11.07.2016 Views

GSN Magazine June 2016 Digital Edition

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Government Security News<br />

JUNE <strong>2016</strong> DIGITAL EDITION<br />

Why broadening U.S. – Mexico cooperation is good for America, by Walter Ewing,<br />

American Immigration Council – Page 8<br />

Also in this issue:<br />

Federal Court orders release of evidence blocked by Customs and Border Protection of deplorable conditions<br />

in Tucson facilities – Page 4<br />

Major scientific discovery: Post-Traumatic Stress Disorder found to be caused by physical trauma, by <strong>GSN</strong><br />

Columnist George Lane – Page 14<br />

Disaster Preparedness Report, Articles and Tech from Apprio, Emergency Communications Network and<br />

Convy on Net-Centric Security – Pages 21-28<br />

Winners in Airport, Seaport, Border Security Awards: Implant Sciences, Best Explosives Detection – Page 36;<br />

PureTech Systems, Best Video Analytics – Page 39


Winners in <strong>GSN</strong> <strong>2016</strong> Airport, Seaport,<br />

Border Security Awards Program<br />

Editor’s Note: Based on the exceptionally high quality of winning entries in our <strong>2016</strong> Airport, Seaport, Border<br />

Security Awards Program, <strong>GSN</strong> will publish entries and interviews with a dozen Winners in the program. The<br />

first two will appear in this <strong>June</strong> <strong>Digital</strong> <strong>Edition</strong>, and the remaining Winning entries will be covered in upcoming<br />

editions of <strong>GSN</strong>’s Daily Insider and Airport, Seaport, Border Security Weekly. See pages 36 through 41.<br />

– Adrian Courtenay, CEO/Editorial Director<br />

PureTech Systems: Winner, Best Video Analytics Solutions<br />

By Adrian Courtenay<br />

<strong>June</strong> 24, <strong>2016</strong> – PureTech Systems describes itself on its website as follows: “Founded in March, 2005,<br />

PureTech Systems is an Arizona based computer vision software company that develops and markets its<br />

patented PureActiv video analytics surveillance software, which is used for perimeter protection of critical<br />

facilities and infrastructure. Current customers include large deployments in several seaports, airports,<br />

military bases, transit railways, and country borders.”<br />

As the company put the case in its entry into the <strong>GSN</strong> Awards Program, “PureActiv geospatial video<br />

analytics provide security professionals with accurate, real-time alarms and video of suspicious activity<br />

in outdoor and remote environments while minimizing nuisance alarm.” That’s a mouthful, but when you<br />

consider the company’s markets, it’s clear that every word in that sentence is appropriate. Read more on<br />

Page 39.<br />

Implant Sciences: Winner, Best Explosives Detection Solution<br />

By Adrian Courtenay<br />

<strong>June</strong> 24, <strong>2016</strong> – As airports and nations around the globe become more concerned with every new act of<br />

terrorism, the U.S. Department of Homeland Security’s Transportation Security Administration (TSA) has<br />

committed tens of millions of dollars to an explosive trace detection (ETD) product: the Implant Sciences<br />

QS-B220.<br />

The TSA, considered the leading ETD evaluation agency in the world, qualified the QS-B220 for passenger<br />

and baggage screening in August of 2014. Shortly thereafter, the product became the first to pass<br />

Europe’s stringent laboratory testing protocol in October 2014. Since that time, the TSA has awarded Implant<br />

Sciences an exclusive ID/IQ (basically an open purchase order) for $162 million, followed by an order<br />

for 1,170 units. These units are being installed right now.<br />

In Europe, the QSB220 has been deployed at airports in The Netherlands, France, Germany, Belgium,<br />

Norway, Austria, the Czech Republic, Romania, Cyprus and Poland. Read more on Page 36.<br />

2


<strong>GSN</strong> <strong>June</strong> <strong>2016</strong> <strong>Digital</strong> <strong>Edition</strong> Table of Contents<br />

