11.07.2015 Views

FIRST LOOK - Government Security News

FIRST LOOK - Government Security News

FIRST LOOK - Government Security News

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Rep. Bennie Thompson (D-MS),right, takes aim at DHS Page 30FormergovernorJim Gilmore(rememberthe GilmoreCommission?)talkshomeland security with GSNPage 18February 21, 2005 Vol. 3 Issue 4 The <strong>News</strong>paper of Record for <strong>Government</strong> <strong>Security</strong> A Publication of World Business Media, LLCINSIDECivitas Sniffs Out Size of Sensor MarketPAGE 8White House Builds Tougher GatehousesPAGE 8“Bust-Out Schemes” Could Fund TerroristsPAGE 9Second Hot Issue of Network DefenseFOLLOWS PAGE 16Treasury Seeks Anti-Counterfeiting IdeasPAGE 23CAPITAL LETTERS: Berteau on the BudgetPAGE 24VOIP can cause securityheadaches, warns NISTIn a sobering report that may throw coldwater on the rush by federal government agenciesto embrace Voice Over Internet Protocol(VOIP) telephony, the National Institute ofStandards and Technology pointed out lastmonth that VOIP services can introduce a widevariety of security vulnerabilities into anagency’s communications network.“VOIP systems can beexpected to be morevulnerable than conventionaltelephonesystems, in partbecause they aretied in to thedata network,resulting inAVAYAMore on Page 28Bush seeks 6.8% hikein DHS spending in ’06The Department of Homeland <strong>Security</strong> (DHS)would see an increase of $2.16 billion in discretionaryspending next fiscal year as well as the consolidationof several DHS programs under theFY06 budget President Bush proposed to Congresson Feb. 7.The president’s budget proposal boosts DHS’sgross discretionary budget authority for spendingby some 6.8 percent — from $31.99 billion in FY05to $34.15 billion in FY06 — and seek to improveagency management and achieve budgetary efficienciesby unifying several programs under centralizedmanagement structures.Chertoff: Up close & personalBy DAVID BATESHe reportedly likes tojog and lift weights in hisspare time. He hashelped raise money forRepublican candidatesas well as needy students.And he is a memberof the Westfield, NJ,Nomahegan Swim Club.Yes, the attributes ofMichael Chertoff, thenew secretary of theDepartment of Homeland<strong>Security</strong> (DHS),extend beyond his muchheralded skills at busting<strong>FIRST</strong> <strong>LOOK</strong>: FY2006 BUDGETCovering Physical & IT Homeland <strong>Security</strong> SolutionsExtreme CCTV’sadvanced all-weatherdome camera isimpervious tovandalismPage 20Gov’t-wide security riseswhile other spending fallsBy JACOB GOODWINWhile most other areas of discretionary spending in the federal governmentwere cut in the president’s $2.6 trillion FY2006 budgetrequest, homeland security spending throughout the government wasraised by $1 billion – or 3.0 percent – over the $31 billion actuallyenacted by Congress in the 2005 budget.Spending by the Department of Homeland <strong>Security</strong> alone would beraised by 6.8 percent between FY05 and FY06.These increases would continue an upward trend in homelandsecurity spending which according to one calculation by the Office ofManagement and Budget has averaged 16 percent annually since2001, or 109.7 percent cumulatively over that five-year period.Actually, the Bush administration has released a confusing array ofMore on Page 10 More on Page 10Senate panel grills DHS nomineeChertoff & Chertoff: New power coupleWith his nomination of federal appellate judge, Michael Chertoff, to besecretary of the Department of Homeland <strong>Security</strong> (DHS), President Bushmay have scored a political “twofer.”When the Newark, NJ-based Chertoff returns to Washington, he willbring with him not only his hands-on experience as a senior level JusticeDepartment counter-terrorismwarrior, but also an importantpolitical asset — his wife.In the wake of 9/11, as MichaelChertoff, was working to ferretout other potential terrorists anddeveloping cross-agency informationsharing and multi-agencyMichael and Meryl Chertoffcollaboration to detect and disruptterrorist operations, his wifeMore on Page 26GasAlertMicro5 sensor byBW Technologies candetect up to fivedifferent gasessimultaneouslyPage 20Senator John Warner (R-VA)compared Michael Chertoff to a“boxer sitting in the corner, waitingto come out to fight” onbehalf of DHS, but at his mostlycordial confirmation hearing onFeb. 2, none of the assembledsenators seemed to lay a glove onthe lawyer-turned-prosecutorturned-federaljudge. (Five dayslater, on a voice vote, the panelapproved Chertoff’s nominationand sent it to the Senate floor.)True, Senator Carl Levin (D-MI) tried to connect Chertoff tosome mildly incriminatingmemos from the JusticeMore on Page 26 More on Page 26www.gsnmagazine.comSecure Risks Ltd.’sCobra StunLight stopsbad guys in their trackswithout doing permanentdamagePage 20


D-tect. D-fine. D-fend.To help protect our homeland from emerging radiological, chemical, andbiological threats, D-tect Systems supplies the most powerful, affordableand deployable detection and identification technologies available forhomeland defense, first responders, border and cargo inspection, industrialsafety, and other applications. Our products are successfully being used bythe U.S. Postal Service, Pentagon Force Protection Agency, Defense LogisticsAgency and others.ADVANCED RADIATION DETECTION SOLUTIONSPersonal Radiation DetectorThe highly portable, rugged,all-weather mini rad-D radiationdetector is small enough to wear on a belt, yetpowerful enough to locate low-level radioactivesources in complex environments under 1 second.Allowing for discreet monitoring without intrusion ordisruption of civilian activities, the mini rad-D features:• audible or discreet silent vibrator alarm.• automatic background radiation calibration tominimize false alarms.• drop-tested survivability to 3-feet on concrete.• self-powered, with 2 year battery life.• simple operation – no special training required.Fixed-InstallationSNM DetectorThe ultra-sensitive rad-Dradiation detector provides maximum monitoringaccuracy and security for container and packageinspection in doorways, conveyor belts, vehicles,and other fixed screening installations. Our wirelessClass 1 Bluetooth interface allows operator controlup to 300 feet from the detector, as well asmonitoring of multiple detectors via LAN or Internet.Other rad-D features include:• high sensitivity to minute traces of gamma radiation.• shielded version for close proximity to X-ray screening.• adjustable field of detection with narrow-beam focusfor single-package and luggage inspection.To learn more about D-tect Systems’advanced radiation, chemical andbiological hazard detection andidentification products visit:ADVANCED TECHNOLOGIES FOR HOMELAND SECURITYFor more information go to www.info.ims.ca/4755-002www.dtectsystems.comor call us at: 866-59D-tect (866-593-8328)


For more information go to www.info.ims.ca/4755-003


CONTENTSPAGE 14For more information click onwww.info.ims.ca/4755-003Front PageHomeland <strong>Security</strong> isFY06 Budget’s Big WinnerWhile most ofthe discretionarydomestic spendingin PresidentBush’s recently unveiled FY06 budget tooka beating, homeland security spendingthroughout the government is up, up, up.– Continues on page 10DHS Envisions MoreMoney and ConsolidatedProgramsThe Department of Homeland <strong>Security</strong>would enjoy a 6.8 percent hike in spendingif the president’s budget were enacted,and it promises to gain efficiency byrolling several related programs into one.– Continues on page 10Voice Over IP TelephonyShould Move ForwardCautiously, says NISTVOIP telephoneservices may havebecome the ragein the past year,but NIST technologistsbelievethese stateof-the-artsystems can lead to awhale of a security problem.– Continues on page 28Chertoff – Part 1 –“The Man”Read about the interesting backgroundon the new Secretary of theDepartment of Homeland <strong>Security</strong>– Continues on page 26Part 2 –“The Power Couple”Meet Michael and Meryl, two of thecapital’s best and brightest.– Continues on page 26AVAYAPart 3 –“The Hearing”The nominee’s confirmationhearing onFeb. 2 probably told usmore about the Senatetoday than it did aboutMichael Chertoff.– Continues on page 26FeaturesNetwork Defense andProduct <strong>News</strong>– Follows Page 16Tucked inside this editionof GSN:<strong>Government</strong> <strong>Security</strong><strong>News</strong> you’ll find thesecond issue ofNetwork Defense andProduct <strong>News</strong>, the latestaddition to theWorld Business Media, LLC family ofpublications. Read on…1-on-1 Interview –Former Gov. JamesGilmore – Page 18Former governor ofVirginia, formerchairman of the“GilmoreCommission,” formerGOP national chairman,currentWashington, DCattorney and publiccitizen, James Gilmore has a lot tosay about homeland security…andthe country.CAPITAL LETTERS –David Berteau– Page 24Our veteran columnistpeels back theBush administration’sFY06 budget requestand tells us what towatch for as the budget battle unfoldson Capitol Hill.DepartmentsHot <strong>News</strong> – Page 6Ever heard of a“Bust-OutScheme”?Know howmuchmoney the federalgovernment willspend on all kinds of security sensorsnext year? Ever wonder how securethose guardhouses are at the entrancesto the White House? Well, read on…Around the Country– Page 13Contracts – Page 16People – Page 17New Products – Page 20GSN’s Calendar – Page 21Page 22 – Page 22Business Opportunities– Page 23Wall St. Close-Up – Page 25Marketing Moves – Page 25GSN Classified Ads – Page 29Personality Profile:Bennie Thompson – Page 30When was the last timeyou saw a congressmanpose for a photographwith a dead deer in anoff-road vehicle whilehunting in the MississippiDelta? Rep. Thompsoncertainly knows how topush the envelope.FEBRUARY 21, 2005 4 GSN: GOVERNMENT SECURITY NEWS


For more information go to www.info.ims.ca/4755-005


For more information go to www.info.ims.ca/4755-001


A few hours in frontof the SenateHomeland <strong>Security</strong>and <strong>Government</strong>alAffairs Committee may have demonstratedto Michael Chertoff why his new post asDHS secretary is frequently called thetoughest job in Washington.One after another, the members of thatSenate committee questioned, cajoled andgrilled Chertoff on their pet programs orpolicy prescriptions. In each case, the everattentiveChertoff promised to come up tospeed on the details of those specificissues, weigh the competing claims, andultimately make some kind of executivedecision…which no doubt will antagonizesomebody. It was probably enough to makeChertoff long for the lifetime seat on thefederal bench he has so nobly relinquished.Norm Coleman (R-MN) wants bettercommunications between DHS officialsand local first responders.Daniel Akaka (D-HI) expects Chertoff toreach outto the180,000employeesof DHS,and theirunions;Sen. Frank Lautenberg (D-NJ)introduces Chertoff at hearingwants himto protectDHSwhistleblowers, and worries about the lossof citizens’ privacy due to data mining.Mark Dayton (D-MN) is concerned thatthe formula for allocating DHS grantmonies may favor large, urban states oversmall, rural states.Pete Domenici (R-NM) doesn’t beataround the bush with Chertoff. “Most ofwhat you have to do is manage a monster,”advises Domenici.A message from Jacob Goodwin,GSN’s Editor-in-ChiefA message from Ed Tyler,GSN’s PublisherAs a leading publication in the field ofhomeland security, GSN: <strong>Government</strong><strong>Security</strong> <strong>News</strong> is always eager to applaudthe efforts of trade shows and conferences– whether they’re sponsored bygovernment agencies or commercialenterprises – for their role in bringingtogether government buyers and industrysuppliers for the good ofthe country.Our editorial staffattends many of theseconclaves -- in searchof the latest news and opinions -- andour sales staff attends the same gettogethers-- to talk with current andprospective marketing partners.I’d like to add a special word of praiseand encouragement to one specificshow, the fifth edition of theDepartment of Defense’s ForceProtection Equipment Demonstration,known as FPED V, which not onlyFrank Lautenberg (D-NJ) wants the newsecretary to take risks and vulnerabilities intoaccount as DHS doles out its grant monies.Jon Corzine (D-NJ), who agrees withLautenberg that a two-mile stretch betweenthe Port of Newark and Newark LibertyInternational Airport is one of the most vulnerableareas in the U.S., is particularlyconcerned about the security of chemicalplants, many of which sprout alongside theNew Jersey Turnpike, a few miles south ofthat “most vulnerable” stretch.Susan Collins (D-ME), the committeechairman, hits Chernoff with several concerns:easier passage between communitiesin northern Maine and communities justacross the international border in Canada;more security funding for the port ofPortland, in her home state; and acceleratedfunding for the Coast Guard’sDeepwater procurement program.Joe Lieberman (D-CT) frets that manyimmigrants in the U.S. were detained bylaw enforcement authorities after 9/11 andnot allowed to confer with lawyers.John Warner (R-VA) suggests thatChertoff look into the possibility of DHSissuing national ID cards.Carl Levin (D-MI) worries that Chertoffmay have condoned the use of torturetechniques by U.S. military personnel inAfghanistan or Guantanamo Bay, Cuba,while he was head of the JusticeDepartment’s criminal division.Robert Bennett (R-UT) wants Chertoff toconsider establishing a new assistant secretary’spost at DHS to focus on cyber security.Throughout it all, the nominee waspleasant, circumspect and respectful of theassembled senators, and diligent in promisingto explore each and every matter theybrought up.His “To-Do” list was already a mile long, andChertoff hadn’t even been confirmed yet!brings buyers and sellerstogether, butenables those sellers toprovide indoor andoutdoor “live,” real-world demonstrationsof the performance of their products.It is not every day that an educationalconference or show can so vividlyassist the buyer in deciding,“Is this securityproduct, system or serviceright for my needs.”FPED has drawnthousands of attendees to Quantico,VA because they know they’ll be ableto touch, feel and smell the uniqueproducts, in action, right in front oftheir eyes.GSN will participate in this year’sFPED V show April 26-28, 2005, andwe hope to see you there. For furtherinformation, you can visitwww.fped5.orgSENIOR EDITOR:Teri Robinson(212) 666-9292trobinson@gsnmagazine.comDavid BerteauDaniel BiranSteven BrierDave ArnoldVice President/New Business:Arnold Blumenthal(516) 292-0674ablumenthal@gsnmagazine.comNortheast Regional Mgr:G. Scott Dinkel(212) 925-7300 x218sdinkel@gsnmagazine.comNJ and PA Regional Mgr:Mike Madsen(212) 925-7300 x 220mmadsen@gsnmagazine.comCIRCULATION DIRECTOR:Ronald Moyer(609) 601-1298PROMOTION DIRECTOR:Robert DiGioia(212) 925-7300 x274GRAPHIC DESIGNER:Pat Monteleone(212) 925-7300 x321Main Number: (212) 925-7300Fax: (212) 925-8754www.gsnmagazine.comART DIRECTOR:Mark Kaplan(212) 925-7300 x322mkaplan@gsnmagazine.comCONTRIBUTING WRITERS:Barbara DePompaDavid GeerJohn KampSkip KaltenheuserADVERTISING SALESMid-Atlantic & Southern Reg. Mgr:Charlie Hull(301) 987-0632chull@gsnmagzine.comMidwest Regional Mgr:Chris Casey(847) 223-5225 x14chrisc@caseyreps.comGSN: <strong>Government</strong> <strong>Security</strong> <strong>News</strong> (ISSN 1548-940X) is published biweekly except once only in August andDecember (22 times per year) by World Business Media, LLC, 100 Avenue of the Americas, 6th Floor, New York,NY 10013. Telephone: (212) 925-7300. Periodicals postage pending at New York, NY and additional mailingoffices. POSTMASTER: Send address changes to GSN: <strong>Government</strong> <strong>Security</strong> <strong>News</strong>, Subscription Department, P. O.Box 2037, Skokie, IL 60076-7937. For government decision makers and business executives involved with securityproducts, systems and services. Qualified U.S. subscribers receive GSN: <strong>Government</strong> <strong>Security</strong> <strong>News</strong> at no charge.Non-qualified subscribers in the U.S. are charged $75.00 per year. Canadian and foreign subscribers are charged$140.00. International Airmail subscribers are charged $210.00. Single copy $10.00. The GSN Web site is:http://www.gsnmagazine.com Copyright 2005 by GSN: <strong>Government</strong> <strong>Security</strong> <strong>News</strong>. All rights reserved. Reproductionof this publication in whole or part is prohibited except with the written permission of the publisher. Printed in theU.S.A. GSN: <strong>Government</strong> <strong>Security</strong> <strong>News</strong> assumes no responsibility for validity of claims in items reported.POSTMASTER:Send changes of address to:GSN: <strong>Government</strong> <strong>Security</strong> <strong>News</strong>Subscription DepartmentP.O. Box 2037, Skokie, IL 60076-7937NEW SUBSCRIPTION REQUESTS:Write to GSN: <strong>Government</strong> <strong>Security</strong> <strong>News</strong>Subscription DepartmentP.O. Box 2037, Skokie, IL 60076-7937or call (847) 763-9617.Subscribe online at www.gsnmagazine.comEDITOR-IN-CHIEF:Jacob Goodwin(212) 925-7300 x255jgoodwin@gsnmagazine.comPUBLISHER:Edward Tyler(212) 925-7300 x232etyler@gsnmagazine.comDIRECTOR OF ADVERTISING:G. Scott Dinkel(212) 925-7300 x218sdinkel@gsnmagazine.comFULFILLMENT/ WEB SUPPORT MANAGER:Anne Tyler(631) 275-0264PRODUCTION DIRECTOR:Joe Oakes(212) 925-7300 x260ADVERTISING TRAFFIC MANAGER:Pedro Reyes(212) 925-7300 x264WORLD BUSINESS MEDIA, LLCEdward Tyler, PresidentWASHINGTON CORRESPONDENT:David Bates(301) 270-5396dbates@gsnmagazine.comNicholas RoegnerRobert SchlesingerArpad TothJan WilsonWestern Regional Mgr:Jim Craven(626) 799-0036jcraven@gsnmagazine.comClassified Advertising:Kelly Winberg(215) 723-2861kwinberg@attglobal.netInternational Sales Mgr (Europe):Dave Harvett+44 121 705 2120daveharvett@btconnect.comEditorial Reprints:Jackie DayPhone (651) 415-2329Fax (651) 484-1370jjday@valeoip.comSUBSCRIBER ADDRESS CHANGES:Write to GSN: <strong>Government</strong> <strong>Security</strong> <strong>News</strong>Subscription DepartmentP.O. Box 2037, Skokie, IL 60076-7937If possible, include a copy of a current mailinglabel with your correspondenceor call (847) 763-9617.SUBSCRIBER INQUIRES:Please call (847) 763-9617 or fax (847) 763-9611 or e-mail gsnews@halldata.comPRODUCTION ASSISTANT:Jermaine Brown(212) 925-7300 x297CONTROLLER:Allen Frydrych(212) 925-7300 x206GSN: GOVERNMENT SECURITY NEWS 7 FEBRUARY 21, 2005


