Government Security News


Scientist George Lane explains “What was in the World Trade Center plume on

9/11”, and former EPA Administrator Christie Whitman acknowledges that many

people died because of her “mistake” in announcing seven days after the attacks

that the air in lower Manhattan was safe to breathe – Page 12

Also in this issue:

Case Study: HID Global helps streamline Bhutan’s driver’s license issuance and management system – Page 6

Chuck Brooks on Cybersecurity: The weakest link will always be the human element in what many people call

the wild, wild west of cybersecrurity – Page 32

The nation’s power grid is struck by cyber or physical attacks once every four days, according to Federal

energy records – Page 40


GSN October 2016 Digital













What was in the World Trade Center chemical plume at

Ground Zero on 9/11

Salient CRGT awarded $22.6M contract from DHS

to improve border technologies

GTT releases most advanced TSP solution to date:

modular, expandable Opticom CVP

HID Global helps streamline Bhutan’s driver license issuance

and management system

Canon U.S.A. and National Crime Prevention Council collaborate

to raise awareness of theft and safety concerns

The Technology War: Advantages of Network-Centric

approach to modern warfare

International sports competition in Brazil catapults

to Gold Standard of ID Management with

Quantum Secure

The 2015 ISIS Attacks on Paris: Assessment and Lessons Learned

Handheld Narcotics Analyzer can now detect lethal W-18 opioid drug

FLIR announces identiFINDER R100 personal radiation detector

with integrated Bluetooth smart technology

Cambridge Pixel enhances radar tracking software

to support small target detection

Vecna attainst DoD DIACAP Security Accreditation

and ATO for patient self-service solution


Edition Table of Contents




Even the Government’s own advisory committee wants

to end family detention

How the Vice Presidential candidates responded to

immigration issues at the debate

Class action lawsuit challenging failure of CBP to respond to

Freedom of Information requests is dismissed following settlement







Chuck Brooks on Cybersecurity: The weakest link will

always be the human element

Arrest of ex-NSA contractor shows federal

cybersecurity still faces a serious insider threat

Intelligent Automation Inc discusses cyber attacks

and tools of analysis and mitigation

Convy on Net-Centric Security:

The future of identity management is

on the tips of your fingers





The nation’s power grid is struck by cyber or physical attacks once every four

days, according to federal energy records

Quanergy acquires OTUS People Tracker Software

from Raytheon BBN Technologies to strengthen its

position as complete LiDar solution provider

Infrared NCR launches national critical infrastructure

security and resilience month awareness campaign


Salient CRGT awarded $22.6M contract from Department

of Homeland Security to improve border technologies

FAIRFAX, VA – October 12, 2016

- Salient CRGT, Inc., a leading provider

of worldwide training development

and delivery, Agile software

development, data analytics, mobility,

cyber security, and infrastructure

solutions, today announced a

prime contract award from

the Department of Homeland

Security (DHS) Science

and Technology

Directorate (S&T), to

provide development,

integration and evaluation

in support of Borders

& Maritime Research, Integration

and Transition Environments

(BorderRITE). This five-year

effort is valued at approximately

$22.6 million.

The objective of BorderRITE is

to provide two environments that

seamlessly work together to help

secure the Nation’s borders. Salient

CRGT fills the gap between vendor

testing and pilot programs by

development systems and creating

environments to evaluate emerging

technologies and transition them

into operational use. The company

will build and maintain these environments

and help S&T identify

new technologies.

Created by Congress in 2003 with

the formation of the Department of

Homeland Security, S&T is DHS’s

primary research and development

(R&D) arm. S&T manages science

and technology research, from development

through transition, for

the department’s operational

components and the nation’s

first responders.

S&T’s mission is to deliver

effective and innovative

insight, methods

and solutions for

the critical needs of the

Homeland Security Enterprise.

“Our partnership with DHS Science

and Technology Directorate

aligns with our company focus on

innovation,” says Brad Antle, CEO

of Salient CRGT. “Our Innovation

Centers focus on identifying and

testing new technologies to improve

our customers’ efficiency and

threat posture. This effort picks up

where manufacturers’ and vendors’

product testing ends. Evaluating

technologies in a real-world environment

will inform DHS S&T’s

decision making about significant

technology investments and save

the agency time and money.”


This award was through Salient

Federal Solutions, Inc., a wholly

owned subsidiary of Salient CRGT.

About Salient CRGT

Salient CRGT provides Agile software

development, data analytics,

mobility, cyber security and infrastructure

solutions. We support

these core capabilities with full lifecycle

IT services and training—to

help our customers meet critical

goals for pivotal missions. We are

purpose built for IT transformation

supporting federal civilian, defense,

homeland, and intelligence agencies,

as well as Fortune 1000 companies.

We use the most innovative

talent delivery model in the industry,

scientifically providing exactly

the right people for the customers’

most pressing requirements. Salient

CRGT has earned a record of success

with integration and operations

of large‐scale, high‐volume solutions.

On September 15, 2015, Salient

and CRGT announced closing

of the merger transactions – visit

newsroom. For additional information

on Salient and CRGT, visit

GTT releases most advanced TSP solution to date:

modular, expandable Opticom CVP

ST. PAUL, MN – October 11, 2016

– Global Traffic Technologies announced

today the availability of Opticom

CVP, the company’s next-generation

transit optimization solution.

The Opticom CVP is built with

the same powerful and precise algorithms

used in Opticom hardwarecentric,

GPS-enabled solutions. The

new platform provides softwarebased

Transit Signal Priority (TSP),

schedule adherence, headway management

and other advanced capabilities,

helping to ensure transit vehicles

adhere to their published timetables.

With GTT’s most advanced solution

to date, agencies have the potential to

increase rider satisfaction while dramatically

reducing operating costs.

The platform also adds cloud-based

analytics for more control and insights.

GTT’s president Doug Roberts said

“the new Opticom CVP is a softwarecentric

platform that, combined with

new service and delivery options, is

designed to offer agencies maximum

flexibility with their implementation.

“The solution significantly reduces

implementation time,” Roberts said.

“This allows agencies to increase efficiency

and improve rider satisfaction

faster than conventional solutions.”

The CVP - like other transit solutions

from GTT - provides a compelling

and quick return on investment

for transit agencies by reducing fuel

and labour costs. Opticom TSP solutions

can even have the potential to

reduce fleet requirements.

“The Opticom Connected Vehicle

Platform is designed to empower

transit agencies,” Roberts said.

“Combining GTT’s industry-leading

Opticom TSP with built-in active

schedule and headway management

capabilities, the CVP helps keep transit

services on time and performing

optimally in order to minimize travel

times, increase predictability and improve

on-time metrics.”

In addition to the software-based

TSP, schedule and headway applications,

the Opticom CVP allows transit

managers to monitor and maintain

system performance from a central

location with cloud-based analytics

and reporting. Transit managers can

monitor such key metrics as on-time

performance, and dwell time and

travel time by vehicle or route. Users

can also assess and maintain system

performance and provide updates to

the system from anywhere with Internet

access using Opticom Centralized

Management Software (CMS).

The Opticom CVP is built to expand

as an agency’s needs grow. The

CVP offers multiple interface options

and allows additional applications to


be added as needed.

In cities that are already equipped

with Opticom for emergency vehicle

preemption, Opticom CVP can be

easily integrated to include service to

their transit fleets. Opticom CVP is

designed to support all variations of

Opticom TSP, including distributed

variants that use infrared and/or GPS

intersection infrastructure, centralized

architectures, and radio or cellbased

communications, including


The Opticom CVP solution is available

now from authorized GTT dealers.

For more information contact

GTT Sales Support via phone at +1

800-258-4610 select Option 1, email, or visit


About Global Traffic

Technologies, LLC

GTT, formed in 2007 from 3M’s pioneering

Intelligent Transportation

Systems business, is the manufacturer

of Opticom priority control systems

and CanogaT traffic-sensing systems.

These systems have provided safe and

More on page 46


HID Global helps streamline Bhutan’s driver

license issuance and management system

Road Safety and Transport Authority,

Thimphu, Bhutan

The Road Safety and Transport

Authority of Bhutan (RSTA), the

government agency responsible

for printing and issuing driver’s licenses

sought a more secure and

durable card issuance solution for

the country’s growing population

of road users. Formerly known as

Surface and Transport Authority

(STA), the agency was established

in 1977 and works to provide safe,

reliable and cost-effective transportation

alternatives that support the

socio-economic development of

Bhutan. Among its myriad of private

and commercial motor vehicle

functions, it is responsible for all vehicle

registration and driver license

issuance throughout the country.

The RSTA currently employs approximately

170 civil servants in its

regional and local offices across the



In recent years, Bhutan has undergone

significant economic development

and modernization leading

to an increase in a

number of drivers

unable to manage

the high demand

in the issuance of

driver’s licenses, the

existing printing

process was inefficient

and lacked

a streamlined approach

for replacing

printer consumables

needed in order to

meet the demands

of new driver requirements.

Dependent on a system

that required different vendors for

its consumables such as cards and

overlaminates, the RSTA needed

a more efficient printing solution

from a single source that would enable

them to issue a high-volume of

ID cards.

“We needed a more efficient printing

solution without compromising

security, durability and image quality,”

said Tshering Nidup, ICT Officer

at the Road Safety and Transport

Authority.“Before implementing

HID Global’s ID card issuance solution,

we had to work with mul-


“The printers were plugged in and they were just ready to go. They

were also incredibly intuitive to use, and we have had no problem

with them through the entire year.”

– Tshering Nidup

ICT Officer, Road Safety and Transport

Authority of Bhutan (RSTA)

tiple vendors to get all the components

needed in order to carry out

the printing of driver’s licenses, but

there were times when it was difficult

to ensure each vendor would

deliver the needed consumable on

time. If any of them had to delay

their delivery to a particular site, we

had to stop printing at that location

creating a large backlog for us.”

Since the driver’s licenses are also

used as citizen identification, it is

critical for the ID card to be highly

secure, resistant to cloning and

counterfeiting. Previously, the li-

More on page 10

HID Global Helps Streamline

Bhutan’s Driver License Issuance

and Management System

Continued from page 6

censes lacked the security features

that prevented them from being

tampered with resulting in an underground

market of fake IDs that

presented a problem for law enforcement.

In addition, the old licenses were

very susceptible to wear and tear

fading after a few years, leaving behind

IDs with only faint images of

personal information that were illegible,

and difficult to be recognized.


After RSTA selected Ugen Trading

House (UTH), the local authorized

dealer of HID Global solutions in

Bhutan, the RSTA selected HID

Global’s FARGO® HDP5000 high

definition printers/encoders and

Thinley Dorji, Motor Vehicle Inspector at

RSTA, is one of the officers responsible for the

issuance of drivers’ licenses in Bhutan.

deployed the new system in its offices

last year to manage the driver’s

license issuance process. The RSTA

chose HID Global because it was

looking for a trusted partner who

could provide not only highly secure

products that adhere to international

standards, but also professional

and thorough aftersales

services and support.

The HDP5000 printers/encoders

enabled RSTA to gain access to

state-of-the-art, high-definition and

efficient card printing at a lower total

cost of ownership than the previously

deployed solution.

“Gaining greater efficiency with

the new printers, we had no problems

operating and issuing ID cards

across all of our driver’s license distribution

locations,” said Nidup.

Additionally, the HDP5000 ID

printer and encoder produces crisp,

high-definition images by leveraging

the retransfer print technology.

By printing a reverse image on an

intermediate film, then transferring

the film to the card surface, the

HDP5000 outputs greater image

quality that is long-lasting and more

resistant to wear and tear compared

to those printed directly on the


The new driver’s licenses also features

a multitude of security features,

supported by the HDP5000

printers. The RTSA achieved this

by utilizing the dual-sided printing


feature. By installing the dual lamination

module it enabled them to

quickly and efficiently laminate the

cards on both sides, without flipping,

in one pass.


For easy identification, the new

driver’s licenses are issued in three

different colors – white for private

cars, blue for commercial vehicles

such as buses, and green for taxis.

The improved quality of the cards

have received positive feedback by

the citizens of Bhutan, as it provides

a more secure, durable and updated

look. “We now have a lot fewer requests

for replacement cards compared

to last year lessening our work

load and resulting in an added benefit

in annual waste savings,” added


With the new HID Global solution

deployed, the RSTA of Bhutan can

now procure all printer consumables

from a single source for a more efficient

and streamlined resupplying

process. The high throughput rate of

the HDP5000 printers also contributes

to improved efficiency. In the

first few weeks of deployment, the

RSTA cleared its backlog of driver’s

licenses requests. As a result, the department

also reduced its wait times

for the issuance of new and replacement


Law enforcement agencies also

More on page 46

GSN’s 2016 Homeland Security Awards Program

Now Accepting Entries at:

The 2016 Government Security News Awards Program, featuring

many new categories in Cybersecurity, Physical Security, Government

Agency Innovations and Mobile Technologies will open for entries on

August 24 and will close for entries on November 15.

In good news for Winners and Finalists, GSN will be reinstating its

annual Homeland Security Awards Dinner in Washington, DC in

the first week of December, in a venue to be announced. Longtime

participants in the GSN awards programs will recall that previous

GSN Awards Dinners have featured top government, military leaders

and respected television commentators such as 4-Star General

Barry McCaffrey (Ret); Fran Townsend, Homeland Security Advisor to

George W. Bush, James Kallstrom, Assistant Director of the FBI and

Admiral Thad Allen (Ret), Commandant of the U.S. Coast Guard

who came out of retirement twice to serve his county, first in

Hurricane Katrina and later in the BP Oil Spill.

The cost of an entry for vendors is $300 per entry, but there is no

charge for government agencies or departments. All Winners

and Finalists receive Awards Emblems, and all Winners receive a

handsome, gold-trimmed plaque describing their winning entries.

All Winners and Finalists will also be invited to participate in the 2016

Digital Yearbook of Awards Winners.

To see photo gallery of previous Awards Dinners:

For information on the Awards Dinner or Sponsorships,

Contact Adrian Courtenay, Managing Partner, at, (Mobile) 917-696-5782

What was in the World Trade Center chemical

plume created at Ground Zero on “9/11”?

By George Lane,

Emergency Response Technology

Fifteen years later, what exactly residents

and rescue workers were exposed

to remains at least a partial

mystery. The smell cannot be forgotten.

