31.12.2014 Views

Cyber attacks focusing more on applications, experts say

Cyber attacks focusing more on applications, experts say

Cyber attacks focusing more on applications, experts say

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

GSN’s<br />

2nd Annual<br />

“HOW TO…”<br />

special secti<strong>on</strong> <strong>on</strong><br />

solving government<br />

security problems<br />

Begins <strong>on</strong> Page 15<br />

Funk<br />

Software’s<br />

Kevin<br />

Walsh<br />

<strong>on</strong><br />

End-Point<br />

Security<br />

Page 13<br />

December 5, 2005 Vol. 3 Issue 22 The Newspaper of Record for Government Security A Publicati<strong>on</strong> of World Business Media, LLC<br />

INSIDE<br />

Seas<strong>on</strong>’s Greetings From Our Publisher<br />

PAGE 6<br />

Kerry Outlines New Anti-Terror Strategy<br />

PAGE 8<br />

NIST Plans To Hold FIPS 201 Demos<br />

PAGE 10<br />

DHS Procurement Chief Rothwell Retires<br />

PAGE 12<br />

Showcase: New Products from Overseas<br />

PAGE 53<br />

Pers<strong>on</strong>ality Profile: John Banghart of CIS<br />

PAGE 54<br />

Company<br />

Portrait:<br />

By DANA E. BLOZIS<br />

“GE believes in the security business.”<br />

Dennis Cooke, president of GE<br />

Security’s Homeland Protecti<strong>on</strong> business<br />

THE BIG PICTURE<br />

For <str<strong>on</strong>g>more</str<strong>on</strong>g> than 100 years, General<br />

Electric has been a household name,<br />

offering c<strong>on</strong>sumers and businesses<br />

everything from light bulbs and<br />

appliances to aircraft and locomotive<br />

engines. What many people d<strong>on</strong>’t<br />

think about, however, is that GE is<br />

also a leader in security for both the<br />

home and the homeland. Through<br />

its newly formed homeland protecti<strong>on</strong><br />

business, GE Security strives<br />

More <strong>on</strong> Page 48<br />

NIST <strong>say</strong>s intelligent buildings<br />

would help first resp<strong>on</strong>ders<br />

By LES SHAVER<br />

A huge fire breaks out in a<br />

high-rise office building downtown<br />

and first resp<strong>on</strong>ders rush<br />

to the scene. They move in<br />

with very little situati<strong>on</strong>al<br />

awareness of what’s going <strong>on</strong><br />

inside. In many cases, they<br />

probably d<strong>on</strong>’t even know<br />

exactly where the fire is located,<br />

how big it is, how fast it’s<br />

spreading, or how many people<br />

are trapped within. To get this<br />

informati<strong>on</strong>, they must go into<br />

the building, which is dangerous<br />

and time-c<strong>on</strong>suming.<br />

“They have informati<strong>on</strong> from an alarm that comes to dispatch,<br />

but that <strong>on</strong>ly indicates the most basic informati<strong>on</strong>,” said<br />

David Holmberg, a mechanical engineer with the Building and<br />

More <strong>on</strong> Page 51<br />

Balancing security & commerce<br />

<strong>on</strong> troubled Tex/Mex border<br />

By MATT SCHERER<br />

Eugenio "Gene" Garza looks like a fighter pilot during<br />

a training flight debriefing as he describes the balance<br />

between quickly moving<br />

freight and providing<br />

security for nearly three<br />

milli<strong>on</strong> trucks that annually<br />

transit through his<br />

U.S. Customs and<br />

Border Protecti<strong>on</strong> facilities.<br />

At first, the U.S.<br />

Customs and Border<br />

Trucks crossing tight border More <strong>on</strong> Page 50<br />

FREDD BERGMAN<br />

Covering Physical & IT Homeland Security Soluti<strong>on</strong>s<br />

Identity assurance<br />

product suite from<br />

Da<strong>on</strong>, which uses<br />

biometrics, is flexible<br />

and vendor neutral.<br />

Page 53<br />

RANDALL KAPLAN<br />

<str<strong>on</strong>g>Cyber</str<strong>on</strong>g> <str<strong>on</strong>g>attacks</str<strong>on</strong>g> <str<strong>on</strong>g>focusing</str<strong>on</strong>g> <str<strong>on</strong>g>more</str<strong>on</strong>g><br />

<strong>on</strong> applicati<strong>on</strong>s, <strong>experts</strong> <strong>say</strong><br />

By DAVID BATES<br />

The nature<br />

of cyber<br />

<str<strong>on</strong>g>attacks</str<strong>on</strong>g> has<br />

shifted dramatically<br />

over<br />

the past year<br />

from <str<strong>on</strong>g>attacks</str<strong>on</strong>g><br />

against operating<br />

systems<br />

to cyber New cyber targets c<strong>on</strong>tinue to emerge<br />

assaults <strong>on</strong><br />

individual applicati<strong>on</strong>s, a trend that could mean increased risk<br />

for large IT systems, according to informati<strong>on</strong> security <strong>experts</strong>.<br />

In an analysis of the year’s top 20 critical cyber security vulnerabilities<br />

released in late November, Bethesda, MD-based<br />

informati<strong>on</strong> security training and certificati<strong>on</strong> company SANS<br />

Institute reported a shift in cyber targets from operating systems<br />

and Internet services to individual vendor applicati<strong>on</strong>s.<br />

More <strong>on</strong> Page 14<br />

Homeland security officials are<br />

turning to GIS technology<br />

By SABEEN ALTAF<br />

The recent hurricanes in<br />

Louisiana have raised questi<strong>on</strong>s<br />

about how accountable our federal<br />

government should be. It has<br />

also highlighted the need for<br />

swift coordinati<strong>on</strong> am<strong>on</strong>gst federal,<br />

state and local agencies in<br />

working <strong>on</strong> emergency planning.<br />

However, even before the hurricanes<br />

struck, legislati<strong>on</strong> introducing<br />

Geographic Informati<strong>on</strong> Systems (GIS) to the Department<br />

GIS maps play a role in security<br />

of Homeland Security was being c<strong>on</strong>sidered.<br />

More <strong>on</strong> Page 52<br />

Steel box from Envisage<br />

isolates a cell ph<strong>on</strong>e from<br />

all network c<strong>on</strong>necti<strong>on</strong>s,<br />

so law enforcement can<br />

analyze ph<strong>on</strong>e’s c<strong>on</strong>tents.<br />

Page 53<br />

www.gsnmagazine.com<br />

Plasan Sasa offers<br />

advanced tactical<br />

assault vest for protecti<strong>on</strong><br />

against high<br />

velocity projectiles.<br />

Page 53<br />

THE LAWS OF VULNERABILITIES - G. ESCHELBECK, QUALYS


We thank all of our marketing partners for your str<strong>on</strong>g<br />

participati<strong>on</strong> in the past and look forward to your<br />

c<strong>on</strong>tinuing support in 2006 and the years bey<strong>on</strong>d.<br />

¤<br />

internati<strong>on</strong>al<br />

Federa<br />

RSA<br />

DECEMBER 5, 2005 2 GSN: GOVERNMENT SECURITY NEWS


CONTENTS<br />

For <str<strong>on</strong>g>more</str<strong>on</strong>g> informati<strong>on</strong> go to<br />

www.info.ims.ca/5111-001<br />

Fr<strong>on</strong>t Page<br />

<str<strong>on</strong>g>Cyber</str<strong>on</strong>g> <strong>experts</strong> <strong>say</strong> <str<strong>on</strong>g>attacks</str<strong>on</strong>g><br />

now target applicati<strong>on</strong><br />

software<br />

Where most<br />

cyber<br />

<str<strong>on</strong>g>attacks</str<strong>on</strong>g> in<br />

the past<br />

focused <strong>on</strong> a<br />

computer’s operating system, newer<br />

<str<strong>on</strong>g>attacks</str<strong>on</strong>g> seem to be aiming at applicati<strong>on</strong><br />

programs.<br />

– C<strong>on</strong>tinues <strong>on</strong> page 14<br />

NIST is promoting<br />

“smart<br />

buildings”<br />

to safeguard<br />

first<br />

resp<strong>on</strong>ders<br />

Sensors located<br />

inside major<br />

buildings, which<br />

could detect<br />

fires and determine<br />

where occupants are located,<br />

could feed this vital data to command<br />

and c<strong>on</strong>trol centers run by first resp<strong>on</strong>ders.<br />

GSN looks at the developing field<br />

of smart buildings.<br />

– C<strong>on</strong>tinues <strong>on</strong> page 51<br />

Company Portrait: GE<br />

Security’s<br />

Homeland<br />

Protecti<strong>on</strong><br />

business<br />

GSN kicks off a<br />

new series of<br />

corporate profiles<br />

with an indepth<br />

look at a<br />

business unit of GE celebrating its<br />

first birthday this m<strong>on</strong>th.<br />

– C<strong>on</strong>tinues <strong>on</strong> page 48<br />

Security<br />

al<strong>on</strong>g<br />

the<br />

Tex/Mex<br />

border requires a delicate<br />

balancing act<br />

Keeping the traffic moving while<br />

simultaneously watching out for terrorists,<br />

drug traffickers and illegal immigrants<br />

has Customs and Border<br />

Protecti<strong>on</strong> officials hopping.<br />

– C<strong>on</strong>tinues <strong>on</strong> page 50<br />

Geographic informati<strong>on</strong><br />

systems (GIS)<br />

are taking<br />

center stage<br />

More and <str<strong>on</strong>g>more</str<strong>on</strong>g> government<br />

agencies are turning to GIS technologies<br />

to help them plan for emergencies<br />

and resp<strong>on</strong>d to unexpected incidents.<br />

– C<strong>on</strong>tinues <strong>on</strong> page 52<br />

Features<br />

Ask the<br />

Expert-<br />

Kevin Walsh<br />

– Page 13<br />

Our expert, the director<br />

of product technology<br />

at Funk Software, decribes the<br />

emerging niche of end-point security.<br />

GSN’s 2nd Annual<br />

“HOW TO…” special<br />

secti<strong>on</strong> – Page 15<br />

In an effort to provide<br />

practical, nitty-gritty<br />

informati<strong>on</strong>, GSN has<br />

c<strong>on</strong>sulted with a slew of<br />

industry <strong>experts</strong> and provided<br />

down-to-earth<br />

answers to 16 real-world<br />

"HOW TO…” questi<strong>on</strong>s.<br />

Departments<br />

Hot News – Page 8<br />

One of our writers<br />

listened to Senator<br />

John Kerry (D-MA)<br />

deliver an important<br />

address <strong>on</strong> his<br />

anti-terror strategy<br />

to the Council <strong>on</strong><br />

Foreign Relati<strong>on</strong>s<br />

in New York City.<br />

We also bring you<br />

up to speed <strong>on</strong> NIST’s plans to offer vendors<br />

the opportunity to dem<strong>on</strong>strate their<br />

pers<strong>on</strong>al identificati<strong>on</strong> and verificati<strong>on</strong><br />

(PIV) systems.<br />

Business Opportunities<br />

– Page 11<br />

C<strong>on</strong>tracts – Page 11<br />

People – Page 12<br />

Ad Directory – Page 51<br />

New Product<br />

Opportunities for U.S.<br />

Integrators – Page 53<br />

Pers<strong>on</strong>ality Profile–<br />

John Banghart – Page 54<br />

If software vendors are ever going to<br />

improve the quality of<br />

the security of their software,<br />

they’ll need benchmarks<br />

to know what’s<br />

expected of them. That’s<br />

where John Banghart, of<br />

The Center for Internet<br />

Security, comes in.<br />

DECEMBER 5, 2005 4 GSN: GOVERNMENT SECURITY NEWS


For <str<strong>on</strong>g>more</str<strong>on</strong>g> informati<strong>on</strong> go to www.info.ims.ca/5111-002


A message from Ed Tyler,<br />

GSN’s Publisher<br />

You are holding the 40th issue of GSN: Government<br />

Security News.<br />

That means 40 ad closings, 40 layout meetings and 40 print<br />

runs, and a lot of work by everybody at World Business Media,<br />

LLC, our parent company. I want to take this opportunity to thank you — and all<br />

of the hundreds of suppliers, integrators, organizati<strong>on</strong>s and advertising agencies<br />

— who have helped to make 2005 another record-breaking year for GSN.<br />

Thank you very much for your c<strong>on</strong>tinuing support and best wishes for the<br />

happiest of holidays.<br />

Putting together our 40th issue inspired me to compile an interesting set of<br />

additi<strong>on</strong>al statistics, which dem<strong>on</strong>strate the extraordinary strength and growing<br />

influence of our publicati<strong>on</strong>. Take a look:<br />

23 -- Number of issues of GSN we delivered in<br />

2005.<br />

491 -- Number of editorial pages we delivered<br />

in the same year.<br />

1 -- Number of GSN scoops picked up (and<br />

attributed) by The New York Times<br />

651 -- Number of worldwide media articles<br />

that cited GSN’s coverage in 2005.<br />

197 -- Companies that have delivered their<br />

marketing messages in GSN.<br />

379 -- New security products and services<br />

introduced in the pages of GSN.<br />

116,490 -- Average number of individuals who read<br />

each issue of GSN in 2005.<br />

2,679,270 -- Total reader impressi<strong>on</strong>s for GSN during<br />

2005.<br />

62 -- Average number of minutes each reader<br />

spent with GSN each m<strong>on</strong>th.<br />

I’m proud of those statistics, and equally proud of the loyalty our readers have<br />

shown to GSN since we launched the publicati<strong>on</strong> in 2003. I’m especially grateful<br />

to those readers who have been willing — time and again — to resp<strong>on</strong>d to<br />

our periodic e-mail research survey questi<strong>on</strong>naires, enabling us to present<br />

intriguing, proprietary research results <strong>on</strong> a number of lively homeland security<br />

topics. Please keep it up!<br />

On behalf of the editorial, marketing, art & design, circulati<strong>on</strong>, producti<strong>on</strong><br />

and finance teams at GSN, I want to thank you for your suggesti<strong>on</strong>s and good<br />

wishes throughout 2005. We all look forward to working with you to help you<br />

increase your understanding — and, perhaps, gain your fair share — of the government<br />

security market in 2006.<br />

ART DIRECTOR:<br />

Mark Kaplan<br />

(212) 925-7300 x322<br />

mkaplan@gsnmagazine.com<br />

Sabeen Altaf<br />

Fredd Bergman<br />

Vice President/New Business:<br />

Arnold Blumenthal<br />

(516) 292-0674<br />

ablumenthal@gsnmagazine.com<br />

North Atlantic Regi<strong>on</strong>al Mgr:<br />

Michael J. Madsen<br />

(212) 925-7300 x 220<br />

mmadsen@gsnmagazine.com<br />

Wash. DC/Mid-Atlantic Reg. Mgr:<br />

Charlie Hull<br />

(301) 987-0632<br />

chull@gsnmagzine.com<br />

CIRCULATION DIRECTOR:<br />

R<strong>on</strong>ald Moyer<br />

(609) 601-1298<br />

PROMOTION DIRECTOR:<br />

Robert DiGioia<br />

(212) 925-7300 x274<br />

Dana Blozis<br />

Gail Kalinoski<br />

FULFILLMENT/ WEB SUPPORT MGR:<br />

Anne Tyler<br />

(631) 275-0264<br />

Main Number: (212) 925-7300<br />

Fax: (212) 925-8754<br />

www.gsnmagazine.com<br />

EDITOR-IN-CHIEF:<br />

Jacob Goodwin<br />

(212) 925-7300 x255<br />

jgoodwin@gsnmagazine.com<br />

SENIOR EDITOR:<br />

Teri Robins<strong>on</strong><br />

(212) 666-9292<br />

trobins<strong>on</strong>@gsnmagazine.com<br />

WASHINGTON CORRESPONDENT:<br />

David Bates<br />

(301) 270-5396<br />

dbates@gsnmagazine.com<br />

CONTRIBUTING WRITERS:<br />

Steven Lewis<br />

Josh Martin<br />

EDITORIAL INTERN:<br />

Blythe Kladney<br />

PUBLISHER:<br />

Edward Tyler<br />

(212) 925-7300 x232<br />

etyler@gsnmagazine.com<br />

ADVERTISING SALES<br />

Midwest/Southwest Regi<strong>on</strong>al Mgr:<br />

Chris Casey<br />

(847) 223-5225 x11<br />

chrisc@caseyreps.com<br />

New England/Metro NY/Southeast<br />

Regi<strong>on</strong>al Mgr:<br />

Andrew Shane<br />

(718) 549-5910<br />

andy66ny@aol.com<br />

ADVERTISING TRAFFIC MANAGER:<br />

Pedro Reyes<br />

(212) 925-7300 x264<br />

pedro@gsnmagazine.com<br />

ASSOCIATE ART DIRECTOR:<br />

Pat M<strong>on</strong>tele<strong>on</strong>e<br />

(212) 925-7300 x290<br />

pm<strong>on</strong>tele<strong>on</strong>e@gsnmagazine.com<br />

Matt Scherer<br />

Les Shaver<br />

Ross Staplet<strong>on</strong>-Gray<br />

Jan Wils<strong>on</strong><br />

Western Regi<strong>on</strong>al Mgr:<br />

Jim Craven<br />

(626) 799-0036<br />

jcraven@gsnmagazine.com<br />

Western IT Security Regi<strong>on</strong>al Mgr.<br />

Lynne Stickrod<br />

Tel: 415-503-3936<br />

lstickrod@gsnmagazine.com<br />

Internati<strong>on</strong>al Sales Mgr (Europe):<br />

Dave Harvett<br />

+44 121 705 2120<br />

daveharvett@btc<strong>on</strong>nect.com<br />

CONTROLLER:<br />

Allen Frydrych<br />

(212) 925-7300 x206<br />

PRODUCTION ASSISTANT:<br />

Jermaine Brown<br />

(212) 925-7300 x297<br />

LIST MANAGER:<br />

Michael Auriemma<br />

(212) 655-5130<br />

GSN: Government Security News (ISSN 1548-940X and UPS 022-945) is published biweekly except <strong>on</strong>ce <strong>on</strong>ly in<br />

August and December (22 times per year) by World Business Media, LLC, 100 Avenue of the Americas, 6th Floor,<br />

New York, NY 10013. Teleph<strong>on</strong>e: (212) 925-7300. Periodicals postage paid at New York, NY and additi<strong>on</strong>al mailing<br />

offices. POSTMASTER: Send address changes to GSN: Government Security News, Subscripti<strong>on</strong> Department, P. O.<br />

Box 316 C<strong>on</strong>gers, NY 10920-0316. For government decisi<strong>on</strong> makers and business executives involved with security<br />

products, systems and services. Qualified U.S. subscribers receive GSN: Government Security News at no charge.<br />

N<strong>on</strong>-qualified subscribers in the U.S. are charged $75.00 per year. Canadian and foreign subscribers are charged<br />

$140.00. Internati<strong>on</strong>al Airmail subscribers are charged $210.00. Single copy $10.00. The GSN Web site is:<br />

http://www.gsnmagazine.com. Copyright 2005 by GSN: Government Security News. All rights reserved. Reproducti<strong>on</strong><br />

of this publicati<strong>on</strong> in whole or part is prohibited except with the written permissi<strong>on</strong> of the publisher. Printed in the U.S.A.<br />

GSN: Government Security News assumes no resp<strong>on</strong>sibility for validity of claims in items reported.<br />

WORLD BUSINESS MEDIA, LLC<br />

Edward Tyler, President<br />

POSTMASTER:<br />

Send changes of address to:<br />

GSN: Government Security News<br />

Subscripti<strong>on</strong> Department<br />

P.O. Box 316, C<strong>on</strong>gers, NY 10920-0316<br />

NEW SUBSCRIPTION REQUESTS:<br />

Write to GSN: Government Security News<br />

Subscripti<strong>on</strong> Department<br />

P.O. Box 316, C<strong>on</strong>gers, NY 10920-0316<br />

or call (845) 268-3156.<br />

Subscribe <strong>on</strong>line at www.gsnmagazine.com<br />

Editorial Reprints:<br />

Robert DiGioia<br />

(212) 925-7300 x274<br />

rdigioia@gsnmagazine.com<br />

Classified Advertising:<br />

Kelly Winberg<br />

(215) 723-2861<br />

kwinberg@attglobal.net<br />

SUBSCRIBER ADDRESS CHANGES:<br />

Write to GSN: Government Security News<br />

Subscripti<strong>on</strong> Department<br />

P.O. Box 316, C<strong>on</strong>gers, NY 10920-0316<br />

If possible, include a copy of a current mailing label<br />

with your corresp<strong>on</strong>dence<br />

or call (845) 268-3156.<br />

SUBSCRIBER INQUIRES:<br />

Please call (845) 268-3156 or fax (845) 267-3478 or e-mail gsnews@cambeywest.com<br />

DECEMBER 5, 2005 6 GSN: GOVERNMENT SECURITY NEWS


For <str<strong>on</strong>g>more</str<strong>on</strong>g> informati<strong>on</strong> go to www.info.ims.ca/5111-003


Hot News<br />

Kerry seeks security overhaul<br />

Sen. John Kerry (D-MA) is calling <strong>on</strong><br />

President Bush to summ<strong>on</strong> “a real council<br />

of war” in which leaders of government and<br />

the private sector would “forge a winning<br />

strategy” to combat domestic and internati<strong>on</strong>al<br />

terrorism.<br />

Kerry, the Democratic Party’s presidential<br />

candidate in 2004, outlined his positi<strong>on</strong><br />

in a recent speech at the Council <strong>on</strong><br />

Foreign Relati<strong>on</strong>s in New York City. He<br />

For <str<strong>on</strong>g>more</str<strong>on</strong>g> informati<strong>on</strong> go to www.info.ims.ca/5111-004<br />

called for a new approach to combating terrorism<br />

and protecting freedoms while<br />

boosting the security of both private and<br />

public sector instituti<strong>on</strong>s.<br />

Government, he said, cannot dictate policy<br />

in isolati<strong>on</strong>; it must maintain a dialogue<br />

with the private sector and “create incentives”<br />

for companies to develop soluti<strong>on</strong>s.<br />

The senator’s proposals come in the<br />

wake of the final report from the organizati<strong>on</strong><br />

that grew<br />

out of the 9/11<br />

Commissi<strong>on</strong>, which blasted both C<strong>on</strong>gress<br />

and the president for failing to take adequate<br />

steps to ensure domestic security.<br />

Kerry’s formal speech, entitled Real<br />

Security in the Post-9/11 World, called for<br />

the U.S. to adopt a new global perspective<br />

<strong>on</strong> the war <strong>on</strong> terror, and to partner with<br />

reform movements within the Arab and<br />

Muslim world that have “the broad and<br />

unchallenged moral authority needed to<br />

isolate and defeat terrorism.”<br />

In additi<strong>on</strong>, Kerry proposed specific<br />

domestic anti-terror measures: Beefing up<br />

port security, developing “true<br />

domestic counter-terrorism capability” in<br />

the FBI, and reviving alternative energy<br />

development programs which have languished<br />

since the Bush Administrati<strong>on</strong><br />

came to power in 2001.<br />

Port security particularly c<strong>on</strong>cerned the<br />

senator (whose home state includes the<br />

port of Bost<strong>on</strong>). He sees the “extreme vulnerability”<br />

of U.S. ports as <strong>on</strong>e of “the most<br />

urgent homeland security threats.”<br />

Kerry warned the Council that ports are<br />

“the most likely point of entry for terrorists<br />

with weap<strong>on</strong>s of mass destructi<strong>on</strong>.”<br />

In additi<strong>on</strong> to beefing up port security in<br />

general, Kerry called for the development<br />

of new and effective regulati<strong>on</strong>s to secure<br />

dangerous materials domestically, as well<br />

as overseas.<br />

Key to success will be effectively utilizing<br />

America’s intelligence agencies. “The FBI<br />

should have a true domestic counter-terrorist<br />

capability,” he said.<br />

Kerry made it clear that his new approach<br />

involves a significant shift in U.S. foreign<br />

policy, redeploying forces and redefining<br />

missi<strong>on</strong>s. “We need to greatly increase our<br />

overseas clandestine intelligence service,”<br />

he suggested. “Our military must also be<br />

reshaped... equipped to perform post-c<strong>on</strong>flict<br />

rec<strong>on</strong>structi<strong>on</strong> missi<strong>on</strong>s.”<br />