Hot <strong>News</strong><strong>Security</strong> sensor market tops $420 million annuallyThe market for chemical, biological,radiological, nuclear and explosives sensorsof all types for homeland security applicationswas estimated at $421.5 millionannually, nearly half of which will be spenton the integration of those sensors intogeographically dispersed networks, accordingto a market research study released thismonth by Civitas Group, LLC, aWashington, DC-based advisory andinvestment firm.The majority of that money – some $305million annually – will be spent on about170 large sensing networks intended tosafeguard geographic regions, cities, largefacilities and transportation systems, saidthe study. More localized uses of approximately20,000 additional sensors, in specificbuildings, at public events, at borders,or aboard aircraft or other transportationmodes, would account for another $80.5million annually. And less expensive personalsensors used by perhaps 300,000individuals, would account for an additional$36 million in annual expenditures, saidCivitas.The study noted that a wide variety ofsensors currently exist to detect threatsranging from chemical weapons (such assarin, VX, hydrogen cyanide, chlorine andmustard gas) to biological weapons (suchas disease-causing bacteria, viruses andWeapons can be categorized by both the severity of destructionthey could cause and the time period during which it is importantto detect their existencetoxins) to radiological weapons (such as“dirty bombs” which can use isotopes suchas cesium-137 or spent nuclear fuel) tonuclear weapons (based on fission orfusion) to explosives (such as C-4, PETN,gunpowder and compounds of ammoniumnitrate and diesel fuel.)The sensors can be divided into categories,depending on whether they candetect the threat before an actual attack oronly after an attack has occurred, a distinctionthe authors referred to as the“window of criticality for sensors.”“The Department of Homeland <strong>Security</strong>has followed this logic and distinguishedbetween ‘detect-to-protect’ and ‘detect-totreat’systems in its sensor-related researchinitiatives,” wrote the Civitas authors,Christian Beckner and Mark Shaheen,saying that “…the former focused onweapons (chemical weapons, explosives)where real-time awareness is necessary,the latter focused on bio-weapons whichare more difficult to detect but do not necessarilyneed to be detected in real-timedue to the lag-time of potential effects.”The study also divides systems accordingto their technological maturity. For example,in the radiological and nuclear arena,it considers handheld Geiger counters andother passive detection systems that werewidely deployed prior to 9/11 to be firstgeneration systems. Second generationsystems, which are now being tested anddeployed, are capable of pinpointingsources of radiation in subways and at bordercrossings, but they are still based onpassive detection technologies. Third generationsystems, which will be able todetect long half-life, low-emission isotopes,such as Uranium-235, will employactive detectiontechnologies,which may rely onemitting radiationinto the environmentin order tospot threateningradiologicalweapons. Suchthird generationsystems “could beproblematic due tothe inherent publicconcern that activedetection systemspose health andsafety risks,” notedthe authors.More than 80percent of the currentR&D spendingby the federalgovernment isfocused on whatCivitas called second generation systems.“Agencies such as HSARPA and theBioWatch Program Office have a mandatefocused on the ‘development’ side of R&D,with the goal of bringing products to marketwithin a 1-3 year time frame…” thestudy noted.Third generation systems, includingthose based on nanotechnology andmicroscopic distributedsensors,known as “smartdust,” are morelikely to be fundedby the Departmentof Defense andprivate sources,than by theDepartment ofHomeland<strong>Security</strong>.These tiny sensorswould formthe backbone ofwidely distributedsensor networks,which could gobeyond the simple notification of an alertoffered by a stand-alone sensor toinclude the use of sophisticated algorithmsand other analytical tools to spot abnormalitieson a city-wide or regional basis.Civitas cited three technology areaswhere it believes the market’s requirementsand potential revenues combineto create investment opportunities: theintegration of sensor data, video feedsThe majority of money that will be spent on sensors each yearwill pay for integrated networks that can monitor regions,cities, large facilities, infrastructure or transportation modesThe National ParkService is planning to teardown three security gatehouseson the White Housegrounds and replace themwith two new ballisticresistantgatehouses in aconstruction project thatwill take a little more thanone year to complete andwill cost between $500,000and $2.5 million.Potential contractingcompanies, which mustpossess a security clearanceat the “Secret” level andhave a facility cleared tostore the constructiondrawings at the “Confidential”level, will beasked to construct ornamentalmetal gates andfencing, retaining walls andsidewalks.The new gatehouses willreplace others located onthe south side of the White House,near State Place and West ExecutiveAvenues; not on Pennsylvania Avenue,at 17th Street, where the frequentlytelevised gatehouse is located.“This is just an ongoing effort toand radar signals into broader surveillancesystems that can be linked to lawenforcement and intelligence databases;real-time chemical and explosive sensorsystems, which the authors feel aremore vital than real-time biological sensors;and large quantities of microscopicdistributed sensors, or “smart dust,”which can provide pervasive coverage ofan area.White House beefs up gatehousesBallistic-resistant gatehouses could cost up to $2.5Mupgrade the facility,” said BobHumphreys, of the National ParkService. “There may be more gatehousescoming in the future.”Prospective contractors were askedto submit their proposals by Feb. 28.FEBRUARY 21, 2005 8 GSN: GOVERNMENT SECURITY NEWS


covering patterns that conform to pre-determinedrules, the software can enable anagency’s analysts to visualize criminal behaviorthat they might otherwise miss.The FBI is aware of this type of bust-outscheme as a possible source of terrorismfinancing, says Visual Analytics’s Westphall.“Everything that generates money is a poten-Hot <strong>News</strong>Visual Analytics helps feds crack financial “bust-out schemes”Now you can add “bust-out schemes” tothe growing list of fraudulent and criminalactivities that have caught the attentionof government financial agencies atleast in part because they could provideillicit financing to terrorist groups.Bust-out schemes occur when one or moreindividuals with criminal intent steal or “borrow”a slew of valid credit cards (or apply forbogus cards with stolen social security numbers).They pretend to be legitimate businesses,set up phony merchant accounts withbanks that agree to process their credit cardpurchases, and use their ill-gotten creditcards to rack up thousands of dollars in fraudulentpurchases. After receiving paymentsfrom banks across the country for those supposedpurchases, the phony merchants oftendisappear before anyone can discover that the“purchases” were completely bogus.Individual banks often become awarethat they’ve been victimized by such bustoutschemes when they learn that manydifferent cardholders all claim that theircards were used by a single suspicious merchantwithout their authorization. Theseclaims by cardholders are often true, but insome instances, experts say, the cardholdersthemselves are actually part of the conspiracy.They may have “lent” their cards toa middleman, for a fee, and agreed to disavowany purchases that may later show upon their account statements.The FBI, in turn, learns that a bust-outscheme may be taking place when it realizesthat several different banks, fromacross the country, have all filed what arecalled “Suspicious Activity Reports”(SARs), describing similar fraudulentbehavior by the same merchant.A private company, Visual Analytics Inc.,of Poolesville, MD, has developed softwarethat is being used by different federal governmentagencies that monitor financialactivities in an effort to spot patterns of illegalfinancial transactions across the country,including such bust-out schemes. Many ofthese federal agencies have access to SARsand other financial data under the BankSecrecy Act, which was passed in 1970.“The primary holder is FINCEN, theFinancial Crimes Enforcement Network,but you also have the Internal RevenueService, Secret Service, FBI, a lot of theDOD components within the counterterrorismworld,” said Chris Westphall, CEOof Visual Analytics. “Depending on thecharter of the agency that is using our software,they will be looking for patterns intheir data set in different ways. DOD componentsare more interested in terrorism.IRS and FINCEN are more interested inmoney laundering and financial crimes.”Software from Visual Analytics can be usedto identify instances in which the same socialsecurity number is being used by the samemerchant in, say, six different states within agiven period of time. By plotting hundreds ofthousands of individual purchases, and dis-tial funder of terrorism.So this is definitely ofinterest to the agencies,”he told GSN. “It’s one ofthose things that you canset up quickly and teardown very quickly, and it’svery hard to trace.”By pinpointing thebogus use of socialsecurity numbers,Visual Analyticscan identify creditcard scamsGSN: GOVERNMENT SECURITY NEWS 9 FEBRUARY 21, 2005VISUAL ANALYTICS


From Page 1DOD, HHS, DOJ, DOE, DOA, NSF & EPA play homeland security rolesbudget documents that provide at leastnine different ways to measure the apparentgrowth in homeland security spending;some look at gross spending, others look atnet spending; some include DefenseDepartment expenditures for homelandsecurity, others do not; some includespending for Project BioShield, others donot. Nonetheless, in all instances, homelandsecurity spending appears to be movingupward.“To ensure our security at home, the2006 budget increases funding for anti-terrorisminvestigations; border security; airportand seaport security; nuclear and radiologicaldetection systems and countermeasures;and improved security for our foodsupply and drinking water,” said PresidentBush’s budget message released Feb. 7.Though the vast majority of homelandsecurity-related expenditures will be madeby DHS, other departments and agenciesalso participate in the effort to safeguardAmerican citizens and the nation’s criticalinfrastructure. In size order of their expenditures,here is how other departments andagencies will be spending their homelandsecurity dollars:Department of Defense — Most of thePentagon’s homeland defense expendituresrelate to military activities conducted overseas,and preparations for such foreignactivities. The administration noted that$300 million would be requested in thebudget, and a future supplemental, for theFrom Page 1Commander’s Emergency ResponseProgram, to help local commanders dealwith short-term needs such as security,education, healthcare and electricity.The budget and supplemental request willseek funds to procure 8,275 new armoredHumvees, to add armor to 26,000 existingHumvees and to supply body armor to individualsoldiers.Another $750 million will be spent totrain and equip Afghan and Iraqi securityforces to assume responsibility for theirown countries’ security.Department of Health & HumanServices – The 2006 budget provides additionalfunding for the Strategic NationalStockpile of drugs, vaccines and othermedical supplies and equipment whichcould be delivered within 12 hours to thescene of a terrorist attack. These expenditureswill be earmarked for antibiotics totreat anthrax, nerve agent treatments andchemical countermeasures through what iscalled the “Chempack” program.The budget also requests money for anew anthrax vaccine purchased throughProject BioShield.Bio-defense research and developmentactivities at the National Institutes ofHealth will receive about $1.8 billion, ofwhich $50 million will go for the developmentof chemical countermeasures and$47 million will be slated for the developmentof radiological and nuclear countermeasures.Two new DHS offices envisionedThe largest such consolidation proposedin the Bush budget would merge nearly adozen major DHS cargo and identityscreening programs into a new entity calledthe Office of Screening Coordination andOperations (SCO).The budget calls for the new SCO to befunded at $525.5 million and to managethe United States Visitor and ImmigrantStatus Indicator Technology (US-VISIT)Program, which screens international travelersentering and exiting at U.S. ports ofentry; the Secure Flight and Crew Vettingprograms aimed at screening all domesticcommercial aviation passengers and crew;the Free and Secure Trade (FAST) program,which facilitates transport of pre-approvedgoods across the U.S.-Canadian border; theTransportation Worker Identification Card(TWIC) program; NEXUS/SecureElectronic Network for Travelers RapidInspection (SENTRI) for commuters crossingthe border; the Registered Traveler program;Hazardous Materials TruckerBackground Checks; and Alien FlightSchool Checks program.Out of the SCO’s proposed budget, US-VISIT would receive $390 million — ahealthy increase of $50 million, or almost15 percent, over FY05 spending levels.Bush’s FY06 budget calls for a new$227.3 million Domestic NuclearDetection Office (DNDO) that wouldmerge all federal efforts to detect terroristattempts to import or build nuclear or radiologicalweapons for use against the U.S.The proposed budget also would provideDHS’s science and technology directoratewith $127 million to consolidate itsresearch, development, testing and evaluationprograms into a single, as-yet-unnamedoffice.The budget also seeks $49.9 million tobegin establishing regional DHS offices thatwould improve efficiencies and consolidatethe information systems, facilities and operationscenters currently in use by 12 of the22 legacy agencies that helped form DHSin 2003.Among the other significant fundingrequests in Bush’s FY06 proposed DHSbudget are:$6.9 billion for the U.S. Coast Guard(USCG), an increase of $626 million, or 10percent. Within the Coast Guard budget,the president is seeking a significantincrease — $242 million, or 33 percent —for the Integrated Deepwater System program,aimed at upgrading the USCG’s fleetof maritime vessels and aircraft. AnotherMore on Page 12Another $70 million will be allocated toimprove emergency health care by empoweringthe federal government to purchaseand store deployable medical care units.These units, which could be deliveredquickly to an affected area, will includeemergency medical supplies and equipment.About $1.3 billion will help bolster thepreparedness of hospitals for terrorist-relatedemergencies, of which $25 million willhelp establish a competitive demonstrationprogram to test the emergency care capabilityof one or more hospitals in metropolitanareas.The Food and Drug Administration,which falls under HHS, will get $30 millionto help prevent and mitigate food contamination,and to develop tests to identifysuch contamination quickly, in conjunctionwith the departments of agriculture andhomeland security.A network of food laboratories will getadditional funds to analyze food samplesmore quickly, identify disease outbreaksand process a surge in food samples thatwould be expected immediately after a terroristincident.Department of Justice – DOJ made1,428 counterterrorism-related arrests, andprosecuted and obtained convictions in497 terrorism-related and anti-terrorismcases, according to the OMB. “The president’shighest priority for the Departmentof Justice continues to be the detection,prevention, investigation, and prosecutionof terrorist attacks against U.S. citizens andinterests,” said the administration’s budgetdocument.While the overall Justice Department suffereda budget cut of nearly $1 billionbetween FY05 and FY06, the FBI will faremuch better. The president’s FBI budgetrequest increased by 11 percent from itsFY05 level to $5.7 billion in FY06. Thislevel of spending would provide new fundingof $294 million for counterterrorismand counterintelligence initiatives, as wellas $117 million to bolster intelligence programs.Other expenditures at DOJ will includean increase in the number of agents dedicatedto terrorism investigations, a doublingMore on Page 12Homeland <strong>Security</strong> Funding By Agency(Budget authority in millions of dollars)2004 2005 2006Actual Enacted RequestHomeland <strong>Security</strong> Funding:Department of Agriculture 411 600 704Department of Commerce 125 167 183Department of Defense-Military (DOD) 7,024 8,570 9,513Department of Energy 1,364 1,562 1,666Department of Health and Human Services 4,062 4,230 4,407Department of Homeland <strong>Security</strong> 22,834 24,871 27,331Department of the Interior 83 65 57Department of Justice 2,165 2,678 3,104Department of State 696 824 938Department of Transportation 284 182 192Department of the Treasury 90 101 111Department of Veterans Affairs 271 280 299Corps of Engineers 102 89 72Environmental Protection Agency 131 107 184General Services Administration 79 65 80National Aeronautics and Space Administration 207 218 205National Science Foundation 340 342 344Smithsonian Institution 78 75 87Social <strong>Security</strong> Administration 143 159 178Other Agencies 239 813 288Total, Homeland <strong>Security</strong> Funding, excludingProject BioShield1 40,728 45,998 49,943Less, Department of Defense-Military (DOD) –7,024 –8,570 –9,513Total, Homeland <strong>Security</strong> Funding, excludingDOD and Project BioShield 33,704 37,428 40,430Less, Mandatory Homeland <strong>Security</strong> Funding2 –1,940 –2,225 –2,302Less, Discretionary Fee-Funded Activities3 –3,289 –3,941 –5,890Net Non-DOD Discretionary Homeland <strong>Security</strong>,excluding Project BioShield 28,475 31,262 32,238Plus, Department of Homeland <strong>Security</strong> Project BioShield 885 2,508 —Net Non-DOD Discretionary Homeland <strong>Security</strong>, includingProject BioShield 29,360 33,770 32,2381 Excludes $107 million in supplemental appropriations in 2004 and $16 million in supplemental appropriations in 2005.2 Mandatory homeland security programs include Agriculture Quarantine and Inspections, Border Protection,and Immigration Enforcement.3 Discretionary fee-funded homeland security programs include Visa Processing, Airport <strong>Security</strong>, and Social <strong>Security</strong>physical and computer security measures.FEBRUARY 21, 2005 10 GSN: GOVERNMENT SECURITY NEWS


