gsn october/november 2014 digital edition

18
GOVERNMENT Security News October/November 2014 Digital Edition j Los Angeles Sheriff’s Department and Geofeedia write the playbook on using Social Media and location based technology in law enforcement. Page 11

Upload: ssir

Post on 06-Apr-2016

226 views

Category:

Documents


0 download

DESCRIPTION

Government Security News

TRANSCRIPT

Page 1: GSN October/November 2014 Digital Edition

G O V E R N M E N T Security NewsOctober/November 2014 Digital Edition j

Los Angeles Sheriff’s Department and Geofeedia write the playbook on using Social Media and location based technology in law enforcement.

Page 11

Page 2: GSN October/November 2014 Digital Edition

2 Government Security News October/November 2014 Digitlal Edition Digitlal Edition October/November 2014 Government Security News 3

X-ray systems manufacturerAstrophysics awarded $6 millionU.S. Navy Contract Page 4

Hey, Governors Christie andCuomo! Good job with the Airports. But what about theSeaports? asks Denise KreppIn “Ebola by Sea” Page 6

Don Waddell of (ISC)2/UniversityOf Phoenix initiative wants toclose the supply demand gapin filling cybersecurity jobs Page 8

æ

T A B L E O F C O N T E N T S N E W S A N D F E A T U R E S

F-35C Completes FirstArrested Landing aboardAircraft Carrier Page 23

Romanowich on Video SurveillanceNew physical standards in theWorks for electrical substations Page 24

Port of Charleston, SC Case StudyPuretech Systems IntegratesFence Detection and Video Analyticsat Port with $50 billion annual cargo Page 26

Law Enforcement Communications

OCTOBER/NOVEMBER 2014 SPECIAL REPORTS

L.A. Sheriff’s Department (LASD) and Geofeedia write the playbook on using Social Media and location based technology Page 11

BriefCam Syndex offers rapid view video synopsis At Israel Exhibition Page 16

Kastle Systems/Metro DC Police launch City-wide network of video camerasand floor plans Page 18

Mutualink Unveils Mobile Go Kit for Interoperable PublicSafety Community at IACP Page 20

Cybersecurity Workforce Competencies:Preparing Tomorrow’s Risk-Ready Professionals

8 18 2823Big update in law enforcement tool-kit

“ Our successful joint operation with the FDA proves again the relevance of social media in intelligence-led policing. Our eComm unit delivers great value by providing real-time, actionable intelligence to our field officers. Geofeedia’s location-based social media monitoring solution is a powerful tool to help us deliver that value.”

Commander Mike Parker, Los Angeles Sheriffs Office

Page 11

Port of Charleston, SC integrates fencedetection and video analytics

PureActiv® provides intelligent video analytics, 3D geospatial command and control, autonomous PTZ tracking and open architecture for ease ofintegration with the MicroPoint™ Cable system which pinpoints fence cut or climb attempt to within 3m, while ignoring environmental disturbances such as wind, rain or vehicle traffic.

Page 26

Page 3: GSN October/November 2014 Digital Edition

4 Government Security News October/November 2014 Digitlal Edition Digitlal Edition October/November 2014 Government Security News 5

THE NEW ENTRY for ACCESS CONTROL POINTS

a

AMERISTARBOOTHS.COM | 855.526.6847

GUARANTEED DELIVERY DATES

FULLY GALVANIZED FRAMEWORK

SINGLE SOURCE FOR PHYSICAL SECURITY

Astrophysics Inc. awarded $6 Million United States Navy ContractRapidly growing X-ray systems manufacturer Astrophysic Inc of City of Industry, CA, has won a $6 million dollar contract from the U.S. Navy to protect entry control points deployed at seaports around the world. The company’s X-ray solutions will be used to screen visitors and personnel before they embark and to accelerate offloading processes.

Astrophysics was selected from a large field of competitors to fulfill the Navy’s XRBS program’s five-year

contract to supply and deploy ruggedized X-ray inspection systems. According to company sources, Astrophysics’ competitive advantages in the bidding included not only that the company buys primarily from U.S. vendors, but also that it has its own fabrication facility, enabling it to pass manufacturing savings along to customers.

“Astrophyics is known around the world for market-leading solutions,” said Francois Zayek, Founder and CEO of the company and a former VP of Research, Development and Engineering at Perkins Elmer, who is known globally for his engineering innovations. “We have a long history of helping protect men and women that protect our great nation and we are pleased to announce this contract.”

The Navy selected Astrophysics’ XIS-7858 system which features a standard 180kV generator for heightened penetration and enhanced object recognition. The XIS-7858 is the ideal screening solution for any location in need of increased screening dimensions within a consolidated space. The Indefinite Delivery, Indefinite Quantity (IDIQ) contract was issued by the Navy XRBS program which is managed by the Crane Division out of Indiana. Ω

ABOUT ASTROPHYSICS INC.Astrophysics offers X-Ray security screening systems that help operators detect and identify weapons and explosives in civil and military markets worldwide. The company exports to over 60 countries and builds all its own products domestically in Southern California. The corporate hearquarters located in City of Industry, CA is the manufacturing facility for air cargo, conventional and mobile solutions. A second facility in Ontario, CA is the primary location for research and development, and the high energy cargo and portal systems. Astrophysics markets range from Air Cargo, Aviation and Transport to Corporate and Hotels, Customs and Border Protection, Government, Law Enforcement and the Military. The company employs over 140 employees in the U.S. and has affiliate company’ globally. For more information about Astrophysics, visit www.astrophysicsinc.com.

æ

UPFRONT

Page 4: GSN October/November 2014 Digital Edition

6 Government Security News October/November 2014 Digitlal Edition Digitlal Edition October/November 2014 Government Security News 7

PHYSICAL SECURITYwith COMPLETE PERIMETER CONTROL

ANTI-CLIMB FENCE RETRACTABLE WEDGES ANTI-RAM FENCE SECURITY BOLLARDS

Call our perimeter security specialist at 866-467-2773 and visit us online at ameristarsecurity.com

Ebola by Sea

BY DENISE RUCKER KREPP

Over the past several days, governors in New York, New Jersey, Illinois, and Connecticut issued quarantine guidance for individuals who’ve been in contact with African Ebola patients. The state guidance focuses on individuals who’ve returned to the U.S. via airplanes. At some point a mariner is going to arrive, sick with the dangerous disease. Unfortunately, the federal government has yet to address this possibility and state governors won’t be willing to wait for the bureaucratic federal machine to churn out vague policy guidance. They’re going to issue state guidance and this guidance could significantly impact U.S. port operations nationwide.

The U.S. Coast Guard is the federal agency responsible for port operations and the Coast Guard Captain of the Port manages port operations on a day-by-day basis. This individual can prevent a foreign flag ship from entering a U.S. port. He or she can also require foreign flag vessels who have ported Sierra Leone, Guinea, and Liberia, Ebola stricken nations, to undergo additional scrutiny before they are allowed in U.S. waters.

The agency released a marine safety information bulletin last week that everyone in the maritime industry should read. The bulletin recommends that “local industry stakeholders work with the Coast Guard Captain of the Port to review and be familiar with their Marine Transportation System Recovery Plan.” These plans were mandated after the 9/11 attacks and the agency issued guidance earlier this summer on how to draft them.

As someone who doesn’t believe in re-inventing the wheel, I strongly support using existing guidance

to address current crises. The problem in this situation is that the recovery plans don’t address Ebola-like catastrophes. These plans focus on terrorist attacks and natural hazards similar to Hurricanes Katrina and Sandy. They don’t address a ship manned with mariners decimated by Ebola.

The Coast Guard appears to recognize the short-comings of the current recovery plan by recommending in the October 22nd bulletin that the local stakeholders “consider conducting a table top exercise to plan and address items such as an evaluation of how to handle a vessel arrival with a suspected Ebola case... what steps need to be considered if a medical evacuation is needed, and possibly how a ship would be decontaminated in order to commence cargo transfers.” Good idea.

A seaport is a finely-tuned machine. According to the Bureau of Transportation Statistics, in 2011, 7,662 oceangoing vessels made 67, 929 calls at U.S. ports. Time is money for vessels owners – they want to enter a port, discharge their cargo, taken on new cargo, and depart as fast as they can. They are not going to want to wait for the Coast Guard Captain of the Port and local stakeholders to decide how to address a vessel with a suspected Ebola case.

A simple answer would be to ban all ships that have stopped in Sierra Leone, Guinea, or Liberia in their last five previous ports of calls. Sadly, that won’t work because the U.S. government is sending U.S. ships to these countries to provide food aid and medical support. People in Ebola areas need to eat and U.S. grown crops are helping them to survive. It would immoral to stop shipping food to those in need.

If the U.S. can’t ban all ships that have ported in Ebola-stricken countries, then the U.S. Coast Guard must develop a more comprehensive plan to address the possibility of Ebola victims arriving in the U.S. by sea. The agency can’t merely recommend that local stakeholders conduct table top exercises. These exercises should be mandatory and the Coast Guard must be ready to provide substantive guidance.