“We need a far-sighted, multi-faceted<br />

approach,” Kerry said.<br />

A key comp<strong>on</strong>ent is developing the<br />

means to cut funding of terrorist groups<br />

and organizati<strong>on</strong>s. Kerry suggested the best<br />

way to do this is by reducing dependence<br />

<strong>on</strong> Middle East oil. “We must liberate ourselves<br />

and the Middle East itself from the<br />

tyranny of dependence <strong>on</strong> petroleum,” he<br />

told the Council.<br />

To achieve this goal, Kerry has called for<br />

a dramatic change in U.S. energy policies,<br />

<str<strong>on</strong>g>focusing</str<strong>on</strong>g> <strong>on</strong> massive investments in renewable<br />

and alternative energy sources. “Many<br />

stunning opportunities to do that are staring<br />

us in the face,” he said, “but n<strong>on</strong>e have<br />

been seized with the urgency our security<br />

demands.”<br />

Kerry believes the nati<strong>on</strong>’s security policies<br />

have been both misdirected and mismanaged.<br />

“It is difficult [to succeed] when<br />

our own acti<strong>on</strong>s defeat our purposes.”<br />

The senator suggested that a true council<br />

of war is needed now <str<strong>on</strong>g>more</str<strong>on</strong>g> than ever, to<br />

“give clarity to peoples’ missi<strong>on</strong>s,” improve<br />

the functi<strong>on</strong> of government and motivate<br />

the private sector.<br />

“We’re at war,” Kerry told the Council,<br />

“but we’re not behaving like it.”<br />

DECEMBER 5, 2005 8 GSN: GOVERNMENT SECURITY NEWS


NIST<br />

Hot News<br />

NIST plans dem<strong>on</strong>strati<strong>on</strong>s for<br />

Pers<strong>on</strong>al ID Verificati<strong>on</strong> products<br />

The Nati<strong>on</strong>al Institute of Standards<br />

and Technology (NIST) is holding a<br />

dem<strong>on</strong>strati<strong>on</strong> for vendors interested<br />

Headquarters<br />

5711 S. 86th Circle<br />

Omaha, NE 68127<br />

Ph<strong>on</strong>e: (866) 325-8140<br />

Fax: (402) 537-6199<br />

in showing products that support pers<strong>on</strong>al<br />

identity verificati<strong>on</strong>, as set out<br />

by the Federal Informati<strong>on</strong><br />

Processing Standard<br />

201 (FIPS 201). The<br />

dem<strong>on</strong>strati<strong>on</strong> will be open to all<br />

Looks can fool you.<br />

To get <str<strong>on</strong>g>more</str<strong>on</strong>g> informati<strong>on</strong> <strong>on</strong> a pers<strong>on</strong> check<br />

SecureUSA allows you to search people by:<br />

• Social Security Numbers<br />

• Unlisted Ph<strong>on</strong>e Numbers<br />

• Cell Ph<strong>on</strong>e Numbers<br />

• Vehicle Informati<strong>on</strong><br />

• Civil Acti<strong>on</strong>s<br />

• Aliases<br />

• Relatives<br />

• Addresses<br />

• Names<br />

• & other critical informati<strong>on</strong><br />

www.infoUSAgov.com<br />

GSA-GS-23F-0096P<br />

*SecureUSA data is available <strong>on</strong>ly to federal, state, and county/municipal government offices.<br />

For <str<strong>on</strong>g>more</str<strong>on</strong>g> informati<strong>on</strong> go to www.info.ims.ca/5111-005<br />

t<br />

For a 10-day<br />

FREE trial<br />

of SecureUSA <br />

call Kevin Shaughnessy<br />

at: 1-866-325-8140<br />

Law Enforcement Agencies Need<br />

SecureUSA for Access to Critical<br />

Informati<strong>on</strong> for Investigative Purposes.<br />

SecureUSA is the largest, most<br />

powerful investigative database for law<br />

enforcement agencies available <strong>on</strong> the<br />

web, at a very affordable price.<br />

For <str<strong>on</strong>g>more</str<strong>on</strong>g> informati<strong>on</strong>, call<br />

Kevin Shaughnessy: (866) 325-8140<br />

or E-mail: government@infoUSA.com<br />

Washingt<strong>on</strong>, D.C. Office<br />

1717 Pennsylvania Ave. NW<br />

Washingt<strong>on</strong>, D.C. 20006<br />

(202) 887-8001<br />

11GSN<br />

interested federal<br />

agencies<br />

that are<br />

required to be<br />

up to date<br />

with FIPS 201<br />

implementati<strong>on</strong><br />

and requirements.<br />

Vendors of pers<strong>on</strong>al<br />

identificati<strong>on</strong> products<br />

are required to comply<br />

with Homeland Security<br />

Presidential Directive 12<br />

and FIPS 201 regulati<strong>on</strong>s<br />

According to the Homeland<br />

Security Presidential Directive 12<br />

(HSPD-12), Policy for a Comm<strong>on</strong><br />

Identificati<strong>on</strong> Standard for Federal<br />

Employees and C<strong>on</strong>tractors, the president<br />

called for the development and<br />

implementati<strong>on</strong> of a governmentwide<br />

standard for secure and reliable<br />

forms of identificati<strong>on</strong> for federal<br />

employees and c<strong>on</strong>tractors.<br />

According to NIST, although it will<br />

have dem<strong>on</strong>strati<strong>on</strong>s for individual<br />

verificati<strong>on</strong> products, it prefers companies<br />

to dem<strong>on</strong>strate fully functi<strong>on</strong>ing<br />

verificati<strong>on</strong> systems. As a<br />

result, many companies who produce<br />

single products may feel pressure to<br />

create a full system with other, competing<br />

companies. All companies,<br />

working together or separately, must<br />

supply informati<strong>on</strong> about their products<br />

to NIST by the end of<br />

December.<br />

NIST suggested a wide range of<br />

product categories that could be<br />

included in the dem<strong>on</strong>strati<strong>on</strong>, such<br />

as card issuance and management<br />

comp<strong>on</strong>ents, fr<strong>on</strong>t-end comp<strong>on</strong>ents,<br />

access c<strong>on</strong>trol comp<strong>on</strong>ents, and pers<strong>on</strong>al<br />

identity verificati<strong>on</strong> (PIV) system<br />

integrators. Included in these<br />

categories are products such as smart<br />

card c<strong>on</strong>tact readers that can read<br />

PIV cards, complete physical access<br />

c<strong>on</strong>trol soluti<strong>on</strong>s, and biometric<br />

soluti<strong>on</strong> providers that capture biometric<br />

data.<br />

Interested vendors are advised that<br />

products that support FIPS 201 will<br />

be interoperable and that they should<br />

take into c<strong>on</strong>siderati<strong>on</strong> other vendors’<br />

products and ideas.<br />

Vendors who participate will provide<br />

NIST the opportunity to perform<br />

proof of c<strong>on</strong>cept and to check interoperability<br />

with the PIV cards.<br />

In early 2006, NIST will release the<br />

finalized list of participating vendors<br />

and distribute a schedule of when the<br />

dem<strong>on</strong>strati<strong>on</strong>s will occur, based <strong>on</strong><br />

the availability of each vendor and<br />

category. Not all interested vendors<br />

are guaranteed that their products<br />

will be dem<strong>on</strong>strated.<br />

DECEMBER 5, 2005 10 GSN: GOVERNMENT SECURITY NEWS


Business Opportunities<br />

Recent and upcoming<br />

government solicitati<strong>on</strong>s<br />

Intrusi<strong>on</strong> Detecti<strong>on</strong> Systems <strong>on</strong><br />

List for U.S. Marshals Service<br />

Buyer:<br />

Scope:<br />

C<strong>on</strong>tact:<br />

U.S. Marshals Service<br />

Department of Justice<br />

Judicial Security C<strong>on</strong>tracts<br />

Team, JSDC<br />

Suite 600 – CS3<br />

3601 Pennsy Drive<br />

Landover, MD 20785-1612<br />

The U.S. Marshals Service is<br />

seeking home intrusi<strong>on</strong> detecti<strong>on</strong><br />

systems, including c<strong>on</strong>trol<br />

panels, key pads, door/window<br />

switches, moti<strong>on</strong> sensors,<br />

horn/sirens, glass break sensors,<br />

repeaters and other items.<br />

Maxine Robins<strong>on</strong>, c<strong>on</strong>tracting<br />

officer<br />

202-307-9185<br />

202-307-9360 (fax)<br />

mrobins<strong>on</strong>@usdoj.gov<br />

FTP Looking for Security<br />

Services in Washingt<strong>on</strong> Area<br />

Buyer:<br />

Scope:<br />

Status:<br />

C<strong>on</strong>tact:<br />

Federal Protective<br />

Immigrati<strong>on</strong> and Customs<br />

Enforcement<br />

Department of Homeland<br />

Security<br />

425 I Street, N.W.<br />

Washingt<strong>on</strong>, DC 20536<br />

FTP needs security services<br />

at a number of locati<strong>on</strong>s in<br />

Washingt<strong>on</strong>, DC. The c<strong>on</strong>tractor<br />

will provide and maintain<br />

all management, supervisi<strong>on</strong>,<br />

manpower, training, equipment,<br />

supplies, licenses, permits,<br />

certificates, insurance,<br />

screenings and the like to<br />

support security guard services<br />

24 hours per day, seven<br />

days a week. Services will<br />

begin <strong>on</strong> April 1, 2006.<br />

The notice was posted<br />

November 28, 2005 and<br />

resp<strong>on</strong>ses are due back <strong>on</strong><br />

January 5, 2006.<br />

R<strong>on</strong>ald Jean-Baptiste, c<strong>on</strong>tracting<br />

officer<br />

202-514-4441<br />

202-514-3353<br />

r<strong>on</strong>ald.jean-baptiste@dhs.gov<br />

Bureau<br />

of<br />

Pris<strong>on</strong>s<br />

Looking<br />

for<br />

X-Ray<br />

Technician Services<br />

Buyer: Bureau of Pris<strong>on</strong>s<br />

Department of Justice<br />

U.S. Armed Forces Reserve<br />

Complex<br />

346 Marine Forces Drive<br />

Grand Prairie, TX 75051<br />

Scope: The Bureau of Pris<strong>on</strong>s requires X-<br />

ray technician services for inmates<br />

in the Federal Correcti<strong>on</strong>al<br />

Instituti<strong>on</strong> located in McKean, PA.<br />

The service is for up to 30 hours<br />

per week, generally between the<br />

hours of 7:30 a.m. and 4:00 p.m.,<br />

M<strong>on</strong>day through Friday. The c<strong>on</strong>tract<br />

covers a period of 12 m<strong>on</strong>ths<br />

with four 12-m<strong>on</strong>th opti<strong>on</strong> periods.<br />

Status:<br />

C<strong>on</strong>tact:<br />

Resp<strong>on</strong>ses were due November<br />

28, 2005.<br />

Terri Tharp, c<strong>on</strong>tracting officer<br />

972-352-4545 (Fax)<br />

VA Seeking Security Services in<br />

Northern California<br />

Buyer:<br />

Scope:<br />

Status:<br />

C<strong>on</strong>tact:<br />

Department of Veterans Affairs<br />

Medical Center<br />

C<strong>on</strong>solidated C<strong>on</strong>tracting Activity<br />

1000 Locust Street<br />

Reno, NV 89520<br />

The VA is looking for security<br />

guard services in VA facilities<br />

in Northern California. At most<br />

locati<strong>on</strong>s, the guard services<br />

will include 8-12-hour daytime<br />

shifts <strong>on</strong> weekdays. At some<br />

locati<strong>on</strong>s, services will be<br />

needed overnight and <strong>on</strong><br />

weekends.<br />

The request was posted <strong>on</strong><br />

November 25, 2005 with<br />

resp<strong>on</strong>ses due back by January<br />

5, 2006.<br />

Rob Weber, c<strong>on</strong>tract specialist<br />

775-328-1435<br />

775-328-1703 (fax)<br />

rob.weber@med.va.gov<br />

For submissi<strong>on</strong>s to this secti<strong>on</strong>, please e-mail detailed informati<strong>on</strong> to: opportunities@gsnmagazine.com<br />

C<strong>on</strong>tracts<br />

Recent security-related awards<br />

CompuDyne<br />

Lands Deal<br />

for Burbank<br />

Police<br />

Department<br />

Public<br />

Safety<br />

System<br />

Issued by:<br />

Issued to:<br />

Value:<br />

Scope:<br />

City of Burbank<br />

Burbank, CA<br />

CompuDyne Corp.<br />

Annapolis, MD<br />

$1.5 milli<strong>on</strong><br />

CompuDyne — Public Safety<br />

& Justice, Inc., has landed a<br />

$1.5 milli<strong>on</strong> c<strong>on</strong>tract to provide<br />

the software and services<br />

for a new public safety<br />

system for the Burbank<br />

Police Department. The new<br />

offering is a computer-aided<br />

dispatch system that operates<br />

<strong>on</strong> Microsoft Windows<br />

workstati<strong>on</strong>s. The processing<br />

of all critical CAD functi<strong>on</strong>s is<br />

server-independent and the<br />

system offers nearly 100<br />

percent availability. If <strong>on</strong>e<br />

comp<strong>on</strong>ent fails, the system<br />

will c<strong>on</strong>tinue to functi<strong>on</strong>.<br />

Awarded: November 21, 2005<br />

American Defense Systems<br />

Wins Deal for Security Door<br />

C<strong>on</strong>trols at New Federal<br />

Courthouse Planned for<br />

Brooklyn<br />

Issued by:<br />

U.S. Marshals Service<br />

Brooklyn, NY<br />

Issued to: American Defense Systems, Inc.<br />

Hicksville, NY<br />

Value: $500,000<br />

Scope: American Defense Systems<br />

has inked a $500,000 deal<br />

with the U.S. Marshals<br />

Service to design and install<br />

upgraded computer-driven<br />

touch-screen security c<strong>on</strong>trols<br />

for <str<strong>on</strong>g>more</str<strong>on</strong>g> than 200 security<br />

doors at the new federal<br />

courthouse in Brooklyn, NY.<br />

The doors will be used by the<br />

marshals to move pris<strong>on</strong>ers to<br />

restricted access points that<br />

were previously installed by<br />

ADSI in the old courthouse.<br />

Awarded: November 23, 2005<br />

Issued by:<br />

Issued to:<br />

CBP<br />

Hands<br />

BIR<br />

C<strong>on</strong>tract<br />

for<br />

IntellX<br />

Gantry<br />

System<br />

Customs and Border Protecti<strong>on</strong><br />

Department of Homeland<br />

Security<br />

Washingt<strong>on</strong>, DC<br />

BIR Inc. Security Systems<br />

Divisi<strong>on</strong><br />

Lincolnshire, IL<br />

Scope: CBP covers a <strong>on</strong>e-year base<br />

c<strong>on</strong>tract with four <strong>on</strong>e-year<br />

renewable opti<strong>on</strong>s. Under the<br />

terms, BIR will provide IntellX<br />

Gantry Vehicle and C<strong>on</strong>tainer<br />

Inspecti<strong>on</strong> System, which<br />

combines a Varian linear<br />

accelerator with a proprietary<br />

detecti<strong>on</strong> system aimed at<br />

scanning high-density cargoes.<br />

Awarded: September 2005<br />

GSA Teams With Telos to<br />

Manage Infrastructure<br />

Issued by:<br />

Issued to:<br />

Value:<br />

Scope:<br />

Federal Acquisiti<strong>on</strong> Service<br />

General Services<br />

Administrati<strong>on</strong><br />

Washingt<strong>on</strong>, DC<br />

Telos Corp.<br />

Ashburn, VA<br />

$3 milli<strong>on</strong> over five years<br />

The GSA’s FSA has teamed<br />

with Telos to manage and<br />

secure the agency’s technology<br />

infrastructure. The base<br />

year of the c<strong>on</strong>tract is valued<br />

at $600,000, with each<br />

of the four opti<strong>on</strong> years also<br />

worth about $600,000. To<br />

fulfill the requirements of<br />

the GSA FAS c<strong>on</strong>tract, Telos<br />

will rely <strong>on</strong> its extensive<br />

security experience performing<br />

Certificati<strong>on</strong>s &<br />

Accreditati<strong>on</strong>s (C&As) and<br />

c<strong>on</strong>ducting security vulnerability<br />

management for the<br />

GSA.<br />

Awarded: November 21, 2005<br />

For submissi<strong>on</strong>s to this secti<strong>on</strong>, please e-mail detailed informati<strong>on</strong> to: c<strong>on</strong>tracts@gsnmagazine.com<br />

GSN: GOVERNMENT SECURITY NEWS 11 DECEMBER 5, 2005


People<br />

Philip Gray has joined Hi-Tec<br />

Systems, Inc., of Egg Harbor<br />

Township, NJ, as vice president<br />

of business development.<br />

Hi-Tec also maintains an office<br />

in Arlingt<strong>on</strong>, VA, which serves<br />

customers at federal agencies<br />

in the Washingt<strong>on</strong>, DC, area.<br />

Gray’s primary resp<strong>on</strong>sibilities<br />

will be to develop business<br />

opportunities and win new government c<strong>on</strong>tracts<br />

for Hi-Tec. He will focus <strong>on</strong> the company's core<br />

competencies of informati<strong>on</strong> technology, aviati<strong>on</strong><br />

safety, homeland security and defense, communicati<strong>on</strong>,<br />

navigati<strong>on</strong>, surveillance and air traffic management<br />

systems and envir<strong>on</strong>mental engineering.<br />

Gray holds a bachelor's degree in mathematics and<br />

a master's degree in computer science from the<br />

University of Maryland.<br />

Richard Kiphart has been appointed co-chairman<br />

and lead independent director at SAFLINK Corp., of<br />

Bellevue, WA. Trevor Neils<strong>on</strong> has been promoted to<br />

co-chairman. Neils<strong>on</strong> is currently the executive<br />

director of the Global Business Coaliti<strong>on</strong> <strong>on</strong><br />

HIV/AIDS, initially funded by Bill Gates, George<br />

Soros and Ted Turner. Kiphart was previously the<br />

company’s chairman.<br />

William Evens<strong>on</strong> has been<br />

appointed vice president of<br />

Future Fibre Technologies’<br />

Americas operati<strong>on</strong>. He was<br />

previously president of Senstar<br />

Stellar Inc., where he was<br />

resp<strong>on</strong>sible for its U.S. operati<strong>on</strong><br />

since 1996. Evens<strong>on</strong> has<br />

<str<strong>on</strong>g>more</str<strong>on</strong>g> than 20 years experience<br />

in the outdoor intrusi<strong>on</strong> detecti<strong>on</strong><br />

market and is well known within the security<br />

industry. FFT chief executive Bill Younger said, “We<br />

are extremely pleased to have such a high calibre<br />

pers<strong>on</strong> drive our expansi<strong>on</strong> into the l<strong>on</strong>g range<br />

perimeter, pipeline and network security markets.”<br />

Evens<strong>on</strong>’s appointment coincides with the opening<br />

of Future Fibre Technologies’ West Coast office,<br />

located in Mountain View, CA.<br />

F4W, Inc., of Lake Mary, FL, a developer of broadband<br />

wireless products, has named Allan Edwards as<br />

CEO and chairman. Edwards holds public service<br />

positi<strong>on</strong>s with the City Commissi<strong>on</strong>er board of<br />

investors and chairman of the pensi<strong>on</strong> study committee<br />

in Providence, RI.<br />

Gregory Rothwell, the chief<br />

procurement officer at DHS,<br />

has announced his retirement.<br />

He assumed his duties as the<br />

department’s first chief procurement<br />

officer in July, 2003,<br />

pledging to create world class<br />

acquisiti<strong>on</strong> and financial assistance<br />

programs. He came to the<br />

department from the Internal<br />

Revenue Service where he served from 1999 to 2003<br />

as the senior career executive resp<strong>on</strong>sible for agency<br />

wide shared services. From 1990 to 1999, Rothwell<br />

served as the IRS’s first assistant commissi<strong>on</strong>er for<br />

procurement where he was a pi<strong>on</strong>eer in partnering<br />

with the private sector through full and open communicati<strong>on</strong>.<br />

He began his career as a c<strong>on</strong>tact negotiator<br />

with the Department of Defense and worked at<br />

both the Aberdeen Proving Ground in Maryland and<br />

the Army Electr<strong>on</strong>ics Command in Philadelphia. A<br />

native of Salina, KS, Rothwell holds bachelor<br />

degrees in ec<strong>on</strong>omics and business administrati<strong>on</strong><br />

and English (cum laude) from Marymount College in<br />

Kansas and a masters of public administrati<strong>on</strong> from<br />

the University of Denver.<br />

SI Internati<strong>on</strong>al, Inc., a Rest<strong>on</strong>, VA-based informati<strong>on</strong><br />

technology and network soluti<strong>on</strong>s company, has<br />

named Lee Stratt<strong>on</strong> as senior vice president of<br />

human resources. He will oversee the company’s HR<br />

functi<strong>on</strong>s, including the recruitment, management,<br />

retenti<strong>on</strong> and training of employees and administrati<strong>on</strong><br />

of employment benefits. Stratt<strong>on</strong> will report<br />

directly to president and CEO Brad Antle. Stratt<strong>on</strong><br />

joins SI Internati<strong>on</strong>al with <str<strong>on</strong>g>more</str<strong>on</strong>g> than 20 years of experience<br />

in HR leadership positi<strong>on</strong>s. Most recently, he<br />

managed the HR functi<strong>on</strong> in a growing financial services<br />

organizati<strong>on</strong> active in <str<strong>on</strong>g>more</str<strong>on</strong>g> than 50 countries<br />

worldwide.<br />

Michael Goodboe, vice president<br />

of training for The<br />

Wackenhut Corporati<strong>on</strong>, has<br />

been elected chairman of the<br />

Nati<strong>on</strong>al Associati<strong>on</strong> of Security<br />

Companies (NASCO) — the<br />

nati<strong>on</strong>’s largest c<strong>on</strong>tract security<br />

associati<strong>on</strong>, whose members<br />

employ nearly 40 percent of all<br />

security officers in the United<br />

States. Goodboe will serve <strong>on</strong> the executive committee<br />

of the board of directors, al<strong>on</strong>g with 1st Vice Chair<br />

Martin Herman, President and CEO of Special<br />

Resp<strong>on</strong>se Corporati<strong>on</strong> and NASCO 2nd Vice Chair<br />