Any smoky mix of burning plastic

can instantly bring back memories

for locals of the aftermath of the collapse

of the two towers of the World

Trade Center on September 11,

2001. 91,000 liters of jet fuel and the

10,000,000 tons of building materials

and contents burning at temperatures

above 1,000 degrees Celsius extended

from lower Manhattan across the East

River into Brooklyn and beyond to

the sea.

The terrorist attacks on the World

Trade Center on September 11, 2001,

exposed thousands of Fire Department

of New York City (FDNY) rescue

workers to dust, leading to substantial

declines in lung function in

the first year. So what exactly was in

that smoke and dust?

The real answer to that question will

never be known as few direct measurements

were taken of the plume

that followed the disintegration of

the two towers into a blizzard of dust,

though air samples were collected in

subsequent weeks and months. Regardless,

the then administrator of the

U.S. Environmental Protection Agency

and former governor of New Jersey

Christie Whitman said on September

13, 2001, “EPA is greatly relieved to

have learned that there appears to be

no significant levels of asbestos dust in

the air in New York City.” She added:

“We will continue to monitor closely.”

And five days later, she announced: “I

am glad to reassure the people of New

York and Washington, D.C., that their

air is safe to breath [sic].” 1

Knowing what was in the dust suggests

what may have caused the ailment

dubbed “World Trade Center

or WTC Cough” by the New England

Journal of Medicine, which doctors at

Mount Sinai Medical Center in New

York estimate afflicted nearly half of

those who worked at the site.

Ultimately, the EPA determined

that the air around “Ground Zero”

was harmless, despite the agency’s

findings concerning levels of asbestos

and dioxin, at least to civilians living

and working in the vicinity, if not the

rescue workers. “Except for inhalation

exposures that may have occurred on

9/11 and a few days afterwards, the

ambient air concentration data suggest

that persons in the general population

were unlikely to suffer short-term or

long-term adverse health effects caused


by inhalation exposures,” EPA scientists

wrote in their analysis published

in 2007. 2

“It was such a horrific event,” says

environmental scientist Paul Lioy of

the Environmental and Occupational

Health Sciences Institute in New

Jersey, who was contacted by both

the federal government and the Port

Authority of New York and New Jersey

to collect samples of the pulverized

remains of the Twin Towers in

the days following the attack. “What

was the contribution of the gases [from


The terrorist attack on the World

Trade Center on September 11, 2001,

now known as “9/11”, and its consequent

collapse killed 2,751 persons,

including 343 rescue workers employed

by the Fire Department of

New York City (FDNY) and exposed

thousands of persons to a dense, persistent

dust cloud of pulverized building

materials and chemical by-products

of combustion or pyrolysis. 3

The FDNY rescue workers who responded

to the World Trade Center

site during the collapse or the subsequent

10-month rescue-and-recovery

operations had substantial loss in pulmonary

function during the first year

after the event, more than 12 times

the annual age-associated rate. The

largest decline was observed among

workers who arrived at the site on

the morning of “9/11”, and there were

larger declines among firefighters

than among emergency medical services

workers. 4

Among non-FDNY rescue workers,

volunteers, and residents of lower

Manhattan who were exposed to

World Trade Center dust, abnormal

results on spirometry, a common office

test used to assess how well your

lungs work by measuring how much

air you inhale, how much you exhale

and how quickly you exhale,

were common and persisted during a

3-year follow-up. However, health records

were not available before “9/11”

to determine the extent of new versus

preexisting abnormalities. 5

During the “9/11” attack on the

WTCs, urban chemical warfare was

introduced to America. Thousands

were hospitalized with a “pulmonary

edema”, an indicator of what became

known as the “WTC Cough”. 6

“FEV1”,” forced expiratory volume” in

1 second, is the volume exhaled during

the first second of a forced expiratory

maneuver started from the level

of total lung capacity. FEV1 was used

to assess airway obstruction, bronchoconstriction,

or bronchodilatation.


“Ground Zero” smoldered until

December 19, releasing fumes that

researchers collected in air samples.

The debris pile acted like a chemical

factory. It cooked together the components

of the buildings and their

contents, including enormous numbers

of computers, and gave off gases

of toxic metals, acids and organics.

The “WTC Cough” was named by

Dr. David Prezant, medical director

of the New York City Fire Department,

in a September 12, 2002, study

in the New England Journal of Medicine.

He and his colleagues reported

that firefighters who had worked at

the World Trade Center site within

the first three days of September

11 were most likely to display these

symptoms, no doubt from massive

exposure to a variety of toxic chemicals.

Those who required at least four

consecutive weeks of medical leave as

a result of the sickness were diagnosed

with “World Trade Center Cough”.

A 2005 study of 2,812 residents living

near the World Trade Center published

in the Journal Environmen-


tal Health Perspectives found that

coughing, wheezing, chest tightness

and shortness of breath were reported

in three to six times greater numbers

among people living within one

mile of the World Trade Center site

than among those who lived more

than five miles away. More recent

studies of patients who have sought

treatment for September 11-related

respiratory illness suggest that years

later, they still have a greater risk for

abnormal lung function.

But it is hard to know what the real

numbers are. Unlike firefighters, who

receive care through the New York

City Fire Department and whose

health status before and after September

11 has been well-documented, the

health of residents and local workers

hasn’t been well-tracked.

The “James L. Zadroga 9/11 Health

& Compensation Act”, signed into law

by President Obama in early 2011,

establishes the “World Trade Center

(WTC) Health Program”. It ensures

that those affected by “9/11” continue

to receive monitoring and treatment

services for “9/11”-related health

problems through at least 2015. The

“WTC Health Program” consists of a

Responder Program (for rescue and

recovery workers, including more

than 15,000 New York City firefighters)

and a Survivor Program (for those

who lived, worked or went to school

in lower Manhattan on “9/11”). Services

also are available for responders

to the Pentagon and Shanksville,

Pennsylvania sites also attacked by

9/11 terrorists. People eligible can receive

services, no matter where they

live now in the U.S. The director of

the National Institute for Occupational

Safety and Health (NIOSH) administers

the “WTC Health Program”,

paid by the federal government and

New York City. 9

I was invited to participate in research

into the chemical origins of

the “WTC Cough” by the Naval Postgraduate

School in 2010. Because

no chemical-specific detectors were

used, I used an indirect forensic science

public policy approach, noting

that almost all victims suffered

from what is known in medicine as

a “pulmonary edema”, characterized

by fluid accumulation in the lungs,

which collects in air sacs. Shortness

of breath is the most common symptom

of “pulmonary edema” and is due

to the failure of the lungs to provide

adequate Oxygen to the body.

I examined the materials of construction

used in World Trade Tower

Centers 1 and 2 (WTCs), completed

in 1973 and using from 200

to 250,000 tons of common plastic,

Polyvinyl chloride (PVC) as insulation

in the WTCs. When the jet fuel

ignited on “9/11”, the PVC was partially

combusted, forming incomplete

product of combustion chemicals,

and creating from 10 to 15,000 tons

of Phosgene within minutes. Phosgene

is used both in industry and as a

battle field weapon.

The effects of exposure to irritants

such as Hydrogen chloride, Phosgene,

and particulates are dependent on the

size of the particle and how readily

the chemical dissolves in water. These

properties determine where in the respiratory

tract the chemical or particle

is deposited and absorbed. Hydrogen

chloride is very soluble therefore

injury occurs in the upper airway as

opposed to Phosgene, which effects

mainly in the lower respiratory tract,

the lungs.

Phosgene is deadly at a concentration

of 2 ppm. It appears as a white

cloud and has a characteristic odor of

sweet, newly mown hay in lower concentrations.

Phosgene has low water

solubility, so has a delayed onset of

action, from 30 minutes to 8 hours. It

readily reaches the respiratory alveoli

and has direct toxic effects, leading to

cellular damage of the alveolar-capillary

membrane and subsequent pulmonary

edema. 10 Alveoli tubes transfer

O2 into and CO2 out of the lungs.

Because there is no systemic absorption,

other organs are not affected. 11

I observed that when Phosgene reacted

on the moisture of the alveoli in

the lungs it formed corrosive Hydrogen

chloride (HCl). Phosgene had reacted

with the moisture of the alveoli

to form corrosive Hydrogen chloride

(HCl), causing “pulmonary edemas”

in both residents and fire fighters.

However, all Phosgene produced by

the incomplete combustion of PVC

was destroyed by the large amounts of


water used to fire the numerous fires

at “Ground Zero”, preventing detection

after “9/11”.

To mitigate human exposure to

Phosgene and other hazardous chemicals

when responding to emergencies,

I am designing and deploying

autonomously operated chemical security

networks capable of detecting,

identifying and measuring not only

Phosgene, but many other chemicals

using a passive standoff chemical

sensor using commercially available

Fourier Transform Infrared (FTIR).

Integrated with video surveillance,

the chemical security “Tool

Box” warns emergency responders

of chemical hazards from up to three

miles away in real-time, preventing

firefighters and other emergency responders

from becoming “canaries in

a coal mine”, protecting both public

health and critical infrastructure.

Editor’s Note:

Published reports within a few days

of the 15th anniversary of 9/11 have

indicated that Christine Todd Whitman,

who was the administrator of

the Environmental Protection Agency

at the time of the 9/11 disaster, has

finally apologized after fifteen years

for her claim in the days immediately

after the attacks that the air around

Ground Zero and in lower Manhattan

was safe. The reports also indicated

that Ms Whitman had stated that

More on page 46

Canon U.S.A. and National Crime Prevention Council

collaborate to raise awareness of theft and safety

concerns to counterfeit power accessories

MELVILLE, NY – October 13, 2016

– Canon U.S.A., Inc., a leader in

digital imaging solutions, today announced

its collaboration with the

National Crime Prevention Council

(NCPC) to promote awareness

around the safety risks of using

counterfeit power accessories,

such as batteries, chargers, and

external flashes. The production

and sale of counterfeit

products is an issue that not

only affects the consumer electronics

industry, but can affect

consumer safety as well. The

launch of this collaboration is

scheduled to coincide with Crime

Prevention Month in October, and

will continue through 2017.

Together with Canon U.S.A.,

NCPC will use its resources to provide

educational tools to crime prevention

practitioners, law enforcement

officials, and educators who,

in turn, can use those resources to

teach their communities about the

dangers of purchasing counterfeits.

The awareness campaign will also

include digital messaging directed

to consumers and public service announcements

as well as other videos

featuring McGruff the Crime Dog®.

Counterfeit items are illegal replicas

of real products, designed to

deceive and take advantage of the

superior value of genuine merchandise.

They are produced in a manner

that is increasingly more difficult

for average consumers to identify,

which is why awareness and education

efforts are so important. Furthermore,

counterfeit power accessories

can lead to potentially

dangerous results. They typically

do not contain important safety

technologies and are not tested to

meet industry safety standards. As

a result, they may overheat, smoke,

melt, ignite, or create power surges

and electrical irregularities that may

cause personal injury or property



“The safety of our customers is of

paramount importance,” said Yuichi

Ishizuka, president and COO, Canon

U.S.A., Inc. “We want to make

sure our customers are aware of the

dangers of counterfeit power accessories

so they can avoid potential

risks of hurting themselves

or damaging their equipment.”

“As counterfeiting of camera

accessories continues to

evolve, we want to make consumers

aware of this risk so

they can keep themselves and

their equipment safe,” said

Ann Harkins, president and

CEO, NCPC. “Counterfeit products

designed to look like genuine products

from major camera manufacturers

may cause damage to people

and property.”

NCPC is a private, nonprofit

tax-exempt 501(c)(3) organization

whose primary mission is to be the

nation’s leader in helping people

keep themselves, their families and

their communities safe from crime.

To learn more about the campaign,

please visit


More on page 47

The Technology of War: Advantages of a

Network-Centric approach to modern warfare

By Barry McElroy

While the reasons we go to war –

land, religion, retribution, resources

– have not changed much over the

millennia, warfare itself has changed

dramatically, especially in recent decades.

No longer is a battle a linear operation

with clearly defined lines and

trained soldiers in uniform firing artillery

at each other, as it was for much

of the 20th century. To fight a war in

the 21st century means fighting an

enemy who is everywhere and nowhere

at the same time, who has not

been trained in battle formations or

military strategy, who does not wear

a uniform or use WoRm formulas to

calculate where to fire.

There are no battle lines – anywhere

in a targeted country is a free

fire zone, and the enemy is constantly

moving and changing where they attack

from. There is no symmetry – a

solitary person can destroy a group of

soldiers and their vehicles using an

improvised explosive device (IED) or


Twenty-first century warfare requires

that soldiers are constantly on

their guard and ready to fight – and

this need for always-on preparedness

has changed the way the military

collects and uses intelligence, giving

rise to what’s called “network-centric

warfare”: the use of networked technology

to provide advantages on the


The Benefits of the

Network-Centric Approach

A network-centric approach to warfare

links all military assets to each

other and to decision makers via

computer, radio and data networks,

enhancing the way military objectives

are accomplished because of information

superiority: According to David

S. Alberts, who formerly worked in

the office of the Assistant Secretary

of Defense for Networks and Information

Integration, “A robustly networked

force improves information

sharing. Information sharing and

collaboration enhance the quality of

information and shared situational

awareness. Shared situational awareness

enables self-synchronization.

These, in turn, dramatically increase

mission effectiveness.”

A Department of Defense text adds

that while war will always be characterized

by “fog, friction, complexity

and irrationality,” network-centric

operations provide increased aware-


ness and more informed decision

making: “… Having a better near real-time

picture of what is happening

… certainly reduces uncertainty in a

meaningful way.”

This method requires a powerful

communications network, however.

A true military-grade

network must provide



to in-motion

and stationary


vehicles and

equipment, giving

commanders and

troops always-connected,

secure access to applications and

information – thus improving situational

awareness and mission effectiveness.

There is no room for security

breaches or outages of any kind

when it can mean the difference between

life and death, or a war won or


Communications have sometimes

been a weak link between the various

moving parts of the armed forces,

whether between ground, airborne

and seaborne forces, or between

forces and non-aligned units such as

foreign coalitions or sister services

within the Department of Defense.

However, this has been changing in

recent years as military operations

and projects have begun utilizing a

network called kinetic mesh.

