GSN 2014 October/November Digital Edition

Government Security News

Government Security News


You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.


Security News

October/November 2014 Digital Edition j

Los Angeles Sheriff’s Department and Geofeedia

write the playbook on using Social Media and

location based technology in law enforcement.

Page 11




Big update in law enforcement tool-kit

“Our successful joint operation with the FDA

proves again the relevance of social media in

intelligence-led policing. Our eComm unit delivers

great value by providing real-time, actionable

intelligence to our field officers. Geofeedia’s

location-based social media monitoring solution

is a powerful tool to help us deliver that value.”

Commander Mike Parker, Los Angeles Sheriffs Office

Page 11

Port of Charleston, SC integrates fence

detection and video analytics

Cybersecurity Workforce Competencies:

Preparing Tomorrow’s Risk-Ready Professionals

8 18 23 28

X-ray systems manufacturer

Astrophysics awarded $6 million

U.S. Navy Contract Page 4

Hey, Governors Christie and

Cuomo! Good job with the

Airports. But what about the

Seaports? asks Denise Krepp

In “Ebola by Sea” Page 6

Don Waddell of (ISC)2/University

Of Phoenix initiative wants to

close the supply demand gap

in filling cybersecurity jobs Page 8

F-35C Completes First

Arrested Landing aboard

Aircraft Carrier Page 23

Romanowich on Video Surveillance

New physical standards in the

Works for electrical substations Page 24

Port of Charleston, SC Case Study

Puretech Systems Integrates

Fence Detection and Video Analytics

at Port with $50 billion annual cargo Page 26

PureActiv ® provides intelligent video analytics,

3D geospatial command and control, autonomous

PTZ tracking and open architecture for ease of

integration with the MicroPoint Cable system

which pinpoints fence cut or climb attempt

to within 3m, while ignoring environmental

disturbances such as wind, rain or vehicle traffic.

Page 26

Law Enforcement Communications

L.A. Sheriff’s Department (LASD) and

Geofeedia write the playbook on using

Social Media and location based technology

Page 11

BriefCam Syndex offers rapid view video

synopsis At Israel Exhibition Page 16

Kastle Systems/Metro DC Police launch

City-wide network of video cameras

and floor plans Page 18

Mutualink Unveils Mobile Go Kit for

Interoperable Public

Safety Community at IACP Page 20

2 Government Security News October/November 2014 Digitlal Edition Digitlal Edition October/November 2014 Government Security News 3


Astrophysics Inc. awarded

$6 Million United States

Navy Contract

Rapidly growing X-ray systems manufacturer

Astrophysic Inc of City of Industry, CA, has won a $6

million dollar contract from the U.S. Navy to protect

entry control points deployed at seaports around the

world. The company’s X-ray solutions will be used to

screen visitors and personnel before they embark and

to accelerate offloading processes.

Astrophysics was selected from a large field of

competitors to fulfill the Navy’s XRBS program’s five-year

contract to supply and deploy ruggedized X-ray inspection

systems. According to company sources, Astrophysics’

competitive advantages in the bidding included not only

that the company buys primarily from U.S. vendors, but

also that it has its own fabrication facility, enabling it to

pass manufacturing savings along to customers.

“Astrophyics is known around the world for marketleading

solutions,” said Francois Zayek, Founder and

CEO of the company and a former VP of Research,

Development and Engineering at Perkins Elmer, who is

known globally for his engineering innovations. “We have

a long history of helping protect men and women that

protect our great nation and we are pleased to announce

this contract.”

The Navy selected

Astrophysics’ XIS-

7858 system which

features a standard

180kV generator for

heightened penetration

and enhanced object recognition. The XIS-7858

is the ideal screening solution for any location in

need of increased screening dimensions within

a consolidated space. The Indefinite Delivery,

Indefinite Quantity (IDIQ) contract was issued by

the Navy XRBS program which is managed by the

Crane Division out of Indiana. Ω


Astrophysics offers X-Ray security screening systems that help

operators detect and identify weapons and explosives in civil and

military markets worldwide. The company exports to over 60

countries and builds all its own products domestically in Southern

California. The corporate hearquarters located in City of Industry,

CA is the manufacturing facility for air cargo, conventional and

mobile solutions. A second facility in Ontario, CA is the primary

location for research and development, and the high energy cargo

and portal systems. Astrophysics markets range from Air Cargo,

Aviation and Transport to Corporate and Hotels, Customs and

Border Protection, Government, Law Enforcement and the

Military. The company employs over 140 employees in the U.S.

and has affiliate company’ globally. For more information about

Astrophysics, visit www.astrophysicsinc.com.











4 Government Security News October/November 2014 Digitlal Edition Digitlal Edition October/November 2014 Government Security News 5


Ebola by Sea


Over the past several days,

governors in New York, New Jersey,

Illinois, and Connecticut issued

quarantine guidance for individuals

who’ve been in contact with African Ebola patients.

The state guidance focuses on individuals who’ve

returned to the U.S. via airplanes. At some point a

mariner is going to arrive, sick with the dangerous

disease. Unfortunately, the federal government has

yet to address this possibility and state governors

won’t be willing to wait for the bureaucratic federal

machine to churn out vague policy guidance. They’re

going to issue state guidance and this guidance could

significantly impact U.S. port operations nationwide.

The U.S. Coast Guard is the federal agency

responsible for port operations and the Coast Guard

Captain of the Port manages port operations on a dayby-day

basis. This individual can prevent a foreign flag

ship from entering a U.S. port. He or she can also require

foreign flag vessels who have ported Sierra Leone,

Guinea, and Liberia, Ebola stricken nations, to undergo

additional scrutiny before they are allowed in U.S. waters.

The agency released a marine safety information

bulletin last week that everyone in the maritime industry

should read. The bulletin recommends that “local

industry stakeholders work with the Coast Guard Captain

of the Port to review and be familiar with their Marine

Transportation System Recovery Plan.” These plans were

mandated after the 9/11 attacks and the agency issued

guidance earlier this summer on how to draft them.

As someone who doesn’t believe in re-inventing

the wheel, I strongly support using existing guidance

to address current crises. The problem in this situation

is that the recovery plans don’t address Ebola-like

catastrophes. These plans focus on terrorist attacks

and natural hazards similar to Hurricanes Katrina and

Sandy. They don’t address a ship manned with mariners

decimated by Ebola.

The Coast Guard appears to recognize the shortcomings

of the current recovery plan by recommending

in the October 22nd bulletin that the local stakeholders

“consider conducting a

table top exercise to plan

and address items such

as an evaluation of how

to handle a vessel arrival

with a suspected Ebola

case... what steps need to

be considered if a medical

evacuation is needed, and

possibly how a ship would

be decontaminated in

order to commence cargo

transfers.” Good idea.

A seaport is a finely-tuned machine. According to

the Bureau of Transportation Statistics, in 2011, 7,662

oceangoing vessels made 67, 929 calls at U.S. ports.

Time is money for vessels owners – they want to enter

a port, discharge their cargo, taken on new cargo, and

depart as fast as they can. They are not going to want

to wait for the Coast Guard Captain of the Port and local

stakeholders to decide how to address a vessel with a

suspected Ebola case.

A simple answer would be to ban all ships that have

stopped in Sierra Leone, Guinea, or Liberia in their

last five previous ports of calls. Sadly, that won’t work

because the U.S. government is sending U.S. ships to

these countries to provide food aid and medical support.

People in Ebola areas need to eat and U.S. grown crops

are helping them to survive. It would immoral to stop

shipping food to those in need.

If the U.S. can’t ban all ships that have ported in

Ebola-stricken countries, then the U.S. Coast Guard must

develop a more comprehensive plan to address the

possibility of Ebola victims arriving in the U.S. by sea. The

agency can’t merely recommend that local stakeholders

conduct table top exercises. These exercises should be

mandatory and the Coast Guard must be ready to provide

substantive guidance.

Keeping in mind that several governors have already

issued isolation guidance for air travelers, the Coast Guard

must work the governors now to address the maritime

sector. How are sick mariners evacuated? At sea via

helicopter or a smaller vessel? At the port by ambulance?

How is the vessel decontaminated? How and when are

the necessary personnel going to be trained to carry

out the evacuation and decontamination procedures?

What happens to the other in-coming vessels during the

decontamination process? If the Coast Guard can’t answer

these questions, the state governors will because they

won’t their ports contaminated with the Ebola virus. Ports

bring in revenue and the revue can’t drop.

