GSN 2014 October/November Digital Edition
Government Security News
Government Security News
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
GOVERNMENT
Security News
October/November 2014 Digital Edition j
Los Angeles Sheriff’s Department and Geofeedia
write the playbook on using Social Media and
location based technology in law enforcement.
Page 11
TABLE OF CONTENTS
NEWS AND FEATURES
OCTOBER/NOVEMBER 2014 SPECIAL REPORTS
Big update in law enforcement tool-kit
“Our successful joint operation with the FDA
proves again the relevance of social media in
intelligence-led policing. Our eComm unit delivers
great value by providing real-time, actionable
intelligence to our field officers. Geofeedia’s
location-based social media monitoring solution
is a powerful tool to help us deliver that value.”
Commander Mike Parker, Los Angeles Sheriffs Office
Page 11
Port of Charleston, SC integrates fence
detection and video analytics
Cybersecurity Workforce Competencies:
Preparing Tomorrow’s Risk-Ready Professionals
8 18 23 28
X-ray systems manufacturer
Astrophysics awarded $6 million
U.S. Navy Contract Page 4
Hey, Governors Christie and
Cuomo! Good job with the
Airports. But what about the
Seaports? asks Denise Krepp
In “Ebola by Sea” Page 6
Don Waddell of (ISC)2/University
Of Phoenix initiative wants to
close the supply demand gap
in filling cybersecurity jobs Page 8
F-35C Completes First
Arrested Landing aboard
Aircraft Carrier Page 23
Romanowich on Video Surveillance
New physical standards in the
Works for electrical substations Page 24
Port of Charleston, SC Case Study
Puretech Systems Integrates
Fence Detection and Video Analytics
at Port with $50 billion annual cargo Page 26
PureActiv ® provides intelligent video analytics,
3D geospatial command and control, autonomous
PTZ tracking and open architecture for ease of
integration with the MicroPoint Cable system
which pinpoints fence cut or climb attempt
to within 3m, while ignoring environmental
disturbances such as wind, rain or vehicle traffic.
Page 26
Law Enforcement Communications
L.A. Sheriff’s Department (LASD) and
Geofeedia write the playbook on using
Social Media and location based technology
Page 11
BriefCam Syndex offers rapid view video
synopsis At Israel Exhibition Page 16
Kastle Systems/Metro DC Police launch
City-wide network of video cameras
and floor plans Page 18
Mutualink Unveils Mobile Go Kit for
Interoperable Public
Safety Community at IACP Page 20
2 Government Security News October/November 2014 Digitlal Edition Digitlal Edition October/November 2014 Government Security News 3
UPFRONT
Astrophysics Inc. awarded
$6 Million United States
Navy Contract
Rapidly growing X-ray systems manufacturer
Astrophysic Inc of City of Industry, CA, has won a $6
million dollar contract from the U.S. Navy to protect
entry control points deployed at seaports around the
world. The company’s X-ray solutions will be used to
screen visitors and personnel before they embark and
to accelerate offloading processes.
Astrophysics was selected from a large field of
competitors to fulfill the Navy’s XRBS program’s five-year
contract to supply and deploy ruggedized X-ray inspection
systems. According to company sources, Astrophysics’
competitive advantages in the bidding included not only
that the company buys primarily from U.S. vendors, but
also that it has its own fabrication facility, enabling it to
pass manufacturing savings along to customers.
“Astrophyics is known around the world for marketleading
solutions,” said Francois Zayek, Founder and
CEO of the company and a former VP of Research,
Development and Engineering at Perkins Elmer, who is
known globally for his engineering innovations. “We have
a long history of helping protect men and women that
protect our great nation and we are pleased to announce
this contract.”
The Navy selected
Astrophysics’ XIS-
7858 system which
features a standard
180kV generator for
heightened penetration
and enhanced object recognition. The XIS-7858
is the ideal screening solution for any location in
need of increased screening dimensions within
a consolidated space. The Indefinite Delivery,
Indefinite Quantity (IDIQ) contract was issued by
the Navy XRBS program which is managed by the
Crane Division out of Indiana. Ω
ABOUT ASTROPHYSICS INC.
Astrophysics offers X-Ray security screening systems that help
operators detect and identify weapons and explosives in civil and
military markets worldwide. The company exports to over 60
countries and builds all its own products domestically in Southern
California. The corporate hearquarters located in City of Industry,
CA is the manufacturing facility for air cargo, conventional and
mobile solutions. A second facility in Ontario, CA is the primary
location for research and development, and the high energy cargo
and portal systems. Astrophysics markets range from Air Cargo,
Aviation and Transport to Corporate and Hotels, Customs and
Border Protection, Government, Law Enforcement and the
Military. The company employs over 140 employees in the U.S.
and has affiliate company’ globally. For more information about
Astrophysics, visit www.astrophysicsinc.com.
THE NEW ENTRY
for ACCESS CONTROL POINTS
GUARANTEED
DELIVERY DATES
FULLY GALVANIZED
FRAMEWORK
SINGLE SOURCE FOR
PHYSICAL SECURITY
a
AMERISTARBOOTHS.COM | 855.526.6847
4 Government Security News October/November 2014 Digitlal Edition Digitlal Edition October/November 2014 Government Security News 5
UPFRONT
Ebola by Sea
BY DENISE RUCKER KREPP
Over the past several days,
governors in New York, New Jersey,
Illinois, and Connecticut issued
quarantine guidance for individuals
who’ve been in contact with African Ebola patients.
The state guidance focuses on individuals who’ve
returned to the U.S. via airplanes. At some point a
mariner is going to arrive, sick with the dangerous
disease. Unfortunately, the federal government has
yet to address this possibility and state governors
won’t be willing to wait for the bureaucratic federal
machine to churn out vague policy guidance. They’re
going to issue state guidance and this guidance could
significantly impact U.S. port operations nationwide.
The U.S. Coast Guard is the federal agency
responsible for port operations and the Coast Guard
Captain of the Port manages port operations on a dayby-day
basis. This individual can prevent a foreign flag
ship from entering a U.S. port. He or she can also require
foreign flag vessels who have ported Sierra Leone,
Guinea, and Liberia, Ebola stricken nations, to undergo
additional scrutiny before they are allowed in U.S. waters.
The agency released a marine safety information
bulletin last week that everyone in the maritime industry
should read. The bulletin recommends that “local
industry stakeholders work with the Coast Guard Captain
of the Port to review and be familiar with their Marine
Transportation System Recovery Plan.” These plans were
mandated after the 9/11 attacks and the agency issued
guidance earlier this summer on how to draft them.
As someone who doesn’t believe in re-inventing
the wheel, I strongly support using existing guidance
to address current crises. The problem in this situation
is that the recovery plans don’t address Ebola-like
catastrophes. These plans focus on terrorist attacks
and natural hazards similar to Hurricanes Katrina and
Sandy. They don’t address a ship manned with mariners
decimated by Ebola.
The Coast Guard appears to recognize the shortcomings
of the current recovery plan by recommending
in the October 22nd bulletin that the local stakeholders
“consider conducting a
table top exercise to plan
and address items such
as an evaluation of how
to handle a vessel arrival
with a suspected Ebola
case... what steps need to
be considered if a medical
evacuation is needed, and
possibly how a ship would
be decontaminated in
order to commence cargo
transfers.” Good idea.
A seaport is a finely-tuned machine. According to
the Bureau of Transportation Statistics, in 2011, 7,662
oceangoing vessels made 67, 929 calls at U.S. ports.
Time is money for vessels owners – they want to enter
a port, discharge their cargo, taken on new cargo, and
depart as fast as they can. They are not going to want
to wait for the Coast Guard Captain of the Port and local
stakeholders to decide how to address a vessel with a
suspected Ebola case.
A simple answer would be to ban all ships that have
stopped in Sierra Leone, Guinea, or Liberia in their
last five previous ports of calls. Sadly, that won’t work
because the U.S. government is sending U.S. ships to
these countries to provide food aid and medical support.
People in Ebola areas need to eat and U.S. grown crops
are helping them to survive. It would immoral to stop
shipping food to those in need.
If the U.S. can’t ban all ships that have ported in
Ebola-stricken countries, then the U.S. Coast Guard must
develop a more comprehensive plan to address the
possibility of Ebola victims arriving in the U.S. by sea. The
agency can’t merely recommend that local stakeholders
conduct table top exercises. These exercises should be
mandatory and the Coast Guard must be ready to provide
substantive guidance.
Keeping in mind that several governors have already
issued isolation guidance for air travelers, the Coast Guard
must work the governors now to address the maritime
sector. How are sick mariners evacuated? At sea via
helicopter or a smaller vessel? At the port by ambulance?
How is the vessel decontaminated? How and when are
the necessary personnel going to be trained to carry
out the evacuation and decontamination procedures?
