positioning system (GPS) tracking device on the mother’s vehicle andquickly discovered she’d made weekly trips to an out-of-town residence, where shestayed for only a few minutes before driving home. Suspecting that the mother wasgoing to the house to buy drugs, Youlen tipped off police in different counties alongthe subject’s route about her activities. Based primarily on information supplied bythe tracking device he installed on her car, the mother was stopped twice by police,

and both times she was subsequently arrested for possession of narcotics. During one of thestops, the 10-month-old girl was in the back seat.

Police executed a search warrant for the house where the subject visited, where more drugswere found. The police arrested a man for possession with intent to distribute narcotics.

“This case was solely made by use of GPS tracking devices,” Youlen told Homeland Secu-rity Today. “Law enforcement had zero knowledge of this individual, [who] was not on any-one’s radar.”

Private investigators like Youlen — and police too — have used GPS trackers ever sincethey were invented, and not only for child custody and drug cases. But the practice didn’t getmuch attention in the early years because the first generation of these devices had a batterylife of only a few hours and were about as big as a dictionary, with wires leading to cumber-some antennas. This made these earlier trackers impractical for many surveillance cases,because the short battery life required frequently changing the battery or switching out thedevice beneath a subject’s vehicle. And each time an investigator did this, they ran the risk ofbeing discovered.

But as the batteries gradually improved and the devices became smaller over the pastdecade, GPS trackers have become the de facto method for conducting surveillance. Accord-ing to Kenneth D’Angelo of Target Investigations, a private investigative firm that specializesin GPS trackers, “We now get about three weeks on average from a fully charged unit.” Firmslike Target Investigations often own as many as 20 GPS trackers, all of them affixed to differ-ent subjects’ vehicles on any given day. This means that investigators like D’Angelo can mon-itor the movements of 20 or more subjects at once, all while sitting in front of a computer.

To understand the advantages of GPS trackers, it is helpful to consider how surveillancelike that conducted in the Youlen case may have been conducted 10 years ago. Before theadvent of trackers, it was necessary to use multiple investigators to tail a subject, with eachinvestigator taking turns as the primary person behind the subject’s vehicle. Investigatorsrefer to the person following the subject as the one with “the eyeball.” By rotating who hasthe eyeball, the subject is less likely to become suspicious that they’re under surveillance.This is often referred to as the “A-B-C method” of surveillance, since investigators, labeled byletters of the alphabet, rotate in and out of the eyeball position.

Physical surveillance like the A-B-C method has consistently been ruled legal by courts,since there is no reasonable expectation of privacy on public streets or open fields, regard-less of how many investigators are involved in the surveillance. It is possible to follow a sub-ject indefinitely using the A-B-C method. However, although effective, using multipleinvestigators in this fashion is expensive and can be dangerous for the investigators as wellas other motorists and pedestrians.

I

Page 36: kmd_hst_201312

34 December 2013/January 2014 | Homeland Security Today Magazine

A suspected drug dealer arrestedafter being tracked with a GPStracker used by private investigatorMichael Youlen.

COUR

TESY

OF

MIC

HAEL

YOU

LEN

Page 37: kmd_hst_201312

35Go online today for exclusive online content and eNewsletters Homeland Security Today Magazine | December 2013/January 2014

In other words, while around-the-clock surveillance has alwaysbeen feasible and legal, GPS trackers allow investigators to tracksomeone’s movements far more affordably and safer than would bepractical using physical surveillance. They are, in essence, the neweyeballs of modern mobile surveillance.

Despite the breakthrough in efficiency that’s made available bythese new eyeballs, the use of GPS trackers by investigatorsreceived very little public attention until law enforcement placedone of them on the vehicle of a suspected drug dealer namedAntoine Jones in Washington, DC. Although police had obtained awarrant to employ the device, it wasn’t until the day after the war-rant expired that police installed it on Jones’ vehicle. Investigatorstracked the subject’s movements for 28 days. The evidenceobtained by the tracking device (among other evidence) was thenused to convict Jones, who appealed the conviction on the groundsthat the device was used without a warrant.