Kinetic Mesh on the Battlefield

A kinetic mesh network combines

wireless network nodes and networking

software. It employs multiple

radio frequencies and any-node-toany-node

capabilities to instantaneously

route data via the best

available traffic path

and frequency,

with up to 300

Mbps transfer


If a certain

path becomes

unavailable for

any reason – due to

antenna failure, for example

– nodes on the network use

an alternate route to deliver the data,

eliminating any gaps in communication

and allowing on-the-fly transmission

of voice, video and data to

provide situational awareness, despite

conditions that would cripple other

networks. Routes are built automatically,

and are evaluated for quality

and performance for every sent and

received packet.

There is no central control node

and no single points of failure. These

self-healing, peer-to-peer networks

support Wi-Fi, integrate easily with

Ethernet-connected devices and

scale to hundreds of high-bandwidth

nodes – in fact, the more nodes added,

the more pathways are established

and the more resilient a network becomes.

The nodes self-configure, making

it simple to expand the network, and

are built to withstand hostile environments

like battlefields. Each node

serves as singular infrastructure,

which enables everything within the

network to be mobile: wireless nodes

can move, clients can move, network

traffic can move – all in real time and

without manual intervention.

A Kinetic mesh network can be easily

redeployed and expanded in multiple

ways, and still operates with the

same level of reliability, even in the

harshest conditions. It eliminates the

challenges of time-consuming, complicated

deployments in the midst of

battlefield pressures, challenging terrain

and changing operations: All a

soldier has to do is hit a power button

on the radio, and the radio immediately

connects to the network and

is up and running. A soldier doesn’t

need extensive training to learn how

to set up a radio, and a company no

longer needs to lay new cable every

time its headquarters moves, which

requires man-hours and taxpayer


Not to be overlooked is the network’s

military-grade level of security

(with some radios certified to

“Secret and Below” interoperability).

Kinetic mesh delivers end-to-end,


256-bit encryption. When encrypted

information flows through the mesh

and comes out another node, it stays

encrypted all the way through, and is

not decrypted until it is delivered to

its final destination, ensuring privacy.

At each hop in the network, kinetic

mesh provides a per-hop authentication

for each packet. Metadata also is

encrypted; an attacker cannot analyze

the traffic and see which nodes are

communicating with other devices –

which, in a battlefield situation, could

give away position.

Kinetic Mesh in Action

Kinetic mesh has been a part of several

military programs and projects,


C-RAM: The C-RAM program is a

“system of systems” that primarily

uses radar to detect incoming projectiles

(rockets, artillery and mortars)

fired from hostile forces. An engagement

weapon then attempts to intercept

the projectile and destroy it in

flight before it impacts.

There also is a warning component;

once the radar has determined the

trajectory of the projectile, it can determine

what kind of shell or projectile

it is, as well as estimated point of

impact, to determine the blast radius.

It then can send an alert to the affected

area, instructing all personnel

to seek cover. A soldier has about 10

seconds to find cover before detonation

if the projectile is not intercepted

in flight – which does not sound like

a lot of time, but can mean the difference

between life and death.

The C-RAM program was an important

counter measure to enemy

fire during the wars in Iraq, where the

way the enemy fought made it impossible

for troops to deploy counter fire

– because there was simply no one to

fire at. Instead, the enemy would set

up crude stands with rockets on top

and use a triggering device to deploy

the rockets from afar. It was by no

means a scientific method of warfare,

but it was intermittently effective, killing

or injuring soldiers and disabling

military assets.

For the past five years, kinetic mesh

has provided the communications

link between the radars and the command

center, and the warning towers

and the command center. Before kinetic

mesh radios were implemented,

there was a much higher rate of interference

between the various components

and the radios, creating gaps in

communications. With kinetic mesh

radios, system availability rate has increased

significantly – meaning even

more human lives will be saved in

current and future field operations.

Soldier Link: Soldier Link is a communications

network that connects

all military personnel from the lowest

link – the individual soldier – up

to national command. It is intended

to provide and distribute situational

awareness communications, including

position locator information for

soldiers and vehicles. Kinetic mesh

radios will provide plug-and-play

Ethernet connections with IP-based

devices for company-level and below

soldiers. (Soldier Link has been developed

and is being evaluated and


Wolfhound: Wolfhound is a manportable

electronic warfare and cyber

capability supporting kinetic

operations in Operation Enduring

Freedom. The system includes three

networked, man-packable nodes capable

of detecting, identifying and

direction-finding conventional communications.

It targets Very High

Frequency (VHF) or Ultra High Frequency

(UHF), push-to-talk, handheld

radio communications, and is a

counter-IED program.

The use of IEDs is an example of the

unconventional military tactics seen

in the asymmetrical warfare of the

late 20th and early 21st centuries: By

burying artillery shells strategically in

roads and other areas where troops

traveled, an enemy can injure or kill

soldiers and damage military assets

– all without needing to take aim or

even remain in the area.

IEDs were used extensively against

U.S.-led forces in Iraq and were responsible

for nearly 2,000 deaths between

July 2003 and January 2009.

Since Wolfhound’s inception, however,

the program has prevented the

detonation of more than 1,000 wouldbe

IEDs and is expected to save many

more lives in the future.


The Need for Real-Time

Communications in Modern Warfare

Technology is constantly changing

everything we do. Ray Kurzweil’s Law

of Accelerating Returns avows that

the rate of change in systems – including

technology – increases exponentially,

not linearly, meaning that

each advance doubles the rate of the

next: “30 steps linearly gets you to 30.

One, two, three, four, step 30, you’re

at 30. With exponential growth, it’s

one, two, four, eight. Step 30, you’re

at a billion.”

If this theory holds true, we will

continue to see lightning-fast technological

progress across every part

of our lives – including the way we

conduct combat operations. As warfare

becomes more unpredictable

and asymmetrical, a network-centric

approach will be ever more critical –

without real-time communications

enabling information superiority, all

the artillery in the world won’t make

a difference. Kinetic mesh networks

provide the mobility, reliability, scalability,

security and high bandwidth

needed to ensure mission-critical intelligence

is sent and received in real

time, breaking new ground in wartime

communications and helping to

save lives.

Barry McElroy is Vice President of Rajant.

He can be reached at bmcelroy@

International sports competition in Brazil catapulted to a

Gold Standard of Identity Management with Quantum Secure

SAN JOSE, CA – October 12, 2016

– While millions of viewers were

watching races, volleyball, gymnastics,

swimming and a wide range of

sporting achievements, Quantum

Secure, part of HID Global, a worldwide

leader in secure identity solutions,

worked behind the scenes in

Rio, Brazil this past summer to protect

sports venues by verifying the

identity of athletes, staff members,

guests and volunteers. The use of

SAFE Software from Quantum Secure

helped reduce the risk of intrusions

at the sporting events, preventing

potential threats through one of

the world’s most advanced forms of

managing identities at large events.

Quantum Secure’s SAFE software

tracked approximately 500,000

people who had credentials to come

and go from sporting venues across

Rio. Identity had to be

verified nearly three

million times during

the competitions, ensuring

that each badge

could be trusted and

was not a counterfeit.

Approximately a dozen

issues with badges were

identified, including an

incident in which people

tried to falsify badges in order

to enter a basketball game. Using

its analytics engine, SAFE software

recognized the falsified records, and

the response time was virtually instantaneous.

“Recent incidents around the

world have shown that the highest

profile activities, including sporting,

political and entertainment events,

require better protection and smarter

managing of access to buildings,”

said Ajay Jain, President and CEO,

Quantum Secure. “The power of our

new SAFE Sports and Events Access

Manager moves us from reaction to

prevention, with the ultimate goal

of eliminating potential threats before

they happen.”

SAFE Sports and Events Access

Manager features a mobile app

that quickly validates individuals


by simply swiping their identity

credentials on handheld peripherals.

Once the credentials are read,

security personnel can perform an

on-site visual confirmation via a

workstation and/or mobile device.

The system can control entrance of

all participants across different venues

or different locations within the

same venue.

“Quantum Secure specializes in

identifying the weak link that could

turn into an inside threat via a fake

ID, and then neutralizing it without

any disruption to the event,” added

Jain. “With years of experience

managing the lifecycle of identities,

we consistently beat threats to the

finish line.”

Like other solutions in the SAFE

portfolio, SAFE Sports and Events

Access Manager focuses on automating

and simplifying

physical identity and access

management, and

identifying and eliminating

potential risk by

amassing and analyzing

actionable intelligence.

Specific capabilities that

enhance its use in high

profile or high secu-

More on page 48

The 2015 ISIS Attacks on Paris:

Assessment and Lessons Learned

By George Lane

The coordinated attacks

in Paris on November 13,

2015 left 130 people dead

and hundreds wounded.

There were nine attackers,

each wearing a suicide

vest. The attackers targeted

a soccer stadium, bars and

restaurants, and a concert

hall, all venues ISIS knew

would be crowded on a Friday evening.

November 13 is now considered

“11/13”, France’s “9/11”. 1

ISIS has designated France as the

European country they hate most.

France has been an enthusiastic participant

in the U.S.-led coalition that

is bombarding Islamic State positions

in Syria and Iraq. ISIS also has

focused on France because it has the

largest Muslim population in Western

Europe and has become Europe’s

biggest source of recruits. 2

In response to the attacks, President

Francois Hollande declared a state of

emergency. France’s borders were

closed and an additional 1,500 troops

were deployed to Paris. The state of

emergency granted security forces

and police the ability to search homes

and place suspects under house arrest

without judicial approval. Within 48

George Lane

hours of the attacks, 168 homes had

been raided and 104 people placed

under house arrest. The

Paris law enforcement

community responded

well to coordinated, simultaneous

attacks. The death

toll likely would have been

much higher if not for several

key decisions made

immediately after the attacks

began. 3

Incident Management Overview: The

lessons learned from assessment of

the Paris attacks focus on six key areas:

(1) intelligence, (2) community

engagement, (3) investigation, (4)

incident command, (5) crisis communication,

and (6) training/equipment.

In each of these areas, findings

specific to the Paris attacks highlight

the challenges and opportunities facing

the French law enforcement and

public safety communities.

Intelligence: The attacks in Paris in

2015 caught authorities off guard for

several reasons. Previously fighters

had relied on a single mode of attack:

a shooting, an explosion, or hostagetaking.

In Paris, the attackers did all

three, overwhelming the country’s

emergency response capabilities. The


terrorists employed new tactics, exploited

weaknesses in Europe’s border

controls and demonstrated a desire

for maximum carnage, as opposed to

directing attacks at symbolic targets.

In many ways, the Paris attacks

closely resembled the Mumbai attacks

in 2008, which required “precise

planning, detailed reconnaissance

and thorough preparation, both

physical and mental. It relied on surprise,

creating confusion and overwhelming

the ability of the authorities

to respond.” 4 As in Mumbai, the

Paris attackers had carefully planned,

carried heavy firepower along with

explosives, and divided into teams,

simultaneously attacking different

locations to prevent the authorities

from developing an accurate assessment

of the situation.

The attackers’ goal was mass murder

rather than targeted killings. At

the Bataclan night club, they knew to

kill the security guard first and then

took large numbers of hostages, creating

a siege. This suggests that the

terrorists studied Mumbai and replicated

what worked. While the Paris

attackers were organized into blind

cells, they had extensive logistical


Investigators believe that ISIS terrorists

used the Sony PlayStation 4

game network to avoid detection of

communication before and during the

attacks. The PlayStation 4 Network allows

video game players from across

the globe to virtually meet and talk

with one another. Players can send

text messages or place calls through

the PlayStation network, spelling out

messages to one another within video

games almost impossible to track. 5

However French authorities do

not believe technological intelligence

could have prevented these attacks.

They said that human intelligence is

the most effective form of counterterrorism,

and the best intelligence

comes from community engagement,

not coercion. But gaining the necessary

trust to build human intelligence

sources within the European Muslim

community has proved particularly

difficult for French authorities. 6

Community Engagement: France has

the largest Muslim population in the

European Union. The Pew Center

for Research estimates that 4.8 million

people, or approximately 7.5% of

French residents, are of Muslim descent.

7 By law the French government

is prohibited from asking or keeping

data on its citizens’ race and religion

so exact demographic data is hard

to obtain. France has a complicated

colonial past that leaves many Muslims

today feeling isolated and discriminated.

Many of France’s Muslim

immigrants come from the former

French colonies of Morocco and Algeria.

In the mid-eighteenth century,

France invaded Algeria and began efforts

to convert the indigenous Muslims

to Christianity.

Algeria remained under French colonial

rule for the next century, not

gaining independence until 1962 after

a brutal eight-year war. Hundreds

of thousands died, and nearly one

million refugees fled to France. But

assimilation was difficult, especially

for practicing Muslims who found

France to be openly hostile to their


religious beliefs. France is a deeply

secular country. This tension has increased

in recent decades. In 2004,

France banned the wearing of veils,

crosses and yarmulkes in schools. In

2010, France banned public wearing

of a face veil worn by some Muslim


Today many Muslims live in the Parisian

suburbs known as the “banlieues”.

While the word literally means

“suburbs,” it has become a pejorative

term synonymous with poor, immigrant,

crime-ridden areas. France has

717 “sensitive urban zones” in which

unemployment is over twice the national

rate. Over a third live below the

poverty line and the unemployment

rate is near 40% for young Muslim

men. 8 There are direct connections

between youth, unemployment, and a

rise in Sunni extremism.

Investigation: While the style and

ferocity of the November attacks

caught law enforcement off-guard,

the immediate response was largely

successful. Though the French do not

have a traditional National Incident

Management System/Incident Command

System (NIMS/ICS) structure,

the many responding agencies were

able to coordinate quickly and share

information, despite the difficulties of

encrypted communication, multiple

crime scenes and numerous fatalities.

Investigators later found a cell

phone in a trash bin that contained

detailed information about the attack

and a text message saying, “On est

parti en commence.” (Translation: “We

have left, we are starting.”) 9 Authorities

were able to use geolocation services

on the phone to find the attackers last

known location before the assault in

an apartment in the Parisian suburb

of St. Denis. A seven hour shootout

with police ended with explosions

and the deaths of three people.

Despite the chaos and the variety of

crime scenes, French authorities were

able to achieve situational awareness

with a high degree of accuracy in

a short period of time. After the attacks,

the police were criticized for

their inability to locate attackers, especially

because they were hiding a

short distance away in Brussels. The

deep cultural divide likely impeded

cooperation between Muslim communities

and the authorities.

cide vest outside the stadium, President

Hollande, who had been inside

the stadium watching the game, was

rushed to safety. However, concerned

that the attacker’s intent was to create

a stampede out of the stadium with

other attackers lying in wait to ambush

the exit spectators, Hollande decided

not to tell the fans and players

what was going on. 10 The stadium was

quietly locked down and play continued.

