GSN Magazine June 2016 Digital Edition


Government Security News


Why broadening U.S. – Mexico cooperation is good for America, by Walter Ewing,

American Immigration Council – Page 8

Also in this issue:

Federal Court orders release of evidence blocked by Customs and Border Protection of deplorable conditions

in Tucson facilities – Page 4

Major scientific discovery: Post-Traumatic Stress Disorder found to be caused by physical trauma, by GSN

Columnist George Lane – Page 14

Disaster Preparedness Report, Articles and Tech from Apprio, Emergency Communications Network and

Convy on Net-Centric Security – Pages 21-28

Winners in Airport, Seaport, Border Security Awards: Implant Sciences, Best Explosives Detection – Page 36;

PureTech Systems, Best Video Analytics – Page 39

Winners in GSN 2016 Airport, Seaport,

Border Security Awards Program

Editor’s Note: Based on the exceptionally high quality of winning entries in our 2016 Airport, Seaport, Border

Security Awards Program, GSN will publish entries and interviews with a dozen Winners in the program. The

first two will appear in this June Digital Edition, and the remaining Winning entries will be covered in upcoming

editions of GSN’s Daily Insider and Airport, Seaport, Border Security Weekly. See pages 36 through 41.

– Adrian Courtenay, CEO/Editorial Director

PureTech Systems: Winner, Best Video Analytics Solutions

By Adrian Courtenay

June 24, 2016 – PureTech Systems describes itself on its website as follows: “Founded in March, 2005,

PureTech Systems is an Arizona based computer vision software company that develops and markets its

patented PureActiv video analytics surveillance software, which is used for perimeter protection of critical

facilities and infrastructure. Current customers include large deployments in several seaports, airports,

military bases, transit railways, and country borders.”

As the company put the case in its entry into the GSN Awards Program, “PureActiv geospatial video

analytics provide security professionals with accurate, real-time alarms and video of suspicious activity

in outdoor and remote environments while minimizing nuisance alarm.” That’s a mouthful, but when you

consider the company’s markets, it’s clear that every word in that sentence is appropriate. Read more on

Page 39.

Implant Sciences: Winner, Best Explosives Detection Solution

By Adrian Courtenay

June 24, 2016 – As airports and nations around the globe become more concerned with every new act of

terrorism, the U.S. Department of Homeland Security’s Transportation Security Administration (TSA) has

committed tens of millions of dollars to an explosive trace detection (ETD) product: the Implant Sciences


The TSA, considered the leading ETD evaluation agency in the world, qualified the QS-B220 for passenger

and baggage screening in August of 2014. Shortly thereafter, the product became the first to pass

Europe’s stringent laboratory testing protocol in October 2014. Since that time, the TSA has awarded Implant

Sciences an exclusive ID/IQ (basically an open purchase order) for $162 million, followed by an order

for 1,170 units. These units are being installed right now.

In Europe, the QSB220 has been deployed at airports in The Netherlands, France, Germany, Belgium,

Norway, Austria, the Czech Republic, Romania, Cyprus and Poland. Read more on Page 36.


GSN June 2016 Digital Edition Table of Contents


Federal Court orders Customs & Border Protection

to release evidence of deplorable conditions in

Tucson detection facilities Page 4

Hikvision honors children of first responders with

ESA Youth Scholarship Page 5

DOD’s “Immune System” strategy for Cyber

Security Page 6

Why broadening U.S.-Mexico cooperation is good

for America, By Walter Ewing Page 8

Pentagon announces end to transgender military

ban on July 1st Page 10

Post-traumatic Stress Disorder (PTSD) found to be

caused by physical as well as physological trauma,

By George Lane Page 14

Campbell on Crypto: Big Data, Big Troubles Page 18

Disaster Preparedness report: To be prepared is to

be safe, by Mike Pena, Apprio Page 21

Disaster Preparedness report: Emergency

Communication Network offers enhanced safety options

for emergency notification delivered by smart phone

Page 24

Convy on Net-Centric Security: New Mobile

technologies for Disaster Response Page 26

Six Tips for better unified IT monitoring in hybrid

cloud environments, by Adelle Rydman Page 28

Salient’s Laurence Rose discusses improving

telemarketing programs through trusting work

relationship Page 30

U.S. Coast Guard Auxiliary celebrates 77th

anniversary Page 31

NUI Galway has received Horizon 2020 EU funding

for ROCSAFE ITC using software and robots Page 32

DHS announces Grant Allocations for fiscal year

2016 Preparedness Grants Page 34

Call for Nominations: DHS requests nominations

for 2016 National Seminar and Table Top Exercise

(NITX) Page 35

Winners Portraits – Implant Sciences, Winner,

Best Explosives Detection Solution Page 36

Winners Portraits – PureTech Systems, Winner,

Best Video Analytics Page 39


Federal court orders release of evidence blocked by

Customs and Border Patrol of deplorable conditions

in Tuscon detention facilities

WASHINGTON D.C., June 27, 2016

– Today, a federal district court unsealed

some of the photographs central

to ongoing litigation challenging

deplorable and unconstitutional

conditions in Border Patrol detention

facilities in the agency’s Tucson

Sector. The court also allowed the

Arizona Republic newspaper to intervene

in the case to argue for the

release of the documents.

The initial evidence released today

is only a portion of the evidence

submitted in support of a motion

for preliminary injunction filed in

December, with the government

fighting the release of additional

evidence remaining under seal. The

injunction is based on compelling

evidence of inhumane conditions

in Tucson facilities—much of which

was disclosed after the Court sanctioned

Border Patrol for destroying

video recordings from these facilities

and failing to turn over other

relevant documentation.

“Border Patrol’s treatment of men,

women and children in its custody

is simply inexcusable and their lack

of transparency shows their desire

to avoid any public oversight or accountability,”

said Mary Kenney, senior

staff attorney for the American

Immigration Council.

“Every step the Government has

taken in response to this lawsuit has

been designed to delay this suit and

hide the conditions present at these

facilities,” said Louise Stoupe of

Morrison & Foerster. “The Government

should be using the resources


they are wasting in court to provide

basic human necessities to those in

its custody.”

“Migrants detained in the Tucson

sector have long suffered horrific

conditions,” said Dan Pochoda, senior

counsel for the ACLU of Arizona.

“The Border Patrol continues

to resist public transparency to en-

More on page 42

Hikvision honors children of

first responders with ESA Youth



2016 – Hikvision® USA, the North

American leader in innovative,

award-winning CCTV and IP video

surveillance products, is a proud

supporter of the Electronic Security

Association (ESA) Youth Scholarship.

With co-contributors DMP

and Monitronics, Hikvision is making

it possible for ESA to provide

college scholarships to two recent

high school graduates whose parents

are first responders.

Since its creation in 1996, the ESA

Youth Scholarship Program has

awarded $621,500 in scholarship

funds to children of police officers

and firefighters. ESA, its affiliated

chartered chapters, and sponsoring

companies within the security industry

make these scholarships possible

and help young people achieve

their goals of higher education.

“The police officers and firefight-


ers that protect and serve our communities

are true heroes and deserve

our unwavering gratitude,” said

ESA President Marshall Marinace.

“These men and women put their

lives on the line every day, and ESA

on behalf of the electronic security

industry is pleased to support these

incredible families. Awarding scholarships

to the first responders’ impressive

children is one of the ways

we can thank our deserving public

safety partners and do our part to

make their lives just a little easier.”

Applicants were asked to write

essays explaining what it meant to

them to have their parent involved in

securing the community. This year’s

first-place winner was Katherine

Waugh of Joel Barlow High School

in Easton, CT. Her father, Steven

Waugh, is chief at Easton Volunteer

Fire Company #1 and was on the

front line when Hurricane Sandy

struck Connecticut. The secondplace

winner, Trevor Carney, recently

graduated from Irondequoit

High School in Rochester, NY. His

father, Patrick Carney, is a member

of the Rochester Police Department.

Both winners will be recognized at

the Public Safety Luncheon at the

Electronic Security Expo (ESX) in

Fort Worth, TX on June 9.

“Hikvision recognizes the invaluable

contributions of first responders

in keeping all of us safe,” com-

More on page 43

DOD’s “Immune System” strategy for

Cyber Security

By Lloyd McCoy Jr.

The Department of Defense (DOD)

wants to combat cyber-attacks the

same way the human body’s immune

system uses layered defenses

to protect key functions. The idea

comes from the military principle

that it’s harder for an adversary to

overcome an intricate and multilayered

defense than a single obstacle.

This defense-in-depth strategy

dominated the 2016 AFCEA Defensive

Cyber Operations Symposium,

held in Washington, DC this past

April. Senior DOD leaders shared

details about the programs and initiatives

driving cyber requirements

and shaping what the Department

will need from industry.

Understanding how this timehonored

military doctrine applies

to cyber security and how it all fits

together to form a single security architecture

is critical to anticipating

where cybersecurity procurements

will be concentrated.

The Outer Layer

The first layer, or outer layer, is how

the DOD sees as perimeter defense

of the DOD Information Network


As the

first line

of defense

for DOD

against external



capabilities Lloyd McCoy Jr.

here have to

be especially robust. The department

will be looking for technology

companies that have cross-domain

and risk management solutions.

The growing prevalence of cloud

technology in the DOD enterprise

applies here as well, especially when

DOD data is hosted in a commercial

cloud environment. Companies

bringing a commercial cloud solution

to DOD should be aware of the

Cloud Access Points (CAP) since

any sensitive data will need to traverse

them before entering or leaving

DOD’s network. Being aware of

what the CAPs look like is important

since they’ll require some customization.

Plus IT solutions that

work seamlessly with the CAPs will

have a leg up on competitors that



The Middle Layer

The second layer focuses on threats

and vulnerabilities within the network

itself. The most notable initiative

within this layer is DOD’s Joint

Regional Security Stacks, which are

replacing what used to be localized

security stacks. They cut down the

number of threat vectors in the DO-

DIN and improve its view of what’s

happening inside, making it easier

to identify a weakness and shore up

boundary defenses for individual

portions of the network. Analytics

solutions are in big need here given

the situational awareness that effective

security at this level will bring

to bear. Also, within this aspect of

cyber defense, DOD will need to

limit the ability for successful infiltrators

to move around in DOD’s

network so authentication tools will

be in demand.

The Inner Layer

The last layer is synonymous with

endpoint protection. These are

desktop computers and mobile devices,

numbering in the millions,

operating within the Department.

The requirements for endpoint protection

will revolve around device

hardening, virtualization,

workforce mobility, and

lightweight, agile security

tools that work on different

operating systems and

built on open standards.

Clearly DOD cyber security

spending, projected to be about $7

billion in fiscal year 2017 according

to budget documents, will continue

to stay healthy for the foreseeable

future. As cyber security strategies

and procurement efforts become

more formally structured around

this layered defense approach, it’s

important to remember that a single

solution doesn’t exist

in a bubble. With multiple

layers involved (and

even more vendors), the

need for interoperability

is here to stay and should be

part and parcel a feature of any solution.

Addressing local DOD security

challenges is important of course,

but any solution should also support

and enhance DOD’s overarching

defense-in-depth strategy. DOD

C-level executives, along with the

program managers controlling the

dollars, don’t have it all figured out,

so continual dialogue and engagement

between industry and government

is critical.

Lloyd McCoy Jr. is a market intelligence

consultant with immixGroup,

an Arrow company that helps technology

companies do business with

the government. Lloyd focuses on Defense

Department agencies, as well as

public sector cyber security. He can

be reached at

or connect with him

on LinkedIn at


“We’re powered by new challenges.

Our experience has made us experts

at providing total security solutions.”


8 years • Power/Utility Business Development

Our high standards help you meet yours. Providing superior

perimeter security solutions is not just our mission.

It’s personal. And that mission never stops.