Keeping in mind that several governors have already issued isolation guidance for air travelers, the Coast Guard must work the governors now to address the maritime sector. How are sick mariners evacuated? At sea via helicopter or a smaller vessel? At the port by ambulance? How is the vessel decontaminated? How and when are the necessary personnel going to be trained to carry

out the evacuation and decontamination procedures? What happens to the other in-coming vessels during the decontamination process? If the Coast Guard can’t answer these questions, the state governors will because they won’t their ports contaminated with the Ebola virus. Ports bring in revenue and the revue can’t drop.

The Coast Guard prides itself on being Semper Paratus. Now, more than ever, it must live up to its motto. The nation’s ports can’t be shut down because of Ebola and they won’t be if the Coast Guard develops more comprehensive guidance before the first ship arrives. Pre-planning with local stakeholders, including governors, will ensure that the country’s supply chain continues to operate. Call your local Captain of the Port and ask him or her to schedule the table top exercise. Ω

æ

UPFRONT

Page 5: GSN October/November 2014 Digital Edition

8 Government Security News October/November 2014 Digitlal Edition Digitlal Edition October/November 2014 Government Security News 9

æ

UPFRONT

urgency, in short, is that there is a serious gap between supply and demand in the realm of cybersecurity professionals.

Cyber security accounts for approximately 10% of all IT occupations, and cybersecurity-related positions are growing faster than all IT jobs. Cybersecurity job openings

take 24% longer to fill than all IT openings, and 36% longer to fill than all vacancies, regardless of industry. U.S. employers pay qualified candidates a premium for cybersecurity jobs – an average of $93,028 annually, or over $15,000 more than other IT jobs overall. In 2013, U.S, employers posted 50,000 new jobs requiring Certified Information Systems Security Professionals (CIISP) credentials, but there were only 60,000 total existing CIISP holders.

“It’s an education-to-workforce gap,” said Waddell, and it’s hindering the efforts to fill cybersecurity jobs.” According to recent findings by Cisco, he pointed out, there are a million jobs that are not being filled. “The supply has gone up slightly, but the demand has gone through the roof.”

“The CISSP is the gold standard of information security professionals,” he said, “but it’s not just ‘tech’ that they need. “We’re trying to teach students the importance

The core mission of the (ISC)2 Foundation, in the

simplest of terms, is to support cybersecurity

education and awareness. With a global

membership of over 100,000 certified information

security professionals, (ISC)2 exists “to ensure that

children everywhere have a

positive, productive and safe

experience online; to spur

the development of the next

generation of cybersecurity

professionals; and to illuminate

major issues facing the issue

now and in the future.” At the 2014 ASIS Conference,

which hosted over 20,000 visitors, 1,600 of the attendees were there to attend the co-located (ISC)2 conference, according to Dan Waddell, Director of US Government Affairs of (ISC)2, who spoke with GSN a few days after the ASIS Conference about the rationale behind the huge delegation. The obvious opening question was, What’s the urgency?

Waddell had a strong answer to this question, one that arose from his own knowledge of cybersecurity and was further informed in great detail by an in-depth report commissioned by the University of Phoenix and (ISC)2 that was named, “Cybersecurity Workface Competencies: Preparing Tomorrow’s Risk-Ready Professionals.” The

of the cyber battlefield and the tools they need to defend it – not just the software and hardware, but also knowledge and experience. An effective cybersecurity professional should have a good balance of education and experience on his or her resume. A credential serves as a validation mechanism. Giving students a head start on the education piece is where (ICS)2 can help through its Global Academic Program, which gets colleges and universities working with our common body of knowledge to help introduce cybersecurity topics in their curricula. We need kids to major in cybersecurity.

The reason we have the gap, according to Waddell, is that “cybersecurity is still a relatively new industry – compared to other disciplines such as law or medicine. Until very recently, we haven’t had a real definition of a career path in cyber, and sometimes we don’t even know what job titles to assign. We have to understand requirements first, then align skills and competencies through a common framework, so that we’re all on the same page. DHS and NIST have developed such a framework under a program called the National Initiative for Cybersecurity Education (NICE). So that’s a great start. (ISC)2 is supplying credentials that align with the NICE framework.”

As co-hosts of the “Cyber Workforce Competencies” report co-hosted by the University of Phoenix, and the (ISC)2 Foundation, the host organizations relied on findings from an industry roundtable with cybersecurity professionals and talent leaders, with the objective of investigating competencies and career priorities of

cybersecurity professionals, and to identify actionable recommendations for key stakeholders to better prepare students to enter careers in cybersecurity.

The focus was on identifying what educational institutions, employers, industry associations and students can do to bridge three education-to-work gaps: a competency gap, a professional experience gap; and an education speed-to-market gap. The roundtable partners included representatives from institutions of higher education that educate cybersecurity professionals; organizations that employ cybersecurity professionals; industry associations that support and provide certifications to cybersecurity professionals; and the Department of Labor, which develops research and tools

for workforce prosperity and achievement. The roundtable also incorporated the perspective of a cybersecurity student/career-starter on higher education practices and career entry.

The findings of these groups and other thought leaders with relevant experience in competency modeling, higher education, cybersecurity services and cybersecurity credentialing resulted in the recommendations coming out of the report, which were designed to be useful to the larger community of industry leaders, employers, educators and current or future cybersecurity professionals. Ω

Editor’s Note:This is the first of several articles that GSN intends to publish based on the information released in the University of Phoenix/(ISC)2 Foundation’s Cybersecurity Workforce initiative and report.

Dan Waddell discusses urgency of (ISC)2 Foundation/University of Phoenix initiative to close the supply and demand gap in filling cybersecurity jobs

Cybersecurity Workforce Competencies:Preparing Tomorrow’s Risk-Ready Professionals

Source: Verizon, based on reports from 50 companies. Source: Kaseya.

63 % of U.S. Federal CIOs (ChiefInformation Officers) and CISOs

(Chief Information Security Officers) say

improving cybersecurityis a top priority

Sources: Homeland Security News Wire, “Improving Cybersecurity Top Priority: Federal CIOs, CISOs,” June 12, 2014, http://www.homelandsecuritynewswire.com/dr20140612-improving-cybersecurity-top-priority-federal-cios-cisos. Andy Sullivan, “Obama Budget Makes Cybersecurity a Growing U.S. Priority,” Reuters, April 10, 2013, http://www.reuters.com/article/2013/04/11/us-usa-fiscal-cybersecurity-idUSBRE93913S20130411. Tom Risen, “Study: Hackers Cost More Than $445 Billion Annually,” U.S. News & World Report, June 9, 2014, http://www.usnews.com/news/articles/2014/06/09/study-hackers-cost-more-than-445-billion-annually.

Proposed annual

U.S. Department of Defensespending on cyber activities

Annual costof computer- and network-based

crimes worldwide

4

CEO/president/ general manager/ owner/principal/ partner Chief security ocer Vice President Director Manager Supervisor of security personnel

4.55%11.18% 5.18%

8.07%

28.57%

42.44%

Figure 1. Most major cybersecurity breaches have oneof seven causes.

Note. Total who responded to the question = 483 (100%)

CEO/president/ general manager/ owner/principal/ partner Chief security ocer Vice President Director Manager Supervisor of security personnel

4.55%11.18% 5.18%

8.07%

28.57%

42.44%

Figure 2. Ninety-four percent of cybersecurity breachesin 2013 fell into these nine categories.

Note. Total who responded to the question = 483 (100%)

63% $4.7Billion

$445Billion

CIOCISO

Naive end usersand disgruntled

employeesUsers not

keeping up with new tactics

No perimeterto protect

Under- estimating

cyber- criminals

Mobiledevices asideal entry

points

Lack of a layered defense

Loss of mobile devices

Distributeddenial-of-

serviceattacks

Physicaltheft/loss

Miscellaneouserrors

Crimeware

Insidermisuse

Paymentcard

skimmers

Point-of-sale-intrusions

Cyber-espionage

Web appattacks

6%Other

Most Commoncategories ofcybersecurity

breaches

Top 7 causes of cybersecurity

breaches

Page 6: GSN October/November 2014 Digital Edition

10 Government Security News October/November 2014 Digitlal Edition Digitlal Edition October/November 2014 Government Security News 11

• Get the New RadEye SPRD brochure: thermoscientific.com/sprdTalk to an Expert: 1-800-274-4212

© 2

014

Ther

mo

Fish

er S

cien

tific

Inc.

All

right

s re

serv

ed. A

ll tr

adem

arks

ar

e th

e pr

oper

ty o

f The

rmo

Fish

er S

cien

tific

and

its s

ubsi

diar

ies.

The detection and analysis of hidden radioactive nuclides requires radiation identification instruments

with high sensitivity and accuracy. The expense, weight and complexity of this equipment prevents

many safety and security teams from having the right tools to manage a dangerous radiation scenario.

The new Thermo Scientific™ RadEye™ SPRD Spectroscopic Personal Radiation Detector makes

radiation identification accessible and affordable. The palm-sized, RadEye SPRD is a high-performance,

radiation monitor designed to expose, locate and identify radioactive nuclides such as orphaned or

hidden sources. Like the trusted Thermo Scientific™ RadEye™ PRD Personal Radiation Detector, the

RadEye SPRD is intuitive, rugged and operates 170 hours on standard AAA batteries. This combination

makes it the perfect solution in unpredictable and challenging scenarios. With a low cost of ownership

the RadEye SPRD is an affordable way to put radiation identification in the hands of the entire team.