Because of the spotty cell reception

inside the stadium, the public remained

largely unaware of the events

that were unfolding outside. At the

same time, police commanders opted

not to flood the area surrounding the

stadium with resources as French authorities

determined that this was a

likely a terrorist attack.

There was much confusion in the

response phase of the crisis. Because

there were three difference crime


Incident Command: Two key decisions

made during the first phase of the attacks

at the Stade de France stadium

likely saved hundreds of lives. After

the first attacker detonated his suiscenes,

there were also three separate

command posts that were operating

independently, hindering police attempts

to get accurate information

in real time. France allows the selfdeployment

of officers in an emergency.

Despite good intentions, these

self-deployed officers and their vehicles

created bottlenecks at key locations.

Because resources were not deployed

from a centralized command,

resource management suffered. First

responders had been using their radios

to communicate with the Incident

Command Post. However, Headquarters

took control of the radio communications,

which interfered with the

first responders’ ability to effectively

communicate with each other on


Crisis Information: Managing crisis

communication and the flow of infor-

mation proved to be one of the most

challenging aspects of the November

13 attacks. First, the emergency information

call system, the French “911”,

was completely overwhelmed. There

were two call centers, each staffed

with forty operators. French authorities

estimated that only one in six

emergency calls was answered. There

were likely many duplicate calls reporting

the same event.

Second, the media in France is

largely unregulated and has unrestricted

access to crime scenes even

as an investigation is unfolding. During

the attacks, French stations aired

live feed of police amassing outside

the market, preparing their attack.

ISIS was able to watch in real time

and gain situational awareness from

these media reports. The media in

France are not credentialed so there

is no way to enforce crime scene perimeters.

Third, the authorities did not effectively

use social media to share

official news updates. The first coordinated

statement and social media

push came the following morning. In

the hours after the attacks, the informational

void increased the sense of

panic throughout the city. 11

Training/Equipment: In the months

following the Paris attacks, no one discounted

the bravery of the responders,

but critics within and outside the

French law enforcement community

questioned if the police are capable

of adequately responding to this new

generation of terror attacks. Simultaneous

attacks with multiple crime

scenes require a nimble response

from a security force trained in both

crisis and counter-terrorism strategies.

But the French police system is

highly centralized.

Community policing, a common

practice in the United States, is not

the norm in France. In most situations,

local officers are trained to wait

for the specialists to arrive. 12 To effectively

manage a terrorist incident, first

responders need appropriate equipment

and training to neutralize or at

least contain the terrorists. However,

French first responders are currently

only trained in crime scene procedures.

They lack counter terrorism

training and do not have adequate

firepower to match up against automatic

weapons. A key lesson learned

is the importance of tactical training

for patrol officers.

Recommendations: The following are

recommendations for Paris law enforcement:

(1) Intelligence:

• Increase efforts to cultivate and leverage

human intelligence sources

• Improve tracking of fighters who

travel abroad for training and return

to France.

(2) Community Engagement:

• Adopt and/or create training programs

to counter violent extremism.

• Develop training programs to

neutralize the radicalization of incarcerated



(3) Investigation:

• Study past terrorist attacks to

identify lessons learned.

• Create a tracking system to maintain

real-time information on the

status of the victims of a major attack

in the medical system.

• Improve major case management

software with commercially available


• Use real-time data tracking systems

to enhance situational awareness

for incidents involving multiple


(4) Incident Command:

• Encourage application of NIMS/

ICS training to all first responders

and first supporters.

• Ensure protocols so that emergency

operation centers can respond to

terrorist attacks.

• Ensure multiple interactive communications

processes are in place

to main situational awareness and


(5) Crisis Information:

• Review current media protocols,

including media credentialing systems.

• Incorporate social media into crisis


• Educate the public on how to react

and respond during an active

shooter incident.

(6) Training/Equipment:

• Enhance counter-terrorist training

provided to patrol officers.

Training such as Multiple Assault

More on page 48

Handheld narcotics analyzer can now detect

lethal W-18 opioid drug

TEWKSBURY, MA – October 5,

2016 – Law enforcement agents,

narcotics officers and customs personnel

can now quickly and safely

detect street drug W-18 and other

lethal drugs with the newest library

update for the Thermo Scientific

TruNarc handheld narcotics analyzer.

W-18 is a new designer drugconsidered

to be significantly more

potent than morphine and fentanyl.

As part of its most recent v1.6

software update, the TruNarc analyzer

adds dibutylone, furanyl fentanyl

andU-47700 to its onboard

library, which now includes nearly

300 suspected narcotics and narcotics

precursorsand an additional 80

common cutting agents. TruNarc

helps combat drug abuse by enabling

law enforcement to quickly

identify core drugs of abuse as well

as emerging threats. These include

dangerouspainkillers that have contributed

to the growing opioid epidemic

in the U.S. Last year, TruNarc

addedfentanyl and acetyl fentanyl to

its library.

Dibutylone, known as “booty” or

“beauty,” is a psychedelic drug in the

phenethylamine, amphetamine andcathinone

class. It has been linked

to recent random acts of violence in

Florida, where the Thermo FisherScientific

Reachback Support

team assisted law enforcement

by identifying the dibutylone

(bk-DMBDB HCl). Furanyl fentanyl

and U-47700 are two synthetic

opioids distributed in the

U.S. as recreational drugs.

Fentanyl has been linked to hundreds

of deaths in the U.S. since

2013, a reason the U.S. Drug EnforcementAgency

issued a briefing

in July 2016 stating that the country

is in the midst of a fentanyl crisis.

“The recent case in Florida highlights

the challenges safety and security

professionals face as newer,

deadlier drugs reach the street,” said

Denzil Vaughn, director of marketing,

portable analytical instruments,

Thermo Fisher. “The TruNarc analyzer’s

latest library update is designed

to equip field agents with

updated capabilities to stay ahead

of emerging narcotics threats and

more quickly get drug users the

treatment they need.”

The TruNarc analyzer, which debuted

in 2012, allows law enforcement

personnel to scan a single

sample for multiple narcotics in one

test and receive the results within

seconds. An increasing number of


lawenforcement departments are

deploying TruNarc for presumptive

testing, helping to eliminate

the need to carry multiple chemical

tests, reduce drug testing backlogs

and speed prosecution.

The analyzer identifies chemicals

with Raman spectroscopy, a wellestablished

technique. Features and

benefits of the TruNarc analyzer include:

• Point-and-shoot simplicity that

allows users to accurately identify

narcotics on site with a highspecificity,

non-destructive and noncontact

test for most samples;

• Rapid presumptive testing designed

to enable law enforcement to

more expeditiously prosecute cases.

As an example, the Franklin County,

Missouri, Multi-County Narcotics

and Violent Crimes Enforcement

Unit uses TruNarc to gain probable

cause and charge drug offenders.

• Field-based sample screening

More on page 48

FLIR announces identiFINDER R100 personal radiation

detector with integrated Bluetooth smart technology

WILSONVILLE, OR – October 13,

2016 – FLIR Systems, Inc. (NASDAQ:

FLIR) today announced the identiFINDER®

R100 personal

radiation detector, the latest

addition to its industry-leading


R-Series handheld radiation

security solutions. The

belt-worn R100 integrates

networking capabilities to

safeguard first responders,

law enforcement, and

military and security personnel

by delivering immediate

radiation threat

FLIR identiFINDER R100

alarms and providing

automatically-generated radiation

dose rate reports to offer increased

situational awareness to central command


The identiFINDER R100 is the

industry’s first IP67-certified and

American National Standards Institute

(ANSI) drop-test compliant personal

radiation detector. The device

meets the 1.5M drop criteria required

by ANSI N42.32, one of the key performance

standards for alarming

PRDs in Homeland Security. The IP67

rating assures the R100 is protected

against dust and immersion in water

up to 1M depth. The unit features

integrated Bluetooth® Smart wireless

technology which facilitates recording

and sending real-time dose rates

and geotag information via a companion

mobile app.

The R100 joins the industry-leading


product family in offering

a complete range of radiation

security solutions,

from threat detection to

threat identification. All

identiFINDER models, including

the identiFINDER

R100, share the same fieldproven,

intuitive user interface,

which enables

coordinated emergency

response between law enforcement,

firefighters, and HAZMAT teams using

any identiFINDER product.

“As the only ANSI drop-test -compliant

and IP67-certified personal

radiation detector, the R100 is the

industry’s most rugged personal radiation

detector for first responders,”

said Dennis Barket, Jr., Vice President

and General Manager of FLIR Detection.

“When deployed across teams,

the R100 provides a primary detection

net that protects the frontline

against radiological threats, while the

integrated networking features eliminate

communication blind spots for

central command.”


FLIR will showcase the identiFIND-

ER R100 for the first time at the International

Association of Chiefs of Police

(IACP) Show on October 16 – 18

in San Diego, CA, booth #5251. The

identiFINDER R100 will begin shipping

globally in January 2017 with

pricing starting at $1,195. To learn

more about the identiFINDER R100,


About FLIR Systems

FLIR Systems, Inc. is a world leader

in the design, manufacture, and

marketing of sensor systems that

enhance perception and awareness.

FLIR’s advanced systems and components

are used for a wide variety of

thermal imaging, situational awareness,

and security applications, including

airborne and ground-based

surveillance, condition monitoring,

navigation, recreation, research and

development, manufacturing process

control, search and rescue, drug

interdiction, transportation safety,

border and maritime patrol, environmental

monitoring, and chemical,

biological, radiological, nuclear, and

explosives (CBRNE) threat detection.

For more information, visit FLIR’s web

site at

Cambridge Pixel enhances radar tracking software

to support small target detection

CAMBRIDGE, United Kingdom,

October 12, 2016 – Cambridge Pixel

(, an

award-winning supplier of radar display,

tracking and recording subsystems,

has enhanced its popular, fieldproven

SPx radar tracking software

with new modelling algorithms to

support the detection and tracking of

very small targets.

The new Model-based Tracking extensions

allow the operator to create

multiple models that match the signature

of likely small and weak targets

such as a swimmer or crawler, rigid

inflatable boat (RIB), jet ski, helicopter,

small UAV or a motorbike.

The tracker can also be configured

to look for specific scenarios, such

as targets moving towards a sensitive

location or on a specific heading.

Importantly, the tracking software allows

multiple types of target to be acquired

from the same data set.

Richard Warren, Cambridge Pixel’s

director of software said: “Radar sensors

are offering more capabilities to

detect targets of interest, but targets

of interest are getting smaller and

more agile, so advances in software

processing are a key part of the overall

detection solution.

“With our enhanced target tracking

software combining a multi-hypothesis

approach with this multi-model

capability, small and weak targets

can now be detected and tracked

even in cluttered environments. Our

software is highly flexible and can

work with a wide range

of commercial and

military radars to

assist our customers

in providing

effective security

and to combat an increase

in terrorism, smuggling,

piracy and insurgency.”

Cambridge Pixel’s SPx radar tracking

software is designed to operate

with many different radar types and is

already widely deployed in command

and control, maritime navigation, security,

airports and vessel traffic applications.

The software receives radar video

as either radar signals through an acquisition

card, as ASTERIX CAT-240

network data or in one of a number

of radar-specific proprietary formats.

Radar video is processed to attenuate

noise and clutter and then target-like

detections are extracted as plots. The

plots are then correlated to identify

candidate targets for fully automatic


Cambridge Pixel’s SPx radar tracker

is a best-in-class software-based


COTS primary radar data extractor

and target tracker that provides target

track identification, heading and

speed. It is fully parameterised, highly

configurable and supports multi-hypothesis

tracking to improve

tracking efficiency

and reduce

nuisance alarms.

Cambridge Pixel’s

SPx radar tracking

software is part of

the company’s world-leading SPx

suite of software libraries and applications

providing highly flexible, readyto-run

software products for radar

scan conversion, visualisation, radar

video distribution, target tracking,

sensor fusion, plot extraction and

clutter processing.

Cambridge Pixel’s technology is

used in naval, air traffic control, vessel

traffic, commercial shipping, security,

surveillance and airborne radar applications.

Its systems have been implemented

in mission critical applications

with companies such as BAE

Systems, Frontier Electronic Systems,

Barco Defence, Blighter Surveillance

Systems, DRS, Exelis, Kelvin Hughes,

Lockheed Martin, Navantia, Navtech

Radar, Raytheon, Saab, Royal Thai

Air Force, Samsung Thales, Sofresud

More on page 49

Vecna attains DoD DIACAP Security Accreditation and

ATO for patient self-service solution

CAMBRIDGE, MA – October 11,

2016– Vecna announced its DIA-

CAP (DoD Information Assurance

Certification and Accreditation

Process) Accreditation and ATO

(Authorization to Operate) issued

by the Department of Defense’s Defense

Health Agency. This latest accreditation

enables DoD customers

to purchase and securely use Vecna’s

patient check-in system on the

DoD network. Vecna’s patient selfservice

solution automates check-in

procedures for medical and dental

clinics, pharmacies, labs, and radiology

centers. Vecna’s system helps

staff to optimize patient flow, reduce

wait times, and increase patient satisfaction.

The system interacts in

real-time with the DoD’s EHR and

Dental Application.

“We are honored to support the

Military Health System,” says Bill

Donnell, Vecna’s VP of Government

Business. “Vecna’s expertise in patient

self-service solutions, combined

with the DoD’s world-class

facilities provide a secure, convenient,

and reliable digital platform

for enhancing patient access to care.

We look forward to showcasing our

very latest capabilities at the upcoming

Joint Federal Pharmacy Seminar

(JFPS) in Washington, DC, October

30 - November 2, 2016.”

Patients use the kiosks to checkin

for scheduled appointments and

unscheduled visits. They can verify

their demographic and insurance

information, respond to satisfaction

surveys, complete forms electronically,

and more.

Staff members use the system to

monitor patient wait times, prioritize

based on individual patient

needs, and manage patient flow in

the facility.

Vecna has deployed and supported

its patient self-service solution

in over 1,000 VA, DoD, and commercial

medical facilities around

the world, including Walter Reed


National Military Medical Center.

Vecna’s solution has processed nearly

30 million health care self-service

interactions to date.

About Vecna

Vecna provides innovative healthcare

IT, including patient selfservice,

robotic telepresence and

logistics solutions, to streamline

operations, improve access, reduce

costs, and increase patient satisfaction.