NEWS AND FEATURES<br />

Federal Court orders Customs & Border Protection<br />

to release evidence of deplorable conditions in<br />

Tucson detection facilities Page 4<br />

Hikvision honors children of first responders with<br />

ESA Youth Scholarship Page 5<br />

DOD’s “Immune System” strategy for Cyber<br />

Security Page 6<br />

Why broadening U.S.-Mexico cooperation is good<br />

for America, By Walter Ewing Page 8<br />

Pentagon announces end to transgender military<br />

ban on July 1st Page 10<br />

Post-traumatic Stress Disorder (PTSD) found to be<br />

caused by physical as well as physological trauma,<br />

By George Lane Page 14<br />

Campbell on Crypto: Big Data, Big Troubles Page 18<br />

Disaster Preparedness report: To be prepared is to<br />

be safe, by Mike Pena, Apprio Page 21<br />

Disaster Preparedness report: Emergency<br />

Communication Network offers enhanced safety options<br />

for emergency notification delivered by smart phone<br />

Page 24<br />

Convy on Net-Centric Security: New Mobile<br />

technologies for Disaster Response Page 26<br />

Six Tips for better unified IT monitoring in hybrid<br />

cloud environments, by Adelle Rydman Page 28<br />

Salient’s Laurence Rose discusses improving<br />

telemarketing programs through trusting work<br />

relationship Page 30<br />

U.S. Coast Guard Auxiliary celebrates 77th<br />

anniversary Page 31<br />

NUI Galway has received Horizon 2020 EU funding<br />

for ROCSAFE ITC using software and robots Page 32<br />

DHS announces Grant Allocations for fiscal year<br />

<strong>2016</strong> Preparedness Grants Page 34<br />

Call for Nominations: DHS requests nominations<br />

for <strong>2016</strong> National Seminar and Table Top Exercise<br />

(NITX) Page 35<br />

Winners Portraits – Implant Sciences, Winner,<br />

Best Explosives Detection Solution Page 36<br />

Winners Portraits – PureTech Systems, Winner,<br />

Best Video Analytics Page 39<br />

3


Federal court orders release of evidence blocked by<br />

Customs and Border Patrol of deplorable conditions<br />

in Tuscon detention facilities<br />

WASHINGTON D.C., <strong>June</strong> 27, <strong>2016</strong><br />

– Today, a federal district court unsealed<br />

some of the photographs central<br />

to ongoing litigation challenging<br />

deplorable and unconstitutional<br />

conditions in Border Patrol detention<br />

facilities in the agency’s Tucson<br />

Sector. The court also allowed the<br />

Arizona Republic newspaper to intervene<br />

in the case to argue for the<br />

release of the documents.<br />

The initial evidence released today<br />

is only a portion of the evidence<br />

submitted in support of a motion<br />

for preliminary injunction filed in<br />

December, with the government<br />

fighting the release of additional<br />

evidence remaining under seal. The<br />

injunction is based on compelling<br />

evidence of inhumane conditions<br />

in Tucson facilities—much of which<br />

was disclosed after the Court sanctioned<br />

Border Patrol for destroying<br />

video recordings from these facilities<br />

and failing to turn over other<br />

relevant documentation.<br />

“Border Patrol’s treatment of men,<br />

women and children in its custody<br />

is simply inexcusable and their lack<br />

of transparency shows their desire<br />

to avoid any public oversight or accountability,”<br />

said Mary Kenney, senior<br />

staff attorney for the American<br />

Immigration Council.<br />

“Every step the Government has<br />

taken in response to this lawsuit has<br />

been designed to delay this suit and<br />

hide the conditions present at these<br />

facilities,” said Louise Stoupe of<br />

Morrison & Foerster. “The Government<br />

should be using the resources<br />

4<br />

they are wasting in court to provide<br />

basic human necessities to those in<br />

its custody.”<br />

“Migrants detained in the Tucson<br />

sector have long suffered horrific<br />

conditions,” said Dan Pochoda, senior<br />

counsel for the ACLU of Arizona.<br />

“The Border Patrol continues<br />

to resist public transparency to en-<br />

More on page 42


Hikvision honors children of<br />

first responders with ESA Youth<br />

Scholarship<br />

CITY OF INDUSTRY, CA – <strong>June</strong> 6,<br />

<strong>2016</strong> – Hikvision® USA, the North<br />

American leader in innovative,<br />

award-winning CCTV and IP video<br />

surveillance products, is a proud<br />

supporter of the Electronic Security<br />

Association (ESA) Youth Scholarship.<br />

With co-contributors DMP<br />

and Monitronics, Hikvision is making<br />

it possible for ESA to provide<br />

college scholarships to two recent<br />

high school graduates whose parents<br />

are first responders.<br />

Since its creation in 1996, the ESA<br />

Youth Scholarship Program has<br />

awarded $621,500 in scholarship<br />

funds to children of police officers<br />

and firefighters. ESA, its affiliated<br />

chartered chapters, and sponsoring<br />

companies within the security industry<br />

make these scholarships possible<br />

and help young people achieve<br />

their goals of higher education.<br />

“The police officers and firefight-<br />

5<br />

ers that protect and serve our communities<br />

are true heroes and deserve<br />

our unwavering gratitude,” said<br />

ESA President Marshall Marinace.<br />

“These men and women put their<br />

lives on the line every day, and ESA<br />

on behalf of the electronic security<br />

industry is pleased to support these<br />

incredible families. Awarding scholarships<br />

to the first responders’ impressive<br />

children is one of the ways<br />

we can thank our deserving public<br />

safety partners and do our part to<br />

make their lives just a little easier.”<br />

Applicants were asked to write<br />

essays explaining what it meant to<br />

them to have their parent involved in<br />

securing the community. This year’s<br />

first-place winner was Katherine<br />

Waugh of Joel Barlow High School<br />

in Easton, CT. Her father, Steven<br />

Waugh, is chief at Easton Volunteer<br />

Fire Company #1 and was on the<br />

front line when Hurricane Sandy<br />

struck Connecticut. The secondplace<br />

winner, Trevor Carney, recently<br />

graduated from Irondequoit<br />

High School in Rochester, NY. His<br />

father, Patrick Carney, is a member<br />

of the Rochester Police Department.<br />

Both winners will be recognized at<br />

the Public Safety Luncheon at the<br />

Electronic Security Expo (ESX) in<br />

Fort Worth, TX on <strong>June</strong> 9.<br />

“Hikvision recognizes the invaluable<br />

contributions of first responders<br />

in keeping all of us safe,” com-<br />

More on page 43


DOD’s “Immune System” strategy for<br />

Cyber Security<br />

By Lloyd McCoy Jr.<br />

The Department of Defense (DOD)<br />

wants to combat cyber-attacks the<br />

same way the human body’s immune<br />

system uses layered defenses<br />

to protect key functions. The idea<br />

comes from the military principle<br />

that it’s harder for an adversary to<br />

overcome an intricate and multilayered<br />

defense than a single obstacle.<br />

This defense-in-depth strategy<br />

dominated the <strong>2016</strong> AFCEA Defensive<br />

Cyber Operations Symposium,<br />

held in Washington, DC this past<br />

April. Senior DOD leaders shared<br />

details about the programs and initiatives<br />

driving cyber requirements<br />

and shaping what the Department<br />

will need from industry.<br />

Understanding how this timehonored<br />

military doctrine applies<br />

to cyber security and how it all fits<br />

together to form a single security architecture<br />

is critical to anticipating<br />

where cybersecurity procurements<br />

will be concentrated.<br />

The Outer Layer<br />

The first layer, or outer layer, is how<br />

the DOD sees as perimeter defense<br />

of the DOD Information Network<br />

(DODIN).<br />

As the<br />

first line<br />

of defense<br />

for DOD<br />

against external<br />

attacks,<br />

cybersecurity<br />

capabilities Lloyd McCoy Jr.<br />

here have to<br />

be especially robust. The department<br />

will be looking for technology<br />

companies that have cross-domain<br />

and risk management solutions.<br />

The growing prevalence of cloud<br />

technology in the DOD enterprise<br />

applies here as well, especially when<br />

DOD data is hosted in a commercial<br />

cloud environment. Companies<br />

bringing a commercial cloud solution<br />

to DOD should be aware of the<br />

Cloud Access Points (CAP) since<br />

any sensitive data will need to traverse<br />

them before entering or leaving<br />

DOD’s network. Being aware of<br />

what the CAPs look like is important<br />

since they’ll require some customization.<br />

Plus IT solutions that<br />

work seamlessly with the CAPs will<br />

have a leg up on competitors that<br />

don’t.<br />

6<br />

The Middle Layer<br />

The second layer focuses on threats<br />

and vulnerabilities within the network<br />

itself. The most notable initiative<br />

within this layer is DOD’s Joint<br />

Regional Security Stacks, which are<br />

replacing what used to be localized<br />

security stacks. They cut down the<br />

number of threat vectors in the DO-<br />

DIN and improve its view of what’s<br />

happening inside, making it easier<br />

to identify a weakness and shore up<br />

boundary defenses for individual<br />

portions of the network. Analytics<br />

solutions are in big need here given<br />

the situational awareness that effective<br />

security at this level will bring<br />

to bear. Also, within this aspect of<br />

cyber defense, DOD will need to<br />

limit the ability for successful infiltrators<br />

to move around in DOD’s<br />

network so authentication tools will<br />

be in demand.<br />

The Inner Layer<br />

The last layer is synonymous with<br />

endpoint protection. These are<br />

desktop computers and mobile devices,<br />

numbering in the millions,<br />

operating within the Department.<br />

The requirements for endpoint protection<br />

will revolve around device


hardening, virtualization,<br />

workforce mobility, and<br />

lightweight, agile security<br />

tools that work on different<br />

operating systems and<br />

built on open standards.<br />

Clearly DOD cyber security<br />

spending, projected to be about $7<br />

billion in fiscal year 2017 according<br />

to budget documents, will continue<br />

to stay healthy for the foreseeable<br />

future. As cyber security strategies<br />

and procurement efforts become<br />

more formally structured around<br />

this layered defense approach, it’s<br />

important to remember that a single<br />

solution doesn’t exist<br />

in a bubble. With multiple<br />

layers involved (and<br />

even more vendors), the<br />

need for interoperability<br />

is here to stay and should be<br />

part and parcel a feature of any solution.<br />

Addressing local DOD security<br />

challenges is important of course,<br />

but any solution should also support<br />

and enhance DOD’s overarching<br />

defense-in-depth strategy. DOD<br />

C-level executives, along with the<br />

program managers controlling the<br />

dollars, don’t have it all figured out,<br />

so continual dialogue and engagement<br />

between industry and government<br />

is critical.<br />

Lloyd McCoy Jr. is a market intelligence<br />

consultant with immixGroup,<br />

an Arrow company that helps technology<br />

companies do business with<br />

the government. Lloyd focuses on Defense<br />

Department agencies, as well as<br />

public sector cyber security. He can<br />

be reached at Lloyd_McCoy@immixgroup.com<br />

or connect with him<br />

on LinkedIn at www.linkedin.com/<br />

in/lloydmccoy<br />

“We’re powered by new challenges.<br />

Our experience has made us experts<br />

at providing total security solutions.”<br />

PHIL BARRETT<br />

8 years • Power/Utility Business Development<br />

Our high standards help you meet yours. Providing superior<br />

perimeter security solutions is not just our mission.<br />

It’s personal. And that mission never stops.<br />

AMERISTARSECURITY.COM | 888-333-3422<br />

7


Why broadening U.S.-Mexico cooperation is<br />

good for America<br />

By Walter Ewing<br />

The U.S.-Mexico border is not simply<br />

the dividing line between two<br />

separate nations. It is a vast expanse<br />

of communities that span both sides<br />

of the border, integrating the United<br />

States and Mexico economically<br />

and socially. In other words, it is<br />

impossible to capture the reality of<br />

El Paso without also including Ciudad<br />

Juarez, or to understand daily<br />

life in San Diego without considering<br />

Tijuana. Numerous families and<br />

businesses stretch across the international<br />

boundary, and the ease or<br />

difficulty that they encounter in trying<br />

to cross that boundary—often<br />

on a daily basis—has ramifications<br />

for the economic well-being and social<br />

harmony of both nations.<br />

The subtext to all this is that the<br />

border is not all about “security.” If<br />

we want to create a better future for<br />

either the United States or Mexico,<br />

we need to focus on how to build up<br />

the economies and infrastructures<br />

of border communities rather than<br />

building walls designed to cut those<br />

communities in half. And that was<br />

the top-line message of a <strong>June</strong> 15<br />

conference at the Wilson Center’s<br />

Mexico Institute—the third annual<br />

8<br />

“Building a Competitive U.S.-Mexico<br />

Border” conference.<br />

The Mexico Institute’s Deputy Director,<br />

Christopher Wilson, emphasized<br />

at the start of the conference<br />

that the United States and Mexico<br />

are deeply intertwined at many levels.<br />

For instance, more than one million<br />

people cross the U.S.-Mexico<br />

border every day. And Mexico is the<br />

third largest trading partner of the<br />

United States, with $583.6 billion<br />

worth of goods and services moving<br />

both ways across the border in<br />

2015. Yet political debates over the<br />

U.S.-Mexico border are usually onedimensional,<br />

focusing only on unauthorized<br />

migration (even though<br />

more Mexicans now leave the United<br />

States every year than arrive).<br />

In a related vein, Rep. Beto<br />

O’Rourke (D-TX) noted the irony<br />

in the fact that so many Americans<br />

envision the border region as a<br />

dangerous place, even though border<br />

communities have some of the<br />

lowest crime rates in the country.<br />

In fact, El Paso is the safest city in<br />

the nation. However, Rep. O’Rourke<br />

emphasized that people are not going<br />

to give up their belief in a violence-ridden<br />

border on the basis<br />

of facts and figures alone. Equally<br />

important are emotional stories of


the contributions and sacrifices that<br />

Mexicans in the border region make<br />

every day as they attempt to build<br />

better lives for themselves and their<br />

families in the United States and in<br />

Mexico. These are the stories that<br />

will serve as an antidote to the grim<br />

narratives spun by politicians like<br />

Donald Trump.<br />

As opposed to building walls, one<br />

particularly important means of<br />

bettering life along the border is to<br />

invest in education. Melissa Floca,<br />

Interim Director of the Center for<br />

U.S.-Mexico Studies at UC San Diego,<br />

and Rebecca Vargas, President<br />

and CEO of the U.S.-Mexico Foundation,<br />

both emphasized binational<br />

programs for children and college<br />

students of all ages, to train them<br />

in STEM (science, technology, engineering,<br />

and mathematics) and to<br />

encourage bilingualism in English<br />

and Spanish. blob:https%3A// This mix of skills is<br />

well-suited mail.google.com/bebcf019-<br />

to a 21st century econ-<br />

f8dd-4b56-8c7c-5daf421140a9<br />

omy in a border environment. Floca<br />

also emphasized the importance of<br />

addressing the educational needs of<br />

DREAMers who have been deported<br />

to Mexico and are having difficulty<br />

integrating into not only a new<br />

school system, but a new society as<br />

well. According to Floca, there are<br />

about a million of these deported<br />

DREAMers in Mexico.<br />

As the “Building a Competitive<br />

U.S.-Mexico Border” conference<br />

made clear, the border region is far<br />

more multi-faceted than nativist<br />

fear-mongers would have us believe.<br />

This is a vibrant bi-national economy,<br />

society, and culture with enormous<br />

untapped potential. It is in<br />

the best interests of both the United<br />

States and Mexico that this potential<br />

be realized.<br />

“We aim to protect property, and provide<br />

peace of mind by providing remarkable<br />

perimeter security products and<br />

unrivaled service.”<br />

EMILY SULLIVAN<br />

11 years • Mission Critical Business Development<br />

We know people make the difference for your business and ours.<br />

Our experienced team thrives on providing the products and<br />

service that lead to total perimeter security solutions.<br />

AMERISTARSECURITY.COM | 888-333-3422<br />

9


Pentagon to announce end to transgender<br />

military ban on July 1st<br />

WASHINGTON, DC – Today, the<br />

American Military Partner Association<br />

(AMPA), the nation’s largest organization<br />

of lesbian, gay, bisexual,<br />

and transgender (LGBT) military<br />

families, praised the news that the<br />

Pentagon is expected to make history<br />

on July 1st by announcing the<br />

much anticipated end to the military’s<br />

ban on open service by transgender<br />

people.<br />

“Our transgender service members<br />

and their families are breathing<br />

a huge sigh of relief,” said AMPA<br />

President Ashley Broadway-Mack.<br />

“Soon, anyone who is qualified will<br />

finally be able to serve our great nation,<br />

regardless of their gender identity.<br />

We are eagerly anticipating the<br />

details of this historic announcement,<br />

and we are incredibly grateful<br />

for the leadership Secretary Carter<br />

has shown in getting us to this critically<br />

important point for our military<br />

families.”<br />

In July of last year, Secretary Carter<br />

first announced that the DoD<br />

would finally update the outdated<br />

regulations that prevent open service<br />

by transgender service members<br />

and would take six months to<br />

assess the impact of the change and<br />

work out the details. The working<br />

group started with the presumption<br />

that “transgender persons can serve<br />

openly without adverse impact on<br />

military effectiveness and readiness,<br />

unless and except where objective,<br />

practical impediments are identified.”<br />

In <strong>June</strong> of 2015, the American<br />

Medical Association approved<br />

a resolution saying there is “no<br />

medically valid reason to exclude<br />

transgender individuals from service<br />

in the U.S. military.”<br />

In March of 2015, AMPA<br />

launched an unprecedented joint<br />

report with the Transgender<br />

American Veterans Association<br />

10<br />

(TAVA) highlighting the tremendous<br />

harm the outdated regulations<br />

inflict on military families. The report<br />

notes, “The outdated regulations<br />

serve no purpose and only dehumanize<br />

and prevent qualified and<br />

capable individuals from enlisting<br />

and serving. The ban perpetuates<br />

trauma to all those involved, both<br />

the service member and their family.”<br />

There are an estimated 15,500<br />

transgender service members currently<br />

serving.<br />

For more information about the<br />

American Military Partner Association<br />

and LGBT military families,<br />

please visit our home on the web at<br />

www.MilitaryPartners.org.<br />

The American Military Partner Association<br />

is the nation’s largest organization<br />

of LGBT military spouses,<br />

families, and allies. Based in Washington<br />

DC, AMPA is committed to<br />

education, advocacy, and support for<br />

our “modern military families.”


