Homeland Security

Page 1

INTERVIEW: FORMER DHS SECRETARY MICHAEL CHERTOFF

THE YEAR IN

HOMELAND SECURITY

2009 Edition

CYBER SECURITY PLUS Special Section: Customs and Border Protection ICE: Shield America Center for Domestic Preparedness

&RYHU ILQDO LQGG

30


The SureFire M951 Millennium Universal WeaponLight Kit puts out 65 lumens of intense white light and is designed for winning ďŹ ghts – often without rounds ďŹ red. It runs on two included 123A lithium batteries, features shock isolation to protect its incandescent lamp, and offers infrared output with the ip of its IR ďŹ lter, included. This hardanodized aluminum WeaponLight mounts to a Picatinny rail with a dual thumbscrew clamp. It also includes a constant-on pushbutton switch, a momentary-on tape switch, and one spare lamp.

This high output WeaponLight, which runs on three included 123A lithium batteries, generates an intense 125-lumen beam of white light. It features the same body construction, dual thumbscrew clamp, shockisolation, and switching as the M951 WeaponLight Kit but doesn’t include an IR ďŹ lter.

The 660 Classic Universal WeaponLight mounts directly to rie/carbine barrels (or gas tubes) that are .5� to .9� in diameter. It produces 65 lumens of white light and runs on two included 123A lithium batteries. The shock-isolated 660 Classic includes a constant-on pushbutton switch and a momentary-on tape switch.

ADS IS A PREMIER PROVIDER OF SUREFIRE PRODUCTS. Contact us for more information or see our Equipment Catalogs online at www.adstactical.com Š 2009 ADS, Inc. The ADS Logo is a registered trademark of ADS, Inc. A0152 08/09

ADS on temp.indd 1

9/22/09 2:52 PM


THE YEAR IN

HOMELAND SECURITY 2009 Edition

7LWOH SDJH LQGG

30


Morpho Detection

Field-proven explosives and narcotics detection

Morpho Detection develops imaging and detection tools to strengthen homeland security programs on land, sea and in the air. Our systems are deployed in more than 120 countries—in airports, customs checkpoints, border crossings, prisons and a range of other high-risk facilities. www.morphodetection.com

SafranMorpho on temp.indd 1

10/26/09 4:25 PM


CONTENTS

10

Interview: The Honorable Michael Chertoff Former DHS Secretary and Co-founder and Managing Principal, The Chertoff Group By Rich Cooper

14

Whither the Patriot Act? By J.R. Wilson

18

Economic Stimulus Bill Earmarks Funds for Homeland Security Upgrades By Charles Dervarics

:H¡UH <RXU 3DUWQHUV LQ &ULPH The Center for Forensic Studies at Alliant International University— the first school in the US to offer a doctorate in Forensic Psychology— wants to join your fight against crime. Our graduates are rigorously prepared by faculty who are not just academics, but who are actively engaged as consultants to many law enforcement agencies. Led by Dr. Eric Hickey, who has worked with multiple federal agencies for 20 years, CFS faculty bring years of experience in working with criminal populations including terrorists, psychopaths, murderers and sociopaths to their teaching. Degree Programs

t Doctor of Psychology: Forensic Psychology-

26

The Minnesota Metric By Rich Cooper

28

Shield America

Los Angeles, Irvine, San Diego, San Francisco, Fresno, Sacramento

t Specializations available in – threat assessment – criminal profiling – homeland security

By Christopher Prawdzik

t Doctor of Philosophy: Forensic Psychology-

Pandemic Preparedness By Christopher Prawdzik

t Post-doctoral Certificate in Forensic Psychology

Special Section: U.S. Customs and Border Protection

Opportunities for international study in South Africa and Italy.

Fresno

34 41

By J.R. Wilson

42 Fighting the War Against Narco-terrorism CBC Combats Drug Smuggling

46 Outbound Inspections 49 Travel Programs 53 Air & Marine 59 Smugglers’ Gulch

Fresno t Irvine t Los Angeles Sacramento t San Diego San Francisco t Mexico City Hong Kong t Tokyo

To Learn More: admissions@alliant.edu 1.866.U.ALLIANT http://ForensicStudies.alliant.edu

60 Noble Mustangs Alliant is a private, nonprofit, WASC-accredited university and equal opportunity employer and educator.

72& LQGG

30


Š2009 Accenture. All rights reserved.

We know what it takes to be a Tiger. High performance depends less on having superior resources and more on superior application of the resources you have. For a deeper look at our research and experience with the world’s most successful organizations, including our landmark study of over 500 high performers, visit accenture.com/research

Accenture on temp.indd 1

8/7/09 2:28 PM


CONTENTS

Global M2M Connecting the World’s Assets

2

Satellite M M Data Services

62

Center for Domestic Preparedness By Christopher Prawdzik

70

The Arctic Challenge The Northwest Passage and Homeland Security By Dr. Joe DiRenzo III and Chris Doane

76

What the Submersibles Mean: Transnational Gangs, Drugs, and Terrorism By Dr. Joe DiRenzo III and Chris Doane

82

Critical Infrastructure Protection Tools for Homeland Security Partners

88

A Byting Challenge – The Cyber Security Problem

Cost Effective Satellite Communications for:

By Rich Cooper

94

An Education in Homeland Security By Christopher Prawdzik

100

Homeland Security Professionals to Watch By Rich Cooper

110

Product Showcase

• • • • • • •

Asset Tracking and Control Logistics and Transportation Container Tracking and Monitoring Border Security Geofencing and Asset Management Transportation Infastructure Maritime Domain Awareness The world’s first space-based Automatic Identification System (AIS) • Bio Surveillance • Infrastructure and Industrial Monitoring

w w w. o r b c o m m . c o m 1-800-ORBCOMM

72& LQGG

30


coloradostate on temp.indd 1

10/27/09 3:28 PM


THE YEAR IN

HOMELAND SECURITY North American Headquarters 701 North West Shore Blvd. Tampa, FL 33609, USA Tel. (813) 639-1900 • Fax (813) 639-4344 )RFXVHG

RQ

,QWHOOLJHQFH

0DQDJHPHQW

INTERVIEW: FORMER DHS SECRETARY MICHAEL CHERTOFF

7HUURULVP DQG &RXQWHUWHUURULVP 6WXGLHV DQG

THE YEAR IN

HOMELAND SECURITY

2009 Edition

CYBER SECURITY PLUS Special Section: Customs and Border Protection ICE: Shield America Center for Domestic Preparedness

3URWHFWLRQ 0DQDJHPHQW +HQOH\ 3XWQDP

Contributing Writers Rich Cooper Charles Dervarics Dr. Joe DiRenzo III Chris Doane Christopher Prawdzik J.R. Wilson

8QLYHUVLW\ V RQOLQH DFFUHGLWHG GHJUHH DQG FHUWLILFDWH SURJUDPV DUH VSHFLILFDOO\ GHVLJQHG IRU LQGLYLGXDOV ZKR DUH VHULRXV DERXW SURWHFWLQJ RXU QDWLRQÂśV IXWXUH 2XU IDFXOW\ PHPEHUV DUH OHDGHUV LQ WKHLU WUDGHFUDIW IURP RUJDQL]DWLRQV LQFOXGLQJ WKH PLOLWDU\ )%, &,$ ',$ DQG 6HFUHW 6HUYLFH

Publishers Ross W. Jobson Peter Antell Chief Operating OfďŹ cer Lawrence Roberts lawrence.roberts@faircount.com Vice President, Business Development Robin Jobson robin.jobson@faircount.com Senior Project Manager Darren Lewis darren.lewis@faircount.com Advertising Account Executives John Anderson, Steve Chidel Jim Huston, Paul Martin Jim Pidcock, Charlie Poe Jay Powers, Bob Wilson Controller Robert John Thorne robert.thorne@faircount.com Director of Information Systems John Madden john.madden@faircount.com Webmaster Clyde Sanchez

Editorial Director Charles Oldham chuck.oldham@faircount.com

DQG ZRUN KDQG LQ KDQG ZLWK RXU VWXGHQWV WR

Senior Editor Ana E. Lopez

+HQOH\ 3XWQDP ZDV UHFHQWO\ QDPHG D 7RS 0LOLWDU\ )ULHQGO\ 6FKRRO E\ * , -REV 0DJD]LQH DQG LV DSSURYHG IRU XVH RI PLOLWDU\ HGXFDWLRQ EHQHILWV