What happens to the other in-coming vessels during the
decontamination process? If the Coast Guard can’t answer
these questions, the state governors will because they
won’t their ports contaminated with the Ebola virus. Ports
bring in revenue and the revue can’t drop.
The Coast Guard prides itself on being Semper
Paratus. Now, more than ever, it must live up to its motto.
The nation’s ports can’t be shut down because of Ebola
and they won’t be if the Coast Guard develops more
comprehensive guidance before the first ship arrives.
Pre-planning with local stakeholders, including governors,
will ensure that the country’s supply chain continues to
operate. Call your local Captain of the Port and ask him
or her to schedule the table top exercise. Ω
PHYSICAL SECURITY
with COMPLETE PERIMETER CONTROL
ANTI-CLIMB FENCE RETRACTABLE WEDGES ANTI-RAM FENCE SECURITY BOLLARDS
Call our perimeter security specialist at 866-467-2773 and visit us online at ameristarsecurity.com
6 Government Security News October/November 2014 Digitlal Edition Digitlal Edition October/November 2014 Government Security News 7
UPFRONT
Dan Waddell discusses urgency of (ISC) 2 Foundation/
University of Phoenix initiative to close the supply
and demand gap in filling cybersecurity jobs
The core mission of the (ISC) 2 Foundation, in the
simplest of terms, is to support cybersecurity
education and awareness. With a global
membership of over 100,000 certified information
security professionals, (ISC) 2 exists “to ensure that
children everywhere have a
positive, productive and safe
experience online; to spur
the development of the next
generation of cybersecurity
professionals; and to illuminate
major issues facing the issue
now and in the future.”
At the 2014 ASIS Conference,
which hosted over 20,000 visitors,
1,600 of the attendees were
there to attend the co-located
(ISC) 2 conference, according to
Dan Waddell, Director of US
Government Affairs of (ISC) 2 , who
spoke with GSN a few days after the ASIS Conference
about the rationale behind the huge delegation. The
obvious opening question was, What’s the urgency?
Waddell had a strong answer to this question, one
that arose from his own knowledge of cybersecurity and
was further informed in great detail by an in-depth report
commissioned by the University of Phoenix and (ISC) 2
that was named, “Cybersecurity Workface Competencies:
Preparing Tomorrow’s Risk-Ready Professionals.” The
urgency, in short, is that there is a serious gap between
supply and demand in the realm of cybersecurity
professionals.
Cyber security accounts for approximately 10% of all
IT occupations, and cybersecurity-related positions are
growing faster than all IT jobs. Cybersecurity job openings
Cybersecurity Workforce Competencies:
Preparing Tomorrow’s Risk-Ready Professionals
take 24% longer to fill than all
IT openings, and 36% longer to
fill than all vacancies, regardless
of industry. U.S. employers pay
qualified candidates a premium
for cybersecurity jobs – an
average of $93,028 annually,
or over $15,000 more than
other IT jobs overall. In 2013,
U.S, employers posted 50,000
new jobs requiring Certified
Information Systems Security
Professionals (CIISP) credentials,
but there were only 60,000 total
existing CIISP holders.
“It’s an education-to-workforce gap,” said Waddell,
and it’s hindering the efforts to fill cybersecurity jobs.”
According to recent findings by Cisco, he pointed out,
there are a million jobs that are not being filled. “The
supply has gone up slightly, but the demand has gone
through the roof.”
“The CISSP is the gold standard of information
security professionals,” he said, “but it’s not just ‘tech’ that
they need. “We’re trying to teach students the importance
of the cyber battlefield and the tools they need to
defend it – not just the software and hardware, but also
knowledge and experience. An effective cybersecurity
professional should have a good balance of education
and experience on his or her resume. A credential serves
as a validation mechanism. Giving students a head start
on the education piece is where (ICS) 2 can help through
its Global Academic Program, which gets colleges and
universities working with our common body of knowledge
to help introduce cybersecurity topics in their curricula.
We need kids to major in cybersecurity.
The reason we have the gap, according to Waddell,
is that “cybersecurity is still a relatively new industry –
compared to other disciplines such as law or medicine.
Until very recently,
we haven’t had a real
definition of a career
path in cyber, and
sometimes we don’t
even know what job
titles to assign. We
have to understand
requirements first,
then align skills and
competencies through a common framework, so that
we’re all on the same page. DHS and NIST have developed
such a framework under a program called the National
Initiative for Cybersecurity Education of seven causes. (NICE). So that’s a
great start. (ISC)2 is supplying credentials 4.55% that align with
the NICE framework.”
63 % of U.S. Federal CIOs (Chief
Information Officers) and CISOs
(Chief Information Security Officers) say
improving cybersecurity
is a top priority
employees
As co-hosts of the “Cyber Workforce Competencies”
officer
■ to Director protect
report co-hosted by the University new tactics of Phoenix, 28.57% and the
(ISC)2 Foundation, the host organizations 42.44% Top 7 causes relied on
Note. Total who responded to the question = 483 (100%)
estimating
findings from an industry roundtable with breaches cybersecurity
devices as
professionals and talent leaders, with the objective
of investigating competencies and Lack career of a layered priorities Loss of mobile of
Proposed annual
U.S. Department of Defense
spending on cyber activities
cybersecurity professionals, and to identify actionable
recommendations for key stakeholders to better prepare
students to enter careers in cybersecurity.
The focus was on identifying what educational
institutions, employers, industry associations and
students can do to bridge three education-to-work gaps:
a competency gap, a professional experience gap; and an
education speed-to-market gap. The roundtable partners
included representatives from institutions of higher
education that educate cybersecurity professionals;
organizations that employ cybersecurity professionals;
industry associations that support and provide
certifications to cybersecurity professionals; and the
Figure 1. Most major cybersecurity breaches have one
11.18%
CISO
CIO
Users not
keeping up with
Under-
cybercriminals
63% $4.7
Billion
5.18%
Naive 8.07% end users
and disgruntled
■ CEO/president/
general manager/
owner/principal/
partner
■ Chief security
■ No Vice perimeter President
■ Manager
■ Supervisor of
security personnel
of cybersecurity Mobile
defense
devices
ideal entry
points
Department of Labor, which develops research and tools
Annual cost
of computer- and network-based
crimes worldwide
for workforce prosperity
and achievement.
The roundtable
also incorporated
the perspective of a
cybersecurity student/
career-starter on higher
education practices and
career entry.
The findings of
these groups and other thought leaders with relevant
experience in competency modeling, higher education,
cybersecurity services and cybersecurity credentialing
Figure 2. Ninety-four percent of cybersecurity breaches
in 2013 fell into these nine categories.
resulted in the recommendations coming out of the
report, 4.55% which were designed to be useful to the larger
11.18%
5.18%
$445
Billion
■ CEO/president/
general manager/
community Distributed 8.07% owner/principal/
of industry leaders, employers, educators and
denial-of-
6% partner
Other ■ Chief security
service
Web
current or future cybersecurity officer app
attacks
professionals. Ω
■ Vice attacks President
■ Director
based on the information intrusions released in the University of Phoenix/
Physical
theft/loss
28.57%
■ Manager
Most
Cyberespionage
personnel
■ Supervisor of
42.44% Editor’s Note: Common security
Miscellaneous
Note. Total who responded
categories
to the question
of
= 483 (100%)
errors
This is the cybersecurity first of several articles that GSN intends to publish
Point-of-sale-
Crimeware
breaches
Payment
(ISC)2 Foundation’s Cybersecurity Workforce initiative and report.
Insider
misuse
card
skimmers
Sources: Homeland Security News Wire, “Improving Cybersecurity Top Priority: Federal CIOs, CISOs,” June 12, 2014, http://www.homelandsecuritynewswire.com/dr20140612-
improving-cybersecurity-top-priority-federal-cios-cisos. Andy Sullivan, “Obama Budget Makes Cybersecurity a Growing U.S. Priority,” Reuters, April 10, 2013, http://www.
reuters.com/article/2013/04/11/us-usa-fiscal-cybersecurity-idUSBRE93913S20130411. Tom Risen, “Study: Hackers Cost More Than $445 Billion Annually,” U.S. News & World
Report, June 9, 2014, http://www.usnews.com/news/articles/2014/06/09/study-hackers-cost-more-than-445-billion-annually.
8 Government Security News October/November 2014 Digitlal Edition Digitlal Edition October/November 2014 Government Security News 9
Source: Kaseya.
Source: Verizon, based on reports from 50 companies.
© 2014 Thermo Fisher Scientific Inc. All rights reserved. All trademarks
are the property of Thermo Fisher Scientific and its subsidiaries.
Radiation Identification
The detection and analysis of hidden radioactive nuclides requires radiation identification instruments
with high sensitivity and accuracy. The expense, weight and complexity of this equipment prevents
many safety and security teams from having the right tools to manage a dangerous radiation scenario.