For more information go to www.info.ims.ca/4755-006


From Page 10 From Page 10New $3 air passengerfee could raise about$1.5 billion in FY2006$1.9 billion would fund the USCG’s discretionaryspending program for ports,waterways and coastal security.$4.7 billion for aviation security operations.This includes air passenger, baggageand cargo screening activities.$3 billion for grants to states and localities.This program would see a significantshift in funds away from formula basedgrants — only $220 million in FY06, comparedto $1.1 billion in FY05 — and intodiscretionary grants — $2.64 billion inFY06, compared to $1.2 billion in FY05.The discretionary funds would be allocatedbased on threats, risks and vulnerabilitiesand would provide $600 million for theTargeted Infrastructure Protection (TIP)program, a new grant program to helpstates and localities protect critical infrastructure,such as ports, energy facilitiesand mass transit systems.$1.29 billion in research and developmentprojects. This amount would increaseDHS’s R&D, acquisitions, and test andevaluation spending by $240 million, or 23percent, over FY05 levels.$669 million for critical infrastructurethreat assessments and protection programs.These funds would be used for variousinformation analysis and infrastructureprotection directorate programs, includingits National Infrastructure Simulation andAnalysis Center, cyber security efforts andthe Homeland <strong>Security</strong> Operations Center,the federal government’s operational nervecenter for managing a domestic incident.$545 million for Transportation <strong>Security</strong>Administration support. This includes fundsfor information technology, intelligence andhuman resources.$458 million for automated systemsused by the office of Customs andBorder Protection (CBP). Of that total,$321.7 million would be spent on CBP’sautomated commercial environment, aninternational commerce tracking andmanagement system.$385 million for the DHS BiologicalCountermeasures Office, an increase of$22 million, or six percent. The fundswill be used to develop animal vaccinesto protect against the intentional or accidentalintroduction of disease into thenation’s food supply.$292.8 million for the border andtransportation security directorate’s airand marine interdiction efforts. Thesefunds would be used to procure, operateand maintain marine vessels, aircraft andrelated equipment.$237 million for DHS-wide informationtechnology hardware, software, and servicesas well as conversion to narrowband communicationssystems. These investmentswould be aimed at modernizing DHS businesspractices and increasing efficiency.$175 million for the Customs andBio-defense & food labs network garner new dollarsof the size of the FBI’s hostage rescueteam, hiring 500 additional intelligenceanalysts, adding $75 million for theTerrorist Screening Center which consolidatesterrorist watch lists, adding $26 millionto foreign language programs thatenhance the FBI’s language translationcapabilities, and expansion of the FBI’slegal attaché program which places FBIpersonnel in foreign countries.Department of Energy – DOE will seeits overall budget cut, but the security-relatedaspects are likely to grow. For example,the department’s emergency operationsinfrastructure, which helps guard against© 2004 Cherry Corporationradiological or nuclear-based acts of terrorism,will enjoy a 10 percent increase infunding in FY06.As the inventory of U.S. nuclearweapons grows older, the NationalNuclear <strong>Security</strong> Administration will playan increasing role in determining howaging might effect the materials and systemsassociated with such weapons.About $1 billion will be included in the2006 budget for DOE’s participation in the“Global Partnership,” a comprehensiveeffort by the G-8 countries to deal withnonproliferation concerns in Russia andother Newly Independent States. ThisFully Integrated<strong>Security</strong>DevicesEnhance YourAccess Control andIdentity ManagementSystem with… Biometric solutionsto fit your needs High-performance PCSC/EMVsmart card readers Secure PIN entry supportFrom government installationsto corporate PKI applications.For complete productinformation, call or visitour Web site.Cherry Electrical ProductsPhone: 800.510.1689www.cherrycorp.comFor more information go to www.info.ims.ca/4755-007Border Protection agency to procure andmaintain inspection and surveillancetechnology, unmanned aerial drones andreplacement aircraft.$125 million for continued deploymentof radiation portal monitors (RPMs) andpilot testing of the next generation of RPMs.$110 million for continued researchon commercial aircraft countermeasures.These funds are for protectingagainst shoulder-fired missiles.$107 million for research and developmentof countermeasures to chemicalweapons. This includes the creation of astate-of-the-art materials testing facility.Among the seemingly smallest increaseswithin the DHS budget is a proposed $3increase in the aviation security fee paid byair passengers. While the proposed fee hikemay seem small, it would generate an additional$1.5 billion in FY06, “allowing nearfull cost recovery of spending on federal aviationscreening operations,” the WhiteHouse’s FY06 budget document said.®would be a down payment on the $10 billionthe U.S. expects to commit to thispartnership over the coming decade.Also included in the DOE’s budget will be$246 million for the International NuclearMaterials Protection and Cooperation programto secure nuclear material in Russiaand the Newly Independent States. Thesefunds will be used to install intrusiondetection and alarm systems and to constructfences around exposed nuclear sites.A “Megaports Initiative,” in which radiationdetection equipment will bedeployed at key overseas ports to prescreenU.S.-bound cargo for nuclear orradioactive materials will be funded at$74 million in 2006.Another $98 million will help secure andremove nuclear and radioactive materialfrom what the administration calls “someof the world’s most dangerous regions,”such as Iraq, Yugoslavia, Belarus,Uzbekistan, Romania and Libya.The budget also includes $651 million tocontinue efforts to complete the repositoryfor spent nuclear fuel being constructed atYucca Mountain, NV.Department of Agriculture – The FY06budget contains $596 million for theDepartment of Agriculture – along withDHS and HHS – to detect and containintentional and unintentional contaminationof the nation’s agriculture and foodsystem. This represents a $144 millionincrease over the FY05 level.$63 million will be earmarked to expandthe network of interconnected food labsfrom 21 to 60 facilities to improve therapid exchange of data on food risks.Another $59 million will help to completeconstruction of the USDA’s animaldisease research and diagnostic facilitylocated in Ames, IA.National Science Foundation — About$94 million will be earmarked forresearch by the NSF related to cybersecurity, which is critical to safeguardingthe nation’s information technology infrastructure.Of this amount, about $10 millionwill be spent on a “Cybercorps” programto fund grants to undergraduate andgraduate students to study cyber securityand eventually help strengthen the country’sIT security workforce.Environmental Protection Administration(EPA) – A “Water Sentinel” initiativethat will provide monitoring andsurveillance for threat contaminants inthe nation’s water supply system will befunded at $44 million in FY06. An additional$185 million will go to supportother EPA security efforts, including$19 million to enhance EPA’s ability todetect and decontaminate threatagents, $12 million to standardize analyticaltesting methods through anEnvironmental Laboratory Preparednessand Response program, and $106 millionfor training and technical assistanceto states, cooperative research and EPA’sown national response teams.FEBRUARY 21, 2005 12 GSN: GOVERNMENT SECURITY NEWS


Around the CountryOREGONThe Tri-County MetropolitanTransportationDistrict of Oregon (TriMet)is rolling out Melville, NYbasedVerint Systems Inc.’sNetworked Video Solutionto secure certain segmentsof its rail system. Tri-Met, amunicipal corporation providingpublic transportationin the Portland area, operatesa transit network thatincludes a 44-mile light railsystem with 64 stations and93 bus lines that account for300,000 passenger tripsdaily during the businessweek. Verint’s NetworkedVideo Solutions will networkvideo across various locationsand use advanced contentanalytics to pull outactionable intelligence fromboth live and stored video.Verint has partnered withARINC Inc., of Annapolis,MD, the prime contractorand integrator, to providethe solution.NEVADAThe Nevada Commission ofHomeland <strong>Security</strong> in arecent meeting proposed toform a Nevada Homeland<strong>Security</strong> DevelopmentAgency to assist existingcompanies and organizationsto acquire additionalfunding for project researchand development as well asto promote existing privatebusinesses and attract newbusinesses to Nevada.MINNESOTALate last year, a woman in green scrubswith a white lab coat and a stethoscopetooled around the Augsburg Collegecampus in Minneapolis for three daysprofessing to be a healthcare professionaladministering flu shots at $20apiece. About three dozen people lether inject them with an unknown substance,which the freelance nurse latersaid was leftover flu vaccine that shewas using to raise money for herdaughter’s school. Authorities encouragedcitizens to use a modicum ofcommon sense and to be cautious toprotect themselves from such threats.OHIOOhio has received $77.8 million in2005 federal homeland securitygrants aimed at preventing, respondingto and recovering from terroristacts. The money will be splitbetween six programs with $32.7million going to the state homelandsecurity program and another $26.1million going to the state’s UrbanArea <strong>Security</strong> Initiative (UASI). TheEmergency Management PerformanceGrant will get $5.4 millionwhile the Law EnforcementTerrorism Prevention Program willreceive $11.9 million. Another $1.4million will go to the MetropolitanMedical Response System and theCitizen Corps will get $414,727.NEW YORKComputer Sciences Corp. and the Drug EnforcementAgency Museum Foundation recently hosted ArrestingNarcoterrorism: The Technology Summit in New YorkCity. The summit, which featured a blue-ribbon panel ofexperts from media, law enforcement and government,was held in the DEA Museum’s three-story exhibit, “TargetAmerica: Drug Traffickers, Terrorists and You”. It exploredhigh-tech solutions aimed at protecting the U.S. from thedeadly duo of drug trafficking and terrorism. Given prioritywere document fraud detection systems, port securitysystems, biometrics, the ability to provide warnings of vulnerabilityto cyber attacks, advanced warning systems forchemical, biological and nuclear attacks and solutions forimproving the sharing of information.MARK KAPLANNEW JERSEYOn January 19, New Jerseydemonstrated its ability to providecommunications between agenciesin the state. Spurred by theevents of September 11, in whichfirefighters, police and medicalpersonnel could not easily communicatewith each other, thedemonstration unveiled emergencyradio interoperability solutionsand showed how firstresponders could talk with eachother via existing radio equipment.Attorney General Peter Harvey,state police superintendent RickFuentes, and public safety communicationsofficer Raymond Hayling,II, along with representatives fromthe U.S. Coast Guard, New JerseyState Police, Jersey City FireDepartment, Newark PoliceDepartment, Jersey City CMS andothers were on hand for thedemonstration of communicationsamong 12 first responder agenciesusing different radio systems.CALIFORNIAOfficers with the SanFrancisco Bay Area RapidTransit District will use location-basedtechnology fromMapInfo Corp., of Troy, NY,to gain access to informationabout emergency situations.BART police department willintegrate the MapInfo applicationon its desktops with aWeb and wireless offeringthat lets officers obtaininformation and graphics viaBlackberry handheld devices.They will be able to determinethe location of emergenciesalong the 104 milesof BART’s tracks, in the system’s43 stations and onBART property in fourcounties.LOUISIANANew Orleans is deploying a network ofIP-based cameras across the city to helpit fight crime. The Big Easy considered abevy of equipment before deciding onSony Electronics’ SNC-RZ30N camerasas well as the most up-to-date networking,wireless communications, telecommunicationsand fiber optics technology.“With this system in place, it will be likevirtual police patrolling our streets, deterringand fighting crime,” said Mayor C.Ray Nagin. The cameras are mounted onpower poles above city streets, can pantilt-zoom,feature a 25X optical zoom lensand have day/night and wireless abilities.They capture images, which are then digitizedand sent over the city’s network to amain server archive where they are monitoredover the Internet from various locations,including patrol cars and policeheadquarters.FLORIDAJacksonville recently demonstratedthe Sentinel II walk-through traceportal at the JacksonvilleInternational Airport, part of theTransportation <strong>Security</strong> Administration’sfield trial. The TSA willevaluate the performance of thetrace portal, from SmithsDetection, of Pine Brook, NJ, aswell as its impact on terminal operations.The non-invasive walk-throughscanner, passes air over the body torelease particles clinging to a person’sbody or clothing and analyzesthe particles for explosive substances.The equipment wasinstalled in the Jacksonville airportin preparation for the Super Bowl.MARYLANDThe University of Maryland has beenselected by the Department ofHomeland <strong>Security</strong> to lead the newHomeland <strong>Security</strong> Center ofExcellence for Behavioral and SocialResearch on Terrorism and Counter-Terrorism. The agency expects togive the university and its partners$12 million over the next threeyears. The center will consider bothinternational and domestic issuesand will explore the sources of andresponses to terrorism, the psychologicalimpact of terrorism on societyand how to increase the Americanpublic’s preparedness, response andresilience in the face of thosethreats.For submissions to this section, please e-mail detailed information to: around@gsnmagazine.comGSN: GOVERNMENT SECURITY NEWS 13 FEBRUARY 21, 2005


GSN’s Corporate ProfileKontek IndustriesVehicle crashbarrieremployedon-site asperimetersecurityFounded in 1986 and headquartered in New Madrid,MO, Kontek Industries is an innovative technologyleader in the area of homeland security and criticalinfrastructure, and force protection. Its wide-rangingcapabilities and solutions address the most sensitivehomeland security and defense-related challenges inboth the private and public sectors. The companymanufactures the world’s most technologicallyadvanced vehicle and delayaccessbarriers, blast resistant barriers,U.L. L-8, NIJ-4, .50 caliberarmor-piercing guardhouse shelters,and telecommunication sheltersin its 150,000 square-footfacility. Kontek Industries is anSBA-designated HUBZone(Historically UnderutilizedBusiness Zone) company.Kontek’s advantage is driven by itsunique partnership with theUniversity of Missouri. This partnershipis centered around an interdisciplinaryresearch, design, test, and evaluation teamcomposed of the Rock Mechanics andExplosives Research Center and the Department ofCivil, Architectural, and Environmental Engineering atthe University of Missouri-Rolla (UM-R), and theDepartment of Architectural Design and the NationalCenter for Explosion Resistant Design at the Universityof Missouri-Columbia (UM-C). In 2004, Kontek, in partnershipwith UM-R and UM-C, received a $2.4 milliongrant from the Department of Defense for research,engineering development, and deployment of blastresistantbarriers and barrier standards for homelanddefense. Kontek is now in the final stages of full-scaletesting on a newly developed mortar-proof roof and wallsystem that will be deployable in 2005.To date, Kontek has provided over 1,500 modular blastbarriers to the United States Air Force ElectronicSystems Center’s Force Protection Command andControl Program Office. In addition to providing vehicleand delay access barriers to 12 nuclear facilitiesthroughout the United States, Kontek has providedstate-of-the-art critical infrastructure protection to twoof the nation’s most important national security facilities,Lawrence Livermore National Laboratory andSandia National Laboratories.ProductsBlast Barrier Design and Experience – Kontek’sMassive Modular Barriers (MMBs) are designed todeliver a massive, virtually indestructible, physicalsecurity barrier capability. The MMBs were designedto resist bulk high explosives and linear threatweapons. To date, Kontek has provided over 1,500modular blast barriers to USAF Force Protection toprotect critical assets.Crash Barrier Design – Kontek manufactures the onlystand-alone, Department of State-tested and rated K8-L2 and K4-L1 vehicle barriers. The company has successfullyfull-scale tested DOS K4 and K8 crash barriers:K4 (15,000 lb. vehicle at 30 mph); K8 (15,000 lb.vehicle at 40 mph, actual recorded impact 44.6 mph)and has crash tested a 20,000 lb. vehicle at 50 mph forits VK8 and MBB models.Guardhouse Design – Kontek manufactures U.L.L-8, NIJ-4, and .50 caliber armor-piercingbullet and blast-resistant guardhouseshelters. The shelters are constructedfrom steel and have been certifiedto withstand 50-caliberarmor-piercing ammunition,and a 1,000 lb. explosion. Theguardhouses have been fullscaleblast tested at a governmentfacility.TelecommunicationShelter Design – Kontekmanufactures modular concreteand lightweight steeltelecommunication shelters. Theshelters are constructed of structurallightweight concrete.For further information please contactDon Utz at:Kontek IndustriesP.O. Box 98New Madrid, MO 63869Phone: 573-748-5561Fax: 573-748-2828www.kontekindustries.comKontek'svehicle barrierbeing testedagainst a20,000 lb.vehicle at50 mphFEBRUARY 21, 2005 14 GSN: GOVERNMENT SECURITY NEWS