The Supreme Court ultimately sidestepped the issue of whetherdigitally tracking people on public streets is an invasion of their pri-vacy. They chose instead to focus on the physical intrusion thatoccurs when the police placed the tracker on Jones’ vehicle. Previ-ous cases had ruled that tracking someone’s movements using elec-tronic methods similar to GPS trackers is lawful and does notrequire a warrant because such devices only tell investigators whatthey would know from observing a subject in public, where there isno reasonable expectation of privacy. However, in this case, theSupreme Court ruled that placing the tracker on Jones’ vehicle did,in fact, require a warrant. He was subsequently retried, there was ahung jury, and he ultimately accepted a plea for time served.

In the wake of the Jones case, it’s become clear that governmentagents must obtain a warrant in order to place a GPS tracker onsomeone’s vehicle. Intrusion comes into play because of the physi-cal trespass on the subject’s property to place the tracker on thesubject’s vehicle — not because of the tracking itself. For privateinvestigators, the Jones decision created an implied trespass dur-ing the placement of the device, which means GPS tracking in theprivate sector is now limited to cases where one owner of a vehicleconsents to the placement of the device on the vehicle to tracksomeone else (e.g., an employee). This means that cases likeYoulen’s may now be problematic.

The fallout from the Jones decision has private investigatorsscrambling for alternatives to the old A-B-C method. One method isto tap into the signals of tracking devices subjects are already car-rying. Indeed, nearly everyone consents to having their move-ments tracked by virtue of carrying around smart phones and othermobile devices. Telephone and Internet service providers — pri-vate companies that are not obliged to adhere to the FourthAmendment — maintain this information. Government agents andprivate investigators can obtain this data through court orders,subpoenas and sometimes by agreements made with providers.There are also devices used by law enforcement that mimic mobilephone towers to obtain geo-location records about subscribers inreal time. One such device is called the Stingray.

The fact that we’re all consenting to private tracking wheneverwe walk out the door with our smartphones influences the societalnotion of a reasonable expectation of privacy. Consequently, onething courts consider in such cases is whether a device that couldconceivably be used to violate someone’s privacy is commonplaceor accepted. And almost nothing is more ubiquitous today than amobile phone. It’s much harder for someone to take the positionthat GPS tracking is a violation of their privacy when they’re will-fully carrying a GPS tracking device in their pocket.

The legal issues surrounding whether devices like the Stingrayrequire a warrant or not may continue to be debated by academicsand privacy advocates, but for investigators and other practition-ers, the new rules are clearly spelled out in between the lines of the

Jones decision. As for how, or if, courts are ever going to curtail dig-ital tracking that does not involve a physical trespass, attorney Jef-frey O’Toole of O’Toole & Rothwell has a simple answer: “Thebottom line is that the use of the data was not a violation of some-one’s reasonable expectation of privacy if it was not gleaned froman actual search.” O’Toole would know. He was one of the attorneyswho represented Jones. “The court found that without the placingof the instrument there was not a search, and therefore they foundthat the Fourth Amendment was not violated,” he said.

O’Toole provided a lesser-known court opinion in Jones’ post-Supreme Court retrial that permitted the inclusion of telecommuni-cations location data during the trial. Although 20 pages long andfull of technical legal arguments, Judge Ellen Segal Huvelle’s opinionabout digital tracking on public streets is consistent with O’Toole’sconclusion. Responding to Jones’ assertion that he had “a reason-able expectation of privacy in the totality of his movements overtime,” Huevelle wrote that “This court knows of no federal courtthat has held that the use of prospective cell-site records consti-tutes a search under the Fourth Amendment.”