The new Thermo Scientific RadEye SPRD Spectroscopic Personal Radiation Detector makes
radiation identification accessible and affordable. The palm-sized, RadEye SPRD is a high-performance,
radiation monitor designed to expose, locate and identify radioactive nuclides such as orphaned or
hidden sources. Like the trusted Thermo Scientific RadEye PRD Personal Radiation Detector, the
RadEye SPRD is intuitive, rugged and operates 170 hours on standard AAA batteries. This combination
makes it the perfect solution in unpredictable and challenging scenarios. With a low cost of ownership
the RadEye SPRD is an affordable way to put radiation identification in the hands of the entire team.
Detect, Locate and Identify
radioactive threats with the
new RadEye SPRD.
is within grasp
• Get the New RadEye SPRD brochure: thermoscientific.com/sprd
Talk to an Expert: 1-800-274-4212
Law Enforcement Communications
L.A. County Sheriff’s Department
and Geofeedia write the playbook
on using social media and location-based
technology in law enforcement
BY ADRIAN COURTENAY
Earlier this year, the Los
Angeles County Sheriff’s
Department (LASD), under
Commanders Scott Edson and
Mike Parker sent out an invitation
to 19,000 law enforcement
agencies in the U.S. and overseas
inviting them to try a new crowdsourcing
platform called LEEDIR,
by which eyewitnesses to a
crime or emergency, anywhere, could upload
and share high-resolution photos and videos
with law enforcement agencies for free and in
real-time. At GSN, we were so impressed with
this initiative that we labeled it “History in the
Making” and ran a front page cover story on it in
our April 2014 Digital Edition.
Now, half a year later, the L.A. Sheriff’s Department
is once again sharing law enforcement history, this time
by using innovative crowd sourcing and social media
technology developed by Geofeedia of Chicago, IL.
Geofeedia’s unique approach organizes social media
by location, as opposed to the long-standing industry
approach of organizing social media solely by keyword
or hashtag without regard to location. The result: a
new set of data focused on the places where events
happen. The key to the new approach is that emergency
services, including law enforcement, place a Geofeedia
virtual perimeter around a designated geographical
area – which can be as big as a city or as small as a single
address – and then monitor social media openly shared
by the public within that perimeter.
10 Government Security News October/November 2014 Digitlal Edition Digitlal Edition October/November 2014 Government Security News 11
Grundy County Sheriff
It Law started Enforcement with school Communications safety • Geofeedia
In a discussion with GSN,
SITUATION:
LASD Commander Mike Parker
Schools made have it clear been that vulnerable one of the to acts of violence at an
alarming most surprising rate in recent revelations months. More than 7 percent of 9th
through about 12th the use graders of a reported “geo-fence” being is threatened or injured
with that a weapon many people on school at the property scene at least once in the last
year. An additional 6 percent admitted to bringing a weapon
of a crime or an emergency
to school for protection.
in progress often openly post
information onto the Internet,
Grundy County, Illinois had its own scare Phil when Harris, a gun CEO was
found specifically at an Oswego in social school media, through Geofeedia’s and a founder social of
media before monitoring they even software. think of dialing Geofeedia
911 and reporting it to the
police. Often, the public share postings, including the
“Geo-Tagging”, which indicate the latitude and longitude
located on Cleveland’s west side when a group of 20 men
surrounded him on the sidewalk. The group attacked and
severely beat the man, stole his phone, and ran.
Immediately following the crime, Patrol Sergeant Tanya Sirl
used Geofeedia to draw a perimeter around the scene of the
In the wake of this incident, the outset Grundy of County the incident Sheriff and has
incident and surrounding areas, searched back to the time of
taken full advantage of had Geofeedia observed to monitor a woman social
the crime, and began scouring the social media content. who
media in locations beyond schools in the neighboring
had seized a knife from a store
towns. According to GIS Analyst Dave Ostrander, the
It was while reviewing these display posts and that had she slashed came across a
easy navigation and reliability of the application has been
individuals who had posted number to Facebook of other about customers. going to The a
fundamental to the success of Geofeedia in Grundy County.
“93rd Street block party” deputy (a common responded gang reference by drawing often
Ostrander knows that it can help solve crimes and provide
synonymous with being up to no good).
situational awareness to his potential weapon public and facing safety down hazards. the
woman, who still had the knife in
Geofeedia Case Study: Hate Crime in Cleveland
her hand with blood dripping off
LASD Commander
ADDITIONALLY:
Michael J. Parker of it. In the last moment before
Another example of the importance of Geofeedia within
he had to shoot, the woman
Grundy County was the monitoring of an ice jam on the
dropped the knife and was put into handcuffs by the off
Kankakee River. Emergency responders were notified and
duty had deputy to respond and other quickly deputies to the situation. who had With just the arrived help on of
the Geofeedia, scene, with officials no loss in Wilmington, of life. Illinois were able to
of the exact location. Prior to the days of social media, monitor The question social media was, how in the did area the and reporter view photos know posted about
he said, the typical scenario was that if members of the the by ongoing citizens situation in real-time, before therefore police assisting knew responders about it? with
additional actionable data.
public saw something suspicious, they would call the The answer was clear: Social media, which was obviously
police and the police would send a patrol car to see if being followed regularly by reporters. In Parker’s words,
the report was accurate and then act on it. In addition to “All of the news media these days are monitoring social
SOLUTION: keyword searches, now that law enforcement can access media. If they’re not, they’re way behind the times and
Officers social media were able activity to react within quickly a geo-fenced based on area, intelligence he pointed their competitors. Tools like Geofeedia are extensively
provided
out, the
by
police
the location-based
can get additional
platform
focused,
through
geographically
postings
used by leading news agencies.”
on several social media outlets. Real-time tweets coming
relevant and important information, and they get it faster. According to Commander Parker, surveys have
from inside the school were communicated to police officers
Describing an incident that he had experienced a indicated that about 8% of the U.S. population uses
on the scene. Geofeedia allowed law enforcement to draw
a perimeter few years around earlier, the Commander area in order Parker to see said what he was received a geotags when sharing opening by social media on their
taking phone place call inside from a school news walls. reporter After asking officers about secured a shooting the mobile phones, thereby making their global position
perimeter that had around supposedly the school, taken it place, was discovered with people that being the gun public information, since their geotags give latitude and
was hit dropped by bullets, by at a contractor a local supermarket. in the faculty When bathroom. sheriff’s The longitude and often include tags of photos on social
students
deputies
were
arrived
safe and
at the
the
scene,
weapon
they
was
learned
secured
that
thanks
an off
to
media. He added that the percentage is probably twice
the services provided by Geofeedia.
duty deputy sheriff had been in the supermarket at that number, or 16%, when teenagers share openly. This
“Geofeedia is easy to use and always works. Its technology has solved crimes and provided our
squad cars with visibility into what is taking place during some very sensitive situations.”
- Dave Ostrander | GIS Analyst
introducing it to students as an important tool in modern
crime fighting:
“Geofeedia is something we are all using as a tool
to combat violent crime because it is the best way
to monitor high crime areas. With what people are
posting these days, it doesn’t take much time to find
evidence against criminals. It is simply amazing what
can be done with this platform.”
- Patrol Sergeant Tanya Sirl
enables law enforcement agencies to be
more effective in dealing with emergency
situations ranging from teen suicide,
natural disasters to shooting and threats
against schools.
A great deal of information shared
by social media, Parker pointed out, is
“open source information”, meaning that
it is shared for the world to see, including
law enforcement. There is no reasonable
expectation of privacy if it’s shared in a way
that “A boy in a basement in Belgium could
view the same information” he said. “But a
line is drawn where there is password protection because
then there usually needs to be an ongoing criminal
investigation or potentially a search warrant signed by a
judge to get that information.”
In a separate interview with GSN, Phil Harris, CEO
and a founder of Geofeedia, agreed with Commander
Parker in pointing out that law enforcement wasn’t the
first sector to use social media, since the marketing and
business worlds had been mining social media and crowd
sourcing for many years. But law enforcement is learning
fast that everyone with a phone or a camera is an
eyewitness that can support first responders by sharing
what they see through social media posts, he said, as the
capture of the Boston bombers demonstrated.
“First responders need reliable, accurate information,”
Harris indicated, “and that can be obtained within 15 feet
of the person posting because of the GPS coordinates
produced by Geofeedia. “We have gathered hundreds of
millions of social media posts on behalf of our customers
across Twitter, Instagram, YouTube, Facebook, Picasa,
Flickr and other sources,” he said. “It starts with a map.
Then you select the location you want to focus on and
adjust the boundaries. Social media posts will then pop
up within those boundaries. In addition, if you find a post
you're interested in, you can blow it up and put in on a
map. One of the most powerful things about Geofeedia,”
he added, is that in addition to location, you can also locate
by word or phrase. You can also take data that’s in the
public domain and take it to a location. You don’t need to
go to the Instagram site. You can see it all on Geofeedia in
a single search, which makes it fast and efficient for first
responders.