Patrick McNulty, divisi<strong>on</strong> president of Allied-Bart<strong>on</strong><br />

Security Services. The NASCO board elects positi<strong>on</strong>s<br />

<strong>on</strong> the board each year during its fall membership meeting<br />

which was held at NASCO’s offices last October.<br />

Joseph Patanella, president of Ambir<strong>on</strong>TrustWave,<br />

will head up the company's new business unit aimed<br />

at providing data security-related products and services<br />

to federal government agencies. “The multitude of<br />

informati<strong>on</strong> assuarance and compliance regulati<strong>on</strong>s<br />

affects government entities as much if not <str<strong>on</strong>g>more</str<strong>on</strong>g> so<br />

than private sector businesses,” said Patanella.<br />

“Federal agencies handle large quantities of sensitive<br />

data and, as a result, are at great risk from hackers and<br />

other unauthorizedd parties seeking access to private<br />

or classified informati<strong>on</strong>.” Patanella is an 18-year veteran<br />

of the Nati<strong>on</strong>al Security Agency (NSA).<br />

MTC Holdings, Inc., of Oakland, CA, has appointed<br />

Larry Grotte as CIO. Grotte will help the company’s<br />

business units identify and develop robust business<br />

processes, as he tackles process and technology elements.<br />

His office will be in the Oakland headquarters.<br />

Prior to joining MTCH, Grotte spent <str<strong>on</strong>g>more</str<strong>on</strong>g> than 30<br />

years as a CEO and C-level executive for several Silic<strong>on</strong><br />

Valley companies within the Fortune 500’s emerging<br />

technology/venture capital-backed sectors. He obtained<br />

a bachelor’s degree in business administrati<strong>on</strong> from San<br />

Francisco State University and an MBA from Notre<br />

Dame de Namur University, of Belm<strong>on</strong>t, CA.<br />

For submissi<strong>on</strong>s to this secti<strong>on</strong>, please e-mail detailed informati<strong>on</strong> to:<br />

people@gsnmagazine.com<br />

For <str<strong>on</strong>g>more</str<strong>on</strong>g> informati<strong>on</strong> go to www.info.ims.ca/5111-006<br />

DECEMBER 5, 2005 12 GSN: GOVERNMENT SECURITY NEWS


Ask The Expert<br />

Kevin Walsh<br />

Director of Product Technology<br />

Funk Software<br />

A lot of government organizati<strong>on</strong>s<br />

are wrestling with the<br />

GSN:<br />

challenge of introducing WiFi communicati<strong>on</strong>s<br />

into their networks which would<br />

allow their internal users and, perhaps,<br />

outside users to access their network.<br />

After they figure out how to establish<br />

smoothly functi<strong>on</strong>ing WiFi c<strong>on</strong>necti<strong>on</strong>s,<br />

how does the c<strong>on</strong>cept of end-point security<br />

come into play<br />

The next<br />

KEVIN WALSH: aspect of<br />

network access for end users seeking to<br />

get <strong>on</strong>to the network will be to determine<br />

not <strong>on</strong>ly who you are, and are<br />

your credentials valid, but what is the<br />

current security state of your machine<br />

Are you meeting the requirements to be<br />

allowed to fully participate <strong>on</strong> the network<br />

And if you’re not, how do we get<br />

that device back to compliance so that<br />

you can do your job<br />

What sort of criteria are you<br />

GSN: most comm<strong>on</strong>ly looking at to<br />

determine whether a user is compliant<br />

At the beginning, the obvious<br />

KW: <strong>on</strong>e is whether or not the antivirus<br />

applicati<strong>on</strong> is present, running<br />

and c<strong>on</strong>figured appropriately to perform<br />

its task. But, as we move bey<strong>on</strong>d<br />

just anti-virus to protect desktops, we<br />

have pers<strong>on</strong>al firewalls, patch management,<br />

anti-spyware and other applicati<strong>on</strong>s<br />

that are used to make sure that<br />

the informati<strong>on</strong> <strong>on</strong> the device [which is<br />

trying to c<strong>on</strong>nect to the network] is<br />

protected, and that the device itself<br />

cannot propagate problems to the other<br />

devices <strong>on</strong> the network.<br />

Let’s <strong>say</strong> I’m the IT director of<br />

GSN: a government agency and an<br />

outside user tries to sign <strong>on</strong>to my network.<br />

He can be either <strong>on</strong>e of my employees<br />

(whose laptop presumably at <strong>on</strong>e stage<br />

was c<strong>on</strong>figured properly), or a total<br />

stranger. Let’s take both circumstances<br />

separately. How is this noti<strong>on</strong> of end-point<br />

security going to help me protect my network<br />

against <strong>on</strong>e of my own employees<br />

Let’s add <strong>on</strong>e twist to your scenario.<br />

In today’s age of mobility,<br />

KW:<br />

your employee might be taking a<br />

device, like a laptop, and taking it away<br />

from your organizati<strong>on</strong>; taking it out<br />

from under your c<strong>on</strong>trol and exposing it<br />

to other networks.<br />

Provided it’s under your c<strong>on</strong>trol, you<br />

have tools to manage it <strong>on</strong> your network<br />

every day. But, for the <strong>on</strong>e hour,<br />

<strong>on</strong>e day or <strong>on</strong>e week that it’s off your<br />

network, that machine might become<br />

out of date. It may have missed a patch<br />

With the increasing prevalence of mobile employees and visitors signing <strong>on</strong>to corporate and governmental computer networks<br />

through WiFi c<strong>on</strong>necti<strong>on</strong>s, a new form of software that instantly inspects the security c<strong>on</strong>figurati<strong>on</strong>s of the laptops<br />

and desktops trying to gain access to such networks has begun to blossom. GSN’s Jacob Goodwin recently spoke with<br />

Kevin Walsh, director of product technology for Funk Software, Inc. of Cambridge, MA, an expert in this new software<br />

niche, known in some circles as “end-point security.”<br />

that you delivered <strong>on</strong> Tuesday because<br />

the machine was in Akr<strong>on</strong>, OH, for<br />

the past week. When it comes back,<br />

you now want to know that it’s not in<br />

compliance (because you’ve updated<br />

your network since it was last a participant),<br />

and you want to get it back<br />

into compliance as quickly and easily<br />

as possible.<br />

How would this be different if<br />

GSN: a total stranger shows up at<br />

your network<br />

The visitor or the guest to your<br />

KW: network complicates the challenge<br />

because you may not be able to<br />

change their machine. You may not<br />

have the privilege to <strong>say</strong>, “Move from<br />

anti-virus X to anti-virus Y in order to<br />

participate <strong>on</strong> my network.” So, you<br />

will need a policy that will allow the<br />

visitor to complete the job they came to<br />

your network to do, but you might not<br />

want to give them the keys to the kingdom<br />

while they’re <strong>on</strong> your network.<br />

What would happen when<br />

GSN: end-point security software<br />

discovers that your friendly employee’s<br />

laptop is no l<strong>on</strong>ger compliant<br />

Let’s <strong>say</strong> our traveling employee<br />

KW: comes back, is out of compliance<br />

and attempts to get <strong>on</strong>to the network.<br />

They’ve presented their credentials.<br />

We like their credentials. They are<br />

who they’re supposed to be. But, now<br />

their anti-virus software doesn’t have the<br />

right virus definiti<strong>on</strong> file.<br />

We have the opportunity to change the<br />

user’s network c<strong>on</strong>necti<strong>on</strong> from the normal<br />

full access network to a <str<strong>on</strong>g>more</str<strong>on</strong>g> limited<br />

“sandbox” network. There will be utilities<br />

and applicati<strong>on</strong>s <strong>on</strong> the sandbox<br />

network — that might be user-driven or<br />

completely automated — that will bring<br />

that applicati<strong>on</strong> back up-to-date. Once<br />

it’s up-to-date, without the user having to<br />

click any butt<strong>on</strong>, and <strong>on</strong>ce the applicati<strong>on</strong>s<br />

notify each other that the user is<br />

back in compliance, the user will be<br />

transferred back to the full network.<br />

And then would they be able<br />

GSN: to gain access to all of the different<br />

applicati<strong>on</strong>s <strong>on</strong> the network<br />

Yes, just as they would the<br />

KW: day before they went out of<br />

compliance.<br />

What happens to the stranger<br />

GSN: who you can’t automatically<br />

bring back into compliance Is he put in<br />

the sandbox forever Does he have the<br />

ability to accomplish anything <strong>on</strong> your<br />

network<br />

Those users will not be given<br />

KW: the full network access because<br />

they aren’t employees and they d<strong>on</strong>’t<br />

deserve that level of access. But, they<br />

could be put in a modified sandbox that<br />

gives them the privileges to do the work<br />

they’re supposed to do, but nothing<br />

bey<strong>on</strong>d that level of network privilege.<br />

In that circumstance, what<br />

GSN: might they be allowed to do<br />

There might be a file server,<br />

KW: print services or maybe an<br />

Internet gateway that guests are<br />

allowed to use, that n<strong>on</strong>-classified, n<strong>on</strong>protected<br />

informati<strong>on</strong> is made available<br />

from. But, access to it would still be<br />

logged, so you’d know who looked at<br />

the informati<strong>on</strong> and what data was<br />

used.<br />

Let’s try to put this new software<br />

innovati<strong>on</strong> in c<strong>on</strong>text.<br />

GSN:<br />

Who are the pi<strong>on</strong>eers of this c<strong>on</strong>cept of<br />

end-point security How does your firm,<br />

Funk Software, fit in with the main players<br />

And is end-point security software<br />

becoming comm<strong>on</strong>place<br />

The giants of our industry have<br />

KW: gotten involved: Cisco, with<br />

their Network Admissi<strong>on</strong> C<strong>on</strong>trol;<br />

Microsoft with their Network Access<br />

Protecti<strong>on</strong>; and the Trusted Computing<br />

Group with their Trusted Network<br />

C<strong>on</strong>nect. Those are probably the big<br />

three protocols today that will help network<br />

administrators perform this task.<br />

What are the similarities and<br />

GSN: the differences between<br />

those three approaches Have their differences<br />

slowed down the adopti<strong>on</strong> of<br />

this technology<br />

The good news for c<strong>on</strong>sumers<br />

KW: is that all three soluti<strong>on</strong>s share<br />

a very similar architecture, so they’re<br />

not being challenged to use different<br />

architectures. If you look at the three of<br />

them in depth, they share very similar<br />

traits. Unfortunately, they share those<br />

traits in very different ways, different<br />

API’s and different interfaces, which<br />

means that today you have to choose<br />

<strong>on</strong>ly <strong>on</strong>e instead of having them all<br />

work together.<br />

How does end-point security<br />

GSN: typically figure in the plans for<br />

government IT security directors<br />

Government organizati<strong>on</strong>s today<br />

KW: have gotten the comp<strong>on</strong>ents<br />

they’ve needed, such as FIPS-enabled<br />

clients and servers, to roll out WiFi.<br />

That’s brought a technology to their network<br />

that they’ve never had before. It’s<br />

8O2.1x, or identity networking.<br />

Once they get the wireless comp<strong>on</strong>ent<br />

deployed, they can start to roll out<br />

end-point integrity soluti<strong>on</strong>s from any<br />

of the vendors. But, now they also have<br />

the opportunity to change their wired<br />

networks to 8O2.1x, to make those<br />

<str<strong>on</strong>g>more</str<strong>on</strong>g> secure and to include things like<br />

end-point security. Starting from today,<br />

I think IT officials are going to need to<br />

study these soluti<strong>on</strong>s, choose the<br />

opti<strong>on</strong>s that they’re going to go forward<br />

with and define how to roll them out<br />

<strong>on</strong> the network.<br />

We hope that for the first half of<br />

2006, it’s an exploratory phase for a lot<br />

of organizati<strong>on</strong>s, gaining an understanding<br />

of the technologies and their choices<br />

within the space; with deployments<br />

beginning in the sec<strong>on</strong>d half of 2006.<br />

Tell us about the c<strong>on</strong>cept of<br />

GSN: “device management” and how<br />

that fits into all of this.<br />

KW:<br />

Today, we can identify you as<br />

user, we can validate your credentials,<br />

we can check the health of<br />

your machine and we can know where<br />

you’re c<strong>on</strong>necting to the network from.<br />

What we’re being asked for next is to<br />

identify whether or not the device<br />

you’re using is completely under the IT<br />

department’s c<strong>on</strong>trol, or whether it is<br />

your own pers<strong>on</strong>al device. By adding<br />

that knowledge to the policy decisi<strong>on</strong>making<br />

process, network administrators<br />

feel they can make even <str<strong>on</strong>g>more</str<strong>on</strong>g> granular<br />

decisi<strong>on</strong>s over how much access to<br />

grant you. Are you c<strong>on</strong>necting to the<br />

network properly with <strong>on</strong>e of my<br />

devices or are you c<strong>on</strong>necting to the<br />

network with your own pers<strong>on</strong>al device.<br />

If they knew that, they could make different<br />

decisi<strong>on</strong>s.<br />

GSN: GOVERNMENT SECURITY NEWS 13 DECEMBER 5, 2005


From Page 1<br />

Vulnerability mgmt. software focuses <strong>on</strong> applicati<strong>on</strong>s<br />

“This was the first year that a significant<br />

piece of the vulnerability was applicati<strong>on</strong>based,”<br />

said Mas<strong>on</strong> Brown, director of the<br />

SANS Institute to a recent E-Gov Institute<br />

Security C<strong>on</strong>ference in Washingt<strong>on</strong>, DC.<br />

While the shift is noteworthy <strong>on</strong> its own,<br />

perhaps <str<strong>on</strong>g>more</str<strong>on</strong>g> alarming is that cyber attackers<br />

are increasingly targeting “the backup<br />

and recovery tools and the antivirus and<br />

other security tools that most organizati<strong>on</strong>s<br />

think are keeping them safe from <str<strong>on</strong>g>attacks</str<strong>on</strong>g><br />

and from loss of data,” the SANS Institute<br />

said in a statement. “Now many of those<br />

systems have been shown to have critical<br />

vulnerabilities.”<br />

Brown succinctly summed up the nature<br />

of the threat: “If you’re buying products<br />

with bad code, you’re going to get your<br />

lunch eaten quickly.”<br />

Amrit Williams, research director for<br />

informati<strong>on</strong> security and risk practice at<br />

Stamford, CT-based IT research and analysis<br />

firm Gartner, Inc., sees another, possibly<br />

related, trend in cyber <str<strong>on</strong>g>attacks</str<strong>on</strong>g>.<br />

“It’s significant that <str<strong>on</strong>g>attacks</str<strong>on</strong>g> are being<br />

launched and vulnerabilities found against<br />

security software,” Williams said. “Another<br />

shift is that we’ve moved from a world of<br />

hobby-based malware to a world of cyber<br />

criminals who are financially motivated.<br />

Because of that criminal activity, it makes<br />

sense to attack the security applicati<strong>on</strong>s.”<br />

A robust and properly implemented vulnerability<br />

management program can help<br />

protect against these increased applicati<strong>on</strong>level<br />

<str<strong>on</strong>g>attacks</str<strong>on</strong>g>, <strong>say</strong>s Allan Paller, SANS director<br />

of research.<br />

Most vulnerability management c<strong>on</strong>sists<br />

of some form of technology – either hardware<br />

or software – that scans a system for<br />

existing comp<strong>on</strong>ents and known vulnerabilities<br />

which then creates a “tickler file to ask<br />

if you took acti<strong>on</strong>,” such as downloading<br />

the latest security patch, he <strong>say</strong>s.<br />

“People who have comprehensive vulnerability<br />

management systems and large staffs<br />

of people who can find the patches, test the<br />

patches and roll them out are in no worse<br />

shape then they were before,” said Paller.<br />

“But since the vast bulk of all organizati<strong>on</strong>s<br />

have very lightweight vulnerability<br />

management systems or rely entirely <strong>on</strong> the<br />

vendors for updates of their operating sys-<br />

tems,” Paller said, “they are at a radically<br />

increased risk because the <str<strong>on</strong>g>attacks</str<strong>on</strong>g> that used<br />

to be blocked by the patching of their operating<br />

systems are not blocked because the<br />

applicati<strong>on</strong>s they run are not patched.”<br />

Under this scenario, a would-be attacker<br />

might transmit a legitimate file — text, or<br />

data, or even music — c<strong>on</strong>taining malicious<br />

code that could launch cyber mayhem at<br />

the receiving end when opened by a vulnerable<br />

applicati<strong>on</strong>.<br />

While many vulnerability assessment<br />

tools have the ability to detect applicati<strong>on</strong><br />

vulnerabilities, these technologies may not<br />

c<strong>on</strong>duct such assessments “at the granular<br />

level that will be needed at the applicati<strong>on</strong><br />

level,” said Gartner’s Williams.<br />

“Most of the assessment tools that are<br />

out there assess vulnerabilities against the<br />

operating system,” he said. “They generally<br />

d<strong>on</strong>’t go into the applicati<strong>on</strong>s themselves.”<br />

Vulnerability management expert<br />

Gerhard Eschelbeck said the trend<br />

toward applicati<strong>on</strong>-level <str<strong>on</strong>g>attacks</str<strong>on</strong>g> does not<br />

require any dramatic shift in the way<br />

enterprises analyze their vulnerabilities<br />

and manage their risks, nor does it call for<br />

new technology.<br />

“The good vulnerability management<br />

soluti<strong>on</strong>s have the capability built into their<br />

systems,” said Eschelbeck, whose firm —<br />

Redwood Shores, CA-based Qualys, Inc.<br />

— provides <strong>on</strong>-demand network security<br />

audits and vulnerability management. “One<br />

of the things that people should c<strong>on</strong>sider is<br />

a trusted or authenticated scan. Those are<br />

deeper scans.”<br />

Another strategy to identify applicati<strong>on</strong>level<br />

vulnerabilities that enterprises might<br />

c<strong>on</strong>sider is altering the frequency of system<br />

scans.<br />

“You may want to c<strong>on</strong>sider the regularity<br />

of when you c<strong>on</strong>duct your assessments. You<br />

may think about a schema where your<br />

servers are scanned <strong>on</strong>ce a m<strong>on</strong>th and your<br />

work stati<strong>on</strong>s <strong>on</strong>ce every six weeks,” said<br />

Eschelbeck, Qualys’ chief technology officer<br />

and vice president of engineering and<br />

<strong>on</strong>e of the security <strong>experts</strong> who produced<br />

the SANS 2005 “Top 20” list.<br />

One area of vulnerability management<br />

that will likely change as a result of the<br />

increased threat of applicati<strong>on</strong>-level <str<strong>on</strong>g>attacks</str<strong>on</strong>g><br />

is the patching process, he said.<br />

“Your patching patterns will change,<br />

because instead of patching servers you<br />

may end up patching 1,000 workstati<strong>on</strong>s,”<br />

he said, noting that the patching process is<br />

usually a manual process that can require<br />

significant staff time and pers<strong>on</strong>nel.<br />

SANS Institute’s Paller notes that federal<br />

agencies are not immune from applicati<strong>on</strong><br />

<str<strong>on</strong>g>attacks</str<strong>on</strong>g>.<br />

“The federal government does have vulnerability<br />

management, but not for all<br />

parts,” he said, explaining that some agencies<br />

have vulnerability management in<br />

place <strong>on</strong>ly for selected IT systems or operati<strong>on</strong>al<br />

divisi<strong>on</strong>s.<br />

“Many of them are relying <strong>on</strong> the automated<br />

updates that come from the vendors,”<br />

said Paller. “What’s wr<strong>on</strong>g with that<br />

process is that the applicati<strong>on</strong> vendors d<strong>on</strong>’t<br />

have automatic updating.”<br />

So if an IT department does not regularly<br />

search vendors’ Web sites for security<br />

patches for each applicati<strong>on</strong> used by an<br />

agency or enterprise, those applicati<strong>on</strong>s will<br />

remain vulnerable, he said.<br />

“The vendors, when you call them, will<br />

<strong>say</strong>, ‘We’ve put out a patch, we’ve fixed<br />

the problem.’ But they d<strong>on</strong>’t have any way<br />

of telling the user because they d<strong>on</strong>’t<br />

have automatic updating,” Paller said,<br />

noting that, “Antivirus is the <strong>on</strong>e excepti<strong>on</strong><br />

to the rule.”<br />

GSN Classified/Marketplace<br />

SERVICES – SALES REPRESENTATION<br />

“You have two choices. One is you run<br />

<strong>on</strong>e of those scanners, and they’re not<br />

cheap,” he said, noting that vulnerability<br />

management technology for an enterprise<br />

can cost anywhere from $25,000 to<br />

$1 milli<strong>on</strong>.<br />

“Two, you’re supposed to go look<br />

things up <strong>on</strong> the vendor’s Web site,”<br />

Paller said, adding, “most people aren’t<br />

doing anything.”<br />

Noting that 10 percent of known software<br />

vulnerabilities account for some 90<br />

percent of all cyber <str<strong>on</strong>g>attacks</str<strong>on</strong>g>, Qualys’s<br />

Eschelbeck urged prioritizati<strong>on</strong> of an organizati<strong>on</strong>’s<br />

identified vulnerabilities rather<br />

than trying to patch them all.<br />

“The biggest key to success is the prioritizati<strong>on</strong>,”<br />

said Eschelbeck. “It must correlate<br />

the vulnerabilities with missi<strong>on</strong> critical<br />

business processes.”<br />

But Williams notes that organizati<strong>on</strong>s<br />

cannot rely exclusively <strong>on</strong> their vulnerability<br />

management programs. Enterprises still<br />

need to deploy and regularly update their<br />

security “shielding” technology — such as<br />

firewalls and antivirus programs, he said.<br />

Even when vulnerability management<br />

technology detects an applicati<strong>on</strong>-level vulnerability<br />

for which a patch is available, he<br />

explained, a large enterprise may need several<br />

days or even weeks to apply the patch<br />

<strong>on</strong> all affected servers or work stati<strong>on</strong>s,<br />

depending <strong>on</strong> its resources. During that<br />

patching period, it is the shielding applicati<strong>on</strong>s<br />

that must protect vulnerable applicati<strong>on</strong>s<br />

until the patches are applied.<br />

Companies and government agencies<br />

must develop processes for integrating their<br />

vulnerability assessment and patch management<br />

programs with their shielding<br />

technology, said Williams.<br />

“There’s no <strong>on</strong>e product in vulnerability<br />

management that does everything<br />

that’s necessary at an adequate level,”<br />

said Gartner’s Williams. “This is all a<br />

work in progress, which is why companies<br />

need to tie all the pieces together<br />

through process today.”<br />

Nati<strong>on</strong>al sales rep firm sought for manufacturer and marketer of extreme-duty stainless-steel video camera housings. See ad in this issue<br />

of GSN <strong>on</strong> p. 45; C<strong>on</strong>tact: D<strong>on</strong> Softness, pres., SecureVue Inc., 251 East 51st Street, New York, NY 10022. www.securevue.net;<br />

p: 212-752-5960; f: 212-888-7387; email: d<strong>on</strong>@securevue.net<br />

For <str<strong>on</strong>g>more</str<strong>on</strong>g> informati<strong>on</strong> go to www.info.ims.ca/5111-007<br />