A ruling on a different case in July 2013 by the US Court ofAppeals for the Fifth Circuit affirmed the constitutionality of lawenforcement obtaining location data from telecommunications car-riers without a warrant. Two other cases on the same issue arepending in the Fourth and Eleventh circuit courts.

Private investigators, meanwhile, have treaded carefully. Justbecause police can track subjects’ locations using their mobilephones without a warrant doesn’t necessarily mean it’s permissiblefor private investigators. One issue is whether devices likeStingrays, by essentially tricking telephones into believing they aremobile-phone towers, violate the Telephone Records and PrivacyProtection Act of 2006, which bans using a false pretense to obtainconfidential telephone data. Nobody wants to find out.

But taking a 10-year step back in time, technologically speaking,isn’t an attractive option either. Until something else comes along,private investigators in many cases may have to resort to relearn-ing the alphabet. HST

Philip A. Becnel IV is a partner at Washington, DC-based Dinolt, Becnel & Wells Investigative Group.Author of Introduction to Conducting Private Inves-tigations and Principles of Investigative Documen-tation, Becnel is a past president of the PrivateInvestigators Association of Virginia and has taught

undergraduate courses in criminal procedure, white collar crimeand criminal investigation.

u Learn more on this subject at www.HSToday.us

A subject’s location may be superimposed over satellite imagery to obtain arealistic picture of where they are located, in this case the entrance to a hotel.

COUR

TESY

OF

KENN

ETH

D’AN

GELO

Page 38: kmd_hst_201312

36 December 2013/January 2014 | Homeland Security Today Magazine

TOOLS & TECHNOLOGY

Springfield, Mo.,Uses Axis Network

Cameras to Protect Power Substations In Springfield, Mo., each copper theft from the city’s power substationscosts an average of $6,000 in labor and repairs.

To combat this problem, the City Utilities (CU) of Springfield turnedto Axis Communications for its thermal and pan/tilt/zoom (PTZ) IP cam-eras to protect unmanned power substations from copper wire theftand improve staff safety to ensure continuous flow of electricity for cus-tomers.

“Within the first month of operation, the new IP camera systemhelped the utility company alert police to four separate incidents at oneof the most highly targeted substations,” Axis said.

CU worked with Springfield, Mo.-based systems integrator NetWatchInc. to create a comprehensive, yet cost-effective digital video secu-rity system with a combination of thermal and day/night Axis networkcameras. AXIS Q1921-E Thermal Network Cameras allow the community-owned utility company to remotely monitor its 47 substations from a cen-tral location 24 hours a day without the added cost of lighting. For sub-stations located in residential areas, the thermal cameras also help CUavoid any concerns about light pollution.

(Source: Axis Communications, www.axis.com)

Food Safety Testing LabsEvaluate PathoGenetix MicrobialStrain Typing System PathoGenetix, Inc., a developer of an automated system for rapidbacterial identification, has completed an initial round of evalua-tions for its RESOLUTION Microbial Genotyping System with lead-ing contract-testing laboratories serving the food safety market.

The RESOLUTION Customer Experience Program gives keyprospects in critical target markets a hands-on, in-depth reviewof the company’s rapid bacterial identification system, and is animportant step in the commercialization of the system, which willbe available in 2014 for use in food safety testing and foodborneillness outbreak investigations.

“The RESOLUTION Customer Experience Program providesimportant input for PathoGenetix as we develop our innovativetechnology into a powerful new food safety solution for the foodindustry and public health agencies,” said John Czajka, Patho-Genetix’s Vice President of Business Development. PathoGenetixwill be offering the RESOLUTION Customer Experience Programagain in 2014, with a focus on food production companies thatconduct food safety testing in-house.

(Source: PathoGenetix, Inc., www.pathogenetix.com)

u

COURTESY OF AXISCOMMUNICATIONS AB. ALL RIGHTS RESERVED.

u

Send Word Now Adds CustomMessage Templates and InstantMessaging to Alerting Service Send Word Now, a provider of emergency notification and criti-cal communications services, announced the addition of customtemplates for message creation, along with the availability ofinstant messaging (IM) as an alerting modality.