According to L.A. County Sheriff’s Department Deputy
Tony Moore, who worked with Commander Parker and
used the law enforcement Geofeedia app, illegal preplanned
teen drug parties had become an escalating
12 Government Security News October/November 2014 Digitlal Edition Digitlal Edition October/November 2014 Government Security News 13
Geofeedia Case Study: Grundy County Sheriff
Law Enforcement Communications • Geofeedia
problem in Los Angeles County and its
population of ten million people across
88 municipalities and 130 unincorporated
communities. Pre-planned teen drug
parties had become an escalating problem
in Los Angeles County, contributing to
a measurable increase in felony and
sexual assaults, related property damage,
vehicular burglary, and gang activity – all
events that were primarily organized and
advertised via social media networks.
To police the pre-planned parties,
the 24-hour LASD Electronic Communications Triage Unit
(eComm) which had been founded in 2012, used key word
search systems such as Hootsuite and the Geofeedia
patented, cloud-based program to search, monitor and
analyze real-time openly shared social media posts via
social media networks.
“What we like about Geo-searching is a look at a
particular location, draw a map and immediately start
gathering real-time intelligence” said Deputy Moore,
adding, “We’re not shy about recommending this ability to
other agencies as this simplifies a lot of things and will help
other agencies accomplish their public safety mission.”
The Geofeedia website has archived a number of
law enforcement Case Studies which can be accessed by
law enforcement officials. These include one study which
describes how situational awareness was established
by a group in West Virginia, using Geofeedia’s social
media monitoring software and drawing a perimeter
around locations such as specific colleges or universities,
neighborhoods, city blocks or specific buildings.
In another, a Patrol Sergeant used Geofeedia to
draw a perimeter around the scene of a brutal attack by
20 men that had taken place outside of a gay bar in a
the Nozz distribution network also eliminated a significant
revenue source for gangs. To fund other criminal activities,
gangs often taxed Nozz distribution at drug parties. The
operation also reduced an environmental threat. Federal
authorities have estimated that the damage to the ozone
from the illegal use of nitrous oxide in the greater LA area is
more than what a small oil refinery in the center of the city
would cause annually.
In addition, the search warrants also resulted in the arrest
of multiple suspects on weapons charges. Thirteen guns
were seized as evidence, including assault weapons, armor
piercing rounds, and high capacity magazines. Another
suspect was arrested for possession of narcotics with
the intention to sell them (a felony charge). Finally, with
Geofeedia’s location-based social media monitoring and
keyword analysis the eComm unit interdicted more than
1,000 parties and reduced felony assaults by 50%.
“Our successful joint operation with the FDA proves
again the relevance of social media in intelligenceled
policing. Our eComm unit delivers great value
by providing real-time, actionable intelligence to
our field officers. Geofeedia’s location-based social
media monitoring solution is a powerful tool to help us
deliver that value.”
- Commander Mike Parker
northeast Ohio town. In reviewing the social media within
the perimeter she had drawn, the Sergeant came across
sales@geofeedia.com
@geofeedia
individuals who had posted to Facebook about going to
a “93rd Street block party”, which was a common gang
reference often synonymous with being up to no good.
Geofeedia Through this Case connection, Study: Los she Angeles was taken County to Sheriff’s one of the Department
town’s known gang members who was also talking about
the block party, and shortly thereafter, the gang member
was identified as one of the attackers, which led to an
arrest by the town’s gang unit.
“Geofeedia can be used by the media or for corporate
security, branding or healthcare,” said Phil Harris, “but
it’s a game-changer for law enforcement, public safety,
emergency response and health crises.” Ω
organization plans to continue spreading their knowledge
about Geofeedia.
About Geofeedia
Geofeedia provides social media search and discovery
by location. Our patented technology searches Twitter,
Facebook, Instagram, YouTube, Flickr, Picasa, and Viddy
data by location to provide users with real-time insights
from anywhere in the world.
Request a free demo at: geofeedia.com/demo
About the Los Angeles County
Sheriff’s Department
The Los Angeles Sheriff’s Department is the largest sheriff’s
department in the world with a mission to “lead the fight
to prevent crime and injustice, enforce the law fairly and
defend the rights of all, including the incarcerated.” The
department is divided into eleven divisions and specialized
services including four patrol divisions, Custody Operations
Division, Correctional Services Division, Detective Division,
Court Services Division, Technical Services Division, Office
of Homeland Security, Administrative Services Division, and
Leadership and Training Division. Learn more at: lasdhq.com
geofeedia.com/demo
14 Government Security News October/November 2014 Digitlal Edition Digitlal Edition October/November 2014 Government Security News 15
Law Enforcement Communications • Briefcam
BriefCam Syndex
offers rapid review
Video Synopsis video
solution at Israel
Exhibition
BriefCam ® , the developer and provider of Video
Synopsis ® solutions for the rapid review, analysis
and indexing of video, has announced a new offering
tailored to the needs of government
investigative agencies and law
enforcement: BriefCam Syndex GV, to be
available in Q1 2015. The announcement
was made at the Israel HLS Exhibition
(iHLS 2014) running from November 10-
12 in Tel-Aviv.
“Two years ago, we won the iHLS
Innovation Award 2012. Since that time,
our product line has matured, our client
base has expanded, and BriefCam
has been used and recognized for its
role in major criminal and homeland
security-related investigations. For all of
these reasons, we’re proud to be able
to announce BriefCam Syndex GV at
Israel HLS 2014,” said Dror Irani, CEO and President of
BriefCam. “This offering meets the needs of government
agencies and was developed in response to direct
feedback from high-profile users already employing
BriefCam successfully in
the field. These include the
departments of defense, the
law enforcement agencies, and
the intelligence communities in
North America, Europe, China,
the APAC region and, of course, Israel.”
BriefCam Syndex is a next-generation product range
based on Video Synopsis technology. (See: YouTube/
BriefCamVS). Video Synopsis is the simultaneous
presentation of objects, events and activities that
occurred at different times. Users can pinpoint events
Continued on page 32
BriefCam Syndex. The Video Synopsis can be refined
by parameters such as color, direction, speed, size and
area of interest/exclusion. New features include multiple
video source capability, access restriction, floating
camera licenses, mobile support and more
To Secure a Perimeter...
success is all about choosing the Right Products.
■ The right Barriers
■ The right Gates
■ The right Sensors
■ The right Fences
We Didn’t Want Standard Shelters,
We Wanted B.I.G.
“Some folks make cheaper booths, but no one
makes a better booth than B.I.G. They build
superior, high-quality modular booths. The
highest quality in the U.S."
— East Coast Facility Manager
■ And most important of all,
the right Guard Station/House
If you don’t protect your staff and
systems, they can’t protect your
students and faculty
A B.I.G. guardhouse is different from
all others because we have invested over
40 years in studying and understanding
what goes on inside—and outside—of
a superior guard station. This expertise
comes to you in the form of a full line
of B.I.G. Enterprises guardhouses—the
cornerstones of your “hardened”
perimeter. With B.I.G. your guardhouse
doesn’t have to appear hard and
unattractive—it can be your steel fist
inside of a velvet glove.
When overseeing the safety of your campus, call in the security heavyweights
—because a perimeter without B.I.G. is like a holster without a gun.
16 Government Security News October/November 2014 Digitlal Edition Digitlal Edition October/November 2014 Government Security News 17
Law Enforcement Communications • Capital Shield Program
Kastle Systems and Metropolitan DC Police launch
“Capital Shield” city-wide network of video cameras and
floor plans to enhance first responder situational awareness
In an innovative initiative backed by the city’s major
real estate owners, managed security services firm
Kastle Systems has launched an interconnected
network of private security cameras, floor plans and
other building information in partnership with the
DC Metropolitan Police Department (MPD) that will
allow first responders direct network access in order
to enhance situational awareness in responding to
emergencies and serious threats.
According to the press announcement, the launch
of “Capital Shield” is a culmination of nearly three years
of collaboration between Kastle and the MPD, with the
shared goal of making the nation’s capital safer and
more secure. It is enthusiastically supported by major
DC real estate firms, including Douglas Development,
Vornado Realty Trust, ON Hoffman, First Potomac Realty
Trust, The Tower Companies and Tishman Speyer. To
catalyze the program, Kastle Sytems is donating 1,000
new security cameras to any real estate owner in the
city that wants to participate in the program and has
already deployed test sites with an additional 300
cameras expected to come online in the first phase.
“Through this public-private partnership, Capital
Shield will significantly increase the public safety of our
nation’s capital,” said Kastle owner and DC area native
Mark Ein. “There are thousands of existing cameras
that should be made accessible to our police in times of
need, and this program will add thousands more over
time. The role of video security has never been more
important or more evident in cities across the country.
Modern video technology saves lives, catches criminals,
deters crime and accomplishes something we all value –
a safer city. Kastle is proud of the role we are playing to
help DC.