Editors Rhonda Carpenter Iwalani Kahikina Assistant Editor Steven Hoarn Art Director Robin K. McDowall Project Designer Daniel Mrgan Design and Production Rebecca Laborde Lorena Noya Kenia Y. Perez Production Assistant Lindsey Brooks Editorial Intern Stephanie Whitehall Sales Support Joshua J. Roberts

HQVXUH

WKHLU

ORQJ

WHUP

VXFFHVV

BACHELORS & MASTERS DEGREES: ‡ ,QWHOOLJHQFH 0DQDJHPHQW ‡ 7HUURULVP &RXQWHUWHUURULVP 6WXGLHV ‡ 0DQDJHPHQW RI 3HUVRQDO 3URWHFWLRQ

DOCTORATE DEGREE: ‡ 6WUDWHJLF 6HFXULW\

CERTIFICATES: ‡ &RXQWHUWHUURULVP ‡ ([HFXWLYH 3URWHFWLRQ ‡ ,QWHOOLJHQFH $QDO\VLV ‡ ,QWHOOLJHQFH &ROOHFWLRQ ‡ ,QWHOOLJHQFH 7HUURULVP 3URILOLQJ ‡ 6WUDWHJLF ,QWHOOLJHQFH ‡ 6HFXULW\ 0DQDJHPHQW

Assistant to the Publisher Alexis Vars OfďŹ ce Administrator Aisha Shazer Cover image: Internet map (courtesy of The Opte Project)

‹&RS\ULJKW )DLUFRXQW 0HGLD *URXS $OO ULJKWV UHVHUYHG 5HSURGXFWLRQ RI HGLWRULDO FRQWHQW LQ ZKROH RU LQ SDUW ZLWKRXW ZULWWHQ SHUPLVVLRQ LV SURKLELWHG )DLUFRXQW 0HGLD *URXS GRHV QRW DVVXPH UHVSRQVLELOLW\ IRU WKH DGYHUWLVHPHQWV QRU DQ\ UHSUHVHQWDWLRQ PDGH WKHUHLQ QRU WKH TXDOLW\ RU GHOLYHUDELOLW\ RI WKH SURGXFWV WKHPVHOYHV 5HSURGXFWLRQ RI DUWLFOHV DQG SKRWRJUDSKV LQ ZKROH RU LQ SDUW FRQWDLQHG KHUHLQ LV SURKLELWHG ZLWKRXW H[SUHVVHG ZULWWHQ FRQVHQW RI WKH SXEOLVKHU ZLWK WKH H[FHSWLRQ RI UHSULQWLQJ IRU QHZV PHGLD XVH 3ULQWHG LQ WKH 8QLWHG 6WDWHV RI $PHULFD

0DVWKHDG LQGG

WWW.HENLEY-PUTNAM.EDU

1 .8 8 8 .852. 8746 6DQ -RVH &$ $FFUHGLWHG 0HPEHU '(7& WK 6WUHHW 1 : 6XLWH :DVKLQJWRQ ' &

30


CONTRIBUTING WRITERS Richard “Richâ€? Cooper is a principal with Catalyst Partners, LLC, a government and public affairs practice in Washington, D.C., that focuses on homeland and national security matters. He also serves as the chairman of the Homeland Security Division of the National Defense Industrial Association (NDIA); as a member of the American National Standards Institute’s Homeland Security Standards Panel (ANSI-HSSP); and as an advisor to the Reform Institute and New York University’s International Center for Enterprise Preparedness (InterCEP). He has been featured on Fox News, C-Span, Congressional Quarterly, Government Executive, and numerous other media outlets. He posts regular commentaries/blogs on a variety of homeland security issues at Security Debrief. He served as business liaison director (2003-2006) for the U.S. Department of Homeland Security’s Private Sector OfďŹ ce (PSO) and as a senior policy advisor at NASA Headquarters, working as the special assistant to the NASA administrator and chief of staff/White House liaison. He served as the program architect for NASA’s Educator Astronaut Program and strategic communications and editorial response for the Space Shuttle Columbia accident, where his works were published/presented in The Wall Street Journal, The New York Times, The Washington Post, New Orleans’ TimesPicayune, NASA Television, and other outlets.

Charles Dervarics is a Washington, D.C.-area writer with 20 years experience covering business, education, and government topics. His articles have appeared in The Washington Post, Washington Business Journal, Pittsburgh magazine, PC Magazine, Defense News, and, in a bit of a surprise, Working Mother magazine. He has written

0DVWKHDG LQGG

business content for clients such as SAP, ofďŹ ce.com, and the Society for Human Resource Management.

Dr. Joe DiRenzo III is Coast Guard Atlantic Area’s chief of operational plans and analysis. He is a retired Coast Guard ofďŹ cer who spent nine years in the Navy in both the submarine and surface warfare communities. In 1991, he transitioned to the Coast Guard where he served as combat information center ofďŹ cer and operations ofďŹ cer aboard USCGC Gallatin (WHEC 721), executive ofďŹ cer of USCGC Vashon (WPB 1308), and commander of USCGC Jefferson Island (WPB 1340). He also served as a SAR controller under Commander Greater Antilles Section (GANTSEC), as the ďŹ rst chief of Frontier Shield Intelligence Detachment (FSID), and as the inaugural Coast Guard liaison ofďŹ cer assigned to the Constellation Battle Group and Peleliu ARG deployed to the Arabian Gulf, serving as maritime interdiction ofďŹ cer for both. Detailed to the Atlantic Area staff, DiRenzo served initially as the Operations Division Regional Strategic Assessment coordinator, then as the AntiTerrorism coordinator. As the AT coordinator following the attacks of 9-11, he drafted numerous policy documents related to maritime terrorism, coordinated anti-terrorism operations with the Navy, and participated in numerous infrastructure vulnerability and risk assessment studies, including those related to CBRNE. Following retirement from the Coast Guard in 2003, he has written and lectured on homeland and maritime security issues. DiRenzo is one of the most published authors in the history of the Coast Guard. A ďŹ vetime winner of the service’s prestigious JOC Alex Haley award, he has published over 250 articles since his retirement on various maritime terrorism

and port security topics in publications such as Marine News, the Maritime Reporter, Proceedings, The American Legion magazine, National Defense, and Undersea Warfare. He has lectured at numerous military and law enforcement venues involving maritime transportation security issues and was the keynote speaker at Dalhouise University’s 2007 Maritime Security Conference. DiRenzo is a 1982 graduate of the United States Naval Academy, holds a Master’s in Business Administration from California Coast University, and is a graduate of both the Naval War College and Marine Corps Command and Staff College. He completed his Doctor of Philosophy in Business Administration (Homeland Security Specialization) in 2007 at Northcentral University. He is currently an Adjunct Professor at the Joint Forces Staff College and teaches for American Military University and Northcentral University.

Chris Doane is the chief of Operations Strategy and Policy Coordination for U.S. Coast Guard Atlantic Area. His responsibilities include supporting the development and reďŹ nement of Coast Guard strategy, policy, doctrine, tactics, techniques, and procedures for the Coast Guard’s 11 missions as well as monitoring and measuring the effective implementation of these directives within Atlantic Area. The Atlantic Area’s area of responsibility includes the Atlantic Ocean, Gulf of Mexico, Great Lakes, and Western rivers as well as out-of-hemisphere operations in Europe, Africa, and the Middle East. Prior positions at Atlantic Area include: chief of operations planning (April 2006 to July 2009) and chief of response and port security (August 1999 to April 2006). A retired Coast Guard ofďŹ cer, Doane is also an adjunct professor at the U.S. Joint Forces Staff College. He holds a Master of

Arts in National Security and Strategic Studies from the U.S. Naval War College, a Master of Science in Ocean Engineering from the University of New Hampshire, and a Bachelor of Science in Biological Technology from the University of Maine at Machias. He has written extensively on homeland security topics, publishing articles for a variety of national and international publications as well as chapters for textbooks.