Radiation Identification

is within grasp

Detect, Locate and Identify radioactive threats with the new RadEye SPRD.

technology developed by Geofeedia of Chicago, IL. Geofeedia’s unique approach organizes social media by location, as opposed to the long-standing industry approach of organizing social media solely by keyword or hashtag without regard to location. The result: a new set of data focused on the places where events happen. The key to the new approach is that emergency services, including law enforcement, place a Geofeedia virtual perimeter around a designated geographical area – which can be as big as a city or as small as a single address – and then monitor social media openly shared by the public within that perimeter.

BY ADRIAN COURTENAY

Earlier this year, the Los Angeles County Sheriff’s Department (LASD), under

Commanders Scott Edson and Mike Parker sent out an invitation to 19,000 law enforcement agencies in the U.S. and overseas inviting them to try a new crowd-sourcing platform called LEEDIR, by which eyewitnesses to a crime or emergency, anywhere, could upload and share high-resolution photos and videos with law enforcement agencies for free and in real-time. At GSN, we were so impressed with this initiative that we labeled it “History in the Making” and ran a front page cover story on it in our April 2014 Digital Edition.

Now, half a year later, the L.A. Sheriff’s Department is once again sharing law enforcement history, this time by using innovative crowd sourcing and social media

Law Enforcement Communications

L.A. County Sheriff’s Department and Geofeedia write the playbook on using social media and location-based technology in law enforcement

Page 7: GSN October/November 2014 Digital Edition

12 Government Security News October/November 2014 Digitlal Edition Digitlal Edition October/November 2014 Government Security News 13

“First responders need reliable, accurate information,” Harris indicated, “and that can be obtained within 15 feet of the person posting because of the GPS coordinates produced by Geofeedia. “We have gathered hundreds of millions of social media posts on behalf of our customers across Twitter, Instagram, YouTube, Facebook, Picasa, Flickr and other sources,” he said. “It starts with a map. Then you select the location you want to focus on and adjust the boundaries. Social media posts will then pop

up within those boundaries. In addition, if you find a post you're interested in, you can blow it up and put in on a map. One of the most powerful things about Geofeedia,” he added, is that in addition to location, you can also locate by word or phrase. You can also take data that’s in the public domain and take it to a location. You don’t need to go to the Instagram site. You can see it all on Geofeedia in a single search, which makes it fast and efficient for first responders.

According to L.A. County Sheriff’s Department Deputy Tony Moore, who worked with Commander Parker and used the law enforcement Geofeedia app, illegal pre-planned teen drug parties had become an escalating

the outset of the incident and had observed a woman who had seized a knife from a store display and had slashed a number of other customers. The deputy responded by drawing his weapon and facing down the woman, who still had the knife in her hand with blood dripping off of it. In the last moment before he had to shoot, the woman

dropped the knife and was put into handcuffs by the off duty deputy and other deputies who had just arrived on the scene, with no loss of life.

The question was, how did the reporter know about the ongoing situation before the police knew about it? The answer was clear: Social media, which was obviously being followed regularly by reporters. In Parker’s words, “All of the news media these days are monitoring social media. If they’re not, they’re way behind the times and their competitors. Tools like Geofeedia are extensively used by leading news agencies.”

According to Commander Parker, surveys have indicated that about 8% of the U.S. population uses geotags when sharing opening by social media on their mobile phones, thereby making their global position public information, since their geotags give latitude and longitude and often include tags of photos on social media. He added that the percentage is probably twice that number, or 16%, when teenagers share openly. This

In a discussion with GSN, LASD Commander Mike Parker made it clear that one of the most surprising revelations about the use of a “geo-fence” is that many people at the scene of a crime or an emergency in progress often openly post information onto the Internet, specifically in social media, before they even think of dialing 911 and reporting it to the police. Often, the public share postings, including the “Geo-Tagging”, which indicate the latitude and longitude of the exact location. Prior to the days of social media, he said, the typical scenario was that if members of the public saw something suspicious, they would call the police and the police would send a patrol car to see if the report was accurate and then act on it. In addition to keyword searches, now that law enforcement can access social media activity within a geo-fenced area, he pointed out, the police can get additional focused, geographically relevant and important information, and they get it faster.

Describing an incident that he had experienced a few years earlier, Commander Parker said he received a phone call from a news reporter asking about a shooting that had supposedly taken place, with people being hit by bullets, at a local supermarket. When sheriff’s deputies arrived at the scene, they learned that an off duty deputy sheriff had been in the supermarket at

enables law enforcement agencies to be more effective in dealing with emergency situations ranging from teen suicide, natural disasters to shooting and threats against schools.

A great deal of information shared by social media, Parker pointed out, is “open source information”, meaning that it is shared for the world to see, including law enforcement. There is no reasonable expectation of privacy if it’s shared in a way that “A boy in a basement in Belgium could view the same information” he said. “But a line is drawn where there is password protection because then there usually needs to be an ongoing criminal investigation or potentially a search warrant signed by a judge to get that information.”

In a separate interview with GSN, Phil Harris, CEO and a founder of Geofeedia, agreed with Commander Parker in pointing out that law enforcement wasn’t the first sector to use social media, since the marketing and business worlds had been mining social media and crowd sourcing for many years. But law enforcement is learning fast that everyone with a phone or a camera is an eyewitness that can support first responders by sharing what they see through social media posts, he said, as the capture of the Boston bombers demonstrated.

Law Enforcement Communications • Geofeedia

LASD Commander Michael J. Parker

Phil Harris, CEO and a founder of Geofeedia

Grundy County Sheriff

Geofeedia

It started with school safety

SITUATION:Schools have been vulnerable to acts of violence at an

alarming rate in recent months. More than 7 percent of 9th

through 12th graders reported being threatened or injured

with a weapon on school property at least once in the last

year. An additional 6 percent admitted to bringing a weapon

to school for protection.

Grundy County, Illinois had its own scare when a gun was

found at an Oswego school through Geofeedia’s social

media monitoring software.

SOLUTION:Officers were able to react quickly based on intelligence

provided by the location-based platform through postings

on several social media outlets. Real-time tweets coming

from inside the school were communicated to police officers

on the scene. Geofeedia allowed law enforcement to draw

a perimeter around the area in order to see what was

taking place inside school walls. After officers secured the

perimeter around the school, it was discovered that the gun

was dropped by a contractor in the faculty bathroom. The

students were safe and the weapon was secured thanks to

the services provided by Geofeedia.

“Geofeedia is easy to use and always works. Its technology has solved crimes and provided our squad cars with visibility into what is taking place during some very sensitive situations.”

- Dave Ostrander | GIS Analyst

ADDITIONALLY:Another example of the importance of Geofeedia within

Grundy County was the monitoring of an ice jam on the

Kankakee River. Emergency responders were notified and

had to respond quickly to the situation. With the help of

Geofeedia, officials in Wilmington, Illinois were able to

monitor social media in the area and view photos posted

by citizens in real-time, therefore assisting responders with

additional actionable data.

Geofeedia Case Study: Grundy County Sheriff

CASE STUDY

In the wake of this incident, Grundy County Sheriff has

taken full advantage of Geofeedia to monitor social

media in locations beyond schools in the neighboring

towns. According to GIS Analyst Dave Ostrander, the

easy navigation and reliability of the application has been

fundamental to the success of Geofeedia in Grundy County.

Ostrander knows that it can help solve crimes and provide

situational awareness to potential public safety hazards.

Hate Crime in Cleveland

Geofeedia

Identifying and locating suspects with Geofeedia

INTRODUCTION:The relationship between social media and law enforcement

is growing rapidly, as made evident in the case of a high-

profile hate crime that occurred in Cleveland in August

of 2013. In the aftermath of the crime, law enforcement

professionals in Cleveland used Geofeedia to gain leads

into the search for those who committed the crime,

and ultimately identified and arrested a number of the

individuals responsible.

SITUATION & OUTCOME:Last August at the start of Labor Day weekend, a young man

was walking from the parking lot to a 93rd Street gay bar

located on Cleveland’s west side when a group of 20 men

surrounded him on the sidewalk. The group attacked and

severely beat the man, stole his phone, and ran.

Immediately following the crime, Patrol Sergeant Tanya Sirl

used Geofeedia to draw a perimeter around the scene of the

incident and surrounding areas, searched back to the time of

the crime, and began scouring the social media content.

It was while reviewing these posts that she came across

individuals who had posted to Facebook about going to a

“93rd Street block party” (a common gang reference often

synonymous with being up to no good).

“Geofeedia is something we are all using as a tool

to combat violent crime because it is the best way

to monitor high crime areas. With what people are

posting these days, it doesn’t take much time to find

evidence against criminals. It is simply amazing what

can be done with this platform.”

- Patrol Sergeant Tanya Sirl

ADDITIONALLY:Being the host of the Gay Games soon after this incident,

the city of Cleveland realized the need to utilize Geofeedia

to monitor social media content during the event to prevent

similar crimes or unrest within the Cleveland community. A

perimeter was drawn around the site, adding another layer

of real-time data to event security efforts.