The Coast Guard prides itself on being Semper

Paratus. Now, more than ever, it must live up to its motto.

The nation’s ports can’t be shut down because of Ebola

and they won’t be if the Coast Guard develops more

comprehensive guidance before the first ship arrives.

Pre-planning with local stakeholders, including governors,

will ensure that the country’s supply chain continues to

operate. Call your local Captain of the Port and ask him

or her to schedule the table top exercise. Ω




Call our perimeter security specialist at 866-467-2773 and visit us online at ameristarsecurity.com

6 Government Security News October/November 2014 Digitlal Edition Digitlal Edition October/November 2014 Government Security News 7


Dan Waddell discusses urgency of (ISC) 2 Foundation/

University of Phoenix initiative to close the supply

and demand gap in filling cybersecurity jobs

The core mission of the (ISC) 2 Foundation, in the

simplest of terms, is to support cybersecurity

education and awareness. With a global

membership of over 100,000 certified information

security professionals, (ISC) 2 exists “to ensure that

children everywhere have a

positive, productive and safe

experience online; to spur

the development of the next

generation of cybersecurity

professionals; and to illuminate

major issues facing the issue

now and in the future.”

At the 2014 ASIS Conference,

which hosted over 20,000 visitors,

1,600 of the attendees were

there to attend the co-located

(ISC) 2 conference, according to

Dan Waddell, Director of US

Government Affairs of (ISC) 2 , who

spoke with GSN a few days after the ASIS Conference

about the rationale behind the huge delegation. The

obvious opening question was, What’s the urgency?

Waddell had a strong answer to this question, one

that arose from his own knowledge of cybersecurity and

was further informed in great detail by an in-depth report

commissioned by the University of Phoenix and (ISC) 2

that was named, “Cybersecurity Workface Competencies:

Preparing Tomorrow’s Risk-Ready Professionals.” The

urgency, in short, is that there is a serious gap between

supply and demand in the realm of cybersecurity


Cyber security accounts for approximately 10% of all

IT occupations, and cybersecurity-related positions are

growing faster than all IT jobs. Cybersecurity job openings

Cybersecurity Workforce Competencies:

Preparing Tomorrow’s Risk-Ready Professionals

take 24% longer to fill than all

IT openings, and 36% longer to

fill than all vacancies, regardless

of industry. U.S. employers pay

qualified candidates a premium

for cybersecurity jobs – an

average of $93,028 annually,

or over $15,000 more than

other IT jobs overall. In 2013,

U.S, employers posted 50,000

new jobs requiring Certified

Information Systems Security

Professionals (CIISP) credentials,

but there were only 60,000 total

existing CIISP holders.

“It’s an education-to-workforce gap,” said Waddell,

and it’s hindering the efforts to fill cybersecurity jobs.”

According to recent findings by Cisco, he pointed out,

there are a million jobs that are not being filled. “The

supply has gone up slightly, but the demand has gone

through the roof.”

“The CISSP is the gold standard of information

security professionals,” he said, “but it’s not just ‘tech’ that

they need. “We’re trying to teach students the importance

of the cyber battlefield and the tools they need to

defend it – not just the software and hardware, but also

knowledge and experience. An effective cybersecurity

professional should have a good balance of education

and experience on his or her resume. A credential serves

as a validation mechanism. Giving students a head start

on the education piece is where (ICS) 2 can help through

its Global Academic Program, which gets colleges and

universities working with our common body of knowledge

to help introduce cybersecurity topics in their curricula.

We need kids to major in cybersecurity.

The reason we have the gap, according to Waddell,

is that “cybersecurity is still a relatively new industry –

compared to other disciplines such as law or medicine.

Until very recently,

we haven’t had a real

definition of a career

path in cyber, and

sometimes we don’t

even know what job

titles to assign. We

have to understand

requirements first,

then align skills and

competencies through a common framework, so that

we’re all on the same page. DHS and NIST have developed

such a framework under a program called the National

Initiative for Cybersecurity Education of seven causes. (NICE). So that’s a

great start. (ISC)2 is supplying credentials 4.55% that align with

the NICE framework.”

63 % of U.S. Federal CIOs (Chief

Information Officers) and CISOs

(Chief Information Security Officers) say

improving cybersecurity

is a top priority


As co-hosts of the “Cyber Workforce Competencies”


■ to Director protect

report co-hosted by the University new tactics of Phoenix, 28.57% and the

(ISC)2 Foundation, the host organizations 42.44% Top 7 causes relied on

Note. Total who responded to the question = 483 (100%)


findings from an industry roundtable with breaches cybersecurity

devices as

professionals and talent leaders, with the objective

of investigating competencies and Lack career of a layered priorities Loss of mobile of

Proposed annual

U.S. Department of Defense

spending on cyber activities

cybersecurity professionals, and to identify actionable

recommendations for key stakeholders to better prepare

students to enter careers in cybersecurity.

The focus was on identifying what educational

institutions, employers, industry associations and

students can do to bridge three education-to-work gaps:

a competency gap, a professional experience gap; and an

education speed-to-market gap. The roundtable partners

included representatives from institutions of higher

education that educate cybersecurity professionals;

organizations that employ cybersecurity professionals;

industry associations that support and provide

certifications to cybersecurity professionals; and the

Figure 1. Most major cybersecurity breaches have one




Users not

keeping up with



63% $4.7



Naive 8.07% end users

and disgruntled

■ CEO/president/

general manager/



■ Chief security

■ No Vice perimeter President

■ Manager

■ Supervisor of

security personnel

of cybersecurity Mobile



ideal entry


Department of Labor, which develops research and tools

Annual cost

of computer- and network-based

crimes worldwide

for workforce prosperity

and achievement.

The roundtable

also incorporated

the perspective of a

cybersecurity student/

career-starter on higher

education practices and

career entry.

The findings of

these groups and other thought leaders with relevant

experience in competency modeling, higher education,

cybersecurity services and cybersecurity credentialing

Figure 2. Ninety-four percent of cybersecurity breaches

in 2013 fell into these nine categories.

resulted in the recommendations coming out of the

report, 4.55% which were designed to be useful to the larger





■ CEO/president/

general manager/

community Distributed 8.07% owner/principal/

of industry leaders, employers, educators and


6% partner

Other ■ Chief security



current or future cybersecurity officer app


professionals. Ω

■ Vice attacks President

■ Director

based on the information intrusions released in the University of Phoenix/




■ Manager




■ Supervisor of

42.44% Editor’s Note: Common security


Note. Total who responded


to the question


= 483 (100%)


This is the cybersecurity first of several articles that GSN intends to publish





(ISC)2 Foundation’s Cybersecurity Workforce initiative and report.





Sources: Homeland Security News Wire, “Improving Cybersecurity Top Priority: Federal CIOs, CISOs,” June 12, 2014, http://www.homelandsecuritynewswire.com/dr20140612-

improving-cybersecurity-top-priority-federal-cios-cisos. Andy Sullivan, “Obama Budget Makes Cybersecurity a Growing U.S. Priority,” Reuters, April 10, 2013, http://www.

reuters.com/article/2013/04/11/us-usa-fiscal-cybersecurity-idUSBRE93913S20130411. Tom Risen, “Study: Hackers Cost More Than $445 Billion Annually,” U.S. News & World

Report, June 9, 2014, http://www.usnews.com/news/articles/2014/06/09/study-hackers-cost-more-than-445-billion-annually.

8 Government Security News October/November 2014 Digitlal Edition Digitlal Edition October/November 2014 Government Security News 9

Source: Kaseya.

Source: Verizon, based on reports from 50 companies.

© 2014 Thermo Fisher Scientific Inc. All rights reserved. All trademarks

are the property of Thermo Fisher Scientific and its subsidiaries.

Radiation Identification

The detection and analysis of hidden radioactive nuclides requires radiation identification instruments

with high sensitivity and accuracy. The expense, weight and complexity of this equipment prevents

many safety and security teams from having the right tools to manage a dangerous radiation scenario.

The new Thermo Scientific RadEye SPRD Spectroscopic Personal Radiation Detector makes

radiation identification accessible and affordable. The palm-sized, RadEye SPRD is a high-performance,

radiation monitor designed to expose, locate and identify radioactive nuclides such as orphaned or

hidden sources. Like the trusted Thermo Scientific RadEye PRD Personal Radiation Detector, the

RadEye SPRD is intuitive, rugged and operates 170 hours on standard AAA batteries. This combination

makes it the perfect solution in unpredictable and challenging scenarios. With a low cost of ownership

the RadEye SPRD is an affordable way to put radiation identification in the hands of the entire team.