In further comments, Chief Cathy L. Lanier of the MPD
added, “Video is a force multiplier for MPD. It gives us an
extra set of eyes by allowing us to provide much needed
situational awareness. The Capital Shield program is an
important new step in working with private enterprise to
enhance public safety throughout the city. I would like to
extend a special thanks to our inaugural members and to
Kastle for its donation to help the city make this a reality.”
Speaking on behalf of his company and the other
participating real estate firms, Patrick Tyrrell, Chief
Operating Officer of Vornado/Charles E. Smith stated,
“As owners in Washington, DC, our company supports
the goal of a safe and secure city. Vornado is delighted
to be an inaugural participant and to work with Kastle
on the Capital Shield program to make a positive and
lasting contribution to DC. The very presence of Capital
Shield will make our buildings safer for our tenants, our
residents and our surrounding communities.”
ABOUT CAPITAL SHIELD
Capital Shield is a public-private partnership that unites the
Washington, DC Metropolitan Police Department (MPD)
with commercial property owners, businesses and institutions
around a common goal of protecting the city. Through this
program, participants can help enhance public safety by
providing the MPD with direct access to their security cameras.
This enables first responders to quickly gain the situational
awareness required to most effectively assist and respond to
major security events and emergency situations. For more
information, visit www.capitalshield.org. Ω
ABOUT KASTLE
Kastle Systems has been a leader in the security industry for
more than 40 years with new technologies and advanced
security solutions. Kastle operates and manages security systems
for its clients remotely, around the clock. Currently, Kastle
protects over 10,000 locations nationwide and internationally
today. Kastle’s outsourced security services significantly reduce
costs and improve the critically important 24/7 performance of
security systems for building owners, developers and tenants.
Kastle Video delivers the latest advancements in monitored
video solutions, including high-definition cameras, cloudenabled
network recording and cutting edge video analytics.
Headquartered in Falls Church, VA Kastle is the largest security
company in DC, according to the Washington Business
Journal. Kastle Systems also has offices in Los Angeles, San
Francisco, Houston, Dallas, Chicago, New York, Philadelphia
and Sydney, Australia. For more information on Kastle
Systems, visit www.kastle.com or call 855-527-8531. Ω
18 Government Security News October/November 2014 Digitlal Edition Digitlal Edition October/November 2014 Government Security News 19
Law Enforcement Communications • Mutualink
Mutualink, Inc.
1269 South Broad Street
Wallingford, CT 06492
REDEFINING Mutualink Unveils INTEROPERABILITY
Breakthrough Mobile Go Kit for
Controllable Interoperable Intuitive Public Safety Affordable Communications at IACP 2014
Phone: (866) 957-5465
Web: www.mutualink.net
E-Mail: info@mutualink.net
In an important interoperable communications
Key features include:
technology at the 121st Annual International
Interoperability • Best-in-class security with military-grade Workstation encryption | IWS
Chiefs of Police (IACP) conference, Mutualink, an
interoperable communications technology
The Mutualink
company,
IWS provides
• Ease
an
of use
incident-based
and deployment,
highly
with
intuitive
plug and
graphical
play
user interface (GUI)
that can be effectively used functionality by a dispatcher or incident manager to communicate with other
introduced its Mobile Go Kit for first responders. In
involved dispatch personnel • Wide-area as well as multi-mode with units connectivity in the field. Interconnection of radio channels/
times of crisis, this easy-to-transport case for on-thego
interoperable communications enables stand-alone, public as a mini-console, “Mutualink or in developed combination our interoperability with an existing solution console position. The IWS
safety officials and emergency managers is simple to establish to use and to easy enable to first maintain. responder In addition, agencies to the securely multi-featured share and robust Mutualink
software is easy to manage
secure command and control on the move, anywhere. disparate for radio, System video Administrators and telephone and communications
other key personnel. The IWS is the
primary operational user with each interface other for during the Mutualink emergencies,” system. said Mark It consists Hatten, of a standard x86 PC
The kit connects to 4G LTE/3G or hard-wired internet,
platform (desktop, laptop,
Mutualink’s
etc.) running
CEO. “Our
the
new
Mutualink
Mobile
real-time
Go Kit puts
communications
all of that
application on
bridging radio and telephone and enabling a Security first Enhanced (SE) Linux operating system.
interoperability into one case that can be set up in a
responders to send and receive full motion video, files
mobile vehicle or transported to a temporary emergency
and text messages from remote locations.
management facility for real-time, ad hoc collaboration.”
The Mobile Go Kit, as shown at the Mutualink booth, In Passaic County, New Jersey, the first Go Kit has
contains an Interoperable Workstation (IWS), which Standard Fixed already Workstation
been made part of a counter-terrorism toolkit,
allows public safety agencies to participate on the
DESKTOP IWS ready M500-100 to assist as the Series county prepares for any man-made
nationwide Interoperable Response and Preparedness or natural threat to security. The kit provides a fully
Platform (IRAPP) network to collaborate with federal, portable information sharing solution; a flexible way to
state and local agencies, regardless of location.
deploy resources as, when and where needed to attain
S
talkgroups is facilitated using Mutualink’s drag and drop interface. An IWS can be used either
inter-agency collaboration.
20 Government Security News October/November 2014 Digitlal Edition Digitlal Edition October/November 2014 Government Security News 21
About Mutualink, Inc.
stand-alone, as a mini-console, or in combination with an existing console position. The IWS
is simple to use and easy to maintain. In addition, the multi-featured and robust Mutualink UPFRONT
software is easy to manage for System Administrators and other key personnel. The IWS is the
primary operational user interface for the Mutualink system. It consists of a standard x86 PC
Law Enforcement Communications • Mutualinkplatform (desktop, laptop, etc.) running the Mutualink real-time communications application on
a Security Enhanced (SE) Linux operating system.
IWS
REDEFINING INTEROPERABILITY
Controllable Intuitive Affordable
Ruggedized Mobile Workstation
IWS M500-150 Series
About Mutualink, Inc.
Also at the IACP event, Mutualink demonstrated Mutualink is an IP-based multimedia communication resource sharing platform that allows aircraft CF-03 at 12:18 p.m. aboard USS Nimitz's (CVN 68)
its resilient peer-to-peer collaboration network for public safety agencies and critical community assets to communicate in a manner that flight is deck.
separate and apart from the general public.
public safety, which provides proven, secure, reliable
The arrested landing is part of initial at-sea
communications for mission-critical homeland security Mutualink technology ABOUT is subject MUTUALINK
to US Patent #7,643,445, #8,364,153, #8,320,874 and Developmental Testing I (DT-I) for the F-35C, which
other patents pending.
and law enforcement needs. The platform won the U.S. Mutualink, Inc. has developed an interoperable
commenced Nov. 3 and is expected to last two weeks.
Department of Defense (DoD) Joint Interoperability Test
communications platform that enables community-wide
£ Voice: LMR radios, VoIP “push-to-talk”, telephone, cellular, Nextel & intercom "Today is a landmark event in the
Command certification for both Information Assurance £ Video: live feeds multimedia from buildings, sharing streets, of radio, cruisers, voice, copters text, video, data files
£ Text Messaging: and more telephone effective communications than voice for informational a secure environment. content
development of the F-35C," said Wilson,
and Interoperability.
£ File Sharing: blue Mutualink’s prints, floor system plans, is currently photos, procedures deployed by hundreds
IACP attendees at IACP enjoyed Ruggedized hands-on Interoperability Workstation | IWS
£ PA and Intercom of System public and Interface: private Broadcast entities worldwide, Emergency including
Messages
a Navy test pilot with Air Test and
demonstration of how a panic button can trigger £ an Dispatch Collaboration: off-the-air conferencing between dispatch centers
The Mutualink IWS provides an homeland incident-based security highly and defense intuitive installations, graphical user NATO interface (GUI)
Evaluation Squadron (VX) 23. "It is the
incident connecting schools (or other that facilities) can be with effectively their used by
Special
a dispatcher
Operations
or incident
Forces,
manager
police and
to
fire
communicate
departments,
with other culmination of many years of hard work
local police department in the event involved of an emergency dispatch personnel as well as with units in the field. Interconnection of radio channels/
transit authorities, hospitals, shopping malls, casinos, © 2013 Mutualink, Inc.
talkgroups is facilitated using Mutualink’s drag and drop interface. An IWS can be used either
using Mutualink’s K12 solution. In such
stand-alone, incident,
as a
police
mini-console, and or in more. combination Mutualink with is an a privately-held existing console company position. The IWS
departments can then invite other community is simple to partners use and easy to maintain. headquartered In addition, in Wallingford, the multi-featured Conn., with and R&D robust Mutualink
like hospitals, fire departments or state software and is federal easy to manage for System
facilities
Administrators
in Westford, Mass.
and other
and
key
Mayagüez,
personnel.