New, user-defined message templates within Send WordNow give users complete control over the presentation of mes-sages, including fonts, colors, styles, images and logos via HTML.Certain system or database fields, such as recipient name or cus-tom Get Work Back instructions, can also be inserted into emailand SMS message templates.

With the addition of IM, Send Word Now supports Yahoo!Messenger, Google Talk, AOL Instant Messenger and ICQ. Othercommonly used IM applications are under consideration forfuture releases.

(Source: Send Word Now, www.sendwordnow.com)

u

Page 39: kmd_hst_201312

p

37Homeland Security Today Magazine | December 2013/January 2014

SpectronicsIntroduces Multi-LED,Broad-Beam UV Lamp for Forensic Inspection in the FieldSpectronics Corporation has introduced the battery-operated Spectro-line TRITAN 365 forensic inspection lamp. This ultra-high intensity,broad-beam, multi-LED UV lamp enhances the detection, inspectionand photography of biological stains, latent fingerprints, untreatedblood, bodily fluids, bruises, bite marks and much more.

The TRITAN 365 features three ultra-high-flux UV LEDs for a wide rangeof forensic inspection applications, plus a white light LED to illuminatedimly lit areas. A convenient three-way rocker switch allows easy con-trol of the light sources, while its lightweight, angled body ensures fa-tigue-free inspections.

A rubber bumper with a Borofloat glass lens protects the LEDs fromdamage in high-risk situations. A built-in fan keeps the LEDs cool, pro-viding optimum light output during lengthy use. The lamp provides twicethe output of conventional 150-watt lamps and has a 100,000-hour LEDservice life.

(Source: Spectronics Corporation, www.spectroline.com)

TOOLS & TECHNOLOGY

u

Alcatel-Lucent and Las Vegasfirst responders conduct trial of4G LTE public safety mobilebroadband networkAlcatel-Lucent and the Las Vegas Metro Police Department,along with the Nevada Department of Transportation and otherfirst responders, conducted a six-month trial of a 4G LTE publicsafety network in a designated section of Las Vegas. The trialused spectrum allocated to the First Responders Network Author-ity (FirstNet), an independent authority set up by the US govern-ment to facilitate the building of a nationwide interoperable publicsafety broadband network.

FirstNet is permitting trials with its dedicated 700 MHz spectrumon a limited basis to gain valuable and necessary input for the plan-ning of the nationwide network rollout. By using real-time video,vehicle tracking, WiFi, multiple devices and other data access andcommunications tools, organizations can quickly and securelyobtain and share detailed information in day-to-day emergency sit-uations. This will provide an integrated approach and improve theservices that these organizations deliver to their communities.

The trial featured 4G LTE public safety mobile broadband tech-nology from Alcatel-Lucent to provide Las Vegas Metro PoliceDepartment, Nevada Department of Transportation and other firstresponders the ability to gain insight into the use and benefits ofmobile broadband with several new capabilities as well as use ofkey existing systems.

(Source: Alcatel-Lucent, www.alcatel-lucent.com)

u

HID Global Adds Direct-to-CardPrinter for Small- and Medium-SizedBusinessesHID Global announced it has added an entry-level model to its FAR-GO Direct-to-Card printer line that provides an easy-to-use, plug-and-play, more affordable solution for printing credentials with low per-cardissuance costs.

The compact FARGO C50 printer includes features such as an all-in-one printer ribbon and card-cleaning cartridge. The printer also in-cludes HID Global’s Workbench diagnostic utility that automatically mon-itors printer health, provides instant system status and lets users knowif and when routine maintenance must be performed. The printer’s built-in Swift ID badging software makes it easy to create personalized IDs.

(Source: HID Global, www.hidglobal.com)

Page 40: kmd_hst_201312

This index is provided as an additional service. The publisher does not assume any liability for errors or omissions.