Vecna delivers better technology

to realize a better world for all.

Learn more at



Monthly Digital Edition

Airport/Seaport Newsletter

Daily Insider Newsletter

GSN Media Kit


Even the Government’s own advisory committee

wants to end family detention

By Lindsay M. Harris

Calls to end the detention of immigrant

children and their mothers

seeking protection in the United

States are not new. What is new is

that the Department of Homeland

Security (DHS) Advisory Committee

on Family Residential Centers, created

by DHS itself, has now added its

voice to the chorus calling for an end

to family detention.

On June 24, 2015, DHS Secretary

Jeh Johnson announced the establishment

of the DHS Committee,

known as the ACFRC (“the Committee”),

which was created to advise

Secretary Johnson and ICE Director

Sarah Saldaña on the family

detention centers. The Committee,

comprised of subject matter experts

with a wide range of expertise, conducted

visits to all three family detention

centers currently operating

in Pennsylvania (Berks County) and

Texas (Dilley and Karnes City) and

spent countless hours analyzing the

practice of family detention prior to

reaching the conclusions outlined in

its lengthy September 30, 2016 draft


DHS tasked the Committee in

March 2016 with developing recommendations

for best practices at family

detention centers, including in the

areas of: education, language, intake

and out-processing procedures, medical

care, and access to legal counsel.

In response to these tasks, the

Committee requested

information and documents

from ICE, some

of which ICE deemed

“beyond the Committee’s

scope.” Nonetheless,

the Committee issued

a thorough and well-researched

draft report last week, demonstrating

their comprehensive understanding

of the problematic elements of family


Today, by a unanimous vote, the

Committee voted to approve the

report with some additional operational

improvements and procedural

protections for detainees. The report

will be officially submitted to DHS

on October 14, at which time it will

be made publicly available.

First and foremost, the Committee

recommends that DHS adopt a presumption

that “detention is generally

neither appropriate nor necessary

for families” and “never in the best

interest of children.” The Committee

proceeded to issue a series of detailed

recommendations, drawing on the

public documents filed in the ongo-


ing Flores litigation, which seeks to

hold the Government accountable to

the commitments it made under the

1997 Flores Settlement that outlines

the required treatment for children

in detention and set a

maximum period of

3-5 days during which

children may be held.

The Committee’s

Report speaks authoritatively


ICE’s misguided use of civil detention,

recognizing that management

of family detention centers is currently

“improperly, premised upon

criminal justice models rather than

civil justice requirements or needs.”

Emphasizing that detention cannot

be used to deter migration, to punish,

or to hold people indefinitely, the

Committee highlighted the plight of

the mothers and children detained

in Berks County, PA, some of whom

have now been detained more than a

year. Indeed, this week 17 Senators

wrote to DHS Secretary Johnson,

calling the decision to hold asylumseeking

children and their mothers

at Berks in prolonged detention “unconscionable.”

In making their recommendations,

the Committee relied on various re-

More on page 49

How the Vice Presidential candidates responded to

immigration issues at the debate

By Eric Gibble

During the recent vice presidential

debate, candidates

U.S. Senator Tim Kaine and

Indiana Governor Mike

Pence engaged in a heated

exchange on immigration.

Kaine reiterated his running

mate Hillary Clinton’s stated

policy positions, while

Pence attempted to soften Donald

Trump’s many radical anti-immigrant


Debate moderator Elaine Quijano

turned to immigration by noting that

Trump has made repeated remarks

that immigrants are dangerous – although

the facts show that immigrants

are less likely to be criminals

and immigration is associated with

lower crime rates and safer communities.

She asked Pence, “what would

you tell the millions of undocumented

immigrants who have not committed

violent crimes?”

Pence, like Trump, favors an enforcement-first

approach to immigration

reform. He stated that their

first order of business would be to begin

deportations to “make our country

safer, then, we will deal with those

that remain.” Later, Pence elaborated

that immigration reform “begins

Photos Courtesy of Gage Skidmore and iprimages

with border security” and that they

would go beyond building a massive

border wall, which experts have noted

would be economically devastating,

and secure the border “beneath

the ground and in the air.”

However, this enforcement-first

policy has already been the law of the

land for decades. Since the last major

overhaul of the U.S. immigration

system in 1986, the federal government

has spent an estimated $186.8

billion on immigration enforcement.

Meanwhile border apprehensions,

the most commonly used metric to

look at the flow of undocumented

immigrants crossing the border, are

at 40 year lows. Under the Obama

administration alone, more than 2.5

million immigrants have already

been deported.

Additionally, Pence said that millions

of Americans “believe that we


can end illegal immigration

once and for all.” Yet the reality

is most of the American

public remains committed

to practical immigration solutions.

72 percent of Americans

say undocumented

immigrants currently living

in the United States should

be allowed to stay.

When Kaine addressed

immigration measures, he focused

instead on the importance of keeping

families together and a path to citizenship:

“I want a bipartisan reform that

will keep families together; second,

that will help focus enforcement efforts

on those were violent; third,

that will do more border control; and

fourth, write a path to citizenship for

those who play by the rules and take

criminal background checks.”

As the topic turned to refugees,

Kaine underscored that a Clinton

administration “will do immigration

enforcement and vet refugees

based on whether they are dangerous

or not, not discriminating based on

which country you are from.” He did

not elaborate on whether any changes

would be made to how refugees

are currently vetted, given the United

States already has robust systems in

place to ensure the safety and security

of our nation.

Pence, however, did not disavow

the discriminatory ban on Muslim

immigration proposed by Trump.

His campaign has called “for a total

and complete shutdown of Muslims

entering the United States until our

country’s representatives can figure

out what is going on.”

The debate showed a clear distinction

between the two campaigns,

one that endeavors to balance the

dignity of immigrants and their

families alongside the need to secure

our country. The other seeks to

continue and expand upon today’s

failed enforcement-only policies that

leave many communities living in the

shadows of society.



Monthly Digital Edition

Airport/Seaport Newsletter

Daily Insider Newsletter

GSN Media Kit


Class action lawsuit challenging failure of

CBP to respond to Freedom of Information

requests is dismissed following settlement

Washington, D.C. - This week,

in accordance with a settlement

reached by the parties, a federal district

court dismissed a class action

lawsuit which challenged U.S. Customs

and Border Protection’s (CBP)

nationwide practice of failing to

timely respond to requests for case

information under the Freedom of

Information Act (FOIA). The suit

was filed in 2015 by five immigration

attorneys and 13 noncitizens,

all of whom had filed FOIA requests

that had been pending between 7

and 24 months—significantly longer

than the 20-business day period

set by law for an agency to respond

to a FOIA request. At the time of filing,

CBP had a staggering backlog

of over 30,000 FOIA requests that

had been pending for more than 20

business days, many for months or

years. During the course of the lawsuit,

CBP implemented new procedures

for handling FOIA requests

and devoted additional staff. Conse-


quently, at the time of the settlement,

CBP’s backlog had been reduced to

approximately 3,000 FOIA requests,

most of which were complex, and

CBP generally was responding to

new requests within 20 days.

In the settlement, CBP committed

to continuing its efforts to

timely process FOIA requests. Additionally,

the agency committed

to increased transparency about its

performance; CBP will now post

monthly FOIA statistics to its website,

including the total number of

FOIA requests pending, how long

they have been pending, how many

new requests are received each

month, and how many are processed.

The Law Office of Stacy Tolchin,

the National Immigration Project of

the National Lawyers Guild, Northwest

Immigrant Rights Project, and

the American Immigration Council

represented the plaintiffs.

GSN’s 2016 Homeland Security Awards Program

Now Accepting Entries at:

The 2016 Government Security News Awards Program, featuring

many new categories in Cybersecurity, Physical Security, Government

Agency Innovations and Mobile Technologies will open for entries on

August 24 and will close for entries on November 15.

In good news for Winners and Finalists, GSN will be reinstating its

annual Homeland Security Awards Dinner in Washington, DC in

the first week of December, in a venue to be announced. Longtime

participants in the GSN awards programs will recall that previous

GSN Awards Dinners have featured top government, military leaders

and respected television commentators such as 4-Star General

Barry McCaffrey (Ret); Fran Townsend, Homeland Security Advisor to

George W. Bush, James Kallstrom, Assistant Director of the FBI and

Admiral Thad Allen (Ret), Commandant of the U.S. Coast Guard

who came out of retirement twice to serve his county, first in

Hurricane Katrina and later in the BP Oil Spill.

The cost of an entry for vendors is $300 per entry, but there is no

charge for government agencies or departments. All Winners

and Finalists receive Awards Emblems, and all Winners receive a

handsome, gold-trimmed plaque describing their winning entries.

All Winners and Finalists will also be invited to participate in the 2016

Digital Yearbook of Awards Winners.

To see photo gallery of previous Awards Dinners:

For information on the Awards Dinner or Sponsorships,

Contact Adrian Courtenay, Managing Partner, at, (Mobile) 917-696-5782

International Threat/Cyber Intelligence

Chuck Brooks on Cybersecurity: The weakest link

who talks about where we stand in what many pe

by Larry Karisny

If you’re in the cybersecurity business,

you know the name Chuck


He is an advisor to the Bill and

Melinda Gates Foundation Technology

Partner Network, chairman of

CompTIA’s New and Emerging Tech

Committee, subject matter expert to

the Homeland Defense and Security

Information Analysis Center, “passcode

influencer” for The Christian

Science Monitor, on the Board of

Advisors for CyberTech, and on the

Board of Directors at Bravatek and

the Cyber Resilience Institute.

Brooks also has authored numerous

articles focusing on cybersecurity,

homeland security and technology

innovation for such publications

as Forbes, Huffington Post, InformationWeek,

MIT Sloan Blog, Computerworld,

Federal Times, NextGov,

Government Security News, Cygnus

Security Media, Homeland Security

Today, The Hill and Government Executive.

I recently got a chance to get

Brooks’ take on where we are today

in what many people call the “wild,

wild west” of cybersecurity. Here are

his thoughts.

Q. You wear many hats and certainly

have been focused on cybersecurity

for some time now. So tell me, who is

Chuck Brooks and what is he trying

to accomplish this space?

A. You are right, over my career in

government, corporate and academia,

I have worn many hats. There

have been some strong common

threads [of] science, technology, national

security, and legislative and executive

policy in all my various roles.


Chuck Brooks, Cybersecurity Expert

Thankfully, I selected a professional

vocation of government relations

and marketing that encompasses all

those threads.

My passion for cybersecurity issues

was first established over a decade

ago during the time I spent at

the Department of Homeland Security’s

Science and Technology Directorate.

Back then, the threats to

our critical infrastructure were not

as pronounced as they are today. Of

course we were just beginning to

experience the smartphone era. The

will always be the human element, says Chuck,

ople call the “wild, wild west” of cybersecurity

field of cybersecurity has evolved

exponentially along with the technologies,

networks and connectivity

that make up the cyber ecosystem.

And the ecosystem is quite diverse

and expansive, comprising software,

hardware, monitoring, forensics,

governance and more. All these elements

make it an exciting area to

explore since there is always more to

learn from strategy and technology

perspectives. Also, it certainly blends

my common career threads.

For anyone’s career focus, studying

cybersecurity makes [sense] since

it touches everything work- or personal-related.

In both the public and

private sectors — just about every

CIO survey — cybersecurity is the

top concern. And of course, along

with data analytics, cybersecurity is

a annually a budget priority of federal

spending. DHS Secretary Jeh

Johnson recently described cybersecurity

and counterterrorism as the

two top priorities for the protecting

the homeland.

What I want to accomplish in this

space is to continue being a subject

matter expert in cybersecurity; I enjoy

writing and speaking about the

varied aspects of the topic and especially

in educating others on how it

can impact their lives. My advisory

and board director roles with organizations

are a reflection of that interest.

When I retire (which is a long

way off), I hope to join academia

again in a part-time role. I spent

two years at Johns Hopkins University

SAIS [School of Advanced International

Studies] teaching graduate

students homeland security and

found it very fulfilling.

Q. You have one of the most active

groups in LinkedIn under the heading

of the Department of Homeland

Security. How has this helped both

yourself and DHS in feeling the pulse

of the cybersecurity industry?

A. I do operate a half dozen groups

that focus on homeland security and

information security on LinkedIn,

including a few of the largest groups:

“U.S. Department of Homeland Security,

DHS” “Information Technology

(Homeland & National Security)”

and “Homeland Security.”

In all, these groups include about

60,000 people. Among the members

are a host of well-known cybersecurity

professionals who often post and

comment on issues of the day. Also,


as any news on data breaches or cyberincidents

occur, they are often

posted in the LinkedIn groups.

Moderating these groups certainly

keeps me updated and in tune with

the pulse of policy. It has also served

as a great networking venue to share

ideas and information with some

of the best security minds around

in both the private and federal sectors.

Many senior-level executives in

the federal government are on social

sites such as LinkedIn, GovLoop,

Facebook and Twitter. There are an

estimated 1.5 million federal government

employees who regularly

use LinkedIn, including over 65,000

from DHS. Because of the growing

need for public/private-sector collaboration

and interface, being actively

involved in social media makes

a lot of sense.

Q. What is Sutherland Government

Relations and what do you do for the


A. Sutherland Global Services is a

global provider of business processing

services, contact centers, IT

service desks and management consulting

serving government and U.S.

leading corporations across multiple

International Threat/Cyber Intelligence

industries, including health care and

insurance, technology, mortgage

and loan services, finance and banking,

retail, and travel. Sutherland has

36,000 employees and annual revenues

of over $1.2 billion, [and] was

listed in 2015 as one of the fastest

growing private companies in America

by Inc.

I work for the recently created

Sutherland Government Solutions

as VP of Government Relations and

Marketing, where we are at several

agencies and are known for integrated

services for citizen service

needs and digital government. Our

cybersecurity operations at Sutherland

Government Services are internal,

but we do have a practice in

customer relations management after

a company or agency has been

breached. Our cybersecurity practice

is led by Glenn Schoonover who has

a deep technical background. He is a

former chief information security officer

for the Army and was responsible

for providing network security to

the Department of the Army headquarters.

He is also a former senior

technology strategist for Worldwide

National Security and Public Safety

at Microsoft.

Q. I see you are active in both the

public and private sectors when it

comes to cybersecurity. What are the

similarities and differences between

these two sectors?