Christopher Prawdzik is a writer, editor, and editorial consultant and owner of Prawdzik Group LLC (prawdzikgroup.com). A journalist for nearly 20 years, he has written extensively on the military, covering the Army, Navy, Air Force, Marines, and National Guard. He lives in Northern Virginia.

J.R. Wilson is a veteran journalist who has been a fulltime freelance writer, focusing primarily on aerospace, defense, and high technology, since 1992. He spent eight years as a reporter, editor, and bureau manager with United Press International before joining McDonnell Douglas Astronautics Company in 1980, serving as head of public relations for that division of the aerospace giant before taking a similar post with Cubic Corp. After a brief stint in the private sector, he was appointed North American Group Editor for Jane’s Information Group. He later served as creative director and editor-in-chief of Today’s OfďŹ cer. As a freelancer, Wilson has written for dozens of magazines and Web sites around the world, including Military & Aerospace Electronics, Aerospace America, Armed Forces Journal, Air Transport World, Seapower, Military Medical Technology, Aerospace Asia/PaciďŹ c, Destination Las Vegas, Signal, Training & Simulation Journal, and C4ISR Journal.

30


Sometimes people in your line of work don’t get the credit they deserve. We can change that.

Finish your degree. Anytime. Anywhere. - Bachelor of Science in Homeland Security and Emergency Preparedness - Bachelor of Arts in Criminal Justice - Graduate Certificate in Homeland Security - Master of Arts in Liberal Studies – Homeland Security Earn credit for college-level knowledge you’ve gained through training: s %ARN CREDITS FOR COMPLETING .* 3TATE 0OLICE basic training s %ARN CREDITS FOR COMPLETING .* -UNICIPAL 0OLICE basic training s %ARN UP TO CREDITS FOR APPROVED &%-! TRAINING COURSES

Visit www.tesc.edu or call (888) 442-8372. 00327

039r.indd 1

10/26/09 11:48 AM


Interview: The Honorable

Michael Chertoff Former DHS Secretary and Co-founder and Managing Principal, The Chertoff Group By Rich Cooper

I

The Year in Homeland Security: Mr. Secretary, looking back at your nearly four years of service at DHS, what are the accomplishments that you are most proud of and what were some of your greatest frustrations? Michael Chertoff: Well, the bottom line, the accomplishment that was most significant is the fact that we did not have another successful attack against the United States. I think in many ways that’s the ultimate measure. At a somewhat less high altitude, I would say we dramatically changed and increased the security for people coming into the country. We transformed the way we deal with people at the ports of entry, not only bringing 10-print biometrics into effect, but also biographic collection and analysis based on commercial airline data. We have more robust requirements for crossing our land border in terms of documentation, and even between the borders. You know we built 630 miles of fence, more than doubled the Border Patrol, and according to the reports I got from the Border Patrol just about a month ago, there’s been essentially a two-thirds reduction in the flow [of illegal immigrants] across the border. In some areas where we used to have thousands a day, there are now five or six a day. Your job has been described by Sen. Joseph Lieberman (I-Conn.) and others as the toughest job in Washington. What do you know now after having been through that job that you wish you had known when you took the job back in March 2005? I think I knew the breadth of the department. What you don’t appreciate until you get the job is the sheer variety of issues you’re going to deal with on a daily basis and, of course, every day you’re dealing with weather-related matters, terrorism-related matters, immigration matters, issues having to do with regulating the chemical industry, and all that can come up in a single day.

U.S. Navy photo

f tough assignments are a measure for the character of an individual, there are few people that can stand either next to or in the shadow of Michael Chertoff. Known to much of America and the world for his nearly four years of service (2005-2009) as the second secretary for the U.S. Department of Homeland Security (DHS), Chertoff has been no stranger to tough jobs. Whether it be serving as a federal judge on the U.S. Court of Appeals; the assistant attorney general for the Criminal Division at the U.S. Justice Department; a U.S. Senate counsel; or a federal prosecutor taking on Mafia kingpins or other criminals, Chertoff has never shied away from tough battles against formidable forces. To those who have worked with him, he is known for his ability to get to the point and to get to it quickly. Drawing upon information before him and his own research, personal network, and instincts, Chertoff’s innate ability to focus onto the crux of an issue or problem has been described by many as “laser-like.” Having turned the DHS secretary’s office over to his friend and former Justice Department colleague, Arizona Gov. Janet Napolitano, in late January 2009, he has set up his own firm, The Chertoff Group, in downtown Washington. Advising U.S. and international clients on a range of issues, the former secretary continues his busy pace of work, having just completed his first book, Homeland Security: Assessing the First Five Years. Chertoff sat down for an interview to reflect on his time as the leader of DHS and what the challenges ahead will be. 10

,QWHUYLHZ LQGG

30


That makes it a fascinating job, but I think in terms of understanding what your day’s going to be like, it gives you some sense of the sheer breadth of the subject matter you’re going to be covering. I always go into a job by saying to myself: “Inevitably, your plans are going to be distracted and frustrated by events that occur, so what are the most important things you have to accomplish? Focus on those, and make sure you drive those to conclusion.” Only one other person has had the job of DHS secretary before, but it’s one of those positions, as you alluded to, that you never know what’s going to happen day-in, dayout. What’s the best piece of advice someone gave you as you took the reins of DHS? I think it was someone who said, “Make sure you keep getting plenty of exercise,” which sounds silly, but in a way, what they’re saying is, “You could spend all your time working. You need to be able to re-charge your batteries a little bit.” In my case I exercise. I go out running. And what it enables you to do is to keep some balance. You could be completely absorbed with work-related things 24/7. What was your biggest surprise in the job? I think, I wouldn’t describe it as a surprise, but the most unexpected benefit was the relationship I developed as the [military] service secretary of the Coast Guard. I don’t think I focused on the fact that other than the Secretary of Defense, the Secretary of Homeland Security is the only other [Cabinet] secretary who has a military service in his domain. Since I had not served in the military, it introduced me to the culture of the military, which is a unique and very admirable culture, in a way that I did not anticipate when I came in. It turned out to be one of the great pleasures of the job that I discovered pretty quickly. What’s the most serious threat to the homeland today, and how do we address it? In terms of consequence, I would say biological terrorism is the most serious threat. It’s not a threat that I think is imminent, although we’ve had an attack in 2001 with anthrax. It is also one which would not be impossible to fabricate in a short period of time because the raw material for a biological attack occurs in nature or you can just have the know-how. So I would say if it was of high consequence, that worries me the most and I do become concerned. What’s the best investment in homeland security today? Right now I would say the best investment for the government would be cyber security. It’s the area where I think we have still the greatest vulnerability relative to the amount of security we’ve put in place. One of the reasons for that is it’s the set of assets that are most widely distributed in the private sector. There are real challenges in terms of what role the government plays in cyber security because you’re getting into very sensitive areas that touch on the First Amendment. That being said, the fact that it’s a hard problem does not mean it’s a problem we should ignore. We need to invest not only the knowhow, but in setting up the basic architecture and the authorities that we’re going to need in order to enable the private sector to protect assets on which we will depend. What about private sector investment? What’s the best investment for them to be making? I would have to say cyber security as well. Most businesses and critical infrastructure have the basic set of tools that they need to continue to refine, but at least they’ve got something going.