38

Find more events and details online at www.HSToday.us

PublisherKimberley S. Hanson-Brown

[email protected]

Sales DirectorDavid Smith

[email protected]

Sales & Marketing ManagerLisa Pavlock

PHONE: 540-349-9794FAX: 540-854-0912

[email protected]

Production DirectorJoanne Harap

[email protected]

Administrative AssistantDani Cole

[email protected]

Public Relations & Marketing Director

Sue Stott1-540-854-0910

[email protected]

Tradeshow ManagerLynn Perciasepe

PHONE: 772-708-4649FAX: 772-334-4271

[email protected]

ADVERTISING REPRESENTATIVES

New England & New YorkDavid Smith

PHONE: 202-285-2898FAX: 540-854-0912

[email protected]

Mid-Atlantic USJackie Gault

PHONE: 703-728-1305FAX: 540-854-0912

[email protected]

South, MidWest & WestBill Turner

PHONE: 703-535-5923 FAX: 703-684-2203

[email protected]

SUBSCRIPTIONS & CHANGESSpecialized Fulfillment Services

PHONE: 800-607-4410FAX: 1-937-890-0221

[email protected]© Copyright 2013 HSToday All rights reserved

December2-3 10th Annual American

Health Care CongressAnaheim, CAworldcongress.com

2-5 I/ITSECOrlando, FLiitsec.org

9-10 Sample Prep East Boston, MAknowledgefoundation.comMEDIA PARTNER

9-12 Special Operations SummitTampa, FLspecialoperationssummit.comMEDIA PARTNER

January7-9 9th Annual Counter IED

Washington, DCcounteriedsummit.com

7-10 International Disaster Conference & Expo (IDCE)New Orleans, LAinternationaldisasterconference.com

15-17 Annual National School Response ConferenceLas Vegas, NVannsrc.eve-ex.com/nsrc2014

27-29 Tactical Power SourcesSummit Washington, DCtacticalpowersourcessummit.com

February19-21 AUSA Winter Symposium

& ExpositionHuntsville, ALausameetings.org/winter

19-21 Biometrics for Governmentand National Security 2014Washington, DCbiometricsevent.com

19-21 5th Annual Cloud Computingfor DoD and GovernmentWashington, DCcloudcomputingevent.com

March10-12 2014 AFCEA Homeland

Security ConferenceWashington, DCafcea.orgMEDIA PARTNER

18-19 8th Annual Border Security ExpoPhoenix, AZbordersecurityexpo.comMEDIA PARTNER

24-28 IWCELas Vegas, NViwceexpo.comMEDIA PARTNER

April1-3 International Security

National Resilience Conference & ExhibitionAub Dhabi, UAE isnrabudhabi.com

2-4 ISC WestLas Vegas, NViscwest.com

5-10 2014 NAB ShowLas Vegas, NVnabshow.comMEDIA PARTNER

7-9 11th Annual World HealthCare CongressNational Harbor, MDworldhealthcarecongress.com