DECEMBER 5, 2005 14 GSN: GOVERNMENT SECURITY NEWS


“HOW TO...”<br />

Soluti<strong>on</strong>s Guide for<br />

Government Security<br />

How 16 of the most important segments<br />

of the government security market tackle<br />

their physical and IT security challenges.<br />

CONTENTS<br />

16 Asset Tracking<br />

How to ensure the integrity of your<br />

product throughout its distributi<strong>on</strong><br />

lifecycle<br />

18 Cargo Screening<br />

How to rapidly screen cargo for illicit<br />

materials and provide automatic detecti<strong>on</strong><br />

of nuclear-based WMDs and dirty<br />

bombs, even through 17” of solid steel<br />

20 Dec<strong>on</strong>taminati<strong>on</strong><br />

How to deal with radiological<br />

dec<strong>on</strong>taminati<strong>on</strong><br />

22 Detecti<strong>on</strong><br />

How to resp<strong>on</strong>d to a radiological terror<br />

event<br />

24 Emergency Alert Notificati<strong>on</strong><br />

How to spread the word of a sudden<br />

emergency to 5,000 employees, a public<br />

venue or even an entire community<br />

in 30 sec<strong>on</strong>ds<br />

26 Guard Services<br />

How to select a guard services<br />

provider<br />

28 Integrated Security Systems<br />

How to build an integrated security<br />

system that leverages your existing<br />

technology<br />

30 Mass Notificati<strong>on</strong> Systems<br />

How to notify thousands of military<br />

pers<strong>on</strong>nel or civilians of a sudden and<br />

critical change in their situati<strong>on</strong><br />

32 Night Visi<strong>on</strong><br />

How to catch would-be intruders <strong>on</strong><br />

your property in the middle of the<br />

night, without them even knowing<br />

you’re watching<br />

34 Perimeter Protecti<strong>on</strong><br />

How to secure any perimeter<br />

36 Perimeter Surveillance<br />

How to service your perimeter<br />

surveillance systems<br />

38 Security Management Systems<br />

How to pull together alarm m<strong>on</strong>itoring,<br />

video surveillance, access c<strong>on</strong>trols<br />

and smart cards into an integrated<br />

system<br />

40 Thermal Imaging<br />

How to spot even the sneakiest<br />

intruder trying to enter your property<br />

at night or during bad weather<br />

42 Video Surveillance<br />

How to design a network-based video<br />

surveillance system<br />

44 Video Surveillance Equipment<br />

How to protect your CCTV cameras<br />

from damage, destructi<strong>on</strong> and deluge<br />

46 X-Ray<br />

How to use X-ray technology to<br />

screen airline passengers, airline cargo<br />

and the U.S. Mail


A Special Supplement to GSN<br />

ASSET TRACKING<br />

HOW TO...<br />

...ensure the integrity of your product throughout<br />

its distributi<strong>on</strong> lifecycle<br />

It is estimated that annual cargo shipment losses range upwards of $100 billi<strong>on</strong>. These<br />

losses are largely the result of product damage and theft due to shipment hijackings,<br />

vandalism and spoilage.<br />

Until recently, efforts to prevent such acts have been <strong>on</strong>ly marginally successful because<br />

freight forwarders and manufacturers have had few ways to m<strong>on</strong>itor their goods and<br />

services while in transit. However, technological advancements are changing this situati<strong>on</strong>,<br />

which is good news for every<strong>on</strong>e — manufacturers save <strong>on</strong> insurance costs, freight<br />

forwarders have the opportunity to sell this new technology as a value-added service and<br />

c<strong>on</strong>sumers pay less as a result of the decline in manufacturing costs and the greater efficiencies<br />

achieved throughout the distributi<strong>on</strong> supply chain.<br />

Using Global Positi<strong>on</strong>ing Systems (GPS), companies can now track their products<br />

remotely, <strong>on</strong> a real-time basis, using any standard Internet browser. Placed covertly<br />

inside shipping crates or attached to the undercarriage of transport vehicles, asset<br />

tracking devices can be c<strong>on</strong>figured to identify temperature c<strong>on</strong>trol changes, shock and<br />

vibrati<strong>on</strong>, opening doors and speed. In additi<strong>on</strong>, such technologies can establish “geofencing”<br />

parameters to ensure that <strong>on</strong>e’s cargo stays <strong>on</strong> its intended route. If any of the<br />

pre-established parameters are breached, alarms are sent immediately to the m<strong>on</strong>itoring<br />

stati<strong>on</strong> or the owner(s) for determinati<strong>on</strong> of acti<strong>on</strong>. Precise locati<strong>on</strong> informati<strong>on</strong> provides<br />

owners the ability to ensure that the desired envir<strong>on</strong>mental and structural integrity of<br />

their shipments are maintained.<br />

The most recent advancement in asset tracking involves a new wireless protocol known<br />

as “ZigBee.” ZigBee sensors are now being integrated into the design architecture of<br />

next generati<strong>on</strong> tracking devices. Using ZigBee protocol, trackers will be able to communicate<br />

effectively with other elements of a client’s security system, such as cameras,<br />

to enhance the accuracy of the client’s detecti<strong>on</strong> and deterrence system.<br />

DECEMBER 5, 2005 16 GSN: GOVERNMENT SECURITY NEWS


For <str<strong>on</strong>g>more</str<strong>on</strong>g> informati<strong>on</strong> go to www.info.ims.ca/5111-013


A Special Supplement to GSN<br />

CARGO SCREENING<br />

HOW TO...<br />

...rapidly screen cargo for illicit materials and<br />

provide automatic detecti<strong>on</strong> of nuclear-based<br />

WMDs and dirty bombs, even through 17” of<br />

solid steel.<br />

Cargo c<strong>on</strong>tainers and truck trailers are often heavily loaded with dense objects that can<br />

easily disguise c<strong>on</strong>traband materials. This defeats gamma ray, backscatter and other<br />

technologies because their penetrating power is simply too low to punch through such<br />

items.<br />

Effective cargo inspecti<strong>on</strong> requires a combinati<strong>on</strong> of good detecti<strong>on</strong> technology and<br />

high-power X-ray systems. Today’s Linatr<strong>on</strong> based X-ray technology answers this challenge<br />

with its ability to resolve objects as small as four millimeters within 17 inches of<br />

steel. Scanning is enhanced by the latest detectors and computer software, which allow<br />

entire c<strong>on</strong>tainers to be scanned at high resoluti<strong>on</strong> in less than 15 sec<strong>on</strong>ds. These high<br />

resoluti<strong>on</strong> digital images allow operators to zoom in <strong>on</strong> suspicious objects, identify the<br />

exact locati<strong>on</strong>s of c<strong>on</strong>cern and save or transmit the images for future use.<br />

Since c<strong>on</strong>traband nuclear materials are a critical, but infrequently found material in<br />

cargo c<strong>on</strong>tainers, it is important to detect these automatically, with a high degree of c<strong>on</strong>fidence<br />

and a very low false alarm rate.<br />

Dual energy scanning technology makes this possible. By alternating X-ray energy<br />

from pulse-to-pulse at a high repetiti<strong>on</strong> rate, nuclear materials can be detected automatically<br />

and differentiated from steel and other routine materials. This automatic detecti<strong>on</strong><br />

process can operate transparently during normal scanning and inspecti<strong>on</strong> without distracting<br />

the operator. However, when nuclear material is detected, the operator is immediately<br />

alerted to its size and locati<strong>on</strong>. Thus, operators can carry out routine inspecti<strong>on</strong>s<br />

for <str<strong>on</strong>g>more</str<strong>on</strong>g> frequent c<strong>on</strong>traband, while having c<strong>on</strong>fidence that their dual-energy system<br />

will clearly identify any significant quantity of nuclear material.<br />

Overall, dual-energy scanning is a break-through technology that, for the first time,<br />

allows automatic detecti<strong>on</strong> of nuclear materials while simultaneously providing excepti<strong>on</strong>ally<br />

high resoluti<strong>on</strong> images at unmatched speeds.<br />

DECEMBER 5, 2005 18 GSN: GOVERNMENT SECURITY NEWS


Introducing Linatr<strong>on</strong> K9<br />

The watchdog<br />

Cargo inspecti<strong>on</strong> with teeth<br />

Varian’s Linatr<strong>on</strong> K9 is the soluti<strong>on</strong> to high-speed interdicti<strong>on</strong> of cargo c<strong>on</strong>tainers<br />

transporting nuclear-based WMDs and Dirty Bombs.<br />

The K9 is the <strong>on</strong>ly dual-energy X-ray source capable of switching energies<br />

pulse-to-pulse. This technology enables cargo screening systems to automatically<br />

identify high-density materials used in WMDs and Dirty Bombs, even in heavily<br />

loaded cargo c<strong>on</strong>tainers.<br />

The K9 provides unmatched penetrati<strong>on</strong> capabilities through 17” of solid steel,<br />

allowing user access to fast, high-resoluti<strong>on</strong> images and the ability to completely<br />

screen a fully loaded c<strong>on</strong>tainer faster than any other n<strong>on</strong>-intrusive inspecti<strong>on</strong> system<br />

in the world.<br />

For <str<strong>on</strong>g>more</str<strong>on</strong>g> informati<strong>on</strong>, c<strong>on</strong>tact<br />

Varian Medical Systems<br />

Security & Inspecti<strong>on</strong> Products<br />

Las Vegas, Nevada<br />

tel: 702.938.4859<br />

fax: 702.938.4833<br />

www.varian.com/sip<br />

The K9 is built <strong>on</strong> Varian’s proven high-energy Linatr<strong>on</strong> accelerator technology, the<br />

industry standard used by cargo screening system manufacturers around the world.<br />

Put some teeth into your cargo screening system with Linatr<strong>on</strong> ® K9 – The watchdog .<br />

For <str<strong>on</strong>g>more</str<strong>on</strong>g> informati<strong>on</strong> go to www.info.ims.ca/5111-014


A Special Supplement to GSN<br />

DECONTAMINATION<br />

HOW TO...<br />

...deal with radiological dec<strong>on</strong>taminati<strong>on</strong>.<br />

When it comes to dec<strong>on</strong>taminati<strong>on</strong>, preparati<strong>on</strong> is key. Once an incident has occurred, it<br />

is too late to plan and prepare. Still, there are some things that every<strong>on</strong>e should know.<br />

In the event of a radiological c<strong>on</strong>taminati<strong>on</strong> event, immediate tracking of the c<strong>on</strong>taminant<br />

to arrest teh plume spread is critical. Without prior planning, the situati<strong>on</strong> can<br />

quickly spiral out of c<strong>on</strong>trol and isotopic c<strong>on</strong>taminati<strong>on</strong> can spread rapidly to otherwise<br />

unaffected areas.<br />

Applicati<strong>on</strong> of water will <strong>on</strong>ly make matters worse, driving materials down into surfaces<br />

and creating additi<strong>on</strong>al “fixed” c<strong>on</strong>taminati<strong>on</strong> problems. Also, <strong>on</strong>ce the water evaporates,<br />

the “smearable” c<strong>on</strong>taminati<strong>on</strong> can again become airborne and spread via the wind. The<br />

<strong>on</strong>ly effective soluti<strong>on</strong> is to have pre-positi<strong>on</strong>ed soluti<strong>on</strong>s, deployment equipment and<br />

trained pers<strong>on</strong>nel executing a c<strong>on</strong>cise emergency resp<strong>on</strong>se plan in order to minimize the<br />

plume spread and begin the recovery process.<br />

If you are working in the affected area, respiratory protecti<strong>on</strong> is crucial in order to protect<br />

lungs and airways. Put <strong>on</strong> your mask or escape hood immediately. If you have a protective<br />

escape suit, boots and gloves, put them <strong>on</strong>. D<strong>on</strong>’t take off your mask for any reas<strong>on</strong><br />

until you are out of the Hot Z<strong>on</strong>e and you have been cleared of c<strong>on</strong>taminati<strong>on</strong>.<br />

If a chemical or biological event takes place inside a building, the ventilati<strong>on</strong> system<br />

should be shut down as quickly as possible to stop the spread of the c<strong>on</strong>taminant. In a<br />

CBRN event outside a building, the building’s air intake must be filtered with a HEPA<br />

system, or the building air intake must be shut down to keep from drawing c<strong>on</strong>taminati<strong>on</strong><br />

inside. HEPA filtering is preferred, as running the ventilati<strong>on</strong> system <strong>on</strong> maximum<br />

settings can serve to positively pressurize the building interior. While still a m<strong>on</strong>umental<br />

task, it is much easier to dec<strong>on</strong>taminate a building exterior than both the interior and<br />

exterior.<br />

Expect professi<strong>on</strong>als to arrive and take samples of the c<strong>on</strong>taminant. Additi<strong>on</strong>ally, the<br />

FBI will investigate. Source retrieval and removal or remediati<strong>on</strong> is critical. Gross dec<strong>on</strong>taminati<strong>on</strong><br />

of equipment and rooms must be achieved before re-use. Post-dec<strong>on</strong>taminati<strong>on</strong><br />

sampling is required prior to a safe release of the area.<br />

DECEMBER 5, 2005 20 GSN: GOVERNMENT SECURITY NEWS


For <str<strong>on</strong>g>more</str<strong>on</strong>g> informati<strong>on</strong> go to www.info.ims.ca/5111-015


A Special Supplement to GSN<br />

DETECTION<br />

HOW TO...<br />

...resp<strong>on</strong>d to a radiological terror event<br />

We’ve heard of the possibility of terrorists using a radiati<strong>on</strong> dispersal device (RDD) —<br />

“dirty bomb” — to spread c<strong>on</strong>taminati<strong>on</strong> and panic through a major city or public gathering.<br />

Such a device c<strong>on</strong>sists of radioactive material — industrial, medical or waste isotopes<br />

— spread over a wide area with c<strong>on</strong>venti<strong>on</strong>al explosives.<br />

The first step is to recognize that an event has occurred. Radiati<strong>on</strong> is colorless, odorless<br />

and tasteless. Electr<strong>on</strong>ic detecti<strong>on</strong> provides the <strong>on</strong>ly means to separate the RDD event<br />

from any other explosi<strong>on</strong> or fire, by detecting the dispersed radioactive material.<br />

Equipping first resp<strong>on</strong>ders (firefighters, police, HAZMAT, etc.) with pers<strong>on</strong>al radiati<strong>on</strong><br />

m<strong>on</strong>itors is the most typical approach for initial detecti<strong>on</strong>. Reliable, fast resp<strong>on</strong>ding,<br />

portable, rugged m<strong>on</strong>itors are needed to stand up to the rigors of first emergency<br />

resp<strong>on</strong>se.<br />

Once the event has been detected, the pers<strong>on</strong>al radiati<strong>on</strong> m<strong>on</strong>itor provides c<strong>on</strong>tinuous<br />

informati<strong>on</strong> about the extent of hazard. Resp<strong>on</strong>ders can make informed decisi<strong>on</strong>s about<br />

movements around the scene, approaches to victim rescue and public evacuati<strong>on</strong>.<br />

As injured victims are evacuated or n<strong>on</strong>-injured members of the public leave the scene,<br />

it is important to c<strong>on</strong>trol c<strong>on</strong>taminati<strong>on</strong>. Dangerous material may be attached to shoes<br />

and clothing and unnecessarily spread — even to hospitals and emergency vehicles.<br />

Well-equipped emergency resp<strong>on</strong>se and HAZMAT teams set up triage/dec<strong>on</strong>taminati<strong>on</strong><br />

areas to determine who is c<strong>on</strong>taminated and to locate the c<strong>on</strong>taminati<strong>on</strong> for removal.<br />

Transportable portal m<strong>on</strong>itors are the first line, followed by <str<strong>on</strong>g>more</str<strong>on</strong>g> close examinati<strong>on</strong> with<br />

handheld survey instruments to precisely locate the c<strong>on</strong>taminati<strong>on</strong>. Radiati<strong>on</strong> identifiers<br />

are also used to discriminate materials from the event vs. medical isotopes that may<br />

legitimately be present in some victims.<br />

The same equipment is also used to assess the extent and locati<strong>on</strong> of c<strong>on</strong>taminati<strong>on</strong>,<br />

keeping people away from dangerous materials until cleanup can proceed.<br />

DECEMBER 5, 2005 22 GSN: GOVERNMENT SECURITY NEWS


For <str<strong>on</strong>g>more</str<strong>on</strong>g> informati<strong>on</strong> go to www.info.ims.ca/5111-016


A Special Supplement to GSN<br />

EMERGENCY ALERT NOTIFICATION<br />

HOW TO...<br />

...spread the word of a sudden emergency to<br />

5,000 employees, a public venue or even an<br />

entire community in 30 sec<strong>on</strong>ds.<br />

Release of Sarin nerve agent in office buildings, a truck bomb in a sports arena or a dirty<br />

bomb threat in a community are but a few of the nati<strong>on</strong>al planning scenarios published<br />

by DHS. Specific companies have been warned that their building plans and pers<strong>on</strong>nel<br />

movements were being tracked and found <strong>on</strong> PCs in Southwest Asia. Being prepared to<br />

rapidly disseminate accurate emergency informati<strong>on</strong> before, during and after an attack<br />

is critical in mitigating casualties.<br />

To be affective, a Mass Notificati<strong>on</strong> System (MNS) must be able to deliver timely, c<strong>on</strong>cise<br />

and event-specific instructi<strong>on</strong>s of what to do (and what not to do) in resp<strong>on</strong>se to a threat.<br />

Often, different messages must be sent to different time z<strong>on</strong>es, whether indoors or outdoors,<br />

as the situati<strong>on</strong> warrants. Rather than siren t<strong>on</strong>es, pre-recorded and live voice<br />

messaging are key comp<strong>on</strong>ents of such notificati<strong>on</strong>s. Today’s best MNS systems feature<br />

secure digital wireless technology that prevents jamming, interference and eavesdropping<br />

by the enemy, and self-healing capabilities that protect the network in the event of<br />

a disaster.<br />

An MNS can operate stand-al<strong>on</strong>e or be integrated into indigenous security systems. A<br />

chemical/biological agent detecti<strong>on</strong> system relays the informati<strong>on</strong> to the MNS, which in<br />

turn issues warnings, instructi<strong>on</strong>s and commands using voice (outdoor speaker towers<br />

and indoor loudspeakers) and visual devices (LED signs and strobes) to pers<strong>on</strong>nel within<br />

sec<strong>on</strong>ds. Rapid and automatic resp<strong>on</strong>ses can be generated using scripts and prerecorded<br />

messages, helping prevent the attack or guiding people to safety during an<br />

attack.<br />

Due to the complexity of threats such as chemical <str<strong>on</strong>g>attacks</str<strong>on</strong>g>, the use of voice is most important<br />

to provide specific life-saving instructi<strong>on</strong>s. When warning times are short or n<strong>on</strong>existent,<br />

the message becomes even <str<strong>on</strong>g>more</str<strong>on</strong>g> critical. Your soluti<strong>on</strong> to alerting pers<strong>on</strong>nel is<br />

an MNS that gets the right message to the right people at the right time.<br />

DECEMBER 5, 2005 24 GSN: GOVERNMENT SECURITY NEWS


For <str<strong>on</strong>g>more</str<strong>on</strong>g> informati<strong>on</strong> go to www.info.ims.ca/5111-017


A Special Supplement to GSN<br />

GUARD SERVICES<br />

HOW TO...<br />

...select a guard services provider<br />

From highly sensitive DoD military installati<strong>on</strong>s to federal buildings, security guards<br />

ensure the protecti<strong>on</strong> of both government employees, assets and the general public. A<br />

successful c<strong>on</strong>tractor should have relevant experience with your missi<strong>on</strong>. The c<strong>on</strong>tractor<br />

should also offer financial stability and a proposal, with references, that dem<strong>on</strong>strates<br />

a complete understanding of your requirements.<br />

Things to c<strong>on</strong>sider when procuring guard services:<br />

Does the offeror propose a management and supervisi<strong>on</strong> plan backed by the required<br />

corporate commitment to meet the specific needs of the c<strong>on</strong>tract C<strong>on</strong>tracts that are<br />

operated in urban close area envir<strong>on</strong>ments require different supervisi<strong>on</strong> procedures<br />

than c<strong>on</strong>tracts that are operated over large rural areas. A successful supervisi<strong>on</strong> plan<br />

must take into account factors such as how many supervisors are needed to adequately<br />

oversee all posts. If the c<strong>on</strong>tractor doesn’t account for supervising their staff, your staff<br />

may have to.<br />

Does the offeror provide the corporate infrastructure and necessary technological<br />

tools to effectively manage the c<strong>on</strong>tract Tools such as communicati<strong>on</strong>s equipment<br />

and scheduling software not <strong>on</strong>ly enable performance in an emergency, but also provide<br />

situati<strong>on</strong>al awareness and ensure that performance can be adequately measured.<br />

Adequate back office infrastructure to provide payroll, invoicing and quality c<strong>on</strong>trol is<br />

also critical to providing high quality security services.<br />

Does the offeror provide a resp<strong>on</strong>sible quote You get what you pay for. Many times,<br />

from a lack of experience, offerors do not take into account all of the expenses involved<br />

in c<strong>on</strong>tract operati<strong>on</strong>s such as collective bargaining agreements, labor laws and equipment<br />

costs. This can result in a c<strong>on</strong>tractor that finds itself under tremendous financial<br />

c<strong>on</strong>straints that may prove detrimental to its performance.<br />

There are <str<strong>on</strong>g>more</str<strong>on</strong>g> than 130 security guard services providers that hold GSA FSS schedules.<br />

When presented with such a highly competitive market, source selecti<strong>on</strong> authorities<br />

must exercise cauti<strong>on</strong> against selecting a c<strong>on</strong>tractor purely <strong>on</strong> price. Having a game<br />

plan that focuses <strong>on</strong> risk identificati<strong>on</strong> and cost realism, combined with a true best value<br />

procurement, makes possible a sustainable soluti<strong>on</strong> that can meet a customer’s missi<strong>on</strong><br />

critical security needs.<br />

DECEMBER 5, 2005 26 GSN: GOVERNMENT SECURITY NEWS


For <str<strong>on</strong>g>more</str<strong>on</strong>g> informati<strong>on</strong> go to www.info.ims.ca/5111-018


A Special Supplement to GSN<br />

INTEGRATED SECURITY SYSTEMS<br />

HOW TO...<br />

...build an integrated security system that leverages<br />

your existing technology<br />

There are several steps to take to ensure that your integrated security system meets<br />

your needs, leverages your existing technology and provides l<strong>on</strong>g-term investment protecti<strong>on</strong>.<br />

First, research best-of-breed comp<strong>on</strong>ents and systems for each security sub-system. You<br />

should be able to determine which vendors are the leaders in access c<strong>on</strong>trol, intrusi<strong>on</strong><br />

detecti<strong>on</strong>, CCTV and digital video management systems.<br />

Once you have a short list of vendors, you should ensure that each security sub-system<br />

offers integrati<strong>on</strong> and/or the availability of a Software Development Kit (SDK), which<br />

will facilitate seamless integrati<strong>on</strong> between the sub-systems. As part of this process,<br />

obtain a list of integrati<strong>on</strong> references. In many cases, you may be able to purchase integrati<strong>on</strong><br />

modules used in prior development of a specific project for a set price, rather<br />

than incurring costly development fees.<br />

Another important note about integrati<strong>on</strong> is that you should ensure each of the vendors<br />

that you are c<strong>on</strong>sidering partner relati<strong>on</strong>ships. That way you can mandate a vendorteam<br />

approach in the resp<strong>on</strong>ses to your RFP and ensure that future revisi<strong>on</strong>s to each<br />

vendor’s applicati<strong>on</strong> will maintain the integrati<strong>on</strong> you originally procured.<br />