Puerto
The
Rico,
IWS is the
primary operational user interface for the Mutualink system. It consists of a standard x86 PC
agencies participating on the IRAPP
platform
as necessary
(desktop, laptop, etc.) running and Defense the Mutualink Services office real-time nearby communications Washington, application DC. For on
respond to and mitigate the emergency. a Security Enhanced (SE) Linux operating more information system. please visit www.mutualink.net. Ω
Commander, Naval Air Forces, Vice Adm. David H.
The company’s suite of interoperability capabilities is
Buss, was aboard Nimitz to witness the milestone event.
deployed and in use in the Orlando Police Department,
"What a historic day today is for Naval Aviation. With
as well as various area hospitals, schools, malls and other
the first traps and launches of the F-35C Lightning II
Critical Infrastructure and Key Resource (CIKR) entities.
aboard an aircraft carrier, we begin the integration of the
S
Ruggedized Mobile Workstation
IWS M500-150 Series
Mutualink, Inc.
1269 South Broad Street
Wallingford, CT 06492
Phone: (866) 957-5465
Web: www.mutualink.net
E-Mail: info@mutualink.net
F-35C Completes
First Arrested Landing
aboard Aircraft Carrier
The U.S. Navy made aviation history Nov. 3 as
an F-35C Lightning II carrier variant Joint Strike
Fighter conducted its first arrested landing
aboard an aircraft carrier off the coast of San Diego.
Navy test pilot Cmdr. Tony Wilson landed F-35C test
by a talented team of thousands. I'm very
excited to see America's newest aircraft
on the flight deck of her oldest aircraft
carrier, the USS Nimitz."
next generation of warfighting capability into our carrierbased
air wings," said Buss. "This important milestone is
Pacific Ocean (Nov. 3, 2014)
yet another indicator of Naval Aviation's ongoing evolution
to meet future threats and remain central to our future
Navy and National Defense Strategy."
DT-I is the first of three at-sea test phases planned
for the F-35C. During DT-I, the test team from the F-35
Lightning II Pax River Integrated Test Force (ITF) has
scheduled two F-35C test aircraft from Naval Air Station
Patuxent River in Patuxent River, Maryland to perform
a variety of operational maneuvers, including various
catapult takeoffs and arrested landings. ITF flight test
operations also encompass general maintenance and fit
tests for the aircraft and support equipment, as well as
simulated maintenance operations.
As with the initial testing of any new aircraft, the
goal is to collect environmental data through added
instrumentation to measure the F-35C's integration to flight
deck operations and to further define the F-35C's operating
parameters aboard the aircraft carrier.
The ITF test team will analyze data obtained during
flight test operations, conduct a thorough assessment of
Continued on page 31
22 Government Security News October/November 2014 Digitlal Edition Digitlal Edition October/November 2014 Government Security News 23
å Romanowich on Video Surveillance
New physical
standards in the works
for electrical substations
Attacks on transformer substations and other
components of the electrical grid in North America have
underscored the risks associated with physical security
breaches and the potentially disastrous consequences.
With the tens of thousands of substations across the U.S.
situated in locations that range from isolated remote
areas to densely populated urban areas, the job of
securing these critical assets is challenging at best for
security professionals.
To provide guidelines to ensure greater physical
security around substations, the Federal Energy
Regulatory Commission (FERC) is currently finalizing the
latest Critical Infrastructure Protection (CIP) standard.
Developed by the North American Energy Reliability
Corporation (NERC), CIP-014 is a mandatory physical
security standard for critical components of the
power grid that is expected to be finalized soon. Upon
completion, CIP-014 will serve as a blueprint to help
both utilities and security professionals understand the
requirements to protect these vital assets.
Following CIP-014’s finalization utilities will be tasked
to identify their most critical substations – those that if
damaged or taken offline would cause major problems
for the power grid. To comply, utilities will need to
perform a gap analysis to evaluate potential threats
John Romanowich
President and CEO of SightLogix
and vulnerabilities of physical attacks on the targets
they’ve identified as most critical, and then deploy
and implement physical security plans to cover those
locations. Finally, utilities will undergo another thirdparty
review to evaluate their gap analysis and physical
security plans. These requirements will be implemented
in phases, giving utilities adequate time to prepare for
and implement physical security upgrades.
Equipment selection and purchase will be crucial
to meeting CIP-014 requirements, so it’s important to
understand what utilities will be looking for. When it
comes to equipment, utilities are generally hesitant
to invest in products that have no real track record of
success. They also want to ensure that they are receiving
the best return on their investment in physical security.
Traditionally, utilities have relied on a combination of
some type of blind sensor – such as coax or fiber on a
fence to act as an activity detector – with video security
solutions, but the reliability and accountability of these
systems is diminished by the many nuisance alerts they
generate. These blind sensors also fall short of the intent
of this new regulation to provide early detection outside
of the fence line for advance warning.
Smart thermal cameras that incorporate video
analytics provide substantial advantages over this
traditional approach, increasing the probability of
intruder detection while greatly reducing the nuisance
alarms that have plagued automated perimeter systems
in the past. These systems cover large distances and
detect what a human would miss, while delivering
immediate, actionable information to enable fast
response decisions.
For this reason, many electrical utilities are already
using smart thermal video cameras to provide accurate,
reliable performance in even the
most challenging conditions. For
example, some smart thermal
cameras can discriminate small
differences between the temperature
of a person and the background,
accurately detecting intruders even
in less than ideal conditions. They
will ignore headlights, reflections off water, or other
lighting issues that cause false detections with visible
light cameras. Because they can detect in complete dark,
bright sunlight, or poor weather, smart thermal cameras
can be counted on to secure outdoor areas 24/7. The
alerts smart thermal cameras generate when – or even
before – an intrusion occurs, allow security personnel to
view real-time video to determine if there is activity to be
stopped. This advanced detection provides alerts before
an individual has an opportunity to steal, vandalize or
disrupt substation operations.
While some utilities have already begun the processes
laid out in CIP-014, the remainder are expected to follow
suit in the near future to ensure their planned physical
security upgrades meet local zoning regulations, address
any issues with light and/or sound around the site, and
acquire proper permits for any construction or other
work necessitated by these upgrades at their substations.
This underscores the need for security
solution providers and system designers,
installers and integrators to educate
themselves on CIP-014 and the best
technologies for ensuring compliance with
this fast-approaching regulation.
SightLogix Thermal SightSensor True security means stopping an event
by detecting intruders as early as possible,
ideally before they enter a secured area, and alerting
security staff. When it comes to protecting these critical
assets, this real-time awareness is critical to ensuring
a timely response and preventing theft, vandalism,
accidents and other potentially dangerous activities or
events that could disrupt the stability of the power grid.
Given their proven track record of providing a high level
of security for substations, smart thermal systems are
the most reliable solution for providing the advanced
detection and real-time awareness necessary to protect
substations while satisfying CIP-014 security mandates. Ω
John Romanowich is the President and CEO of SightLogix
24 Government Security News October/November 2014 Digitlal Edition Digitlal Edition October/November 2014 Government Security News 25
CASE
STUDY
his credentials was needed to customize a plan complying
based on turn times,” Brown explained. “But you’ve got
THE PORT OF CHARLESTON, SC
with new legislation.
IDENTIFYING THE CHALLENGES
shipping lines that rely on the Port Authority to securely
transfer their cargo and 105 Regulations in place, so Port
Police needs the security of the terminal ensured.”
In evaluating program options, Brown considered
Brown describes working through these conflicting
the Port’s unique security challenges. Prior to 9/11,
issues as one of the most difficult functions he performs,
ensuring secure transfer of cargo was a key focus at
and cites strong communication as the key to effectively
Wando Welch Terminal, and roving patrols by Port Police
bridging the gap between Operations and Security. He
managed loss prevention. With the prospect of terrorist
coordinates closely with port operations, engineering,
breach, a system that could reliably detect and monitor
IT and maintenance teams. He also regularly consults
PURETECH SYSTEMS
Integrating Fence
Detection And Video
Analytics
disturbances at the perimeter became the new paradigm.
A must for Brown was finding a solution that
successfully addressed a marine environment; one that
remained in near constant motion between ship, vehicle
and foot traffic. This scenario would trigger nuisance
alarms in most security systems, so the new system
needed the intelligence to recognize
port police, customs and border protection, the U.S.
Coast Guard, and Project Seahawk – an innovative pilot
program at Port of Charleston created by Congress under
the guidance of the Department of Justice to enhance
port security operations, capabilities and coordination. By
understanding and addressing the needs of each of these
and ignore traditional environmental
Port of Charleston is one of the busiest container
ports along the United States’ Southeast and
Gulf coasts. Moving more than 600,000 pier
containers per year and ranked 8th largest U.S. port
in cargo value, with $50 billion in annual shipments,
Charleston is recognized as North America’s most
efficient and productive port. As a vital hub for global
freight transfer, implementing a site protection solution
that would safeguard facility infrastructure without
adverse affect to flow of cargo was a critical goal.