Hazmat Science and Public Policy with George Lane<br />

Post-Traumatic Stress Disorder (PTSD)<br />

is Caused by Physical as well as<br />

Psychological Trauma<br />

By George Lane<br />

During World War 1, the psychological<br />

trauma of soldiers from<br />

concussions was attributed to the<br />

impact of exploding shells, causing<br />

“shell shock”, a term that first appeared<br />

in the British medical journal<br />

The Lancet in February 1915,<br />

only six months after the beginning<br />

of World War 1. “Shell shock” was<br />

characterized by “the dazed, disoriented<br />

state many soldiers experienced<br />

during combat or<br />

shortly thereafter”. 1 It<br />

was presumed that soldiers<br />

who experienced<br />

these symptoms were<br />

weak so treatment was<br />

brief with the “firm expectation<br />

that the soldier<br />

return to duty”. 2 However, even<br />

soldiers who were not exposed to<br />

exploding shells were experiencing<br />

similar symptoms.<br />

Because sixty-five percent of<br />

“shell-shocked” soldiers ultimately<br />

returned to the front lines, treatment<br />

was considered a success.<br />

However, another reason for this<br />

success was that if they didn’t return<br />

to the front, their own soldiers<br />

could kill them. Between 1914 and<br />

1918, the British Army identified<br />

80,000 men with what would now<br />

be defined as the symptoms of “shell<br />

shock”. Some who suffered from severe<br />

“shell shock” deserted. If caught<br />

they received a court martial and<br />

if sentenced to death were shot by<br />

a twelve-man firing squad. During<br />

In 2012, neuropathologist Dr. Daniel<br />

Perl was examining a slide of human<br />

brain tissue when he saw a distinctive<br />

pattern of tiny scars.<br />

14<br />

World War 1, 346 British and Commonwealth<br />

soldiers were executed<br />

for “desertion and cowardice”. 3<br />

The use of executions as a form<br />

of discipline during World War 1<br />

was summed up by British General<br />

Sir Horace Smith-Dorrien: “There<br />

is a serious prevalence of desertion<br />

to avoid duty in the trenches, especially<br />

in the<br />

8th Brigade,<br />

and I am sure<br />

that the only<br />

way to stop it is to carry out some<br />

death sentences”. As many as 700<br />

French soldiers were executed for<br />

similar offenses while only 48 of the<br />

150 German soldiers condemned<br />

by military courts were shot during<br />

World War 1. Paradoxically the<br />

abolition of flogging, one<br />

of the few progressive features<br />

of British reforms,<br />

contributed to the use of<br />

execution in World War<br />

1. 4 Until the conflict in<br />

Vietnam, psychiatrists<br />

believed that “shell shock” was the<br />

result of emotional problems rather<br />

than physical injury of the brain.<br />

However in 2012, neuropathologist<br />

Dr. Daniel Perl was examining<br />

a slide of human brain tissue when<br />

he saw a distinctive pattern of tiny<br />

scars. Perl had previously examined<br />

tissue from 20,000 brains for


Alzheimer’s and other degenerative<br />

disorders over four decades. He was<br />

an expert in the biology of brain disease,<br />

but this was unlike anything he<br />

had never seen.<br />

Perl had read a great deal about the<br />

men who suffered from “shell shock”<br />

during World War I and the doctors<br />

who struggled to treat them. He had<br />

seen a monument in central England<br />

called “Shot at Dawn,” dedicated to<br />

British and Commonwealth soldiers<br />

who were executed by a firing squad<br />

after being convicted of cowardice<br />

or desertion. 5 The monument is a<br />

stone figure of a blindfolded soldier<br />

in a military storm coat, with his<br />

hands bound behind him. Behind<br />

the monument are the names,<br />

ranks, ages, and dates of execution<br />

of all 346 soldiers. Perl believed<br />

some of these men probably<br />

had traumatic brain injuries<br />

from blasts and should not have<br />

been held responsible for their<br />

actions. He has begun looking<br />

into the possibility of obtaining<br />

brain samples of “shell-shocked”<br />

soldiers from that war, hoping to<br />

grant them the correct diagnoses<br />

they deserve.<br />

One brain Perl studied belonged<br />

to an American soldier<br />

who in 2009 had been five feet<br />

away when a suicide bomber<br />

detonated his explosives. The<br />

soldier survived the blast because of<br />

his body armor, but died two years<br />

later of a drug overdose after suffering<br />

effects familiar in the wars<br />

in Iraq and Afghanistan: memory<br />

loss, cognitive problems, inability<br />

to sleep, depression, and in many,<br />

suicide. Nearly 350,000 members<br />

of the military have been diagnosed<br />

with traumatic brain injury over the<br />

past 15 years, many from blast exposure.<br />

The real number is likely to<br />

be much higher, because so many<br />

are too proud to report an invisible<br />

wound.<br />

For years, many scientists have<br />

assumed that explosive blasts affect<br />

the brain in much the same way as<br />

15<br />

concussions from football or car accidents.<br />

Perl was a leading researcher<br />

on “chronic traumatic encephalopathy”,<br />

or C.T.E., which has caused<br />

dementia in N.F.L. players. Several<br />

veterans who died after suffering<br />

blast wounds have in fact developed<br />

C.T.E. But those veterans had other<br />

non-blast injuries too. No one had<br />

done a systematic post-mortem<br />

study of blast-injured troops. In<br />

2010 the Pentagon asked Dr. Perl<br />

to conduct what would become a<br />

landmark study. The military gave<br />

him access to the brains gathered<br />

for research. Perl left his position<br />

as Director of Neuropathology at<br />

the Mount Sinai Medical School to<br />

come to Washington.<br />

Perl immediately recognized<br />

that the injury that they were<br />

looking at was not concussion.<br />

C.T.E. involves an abnormal protein<br />

called “tau”, which builds<br />

up usually over years throughout<br />

the cerebral cortex, but especially<br />

in the temporal lobes,<br />

visible across the stained tissue<br />

appearing like brown mold. Perl<br />

found scarring at the border between<br />

gray matter and where<br />

synapses connect white matter<br />

in the brain. Perl examined<br />

several more brains of service<br />

members who died after their<br />

blast exposure and all of them


Hazmat Science and Public Policy with George Lane<br />

had the same pattern of scarring in<br />

the same places, which appeared to<br />

correspond to the brain’s centers for<br />

sleep, cognition and other classic<br />

brain-injury trouble spots.<br />

Then Perl made an even more surprising<br />

discovery. He examined the<br />

brains of two veterans who died just<br />

days after their blast exposure and<br />

found embryonic versions of the<br />

same injury, in the same areas. The<br />

development of the injuries seemed<br />

to match the time elapsed since the<br />

blast event. Perl compared the damaged<br />

brains with those of people<br />

who suffered ordinary concussions<br />

with others who had drug addictions,<br />

which can also cause visible<br />

brain changes, and a control group<br />

with no injuries at all. None in control<br />

groups had the mold-like pattern.<br />

Perl’s findings were recently published<br />

in the scientific journal “The<br />

Lancet Neurology”. 6 His discovery<br />

may solve a medical mystery first<br />

observed in the trenches of World<br />

War I, first called “shell shock”, then<br />

“combat fatigue”, and now “Post-<br />

Traumatic Stress Disorder”, “PTSD”.<br />

In each case, it was considered psychic<br />

rather than a physical affliction.<br />

Only recently have neurologists,<br />

physicists, and senior officers<br />

pushed back at military generals<br />

that had told soldiers diagnosed<br />

with PTSD to “deal with it,” fed<br />

them pills, and then sent them back<br />

into battle untreated.<br />

If Perl’s discovery is confirmed by<br />

other scientists, and if short-term<br />

signatures caused by blast are confirmed<br />

to be a pattern of scarring in<br />

the brain, there could be significant<br />

implications for both the military<br />

and the medical community. Much<br />

of what has been described as emotional<br />

trauma may be reinterpreted,<br />

and many veterans may demand<br />

recognition of an injury that cannot<br />

be definitively diagnosed until after<br />

death. There will be calls for more<br />

research, drug trials, better helmets,<br />

and expanded veteran care. The disturbing<br />

message behind Perl’s discovery<br />

is that modern warfare destroys<br />

soldier’s brains.<br />

A blast wave generated by an explosion<br />

starts with a single pulse of<br />

increased air pressure that lasts a<br />

few milliseconds. Negative pressure,<br />

or suction, immediately follows the<br />

positive wave. The duration of the<br />

blast waves depends on the type of<br />

explosive and the distance from the<br />

point of detonation. The blast wave<br />

expands as a sphere of compressed<br />

gases, which displaces an equal volume<br />

of air at a high velocity. It compresses<br />

air and then falls rapidly to<br />

negative pressure in milliseconds,<br />

generated by the mass displacement<br />

of air by expanding gases. It may accelerate<br />

to hurricane force. The blast<br />

16<br />

wave is the main cause of blast injury.<br />

The effects of blast on the human<br />

body are complicated. People who<br />

have been exposed to blasts at close<br />

range describe it as overpowering.<br />

Many soldiers do not recall the moment<br />

of impact, lost in the flash of<br />

light, and the deafening sound or<br />

unconsciousness. Those who do remember<br />

it recall it as intensely violent.<br />

Trinitrotoluene, or TNT, was<br />

first used in artillery shells by the<br />

German Army in 1902. These weapons<br />

were used by all sides soon after<br />

the First World War started in 1914.<br />

TNT created a level of violence far<br />

beyond the cavalry charges of previous<br />

wars.<br />

British doctor Dr. Frederick Mott


elieved that “shell shock” was<br />

caused by a physical wound and<br />

proposed dissecting the brains of<br />

affected soldiers. He predicted the<br />

mechanism of blast effects in a paper<br />

published in The Lancet in February<br />

1916 in which he said blasts<br />

caused “physical or chemical change<br />

and a break in the links of the chain<br />

of neurons which serve a particular<br />

function.” 7<br />

Most other doctors saw “shell<br />

shock” as emotional trauma. Sigmund<br />

Freud and other psychologists<br />

began developing theories<br />

about how the mind responds to<br />

stress. Soldiers suffering from “shell<br />

shock” were often described as possessing<br />

“a neuropathic tendency” or<br />

even “a lack of manly vigor and patriotic<br />

spirit”. 8<br />

In 1980 “shell shock” became<br />

known as “post-traumatic stress disorder”<br />

(PTSD), reflecting the social<br />

and emotional strain of returning<br />

veterans of the war in Vietnam. It<br />

was known that blasts had powerful<br />

and mysterious effects on the body.<br />

Starting in 1951 the U.S. government<br />

established the “Blast Overpressure<br />

Program” to investigate the<br />

effects of large explosions, including<br />

atomic bombs, on living tissue.9 At<br />

that time, scientists believed blasts<br />

would mainly affect air pockets in<br />

the body, like the lungs, the digestive<br />

system, and the ears. However<br />

few asked about the effects on the<br />

brain.<br />

In the early 1990s, Dr. Ibolja Cernak,<br />

who grew up in what is now<br />

Serbia, was working as a doctor and<br />

researcher at a military hospital in<br />

Belgrade, treating large numbers of<br />

soldiers with blast trauma, usually<br />

from mortars and artillery fire. As<br />

in World War I, men often suffered<br />

mental impairment but few visible<br />

wounds. Dr. Cernak collected blood<br />

samples from soldiers around the<br />

battlefields of Bosnia and Serbia for<br />

several years, cataloging the neurological<br />

effects of blast on over 1,300<br />

soldiers. “The blast covers the entire<br />

body,” she said. “It has a squeezing<br />

effect. Ask soldiers what they felt: The<br />

first thing they say is that their ears<br />

17<br />

were popped out, they were gasping<br />

for air, like some huge fist is squeezing<br />

them. The entire body is involved<br />

in that interaction.” 10<br />

Cernak believed that blast ripples<br />

moved through the body like rings<br />

on the surface of a pond. The speed<br />

of the ripples changes when they<br />

encounter air pockets with different<br />

density at the borders between<br />

the gray and white matter of the<br />

brain, and inflict greater damage in<br />

those places. Physicists later theorized<br />

how blast damages the brain,<br />

including surges of blood from the<br />

chest, pressure on brain tissue, and<br />

the centripetal forces of the brain<br />

bouncing back and forth inside<br />

the skull as in concussions. Charles<br />

Needham, a renowned authority on<br />

blast physics, wrote that post-mortems<br />

on blast injuries supported<br />

these theories. 11<br />

More powerful roadside bombs,<br />

Improvised Explosive Devices, or<br />

IEDs, are being used in fighting in<br />

Iraq and Afghanistan, creating a<br />

growing number of blast injuries.<br />

Doctors have noticed that the blast<br />

reflect off hard surfaces and multiplies<br />

so that people who appear to be<br />

protected inside an enclosed space<br />

like a Humvee often suffer much<br />

worse brain injuries than those outside.<br />

Military and civilian researchers<br />

began focusing their work on<br />

More on page 44


Campbell on Crypto<br />

Big Data, Big Troubles: Simple advice<br />

for encrypting data in motion<br />

By Shawn Campbell<br />

As Big Data becomes more prevalent<br />

in government – along with<br />

growing adoption of cloud services,<br />

and unprecedented volume<br />

of data moving across networks<br />

– there is an increasing<br />

threat to data in motion. With<br />

Big Data comes big data networks,<br />

big cloud computing and<br />

big datacenter services, which<br />

expose organizations to bigger<br />

threats including<br />

data theft,<br />

cyber-crime<br />

and malicious<br />

cyber-attacks.<br />

The moment<br />

data is transmitted<br />

from<br />

one location to<br />

another, it’s at<br />

risk. Encrypting data in motion<br />

doesn’t keep cyber-criminals<br />

from accessing the data network.<br />

Rather, it protects the data from<br />

unauthorized parties, making<br />

tampered encrypted data useless<br />

and harmless when it is decrypted<br />

at the time it is received.<br />

Of course, there are numerous<br />

ways to reduce the risk of data<br />

tampering. Your organization<br />

may have already implemented<br />

some of these ways. But at a minimum<br />

you should have regular<br />

system intrusion and penetration<br />

testing to review each of the<br />

following:<br />

• Intrusion detection systems<br />

(IDS) to detect hackers<br />

Organizations can spend a fortune on<br />

traditional data network security measures<br />

such as firewalls and anti-virus software,<br />

but still fail to protect their data while it’s<br />

moving through the network.<br />

• Intrusion Prevention Systems<br />

(IPS) to counter penetration<br />

attempts<br />

• Internal access controls based<br />

on passwords or identity keys<br />

• Encryption of all network<br />

traffic<br />

• Access control to prevent<br />

18<br />

unauthorized entry to secure<br />

areas<br />

• Measures to discourage tailgating<br />

• Motion detectors and/or<br />

CCTV monitoring to secure<br />

areas<br />

Defensive actions may seem<br />

equally obvious: Identify your<br />

most sensitive data and segment<br />

your IT infrastructure,<br />

increase the<br />

visibility of your<br />

network activity<br />

through analytics<br />

and forensics tools,<br />

and monitor your<br />

logs.<br />

The best advice,<br />

however, is to encrypt<br />

your data in the most effective<br />

and efficient way possible.<br />

Organizations can spend a fortune<br />

on traditional data network<br />

security measures such as firewalls<br />

and anti-virus software,<br />

but still fail to protect their data<br />

while it’s moving through the


network. Once the data leaves<br />

the building, it can be attacked<br />

and directly controlled from the<br />

outside.<br />

By encrypting sensitive data<br />

while in motion, you can rest<br />

easy that data accessed by unauthorized<br />

parties is useless in<br />

their hands.<br />

It’s a common misconception<br />

that any encryption of data in<br />

motion can lead to bandwidth<br />

losses, poor network performance<br />

and increased costs. But<br />

that doesn’t have to be the case.<br />

Data in motion can be protected<br />

at any level in the communication<br />

subsystem; where<br />

volumes are low, software encryption<br />

based on SSL/TLS may<br />

be enough.<br />

With greater demands on the<br />

network, you’ll need more efficient<br />

approaches, with encryption<br />

at either Layer 2 or Layer 3.<br />

As a refresher, Layer 2 devices<br />

such as network switches operate<br />

at the data link level (one<br />

above Layer 1, or the “physical<br />

layer”). Layer 3 is the next Layer<br />

up – also known as the Internet<br />

Layer, often made up of routers<br />

or “switch routers.”<br />

Layer 3 encryption is more<br />

commonly known as IPSec (Internet<br />

Protocol Security) encryption,<br />

is generally provided within<br />

the routers that are deployed<br />

throughout your data network.<br />

However, IPSec does affect the<br />

throughput performance of the<br />

data network. With Layer 3,<br />

overheads are typically 30-40%.<br />

While dedicated internal networks<br />

may be able to accommodate<br />

this, using Layer 3 encryption<br />

across public networks can<br />

be expensive.<br />

IPSec essentially imposes an<br />

encryption tax on your data.<br />

For that reason, in practice, the<br />

higher the network speed or the<br />

greater the bandwidth requirements,<br />

your more likely solution<br />

would be Layer 2 encryption.<br />

Layer 2 encryption can be applied<br />

in point-to-point, meshed,<br />

and VPN or MPLS networks.<br />

The most effective form of Layer<br />

2 encryption is provided by dedicated<br />

hardware systems that use<br />

the AES algorithm and encrypt<br />

with 256 bit keys. To ensure that<br />

these devices are secure you<br />

should always verify that they<br />

are appropriately accredited to<br />

international security standards.<br />

For federal agencies, that standard<br />

would be Federal Information<br />

Processing Standard Publication<br />

(FIPS) 140-2<br />

FIPS Publication 140-2 is a<br />

19<br />

U.S. government computer security<br />

standard used to accredit<br />

cryptographic modules. It is a<br />

joint effort mandated by both<br />

the United States and Canadian<br />

governments, and recognized by<br />

many other countries and institutions.<br />

Products that meet the security<br />

requirements of the FIPS 140-2<br />

Cryptographic Module demonstrate<br />

security and proficiency<br />

which both government and<br />

commercial customers can rely<br />

upon.<br />

When current best practice<br />

data encryption technology is<br />

implemented for data in motion<br />

and data at rest, the data gained<br />

by cyber-criminals is, of course,<br />

rendered completely useless assuring<br />

no risk of adverse consequences.<br />

Shawn Campbell is VP of Product<br />

Management, SafeNet Assured<br />

Technologies, LLC. He can<br />

be reached at Shawn.Campbell@<br />

safenetat.com


PLAN. PREPARE.<br />

ACT.<br />

10 ways<br />

you can improve<br />

your readiness<br />

HOW YOU CAN REDUCE THE IMPACT OF<br />

AN EMERGENCY OR DISASTER<br />

It could be in a movie theater, in a classroom, at work, in a train station or<br />

airport, or as we recently saw in Orlando, Fla., having a night out with friends.<br />

When an emergency or disaster happens, we don’t usually see it coming.<br />

Even if you aren’t trained as an emergency responder, there are important<br />

steps you can take to prepare before the unthinkable strikes.<br />

Always Have a Plan. Preparation and planning reduce panic in an emergency<br />

situation. A plan provides a helpful structure in a chaotic situation. No matter where you<br />

1 are, always think about a plan.<br />

Be Alert and Observant. First signs of an impending disaster or emergency are often encountering something odd or out of place. If you<br />

see something, say something. Always trust your instincts. And make it a habit to observe your surroundings and know where exit doors are<br />

2 located no matter where you are.<br />

Have an Alternate Communications Plan. Telephone and Internet will be overwhelmed or no longer in-service. Use social media<br />

provided alternatives such as the Facebook emergency check-in feature or develop an emergency text group to have the ability to contact<br />

3 key people with one text. Having an out-of-state contact number to check-in sometimes may be easier to reach than a local number.<br />

6<br />

office.<br />

7<br />

8<br />

Learn<br />

4<br />

Maintain Basic Supplies. Personal phones are everyone’s lifeline. Keep a spare phone charger in your pocketbook, briefcase or<br />