Whether it is the United States Air Force Force ProtectionCommand, Lawrence Livermore and Sandia NationalLaboratories, or 12 of our country’s nuclear powerplants, the nation’s most critical facilities turn toKONTEK INDUSTRIES for state-of-the-art, certified, andproven homeland security and force protection solutions.The latest state-of-the-art solution is the U.L. L-8,NIJ-4, and .50 caliber armor-piercing blast-resistantguardhouse. Successfully tested at the University ofMissouri-Rolla’s (UMR) Rock Mechanics and ExplosivesResearch Center and Tyndall Air Force Base in Florida,through a Department of Defense $2.4 million grantawarded to Kontek and UMR; the guardhouse is certifiedto withstand “armor-penetrating” rounds fired from a.50 caliber BMG sniper rifle, 81mm and 120mm mortarrounds, and a 1,000 lb. explosion.Kontek Industries – providing state-of-the-art, criticalinfrastructure solutions for our nation’s homelandsecurity and U.S. force protectionFIRING PORT HOLESTAND ALONECONSTRUCTIONMAKES THE GUARDHOUSE RAPIDLYDEPLOYABLEwww.kontekindustries.comVisit us at FPED V and seeour products on display.For more information go to www.info.ims.ca/4755-004


ContractsMexican <strong>Government</strong> TransportationAgency Employs DVRs fromMarch Networks for Remote Videoand Transaction MonitoringIssued by:Issued to:Caminos y Puentes Federalesde Ingresos y ServiciosConexos (CAPUFE)Cuernavaca City, MexicoMarch NetworksOttawa, CanadaScope: Digital video recorders andsoftware from MarchNetworks are being used byCAPUFE, the Mexican governmentagency in charge of federaltoll roads and bridges.Supervisors and audit staff areable to monitor in real timearound 31 million transactionsper month at tollbooths inMexico. Controles Electromecanicos,S.A. de C.V. is thesystems integrator for theproject which to date hasinstalled about 100 systems in165 toll plazas.Announced: January 19, 2005SAGEM to Provide BiometricTechnology for Northrop GrummanContract with U.K. PoliceIssued by:Issued to:Northrop GrummanInformation TechnologyHerndon, VASAGEM Morpho, Inc.Tacoma, WAScope: SAGEM has inked an eightyeardeal with NorthropGrumman InformationTechnology to provide biometricidentification technologythat will be used to boost acomputer system in the U.K.that connects more than 50police forces and agencies.Northrop Grumman will integratethe biometric technologyinto the Automated FingerprintIdentification System ofEngland and Wales. It will alsobe folded into the AFIS usedby the Scotland police force.The new system, IDENT1, willlet police search fingerprintsand marks against combineddatabases that include morethan six million ten-printrecords and over one millionlatent prints or marks.Announced: January 26, 2005Expert Microsystems Lands DOI-NBC Contract to Boost <strong>Security</strong>Information Management forSCADA SystemsIssued by:Issued to:Dept. of Interior – NBCFort Huachuca, AZExpert Microsystems, Inc.Orangevale, CAScope: DOI–NBC has awarded ExpertMicrosystems a contract toimprove security informationmanagement for SCADA systems.Expert Microsystemsoffers advanced sensing systemsand software for automatedcondition monitoring ofpower, aerospace, and industrialprocess equipment. Thecompany provides engineeringservices for industrial and scientificsoftware development,computer-aided design (CAD)of industrial and MIL Specelectronics and system integration.Announced: January 26, 2005Navy Buys iMove Wide AreaSurveillance SystemIssued by:U.S. NavyWashington, DCIssued to: iMove, Inc.Portland, ORValue: $720,000Scope: The U.S. Navy has handediMove a contract for aniMove wide area surveillancesystem to be used on anunspecified U.S. naval base.The system offers seamlessvideo coverage of largeperimeters and featuresautomated motion detectionfor up to 100 meters beyondthe perimeter. It also comesequipped with high-resolutionthreat assessment sensors,long-term and realtimerepositories and multipleremote console support.The iMove systems aredesigned to work with existingdetection sensors andintegrate into existing infrastructure.Announced: January 27, 2005Ametek’s ORTEC Division WillDevelop Advanced Portal Monitorfor DHSIssued by:Issued to:Department of Homeland<strong>Security</strong>Washington, DCAdvanced MeasurementTechnology, Inc.Oak Ridge, TNScope: Ametek’s ORTEC business unithas received a first phase contractfrom DHS to develop anAdvanced Spectroscopic PortalMonitoring System. The systemwould be used to detect illicitnuclear materials. The companywill build the new portal on itsDetective and Detective-EXhandheld radioisotope identifiers(HHRIDS). Those units featurehigh-resolution, high-puritygermanium detectors and arecooled by miniature Stirlingcycle coolers.Announced: January 13, 2005CBP Intends to Give Silent Partner<strong>Security</strong> Systems a Contract toSupport DSX <strong>Security</strong> SystemIssued by:Issued to:DHS -– Customs and BorderProtectionIndianapolis, INSilent Partner <strong>Security</strong>Systems, Inc.Marshall, VAScope: The indefinite delivery,indefinite quantity contractto provide supplies andservices to support DSX<strong>Security</strong> System productswill cover one year, with twoone-year options. DSX hardwareis used in facilities inWashington, DC, and northernVirginia.Announced: February 10, 2005<strong>Government</strong> Orders $7.2 MillionWorth of Backscatter Vans fromAS&EIssued to:Issued by:Value:Scope:American Science andEngineering, Inc.Billerica, MAUnspecified U.S. <strong>Government</strong>agencies$7.2 millionThe U.S. <strong>Government</strong> hasordered nine Z Backscatter Vansfrom American Science andEngineering X-ray screeningsystems. The vans come withthe company’s RadioactiveThreat Detection technology thatcan detect nuclear devices anddirty bombs that might be hiddenin vehicles or containers.The company will equip thevans for operations in remoteand harsh environments.Announced: January 19, 2005Customs and Border Protection toGrant Sole Source Contract toWinMagic for Tech Support ofEncryption SoftwareIssued by:Issued to:DHS – Customs and BorderProtectionIndianapolis, INWinMagic Inc.Mississauga, ON, CanadaScope: Customs and BorderProtection intends to awarda sole source contract toWinMagic for technical supportfor SecureDoc DiskEncryption Software and theSecureDoc EnterpriseServer. It is expected to be afirm-fixed price purchaseorder.Announced: February 2, 2005FEBRUARY 21, 2005 16 GSN: GOVERNMENT SECURITY NEWS


PeopleTim Leisman has been namedpresident and CEO ofBorderWare Technologies, Inc.,of Mississauga, ON, Canada.Leisman is a 25-year industry veteranof everything from start-upsto Fortune 50 companies, includingCompaq and DEC. Beforejoining BorderWare, Leisman wasthe president & CEO ofStorability Software. Leisman has a B.A. in economicsand a master’s degree in marketing from the Universityof Massachusetts, Amherst.Kelby Woodard of TargetCorp., of Minneapolis, MN,was elected secretary of theInternational Cargo <strong>Security</strong>Council (ICSC) for 2005. He isdirector of supply chain assetsprotection for Target where heleads the company’s efforts indistribution-center security,supply-chain investigations,global security and theCustoms-Trade Partnership Against Terrorism (C-TPAT) program. Prior to joining Target, he was withthe U.S. Customs Service. A charter member of C-TPAT, Woodard and his team played a vital role indeveloping global security standards. He is alsoactive in the World Customs Organization.Katy Hsieh has become assistantvice president within thefinance department atUSProtect, of Silver Spring,MD. For more than threeyears, Hsieh has implementedsoftware conversions for payrolland scheduling, assistedwith payroll functions and supportedpricing proposals. Shealso has been instrumental in supporting operationsthrough recruiting and staffing during projectstart-ups. In her new role, Hsieh will coordinatepricing proposals and administer contracts andinvoices. She is a graduate of Johns HopkinsUniversity.Continental Instruments, Inc.,of Amityville, NY, has promotedGene Cronin to product/salessupport manager. He will continuein his training functionand will also develop and maintainliterature, documentationand product specifications.Cronin will also serve as theprimary channel between customers,sales reps, technical support, software developersand engineers.Donald Cannon, director ofcampus safety and security forJohnson & Wales Universityhas been named to the strategicplanning committee of theNorth Miami PoliceDepartment to help set thegoals and objectives of thepolice department for the nextfive years. As director of campussafety and security at J&W’s Florida campus,Cannon oversees the enforcement of the university’scode of conduct. He educates students, faculty, andstaff on the importance of security measures.Previously, Cannon was a police detective for morethan 20 years and specialized in investigating hatecrimes and street gang-related incidents. He wasone of four officers nationwide to receive theKennedy Center “Heroes in Blue” award for hisachievements.Clearswift Limited, of RedwoodCity, CA, has appointed GregHampton as its new general managerfor the Americas. Hamptonbrings more than 20 years experiencefounding, growing and successfullyrunning profitable ITcompanies to Clearswift.Hampton will be responsible forClearswift’s operations in theU.S., Canada and South America.MDI <strong>Security</strong> Systems, of SanAntonio, TX, has named MichaelGarcia as vice president ofworldwide marketing and productmarketing. He will focus onexpanding and strengthening thecompany’s global market presencewith responsibility for allmarket strategy, branding, productmarketing, corporate marketing,field marketing, marketing communications andpublic relations activities. Garcia will report directly tocompany CEO and president J. Collier Sparks. Garciawas the founder of the FBI’s InfraGard Alamo Chapterin 2001, a founding member of the NSA AccreditedCenter for Information Assurance and <strong>Security</strong> (CIAS)at the University of Texas at San Antonio and a foundingorganizer of the Information Technology and<strong>Security</strong> Academy at Kelly, TX.Nicole Deschler has been namedas VOC/ Dealer program managerfor Group 4 Technology, ofTewkesbury, UK, a leading developerof advanced technology securitymanagement programs.Deschler is the first employee tobe hired under Kim Loy, the company’snew vice president of marketing.Deschler has worked inthe security industry for the past four years, most recentlyas channel marketing manager at GE <strong>Security</strong>.Shavlik Technologies, LLC, of St.Paul, MN, has hired RickGreenwood as chief technologyofficer. He will be responsible forproviding technical leadership inthe planning and direction oftechnology projects for the companyand for Shavlik’s technologypartners.For submissions to this section, please e-mail detailed information to:people@gsnmagazine.comFor more information go to For more information go to www.info.ims.ca/4755-008GSN: GOVERNMENT SECURITY NEWS 17 FEBRUARY 21, 2005


One-on-OneJames Gilmore III,former governor of VirginiaJames Gilmore III is a former governor of Virginia (1998–2002) and the former chairman of the“Congressional Advisory Panel to Assess Domestic Response Capabilities for Terrorism Involving Weapons ofMass Destruction,” which is such a mouthful that most people simply called it the Gilmore Commission.That panel spent five years studying a wide variety of homeland security issues and delivered five annualreports to the president and Congress. As its chairman, Gilmore earned a national reputation in the field ofdomestic preparedness. He has also been chairman of the Republican National Committee (2001–2002) andis currently a partner with the Kelley Drye & Warren LLP law firm in Washington, DC. On a recent visit toNew York City for a symposium on the connection between narcotics trafficking and terrorism, sponsored byComputer Sciences Corp., Gilmore spoke with GSN’s Jacob GoodwinGSNWhatbringsyouto New York City?heart oftoday’s issue is toJGThefocus on thepotential for traffickingin narcotics to fund terroristactivity. We’retalking about major,giant organizations thatare trafficking in majornarcotics. They maketremendous amounts ofmoney and they’recriminals of the most serious nature.They’re also people that are anti-governmentin their own countries, so as a resultthere is a real likelihood of interaction andcommunication back and forth, and thedanger of terrorism inside the United Statesbeing funded through drug money.MARK KAPLANevidence do we havethat illicitly gained narcoticsmoney is finding its GSNWhatway into the hands of active terrorists?we have all kinds of evidence.The Afghani economy, forJGWell,example, is very heavily intopoppy growth. That’s something thathas to be addressed and dealt with. Wehave evidence that Osama bin Ladenhas, in fact, had connections with peoplewho deal in this kind of area. Wehave of course the Taliban and theirconnection with much of this as well.We have the Shining Path’s history ofdoing business on drugs.But the real need is to know as muchabout this criminal enterprise andactivity as possible because it is a majorinternational source of illicit funds,which then can be used for weaponry.There was an incident where peoplewho were cocaine dealers were tradingtheir cocaine in return for anti-personnelor anti-aircraft missiles. That kindof issue has to be addressed and dealtwith by the FBI and our foreign intelligencepeople.We need to find the proper technologyand methods, and put systemsinto place to protect our borders tomake sure that drugs –and the peoplewho traffic in them –can’t get acrossthese borders, poison our kids, andmake the kind of money necessary tofund terrorism.fifth and finalreport, your commissionGSNIn itstalked about a return toa “New Normalcy” in America.What did you mean by that?commission in its fifth andfinal year was very concerned thatJGThebasically we were going to alter theentire structure of American society inorder to meet the terrorist threat. Thatcivil freedoms might be impinged upon,that privacies might go out the window,that we would be living in a constant stateof terror and tension, that sacrifices weregoing to have to be made that may nothave even been necessary based upon fearand uncertainty, and that this couldpotentially even change the national characterof the United States, which is a verystrong, forward looking, optimistic, sunnytype of society with lots of opportunityand hope and dreams for people. And thatterrorists could throw a blanket on that.So, the thinking behind the ‘NewNormalcy’ is that we need to understandwhat the real threat is, make systemicplans to protect this country so that wecan meet the real challenge and then recognizethat, internalize it, and get on withour lives. We don’t need to live in uncertaintyall the time. We know, for example,that we need to have a national plan thatwe need to fold into state and local plans.We know that we need to make decisionsabout the proper expenditure of money.We know we have to have the intelligencecommunity talking to each other andworking together in partnership. And weknow we have to place an emphasis oncivil freedoms in this country.Once we have done those things, we canmove back to a more normal state of affairsin this country, recognizing that we cannotprotect against all types of attacks. But, ifwe can protect the country within a reasonablelevel of threat that can be anticipated,we can get back to a more normal life.There comes a time at which we have tobegin to calm the minds of the Americanpeople.that there is now aDepartment of HomelandGSNGiven<strong>Security</strong>, with a cabinetmember as secretary, is there a rolefor a White House Advisor onHomeland <strong>Security</strong>?nothing wrong withhaving someone in the WhiteJGThere’sHouse to discuss the majorissues with the president of theUnited States. The president has tolead in this area. He is leading in thisarea and he has to have somebodythere at his side on his personalstaff. But, I believe the presidentshould use, as his major advisor, theSecretary of Homeland <strong>Security</strong>. Andthis has to go beyond just the WhiteHouse and the Department ofHomeland <strong>Security</strong>. You have to foldPHOTOS BY MARK KAPLANin the states, the locals and the privatesector.was your reaction toMichael Chertoff’s nominationas DHS GSNWhatsecretary?you believe that the way todeal with issues in the homelandJGIfis the law enforcement model,then Michael Chertoff is the rightselection. If you are going to arrest terrorists,put them in jail, and try themunder American criminal law, he’sexactly the right person to do that typeof work. So we may be shifting to amuch more domestic type of policythan we’ve seen in the past. And I’mglad of that.I think that if we were to go back to amilitarization of homeland security andthe more active intervention of the military,for example, inside the homeland,this would be a disturbing direction.But, if you begin to deal with it in away that you can protect the homeland,do the kind of investigations, coordinatewith domestic and foreign intelligence,protect the homeland internally,while at the same time protecting civilfreedoms, then the rule of law is goingto be a necessary foundation for that.military action morecommonly on the foreignGSNIsn’tside of the equation?external pushing back of theenemy in foreign countries,JGThediminishing their capacities,depriving them of their refuges andtheir safe havens –that is an outwardbound, military approach that has to becoordinated by the policy of the UnitedStates and supported by the military.But here, within the homeland,you’re dealing with American citizens,as you conduct these investigations andthe world that the American citizenlives with. So, as a result, I thinkMichael Chertoff is going to work outfine on this. I don’t think he’s done thisbefore. I don’t think he has engaged inpolicy debate before. I don’t think thathe’s aware of all the ins and outs thathave gone on with DHS. But there aretwo points: number one, by training heis a lawyer and I believe that the rule ofFEBRUARY 21, 2005 18 GSN: GOVERNMENT SECURITY NEWS