Depending on what your particular business or facility is, you’re going to have some protection from the physical surroundings, vetting of your employees, some kind of protection for travel. You should, if you’ve been paying attention, have a contingency plan for a pandemic flu or some similar kind of biological incident, but the area where again I think we see uneven behavior is in the cyber area. You alluded in one of your earlier responses about working with the Coast Guard and the talent you had the opportunity to work with. Over the course of your career you’ve had the opportunity to work with a wide cadre of people, from public sector, private sector, from the legal world, from the military world. What are some of the leadership skills that you think we really need to be developing for homeland security leaders today so that we can be more resilient and more successful? I think you put your finger on it when describing the breadth of interactions that I had, which really reflect the breadth of interactions anybody in homeland security is going to have. It is a domain that’s going to take you – in a single day – from dealing with the military, to the private sector, to lawyers, to engineers, to people in schools and community centers. In terms of a civilian domain, where there is no such thing as command and control, where it’s about achieving unity of effort through coordination across a wide series or a wide spectrum of actors, the key is to learn how to lead by coordination. What that means is how to set and explain what your goals are; how to help the various elements that have to come together understand how their particular talents and capabilities fit within those goals, but also to make sure everybody has ownership of the goal. That requires a different set of skills than just the traditional top-down management. It really involves being able to work with colleagues in a networked way across a wide spectrum of business and government cultures. Terrorism experts and homeland security leaders including you have said it’s not a matter of “if,” but rather “when” another act of terror will occur in the United States. Are you surprised we’ve not been attacked? Well, we’ve been attacked. It hasn’t been successful. I mean, going back to the shoe-bomber we had a series of efforts to attack us, and they’ve all been frustrated. They’ve all been frustrated because we often acted early. I recognize we have been attacked, I am confident there will be future efforts to attack us, and the variable is are we going to be able to frustrate those efforts. We’ve done a lot by doing what we’ve done in Afghanistan and Pakistan. We’ve done a lot with what we’ve done at the borders; what we’ve done internally; and what we’ve done for intelligence collection and analysis. But this is a dynamic process, so with each refinement that the enemy puts in place, there’s going to be a countermeasure we’re going to have to be prepared to put in place at the same time or before. I think that is the thing which I worry about when I look down the road. Now that you’re in the private sector, how have your views about the private sector and what it can do for homeland security changed? The upside is, it’s given me the opportunity to become much more personally acquainted with some of the entrepreneurial and technological skills that the private sector brings to the problem. You know when you’re a Cabinet secretary, particularly because of

11

,QWHUYLHZ LQGG

30


the procurement rules and complicated rules about acquisition; you tend to view technology at the end of a long funnel. You don’t see it from the perspective of people who are working on it. It’s been fascinating for me to see all the ingenuity that’s out there. What I sometimes see is that the people who work on these solutions are frustrated because they think they have something good, but they don’t know what it’s good for. They have a solution but they don’t know what the problem is. In fact, a lot of what I find that I do now is really help people understand what it is that they can solve, because if you know what you’re solving then you can adapt your technology, your ingenuity to actually produce a positive result. Who should bear the burden – the public or private sector – when it comes to research and development (R&D) for the technologies and products that we need to have deployed to protect the country from a range of hazards? Well, I think that the government certainly can do things to promote R&D, the way we do with DARPA, the way we started to do with [the] Science and Technology [Directorate], which is to seed research into areas that we know operationally would be beneficial to us, as well as devoting a certain percent of the budget – I think we used to put about 10 percent – into the kind of long-ball, Hail Mary pass type of effort that, while unlikely to succeed, would, if it did succeed, be a game-changer. I think you’ve got to have a spectrum. But at the same time, the government is not the only consumer of homeland security. The private sector itself consumes homeland security. Some of the key to the research is understanding what the need is. If you can identify a felt need in a market, it’s like any other business. You can then work to take the tools you have and make them adaptable to meet that market need. One of the resounding criticisms on DHS in its early days was that it was too focused on terrorism at the expense of preparing for other hazards. Shortly after you took office, along comes the 2005 hurricane season with Katrina, Rita, and Wilma that literally shocked us all. Based upon that experience do you think there’s a better balance now at the department and how the nation views and prepares for threats? I don’t think there’s any question that Katrina, in particular, was a traumatic experience and caused us to invest a tremendous amount of effort into understanding how we had to reconfigure the department, including FEMA, to deal with the admittedly exceptional but nevertheless real occurrence where local and state government is overwhelmed and can’t perform the traditional function that the doctrine says is: “They’re the first responders.” The federal government had not really prepared for first response in the civilian domain. The military had the capabilities, but we’d never really closed the circle in merging those with the civilian authorities. That’s a lot of what we did, as I spent a lot of personal time of mine in the two years right after Katrina, and of course the test came when we did Gustav. That actually was a great example of how all the lessons learned were put into effect, because we had created that relationship between the military and the civilian authorities. We had done the planning, the preparation, the capacity building that had not been before, and I think that’s resulted in a department that’s better balanced. Although I have to say as we speak now, toward the end of October, I don’t think we’ve not had a hurricane make landfall in the United States [this year].

We’ve had a remarkably calm season, contrary to all the predictions, but as you point out with Gustav, that really was the emergence of the true homeland defense mission that was still trying to form in those early days. How did the Katrina experience change you and how you led the department? Certainly it consumed a huge amount of personal time because it was very frustrating to see things in the department that did not work well. As I’ve said a lot of times publicly, a lot of that had to do with lack of planning in advance, so it really gave me a very strong impetus to build a planning capability in the department. The irony is that I gave a speech about a month before Katrina where I said I thought that one of the problems we had in the department is we didn’t have preparedness down right, we weren’t planning right. So I can’t say Katrina opened my eyes to it. What I can say is Katrina created a very strong emotional incentive to get it done right, to drive it to conclusion and we did drive it to conclusion. We spent a huge amount of time pushing this issue, and I might also say the president spent a huge amount of personal time pushing to make sure that we prepared and took on board the lessons learned. It was the absolute obsessive focus on getting the planning job done that was the real legacy of Katrina.

“I DO HEAR FROM SOME PEOPLE THE ATTITUDE: ‘LET’S MOVE BEYOND 9/11.’ THE PROBLEM IS THE TERRORISTS ARE NOT MOVING BEYOND 9/11. AND LET ME SAY THIS: EVEN IF AL QAEDA WERE COMPLETELY ELIMINATED TOMORROW, IT’S NOT GOING TO END THE PROBLEM.” It’s interesting that you talk about the planning legacy, because it just seems as we move further from 9/11 that you hear more and more persons echoing concerns about complacency. I’m curious as to your thoughts: Are we a Pearl Harbor nation? Does it take a major event or a major disaster to cause us to take dramatic actions that need to be done? You know, that’s a very good question – “Are we a Pearl Harbor nation?” I really hope not. You know when I go out among members of the public, I’m constantly gratified and pleased by the fact that people come up and say, “Thank you for what you did,” and “You’ve kept the country safe,” not because it’s a personal compliment to me but because it shows people do think about this and do care about it. So I think the public is very well aware of what we went through. On the other hand, there are times I read things in the media, in which it’s hard to believe the author was in any way aware of the fact that we had an attack on September 11th. They act as if the threat is conjured-up and that worries me because you’re competing with a lot of other agenda items for investment. I’m not saying we should put all our money in homeland security and nothing in anything else, but what I am saying is, whether it’s biological threats or issues involving Afghanistan, I do hear from some people the attitude: “Let’s move beyond 9/11.” The problem is the terrorists are not moving beyond 9/11. And let me say this: Even if Al Qaeda were completely eliminated tomorrow, it’s not going to end the problem.

12

,QWHUYLHZ LQGG

30


There are other ideological groups and there’ll be ideologies in the future, maybe different than what we face now, that will model themselves on what we saw eight years ago, and will meet or exceed the kind of levels of violence that we’ve seen. We’re in a world now where technology and global communications allow a smaller and smaller number of people to wage a kind of warfare that used to be the prerogative of a nation-state. Those days are never going to go away and we’ve got to not be panicked or hyper-anxious, but we have to have a disciplined program dealing with security in much the same way as we should have a disciplined program about maintaining our health or making sure that our fiscal house is in order. What lessons do we still have to learn from 9/11 and Katrina? I think the hardest lesson to learn is that the responsibility for security is not purely a government responsibility. It flows down even to the individual. When we saw in the hurricane seasons after Katrina people still not evacuating because they didn’t take on board the significance of voluntary evacuation when you have the capability of doing that; when you see people who fought against having secure identification because they don’t understand that knowing who gets on an airplane means we can keep dangerous people off; then what you worry about is people have the attitude that’s going to be taken care of by the government. The government’s not going to take care of all of it. The government will take care of some of it, and there are some things only the government can do, but in modern life, whether it’s a natural disaster or an act of terror, an act of war, everybody’s on the front lines now. There is no rear area. There is no civilian domain. When we have terrorist attacks they go right in to the buildings, the airplanes, the civilian domains, and likewise the natural disasters put everybody on the front line. You’ve known DHS Secretary Janet Napolitano from your previous work together at the Justice Department, and it was obvious from the moment that she was named there was a great deal of comfort and confidence that you had in her taking on the reins of the department following you. What was it about her that gave you the comfort level in her taking your job, and what were some of the things that you offered as far as guideposts for her in taking it on? First of all, I’ve known her for 15 years or more. We were prosecutors together and U.S. attorneys together. I know her to be smart, I know her to be committed to security as a law enforcement person. I knew she was a governor. I knew that she knew the issues and cared about the issues and most important, was tough-minded enough that she could prepare to do what had to be done. The one thing about the job of secretary of Homeland Security is you’re going to have to make decisions and a lot of them, and you have to be tough-minded about making them. So that made me feel she was a very good choice for the job. We also put into a place a very detailed transition plan, which I think worked very well. My personal advice, which I will keep personal to her, had to do more with the kind of unique perspective of the secretary. What does it mean to be responsible under HSPD 5 [Homeland Security Policy Directive 5 deals with management of domestic incidents] for coordinating response across the entire government? What does that mean in practical terms? What does it mean to deal with your Cabinet colleagues? What does it mean to deal with Congress?