Ensure you have a car charger for your phone in case of a loss in power.<br />

Don’t Be a Social Media Hound. During a disaster or<br />

emergency situation, don’t stop or delay your escape by taking a<br />

video, tweeting or Snapchatting. Protect yourself by leaving the<br />

danger area immediately. Seconds count.<br />

Basic First Aid and CPR. During<br />

an emergency, first responders may be<br />

delayed and hospitals may be swamped<br />

with the seriously injured. Knowing basic<br />

first aid can keep you and others alive<br />

until professional assistance can reach<br />

you. Learn the next level of first aid for<br />

how to control bleeding.<br />

Establish a Meeting Place.<br />

Choose a safe, familiar place for family<br />

members and friends to go in the event<br />

of an emergency. Even when out for the<br />

day or night with a group of family or<br />

friends, agree on a meeting location.<br />

9<br />

Stay Informed. Authoritative<br />

information will be critical during an<br />

emergency. Have a means to stay<br />

connected to a reliable, accurate<br />

information source so you can act<br />

accordingly. Be cautious of acting on<br />

rumors. Question non-professionals<br />

giving advice or direction.<br />

5<br />

Be Prepared to Evacuate. Always be<br />

prepared to evacuate your location with your<br />

car and house keys, wallet and phone. Always<br />

keep them accessible for a quick exit. Always<br />

train—take these items even during drills.<br />

Don’t find yourself stranded.<br />

10<br />

Stay Calm. Resist Panic.<br />

If an emergency comes up, take a<br />

quick moment and stop, assess and<br />

form a plan of action. Panic always<br />

makes a bad situation worse. You can<br />

act with urgency while not being in<br />

panic mode.<br />

APPRIOINC.COM


Disaster Preparedness and Emergency Response<br />

To be prepared is to be safe: How having<br />

a personal safety plan can keep you alive<br />

By Mike Pena, Apprio Inc.<br />

The threats that are unfortunately<br />

becoming common<br />

around the world are<br />

challenging us to be ever<br />

vigilant in our surroundings<br />

and to prepare for<br />

the fight that we often<br />

never see coming.<br />

You could be sitting<br />

in a movie theater, in Mike Pena<br />

a classroom, at work,<br />

in a train station or airport, or as<br />

we recently have seen in Orlando,<br />

Fla., having a night out with friends<br />

when the unthinkable happens. The<br />

nature of disasters, emergencies and<br />

even terrorist attacks is that they<br />

erupt unexpectedly and throw normal<br />

lives into chaos.<br />

As an emergency manager, you<br />

play a critical role in fortifying preparedness<br />

postures and mitigating<br />

potential damages for your organization<br />

and its employees. But the reality<br />

is that emergencies often happen<br />

outside of your organization’s<br />

boundaries, and one of the most<br />

important things you can do to keep<br />

everyone safe is to train them to<br />

think about security in their everyday<br />

lives. Even for people who are<br />

not trained as emergency responders,<br />

knowing how we prepare<br />

before an emergency<br />

strikes can make a critical<br />

difference in the magnitude<br />

of its impact.<br />

There are simple steps<br />

you can take now that will<br />

ensure that individuals are<br />

sufficiently prepared and<br />

able to respond in a way<br />

that will maximize their survivability<br />

and reduce the chance a bad situation<br />

will get worse. This article is a<br />

primer, as well as a call to action, to<br />

bolster your security stance by suggesting<br />

ways you can equip your<br />

staff, their families and friends with<br />

advance preparation techniques to<br />

help everyone stay as safe as possible.<br />

In addition to providing some<br />

basic pointers for promoting employee<br />

safety within this article, you<br />

can also download a short employee<br />

primer that you can make available<br />

to your staff in order to promote<br />

awareness and safety in everything<br />

they do.<br />

21<br />

Survivability Increases for<br />

Those Who Are Prepared and<br />

Have a Plan on How to React<br />

Luckily, every person reading this<br />

already has the most important tool<br />

for keeping them safe: your brain.<br />

But, your brain can also be a liability.<br />

How? There are two ways your<br />

brain can engage: by instinct or rationality.<br />

In the most literal sense, it<br />

is the difference between living and<br />

dying.<br />

In every emergency, panic ensues.<br />

Without preparation or a plan, the<br />

instinct to panic becomes the default<br />

behavior for people suddenly<br />

confronted by danger. Panic will<br />

always make a bad situation much<br />

worse.<br />

To reinforce that phenomena, research<br />

some of the past night club


Disaster Preparedness and Emergency Response<br />

fires. All injuries and most fatalities<br />

occur at the front door because individuals<br />

did not take a minute to<br />

identify where all exits were located.<br />

They had no plan. Forensic study<br />

has shown that people had passed<br />

by available and open exits trying<br />

to get to the front door because, in<br />

their panic, that was the only exit<br />

they could recall. Most, if not all, of<br />

the survivors of those catastrophes<br />

did know where the other emergency<br />

exits were.<br />

In the 2003 Station nightclub fire<br />

in West Warwick, Rhode Island, a<br />

stampede of people rushing to get<br />

out the front door created a crush<br />

of humanity in the narrow hallway<br />

that completely blocked the exit.<br />

More than 40 people perished in<br />

that space alone. Three other exits<br />

were used by survivors.<br />

The first step a person should take<br />

to prepare in advance for an emergency<br />

is to develop an emergency<br />

plan. There will be emergency situations<br />

where first responders may<br />

take some time to reach you. Ongoing<br />

threats, multiple site attacks,<br />

communications breakdowns,<br />

hazardous environments and overstretched<br />

resources are all possible<br />

reasons for delays in emergency response.<br />

The result is that your taking<br />

the initial action to protect yourself<br />

may save your life, and potentially<br />

the lives of others. For starters, be<br />

prepared to evacuate. Always be<br />

ready to leave your location with<br />

your car and house keys, wallet and<br />

phone easily accessible. Even keep<br />

spare phone chargers handy. Don’t<br />

find yourself stranded.<br />

Finding yourself thrust into the<br />

middle of an emergency is not the<br />

time to develop your strategy, which<br />

should also include an alternative<br />

communication plan since it’s likely<br />

that telephone and Internet service<br />

will be down. If you prepare a<br />

plan in advance, you’d be surprised<br />

how your instincts and what you<br />

have learned rise to the top of your<br />

thought process during an actual<br />

emergency. Know how to escape<br />

out a secondary exit. Know what<br />

to do in a workplace violence situation.<br />

Know your surroundings, and<br />

if you get that uncomfortable feeling<br />

that something doesn’t seem right, it<br />

usually isn’t. It may not prompt an<br />

action on your part but will prepare<br />

you to react if needed. The important<br />

elements here are self-reliance<br />

and preparation.<br />

Train, Train, Train<br />

Just as fire drills are common ways<br />

employers train staff for fire emergencies,<br />

emergency managers need<br />

to teach staff, via training, how to<br />

implement emergency plans. They<br />

22<br />

can set up mock scenarios or simply<br />

walk through the steps on a random,<br />

yet frequent basis, so that you and<br />

your staff have a great understanding<br />

of the plan and are comfortable<br />

with what to do in the event of an<br />

incident.<br />

Even if you’re not an emergency<br />

manager, it’s still critical that you<br />

familiarize yourself with your plan,<br />

and that you walk through it, step<br />

by step. An emergency or disaster is<br />

jolting enough, without the uncertainties<br />

of how to respond. You want<br />

to be assured that you know how to<br />

react, and this can only come from<br />

practice.<br />

Stay Alert. Be Aware to Stay Safe.<br />

Take Action to Stay Alive<br />

Not everyone can tell a firecracker<br />

from a gunshot. In either case, ev-


eryone will recognize an unfamiliar<br />

or extraordinary sound. It may not<br />

require an immediate response, but<br />

it will get your attention. This provides<br />

you with a moment to pause,<br />

think and recall your plan of action.<br />

Usually normalcy will return. If it<br />

doesn’t, you are already turning on<br />

your brain to be prepared for action.<br />

The above scenario could easily<br />

happen in your workplace. That<br />

loud crack will get your attention.<br />

Should you just ignore it, or should<br />

you start thinking of the “what if ’s.”<br />

If you smell something burning,<br />

does that get your attention? Start<br />

the “what if.” Your safety will depend<br />

on your preparation and how<br />

you react.<br />

If you begin thinking of the, “what<br />

if ’,” you are already one step ahead<br />

of everyone else in keeping yourself<br />

safe. Prepare, plan and react. These<br />

are things you need to train your<br />

brain on now.<br />

There are reasons why first responders,<br />

law enforcement and<br />

military are constantly training.<br />

They are learning how to respond<br />

in specific ways for different situations;<br />

achieving so-called “muscle<br />

memory.” You might often hear<br />

these professionals repeat the mantra,<br />

“Always revert to your training.”<br />

There is a good reason why.<br />

We, as civilians, are no different.<br />

We may not need to train to this<br />

high level, but the underlying objective<br />

of teaching our brains how<br />

to react in extreme situations is the<br />

same: a calm, rational, effective response.<br />

Stay Calm<br />

The sudden onset of confusion, fear,<br />

hysteria and chaos can be overwhelming.<br />

Not everyone will be<br />

prepared. As you think about this<br />

and have an opportunity to prepare<br />

yourself, be ready to lead those who<br />

are with you at that time. There will<br />

be times you will have to take on<br />

the role as leader to get everyone<br />

to a safe place. Those who are not<br />

trained or prepared will be in denial<br />

and confused that something dangerous<br />

is happening. They will be<br />

frantically looking for their protec-<br />

23<br />

tor. That protector may be you until<br />

first responders arrive.<br />

Emergency situations, either<br />

man-made or natural, can confront<br />

you with a clear and present danger.<br />

Preparation and planning can make<br />

the difference between becoming a<br />

victim, or emerging as a survivor.<br />

Mike Pena is Executive Vice President<br />

of Homeland Security for Apprio<br />

Inc. and has an extensive 35 year<br />

career in first response, emergency<br />

preparedness, homeland security and<br />

facility protection. Pena’s background<br />

includes first responder experience<br />

with the New York City Fire Department’s<br />

Special Operations Command<br />

and FEMA, as well as security and<br />

critical infrastructure protection experience<br />

with the Department of Energy’s<br />

(DOE) Brookhaven National<br />

Laboratory.