Why broadening U.S.-Mexico cooperation is

good for America

By Walter Ewing

The U.S.-Mexico border is not simply

the dividing line between two

separate nations. It is a vast expanse

of communities that span both sides

of the border, integrating the United

States and Mexico economically

and socially. In other words, it is

impossible to capture the reality of

El Paso without also including Ciudad

Juarez, or to understand daily

life in San Diego without considering

Tijuana. Numerous families and

businesses stretch across the international

boundary, and the ease or

difficulty that they encounter in trying

to cross that boundary—often

on a daily basis—has ramifications

for the economic well-being and social

harmony of both nations.

The subtext to all this is that the

border is not all about “security.” If

we want to create a better future for

either the United States or Mexico,

we need to focus on how to build up

the economies and infrastructures

of border communities rather than

building walls designed to cut those

communities in half. And that was

the top-line message of a June 15

conference at the Wilson Center’s

Mexico Institute—the third annual


“Building a Competitive U.S.-Mexico

Border” conference.

The Mexico Institute’s Deputy Director,

Christopher Wilson, emphasized

at the start of the conference

that the United States and Mexico

are deeply intertwined at many levels.

For instance, more than one million

people cross the U.S.-Mexico

border every day. And Mexico is the

third largest trading partner of the

United States, with $583.6 billion

worth of goods and services moving

both ways across the border in

2015. Yet political debates over the

U.S.-Mexico border are usually onedimensional,

focusing only on unauthorized

migration (even though

more Mexicans now leave the United

States every year than arrive).

In a related vein, Rep. Beto

O’Rourke (D-TX) noted the irony

in the fact that so many Americans

envision the border region as a

dangerous place, even though border

communities have some of the

lowest crime rates in the country.

In fact, El Paso is the safest city in

the nation. However, Rep. O’Rourke

emphasized that people are not going

to give up their belief in a violence-ridden

border on the basis

of facts and figures alone. Equally

important are emotional stories of

the contributions and sacrifices that

Mexicans in the border region make

every day as they attempt to build

better lives for themselves and their

families in the United States and in

Mexico. These are the stories that

will serve as an antidote to the grim

narratives spun by politicians like

Donald Trump.

As opposed to building walls, one

particularly important means of

bettering life along the border is to

invest in education. Melissa Floca,

Interim Director of the Center for

U.S.-Mexico Studies at UC San Diego,

and Rebecca Vargas, President

and CEO of the U.S.-Mexico Foundation,

both emphasized binational

programs for children and college

students of all ages, to train them

in STEM (science, technology, engineering,

and mathematics) and to

encourage bilingualism in English

and Spanish. blob:https%3A// This mix of skills is


to a 21st century econ-


omy in a border environment. Floca

also emphasized the importance of

addressing the educational needs of

DREAMers who have been deported

to Mexico and are having difficulty

integrating into not only a new

school system, but a new society as

well. According to Floca, there are

about a million of these deported

DREAMers in Mexico.

As the “Building a Competitive

U.S.-Mexico Border” conference

made clear, the border region is far

more multi-faceted than nativist

fear-mongers would have us believe.

This is a vibrant bi-national economy,

society, and culture with enormous

untapped potential. It is in

the best interests of both the United

States and Mexico that this potential

be realized.

“We aim to protect property, and provide

peace of mind by providing remarkable

perimeter security products and

unrivaled service.”


11 years • Mission Critical Business Development

We know people make the difference for your business and ours.

Our experienced team thrives on providing the products and

service that lead to total perimeter security solutions.



Pentagon to announce end to transgender

military ban on July 1st

WASHINGTON, DC – Today, the

American Military Partner Association

(AMPA), the nation’s largest organization

of lesbian, gay, bisexual,

and transgender (LGBT) military

families, praised the news that the

Pentagon is expected to make history

on July 1st by announcing the

much anticipated end to the military’s

ban on open service by transgender


“Our transgender service members

and their families are breathing

a huge sigh of relief,” said AMPA

President Ashley Broadway-Mack.

“Soon, anyone who is qualified will

finally be able to serve our great nation,

regardless of their gender identity.

We are eagerly anticipating the

details of this historic announcement,

and we are incredibly grateful

for the leadership Secretary Carter

has shown in getting us to this critically

important point for our military


In July of last year, Secretary Carter

first announced that the DoD

would finally update the outdated

regulations that prevent open service

by transgender service members

and would take six months to

assess the impact of the change and

work out the details. The working

group started with the presumption

that “transgender persons can serve

openly without adverse impact on

military effectiveness and readiness,

unless and except where objective,

practical impediments are identified.”

In June of 2015, the American

Medical Association approved

a resolution saying there is “no

medically valid reason to exclude

transgender individuals from service

in the U.S. military.”

In March of 2015, AMPA

launched an unprecedented joint

report with the Transgender

American Veterans Association


(TAVA) highlighting the tremendous

harm the outdated regulations

inflict on military families. The report

notes, “The outdated regulations

serve no purpose and only dehumanize

and prevent qualified and

capable individuals from enlisting

and serving. The ban perpetuates

trauma to all those involved, both

the service member and their family.”

There are an estimated 15,500

transgender service members currently


For more information about the

American Military Partner Association

and LGBT military families,

please visit our home on the web at

The American Military Partner Association

is the nation’s largest organization

of LGBT military spouses,

families, and allies. Based in Washington

DC, AMPA is committed to

education, advocacy, and support for

our “modern military families.”

Hazmat Science and Public Policy with George Lane

Post-Traumatic Stress Disorder (PTSD)

is Caused by Physical as well as

Psychological Trauma

By George Lane

During World War 1, the psychological

trauma of soldiers from

concussions was attributed to the

impact of exploding shells, causing

“shell shock”, a term that first appeared

in the British medical journal

The Lancet in February 1915,

only six months after the beginning

of World War 1. “Shell shock” was

characterized by “the dazed, disoriented

state many soldiers experienced

during combat or

shortly thereafter”. 1 It

was presumed that soldiers

who experienced

these symptoms were

weak so treatment was

brief with the “firm expectation

that the soldier

return to duty”. 2 However, even

soldiers who were not exposed to

exploding shells were experiencing

similar symptoms.

Because sixty-five percent of

“shell-shocked” soldiers ultimately

returned to the front lines, treatment

was considered a success.

However, another reason for this

success was that if they didn’t return

to the front, their own soldiers

could kill them. Between 1914 and

1918, the British Army identified

80,000 men with what would now

be defined as the symptoms of “shell

shock”. Some who suffered from severe

“shell shock” deserted. If caught

they received a court martial and

if sentenced to death were shot by

a twelve-man firing squad. During

In 2012, neuropathologist Dr. Daniel

Perl was examining a slide of human

brain tissue when he saw a distinctive

pattern of tiny scars.


World War 1, 346 British and Commonwealth

soldiers were executed

for “desertion and cowardice”. 3

The use of executions as a form

of discipline during World War 1

was summed up by British General

Sir Horace Smith-Dorrien: “There

is a serious prevalence of desertion

to avoid duty in the trenches, especially

in the

8th Brigade,

and I am sure

that the only

way to stop it is to carry out some

death sentences”. As many as 700

French soldiers were executed for

similar offenses while only 48 of the

150 German soldiers condemned

by military courts were shot during

World War 1. Paradoxically the

abolition of flogging, one

of the few progressive features

of British reforms,

contributed to the use of

execution in World War

1. 4 Until the conflict in

Vietnam, psychiatrists

believed that “shell shock” was the

result of emotional problems rather

than physical injury of the brain.

However in 2012, neuropathologist

Dr. Daniel Perl was examining

a slide of human brain tissue when

he saw a distinctive pattern of tiny

scars. Perl had previously examined

tissue from 20,000 brains for

Alzheimer’s and other degenerative

disorders over four decades. He was

an expert in the biology of brain disease,

but this was unlike anything he

had never seen.

Perl had read a great deal about the

men who suffered from “shell shock”

during World War I and the doctors

who struggled to treat them. He had

seen a monument in central England

called “Shot at Dawn,” dedicated to

British and Commonwealth soldiers

who were executed by a firing squad

after being convicted of cowardice

or desertion. 5 The monument is a

stone figure of a blindfolded soldier

in a military storm coat, with his

hands bound behind him. Behind

the monument are the names,

ranks, ages, and dates of execution

of all 346 soldiers. Perl believed

some of these men probably

had traumatic brain injuries

from blasts and should not have

been held responsible for their

actions. He has begun looking

into the possibility of obtaining

brain samples of “shell-shocked”

soldiers from that war, hoping to

grant them the correct diagnoses

they deserve.

One brain Perl studied belonged

to an American soldier

who in 2009 had been five feet

away when a suicide bomber

detonated his explosives. The

soldier survived the blast because of

his body armor, but died two years

later of a drug overdose after suffering

effects familiar in the wars

in Iraq and Afghanistan: memory

loss, cognitive problems, inability

to sleep, depression, and in many,

suicide. Nearly 350,000 members

of the military have been diagnosed

with traumatic brain injury over the

past 15 years, many from blast exposure.

The real number is likely to

be much higher, because so many

are too proud to report an invisible


For years, many scientists have

assumed that explosive blasts affect

the brain in much the same way as


concussions from football or car accidents.

Perl was a leading researcher

on “chronic traumatic encephalopathy”,

or C.T.E., which has caused

dementia in N.F.L. players. Several

veterans who died after suffering

blast wounds have in fact developed

C.T.E. But those veterans had other

non-blast injuries too. No one had

done a systematic post-mortem

study of blast-injured troops. In

2010 the Pentagon asked Dr. Perl

to conduct what would become a

landmark study. The military gave

him access to the brains gathered

for research. Perl left his position

as Director of Neuropathology at

the Mount Sinai Medical School to

come to Washington.

Perl immediately recognized

that the injury that they were

looking at was not concussion.

C.T.E. involves an abnormal protein

called “tau”, which builds

up usually over years throughout

the cerebral cortex, but especially

in the temporal lobes,

visible across the stained tissue

appearing like brown mold. Perl

found scarring at the border between

gray matter and where

synapses connect white matter

in the brain. Perl examined

several more brains of service

members who died after their

blast exposure and all of them

Hazmat Science and Public Policy with George Lane

had the same pattern of scarring in

the same places, which appeared to

correspond to the brain’s centers for

sleep, cognition and other classic

brain-injury trouble spots.

Then Perl made an even more surprising

discovery. He examined the

brains of two veterans who died just

days after their blast exposure and

found embryonic versions of the

same injury, in the same areas. The

development of the injuries seemed

to match the time elapsed since the

blast event. Perl compared the damaged

brains with those of people

who suffered ordinary concussions

with others who had drug addictions,

which can also cause visible

brain changes, and a control group

with no injuries at all. None in control

groups had the mold-like pattern.

Perl’s findings were recently published

in the scientific journal “The

Lancet Neurology”. 6 His discovery

may solve a medical mystery first

observed in the trenches of World

War I, first called “shell shock”, then

“combat fatigue”, and now “Post-

Traumatic Stress Disorder”, “PTSD”.

In each case, it was considered psychic

rather than a physical affliction.

Only recently have neurologists,

physicists, and senior officers

pushed back at military generals

that had told soldiers diagnosed

with PTSD to “deal with it,” fed

them pills, and then sent them back

into battle untreated.

If Perl’s discovery is confirmed by

other scientists, and if short-term

signatures caused by blast are confirmed

to be a pattern of scarring in

the brain, there could be significant

implications for both the military

and the medical community. Much

of what has been described as emotional

trauma may be reinterpreted,

and many veterans may demand

recognition of an injury that cannot

be definitively diagnosed until after

death. There will be calls for more

research, drug trials, better helmets,

and expanded veteran care. The disturbing

message behind Perl’s discovery

is that modern warfare destroys

soldier’s brains.

A blast wave generated by an explosion

starts with a single pulse of

increased air pressure that lasts a

few milliseconds. Negative pressure,

or suction, immediately follows the

positive wave. The duration of the

blast waves depends on the type of

explosive and the distance from the

point of detonation. The blast wave

expands as a sphere of compressed

gases, which displaces an equal volume

of air at a high velocity. It compresses

air and then falls rapidly to

negative pressure in milliseconds,

generated by the mass displacement

of air by expanding gases. It may accelerate

to hurricane force. The blast


wave is the main cause of blast injury.