Those are things which only the personal perspective of the secretary can lend. So it was that kind of personal advice that I gave. If you could, what policy or program would you like to see changed to better advance the homeland mission? There’s been a lot of continuity, so in one way I have to say there’s not one particular thing I can single out. I know Real ID is still in the balance, and I think we’re going to need to drive the ability to have a secure form of identification that’s used to get into airplanes or do whatever else we require knowing something about the people coming into or being in a particular location. So I’d like to make sure we’re committed to getting that done, I’d like to see we’re committed to getting the work under way on the issue of bioterrorism and I’d like to see us continue to implement a cyber security strategy. Last question. What were the greatest lessons you learned from being secretary? I guess I have to say in some ways, I probably dealt with more crises as secretary than in any other job. But I also have to say I was on duty as head of Criminal Division on 9/11, and that was certainly a crisis too, and I was there during Enron, and that was a crisis. I guess the lessons I learned were probably most in the area of crisis management. First, as I said, planning. Second, investing in building capacity so that when you do need to deploy something and you flip the switch, the light comes on. You can have a great plan but if you don’t have the capacity you’re not going to execute. Then I have to say, I find people consistently underestimate the gravity of a crisis. I don’t know whether it’s a psychological defense mechanism or a desire not to look like you’re unduly panicked or overreacting, but I find that people have a tendency – and I don’t care whether it’s a legal crisis, a natural disaster, or an act of terror – the first response I see almost uniformly is to downplay it. It’s almost like you’re in disbelief, and in my experience, over and over, I don’t know how many crises I’ve dealt with of every kind it is you actually have to fight against that impulse, because more often than not, you’re going to start off by doing too little rather than too much. At the close call, you’re always better off doing a little more than you need rather than doing a little less. Is that something that really came to light for you based upon the Katrina experience? Yeah, but not just Katrina. I’ve seen it with all the natural disasters, I’ve seen it with various kinds of terrorist plots and things of that sort we had to deal with, and then going back to dealing with some of the issues I had when I was at the Department of Justice, looking at 9/11. There I think everybody understood it was a big deal, but even look at some of the ways people reacted to the financial crisis, the Enron case, other cases. Once you’ve got the plan and the capabilities, you need to act forcefully and dramatically to make sure that you change momentum in the situation. I’ve been in too many meetings where people are almost paralyzed, and they say, “Well maybe we really don’t need to do this. Maybe that’s too much.” I’ve even seen it in exercises too. Now what I’ve learned having gone through a lot of these, your first impulse – “Maybe we don’t need to do it” – is not always, but more often than not, not correct, and that you’re better off doing a little more than you think you need, rather than doing less than you think you need.

13

,QWHUYLHZ LQGG

30


Whither the Patriot Act? By J.R. Wilson

n the weeks and months immediately following the September 11 terrorist attacks on New York City and Washington, D.C., Congress and President George W. Bush enacted legislation enhancing law enforcement capabilities to identify, track, and thwart future terrorist plans and to increase the security of the American homeland. One of the first of those was the Patriot Act, introduced into the House of Representatives as the Provide Appropriate Tools Required to Intercept and Obstruct Terrorism (PATRIOT) Act of 2001 and, following passage, into the Senate as the USA Act of 2002. After numerous amendments, the final bill, the USA PATRIOT Act, was introduced into the House on Oct. 23, 2001, and, after incorporating provisions of other House measures, passed overwhelmingly. It then passed the Senate with only one negative vote and was signed into law by the president on Oct. 26. Despite the near unanimous support of both political parties and both houses of Congress – and even its detractors acknowledging the need for many of its provisions – a number of “sunset” clauses were incorporated, under which some provisions would expire at the end of four years unless reauthorized, beginning on Dec. 31, 2005. While the most widely known – and, ultimately, controversial – legislative response to 9/11, the Patriot Act was not alone. Congress also created the Department of Homeland Security (DHS), bringing more than two dozen existing federal agencies under one umbrella organization. Other new laws were drafted to tighten America’s land borders with Canada and Mexico, enhance coastal security, and gain greater knowledge of and control over imported goods coming into the country by ships, aircraft, trains, and trucks. Other legislation demanded more information from and about nonU.S. citizens coming into the country, by whatever means and for whatever reasons. Some of these fell under an assortment of Trusted Traveler Programs, while others included the creation and coordination of “watch” lists by U.S., foreign, and international law enforcement agencies. More thorough searches of passengers boarding commercial flights and restrictions on what they could carry on board and what had to be checked – plus greatly intensified scrutiny of packages and cargo arriving at official ports of entry and, more recently, of outgoing traffic, as well – required increased levels of automation and rapid computerized information sharing to avoid unacceptable delays in the movement of goods and individuals into and out of the country.

I

While most of these measures were accepted as necessary – and, in many cases, even reassuring – by the vast majority of people involved – both Americans and non-citizens – others drew increasing criticism. Much of that was fueled by the interpretation of the Patriot Act in TV shows and movies, often exaggerating both how it is employed and what it actually allows. Those fictional elements then were picked up as fact and became the centerpiece of many protests, often to the dismay of those with legitimate concerns about real provisions of the law and their application. As Congress opened debate on the Patriot Act’s sunset provisions in the fall of 2009, keeping the debate focused on the oftenclassified record of terrorist or potential terrorist activities against U.S. targets foiled since 9/11 became increasingly important. However, there also was a new factor in the debate as a new administration moved into the White House. Much of what had become anti-Bush rhetoric began to deflate as President Barack Obama dropped some of his own campaign criticism to pursue many of the same policies as his predecessor – including the Patriot Act. “We’ve foiled quite a few attacks over the years, at least 23 that have been talked about publicly, but countless others we know have occurred but were not reported [to the public],” noted Jena Baker McNeill, a homeland security policy analyst at The Heritage Foundation. “And a lot of that goes back to the Patriot Act. You have to be able to use its provisions and we have been successful, which is one of the best reasons of all for continuing it. “Privacy needs to be a concern, but I haven’t seen a single convincing piece of information demonstrating the Patriot Act infringes on people’s liberties in any unconstitutional way. There are a lot of people who think anything is a problem, but I haven’t seen any proof of actual problems.” Others, however, believe some changes are needed. The Constitution Project, for example, released a report aimed at persuading Congress to modify three provisions facing sunset reauthorization votes – business/library records, surveillance of suspected “lone wolf” terrorists, and roving wiretaps – “incorporating important civil liberties safeguards” in the process. “We welcome the introduction of legislation that would enhance the privacy and individual rights of all Americans. The USA Patriot Act Sunset Extension Act would accomplish much of what is proposed in the Constitution Project’s Statement on Reforming the Patriot Act,” said Sharon Bradford Franklin, the project’s senior policy counsel. “Through these reforms, we can ensure that the federal government

14

3DWULRW $FW LQGG

30


U.S. Navy photo by Chief Photographer’s Mate Eric J. Tilford

An aerial view shows only a small portion of the crime scene where the World Trade Center collapsed following the Sept. 11 terrorist attack. Nearly 3,000 were killed in the attacks on the Pentagon and World Trade Center and aboard the hijacked aircraft. The Patriot Act was one of the more controversial pieces of legislation passed in the wake of the attacks.

is provided with the necessary authorities to keep our nation safe, while restoring critical safeguards for individual rights and liberties.” The Constitution Project also called on Congress to reform the National Security Letter (NSL) authority, expanded under the Patriot Act and not subject to sunset, along with provisions allowing deportation and visa denial. Citing a potential for abuse, the report called for strict limitations on NSLs, restricting them to situations in which there is strong evidence the target is an agent of a foreign power and the scope of the order is no greater than required to meet the needs of the investigation. With regard to business records, the Constitution Project called for tighter standards of evidence before a judge approves such orders and assurances that “the scope of the order is no greater than necessary to accomplish the investigative purpose.”