Disaster Preparedness and Emergency Response<br />

Emergency Communications Network offers enhanced<br />

safety options for emergency notifications delivered<br />

via smartphones<br />

ORMOND BEACH, FL – <strong>June</strong> 10,<br />

<strong>2016</strong> – Emergency Communications<br />

Network (ECN), North America’s<br />

largest provider of critical and<br />

mass notification systems, is pleased<br />

to announce the addition of a safe<br />

driver feature to its CodeRED Mobile<br />

Alert app aimed at improving<br />

the safe operation of motor vehicles<br />

across the country. Currently, 46<br />

states, D.C., Puerto Rico, Guam, and<br />

the U.S. Virgin Islands have banned<br />

text messaging while driving, while<br />

14 states prohibit drivers of all ages<br />

from using handheld cell phones in<br />

any fashion while operating a motor<br />

vehicle.<br />

Distracted driving is defined as<br />

any activity that could divert a person’s<br />

attention away from the safe<br />

operation of a vehicle, even if only<br />

for a second. “Every time you take<br />

your eyes off the road, or focus on<br />

anything other than the safe operation<br />

of your vehicle, it’s a distraction<br />

with potentially fatal consequences.<br />

Such distractions endanger not only<br />

drivers and their passengers, but<br />

also other motorists and bystanders,”<br />

said David DiGiacomo, CEO<br />

and President of ECN. “We are<br />

proud the CodeRED Mobile<br />

Alert app will now assist motorists<br />

with operating their vehicle<br />

in a safe, hands-free, law<br />

compliance mode where critical<br />

notifications<br />

received on<br />

their Android<br />

phones and<br />

tablets will automatically<br />

play<br />

audibly while in<br />

motion to help<br />

reduce distractions.”<br />

Currently, there are eight unique<br />

activities that are detected via cellphone<br />

accelerometers, which are<br />

designed to detect changes in the<br />

orientation and movement of such<br />

devices. These activities include<br />

walking, running, and tilting, to<br />

name a few. This enhancement to<br />

the industry’s most downloaded<br />

public safety app now integrates two<br />

different modes subscribers can select<br />

to receive audible notifications.<br />

The “Safe Driver Mode” delivers all<br />

notifications audibly when the individual’s<br />

device is determined to<br />

24<br />

be in motion, while the “Hands<br />

Free Auto Mode” will automatically<br />

deliver audible messages<br />

regardless of your motion or activity.<br />

“Safe driving is everyone’s responsibility<br />

as more and more vehicles<br />

appear on the road each and<br />

every day. It was reported by Distraction.gov<br />

that more than 3,179<br />

people were killed and 431,000 injured<br />

in motor vehicle accidents<br />

involving distracted drivers in 2014<br />

alone,” said Troy Harper, CodeRED<br />

Product Manager. “As society continues<br />

to be increasingly mobile and<br />

demand the use of smart devices to<br />

stay informed of emergencies and<br />

other time-sensitive information,<br />

it is important that we better utilize<br />

technology to further promote<br />

safety. With this in mind, ECN cre-


ated a self-aware safety mechanism<br />

where citizens may elect to remain<br />

safety-conscientious and help eliminate<br />

driving distractions.”<br />

This new feature is currently available<br />

for Android devices registered<br />

for the CodeRED Mobile Alert app.<br />

About Emergency<br />

Communications Network<br />

Headquartered in Ormond Beach,<br />

Florida, Emergency Communications<br />

Network (ECN) is an industryleading<br />

provider of SaaS-based critical<br />

communication and emergency<br />

notification systems across North<br />

America, managing nine customized<br />

statewide notification solutions<br />

– the most in the industry. Whether<br />

in the event of mission-critical business<br />

events, emergencies, or routine<br />

operational announcements, ECN<br />

provides the market with two core<br />

solutions: CodeRED is designed for<br />

state and local government entities<br />

to deliver emergency and general<br />

messages to residents in specific<br />

geographic areas, and SmartNotice<br />

focuses on employee and stakeholder<br />

notifications, serving as an essential<br />

tool for business continuity and<br />

disaster recovery. ECN’s technology<br />

solutions are used each day to effectively<br />

alert, inform, and affect lives.<br />

To learn more, visit ecnetwork.com.<br />

© <strong>2016</strong> Emergency Communications Network<br />

25


Convy on Net-Centric Security<br />

New Mobile Technology for<br />

Disaster Response<br />

By John Convy, Convy Associates, Washington, DC<br />

When disasters and conflicts take<br />

place, communications and power<br />

infrastructure can be severely damaged<br />

or rendered nonexistent, and<br />

must be restored as vital components<br />

for response and recovery. Government,<br />

aid agencies,<br />

and NGOs are increasingly<br />

depending on<br />

digital communications<br />

to deliver food,<br />

shelter, medical aid,<br />

and conduct searches<br />

and rescues.<br />

Surprisingly, some<br />

people displaced by disasters<br />

are initially more concerned<br />

with communicating with friends<br />

and family than receiving food or<br />

water. In our ultra-connected world,<br />

mobile connectivity has become a<br />

basic and essential human need.<br />

When disasters bring down critical<br />

infrastructure, first responders<br />

now rely on many new forms of<br />

mobile technology. Mobile seems to<br />

improve and advance on a monthly<br />

basis, along with a fast-growing demand<br />

for instant and accurate information<br />

for billions of people worldwide.<br />

The mobile industry is responding<br />

with a dramatic surge in new tools<br />

and inventions.<br />

One of these that I happened upon<br />

recently is a text messaging, contacts,<br />

calendaring, and task management<br />

With Gyst, an incident commander, first<br />

responder, or disaster service worker can<br />

communicate, collaborate, and coordinate<br />

with anyone, anywhere in the world who<br />

can receive SMS or MMS messages.<br />

app from a startup in Austin, Texas,<br />

founded by former Dell executive<br />

Bruce Kornfeld. Named Gyst, Inc.<br />

(gystapp.com), the company is funded<br />

by angel investors, including former<br />

BlackBerry board member Jim<br />

Estill.<br />

Kornfeld told me that<br />

Gyst is designed to be a<br />

powerful productivity tool<br />

for professional and organizational<br />

communications<br />

that he hopes will<br />

revolutionize in-the-field<br />

emergency and disaster<br />

26<br />

Bruce Kornfeld<br />

response, and make disaster service<br />

workers better connected and more<br />

effective.<br />

“There is a growing need for specialized<br />

text applications to help in<br />

disaster response situations, because<br />

it’s common for wireless<br />

voice communications<br />

to be down, but<br />

for data to still be up,”<br />

Kornfeld explained.<br />

“If voice calls are impossible,<br />

as long as an<br />

SMS or cellular data<br />

connection is available,<br />

Gyst can function<br />

optimally.”<br />

At its core, Gyst is a productivity<br />

and organizational tool. But, because<br />

of its unique capabilities, I think it<br />

may find a place among disaster response<br />

organizations, by positioning<br />

itself as a useful means of<br />

fast, global communications<br />

for both agencies and<br />

individual users.<br />

“Gyst has the ability to<br />

operate anywhere in the<br />

world, and connect with<br />

any user who has a cellular<br />

data connection. It helps


organize and unify groups of users,<br />

even those who are not using Gyst,<br />

because the app can communicate<br />

with anyone who can receive SMS<br />

or MMS messages. You can use it to<br />

manage and track texts with anyone<br />

for productivity-focused messaging<br />

on any mobile platform,” Kornfeld<br />

added.<br />

Gyst is fast and easy to install, with<br />

a lightweight footprint, and strong<br />

security for disaster operations, according<br />

to Kornfeld.<br />

“We follow industry standard<br />

encryption for any documents or<br />

videos flowing through our cloudbased<br />

servers, meaning that even<br />

non-Gyst-app users benefit from our<br />

data security filters,” he said. “When<br />

information is shared between two<br />

Gyst users (G2G), that information<br />

follows a fully encrypted communication<br />

path on a 4,096-bit channel.”<br />

With Gyst, an incident commander,<br />

first responder, or disaster service<br />

worker can communicate, collaborate,<br />

and coordinate with anyone,<br />

anywhere in the world who can receive<br />

SMS or MMS messages.<br />

Other Gyst highlights include message<br />

flagging for prioritization, text<br />

message inbox organization through<br />

labeling, calendar integration, and<br />

the ability to send any document or<br />

video over SMS text messaging via<br />

downloads from Gyst’s servers. It<br />

also supports the creation of communication<br />

groups, which allow<br />

people to communicate with each<br />

27<br />

Photo: Kurt Barnhart<br />

other without a limit on the number<br />

of individuals in the group, and<br />

provides the ability to share locations<br />

displayed on Google Maps.<br />

The capability to send a series of<br />

videos or still photos in the aftermath<br />

of a disaster could help dispatchers<br />

assess a situation and deploy<br />

resources to the areas where<br />

they are needed most. The ability to<br />

pinpoint a user’s location, or to send<br />

instructions on where water, food,<br />

and aid should be delivered, is an obvious<br />

benefit in search, rescue, and<br />

recovery operations. These functions<br />

make Gyst something that should be<br />

evaluated by federal, state, and local<br />

governments, I believe.<br />

Kornfeld described the inspiration<br />

for the development of Gyst.<br />

“We recognized that smartphone<br />

users were increasingly preferring<br />

communications via the written<br />

word rather than voice calls. Email<br />

and text messaging represent a huge<br />

percentage of both personal and professional<br />

communications today, and<br />

while email technology maintained<br />

pace with this movement, text messaging<br />

has not always kept up. We<br />

developed Gyst as a tool to make text<br />

messaging more functional and effective.”<br />

It is easy to see opportunities for<br />

applications like Gyst in the converged<br />

security space. The power to<br />

connect public safety personnel and<br />

first responders with the general public,<br />

other involved agencies, and associated<br />

organizations for planning,<br />

early warning, and crisis response<br />

scenarios has obvious benefits.<br />

As mobile continues to establish<br />

itself as the first choice for disaster<br />

management and response communications,<br />

merging the roles of information<br />

and physical security can<br />

help unify organizational management,<br />

and create better prevention<br />

and response strategies for government<br />

agencies at all levels.<br />

More on page 43


Cybersecurity Guest Expert<br />

Six tips for better unified IT monitoring in<br />

hybrid cloud environments<br />

By Adelle Rydman<br />

As Big Data becomes more prevalent<br />

in government – along with<br />

growing adoption of cloud services,<br />

and unprecedented volume<br />

of data moving across networks<br />

– there Cloud technology<br />

and mobile devices are adding<br />

to infrastructure complexity for<br />

government agencies. This year<br />

will see a big push to federal hybrid<br />

cloud environments. The<br />

security requirements that go<br />

along with this approach place<br />

even greater demands on infrastructure<br />

managers to ensure the<br />

security and reliability of IT services.<br />

The OMB recently released a<br />

memo on changes to procurement<br />

requirements. Based on<br />

that memo, IT management and<br />

procurement professionals must<br />

show how their purchases help<br />

the agency transition to cloudbased<br />

solutions. Practically<br />

speaking, the IT infrastructure<br />

for all government agencies –<br />

both civilian and military – will<br />

28<br />

increasingly incorporate cloudbased<br />

technologies.<br />

The demands on IT infrastructure<br />

created by this ongoing<br />

move to cloud calls for new ways<br />

to understand IT performance<br />

across a growing variety of IT<br />

platforms. Unfortunately, most<br />

agencies still use legacy monitoring<br />

solutions.<br />

These systems were designed<br />

for physical infrastructures.<br />

They lack the capacity to look<br />

across hybrid infrastructures to<br />

dynamically depict the health<br />

and status of a unified platform.<br />

That inhibits the ability to quickly<br />

determine the root cause of<br />

outages – and most importantly,<br />

to determine which IT services<br />

may be at risk. Without that<br />

understanding it’s impossible to<br />

prioritize necessary corrective<br />

actions.<br />

The bottom line is that Federal<br />

agencies can no longer rely on a<br />

series of siloed monitoring solutions,<br />

each covering only segments<br />

of the entire infrastructure.<br />

For agency professionals who<br />

are responsible for monitoring<br />

hybrid environments, here are<br />

some tips:<br />

1. Understand your mission<br />

critical IT services and which<br />

infrastructure components<br />

they are dependent on. Not<br />

all IT services share the same<br />

level of criticality. It is important<br />

to identify and monitor<br />

your most critical IT services<br />

as more than just the individual<br />

components.<br />

2. Determine which of your<br />

critical IT services can be best<br />

supported by physical and or<br />

cloud solutions or in some<br />

combination. Not all IT Services<br />

are suited to be moved to<br />

the cloud.<br />

3. Understand how one component<br />

of your infrastructure


is impacted by other components.<br />

By working with tools<br />

that provide a common operating<br />

picture across your IT<br />

infrastructure as a whole, you<br />

will be able to quickly identify<br />

interdependencies. Without<br />

it, you have no insight on how<br />

something in your cloud environment<br />

(for example) may<br />

affect something within your<br />

physical infrastructure.<br />

4. Complete a “Cloud Ready<br />

Assessment.” A cloud ready<br />

assessment considers all aspects<br />

of moving to the cloud,<br />

including increased IT complexity,<br />

security, upgrade<br />

costs, consultancy costs, and<br />

new integrations required – as<br />

well as unified monitoring,<br />

training, increased agility to<br />

meet mission demands and<br />

any expected IT efficiency<br />

gains.<br />

5. Use tools, whether open<br />

source or commercial, for<br />

actionable intelligence to support<br />

your decisions on whether<br />

mission readiness is being<br />

compromised. Commercial<br />

tools that have been built on<br />

an open architecture typically<br />

provide the deepest levels of<br />

functionality, scalability and<br />

flexibility and will allow an<br />

agencies to more easily shift<br />

to support changing mission<br />

strategies and IT requirements<br />

without having to rip<br />

and replace.<br />

6. Determine whether your IT<br />

monitoring needs are best met<br />

by open source or commercial<br />

solutions. Open source solutions<br />

are a growing trend in<br />

monitoring. By working with<br />

tools based on open architecture,<br />

agencies aren’t locked<br />

into any particular vendor<br />

stack and can readily shift<br />

from one cloud provider to<br />

another. Unless your program<br />

requirements are extremely<br />

unusual, it seldom makes financial<br />

sense to develop what<br />

a commercial provider has<br />

previously developed, deployed<br />

and is able to support.<br />

Make your best choice of what<br />

works for your organization, but<br />

understand that there is an argument<br />

for both agencies and contractors<br />

to give up the traditional<br />

approach to managing IT infrastructures<br />

as they move to the<br />

cloud.<br />

Cloud era monitoring tools<br />

29<br />

provide the ability to monitor<br />

both physical and cloud from a<br />

single platform. And over time,<br />

you’ll need to show that your<br />

IT management plans take the<br />

cloud mandate into account<br />

while managing your agencies<br />

budgetary constraints. Adopting<br />

monitoring tools that can monitor<br />

both environments ensures<br />

you stay compliant with technology<br />

mandates.<br />

As agencies embrace cloud environments,<br />

unified monitoring<br />

is becoming even more essential.<br />

No matter what’s in your physical<br />

and cloud environments,<br />

monitoring can reduce the number<br />

and severity of impacts to the<br />

trusted services you offer both<br />

your personnel and the citizens<br />

of the United States.<br />

Adelle Rydman is Director Federal<br />

Business for Zenoss. She can<br />

be reached arydman@zenoss.com


Salient’s Laurence Rose discusses<br />

improving teleworking programs<br />

through trusting work relationships<br />

FAIRFAX, VA – <strong>June</strong> 15, <strong>2016</strong> – According<br />

to a Gallup poll published<br />

in August 2015, telecommuting in<br />

the United States has climbed to<br />

37%. This number is expected to<br />

continue rising, given the increase<br />

of millennials in the workforce and<br />

their focus on work-life balance.<br />

Ability to telework is also a recruiting<br />

incentive when companies are<br />

looking for professional employees.<br />

While teleworking saves time and<br />

reduces energy consumption, the<br />

downside can be seen in the loss<br />

of “the human touch.” Issues with<br />

trust, isolation, and presence are<br />

human perceptions that can have<br />

a negative impact, not only on the<br />

employee or a company team, but<br />

customers as well.<br />

Customers may feel isolated from<br />

a company’s employees, leading to<br />

concerns about a company’s dedication<br />

to a project. For example, an<br />

Agile development project requires<br />

frequent interaction between the<br />

customer and the software developers.<br />

For that close working relationship<br />

to be successful, trust is<br />

paramount. Without regular faceto-face<br />

meetings distrust can occur,<br />

isolation can be felt and a lack of<br />

30<br />

Dr. Laurence Rose<br />

real presence (commitment)<br />

can be challenged.<br />

In a recent published<br />

book, “The Human Side<br />

of Virtual Work”, executive<br />

expert Dr. Rose, Senior<br />

Vice President, Contracts<br />

and Procurement<br />

at Salient CRGT, takes a<br />

journey from the industrial<br />

revolution through a<br />

technology revolution known as the<br />

virtual work environment.<br />

Dr. Rose discusses methods for<br />

improving the success of companies’<br />

teleworking programs and increasing<br />

employee and customer<br />

satisfaction through trusting work<br />

relationships. He presents arguments<br />

and ideas on how to take action<br />

now to prevent the potential<br />

negative outcomes that could affect<br />

many working in the virtual work<br />

environment. Rework or redoing<br />

a deliverable often happens when<br />

there is a lack of effective communication<br />

through human interaction<br />

rather than just through technology.<br />

“We see the virtual work environment<br />

becoming more and more a<br />

way of doing business and the way<br />

leaders deal with the virtual worker<br />

is increasingly important,” said<br />

Tom Ferrando, President of Salient<br />

CRGT. “Ensuring that our customers<br />

are benefiting from the developments<br />

in technology and teleworking<br />

are incredibly valuable to<br />

improving our culture, delivering<br />

the right service, and reducing<br />

our costs.”<br />

“As a contracts professional,<br />

I hear from customers<br />

there is a need to<br />

talk more and address issues<br />

as they arise,” said<br />

Laurence Rose. “I have<br />

seen first-hand the importance<br />

of strong, trusting<br />

relationships. When<br />

communications are limited, it is<br />

important to provide humanistic<br />

management to avoid potential<br />

trust and isolation issues. Moving<br />

from a traditional to virtual work<br />

environment, there are new challenges<br />

all dealing with the aspects of<br />

trust, isolation, and work presence<br />

that we can focus on to ensure successful<br />

working relationships. The<br />

difference is we cannot take these<br />

perceptions for granted when delivering<br />

services to our clients.”<br />

Dr. Rose has been an executive<br />

leader for more than 14 years and<br />

has more than 30 years of government<br />

and commercial business<br />

and operational experience. He<br />

has coached and managed teams of<br />

multiple sizes and prides himself on<br />

More on page 43


US Coast Guard Auxiliary celebrates 77th anniversary<br />

WASHINGTON – The U.S. Coast<br />

Guard’s all-volunteer service, the<br />

U.S. Coast Guard Auxiliary, celebrates<br />

77 years of service to the<br />

United States Thursday.<br />

“For the last 77 years, the U.S.<br />

Coast Guard Auxiliary has answered<br />

the call to support our Coast<br />

Guard and our great nation on the<br />

water, in the air and ashore,” said<br />

Mark Simoni, national commodore<br />

of the U.S. Coast Guard Auxiliary.<br />

The auxiliary is made up of more<br />

than 28,000 uniformed civilian volunteers<br />

and provides trained crews<br />

and facilities to augment the U.S.<br />

Coast Guard and enhance the safety<br />

and security of our nation’s ports,<br />

waterways and coastal regions.<br />

“With our unwavering support of<br />

our primary mission of promoting<br />

and improving recreational boating<br />

safety, we have seen historic lows in<br />

the number of boating fatalities and<br />

a new record low in the number of<br />

injuries to recreational boaters,” said<br />

Simoni.<br />

Over the last five years alone auxiliarists<br />

have performed 583,500<br />

vessel safety checks, taught 320,000<br />

hours of boating<br />

safety courses,<br />

conducted 809,000<br />

hours of public<br />

outreach, gave<br />

2 million hours<br />

of administrative<br />

support, rescued<br />

$157 million<br />

in property, and<br />

saved 785 lives,<br />

while assisting 11,000 others.<br />

Auxiliary members also provide<br />

skill sets not often found in<br />

the Coast Guard. For example, the<br />

Auxiliary Interpreter Corps has 450<br />

trained volunteers with expertise in<br />

48 languages. The Interpreter Corps<br />

fills roles in support of international<br />

training exercises, forums and partner<br />

nation programs.<br />

“Our auxiliarists bring their valuable<br />

skills, across 64 competencies,<br />

to all our Coast Guard missions,”<br />

said Coast Guard Commandant<br />

Adm. Paul Zukunft. “Our missions<br />

are far too many and far too<br />

complex to accomplish with so few<br />

people. Today, we sustain mission<br />

excellence with our entire force of<br />

active, reserve, civilian<br />

and volunteer<br />

auxiliarists.”<br />

“Auxiliarists<br />

are accountants,<br />

lawyers, doctors,<br />

chefs, carpenters,<br />

welders, public<br />

relations specialists,<br />

teachers, musicians<br />

and even a<br />

nuclear engineer or two,” said Zukunft.<br />

“They bring master-level proficiency<br />

to our service.”<br />

Auxiliarists operate in all 50 states,<br />

Puerto Rico, the U.S. Virgin Islands,<br />

America Samoa and Guam.<br />

The Coast Guard Auxiliary was<br />

authorized by an act of Congress<br />

in 1939, when the Coast Guard was<br />

given a legislative mandate to use<br />

civilians to promote safety on and<br />