Wando Welch Terminal is Port of Charleston's largest
terminal, both in cargo volume and physical size. Jeff
Brown, HNTB consultant and contractor to South Carolina
State Port Authority, has managed the SCSPA security
program since 2005. Overseeing perimeter protection
and access control for the Port’s terminals, he was tasked
with enhancing Waldo Welch’s perimeter security system.
Brown is a civil engineer with an imposing
background in antiterrorism force protection, blastresistant
structural design and high security access
control for the U.S. government and military. Prior to his
involvement with Port of Charleston, he served as team
leader for the U.S. Coast Guard’s National Facility Security
Plan Review Center, whose mandate was to review U.S.
ports for compliance with 33 CFR Part 105 Regulations.
These post-9/11 performance guidelines call for
perimeter monitoring, access control and anti-terrorism
readiness for marine facilities receiving regulated
cargo, and require that restricted areas - both land and
waterside perimeters - be continuously monitored.
As the Coast Guard representative responsible
for reviewing South Carolina State Port Authority’s
facility security plan, Jeff evolved into directing Port of
Charleston’s security operations when a consultant with
WWT © Marvin Preston 2011
disturbances to avoid desensitizing
monitoring personnel with false
positives.
Another challenge was balancing
the divergent priorities of airtight
terminal security and efficient cargo
transfer. By definition, complex counterterror
measures had the potential to
slow the pace of a facility consistently
recognized for high productivity. It was
imperative to narrow the solutions to
those that delivered superior intrusion
detection without being cumbersome to
administrate.
“At the very core, Port Operations
and Port Security are 180 degrees out
of phase because Operations wants to
move cargo as quickly as possible. It's all
26 Government Security News October/November 2014 Digitlal Edition Digitlal Edition October/November 2014 Government Security News 27
CASE
STUDY
service that included 24-hour response time, 72-hour
THE PORT OF CHARLESTON, SC • PURETECH SYSTEMS
constituents, Brown has manages to deliver a security
program that satisfies all parties.
resolution of issues and a 3-year warranty on installed
product.
AN INTELLIGENT SOLUTION
DEVELOPING A PLAN
Mapping out security program expansion guidelines for
each of the facility’s five non-continuous terminals was
Port of Charleston’s greatest challenge.
“105 Regulations say that you have to monitor your
perimeter and access points, but it’s up to the individual
entities to figure out how to comply,” Brown explained.
To address this responsibly, Brown and his team
formulated a comprehensive Security Improvement Plan -
an industry best-practice concept incorporating solutions
that delivered the protection required by Port Authorities,
and addressed the risks identified by the Port during
vulnerability assessments.
“To put together a plan of this magnitude, we had
to take a holistic approach,” outlined Brown. “There
was extensive coordination between Operations and
Security. Each of the Port’s various internal and external
constituents were consulted.”
Traffic flow at each terminal was evaluated toward
restricted area boundary redefinition, and detailed site
diagrams and project cost estimates were developed.
The plan eventually included equipment design and
performance specifications for the initial upgrade at
Wando Welch Terminal.
“This master plan has been critical to the success
of Port of Charleston’s security program,” Brown
emphasized. “All affected parties agreed on it. Everybody
understands what is expected, how it will be delivered
and what the price tag will be.” In fact, Brown reports that
the plan's elaborate detail has been an important factor
Southwest Microwave’s MicroPoint Cable system pinpoints
fence cut or climb attempt to within 3m, while ignoring
environmental disturbances such as wind, rain or vehicle traffic.
in the Port’s ongoing success in securing grant monies for
bringing the security upgrades to fruition.
THE INTEGRATION PARTNER
Upon plan approval, Brown tackled hiring a systems
integrator to handle the installation. To attract only highly
qualified candidates, he employed rigorous selection
criteria that included evaluation of each firm’s technical
certifications, breadth of manpower, implementation
history for similar systems and quality assurance
parameters.
“We had our design, so everyone would be delivering
the same product,” Brown recalled. “I wanted to
know how a prospective partner would strategically
approach the installation, and what they would do to
set themselves apart. We expected a thorough plan of
action.”
Port of Charleston ultimately selected I-Sys
Corporation of North Charleston, South Carolina.
Along with capabilities that satisfied Brown’s stringent
requirements, I-Sys committed to providing a level of
According to Port of Charleston’s Security Improvement
Plan, a key requirement of the new perimeter system
was its ability to precisely locate fence line breaches
and monitor intruders from point of attack through
incident resolution. Brown acknowledged that it would be
unmanageable and costly to install cameras along every
linear foot of its irregular boundary for this purpose.
Instead, the Port chose two market-leading intelligent
detection solutions: Southwest Microwave’s INTREPID
MicroPoint Cable fence detection system - which offered
pinpoint intrusion location and tie-in of detection zones
to CCTV camera presets - and PureTech’s PureActiv ®
wide area video surveillance system - which successfully
identified and tracked qualified targets.
"There weren't many companies who could deliver
what we wanted," said Brown. "We went through an
exhaustive process to ensure that we were going to get
the most appropriate, best of breed perimeter security
system."
The synergistic solution they selected enabled the
Port to strategically place visible light, infrared illuminated
and thermal pan-tilt-zoom cameras controlled by the
PureActiv ® system at key points along the perimeter, and
integrate them with the MicroPoint Cable system to
quickly locate and react to intrusions across the port’s
vast property.
“We chose MicroPoint because it was the
only sensor that could detect to within 3 meters
and direct camera PTZ activity to incident location,”
Brown explained. “PureActiv ® provided intelligent
video analytics, 3D geospatial command and control,
PureActiv ® provides intelligent video analytics, 3D geospatial
command and control, autonomous PTZ tracking and open
architecture for ease of integration with the MicroPoint
Cable system.
autonomous PTZ tracking and open architecture which
easily integrated with MicroPoint and our Lenel access
control system.”
Brown recognized that the Southwest Microwave
fence detection system had been successfully paired
with PureTech's video analytics package at many other
sites. “The fact that this was not the first time these two
products have been integrated, that all the kinks had
been ironed out, was invaluable to me.”
EXTENSIVE TESTING
Once the MicroPoint Cable / PureActiv® system was
installed, the Port’s security team, I-Sys Corporation and
PureTech conducted thorough performance verification
testing to ensure round-the-clock functionality at every
point along the fence line.
“We painstakingly went to each camera and had an
‘intruder’ run, walk, roll, crawl and climb the fence to
ensure that cameras and fence sensors worked properly,”
said Brown. With an extensive array of PTZ cameras, this
28 Government Security News October/November 2014 Digitlal Edition Digitlal Edition October/November 2014 Government Security News 29
CASE
STUDY
UPFRONT
Coming Attractions
THE PORT OF CHARLESTON, SC • PURETECH SYSTEMS
endeavor took weeks to complete. While Brown concedes
that the testing was more rigorous than most, results
were overarchingly positive.
"I expected our vendor to prove to me that the
system was ready to do what it needs to do," Brown
recalled. "They knocked it out of the park. It was an
amazing success." In fact, Brown remarked that in
general, the new solution far exceeded his expectations
both during the testing phase and initial implementation.
A SOLID SOLUTION
Port of Charleston's new perimeter detection system
solves the facility's main concerns, terrorist breach and
cargo loss.
Southwest Microwave’s INTREPID MicroPoint
Cable system allows the Port to confidently pinpoint
a cut or climb attempt to within one fence panel.
PureTech’s PureActiv® system reliably analyzes
disturbances, then smoothly tracks and manages
qualified events until they are resolved.
Each product has contributed to solving
environmental nuisance alarm issues common
to other detection technologies. MicroPoint
effectively identifies fence attacks while ignoring
distributed environmental disturbances such
as truck traffic at the Port. PureActiv ® copes
exceptionally well with the diversity of port
environments, including busy waterside cargo
loading areas, long fence lines, active roadways and
controlled entrance and egress points.
The MicroPoint Cable / PureActiv ® solution has
delivered the Port a cost-effective solution for detecting
intrusions along a lengthy perimeter, and an efficiency
that reinforces both systems' smart sensor capabilities.
MicroPoint's unique ability to assign detection zones in
system software at any point along the cable has reduced
hardware requirements and simplified assessment.
PureTech's analytics can identify targets at long ranges,
minimizing the required number of cameras and
simplifying monitoring processes. By employing standard
cameras, the PureActiv ® system further reduces cost and
gives the port installation flexibility without compromising
detection standards.
“I could not be more pleased with the new system,"
Brown stated emphatically. "I do not think there are other
products out there that do what MicroPoint Cable and
PureActiv ® can. These solutions are so well integrated
that I almost forget that they are two separate systems.