Claiming serious constitutional issues, the report called on Congress to allow the lone wolf provision to expire, on grounds anyone suspected of terrorist activities would still be subject to surveillance under traditional criminal investigative procedures. If it is reauthorized, the project called for a new sunset provision and full reporting to Congress on how many lone wolf surveillances are authorized and how many of those targets are charged and prosecuted. The “roving wiretaps” provision permits tracking multiple telephones and e-mail addresses without citing a specific location for the target. The report recommended a requirement that either the location or target be specifically identified. “Since the initial passage of the Patriot Act, we have learned how numerous provisions of the Act intrude upon Americans’ privacy rights and civil liberties,” the project stated in its report. “Although

15

3DWULRW $FW LQGG

30


many parts of the act were designed to remedy gaps in the United States’ intelligence gathering powers, the Patriot Act authorizes overly broad executive powers to track, monitor and search individuals without adequate safeguards to forestall abuse. In too many instances, such surveillance unnecessarily chills First Amendment freedoms and intrudes upon Fourth Amendment rights.” A report McNeill co-authored for The Heritage Foundation, however, calls for Congress to expand, not curtail, anti-terrorism legislation and law enforcement authority and further tighten control of the borders and enhance efforts to block illegal immigration. “Basically, it is not as simple as Hollywood makes it out to be, with government having all this power to see everything you do and take away anything they want. The difference between the Hollywood and real-life versions are there are a lot of safeguards in place,” McNeill said. “For example, with the roving wiretap, you have to show reasonable grounds and relevance, that it involves a foreign target. This isn’t something they can just do without anyone knowing about it. “And when they actually implement it, they have to report it to the FISA [Foreign Intelligence Surveillance Act] court, which is the court that determines if you have enough evidence to go forward; they have to approve what they are wanting to do. There are 11 FISA judges, all sitting federal court judges appointed by the Chief Justice to this additional task for a single seven-year term and rotating through oneweek assignments.” Even so, McNeill believes all anti-terrorism efforts should be tempered by traditional American rights. “We can’t have security at all costs – but we do need security that keeps us safe and free and prosperous. So while we do need the Patriot Act, we also need those provisions that require proof,” she said. “And if you are dealing with an American citizen, there are a lot more

safeguards in place. I think people forget the real purpose of all this, which is to keep Americans safer from terrorism.” Both reports have supporters in Congress as the Senate Homeland Security and Governmental Affairs Committee (HSGAC) and House Committee on Homeland Security begin debate on the Patriot Act sunset provisions and other legislation. One of the latter is new Senate legislation directed at potential weapons of mass destruction (WMD) attacks inside the United States – the WMD Prevention and Preparedness Act of 2009, co-sponsored by HSGAC Chairman Sen. Joseph Lieberman, I-Conn., and ranking member Sen. Susan Collins, R-Maine. “The bill would improve our nation’s ability to prevent and respond to WMD attacks,” according to Collins. “It would enact many of the recommendations of the Commission on the Prevention of WMD Proliferation and Terrorism – a commission the chairman and I helped establish in 2007. “The recent arrest of a terrorism suspect in Colorado is a sobering reminder of the continued threat to our nation. Al Qaeda and other terrorist organizations have publicly declared their intention to acquire and use weapons of mass destruction against the United States. “In the words of a former U.S. Embassy official in Afghanistan, ‘When you get to the point where you can smuggle tons of drugs through one border ... then you certainly have the capacity to smuggle in weapons of mass destruction or agents.’ Clearly, this threat is real, urgent, and evolving.” Collins said while she believes the Senate committee and Congress have strengthened intelligence-gathering efforts, tightened security at ports and chemical facilities, and vastly improved emergency preparedness, “the commission’s report provides a chilling reminder that ‘the terrorists have been active, too.’

CBP photo by Gerald Nino

President George W. Bush makes remarks to Homeland Security employees marking the first anniversary of the Department of Homeland Security.

16

3DWULRW $FW LQGG

30


“Nuclear proliferation and advances in biotechnology are giving terrorists new methods to commit mass murder. We must continue our efforts to identify risks and to increase security,” she said. “As the commission explained, the most likely WMD threat to the United States is a biological weapon. “It is easier to develop and disseminate bio-weapons and gain access to lethal pathogens. Furthermore, terrorists know that a bio-weapon can be a stealth attack. We may not immediately recognize such an attack until hundreds of people have died.” According to the commission report, however, security is seriously flawed at the nation’s biological labs, where some of the world’s most dangerous pathogens are stored. That was reinforced, Lieberman and Collins said, by a Government Accountability Office report on deficiencies in perimeter security at such facilities and an over-reliance on “self-policing” in laboratory regulation. “Thousands of people in the United States have access to dangerous pathogens. More than 400 research facilities and nearly 15,000 individuals are on the Select Agent List – an authorization to handle the most deadly pathogens,” Collins said. “The FBI determined that a cleared scientist at a regulated research lab likely carried out the 2001 anthrax attacks on the Senate and the U.S. postal system. “To counter this threat, the WMD Commission recommends increasing lab security. Our bill seeks to accomplish that goal by identifying those pathogens that terrorists are most likely to utilize and increasing the security standards at the biolabs that handle them. A negotiated rule making – with federal agencies and research institutions at the table – would develop these standards. This collaboration would ensure the regulations that make our nation’s biological labs more secure do not have the unintended consequence of deterring legitimate research.” The danger is further complicated by an unknown number of research facilities with no government oversight that handle other dangerous, though less strictly controlled, pathogens. The new legislation would require all such labs to be registered, with the implementation of a tiered system of facility security requirements based on the risk that terrorists could use a particular pathogen in a biological attack. It also would require the director of national intelligence to identify security measures in place and potential problems at high-risk biolabs in other nations. “This legislation provides a comprehensive framework for protecting the United States from weapons of mass destruction and biological attacks, in particular, which the experts say is more likely than a nuclear attack,” Lieberman said in introducing the WMD proposal. “Our bill would strengthen security at labs using the most dangerous pathogens, improve our capabilities to assess the threat of terrorists acquiring WMD, ensure that citizens get critical safety information, and develop a means for quickly delivering life-saving drugs to areas that have been attacked. “We dare not bury our heads in the sand and ignore the very real risks we face from a terrorist WMD attack. This legislation would help prevent such an attack and better prepare the nation to respond should one occur.” Despite the debate over specifics of the Patriot Act and other legislation, there is general agreement that the laws in place since 9/11 – along with greatly enhanced information sharing among law enforcement agencies – have played a significant role in the identification and arrest of suspects who intended to commit terrorist acts and in preventing attacks. At the same time, the fact such efforts continue to be discovered indicate there are gaps that enable some degree of planning success by terrorists and a need for continued government efforts. “We also must ask what further resources are necessary for departments and agencies at all levels of government to be better prepared to respond to these threats. And, we must always remember, while our nation has been hard at work realigning our defenses and response systems, the terrorists have been busy, too,” Collins warned. “Terrorists haven’t given up; they haven’t gone away. Our enemies remain fixed on their avowed goal of committing mass murder. “Eight years removed from the attacks of Sept. 11, 2001, our nation must remain vigilant against the Islamist terrorist threat we face. Recent cases drive home the reality of this threat. It is critical that we remain focused on the evolving and persistent threat of terrorism. We must not return to a pre-9/11 mentality.”