law is going to be stronger in thefuture, and number two, he absolutelyis part of the inner circle of the WhiteHouse. That’s good because it gives thepresident someone that he can look to.He has picked as secretary somebodyhe considers to be in his inner circle.GSNI recall your name beingmentioned as a possiblecandidate for DHS secretary.Would you have considered it?JGI never discuss any process thepresident might go through withrespect to who he’s looking at orwho he’s talking to. But, on the otherhand, I would have considered theposition, to be sure, because I think itis very central to the future of thiscountry and it certainly would havebeen a good opportunity.still a deputy secretaryposition available.GSNThere’sI never discuss anything thepresident’s doing, but I don’tJGAgain,believe I’m interested in that kindof position.view, what is thecorrect potential role forGSNIn yourthe U.S. uniformed military– the Army, Navy, Air Force,National Guard and Reserves – inhelping with domestic security hereinside the United States?I have some very specificviews on that. First of all, our commissionstudied JGWell,thatquestion for years. Webelieve that the first respondersshould always be yourlocal police, fire, rescue,emergency services. If theyneed help to support them,we want to turn to theNational Guard which isgoverned by state authoritiesuntil nationalized, at whichpoint those same authoritiesbecome federalized.We think that the stateswould and should welcomespecialty organizations fromthe military to deal especiallywith matters of weapons ofmass destruction or somethingof that nature. Webelieve that the regular militaryshould be engaged inthis business inside thedomestic United States only as a lastresort.GSNIf there were to be a terroristattack with mass casualties,would you deem that tobe a last resort?maybe so. But, we wouldaspire to see a day when localJGToday,responders would be properlyengaged in this business and properlytrained to deal with even a mass casualtysituation. After all, the ambulancesare going to be the ones that move thepeople. And, if you need a lot of peopleinvolved, we believe, the NationalGuard will be equipped and trained toserve that role. The regular military cancertainly do it, and until we get up-andrunning,they might in fact be the peoplethat the president would turn to.But we have to remember that thePosse Comitatus rule prevents theUnited States Army and the regularmilitary from conducting themselves ina domestic setting, and I support that.Except in the instance of weapons ofmass destruction, where there’s anexception to the Posse Comitatus ruleand it is contemplated that the regularmilitary would come in on such a basis.But I still believe that the correctmethod, which our commission discussed,is: first responders, NationalGuard and regular military only as alast resort.GSNDo you think the currentadministration has setclear priorities in the fieldof homeland security?the secretary of DHS hasjust set out a national plan inJGWell,the last several weeks, which Ihave not yet reviewed. I think they’removing in the right direction and tryingto set those priorities. But, I thinkyou have to go back to first principles,“We should, in fact,have a framework intellectuallyand policy-wisewhere security in thehomeland and the freedomsof the Americanpeople exist side-byside,and you don’t tradeone off for the other.”as our commission did. You have tolook for the likelihood of an attack.Then, you have to look at what ismost dangerous. For example, a bioattack or a nuclear attack – eventhough they are less likely – they areso dangerous that at least you have toprepare for those eventualities. Onceyou see exactly what the threat is,you can begin to address the properway to deal with it, within theAmerican context. That is what stillneeds to be finished up, in my view.sense that theadministration has putGSNDo yousuch an overall prioritizationof vulnerabilities and preparationsat the top of its “To-Do”list?JGI think they do. That’s whythey came up, once again, witha new implementing plan severalweeks ago. The final plan has tobe something that allows states andlocals to set some priorities that canbe tailored to each state. It doesn’thave to be ‘one size fits all’ fromMaine to California. It can be a differenttype of approach state-bystate.But at the same time, I believethere has to be some over-archingidea of what the threat is, and how weshould be prepared to meet that threat.GSNDo you have one finalthought?actually. First, we have tofind better ways to engage theJGTwo,private sector in the business ofhomeland security. They have knowledge,the experience, and the capital.And they need to be engaged, both aspeople who have to protect their criticalinfrastructure – their own plants,their own facilities, their own telecommunications,their own pipelines – butin addition to that, companiesthat can engage inimplementingthese plans.Industry has to goforward in a veryvigorous way anda lot of that isgoing to be drivenby governmentmoney. But a lotof it can be drivenby private moneyas well. That’swhy I’m involvedwith ComputerSciencesCorporation,because they’reone of the companiesthat areengaged in seekingthis business,particularly inborder protection.Second, I believe wehave to absolutely bededicated to the simplefreedoms of thiscountry as we gothrough this process.There’s a lot of dis-cussion about balancing and tradingoff. I believe we should not balanceand trade off. We should not strikethe right balance. We should, infact, have a framework intellectuallyand policy-wise where security inthe homeland and the freedoms ofthe American people exist side-byside,and you don’t trade one off forthe other.Now, that’s more challenging. It’seasier to trade off. That way you canimplement fast, but you give up somethingin order to achieve security, andI don’t believe we should do that. Ithink Americans need to do this thehard way and make sure we have securityand freedom.For more information go to www.info.ims.ca/4755-009GSN: GOVERNMENT SECURITY NEWS 19 FEBRUARY 21, 2005


New Products, Systems& Related ServicesPHYSICAL SECURITYExtreme CCTV Advanced Dome Camera Is Vandal-ResistantExtreme CCTV Inc., of Burnaby, BC, Canada, has unveiled what it calls itsmost technically advanced Hi-Impact IntegratedDay-Night (IDN) dome, the EX40MNX. The camera,an all-weather, vandal-resistant fixed dome,melds a number of Extreme’s latest imagingtechnologies. The EX40MNX features a photocell-controlledmechanical filter whichhelps it provide “brilliant” color during theday and is sensitive to infrared at night. Thecamera also sports spatially optimized LEDswhich deliver evenly distributed night visionup to 35 feet for images and clarity underzero lux. The EX40MNX uses Extreme’s LXRCCD technology for day-night performance andcomes with local video out, pan-tilt-twist gimbal,conduit compatibility, and 4.0-8.0mm varifocal auto-iris lens and otherenhancements.For more information go to www.info.ims.ca/4755-011IT SECURITYVidient’s SmartCatch 2.0 Video Surveillance Software IdentifiesThreats in Complex EnvironmentsVidient, Inc., of Sunnyvale, CA,has announced the availability ofits SmartCatch v2.0 video surveillancesoftware that can identifyand analyze threats in complexsecure environments, suchas major transportation facilities,corporations, public institutionsand government agencies.SmartCatch offers access control,perimeter monitoring andasset protection. Unlike competitiveproducts, it can identify multiple objects correctly and assess whethercertain behaviors should be considered suspicious, says Vidient. That abilityis programmed using patent pending video algorithms, reduces false-positivereadings, and then sends an alarm to the appropriate responder.For more information go to www.info.ims.ca/4755-014BW Technologies Gas Monitor Can Detectand Monitor Multiple GasesBW Technologies Ltd., of Calgary, Canada,has taken the wraps off the GasAlertMicro5.The new monitor is rugged, water-resistant andcapable of simultaneously monitoring up to fivegases including combustible gases, such as H2S,CO, O2, and other toxic gases including ammonia,chlorine and phosphine. Other features includeoptional data logging, a motorized pump, multi-languagesupport, and a variety of power choices.For more information go to www.info.ims.ca/4755-012Non-Lethal Cobra StunLight Can Be Fired Multiple TimesSecure Risks Ltd., of Newport Beach, CA, a division of Universal GuardianHoldings, Inc., ofLondon, UK, has releaseda line of non-lethal ShieldDefense Cobra StunLightproducts. “The CobraStunlight is the ideal nonlethalproduct for everydayuse by civilian, lawenforcement and militaryin these countries. Ibelieve that the CobraStunlight, which is now available for sale, is a much safer and more versatilenon-lethal device than other products such as the single shot Taser,”stated Dennis Cole, president of Shield Defense. “All of our products canbe fired multiple times without reloading.”For more information go to www.info.ims.ca/4755-013For submissions to this section, please e-mail detailed information to: products@gsnmagazine.commyC.R.O. Solutions Provides Execs With Technology to Model RiskmyC.R.O. Solutions, part ofUpstream Solutions, Inc., ofMinneapolis, MN, offers chief riskofficers a way to model risk by providinga “what-if” view of how technologychanges can boost or lowertheir technology risk factors on ascale of zero to 100. The model, thecompany believes, is answering aneed for quantifiable measures ofrisk that can then be used to reduce IT vulnerability and can help them to complywith the Sarbanes-Oxley law. The solution targets both external and internal threats.For more information go to www.info.ims.ca/4755-015Applied Identity’s Identiforce Works With ExistingAuthentication and Directory ServicesApplied Identity, of SanFrancisco, CA, has completed$8 million of venture financingto promote the sales and marketingof its products, such asthe Applied Identity identificationpolicy enforcement gatewayappliance (Indentiforce).The appliance works with existingauthentication and directoryservices to cloak network resources, with the exception of those allowedany user or group. Other approaches are based on physical segmentationand enforcement by network addresses. But the Identiforce approach bindsuser identity to use of network resources independent of location, platformor type of connection.For more information go to www.info.ims.ca/4755-016FEBRUARY 21, 2005 20 GSN: GOVERNMENT SECURITY NEWS


CalendarSUNMON TUES WED THURS FRISATF E B R U A R Y 2 0 0 5SUN613MON TUES WED THURS FRIScottsdale, AZ, 360-Degree <strong>Security</strong> Conference, PatchLink, 480-970-1025,Begins: 1/31, www.patchlink.com/360/1 2 3 4Orlando, FL, Immersion Training, SANS Institute, 301-654-7267Begins: 2/3, www.sans.orgSan Diego, CA, Corporate <strong>Security</strong>Roundtable, <strong>Security</strong> Industry Assn.703-683-2075,corporatesecurityroundtable.comAtlanta, GA, Physical <strong>Security</strong> for<strong>Government</strong> Facilities, HomelandDefense Journal, 703-807-2753www.homelanddefensejournal.comNaples, FL, 14th Annual AirportEmerg. Response School, Am. Assn.of Airport Executives, 703-824-0500www.airportnet.org14 15 16 17 18SAT7 8 9 10 11 12San Francisco, CA, RSA Conference 2005, RSA, 888-746-9734, http://2005.rsaconference.com/usTallahassee, FL, Cargo <strong>Security</strong>Legislation Summit, National Cargo<strong>Security</strong> Council, 410-571-7913,www.cargosecurity.comSydney, Australia, SANS Darling Harbor 2005, SANS Institute, 301-654-7267, www.sans.orgWashington, DC, Homeland <strong>Security</strong>Conference, AFCEA, 703-631-6236,www.afcea.orgDallas, TX, <strong>Security</strong> Solutions Seminar,Smiths Detection, 973-830-2037,www.smithsdetection.com, 2/23 OnlyLondon, UK, Homeland <strong>Security</strong>, SMI,44(0)20-7827-6000,www.smi-online.co.uk51920 21 22 23 24 25 26M A R C H 2 0 0 5613Washington, DC, Homeland & Global <strong>Security</strong> Summit,Equity International, 202-756-2244 www.globalsecurity.bz/conferences/1 2 3 47 8 9 10 11 12Arlington, VA, 23rd Annual Govt-Industry Conf on GlobalTerrorism, ASIS, 703-519-6200 www.asisonline.orgChicago, IL, 3/15 only, GrantsWorkshop, Homeland DefenseJournal, 703-807-2753 www.homelanddefensejournal.com14 15 16 17 18London, UK, Protecting CriticalNetworks, Chatham House, 020-7957-5753 www.riaa.orgNew York, NY, Business Continuity &Corp. <strong>Security</strong> Show, FlaggManagement, 212-286-0333www.flaggmgmt.com/bc/default.htm5Houston, TX, through 3/16/05, SANSImmersion Training, SANS Institute, 301-654-7267 www.sans.org1920 21 22 23 24 25 26Singapore, Global <strong>Security</strong> Asia, Info Systems <strong>Security</strong>,44-1959-569297 www.globalsecasia.comGaithersburg, MD, 3/29/05 only,3/29/05 NIST IT <strong>Security</strong> Day, FederalBusiness Council, 800-878-2940www.fbcinc.com/fiscSan Francisco, CA, Physical<strong>Security</strong> for Gov't Facilities,Homeland Defense Journal, 703-807-2753 www.homelanddefensejournal.comOrlando, FL, PSA 2005 Conf & SystemsInteg. Expo, PSA <strong>Security</strong>, 301-694-5243www.psasecurity.com27 28 29 30 3127 28<strong>Government</strong> Event Education/Assn Event Commercial EventFor submissions to this section, please e-mail detailed information to: calendar@gsnmagazine.comGSN ALLIANCE PARTNER EVENTS<strong>Security</strong> Solutions Seminars Feb 23, 05 • Dallas,TX • Smiths Detection • 973-830-2037 • www.smithsdetection.com • T. MacRaeHomeland & Global <strong>Security</strong> Conference • Mar 1-3, ‘05 • Wash., DC • Equity Int’l.• 202-756-5026 • www.globalsecurity.bzInfoSec WorldConference & Expo 2005 • Apr 4-6, ‘05 • Orlando, FL • MISTI • 508-879-7999 • www.misti.com/infosecworldForce Protection Equipment Demonstration V • Apr 26-29, ‘05 • Quantico, VA • U.S. DoD • 703-452-3760 • www.fped5.orgGSN: <strong>Government</strong> <strong>Security</strong> <strong>News</strong> has contracted withLarstan Business Reports to conduct its proprietary“Ad Effectiveness Study” on three different issues of GSNthis year: dated April 18, July 18 and October 24. These studies will allow youradvertisements to be measured by a third party, independent research firm.The results will help you plan your future campaigns.Contact your GSN representative for more information about an upcoming Larstan Ad Effectiveness Study.Orders must be received by the ad closing date of each issue.Book your ads in the April 18th, July 18thand October 24th issues of GSN today.GSN: GOVERNMENT SECURITY NEWS 21 FEBRUARY 21, 2005


“Page 22”Rep. Davis Introduces Identity <strong>Security</strong>LegislationRep. Tom Davis (R-VA), chairman of theHouse <strong>Government</strong> Reform Committee,has introduced stand-alone identity securitylegislation that lays out minimumstandards under which the federal governmentwould accept drivers’ licensesand state-issued identification cards. Thecommittee and the full House alreadyapproved the language last year as part ofthe “9/11 RecommendationsImplementation Act,” which was createdto address the shortcomings pointed outby the 9-11 commission. The licensesecurity provisions were a point of contentionduring the 108th Congress and awatered down version was in the conferencereport signed into law last year. Thisstand-alone bill seeks to set downstronger guidelines and regulations andestablish rigorous proof of identity.House Readies for Bipartisan Attackon SpywareCalling spyware a “trespass-like offense,”House Energy and CommerceCommittee chairman Joe Barton (R-TX)said legislation “is on a fast track, and wehope to be marking this up in the verynear future.” Barton chided the Senatefor not passing the bill last year. “I hopethat will not be the case this year,” hesaid. The new legislation, HR 29,“includes penalties for nefarious practiceslike keystroke logging and ‘phishing’,” saidConsumer Protection Subcommitteechairman Cliff Stearns (R-FL).TSA Enters Second Phase of ItsHazmat Threat Assessment ProgramThe Transportation <strong>Security</strong>Administration (TSA) entered the secondphase of its Hazmat Threat AssessmentProgram by fingerprinting commercialtruck drivers who apply for hazardousmaterials endorsements (HME) on theircommercial drivers licenses issued bystates. The first phase of the programincluded security threat assessments of2.7 million hazmat drivers. In phase two,the FBI will examine the drivers’ fingerprintsto check for criminal history andimmigration status. In the third phase,which is scheduled to begin May 31,currently licensed drivers wanting torenew or transfer an HME must also befingerprinted and undergo a backgroundA news roundup from the 22 federal agencies and offices that were consolidatedinto the Department of Homeland <strong>Security</strong>...as well as other government unitscheck. The USA Patriot Act forbidsstates from issuing, renewing or transferringan HME unless the driver undergoessuch checks. The HME must berenewed every five years.USDA Web Site Offers Information onAnimal Identification SystemThe U.S. Department of Agriculture’sAnimal and Plant Health InspectionService (APHIS) has kicked off a newWeb site that lets stakeholders knowabout the national animal identificationsystem, or NAIS. The site, atwww.usda.gov/nais, provides nationalnews and contact information for stateand tribal animal health authorities.Each facility that manages or hold animalsis assigned a unique identificationnumber by the state or tribe responsiblefor that area. Eventually APHIS will addresources aimed at specific industry segmentsand animal species. The USDAsite is part of an effort by the departmentto give animal health officials away to identify all animals and premisesthat have had some sort of contact witha foreign or domestic animal diseasewithin 48 hours. In some cases, theoutbreak of diseases among animalscould be an early indication of a bio-terrorismattack.ASTM International Subcommittee onDecontamination Leaps Ahead withStandards DevelopmentASTM International SubcommitteeE54.03 on Decontamination has beendeveloping standards rapidly since ameeting in June 2004, the subcommitteeannounced recently. Duringthe meeting, a wide variety of representativesfrom private industry, governmentagencies, standards groups,emergency response teams and themilitary contributed their know-how,allowing the subcommittee to acceleratestandards development. Duringthe meeting in Kansas City, MO, atask group was formed which organizedthe standards development intofour key areas: biological agentdecontamination, chemical agentdecontamination, radionuclide andnuclear decontamination, and massdecontamination operations. Sincethe meeting, four proposed new standardshave emerged.U.S. Customs and Border Patrol Agentsto Wear New DuPont Kevlar VestsNew Kevlar Comfort XLT technologyfrom DuPont Corp., of Wilmington, DE,has made its way into vests worn by theU.S. Customs and Border ProtectionBorder Patrol. In a multiyear agreement,the government agencies will outfit agentswith the vests that weigh 25 percent lessthan current models. While lighter, thevests can still withstand the same level ofballistics assault as their heavier counterparts.“For CBP Border Patrol agents,many of whom spend all day on their feetworking in extreme weather conditions,Kevlar Comfort will provide the protectionthey need without sacrificing the freedomof movement required to do their jobseffectively,” said Bill Harvey, vice presidentand general manager of DuPont AdvancedFiber Systems.DHS Cyber <strong>Security</strong> R&D Center toHost Forum on Emerging <strong>Security</strong>TechnologiesThe DHS Cyber <strong>Security</strong> Research andDevelopment Center will hold an emergingsecurity technology forum inArlington, VA, on April 13–14. The conferencewill focus on technologies thatfight or guard against distributed denial ofservice and worm attacks. Small andmedium-sized businesses will presenttechnologies to those who must incorporatenew technologies into the governmentinfrastructure, including governmenttechnologists and technical managers.The presentations will be directedtoward senior and mid-level technologymanagers who have purchasing authorityfor technology to defend against DDOSand worm attacks. Vendors will be able todemonstrate their technologies followingthe presentation period.CDC Awards Contract for SupportServices to URS Corp.URS Corp., headquartered in SanFrancisco, CA, has landed a contract toprovide scientific, professional and engineeringsupport services to the Centers ofDisease Control and Prevention’s NationalPersonal Protective TechnologyLaboratory (NPPTL). The NPPTL spursthe development, certification, deploy-ment and use of personal protective gearin an effort to prevent work-related injuryand illness. The one-year base contractcomes with four one-year options andcould be worth $11 million during thenext five years.DHS to Use RFID Tags at BorderThe US-VISIT program run by theDepartment of Homeland <strong>Security</strong> thissummer will begin testing the use of radiofrequency identification (RFID) tags thatwill be given to foreign visitors to the U.S.who arrive by foot or vehicle at five differentborder entry points in three states.The RFID tags will be able to capture,store and automatically transmit serialnumbers that will identify individual visitorswhen they depart from the U.S.The goal is to shorten the length oftime it takes when a visitor exits the country,while maintaining accurate records ofwhich visitors have left the U.S. andwhich still remain in the country. Testingwill begin by July 31 at the ports ofNogales East and Nogales West inArizona, Alexandria Bay in New York state,and Pacific Highway and Peace Arch inWashington state. The “proof of concept”phase is expected to continue through thespring of 2006, according to anannouncement in January by then UnderSecretary of DHS for Border andTransportation <strong>Security</strong> Asa Hutchinson.“Through the use of radio frequencytechnology, we see the potential to notonly improve the security of our country,”said Hutchinson, “but also to make themost important infrastructure enhancementsto the U.S. land borders in morethan fifty years.”The RFID tags will safeguard sensitiveinformation, said DHS, by including onlya serial code that would link to an individual’spersonal information that wouldbe securely stored in databases used bythe US-VISIT program. No personalinformation will be included on the tag,the tags will be activated only after theyare officially issued, and information willonly be processed over secure communicationspaths, said the department.“These factors will render ineffective socalled‘skimming,’ the use of unauthorizedreading devices to capture informationfrom such tags,” the DHS announcementsaid. “A serial code would be meaninglessto any third party trying to collectthat information.”For submissions to this section, please e-mail detailed information to: page22@gsnmagazine.comFEBRUARY 21, 2005 22 GSN: GOVERNMENT SECURITY NEWS