The entire perimeter security system performs the way
it’s supposed to. If every system I implemented worked as
well, then my job would be easy.” Ω
Continued from page 23
how well the F-35C operated in the shipboard environment, and advise
the Navy to make any adjustments necessary to ensure that the fifthgeneration
fighter is fully capable and ready to deploy to the fleet in 2018.
"Our F-35 integrated test team has done an amazing job preparing
for today. This will be one landing out of thousands more that will happen
over the next few decades," said Lt. Gen. Chris Bogdan, F-35 Program
Executive Officer. "For months, we've been working with the Nimitz crew,
Naval Air Forces, and our industry partners, Lockheed Martin and Pratt
& Whitney, as well as their suppliers, to prepare and train for this event.
We plan on learning a lot during this developmental test and will use that
knowledge to make the naval variant of the F-35 an even more effective
weapons platform."
The F-35C combines advanced stealth with fighter speed and agility,
fused targeting, cutting-edge avionics, advanced jamming, networkenabled
operations and advanced sustainment. With a broad wingspan,
reinforced landing gear, ruggedized structures and durable coatings,
the F-35C is designed to stand up to harsh shipboard conditions while
delivering a lethal combination of fighter capabilities to the fleet.
The F-35C will enhance the flexibility, power projection, and strike
capabilities of carrier air wings and joint task forces and will complement
the capabilities of the F/A-18E/F Super Hornet, which currently serves as
the Navy's premier strike fighter.
By 2025, the Navy's aircraft carrier-based air wings will consist of a
mix of F-35C, F/A-18E/F Super Hornets, EA-18G Growlers electronic attack
aircraft, E-2D Hawkeye battle management and control aircraft, MH-60R/S
helicopters and Carrier Onboard Delivery logistics aircraft.
The successful recovery of the F-35C represents a step forward in the
development of the Navy's next generation fighter and reinforces Navyindustry
partnership goals to deliver the operational aircraft to the fleet in
2018.
For more news from Commander, Naval Air Forces, visit
www.navy.mil/local/airpac/. Ω
December 2014
January-March, 2015
December Digital Edition
2014 Digital Yearbook of Homeland
Security Awards Recipients
January Print Edition
Technology Focus:
Perimeter Protection and
Short Wave Detection
Market Sector Focus:
Airport/ Aviation Security
February Digital Edition
Technology Focus:
Access Control/ID, Biometrics
Market Sector Focus:
Energy, Nuclear, Infrastructure
And Grid Protection
March Print Edition
Technology Focus:
Cybersecurity/Closing
The Gap
Market Sector:
Maritime/Port Security
Topics We’re Following
Throughout the Year:
Protecting the Grid
Closing the Cyber Gap
The Immigration Crisis
Social Media in Law Enforcement
30 Government Security News October/November 2014 Digitlal Edition Digitlal Edition October/November 2014 Government Security News 31
Continued from page 16
of interest, reach targets quickly and take action as
required. BriefCam stresses ease of use, integrating user
experience and intuition as a vital part of the process; the
human mind and eye are always engaged.
In addition to fast video review, BriefCam Syndex
augments the basic Video Synopsis by providing users
with a powerful set of tools for searching video according
to attributes that
they define: size,
color, speed,
direction and
location within
the frame. All
parameters are
under the user’s
control – even the
order of objects
displayed. Like all
search engines,
BriefCam Syndex
ranks results in
order by probability to ensure the most relevant events of
interest are presented first.
BriefCam Syndex is also offered as a standalone
product intended mainly for law enforcement and
individual security investigators (FS) and for investigative
teams (FS+), or as an integrated/embedded product
within the VMS environment for medium-sized
enterprises (EP) and large/growing ones (EP+).
New features incorporated into BriefCam Syndex GV
include floating licenses so that cameras can be assigned
and reassigned among authorized users, mobile (thin)
client support, in/out zoom, and multiple video source
capability that enable processing of video input from the
agency-owned VMS as well as from imported external
video footage.
Review hours of video in minutes.
Select, view and zoom in on events
of interest
“As security cameras proliferate, more and more
investigations are crowdsourcing video from the public
for intelligence gathering and post-event investigation,”
Irani noted. “More evidence is a boon to investigators
but also means hours, days and even weeks of video are
collected – that’s where rapid video review is absolutely
essential. Crowdsourcing also increases the need for
greater control over privacy.”
In line with the trend, BriefCam Syndex GV’s enhanced
collaborative investigation tools include permissions
limitations so that camera access is restricted in
accordance with the individual investigator’s viewing
rights. Ω
ABOUT BRIEFCAM
BriefCam ® , Ltd. is the developer and provider of
Video Synopsis®, an award-winning technology
that summarizes hours of events into a “brief” that
extracts maximum value from video, recorded and
live. BriefCam products interface with a wide range of
video recorders, advanced IP cameras and complement
existing surveillance solutions. BriefCam is winner
of the 2013 SIA New Product Showcase for Video
Analytics, 2012 Israel HLS Technology Innovation
Award, 2011 ASIS Accolades Award - Surveillance,
2010 IFSEC Security Industry Award - Best CCTV
System Product, 2010 Wall St. Journal Technology
Innovation Award - Physical Security and others.
Founded in December 2007, BriefCam, Ltd. is
headquartered in Modi'in, Israel, with subsidiaries in
Connecticut, USA and Shanghai, China. For more
information: www.briefcam.com.
For updates: https://twitter.com/BriefCamVS.
GOVERNMENT
Security News
The News Leader in Physical, IT and Homeland Security
Publisher:
Michael Madsen
(O) 212-344-0759, X1
(C) 732-233-8119
mmadsen@gsnmagazine.com
Executive Editor:
John Wagley
(O) 212-344-0759, X2
(C) 202-425-0196
Wagley.jr@gmail.com
Senior Writer:
Lorrie Barclay
(O) 212-344-0759, X5
(C) 508-685-0652
lorriebarclay@gmail.com
Columnist:
John Convy
Convy on Netcentric Security
john@convyassociates.com
Columnist:
John Romanowich
Romanowich on Video Surveillance
jromanowich@sightloxic.com
Guest Expert Contributor:
Denise Rucker Krepp
(C) 202-546-2533
kdrkrepp@hotmail.com
Art Director:
Vance Klein
crosscheckdesigns.com
(O) 212-344-0759, X4
(C) 914-245-6662
vancemk@mac.com
Interim Production Manager:
Vance Klein
crosscheckdesigns.com
(O) 212-344-0759, X4
(C) 914-245-6662
vancemk@mac.com
Editorial Director/CEO
Adrian Courtenay
(212) 344-0759, X3
(C) 917-696-5782
acourtenay@gsnmagazine.com
MEDIA KIT
SUBSCRIBE
Mailing Address:
Government Security News
P.O. Box 7608
Greenwich, CT 06836
Government Security News (ISSN 1548-940X and UPS 022-845) is published in six print editions (Jan, Mar, May, Jul, Sep, Nov) and
six digital editions (Feb, Apr, Jun, Aug, Oct, Dec) per year by World Business Media, LLC, P.O. Box 7608, Greenwich, CT , 06836,
Telephone (212) 344-0759. Periodicals postage paid at New York, NY and additional mailing offices. POSTMASTER: Send address
changes to GSN: Government Security News, Subscription Department, P.O. Box 316, Congers, NY 10920-0316. For Government
decision makers and business executives involved with security products, Systems and series. Qualified U.S. subscribers received
GSN: Government Security News At no charge. Non-qualified subscribers in the U.S. are charged $75.00 per year. Canadian
and foreign subscribers are charged $140 International Airmail. Copyright 2014 by GSN: Government Security News. All rights
reserved. Printed in the U.S.A. GSN: Government Security News assumes responsibility for validity of claims in items reported.
32 Government Security News October/November 2014 Digitlal Edition Digitlal Edition October/November 2014 Government Security News 33
PIVotal
Security.
pivCLASS ® readers and software from HID Global
provide security and compliance.
HID Global’s pivCLASS ® reader solutions PIV-enable existing physical access control systems (PACS) without
the need to “rip and replace” valuable infrastructure, reducing costs, minimize disruptions, and preserving
investments. And, HID’s pivCLASS off-the-shelf software solves the problem of validating, authenticating and
registering PIV card data in a PACS – all without custom programming. pivCLASS software also automatically
revalidates PIV card certificates periodically to make sure your PACS is always up to date.
To make the pivotal move to compliance, visit hidglobal.com/piv-gsn
© 2014 HID Global Corporation/ASSA ABLOY AB. All rights reserved. HID, HID Global, the HID Blue Brick logo, the Chain Design and pivCLASS are trademarks or registered trademarks
of HID Global or its licensor(s)/supplier(s) in the US and other countries and may not be used without permission. All other trademarks, service marks, and product or service names are
trademarks or registered trademarks of their respective owners.
34 Government Security News October/November 2014 Digitlal Edition