Third, it is important that you can m<strong>on</strong>itor the total security system from <strong>on</strong>e central<br />

workstati<strong>on</strong>, rather than using a separate workstati<strong>on</strong> for each security sub-system vendor.<br />

This will ensure that your video surveillance operati<strong>on</strong> is as efficient and easy to<br />

manage as possible. You also may want to avoid systems that use comm<strong>on</strong> databases. If<br />

a sub-system fails, a distributed database, without sub-system dependencies, will ensure<br />

that each of the other sub-systems remain operati<strong>on</strong>al.<br />

Finally, award your project to the vendor team that provides the type of integrated soluti<strong>on</strong><br />

you require. Request reference sites of similar projects that the vendor has completed<br />

and ensure that the vendor dem<strong>on</strong>strates an ability to meet deadlines.<br />

DECEMBER 5, 2005 28 GSN: GOVERNMENT SECURITY NEWS


What can<br />

acti<strong>on</strong>able<br />

intelligence<br />

do for your<br />

security<br />

initiatives<br />

Verint Networked Video<br />

Soluti<strong>on</strong>s equip government<br />

organizati<strong>on</strong>s to minimize<br />

security exposures and<br />

address security threats before<br />

they can escalate.<br />

Verint Networked Video Soluti<strong>on</strong>s transform<br />

video images into acti<strong>on</strong>able intelligence - the<br />

just-in-time informati<strong>on</strong> to secure government<br />

facilities and protect assets and lives.<br />

Verint Video Soluti<strong>on</strong>s interface with your<br />

access c<strong>on</strong>trol, magnetometer, and other state-ofthe-art<br />

security systems, issuing automatic alerts<br />

about excepti<strong>on</strong>al events.<br />

Visit us <strong>on</strong> the Internet at:<br />

www.verint.com/videosoluti<strong>on</strong>s<br />

No w<strong>on</strong>der they call it Acti<strong>on</strong>able Intelligence<br />

For A Safer World.<br />

Verint. Powering Acti<strong>on</strong>able Intelligence.<br />

Copyright Verint, Inc, 2004. All rights reserved.<br />

For <str<strong>on</strong>g>more</str<strong>on</strong>g> informati<strong>on</strong> go to www.info.ims.ca/5111-019


A Special Supplement to GSN<br />

MASS NOTIFICATION SYSTEMS<br />

HOW TO...<br />

...notify thousands of military pers<strong>on</strong>nel or<br />

civilians of a sudden and critical change in<br />

their situati<strong>on</strong><br />

Mass notificati<strong>on</strong> systems are at the forefr<strong>on</strong>t in providing emergency notificati<strong>on</strong> to<br />

military and civilian pers<strong>on</strong>nel as well as visitors at military facilities around the world.<br />

Especially after the terrorist tragedies in the Middle East, the immediate notificati<strong>on</strong> of<br />

all base and command pers<strong>on</strong>nel has been recognized as a fundamental life safety and<br />

security requirement that needs to be addressed.<br />

Broadcast announcements for alerting military forces, family members, distinguished<br />

visitors and other pers<strong>on</strong>nel under base and command jurisdicti<strong>on</strong> should be adapted for<br />

both emergencies and general use. There is no need to have separate complex systems<br />

inside and outside a building for pers<strong>on</strong>nel alerting. Whether the announcement is for<br />

bad weather, a security threat, broadcasting taps or broadcasting a speech during a cerem<strong>on</strong>y,<br />

you should be able to prioritize the functi<strong>on</strong>ality and size of the system and plan<br />

for future expansi<strong>on</strong> when feasible.<br />

Equipment soluti<strong>on</strong>s for mass notificati<strong>on</strong> are flexible, expandable and use high security<br />

technology.<br />

A multi-functi<strong>on</strong> communicati<strong>on</strong>s system that incorporates emergency evacuati<strong>on</strong>, automated<br />

messaging, background music and general paging capabilities can be built to<br />

your specificati<strong>on</strong>s and budget. It can automatically broadcast emergency messages and<br />

provide general paging throughout a facility or in selected areas. The system can also<br />

be c<strong>on</strong>figured for wireless transmissi<strong>on</strong> for giant outdoor wide area voice applicati<strong>on</strong>s<br />

or it can be used within a base’s buildings such as dormitories, mess halls or auditoriums.<br />

With mass notificati<strong>on</strong>, military and civilian pers<strong>on</strong>nel can learn what acti<strong>on</strong>s to<br />

take during a crisis, whether to evacuate an entire area or move to a safe locati<strong>on</strong>. With<br />

the system’s flexibility, people can be kept out of harm’s way or listen to a speech during<br />

a graduati<strong>on</strong> cerem<strong>on</strong>y.<br />

DECEMBER 5, 2005 30 GSN: GOVERNMENT SECURITY NEWS


For <str<strong>on</strong>g>more</str<strong>on</strong>g> informati<strong>on</strong> go to www.info.ims.ca/5111-020


A Special Supplement to GSN<br />

NIGHT VISION<br />

HOW TO...<br />

...catch would-be intruders <strong>on</strong> your property in<br />

the middle of the night, without them even<br />

knowing you’re watching<br />

Catching and preventing intruders at high-risk facilities has l<strong>on</strong>g been a challenge —<br />

<strong>on</strong>e made <str<strong>on</strong>g>more</str<strong>on</strong>g> difficult when darkness falls. Traditi<strong>on</strong>ally, the workhorse product has<br />

been the surveillance camera, possibly integrated with perimeter lighting, intelligent<br />

software and/or some type of “night illuminati<strong>on</strong>.” However, the main problems with<br />

all these opti<strong>on</strong>s are their effective range of visibility and the necessary light sources.<br />

Nighttime illuminati<strong>on</strong> in most cases does not give you the visible range you require<br />

in the darkness<br />

The answer is thermal imaging technology. A high-quality thermal imaging camera<br />

can detect potential intruders from <str<strong>on</strong>g>more</str<strong>on</strong>g> than 3,000 feet away — and vehicles from<br />

even farther. They aren’t limited by light sources, are <str<strong>on</strong>g>more</str<strong>on</strong>g> effective in difficult weather<br />

c<strong>on</strong>diti<strong>on</strong>s and show people and vehicles in vast c<strong>on</strong>trast to the background, allowing<br />

easier detecti<strong>on</strong> both with your eye and with software. Placed at the perimeter,<br />

thermal-imaging cameras give security professi<strong>on</strong>als at high-risk facilities the early<br />

detecti<strong>on</strong> capabilities they need to protect people and property.<br />

Thermal imaging cameras detect heat signatures <strong>on</strong>ly, such as body temperatures versus<br />

light sources. Because no light is required, not <strong>on</strong>ly can you better detect intruders<br />

at l<strong>on</strong>ger range, but they can’t detect you watching them because you’re not emitting<br />

any light. You can operate in stealth mode. This results in your ability to identify<br />

security threats even in pitch-black darkness and makes thermal imaging cameras<br />

perfect for nighttime perimeter security. In brief, a thermal imaging camera’s advantages<br />

lead to earlier, <str<strong>on</strong>g>more</str<strong>on</strong>g> accurate threat detecti<strong>on</strong> and quicker resp<strong>on</strong>se times for<br />

your security team. You’ll have the ability to stop intruders — any<strong>on</strong>e, at any time of<br />

day or night, under any light c<strong>on</strong>diti<strong>on</strong> — before they enter your facility to inflict catastrophic<br />

damage.<br />

DECEMBER 5, 2005 32 GSN: GOVERNMENT SECURITY NEWS


For <str<strong>on</strong>g>more</str<strong>on</strong>g> informati<strong>on</strong> go to www.info.ims.ca/5111-021


A Special Supplement to GSN<br />

PERIMETER PROTECTION<br />

HOW TO...<br />

...secure any perimeter<br />

Securing the outer perimeter of a facility is often hampered by varying physical envir<strong>on</strong>ments,<br />

but the fundamentals never change. A comm<strong>on</strong> mistake in many perimeter<br />

security system designs is placing too much focus <strong>on</strong> technology and not enough attenti<strong>on</strong><br />

<strong>on</strong> the overall plan. In some cases, the entire budget is spent <strong>on</strong> a CCTV system, <strong>on</strong>ly<br />

to realize later that a single guard can’t watch multiple m<strong>on</strong>itors with any hope of detecting<br />

an unauthorized intrusi<strong>on</strong>. In any successful perimeter security plan there are five<br />

essential elements: Deter, Detect, Delay, Assess and Resp<strong>on</strong>d.<br />

Deterrents filter out alarms caused by harmless passersby. They can be warnings posted<br />

<strong>on</strong> the perimeter (such as signs at a main entrance) or they can be physical structures<br />

(such as barbed-wire strands <strong>on</strong> top of a fence.)<br />

Detecti<strong>on</strong> tells staff where to look. This is a critical element that is often overlooked or<br />

undervalued. On a large, or even medium-sized perimeter, guards and CCTV systems<br />

provide little detecti<strong>on</strong>. Electr<strong>on</strong>ic security systems (outdoor perimeter security sensors)<br />

provide the 24x7 vigilant detecti<strong>on</strong> required to make a perimeter security plan effective.<br />

Delay provides the time needed to assess the situati<strong>on</strong> and react to a potential threat.<br />

Assessment is the process of determining what type of resp<strong>on</strong>se, if any, is required. A<br />

lack of proper assessment can cripple a perimeter security plan. Verifying when you<br />

should send a resp<strong>on</strong>se, or what type of resp<strong>on</strong>se you should dispatch, decreases system<br />

cost and increases effectiveness.<br />

Resp<strong>on</strong>se is the acti<strong>on</strong> you take <strong>on</strong> a verified alarm. A perimeter security plan that incorporates<br />

deterrents, effective electr<strong>on</strong>ic intrusi<strong>on</strong> detecti<strong>on</strong>, sufficient delay and assessment<br />

can dispatch a powerful resp<strong>on</strong>se without the fear of false dispatch.<br />

Employ these five essential elements and you can secure any perimeter.<br />

DECEMBER 5, 2005 34 GSN: GOVERNMENT SECURITY NEWS


Outdoor<br />

Perimeter<br />

Security<br />

Specialists<br />

Reliable. Effective. Affordable.<br />

Early warning made easy.<br />

For <str<strong>on</strong>g>more</str<strong>on</strong>g> than 30 years, Magal-Senstar has been<br />

producing outdoor perimeter intrusi<strong>on</strong> detecti<strong>on</strong><br />

security systems that reliably detect intruders as<br />

so<strong>on</strong> as they enter restricted or sensitive areas,<br />

providing the instant advanced warning you or<br />

your security forces need to react. In thousands of<br />

sites, in <str<strong>on</strong>g>more</str<strong>on</strong>g> than 75 countries worldwide, people<br />

are <str<strong>on</strong>g>more</str<strong>on</strong>g> comfortable with their security knowing<br />

Magal-Senstar is defending the perimeter.<br />

• Covert Buried Cable Sensors<br />

• Fence Detecti<strong>on</strong> Sensors • Microwave Sensors<br />

• Barrier Sensors • Portable Sensors<br />

• Electrostatic Field Disturbance Sensors<br />

• Alarm M<strong>on</strong>itoring & C<strong>on</strong>trol Systems<br />

• DreamBox - All-in-One CCTV Soluti<strong>on</strong><br />

• Government & Military locati<strong>on</strong>s • Airports<br />

• Industrial & Commercial sites • Utilities<br />

• Correcti<strong>on</strong>al Facilities • VIP Residences<br />

For <str<strong>on</strong>g>more</str<strong>on</strong>g> informati<strong>on</strong> go to www.info.ims.ca/5111-022<br />

Magal-Senstar, Inc.<br />

43180 Osgood Rd., Frem<strong>on</strong>t, CA 94539<br />

T: +1.800.676.3300 F: +1.510.249.1540<br />

E: mkt@magalsenstarinc.com<br />

www.magalsenstarinc.com


A Special Supplement to GSN<br />

PERIMETER SURVEILLANCE<br />

HOW TO...<br />

...service your perimeter surveillance systems<br />

Maintainability is the cornerst<strong>on</strong>e of any surveillance applicati<strong>on</strong>. When a camera<br />

remains down for <str<strong>on</strong>g>more</str<strong>on</strong>g> than 15-20 minutes, the resulting vulnerability (loss of sight)<br />

can create a passive security breach that requires the costly deployment of live pers<strong>on</strong>nel<br />

to secure the area. Typical maintenance for pole- or structure-mounted cameras is<br />

often performed using a bucket truck. The availability or accessibility of such trucks can<br />

mean that a camera will remain off-line for several days. Excessive camera downtime can<br />

cripple any facility, port or border from being able to effectively mount a defense from<br />

impending threats.<br />

Acknowledging the importance of maintainability, which in most projects virtually<br />

always c<strong>on</strong>trols mounting height and locati<strong>on</strong>, camera deployment becomes an issue of<br />

“how high can the local bucket truck go” and whether “we can get a bucket truck to the<br />

area where the camera is to be located.” However, by employing a CCTV lowering system,<br />

camera locati<strong>on</strong>s are no l<strong>on</strong>ger determined by where or how high the bucket truck<br />

can go. If the best locati<strong>on</strong> for the camera pole is <strong>on</strong> a railway, <strong>on</strong> top of a parking deck<br />

or <strong>on</strong> a pier, cameras can be placed successfully without c<strong>on</strong>cern about how the bucket<br />

truck will access the camera.<br />

Regardless of the height or locati<strong>on</strong> selected, the ability to quickly and easily access the<br />

cameras for maintenance can make a huge difference in the overall success of their use.<br />

If the camera cannot be quickly and efficiently maintained, m<strong>on</strong>ey spent <strong>on</strong> the cameras<br />

themselves becomes a waste. The implementati<strong>on</strong> of a camera-lowering device allows a<br />

single pers<strong>on</strong> to access cameras in a matter of sec<strong>on</strong>ds. All maintenance or replacement<br />

can be d<strong>on</strong>e safely at ground level.<br />

This CCTV lowering device technology is already in use throughout most state departments<br />

of transportati<strong>on</strong> in their intelligent transportati<strong>on</strong> system deployments. This lowering<br />

technology is also currently used by the U.S. Customs and Border Protecti<strong>on</strong> service,<br />

NY/NJ Port Authority and Department of Defense at several locati<strong>on</strong>s. With the ability<br />

to perform required maintenance or replace a downed camera in less than 10 minutes,<br />

CCTV lowering systems should be an important c<strong>on</strong>siderati<strong>on</strong> for any perimeter security<br />

applicati<strong>on</strong>.<br />

DECEMBER 5, 2005 36 GSN: GOVERNMENT SECURITY NEWS


For <str<strong>on</strong>g>more</str<strong>on</strong>g> informati<strong>on</strong> go to www.info.ims.ca/5111-023


A Special Supplement to GSN<br />

SECURITY MANAGEMENT SYSTEMS<br />

HOW TO...<br />

...pull together alarm m<strong>on</strong>itoring, video<br />

surveillance, access c<strong>on</strong>trols and smart cards<br />

into an integrated system<br />

When designing a security management system that will ensure flawless interoperability<br />

between multiple, complex comp<strong>on</strong>ents — both now and into the future — a number<br />

of key elements are essential.<br />

The integrati<strong>on</strong> must be seamless. This implies a single system in which various comp<strong>on</strong>ents<br />

can be seamlessly plugged through well-defined “open interfaces” and behave as<br />

integral parts of the system.<br />

The system must be based <strong>on</strong> an open design that relies <strong>on</strong> current de facto computing<br />

standards for seamless integrati<strong>on</strong> with the corporate infrastructure, and that provides<br />

a standard way of integrating with the outside world to offer real-time, bi-directi<strong>on</strong>al<br />

data exchanges with external systems. Applicati<strong>on</strong> software must be designed using offthe-shelf<br />

objects libraries as well as the latest technologies and tools available.<br />

An integrated system must provide a single network and software platform that supports<br />

unlimited scalability. The system must offer centralized system c<strong>on</strong>figurati<strong>on</strong>,<br />

management, m<strong>on</strong>itoring and reporting, with a single, centralized data depository and<br />

a single graphical user interface for all applicati<strong>on</strong>s.<br />

The system must provide a seamless cardholder enrollment process. Biometric templates<br />

must be captured when the cardholder is enrolled, then distributed to access c<strong>on</strong>trollers<br />

or encoded directly to the cardholder’s smart card credential. The system must offer single-point<br />

encoding and management of all smart card data, and provide all the tools<br />

needed to manage ID-related informati<strong>on</strong>.<br />

The system must have a distributed network architecture, with all access decisi<strong>on</strong>s and<br />

template comparis<strong>on</strong>s being made and processed in real time at the field hardware,<br />

rather than relying <strong>on</strong> the host computer. The system must be able to link cameras to<br />

specific hardware devices to create an associati<strong>on</strong> in the central database, so that digital<br />

video clips can be linked in real time to associated alarms.<br />

When these characteristics are built into the design, a system can be created that satisfies<br />

an organizati<strong>on</strong>’s unique security requirements and achieves seamless interoperability<br />

between the comp<strong>on</strong>ent subsystems.<br />

DECEMBER 5, 2005 38 GSN: GOVERNMENT SECURITY NEWS


For <str<strong>on</strong>g>more</str<strong>on</strong>g> informati<strong>on</strong> go to www.info.ims.ca/5111-024


A Special Supplement to GSN<br />

THERMAL IMAGING<br />

HOW TO...<br />

...spot even the sneakiest intruder trying to<br />

enter your property at night or during bad<br />

weather<br />

As the need to maintain security 24 hours a day, seven days a week, in all weather c<strong>on</strong>diti<strong>on</strong>s<br />

increases, security professi<strong>on</strong>als are challenged to find real soluti<strong>on</strong>s for intrusi<strong>on</strong><br />

detecti<strong>on</strong>.<br />

More CCTV cameras in <str<strong>on</strong>g>more</str<strong>on</strong>g> locati<strong>on</strong>s and complicated security systems d<strong>on</strong>’t guarantee<br />

coverage in all c<strong>on</strong>diti<strong>on</strong>s. Unlit pathways become safe routes for intruders trying to<br />

gain access to your facility.<br />

The best soluti<strong>on</strong> to address all hour, all weather intrusi<strong>on</strong> detecti<strong>on</strong> is thermal imaging.<br />

Thermal imaging cameras detect the heat signatures of intruders and can identify a<br />

human presence from multi-kilometer distances.<br />

Thermal imaging also allows crisp, detailed imagery at night, with no additi<strong>on</strong>al lighting<br />

required. Additi<strong>on</strong>ally, thermal imaging cameras are able literally to see through<br />

weather c<strong>on</strong>diti<strong>on</strong>s such as fog, haze and smoke.<br />

For any<strong>on</strong>e who has a large area to m<strong>on</strong>itor, or a l<strong>on</strong>g fence line to survey, thermal<br />

imagers are ideal. With a wide-angle imager, you can detect movement in an area, then<br />

slew-to-cue a l<strong>on</strong>g range, high-resoluti<strong>on</strong> imager to identify the source of the disturbance.<br />

Thermal imaging also saves time — security officers can resp<strong>on</strong>d to alarms instantly by<br />

targeting the source of the alarm with a thermal imaging camera. By identifying alarm<br />

sources without having to be <strong>on</strong> the scene, security professi<strong>on</strong>als can weed out the false<br />

alarms and resp<strong>on</strong>d with the appropriate resources to real alarms.<br />

Using thermal imaging for intrusi<strong>on</strong> detecti<strong>on</strong> allows security professi<strong>on</strong>als to see what<br />

they are missing with traditi<strong>on</strong>al security cameras. Thermal imaging increases resp<strong>on</strong>se<br />

time, decreases false alarms and guarantees coverage of your facility in all c<strong>on</strong>diti<strong>on</strong>s.<br />

DECEMBER 5, 2005 40 GSN: GOVERNMENT SECURITY NEWS


77 Countries, 84 Events<br />

One Security Soluti<strong>on</strong><br />

FLIR ThermoVisi<strong>on</strong>®<br />

Preparing for the 2006 Winter Olympics, the security<br />

team at SAGAT Turin Airport needed a perimeter<br />

surveillance system that would operate 24/7 in snow,<br />

rain, and fog. They selected FLIR ThermoVisi<strong>on</strong>. Why<br />

Because ThermoVisi<strong>on</strong> harnesses the power of thermal<br />

imaging, allowing security professi<strong>on</strong>als to easily detect<br />

movement and identify threats. Now, instead of reacting<br />

to every tourist taking pictures or gust of wind, officials<br />

know where and when to react - even during the harshest<br />

winter c<strong>on</strong>diti<strong>on</strong>s. Whether it's tourists, torrents, or<br />

terrorists, ThermoVisi<strong>on</strong> is the 24/7 tool that identifies<br />

your trouble.<br />

ThermoVisi<strong>on</strong> ®<br />

Sentry II<br />

ThermoVisi<strong>on</strong> ®<br />

Integrati<strong>on</strong> Series <br />

ThermoVisi<strong>on</strong> ®<br />

2000 <br />

FLIR offers a broad spectrum of soluti<strong>on</strong>s, price points, and performance<br />

specificati<strong>on</strong>s for your specific requirements<br />

USA: 1.888.747.FLIR<br />

Internati<strong>on</strong>al: +44 (0) 1732 22 0011<br />

Learn <str<strong>on</strong>g>more</str<strong>on</strong>g> at:<br />

www.flir.com<br />

For <str<strong>on</strong>g>more</str<strong>on</strong>g> informati<strong>on</strong> go to www.info.ims.ca/5111-025


A Special Supplement to GSN<br />

VIDEO SURVEILLANCE<br />

HOW TO...<br />

...design a network-based video<br />

surveillance system<br />

Systems integrators and end-users who wish to make the transiti<strong>on</strong> to a network-based<br />

video surveillance system generally begin with the deployment of cameras — usually in<br />

remote areas such as a parking facility or satellite locati<strong>on</strong>s that require a dedicated network<br />

infrastructure. Cameras operating <strong>on</strong> a network are truly digital by definiti<strong>on</strong>.<br />

Digital signals being transmitted from a camera’s output across a network do not undergo<br />

any analog-to-digital c<strong>on</strong>versi<strong>on</strong>. Therefore, there is little c<strong>on</strong>cern about signal loss<br />

down the system’s chain as video signals are processed and eventually recorded. This<br />

presents a significant improvement in picture quality over c<strong>on</strong>venti<strong>on</strong>al analog-based<br />

systems.<br />

Ease of transmissi<strong>on</strong> and camera access are two other important operati<strong>on</strong>al benefits.<br />

Cameras can be accessed by their assigned addresses <strong>on</strong> an Ethernet-based LAN or WAN,<br />

using a standard Internet browser, just as you would access your favorite Web sites by<br />

their URL addresses. This provides system designers with many different opti<strong>on</strong>s when<br />

establishing the c<strong>on</strong>trol and access parameters for a video surveillance system, especially<br />

in the areas of software-based c<strong>on</strong>trol and digital video recording.<br />