Detect, Locate and Identify

radioactive threats with the

new RadEye SPRD.

is within grasp

• Get the New RadEye SPRD brochure: thermoscientific.com/sprd

Talk to an Expert: 1-800-274-4212

Law Enforcement Communications

L.A. County Sheriff’s Department

and Geofeedia write the playbook

on using social media and location-based

technology in law enforcement


Earlier this year, the Los

Angeles County Sheriff’s

Department (LASD), under

Commanders Scott Edson and

Mike Parker sent out an invitation

to 19,000 law enforcement

agencies in the U.S. and overseas

inviting them to try a new crowdsourcing

platform called LEEDIR,

by which eyewitnesses to a

crime or emergency, anywhere, could upload

and share high-resolution photos and videos

with law enforcement agencies for free and in

real-time. At GSN, we were so impressed with

this initiative that we labeled it “History in the

Making” and ran a front page cover story on it in

our April 2014 Digital Edition.

Now, half a year later, the L.A. Sheriff’s Department

is once again sharing law enforcement history, this time

by using innovative crowd sourcing and social media

technology developed by Geofeedia of Chicago, IL.

Geofeedia’s unique approach organizes social media

by location, as opposed to the long-standing industry

approach of organizing social media solely by keyword

or hashtag without regard to location. The result: a

new set of data focused on the places where events

happen. The key to the new approach is that emergency

services, including law enforcement, place a Geofeedia

virtual perimeter around a designated geographical

area – which can be as big as a city or as small as a single

address – and then monitor social media openly shared

by the public within that perimeter.

10 Government Security News October/November 2014 Digitlal Edition Digitlal Edition October/November 2014 Government Security News 11

Grundy County Sheriff

It Law started Enforcement with school Communications safety • Geofeedia

In a discussion with GSN,


LASD Commander Mike Parker

Schools made have it clear been that vulnerable one of the to acts of violence at an

alarming most surprising rate in recent revelations months. More than 7 percent of 9th

through about 12th the use graders of a reported “geo-fence” being is threatened or injured

with that a weapon many people on school at the property scene at least once in the last

year. An additional 6 percent admitted to bringing a weapon

of a crime or an emergency

to school for protection.

in progress often openly post

information onto the Internet,

Grundy County, Illinois had its own scare Phil when Harris, a gun CEO was

found specifically at an Oswego in social school media, through Geofeedia’s and a founder social of

media before monitoring they even software. think of dialing Geofeedia

911 and reporting it to the

police. Often, the public share postings, including the

“Geo-Tagging”, which indicate the latitude and longitude

located on Cleveland’s west side when a group of 20 men

surrounded him on the sidewalk. The group attacked and

severely beat the man, stole his phone, and ran.

Immediately following the crime, Patrol Sergeant Tanya Sirl

used Geofeedia to draw a perimeter around the scene of the

In the wake of this incident, the outset Grundy of County the incident Sheriff and has

incident and surrounding areas, searched back to the time of

taken full advantage of had Geofeedia observed to monitor a woman social

the crime, and began scouring the social media content. who

media in locations beyond schools in the neighboring

had seized a knife from a store

towns. According to GIS Analyst Dave Ostrander, the

It was while reviewing these display posts and that had she slashed came across a

easy navigation and reliability of the application has been

individuals who had posted number to Facebook of other about customers. going to The a

fundamental to the success of Geofeedia in Grundy County.

“93rd Street block party” deputy (a common responded gang reference by drawing often

Ostrander knows that it can help solve crimes and provide

synonymous with being up to no good).

situational awareness to his potential weapon public and facing safety down hazards. the

woman, who still had the knife in

Geofeedia Case Study: Hate Crime in Cleveland

her hand with blood dripping off

LASD Commander


Michael J. Parker of it. In the last moment before

Another example of the importance of Geofeedia within

he had to shoot, the woman

Grundy County was the monitoring of an ice jam on the

dropped the knife and was put into handcuffs by the off

Kankakee River. Emergency responders were notified and

duty had deputy to respond and other quickly deputies to the situation. who had With just the arrived help on of

the Geofeedia, scene, with officials no loss in Wilmington, of life. Illinois were able to

of the exact location. Prior to the days of social media, monitor The question social media was, how in the did area the and reporter view photos know posted about

he said, the typical scenario was that if members of the the by ongoing citizens situation in real-time, before therefore police assisting knew responders about it? with

additional actionable data.

public saw something suspicious, they would call the The answer was clear: Social media, which was obviously

police and the police would send a patrol car to see if being followed regularly by reporters. In Parker’s words,

the report was accurate and then act on it. In addition to “All of the news media these days are monitoring social

SOLUTION: keyword searches, now that law enforcement can access media. If they’re not, they’re way behind the times and

Officers social media were able activity to react within quickly a geo-fenced based on area, intelligence he pointed their competitors. Tools like Geofeedia are extensively


out, the



the location-based

can get additional






used by leading news agencies.”

on several social media outlets. Real-time tweets coming

relevant and important information, and they get it faster. According to Commander Parker, surveys have

from inside the school were communicated to police officers

Describing an incident that he had experienced a indicated that about 8% of the U.S. population uses

on the scene. Geofeedia allowed law enforcement to draw

a perimeter few years around earlier, the Commander area in order Parker to see said what he was received a geotags when sharing opening by social media on their

taking phone place call inside from a school news walls. reporter After asking officers about secured a shooting the mobile phones, thereby making their global position

perimeter that had around supposedly the school, taken it place, was discovered with people that being the gun public information, since their geotags give latitude and

was hit dropped by bullets, by at a contractor a local supermarket. in the faculty When bathroom. sheriff’s The longitude and often include tags of photos on social





safe and

at the










an off


media. He added that the percentage is probably twice

the services provided by Geofeedia.

duty deputy sheriff had been in the supermarket at that number, or 16%, when teenagers share openly. This

“Geofeedia is easy to use and always works. Its technology has solved crimes and provided our

squad cars with visibility into what is taking place during some very sensitive situations.”

- Dave Ostrander | GIS Analyst

introducing it to students as an important tool in modern

crime fighting:

“Geofeedia is something we are all using as a tool

to combat violent crime because it is the best way

to monitor high crime areas. With what people are

posting these days, it doesn’t take much time to find

evidence against criminals. It is simply amazing what

can be done with this platform.”

- Patrol Sergeant Tanya Sirl

enables law enforcement agencies to be

more effective in dealing with emergency

situations ranging from teen suicide,

natural disasters to shooting and threats

against schools.

A great deal of information shared

by social media, Parker pointed out, is

“open source information”, meaning that

it is shared for the world to see, including

law enforcement. There is no reasonable

expectation of privacy if it’s shared in a way

that “A boy in a basement in Belgium could

view the same information” he said. “But a

line is drawn where there is password protection because

then there usually needs to be an ongoing criminal

investigation or potentially a search warrant signed by a

judge to get that information.”

In a separate interview with GSN, Phil Harris, CEO

and a founder of Geofeedia, agreed with Commander

Parker in pointing out that law enforcement wasn’t the

first sector to use social media, since the marketing and

business worlds had been mining social media and crowd

sourcing for many years. But law enforcement is learning

fast that everyone with a phone or a camera is an

eyewitness that can support first responders by sharing

what they see through social media posts, he said, as the

capture of the Boston bombers demonstrated.

“First responders need reliable, accurate information,”

Harris indicated, “and that can be obtained within 15 feet

of the person posting because of the GPS coordinates

produced by Geofeedia. “We have gathered hundreds of

millions of social media posts on behalf of our customers

across Twitter, Instagram, YouTube, Facebook, Picasa,

Flickr and other sources,” he said. “It starts with a map.

Then you select the location you want to focus on and

adjust the boundaries. Social media posts will then pop

up within those boundaries. In addition, if you find a post

you're interested in, you can blow it up and put in on a

map. One of the most powerful things about Geofeedia,”

he added, is that in addition to location, you can also locate

by word or phrase. You can also take data that’s in the

public domain and take it to a location. You don’t need to

go to the Instagram site. You can see it all on Geofeedia in

a single search, which makes it fast and efficient for first


According to L.A. County Sheriff’s Department Deputy

Tony Moore, who worked with Commander Parker and

used the law enforcement Geofeedia app, illegal preplanned

teen drug parties had become an escalating

12 Government Security News October/November 2014 Digitlal Edition Digitlal Edition October/November 2014 Government Security News 13

Geofeedia Case Study: Grundy County Sheriff

Law Enforcement Communications • Geofeedia

problem in Los Angeles County and its

population of ten million people across

88 municipalities and 130 unincorporated

communities. Pre-planned teen drug

parties had become an escalating problem

in Los Angeles County, contributing to

a measurable increase in felony and

sexual assaults, related property damage,

vehicular burglary, and gang activity – all

events that were primarily organized and

advertised via social media networks.