Business OpportunitiesRecent and upcominggovernment solicitationsEPA Seeks Support Services forNew Water <strong>Security</strong> DivisionBuyer:Scope:Status:Contact:U.S. Environmental ProtectionAgency (EPA)Contracts Management Office26 W. Martin Luther King DriveCincinnati, OH 45268The EPA needs a contractor toprovide technical, analytical andregulatory support regardinghomeland security issues for theOffice of Water, Office ofGroundwater and DrinkingWater, Water <strong>Security</strong> Division.The contract, if all options areexercised, is expected to lastfive years and include up to860,000 direct labor hours. TheWater <strong>Security</strong> Division is a newarea within the agency.The solicitation is expected to beissued around April 15, 2005,and the contract should beawarded August 10, 2005.Contracts Management Division26 W. Martin Luther King DriveCincinnati, OH 45268Homeland <strong>Security</strong> CenterSeeks to Build Consortia toResearch and Educate onPreparedness and ResponseBuyer:Department of NavyOffice of Naval Research800 N. Quincy St.Room 704Arlington, VA 22217Status: The Department of Homeland<strong>Security</strong> Center, along with others, isseeking to put together consortiamade up of institutions, partnersand groups of investigators who canspearhead and sustain a researchand education effort aimed at thestudy of high consequence eventpreparedness and response. Thecenter wants to turn out applicationsrelated to organizational, technicaland educational tools forresponding to high consequenceevents such as acts of terrorism.Status: Responses due April 22, 2005.Contact:Laura Petonito, deputy director,university programs202-254-5840laura.petonito@dhs.govNational Guard Needs TrainedSMEs to Define Its Role inMilitary Support DuringDomestic EventsBuyer:Scope:Status:Contact:National Guard Bureau1411 Jefferson Davis HighwayArlington, VAThe contractor must provide highlytrained SMEs in a variety of functions,among them military, personnelrequirements, logistics, trainingoperational systems integration,civil defense and force development,to define military support fordomestic events. Contractor mustbe able to perform studies, analysesand project management activitiesin support of the ConsequenceManagement Integration Program.A program manager for the projectmust have experience in developingtechnical studies for militarysupport organizations personnelrequirement and secret or highersecurity clearance. The programmanager will be responsible forquality assurance, staff qualificationsand availability.Responses were due by February15, 2005.Brenda Golden, contracting officer703-607-0983Brenda.golden@ngb.army.milICE Mulling EmergencyCommunications SystemsBuyer:Scope:Status:Contact:Immigration and CustomsEnforcementWashington, DCICE is considering current andfuture emergency communicationssystems that can transmitmessages to desktop computers,landline phones andother traditional devices aswell as to wireless devicessuch as cell phones and PDAs.The system should be able toaccommodate 10,000 addressesin a single message andsend messages out in the correctorder.Responses were due February18, 2005.Nancy Ballay, contracting officer609-813-3413609—813-3446 (fax)Nancy.ballay@dhs.govDebra.stuart@dhs.gov (send copy)U.S. <strong>Government</strong> PrintingOffice Needs Experts inAcquisitions and Managementfor Future Digital SystemsBuyer:Scope:Status:Contact:U.S. <strong>Government</strong> Printing OfficePaper and SpecializedProcurement and Sales Division732 North Capitol Street, N.W.Washington, DC 20401The GPO is looking for companiesthat have the experience to providecomprehensive services forthe acquisition planning and managementimplementation of itsfuture digital systems. Interestedparties must submit a capabilitystatement. The future system willtake in, preserve and provideaccess to electronic content fromall three branches of government.Contractor would provide informationsecurity consulting services tosupport the team that developsFDsys requirements.Capability statements were dueby February 3, 2005.Larry Ferezan, procurementanalysis202-512-2010, x1502202-512-1481 (Fax)lferezan@gpo.govTreasury Department EvaluatingVarious Technologies to DeterCounterfeitingBuyer:Scope:Status:Contact:Department of the TreasuryBureau of Engraving and PrintingOffice of Procurement14th and C Streets, S.W.Washington, DC 20228The Bureau of Engraving andPrinting is evaluating technologiesand materials that could beused in U.S. currency to detercounterfeiting. Products of interestinclude ink and ink additives,alternate and traditionalsubstrates such as paper, substrateadditives, design elementsor techniques, diffractive,reflective, laminated or hotstampedmaterials.The solicitation was postedJanuary 26, 2005.Larry McCain, SupervisoryContract Specialist202-874-0133202-874-3135 (Fax)Larry.mccain@bep.treas.govNNSA Seeks <strong>Security</strong> SystemServices for Nevada OfficeBuyer:Value:Scope:Status:Contact:U.S. Department of EnergyNational Nuclear <strong>Security</strong>AdministrationP.O. Box 5400Albuquerque, NM$20 MillionNNSA is looking for small businessesthat can provide securitysystem services to supportits Nevada office. The contractormust be able to performvulnerability assessments aswell as support operationalsecurity requirements andassessments. Qualified candidatesmust also be able toperform physical fitness trainingand other services. Thecontract is expected to spanfive years.Responses were due December8, 2004.Teresa Martinez, contracting officer505-845-4127tmartinez@doeal.govGSA Federal Technology ServiceSeeks Encrypted DevicesSectera Wireline Terminals forU.S. NavyBuyer:General Services AdministrationFederal Technology Service501 Magazine StreetRoom 1033New Orleans, LA 70130Scope: GSA’s federal technology serviceneeds 25 FNBB21 EncryptedDevices Sectera WirelineTerminals that can encrypt bothvoice and data. The compactdevices can interface to a PC orto standard analog desktophandsets. Because the moderatelypriced units are small,they can be used in limitedspaces. Secure calling is virtuallytransparent and voice qualityis clear.Status: Responses are due February 12,2005.Contact:Cheryl Bruza, contracting officer504-589-436Cheryl.Bruza@gsa.govFor submissions to this section, please e-mail detailed information to: opportunities@gsnmagazine.comGSN: GOVERNMENT SECURITY NEWS 23 FEBRUARY 21, 2005


The President’s budget for fiscalyear 2006 was released earlierthis month, and it showed thecontinuing importance of homelandsecurity. In a year of drastically constrainedspending, the Bush administrationis seeking an increase for theDepartment of Homeland <strong>Security</strong>(DHS) of nearly seven percent. Thatis the largest percentage increase forany federal agency except the StateDepartment.Here is a table for comparison.AgencyDHS 6.8%DoD 4.8%State 15.6%The president has said that preventingnew terrorist attacks is a top priority,and a seven percent increaseseems to be consistent with that priority,especially with the rest of thebudget in decline.What’s important to consider,though, are some of the key increasesand their reasons. In many cases,these increases mask serious questionsthat remain unanswered. DHSstill does not know how to set realrequirements or to allocate effectivelyamong competing priorities. Let’s lookat some of those questions.BORDER PATROL AGENTSLast year, over 500 border patrolofficers left their positions, stretchingthe work across an ever-thinnerforce. This is widely seen as a seriousproblem, and the Congress believedit had addressed this issue in theintelligence reform act signed lastDecember.That act authorized an additional2,000 border patrol agents per year,starting in FY2006, and doubling theforce over five years. The presidentsigned the act, but the budget onlyadds 210 new agents, not 2,000.Questioned about this gap, actingsecretary of Homeland <strong>Security</strong> JamesFY2006 increaseover FY2005All Other DiscretionarySpending Minus 1%Bush’s Budget:What You See Isn’t What You GetLoy noted that tough trade-offs had tobe made in a budget constrained bydeficits and that new border patrolagents were among those trade-offs.The problem now goes to Congress.<strong>FIRST</strong> RESPONDER GRANTSThe new budget offers$3.6 billion in state andlocal first respondergrants, not much differentthan last year. Thebig news is that it proposesto change the allocationrules to pushmore money to higherrisk areas and states.That’s nothing new,though. Last year,Congress made seriousattempts to changethose very rules, but those attemptsfoundered on resistance from thestates that would get less moneyunder the new rules. The administrationwas noticeably absent from thatdebate; at the very time it could haveweighed in to push the Republicanleadership to move, it was silent.Why propose the change now? Theidea looks budget driven, rather thana serious attempt to refocus priorities.What will be needed is a firm commitmentfrom the White House to getthis through Congress, or it will dieagain.TERRORIST WATCH LISTSHomeland <strong>Security</strong> Secretary TomRidge spoke last year about thedepartment’s 2004 goals and challengedthe country to hold himaccountable for achieving those goals.He has since departed, but we shouldexplore how the budget meshes withhis promises.First, he promised the consolidationof the terrorist watch lists, from adozen into one. The budget, unfortunately,contains no declaration of successon this promise, and there is littleincrease in funding to achieve it.In fact, there is still confusion overwho is in charge of consolidating thelists. Ridge’s promise last year makessense, because the Homeland <strong>Security</strong>Act clearly designates DHS as thelead. Within the White House,though, the relevant presidentialdirective (HSPD-6) designates theJustice Department (and under DOJ,as of today, the FBI’s TerroristScreening Center) as the lead.How do these efforts fit together?What will be the role of the newDHS Office of ScreeningCoordination and Operation? Howwill they interface with the FBI? Willany of that lead to a single integratedwatch list? No one can answer thosequestions today.CRITICAL INFRASTRUCTUREPROTECTIONSimilarly, Ridge promised to completea full assessment of criticalinfrastructure and what needs to bedone to protect it by the end of2004. What does the new budgetreport?Well, at least critical infrastructureprotection is actually highlightedin the proposed budget. It designates$600 million to “reduce thevulnerability” of such infrastructure.Missing from this analysis,though, is the necessary assessmentof what is most vulnerable, at highestrisk, and with greatest consequence.In addition, this is not newmoney – it’s a consolidation of previousfunds for specific threat areaslike ports, rail and transit, andtrucks, which are areas widelyviewed as under-funded.Recently departed DHS inspectorgeneral Clark Kent Ervin wrote inthe Washington Post that DHS’s toppriority should be to “finish compilinga list of the nation’s most criticalinfrastructure and then rank thesites and sectors according to whichare most at risk of terrorist attackand most vulnerable to it.” Butthere is “no apparent rationale forsome entries other than parochialismand pork,” Ervin wrote. Thatsounds like another promise unfulfilled.THE ROLE OF CONGRESSI noted that Admiral Loy clearlycalled the problem of adding borderpatrol agents a “tough trade-off.”Congress will have to reallocate if itwants to support the intelligencereform act commitment and beef upborder security. How will it be able todo that?Look at the table. Except fornational security, foreign affairs, andhomeland security, the federal budgetdecreases by one percent. SomeRepublicans called the budget “deadon arrival.” Congress will be underenormous pressure to resist thosecuts and to find money to restoresome of them.For homeland security, this will bea tough fight. Each appropriationssubcommittee will get its allocation,and it is unlikely that DHS will get alarger increase than the Bush administrationproposed. Given that, addingborder patrol agents will mean cuttingsomething else within the DHSallocation. The homeland securityappropriations subcommittees in boththe House and Senate will wrestlewith that from now until the bills aremarked up later this spring. It won’tbe an easy task.On balance, then, the new DHSbudget does sustain the trend ofincreasing spending on homelandsecurity. However, it still reflectssome very serious shortcomings:DHS can neither define its real prioritiesnor execute its programs toaddress them. Until those core problemsare fixed, any increases willnever be as meaningful as theyshould be.David Berteau is a defense andhomeland security consultant forClark & Weinstock in Washington,DC, and an adjunct professor forthe Maxwell School of SyracuseUniversity. His 30 years of governmentand business managementexperience include 12 yearsas a senior Pentagon official,serving four secretaries ofdefense. He can be reached atdberteau@cwdc.comFEBRUARY 21, 2005 24 GSN: GOVERNMENT SECURITY NEWS