Geofeedia Case Study: Hate Crime in Cleveland

CASE STUDY

Through the social profile of this individual, she was led

to one of Cleveland’s known gang members who was also

talking about the block party. During an interview with

the victim, the gang member was identified as one of the

attackers. Ultimately, Cleveland PD’s gang unit made

the arrest.

Sergeant Sirl is also a seasoned law enforcement instructor

with LEOTTA, an organization that has been using

Geofeedia’s platform in the classroom for some time,

introducing it to students as an important tool in modern

crime fighting:

Social media content from the area surrounding the bar on Cleveland’s west side.

Page 8: GSN October/November 2014 Digital Edition

14 Government Security News October/November 2014 Digitlal Edition Digitlal Edition October/November 2014 Government Security News 15

Law Enforcement Communications • Geofeedia

RESULTS:Nearly 300 FDA agents and Los Angeles County Sheriff’s

deputies executed the 19 search warrants and found cause

to effectively shut down the Nozz distribution network that

had been supplying the teen drug parties. Over 650 nitrous

oxide tanks were recovered with an estimated value of $10

million retail and $20 million when sold as a drug at parties.

Since the operation, illegal use of Nozz in Los Angeles

County has now become virtually non-existent. Removing

the Nozz distribution network also eliminated a significant

revenue source for gangs. To fund other criminal activities,

gangs often taxed Nozz distribution at drug parties. The

operation also reduced an environmental threat. Federal

authorities have estimated that the damage to the ozone

from the illegal use of nitrous oxide in the greater LA area is

more than what a small oil refinery in the center of the city

would cause annually.

In addition, the search warrants also resulted in the arrest

of multiple suspects on weapons charges. Thirteen guns

were seized as evidence, including assault weapons, armor

piercing rounds, and high capacity magazines. Another

suspect was arrested for possession of narcotics with

the intention to sell them (a felony charge). Finally, with

Geofeedia’s location-based social media monitoring and

keyword analysis the eComm unit interdicted more than

1,000 parties and reduced felony assaults by 50%.

Geofeedia Case Study: Los Angeles County Sheriff’s Department

“Our successful joint operation with the FDA proves

again the relevance of social media in intelligence-

led policing. Our eComm unit delivers great value

by providing real-time, actionable intelligence to

our field officers. Geofeedia’s location-based social

media monitoring solution is a powerful tool to help us

deliver that value.”

- Commander Mike Parker

FUTURE PLANS:The Los Angeles County Sheriff’s Department eComm

unit considers Geofeedia a necessary tool to filter the

vast amounts of social media content that is distributed

to investigative and response units. “Mini-eComm units”

will be created in 23 field patrol stations, and they will use

Geofeedia to provide real-time, actionable social media

intelligence to local units. eComm has trained over 1,000

officers from 150 agencies across 5 countries on the use

of web-based communications. This prominent training

organization plans to continue spreading their knowledge

about Geofeedia.

About GeofeediaGeofeedia provides social media search and discovery

by location. Our patented technology searches Twitter,

Facebook, Instagram, YouTube, Flickr, Picasa, and Viddy

data by location to provide users with real-time insights

from anywhere in the world.

Request a free demo at: geofeedia.com/demo

About the Los Angeles CountySheriff’s DepartmentThe Los Angeles Sheriff’s Department is the largest sheriff’s

department in the world with a mission to “lead the fight

to prevent crime and injustice, enforce the law fairly and

defend the rights of all, including the incarcerated.” The

department is divided into eleven divisions and specialized

services including four patrol divisions, Custody Operations

Division, Correctional Services Division, Detective Division,

Court Services Division, Technical Services Division, Office

of Homeland Security, Administrative Services Division, and

Leadership and Training Division. Learn more at: lasdhq.com

geofeedia.com/[email protected] @geofeedia

Geofeedia

CASE STUDYLos Angeles County Sheriff’s Department

problem in Los Angeles County and its population of ten million people across 88 municipalities and 130 unincorporated communities. Pre-planned teen drug parties had become an escalating problem in Los Angeles County, contributing to a measurable increase in felony and sexual assaults, related property damage, vehicular burglary, and gang activity – all events that were primarily organized and advertised via social media networks.

To police the pre-planned parties, the 24-hour LASD Electronic Communications Triage Unit (eComm) which had been founded in 2012, used key word search systems such as Hootsuite and the Geofeedia patented, cloud-based program to search, monitor and analyze real-time openly shared social media posts via social media networks.

“What we like about Geo-searching is a look at a particular location, draw a map and immediately start gathering real-time intelligence” said Deputy Moore, adding, “We’re not shy about recommending this ability to other agencies as this simplifies a lot of things and will help other agencies accomplish their public safety mission.”

The Geofeedia website has archived a number of law enforcement Case Studies which can be accessed by law enforcement officials. These include one study which describes how situational awareness was established by a group in West Virginia, using Geofeedia’s social media monitoring software and drawing a perimeter around locations such as specific colleges or universities, neighborhoods, city blocks or specific buildings.

In another, a Patrol Sergeant used Geofeedia to draw a perimeter around the scene of a brutal attack by 20 men that had taken place outside of a gay bar in a

northeast Ohio town. In reviewing the social media within the perimeter she had drawn, the Sergeant came across individuals who had posted to Facebook about going to a “93rd Street block party”, which was a common gang reference often synonymous with being up to no good. Through this connection, she was taken to one of the town’s known gang members who was also talking about the block party, and shortly thereafter, the gang member was identified as one of the attackers, which led to an arrest by the town’s gang unit.

“Geofeedia can be used by the media or for corporate security, branding or healthcare,” said Phil Harris, “but it’s a game-changer for law enforcement, public safety, emergency response and health crises.” Ω

Page 9: GSN October/November 2014 Digital Edition

16 Government Security News October/November 2014 Digitlal Edition Digitlal Edition October/November 2014 Government Security News 17

To Secure a Perimeter... The right Barriers

The right Gates

The right Sensors

The right Fences

When overseeing the safety of your campus, call in the security heavyweights—because a perimeter without B.I.G. is like a holster without a gun.

And most important of all,the right Guard Station/House

success is all about choosing the Right Products.

We Didn’t Want Standard Shelters, We Wanted B.I.G.“Some folks make cheaper booths, but no one

makes a better booth than B.I.G. They build

superior, high-quality modular booths. The

highest quality in the U.S."

— East Coast Facility Manager

If you don’t protect your staff andsystems, they can’t protect yourstudents and facultyA B.I.G. guardhouse is different fromall others because we have invested over40 years in studying and understandingwhat goes on inside—and outside—of a superior guard station. This expertisecomes to you in the form of a full line of B.I.G. Enterprises guardhouses—thecornerstones of your “hardened”perimeter. With B.I.G. your guardhousedoesn’t have to appear hard andunattractive—it can be your steel fistinside of a velvet glove.

A-87 BIG GSN Oct 2014 Campus Security Digital 9/11/14 3:22 PM Page 1

BriefCam Syndex offers rapid review Video Synopsis video solution at Israel ExhibitionBriefCam®, the developer and provider of Video

Synopsis® solutions for the rapid review, analysis

and indexing of video, has announced a new offering

tailored to the needs of government

investigative agencies and law

enforcement: BriefCam Syndex GV, to be

available in Q1 2015. The announcement

was made at the Israel HLS Exhibition

(iHLS 2014) running from November 10-

12 in Tel-Aviv.“Two years ago, we won the iHLS

Innovation Award 2012. Since that time, our product line has matured, our client base has expanded, and BriefCam has been used and recognized for its role in major criminal and homeland security-related investigations. For all of these reasons, we’re proud to be able to announce BriefCam Syndex GV at Israel HLS 2014,” said Dror Irani, CEO and President of BriefCam. “This offering meets the needs of government agencies and was developed in response to direct feedback from high-profile users already employing

BriefCam successfully in the field. These include the departments of defense, the law enforcement agencies, and the intelligence communities in North America, Europe, China,

the APAC region and, of course, Israel.” BriefCam Syndex is a next-generation product range

based on Video Synopsis technology. (See: YouTube/BriefCamVS). Video Synopsis is the simultaneous presentation of objects, events and activities that occurred at different times. Users can pinpoint events

Law Enforcement Communications • Briefcam

BriefCam Syndex. The Video Synopsis can be refined by parameters such as color, direction, speed, size and area of interest / exclusion. New features include multiple video source capability, access restriction, floating camera licenses, mobile supprt and more

Continued on page 32

Page 10: GSN October/November 2014 Digital Edition

18 Government Security News October/November 2014 Digitlal Edition Digitlal Edition October/November 2014 Government Security News 19

Law Enforcement Communications • Capital Shield Program

In an innovative initiative backed by the city’s major real estate owners, managed security services firm Kastle Systems has launched an interconnected

network of private security cameras, floor plans and other building information in partnership with the DC Metropolitan Police Department (MPD) that will allow first responders direct network access in order to enhance situational awareness in responding to emergencies and serious threats.

According to the press announcement, the launch of “Capital Shield” is a culmination of nearly three years of collaboration between Kastle and the MPD, with the shared goal of making the nation’s capital safer and more secure. It is enthusiastically supported by major DC real estate firms, including Douglas Development, Vornado Realty Trust, ON Hoffman, First Potomac Realty Trust, The Tower Companies and Tishman Speyer. To catalyze the program, Kastle Sytems is donating 1,000 new security cameras to any real estate owner in the city that wants to participate in the program and has already deployed test sites with an additional 300 cameras expected to come online in the first phase.