It’s important that you (and / or the system designer you are working with) clearly define<br />

the role that IP cameras and related networked products will fulfill in your system.<br />

Here are a few key questi<strong>on</strong>s to c<strong>on</strong>sider:<br />

• What will be the man-to-machine interface PC or c<strong>on</strong>venti<strong>on</strong>al NTSC hardware<br />

• How many users / locati<strong>on</strong>s will be viewing the camera / system<br />

• What infrastructure is available or will be needed for the camera / system — WAN,<br />

DSL, T1 or LAN subnet<br />

• What are the image quality / frame rate c<strong>on</strong>siderati<strong>on</strong>s<br />

• Will recording be accomplished remotely, from a central locati<strong>on</strong> or some combinati<strong>on</strong><br />

of the two Will recording be d<strong>on</strong>e <strong>on</strong> a server or stand-al<strong>on</strong>e DVRs<br />

DECEMBER 5, 2005 42 GSN: GOVERNMENT SECURITY NEWS


For <str<strong>on</strong>g>more</str<strong>on</strong>g> informati<strong>on</strong> go to www.info.ims.ca/5111-026


A Special Supplement to GSN<br />

VIDEO SURVEILLANCE EQUIPMENT<br />

HOW TO...<br />

...protect your CCTV cameras from damage,<br />

destructi<strong>on</strong> and deluge<br />

Video camera security/surveillance is the best site protecti<strong>on</strong> against terroristic acts, and<br />

budgets being what the are, usually the <strong>on</strong>ly protecti<strong>on</strong>. If camera surveillance doesn’t<br />

actually protect its site, it may well identify the terrorists — as recently dem<strong>on</strong>strated in<br />

the L<strong>on</strong>d<strong>on</strong> Underground — and so prevent a future calamity.<br />

Therefore, it behooves you to protect your expensive camera from various forces, both<br />

human and natural, so it can perform its intended functi<strong>on</strong>. Various studies have<br />

revealed that terrorists generally have above average intelligence, so you can be sure<br />

they will try to disable the camera if they can do so expeditiously and swiftly.<br />

Protect against...<br />

Destructi<strong>on</strong>: The housing must withstand repeated blows from a crowbar, tire ir<strong>on</strong> or<br />

similar implement. Therefore, the housing should be fabicated of heavy-gauge steel, not<br />

plastic, aluminum or mild steel.<br />

Theft: A key to theft protecti<strong>on</strong> is the utilizati<strong>on</strong> of special vandal-resistant fasteners.<br />

Deflecti<strong>on</strong> off target: Terrorists and thieves know that tilting a camera’s aim as little as<br />

two degrees off target often will leave it useless. The bracket should allow the housing<br />

to be readily aligned and locked in place. Bracket mount should be designed so that the<br />

weight of a 200 pound man hanging from the enclosure will not deflect it.<br />

Hurricanes: A bracket design that protects against target aim deflecti<strong>on</strong> by manual force<br />

will also protect against Category 5 hurricane winds. Protecti<strong>on</strong> against torrential rain<br />

is afforded by careful c<strong>on</strong>structi<strong>on</strong>, close tolerances and proficient use of neoprene gaskets<br />

and O-rings. Housing should have a high IP enclosure rating. Ratings of 67 and 68<br />

are optimal.<br />

Rust and Corrosi<strong>on</strong>: Housing should be fabricated from 304 stainless steel. Other steels<br />

will rust; and aluminum will pit and powder.<br />

Firearms: Even though the housing may be mounted well out of reach, its window can<br />

still be shot out. To prevent this, window material must be triple-ply ballistic polycarb<strong>on</strong>ate.<br />

Ballistic window gauge should be 3/4” thick to protect against 9 mm, and 38 cal.<br />

slugs 1 1/2” gauge resists a .357 Magnum.<br />

Failure: In c<strong>on</strong>clusi<strong>on</strong>: Buy quality; buy <strong>on</strong>ce and buy right. Cheap, “budget” housings<br />

(or virtually anything) cost infinitely <str<strong>on</strong>g>more</str<strong>on</strong>g> in the l<strong>on</strong>g run — the price of failure is astr<strong>on</strong>omical,<br />

and could be catastrophic. D<strong>on</strong>’t let it happen <strong>on</strong> your watch. It is not well<br />

known that a product doesn’t have to have electric or electr<strong>on</strong>ic comp<strong>on</strong>ents to get an<br />

Underwriters Laboratories listing. UL exhaustively tests a variety of functi<strong>on</strong>s, and its<br />

mark ensures that manufacturers live up to their claims.<br />

DECEMBER 5, 2005 44 GSN: GOVERNMENT SECURITY NEWS


Set it and Forget it<br />

SecureCam ® by SecureVue Inc.<br />

Protects your Video Camera...<br />

For Sure and Forever<br />

Defies terrorists, vandals & thieves<br />

THEY CAN’T GET IT<br />

THEY CAN’T BREAK IT<br />

THEY CAN’T DAMAGE IT<br />

THEY CAN’T SHOOT IT OUT<br />

THEY CAN’T TILT ITS AIM OFF TARGET<br />

SecureCam Protects Against Weather Extremes: Hurricane Force Winds Torrential Rains<br />

Corrosive Envir<strong>on</strong>ments. So impregnable, it earned this incredible guarantee:<br />

The incredible guarantee<br />

The housing itself is guaranteed forever against breakage,<br />

deformati<strong>on</strong> and corrosi<strong>on</strong>. Your camera is guaranteed too!<br />

If your camera inside a SecureCam housing is damaged, or<br />

stolen, we will replace the camera.<br />

The SecureCam can’t be moved off target<br />

•SecureVue has a patented tamper-resistant bracket<br />

mount that is easily aimed <strong>on</strong> horiz<strong>on</strong>tal and vertical<br />

axes.<br />

•It is locked in place by a proprietary hex wrench that<br />

protects it against manual force.<br />

•Protected by two U.S. patents, SecureCam is the <strong>on</strong>ly<br />

totally vandal-proof housing in the world<br />

The SecureCam is invulnerable and bulletproof<br />

•Entire housing is heavy-gauge type 304 stainless steel<br />

and the window is 3/4” gauge ballistic three-ply polycarb<strong>on</strong>ate,<br />

which stops 9 mm or 38 caliber bullets.<br />

The SecureCam image is always right-side-up<br />

•Camera enclosure compartment is cylindrical and<br />

rotatable — a patented feature — so the m<strong>on</strong>itor’s<br />

image is still in an upright positi<strong>on</strong> even when the housing<br />

is mounted upside-down or vertically, and locked.<br />

Buy SecureCam. Enjoy Peace of Mind.<br />

UL Listed • Highest IL-68 Rating<br />

Holds two U.S. Patents<br />

SecureVue Inc.<br />

251 East 51st Street, New York, NY 10022<br />

ph: 212-752-5960; fax: 212-888-7387<br />

e-mail: d<strong>on</strong>@securevue.net<br />

Web site: www.securevue.net<br />

For <str<strong>on</strong>g>more</str<strong>on</strong>g> informati<strong>on</strong> go to www.info.ims.ca/5111-027


A Special Supplement to GSN<br />

X-RAY<br />

HOW TO...<br />

...use X-ray technology to screen airline passengers,<br />

airline cargo and the U.S. Mail.<br />

X-ray technology has provided the basis of security screening for decades and will c<strong>on</strong>tinue<br />

to play a vital role in the future. Like any technology, X-ray has strengths and<br />

weaknesses and when used al<strong>on</strong>e can be inadequate at detecting some types of threats.<br />

The most effective way to screen passengers and cargo employs X-ray al<strong>on</strong>g with other<br />

approaches. When complementary technologies are combined into a single system,<br />

detecti<strong>on</strong> is improved and security is enhanced.<br />

Passenger screening can be improved with backscatter systems that complement today’s<br />

metal detectors. Backscatter X-ray is completely safe, available today and is the most<br />

effective way to screen for n<strong>on</strong>-metallic threats such as explosives or ceramic weap<strong>on</strong>s<br />

that may be c<strong>on</strong>cealed under clothing.<br />

Quadrupole res<strong>on</strong>ance (QR), in combinati<strong>on</strong> with X-ray, can be deployed to detect automatically<br />

the most dangerous and hard to find categories of explosives in both baggage<br />

and mail. Combined X-ray and QR systems are now available.<br />

The most effective way to screen airborne cargo is high energy X-ray combined with<br />

neutr<strong>on</strong> analysis. The additi<strong>on</strong> of neutr<strong>on</strong> analysis provides automatic detecti<strong>on</strong> of<br />

explosives (by gamma-ray spectroscopy) whereas X-ray al<strong>on</strong>e provides an image that<br />

requires operator inspecti<strong>on</strong>. Automatic detecti<strong>on</strong> is a vital part of cargo screening<br />

because it reduces false alarms and preserves the rapid flow of commerce.<br />

Technology al<strong>on</strong>e is not the answer. Resources are limited, m<strong>on</strong>ey does not grow <strong>on</strong> trees<br />

and our society must find a lawful and effective way to allocate the vast majority of security<br />

spending to the small fracti<strong>on</strong> of passengers and cargo that pose real threats.<br />

Without a resoluti<strong>on</strong> to this problem, scarce resources can drive an unacceptable outcome<br />

— the lowest-comm<strong>on</strong>-denominator.<br />

When looking to solve the most difficult challenges in security, X-ray combined with<br />

other complementary methods provides a logical path forward.<br />

DECEMBER 5, 2005 46 GSN: GOVERNMENT SECURITY NEWS


For <str<strong>on</strong>g>more</str<strong>on</strong>g> informati<strong>on</strong> go to www.info.ims.ca/5111-028


From Page 1<br />

GE builds a diverse security portfolio<br />

strives to offer innovative soluti<strong>on</strong>s to<br />

provide optimal security to its customers.<br />

According to GE Homeland<br />

Protecti<strong>on</strong> President Dennis Cooke,<br />

GE reviewed its businesses<br />

a few years ago and<br />

picked those in its portfolio<br />

that would grow faster<br />

than the global ec<strong>on</strong>omy<br />

and to which GE could<br />

bring value through technology<br />

and service. GE<br />

identified the top four<br />

growth markets as<br />

healthcare, energy, water<br />

and security. Noting that<br />

the security arena had<br />

significant potential, GE<br />

Security officially formed its homeland<br />

protecti<strong>on</strong> divisi<strong>on</strong> <strong>on</strong> Dec. 6, 2004.<br />

Chief Marketing Officer Mike<br />

Cavanaugh said that, while the official<br />

creati<strong>on</strong> of the divisi<strong>on</strong> took place <strong>on</strong>ly<br />

a year ago, the events of September<br />

11, 2001, heightened the company’s<br />

dedicati<strong>on</strong> to security issues, causing<br />

it to devote significant resources to<br />

acquire companies like I<strong>on</strong> Track and<br />

InVisi<strong>on</strong>, as well as to the research<br />

and development of new homeland<br />

security soluti<strong>on</strong>s.<br />

Initially, Cavanaugh said, the divisi<strong>on</strong><br />

was very focused <strong>on</strong> the aviati<strong>on</strong> market.<br />

While GE Security is still c<strong>on</strong>centrated<br />

in that arena, the company’s<br />

focus has evolved to include soluti<strong>on</strong>s<br />

for transportati<strong>on</strong> and mass transit,<br />

local and state governments, correcti<strong>on</strong>s<br />

and law enforcement, nuclear<br />

and petrochemical plants and the private<br />

sector as well.<br />

“Aviati<strong>on</strong>, the military, and the federal<br />

government c<strong>on</strong>tinue to be big markets<br />

for us,” Cavanaugh said. “But<br />

there are lots of opportunities in mass<br />

transit and the private sector. We’ve<br />

just scratched the surface.”<br />

Cavanaugh said the marketplace has<br />

been very receptive to GE and its products,<br />

although he is not sure to what<br />

extent the market is aware of GE’s<br />

broad range of soluti<strong>on</strong>s.<br />

“GE is a name that’s familiar and<br />

that people can trust,” Cavanaugh<br />

said. “Protecting people, assets and<br />

community is at the absolute core of<br />

what we do.”<br />

PRODUCT FOCUS<br />

From a product perspective, GE’s<br />

homeland protecti<strong>on</strong> divisi<strong>on</strong> relies primarily<br />

<strong>on</strong> two technologies: trace products<br />

and explosives detecti<strong>on</strong> systems<br />

(EDS).<br />

Trace products are categorized as<br />

portables, desktop devices or portals,<br />

and are most comm<strong>on</strong>ly used by the<br />

federal government, the military and<br />

law enforcement. Trace products are<br />

Dennis Cooke<br />

used for explosives and narcotics<br />

detecti<strong>on</strong>.<br />

GE’s VaporTracer is a portable, handheld<br />

device used to detect and identify<br />

microscopic traces of explosives or narcotics<br />

in a matter of sec<strong>on</strong>ds.<br />

At seven pounds, the<br />

VaporTracer has numerous<br />

applicati<strong>on</strong>s at airports,<br />

seaports, military<br />

bases, embassies, nuclear<br />

plants, correcti<strong>on</strong>s facilities,<br />

crime scenes and<br />

other venues. With instant<br />

results, operators aren’t<br />

required to analyze data.<br />

Instead, they can c<strong>on</strong>centrate<br />

<strong>on</strong> obtaining samples<br />

by swiping, direct<br />

sampling or vacuum sampling.<br />

One applicati<strong>on</strong> of the VaporTracer<br />

is its use at military bases in the<br />

Middle East. Door handles of vehicles<br />

are swabbed before the vehicles are<br />

allowed past checkpoints or entry into<br />

secured areas.<br />

“We’ve gotten really positive<br />

feedback from the troops,”<br />

Jim Housman, government<br />

and military sales manager,<br />

said of the company’s explosive<br />

trace detecti<strong>on</strong> (ETD)<br />

technology.<br />

With approximately 1,000<br />

units in Iraq, the ETD was<br />

recently employed to locate<br />

improvised explosive<br />

devices (IEDs).<br />

“You never know when<br />

something will have an<br />

impact,” Housman added.<br />

Another portable trace<br />

device being used by law<br />

enforcement, customs and<br />

borders officials, forensics<br />

labs and first resp<strong>on</strong>ders is<br />

StreetLab, a seven-pound<br />

substance identificati<strong>on</strong><br />

system. With a single test,<br />

StreetLab uses laser-based<br />

Raman technology to identify<br />

a wide range of c<strong>on</strong>traband-like<br />

explosives, powders<br />

and pills, without damaging the original<br />

sample. No chemicals are used in<br />

the identificati<strong>on</strong> of unknown substances,<br />

making this methodology both<br />

ec<strong>on</strong>omical and safe to use. The device<br />

c<strong>on</strong>tains an extensive library of identified<br />

substances that can be updated<br />

and expanded by the user.<br />

Categorized as a desktop device, the<br />

Itemiser FX is used to detect traces of<br />

explosives and narcotics in a matter of<br />

sec<strong>on</strong>ds with the imprint of a single<br />

finger. Shaped like a projector with an<br />

instructi<strong>on</strong>al screen, Itemiser FX can<br />

be used at security checkpoints, such<br />

as airport security terminals, public<br />

transportati<strong>on</strong> and government buildings,<br />

prior to allowing entry. With this<br />

system, people can do the screening<br />

themselves, while being m<strong>on</strong>itored<br />

remotely by security pers<strong>on</strong>nel.<br />

Introduced last September, the<br />

Itemiser FX is in beta testing in the<br />

Persian Gulf nati<strong>on</strong> of Qatar and by<br />

the U.S. Coast Guard.<br />

Yotam Margalit, marketing leader of<br />

aviati<strong>on</strong> and transportati<strong>on</strong>, envisi<strong>on</strong>s a<br />

number of uses for the Itemiser FX<br />

technology. For example, it could be<br />

introduced into GE’s shoe scanner or<br />

as part of a mass transit kiosk where<br />

passengers are screened when purchasing<br />

their boarding passes. In the l<strong>on</strong>g<br />

term, Margalit said the Itemiser FX<br />

could be used as part of the baggage<br />

checking process at airports, which he<br />

expects to be <str<strong>on</strong>g>more</str<strong>on</strong>g> highly scrutinized<br />

in the future.<br />

GE’s EntryScan, a trace product categorized<br />

as a portal, is used to do full<br />

body scans at a point of entry. Using<br />

n<strong>on</strong>-intrusive technology, the user<br />

walks through the entry scan portal<br />

that resembles a<br />

metal detector used in federal buildings<br />

and airports. The user is then tested<br />

for explosives and narcotics residue.<br />

The EntryScan product is currently<br />

being used <strong>on</strong> visitors to the Statue of<br />

Liberty who must be screened before<br />

entry into the federal m<strong>on</strong>ument. GE<br />

executives point out that the end user<br />

determines the protocol as to how and<br />

by whom the mechanism functi<strong>on</strong>s,<br />

and what acti<strong>on</strong>s will be taken if explosives<br />

or narcotics are detected.<br />

In additi<strong>on</strong> to its current use,<br />

Margalit expects the EntryScan to be a<br />

key comp<strong>on</strong>ent in the company’s visi<strong>on</strong><br />

for the security checkpoint of the<br />

future, an integrated approach that<br />

envisi<strong>on</strong>s using a combinati<strong>on</strong> of technologies<br />

to enhance security.<br />

On the EDS side of the house, GE<br />

employs several technologies to identify<br />

explosives and weap<strong>on</strong>s. Using X-ray<br />

diffracti<strong>on</strong>, for example, GE’s CTX<br />

machines screen checked baggage for<br />

objects falling within a certain density<br />

that are known to be explosives or<br />

weap<strong>on</strong>s. When suspicious items are<br />

found, the CTX machine identifies the<br />

object based <strong>on</strong> its molecular signature.<br />

If an item is found to be a potential<br />

threat, the system triggers an<br />

alarm, and the object appears <strong>on</strong> a<br />

screen for evaluati<strong>on</strong> by a trained technician.<br />

It is then flagged for sec<strong>on</strong>dary<br />

screening according to the end user’s<br />

security policies and procedures.<br />

Certified by the TSA, the CTX 5500<br />

DS is the most widely used EDS system<br />

in the world. Although specific<br />

locati<strong>on</strong>s were not shared with GSN,<br />

Margalit did <strong>say</strong> that GE has the<br />

largest market share of such devices in<br />

airports today.<br />

“It’s a big thing for us right now,”<br />

Margalit said. “We have a physical<br />

product certified by the TSA. That’s a<br />

very exciting element for us.”<br />

In additi<strong>on</strong>, Margalit said this<br />

product has the potential for<br />

reducing manpower as well<br />

as the human error inherent<br />

in the screening<br />

process.<br />

“Security technology<br />

actually has the potential<br />

for reducing<br />

costs,” he said.<br />

Another EDS product<br />

developed by GE is<br />

a shoe scanner that<br />

scans shoes without<br />

having to be removed.<br />

Instead, the passenger<br />

steps <strong>on</strong>to a small<br />

bridge that scans the<br />

soles of the pers<strong>on</strong>’s<br />

shoes for metals and explosives.<br />

In additi<strong>on</strong>, GE offers its<br />

millimeter wave imaging portal<br />

as an alternative body imaging device.<br />

Using harmless, n<strong>on</strong>-i<strong>on</strong>izing radiati<strong>on</strong>,<br />

the portal takes a full body scan<br />

to generate a three-dimensi<strong>on</strong>al image<br />

of a given subject. The operator looks<br />

for anomalies that are not a part of the<br />

anatomy. Subjects who are cleared may<br />

c<strong>on</strong>tinue through the security checkpoint,<br />

while those in questi<strong>on</strong> will proceed<br />

to a security team for further<br />

investigati<strong>on</strong>. This device replaces<br />

metal detectors and is c<strong>on</strong>sidered to be<br />

far less intrusive.<br />

Of some c<strong>on</strong>cern with this product,<br />

however, is the percepti<strong>on</strong> that a pers<strong>on</strong>’s<br />

privacy might be invaded. Chief<br />

technology officer Jay Hill addressed<br />

those c<strong>on</strong>cerns, stating that GE deals<br />

regularly with privacy sensitivities all<br />

DECEMBER 5, 2005 48 GSN: GOVERNMENT SECURITY NEWS<br />

MARK KAPLAN


around the world.<br />

“Privacy is really important to us,” Hill<br />

said. “We want to do the right things.”<br />

While not a part of GE’s homeland<br />

protecti<strong>on</strong> business, GE Security’s<br />

Commerce-Guard is another innovative<br />

product designed to protect assets. The<br />

CommerceGuard c<strong>on</strong>tainer security<br />

system includes a c<strong>on</strong>tainer security<br />

device (CSD) that, when armed, alerts<br />

officials electr<strong>on</strong>ically if an ocean-going<br />

c<strong>on</strong>tainer has been opened. If the c<strong>on</strong>tainer<br />

is not opened, a tracking report is<br />

provided al<strong>on</strong>g the route. However, if it<br />

has been opened, officials at key transit<br />

points are notified of the trespass so<br />

that further acti<strong>on</strong> can be taken. Using<br />

radio frequency technology, the product<br />

is being used worldwide to protect<br />

cargo, its carriers and recipients.<br />

LIVING UP TO EXPECTATIONS<br />

Cooke said GE’s homeland protecti<strong>on</strong><br />

business has “absolutely” lived up to the<br />

company’s expectati<strong>on</strong>s in its first year.<br />

While historically focused <strong>on</strong> the area<br />

of aviati<strong>on</strong>, Cooke said the company is<br />

growing quickly in the internati<strong>on</strong>al<br />

market and is working toward increasing<br />

passenger security, efficiency and<br />

throughput, while reducing the end<br />

user’s costs.<br />

As homeland protecti<strong>on</strong> celebrates<br />

its first anniversary this m<strong>on</strong>th, Cooke<br />

expects the business to expand into<br />

other vertical markets, including<br />

nuclear power plants, mass transit,<br />

correcti<strong>on</strong>s facilities and police<br />

departments.<br />

“We have the opportunity to integrate<br />

multiple technologies in a given market<br />

for use in other markets,” Cooke said.<br />

“We’re excited about security and are<br />

pleased to be in the space.”<br />

BEATING THE COMPETITION<br />

Since 9/11, a number of vendors have<br />

brought homeland security products to<br />

the marketplace. N<strong>on</strong>e, however, has<br />

d<strong>on</strong>e so in quite so diversified a way as<br />

General Electric. It is the <strong>on</strong>ly company<br />

that has combined CT technology, X-ray<br />

diffracti<strong>on</strong>, trace products and biotechnology<br />

al<strong>on</strong>g with <str<strong>on</strong>g>more</str<strong>on</strong>g> traditi<strong>on</strong>al<br />