To police the pre-planned parties,

the 24-hour LASD Electronic Communications Triage Unit

(eComm) which had been founded in 2012, used key word

search systems such as Hootsuite and the Geofeedia

patented, cloud-based program to search, monitor and

analyze real-time openly shared social media posts via

social media networks.

“What we like about Geo-searching is a look at a

particular location, draw a map and immediately start

gathering real-time intelligence” said Deputy Moore,

adding, “We’re not shy about recommending this ability to

other agencies as this simplifies a lot of things and will help

other agencies accomplish their public safety mission.”

The Geofeedia website has archived a number of

law enforcement Case Studies which can be accessed by

law enforcement officials. These include one study which

describes how situational awareness was established

by a group in West Virginia, using Geofeedia’s social

media monitoring software and drawing a perimeter

around locations such as specific colleges or universities,

neighborhoods, city blocks or specific buildings.

In another, a Patrol Sergeant used Geofeedia to

draw a perimeter around the scene of a brutal attack by

20 men that had taken place outside of a gay bar in a

the Nozz distribution network also eliminated a significant

revenue source for gangs. To fund other criminal activities,

gangs often taxed Nozz distribution at drug parties. The

operation also reduced an environmental threat. Federal

authorities have estimated that the damage to the ozone

from the illegal use of nitrous oxide in the greater LA area is

more than what a small oil refinery in the center of the city

would cause annually.

In addition, the search warrants also resulted in the arrest

of multiple suspects on weapons charges. Thirteen guns

were seized as evidence, including assault weapons, armor

piercing rounds, and high capacity magazines. Another

suspect was arrested for possession of narcotics with

the intention to sell them (a felony charge). Finally, with

Geofeedia’s location-based social media monitoring and

keyword analysis the eComm unit interdicted more than

1,000 parties and reduced felony assaults by 50%.

“Our successful joint operation with the FDA proves

again the relevance of social media in intelligenceled

policing. Our eComm unit delivers great value

by providing real-time, actionable intelligence to

our field officers. Geofeedia’s location-based social

media monitoring solution is a powerful tool to help us

deliver that value.”

- Commander Mike Parker

northeast Ohio town. In reviewing the social media within

the perimeter she had drawn, the Sergeant came across



individuals who had posted to Facebook about going to

a “93rd Street block party”, which was a common gang

reference often synonymous with being up to no good.

Geofeedia Through this Case connection, Study: Los she Angeles was taken County to Sheriff’s one of the Department

town’s known gang members who was also talking about

the block party, and shortly thereafter, the gang member

was identified as one of the attackers, which led to an

arrest by the town’s gang unit.

“Geofeedia can be used by the media or for corporate

security, branding or healthcare,” said Phil Harris, “but

it’s a game-changer for law enforcement, public safety,

emergency response and health crises.” Ω

organization plans to continue spreading their knowledge

about Geofeedia.

About Geofeedia

Geofeedia provides social media search and discovery

by location. Our patented technology searches Twitter,

Facebook, Instagram, YouTube, Flickr, Picasa, and Viddy

data by location to provide users with real-time insights

from anywhere in the world.

Request a free demo at: geofeedia.com/demo

About the Los Angeles County

Sheriff’s Department

The Los Angeles Sheriff’s Department is the largest sheriff’s

department in the world with a mission to “lead the fight

to prevent crime and injustice, enforce the law fairly and

defend the rights of all, including the incarcerated.” The

department is divided into eleven divisions and specialized

services including four patrol divisions, Custody Operations

Division, Correctional Services Division, Detective Division,

Court Services Division, Technical Services Division, Office

of Homeland Security, Administrative Services Division, and

Leadership and Training Division. Learn more at: lasdhq.com


14 Government Security News October/November 2014 Digitlal Edition Digitlal Edition October/November 2014 Government Security News 15

Law Enforcement Communications • Briefcam

BriefCam Syndex

offers rapid review

Video Synopsis video

solution at Israel


BriefCam ® , the developer and provider of Video

Synopsis ® solutions for the rapid review, analysis

and indexing of video, has announced a new offering

tailored to the needs of government

investigative agencies and law

enforcement: BriefCam Syndex GV, to be

available in Q1 2015. The announcement

was made at the Israel HLS Exhibition

(iHLS 2014) running from November 10-

12 in Tel-Aviv.

“Two years ago, we won the iHLS

Innovation Award 2012. Since that time,

our product line has matured, our client

base has expanded, and BriefCam

has been used and recognized for its

role in major criminal and homeland

security-related investigations. For all of

these reasons, we’re proud to be able

to announce BriefCam Syndex GV at

Israel HLS 2014,” said Dror Irani, CEO and President of

BriefCam. “This offering meets the needs of government

agencies and was developed in response to direct

feedback from high-profile users already employing

BriefCam successfully in

the field. These include the

departments of defense, the

law enforcement agencies, and

the intelligence communities in

North America, Europe, China,

the APAC region and, of course, Israel.”

BriefCam Syndex is a next-generation product range

based on Video Synopsis technology. (See: YouTube/

BriefCamVS). Video Synopsis is the simultaneous

presentation of objects, events and activities that

occurred at different times. Users can pinpoint events

Continued on page 32

BriefCam Syndex. The Video Synopsis can be refined

by parameters such as color, direction, speed, size and

area of interest/exclusion. New features include multiple

video source capability, access restriction, floating

camera licenses, mobile support and more

To Secure a Perimeter...

success is all about choosing the Right Products.

■ The right Barriers

■ The right Gates

■ The right Sensors

■ The right Fences

We Didn’t Want Standard Shelters,

We Wanted B.I.G.

“Some folks make cheaper booths, but no one

makes a better booth than B.I.G. They build

superior, high-quality modular booths. The

highest quality in the U.S."

— East Coast Facility Manager

■ And most important of all,

the right Guard Station/House

If you don’t protect your staff and

systems, they can’t protect your

students and faculty

A B.I.G. guardhouse is different from

all others because we have invested over

40 years in studying and understanding

what goes on inside—and outside—of

a superior guard station. This expertise

comes to you in the form of a full line

of B.I.G. Enterprises guardhouses—the

cornerstones of your “hardened”

perimeter. With B.I.G. your guardhouse

doesn’t have to appear hard and

unattractive—it can be your steel fist

inside of a velvet glove.

When overseeing the safety of your campus, call in the security heavyweights

—because a perimeter without B.I.G. is like a holster without a gun.

16 Government Security News October/November 2014 Digitlal Edition Digitlal Edition October/November 2014 Government Security News 17

Law Enforcement Communications • Capital Shield Program

Kastle Systems and Metropolitan DC Police launch

“Capital Shield” city-wide network of video cameras and

floor plans to enhance first responder situational awareness

In an innovative initiative backed by the city’s major

real estate owners, managed security services firm

Kastle Systems has launched an interconnected

network of private security cameras, floor plans and

other building information in partnership with the

DC Metropolitan Police Department (MPD) that will

allow first responders direct network access in order

to enhance situational awareness in responding to

emergencies and serious threats.

According to the press announcement, the launch

of “Capital Shield” is a culmination of nearly three years

of collaboration between Kastle and the MPD, with the

shared goal of making the nation’s capital safer and

more secure. It is enthusiastically supported by major

DC real estate firms, including Douglas Development,

Vornado Realty Trust, ON Hoffman, First Potomac Realty

Trust, The Tower Companies and Tishman Speyer. To

catalyze the program, Kastle Sytems is donating 1,000

new security cameras to any real estate owner in the

city that wants to participate in the program and has

already deployed test sites with an additional 300

cameras expected to come online in the first phase.

“Through this public-private partnership, Capital

Shield will significantly increase the public safety of our

nation’s capital,” said Kastle owner and DC area native

Mark Ein. “There are thousands of existing cameras

that should be made accessible to our police in times of

need, and this program will add thousands more over

time. The role of video security has never been more

important or more evident in cities across the country.