“Through this public-private partnership, Capital Shield will significantly increase the public safety of our nation’s capital,” said Kastle owner and DC area native Mark Ein. “There are thousands of existing cameras that should be made accessible to our police in times of need, and this program will add thousands more over time. The role of video security has never been more important or more evident in cities across the country. Modern video technology saves lives, catches criminals,

deters crime and accomplishes something we all value – a safer city. Kastle is proud of the role we are playing to help DC.

In further comments, Chief Cathy L. Lanier of the MPD added, “Video is a force multiplier for MPD. It gives us an extra set of eyes by allowing us to provide much needed situational awareness. The Capital Shield program is an important new step in working with private enterprise to enhance public safety throughout the city. I would like to extend a special thanks to our inaugural members and to Kastle for its donation to help the city make this a reality.”

Speaking on behalf of his company and the other participating real estate firms, Patrick Tyrrell, Chief Operating Officer of Vornado/Charles E. Smith stated, “As owners in Washington, DC, our company supports the goal of a safe and secure city. Vornado is delighted to be an inaugural participant and to work with Kastle on the Capital Shield program to make a positive and lasting contribution to DC. The very presence of Capital Shield will make our buildings safer for our tenants, our residents and our surrounding communities.”

ABOUT CAPITAL SHIELDCapital Shield is a public-private partnership that unites the Washington, DC Metropolitan Police Department (MPD) with commercial property owners, businesses and institutions around a common goal of protecting the city. Through this program, participants can help enhance public safety by providing the MPD with direct access to their security cameras. This enables first responders to quickly gain the situational awareness required to most effectively assist and respond to major security events and emergency situations. For more information, visit www.capitalshield.org. Ω

ABOUT KASTLEKastle Systems has been a leader in the security industry for more than 40 years with new technologies and advanced

security solutions. Kastle operates and manages security systems for its clients remotely, around the clock. Currently, Kastle protects over 10,000 locations nationwide and internationally today. Kastle’s outsourced security services significantly reduce costs and improve the critically important 24/7 performance of security systems for building owners, developers and tenants. Kastle Video delivers the latest advancements in monitored video solutions, including high-definition cameras, cloud-enabled network recording and cutting edge video analytics. Headquartered in Falls Church, VA Kastle is the largest security company in DC, according to the Washington Business Journal. Kastle Systems also has offices in Los Angeles, San Francisco, Houston, Dallas, Chicago, New York, Philadelphia and Sydney, Australia. For more information on Kastle Systems, visit www.kastle.com or call 855-527-8531. Ω

Kastle Systems and Metropolitan DC Police launch “Capital Shield” city-wide network of video cameras and floor plans to enhance first responder situational awareness

Page 11: GSN October/November 2014 Digital Edition

20 Government Security News October/November 2014 Digitlal Edition Digitlal Edition October/November 2014 Government Security News 21

Law Enforcement Communications • Mutualink

In an important interoperable communications

technology at the 121st Annual International

Chiefs of Police (IACP) conference, Mutualink, an

interoperable communications technology company,

introduced its Mobile Go Kit for first responders. In

times of crisis, this easy-to-transport case for on-the-

go interoperable communications enables public

safety officials and emergency managers to establish

secure command and control on the move, anywhere.

The kit connects to 4G LTE/3G or hard-wired internet,

bridging radio and telephone and enabling first

responders to send and receive full motion video, files

and text messages from remote locations. The Mobile Go Kit, as shown at the Mutualink booth,

contains an Interoperable Workstation (IWS), which allows public safety agencies to participate on the nationwide Interoperable Response and Preparedness Platform (IRAPP) network to collaborate with federal, state and local agencies, regardless of location.

Key features include:

• Best-in-class security with military-grade encryption• Ease of use and deployment, with plug and play

functionality• Wide-area multi-mode connectivity

“Mutualink developed our interoperability solution to enable first responder agencies to securely share disparate radio, video and telephone communications with each other during emergencies,” said Mark Hatten, Mutualink’s CEO. “Our new Mobile Go Kit puts all of that interoperability into one case that can be set up in a mobile vehicle or transported to a temporary emergency management facility for real-time, ad hoc collaboration.”

In Passaic County, New Jersey, the first Go Kit has already been made part of a counter-terrorism toolkit, ready to assist as the county prepares for any man-made or natural threat to security. The kit provides a fully portable information sharing solution; a flexible way to deploy resources as, when and where needed to attain inter-agency collaboration.

Mutualink Unveils Breakthrough Mobile Go Kit for Interoperable Public Safety Communications at IACP 2014

© 2013 Mutualink, Inc.

IWS

REDEFINING INTEROPERABILITYControllable Intuitive Affordable

1269 South Broad StreetWallingford, CT 06492

Phone: (866) 957-5465Web: www.mutualink.net

E-Mail: [email protected]

Mutualink, Inc.

Standard Fixed Workstation DESKTOP IWS M500-100 Series

The Mutualink IWS provides an incident-based highly intuitive graphical user interface (GUI) that can be effectively used by a dispatcher or incident manager to communicate with other involved dispatch personnel as well as with units in the field. Interconnection of radio channels/talkgroups is facilitated using Mutualink’s drag and drop interface. An IWS can be used either stand-alone, as a mini-console, or in combination with an existing console position. The IWS is simple to use and easy to maintain. In addition, the multi-featured and robust Mutualink software is easy to manage for System Administrators and other key personnel. The IWS is the primary operational user interface for the Mutualink system. It consists of a standard x86 PC platform (desktop, laptop, etc.) running the Mutualink real-time communications application on a Security Enhanced (SE) Linux operating system.

Interoperability Workstation | IWS

About Mutualink, Inc.Mutualink is an IP-based multimedia communication resource sharing platform that allows public safety agencies and critical community assets to communicate in a manner that is separate and apart from the general public.

Mutualink technology is subject to US Patent #7,643,445, #8,364,153, #8,320,874 and other patents pending.

£ Voice: LMR radios, VoIP “push-to-talk”, telephone, cellular, Nextel & intercom£ Video: live feeds from buildings, streets, cruisers, copters£ Text Messaging: more effective than voice for informational content£ File Sharing: blue prints, floor plans, photos, procedures£ PA and Intercom System Interface: Broadcast Emergency Messages£ Dispatch Collaboration: off-the-air conferencing between dispatch centers

Page 12: GSN October/November 2014 Digital Edition

22 Government Security News October/November 2014 Digitlal Edition Digitlal Edition October/November 2014 Government Security News 23

Also at the IACP event, Mutualink demonstrated its resilient peer-to-peer collaboration network for public safety, which provides proven, secure, reliable communications for mission-critical homeland security and law enforcement needs. The platform won the U.S. Department of Defense (DoD) Joint Interoperability Test Command certification for both Information Assurance and Interoperability.

IACP attendees at IACP enjoyed hands-on demonstration of how a panic button can trigger an incident connecting schools (or other facilities) with their local police department in the event of an emergency using Mutualink’s K12 solution. In such an incident, police departments can then invite other community partners like hospitals, fire departments or state and federal agencies participating on the IRAPP as necessary to respond to and mitigate the emergency.

The company’s suite of interoperability capabilities is deployed and in use in the Orlando Police Department, as well as various area hospitals, schools, malls and other Critical Infrastructure and Key Resource (CIKR) entities.

Law Enforcement Communications • Mutualink

ABOUT MUTUALINKMutualink, Inc. has developed an interoperable communications platform that enables community-wide multimedia sharing of radio, voice, text, video, data files and telephone communications in a secure environment. Mutualink’s system is currently deployed by hundreds of public and private entities worldwide, including homeland security and defense installations, NATO Special Operations Forces, police and fire departments, transit authorities, hospitals, shopping malls, casinos, and more. Mutualink is a privately-held company headquartered in Wallingford, Conn., with R&D facilities in Westford, Mass. and Mayagüez, Puerto Rico, and Defense Services office nearby Washington, DC. For more information please visit www.mutualink.net. Ω

© 2013 Mutualink, Inc.

IWS

REDEFINING INTEROPERABILITYControllable Intuitive Affordable

1269 South Broad StreetWallingford, CT 06492

Phone: (866) 957-5465Web: www.mutualink.net

E-Mail: [email protected]

Mutualink, Inc.

Ruggedized Mobile WorkstationIWS M500-150 Series

Ruggedized Interoperability Workstation | IWSThe Mutualink IWS provides an incident-based highly intuitive graphical user interface (GUI) that can be effectively used by a dispatcher or incident manager to communicate with other involved dispatch personnel as well as with units in the field. Interconnection of radio channels/talkgroups is facilitated using Mutualink’s drag and drop interface. An IWS can be used either stand-alone, as a mini-console, or in combination with an existing console position. The IWS is simple to use and easy to maintain. In addition, the multi-featured and robust Mutualink software is easy to manage for System Administrators and other key personnel. The IWS is the primary operational user interface for the Mutualink system. It consists of a standard x86 PC platform (desktop, laptop, etc.) running the Mutualink real-time communications application on a Security Enhanced (SE) Linux operating system.