over the high seas and the nation’s<br />

navigable waters.<br />

For more information on the auxiliary,<br />

please visit the U.S. Coast<br />

Guard Auxiliary website, or follow<br />

their official social media presence on<br />

Facebook and Twitter.<br />

31


NUI Galway has received Horizon 2020<br />

EU funding for ROCSAFE ITC using software<br />

and robots to gather evidence of chemical,<br />

biological or nuclear incidents<br />

<strong>June</strong> 20, <strong>2016</strong>: A team led by NUI<br />

Galway has been awarded €4.8<br />

Million in Horizon 2020 EU funding<br />

for their project ROCSAFE<br />

(Remotely Operated CBRNe<br />

Scene Assessment & Forensic<br />

Examination), which will use robotics<br />

and intelligent reasoning<br />

to gather forensic evidence in the<br />

event of a chemical, biological or<br />

nuclear incident.<br />

Led by Dr Michael Madden<br />

from the College of Engineering<br />

& Informatics at NUI Galway,<br />

the ROCSAFE project will focus<br />

on developing ICT and Security<br />

software to gather forensic intelligence<br />

in the event of a terrorist<br />

attack.<br />

ROCSAFE’s overall goal is<br />

to fundamentally change how<br />

CBRNe (chemical, biological,<br />

radiological and nuclear defense<br />

events) are assessed, and ensure<br />

the safety of crime scene investigators,<br />

by reducing the need for them<br />

to enter dangerous scenes to gather<br />

evidence.<br />

There are 13 SME and institutional<br />

partners in total involved in the<br />

NUI Galway Students<br />

ROCSAFE project across Ireland,<br />

Italy, Portugal, Spain and Germany,<br />

along with a wider set of advisory<br />

board members. This includes Scorpion<br />

Networks Ltd. an SME responsible<br />

for a handheld CBNRE platform<br />

project success under the last<br />

32<br />

EU funding round FP7.<br />

CBRNe accidents or terrorist attacks<br />

are a low probability but of<br />

high consequence. In the aftermath<br />

of a CBRNe event, the principles<br />

that govern the response<br />

mission are:<br />

• Protection of Life<br />

• Elimination/Reduction of Threat<br />

• Protection of Property<br />

• Preservation of Evidence<br />

• Restoration of Normal Activities<br />

ROCSAFE focuses specifically on<br />

three of these principles: the protection<br />

of life, the elimination/<br />

reduction on of the threat, and<br />

the preservation of evidence. By<br />

building a mobile remotely operated<br />

system, ROCSAFE can protect<br />

personnel by removing the<br />

need for them to go on-scene to<br />

identify threats, detect the presence<br />

of forensic material, and collect forensic<br />

material.<br />

In order to safely respond to a<br />

threat, it must first be identified. To<br />

do this, the scientific team will adapt<br />

robotic air and ground vehicles to


carry cameras and innovative sensors<br />

for the identification of CBRNe<br />

materials. To preserve evidence,<br />

they will equip the vehicles with<br />

tools to enable the careful and methodical<br />

collection of forensic materials<br />

and will develop procedures<br />

that are appropriate to remotely operated<br />

vehicles (ROVs), to preserve<br />

the integrity of the evidence chain.<br />

Using robotic aerial vehicles<br />

(RAVs) that will be remotely managed<br />

and semi-autonomous, ROC-<br />

SAFE will quickly gain a visual<br />

overview of the scene and identify<br />

hotspots. This will enable responders<br />

to quickly set up a perimeter to<br />

protect bystanders and start managing<br />

the scene. The RAVs will be<br />

equipped with cameras (operating<br />

in the visible and infra-red ranges)<br />

and sensors for detection of radiation/nuclear,<br />

chemical and biological<br />

threats. Data from these will be<br />

relayed to a Central Decision Management<br />

unit in real-time.<br />

The Central Decision Management<br />

will provide data analytics and<br />

decision support software to ensure<br />

all available data is presented in the<br />

Command Centre, which will be<br />

located in a safe zone near the periphery<br />

of the incident, to the onscene<br />

commanders in an intuitive<br />

and easy to assimilate manner. The<br />

Central Decision Management will<br />

include an innovative approach,<br />

which will be able to adapt to the<br />

evolving situation over time as information<br />

arrives from sensors<br />

and cameras, and the people on the<br />

scene provide inputs.<br />

ROCSAFE will use state-of-theart<br />

ground vehicles that are specifically<br />

designed for hazardous scenes,<br />

and will include the development<br />

of tools and procedures for gathering<br />

forensic material and evidence.<br />

The challenges in forensic evidence<br />

collection are to remove the possibility<br />

of cross-contamination and to<br />

ensure the integrity of the evidence<br />

chain.<br />

This process will ensure that<br />

CBRNe scenes are assessed more<br />

rapidly and thoroughly than is currently<br />

possible, and that forensic evidence<br />

and material is collected in a<br />

manner that stands up in court, and<br />

all without sending personnel into<br />

zones of high risk.<br />

NUI Galway has recently established<br />

a National Centre for Security<br />

Research to draw together the<br />

multiple strands of security-related<br />

research in the University, and to<br />

facilitate growth of this activity into<br />

the future.<br />

For further information visit:<br />

http://www.nuigalway.ie/securesocieties/<br />

About Horizon 2020 EU Funding<br />

33<br />

Horizon 2020 is the biggest EU Research<br />

and Innovation programme<br />

ever with nearly €80 billion of funding<br />

available over 7 years (2014 to<br />

2020) – in addition to the private<br />

investment that this money will<br />

attract. It promises more breakthroughs,<br />

discoveries and worldfirsts<br />

by taking great ideas from the<br />

lab to the market.<br />

Seen as a means to drive economic<br />

growth and create jobs, Horizon<br />

2020 has the political backing of<br />

Europe’s leaders and the Members<br />

of the European Parliament. They<br />

agreed that research is an investment<br />

in the future and so put it at<br />

the heart of the EU’s blueprint for<br />

smart, sustainable and inclusive<br />

growth and jobs.<br />

By coupling research and innovation,<br />

Horizon 2020 is helping to<br />

achieve this with its emphasis on<br />

excellent science, industrial leadership<br />

and tackling societal challenges.<br />

The goal is to ensure Europe produces<br />

world-class science, removes<br />

barriers to innovation and makes it<br />

easier for the public and private sectors<br />

to work together in delivering<br />

innovation while cooperating with<br />

its international counterparts outside<br />

of the EU.<br />

Visit:https://ec.europa.eu/programmes/horizon2020/en/what-horizon-2020


DHS Announces Grant Allocations for Fiscal Year<br />

<strong>2016</strong> Preparedness Grants<br />

<strong>June</strong> 29, <strong>2016</strong> - As part of the U.S.<br />

Department of Homeland Security’s<br />

(DHS) ongoing efforts to support<br />

state, local, tribal, and territorial<br />

partners, Secretary Jeh Johnson today<br />

announced<br />

final allocations<br />

of $275 million<br />

for six Fiscal<br />

Year (FY) <strong>2016</strong><br />

DHS competitive<br />

preparedness<br />

grant programs.<br />

These<br />

DHS Secretary<br />

Jeh Johnson<br />

allocations, in addition to the more<br />

than $1.3 billion in non-competitive<br />

grant funding announced by Secretary<br />

Johnson in February, total<br />

more than $1.6 billion in FY <strong>2016</strong> to<br />

assist states, urban areas, tribal and<br />

territorial governments, nonprofit<br />

agencies, and the private sector with<br />

their preparedness efforts.<br />

“In an ever-changing threat environment,<br />

our homeland security<br />

grants demonstrate the Department’s<br />

continued commitment to<br />

strengthening the nation’s preparedness<br />

and ability to respond to a wide<br />

variety of emergencies,” said Secretary<br />

Johnson. “These <strong>2016</strong> homeland<br />

security grant allocations will<br />

support our partners at all levels of<br />

government and the private sector,<br />

ensuring we remain vigilant and<br />

keep the homeland secure.”<br />

Together with previous grant<br />

funding awarded since 2002, DHS<br />

has awarded more than $47 billion<br />

to these partners. Preparedness<br />

grants strengthen our nation’s ability<br />

to prevent, protect against, mitigate,<br />

respond to, and recover from<br />

terrorist attacks, major disasters,<br />

and other emergencies in support of<br />

the National Preparedness Goal and<br />

the National Preparedness System.<br />

The FY <strong>2016</strong> grants focus on the<br />

nation’s highest risk areas, including<br />

urban areas that continue to face<br />

the most significant threats. Consistent<br />

with previous grant guidance,<br />

dedicated funding is provided<br />

for law enforcement and terrorism<br />

prevention activities throughout the<br />

country to prepare for, prevent, and<br />

respond to pre-operational activity<br />

and other crimes that are precursors<br />

or indicators of terrorist activity.<br />

Competitive Grant Program<br />

Allocations for Fiscal Year <strong>2016</strong>:<br />

Port Security Grant Program (PSGP)<br />

— a competitive grant that provides<br />

$100 million to help protect critical<br />

34<br />

port infrastructure from terrorism,<br />

enhance maritime domain awareness,<br />

improve port-wide maritime<br />

security risk management, and<br />

maintain or reestablish maritime<br />

security mitigation protocols that<br />

support port recovery and resiliency<br />

capabilities.<br />

Transit Security Grant Program<br />

(TSGP) — a competitive grant that<br />

provides $87 million to owners and<br />

operators of transit systems to protect<br />

critical surface transportation<br />

and the traveling public from acts of<br />

terrorism and to increase the resilience<br />

of transit infrastructure.<br />

Operation Stonegarden (OPSG)—<br />

a competitive grant that provides<br />

$55 million to enhance cooperation<br />

and coordination among local,<br />

tribal, territorial, state, and federal<br />

law enforcement agencies to jointly<br />

enhance security along the United<br />

States’ land and water borders where<br />

there are ongoing Customs and Border<br />

Protection missions.<br />

Nonprofit Security Grant Program<br />

(NSGP) — a competitive grant that<br />

provides $20 million to support target<br />

hardening and other physical se-<br />

More on page 46


Call for Nominations: DHS requests nominations for<br />

<strong>2016</strong> National Seminar and Tabletop Exercise (NITX)<br />

The U.S. Department of Homeland<br />

Security (DHS) requests topic/exercise<br />

scenario nominations<br />

for the <strong>2016</strong> National Seminar<br />

and Tabletop Exercise (NTTX)<br />

for Institutions of Higher Education.<br />

The <strong>2016</strong> NTTX will engage college<br />

and university representatives<br />

in workshop sessions and a tabletop<br />

exercise designed to help prepare<br />

participants to respond to a<br />

campus emergency. The tabletop<br />

exercise will engage team members<br />

and get the participants to work together<br />

to manage the response to a<br />

hypothetical incident. The overall<br />

event seeks to enhance knowledge<br />

of emergency operations planning,<br />

allow participants to improve their<br />

own performance and identify opportunities<br />

to improve capabilities<br />

to respond to real events.<br />

The DHS Office of Academic Engagement<br />

(OAE), in collaboration<br />

with the Federal Emergency Management<br />

Agency (FEMA) would<br />

like input on topics/exercise scenarios<br />

from the higher education<br />

and emergency management communities<br />

given their equities to<br />

and expertise in campus resilience<br />

emerging issues and trends impacting<br />

colleges and universities. The<br />

<strong>2016</strong> NTTX will take place in late<br />

October or early November.<br />

Topic/exercise scenario nominations<br />

must be received by <strong>June</strong> 17,<br />

<strong>2016</strong>.<br />

About the NTTX<br />

The NTTX is a series of campusbased<br />

events to test and promote<br />

campus resilience. Each event in<br />

the series includes workshops and<br />

an exercise scenario focused on<br />

a specific resilience-related topic<br />

impacting the higher education<br />

community. DHS launched the inaugural<br />

event in October 2014 at<br />

Northeastern University, providing<br />

insight into common planning,<br />

preparedness, and resilience best<br />

practices and challenges of the academic<br />

community when faced with<br />

an infectious disease outbreak. The<br />

second event in the series occurred<br />

in October 2015 at Indiana University<br />

and focused on the cyber threat<br />

landscape across the U.S. higher education<br />

community.<br />

35<br />

Selection Criteria<br />

Nominated topics/exercise scenarios<br />

should reflect campus resilience<br />

issues or trends that impact<br />

the college and university<br />

community. Topics/exercise scenarios<br />

should also align with DHS core<br />

missions:<br />

1. Prevent terrorism and enhancing<br />

security;<br />

2. Secure and manage our borders;<br />

3. Enforce and administer our immigration<br />

laws;<br />

4. Safeguard and secure cyberspace;<br />

and<br />

5. Ensure resilience to disasters.<br />

Please submit your recommended<br />

topic/exercise scenario nominations<br />

in order of priority. OAE will review<br />

topic/exercise scenario recommendations<br />

in coordination with FEMA<br />

to select the topic for the <strong>2016</strong><br />

NTTX. Upon selection of the topic/<br />

exercise scenario, OAE will begin<br />

outreach in July for participation in<br />

the fall event.<br />

Nomination Process<br />

Please send topic/exercise scenario<br />

nominations via email directly to<br />

More on page 45


Winners’ Portraits: <strong>GSN</strong> <strong>2016</strong> Airport, Seaport, Border Security Awa<br />

Implant Sciences:<br />

<strong>2016</strong> Winner, Best Explosives Detection Solution<br />

By Adrian Courtenay<br />

<strong>June</strong> 24, <strong>2016</strong> – As airports and<br />

nations around the globe become<br />

more concerned with every new act<br />

of terrorism, the U.S. Department<br />

of Homeland Security’s Transportation<br />

Security Administration (TSA)<br />

has committed tens of millions of<br />

dollars to an explosive trace detection<br />

(ETD) product: the Implant<br />

Sciences QS-B220.<br />

The TSA, considered the leading<br />

ETD evaluation agency in the<br />

world, qualified the QS-B220 for<br />

passenger and baggage screening in<br />

August of 2014. Shortly thereafter,<br />

the product became the first to pass<br />

Europeas stringent laboratory testing<br />

protocol in October 2014. Since<br />

that time, the TSA has awarded Implant<br />

Sciences an exclusive ID/IQ<br />

(basically an open purchase order)<br />

for $162 million, followed by an order<br />

for 1,170 units. These units are<br />

being installed right now.<br />

In Europe, the QSB220 has been<br />

deployed at airports in The Netherlands,<br />

France, Germany, Belgium,<br />

Norway, Austria, the Czech Republic,<br />

Romania, Cyprus and Poland.<br />

Among the many reasons for this<br />

overwhelming leadership, according<br />

to Dr. Darryl Jones, Executive<br />

Vice President of Implant Sciences,<br />

“the QS-B220 provides fast, accurate<br />

real-time detection of trace amounts<br />

of a wide variety of military, commercial<br />

and homemade explosives,<br />

as well as drugs. Featuring a low total<br />

cost of ownership , the system is<br />

easy to use, with intuitive controls<br />

that eliminate or reduce training requirements.<br />

“A patented automatic internal<br />

calibration system simplifies operations<br />

of the system and minimizes<br />

the need for manual calibration<br />

using costly consumables – and<br />

its small footprint is well suited to<br />

crowded security checkpoints. Unlike<br />

some competing systems, its<br />

low false alarm rate keeps airport<br />

operators on track. Furthermore,<br />

fewer false alarms means faster passenger<br />

through-put at checkpoints<br />

and fewer distractions for screening<br />

personnel. “<br />

According to President Robert<br />

Liscouski, a regular commentator<br />

on CNN, Fox News and other business<br />

and security media, who was<br />

36<br />

appointed by President George W.<br />

Bush as the first Assistant Secretary<br />

for Infrastructure Protection at the<br />

U.S. Department of Homeland Security,<br />

“Implant Sciences continues<br />

to innovate, earning its 19th patent,<br />

which significantly enhances the<br />

company’s non-contact sampling<br />

capability, making it an ideal tool<br />

for next generation ETD technology.<br />

In fact,” said Liscouski, “we have<br />

been awarded a developmental contract<br />

worth up to $2 million by the<br />

Department of Homeland Security<br />

to develop advanced ETD solutions.<br />

That contract is set to commence<br />

shortly.”<br />

Implant Sciences Markets<br />

As a leading manufacturer of explosive<br />

trace detection (ETD) and<br />

drugs trade detection solutions for<br />

homeland security applications, Implant<br />

Sciences products meet the<br />

needs of a wide variety of security<br />

venues:<br />

AVIATION<br />

The QS-B220 desktop ETD is the<br />

first product of its kind without radioactive<br />

materials to pass testing<br />

with both Transportation Security


ds Program<br />

Administration (TSA) and the European<br />

Civil Aviation Conference<br />

(ECAC), and has been selected for<br />

deployment in a number of major<br />

international airports globally. The<br />

company is dedicated to improving<br />

overall passenger experience while<br />

increasing screening efficiency and<br />

augmenting security.<br />

CARGO<br />

The QS-B220 is on the Qualified<br />

Products list in the TSA’s Air Cargo<br />

Screening Technology List (ACSTL)<br />

and was the first system to pass the<br />

ECAC Common Evaluation Process<br />

(CEP) for cargo. With sample results<br />

in 10 seconds more or less and<br />

a fast clear-down, the system allows<br />

freight forwarders and cargo screeners<br />

to clear shipments more quickly.<br />

CRITICAL INFRASTRUCTURE<br />

A wide range of critical infrastructure<br />

facilities rely on Implant Sciences<br />

to help protect them against<br />

terrorist attacks. Installations include<br />

nuclear power plants, oil and<br />

gas facilities, banks, embassies and<br />

other high-threat infrastructure.<br />

CUSTOMS AND BORDERS<br />

Able to detect a wide variety of illegal<br />

drugs, including synthetics<br />

such as Spice and Molly, as well as<br />

explosives, the desktop QS-B220 is<br />

an excellent tool for customs and<br />

borders.<br />

MILITARY AND<br />

FIRST RESPONSE<br />

Working in the even the most challenging<br />

of environments, the portable<br />

QS-H150 delivers performance<br />

and increases safety for those on<br />

the front lines. With one handed<br />

operation and minimal supply requirements,<br />

the system is extremely<br />

well-suited to field operations. For<br />

checkpoint applications, the TSAqualified<br />

QS-B220 provides the<br />

highest levels of detection.<br />

Here are the bios of four of the company<br />

leaders and management team<br />

who have contributed mightily to<br />

the company’s ongoing and growing<br />

success:<br />

DR. BILL McGANN,<br />

CHIEF EXECUTIVE OFFCER<br />

Dr. McGann,<br />

one of the original<br />

developers of<br />

commercial ion<br />

mobility spectrometry<br />

technology<br />

for explosives<br />

trace<br />

detection (ETD), joined Implant<br />

Sciences in April, 2012. He has authored<br />

over 70 research proposals<br />

to the U.S. Government, 20-plus<br />

37<br />

scientific publications and over<br />

25 patents in the areas of nuclear,<br />

chemical and biological detection<br />

technologies. He played a key role<br />

in creating an industry around ETD<br />

science and technology at Ion Track<br />

Instruments, which was acquired by<br />

General Electric. After the acquisition,<br />

Dr. McCann served as Vice-<br />

President, R&D at GE Ion Track<br />

and went on to become Chief Technology<br />

Officer of GE Security. Immediately<br />

prior to joining Implant<br />

Sciences, he was VP Engineering<br />

for Global Fire Products and United<br />

Technologies.<br />

ROBERT LISCOUSKI,<br />

PRESIDENT<br />

Mr. Liscouski is a<br />

recognized security<br />

and counterterrorism<br />

expert<br />

with more than<br />

30 years of experience<br />

as a senior<br />

government official,<br />

business leader, entrepreneur,<br />

special agent and law enforcement<br />

officer. After his appointment by<br />

President George W. Bush in 2003<br />

as first Assistant Secretary for Infrastructure<br />

Protection at the U.S.<br />

Department of Homeland Security,<br />

he worked closely with the White<br />

House and other federal agencies


Winners’ Portraits: <strong>GSN</strong> <strong>2016</strong> Airport, Seaport, Border Security Awa<br />

to design, develop and implement<br />

the framework to protect the nation’s<br />

critical infrastructure following<br />

9/11. Early in his career, Mr. Liscouski<br />

worked in law enforcement<br />

as a homicide and undercover investigator<br />

and special agent for the<br />

Diplomatic Security Service before<br />

joining a Fortune 500 to develop<br />

security systems to protect information<br />

technology and intellectual<br />

property.<br />

TODD SILVESTRI,<br />

CHIEF OPERATING OFFICER<br />

Mr. Silvestri<br />

joined Implant<br />

Sciences in September,<br />

2008 as<br />

Vice President,<br />

Technology and<br />

Product Development<br />

to lead<br />

the Company’s product development<br />

and certification process.<br />

Under his leadership, the QS-B220<br />

was successfully launched in 2010<br />

and has been certified by the TSA,<br />

ECAC, CAAC and other worldwide<br />

organizations. Mr. Silvestri was promoted<br />

to Chief Operating Officer<br />

in October, 2015. He holds a Masters<br />

Degree in Business from the<br />

Kellogg School of Management at<br />

Northwestern University, as well as<br />

a BS in Chemical Engineering from<br />

Clarkson University.<br />

DR DARRYL JONES,<br />

EXECUTIVE VICE PRESIDENT<br />

Joining Implant<br />

Sciences in May,<br />

2012, Dr. Jones<br />

brings significant<br />

homeland<br />

security industry<br />

experience to<br />

the Company’s<br />

sales and marketing efforts. He was<br />

previously Vice President of Global<br />

Product Management at Safran’s<br />

Morpho Detection, where he managed<br />

one of the largest ETD and EDS<br />

product portfolios in the industry,<br />

and helped launch the X-ray and<br />

Raman spectroscopy product lines.<br />

Prior to GE Security’s sale to Safran,<br />

Dr. Jones was General Manager of<br />

Global Security Sales at GE Secu-<br />

38<br />

rity, where he recruited and developed<br />

a glob al sales team focused on<br />

six key markets and achieved yearover-year<br />

top line growth. Dr. Jones<br />

has been issued a patent, authored<br />

six papers in scientific publications,<br />

and delivered nine presentations.<br />

He received his PHD in Optical Science<br />

and Engineering from the University<br />

of Alabama, and a Master of<br />

Arts in Physics from Fisk University.<br />

The staff of Government Security<br />

News, Lead Sponsor HID GLOBAL<br />

and Lead Judge Chuck Brooks congratulate<br />

Implant Sciences as <strong>2016</strong><br />

Winner in the category of “Best Explosives<br />

Detection System” in the<br />

<strong>GSN</strong> <strong>2016</strong> Airport, Seaport, Border<br />

Security Awards Program and wishes<br />

the company many more years of<br />

brilliant technological success!