COBHAM SENSOR SYSTEMS WHERE THE POWER OF INTEGRATION IS ALWAYS WORKING FOR YOU Cobham Sensor Systems is: Sensor Electronics, Microwave Electronics, Microwave Components, and Advanced Programs & Technology. For added assurance, all our products, from the smallest MMIC components to the largest antenna subsystems, are designed, manufactured, tested and inspected to meet the most stringent customer specifications. Count on Cobham for your product needs: Electronic Warfare, Homeland Security, Radar, Ground & Mobile Communications, Smart Munitions, Search & Surveillance, Force Protection, Missiles, Space, Satellite Communication, SIGINT, and Overhaul & Repair. From names you know and trust: Atlantic Microwave, Atlantic Positioning Systems, Continental Microwave, Kevlin, Lansdale, M/A-COM, Nurad, REMEC Defense & Space, Sivers Lab AB.

www.cobham.com

17

3DWULRW $FW LQGG

30


Photo by Barry Bahler/FEMA

A crowded Washington, D.C., Metro Rail moves riders out of downtown D.C. Washington, D.C., has received $9.6 million in ARRA funds for improving transit security.

18

6WLPXOXV %LOO LQGG

30


Economic Stimulus Bill Earmarks Funds for Homeland Security Upgrades By Charles Dervarics

he nation’s sputtering economy is presenting a unique “win-win” situation for the federal government and regional homeland security leaders as new funding from the $787 billion American Recovery and Reinvestment Act (ARRA) begins to make its way from Washington, D.C., to the state and local levels. Better known as the 2009 economic stimulus bill, ARRA includes major new funding for a variety of Department of Homeland Security (DHS) programs, from border protection to airport security, U.S. Coast Guard operations, and support for local first responders. “Recovery Act projects are utilizing the latest science and technology to secure our country while creating jobs locally,” said Janet Napolitano, U.S. secretary of homeland security. The new dollars will touch virtually all major DHS offices and operations, with a long-term goal of making the nation more secure. Congress approved and President Barack Obama signed the measure in February 2009, with a goal to distribute nearly all funds by September 2010. For homeland security, the measure includes $3 billion across many areas. The largest DHS allotment is $1 billion for airport security, administered by the department’s Transportation Safety Administration (TSA). ARRA money will also support U.S. Customs and Border Protection (CBP), Immigration and Customs Enforcement (ICE), and the Federal Emergency Management Agency (FEMA).

T

Transportation Safety: A $1 Billion Ticket With its share of stimulus funds, TSA is planning a nationwide effort to use technology for more efficient operations. Under the bill, $700 million must go toward baggage-screening technology.

Already, the agency has awarded some of this money, with a focus on in-line baggage handling systems – the latest technology to screen baggage quickly for explosives. According to DHS, one advantage of these systems is that they eliminate the need for passengers to walk checked baggage to a screening location and wait for the baggage to clear security. With the new systems, TSA officers have on-screen viewing capabilities to screen baggage. As a result, there is less need for re-scans and physical bag searches. “These new in-line explosives detection systems will strengthen airport security and streamline the baggage screening process,” Napolitano said. Already, the department has awarded in-line baggage screening grants of $24 million for Honolulu International Airport, $11 million for Sacramento International Airport, and $7 million for Kahului Airport in Hawaii. The remaining $300 million will go toward checkpoint explosivesdetection technology at airports and other high-risk transportation hubs. One of the most popular systems in this area is Advanced Technology Checkpoint X-ray, or AT X-ray, a term that covers a wide range of new products that provide multiple views of carry-on baggage. AT systems use multiple X-ray angles or views and include highdefinition zoom and automated detection capabilities. The components represent a major upgrade from current systems, most of which rely on a single, top-down X-ray view, the department noted. “These resources are enhancing our nation’s explosives detection capabilities in airports throughout the country by significantly accelerating the deployment of more effective and efficient technologies,” said Gale Rossides, acting administrator of TSA. Using Recovery Act dollars, the agency has purchased 123 reduced-size explosive-detection systems from Reveal Imaging

19

6WLPXOXV %LOO LQGG

30


Secretary of Homeland Security Janet Napolitano visits the Transportation Security Administration (TSA) headquarters Jan. 26, 2009, to conduct a town hall with TSA employees. DHS has allotted $ 1 billion for airport security to be administered by TSA.

for concealed weapons, explosives, and prohibited items. DHS says this technology will help safety officers identify possible problems without a lengthy search via a pat-down or hand wanding. • Explosive Trace Detectors – Safety officers can use these detectors to examine articles and items for the residue of explosives. It also will allow for the identification of a larger range of explosives than found in current practice. • Universal Conveyor Systems – These systems automatically divert problem baggage from the cleared baggage stream, allowing a speedier flow of passengers through critical checkpoints. In another move to improve threat detection, the department is using nearly $8 million in Recovery Act funds to install

new closed circuit television systems at airports in Cincinnati, Ohio, Washington, D.C., Spokane, Wash., Grand Rapids, Mich., and Boise, Idaho. Taken together, these TSA investments present an unprecedented opportunity to promote security while meeting goals of the economic stimulus. “These ARRA funds will not only improve security, but also will create jobs and strengthen our economy,” Rossides said.

Emergency Preparedness: A Major Focus Another big winner in the Recovery Act is FEMA, the agency within DHS that coordinates U.S. response to national emergencies. The new bill has eight separate

TSA photo/Dittberner

Technologies under an existing contract. The agency also will purchase 44 AT X-ray units from Rapiscan Systems for approximately $3 million under another existing contract. Passengers also soon may see other new technologies that make their travels easier. Through this line item in the Recovery Act, DHS expects quicker adoption of other technologies such as bottled liquid scanners – detection systems that can differentiate liquid explosives from common liquids. This new equipment will aim sensors at a bottle opening, allowing it to analyze the intake of certain vapors. Other new technologies scheduled for greater use via Recovery Act dollars include: • Whole Body Imagers –These imagers allow the inspection of a passenger’s body

20

6WLPXOXV %LOO LQGG

30


Lawmakers Seek Accountability on ARRA Funds

DHS photo by Barry Bahler

From left to right, foreground: FEMA Administrator W. Craig Fugate (left) with Congressman C.A. “Dutchâ€? Ruppersberger, D-Md., DHS Secretary Janet Napolitano, and Maryland Gov. Martin O’Malley, announce the $380 million Preparedness Grant funded by the American Recovery and Reinvestment Act (ARRA), to pay for ďŹ re station construction and port/transit security initiatives nationwide, on Sept. 23, 2009.

allocations of money for FEMA programs. One of the largest amounts, $150 million, is for transit and rail security grants through which localities can hire transit law enforcement ofďŹ cers and make security improvements to high-density tunnels, stations, and bridges. Transit hubs also can use these funds for mobile explosive-detection screening teams, anti-terrorism teams, and other security enhancements. But there’s a catch in that last category: Projects must be “shovelready,â€? meaning the grantee must be able to complete the security enhancement within 90 days. Some of these dollars already are having an impact. In July 2009, the department awarded $78 million in Recovery Act grants for new transit security ofďŹ cers and equipment. Fifteen transit systems across the country received funding for 240 new ofďŹ cers. “Securing our mass transit systems requires well-trained personnel on the ground to protect against those who seek to cause harm,â€? Napolitano said in releasing the funds. Recipients included:

• New York City: $35 million, for improvements that include the hiring of 125 new ofďŹ cers; • Washington, D.C.: $9.6 million; • Chicago: $6.6 million for subway and commuter rail security; • Houston: $3 million; • Buffalo: $2.2 million; and • Cleveland: $1.4 million. In addition to hiring ofďŹ cers, these funds will support development of anti-terrorism teams, explosive detection canine teams, and mobile explosives detection screening teams. Elsewhere for FEMA, the Recovery Act has $210 million for Assistance to FireďŹ ghter Grants, a comprehensive initiative that may help communities in different ways. Funds can support ďŹ rehouse construction, with a maximum grant of $15 million. Projects also can build or modify existing ďŹ re stations – including aged or unsafe structures – in ways that improve response capabilities. The chief goal of this initiative is to help shore up local budgets and “keep ďŹ re houses open,â€? Napolitano said. “In other words, not to let the ďŹ reďŹ ghter infrastructure that we have

In approving the American Recovery and Reinvestment Act, President Barack Obama and Congress outlined policies to promote accountability and efďŹ cient use of public dollars. All federal agencies, including the U.S. Department of Homeland Security (DHS), must provide weekly updates, monthly ďŹ nancial reports, and award transaction data that is uploaded to Recovery.gov, a public Web site outlining the use of funds. The chief goal is transparency, so that the public can see the ow of dollars. At DHS, the inspector general’s ofďŹ ce also received $5 million through the bill to conduct independent oversight of program spending. Given the sprawling federal programs all located under DHS, the inspector’s ofďŹ ce said it will monitor activity closely. “There is ample evidence that the Department of Homeland Security has faced innumerable challenges in establishing management controls since its creation,â€? the inspector general said in a recent report. “The department has put a great deal of effort into improving its processes and controls over awarding, managing, and monitoring contract and grant funds, but it still needs to do more.â€? The Recovery Act also established a government-wide monitoring body. A Recovery Accountability and Transparency Board will conduct oversight activities to prevent fraud, waste, and abuse and to encourage transparency. Members of the board include the inspector general of DHS and 11 other federal agencies. More information is available at www.recovery.gov. The DHS inspector general’s Web site is www.dhs.gov/xoig.