Wall St. Close-upMARK KAPLANGSN’S HOMELAND SECURITY INDEXVERSUS NASDAQ COMPOSITE AND S&P 500Top 5 Price Gains and Lossesfrom this issue’s Homeland <strong>Security</strong> IndexGAINSLOSSESCompany% GainCompany% LossHomeland <strong>Security</strong>Index(price weighted)S&P 500IndexNASDAQCompositeIndexFirst Advantage............................23.3%Gemplus ......................................19.4%Maximus......................................13.1%Cepheid Inc .................................12.3%American Science & Engineering ..11.4%Taser International –69.9%Symantec –61.5%FLIP Systems –46.7%Unisys –31.9%RSA <strong>Security</strong> –25.7%THE HOMELAND SECURITY INDEX MEASURES FIFTY STOCKS FROM FIVE CATEGORIES:(1) Homeland <strong>Security</strong> Plays: ActivCard (ACTI), American Science & Engineering (ASEI), Armor Holdings (AH), Cogent Systems (COGT), CompuDyne (CDCY),Digimarc (DMRCE), LaserCard (LCRD), First Advantage (FADV), FLIR Systems (FLIR), Identix (IDNX), Mine Safety Appliances (MSA), OSI Systems (OSIS), TASERInternational (TASR), Verint Systems (VRNT), and Viisage Technology (VISG)(2) IT Systems Integration / Gov't Consulting: Affiliated Computer Services (ACS), Anteon International (ANT), CACI International (CAI), Computer Associates(CA), Computer Sciences (CSC), Electronic Data Systems (EDS), ManTech International (MANT), Maximus (MMS), McAfee (MFE), Net IQ (NTIQ), and Unisys (UIS)(3) Defense Contractors: Boeing (BA), Cubic (CUB), DHB Industries (DHB), DRS Technologies (DRS), General Dynamics (GD), General Electric (GE), Honeywell(HON), L-3 Communications (LLL), Lockheed Martin (LMT), Northrop Grumman (NOC), and Raytheon (RNT)(4) Data Integrity / Network <strong>Security</strong>: Check Point Software (CHKP), ChoicePoint (CPS), Gemplus (GEMP), Internet <strong>Security</strong> Systems (ISSX), RSA <strong>Security</strong>(RSAS), Secure Computing (SCUR), Symantec (SYMC), Titan (TTN), Verisign (VRSN), and Watchguard (WGRD)(5) BioTerrorism / Pharmaceuticals: Applied Biosystems (ABI), Cepheid (CPHD), and QIAGEN (QGENF)The “Homeland <strong>Security</strong> Index” historical pricing chart and the price gains and losses chart were provided by Morgan Keegan & Company. www.morgankeegan.comMarketing MovesOldaker, Biden & Belair, DCI GroupJoin VeriChip’s Washington TeamVeriChip Corp., of Delray Beach, FL,has retained both the law firm ofOldaker, Biden & Belair and thepublic affairs firm DCI Group for itsWashington team. The team isresponsible for directing the companytoward a patient-oriented role on privacymatters as well as educatingCongress on VeriChip’s abilities andgenerating revenue from federal agencies.VeriChip provides loss-proof,tamper-proof identification for medicaland security markets.Smiths Heimann Biometrics andAssureTec Sign MOU forID-Validating SystemsSmiths Heimann BiometricsGmbH, whose U.S. offices are locatedin Las Vegas, NV, and AssureTecSystems, Inc., of Manchester, NH,have joined forces to develop andmarket advanced solutions to validateidentity in just a few seconds byauthenticating ID documents. Thecompanies are hoping to combinetheir expertise—Smiths Heimann specializesin high-performance imagingtechnology while ATS is a documentauthentication company—to createnext generation systems for identitychecks at border crossings and attransit points.Corgenix Creates Bio-TerrorismDefense Development Programto Detect Hemorrhagic FeversCorgenix Medical Corp., of Denver,CO, has created a program to developa rapid detection system for viral hemorrhagicfevers that could be used aspotential bio-terrorism agents. Thosefevers are classified by the Centers forDisease Control (CDC) as Category Adiseases, a high-priority category thatincludes anthrax, botulism, smallpoxand tularemia. The company is formingstrategic relationships with industryand academic sources to quicklybring diagnostic and detection systemsto bear. The company hasalready applied for a grant from theNational Institutes of Health to fundthe program, according to a statementfrom company presidentDouglass Simpson.WFI Buys TLA AssociatesWFI, Inc., of San Diego, CA, hasacquired TLA Associates, ofAlexandria, VA, in a deal worthapproximately $34 million. WFI,which designs, deploys and managescommunications networks and securitysystems will use cash on hand to payfor TLA Associates, which offersvoice, data and converged communicationsnetworks to the U.S. DefenseDepartment and federal civilian agencies.When the acquisition is complete,WFI will implement a $15 millionsenior credit facility to be used forfuture acquisitions or general corporatepurposes.Northrop Grumman Puts FinishingTouches on Aircraft Anti-MissileSystemNorthrop Grumman Corp., ofRolling Meadows, IL, will flight testits Guardian commercial aircraftprotection system on both a Boeing747 and an MD-11 later this year.The system, which the companynow says will cost half of what waspublished in recent reports, employsthe same kind of directional infraredcountermeasures technology usedby military systems. The test flightsare part of a bid to gain FederalAviation Administration (FAA) certification.For submissions to this section,please e-mail detailed information to:marketingmoves@gsnmagazine.comGSN: GOVERNMENT SECURITY NEWS 25 FEBRUARY 21, 2005


From Page 1Chertoff gets an earful at confirmation hearingDepartment while Chertoff headed its criminaldivision, suggesting that the nomineehad condoned the use of torture techniquesagainst alleged terrorists held by U.S.forces, or had tolerated the use of overlyharsh detention policies used against immigrantsin the U.S. who were swept up byaggressive prosecutors in post 9/11 raids.Neither of Levin’s accusations seemed torattle Chertoff, whose verbal skills andselective memory lapses served him well.But the nominee appeared to stumble abit when Levin distributed copies of threeheavily redacted FBI e-mails from May2004 in which some senior FBI officialsappeared to express long-running concernsover interrogation techniques used byDefense and Homeland <strong>Security</strong> Departmentofficials on prisoners detained by U.S.forces in Iraq and Guantanamo Bay, Cuba.Although Chertoff was no longer workingat the Justice Department (DOJ) headquarterswhen the e-mails were written, Levinsaid one of the documents referred to meetingsin 2002 in which FBI officials discussedthe interrogation techniques withmembers of the DOJ’s criminal divisionthen headed by Chertoff.When asked directly by Levin if he knewof these meetings, Chertoff appeared lessconfident in his response and unable to givethe senator a firm “no.” Saying he could notrecall discussions of DOD interrogationtechniques, he then began dissecting thewording of the e-mails like a good defenseattorney questioning evidence, suggestingthat the FBI concerns may have focused onthe effectiveness of different interrogationtechniques rather than on the legality ofusing torture.After being introduced by the two fulsomeDemocratic senators from his home state ofNew Jersey, Frank Lautenberg and JonCorzine, Chertoff fielded a wide variety ofquestions – some thoughtful, some fawning,and many parochial – from the members ofthe Senate Homeland <strong>Security</strong> and <strong>Government</strong>alAffairs Committee, chaired by SusanCollins (R-ME).Many of the senatorsasked questions aboutthe Department ofHomeland <strong>Security</strong>’scontroversial formulafor allocating grants tostate and local governments,as a means ofdelicately and indirectlylobbying for additionalfunds on behalfof their states. Thosefrom rural states or states with relativelysmall populations, suggested it makes nosense to earmark funds based on perceivedterrorist risks because all states are at riskand all should be allocated a piece of thehomeland security pie. Mark Dayton (D-MN) said eliminating funding for some areasin Minnesota would be “arbitrary and nonsensical”because “threats are conceivableanywhere.”Lautenberg and Corzine, who agreed thata two-mile stretch in New Jersey betweenthe Port of Newark and Newark LibertyInternational Airport was one of the country’smost vulnerable targets for a terroristattack, spoke more favorably about a fundingallocation formula that took risks andvulnerabilities actively into account.Acknowledging that this is one of the“burning issues” facing DHS, Chertoffseemed to lean toward the more heavilypopulated, more vulnerable states. “My philosophyis a risk-based, vulnerability-basedsystem,” said Chertoff. “I understand thatevery community thinks its infrastructure isat risk,” he said, but quickly added that hepreferred to look at population density, theinfrastructure that serves a particular areaand intelligence reports about potentialthreats. “We ought todeliver a fine-grainedanalysis,” said theHarvard-educatedlawyer who wasrepeatedly praised forhis intellect.A contrary note wassounded by Sen. PeteDomenici (R-NM),who has been in theSenate since 1972. “Idon’t want to join thechorus that says you need more money,”Domenici told Chertoff. “The truth is youcan’t distribute first responder money thatway.” The 72-year-old senator said manyrequests from first responders aren’t justifiedby any genuine risk and that, furthermore,“You can’t eliminate every risk.”Chertoff did his best to placate severalsenators with non-committal support fortheir pet projects without tying himselfdown with many specifics.He agreed to look closely at SenatorWarner’s effort to more generously fund anoffice of the national capital region, whichcoordinates homeland security efforts inD.C., Virginia and Maryland. He alsoagreed, at Sen. Lautenberg’s urging, toexamine the controversial DHS color-codednational warning system with an eye towardmaking it “a little clearer, or less alarming.”When Sen. Robert Bennett (R-UT), anoutspoken champion of Y2K preparations atthe turn of the millenium, talked of theneed for a new assistant secretary positionat DHS to focus on cyber security, Chertoffsaid he would consider it. “I want positionsat DHS to be able to attract people of sufficientquality to be really able to help us,”said the nominee. He went on to envisionthe possibility of a “combined cyber andphysical attack,” in which terrorists firstlaunched a computer-based attack that wasquickly followed by a physical attack.When asked by Sen. Daniel Akaka (D-HI),whether agricultural security was a responsibilityof DHS, Chertoff said he thought agriculturalsecurity was a joint responsibility ofDHS, the Department of Agriculture andother departments, but that “nuclear-biological-chemicalcontamination is probably themost serious threat we face as a country.”Pressed with other apocalyptic scenarios,Chertoff felt obliged to talk earnestly aboutthreats to the nation’s commuter andnational railway systems. Citing the Madridrailway bombings, the recent railroad chemicalspill in South Carolina and the recentderailment in California as a result of anaborted suicide attempt, Chertoff indicated,“It’s hard not to be aware that trains are vulnerableand are attractive targets.”Similarly, he agreed to look at the notion ofaccelerating the Coast Guard’s DeepwaterProgram, under which billions will be spentto upgrade the Coast Guard’s ships, aircraftand other capital equipment. Sen. Collins,whose home state of Maine draws economicstrength from the port of Portland and otherseaports, said some $4 billion can be savedby shortening the Deepwater procurementprogram from 20 years to 10 years, andChertoff agreed to examine that issue as well.After about three hours of respectfulgrilling, Chertoff wrapped up his firstappearance before the Senate panel.From Page 1Washington twofer: Mike & MerylMeryl was equally busy in her role as directorof the State of New Jersey’s Washington, DC,office, strategizing ways to get congressionallawmakers and the executive branch to fundhomeland security projects for the state.“As the governor’s primary Washington contactfollowing the September 11, 2001 attacks,she spearheaded state efforts to secure earmarksand grants for New Jersey homelandsecurity and transportation projects fromCongress and federal agencies as part of thestate’s relief and recovery efforts,” accordingto a brief biography of Meryl posted on the Website of her most recent employer, Trenton, NJbasedlobby and public relations firm Nancy H.Becker Associates.Meryl resigned as the firm’s vice presidentand legal counsel after President Bush nominatedher husband to be DHS secretary.Not only is Meryl, 46, experienced in lobbyingCongress and the agencies, but she also hasworked at the very agency that her husbandnow heads.Indeed, in 2002 Meryl left her position withthe State of New Jersey to become a “disasterresponse branch chief” in the Office ofLegislative Affairs at the Federal EmergencyManagement Agency. In this position, Merylbriefed Congress on various FEMA responseand relief efforts, such as the February 2003Columbia space shuttle disaster and the WorldTrade Center cleanup.As a member of FEMA’s “task force on externalcommunications” she subsequently helpedwith FEMA’s transition into the new DHS in2003.Like her husband, Meryl earned her undergraduatedegree at Harvard (Harvard-RadcliffeCollege, to be precise) and a subsequent lawdegree from Harvard University School of Law.Her degrees were conferred five years afterthose of her slightly older spouse.The two were married in 1988 in what wasMichael’s second marriage. He and his firstwife were divorced in 1981.With the arrival of the Chertoff team in thenation’s capital, Washington could soon see theemergence of what may be the perfect homelandsecurity power couple — Chertoff &Chertoff, highly educated, politically savvy, andpractically old hands in the evolving realm ofhomeland security.From Page 1M. Chertoff - Background checkMafiosi and prosecuting suspected terrorists.His sparse gray beard and balding patealone would make him a stand out on theWashington scene, which tends to valuethe clean shaven, blow-dried look of somany other political appointees. But withhis deep-set eyes, gaunt face, and tallframe, the 51-year-old Chertoff cuts asomewhat foreboding presence that tendsto set him apart from other Washingtonpoliticos.Although he has never run for publicoffice, he has assisted in the campaigns ofvarious local, state and national candidates,according to a biographical statementhe provided to the Senate Homeland<strong>Security</strong> and <strong>Government</strong>al AffairsCommittee, which held a confirmationhearing on his nomination of Feb. 2 andapproved his nomination five days later.Hopefully, Chertoff as DHS secretary willhave more success detecting terrorist plotsthan he has had selecting winning politicians.In 1998 and 1999, Chertoff served as“occasional outside counsel” to the localcampaign organization of Essex County(NJ) Republican executive JamesTreffinger, according to Chertoff’s biographicalstatement to the Senate committee.Chertoff also contributed $500 toTreffinger’s 2000 bid for a U.S. Senate seat.But Treffinger never won a Senate seatand instead went to prison in 2003 afterpleading guilty to federal mail fraud andobstruction of justice charges in connectionwith his awarding government contractsto a firm that helped fund his twofailed Senate campaigns.Chertoff has dabbled in other RepublicanParty politics, as well.In 1996, he raised funds for the U.S.Senate campaign of then-CongressmanDick Zimmer (R-NJ) and even served as awarm-up speaker for Republican PartyContinues on Next PageFEBRUARY 21, 2005 26 GSN: GOVERNMENT SECURITY NEWS


From Page 26presidential candidate Bob Dole at a campaignevent. Both candidates lost theirraces that year.In 2000, Chertoff contributed $1,000to Zimmer’s effort to win back his Houseseat and $500 to the Senate campaign ofRepublican Bob Franks. Again, both ofChertoff’s candidates lost.But in the 2000 presidential race,Chertoff found a winner. In 1999, he andhis wife contributed a total of $3,000 tothe Bush presidential campaign. Chertoffalso provided the Bush presidential campaignwith “occasional advice on criminaljustice issues” and served as vice chair ofBush’s New Jersey finance committee,according to his biographical submissionto the Senate committee.The son of a rabbi, Chertoff graduatedin 1971 from the Pingry School, a privateeducational institution for students fromkindergarten through grade 12.Operating out of two separate campusesin northern New Jersey, the PingrySchool charges tuition — now more than$22,000 a year — rivaling some colleges.In 2004, the Pingry alumni associationawarded Chertoff — by then a federaljudge — with its annual “Letter-In-LifeAward” for his distinguished career andservice to the school, according to hisbiographical statement to the Senatecommittee.From his private high school he continuedhis studies at one of the nation’s premierinstitutes of higher learning —Harvard University.Considered an intense and sharpthinker by friends and colleagues,Chertoff graduated magna cum laudefrom Harvard College in 1975 and magnacum laude again from Harvard UniversitySchool of Law in 1978. Judge Chertoffreportedly was the inspiration for some ofthe characters in writer Scott Turow’s1977 fictional memoir about his first yearat Harvard Law School titled One L: TheTurbulent True Story of a First Year atHarvard Law School.The man who would be DHS secretaryshares a tenuous link with British rockstar Mick Jagger and Venezuelan terroristIlich Ramirez Sanchez, a.k.a., “TheJackal” — all three are alumni of theLondon School of Economics (althoughthey attended the institution at differenttimes).Chertoff has been involved in the philanthropicendeavors of the College Men’sClub of Westfield, NJ, which raises scholarshipfunds for college students.Chertoff has practiced law in both thepublic and private sectors and on bothsides of the legal aisle, at times prosecutingcriminal suspects and at other timesdefending alleged criminals from prosecution.In fact, in 2001, Chertoff heldmemberships in both the InternationalAssociation of Prosecutors and the Associationof Criminal Defense Lawyers.In the course of his legal career in bothpublic and private practice, Chertoff hasestablished a comfortable financial cushionfor himself and his family.According to recent financial disclosurestatements that he was requiredto file — in May 2004 as a federaljudge and in January 2005 as the DHSsecretary nominee — Chertoff’sBernardsville, NJ, home is worth$1.15 million, his vacation home isworth another $300,000, and he ownsmillions of dollars in mutual funds,cash funds, stocks and municipalbonds. His net worth is estimated atabout $4.5 million.Although his investments seem fairlyconservative, some of them presented apotential problem for Chertoff, promptinghim to take precautions against theappearance of any conflicts of interestsbetween his work as DHS secretary andhis financial holdings.Because the DHS secretary would likelybe involved at some level in the allocationof discretionary grant funds to specificmetropolitan regions as well as in decisionson bio-preparedness, Chertoff haspromised the U.S. Office of <strong>Government</strong>Ethics that he, his wife, Meryl, and theirminor children will divest their holdingsin individual municipal bonds and theirstock in Endo PharmaceuticalHoldings, Inc., of Chadds Ford, PA.In a Jan. 21 letter to DHS’ ethicsoffice, Chertoff further promised thathis wife would resign her position asvice president and legislative counselof the Trenton, NJ-based lobby andpublic relations firm of Nancy H.Becker Associates.Although he will lose his lifetimetenure as a federal judge, Chertoffcan look forward to a slight bump insalary when his pay rises from the$171,800 per year he earned on thefederal appellate bench to the$175,700 annually that he will earnas DHS secretary.ISC WEST 2005 | APRIL 6-8, 2005 | SANDS EXPO AND CONVENTION CENTER | LAS VEGAS, NVCODE: GSNSECURITY ISEVERYBODY’S BUSINESS.But for 3 days, it’s all about yours.BOOST YOUR BUSINESS APRIL 6 TH THROUGH THE 8 TH at America’s largest and most attendedsecurity event. ISC West 2005 brings together everyone who is anyone in security for threepacked days of state-of-the-art new products, new trends and technology, great sourcing,and an educational conference that is second to none. When it’s a question of security,the answer is here. You should be too. Secure your place today.REGISTER ONLINE AT WWW.ISCWEST.COM/GSN USING PRIORITY CODE GSN,CALL ISC CUSTOMER SERVICE AT 1-800-840-5602OR EMAIL US: INQUIRY@ISC.REEDEXPO.COMSPONSORED BY:CORPORATE SPONSORS:PRODUCED BY:ENDORSED BY:International <strong>Security</strong> Conference West ® is a registered trademark of Reed Elsevier Properties Inc., used under license. ©2005 Reed Elsevier Inc.WHEN IT’S A QUESTION OFSECURITY, THE ANSWER ISISC WEST:➔ Cameras➔ CCTV➔ Digital Recording➔ Access Control➔ Biometrics➔ Systems Integration➔ Alarms & Monitoring➔ Fire Control➔ Wireless Applications➔ Remote MonitoringGSN: GOVERNMENT SECURITY NEWS 27 FEBRUARY 21, 2005