Modern video technology saves lives, catches criminals,

deters crime and accomplishes something we all value –

a safer city. Kastle is proud of the role we are playing to

help DC.

In further comments, Chief Cathy L. Lanier of the MPD

added, “Video is a force multiplier for MPD. It gives us an

extra set of eyes by allowing us to provide much needed

situational awareness. The Capital Shield program is an

important new step in working with private enterprise to

enhance public safety throughout the city. I would like to

extend a special thanks to our inaugural members and to

Kastle for its donation to help the city make this a reality.”

Speaking on behalf of his company and the other

participating real estate firms, Patrick Tyrrell, Chief

Operating Officer of Vornado/Charles E. Smith stated,

“As owners in Washington, DC, our company supports

the goal of a safe and secure city. Vornado is delighted

to be an inaugural participant and to work with Kastle

on the Capital Shield program to make a positive and

lasting contribution to DC. The very presence of Capital

Shield will make our buildings safer for our tenants, our

residents and our surrounding communities.”


Capital Shield is a public-private partnership that unites the

Washington, DC Metropolitan Police Department (MPD)

with commercial property owners, businesses and institutions

around a common goal of protecting the city. Through this

program, participants can help enhance public safety by

providing the MPD with direct access to their security cameras.

This enables first responders to quickly gain the situational

awareness required to most effectively assist and respond to

major security events and emergency situations. For more

information, visit www.capitalshield.org. Ω


Kastle Systems has been a leader in the security industry for

more than 40 years with new technologies and advanced

security solutions. Kastle operates and manages security systems

for its clients remotely, around the clock. Currently, Kastle

protects over 10,000 locations nationwide and internationally

today. Kastle’s outsourced security services significantly reduce

costs and improve the critically important 24/7 performance of

security systems for building owners, developers and tenants.

Kastle Video delivers the latest advancements in monitored

video solutions, including high-definition cameras, cloudenabled

network recording and cutting edge video analytics.

Headquartered in Falls Church, VA Kastle is the largest security

company in DC, according to the Washington Business

Journal. Kastle Systems also has offices in Los Angeles, San

Francisco, Houston, Dallas, Chicago, New York, Philadelphia

and Sydney, Australia. For more information on Kastle

Systems, visit www.kastle.com or call 855-527-8531. Ω

18 Government Security News October/November 2014 Digitlal Edition Digitlal Edition October/November 2014 Government Security News 19

Law Enforcement Communications • Mutualink

Mutualink, Inc.

1269 South Broad Street

Wallingford, CT 06492


Breakthrough Mobile Go Kit for

Controllable Interoperable Intuitive Public Safety Affordable Communications at IACP 2014

Phone: (866) 957-5465

Web: www.mutualink.net

E-Mail: info@mutualink.net

In an important interoperable communications

Key features include:

technology at the 121st Annual International

Interoperability • Best-in-class security with military-grade Workstation encryption | IWS

Chiefs of Police (IACP) conference, Mutualink, an

interoperable communications technology

The Mutualink


IWS provides

• Ease


of use


and deployment,




plug and



user interface (GUI)

that can be effectively used functionality by a dispatcher or incident manager to communicate with other

introduced its Mobile Go Kit for first responders. In

involved dispatch personnel • Wide-area as well as multi-mode with units connectivity in the field. Interconnection of radio channels/

times of crisis, this easy-to-transport case for on-thego

interoperable communications enables stand-alone, public as a mini-console, “Mutualink or in developed combination our interoperability with an existing solution console position. The IWS

safety officials and emergency managers is simple to establish to use and to easy enable to first maintain. responder In addition, agencies to the securely multi-featured share and robust Mutualink

software is easy to manage

secure command and control on the move, anywhere. disparate for radio, System video Administrators and telephone and communications

other key personnel. The IWS is the

primary operational user with each interface other for during the Mutualink emergencies,” system. said Mark It consists Hatten, of a standard x86 PC

The kit connects to 4G LTE/3G or hard-wired internet,

platform (desktop, laptop,


etc.) running

CEO. “Our






Go Kit puts


all of that

application on

bridging radio and telephone and enabling a Security first Enhanced (SE) Linux operating system.

interoperability into one case that can be set up in a

responders to send and receive full motion video, files

mobile vehicle or transported to a temporary emergency

and text messages from remote locations.

management facility for real-time, ad hoc collaboration.”

The Mobile Go Kit, as shown at the Mutualink booth, In Passaic County, New Jersey, the first Go Kit has

contains an Interoperable Workstation (IWS), which Standard Fixed already Workstation

been made part of a counter-terrorism toolkit,

allows public safety agencies to participate on the

DESKTOP IWS ready M500-100 to assist as the Series county prepares for any man-made

nationwide Interoperable Response and Preparedness or natural threat to security. The kit provides a fully

Platform (IRAPP) network to collaborate with federal, portable information sharing solution; a flexible way to

state and local agencies, regardless of location.

deploy resources as, when and where needed to attain


talkgroups is facilitated using Mutualink’s drag and drop interface. An IWS can be used either

inter-agency collaboration.

20 Government Security News October/November 2014 Digitlal Edition Digitlal Edition October/November 2014 Government Security News 21

About Mutualink, Inc.

stand-alone, as a mini-console, or in combination with an existing console position. The IWS

is simple to use and easy to maintain. In addition, the multi-featured and robust Mutualink UPFRONT

software is easy to manage for System Administrators and other key personnel. The IWS is the

primary operational user interface for the Mutualink system. It consists of a standard x86 PC

Law Enforcement Communications • Mutualinkplatform (desktop, laptop, etc.) running the Mutualink real-time communications application on

a Security Enhanced (SE) Linux operating system.



Controllable Intuitive Affordable

Ruggedized Mobile Workstation

IWS M500-150 Series

About Mutualink, Inc.

Also at the IACP event, Mutualink demonstrated Mutualink is an IP-based multimedia communication resource sharing platform that allows aircraft CF-03 at 12:18 p.m. aboard USS Nimitz's (CVN 68)

its resilient peer-to-peer collaboration network for public safety agencies and critical community assets to communicate in a manner that flight is deck.

separate and apart from the general public.

public safety, which provides proven, secure, reliable

The arrested landing is part of initial at-sea

communications for mission-critical homeland security Mutualink technology ABOUT is subject MUTUALINK

to US Patent #7,643,445, #8,364,153, #8,320,874 and Developmental Testing I (DT-I) for the F-35C, which

other patents pending.

and law enforcement needs. The platform won the U.S. Mutualink, Inc. has developed an interoperable

commenced Nov. 3 and is expected to last two weeks.

Department of Defense (DoD) Joint Interoperability Test

communications platform that enables community-wide

£ Voice: LMR radios, VoIP “push-to-talk”, telephone, cellular, Nextel & intercom "Today is a landmark event in the

Command certification for both Information Assurance £ Video: live feeds multimedia from buildings, sharing streets, of radio, cruisers, voice, copters text, video, data files

£ Text Messaging: and more telephone effective communications than voice for informational a secure environment. content

development of the F-35C," said Wilson,

and Interoperability.

£ File Sharing: blue Mutualink’s prints, floor system plans, is currently photos, procedures deployed by hundreds

IACP attendees at IACP enjoyed Ruggedized hands-on Interoperability Workstation | IWS

£ PA and Intercom of System public and Interface: private Broadcast entities worldwide, Emergency including


a Navy test pilot with Air Test and

demonstration of how a panic button can trigger £ an Dispatch Collaboration: off-the-air conferencing between dispatch centers

The Mutualink IWS provides an homeland incident-based security highly and defense intuitive installations, graphical user NATO interface (GUI)

Evaluation Squadron (VX) 23. "It is the

incident connecting schools (or other that facilities) can be with effectively their used by


a dispatcher


or incident



police and





with other culmination of many years of hard work

local police department in the event involved of an emergency dispatch personnel as well as with units in the field. Interconnection of radio channels/

transit authorities, hospitals, shopping malls, casinos, © 2013 Mutualink, Inc.

talkgroups is facilitated using Mutualink’s drag and drop interface. An IWS can be used either

using Mutualink’s K12 solution. In such

stand-alone, incident,

as a


mini-console, and or in more. combination Mutualink with is an a privately-held existing console company position. The IWS

departments can then invite other community is simple to partners use and easy to maintain. headquartered In addition, in Wallingford, the multi-featured Conn., with and R&D robust Mutualink

like hospitals, fire departments or state software and is federal easy to manage for System



in Westford, Mass.

and other








IWS is the

primary operational user interface for the Mutualink system. It consists of a standard x86 PC

agencies participating on the IRAPP


as necessary

(desktop, laptop, etc.) running and Defense the Mutualink Services office real-time nearby communications Washington, application DC. For on

respond to and mitigate the emergency. a Security Enhanced (SE) Linux operating more information system. please visit www.mutualink.net. Ω

Commander, Naval Air Forces, Vice Adm. David H.