About Mutualink, Inc.Mutualink is an IP-based multimedia communication resource sharing platform that allows public safety agencies and critical community assets to communicate in a manner that is separate and apart from the general public.

Mutualink technology is subject to US Patent #7,643,445, #8,364,153, #8,320,874 and other patents pending.

£ Voice: LMR radios, VoIP “push-to-talk”, telephone, cellular, Nextel & intercom£ Video: live feeds from buildings, streets, cruisers, copters£ Text Messaging: more effective than voice for informational content£ File Sharing: blue prints, floor plans, photos, procedures£ PA and Intercom System Interface: Broadcast Emergency Messages£ Dispatch Collaboration: off-the-air conferencing between dispatch centers

© 2013 Mutualink, Inc.

IWSREDEFINING INTEROPERABILITYControllable Intuitive Affordable

1269 South Broad StreetWallingford, CT 06492

Phone: (866) 957-5465Web: www.mutualink.net

E-Mail: [email protected]

Mutualink, Inc.

Ruggedized Mobile WorkstationIWS M500-150 Series

Ruggedized Interoperability Workstation | IWSThe Mutualink IWS provides an incident-based highly intuitive graphical user interface (GUI) that can be effectively used by a dispatcher or incident manager to communicate with other involved dispatch personnel as well as with units in the field. Interconnection of radio channels/talkgroups is facilitated using Mutualink’s drag and drop interface. An IWS can be used either stand-alone, as a mini-console, or in combination with an existing console position. The IWS is simple to use and easy to maintain. In addition, the multi-featured and robust Mutualink software is easy to manage for System Administrators and other key personnel. The IWS is the primary operational user interface for the Mutualink system. It consists of a standard x86 PC platform (desktop, laptop, etc.) running the Mutualink real-time communications application on a Security Enhanced (SE) Linux operating system.

About Mutualink, Inc.Mutualink is an IP-based multimedia communication resource sharing platform that allows public safety agencies and critical community assets to communicate in a manner that is separate and apart from the general public.

Mutualink technology is subject to US Patent #7,643,445, #8,364,153, #8,320,874 and other patents pending.

£ Voice: LMR radios, VoIP “push-to-talk”, telephone, cellular, Nextel & intercom£ Video: live feeds from buildings, streets, cruisers, copters£ Text Messaging: more effective than voice for informational content£ File Sharing: blue prints, floor plans, photos, procedures£ PA and Intercom System Interface: Broadcast Emergency Messages£ Dispatch Collaboration: off-the-air conferencing between dispatch centers

æ

UPFRONT

F-35C Completes First Arrested Landing aboard Aircraft Carrier

The U.S. Navy made aviation history Nov. 3 as

an F-35C Lightning II carrier variant Joint Strike

Fighter conducted its first arrested landing

aboard an aircraft carrier off the coast of San Diego. Navy test pilot Cmdr. Tony Wilson landed F-35C test

aircraft CF-03 at 12:18 p.m. aboard USS Nimitz's (CVN 68) flight deck.

The arrested landing is part of initial at-sea Developmental Testing I (DT-I) for the F-35C, which commenced Nov. 3 and is expected to last two weeks.

"Today is a landmark event in the development of the F-35C," said Wilson, a Navy test pilot with Air Test and Evaluation Squadron (VX) 23. "It is the culmination of many years of hard work by a talented team of thousands. I'm very excited to see America's newest aircraft on the flight deck of her oldest aircraft carrier, the USS Nimitz."

Commander, Naval Air Forces, Vice Adm. David H. Buss, was aboard Nimitz to witness the milestone event.

"What a historic day today is for Naval Aviation. With the first traps and launches of the F-35C Lightning II aboard an aircraft carrier, we begin the integration of the next generation of warfighting capability into our carrier-based air wings," said Buss. "This important milestone is

yet another indicator of Naval Aviation's ongoing evolution to meet future threats and remain central to our future Navy and National Defense Strategy."

DT-I is the first of three at-sea test phases planned for the F-35C. During DT-I, the test team from the F-35 Lightning II Pax River Integrated Test Force (ITF) has scheduled two F-35C test aircraft from Naval Air Station Patuxent River in Patuxent River, Maryland to perform a variety of operational maneuvers, including various catapult takeoffs and arrested landings. ITF flight test operations also encompass general maintenance and fit tests for the aircraft and support equipment, as well as simulated maintenance operations.

As with the initial testing of any new aircraft, the goal is to collect environmental data through added instrumentation to measure the F-35C's integration to flight deck operations and to further define the F-35C's operating parameters aboard the aircraft carrier.

The ITF test team will analyze data obtained during flight test operations, conduct a thorough assessment of

Pacific Ocean (Nov. 3, 2014)

Continued on page 31

Page 13: GSN October/November 2014 Digital Edition

24 Government Security News October/November 2014 Digitlal Edition Digitlal Edition October/November 2014 Government Security News 25

New physical standards in the works for electrical substations

Attacks on transformer substations and other components of the electrical grid in North America have underscored the risks associated with physical security breaches and the potentially disastrous consequences. With the tens of thousands of substations across the U.S. situated in locations that range from isolated remote areas to densely populated urban areas, the job of securing these critical assets is challenging at best for security professionals.

To provide guidelines to ensure greater physical security around substations, the Federal Energy Regulatory Commission (FERC) is currently finalizing the latest Critical Infrastructure Protection (CIP) standard. Developed by the North American Energy Reliability Corporation (NERC), CIP-014 is a mandatory physical security standard for critical components of the power grid that is expected to be finalized soon. Upon completion, CIP-014 will serve as a blueprint to help both utilities and security professionals understand the requirements to protect these vital assets.

Following CIP-014’s finalization utilities will be tasked to identify their most critical substations – those that if damaged or taken offline would cause major problems for the power grid. To comply, utilities will need to perform a gap analysis to evaluate potential threats

and vulnerabilities of physical attacks on the targets they’ve identified as most critical, and then deploy and implement physical security plans to cover those locations. Finally, utilities will undergo another third-party review to evaluate their gap analysis and physical security plans. These requirements will be implemented in phases, giving utilities adequate time to prepare for and implement physical security upgrades.

Equipment selection and purchase will be crucial to meeting CIP-014 requirements, so it’s important to understand what utilities will be looking for. When it comes to equipment, utilities are generally hesitant to invest in products that have no real track record of success. They also want to ensure that they are receiving the best return on their investment in physical security. Traditionally, utilities have relied on a combination of some type of blind sensor – such as coax or fiber on a fence to act as an activity detector – with video security solutions, but the reliability and accountability of these systems is diminished by the many nuisance alerts they generate. These blind sensors also fall short of the intent of this new regulation to provide early detection outside of the fence line for advance warning.

Smart thermal cameras that incorporate video analytics provide substantial advantages over this traditional approach, increasing the probability of intruder detection while greatly reducing the nuisance alarms that have plagued automated perimeter systems in the past. These systems cover large distances and detect what a human would miss, while delivering immediate, actionable information to enable fast response decisions.

For this reason, many electrical utilities are already using smart thermal video cameras to provide accurate, reliable performance in even the most challenging conditions. For example, some smart thermal cameras can discriminate small differences between the temperature of a person and the background, accurately detecting intruders even in less than ideal conditions. They will ignore headlights, reflections off water, or other lighting issues that cause false detections with visible light cameras. Because they can detect in complete dark, bright sunlight, or poor weather, smart thermal cameras can be counted on to secure outdoor areas 24/7. The alerts smart thermal cameras generate when – or even before – an intrusion occurs, allow security personnel to view real-time video to determine if there is activity to be stopped. This advanced detection provides alerts before an individual has an opportunity to steal, vandalize or disrupt substation operations.

While some utilities have already begun the processes laid out in CIP-014, the remainder are expected to follow suit in the near future to ensure their planned physical

security upgrades meet local zoning regulations, address any issues with light and/or sound around the site, and acquire proper permits for any construction or other work necessitated by these upgrades at their substations.

This underscores the need for security solution providers and system designers, installers and integrators to educate themselves on CIP-014 and the best technologies for ensuring compliance with this fast-approaching regulation.

True security means stopping an event by detecting intruders as early as possible,

ideally before they enter a secured area, and alerting security staff. When it comes to protecting these critical assets, this real-time awareness is critical to ensuring a timely response and preventing theft, vandalism, accidents and other potentially dangerous activities or events that could disrupt the stability of the power grid. Given their proven track record of providing a high level of security for substations, smart thermal systems are the most reliable solution for providing the advanced detection and real-time awareness necessary to protect substations while satisfying CIP-014 security mandates. Ω

John Romanowich is the President and CEO of SightLogix

å Romanowich on Video Surveillance

John RomanowichPresident and CEO of SightLogix

SightLogix Thermal SightSensor

Page 14: GSN October/November 2014 Digital Edition

26 Government Security News October/November 2014 Digitlal Edition Digitlal Edition October/November 2014 Government Security News 27

Brown is a civil engineer with an imposing background in antiterrorism force protection, blast-resistant structural design and high security access control for the U.S. government and military. Prior to his involvement with Port of Charleston, he served as team leader for the U.S. Coast Guard’s National Facility Security Plan Review Center, whose mandate was to review U.S. ports for compliance with 33 CFR Part 105 Regulations. These post-9/11 performance guidelines call for perimeter monitoring, access control and anti-terrorism readiness for marine facilities receiving regulated cargo, and require that restricted areas - both land and waterside perimeters - be continuously monitored.