The effects of blast on the human

body are complicated. People who

have been exposed to blasts at close

range describe it as overpowering.

Many soldiers do not recall the moment

of impact, lost in the flash of

light, and the deafening sound or

unconsciousness. Those who do remember

it recall it as intensely violent.

Trinitrotoluene, or TNT, was

first used in artillery shells by the

German Army in 1902. These weapons

were used by all sides soon after

the First World War started in 1914.

TNT created a level of violence far

beyond the cavalry charges of previous


British doctor Dr. Frederick Mott

elieved that “shell shock” was

caused by a physical wound and

proposed dissecting the brains of

affected soldiers. He predicted the

mechanism of blast effects in a paper

published in The Lancet in February

1916 in which he said blasts

caused “physical or chemical change

and a break in the links of the chain

of neurons which serve a particular

function.” 7

Most other doctors saw “shell

shock” as emotional trauma. Sigmund

Freud and other psychologists

began developing theories

about how the mind responds to

stress. Soldiers suffering from “shell

shock” were often described as possessing

“a neuropathic tendency” or

even “a lack of manly vigor and patriotic

spirit”. 8

In 1980 “shell shock” became

known as “post-traumatic stress disorder”

(PTSD), reflecting the social

and emotional strain of returning

veterans of the war in Vietnam. It

was known that blasts had powerful

and mysterious effects on the body.

Starting in 1951 the U.S. government

established the “Blast Overpressure

Program” to investigate the

effects of large explosions, including

atomic bombs, on living tissue.9 At

that time, scientists believed blasts

would mainly affect air pockets in

the body, like the lungs, the digestive

system, and the ears. However

few asked about the effects on the


In the early 1990s, Dr. Ibolja Cernak,

who grew up in what is now

Serbia, was working as a doctor and

researcher at a military hospital in

Belgrade, treating large numbers of

soldiers with blast trauma, usually

from mortars and artillery fire. As

in World War I, men often suffered

mental impairment but few visible

wounds. Dr. Cernak collected blood

samples from soldiers around the

battlefields of Bosnia and Serbia for

several years, cataloging the neurological

effects of blast on over 1,300

soldiers. “The blast covers the entire

body,” she said. “It has a squeezing

effect. Ask soldiers what they felt: The

first thing they say is that their ears


were popped out, they were gasping

for air, like some huge fist is squeezing

them. The entire body is involved

in that interaction.” 10

Cernak believed that blast ripples

moved through the body like rings

on the surface of a pond. The speed

of the ripples changes when they

encounter air pockets with different

density at the borders between

the gray and white matter of the

brain, and inflict greater damage in

those places. Physicists later theorized

how blast damages the brain,

including surges of blood from the

chest, pressure on brain tissue, and

the centripetal forces of the brain

bouncing back and forth inside

the skull as in concussions. Charles

Needham, a renowned authority on

blast physics, wrote that post-mortems

on blast injuries supported

these theories. 11

More powerful roadside bombs,

Improvised Explosive Devices, or

IEDs, are being used in fighting in

Iraq and Afghanistan, creating a

growing number of blast injuries.

Doctors have noticed that the blast

reflect off hard surfaces and multiplies

so that people who appear to be

protected inside an enclosed space

like a Humvee often suffer much

worse brain injuries than those outside.

Military and civilian researchers

began focusing their work on

More on page 44

Campbell on Crypto

Big Data, Big Troubles: Simple advice

for encrypting data in motion

By Shawn Campbell

As Big Data becomes more prevalent

in government – along with

growing adoption of cloud services,

and unprecedented volume

of data moving across networks

– there is an increasing

threat to data in motion. With

Big Data comes big data networks,

big cloud computing and

big datacenter services, which

expose organizations to bigger

threats including

data theft,


and malicious


The moment

data is transmitted


one location to

another, it’s at

risk. Encrypting data in motion

doesn’t keep cyber-criminals

from accessing the data network.

Rather, it protects the data from

unauthorized parties, making

tampered encrypted data useless

and harmless when it is decrypted

at the time it is received.

Of course, there are numerous

ways to reduce the risk of data

tampering. Your organization

may have already implemented

some of these ways. But at a minimum

you should have regular

system intrusion and penetration

testing to review each of the


• Intrusion detection systems

(IDS) to detect hackers

Organizations can spend a fortune on

traditional data network security measures

such as firewalls and anti-virus software,

but still fail to protect their data while it’s

moving through the network.

• Intrusion Prevention Systems

(IPS) to counter penetration


• Internal access controls based

on passwords or identity keys

• Encryption of all network


• Access control to prevent


unauthorized entry to secure


• Measures to discourage tailgating

• Motion detectors and/or

CCTV monitoring to secure


Defensive actions may seem

equally obvious: Identify your

most sensitive data and segment

your IT infrastructure,

increase the

visibility of your

network activity

through analytics

and forensics tools,

and monitor your


The best advice,

however, is to encrypt

your data in the most effective

and efficient way possible.

Organizations can spend a fortune

on traditional data network

security measures such as firewalls

and anti-virus software,

but still fail to protect their data

while it’s moving through the

network. Once the data leaves

the building, it can be attacked

and directly controlled from the


By encrypting sensitive data

while in motion, you can rest

easy that data accessed by unauthorized

parties is useless in

their hands.

It’s a common misconception

that any encryption of data in

motion can lead to bandwidth

losses, poor network performance

and increased costs. But

that doesn’t have to be the case.

Data in motion can be protected

at any level in the communication

subsystem; where

volumes are low, software encryption

based on SSL/TLS may

be enough.

With greater demands on the

network, you’ll need more efficient

approaches, with encryption

at either Layer 2 or Layer 3.

As a refresher, Layer 2 devices

such as network switches operate

at the data link level (one

above Layer 1, or the “physical

layer”). Layer 3 is the next Layer

up – also known as the Internet

Layer, often made up of routers

or “switch routers.”

Layer 3 encryption is more

commonly known as IPSec (Internet

Protocol Security) encryption,

is generally provided within

the routers that are deployed

throughout your data network.

However, IPSec does affect the

throughput performance of the

data network. With Layer 3,

overheads are typically 30-40%.

While dedicated internal networks

may be able to accommodate

this, using Layer 3 encryption

across public networks can

be expensive.

IPSec essentially imposes an

encryption tax on your data.

For that reason, in practice, the

higher the network speed or the

greater the bandwidth requirements,

your more likely solution

would be Layer 2 encryption.

Layer 2 encryption can be applied

in point-to-point, meshed,

and VPN or MPLS networks.

The most effective form of Layer

2 encryption is provided by dedicated

hardware systems that use

the AES algorithm and encrypt

with 256 bit keys. To ensure that

these devices are secure you

should always verify that they

are appropriately accredited to

international security standards.

For federal agencies, that standard

would be Federal Information

Processing Standard Publication

(FIPS) 140-2

FIPS Publication 140-2 is a


U.S. government computer security

standard used to accredit

cryptographic modules. It is a

joint effort mandated by both

the United States and Canadian

governments, and recognized by

many other countries and institutions.

Products that meet the security

requirements of the FIPS 140-2

Cryptographic Module demonstrate

security and proficiency

which both government and

commercial customers can rely


When current best practice

data encryption technology is

implemented for data in motion

and data at rest, the data gained

by cyber-criminals is, of course,

rendered completely useless assuring

no risk of adverse consequences.

Shawn Campbell is VP of Product

Management, SafeNet Assured

Technologies, LLC. He can

be reached at Shawn.Campbell@



10 ways

you can improve

your readiness



It could be in a movie theater, in a classroom, at work, in a train station or

airport, or as we recently saw in Orlando, Fla., having a night out with friends.

When an emergency or disaster happens, we don’t usually see it coming.

Even if you aren’t trained as an emergency responder, there are important

steps you can take to prepare before the unthinkable strikes.

Always Have a Plan. Preparation and planning reduce panic in an emergency

situation. A plan provides a helpful structure in a chaotic situation. No matter where you

1 are, always think about a plan.

Be Alert and Observant. First signs of an impending disaster or emergency are often encountering something odd or out of place. If you

see something, say something. Always trust your instincts. And make it a habit to observe your surroundings and know where exit doors are

2 located no matter where you are.

Have an Alternate Communications Plan. Telephone and Internet will be overwhelmed or no longer in-service. Use social media

provided alternatives such as the Facebook emergency check-in feature or develop an emergency text group to have the ability to contact

3 key people with one text. Having an out-of-state contact number to check-in sometimes may be easier to reach than a local number.







Maintain Basic Supplies. Personal phones are everyone’s lifeline. Keep a spare phone charger in your pocketbook, briefcase or

Ensure you have a car charger for your phone in case of a loss in power.

Don’t Be a Social Media Hound. During a disaster or

emergency situation, don’t stop or delay your escape by taking a

video, tweeting or Snapchatting. Protect yourself by leaving the

danger area immediately. Seconds count.

Basic First Aid and CPR. During

an emergency, first responders may be

delayed and hospitals may be swamped

with the seriously injured. Knowing basic

first aid can keep you and others alive

until professional assistance can reach

you. Learn the next level of first aid for

how to control bleeding.

Establish a Meeting Place.

Choose a safe, familiar place for family

members and friends to go in the event

of an emergency. Even when out for the

day or night with a group of family or

friends, agree on a meeting location.


Stay Informed. Authoritative

information will be critical during an

emergency. Have a means to stay

connected to a reliable, accurate

information source so you can act

accordingly. Be cautious of acting on

rumors. Question non-professionals

giving advice or direction.


Be Prepared to Evacuate. Always be

prepared to evacuate your location with your

car and house keys, wallet and phone. Always

keep them accessible for a quick exit. Always

train—take these items even during drills.

Don’t find yourself stranded.


Stay Calm. Resist Panic.

If an emergency comes up, take a

quick moment and stop, assess and

form a plan of action. Panic always

makes a bad situation worse. You can

act with urgency while not being in

panic mode.


Disaster Preparedness and Emergency Response

To be prepared is to be safe: How having

a personal safety plan can keep you alive

By Mike Pena, Apprio Inc.

The threats that are unfortunately

becoming common

around the world are

challenging us to be ever

vigilant in our surroundings

and to prepare for

the fight that we often

never see coming.

You could be sitting

in a movie theater, in Mike Pena

a classroom, at work,

in a train station or airport, or as

we recently have seen in Orlando,

Fla., having a night out with friends

when the unthinkable happens. The

nature of disasters, emergencies and

even terrorist attacks is that they

erupt unexpectedly and throw normal

lives into chaos.

As an emergency manager, you

play a critical role in fortifying preparedness

postures and mitigating

potential damages for your organization

and its employees. But the reality

is that emergencies often happen

outside of your organization’s

boundaries, and one of the most

important things you can do to keep

everyone safe is to train them to

think about security in their everyday

lives. Even for people who are

not trained as emergency responders,

knowing how we prepare

before an emergency

strikes can make a critical

difference in the magnitude

of its impact.

There are simple steps

you can take now that will

ensure that individuals are

sufficiently prepared and

able to respond in a way

that will maximize their survivability

and reduce the chance a bad situation

will get worse. This article is a

primer, as well as a call to action, to

bolster your security stance by suggesting

ways you can equip your

staff, their families and friends with

advance preparation techniques to

help everyone stay as safe as possible.

In addition to providing some

basic pointers for promoting employee

safety within this article, you

can also download a short employee

primer that you can make available

to your staff in order to promote

awareness and safety in everything

they do.


Survivability Increases for

Those Who Are Prepared and

Have a Plan on How to React

Luckily, every person reading this

already has the most important tool

for keeping them safe: your brain.

But, your brain can also be a liability.

How? There are two ways your

brain can engage: by instinct or rationality.

In the most literal sense, it

is the difference between living and


In every emergency, panic ensues.