A. The biggest difference is that government

is motivated by mission,

and the private sector (for the most

part) is driven by profit and loss.

The R&D efforts, innovation sector

and skilled technical expertise in

the private sector has been more robust

than in government. Industry is

more agile and able to react to threat


On the federal side, the landscape

has really changed over the past

few years. [The U.S. Department

of Defense], of course, has had the

cybersecurity war-fighting mission

and continues to build upon new

requirements for operations and for

systems. On the civilian side, DHS

takes an increasingly larger role in

cybersecurity. Presidential and congressional

directives have mandated

that DHS play a growing and more

primary role, especially with protecting

critical infrastructure (transportation,

health, energy, finance) that

is mostly owned by the private sector.

DHS has to step up its activities

in assessing situational awareness,

information sharing, and resilience

research and development plans

with stakeholders. This has led to a

trend in public-private partnering

for sharing threat information and

in creating standards and protocols.

In both the public and private sectors,

training of the next-generation

cybersecurity technical and policy

[subject matter experts] is a major



Q. To date, there seems to be a standoff

between Apple and the federal

government when it comes to iPhone

security. What are your thoughts on

this, and can this bring about some

lessons learned for the cybersecurity


A. This is the topic of the day, and it

is a complicated issue relating to government

requesting a corporation to

provide software to allow access to

data. My thoughts may be a bit different

from some of the others in the

industry. While I recognize the importance

of privacy and the dire risk

of an Orwellian surveillance state, I

consider protecting innocent lives

as a mitigating circumstance. What

if that data that the FBI is seeking

on the terrorist’s encrypted phone

uncovers a deeper terrorist network

planning more horrific acts? In my

opinion, this is a mitigating circumstance.

What should be done is to establish

protocols between industry and law

enforcement to cooperate in these

type of instances (with proper warrants

and assurances) so that company

Internet protocol can be isolated

and privacy issues for the company’s

customers can be best addressed. I

am quite sure Congress will be looking

closely at this case to establish

legislation to create a working formula.

The lesson for cybersecurity is

that there is a balance between privacy

and security that has to be constantly

reviewed in accordance with

the threats at hand.

Q. With billions of Inernet of Things

devices on the near horizon

and zetabytes of data projected

by 2020, can we secure

and control our digital

processes, or are we

headed for a digital train


A. According to Gartner, there

will be nearly 26 billion networked

devices on the Internet of Things

(IoT) by 2020. Moreover, it will keep

expanding as the cost of sensors decreases

and processing power and

bandwidth continue to increase. The

fact is that most of these IT networks

will have some sort of an IoT-based

security breach. We could be headed

for a digital train wreck if IoT security

standards are not adopted. We

may have a digital train wreck even

if they are adopted. Standards will

have to be developed industry by

industry. Protecting a network of

medical devices in a hospital will require

different sets of standards than

protecting utilities with SCADA [supervisory

control and data acquisition]

systems that make up the electric

grid. There are a lot of questions,

including who enforces compliance?

And what are the liabilities of an IoT


The real danger is that the Internet

was not built for security at its

inception; it was built for connectivity.

There is some truth to the notion

that your network may someday be

betrayed by your toaster or refrigerator.

One thing is for sure:

the Internet of Things will

pose many challenges to

cybersecurity and data

analytics, much of which

we have yet to contemplate.

Q. You’ve had the opportunity to

review many cyberdefense technologies.

Are we really finding new solutions

that can handle this explosion

of digital processes, or are we still

playing the game of catch-up and

patch-and-pray cybersecurity?

A. New solutions are continually

evolving with threats, but there will

always be a need for better encryption,

biometrics, analytics and automated

network security to protect

networks and endpoints. It is

a perpetual game of cat and mouse

between hackers and protectors, and

there is really no such thing as being


In a sense, we are continually playing

catch-up and reacting to the last

incident with patches. The weakest

link will always be the human element.

However, there are many new

interesting technologies that could

significantly impact cybersecurity in


the near future. There are technologies

and algorithms coming out of

the national labs, government, and

from private-sector R&D and startups

that have the potential to be disruptive.

Q. Any final comments? And are

there any speaking engagements or

events you are participating in that

you would like to announce? Could

you also offer a good source for information

on the subject of cybersecurity

that you would suggest for our


A. Please check my regular posts in

the media and social media, join

my LinkedIn groups and follow me

on Twitter @ChuckDBrooks. I do

have some future blogs with the National

Cybersecurity Institute on my

agenda. Also, in addition to social

media, which I highly recommend,

there are many excellent outlets for

cybersecurity information including

the Homeland Defense and Security

Information Analysis Center. A great

site that aggregated cybersecurity

news daily is The CyberWire.

Larry Karisny is the director of

Project, an advisor, consultant,

speaker and writer supporting

advanced cybersecurity technologies

in both the public and private sectors.

Reprinted with permission of authors.

International Threat/Cyber Intelligence

Arrest of ex-NSA contractor shows federal

cybersecurity still faces a serious inside threat

By Steve Bittenbender

The latest arrest of a government

contractor charged with stealing

documents and illegally downloading

and retaining classified data indicates

that the threat of an inside

attack on data remains real and, in

many cases, exposes an Achilles’

heel for U.S. cybersecurity efforts.

Court documents released earlier

this week show the Federal Bureau

of Investigation arrested Harold

T. Martin III at his Maryland residence

in late August. In searching

his house and car, investigators

found numerous documents – both

in hard-copy and digital formats –

marked as highly classified that contained

sensitive information vital to

national security.

In at least six cases, the documents

date back to 2014.

Martin worked for Booz Allen

Hamilton, which performs work

for several agencies involved with

federal security and defense. Most

recently, he was working within the

Department of Defense, but documents

found date back to at least

2014. At that time, Martin was a

Booz contractor holding cleared position

within the National Security


“The disclosure of the documents

would reveal those sensitive sources,

methods, and capabilities,” said

F.B.I. Special Agent Jeremy Bucalo

in an affidavit filed with Martin’s

criminal complaint.

The NSA monitors and collects

information regarding foreign intelligence

matters. It’s also responsible

for securing federal communications

and computer networks. Booz

Allen Hamilton is the same firm

that employed Edward Snowden,

who released without authorization

classified NSA material three years


Most of the attention placed on

cybersecurity focuses

on efforts to stop

hackers trying to penetrate

systems from

abroad. However, a

survey conducted by

cybersecurity software

provider Imperva

revealed that 1

in 50 employees (or 2

percent of the work-


force) can be considered a threat for

an inside breach.

In addition, 36 percent of companies

surveyed said insider incidents

took place on their systems within

the past year.

“The insider threat is real and

reinforces the fact that the biggest

threat to enterprise security is the

people already on the payroll,” said

Terry Ray, a chief strategist for Imperva.

“The unfortunate reality is

that insiders can do far more damage

than external attackers because

they have legitimate access and vast


Amichai Shulman, Imperva’s chief

technology officer, said current cybersecurity

solutions target malware

and other tools used by hackers.

Those solutions do

not work properly and

because of that expose

government and other

vital systems to substantial


Solutions must be

focused on protecting

the target of the

attack, the data, Shul-

More on page 49

Intelligent Automation Inc discusses cyber attacks

and tools of analysis and mitigation

Cyber security is a critical issue as

networks are consistently attacked

and compromised. Due to the evergrowing

dependency on computer

systems and networks for

business transactions, systems

face growing cyber threats

from both inside and outside.

IAI has in-depth knowledge,

advanced technology and extensive

hands-on experience

in providing cyber-attack

analysis and mitigation strategies

and solutions. IAI is focused on

cyber defense through prevention,

attack detection and mitigation, and

reliability and trustworthiness.

Examples of IAI’s cyber attack

analysis and

mitigation solutions include:

Self-shielding Dynamic Network

Architecture (SDNA) changes the

nature of the network by introducing

cryptographically strong

dynamics. SDNA provides an

IPv6-based integrated security architecture

allowing multiple types

of dynamics to be constructively

combined. Various network-level

dynamics like addressing, naming,

routing, availability, etc. are incorporated

into SDNA’s design. SDNA’s

dynamics operate before, during,

and after an attack and place the

burden on the attacker, creating an

environment where the network is

secured by default. This approach

significantly reduces the reliance on

detection to defend against attacks.

NIRVANA is cyber situational

awareness tool that leverages efficient

graphical models and inference/analysis

algorithms to assist

system administrators in enterprise

network security analysis and dynamic

situation awareness. We decouple

the abstract knowledge from

the particular network information

like topology settings, roll out the

instance network attack graph as

needed, use efficient matching algorithms

for situation awareness,


and apply inference algorithms under

uncertainty to facilitate what-if

analysis and action planning. IAI’s

graphical models capture the inherence

dependency relationships

of applications on

networks/systems, and of

missions on applications. Our

method enables independent

graphic model development at

different levels while ensuring


NetBEAM is an integrated

tool for enterprise network monitoring

and cyber behavior anomaly

detection based upon the unique

features and characteristics of typical

cyber threats.

JANASSURE is an automated

network mapping tool to detect the

existence of IPv6 transition mechanisms

and evaluate the potential risk

caused by IPv6 transition mechanisms

in networks.

Smart AppShield is a virtualization-based

approach to application

protection which employs an outof-the-box

approach to monitor the

information flow among applications

and enforce the security polic-

More on page 50

Convy on Net-Centric Security

The future of identity management –

on the tips of your fingers

By John Convy, Convy Associates, Washington, DC

Identity management remains an ongoing

challenge for the security industry.

Any number of technologies promise

quick, easy access for authorized

individuals, including card keys, biometric

scans, facial recognition, and

voice recognition. However, issues

with accuracy, false positives, and

false negatives continue to frustrate

security people.

One of the world’s oldest identity

management methods, ironically,

may still be the best. This uses something

each of us carries with us everywhere,

and is almost perfectly unique

to every individual – our fingerprints.

Forensic Science in Literature

Sir Arthur Conan Doyle popularized

fingerprint use as a forensic tool in a

Sherlock Holmes story published in

1890. The first documented application

of fingerprint technology came

from an Argentine police official

around 1892.

Soon after that, fingerprints became

the backbone of many police

operations. Analog images can be

printed and shared easily. Scans can

be turned into digital codes that serve

as unique identifiers that can operate

as both a user ID and password. This

application of biometrics – the use

of physical characteristics for digital

authentication – has been one of the

key goals for the security industry for

many years.

Older fingerprint scanner technologies

had their limitations. They

could not record sufficient information

from a finger to be reliable or

generate a sufficiently sophisticated

numerical code that was fully secure.

Dirty sensors or wet fingertips caused

readability issues. Slow analytics took

too long to validate identity, and some

systems could be fooled by something

as simple as an analog copy of a fingerprint

printed on a clear piece of


According to Gary Jones, Director

of Biometric Access and Time Solutions

at MorphoTrak LLC, those legacy

scanners are just as obsolete as the

paper fingerprints in old police ledgers.

Today’s fingerprint sensors are

fast, accurate, and reliable.

“We call this frictionless access,”

Jones told me. “The difference is that

we now know how to capture fingerprints

in 3D. Once you have the whole

fingerprint, including the curvature,

you can capture more information.


And that extra information means incredible

accuracy. We can now come

very close to the rolled capture from

ink-and-paper, even with a partial

scan. And we can process that information

very rapidly.”

Always Available, Rarely Lost

Another key element in the evolution

of fingerprint scanning has been the

development of sensors that automatically

account for distorted scans, wet

fingers, or dirty surfaces. These newer

technologies operate under challenging

conditions that confused older

systems, and occasionally rendered

them inoperable.

Speed is another major improvement,

according to MorphoTrak’s

Gary Jones.

“Wave your hand – left or right –

it does not matter. We now see what

we need to see as your fingers move

through the scanning area. It’s like

placing your finger on an older sensor

10, 12, or 15 times – except you

only have to wave once, and you don’t

have to place your finger down on a


The result is an advanced identity

management solution that can move

large numbers of people through

doorways, gateways, turnstiles, and

other access points with impressively

little delay. It works when hands

are wet, dirty, or even

damaged. This method

delivers enhanced security

without cards,

key fobs, smartphone

two-factor authentication

apps, or other

devices that need to

be managed and can

easily be lost. It takes

a catastrophic event for someone to

misplace a finger.

Multiple Security Layers

Modern fingerprint sensors can provide

two-factor authentication out of

the same device scanning for fingerprints.

The unit can recognize unique

finger vein patterns at the same time.

In the infinitesimally unlikely event

that two individuals have the same

fingerprint, or that the sensor has

somehow been fooled with a spoofed

print, the vein pattern provides an additional

layer of security that is tough

to fake.

Adding a PIN requirement enables

three-factor authentication – all from

a single sensor and keypad. “MorphoTrak’s

FingerVP product won a

Best-In-Show at ISC West for this innovation,”

Jones pointed out.

The final piece of the puzzle comes

from faster, smarter processing, both

on the sensor and in the back end

systems that handle the significantly

greater amounts of data that each

scan can capture. It has never been

easier to process the volume of data

The final piece of the puzzle comes from

faster, smarter processing, both on the

sensor and in the back end systems that

handle the significantly greater amounts

of data that each scan can capture.

necessary for proper identity management

using something as simple

and unique as a fingerprint. National

Institute of Standards and Technology

(NIST) testing has confirmed the

superior performance of MorphoTrak’s


“People, especially younger individuals,

quite literally expect the world at

their fingertips through their smartphones,”

Jones added. “And they’re

already used to securing their phones

with their fingerprints. We can now

deliver that same ease of use at the

levels of security demanded by the

toughest of governmental and business


Standards Compliance

MorphoTrak’s technology operates

equally well as a mobile solution as

it does at fixed locations, according

to Jones. It complies with essential

government standards to ensure

high levels of effectiveness and performance.

These include FIPS 201


Personal Identity Verification (PIV)

approval for Federal contractors and

employees, Transportation Worker

Identity Credential

(TWIC) certification

for Homeland Security

contractors, and FBI

Next Generation Identification

(NGI) Image

Quality Specification

(IQS) compliance.

This commitment to

standards also ensures

that MorphoTrak’s fingerprint solutions

integrate smoothly with other

biometric systems. The company

recognizes that no single technology

provides perfect identity management.

It is essential for organizations

to be able to operate multiple layers

of authentication as transparently as


Sometimes, what is old becomes

new again.

John Convy and Convy Associates provide

strategic alliance, A&E consultant,

technology ecosystem, and lead

generation programs to monetize relationships

and accelerate demand for

leading security industry manufacturers.