As the Coast Guard representative responsible for reviewing South Carolina State Port Authority’s facility security plan, Jeff evolved into directing Port of Charleston’s security operations when a consultant with

his credentials was needed to customize a plan complying with new legislation.

IDENTIFYING THE CHALLENGESIn evaluating program options, Brown considered the Port’s unique security challenges. Prior to 9/11, ensuring secure transfer of cargo was a key focus at Wando Welch Terminal, and roving patrols by Port Police managed loss prevention. With the prospect of terrorist breach, a system that could reliably detect and monitor disturbances at the perimeter became the new paradigm.

A must for Brown was finding a solution that successfully addressed a marine environment; one that remained in near constant motion between ship, vehicle and foot traffic. This scenario would trigger nuisance alarms in most security systems, so the new system needed the intelligence to recognize and ignore traditional environmental disturbances to avoid desensitizing monitoring personnel with false positives.

Another challenge was balancing the divergent priorities of airtight terminal security and efficient cargo transfer. By definition, complex counter-terror measures had the potential to slow the pace of a facility consistently recognized for high productivity. It was imperative to narrow the solutions to those that delivered superior intrusion detection without being cumbersome to administrate.

“At the very core, Port Operations and Port Security are 180 degrees out of phase because Operations wants to move cargo as quickly as possible. It's all

based on turn times,” Brown explained. “But you’ve got shipping lines that rely on the Port Authority to securely transfer their cargo and 105 Regulations in place, so Port Police needs the security of the terminal ensured.”

Brown describes working through these conflicting issues as one of the most difficult functions he performs, and cites strong communication as the key to effectively bridging the gap between Operations and Security. He coordinates closely with port operations, engineering, IT and maintenance teams. He also regularly consults port police, customs and border protection, the U.S. Coast Guard, and Project Seahawk – an innovative pilot program at Port of Charleston created by Congress under the guidance of the Department of Justice to enhance port security operations, capabilities and coordination. By understanding and addressing the needs of each of these

æ

CASESTUDY

THE PORT OF CHARLESTON, SC

PURETECH SYSTEMS

Integrating Fence Detection And Video Analytics

Port of Charleston is one of the busiest container ports along the United States’ Southeast and Gulf coasts. Moving more than 600,000 pier

containers per year and ranked 8th largest U.S. port in cargo value, with $50 billion in annual shipments, Charleston is recognized as North America’s most efficient and productive port. As a vital hub for global freight transfer, implementing a site protection solution that would safeguard facility infrastructure without adverse affect to flow of cargo was a critical goal.

Wando Welch Terminal is Port of Charleston's largest terminal, both in cargo volume and physical size. Jeff Brown, HNTB consultant and contractor to South Carolina State Port Authority, has managed the SCSPA security program since 2005. Overseeing perimeter protection and access control for the Port’s terminals, he was tasked with enhancing Waldo Welch’s perimeter security system.

WW

T© M

arvi

n Pr

esto

n 20

11

Page 15: GSN October/November 2014 Digital Edition

28 Government Security News October/November 2014 Digitlal Edition Digitlal Edition October/November 2014 Government Security News 29

constituents, Brown has manages to deliver a security program that satisfies all parties.

DEVELOPING A PLANMapping out security program expansion guidelines for each of the facility’s five non-continuous terminals was Port of Charleston’s greatest challenge.

“105 Regulations say that you have to monitor your perimeter and access points, but it’s up to the individual entities to figure out how to comply,” Brown explained.

To address this responsibly, Brown and his team formulated a comprehensive Security Improvement Plan - an industry best-practice concept incorporating solutions that delivered the protection required by Port Authorities, and addressed the risks identified by the Port during vulnerability assessments.

“To put together a plan of this magnitude, we had to take a holistic approach,” outlined Brown. “There was extensive coordination between Operations and Security. Each of the Port’s various internal and external constituents were consulted.”

Traffic flow at each terminal was evaluated toward restricted area boundary redefinition, and detailed site diagrams and project cost estimates were developed. The plan eventually included equipment design and performance specifications for the initial upgrade at Wando Welch Terminal.

“This master plan has been critical to the success of Port of Charleston’s security program,” Brown emphasized. “All affected parties agreed on it. Everybody understands what is expected, how it will be delivered and what the price tag will be.” In fact, Brown reports that the plan's elaborate detail has been an important factor

in the Port’s ongoing success in securing grant monies for bringing the security upgrades to fruition.

THE INTEGRATION PARTNERUpon plan approval, Brown tackled hiring a systems integrator to handle the installation. To attract only highly qualified candidates, he employed rigorous selection criteria that included evaluation of each firm’s technical certifications, breadth of manpower, implementation history for similar systems and quality assurance parameters.

“We had our design, so everyone would be delivering the same product,” Brown recalled. “I wanted to know how a prospective partner would strategically approach the installation, and what they would do to set themselves apart. We expected a thorough plan of action.”

Port of Charleston ultimately selected I-Sys Corporation of North Charleston, South Carolina. Along with capabilities that satisfied Brown’s stringent requirements, I-Sys committed to providing a level of

æ

CASESTUDY

THE PORT OF CHARLESTON, SC • PURETECH SYSTEMS

Southwest Microwave’s MicroPoint™ Cable system pinpoints fence cut or climb attempt to within 3m, while ignoring environmental disturbances such as wind, rain or vehicle traffic.

service that included 24-hour response time, 72-hour resolution of issues and a 3-year warranty on installed product.

AN INTELLIGENT SOLUTIONAccording to Port of Charleston’s Security Improvement Plan, a key requirement of the new perimeter system was its ability to precisely locate fence line breaches and monitor intruders from point of attack through incident resolution. Brown acknowledged that it would be unmanageable and costly to install cameras along every linear foot of its irregular boundary for this purpose. Instead, the Port chose two market-leading intelligent detection solutions: Southwest Microwave’s INTREPID™ MicroPoint™ Cable fence detection system - which offered pinpoint intrusion location and tie-in of detection zones to CCTV camera presets - and PureTech’s PureActiv® wide area video surveillance system - which successfully identified and tracked qualified targets.

"There weren't many companies who could deliver what we wanted," said Brown. "We went through an exhaustive process to ensure that we were going to get the most appropriate, best of breed perimeter security system."

The synergistic solution they selected enabled the Port to strategically place visible light, infrared illuminated and thermal pan-tilt-zoom cameras controlled by the PureActiv® system at key points along the perimeter, and integrate them with the MicroPoint™ Cable system to quickly locate and react to intrusions across the port’s vast property.

“We chose MicroPoint™ because it was the only sensor that could detect to within 3 meters and direct camera PTZ activity to incident location,” Brown explained. “PureActiv® provided intelligent video analytics, 3D geospatial command and control,

autonomous PTZ tracking and open architecture which easily integrated with MicroPoint™ and our Lenel access control system.”

Brown recognized that the Southwest Microwave fence detection system had been successfully paired with PureTech's video analytics package at many other sites. “The fact that this was not the first time these two products have been integrated, that all the kinks had been ironed out, was invaluable to me.”

EXTENSIVE TESTINGOnce the MicroPoint™ Cable / PureActiv® system was installed, the Port’s security team, I-Sys Corporation and PureTech conducted thorough performance verification testing to ensure round-the-clock functionality at every point along the fence line.

“We painstakingly went to each camera and had an ‘intruder’ run, walk, roll, crawl and climb the fence to ensure that cameras and fence sensors worked properly,” said Brown. With an extensive array of PTZ cameras, this

PureActiv® provides intelligent video analytics, 3D geospatial command and control, autonomous PTZ tracking and open architecture for ease of integration with the MicroPoint™ Cable system.

Page 16: GSN October/November 2014 Digital Edition

30 Government Security News October/November 2014 Digitlal Edition Digitlal Edition October/November 2014 Government Security News 31

endeavor took weeks to complete. While Brown concedes that the testing was more rigorous than most, results were overarchingly positive.

"I expected our vendor to prove to me that the system was ready to do what it needs to do," Brown recalled. "They knocked it out of the park. It was an amazing success." In fact, Brown remarked that in general, the new solution far exceeded his expectations both during the testing phase and initial implementation.

A SOLID SOLUTIONPort of Charleston's new perimeter detection system solves the facility's main concerns, terrorist breach and cargo loss.

Southwest Microwave’s INTREPID™ MicroPoint™ Cable system allows the Port to confidently pinpoint a cut or climb attempt to within one fence panel. PureTech’s PureActiv® system reliably analyzes disturbances, then smoothly tracks and manages qualified events until they are resolved.

Each product has contributed to solving environmental nuisance alarm issues common to other detection technologies. MicroPoint™ effectively identifies fence attacks while ignoring distributed environmental disturbances such as truck traffic at the Port. PureActiv® copes exceptionally well with the diversity of port environments, including busy waterside cargo loading areas, long fence lines, active roadways and controlled entrance and egress points.