The company’s suite of interoperability capabilities is

Buss, was aboard Nimitz to witness the milestone event.

deployed and in use in the Orlando Police Department,

"What a historic day today is for Naval Aviation. With

as well as various area hospitals, schools, malls and other

the first traps and launches of the F-35C Lightning II

Critical Infrastructure and Key Resource (CIKR) entities.

aboard an aircraft carrier, we begin the integration of the


Ruggedized Mobile Workstation

IWS M500-150 Series

Mutualink, Inc.

1269 South Broad Street

Wallingford, CT 06492

Phone: (866) 957-5465

Web: www.mutualink.net

E-Mail: info@mutualink.net

F-35C Completes

First Arrested Landing

aboard Aircraft Carrier

The U.S. Navy made aviation history Nov. 3 as

an F-35C Lightning II carrier variant Joint Strike

Fighter conducted its first arrested landing

aboard an aircraft carrier off the coast of San Diego.

Navy test pilot Cmdr. Tony Wilson landed F-35C test

by a talented team of thousands. I'm very

excited to see America's newest aircraft

on the flight deck of her oldest aircraft

carrier, the USS Nimitz."

next generation of warfighting capability into our carrierbased

air wings," said Buss. "This important milestone is

Pacific Ocean (Nov. 3, 2014)

yet another indicator of Naval Aviation's ongoing evolution

to meet future threats and remain central to our future

Navy and National Defense Strategy."

DT-I is the first of three at-sea test phases planned

for the F-35C. During DT-I, the test team from the F-35

Lightning II Pax River Integrated Test Force (ITF) has

scheduled two F-35C test aircraft from Naval Air Station

Patuxent River in Patuxent River, Maryland to perform

a variety of operational maneuvers, including various

catapult takeoffs and arrested landings. ITF flight test

operations also encompass general maintenance and fit

tests for the aircraft and support equipment, as well as

simulated maintenance operations.

As with the initial testing of any new aircraft, the

goal is to collect environmental data through added

instrumentation to measure the F-35C's integration to flight

deck operations and to further define the F-35C's operating

parameters aboard the aircraft carrier.

The ITF test team will analyze data obtained during

flight test operations, conduct a thorough assessment of

Continued on page 31

22 Government Security News October/November 2014 Digitlal Edition Digitlal Edition October/November 2014 Government Security News 23

å Romanowich on Video Surveillance

New physical

standards in the works

for electrical substations

Attacks on transformer substations and other

components of the electrical grid in North America have

underscored the risks associated with physical security

breaches and the potentially disastrous consequences.

With the tens of thousands of substations across the U.S.

situated in locations that range from isolated remote

areas to densely populated urban areas, the job of

securing these critical assets is challenging at best for

security professionals.

To provide guidelines to ensure greater physical

security around substations, the Federal Energy

Regulatory Commission (FERC) is currently finalizing the

latest Critical Infrastructure Protection (CIP) standard.

Developed by the North American Energy Reliability

Corporation (NERC), CIP-014 is a mandatory physical

security standard for critical components of the

power grid that is expected to be finalized soon. Upon

completion, CIP-014 will serve as a blueprint to help

both utilities and security professionals understand the

requirements to protect these vital assets.

Following CIP-014’s finalization utilities will be tasked

to identify their most critical substations – those that if

damaged or taken offline would cause major problems

for the power grid. To comply, utilities will need to

perform a gap analysis to evaluate potential threats

John Romanowich

President and CEO of SightLogix

and vulnerabilities of physical attacks on the targets

they’ve identified as most critical, and then deploy

and implement physical security plans to cover those

locations. Finally, utilities will undergo another thirdparty

review to evaluate their gap analysis and physical

security plans. These requirements will be implemented

in phases, giving utilities adequate time to prepare for

and implement physical security upgrades.

Equipment selection and purchase will be crucial

to meeting CIP-014 requirements, so it’s important to

understand what utilities will be looking for. When it

comes to equipment, utilities are generally hesitant

to invest in products that have no real track record of

success. They also want to ensure that they are receiving

the best return on their investment in physical security.

Traditionally, utilities have relied on a combination of

some type of blind sensor – such as coax or fiber on a

fence to act as an activity detector – with video security

solutions, but the reliability and accountability of these

systems is diminished by the many nuisance alerts they

generate. These blind sensors also fall short of the intent

of this new regulation to provide early detection outside

of the fence line for advance warning.

Smart thermal cameras that incorporate video

analytics provide substantial advantages over this

traditional approach, increasing the probability of

intruder detection while greatly reducing the nuisance

alarms that have plagued automated perimeter systems

in the past. These systems cover large distances and

detect what a human would miss, while delivering

immediate, actionable information to enable fast

response decisions.

For this reason, many electrical utilities are already

using smart thermal video cameras to provide accurate,

reliable performance in even the

most challenging conditions. For

example, some smart thermal

cameras can discriminate small

differences between the temperature

of a person and the background,

accurately detecting intruders even

in less than ideal conditions. They

will ignore headlights, reflections off water, or other

lighting issues that cause false detections with visible

light cameras. Because they can detect in complete dark,

bright sunlight, or poor weather, smart thermal cameras

can be counted on to secure outdoor areas 24/7. The

alerts smart thermal cameras generate when – or even

before – an intrusion occurs, allow security personnel to

view real-time video to determine if there is activity to be

stopped. This advanced detection provides alerts before

an individual has an opportunity to steal, vandalize or

disrupt substation operations.

While some utilities have already begun the processes

laid out in CIP-014, the remainder are expected to follow

suit in the near future to ensure their planned physical

security upgrades meet local zoning regulations, address

any issues with light and/or sound around the site, and

acquire proper permits for any construction or other

work necessitated by these upgrades at their substations.

This underscores the need for security

solution providers and system designers,

installers and integrators to educate

themselves on CIP-014 and the best

technologies for ensuring compliance with

this fast-approaching regulation.

SightLogix Thermal SightSensor True security means stopping an event

by detecting intruders as early as possible,

ideally before they enter a secured area, and alerting

security staff. When it comes to protecting these critical

assets, this real-time awareness is critical to ensuring

a timely response and preventing theft, vandalism,

accidents and other potentially dangerous activities or

events that could disrupt the stability of the power grid.

Given their proven track record of providing a high level

of security for substations, smart thermal systems are

the most reliable solution for providing the advanced

detection and real-time awareness necessary to protect

substations while satisfying CIP-014 security mandates. Ω

John Romanowich is the President and CEO of SightLogix

24 Government Security News October/November 2014 Digitlal Edition Digitlal Edition October/November 2014 Government Security News 25



his credentials was needed to customize a plan complying

based on turn times,” Brown explained. “But you’ve got


with new legislation.


shipping lines that rely on the Port Authority to securely

transfer their cargo and 105 Regulations in place, so Port

Police needs the security of the terminal ensured.”

In evaluating program options, Brown considered

Brown describes working through these conflicting

the Port’s unique security challenges. Prior to 9/11,

issues as one of the most difficult functions he performs,

ensuring secure transfer of cargo was a key focus at

and cites strong communication as the key to effectively

Wando Welch Terminal, and roving patrols by Port Police

bridging the gap between Operations and Security. He

managed loss prevention. With the prospect of terrorist

coordinates closely with port operations, engineering,

breach, a system that could reliably detect and monitor

IT and maintenance teams. He also regularly consults


Integrating Fence

Detection And Video


disturbances at the perimeter became the new paradigm.

A must for Brown was finding a solution that

successfully addressed a marine environment; one that

remained in near constant motion between ship, vehicle

and foot traffic. This scenario would trigger nuisance

alarms in most security systems, so the new system

needed the intelligence to recognize

port police, customs and border protection, the U.S.