ds Program<br />

PureTech Systems:<br />

<strong>2016</strong> Winner, Best Video Analytics Solutions<br />

By Adrian Courtenay<br />

<strong>June</strong> 24, <strong>2016</strong> – PureTech Systems<br />

describes itself on its website as follows:<br />

“Founded in March, 2005,<br />

PureTech Systems is an Arizona<br />

based computer vision software<br />

company that develops and markets<br />

its patented PureActiv video analytics<br />

surveillance software, which<br />

is used for perimeter protection of<br />

critical facilities and infrastructure.<br />

Current customers include large<br />

deployments in several seaports,<br />

airports, military bases, transit railways,<br />

and country borders.”<br />

The company’s performance in<br />

the <strong>2016</strong> Airport, Seaport, Border<br />

Security Awards Program certainly<br />

supports this description, and a<br />

<strong>GSN</strong> Interview with Larry J. Bowe,<br />

Jr, Founder and President and Eric<br />

Olson, Vice President of Marketing,<br />

provided lots of further examples of<br />

PureTech’s activities that confirmed<br />

the claims.<br />

As the company put the case in<br />

its entry into the <strong>GSN</strong> Awards Program,<br />

“PureActiv geospatial video<br />

analytics provide security professionals<br />

with accurate, real-time<br />

alarms and video of suspicious activity<br />

in outdoor and remote environments<br />

while minimizing nuisance<br />

alarm.” That’s a mouthful, but<br />

when you consider the company’s<br />

markets, it’s clear that every word in<br />

that sentence is appropriate.<br />

One of the company’s large deployments<br />

is along the Southern<br />

Border of the U.S, where PureTech<br />

Systems is a technology supplier<br />

to General Dynamics Information<br />

Technology (GDIT), providing<br />

all video technology including:<br />

1) “Full motion video” (i.e. streams<br />

full frame rate and full quality video<br />

to the agents), 2) geospatial mapbased<br />

camera control, and 3) longrange<br />

video analytics including PTZ<br />

Auto-tracking. The border deployment,<br />

referred to as RVSS (Remote<br />

Video Surveillance System) is currently<br />

deployed at the Arizona border<br />

and is scheduled for deployment<br />

along the Texas border.<br />

Detecting and computing the locations<br />

of intruders and left behind<br />

objects is a very important capability<br />

of the software. – Security personnel<br />

need to know where the intruders<br />

are, where they have been,<br />

39<br />

and where they may have dropped<br />

a package. Knowing this information<br />

then enables automated control<br />

of PTZ cameras equipped with<br />

PureTech’s Auto-tracking capability<br />

and deterrent sensors, such as,<br />

an acoustic loud hailers like those<br />

provided by the LRAD Corporation<br />

(another Winner in this year’s<br />

Airport, Seaport, Border Security<br />

Awards). In this environment, Larry<br />

Bowe explained, the PureActiv<br />

technology can be thought of as<br />

turning surveillance cameras into<br />

“passive radars.” While radar emits a<br />

signal and expects a return, cameras<br />

do not have active return signals.<br />

When cameras are integrated with<br />

PureTech’s powerful geo-referencing<br />

software, in addition to pointing<br />

PTZ cameras and deterrent devices,<br />

security personnel are provided<br />

with the location of security targets,<br />

which they can use to orchestrate<br />

apprehensions.<br />

Water and electric utilities are<br />

another logical client for PureTech<br />

Systems, for the simple reason that<br />

oftentimes first responders may not<br />

be able to arrive at a remote substation<br />

for several minutes after being


Winners’ Portraits: <strong>GSN</strong> <strong>2016</strong> Airport, Seaport, Border Security Awa<br />

contacted, due to the distance they<br />

must travel. Once again, PureTech’s<br />

technology enables early detection<br />

of suspicious activity, which affords<br />

security personnel the opportunity<br />

to 1) deter the intruder through the<br />

use of non-lethal loud hailers and<br />

strobe-lights, 2) automatically lock<br />

down critical access and equipment,<br />

and 3) notify law enforcement as<br />

early as possible.<br />

Transportation is another important<br />

market for PureTech Systems,<br />

which works with a number<br />

of Seaports including the Ports of<br />

Charleston, Seattle, and Tacoma.<br />

The company’s technology is also<br />

well suited to safeguard critical infrastructure<br />

including public transit<br />

railways and tunnels. Operating<br />

effectively in these environments is<br />

quite challenging since the system<br />

must cope with normal traffic while<br />

still detecting abnormal activities.<br />

Detecting persons who have fallen<br />

off a cruise ship is something else<br />

that PureTech Systems can handle,<br />

and in fact, the company was Winner<br />

in the Man-over board rescue<br />

category in <strong>GSN</strong>’s 2015 program.<br />

Protection of transit, railroad, utility,<br />

and bridge infrastructures are all<br />

logical applications for the Pure-<br />

Activ package, along with Coastal<br />

applications that include determining<br />

whether an incoming ship fits<br />

the expected profile or could pose<br />

a threat. The company also addresses<br />

safety applications such as<br />

one example that keeps people out<br />

of harm’s way of nearby moving machinery.<br />

To sum up (some of what we<br />

learned), PureTech Systems focus<br />

is on the creation of computer vision<br />

software. They specialize in<br />

long range applications, applying<br />

their patented video analytics and<br />

integrating with other surveillance<br />

sensors such as radar, gun-shot detection,<br />

fence sensors, and drone<br />

detection, as needed, to address a<br />

variety of surveillance and safety applications.<br />

Here are the bios of four<br />

of the company leaders who have<br />

contributed mightily to the company’s<br />

ongoing and growing success:<br />

LARRY J. BOWE, JR,<br />

FOUNDER AND CEO<br />

40<br />

Larry founded<br />

PureTech in<br />

March 2005. Prior<br />

to PureTech,<br />

Larry was Vice<br />

President of Business<br />

Development<br />

for Verint<br />

Video Systems, from 2001 to March<br />

2005. In this role, Larry had overall<br />

responsibility for Product Management,<br />

technology licensing, acquisitions<br />

and their mobile digital video<br />

business. Prior to joining Verint,<br />

Larry had a 17 year career at Honeywell,<br />

where he held several technical<br />

leadership positions in both their<br />

Homes and Buildings and Avionics<br />

SBUs. Larry shared global responsibility<br />

for technology planning<br />

and budgeting for their billion dollar<br />

Homes and Buildings Solutions<br />

SBU. Larry was one of a select few to<br />

be nominated to participate in Honeywell’s<br />

2-year Leadership training<br />

program, which he completed. Prior<br />

to joining Honeywell, Larry worked<br />

for Motorola’s government electronics<br />

group, whose focus was the<br />

manufacturing of satellite electronic<br />

systems. Larry holds a BS in Computer<br />

Science from Arizona State<br />

University School of Engineering<br />

and an MBA from the University of<br />

Phoenix.<br />

FEREYDOUN MAALI,<br />

CHIEF IMAGING SCIENTIST<br />

Fereydoun Maali,<br />

who joined<br />

PureTech Systems<br />

in March<br />

2005, has worked<br />

in image processing<br />

and related<br />

areas addressing<br />

applications in robotic vision (2D<br />

& 3D) biometrical, automotive, de-


ds Program<br />

fense, electronics, semiconductor<br />

and analytics of surveillance since<br />

1983. From 1985-1991 he was a Senior<br />

R&D Engineer at Robotic Vision<br />

Systems, Long Island, NY. He<br />

has a DIC, MSc, PHD from Imperial<br />

College U.K., where his doctoral<br />

focus was “Image Processing and<br />

Pattern Recognition for Industrial<br />

Robotic Vision.” He is a Chartered<br />

Electrical Engineer (CEng) and a<br />

senior member of IEEE. He has received<br />

18 US patents in image processing<br />

and related areas, with additional<br />

patents pending.<br />

WADE BARNES,<br />

VICE PRESIDENT<br />

ENGINEERING &<br />

CHIEF SOFTWARE ARCHITECT<br />

Wade Barnes,<br />

who joined<br />

PureTech in September<br />

2006, has<br />

been in the information<br />

technology<br />

industry<br />

since 1977, having<br />

worked in the areas of distributed<br />

computing, large systems design<br />

and computer applications in<br />

diverse fields, including security,<br />

health care, financial and minerals<br />

industry. He is a winner of the<br />

3M Technical Circle of Excellence<br />

Award and the Oblad Award from<br />

the University of Utah. Mr. Barnes<br />

has B.S. and M.S. degrees in mining<br />

engineering and an M.S. degree in<br />

computer sciences.<br />

ERIC OLSON,<br />

VICE PRESIDENT MARKETING<br />

Eric Olson joined<br />

PureTech in<br />

March 2006. Eric<br />

leads the marketing<br />

organization,<br />

with accountability<br />

for product<br />

positioning,<br />

media relations, trade shows and<br />

social media. Prior to joining the<br />

company, he spent over 18 years in<br />

the aerospace market, initially as an<br />

electrical engineer responsible for<br />

design, specification and test of critical<br />

flight systems, and later secur-<br />

41<br />

ing leadership roles in alliance management,<br />

competitive intelligence,<br />

program management and product<br />

management. Olson is a certified<br />

Six Sigma Black Belt, trained and<br />

certified in the development of sales<br />

and marketing processes. He holds<br />

a B.S. in Electrical and Computer<br />

Engineering from the University of<br />

Iowa, an MBA from Arizona State<br />

University and a Global Leadership<br />

Certificate from Thunderbird<br />

Graduate School of International<br />

Management.<br />

Govermment Security News congratulates<br />

PureTech Systems as <strong>2016</strong><br />

Winner in he category the Best Video<br />

Analytics Awards and wishes the<br />

company many more years of brilliant<br />

success!


Russelelectric appoints Dorian<br />

Alexandrescue as President/CEO<br />

HINGHAM, MA — John Russell,<br />

Chairman of the Board of Russelectric<br />

Inc., recently announced the appointment<br />

of Dorian Alexandrescu as the<br />

company’s new President and CEO.<br />

Mr. Alexandrescu has over<br />

20 years of extensive management<br />

experience across<br />

industry segments ranging<br />

from electrical equipment,<br />

energy management, and<br />

clean energy to automotive,<br />

industrial automation,<br />

packaging, and consumer Dorian Alexandrescue<br />

goods. Most recently, he<br />

served as President and CEO of RESA<br />

Power Solutions, a market leader in<br />

life extension products and services<br />

for electric power transmission,<br />

distribution, and circuit protection<br />

equipment. Prior to that, he was Vice<br />

President and General Manager of<br />

Eaton Corporation/Power Distribution<br />

Operations’ Latin America and<br />

Caribbean Division. Alexandrescu<br />

has an International Baccalaureate in<br />

Electromechanical Engineering, the<br />

equivalent of an MS in Theoretical<br />

Physics and Technology Applications<br />

from the University of Bucharest, and<br />

is a graduate of the Executive Development<br />

Program of Dartmouth College’s<br />

Amos Tuck Business School.<br />

Mr. Alexandrescu takes over for<br />

George Whittaker, who is retiring<br />

after 48 years of service. Whittaker<br />

succeeded Raymond G. Russell, Russelectric’s<br />

founder and owner. Chairman<br />

John Russell commented, “We<br />

want to thank George for his wise<br />

stewardship. We also want<br />

to welcome Dorian, who is<br />

committed to running and<br />

growing the company in<br />

the spirit my father — independently-owned,<br />

innovative,<br />

and uncompromising<br />

on quality.”<br />

Founded in 1955, Russelectric<br />

Inc. designs and<br />

manufactures integrated emergency<br />

and standby power control systems<br />

for mission critical facilities. Manufactured<br />

at facilities in Hingham,<br />

Massachusetts, and Broken Arrow,<br />

Oklahoma, the company’s sophisticated<br />

power control systems, transfer<br />

switches, and bypass/isolation<br />

switches are widely used in advanced<br />

data centers, banks, hospitals, and<br />

other vital installations.<br />

For more information, contact John<br />

A. Meuleman, Vice President, Sales &<br />

Marketing, Russelectric, South Shore<br />

Park, Hingham, MA 02043-4387,<br />

TEL: (781) 749-6000, FAX: (781) 749-<br />

4205, www.russelectric.com, e-mail:<br />

info@russelectric.com.<br />

42<br />

Federal court orders release of<br />

evidence blocked by Customs and<br />

Border Patrol<br />

Continued from page 4<br />

able continuation of detention operations<br />

that knowingly violate U.S.<br />

and international law as well as its<br />

own standards.”<br />

“The images unsealed by the court<br />

are just the tip of the iceberg,” said<br />

Nora Preciado, staff attorney with<br />

the National Immigration Law Center.<br />

“These abuses have been kept<br />

hidden for too long. As these initial<br />

images begin to reveal, we can no<br />

longer wait for meaningful and lasting<br />

reforms; the time is now.”<br />

Jane Doe, et al. v. Johnson, et al.<br />

was filed in the U.S. District Court<br />

for the District of Arizona. Attorneys<br />

on the case include Harold J.<br />

McElhinny, Colette Reiner Mayer,<br />

Louise C. Stoupe, Kevin M. Coles,<br />

Pieter S. de Ganon, and Elizabeth<br />

Balassone of Morrison & Foerster<br />

LLP; Nora Preciado, Linton Joaquin,<br />

and Karen C. Tumlin of the<br />

National Immigration Law Center;<br />

Mary Kenney, and Melissa Crow of<br />

the American Immigration Council;<br />

Travis Silva of the Lawyers’<br />

Committee for Civil Rights of the<br />

San Francisco Bay Area; and James<br />

Lyall and Dan Pochoda of ACLU of<br />

Arizona.<br />

For additional links to complaint,<br />

FAQ, Fact Sheet on FOIA Data and<br />

more, click here.