The MicroPoint™ Cable / PureActiv® solution has delivered the Port a cost-effective solution for detecting intrusions along a lengthy perimeter, and an efficiency

that reinforces both systems' smart sensor capabilities. MicroPoint's unique ability to assign detection zones in system software at any point along the cable has reduced hardware requirements and simplified assessment. PureTech's analytics can identify targets at long ranges, minimizing the required number of cameras and simplifying monitoring processes. By employing standard cameras, the PureActiv® system further reduces cost and gives the port installation flexibility without compromising detection standards.

“I could not be more pleased with the new system," Brown stated emphatically. "I do not think there are other products out there that do what MicroPoint™ Cable and

PureActiv® can. These solutions are so well integrated that I almost forget that they are two separate systems. The entire perimeter security system performs the way it’s supposed to. If every system I implemented worked as well, then my job would be easy.” Ω

æ

CASESTUDY

æ

CASESTUDY

THE PORT OF CHARLESTON, SC • PURETECH SYSTEMSContinued from page 23

how well the F-35C operated in the shipboard environment, and advise the Navy to make any adjustments necessary to ensure that the fifth-generation fighter is fully capable and ready to deploy to the fleet in 2018.

"Our F-35 integrated test team has done an amazing job preparing for today. This will be one landing out of thousands more that will happen over the next few decades," said Lt. Gen. Chris Bogdan, F-35 Program Executive Officer. "For months, we've been working with the Nimitz crew, Naval Air Forces, and our industry partners, Lockheed Martin and Pratt & Whitney, as well as their suppliers, to prepare and train for this event. We plan on learning a lot during this developmental test and will use that knowledge to make the naval variant of the F-35 an even more effective weapons platform."

The F-35C combines advanced stealth with fighter speed and agility, fused targeting, cutting-edge avionics, advanced jamming, network-enabled operations and advanced sustainment. With a broad wingspan, reinforced landing gear, ruggedized structures and durable coatings, the F-35C is designed to stand up to harsh shipboard conditions while delivering a lethal combination of fighter capabilities to the fleet.

The F-35C will enhance the flexibility, power projection, and strike capabilities of carrier air wings and joint task forces and will complement the capabilities of the F/A-18E/F Super Hornet, which currently serves as the Navy's premier strike fighter.

By 2025, the Navy's aircraft carrier-based air wings will consist of a mix of F-35C, F/A-18E/F Super Hornets, EA-18G Growlers electronic attack aircraft, E-2D Hawkeye battle management and control aircraft, MH-60R/S helicopters and Carrier Onboard Delivery logistics aircraft.

The successful recovery of the F-35C represents a step forward in the development of the Navy's next generation fighter and reinforces Navy-industry partnership goals to deliver the operational aircraft to the fleet in 2018.

For more news from Commander, Naval Air Forces, visit www.navy.mil/local/airpac/. Ω

æ

UPFRONTComing Attractions

December 2014

January-March, 2015

December Digital Edition2014 Digital Yearbook of HomelandSecurity Awards Recipients January Print EditionTechnology Focus:Perimeter Protection andShort Wave Detection Market Sector Focus:Airport/ Aviation Security February Digital EditionTechnology Focus:Access Control/ID, Biometrics Market Sector Focus:Energy, Nuclear, InfrastructureAnd Grid Protection March Print EditionTechnology Focus:Cybersecurity/ClosingThe Gap Market Sector:Maritime/Port Security Topics We’re FollowingThroughout the Year:Protecting the GridClosing the Cyber GapThe Immigration CrisisSocial Media in Law Enforcement

Page 17: GSN October/November 2014 Digital Edition

32 Government Security News October/November 2014 Digitlal Edition Digitlal Edition October/November 2014 Government Security News 33

Government Security News (ISSN 1548-940X and UPS 022-845) is published in six print editions (Jan, Mar, May, Jul, Sep, Nov) and six digital editions (Feb, Apr, Jun, Aug, Oct, Dec) per year by World Business Media, LLC, P.O. Box 7608, Greenwich, CT , 06836, Telephone (212) 344-0759. Periodicals postage paid at New York, NY and additional mailing offices. POSTMASTER: Send address changes to GSN: Government Security News, Subscription Department, P.O. Box 316, Congers, NY 10920-0316. For Government decision makers and business executives involved with security products, Systems and series. Qualified U.S. subscribers received GSN: Government Security News At no charge. Non-qualified subscribers in the U.S. are charged $75.00 per year. Canadian and foreign subscribers are charged $140 International Airmail. Copyright 2014 by GSN: Government Security News. All rights reserved. Printed in the U.S.A. GSN: Government Security News assumes responsibility for validity of claims in items reported.

of interest, reach targets quickly and take action as required. BriefCam stresses ease of use, integrating user experience and intuition as a vital part of the process; the human mind and eye are always engaged.

In addition to fast video review, BriefCam Syndex augments the basic Video Synopsis by providing users with a powerful set of tools for searching video according to attributes that they define: size, color, speed, direction and location within the frame. All parameters are under the user’s control – even the order of objects displayed. Like all search engines, BriefCam Syndex ranks results in order by probability to ensure the most relevant events of interest are presented first.

BriefCam Syndex is also offered as a standalone product intended mainly for law enforcement and individual security investigators (FS) and for investigative teams (FS+), or as an integrated/embedded product within the VMS environment for medium-sized enterprises (EP) and large/growing ones (EP+).

New features incorporated into BriefCam Syndex GV include floating licenses so that cameras can be assigned and reassigned among authorized users, mobile (thin) client support, in/out zoom, and multiple video source capability that enable processing of video input from the agency-owned VMS as well as from imported external video footage.

“As security cameras proliferate, more and more investigations are crowdsourcing video from the public for intelligence gathering and post-event investigation,” Irani noted. “More evidence is a boon to investigators but also means hours, days and even weeks of video are collected – that’s where rapid video review is absolutely essential. Crowdsourcing also increases the need for greater control over privacy.”

In line with the trend, BriefCam Syndex GV’s enhanced collaborative investigation tools include permissions limitations so that camera access is restricted in accordance with the individual investigator’s viewing rights. Ω

ABOUT BRIEFCAMBriefCam®, Ltd. is the developer and provider of

Video Synopsis®, an award-winning technology

that summarizes hours of events into a “brief ” that

extracts maximum value from video, recorded and

live. BriefCam products interface with a wide range of

video recorders, advanced IP cameras and complement

existing surveillance solutions. BriefCam is winner

of the 2013 SIA New Product Showcase for Video

Analytics, 2012 Israel HLS Technology Innovation

Award, 2011 ASIS Accolades Award - Surveillance,

2010 IFSEC Security Industry Award - Best CCTV

System Product, 2010 Wall St. Journal Technology

Innovation Award - Physical Security and others.

Founded in December 2007, BriefCam, Ltd. is

headquartered in Modi'in, Israel, with subsidiaries in

Connecticut, USA and Shanghai, China. For more

information: www.briefcam.com.

For updates: https://twitter.com/BriefCamVS.

Review hours of video in minutes. Select, view and zoom in on events of interest

Continued from page 16

G O V E R N M E N T Security News

The News Leader in Physical, IT and Homeland Security

Publisher:Michael Madsen

(O) 212-344-0759, X1(C) 732-233-8119

[email protected]

Executive Editor:John Wagley

(O) 212-344-0759, X2(C) 202-425-0196

[email protected]

Senior Writer:Lorrie Barclay

(O) 212-344-0759, X5(C) 508-685-0652

[email protected]

Columnist:John Convy

Convy on Netcentric [email protected]

Columnist:John Romanowich

Romanowich on Video [email protected]

Guest Expert Contributor:

Denise Rucker Krepp(C) 202-546-2533

[email protected]

Art Director:Vance Klein

crosscheckdesigns.com(O) 212-344-0759, X4

(C) [email protected]

Interim Production Manager:Vance Klein

crosscheckdesigns.com(O) 212-344-0759, X4

(C) [email protected]

Editorial Director/CEO

Adrian Courtenay(212) 344-0759, X3(C) 917-696-5782

[email protected]

MEDIA KIT

SUBSCRIBE

Mailing Address:Government Security News

P.O. Box 7608Greenwich, CT 06836

Page 18: GSN October/November 2014 Digital Edition

34 Government Security News October/November 2014 Digitlal Edition

© 2014 HID Global Corporation/ASSA ABLOY AB. All rights reserved. HID, HID Global, the HID Blue Brick logo, the Chain Design and pivCLASS are trademarks or registered trademarks of HID Global or its licensor(s)/supplier(s) in the US and other countries and may not be used without permission. All other trademarks, service marks, and product or service names are trademarks or registered trademarks of their respective owners.

PIVotal Security.

pivCLASS® readers and software from HID Global provide security and compliance.

HID Global’s pivCLASS® reader solutions PIV-enable existing physical access control systems (PACS) without

the need to “rip and replace” valuable infrastructure, reducing costs, minimize disruptions, and preserving

investments. And, HID’s pivCLASS off-the-shelf software solves the problem of validating, authenticating and

registering PIV card data in a PACS – all without custom programming. pivCLASS software also automatically

revalidates PIV card certificates periodically to make sure your PACS is always up to date.

To make the pivotal move to compliance, visit hidglobal.com/piv-gsn

HID-PIVotal-SIA.indd 1 6/26/14 10:37