From Page 1VOIP carries greater-than-expected risksadditional securityweaknesses andavenues of attack,”said NIST’s specialstudy, <strong>Security</strong>Considerations forVoice Over IP Systems,which was written bytwo NIST employeesand an employee ofGerman-basedSiemens AG.The NIST studynoted that becauseVOIP systems sendtheir digitized voice signalsin packets, likeother data signals,many network administratorsincorrectlybelieve that VOIP componentscan simply beplugged into their existingdata networks withno consequence. Thisis not true, said NIST,because traditional elementsof a data network,such as firewallsand encryption, canreduce the quality ofthe VOIP transmission.Standard firewalls candelay or block entirelyoutgoing VOIP calls, so new firewalltypecomponents must be added.CableModemHowever, universally accepted standardsfor such VOIP firewall solutions havenot yet been established.Similarly, standard encryption methodscan cause latency or jitters in VOIPtransmissions, which can degrade theoverall quality of VOIP calls, but universalstandards for new encryption solutionshave not yet been adopted.“Because of the time-critical nature ofVOIP, and its low tolerance for disruptionand packet loss, many securitymeasures implemented in traditionalnetworks are simply not applicable toVOIP in their current form;” said thereport, issued by NIST’s informationtechnology laboratory, “firewalls, intrusiondetection systems, and other componentsmust be specialized for VOIP.”New VOIP systems are especially vulnerableto eavesdropping or network“sniffing,” said NIST. “Unless the VOIPnetwork is encrypted, anyone with physicalaccess to the office LAN [Local AreaNetwork] could potentially connectmonitoring tools and tap into telephoneconversations,” said NIST. Thus, confidentialityand privacy could be at greaterrisk with such VOIP services.While acknowledging that conventionaltelephone lines can also be tapped physically,the NIST authors warned “there aremany more points to connect with a LANwithout arousing suspicion.”PersonalComputerPersonalComputerInternetTelephoneTelephoneDIRECTORY OF CONTACT INFORMATION FOR ADVERTISERS IN THIS ISSUEFor more information from any of the companies listed below, please use the contact information presented here.American Military UniversityAd on page 19Charles Town, WV877-468-6268www.apus.edu/AMUFor more info click onwww.info.ims.ca/4755-009CherryAd on page 12Waukegan IL847-662-9200www.cherrycorp.comFor more info click onwww.info.ims.ca/4755-007ATK Marketing DepartmentAd on page 2Anoka, MN866-59D-tect (866-593-8328)www.dtectsystems.comFor more info click onwww.info.ims.ca/4755-002Evan Scott GroupAd on page 17Plymouth Meeting, PA610-940-1677www.evanscottgroup.comFor more info click onwww.info.ims.ca/4755-008PhoneAdapterVOIP systems, which rely on the Internet, can be easily hackedFCCFPEDVAd on page 9Quantico Marine Corps BaseQuantico, VAwww.fped5.orgKontekAds on pages 4 & 15New Madrid, MOPhone: 573-748-5561www.kontekindustries.comFor more info click onwww.info.ims.ca/4755-004NIST’s Recommendations to Strengthen VOIP Telephony1.2.3.4.5.6.7.ISC WestAd on page 27Norwalk, Ct.203-840-5602www.iscwest.comBetter network architecture – Voice and data networks should be separated;strong authentication and access control must be established for VOIP services;a mechanism to allow VOIP traffic through firewalls must be found; encryptionshould be established at the routers or other gateways, not at the individual telephoneinstruments.Know thyself – Network administrators need to understand their own level ofexpertise before tackling very complex VOIP introductions onto their networks.“Essential telephone services, unless carefully planned, deployed, and maintained,will be at greater risk if based on VOIP,” said the report.E-9-1-1 capability – VOIP systems can provide greater flexibility to users, whocan be highly mobile, but they have difficulty providing E-9-1-1 emergency servicesbecause VOIP systems are not necessarily tied to specific geographic locations.Vendors are developing solutions to this problem, but agencies must thinkabout 9-1-1 requirements very carefully, said NIST.Physical controls are vital – Measures such as barriers, locks, access controlsystems and guards are necessary to physically prevent unauthorized users fromgaining access to networks on which VOIP telephony is being used. Specialefforts should be taken to prevent network sniffers from being surreptitiouslyinstalled because such sniffers can detect not only data traffic but all voice communicationsas well.Backup power – VOIP systems are dependent on reliable power supplies, sogovernment agencies need to think about the availability and costs associatedwith backup power for the switch and the desktop instruments, battery chargers,electrical generators in case of power outages for several hours, and fuel.“Softphone” systems – Worms, viruses and other malicious software can bedownloaded to an individual PC – or a PC outfitted with special software andheadphones for use in a VOIP system, called a ‘softphone’ -- often without theknowledge of the user. “These vulnerabilities result in unacceptably high risks inthe use of ‘softphones,’ for most [VOIP] applications,” said NIST.WiFi vulnerabilities – The 802.11 Wired Equivalency Privacy (WEP) specificationprovides “little or no protection” for VOIP transmissions because “WEPcan be cracked with publicly available software,” warned NIST. Instead, theauthors recommend that the newer WiFi Protected Access (WPA) standardoffers significant improvements in security.Larstan Business Reports Inc.Ad on page 31Potomac, MD301-424-8874, www.larstan.netFor more info contact G. Scott Dinkelat 212-925-7300, ext. 218MVM Inc.Ad on page 11Vienna, VA703-245-9646www.mvminc.comFor more info go towww.info.ims.ca/4755-006SONYAd on page 3Park Ridge, NJ201-930-6599www.sony.com/securityFor more info click onwww.info.ims.ca/4755-003TelenorAd on page 32301-838-7700www.telenor.com/satelliteFor more info go towww.info.ims.ca/4755-010US ProtectAds on pages 1 & 6Silver Spring, MD301-587-8001www.usprotect.comFor more info click onwww.info.ims.ca/4755-001Wheelock Inc.Ad on page 5Long Branch, NJ800-631-2148www.wheelockinc.comFor more info go towww.info.ims.ca/4755-005To join this list ofGSN advertisers,please contact either:Ed Tyler, Publisher212-925-7300, ext 232,orG. Scott DinkelAdvertising Director212-925-7300, ext. 218FEBRUARY 21, 2005 28 GSN: GOVERNMENT SECURITY NEWS


GSN Classified AdsSERVICESPRODUCTS - PHYSICAL SECURITYACCOUNTINGEXECUTIVE RECRUITMENTINTEGRATED SECURITY SYSTEMSBUSINESS OWNERSWHAT is your business worth?WHERE is your business going?WHO reviews your industry andcompares it to your company?WHEN did you last review yourbuy/sell agreement or your lifeinsurance needs for your business?HOW do you strategically planfor your business’s futuregrowth?WHY are you in business?HAVE YOU asked or answeredthese questions recently?IT may be time for a BUSINESSAPPRAISAL / VALUATION.A business appraisal is thesmart business owner’s strategicplanning tool.The appraisal will help you toanswer these and other importantquestions.CERTIFIED VALUATION ANALYSTSCERTIFIED PUBLIC ACCOUNTANTSNOT YOUR EVERYDAY CPAs631-859-0100www.ringler-associates.comGSN: <strong>Government</strong><strong>Security</strong> <strong>News</strong>can be your resourcefor timely classifiedadvertising!call Kelly Winberg at:(215) 723-2861kwinberg@attglobal.netEXEMPT • POSITION DESCRIPTIONJOB TITLE: Business Development Manager, <strong>Government</strong> ServicesGroupSUMMARY:The primary function of this position is to drive the <strong>Government</strong> business;be the <strong>Government</strong> / GSA expert as it pertains to Sales & Marketingwhile working with district offices, and various internal groups.Responsible for key assigned Agencies, internal groups and geographies.Also, responsible for the development and management of specificprograms in support of the overall <strong>Government</strong> Services GroupBusiness Plan.RESPONSIBILITIES:• Develop & drive market strategies and tactics for Federal, GSA, andState business including identification of market opportunities forassigned geographies / Agencies.• Develop effective relationships with district offices – become the<strong>Government</strong> expert for market area.• Ensure District offices are trained on <strong>Government</strong> procurement, sales/ internal processes, GSA, and State Agreements.• Bring the correct personnel from district offices into various accountswhile assisting with identifying significant sales opportunities andclosing.• Represent SimplexGrinnell in key trade organizations / trade shows.• Help ensure we are customer focused, by addressing various issueswith district management.BACKGROUND:Education: Undergraduate degree or equivalent experienceExperience:Minimum of 5 years relevant experience in fire protectionsales or service. Ideally, two years experiencein business development with <strong>Government</strong> agencies.Special Skills: Ability to be a strong champion for the governmentbusinesses and to drive business within theSimplexGrinnell organization. Ability to present selfand SimplexGrinnell effectively in front of customersand large groups. Strategic and analytic thinkingskills. Ability to produce, present and defend businessplans. Broad knowledge of various services & productportfolio we can provide.Contact John Harding, <strong>Government</strong> Services Group, 978 731 7179Send resumes to: joharding@tycoint.comSenstar-Stellar, Inc., a thirty-year-old electronic security equipment manufactureris seeking a highly motivated Federal Market Sales Manager. Thesuccessful candidate must have proven experience selling technical securitysystems to the Federal <strong>Government</strong>, DoD, Homeland <strong>Security</strong> marketplaces.A minimum of 5 to 7 years experience in these areas in necessaryand have the ability to work with both end users and system integrationcompanies. Must be familiar with government agencies, and be able to followcurrent and emerging trends relating to security technology.Candidate must be a self-starter, and demonstrate proven executive levelpresentation, communication, forecasting, sales and marketing skills. Thisposition will require location in the Washington/Baltimore area, with travelto other parts of the U. S.Interested candidates please send resume to:usinfo@senstarstellar.com.PRODUCTSIT SECURITYHardwareData storageDesktop computerLaptop computerFirewall applianceSoftwareAnti-virus / anti-spamAuthenticationComplianceDatabase managementDocument securityE-mailEncryptionFirewall network monitoringPatch managementVulnerability managementWireless intrusionPHYSICAL SECURITYAccess controlAsset trackingArmored vehiclesBiometricsFace recognitionFingerprintIrisBio-terrorismBlast resistantCommunicationsDetectionChem / bio / nuclearChemical traceVideoX-rayEmergency alert notificationIdentificationIntegrated security systemsIntrusion detectionLocking mechanismsNight visionObject detectionPerimeter protectionPort securityAD CATEGORIESSignageTelecommunicationsVideo surveillanceAbandoned bag detectionAnalytic softwareCameraDigital video recorderMonitorWirelessSERVICESAccountingAirport screeningConsultingBackground investigationForensicsManagementVulnerability assessmentsDisaster recoveryDocument destructionEducationExecutive protectionExecutive recruitingFinancialGuard servicesInternet servicesInvestigativeLegalMarketingAdvertisingGSA contractsMarket researchPublic relationsTrade showsPublicationsSystems integrationThreat assessmentsTrainingHELP WANTEDGSN: GOVERNMENT SECURITY NEWS 29 FEBRUARY 21, 2005


Personality ProfileBennie Thompson (D-MS)“On Duty”Current job:Career steppingstones:Education:Ranking Member, House Committee on Homeland <strong>Security</strong>During the 108th Congress, was the Vice-Ranking Member of the House Select Committeeon Homeland <strong>Security</strong> and served as the Ranking Member of its Emergency Preparednessand Response Subcommittee. Also served on the Agriculture Committee.Began political career in 1969 as an alderman in Bolton, MS. Four years later, was electedmayor of Bolton, a position held until 1979. From 1980-1993, served as Hinds Countysupervisor. In 1993, was elected as U.S. Representative from Mississippi’s second district.Throughout career, I have been a true civil rights activist, a strong supporter of access toaffordable quality healthcare and the labor rights of workers.Grew up in Hinds County public schools. Received a B.A degree in political science fromTougaloo College, in Tougaloo, MS, in 1968 and a M.S. degree in educational administrationfrom Jackson State University, in Jackson, MS, in 1972.Homeland securitymission:Top job priority:Biggest obstacle:Homeland securityinvolvement outside work:As Ranking Member of the Homeland <strong>Security</strong> Committee, I plan to hold the Department of Homeland <strong>Security</strong> accountable. TheAmerican people deserve to know that their government is getting homeland security right and getting the job of protecting our country done.Ensuring that Congress provides strong, sustained and determined oversight of the Department of Homeland <strong>Security</strong> so that the billionsof dollars that are being spent on homeland security programs are really protecting our ports, our food supply, our borders, our computernetworks and our critical infrastructures.Much needed homeland security funds are supposed to be getting to first responders in every community – from New York to Gulfport,MS – so they have the equipment to provide assistance to those who are the first on site when terrorists strike. From what I’ve seen fromDHS so far, it is not doing this job. That inaction puts everyone at risk.I was responsible for getting Bolton, MS, my hometown, its first fire engine.My role model:Former Mississippi State Senator Henry Kirksey, the foremost political reformer and pioneer in 20th-Century Mississippi politicsCareer ambition:To continue serving as a change agent for the State of MississippiBirth year: 1948“At Ease”Hometown:Childhood nickname:Current residence:Family:Last book read:Favorite film:Ideal vacation:Hobby / Sport:Favorite meal:Bolton, MSPabloBolton, MSMarried to college sweetheart, London Johnson ofMound Bayou, MS, for 35 years. We have one daughter,BendaLonne, and one granddaughter, Jenna.The autobiography of Muhammad Ali“The Ten Commandments,” directed byCecil B. DeMille (1956)Anywhere I can hunt twice a dayHuntingGrilled salmon and broccoliCongressmen Thompson (second from right) and Jesse Jackson, Jr.hunting with friends in the Mississippi DeltaClubs / groups:Major regret:Proudest achievement:Inspiring quotation:NAACP, 100 Black Men of America, Kappa Alpha Psi Fraternity, Inc., Board of Trustees of Tougaloo College, Asbury United Methodist ChurchNot completing my dissertation for a Ph.D. degree 30 years agoForced the State of Mississippi to give $503 million to Historically Black Colleges and Universities as a financial settlement to endsegregation at its public universitiesKeep the faithFEBRUARY 21, 2005 30 GSN: GOVERNMENT SECURITY NEWS


GSN: <strong>Government</strong> <strong>Security</strong> <strong>News</strong>has contracted with LarstanBusiness Reports toconduct its proprietary“Ad EffectivenessStudy” on three differentissues of GSN this year:dated April 18, July 18 andOctober 24. These studieswill allow your advertisementsto be measured by athird party, independentresearch firm. The results willhelp you plan your futurecampaigns.Larstan’s unique approach will tell advertisers:• How effective is your ad compared with others in the same issue?• Which ads draw the most attention?• How does color influence ad recall and effectiveness?• How well does a single page ad compare to a spread or an insert?Also included will be verbatim extracts from the Larstan interviews about your ad.Book your ads in theApril 18th, July 18th,and October 24thissues of GSN today.Contact your GSN representative formore information about an upcomingLarstan Ad Effectiveness Study. Ordersmust be received by the ad closing dateof each issue.


Ready to Go Telenor Secure Communicationsmaking secureconnections routineSecure communications now available through Telenor Satellite Services. Encrypt low-speed voice, fax, and data using STU-IIBand STUIII-capable Inmarsat GAN, Mini-M, Swift and Fleet F55 services at no additional per minute surcharge or subscription fee.Telenor STU-IIB and STU-III communications are part of a full suite of SecureCommunications Services. Also offered, encrypted end-to-end communicationsusing Inmarsat-B, Mini-M, GAN, Swift, Fleet F77 / F55 and Aero-H standards. TelenorSecure Services are compatible with standard cryptographic equipment such asSecure Telephone Unit – Second Generation Version B (STU-IIB), SecureTelephone Unit – Third Generation (STU-III), Secure Terminal Equipment (STE) andKIV-7/KG-84 devices.Inmarsat Global Area Network (GAN) terminal“Ensure Simple, Reliable and Secure Dialing”Secure calling is easy and efficient with Telenor’s Satellite Direct Plus service. Usinga dedicated 10-digit telephone number, full duplex secure calls can simply be dialedto and from satellite terminals and secure phones anywhere on land, at sea and inflight. Satellite Direct Plus is exclusively available from Telenor Satellite Services.For more information about the benefits of Telenor’s Secure CommunicationsServices and Satellite Direct Plus, contact a Telenor Service Provider.Motorola SECTEL (STU-III) telephoneTelenor Satellite ServicesCustomer CareTel: +1 301 838 7700customer.care@telenor.comwww.telenor.com/satelliteFor more information go to www.info.ims.ca/4755-010

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!