Hikvision honors children of first<br />

responders with Youth Scholarship<br />

Continued from page 5<br />

mented Jeffrey He, president of<br />

Hikvision USA and Hikvision Canada.<br />

“It is our honor to support the<br />

children of first responders, and we<br />

wish these young people the greatest<br />

success in their future endeavors.”<br />

To learn about Hikvision’s comprehensive<br />

product suite of video<br />

surveillance solutions, see them in<br />

person at ESX, booth 311, <strong>June</strong> 8-10.<br />

About Hikvision<br />

Hikvision is the world’s leading supplier<br />

of video surveillance solutions.<br />

Featuring the industry’s strongest<br />

R&D workforce, Hikvision designs,<br />

develops, and manufactures standard-<br />

and high-definition cameras,<br />

including a variety of IP cameras,<br />

analog cameras, and cameras featuring<br />

the latest in high-definition<br />

analog technology. Hikvision’s<br />

product suite also includes digital<br />

video servers, hybrid and standalone<br />

DVRs, NVRs, and other elements<br />

of sophisticated security systems<br />

for both indoor and outdoor<br />

use.<br />

Rose: Improving teleworking<br />

programs through trusting work<br />

relationships<br />

Continued from page 30<br />

their success. He taught classes at<br />

the business level in topics of contracts<br />

management, negotiations,<br />

and program management and has<br />

been recognized for his outstanding<br />

presentation style and approach to<br />

teaching. Dr. Rose received his BS in<br />

administration of justice at the Virginia<br />

Commonwealth University,<br />

his MS in administration of justice<br />

from American University, and his<br />

PhD in management and organization<br />

leadership from Cappella University.<br />

About Salient CRGT<br />

43<br />

Convy: New Mobile Technology for<br />

Disaster Response<br />

Continued from page 27<br />

Right now, Gyst is a free application<br />

(gystapp.com), that can be used<br />

by any government or commercial<br />

organization. As the company becomes<br />

more established, it will implement<br />

a pricing model to assure its<br />

own sustainability.<br />

I will be watching the progress of<br />

Gyst and similar mobile messaging<br />

app developers over the coming<br />

months and years, and I suspect that<br />

we will be hearing a lot more about<br />

the development and implementation<br />

of the rapidly growing mobile<br />

segment.<br />

John Convy and Convy Associates<br />

provide strategic alliance, A&E consultant,<br />

technology ecosystem, and<br />

lead generation programs to monetize<br />

relationships and accelerate demand<br />

for leading security industry manufacturers.<br />

John is the Founder and<br />

Managing Director of the Open Standards<br />

Security Alliance and the IP<br />

Security Academy, and a speaker at<br />

many global industry events. Email:<br />

John@ConvyAssociates.com<br />

Salient CRGT provides Agile software<br />

development, data analytics,<br />

mobility, cyber security and infrastructure<br />

solutions. We support<br />

these core capabilities with full lifecycle<br />

IT services and training—to<br />

help our customers meet critical<br />

goals for pivotal missions. We are<br />

purpose built for IT transformation<br />

supporting federal civilian, defense,<br />

homeland, and intelligence agencies,<br />

as well as Fortune 1000 companies.<br />

We use the most innovative<br />

talent delivery model in the industry,<br />

scientifically providing exactly<br />

the right people for the customers’<br />

most pressing requirements. Salient<br />

CRGT has earned a record of success<br />

with integration and operations<br />

of large‐scale, high‐volume solutions.<br />

On September 15, 2015, Salient<br />

and CRGT announced closing<br />

of the merger transactions – visit<br />

newsroom. For additional information<br />

on Salient and CRGT, visit<br />

www.salientcrgt.com.


George Lane: Post-Traumatic Stress<br />

Disorder is Caused by Physical as<br />

well as Psychological Trauma<br />

Continued from page 17<br />

brain injury across the entire military.<br />

They were called the “Gray<br />

Team”, named partly for gray matter<br />

and partly because the men’s hair<br />

was going gray. They were mostly<br />

military officers, all of them had<br />

advanced degrees in medicine or<br />

science, and almost all of them had<br />

seen combat. The “Gray Team” bethe<br />

brain rather than just the body.<br />

But it was still very difficult to isolate<br />

blast from all the other physical<br />

and mental effects of being exposed<br />

to an explosion in a combat zone.<br />

A major advance came in 2007<br />

when an engineering firm called<br />

Applied Research Associates received<br />

a call from the SWAT team of<br />

the Arapahoe County Sheriff ’s Office<br />

in Colorado. The officers were<br />

worried about possible neurological<br />

effects from “breaching”, the practice<br />

of blowing open doors with small<br />

explosive charges. Almost every<br />

major city in the United States has<br />

“breacher” teams. The Applied Research<br />

team quickly recognized that<br />

monitoring “breachers” would allow<br />

them to observe blast in its pure<br />

form because the charges are too<br />

small to knock soldiers over or give<br />

them concussions. They are subject<br />

only to the blast wave. Their report<br />

found a small but distinct decline in<br />

performance among the instructors,<br />

who are exposed to far more blasts<br />

than students. 12<br />

Some senior officers were frustrated<br />

because they had seen too many<br />

soldiers discharged for disciplinary<br />

issues that were actually related to<br />

brain injury. Several other experts<br />

joined to monitor the treatment of<br />

Monument in central England called “Shot at Dawn”<br />

lieved that a blast wave’s effects on<br />

the body were far more extreme and<br />

more complex than the concussion<br />

model could account for. But their<br />

main task was to take brain injury<br />

more seriously.<br />

The distinction between organic<br />

and emotional injury can be very<br />

blurry. Trauma changes neuronal<br />

George Lane has 25 years of experience in the development of chemical security<br />

systems, conducting research as a NASA Fellow at the Stennis Space<br />

Center and as a NSF Fellow. Lane was air quality SME for the University<br />

of California at Berkeley Center for Catastrophic Risk Management during<br />

the BP Oil Spill. Lane is currently chemical security SME for the Naval<br />

Postgraduate School Maritime Interdiction Operations in the Center for<br />

Network Innovation and Experimentation.<br />

44


patterns, and therapy can alter a<br />

brain that has been physically damaged.<br />

Dr. David Brody, a neurologist<br />

who has worked extensively with<br />

the military, said “Everything we<br />

know suggests that people with structural<br />

lesion will also respond to pharmacological<br />

and psychological treatment,”.<br />

13 Dr. Perl is continuing to<br />

examine the brains of blast-injured<br />

soldiers. After five years of working<br />

with the military, he feels sure that<br />

many blast injuries have not been<br />

identified. He said recently “We<br />

could be talking many thousands<br />

of types of brain injuries. And what<br />

scares me is that what we’re seeing<br />

now might just be the first round. If<br />

they survive the initial injuries, many<br />

of them may develop C.T.E. years or<br />

decades later.” 14<br />

References<br />

1. Bentley, S., “Short history of PTSD: From<br />

Thermopylae to Hue soldiers have always had a<br />

disturbing reaction to war”. Vietnam Veterans<br />

of America: The Veteran, 2005; www.vva.org/<br />

archive/TheVeteran/2005_03/feature_HistoryPTSD.htm<br />

2. Caroline Alexander, “World War I: 100<br />

Years Later - The Shock of War”, Smithsonian<br />

<strong>Magazine</strong>, September 2010; http://www.smith-<br />

sonianmag.com/history/the-shock-of-war-<br />

55376701/?no-ist<br />

3. C.N. Trueman “World War One executions”,<br />

The History Learning Site, March 3, <strong>2016</strong>; www.<br />

historylearningsite.co.uk/world-war-one/thewestern-front-in-world-war-one/world-warone-executions/<br />

4. Gerard Oram, “Desertion and deserters”,<br />

British Military Law and the Death Penalty<br />

(1868-1918), Crime, History, & Societies; Vol. 5,<br />

no.1, 2001; https://chs.revues.org/782<br />

5. Peter Taylor-Whiffen, “Shot at Dawn: Cowards,<br />

Traitors or Victims?” March 3, 2011; www.<br />

bbc.co.uk/history/british/britain_wwone/shot_<br />

at_dawn_01.shtm<br />

6. Daniel Perl, “Characterization of interface<br />

astroglial scarring in the human brain after blast<br />

exposure: a post-mortem case series”, The Lancet<br />

Neurology, <strong>June</strong> 9, <strong>2016</strong>; www.thelancet.com/<br />

pdfs/journals/laneur/PIIS1474-4422(16)30057-<br />

6.pdf<br />

7. McLeod, S. A. (2010). “What is the Stress<br />

Response?” www.simplypsychology.org/stressbiology.html<br />

8. Edgar Jones, PhD, “Battle for the mind:<br />

World War 1 and the birth of military psychiatry”,<br />

The Lancet, Volume 384, No. 9955, p1708–1714,<br />

November 8, 2014; http://thelancet.com/journals/lancet/article/PIIS0140-6736(14)61260-5/<br />

fulltext<br />

9. Berlinda S. Martinez, “A Health Hazard<br />

Assessment for Blast Overpressure Exposures<br />

Subtitle - Citation Database - Version 1”, www.<br />

researchgate.net/publication/235121426_A_<br />

Health_Hazard_Assessment_for_Blast_Overpressure_Exposures_Subtitle_-_Citation_Database_-_Version_1<br />

10. Amy Courtney, ”The Complexity of Causing<br />

Primary Blast-Induced Traumatic Brain Injury:<br />

A Review of Potential Mechanisms”, Front<br />

Neurol. 2015; 6: 221.<br />

11. Charles Needham, “Blast Waves”, 2010;<br />

http://www.springer.com/us/book/9783642052873<br />

12. “Study Suggests a Link Between Head Injury<br />

and PTSD”, Department of Defense Blast<br />

Injury Research Program; blastinjuryresearch.<br />

amedd.army.mil/index.cfm?f=application.<br />

accomplishments&yr=2007<br />

13. Dr. David Brody, “Blast-Related Brain Injury:<br />

Imaging for Clinical and Research Applications:<br />

Report of the 2008 St. Louis Workshop”, J.<br />

Neurotrauma. Dec; 26(12): 2127–2144. 2009<br />

14. Dr. Daniel Perl, “What if PTSD is more<br />

physical than psychological”, New York Times,<br />

www.nytimes.com/<strong>2016</strong>/06/12/magazine/whatif-ptsd-is-more-physical-than-psychological.<br />

html?emc=edit_au_<strong>2016</strong>0610&nl=afternoonup<br />

date&nlid=57532744<br />

DHS requests nominations for <strong>2016</strong><br />

National Seminar and Tabletop<br />

Exercise (NITX)<br />

Continued from page 35<br />

OAE at: AcademicEngagement@<br />

hq.dhs.gov. Please include the following<br />

subject line in your message:<br />

<strong>2016</strong> NTTX Topic Nomination<br />

Additional Opportunity: Join the<br />

NTTX Planning Team<br />

In addition to the contribution of<br />

potential topics/exercise scenarios,<br />

DHS is actively looking for representatives<br />

from colleges and universities<br />

to join the NTTX planning<br />

team. The NTTX planning team,<br />

which helps inform and develop<br />

materials for the event, convenes<br />

monthly via teleconference (in-person<br />

available) in advance of the fall<br />

<strong>2016</strong> event.<br />

To participate in the planning<br />

team process and for additional details,<br />

please contact the Office of Academic<br />

Engagement at: AcademicEngagement@hq.dhs.gov.<br />

Please<br />

include the following subject line<br />

in your message: <strong>2016</strong> NTTX Planning<br />

Team<br />

Any additional questions on the<br />

<strong>2016</strong> NTTX can also be directed<br />

to OAE: AcademicEngagement@<br />

hq.dhs.gov.<br />

45


DHS Announces Grant Allocations<br />

for Fiscal Year <strong>2016</strong> Preparedness<br />

Grants<br />

Continued from page 34<br />

Awards made to the states and urban<br />

areas for HSGP carry pass-through<br />

requirements. Pass-through is decurity<br />

enhancements for nonprofit<br />

organizations that are at high risk of<br />

a terrorist attack and located within<br />

one of the 29 Fiscal Year <strong>2016</strong> UASIeligible<br />

urban areas.<br />

Tribal Homeland Security Grant<br />

Program (THSGP) — a competitive<br />

grant that provides $10 million to<br />

eligible tribal nations to implement<br />

preparedness initiatives to help<br />

strengthen the nation against risk<br />

associated with potential terrorist<br />

attacks and other hazards.<br />

Intercity Bus Security Grant Program<br />

(IBSGP) — a competitive<br />

grant that provides $3 million to<br />

assist operators of fixed-route intercity<br />

and charter bus services within<br />

high-threat urban areas to protect<br />

bus systems and the traveling public<br />

from acts of terrorism, major disasters<br />

and other emergencies.<br />

In addition to the competitive grants<br />

announced today, in February <strong>2016</strong>,<br />

Secretary Johnson announced more<br />

than $1.3 billion in preparedness<br />

grant program funding.<br />

Non-Competitive Grant Program<br />

Allocations for Fiscal Year <strong>2016</strong>:<br />

vides more than $350 million to<br />

assist local, tribal, territorial, and<br />

state governments in enhancing and<br />

sustaining all-hazards emergency<br />

management capabilities.<br />

Intercity Passenger Rail - Amtrak<br />

(IPR) Program — a non-competitive<br />

grant that provides $10 million to<br />

protect critical surface transportation<br />

infrastructure and the traveling<br />

public from acts of terrorism and<br />

increase the resilience of the Amtrak<br />

rail system.<br />

Homeland Security Grant Program<br />

(HSGP) — provides more than $1<br />

billion for states and urban areas to<br />

prevent, protect against, mitigate,<br />

respond to, and recover from acts<br />

of terrorism and other threats. The<br />

HSGP grants are:<br />

• State Homeland Security Program<br />

(SHSP) — a non-competitive<br />

grant that provides $402 million<br />

to support the implementation of<br />

the National Preparedness System<br />

to build and strengthen preparedness<br />

capabilities at all levels.<br />

• Urban Areas Security Initiative<br />

(UASI) — a non-competitive<br />

grant that provides $580 million<br />

to enhance regional preparedness<br />

and capabilities in 29 high-threat,<br />

high-density areas.<br />

46<br />

Emergency Management Performance<br />

Grant (EMPG) Program — a<br />

non-competitive grant that profined<br />

as an obligation on the part<br />

of the State Administrative Agency<br />

(SAA) to make funds available to<br />

local units of government, combinations<br />

of local units, tribal governments,<br />

or other specific groups<br />

or organizations. The SAA must<br />

obligate at least 80 percent (80%) of<br />

the funds awarded under SHSP and<br />

UASI to local or tribal units of government.<br />

Per section 2006 of the Homeland<br />

Security Act of 2002, as amended<br />

(6 U.S.C. § 607), DHS/FEMA is required<br />

to ensure that at least 25 percent<br />

of grant funding must be used<br />

for law enforcement terrorism prevention<br />

activities.<br />

Further information on DHS’s<br />

preparedness grant programs is<br />

available at www.dhs.gov and http://<br />

www.fema.gov/grants.<br />

Sign-up for Free <strong>GSN</strong><br />

Print/<strong>Digital</strong> <strong>Edition</strong>s<br />

& Email Newsletters<br />

CLICK HERE


The News Leader in Physical, IT and Homeland Security<br />

CEO/Editorial Director<br />

Adrian Courtenay<br />

917-696-5782<br />

acourtenay@gsnmagazine.com<br />

Editor<br />

Steve Bittenbender<br />

502-552-1450<br />

sbittenbender@gsnmagazine.com<br />

Senior Writer<br />

Karen Ferrick-Roman<br />

412-671-1456<br />

karenferrickroman@gmail.com<br />

Shawn Campbell, Columnist<br />

Campbell on Crypto<br />

shawn.campbell@safenetat.com<br />

John Convy, Columnist<br />

Convy on Net-Centric Security<br />

john@convyassociates.com<br />

George Lane, Columnist<br />

Hazmat Science & Public Policy<br />

georgelane@hotmail.com<br />

Lloyd McCoy,Jr,<br />

Contributing Author<br />

Lloyd_McCoy@immixgroup.com<br />

Walter Ewing,<br />

American Immigration Council<br />

Contributing Author<br />

Mike Pena, Apprio<br />

Contributing Author<br />

202-863-9281<br />

Adelle Rydman, Zenoss<br />

Contributing Author<br />

arydman@zenoss.com<br />

Gerry O’Hara, Art Director<br />

OHDesign3<br />

gerry@ohd3.com<br />

For <strong>GSN</strong> Media Kit<br />

or Advertising Rates,<br />

contact Adrian Courtenay<br />

at 917-696-5782<br />

or by email at<br />

acourtenay@gsnmagazine.com<br />

Coming Attractions<br />

<strong>2016</strong><br />

July<br />

Tech Focus<br />

Perimeter Protection/<br />

Intrusion Detection<br />

Market Focus<br />

Airport/Aviation<br />

Security<br />

August<br />

Tech Focus<br />

Access Control/<br />

Biometric ID<br />

Market Focus<br />

Maritime/Coastal/<br />

Port Security<br />

September<br />

Tech Focus<br />

School Safety/<br />

Mobile & Surveillance<br />

Solutions<br />

Market Focus<br />

Oil/Gas/Electric Grid<br />

Security<br />

47

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!