John is the Founder and Managing

Director of the Open Standards

Security Alliance and the IP Security

Academy, and a speaker at many global

industry events. Email:

Oil/Gas/Electric Grid Security

The nation’s power grid is struck by cyber or physical attacks

once every four days, according to Federal energy records

By Bill Gertz

The threat of a devastating cyber

attack on the U.S. electrical grid is

increasing due to the Obama administration’s

politically correct

policies that spend vast sums on

green and smart grid technologies

while failing to secure power grids

from cyber attack.

A report by the Manhattan Institute,

a New York think tank, warns

that the push to integrate wind and

solar electrical power into the $6

trillion electric utility system has

created new vulnerabilities that

other nations could exploit in a future

cyber war.

“Electric grids have always been

vulnerable to natural hazards and

malicious physical attacks,” writes

Mark Mills, a physicist and engineer

who authored the Manhattan

Institute report. “Now the U.S. faces

a new risk—cyber attacks—that

could threaten public safety and

greatly disrupt daily life.”

The U.S. electrical power network

is not made up of a single

grid, but a complex web of eight


regional “supergrids” linked to

thousands of local grids. Under a

drive for improved efficiency, government

policymakers and regulators

in recent years have spent tens

of billions of dollars on so-called

“smart grid” technology. But

the efficiency drive has not been

matched with new technology that

will secure grids against cyber attacks.

Utility owners also have resisted

improving cyber security over

concerns doing so would increase

operating costs and force unpopular

rate hikes. Yet the failure to

take steps now to deal with future

threats could prove catastrophic.

The threat, according to the report,

is not the current state of security

but the future use of greener

and smarter electric grids, interconnected

and linked to the Internet.

“These greener, smarter grids

will involve a vast expansion of

the Internet of Things that greatly

increases the cyber attack surface

available to malicious hackers and

hostile nation-state entities,” the

report warns, adding that cyber attacks

overall have risen 60 percent

annually over the past six years

and increasingly include the targeting

of electric utilities.

A recent survey by Cisco Systems

revealed that 70 percent of electric

utility security managers suffered

at least one security breach.

Unfortunately, Obama’s liberal

agenda forced government policymakers

and regulators to promote

green and smart grid technologies

while spending relatively trivial

amounts to secure those grids

from cyber attacks.

“Greater grid cyber security in

the future means that policymakers

must rethink the deployment

of green and smart grids until

there are assurances that security

technologies have caught up,” the

report recommends.

Part of the problem for grid security

is that power networks are

controlled by the private sector

utilities. Government can and

must provide intelligence and

warning of cyber threats. But grid

security is the responsibility of industry

and there is an urgent need

for the private sector to do more to

defend the country from a future

devastating blackout.

Further, the government and

electric companies appear to be

playing down the danger, claiming

cyber attacks are less likely than

squirrels eating electrical cables,

or tree limbs shorting out wires.

This attitude was reflected in

a controversial Department of

Homeland Security Report produced

in January that concluded

the threat of a damaging or disruptive

cyber attack on the electric infrastructure

was low. The study was

an embarrassing reminder that the

federal government is ill-prepared

for future dangers. A month before

the DHS report, Russian hackers

took down portions of Ukraine’s

power grid in what has been called

the first known cyber attack on an

electricity infrastructure.

The problem of grid security

has been made worse by the past

seven years of administration policies

that subordinated building up

security against cyber attacks to

integrating environmental technologies.

The liberal worldview

mistakenly has placed climate

change as a greater national security

threat than future cyber attacks

from nation states.

According to the Manhattan report,

wind and solar power will be

unable to meet the country’s 24/7


energy demands for the foreseeable

future. Yet programs to develop

these energy sources received

over 75 percent of all new generating

capacity, with some $150 billion

invested by the federal government

on green and smart grid

programs. By contrast, the Energy

Department spent $150 million on

cyber security research and development.

Blackouts have occurred in the

past, mainly after hurricanes. One

non-natural disaster was the August

2003 blackout that affected

New York City and the Northeast.

That power outage put 50 million

people in the dark for two days,

and caused $6 billion in damage.

The cause was a combination of a

software glitch and human error

that resulted in a localized power

outage in Ohio cascading into a

widespread regional power disruption.

According to the Manhattan Institute

study, Lloyd’s estimates that

the damage from a worst-case cyber

attack that causes a widespread

blackout would cost between $250

billion and $1 trillion.

The coming danger will involve

sophisticated nation state cyber attacks.

U.S. Cyber Command chief

More on page 50

Oil/Gas/Electric Grid Security

Quanergy acquires OTUS People Tracker Software

from Raytheon BBN Technologies to strengthen its

position as complete LiDAR solution provider


WIRE)—Quanergy Systems, Inc.,

the leading provider of solid state

LiDAR sensors and smart sensing

solutions, today announced the acquisition

of OTUS People Tracker

software from Raytheon BBN Technologies.

The software complements

Quanergy’s existing software portfolio

and, when used with Quanergy’s

LiDAR sensors, creates an

integrated hardware and software

solution for advanced people detection

and tracking applications

within the security and autonomous

driving markets.

OTUS uses sophisticated human

perception algorithms to identify

and track people for safety and security

in crowded environments at

ranges exceeding 100 meters when

used with Quanergy LiDAR sensors.

The system features segmentation

techniques identifying humans,

background extraction, object clustering,

sophisticated merge and split

algorithms, persistent

tracking algorithms, and other advanced

features supporting robust

crowd control. Support for multiple

zones of interest is included, allowing

users fine control over active

monitoring. With the acquisition,

Quanergy is offering the most intelligent

and complete solution to

track people in 3D and in real-time

over large spaces. The combined solution

has advantages over camera

systems including the

ability to work in any

weather or lighting

conditions with fewer

false alarms, along

with the reduction of

equipment and labor


“The acquisition

of Raytheon BBN’s


OTUS People Tracker software is a

significant milestone in Quanergy’s

strategy and long term road map

for LiDAR integration into larger

transportation and automation

platforms,” said Dr. Louay Eldada,

Quanergy CEO. “Raytheon BBN is a

recognized leader in the space, with

the most advanced solution, and

Quanergy is now further positioned

to expand its footprint and accelerate

its ability to deliver new levels of

product performance.”

The software is the foundation for

Q-Guard, Quanergy’s 3D perimeter

fencing and intrusion detection system.

The company recently demonstrated

Q-Guard and the capability

for tracking human subjects at the

tradeshow, ASIS 2016, which was

held September 12-15 at the Orange

County Convention Center in Orlando,

Florida. The demo will show

how Quanergy LiDAR sensors and

software incorporating the OTUS

People Tracker capability can track

people persistently, send commands

to PTZ cameras and enable the cameras

to focus on subjects.

About Quanergy Systems, Inc.

Quanergy Systems, Inc. was founded

in 2012 and builds on decades of

experience of its team in the areas

of optics, photonics, optoelectronics,

artificial intelligence software,

and control systems. Headquartered

in Sunnyvale, California, in

the heart of Silicon Valley, Quanergy

offers the leading solid state

LiDAR sensors and software for

real-time capture and processing of

high-definition 3D mapping data

and object detection, tracking, and

classification. Application areas include

transportation, security, mapping

and industrial automation.

Quanergy’s LiDARs lead in six key

commercialization areas (price, performance,

reliability, size, weight,

power efficiency) while meeting the

mass deployment requirements of

durability and dependability using

solid state technology. For more information

about Quanergy, visit us

at and follow us

on Twitter @Quanergy.

Sign-up for Free

GSN Digital Editions

and Email Newsletters

Free subscription to your selection of GSN digital editions

and daily/weekly email newsletters. Add new selections or

opt-out of any selections at any time.

GSN Airport, Seaport, Rail, Border Security Weekly

GSN Daily Insider Newsletter (5 Days Weekly)

GSN Monthly Digital Edition

GSN Media Kit


The News Leader in Physical, IT and Homeland Security


Oil/Gas/Electric Grid Security

InfragardNCR launches national critical infrastructure

security and resilience month awareness campaign

WASHINGTON, DC – October 12

– InfraGard of the National Capital

Region (InfraGardNCR), a partnership

between the FBI and the private

sector to protect critical infrastructure,

today launched a comprehensive

effort to recognize and support

National Critical Infrastructure Security

& Resilience Month (NCIS-

RM). The initiative supports the U.S.

Department of Homeland Security’s

National Protection & Programs

Directorate, Office of Infrastructure

Protection mission to raise awareness

around critical infrastructure

protection during the month of November.

InfraGardNCR unveiled

the NCISRM website and its numerous

social media interaction points

and announced an owner/operator

driven event to focus on CI supply

chain partners.

“Well after the events of September

11 we are still working to understand

and mitigate the complex

challenges posed by our converged

cyber and physical environments.

NCISRM is an opportunity for

both the owners and operators of

our critical infrastructure, and our

government counterparts engaged

in all 16 critical infrastructures

to highlight and

reinforce their work, understand

in-depth the pressing

threats and vulnerabilities,

and work on ways to mitigate

their effects,” said Kristina

Tanasichuk, president of InfraGardNCR

and CEO of the

Government Technology &

Services Coalition.

The Office of Infrastructure

Protection, within the U.S.

Department of Homeland

Security’s National Protec-


tion and Programs Directorate, is

partnering with InfraGardNCR to

promote Critical Infrastructure Security

and Resilience Month. InfraGardNCR


been working

since January

2016 with numerous



national nonprofit


that are

aligned with the

16 critical infrastructure


to work together

in November to

raise awareness

and take tangible

steps to improve

the security posture around our

critical infrastructure.

In addition to campaigns to raise

awareness, InfraGardNCR will

bring key stakeholders together to

explore physical and cyber vulnerabilities

to the U.S. electric grid.

The discussions will focus on the

threats to the grid and include briefings

from both the FBI and the Of-

fice of the Director of National Intelligence,

in addition to a targeted

campaign for owners and operators

to invite their vendors and others

who “should” know more about CI

in order to make their supply chain

stronger and educate those who

may not focus on critical infrastructure

security on a daily basis will be

a key part of the

awareness effort.

“Critical infrastructure



to be concerned

about the physical

security as

well as the cybersecurity

of their

small business

suppliers. Those

small businesses

in the supply

chain need to be

concerned about

their security

primarily for the common good,

but also to differentiate themselves

to their critical infrastructure customers.

The BBB is engaging with

NCISRM to raise awareness of sector

interdependencies and to provide

training for small businesses

across North America based on the

NIST Cybersecurity Framework,”

added Bill Fanelli, CISSP, Chief

Security Officer, Council of Better

Business Bureaus Inc.

Owners and operators of critical

infrastructure, non-profit organizations

that represent critical

infrastructure sectors, colleges and

universities, and private companies

are all invited to partner during November

to raise awareness and educate

their constituents. More information

on partnership is available


The NCISRM website, which will

provide tools, resources, and tips

throughout November, is available


More information on the in-person

event, Attacking the Grid: Left

and Right of Boom, will take place

in Tysons Corner, Virginia and

focus on uncovering interdependencies

due to an extended power

outage. This year’s NCISRM event

will provide attendees with three

things: 1) the most recent, accurate

threat assessments from the

FBI and ODNI; 2) an in-depth look


at the December 2015 cyberattack

on the electric grid in Ukraine and

an analysis of the implications of a

similar attack in the United States;

and 3) scenario-based facilitated

breakout sessions with stakeholders

across critical infrastructure sectors

to discuss best practices and tangible

tools for preventing, detecting,

responding, and recovering from a

large power outage.

More information on all of these

activities can be found at: www.

About InfraGardNCR

InfraGardNCR is a partnership between

the FBI and the private sector

to share information to protect the

nation’s critical infrastructure. InfraGardNCR

serves as a critical link

that connects owners and operators

with the entities that strive to protect

their assets. More information

is available at www.InfraGardNCR.


GTT releases most advanced TSP

solution to date

Continued from page 5

reliable traffic solutions to communities

for over 40 years. GTT proactively

delivers advanced transportation

solutions to help emergency, transit

and traffic personnel increase safety,

minimize traffic congestion and reduce

greenhouse gas emissions, while

maximizing resource efficiency and

performance. Headquartered in St.

Paul, Minnesota, GTT is the market

leader in traffic management systems,

with its system installed in intersections

in 41 of the 50 largest U.S. cities.

To find out more about GTT, visit their

website (



Monthly Digital Edition

Airport/Seaport Newsletter

Daily Insider Newsletter

GSN Media Kit


HID Global Helps Streamline

Bhutan’s Driver License Issuance

and Management System

Continued from page 10

benefit from the change to the

printing process. In the months

since the new IDs were issued, law

enforcement officers have observed

a decline in incidents involving

fake IDs. The new security features

on the IDs prove to be an effective

deterrence against counterfeiting.

Those counterfeit driver’s licenses

circulating in the market can easily

be distinguished from the genuine

ones. The inability to create a counterfeit

of the new IDs has resulted

in a drop in the production of inauthentic


“We are very pleased with the deployment

of the HDP5000 printers

and are are currently exploring how

we can expand our use of technology.

Smart chip encoding, which

can be supported by the printers

with an upgrade, would enable us to

augment the cards and make them

multifunctional, and is a feature we

are interested in implementing in

the near future,” said Nidup.

© 2016 HID Global Corporation/ASSA ABLOY

AB. All rights reserved. HID, HID Global,

the HID Blue Brick logo, and Chain Design

and FARGO are trademarks or registered

trademarks of HID Global or its licensor(s)/

supplier(s) in the US and other countries and

may not be used without permission. All other

trademarks, service marks, and product or service

names are trademarks or registered trademarks

of their respective owners.


What was in the World Trade

Center chemical plume created at

Ground Zero on “9/11”?

Continued from page 14

“we did the very best we could at the

time” and she was sorry that people

had died as a result of her “mistake”

– a claim which was disputed and rejected

by numerous firefighters, who

made it clear that they knew the air

was polluted with toxins, but they did

the clean-up work and searches for

survivors because that was their job.

Other firefighters described the EPA

decision to be absurd in light of the

fact that seven days after the attacks

virtually all the buildings in downtown

Manhattan were coated with

dust, debris, lead, asbestos and other

toxic substances. Still others argued

that Ms Whitman’s decision jeopardized

the health of every school child

and every educator who went back to

teach the children, along with every

person who lived in the area who returned

home to breathe in toxic dust.