Coast Guard, and Project Seahawk – an innovative pilot

program at Port of Charleston created by Congress under

the guidance of the Department of Justice to enhance

port security operations, capabilities and coordination. By

understanding and addressing the needs of each of these

and ignore traditional environmental

Port of Charleston is one of the busiest container

ports along the United States’ Southeast and

Gulf coasts. Moving more than 600,000 pier

containers per year and ranked 8th largest U.S. port

in cargo value, with $50 billion in annual shipments,

Charleston is recognized as North America’s most

efficient and productive port. As a vital hub for global

freight transfer, implementing a site protection solution

that would safeguard facility infrastructure without

adverse affect to flow of cargo was a critical goal.

Wando Welch Terminal is Port of Charleston's largest

terminal, both in cargo volume and physical size. Jeff

Brown, HNTB consultant and contractor to South Carolina

State Port Authority, has managed the SCSPA security

program since 2005. Overseeing perimeter protection

and access control for the Port’s terminals, he was tasked

with enhancing Waldo Welch’s perimeter security system.

Brown is a civil engineer with an imposing

background in antiterrorism force protection, blastresistant

structural design and high security access

control for the U.S. government and military. Prior to his

involvement with Port of Charleston, he served as team

leader for the U.S. Coast Guard’s National Facility Security

Plan Review Center, whose mandate was to review U.S.

ports for compliance with 33 CFR Part 105 Regulations.

These post-9/11 performance guidelines call for

perimeter monitoring, access control and anti-terrorism

readiness for marine facilities receiving regulated

cargo, and require that restricted areas - both land and

waterside perimeters - be continuously monitored.

As the Coast Guard representative responsible

for reviewing South Carolina State Port Authority’s

facility security plan, Jeff evolved into directing Port of

Charleston’s security operations when a consultant with

WWT © Marvin Preston 2011

disturbances to avoid desensitizing

monitoring personnel with false


Another challenge was balancing

the divergent priorities of airtight

terminal security and efficient cargo

transfer. By definition, complex counterterror

measures had the potential to

slow the pace of a facility consistently

recognized for high productivity. It was

imperative to narrow the solutions to

those that delivered superior intrusion

detection without being cumbersome to


“At the very core, Port Operations

and Port Security are 180 degrees out

of phase because Operations wants to

move cargo as quickly as possible. It's all

26 Government Security News October/November 2014 Digitlal Edition Digitlal Edition October/November 2014 Government Security News 27



service that included 24-hour response time, 72-hour


constituents, Brown has manages to deliver a security

program that satisfies all parties.

resolution of issues and a 3-year warranty on installed




Mapping out security program expansion guidelines for

each of the facility’s five non-continuous terminals was

Port of Charleston’s greatest challenge.

“105 Regulations say that you have to monitor your

perimeter and access points, but it’s up to the individual

entities to figure out how to comply,” Brown explained.

To address this responsibly, Brown and his team

formulated a comprehensive Security Improvement Plan -

an industry best-practice concept incorporating solutions

that delivered the protection required by Port Authorities,

and addressed the risks identified by the Port during

vulnerability assessments.

“To put together a plan of this magnitude, we had

to take a holistic approach,” outlined Brown. “There

was extensive coordination between Operations and

Security. Each of the Port’s various internal and external

constituents were consulted.”

Traffic flow at each terminal was evaluated toward

restricted area boundary redefinition, and detailed site

diagrams and project cost estimates were developed.

The plan eventually included equipment design and

performance specifications for the initial upgrade at

Wando Welch Terminal.

“This master plan has been critical to the success

of Port of Charleston’s security program,” Brown

emphasized. “All affected parties agreed on it. Everybody

understands what is expected, how it will be delivered

and what the price tag will be.” In fact, Brown reports that

the plan's elaborate detail has been an important factor

Southwest Microwave’s MicroPoint Cable system pinpoints

fence cut or climb attempt to within 3m, while ignoring

environmental disturbances such as wind, rain or vehicle traffic.

in the Port’s ongoing success in securing grant monies for

bringing the security upgrades to fruition.


Upon plan approval, Brown tackled hiring a systems

integrator to handle the installation. To attract only highly

qualified candidates, he employed rigorous selection

criteria that included evaluation of each firm’s technical

certifications, breadth of manpower, implementation

history for similar systems and quality assurance


“We had our design, so everyone would be delivering

the same product,” Brown recalled. “I wanted to

know how a prospective partner would strategically

approach the installation, and what they would do to

set themselves apart. We expected a thorough plan of


Port of Charleston ultimately selected I-Sys

Corporation of North Charleston, South Carolina.

Along with capabilities that satisfied Brown’s stringent

requirements, I-Sys committed to providing a level of

According to Port of Charleston’s Security Improvement

Plan, a key requirement of the new perimeter system

was its ability to precisely locate fence line breaches

and monitor intruders from point of attack through

incident resolution. Brown acknowledged that it would be

unmanageable and costly to install cameras along every

linear foot of its irregular boundary for this purpose.

Instead, the Port chose two market-leading intelligent

detection solutions: Southwest Microwave’s INTREPID

MicroPoint Cable fence detection system - which offered

pinpoint intrusion location and tie-in of detection zones

to CCTV camera presets - and PureTech’s PureActiv ®

wide area video surveillance system - which successfully

identified and tracked qualified targets.

"There weren't many companies who could deliver

what we wanted," said Brown. "We went through an

exhaustive process to ensure that we were going to get

the most appropriate, best of breed perimeter security


The synergistic solution they selected enabled the

Port to strategically place visible light, infrared illuminated

and thermal pan-tilt-zoom cameras controlled by the

PureActiv ® system at key points along the perimeter, and

integrate them with the MicroPoint Cable system to

quickly locate and react to intrusions across the port’s

vast property.

“We chose MicroPoint because it was the

only sensor that could detect to within 3 meters

and direct camera PTZ activity to incident location,”

Brown explained. “PureActiv ® provided intelligent

video analytics, 3D geospatial command and control,

PureActiv ® provides intelligent video analytics, 3D geospatial

command and control, autonomous PTZ tracking and open

architecture for ease of integration with the MicroPoint

Cable system.

autonomous PTZ tracking and open architecture which

easily integrated with MicroPoint and our Lenel access

control system.”

Brown recognized that the Southwest Microwave

fence detection system had been successfully paired

with PureTech's video analytics package at many other

sites. “The fact that this was not the first time these two

products have been integrated, that all the kinks had

been ironed out, was invaluable to me.”


Once the MicroPoint Cable / PureActiv® system was

installed, the Port’s security team, I-Sys Corporation and

PureTech conducted thorough performance verification

testing to ensure round-the-clock functionality at every

point along the fence line.

“We painstakingly went to each camera and had an

‘intruder’ run, walk, roll, crawl and climb the fence to

ensure that cameras and fence sensors worked properly,”

said Brown. With an extensive array of PTZ cameras, this

28 Government Security News October/November 2014 Digitlal Edition Digitlal Edition October/November 2014 Government Security News 29




Coming Attractions


endeavor took weeks to complete. While Brown concedes

that the testing was more rigorous than most, results

were overarchingly positive.

"I expected our vendor to prove to me that the

system was ready to do what it needs to do," Brown

recalled. "They knocked it out of the park. It was an

amazing success." In fact, Brown remarked that in

general, the new solution far exceeded his expectations

both during the testing phase and initial implementation.


Port of Charleston's new perimeter detection system

solves the facility's main concerns, terrorist breach and

cargo loss.

Southwest Microwave’s INTREPID MicroPoint

Cable system allows the Port to confidently pinpoint

a cut or climb attempt to within one fence panel.

PureTech’s PureActiv® system reliably analyzes

disturbances, then smoothly tracks and manages

qualified events until they are resolved.

Each product has contributed to solving

environmental nuisance alarm issues common

to other detection technologies. MicroPoint

effectively identifies fence attacks while ignoring

distributed environmental disturbances such

as truck traffic at the Port. PureActiv ® copes

exceptionally well with the diversity of port

environments, including busy waterside cargo

loading areas, long fence lines, active roadways and

controlled entrance and egress points.

The MicroPoint Cable / PureActiv ® solution has

delivered the Port a cost-effective solution for detecting

intrusions along a lengthy perimeter, and an efficiency

that reinforces both systems' smart sensor capabilities.

MicroPoint's unique ability to assign detection zones in

system software at any point along the cable has reduced

hardware requirements and simplified assessment.

PureTech's analytics can identify targets at long ranges,

minimizing the required number of cameras and

simplifying monitoring processes. By employing standard

cameras, the PureActiv ® system further reduces cost and

gives the port installation flexibility without compromising

detection standards.