Without preparation or a plan, the

instinct to panic becomes the default

behavior for people suddenly

confronted by danger. Panic will

always make a bad situation much


To reinforce that phenomena, research

some of the past night club

Disaster Preparedness and Emergency Response

fires. All injuries and most fatalities

occur at the front door because individuals

did not take a minute to

identify where all exits were located.

They had no plan. Forensic study

has shown that people had passed

by available and open exits trying

to get to the front door because, in

their panic, that was the only exit

they could recall. Most, if not all, of

the survivors of those catastrophes

did know where the other emergency

exits were.

In the 2003 Station nightclub fire

in West Warwick, Rhode Island, a

stampede of people rushing to get

out the front door created a crush

of humanity in the narrow hallway

that completely blocked the exit.

More than 40 people perished in

that space alone. Three other exits

were used by survivors.

The first step a person should take

to prepare in advance for an emergency

is to develop an emergency

plan. There will be emergency situations

where first responders may

take some time to reach you. Ongoing

threats, multiple site attacks,

communications breakdowns,

hazardous environments and overstretched

resources are all possible

reasons for delays in emergency response.

The result is that your taking

the initial action to protect yourself

may save your life, and potentially

the lives of others. For starters, be

prepared to evacuate. Always be

ready to leave your location with

your car and house keys, wallet and

phone easily accessible. Even keep

spare phone chargers handy. Don’t

find yourself stranded.

Finding yourself thrust into the

middle of an emergency is not the

time to develop your strategy, which

should also include an alternative

communication plan since it’s likely

that telephone and Internet service

will be down. If you prepare a

plan in advance, you’d be surprised

how your instincts and what you

have learned rise to the top of your

thought process during an actual

emergency. Know how to escape

out a secondary exit. Know what

to do in a workplace violence situation.

Know your surroundings, and

if you get that uncomfortable feeling

that something doesn’t seem right, it

usually isn’t. It may not prompt an

action on your part but will prepare

you to react if needed. The important

elements here are self-reliance

and preparation.

Train, Train, Train

Just as fire drills are common ways

employers train staff for fire emergencies,

emergency managers need

to teach staff, via training, how to

implement emergency plans. They


can set up mock scenarios or simply

walk through the steps on a random,

yet frequent basis, so that you and

your staff have a great understanding

of the plan and are comfortable

with what to do in the event of an


Even if you’re not an emergency

manager, it’s still critical that you

familiarize yourself with your plan,

and that you walk through it, step

by step. An emergency or disaster is

jolting enough, without the uncertainties

of how to respond. You want

to be assured that you know how to

react, and this can only come from


Stay Alert. Be Aware to Stay Safe.

Take Action to Stay Alive

Not everyone can tell a firecracker

from a gunshot. In either case, ev-

eryone will recognize an unfamiliar

or extraordinary sound. It may not

require an immediate response, but

it will get your attention. This provides

you with a moment to pause,

think and recall your plan of action.

Usually normalcy will return. If it

doesn’t, you are already turning on

your brain to be prepared for action.

The above scenario could easily

happen in your workplace. That

loud crack will get your attention.

Should you just ignore it, or should

you start thinking of the “what if ’s.”

If you smell something burning,

does that get your attention? Start

the “what if.” Your safety will depend

on your preparation and how

you react.

If you begin thinking of the, “what

if ’,” you are already one step ahead

of everyone else in keeping yourself

safe. Prepare, plan and react. These

are things you need to train your

brain on now.

There are reasons why first responders,

law enforcement and

military are constantly training.

They are learning how to respond

in specific ways for different situations;

achieving so-called “muscle

memory.” You might often hear

these professionals repeat the mantra,

“Always revert to your training.”

There is a good reason why.

We, as civilians, are no different.

We may not need to train to this

high level, but the underlying objective

of teaching our brains how

to react in extreme situations is the

same: a calm, rational, effective response.

Stay Calm

The sudden onset of confusion, fear,

hysteria and chaos can be overwhelming.

Not everyone will be

prepared. As you think about this

and have an opportunity to prepare

yourself, be ready to lead those who

are with you at that time. There will

be times you will have to take on

the role as leader to get everyone

to a safe place. Those who are not

trained or prepared will be in denial

and confused that something dangerous

is happening. They will be

frantically looking for their protec-


tor. That protector may be you until

first responders arrive.

Emergency situations, either

man-made or natural, can confront

you with a clear and present danger.

Preparation and planning can make

the difference between becoming a

victim, or emerging as a survivor.

Mike Pena is Executive Vice President

of Homeland Security for Apprio

Inc. and has an extensive 35 year

career in first response, emergency

preparedness, homeland security and

facility protection. Pena’s background

includes first responder experience

with the New York City Fire Department’s

Special Operations Command

and FEMA, as well as security and

critical infrastructure protection experience

with the Department of Energy’s

(DOE) Brookhaven National


Disaster Preparedness and Emergency Response

Emergency Communications Network offers enhanced

safety options for emergency notifications delivered

via smartphones


2016 – Emergency Communications

Network (ECN), North America’s

largest provider of critical and

mass notification systems, is pleased

to announce the addition of a safe

driver feature to its CodeRED Mobile

Alert app aimed at improving

the safe operation of motor vehicles

across the country. Currently, 46

states, D.C., Puerto Rico, Guam, and

the U.S. Virgin Islands have banned

text messaging while driving, while

14 states prohibit drivers of all ages

from using handheld cell phones in

any fashion while operating a motor


Distracted driving is defined as

any activity that could divert a person’s

attention away from the safe

operation of a vehicle, even if only

for a second. “Every time you take

your eyes off the road, or focus on

anything other than the safe operation

of your vehicle, it’s a distraction

with potentially fatal consequences.

Such distractions endanger not only

drivers and their passengers, but

also other motorists and bystanders,”

said David DiGiacomo, CEO

and President of ECN. “We are

proud the CodeRED Mobile

Alert app will now assist motorists

with operating their vehicle

in a safe, hands-free, law

compliance mode where critical


received on

their Android

phones and

tablets will automatically


audibly while in

motion to help

reduce distractions.”

Currently, there are eight unique

activities that are detected via cellphone

accelerometers, which are

designed to detect changes in the

orientation and movement of such

devices. These activities include

walking, running, and tilting, to

name a few. This enhancement to

the industry’s most downloaded

public safety app now integrates two

different modes subscribers can select

to receive audible notifications.

The “Safe Driver Mode” delivers all

notifications audibly when the individual’s

device is determined to


be in motion, while the “Hands

Free Auto Mode” will automatically

deliver audible messages

regardless of your motion or activity.

“Safe driving is everyone’s responsibility

as more and more vehicles

appear on the road each and

every day. It was reported by

that more than 3,179

people were killed and 431,000 injured

in motor vehicle accidents

involving distracted drivers in 2014

alone,” said Troy Harper, CodeRED

Product Manager. “As society continues

to be increasingly mobile and

demand the use of smart devices to

stay informed of emergencies and

other time-sensitive information,

it is important that we better utilize

technology to further promote

safety. With this in mind, ECN cre-

ated a self-aware safety mechanism

where citizens may elect to remain

safety-conscientious and help eliminate

driving distractions.”

This new feature is currently available

for Android devices registered

for the CodeRED Mobile Alert app.

About Emergency

Communications Network

Headquartered in Ormond Beach,

Florida, Emergency Communications

Network (ECN) is an industryleading

provider of SaaS-based critical

communication and emergency

notification systems across North

America, managing nine customized

statewide notification solutions

– the most in the industry. Whether

in the event of mission-critical business

events, emergencies, or routine

operational announcements, ECN

provides the market with two core

solutions: CodeRED is designed for

state and local government entities

to deliver emergency and general

messages to residents in specific

geographic areas, and SmartNotice

focuses on employee and stakeholder

notifications, serving as an essential

tool for business continuity and

disaster recovery. ECN’s technology

solutions are used each day to effectively

alert, inform, and affect lives.

To learn more, visit

© 2016 Emergency Communications Network


Convy on Net-Centric Security

New Mobile Technology for

Disaster Response

By John Convy, Convy Associates, Washington, DC

When disasters and conflicts take

place, communications and power

infrastructure can be severely damaged

or rendered nonexistent, and

must be restored as vital components

for response and recovery. Government,

aid agencies,

and NGOs are increasingly

depending on

digital communications

to deliver food,

shelter, medical aid,

and conduct searches

and rescues.

Surprisingly, some

people displaced by disasters

are initially more concerned

with communicating with friends

and family than receiving food or

water. In our ultra-connected world,

mobile connectivity has become a

basic and essential human need.

When disasters bring down critical

infrastructure, first responders

now rely on many new forms of

mobile technology. Mobile seems to

improve and advance on a monthly

basis, along with a fast-growing demand

for instant and accurate information

for billions of people worldwide.

The mobile industry is responding

with a dramatic surge in new tools

and inventions.

One of these that I happened upon

recently is a text messaging, contacts,

calendaring, and task management

With Gyst, an incident commander, first

responder, or disaster service worker can

communicate, collaborate, and coordinate

with anyone, anywhere in the world who

can receive SMS or MMS messages.

app from a startup in Austin, Texas,

founded by former Dell executive

Bruce Kornfeld. Named Gyst, Inc.

(, the company is funded

by angel investors, including former

BlackBerry board member Jim


Kornfeld told me that

Gyst is designed to be a

powerful productivity tool

for professional and organizational


that he hopes will

revolutionize in-the-field

emergency and disaster


Bruce Kornfeld

response, and make disaster service

workers better connected and more


“There is a growing need for specialized

text applications to help in

disaster response situations, because

it’s common for wireless

voice communications

to be down, but

for data to still be up,”

Kornfeld explained.

“If voice calls are impossible,

as long as an

SMS or cellular data

connection is available,

Gyst can function


At its core, Gyst is a productivity

and organizational tool. But, because

of its unique capabilities, I think it

may find a place among disaster response

organizations, by positioning

itself as a useful means of

fast, global communications

for both agencies and

individual users.

“Gyst has the ability to

operate anywhere in the

world, and connect with

any user who has a cellular

data connection. It helps

organize and unify groups of users,

even those who are not using Gyst,

because the app can communicate

with anyone who can receive SMS

or MMS messages. You can use it to

manage and track texts with anyone

for productivity-focused messaging

on any mobile platform,” Kornfeld


Gyst is fast and easy to install, with

a lightweight footprint, and strong

security for disaster operations, according

to Kornfeld.

“We follow industry standard

encryption for any documents or

videos flowing through our cloudbased

servers, meaning that even

non-Gyst-app users benefit from our

data security filters,” he said. “When

information is shared between two

Gyst users (G2G), that information

follows a fully encrypted communication

path on a 4,096-bit channel.”

With Gyst, an incident commander,

first responder, or disaster service

worker can communicate, collaborate,

and coordinate with anyone,

anywhere in the world who can receive

SMS or MMS messages.

Other Gyst highlights include message

flagging for prioritization, text

message inbox organization through

labeling, calendar integration, and

the ability to send any document or

video over SMS text messaging via

downloads from Gyst’s servers. It

also supports the creation of communication

groups, which allow

people to communicate with each


Photo: Kurt Barnhart

other without a limit on the number

of individuals in the group, and

provides the ability to share locations

displayed on Google Maps.

The capability to send a series of

videos or still photos in the aftermath

of a disaster could help dispatchers

assess a situation and deploy

resources to the areas where

they are needed most. The ability to

pinpoint a user’s location, or to send

instructions on where water, food,

and aid should be delivered, is an obvious

benefit in search, rescue, and

recovery operations. These functions

make Gyst something that should be

evaluated by federal, state, and local

governments, I believe.

Kornfeld described the inspiration

for the development of Gyst.

“We recognized that smartphone

users were increasingly preferring

communications via the written

word rather than voice calls. Email

and text messaging represent a huge

percentage of both personal and professional

communications today, and

while email technology maintained

pace with this movement, text messaging

has not always kept up. We

developed Gyst as a tool to make text

messaging more functional and effective.”

It is easy to see opportunities for

applications like Gyst in the converged

security space. The power to

connect public safety personnel and

first responders with the general public,

other involved agencies, and associated

organizations for planning,

early warning, and crisis response

scenarios has obvious benefits.