29-30 Counter Terror ExpoOlympia, Londoncounterterrorexpo.com

May11-16 Governor's Hurricane

ConferenceOrlando, FLflghc.org

12-14 GovSecWashington, DCgovsecinfo.comMEDIA PARTNER

June4-5 Security Europe Exhibition

& Conference Brusselssecurity-europe.eu MEDIA PARTNER

ADVERTISER INDEX

TRADESHOW CIRCUIT

™™

2007 Central-Southeast Region

Bronze Special Supplement

2005 Central- Southeast Region

Bronze Regular Department

2005 Central- Southeast Region

Silver Special Section

2007 Central-Southeast Region

BronzeSpecial Section

JOURNALISMTHAT

MATTERS

2012 RegionalSILVER

EDITORIALAward Winner

2012 NationalSILVER

EDITORIALAward Winner

BRONZE

2012 RegionalSILVERDESIGN

Award Winner

2010 NationalGOLD

20 AFCEA Homeland Security Conferenceafcea.org/events/homeland

11 American Military Universityamuonline.com/hstoday

C2 DellDell.com/security

C4 GEICOgeico.com/gov

7 Homeland Security Today, LinkedInhstoday.us

13 Homeland Security Today, Media Kithstoday.us

C3 Security Europe Exhibition & Conferencesecurity-europe.eu

3 Tyco Integrated SecurityTycoIS.com/gov

Page 41: kmd_hst_201312

Plus ...• Wireless Communications• Agency Spotlight: FEMA• Emergency Preparedness:

Outlook for States & Locals

COMING IN

FEBR

UARY

THE KIMERYREPORT

By Anthony L. KimeryAward-winning column on border security,counter terrorism and homeland security.» www.hstoday.us/blogs/the-kimery-report.html

BORDERS & INTEL

By Sylvia LongmireAuthor of the book, Cartel: The Coming Invasion of Mexico’s Drug Wars.» www.hstoday.us/blogs/borders-intel.html

LEADING EDGE TODAY DIGITAL REPORTS Feature stories, guest commentaries, market analysis and videocoverage of today’s most important technology needs.» www.hstoday.us/channels/the-leading-edge-today/landing-page.html»DAILY NEWS AND ANALYSIS» www.hstoday.us/briefings/daily-news-analysis.htmlEXPANDED INDUSTRY NEWS » www.hstoday.us/briefings/industry-news.html»POLL OF THE WEEKWeekly survey of readers about the most timely and compellingtopics facing the homeland security community. Cast your vote.» www.hstoday.us»

RESOURCES Connect, Engage & Comment»

HomelandSecurityTODAYwww.HSToday.us

Surveillance&Detection

Page 42: kmd_hst_201312

40

LEADERSHIP PROFILE

Capitalizing on this long relationship,Stephanie C. Hill, president of the com-pany’s Information Systems & Global

Solutions Civil business, believes the venerable federalcontractor can build “on this strong partnership … tocontribute to a wide range of Department of HomelandSecurity [DHS] missions.”

Hill said Lockheed Martin “especially [sees oppor-tunities] in the priority areas of cybersecurity, bordersecurity and immigration and enterprise informationtechnology (IT) services that incorporate cloud com-puting and big data technologies.”

“We’re either executing, or are competing, for con-tracts in all of these areas, plus, we’re investing bothintellectual capital and our own research and develop-ment dollars to help DHS stay ahead of the curve ontechnologies that can be used to defeat threats to ournational security,” she said.

Hill began her career at Lockheed Martin in 1987 asa software engineer and quickly assumed positions ofincreasing responsibility, most recently serving as vicepresident, Corporate Internal Audit.

Also the former vice president and general managerof the company’s Baltimore-based Electronic Systems-Mission Systems & Sensors, Hill said, “In the cybersecu-rity arena, we’re at the forefront of assisting DHS andother government agencies in fulfilling the February2013 presidential mandate to strengthen protections ofthe nation’s digital infrastructure. We’re an authorizedprovider of cyber security IT services and toolsthrough the DHS Continuous Diagnostics and Mitiga-tion program, and we’re already leveraging our invest-ment in continuous monitoring technology to showgovernment agencies how to ensure that their unclassi-fied networks are scanned constantly for threats,defended from attacks, and audited for performance.”

Looking ahead, Hill said “we’re continuing to makeinternal research and development investments in anext-generation approach to cyber defense that we callcyber threat intelligence (CTI).”

Hill explained that “CTI integrates continuous intelli-gence collection, malware analysis, tailor-able analyticsand social network mining. It uses big data technologyto automatically extract events and relationships fromhuge volumes of complex, unstructured data, and thenalerts analysts who can are monitoring the entire cyber

enterprise through a common operational picture.”“Also, as mobile devices proliferate among govern-

ment users, we’re developing capabilities to supportDHS by providing an easy method for employees toaccess secure networks,” Hill said. “We’re partneringwith Fixmo Inc. in the development of Mandrake, whichprovides a new level of secure authentication for con-sumer-grade devices. The technology allows smart-phone and tablet users to easily switch between thepersonal and business sides of the device, while ensur-ing the integrity and identity of the user.”