“I could not be more pleased with the new system,"

Brown stated emphatically. "I do not think there are other

products out there that do what MicroPoint Cable and

PureActiv ® can. These solutions are so well integrated

that I almost forget that they are two separate systems.

The entire perimeter security system performs the way

it’s supposed to. If every system I implemented worked as

well, then my job would be easy.” Ω

Continued from page 23

how well the F-35C operated in the shipboard environment, and advise

the Navy to make any adjustments necessary to ensure that the fifthgeneration

fighter is fully capable and ready to deploy to the fleet in 2018.

"Our F-35 integrated test team has done an amazing job preparing

for today. This will be one landing out of thousands more that will happen

over the next few decades," said Lt. Gen. Chris Bogdan, F-35 Program

Executive Officer. "For months, we've been working with the Nimitz crew,

Naval Air Forces, and our industry partners, Lockheed Martin and Pratt

& Whitney, as well as their suppliers, to prepare and train for this event.

We plan on learning a lot during this developmental test and will use that

knowledge to make the naval variant of the F-35 an even more effective

weapons platform."

The F-35C combines advanced stealth with fighter speed and agility,

fused targeting, cutting-edge avionics, advanced jamming, networkenabled

operations and advanced sustainment. With a broad wingspan,

reinforced landing gear, ruggedized structures and durable coatings,

the F-35C is designed to stand up to harsh shipboard conditions while

delivering a lethal combination of fighter capabilities to the fleet.

The F-35C will enhance the flexibility, power projection, and strike

capabilities of carrier air wings and joint task forces and will complement

the capabilities of the F/A-18E/F Super Hornet, which currently serves as

the Navy's premier strike fighter.

By 2025, the Navy's aircraft carrier-based air wings will consist of a

mix of F-35C, F/A-18E/F Super Hornets, EA-18G Growlers electronic attack

aircraft, E-2D Hawkeye battle management and control aircraft, MH-60R/S

helicopters and Carrier Onboard Delivery logistics aircraft.

The successful recovery of the F-35C represents a step forward in the

development of the Navy's next generation fighter and reinforces Navyindustry

partnership goals to deliver the operational aircraft to the fleet in


For more news from Commander, Naval Air Forces, visit

www.navy.mil/local/airpac/. Ω

December 2014

January-March, 2015

December Digital Edition

2014 Digital Yearbook of Homeland

Security Awards Recipients

January Print Edition

Technology Focus:

Perimeter Protection and

Short Wave Detection

Market Sector Focus:

Airport/ Aviation Security

February Digital Edition

Technology Focus:

Access Control/ID, Biometrics

Market Sector Focus:

Energy, Nuclear, Infrastructure

And Grid Protection

March Print Edition

Technology Focus:


The Gap

Market Sector:

Maritime/Port Security

Topics We’re Following

Throughout the Year:

Protecting the Grid

Closing the Cyber Gap

The Immigration Crisis

Social Media in Law Enforcement

30 Government Security News October/November 2014 Digitlal Edition Digitlal Edition October/November 2014 Government Security News 31

Continued from page 16

of interest, reach targets quickly and take action as

required. BriefCam stresses ease of use, integrating user

experience and intuition as a vital part of the process; the

human mind and eye are always engaged.

In addition to fast video review, BriefCam Syndex

augments the basic Video Synopsis by providing users

with a powerful set of tools for searching video according

to attributes that

they define: size,

color, speed,

direction and

location within

the frame. All

parameters are

under the user’s

control – even the

order of objects

displayed. Like all

search engines,

BriefCam Syndex

ranks results in

order by probability to ensure the most relevant events of

interest are presented first.

BriefCam Syndex is also offered as a standalone

product intended mainly for law enforcement and

individual security investigators (FS) and for investigative

teams (FS+), or as an integrated/embedded product

within the VMS environment for medium-sized

enterprises (EP) and large/growing ones (EP+).

New features incorporated into BriefCam Syndex GV

include floating licenses so that cameras can be assigned

and reassigned among authorized users, mobile (thin)

client support, in/out zoom, and multiple video source

capability that enable processing of video input from the

agency-owned VMS as well as from imported external

video footage.

Review hours of video in minutes.

Select, view and zoom in on events

of interest

“As security cameras proliferate, more and more

investigations are crowdsourcing video from the public

for intelligence gathering and post-event investigation,”

Irani noted. “More evidence is a boon to investigators

but also means hours, days and even weeks of video are

collected – that’s where rapid video review is absolutely

essential. Crowdsourcing also increases the need for

greater control over privacy.”

In line with the trend, BriefCam Syndex GV’s enhanced

collaborative investigation tools include permissions

limitations so that camera access is restricted in

accordance with the individual investigator’s viewing

rights. Ω


BriefCam ® , Ltd. is the developer and provider of

Video Synopsis®, an award-winning technology

that summarizes hours of events into a “brief” that

extracts maximum value from video, recorded and

live. BriefCam products interface with a wide range of

video recorders, advanced IP cameras and complement

existing surveillance solutions. BriefCam is winner

of the 2013 SIA New Product Showcase for Video

Analytics, 2012 Israel HLS Technology Innovation

Award, 2011 ASIS Accolades Award - Surveillance,

2010 IFSEC Security Industry Award - Best CCTV

System Product, 2010 Wall St. Journal Technology

Innovation Award - Physical Security and others.

Founded in December 2007, BriefCam, Ltd. is

headquartered in Modi'in, Israel, with subsidiaries in

Connecticut, USA and Shanghai, China. For more

information: www.briefcam.com.

For updates: https://twitter.com/BriefCamVS.


Security News

The News Leader in Physical, IT and Homeland Security


Michael Madsen

(O) 212-344-0759, X1

(C) 732-233-8119


Executive Editor:

John Wagley

(O) 212-344-0759, X2

(C) 202-425-0196


Senior Writer:

Lorrie Barclay

(O) 212-344-0759, X5

(C) 508-685-0652



John Convy

Convy on Netcentric Security



John Romanowich

Romanowich on Video Surveillance


Guest Expert Contributor:

Denise Rucker Krepp

(C) 202-546-2533


Art Director:

Vance Klein


(O) 212-344-0759, X4

(C) 914-245-6662


Interim Production Manager:

Vance Klein


(O) 212-344-0759, X4

(C) 914-245-6662


Editorial Director/CEO

Adrian Courtenay

(212) 344-0759, X3

(C) 917-696-5782




Mailing Address:

Government Security News

P.O. Box 7608

Greenwich, CT 06836

Government Security News (ISSN 1548-940X and UPS 022-845) is published in six print editions (Jan, Mar, May, Jul, Sep, Nov) and

six digital editions (Feb, Apr, Jun, Aug, Oct, Dec) per year by World Business Media, LLC, P.O. Box 7608, Greenwich, CT , 06836,

Telephone (212) 344-0759. Periodicals postage paid at New York, NY and additional mailing offices. POSTMASTER: Send address

changes to GSN: Government Security News, Subscription Department, P.O. Box 316, Congers, NY 10920-0316. For Government

decision makers and business executives involved with security products, Systems and series. Qualified U.S. subscribers received

GSN: Government Security News At no charge. Non-qualified subscribers in the U.S. are charged $75.00 per year. Canadian

and foreign subscribers are charged $140 International Airmail. Copyright 2014 by GSN: Government Security News. All rights

reserved. Printed in the U.S.A. GSN: Government Security News assumes responsibility for validity of claims in items reported.

32 Government Security News October/November 2014 Digitlal Edition Digitlal Edition October/November 2014 Government Security News 33



pivCLASS ® readers and software from HID Global

provide security and compliance.

HID Global’s pivCLASS ® reader solutions PIV-enable existing physical access control systems (PACS) without

the need to “rip and replace” valuable infrastructure, reducing costs, minimize disruptions, and preserving

investments. And, HID’s pivCLASS off-the-shelf software solves the problem of validating, authenticating and

registering PIV card data in a PACS – all without custom programming. pivCLASS software also automatically

revalidates PIV card certificates periodically to make sure your PACS is always up to date.

To make the pivotal move to compliance, visit hidglobal.com/piv-gsn

© 2014 HID Global Corporation/ASSA ABLOY AB. All rights reserved. HID, HID Global, the HID Blue Brick logo, the Chain Design and pivCLASS are trademarks or registered trademarks

of HID Global or its licensor(s)/supplier(s) in the US and other countries and may not be used without permission. All other trademarks, service marks, and product or service names are

trademarks or registered trademarks of their respective owners.

34 Government Security News October/November 2014 Digitlal Edition

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!