As mobile continues to establish

itself as the first choice for disaster

management and response communications,

merging the roles of information

and physical security can

help unify organizational management,

and create better prevention

and response strategies for government

agencies at all levels.

More on page 43

Cybersecurity Guest Expert

Six tips for better unified IT monitoring in

hybrid cloud environments

By Adelle Rydman

As Big Data becomes more prevalent

in government – along with

growing adoption of cloud services,

and unprecedented volume

of data moving across networks

– there Cloud technology

and mobile devices are adding

to infrastructure complexity for

government agencies. This year

will see a big push to federal hybrid

cloud environments. The

security requirements that go

along with this approach place

even greater demands on infrastructure

managers to ensure the

security and reliability of IT services.

The OMB recently released a

memo on changes to procurement

requirements. Based on

that memo, IT management and

procurement professionals must

show how their purchases help

the agency transition to cloudbased

solutions. Practically

speaking, the IT infrastructure

for all government agencies –

both civilian and military – will


increasingly incorporate cloudbased


The demands on IT infrastructure

created by this ongoing

move to cloud calls for new ways

to understand IT performance

across a growing variety of IT

platforms. Unfortunately, most

agencies still use legacy monitoring


These systems were designed

for physical infrastructures.

They lack the capacity to look

across hybrid infrastructures to

dynamically depict the health

and status of a unified platform.

That inhibits the ability to quickly

determine the root cause of

outages – and most importantly,

to determine which IT services

may be at risk. Without that

understanding it’s impossible to

prioritize necessary corrective


The bottom line is that Federal

agencies can no longer rely on a

series of siloed monitoring solutions,

each covering only segments

of the entire infrastructure.

For agency professionals who

are responsible for monitoring

hybrid environments, here are

some tips:

1. Understand your mission

critical IT services and which

infrastructure components

they are dependent on. Not

all IT services share the same

level of criticality. It is important

to identify and monitor

your most critical IT services

as more than just the individual


2. Determine which of your

critical IT services can be best

supported by physical and or

cloud solutions or in some

combination. Not all IT Services

are suited to be moved to

the cloud.

3. Understand how one component

of your infrastructure

is impacted by other components.

By working with tools

that provide a common operating

picture across your IT

infrastructure as a whole, you

will be able to quickly identify

interdependencies. Without

it, you have no insight on how

something in your cloud environment

(for example) may

affect something within your

physical infrastructure.

4. Complete a “Cloud Ready

Assessment.” A cloud ready

assessment considers all aspects

of moving to the cloud,

including increased IT complexity,

security, upgrade

costs, consultancy costs, and

new integrations required – as

well as unified monitoring,

training, increased agility to

meet mission demands and

any expected IT efficiency


5. Use tools, whether open

source or commercial, for

actionable intelligence to support

your decisions on whether

mission readiness is being

compromised. Commercial

tools that have been built on

an open architecture typically

provide the deepest levels of

functionality, scalability and

flexibility and will allow an

agencies to more easily shift

to support changing mission

strategies and IT requirements

without having to rip

and replace.

6. Determine whether your IT

monitoring needs are best met

by open source or commercial

solutions. Open source solutions

are a growing trend in

monitoring. By working with

tools based on open architecture,

agencies aren’t locked

into any particular vendor

stack and can readily shift

from one cloud provider to

another. Unless your program

requirements are extremely

unusual, it seldom makes financial

sense to develop what

a commercial provider has

previously developed, deployed

and is able to support.

Make your best choice of what

works for your organization, but

understand that there is an argument

for both agencies and contractors

to give up the traditional

approach to managing IT infrastructures

as they move to the


Cloud era monitoring tools


provide the ability to monitor

both physical and cloud from a

single platform. And over time,

you’ll need to show that your

IT management plans take the

cloud mandate into account

while managing your agencies

budgetary constraints. Adopting

monitoring tools that can monitor

both environments ensures

you stay compliant with technology


As agencies embrace cloud environments,

unified monitoring

is becoming even more essential.

No matter what’s in your physical

and cloud environments,

monitoring can reduce the number

and severity of impacts to the

trusted services you offer both

your personnel and the citizens

of the United States.

Adelle Rydman is Director Federal

Business for Zenoss. She can

be reached

Salient’s Laurence Rose discusses

improving teleworking programs

through trusting work relationships

FAIRFAX, VA – June 15, 2016 – According

to a Gallup poll published

in August 2015, telecommuting in

the United States has climbed to

37%. This number is expected to

continue rising, given the increase

of millennials in the workforce and

their focus on work-life balance.

Ability to telework is also a recruiting

incentive when companies are

looking for professional employees.

While teleworking saves time and

reduces energy consumption, the

downside can be seen in the loss

of “the human touch.” Issues with

trust, isolation, and presence are

human perceptions that can have

a negative impact, not only on the

employee or a company team, but

customers as well.

Customers may feel isolated from

a company’s employees, leading to

concerns about a company’s dedication

to a project. For example, an

Agile development project requires

frequent interaction between the

customer and the software developers.

For that close working relationship

to be successful, trust is

paramount. Without regular faceto-face

meetings distrust can occur,

isolation can be felt and a lack of


Dr. Laurence Rose

real presence (commitment)

can be challenged.

In a recent published

book, “The Human Side

of Virtual Work”, executive

expert Dr. Rose, Senior

Vice President, Contracts

and Procurement

at Salient CRGT, takes a

journey from the industrial

revolution through a

technology revolution known as the

virtual work environment.

Dr. Rose discusses methods for

improving the success of companies’

teleworking programs and increasing

employee and customer

satisfaction through trusting work

relationships. He presents arguments

and ideas on how to take action

now to prevent the potential

negative outcomes that could affect

many working in the virtual work

environment. Rework or redoing

a deliverable often happens when

there is a lack of effective communication

through human interaction

rather than just through technology.

“We see the virtual work environment

becoming more and more a

way of doing business and the way

leaders deal with the virtual worker

is increasingly important,” said

Tom Ferrando, President of Salient

CRGT. “Ensuring that our customers

are benefiting from the developments

in technology and teleworking

are incredibly valuable to

improving our culture, delivering

the right service, and reducing

our costs.”

“As a contracts professional,

I hear from customers

there is a need to

talk more and address issues

as they arise,” said

Laurence Rose. “I have

seen first-hand the importance

of strong, trusting

relationships. When

communications are limited, it is

important to provide humanistic

management to avoid potential

trust and isolation issues. Moving

from a traditional to virtual work

environment, there are new challenges

all dealing with the aspects of

trust, isolation, and work presence

that we can focus on to ensure successful

working relationships. The

difference is we cannot take these

perceptions for granted when delivering

services to our clients.”

Dr. Rose has been an executive

leader for more than 14 years and

has more than 30 years of government

and commercial business

and operational experience. He

has coached and managed teams of

multiple sizes and prides himself on

More on page 43

US Coast Guard Auxiliary celebrates 77th anniversary


Guard’s all-volunteer service, the

U.S. Coast Guard Auxiliary, celebrates

77 years of service to the

United States Thursday.

“For the last 77 years, the U.S.

Coast Guard Auxiliary has answered

the call to support our Coast

Guard and our great nation on the

water, in the air and ashore,” said

Mark Simoni, national commodore

of the U.S. Coast Guard Auxiliary.

The auxiliary is made up of more

than 28,000 uniformed civilian volunteers

and provides trained crews

and facilities to augment the U.S.

Coast Guard and enhance the safety

and security of our nation’s ports,

waterways and coastal regions.

“With our unwavering support of

our primary mission of promoting

and improving recreational boating

safety, we have seen historic lows in

the number of boating fatalities and

a new record low in the number of

injuries to recreational boaters,” said


Over the last five years alone auxiliarists

have performed 583,500

vessel safety checks, taught 320,000

hours of boating

safety courses,

conducted 809,000

hours of public

outreach, gave

2 million hours

of administrative

support, rescued

$157 million

in property, and

saved 785 lives,

while assisting 11,000 others.

Auxiliary members also provide

skill sets not often found in

the Coast Guard. For example, the

Auxiliary Interpreter Corps has 450

trained volunteers with expertise in

48 languages. The Interpreter Corps

fills roles in support of international

training exercises, forums and partner

nation programs.

“Our auxiliarists bring their valuable

skills, across 64 competencies,

to all our Coast Guard missions,”

said Coast Guard Commandant

Adm. Paul Zukunft. “Our missions

are far too many and far too

complex to accomplish with so few

people. Today, we sustain mission

excellence with our entire force of

active, reserve, civilian

and volunteer



are accountants,

lawyers, doctors,

chefs, carpenters,

welders, public

relations specialists,

teachers, musicians

and even a

nuclear engineer or two,” said Zukunft.

“They bring master-level proficiency

to our service.”

Auxiliarists operate in all 50 states,

Puerto Rico, the U.S. Virgin Islands,

America Samoa and Guam.

The Coast Guard Auxiliary was

authorized by an act of Congress

in 1939, when the Coast Guard was

given a legislative mandate to use

civilians to promote safety on and

over the high seas and the nation’s

navigable waters.

For more information on the auxiliary,

please visit the U.S. Coast

Guard Auxiliary website, or follow

their official social media presence on

Facebook and Twitter.


NUI Galway has received Horizon 2020

EU funding for ROCSAFE ITC using software

and robots to gather evidence of chemical,

biological or nuclear incidents

June 20, 2016: A team led by NUI

Galway has been awarded €4.8

Million in Horizon 2020 EU funding

for their project ROCSAFE

(Remotely Operated CBRNe

Scene Assessment & Forensic

Examination), which will use robotics

and intelligent reasoning

to gather forensic evidence in the

event of a chemical, biological or

nuclear incident.

Led by Dr Michael Madden

from the College of Engineering

& Informatics at NUI Galway,

the ROCSAFE project will focus

on developing ICT and Security

software to gather forensic intelligence

in the event of a terrorist


ROCSAFE’s overall goal is

to fundamentally change how

CBRNe (chemical, biological,

radiological and nuclear defense

events) are assessed, and ensure

the safety of crime scene investigators,

by reducing the need for them

to enter dangerous scenes to gather


There are 13 SME and institutional

partners in total involved in the

NUI Galway Students

ROCSAFE project across Ireland,

Italy, Portugal, Spain and Germany,

along with a wider set of advisory

board members. This includes Scorpion

Networks Ltd. an SME responsible

for a handheld CBNRE platform

project success under the last


EU funding round FP7.

CBRNe accidents or terrorist attacks

are a low probability but of

high consequence. In the aftermath

of a CBRNe event, the principles

that govern the response

mission are:

• Protection of Life

• Elimination/Reduction of Threat

• Protection of Property

• Preservation of Evidence

• Restoration of Normal Activities

ROCSAFE focuses specifically on

three of these principles: the protection

of life, the elimination/

reduction on of the threat, and

the preservation of evidence. By

building a mobile remotely operated

system, ROCSAFE can protect

personnel by removing the

need for them to go on-scene to

identify threats, detect the presence

of forensic material, and collect forensic


In order to safely respond to a

threat, it must first be identified. To

do this, the scientific team will adapt

robotic air and ground vehicles to

carry cameras and innovative sensors

for the identification of CBRNe

materials. To preserve evidence,

they will equip the vehicles with

tools to enable the careful and methodical

collection of forensic materials

and will develop procedures

that are appropriate to remotely operated

vehicles (ROVs), to preserve

the integrity of the evidence chain.

Using robotic aerial vehicles

(RAVs) that will be remotely managed

and semi-autonomous, ROC-

SAFE will quickly gain a visual

overview of the scene and identify

hotspots. This will enable responders

to quickly set up a perimeter to

protect bystanders and start managing

the scene. The RAVs will be

equipped with cameras (operating

in the visible and infra-red ranges)

and sensors for detection of radiation/nuclear,

chemical and biological

threats. Data from these will be

relayed to a Central Decision Management

unit in real-time.