According to a post-fifteenth anniversary

article by the Associated

Press, “More than 1,000 people who

registered with the World Trade Center

Health Program, set up to oversee

those affected by the aftermath

of the attacks, have died in the past

15 years. According to a summary

of five research articles on the health

impacts on rescuers and others who

worked the site, both the number

of people sickened and the type of

illnesses present were greater than

anticipated. According to Jake Lemonda,

union head of the Uniformed

Fire Officer’s Association, there are

currently 1,396 afflicted with cancer;

5,456 with a lower respiratory illness

and there are many more firefighters

who responded on 9/11 who are very



1. Amy Goodman, “Ex-EPA Head Christine

Todd Whitman Denies Misleading Public over

Environmental Dangers After ‘9/11’ ”, Independent

Global News, June 26, 2007;

2. Thomas K. Aldrich, M.D., Jackson Gustave,

M.P.H., Charles B. Hall, Ph.D., “Lung Function

in Rescue Workers at the World Trade Center after

7 Years”, New England Journal of Medicine,

2010; 362:1263-1272, April 8, 2010

3. David Biello, “What Was in the World

Trade Center Plume? Ten years later, what exactly

residents and rescue workers were exposed

to remains at least a partial mystery”, Scientific

American, September 7, 2011;

4. Rachel Zeig-Owens, Anna Nolan, Barbara

Putman, Ankura Singh, David J. Prezant, Michael

D. Weiden. “Biomarkers of patient intrinsic

risk for upper and lower airway injury after exposure

at the World Trade Center”, American Journal

of Industrial Medicine, 2016, 59:9, 788-794.

5. Jennifer Yip, Mayris P. Webber, Rachel

Zeig-Owens, Madeline Vossbrinck, Ankura

Singh, Kerry Kelly, David J. Prezant, “FDNY and

9/11: Clinical services and health outcomes in

World Trade Center-exposed firefighters and EMS

workers from 2001 to 2016”, American Journal of

Industrial Medicine, 2016 59:9, 695-708

6. Caralee Caplan-Shaw, Angeliki Kazeros,

Deepak Pradhan, Kenneth Berger, Roberta

Goldring, Sibo Zhao, Mengling Liu, Yongzhao

Shao; “Improvement in severe lower respiratory

symptoms and small airway function in World

Trade Center dust exposed community members”,

American Journal of Industrial Medicine, 2016

Canon U.S.A. and National Crime

Prevention Council collaborate

Continued from page 15

About Canon U.S.A., Inc.

Canon U.S.A., Inc., is a leading provider

of consumer, business-to-business,

and industrial digital imaging

solutions to the United States and to

Latin America and the Caribbean

(excluding Mexico) markets. With

approximately $31 billion in global

revenue, its parent company, Canon

Inc. (NYSE: CAJ), ranks third overall

in U.S. patents granted in 2015†

and is one of Fortune Magazine’s

World’s Most Admired Companies

in 2016. Canon U.S.A. is committed

to the highest level of customer satisfaction

and loyalty, providing 100

percent U.S.-based consumer service

and support for all of the products

it distributes. Canon U.S.A.

59:9, 777-787.

7. James E. Cone, Sukhminder Osahan, Christine

C. Ekenga, Sara A. Miller-Archie; “Asthma

among Staten Island fresh kills landfill and barge

workers following the September 11, 2001 World

Trade Center terrorist attacks”, American Journal

of Industrial Medicine, 2016, 59:9, 795-804

8. “Lung function indices”, www.spirxpert.


9. “James L. Zadroga 9/11 Health and Compensation

Act”, “9/11 Health”,



10. “Medical management of chemical casualties

handbook”, 3rd ed. USAMRICD, Aberdeen

Proving Ground, MD. July 2000.

11. Kales S, Christiani D., “Acute chemical injuries”,

New England Journal of Medicine 2004;



is dedicated to its Kyosei philosophy

of social and environmental

responsibility. In 2014, the Canon

Americas Headquarters secured

LEED® Gold certification, a recognition

for the design, construction,

operations and maintenance of

high-performance green buildings.

To keep apprised of the latest news

from Canon U.S.A., sign up for the

Company’s RSS news feed by visiting and

follow us on Twitter @CanonUSA.

For media inquiries, please contact

About National Crime

Prevention Council

The National Crime Prevention

Council is the nonprofit leader in

crime prevention. For more than 35

years, our symbol of safety, McGruff

the Crime Dog®, has delivered easyto-use

crime prevention tips that

protect what matters most—you,

your family, and your community.

Since 1982, NCPC has continuously

provided the American public with

comprehensive educational materials,

training programs, and effective

crime prevention messaging, delivered

in large part through its vast

network of more than 10,000 state

and local law enforcement agencies,

crime prevention associations,

community groups, foundations,

and corporate partners.

For more information on how NCPC

can be a public safety expert for

you or how to “Take A Bite Out of

Crime®,” visit

International sports competition

in Brazil

Continued from page 19

rity applications include real-time

credential validation; integration

with multiple handheld peripherals;

tracking of all access activity; and

instantly provisioning and managing

secure access to each identity

per their access profile.

SAFE Sports and Events Access

Manager offers an ideal solution for

temporary or limited engagement

events where security is a high priority.

About Quantum Secure, Inc.

Quantum Secure’s SAFE software

suite provides a single, fully interoperable

and integrated physical security

policy platform to manage and

streamline security identities, compliance,

and operations across multiple

sites and systems. Quantum

Secure’s customers include both

commercial and government organizations.

Quantum Secure is part

of HID Global, an ASSA ABLOY

Group brand.

For more information, visit www.

The 2015 ISIS Attacks on Paris:

Assessment and Lessons Learned

Continued from page 23

Counter Terrorism Action Capabilities

or an equivalent course should

be offered to all first responders.

• Enhance efforts regarding Tactical

Emergency Medical Service to include

Special Weapons and Tactics

(SWAT) teams cross-training with

Fire Department personnel.


1. Geert Vanden Wijngaert, AP, “Lessons

Learned from the Paris and Brussels Terrorist

Attacks”, March 23, 2016,

2. “An ISIS Militant from Belgium Whose

Own Family Wants Him Dead,” New York

Times, November 17, 2015.

3. “France under first state of emergency since

1961”, The Guardian, November 15, 2016.

4. “The Lessons of Mumbai”, The RAND Corporation,

January 9, 2009.

5. Paul Tassi, “How ISIS Terrorists May

Have Used PlayStation 4 to Discuss And Plan

Attacks”, Forbes, November 14, 2015; www.

6. “Five Facts about the Muslim Population

in Europe”, Pew Research Center, November 17,


7. “Forgotten in the Banlieus”, The Economist,

February 23, 2013.

8. “France: Efforts to Counter Islamist Terrorism

and the Islamic State”, Congressional Research

Service, November 18, 2015

9. “Islamic, Yet Integrated,” The Economist,

September 6, 2014.

10. “Paris Attacks”, New York Times, November

18, 2015.

11. “Behind Francois Hollande’s Snap Decision”,

Wall Street Journal, November 15, 2015.

12. David, Edward F. III, Alejandro A. Alves

and David Alan Sklansky, “Social Media and Police

Leadership: Lessons from Boston”, New Perspectives

in Policing Bulletin, Washington, DC,

U.S. Department of Justice, National Institute of

Justice, 2014

Handheld Narcotics Analyzer

Continued from page 24

designed to reduce sample backlogs

and ensure valuable resources are

put to use on high-profile cases and

analysis of unconfirmed samples;


• Free library updates that add

newly discovered substances to the

analyzer’s “fingerprint” library. For

more information on the Thermo

Scientific TruNarc handheld narcotics

analyzer, please visit

About Thermo Fisher Scientific

Thermo Fisher Scientific Inc. is the

world leader in serving science,

with revenues of $17 billion and

more than 50,000 employees in 50

countries. Our mission is to enable

our customers to make the world

healthier, cleaner and safer. We help

our customers accelerate life sciences

research, solve complex analytical

challenges, improve patient

diagnostics and increase laboratory

productivity. Through our premier


Thermo Scientific, Applied Biosystems,

Invitrogen, Fisher Scientific

and Unity Lab Services – we offer

an unmatched combination of innovative

technologies, purchasing

convenience and comprehensive


For more information, please visit


Cambridge Pixel enhances radar

tracking software

Continued from page 26

and Tellumat.

Cambridge Pixel will be showcasing

its new SPx radar tracking software

on stand G27 in Hall 2b (UK

Pavilion) at Euronaval in Paris from

17-21 October 2016.

For more information about

Cambridge Pixel’s radar tracker and

range of software modules, please

visit or

call: +44 (0) 1763 852749 or email:

About Cambridge Pixel

Founded in 2007, Cambridge Pixel

is an award-winning developer of

sensor processing and display solutions

including primary and secondary

radar interfacing, processing

and display components for military

and commercial radar applications.

It is a world-leading supplier of

software-based radar tracking and

scan conversion solutions through

its modular SPx software, and HPx

hardware product range. Based near

Cambridge in the UK, the company

operates worldwide through a network

of agents and distributors. In

2015, Cambridge Pixel received a

Queen’s Award for Enterprise in International

Trade for ‘outstanding

overseas sales growth over the last

three years.

Government’s advisory committee

want to end family detention

Continued from page 28

cent reports on family detention, including:

• The S. Commission on International

Religious Freedom’s Report

on the extremely troubling practice

of expedited removal that funnels

children and families into detention

• The American Immigration Lawyers’

Association Report on Central

Americans Seeking Asylum

and Legal Protection in the U.S.

• The American Immigration

Council report on family separation

in family detention and on

families deported back to danger

in Central America.

• Human Rights First reports including

Lifeline on Lockdown and

Family Detention: Still Happening,

Still Damaging.

The Committee’s report will be worth

reading in full and makes concrete,

specific, practical recommendations

throughout to comprehensively address

the myriad of problems posed

by detaining families, but the bottom

line is clear – the U.S. government

should end family detention.

Lindsay Harris is Assistant Professor

of Law at the University of the District

of Columbia, David A. Clarke School

of Law.

Arrest of ex-NSA contractor shows

federal cybersecurity still faces a

serious inside threat

Continued from page 36

man said.

“The main line of defense must be

around your data,” he said. “These

are the only assets you can control.

It may not be a physical location—

it could be in the cloud. There are

endless possibilities for the ways a

hacker or bad actor can get in, so

you can’t try to control it all. The

right approach to managing the insider

threat problem starts with protecting

against inappropriate access

to all of your data repositories–databases,

file servers and cloud applications.”

Martin faces up to 10 years in

federal prison for theft of government

property and a year for the

unauthorized retention of classified

materials. He appeared in federal

court in Maryland on Aug. 29 and

remains in custody, according to the

Department of Justice.


Intelligent Automation Inc

discusses Cyber Attacks

Continued from page 37

es to regulate the secure information

flow. Smart AppShield shields

the application from the cyber

attacks and prevents information

leakage, thus providing a trusted

computing base.

Trusted Computing Framework

for Embedded System

(TCES) is a hardware and software

solution that provides broad capabilities

for ensuring the security

of highly distributed embedded

systems, with high-level security

assurance rooted in the hardware,

and high flexibility provided by

the software implementation.

SecureVisor is a platform for

efficiently protecting weapon systems

against cyber threats. Secure-

Visor has three major components

including a whitelisting tool to

identify allowed safe programs,

a security enhanced hypervisor,

and a Trusted Platform Module

(TPM) to provide the root of trust.

SecureVisor is a combined hardware-software

security solution

that provides a high level of security,

and also minimizes impact on

platforms in terms of power, processing

cycles and operation performance.

The nation’s power grid is struck

by cyber or physical attacks once

every four days

Continued from page 41

Adm. Mike Rogers announced in

March that it is a matter of “when,

not if ” a foreign power will attack

critical U.S. infrastructures.

Peter Pry, a former CIA officer

and grid security advocate, says

the report correctly identified the

contradiction between Obama administration’s

green agenda and

the need to protect the nation’s energy


“The ‘war on coal’ and other hydrocarbon

sources of energy, and

the Obama administration’s environmental

obstacles to development

of nuclear power, is making

the nation less safe,” said Pry, executive

director of the Task Force on

National and Homeland Security.

Coal-fired electric plants and

potentially nuclear power provide

the country with the most resilient

source of electric power. But

the administration’s push to phase

them out and replace them with

wind and solar energy generation

is not only technologically unrealistic.

It will reduce national electrical

supplies at a time when demand

is increasing sharply.

The result will be both increase

costs for electric power and increase

risks to national survival in


the aftermath a major cyber attack.

“The increased risks to the national

electric grid and national

security by Obama’s green agenda,

driven by the alleged threat from

climate change, is even more true

for greater threats to the grid posed

by natural and manmade electromagnetic

pulse (EMP),” Pry said.

“These threats and cyber are here

and now, while climate change—if

this scientifically dubious threat

occurs at all—is in the future.”

Mills, the Manhattan Institute

researcher, told the Washington

Free Beacon that cyber security

“is the existential challenge of the

Internet, but so far mainly about

private info and financial data.”

“Meanwhile, the so-called smarter

grid and green power both require

a vast increase of Internet

connectivity bolted onto our electrical

grids,” he said. “What in the

world makes green pundits think

that rapidly expanding and exposing

our critical grid infrastructure

to the Internet is a good idea to

rush into?”

Editor’s Note: Bill Gertz article reproduced

with permission of Washington

Free Beacon:

The News Leader in Physical, IT and Homeland Security

CEO/Editorial Director

Adrian Courtenay



Steve Bittenbender


Senior Writer

Karen Ferrick-Roman



Shawn Campbell

Campbell on Crypto


George Lane

Hazmat Science & Public Policy

Contributing Author

Lloyd McCoy Jr

Immix Group

Contributing Author

Walter Ewing

Contributing Author

Wendy Feliz

Contributing Author

Joshua Breisblatt

Contributing Author

J. Michael Barrett

Contributing Author

Christopher Millar

Gatekeeper Security

Art Director

Gerry O’Hara, OHDesign3


Production Manager

Brenden Hitt

Direct: 203-216-7798



Tech Focus

Perimeter Protection/

Intrusion Detection

Market Sector Focus

Mass Notification/

Disaster Response


Late News

Tech Focus

2016 Technology Roundup

Special Awards Review:

2016 Digital Yearbook of

Awards Winners


More magazines by this user
Similar magazines