Hill said Lockheed Martin sees “a significant oppor-tunity to apply a variety of” the company’s “capabilitiesto border security and immigration. We’re currentlycompeting for Customs and Border Protection’s (CBP’s)Integrated Fixed Tower program, for which we com-pleted test, demonstration and operational successwith our tower on the southwest border.”

CBP has embarked on a four-year strategy that callsfor adding incremental capabilities rather than pursinglarge systems development. Hill said this is “a well-con-ceived roadmap that includes an agile IT architectureand common technology standards is necessary to fullyintegrate each new capability.”

DHS will also address the many challenges that sur-round immigration policy issues like a fair path to citi-zenship, employment verification and admitting futureworkers. “In these areas and across other DHS mis-sions,” Hill said, “we have the capabilities to assist DHSagencies by providing cloud computing and big dataanalytics to promote greater collaboration andprocess efficiencies.

“For example,” Hill explained that “big data tech-nologies applied to shared data from CBP and the USCitizenship and Immigration Services and Immigrationand Customers Enforcement, could reveal patternsand connections, leading to a reduction in illegal alienentry and disruption of the flow of illegal drugs andother contraband.”

Finally, Hill pointed out, “we see an opportunity toalign our expertise with biometric identification tech-nologies to the DHS mission. Our experience as thedeveloper of the FBI’s Integrated Automated Finger-printing Identification System — and now the NextGeneration Identification system — places us in astrong position to help DHS utilize biometric identifica-tion to secure our borders, identify illegals and supportprosecutions.”

“In all of these ways and more,” Hill concluded,“Lockheed Martin is excited about the growing possi-bilities for applying our existing capabilities andexpertise — as well as new technologies we’re devel-oping — to help DHS achieve mission success.” HST

LockheedMartin isexcitedabout thegrowingpossibilitiesfor applyingour existingcapabilitiesand expertise— as well asnewtechnologieswe’redeveloping —to help DHSachievemissionsuccess.

BY ANTHONY KIMERY

Stephanie C. Hill

President,Lockheed Martin Information Systems &Global Solutions – Civil

LOCKHEED MARTIN HAS BEEN THELEADING INFORMATION TECHNOL-OGY PROVIDER TO THE FEDERAL GOV-ERNMENT FOR THE PAST 19 YEARS,AND A US DEFENSE CONTRACTORFOR MORE THAN A CENTURY.

Go online today for exclusive online content and eNewslettersDecember 2013/January 2014 | Homeland Security Today Magazine

Page 43: kmd_hst_201312

www.security-europe.eu

Brussels Expo

For more information contact:Michael Rosenberg

E.J. Krause & Associates, Inc.Tel: +1-301-493-5500

[email protected]

Organized by:

E X P E R T I N E X H I B I T I O N S

E.J. Krause & Associates andHomeland Security Today bring you...

In Association with:Hosted by:

The City of Brussels

Media Partner:

SECURITYEUROPEEXHIBITION & CONFERENCE

Critical Infrastructure Resilience CybersecurityCross Border Protection Embassy Security Maritime, Rail, and Airport Safety

Page 44: kmd_hst_201312

Some discounts, coverages, payment plans and features are not available in all states or all GEICO companies. GEICO is a registered service mark of Government Employees Insurance Company, Washington, D.C. 20076; a Berkshire Hathaway Inc. subsidiary. GEICO Gecko image © 1999-2013. © 2013 GEICO

Tell us you’re a Federal employee and you could get a discount.1-800-368-2734geico.com/gov

stands for saving money.(also stands for Government Employees Insurance Company)