The Central Decision Management

will provide data analytics and

decision support software to ensure

all available data is presented in the

Command Centre, which will be

located in a safe zone near the periphery

of the incident, to the onscene

commanders in an intuitive

and easy to assimilate manner. The

Central Decision Management will

include an innovative approach,

which will be able to adapt to the

evolving situation over time as information

arrives from sensors

and cameras, and the people on the

scene provide inputs.

ROCSAFE will use state-of-theart

ground vehicles that are specifically

designed for hazardous scenes,

and will include the development

of tools and procedures for gathering

forensic material and evidence.

The challenges in forensic evidence

collection are to remove the possibility

of cross-contamination and to

ensure the integrity of the evidence


This process will ensure that

CBRNe scenes are assessed more

rapidly and thoroughly than is currently

possible, and that forensic evidence

and material is collected in a

manner that stands up in court, and

all without sending personnel into

zones of high risk.

NUI Galway has recently established

a National Centre for Security

Research to draw together the

multiple strands of security-related

research in the University, and to

facilitate growth of this activity into

the future.

For further information visit:

About Horizon 2020 EU Funding


Horizon 2020 is the biggest EU Research

and Innovation programme

ever with nearly €80 billion of funding

available over 7 years (2014 to

2020) – in addition to the private

investment that this money will

attract. It promises more breakthroughs,

discoveries and worldfirsts

by taking great ideas from the

lab to the market.

Seen as a means to drive economic

growth and create jobs, Horizon

2020 has the political backing of

Europe’s leaders and the Members

of the European Parliament. They

agreed that research is an investment

in the future and so put it at

the heart of the EU’s blueprint for

smart, sustainable and inclusive

growth and jobs.

By coupling research and innovation,

Horizon 2020 is helping to

achieve this with its emphasis on

excellent science, industrial leadership

and tackling societal challenges.

The goal is to ensure Europe produces

world-class science, removes

barriers to innovation and makes it

easier for the public and private sectors

to work together in delivering

innovation while cooperating with

its international counterparts outside

of the EU.


DHS Announces Grant Allocations for Fiscal Year

2016 Preparedness Grants

June 29, 2016 - As part of the U.S.

Department of Homeland Security’s

(DHS) ongoing efforts to support

state, local, tribal, and territorial

partners, Secretary Jeh Johnson today


final allocations

of $275 million

for six Fiscal

Year (FY) 2016

DHS competitive


grant programs.


DHS Secretary

Jeh Johnson

allocations, in addition to the more

than $1.3 billion in non-competitive

grant funding announced by Secretary

Johnson in February, total

more than $1.6 billion in FY 2016 to

assist states, urban areas, tribal and

territorial governments, nonprofit

agencies, and the private sector with

their preparedness efforts.

“In an ever-changing threat environment,

our homeland security

grants demonstrate the Department’s

continued commitment to

strengthening the nation’s preparedness

and ability to respond to a wide

variety of emergencies,” said Secretary

Johnson. “These 2016 homeland

security grant allocations will

support our partners at all levels of

government and the private sector,

ensuring we remain vigilant and

keep the homeland secure.”

Together with previous grant

funding awarded since 2002, DHS

has awarded more than $47 billion

to these partners. Preparedness

grants strengthen our nation’s ability

to prevent, protect against, mitigate,

respond to, and recover from

terrorist attacks, major disasters,

and other emergencies in support of

the National Preparedness Goal and

the National Preparedness System.

The FY 2016 grants focus on the

nation’s highest risk areas, including

urban areas that continue to face

the most significant threats. Consistent

with previous grant guidance,

dedicated funding is provided

for law enforcement and terrorism

prevention activities throughout the

country to prepare for, prevent, and

respond to pre-operational activity

and other crimes that are precursors

or indicators of terrorist activity.

Competitive Grant Program

Allocations for Fiscal Year 2016:

Port Security Grant Program (PSGP)

— a competitive grant that provides

$100 million to help protect critical


port infrastructure from terrorism,

enhance maritime domain awareness,

improve port-wide maritime

security risk management, and

maintain or reestablish maritime

security mitigation protocols that

support port recovery and resiliency


Transit Security Grant Program

(TSGP) — a competitive grant that

provides $87 million to owners and

operators of transit systems to protect

critical surface transportation

and the traveling public from acts of

terrorism and to increase the resilience

of transit infrastructure.

Operation Stonegarden (OPSG)—

a competitive grant that provides

$55 million to enhance cooperation

and coordination among local,

tribal, territorial, state, and federal

law enforcement agencies to jointly

enhance security along the United

States’ land and water borders where

there are ongoing Customs and Border

Protection missions.

Nonprofit Security Grant Program

(NSGP) — a competitive grant that

provides $20 million to support target

hardening and other physical se-

More on page 46

Call for Nominations: DHS requests nominations for

2016 National Seminar and Tabletop Exercise (NITX)

The U.S. Department of Homeland

Security (DHS) requests topic/exercise

scenario nominations

for the 2016 National Seminar

and Tabletop Exercise (NTTX)

for Institutions of Higher Education.

The 2016 NTTX will engage college

and university representatives

in workshop sessions and a tabletop

exercise designed to help prepare

participants to respond to a

campus emergency. The tabletop

exercise will engage team members

and get the participants to work together

to manage the response to a

hypothetical incident. The overall

event seeks to enhance knowledge

of emergency operations planning,

allow participants to improve their

own performance and identify opportunities

to improve capabilities

to respond to real events.

The DHS Office of Academic Engagement

(OAE), in collaboration

with the Federal Emergency Management

Agency (FEMA) would

like input on topics/exercise scenarios

from the higher education

and emergency management communities

given their equities to

and expertise in campus resilience

emerging issues and trends impacting

colleges and universities. The

2016 NTTX will take place in late

October or early November.

Topic/exercise scenario nominations

must be received by June 17,


About the NTTX

The NTTX is a series of campusbased

events to test and promote

campus resilience. Each event in

the series includes workshops and

an exercise scenario focused on

a specific resilience-related topic

impacting the higher education

community. DHS launched the inaugural

event in October 2014 at

Northeastern University, providing

insight into common planning,

preparedness, and resilience best

practices and challenges of the academic

community when faced with

an infectious disease outbreak. The

second event in the series occurred

in October 2015 at Indiana University

and focused on the cyber threat

landscape across the U.S. higher education



Selection Criteria

Nominated topics/exercise scenarios

should reflect campus resilience

issues or trends that impact

the college and university

community. Topics/exercise scenarios

should also align with DHS core


1. Prevent terrorism and enhancing


2. Secure and manage our borders;

3. Enforce and administer our immigration


4. Safeguard and secure cyberspace;


5. Ensure resilience to disasters.

Please submit your recommended

topic/exercise scenario nominations

in order of priority. OAE will review

topic/exercise scenario recommendations

in coordination with FEMA

to select the topic for the 2016

NTTX. Upon selection of the topic/

exercise scenario, OAE will begin

outreach in July for participation in

the fall event.

Nomination Process

Please send topic/exercise scenario

nominations via email directly to

More on page 45

Winners’ Portraits: GSN 2016 Airport, Seaport, Border Security Awa

Implant Sciences:

2016 Winner, Best Explosives Detection Solution

By Adrian Courtenay

June 24, 2016 – As airports and

nations around the globe become

more concerned with every new act

of terrorism, the U.S. Department

of Homeland Security’s Transportation

Security Administration (TSA)

has committed tens of millions of

dollars to an explosive trace detection

(ETD) product: the Implant

Sciences QS-B220.

The TSA, considered the leading

ETD evaluation agency in the

world, qualified the QS-B220 for

passenger and baggage screening in

August of 2014. Shortly thereafter,

the product became the first to pass

Europeas stringent laboratory testing

protocol in October 2014. Since

that time, the TSA has awarded Implant

Sciences an exclusive ID/IQ

(basically an open purchase order)

for $162 million, followed by an order

for 1,170 units. These units are

being installed right now.

In Europe, the QSB220 has been

deployed at airports in The Netherlands,

France, Germany, Belgium,

Norway, Austria, the Czech Republic,

Romania, Cyprus and Poland.

Among the many reasons for this

overwhelming leadership, according

to Dr. Darryl Jones, Executive

Vice President of Implant Sciences,

“the QS-B220 provides fast, accurate

real-time detection of trace amounts

of a wide variety of military, commercial

and homemade explosives,

as well as drugs. Featuring a low total

cost of ownership , the system is

easy to use, with intuitive controls

that eliminate or reduce training requirements.

“A patented automatic internal

calibration system simplifies operations

of the system and minimizes

the need for manual calibration

using costly consumables – and

its small footprint is well suited to

crowded security checkpoints. Unlike

some competing systems, its

low false alarm rate keeps airport

operators on track. Furthermore,

fewer false alarms means faster passenger

through-put at checkpoints

and fewer distractions for screening

personnel. “

According to President Robert

Liscouski, a regular commentator

on CNN, Fox News and other business

and security media, who was


appointed by President George W.

Bush as the first Assistant Secretary

for Infrastructure Protection at the

U.S. Department of Homeland Security,

“Implant Sciences continues

to innovate, earning its 19th patent,

which significantly enhances the

company’s non-contact sampling

capability, making it an ideal tool

for next generation ETD technology.

In fact,” said Liscouski, “we have

been awarded a developmental contract

worth up to $2 million by the

Department of Homeland Security

to develop advanced ETD solutions.

That contract is set to commence


Implant Sciences Markets

As a leading manufacturer of explosive

trace detection (ETD) and

drugs trade detection solutions for

homeland security applications, Implant

Sciences products meet the

needs of a wide variety of security



The QS-B220 desktop ETD is the

first product of its kind without radioactive

materials to pass testing

with both Transportation Security

ds Program

Administration (TSA) and the European

Civil Aviation Conference

(ECAC), and has been selected for

deployment in a number of major

international airports globally. The

company is dedicated to improving

overall passenger experience while

increasing screening efficiency and

augmenting security.


The QS-B220 is on the Qualified

Products list in the TSA’s Air Cargo

Screening Technology List (ACSTL)

and was the first system to pass the

ECAC Common Evaluation Process

(CEP) for cargo. With sample results

in 10 seconds more or less and

a fast clear-down, the system allows

freight forwarders and cargo screeners

to clear shipments more quickly.


A wide range of critical infrastructure

facilities rely on Implant Sciences

to help protect them against

terrorist attacks. Installations include

nuclear power plants, oil and

gas facilities, banks, embassies and

other high-threat infrastructure.


Able to detect a wide variety of illegal

drugs, including synthetics

such as Spice and Molly, as well as

explosives, the desktop QS-B220 is

an excellent tool for customs and




Working in the even the most challenging

of environments, the portable

QS-H150 delivers performance

and increases safety for those on

the front lines. With one handed

operation and minimal supply requirements,

the system is extremely

well-suited to field operations. For

checkpoint applications, the TSAqualified

QS-B220 provides the

highest levels of detection.

Here are the bios of four of the company

leaders and management team

who have contributed mightily to

the company’s ongoing and growing




Dr. McGann,

one of the original

developers of

commercial ion

mobility spectrometry


for explosives


detection (ETD), joined Implant

Sciences in April, 2012. He has authored

over 70 research proposals

to the U.S. Government, 20-plus


scientific publications and over

25 patents in the areas of nuclear,

chemical and biological detection

technologies. He played a key role

in creating an industry around ETD

science and technology at Ion Track

Instruments, which was acquired by

General Electric. After the acquisition,

Dr. McCann served as Vice-

President, R&D at GE Ion Track

and went on to become Chief Technology

Officer of GE Security. Immediately

prior to joining Implant

Sciences, he was VP Engineering

for Global Fire Products and United




Mr. Liscouski is a

recognized security

and counterterrorism


with more than

30 years of experience

as a senior

government official,

business leader, entrepreneur,

special agent and law enforcement

officer. After his appointment by

President George W. Bush in 2003

as first Assistant Secretary for Infrastructure

Protection at the U.S.