GE’s “security checkpoint of the future” envisi<strong>on</strong>s using multiple technologies<br />

security products to solve its customers’<br />

challenges.<br />

“We’re the company that has all of<br />

these technologies available, and our<br />

objective is to pull them together into<br />

comprehensive soluti<strong>on</strong>s for customers,”<br />

Cooke said. “I d<strong>on</strong>’t think<br />

anybody in the world has that today<br />

outside GE.”<br />

In additi<strong>on</strong>, GE prides itself <strong>on</strong> its<br />

training and customer support services.<br />

Not <strong>on</strong>ly does it train end users to operate<br />

its products, but it also provides<br />

<strong>on</strong>going service, support, maintenance<br />

and repair as needed. It can even provide<br />

financing when needed.<br />

“It’s a full turn-key soluti<strong>on</strong>,”<br />

Housman said.<br />

WHAT’S NEXT<br />

While GE officials would not speak<br />

about the company’s future acquisiti<strong>on</strong><br />

plans, they did <strong>say</strong> the company would<br />

allocate additi<strong>on</strong>al resources to its trace<br />

business and to the CT technology used<br />

for checked baggage, including new<br />

technology to determine the c<strong>on</strong>tent of<br />

bags. It will also devote funds to reducing<br />

the number of false alarms generated<br />

by such systems, as well as costs for<br />

the end user.<br />

“Our passi<strong>on</strong> for technology is the key<br />

to solving the world’s problems and<br />

driving organic growth,” Cooke said.<br />

“We are zeroed in <strong>on</strong> technology development<br />

to solve the key problems in the<br />

world and to be both a good and a great<br />

company.”<br />

“A great company is defined as a<br />

company that is profitable and able to<br />

grow, and a good company means that<br />

we do things that help solve the<br />

world’s problems.”<br />

For <str<strong>on</strong>g>more</str<strong>on</strong>g> informati<strong>on</strong> go to www.info.ims.ca/5111-008<br />

GSN: GOVERNMENT SECURITY NEWS 49 DECEMBER 5, 2005


From Page 1<br />

CBP copes with heavy traffic at the border<br />

Protecti<strong>on</strong> port director holds his left hand<br />

in the classic wingman positi<strong>on</strong> with <strong>on</strong>e<br />

plane which he <strong>say</strong>s represents security at<br />

the 12 o’clock positi<strong>on</strong> and the right hand<br />

representing rapid logistics at the 6 o’clock<br />

positi<strong>on</strong>.<br />

But in the war <strong>on</strong> terrorism, Garza said<br />

he wants equilibrium between security and<br />

the logistical nightmare of expediting thousands<br />

of trucks and railroad cars that travel<br />

through this south Texas community.<br />

“I want a balance between security and<br />

moving people to their destinati<strong>on</strong>s,” Garza<br />

said, moving his hands to the 3 o’clock and<br />

9 o’clock positi<strong>on</strong>s. Standing outside his<br />

office, located within 50 feet of the<br />

Lincoln-Juarez Bridge, Garza said he has a<br />

goal of moving each vehicle heading south<br />

or north within 55 minutes, if not less.<br />

“If my people are not meeting these<br />

standards,” he said, “I am not happy, and if<br />

I keep people waiting for almost two hours,<br />

I have to inform my bosses in Washingt<strong>on</strong>,<br />

DC, about the reas<strong>on</strong> for those delays.”<br />

Technology has helped agents like Garza<br />

to try to secure the U.S.-Mexican border,<br />

while moving passengers and freight<br />

through Laredo. The United States Visitor<br />

and Immigrant Status Indicati<strong>on</strong><br />

Technology (US-VISIT) program helps<br />

Garza and the DHS staff identify both possible<br />

risks as well as those who pose low<br />

risk. With the help of specialized radar and<br />

other sensors, U.S. Customs and Border<br />

Protecti<strong>on</strong> agents can quickly expedite the<br />

movement of either tractor trailers or<br />

freight trains.<br />

“If an agent suspected something was<br />

wr<strong>on</strong>g, it could take him up to six hours to<br />

manually inspect a vehicle,” said Jose<br />

Uribe, the U.S. Customs and Border<br />

Protecti<strong>on</strong> assistant port director of trade<br />

operati<strong>on</strong>s. “Now,” he c<strong>on</strong>tinued, “the<br />

same agent could inspect a vehicle with a<br />

special X-ray in about six to eight minutes.”<br />

Agents have special gamma ray m<strong>on</strong>itoring<br />

devices, and each agent wears a pers<strong>on</strong>al<br />

radiati<strong>on</strong> detector during his duties at ports<br />

like Laredo.<br />

“The CBP does not rely <strong>on</strong> any single<br />

technology or inspecti<strong>on</strong> process,” said<br />

Rick Pauza, the Laredo-based U.S.<br />

Customs and Border Protecti<strong>on</strong> public<br />

affairs officer. “Instead, officers and agents<br />

use these technologies in different combinati<strong>on</strong><br />

to substantially increase the likelihood<br />

that terrorist weap<strong>on</strong>s, including a<br />

nuclear or radiological weap<strong>on</strong>, will be<br />

detected and interdicted.”<br />

Adding a special freight inspecti<strong>on</strong> center<br />

for semi-trucks has also expedited the<br />

flow of goods via the 18-wheeled vehicles<br />

that travel down Interstate 35 from San<br />

Ant<strong>on</strong>io and other major throughways.<br />

“Having a separate facility has really<br />

helped us expedite these vehicles,” said<br />

Uribe, describing the difference the separate<br />

facility has <strong>on</strong> expediting both commercial<br />

and passenger vehicles through<br />

the port of Laredo.<br />

The inspecti<strong>on</strong> facility for trucks<br />

resembles that of Checkpoint Bravo from<br />

the days of a divided Germany. Set off<br />

from the people who drive pers<strong>on</strong>al autos<br />

for vacati<strong>on</strong>s, to visit families or to legally<br />

work in the U.S., the U.S. Customs<br />

and Border Protecti<strong>on</strong> facility changes<br />

staffing hourly to meet the 55-minute<br />

standard.<br />

Transportati<strong>on</strong> companies work with<br />

brokers to further expedite the inspecti<strong>on</strong><br />

paperwork needed to travel into Mexico<br />

and the U.S. Arriving early in the morning,<br />

these brokers can turn in the paperwork or<br />

they can use the Automated Commercial<br />

Envir<strong>on</strong>ment (ACE) to provide the documentati<strong>on</strong><br />

of goods moving between both<br />

countries for truckers who transit Laredo<br />

at 7 p.m. every day.<br />

Uribe said his staff works with their<br />

Mexican counterparts to make sure that<br />

his staff has enough people for holidays<br />

such as the Nov. 2 All Souls Day holiday<br />

and the Jan. 6 Feast of the Three Kings.<br />

“A lot of people try to make it home for<br />

these Mexican holidays, and we need to<br />

have sufficient staffing to handle them,”<br />

he said.<br />

Still, Garza said he knows that terrorists<br />

would love nothing better than to upset<br />

traffic between the two countries. “If a<br />

terrorist act has disrupted trade, it can<br />

have a major impact <strong>on</strong> our two<br />

ec<strong>on</strong>omies.”<br />

“Losing a bridge to terrorism could<br />

raise the cost of goods and add extra<br />

inc<strong>on</strong>venience,” said Joe McKinney, a<br />

professor of internati<strong>on</strong>al ec<strong>on</strong>omics at<br />

Baylor University.<br />

Trade between the two countries<br />

dropped by about 400,000 export and<br />

import vehicles in the first year following<br />

the 9/11 tragedy, Pauza said. His<br />

agency projects that this year shipping<br />

will return to the pre-9/11 levels.<br />

Even while technology has helped<br />

agents do their jobs in battling terrorism,<br />

deterring drug traffic and the flow<br />

of illegal immigrants through the ports,<br />

Uribe said his agents still have to rely<br />

up<strong>on</strong> training and experience.<br />

“Technology can <strong>on</strong>ly do so much,”<br />

he maintained,”but a well-trained agent<br />

who has a gut feeling can deter a terrorist<br />

or find a drug smuggler based <strong>on</strong> the<br />

way he observes the eyes of a driver<br />

crossing our border.”<br />

For <str<strong>on</strong>g>more</str<strong>on</strong>g> informati<strong>on</strong> go to www.info.ims.ca/5111-009<br />

DECEMBER 5, 2005 50 GSN: GOVERNMENT SECURITY NEWS


From Page 1<br />

Smart buildings can improve safety<br />

Fire Research Lab at the Nati<strong>on</strong>al<br />

Institute of Standards and Technology<br />

(NIST).<br />

Holmberg and his colleagues think<br />

there’s a better way. That’s why NIST is<br />

now studying how “intelligent” building<br />

systems can be used by first resp<strong>on</strong>ders to<br />

accurately assess real-time emergency<br />

c<strong>on</strong>diti<strong>on</strong>s. “In the Building and Fire<br />

Research lab,” said Holmberg, “our focus<br />

is <strong>on</strong> c<strong>on</strong>necting the first resp<strong>on</strong>der to<br />

informati<strong>on</strong> available from various c<strong>on</strong>trol<br />

systems.”<br />

Under NIST’s program, the building’s<br />

floor plans, al<strong>on</strong>g with data from moti<strong>on</strong>,<br />

heat, biochemical and other sensors and<br />

video cameras go directly to dispatchers.<br />

First resp<strong>on</strong>ders would also get status<br />

informati<strong>on</strong> c<strong>on</strong>cerning a specific building’s<br />

elevators, mechanical, lighting, security<br />

and fire systems, its temperature and<br />

smoke c<strong>on</strong>diti<strong>on</strong>s and most importantly,<br />

the locati<strong>on</strong>s of the building’s occupants.<br />

The key isn’t just having the technology.<br />

That already exists. The soluti<strong>on</strong> is creating<br />

an interface so that first resp<strong>on</strong>ders<br />

can m<strong>on</strong>itor the systems in these buildings,<br />

regardless of manufacturer, in case of<br />

an emergency. NIST is working to develop<br />

standards so that manufacturers can create<br />

intelligent building systems that use<br />

wireless networks and other types of communicati<strong>on</strong>s<br />

to send informati<strong>on</strong> to first<br />

resp<strong>on</strong>ders.<br />

“Company B may use different formats<br />

that cannot c<strong>on</strong>nect to the dispatch software<br />

or the building,” said Holmberg.<br />

“Both sides are proprietary and you have<br />

some proprietary gateway interface. Our<br />

focus is <strong>on</strong> getting those companies to <strong>say</strong><br />

what they’re doing.”<br />

Add intelligent software to read the<br />

building’s situati<strong>on</strong> while providing<br />

a model of the fire’s scale,<br />

and suddenly first<br />

resp<strong>on</strong>ders have a<br />

complete picture<br />

of what’s happening<br />

inside<br />

a building.<br />

“Intelligent<br />

software<br />

based <strong>on</strong><br />

alarms and<br />

temperature<br />

can tell you<br />

how big the<br />

fire is, how<br />

dangerous<br />

it is and how<br />

fast it’s<br />

growing,”<br />

Holmberg<br />

said.<br />

Not surprisingly, first<br />

resp<strong>on</strong>ders would welcome<br />

the data a building<br />

could provide to dispatchers.<br />

Lt. Dallas Lipp, of M<strong>on</strong>tgomery<br />

County Fire and Rescue in M<strong>on</strong>tgomery<br />

County, MD, has worked with NIST <strong>on</strong> the<br />

smart buildings program and thinks that<br />

the biggest advantage is its potential to help<br />

first resp<strong>on</strong>ders know exactly what’s going<br />

<strong>on</strong> in a building before they even get there.<br />

Others feel the same way.<br />

“The <str<strong>on</strong>g>more</str<strong>on</strong>g> informati<strong>on</strong> we have, the<br />

better,”<br />

said Bill<br />

Killen,<br />

president<br />

of the<br />

Internati<strong>on</strong>al<br />

Associati<strong>on</strong><br />

of Fire<br />

Chiefs and<br />

RANDALL KAPLAN<br />

a first<br />

resp<strong>on</strong>der<br />

for almost<br />

50 years.<br />

“It [smart<br />

technology]<br />

makes<br />

sense from<br />

a pre-fire<br />

planning<br />

perspective.”<br />

With software<br />

providing<br />

an idea of a<br />

fire’s scale, and sensors feeding informati<strong>on</strong><br />

back to the dispatchers, the incident<br />

commanders will not <strong>on</strong>ly know where<br />

the fire is but also how to resp<strong>on</strong>d. That<br />

means knowing how many trucks and<br />

people should be sent to the scene, as<br />

well as having a plan to fight the fire<br />

within 5 or 10 minutes of alert.<br />

Otherwise, firemen have to get to the<br />

scene and go inside the building to know<br />

how to properly mobilize. “The informati<strong>on</strong><br />

would be readily available to us in a<br />

comm<strong>on</strong> format,” Lipp said. “We would<br />

be better able to scale the event.”<br />

Smart technology also gives first resp<strong>on</strong>ders<br />

<str<strong>on</strong>g>more</str<strong>on</strong>g> c<strong>on</strong>trol. The incident commander<br />

is able to m<strong>on</strong>itor devices in the<br />

fire c<strong>on</strong>trol room, which could be a huge<br />

advantage in the case of a nuclear, biological<br />

or chemical attack that made the fire<br />

c<strong>on</strong>trol room inaccessible.<br />

Firefighters would also have fewer surprises<br />

when going into a burning building.<br />

“When we do send people in, they’d have<br />

greater situati<strong>on</strong>al awareness,” said Lipp.<br />

“For instance, if we see doors opening, we<br />

know people are in the building. Knowing<br />

where the people are in the building is <strong>on</strong>e<br />

of our ultimate goals. It’s very time c<strong>on</strong>suming<br />

to find people.”<br />

In the l<strong>on</strong>g run, finding people and saving<br />

lives is the first resp<strong>on</strong>der’s goal. “To<br />

be able to send informati<strong>on</strong> about the<br />

floorplan or informati<strong>on</strong> from sensors,<br />

detectors or video equipment, can<br />

absolutely be a remarkable tool,” said<br />

Killen. “I believe it would enhance the<br />

ability for us to do our jobs better as emergency<br />

resp<strong>on</strong>ders and would clearly help<br />

in preventing loss of lives.”<br />

DIRECTORY OF CONTACT INFORMATION FOR ADVERTISERS IN THIS ISSUE<br />

For <str<strong>on</strong>g>more</str<strong>on</strong>g> informati<strong>on</strong> from any of the companies listed below, please use the c<strong>on</strong>tact informati<strong>on</strong> presented here.<br />

Actcom Security Soluti<strong>on</strong>s<br />

Ad <strong>on</strong> page 52<br />

877-613-3580<br />

www.actcom.org<br />

For <str<strong>on</strong>g>more</str<strong>on</strong>g> info go to<br />

www.info.ims.ca/5111-010<br />

Canberra Industries, Inc.<br />

Ad <strong>on</strong> page 23<br />

800-243-4422<br />

www.canberra-hs.com<br />

For <str<strong>on</strong>g>more</str<strong>on</strong>g> info go to<br />

www.info.ims.ca/5111-016<br />

GSA Schedules, Inc.<br />

Ad <strong>on</strong> page 14<br />

301-805-1300<br />

www.gsa-schedules.com<br />

For <str<strong>on</strong>g>more</str<strong>on</strong>g> info go<br />

www.info.ims.ca/5111-007<br />

Intelagard<br />

Ad <strong>on</strong> page 21<br />

303-309-6309<br />

www.intelagard.com<br />

For <str<strong>on</strong>g>more</str<strong>on</strong>g> info go to<br />

www.info.ims.ca/5111-015<br />

Magal-Senstar Inc.<br />

Ad <strong>on</strong> page 35<br />

800-676-3300<br />

www.magalsenstarinc.com<br />

For <str<strong>on</strong>g>more</str<strong>on</strong>g> info go to<br />

www.info.ims.ca/5111-022<br />

RSA C<strong>on</strong>ference 2006<br />

Ad <strong>on</strong> page 3<br />

www.rsac<strong>on</strong>ference.com<br />

Varian<br />

Ad <strong>on</strong> page 19<br />

702-938-4859<br />

www.varian.com/SIP<br />

For <str<strong>on</strong>g>more</str<strong>on</strong>g> info go to<br />

www.info.ims.ca/5111-014<br />

Ameristar Fence<br />

Ad <strong>on</strong> page 55<br />

866-467-2773<br />

www.ameristarfence.com<br />

For <str<strong>on</strong>g>more</str<strong>on</strong>g> info go to<br />

www.info.ims.ca/5111-011<br />

Chyr<strong>on</strong><br />

Ad <strong>on</strong> page 4<br />

631-845-3880<br />

www.chytv.com<br />

For <str<strong>on</strong>g>more</str<strong>on</strong>g> info go to<br />

www.info.ims.ca/5111-001<br />

HID Corp.<br />

Ad <strong>on</strong> page 56<br />

800-237-7769<br />

www.hidcorp.com<br />

For <str<strong>on</strong>g>more</str<strong>on</strong>g> info go to<br />

www.info.ims.ca/5111-012<br />

L3 / Thermal Eye<br />

Ad <strong>on</strong> page 33<br />

800-990-3275<br />

www.thermal-eye.com<br />

For <str<strong>on</strong>g>more</str<strong>on</strong>g> info go to<br />

www.info.ims.ca/5111-021<br />

MG Squared<br />

Ad <strong>on</strong> page 37<br />

205-823-6688<br />

www.loweringsystems.com<br />

For <str<strong>on</strong>g>more</str<strong>on</strong>g> info go to<br />

www.info.ims.ca/5111-023<br />

Sceptor<br />

Ad <strong>on</strong> page 50<br />

816-360-3895<br />

www.sceptorindustries.com<br />

For <str<strong>on</strong>g>more</str<strong>on</strong>g> info go to<br />

www.info.ims.ca/5111-009<br />

Verint Systems Inc.<br />

Ad <strong>on</strong> page 29<br />

303-450-5900<br />

www.verint.com/videosoluti<strong>on</strong>s<br />

For <str<strong>on</strong>g>more</str<strong>on</strong>g> info go to<br />

www.info.ims.ca/5111-019<br />

ARGOTracker<br />

Ad <strong>on</strong> page 17<br />

520-202-2785<br />

www.gsn.argotracker.com<br />

For <str<strong>on</strong>g>more</str<strong>on</strong>g> info go to<br />

www.info.ims.ca/5111-013<br />

Evan Scott Group Int’l<br />

Ad <strong>on</strong> page 12<br />

610-940-1677<br />

www.evanscottgroup.com<br />

For <str<strong>on</strong>g>more</str<strong>on</strong>g> info go to<br />

www.info.ims.ca/5111-006<br />

Internati<strong>on</strong>al Fiber Systems<br />

Ad <strong>on</strong> page 5<br />

800-824-5990 x180<br />

www.ifs.com<br />

For <str<strong>on</strong>g>more</str<strong>on</strong>g> info go to<br />

www.info.ims.ca/5111-002<br />

Lenel Systems Int’l, Inc.<br />

Ads <strong>on</strong> pages 8 & 39<br />

585-248-9720<br />

www.lenel.com<br />

For <str<strong>on</strong>g>more</str<strong>on</strong>g> info go to<br />

www.info.ims.ca/5111-004, p.8<br />

www.info.ims.ca/5111-024, p.39<br />

Panas<strong>on</strong>ic<br />

Ad <strong>on</strong> page 43<br />

www.panas<strong>on</strong>ic.com/intelligent<br />

For <str<strong>on</strong>g>more</str<strong>on</strong>g> info go to<br />

www.info.ims.ca/5111-026<br />

SecureVueInc.<br />

Ad <strong>on</strong> page 45<br />

212-752-5960<br />

www.securevue.net<br />

For <str<strong>on</strong>g>more</str<strong>on</strong>g> info go to<br />

www.info.ims.ca/5111-027<br />

Wheelock Inc.<br />

Ad <strong>on</strong> page 31<br />

800-631-2148<br />

www.wheelockinc.com<br />

For <str<strong>on</strong>g>more</str<strong>on</strong>g> info go to<br />

www.info.ims.ca/5111-020<br />

To join this list of<br />

GSN advertisers,<br />

please c<strong>on</strong>tact<br />

Ed Tyler, Publisher, at<br />

212-925-7300, ext 232<br />

Black Hat<br />

Ad <strong>on</strong> page 49<br />

206-443-5489<br />

www.blackhat.com<br />

For <str<strong>on</strong>g>more</str<strong>on</strong>g> info go<br />

towww.info.ims.ca/5111-008<br />

FLIR Systems, Inc.<br />

Ad <strong>on</strong> page 41<br />

888-747-FLIR<br />

www.flir.com<br />

For <str<strong>on</strong>g>more</str<strong>on</strong>g> info go to<br />

www.info.ims.ca/5111-025<br />

InfoUSA<br />

Ad <strong>on</strong> page 10<br />

866-325-8140<br />

infousagov.com<br />

For <str<strong>on</strong>g>more</str<strong>on</strong>g> info go to<br />

www.info.ims.ca/5111-005<br />

MadahCom<br />

Ad <strong>on</strong> page 25<br />

941-487-2300<br />

www.madah.com<br />

For <str<strong>on</strong>g>more</str<strong>on</strong>g> info go to<br />

www.info.ims.ca/5111-017<br />

Rapiscan<br />

Ad <strong>on</strong> page 47<br />

310-978-1457<br />

www.rapiscansystems.com<br />

For <str<strong>on</strong>g>more</str<strong>on</strong>g> info go to<br />

www.info.ims.ca/5111-028<br />

US Protect<br />

Ads <strong>on</strong> pages 1, 7 & 27<br />

301-587-8001<br />

www.usprotect.com/gsn<br />

For <str<strong>on</strong>g>more</str<strong>on</strong>g> info go to<br />

www.info.ims.ca/5111-003, p.7<br />

www.info.ims.ca/5111-018, p.27<br />

GSN: GOVERNMENT SECURITY NEWS 51 DECEMBER 5, 2005


From Page 1<br />

GIS moves into security’s mainstream<br />

In a landmark achievement, President vant data for strategic planning. GIS can The Pennsylvania Enterprise<br />

Bush signed into effect the “Safe, also help emergency pers<strong>on</strong>nel track locati<strong>on</strong>s<br />