Department of Homeland Security,

he worked closely with the White

House and other federal agencies

Winners’ Portraits: GSN 2016 Airport, Seaport, Border Security Awa

to design, develop and implement

the framework to protect the nation’s

critical infrastructure following

9/11. Early in his career, Mr. Liscouski

worked in law enforcement

as a homicide and undercover investigator

and special agent for the

Diplomatic Security Service before

joining a Fortune 500 to develop

security systems to protect information

technology and intellectual




Mr. Silvestri

joined Implant

Sciences in September,

2008 as

Vice President,

Technology and

Product Development

to lead

the Company’s product development

and certification process.

Under his leadership, the QS-B220

was successfully launched in 2010

and has been certified by the TSA,

ECAC, CAAC and other worldwide

organizations. Mr. Silvestri was promoted

to Chief Operating Officer

in October, 2015. He holds a Masters

Degree in Business from the

Kellogg School of Management at

Northwestern University, as well as

a BS in Chemical Engineering from

Clarkson University.



Joining Implant

Sciences in May,

2012, Dr. Jones

brings significant


security industry

experience to

the Company’s

sales and marketing efforts. He was

previously Vice President of Global

Product Management at Safran’s

Morpho Detection, where he managed

one of the largest ETD and EDS

product portfolios in the industry,

and helped launch the X-ray and

Raman spectroscopy product lines.

Prior to GE Security’s sale to Safran,

Dr. Jones was General Manager of

Global Security Sales at GE Secu-


rity, where he recruited and developed

a glob al sales team focused on

six key markets and achieved yearover-year

top line growth. Dr. Jones

has been issued a patent, authored

six papers in scientific publications,

and delivered nine presentations.

He received his PHD in Optical Science

and Engineering from the University

of Alabama, and a Master of

Arts in Physics from Fisk University.

The staff of Government Security

News, Lead Sponsor HID GLOBAL

and Lead Judge Chuck Brooks congratulate

Implant Sciences as 2016

Winner in the category of “Best Explosives

Detection System” in the

GSN 2016 Airport, Seaport, Border

Security Awards Program and wishes

the company many more years of

brilliant technological success!

ds Program

PureTech Systems:

2016 Winner, Best Video Analytics Solutions

By Adrian Courtenay

June 24, 2016 – PureTech Systems

describes itself on its website as follows:

“Founded in March, 2005,

PureTech Systems is an Arizona

based computer vision software

company that develops and markets

its patented PureActiv video analytics

surveillance software, which

is used for perimeter protection of

critical facilities and infrastructure.

Current customers include large

deployments in several seaports,

airports, military bases, transit railways,

and country borders.”

The company’s performance in

the 2016 Airport, Seaport, Border

Security Awards Program certainly

supports this description, and a

GSN Interview with Larry J. Bowe,

Jr, Founder and President and Eric

Olson, Vice President of Marketing,

provided lots of further examples of

PureTech’s activities that confirmed

the claims.

As the company put the case in

its entry into the GSN Awards Program,

“PureActiv geospatial video

analytics provide security professionals

with accurate, real-time

alarms and video of suspicious activity

in outdoor and remote environments

while minimizing nuisance

alarm.” That’s a mouthful, but

when you consider the company’s

markets, it’s clear that every word in

that sentence is appropriate.

One of the company’s large deployments

is along the Southern

Border of the U.S, where PureTech

Systems is a technology supplier

to General Dynamics Information

Technology (GDIT), providing

all video technology including:

1) “Full motion video” (i.e. streams

full frame rate and full quality video

to the agents), 2) geospatial mapbased

camera control, and 3) longrange

video analytics including PTZ

Auto-tracking. The border deployment,

referred to as RVSS (Remote

Video Surveillance System) is currently

deployed at the Arizona border

and is scheduled for deployment

along the Texas border.

Detecting and computing the locations

of intruders and left behind

objects is a very important capability

of the software. – Security personnel

need to know where the intruders

are, where they have been,


and where they may have dropped

a package. Knowing this information

then enables automated control

of PTZ cameras equipped with

PureTech’s Auto-tracking capability

and deterrent sensors, such as,

an acoustic loud hailers like those

provided by the LRAD Corporation

(another Winner in this year’s

Airport, Seaport, Border Security

Awards). In this environment, Larry

Bowe explained, the PureActiv

technology can be thought of as

turning surveillance cameras into

“passive radars.” While radar emits a

signal and expects a return, cameras

do not have active return signals.

When cameras are integrated with

PureTech’s powerful geo-referencing

software, in addition to pointing

PTZ cameras and deterrent devices,

security personnel are provided

with the location of security targets,

which they can use to orchestrate


Water and electric utilities are

another logical client for PureTech

Systems, for the simple reason that

oftentimes first responders may not

be able to arrive at a remote substation

for several minutes after being

Winners’ Portraits: GSN 2016 Airport, Seaport, Border Security Awa

contacted, due to the distance they

must travel. Once again, PureTech’s

technology enables early detection

of suspicious activity, which affords

security personnel the opportunity

to 1) deter the intruder through the

use of non-lethal loud hailers and

strobe-lights, 2) automatically lock

down critical access and equipment,

and 3) notify law enforcement as

early as possible.

Transportation is another important

market for PureTech Systems,

which works with a number

of Seaports including the Ports of

Charleston, Seattle, and Tacoma.

The company’s technology is also

well suited to safeguard critical infrastructure

including public transit

railways and tunnels. Operating

effectively in these environments is

quite challenging since the system

must cope with normal traffic while

still detecting abnormal activities.

Detecting persons who have fallen

off a cruise ship is something else

that PureTech Systems can handle,

and in fact, the company was Winner

in the Man-over board rescue

category in GSN’s 2015 program.

Protection of transit, railroad, utility,

and bridge infrastructures are all

logical applications for the Pure-

Activ package, along with Coastal

applications that include determining

whether an incoming ship fits

the expected profile or could pose

a threat. The company also addresses

safety applications such as

one example that keeps people out

of harm’s way of nearby moving machinery.

To sum up (some of what we

learned), PureTech Systems focus

is on the creation of computer vision

software. They specialize in

long range applications, applying

their patented video analytics and

integrating with other surveillance

sensors such as radar, gun-shot detection,

fence sensors, and drone

detection, as needed, to address a

variety of surveillance and safety applications.

Here are the bios of four

of the company leaders who have

contributed mightily to the company’s

ongoing and growing success:




Larry founded

PureTech in

March 2005. Prior

to PureTech,

Larry was Vice

President of Business


for Verint

Video Systems, from 2001 to March

2005. In this role, Larry had overall

responsibility for Product Management,

technology licensing, acquisitions

and their mobile digital video

business. Prior to joining Verint,

Larry had a 17 year career at Honeywell,

where he held several technical

leadership positions in both their

Homes and Buildings and Avionics

SBUs. Larry shared global responsibility

for technology planning

and budgeting for their billion dollar

Homes and Buildings Solutions

SBU. Larry was one of a select few to

be nominated to participate in Honeywell’s

2-year Leadership training

program, which he completed. Prior

to joining Honeywell, Larry worked

for Motorola’s government electronics

group, whose focus was the

manufacturing of satellite electronic

systems. Larry holds a BS in Computer

Science from Arizona State

University School of Engineering

and an MBA from the University of




Fereydoun Maali,

who joined

PureTech Systems

in March

2005, has worked

in image processing

and related

areas addressing

applications in robotic vision (2D

& 3D) biometrical, automotive, de-

ds Program

fense, electronics, semiconductor

and analytics of surveillance since

1983. From 1985-1991 he was a Senior

R&D Engineer at Robotic Vision

Systems, Long Island, NY. He

has a DIC, MSc, PHD from Imperial

College U.K., where his doctoral

focus was “Image Processing and

Pattern Recognition for Industrial

Robotic Vision.” He is a Chartered

Electrical Engineer (CEng) and a

senior member of IEEE. He has received

18 US patents in image processing

and related areas, with additional

patents pending.





Wade Barnes,

who joined

PureTech in September

2006, has

been in the information



since 1977, having

worked in the areas of distributed

computing, large systems design

and computer applications in

diverse fields, including security,

health care, financial and minerals

industry. He is a winner of the

3M Technical Circle of Excellence

Award and the Oblad Award from

the University of Utah. Mr. Barnes

has B.S. and M.S. degrees in mining

engineering and an M.S. degree in

computer sciences.



Eric Olson joined

PureTech in

March 2006. Eric

leads the marketing


with accountability

for product


media relations, trade shows and

social media. Prior to joining the

company, he spent over 18 years in

the aerospace market, initially as an

electrical engineer responsible for

design, specification and test of critical

flight systems, and later secur-


ing leadership roles in alliance management,

competitive intelligence,

program management and product

management. Olson is a certified

Six Sigma Black Belt, trained and

certified in the development of sales

and marketing processes. He holds

a B.S. in Electrical and Computer

Engineering from the University of

Iowa, an MBA from Arizona State

University and a Global Leadership

Certificate from Thunderbird

Graduate School of International


Govermment Security News congratulates

PureTech Systems as 2016

Winner in he category the Best Video

Analytics Awards and wishes the

company many more years of brilliant


Russelelectric appoints Dorian

Alexandrescue as President/CEO

HINGHAM, MA — John Russell,

Chairman of the Board of Russelectric

Inc., recently announced the appointment

of Dorian Alexandrescu as the

company’s new President and CEO.

Mr. Alexandrescu has over

20 years of extensive management

experience across

industry segments ranging

from electrical equipment,

energy management, and

clean energy to automotive,

industrial automation,

packaging, and consumer Dorian Alexandrescue

goods. Most recently, he

served as President and CEO of RESA

Power Solutions, a market leader in

life extension products and services

for electric power transmission,

distribution, and circuit protection

equipment. Prior to that, he was Vice

President and General Manager of

Eaton Corporation/Power Distribution

Operations’ Latin America and

Caribbean Division. Alexandrescu

has an International Baccalaureate in

Electromechanical Engineering, the

equivalent of an MS in Theoretical

Physics and Technology Applications

from the University of Bucharest, and

is a graduate of the Executive Development

Program of Dartmouth College’s

Amos Tuck Business School.

Mr. Alexandrescu takes over for

George Whittaker, who is retiring

after 48 years of service. Whittaker

succeeded Raymond G. Russell, Russelectric’s

founder and owner. Chairman

John Russell commented, “We

want to thank George for his wise

stewardship. We also want

to welcome Dorian, who is

committed to running and

growing the company in

the spirit my father — independently-owned,


and uncompromising

on quality.”

Founded in 1955, Russelectric

Inc. designs and

manufactures integrated emergency

and standby power control systems

for mission critical facilities. Manufactured

at facilities in Hingham,

Massachusetts, and Broken Arrow,

Oklahoma, the company’s sophisticated

power control systems, transfer

switches, and bypass/isolation

switches are widely used in advanced

data centers, banks, hospitals, and

other vital installations.

For more information, contact John

A. Meuleman, Vice President, Sales &

Marketing, Russelectric, South Shore

Park, Hingham, MA 02043-4387,

TEL: (781) 749-6000, FAX: (781) 749-

4205,, e-mail:


Federal court orders release of

evidence blocked by Customs and

Border Patrol

Continued from page 4

able continuation of detention operations

that knowingly violate U.S.

and international law as well as its

own standards.”

“The images unsealed by the court

are just the tip of the iceberg,” said

Nora Preciado, staff attorney with

the National Immigration Law Center.

“These abuses have been kept

hidden for too long. As these initial

images begin to reveal, we can no

longer wait for meaningful and lasting

reforms; the time is now.”

Jane Doe, et al. v. Johnson, et al.

was filed in the U.S. District Court

for the District of Arizona. Attorneys

on the case include Harold J.

McElhinny, Colette Reiner Mayer,

Louise C. Stoupe, Kevin M. Coles,

Pieter S. de Ganon, and Elizabeth

Balassone of Morrison & Foerster

LLP; Nora Preciado, Linton Joaquin,

and Karen C. Tumlin of the

National Immigration Law Center;

Mary Kenney, and Melissa Crow of

the American Immigration Council;

Travis Silva of the Lawyers’

Committee for Civil Rights of the

San Francisco Bay Area; and James

Lyall and Dan Pochoda of ACLU of


For additional links to complaint,

FAQ, Fact Sheet on FOIA Data and

more, click here.