Geospatial Technologies Data<br />

Accountable, Flexible, Efficient<br />

using sophisticated mapping tech-<br />

Architecture (EGTDA) project has been<br />

Transportati<strong>on</strong> Equity Act: A Legacy for<br />

Users,” (HR 3) last August. The bill calls<br />

for inclusi<strong>on</strong> of GIS technology in any<br />

comprehensive interoperability or informati<strong>on</strong>-sharing<br />

plan.<br />

niques during times of actual incidents.<br />

The threat of terrorism and the dangers it<br />

presents is a challenge for all resp<strong>on</strong>ders. A<br />

prudent resp<strong>on</strong>se depends not <strong>on</strong>ly <strong>on</strong> federal<br />

agencies, but also <strong>on</strong> local public works<br />

funded by the U.S. Department of<br />

Homeland Security’s 2004 Informati<strong>on</strong><br />

Technology Evaluati<strong>on</strong> Program (ITEP)<br />

grant project. Pennsylvania is <strong>on</strong>e of 13<br />

states to receive this grant to enhance its<br />

Additi<strong>on</strong>ally, the Senate Appropriati<strong>on</strong>s departments and<br />

homeland security<br />

Committee has approved funding for a<br />

“Real Time Geospatial Video Sensor<br />

organizati<strong>on</strong>s.<br />

These organizati<strong>on</strong>s<br />

efforts.<br />

According to a<br />

Intelligence” project with the U.S. Army. have the logistical<br />

statement by<br />

Sen. C<strong>on</strong>rad Burns (R-MT), a staunch<br />

prop<strong>on</strong>ent of the project, said “we must<br />

expertise to expedite<br />

the resp<strong>on</strong>se and<br />

GeoDecisi<strong>on</strong>s, interoperable<br />

geospatial<br />

always be seeking ways to improve the carry out essential<br />

mapping services<br />

safety and effectiveness of our armed<br />

forces. Technological research such as this<br />

is a key comp<strong>on</strong>ent to not <strong>on</strong>ly ensuring<br />

the effectiveness of our troops, but making<br />

tasks when it comes<br />

to the preventi<strong>on</strong><br />

and detecti<strong>on</strong> of<br />

threats.<br />

and XML applicati<strong>on</strong><br />

Web services<br />

are being implemented<br />

to provide<br />

sure that they hold the edge far into the Since March<br />

data integrati<strong>on</strong><br />

future. I'm hopeful we will be able to<br />

maintain the funding for this program<br />

through the c<strong>on</strong>gressi<strong>on</strong>al process.”<br />

The use of GIS technology is vital in<br />

supporting our nati<strong>on</strong>'s homeland security<br />

efforts. The system is able to display tables<br />

based <strong>on</strong> geographic references in the<br />

2003, the DHS<br />

grant program, including the Office for<br />

Domestic Preparedness (ODP), FEMA<br />

and TSP, have dispersed $7 billi<strong>on</strong> to<br />

state governments for emergency preparedness<br />

and resp<strong>on</strong>se.<br />

One state that is an active player in the<br />

am<strong>on</strong>g state agencies<br />

and first resp<strong>on</strong>ders throughout the<br />

state. Creating this single source of data for<br />

homeland security will support decisi<strong>on</strong><br />

makers in generating intelligent maps and<br />

performing further geospatial analysis.<br />

“Geospatial technologies are essential to<br />

form of maps. GIS is a type of geospatial arena of geospatial technology is creating successful and effective homeland<br />

technology which is able to store and analyze<br />

data that represents geospatial features.<br />

GIS databases have been previously<br />

used to grant both governmental and n<strong>on</strong>governmental<br />

Pennsylvania. GeoDecisi<strong>on</strong>s, of Camp<br />

Hill, PA, has built a model that will make it<br />

feasible for all government levels to share<br />

geospatial data to enhance that state’s<br />

security and incident resp<strong>on</strong>se sys-<br />

tems to support threat assessment, planning,<br />

and resp<strong>on</strong>se capabilities,” said Jim<br />

Knuds<strong>on</strong>, director of the bureau of<br />

organizati<strong>on</strong>s access to rele-<br />

homeland security resp<strong>on</strong>se.<br />

geospatial technologies in the<br />

Pennsylvania Governor’s Office for<br />

Informati<strong>on</strong> Technology.<br />

Last year, C<strong>on</strong>gress directed $8 milli<strong>on</strong><br />

of the IT part of the 2005 DHS<br />

budget toward development of geospatial<br />

mapping.<br />

Last March, DHS issued detailed guidelines<br />

specifying the need for a closer look<br />

at the Commercial Equipment Direct<br />

Assistance Program (CEDAP). In these<br />

guidelines, the DHS announced a new<br />

pilot program designed to transfer GIS<br />

technology to smaller jurisdicti<strong>on</strong>s.<br />

The time has come for GIS capability to<br />

be channeled in a user-friendly way for<br />

smaller areas. This means DHS will have<br />

to shift its focus from larger to smaller<br />

areas, since smaller areas have proven to<br />

be <str<strong>on</strong>g>more</str<strong>on</strong>g> vulnerable and less than adequate<br />

in dealing with security threats.<br />

In his June 2004 c<strong>on</strong>gressi<strong>on</strong>al testim<strong>on</strong>y,<br />

Fred Corle, president of the Spatial<br />

Technologies Industry Associati<strong>on</strong>, noted<br />

that cities as well as counties have used<br />

GIS to track, analyze and resp<strong>on</strong>d to<br />

threats, which range from natural disasters<br />

to nati<strong>on</strong>al security.<br />

In hopes of increasing profitability and<br />

gaining an edge, companies are calling for<br />

governmental departments to subsidize<br />

GIS technology. With this boost, such<br />

companies hope to acquire a porti<strong>on</strong> of this<br />

marketplace before it becomes saturated.<br />

In a press release last August,<br />

Plangraphics, Inc., of Frankfort, KY,<br />

announced the extensi<strong>on</strong> of its GIS services<br />

c<strong>on</strong>tract, which will allow it to c<strong>on</strong>tinue<br />

For <str<strong>on</strong>g>more</str<strong>on</strong>g> informati<strong>on</strong> go to www.info.ims.ca/5111-010<br />

to pursue projects from multiple city agencies.<br />

Plangraphics has implemented a<br />

mapping applicati<strong>on</strong> (ArcIMS) and an<br />

Emergency Online Locator System<br />

(EMOLS). The programs have a spatial<br />

template design for emergency preparedness<br />

that allows for the extracti<strong>on</strong><br />

of GIS data and to share that informati<strong>on</strong><br />

via a portal.<br />

The most recent development in terms<br />

of integrati<strong>on</strong> of security systems has<br />

occurred at the Tallahassee Regi<strong>on</strong>al<br />

Airport. Vidient Systems Inc., of<br />

Sunnyvale, CA, has designed a new system<br />

called SmartCatch 2.5 which is based <strong>on</strong> a<br />

model by G5 Technologies, Inc., of<br />

Cherry Hill, NJ. SmartCatch uses realtime<br />

video data and feeds it into a GIS program<br />

to send alert messages to airport<br />

security. Bill Adams, CEO of G5<br />

Technologies, which is the systems design<br />

and general c<strong>on</strong>tractor for the project, said<br />

that G5 has added software that will let<br />

agencies c<strong>on</strong>sume data from various<br />

remote sensing devices such as cameras,<br />

pagers, radios and PDAs.<br />

“GIS can provide a unified envir<strong>on</strong>ment<br />

to make sensor and data systems <str<strong>on</strong>g>more</str<strong>on</strong>g> useable<br />

to the operators of those systems,”<br />

Adams added. “GIS systems are just beginning<br />

to hit the markets and will be <str<strong>on</strong>g>more</str<strong>on</strong>g><br />

user friendly as time progresses.”<br />

According to the market research firm<br />

IDC, based in Framingham, MA, spending<br />

<strong>on</strong> GIS software in 2004 was $1.8 billi<strong>on</strong>, of<br />

which $544 milli<strong>on</strong> was spent by U.S. federal,<br />

state and local government agencies.<br />

IDC’s senior c<strong>on</strong>sultant, David S<strong>on</strong>nan,<br />

noted that Envir<strong>on</strong>mental Systems<br />

Reasearch Institute, Inc. (ESRI), based in<br />

Redlands, CA, has roughly 80 percent of the<br />

software market share in the federal, state<br />

and local government space. ESRI programs<br />

specialize in technical/GIS c<strong>on</strong>sulting, and<br />

system upgrades and maintenance.<br />

Last February, with the help of ESRI,<br />

IBM was awarded the c<strong>on</strong>tract for providing<br />

IT services for a nati<strong>on</strong>-wide Multi-<br />

Hazard Flood Map Modernizati<strong>on</strong> project.<br />

The five-year project, with an estimated<br />

worth of $750 milli<strong>on</strong>, was commissi<strong>on</strong>ed<br />

by FEMA.<br />

Senior GIS product manager for IBM,<br />

David Beddoe, has been promoting Big<br />

Blue recently for its GIS-related work at the<br />

state and local level. The company is assisting<br />

San Francisco in applying geospatial<br />

technology for ec<strong>on</strong>omic development as<br />

well as emergency management initiatives.<br />

Similarly, Science Applicati<strong>on</strong>s<br />

Internati<strong>on</strong>al Corp. (SAIC), of San<br />

Diego, CA, is helping the Michigan State<br />

Police with its crisis management software<br />

by forging an alliance with Keyhole Corp.,<br />

of Mountain View, CA, a subsidiary of<br />

Google Inc. Through its alliance with<br />

Keyhole and in c<strong>on</strong>juncti<strong>on</strong> with Google<br />

Earth and Google Maps, SAIC is offering<br />

mapping informati<strong>on</strong> and images collected<br />

from satellites and airplanes.<br />

GIS technology allows a user to simultaneously<br />

view and manipulate numerous<br />

layers of data-sets. In an era of fast-paced<br />

and ever evolving technology, the arrival of<br />

GIS is extremely important and has presented<br />

several sectors of our society with<br />

untapped opportunities.<br />

DECEMBER 5, 2005 52 GSN: GOVERNMENT SECURITY NEWS


Da<strong>on</strong> Delivers Biometric Identity<br />

Assurance Software Products<br />

Da<strong>on</strong> enables system integrators to implement fast, flexible and<br />

secure identity-based soluti<strong>on</strong>s that meet the demands of government<br />

ID programs. Da<strong>on</strong>’s identity assurance product suite is vendor<br />

neutral, providing a choice of multiple platforms, multiple biometric<br />

types (finger, face, iris), multiple algorithms, multiple credentials and<br />

multiple databases <strong>on</strong> a standards-based open architecture, ensuring<br />

the future proofing of any system deployed. Independent assessments<br />

show that Da<strong>on</strong> provides a best-in-class platform for managing identities in Border Management<br />

Envir<strong>on</strong>ments, Civil Identity Applicati<strong>on</strong>s, Traveler ID Soluti<strong>on</strong>s and Employee Credentialing Soluti<strong>on</strong>s.<br />

Da<strong>on</strong><br />

Tel: 703.984.4000<br />

Web: www.da<strong>on</strong>.com<br />

Email: fi<strong>on</strong>a.darcy@da<strong>on</strong>.com<br />

ISO 14443 Lighted Keypad Reader<br />

The new ISO 14443 reader with lighted keypad from Integrated Engineering<br />

adds extra security to those access points where you need<br />

double (card + PIN) authenticati<strong>on</strong>. To improve the user PIN<br />

interface in low light areas, and after dark, red lights are built<br />

in to backlight the keypad butt<strong>on</strong>s. The backlighting is activated<br />

when a card is presented or key pressed. This combined<br />

card and PIN reader is fully c<strong>on</strong>figurable, providing the<br />

flexibility and compliance expected from all Integrated<br />

Engineering readers. The flash c<strong>on</strong>figurati<strong>on</strong> capability allows all these readers to be completely reprogrammed.<br />

The reader supports am<strong>on</strong>gst others Mifare, DESFire (PIV II compliant) and PIV 7816 SmartMX.<br />

Integrated Engineering<br />

Tel: 831.659.3218 or 717.666.1107<br />

Web: www.smart-id.com Email: info@smart-id.com<br />

Milest<strong>on</strong>e XProtect Enterprise<br />

Milest<strong>on</strong>e XProtect Enterprise is the world’s leading open platform<br />

IP video surveillance software. It manages unlimited cameras,<br />

multiple servers and multiple sites. Delivered with a Remote<br />

Client, Smart Client and opti<strong>on</strong>al PDA Client, XPE is well suited to<br />

the needs of an increasingly sophisticated security market. It is<br />

reliable and robust, providing support for the widest choice in network<br />

cameras from <str<strong>on</strong>g>more</str<strong>on</strong>g> than 30 manufacturers. You can view<br />

both JPEG and MPEG4 images at the same time – live or recorded<br />

– centrally, locally or remotely. XPE provides advanced management, fast searching, easy analysis and export<br />

of evidence. Open architecture provides endless integrati<strong>on</strong> opti<strong>on</strong>s with other systems.<br />

Milest<strong>on</strong>e Systems, Inc.<br />

Tel: 503.906.7910<br />

Web: www.milest<strong>on</strong>esys.com<br />

Optelecom-NKF<br />

Tel: 301.444.2200<br />

Web: www.optelecom-nkf.com<br />

Email: info@milest<strong>on</strong>esys.com<br />

MX Viewer PC-based Video Client<br />

Software<br />

As the fr<strong>on</strong>t-end interface for Optelecom-NKF’s suite of IP Video Network products,<br />

MX Viewer Lite offers the operator intuitive access to live images <strong>on</strong> a<br />

PC or laptop. Featuring live recording, two-way CD quality audio for PA systems<br />

or intercom, alarm handling and PTZ c<strong>on</strong>trol, MX Viewer provides a powerful<br />

tool to aid safety, security and remote m<strong>on</strong>itoring. The PC-based software<br />

allows simultaneous viewing of 1-4 high-quality images in full D1, 2/3D1,<br />

1/2D1 or CIF resoluti<strong>on</strong>. The software supports multicast streams, enabling a<br />

virtually unlimited number of MX Viewers to operate simultaneously.<br />

Email: marketing.us@optelecom-nkf.com<br />

Baxall Launches New ICE Camera<br />

Range<br />

Baxall, the leading British manufacturer of high-quality CCTV equipment<br />

and video network soluti<strong>on</strong>s, has launched the ICE Camera<br />

Range, so<strong>on</strong> to replace Baxall’s existing portfolio of cameras. Baxall<br />

is well known around the world for its quality CCTV cameras and has<br />

been first in the field with many technological advances and an<br />

extensive array of cameras for Homeland Security applicati<strong>on</strong>s. The<br />

ICE range features a new, modern design, smaller size and superior picture quality, which comes as a result<br />

of improved software technology, although the same highly competitive pricing structure remains. Product<br />

codes have also been adjusted to make ordering simpler.<br />

Baxall USA, Inc<br />

Tel: 719.282.6780<br />

Web: www.baxall.com/ice<br />

Email: marketing@baxall.com<br />

For <str<strong>on</strong>g>more</str<strong>on</strong>g> informati<strong>on</strong> go to<br />

www.info.ims.ca/5111-029<br />

For <str<strong>on</strong>g>more</str<strong>on</strong>g> informati<strong>on</strong> go to<br />

www.info.ims.ca/5111-031<br />

For <str<strong>on</strong>g>more</str<strong>on</strong>g> informati<strong>on</strong> go to<br />

www.info.ims.ca/5111-033<br />

For <str<strong>on</strong>g>more</str<strong>on</strong>g> informati<strong>on</strong> go to<br />

www.info.ims.ca/5111-035<br />

For <str<strong>on</strong>g>more</str<strong>on</strong>g> informati<strong>on</strong> go to<br />

www.info.ims.ca/5111-037<br />

Ph<strong>on</strong>eBase 2: First Ph<strong>on</strong>e Analysis System to<br />

offer Complete Legal Security<br />

Envisage Systems has moved to allay the fears of many police forces, c<strong>on</strong>cerned<br />

about the possible legal implicati<strong>on</strong>s if cell ph<strong>on</strong>es in their possessi<strong>on</strong><br />

should receive calls or messages while the ph<strong>on</strong>e's SIM card and memory are<br />

being analyzed by cell ph<strong>on</strong>e analysis systems. The steel APM (Acquisiti<strong>on</strong><br />

Preventi<strong>on</strong> Module) completely isolates the ph<strong>on</strong>e from all network c<strong>on</strong>necti<strong>on</strong>s,<br />

enabling the police to analyze the ph<strong>on</strong>e in completely secure c<strong>on</strong>diti<strong>on</strong>s.<br />

Inside the compact desktop enclosure, the ph<strong>on</strong>e can be interrogated by infra red or<br />

cable c<strong>on</strong>necti<strong>on</strong> without affecting the integrity of the evidence.<br />

Envisage Systems<br />

Tel: UK (01144) 1442 877 770<br />

Web: www.ph<strong>on</strong>ebase.info Email: info@ph<strong>on</strong>ebase.info<br />

The Smallest In-the-Ear<br />

RF Receiver<br />

invisity, the new RF receiver from Ph<strong>on</strong>ak Communicati<strong>on</strong><br />

Systems, is the smallest, and <strong>on</strong>ly, in-the-ear receiver in the<br />

world, improved to meet the requirements of the demanding<br />

security market. invisity will find applicati<strong>on</strong> in many situati<strong>on</strong>s<br />

where discreti<strong>on</strong> and freedom of movement are a necessity.<br />

invisity 4 channels with reprogrammable frequencies is<br />

bundled with the handheld invisity remote c<strong>on</strong>trol to<br />

change the pre-set channels, increase the volume or alter the audio level.<br />

Ph<strong>on</strong>ak Communicati<strong>on</strong>s AG<br />

Tel: Switzerland (01141) 26 672 9630<br />

Web: www.ph<strong>on</strong>akcom.ch Email: info@ph<strong>on</strong>akcom.ch<br />

Vehicle-borne N<strong>on</strong>-Lethal Deterrent<br />

System<br />

Minimizing danger to innocent bystanders, the vehicle-borne, retrofitted,<br />

N<strong>on</strong>-Lethal Deterrent (NLD) System from MS Instruments comprises<br />

Smoke, Sound and rear Air Burst / Multi-Stun firing sets. Aggressors<br />

such as pursuing gunmen are diverted, disoriented and deprived of the<br />

initiative. Transferable between all vehicles, the system enables the firing,<br />

from within a moving or stati<strong>on</strong>ary vehicle, of all or any of 12 externally<br />

mounted pyrotechnic units. To reach maximum output rate, the<br />

integral smoke unit takes 6 sec<strong>on</strong>ds, whilst the 155-decibel sound unit det<strong>on</strong>ates 1-1.5 sec<strong>on</strong>ds after<br />

being jettis<strong>on</strong>ed.<br />

MS Instruments plc<br />

Tel: UK (01144) 1732 749 580<br />

Web: www.msinstruments.co.uk/cps/skynews.wmv<br />

Skyquest Aviati<strong>on</strong><br />

Email: info@msinstruments.co.uk<br />

Display Soluti<strong>on</strong>s for the Aircraft Cockpit<br />

Skyquest Aviati<strong>on</strong> designs and manufactures airborne surveillance systems,<br />

rugged video recorders, multi-functi<strong>on</strong> LCD video and missi<strong>on</strong> displays,<br />

moving map systems, DGPS, microwave link systems, gyrostabilized<br />

camera platforms and cargo hook cameras. Now Skyquest has launched a<br />

new range of ultra-high-resoluti<strong>on</strong> aircraft missi<strong>on</strong> displays to complement<br />

new-technology stabilized cameras. It has also designed a unique<br />

video distributi<strong>on</strong> system which takes the feed from the airborne camera<br />

systems in its highest resoluti<strong>on</strong> and routes this via a single cable to any<br />

number of <strong>on</strong>board video displays and video recorders.<br />

Tel: UK (01144) 1628 785 143<br />

Web: www.skyquest.co.uk Email: info@skyquest.co.uk<br />

Plasan Sasa<br />

Tel: Israel (00972) 4 680 9000<br />

Web: www.plasansasa.com<br />

Advanced Tactical Assault Vest<br />

Plasan Sasa, a leading manufacturer of combat-proven ballistic protecti<strong>on</strong><br />

products in advanced composite materials, presents the Advanced<br />

Tactical Assault Vest. Developed in cooperati<strong>on</strong> with NATO’s internati<strong>on</strong>al<br />

associati<strong>on</strong> of police forces, TFWG, this highly engineered vest is<br />

specifically designed for the needs of Special Forces and police units.<br />

The erg<strong>on</strong>omic design offers not <strong>on</strong>ly comfort but also maximum coverage<br />

area. The ultra lightweight and flexible vest has a valve that can be<br />

adapted to the threat level and offers maximum protecti<strong>on</strong> against high<br />

velocity projectiles, such as AK-47 and NATO Ball.<br />

Email: plasan@plasan.com<br />

For <str<strong>on</strong>g>more</str<strong>on</strong>g> informati<strong>on</strong> go to<br />

www.info.ims.ca/5111-030<br />

For <str<strong>on</strong>g>more</str<strong>on</strong>g> informati<strong>on</strong> go to<br />

www.info.ims.ca/5111-032<br />

For <str<strong>on</strong>g>more</str<strong>on</strong>g> informati<strong>on</strong> go to<br />

www.info.ims.ca/5111-034<br />

For <str<strong>on</strong>g>more</str<strong>on</strong>g> informati<strong>on</strong> go to<br />

www.info.ims.ca/5111-036<br />

For <str<strong>on</strong>g>more</str<strong>on</strong>g> informati<strong>on</strong> go to<br />

www.info.ims.ca/5111-038<br />

GSN: GOVERNMENT SECURITY NEWS 53 DECEMBER 5, 2005


Pers<strong>on</strong>ality Profile<br />

John Banghart<br />

“On Duty”<br />

Current job:<br />

Director of Benchmark Services at The Center for Internet Security (CIS)<br />

Career steppingst<strong>on</strong>es:<br />

System and security administrator at OneMain.com (1994-2000); Director of Technology,<br />

Re-Route, Inc. (2000-2002); Director of Benchmark Services, CIS (2002-current)<br />

Educati<strong>on</strong>:<br />

Bachelor of Arts degree in English from Tows<strong>on</strong> State University, MD. CISSP and GCFA<br />

certificati<strong>on</strong>s.<br />

Homeland security missi<strong>on</strong>:<br />

Provide trusted security c<strong>on</strong>figurati<strong>on</strong> informati<strong>on</strong> to public and private instituti<strong>on</strong>s to help<br />

raise the bar <strong>on</strong> informati<strong>on</strong> security.<br />

Top job priority:<br />

Creati<strong>on</strong> of comprehensive security guidance across a wide range of technologies.<br />

Biggest obstacle:<br />

Finding the time to be involved with all the great security-related projects, both at CIS and<br />

across the industry.<br />

Homeland security involvement outside work:<br />

Participating <strong>on</strong> the FBI/SANS Top 20 development team; speaking <strong>on</strong> security topics at industry c<strong>on</strong>ferences.<br />

Your role model:<br />

My father, John Banghart, a successful businessman and gifted “people pers<strong>on</strong>”.<br />

Career ambiti<strong>on</strong>:<br />

To keep “fighting the good fight” for better informati<strong>on</strong> security for as l<strong>on</strong>g as I can.<br />

Birth year: 1971<br />

Hometown:<br />

Childhood nickname:<br />

Indiana, PA<br />

Johnny<br />

“At Ease”<br />

Current residence:<br />

Hernd<strong>on</strong>, VA<br />

Family:<br />

Wife Rebecca; s<strong>on</strong>s Stephen and Jeffrey<br />

Last book read:<br />

“The Art of Intrusi<strong>on</strong>,” by Kevin D. Mitnick<br />

Favorite film: “Inherit the Wind,” directed by Stanley Kramer (1960)<br />

Ideal vacati<strong>on</strong>:<br />

Going anywhere and leaving behind my mobile ph<strong>on</strong>e.<br />

Hobby/sport:<br />

Airsoft and playing computer games with my kids.<br />

Favorite meal:<br />

Clubs / groups:<br />

Anything Tex/Mex<br />

First Lego League; Odyssey of the Mind<br />

John Banghart enjoys time with his s<strong>on</strong>s Stephen and Jeffrey<br />

Inspiring quotati<strong>on</strong>:<br />

“An investment in knowledge always pays the best interest.” – Benjamin Franklin<br />

DECEMBER 5, 2005 54 GSN: GOVERNMENT SECURITY NEWS


For <str<strong>on</strong>g>more</str<strong>on</strong>g> informati<strong>on</strong> go to www.info.ims.ca/5111-011


For <str<strong>on</strong>g>more</str<strong>on</strong>g> informati<strong>on</strong> go to www.info.ims.ca/5111-012<br />

For <str<strong>on</strong>g>more</str<strong>on</strong>g> informati<strong>on</strong> go to www.info.ims.ca/5110-011

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!