Hikvision honors children of first

responders with Youth Scholarship

Continued from page 5

mented Jeffrey He, president of

Hikvision USA and Hikvision Canada.

“It is our honor to support the

children of first responders, and we

wish these young people the greatest

success in their future endeavors.”

To learn about Hikvision’s comprehensive

product suite of video

surveillance solutions, see them in

person at ESX, booth 311, June 8-10.

About Hikvision

Hikvision is the world’s leading supplier

of video surveillance solutions.

Featuring the industry’s strongest

R&D workforce, Hikvision designs,

develops, and manufactures standard-

and high-definition cameras,

including a variety of IP cameras,

analog cameras, and cameras featuring

the latest in high-definition

analog technology. Hikvision’s

product suite also includes digital

video servers, hybrid and standalone

DVRs, NVRs, and other elements

of sophisticated security systems

for both indoor and outdoor


Rose: Improving teleworking

programs through trusting work


Continued from page 30

their success. He taught classes at

the business level in topics of contracts

management, negotiations,

and program management and has

been recognized for his outstanding

presentation style and approach to

teaching. Dr. Rose received his BS in

administration of justice at the Virginia

Commonwealth University,

his MS in administration of justice

from American University, and his

PhD in management and organization

leadership from Cappella University.

About Salient CRGT


Convy: New Mobile Technology for

Disaster Response

Continued from page 27

Right now, Gyst is a free application

(, that can be used

by any government or commercial

organization. As the company becomes

more established, it will implement

a pricing model to assure its

own sustainability.

I will be watching the progress of

Gyst and similar mobile messaging

app developers over the coming

months and years, and I suspect that

we will be hearing a lot more about

the development and implementation

of the rapidly growing mobile


John Convy and Convy Associates

provide strategic alliance, A&E consultant,

technology ecosystem, and

lead generation programs to monetize

relationships and accelerate demand

for leading security industry manufacturers.

John is the Founder and

Managing Director of the Open Standards

Security Alliance and the IP

Security Academy, and a speaker at

many global industry events. Email:

Salient CRGT provides Agile software

development, data analytics,

mobility, cyber security and infrastructure

solutions. We support

these core capabilities with full lifecycle

IT services and training—to

help our customers meet critical

goals for pivotal missions. We are

purpose built for IT transformation

supporting federal civilian, defense,

homeland, and intelligence agencies,

as well as Fortune 1000 companies.

We use the most innovative

talent delivery model in the industry,

scientifically providing exactly

the right people for the customers’

most pressing requirements. Salient

CRGT has earned a record of success

with integration and operations

of large‐scale, high‐volume solutions.

On September 15, 2015, Salient

and CRGT announced closing

of the merger transactions – visit

newsroom. For additional information

on Salient and CRGT, visit

George Lane: Post-Traumatic Stress

Disorder is Caused by Physical as

well as Psychological Trauma

Continued from page 17

brain injury across the entire military.

They were called the “Gray

Team”, named partly for gray matter

and partly because the men’s hair

was going gray. They were mostly

military officers, all of them had

advanced degrees in medicine or

science, and almost all of them had

seen combat. The “Gray Team” bethe

brain rather than just the body.

But it was still very difficult to isolate

blast from all the other physical

and mental effects of being exposed

to an explosion in a combat zone.

A major advance came in 2007

when an engineering firm called

Applied Research Associates received

a call from the SWAT team of

the Arapahoe County Sheriff ’s Office

in Colorado. The officers were

worried about possible neurological

effects from “breaching”, the practice

of blowing open doors with small

explosive charges. Almost every

major city in the United States has

“breacher” teams. The Applied Research

team quickly recognized that

monitoring “breachers” would allow

them to observe blast in its pure

form because the charges are too

small to knock soldiers over or give

them concussions. They are subject

only to the blast wave. Their report

found a small but distinct decline in

performance among the instructors,

who are exposed to far more blasts

than students. 12

Some senior officers were frustrated

because they had seen too many

soldiers discharged for disciplinary

issues that were actually related to

brain injury. Several other experts

joined to monitor the treatment of

Monument in central England called “Shot at Dawn”

lieved that a blast wave’s effects on

the body were far more extreme and

more complex than the concussion

model could account for. But their

main task was to take brain injury

more seriously.

The distinction between organic

and emotional injury can be very

blurry. Trauma changes neuronal

George Lane has 25 years of experience in the development of chemical security

systems, conducting research as a NASA Fellow at the Stennis Space

Center and as a NSF Fellow. Lane was air quality SME for the University

of California at Berkeley Center for Catastrophic Risk Management during

the BP Oil Spill. Lane is currently chemical security SME for the Naval

Postgraduate School Maritime Interdiction Operations in the Center for

Network Innovation and Experimentation.


patterns, and therapy can alter a

brain that has been physically damaged.

Dr. David Brody, a neurologist

who has worked extensively with

the military, said “Everything we

know suggests that people with structural

lesion will also respond to pharmacological

and psychological treatment,”.

13 Dr. Perl is continuing to

examine the brains of blast-injured

soldiers. After five years of working

with the military, he feels sure that

many blast injuries have not been

identified. He said recently “We

could be talking many thousands

of types of brain injuries. And what

scares me is that what we’re seeing

now might just be the first round. If

they survive the initial injuries, many

of them may develop C.T.E. years or

decades later.” 14


1. Bentley, S., “Short history of PTSD: From

Thermopylae to Hue soldiers have always had a

disturbing reaction to war”. Vietnam Veterans

of America: The Veteran, 2005;


2. Caroline Alexander, “World War I: 100

Years Later - The Shock of War”, Smithsonian

Magazine, September 2010; http://www.smith-


3. C.N. Trueman “World War One executions”,

The History Learning Site, March 3, 2016; www.

4. Gerard Oram, “Desertion and deserters”,

British Military Law and the Death Penalty

(1868-1918), Crime, History, & Societies; Vol. 5,

no.1, 2001;

5. Peter Taylor-Whiffen, “Shot at Dawn: Cowards,

Traitors or Victims?” March 3, 2011; www.


6. Daniel Perl, “Characterization of interface

astroglial scarring in the human brain after blast

exposure: a post-mortem case series”, The Lancet

Neurology, June 9, 2016;



7. McLeod, S. A. (2010). “What is the Stress


8. Edgar Jones, PhD, “Battle for the mind:

World War 1 and the birth of military psychiatry”,

The Lancet, Volume 384, No. 9955, p1708–1714,

November 8, 2014;


9. Berlinda S. Martinez, “A Health Hazard

Assessment for Blast Overpressure Exposures

Subtitle - Citation Database - Version 1”, www.


10. Amy Courtney, ”The Complexity of Causing

Primary Blast-Induced Traumatic Brain Injury:

A Review of Potential Mechanisms”, Front

Neurol. 2015; 6: 221.

11. Charles Needham, “Blast Waves”, 2010;

12. “Study Suggests a Link Between Head Injury

and PTSD”, Department of Defense Blast

Injury Research Program; blastinjuryresearch.


13. Dr. David Brody, “Blast-Related Brain Injury:

Imaging for Clinical and Research Applications:

Report of the 2008 St. Louis Workshop”, J.

Neurotrauma. Dec; 26(12): 2127–2144. 2009

14. Dr. Daniel Perl, “What if PTSD is more

physical than psychological”, New York Times,



DHS requests nominations for 2016

National Seminar and Tabletop

Exercise (NITX)

Continued from page 35

OAE at: AcademicEngagement@ Please include the following

subject line in your message:

2016 NTTX Topic Nomination

Additional Opportunity: Join the

NTTX Planning Team

In addition to the contribution of

potential topics/exercise scenarios,

DHS is actively looking for representatives

from colleges and universities

to join the NTTX planning

team. The NTTX planning team,

which helps inform and develop

materials for the event, convenes

monthly via teleconference (in-person

available) in advance of the fall

2016 event.

To participate in the planning

team process and for additional details,

please contact the Office of Academic

Engagement at:


include the following subject line

in your message: 2016 NTTX Planning


Any additional questions on the

2016 NTTX can also be directed

to OAE: AcademicEngagement@


DHS Announces Grant Allocations

for Fiscal Year 2016 Preparedness


Continued from page 34

Awards made to the states and urban

areas for HSGP carry pass-through

requirements. Pass-through is decurity

enhancements for nonprofit

organizations that are at high risk of

a terrorist attack and located within

one of the 29 Fiscal Year 2016 UASIeligible

urban areas.

Tribal Homeland Security Grant

Program (THSGP) — a competitive

grant that provides $10 million to

eligible tribal nations to implement

preparedness initiatives to help

strengthen the nation against risk

associated with potential terrorist

attacks and other hazards.

Intercity Bus Security Grant Program

(IBSGP) — a competitive

grant that provides $3 million to

assist operators of fixed-route intercity

and charter bus services within

high-threat urban areas to protect

bus systems and the traveling public

from acts of terrorism, major disasters

and other emergencies.

In addition to the competitive grants

announced today, in February 2016,

Secretary Johnson announced more

than $1.3 billion in preparedness

grant program funding.

Non-Competitive Grant Program

Allocations for Fiscal Year 2016:

vides more than $350 million to

assist local, tribal, territorial, and

state governments in enhancing and

sustaining all-hazards emergency

management capabilities.

Intercity Passenger Rail - Amtrak

(IPR) Program — a non-competitive

grant that provides $10 million to

protect critical surface transportation

infrastructure and the traveling

public from acts of terrorism and

increase the resilience of the Amtrak

rail system.

Homeland Security Grant Program

(HSGP) — provides more than $1

billion for states and urban areas to

prevent, protect against, mitigate,

respond to, and recover from acts

of terrorism and other threats. The

HSGP grants are:

• State Homeland Security Program

(SHSP) — a non-competitive

grant that provides $402 million

to support the implementation of

the National Preparedness System

to build and strengthen preparedness

capabilities at all levels.

• Urban Areas Security Initiative

(UASI) — a non-competitive

grant that provides $580 million

to enhance regional preparedness

and capabilities in 29 high-threat,

high-density areas.


Emergency Management Performance

Grant (EMPG) Program — a

non-competitive grant that profined

as an obligation on the part

of the State Administrative Agency

(SAA) to make funds available to

local units of government, combinations

of local units, tribal governments,

or other specific groups

or organizations. The SAA must

obligate at least 80 percent (80%) of

the funds awarded under SHSP and

UASI to local or tribal units of government.

Per section 2006 of the Homeland

Security Act of 2002, as amended

(6 U.S.C. § 607), DHS/FEMA is required

to ensure that at least 25 percent

of grant funding must be used

for law enforcement terrorism prevention


Further information on DHS’s

preparedness grant programs is

available at and http://

Sign-up for Free GSN

Print/Digital Editions

& Email Newsletters


The News Leader in Physical, IT and Homeland Security

CEO/Editorial Director

Adrian Courtenay



Steve Bittenbender


Senior Writer

Karen Ferrick-Roman


Shawn Campbell, Columnist

Campbell on Crypto

John Convy, Columnist

Convy on Net-Centric Security

George Lane, Columnist

Hazmat Science & Public Policy

Lloyd McCoy,Jr,

Contributing Author

Walter Ewing,

American Immigration Council

Contributing Author

Mike Pena, Apprio

Contributing Author


Adelle Rydman, Zenoss

Contributing Author

Gerry O’Hara, Art Director


For GSN Media Kit

or Advertising Rates,

contact Adrian Courtenay

at 917-696-5782

or by email at

Coming Attractions



Tech Focus

Perimeter Protection/

Intrusion Detection

Market Focus




Tech Focus

Access Control/

Biometric ID

Market Focus


Port Security


Tech Focus

School Safety/

Mobile & Surveillance


Market Focus

Oil/Gas/Electric Grid



More magazines by this user
Similar magazines