21

6WLPXOXV %LOO LQGG

30


be constricted in such a fashion that some communities are having to contemplate.” Another $150 million is available for port security grants for anti-terrorism programs and protection against explosive devices and other non-conventional weapons. It also will support implementation of the Transportation Worker Identification Credential. To meet the daily needs of many individuals and families in this recession, the law earmarks $100 million for FEMA emergency food and shelter programs. Using measures of unemployment and poverty, the agency will allocate funds to cities and counties nationwide. The program also awards additional funds to areas of high need and those with sudden spikes in unemployment, poverty, and homelessness. “These ARRA funds will provide immediate relief to communities impacted by unemployment and poverty,” Napolitano said.

“The community organizations receiving this money not only support Americans in need, but also play a crucial role in helping to get our economy back on track and families back on their feet.”

Border Protection Programs Customs and border protection is another homeland security priority in ARRA. These funds will run through U.S. Customs and Border Protection (CBP), the nation’s largest law enforcement unit, with more than 20,000 uniformed officers at major air, land, and sea access points. In recognition of the agency’s importance, the stimulus bill provides $680 million, including: • $420 million for construction of land ports of entry; • $100 million for non-intrusive inspection technology;

• $100 million for border technology in the U.S. Southwest; and • $60 million for tactical communications. “These funds will support planning, management, design, alteration, and construction of CBP-owned land ports of entry,” said Jayson Ahern, the agency’s acting commissioner. In summer 2009, Ahern told a House of Representatives panel that this funding will provide “greatly needed improvements to our aging infrastructure, and for the addition of new technology at our nation’s borders.” In addition to the funding for CBP, the Recovery Act also includes $300 million for construction and repair of land ports of entry managed by the U.S. General Services Administration (GSA). Many CBP projects will target areas of the Southwest near the U.S./Mexico border. The agency said $269 million will go toward port

U.S. Coast Guard photo/Petty Officer 3rd Class Ann Marie Gorden

Sen. Thomas R. Carper addresses crew members of Coast Guard Station Indian River Inlet, Del., at the site of the station’s upcoming construction project May 8, 2009. Station Indian River Inlet received $11.5 million as part of the American Recovery and Reinvestment Act (ARRA) for refurbishing its critical infrastructure.

22

6WLPXOXV %LOO LQGG

30


UMBC on temp.indd 1

10/23/09 10:27 AM


FREKDP LQGG

30


ICE photo/Gerald L. Nino

The Department of Homeland Security is using American Recovery and Reinvestment Act funding to improve security at land ports of entry and along borders, such as the U.S./Mexican border (the United States is on the left side of the photo).

and infrastructure projects at Otay Mesa in San Diego, Calif., Antelope Wells, N.M., Los Ebanos and Corpus Christi, Texas, and Nogales, Ariz. Technology is another major theme, as $50 million will accelerate the deployment of surveillance technology and command and control operations in Arizona. El Paso and other areas of Texas will receive $50 million for tactical communication modernization. “The critical new technology and resources that DHS is sending to the Southwest border and across the country will contribute both to DHS’ security mission and the president’s effort to restore our nation’s economic health,” Napolitano said in awarding the funds. Another $42 million will purchase non-intrusive inspection equipment at border points of entry. DHS says the technology will include both small and large systems, with the latter able to scan tractor trailers.

Another DHS agency, the U.S. Coast Guard, will receive $240 million under the stimulus legislation. Bridge improvement is a major theme, as $142 million is earmarked for Mobile Bridge in Hurricane, Ala.; the EJ&E Bridge in Devine, Ill.; Burlington Bridge in Burlington, Iowa; and the Galveston Causeway Railroad Bridge, in Galveston, Texas. Coast Guard shore infrastructure projects will receive $88 million. The funds will support shore infrastructure projects, including personnel housing, boat moorings, and other improvements, in Alaska, Delaware, North Carolina, Oregon, Virginia, and Washington. Many of the Coast Guard’s 40-yearold cutters will receive improvements as well. Ships based in Alaska, California, Hawaii, South Carolina, and Washington will benefit from $10 million in upgrades to replace worn or obsolete components.

Elsewhere, the law will provide this additional funding: • ICE will receive $20 million for automation modernization and tactical communications; and • the Department of Homeland Security will receive $200 million to support continued consolidation of agency headquarters. The DHS inspector general will receive $5 million to conduct oversight and audits of Recovery Act spending (for more information on accountability provisions of the law, see sidebar “Lawmakers Seek Accountability on ARRA Funds”). When combined, these investments provide a significant opportunity to promote safety and security. Added Napolitano, “These funds will strengthen our economy while improving our ability to prepare for terrorist attacks, major disasters, and other emergencies.”

25

6WLPXOXV %LOO LQGG

30


The Minnesota Metric By Rich Cooper

hen most practitioners and observers think of cities or states where homeland security capabilities are on the leading edge, places such as New York City, Los Angeles, and Florida are mentioned. As accomplished as each of those areas and other locations may be in the homeland arena, there is one state that changed the metric of success – Minnesota. While known to most Americans more for its arctic winters, the Nordic heritage of its residents, and the land of 10,000 lakes, the 32nd state changed the dynamic of America’s homeland security experience during a tragic summer evening. As thousands of weary commuters made their respective ways home during the evening rush hour of Aug. 1, 2007, the westward span of Minneapolis’ I-35 Bridge collapsed into the Mississippi River, killing 13 and injuring more than 140 others. The imagery captured by everything from television cameras to cell phones showed a sight only imaginable in a Hollywood film. Cars, motorcycles, and buses were strewn along the fractured remnants of the bridge, with several more trapped under tons of steel, shattered concrete, and the churning waters of the Mississippi. As quickly as the event occurred, the area was inundated with city, regional, and state emergency personnel and equipment that sprang into action. With their emergency operations under way, other federal emergency personnel (FEMA, the U.S. Army Corps of Engineers, the U.S. Coast Guard, etc.) quickly joined these first responders, looking to assist. With so many parties rushing to deliver assistance, confusion and conflict between them was anticipated, but rather than getting in one another’s way, each of the respective responders played their particular role and worked cooperatively and cohesively with the others. As shocking as the bridge collapse was, the skill and effectiveness of the response was also cause for considerable attention. Following the well-chronicled dysfunction of emergency response in New York City on 9/11 and New Orleans during Katrina, the level of chaos and confusion experienced in the past had become the anticipated performance expectation. To the welcome surprise of many, such a poor performance metric was not achieved. As for why things went as well as they did in the midst of so much unprecedented destruction, police, emergency/rescue personnel, transportation officials, regional elected leaders, state agencies,

W

Cars and roadway litter the river where the I-35W Bridge collapsed in Minneapolis.

and other responders to the I-35 Bridge collapse all pointed to two things that made the difference: training and interoperable communications tools. When combined, the two enabled an almost seamless response.

Because of training investments that had been made in preceding years, elected leaders and first responders (local, regional, and national) had forged the necessary relationships to work together. Each of these players understood what they brought to an emergency and was able to put into action the plans and skills they had developed and refined together when their community needed it most. Without those relationships and enhanced understanding, many of the I-35 responders attested to news media and in incident reports that more lives would have been lost, additional injuries incurred, and community recovery further delayed.

Photo by FEMA/Gene Romano

Training

26

, LQGG

30


Navy divers from Mobile Diving and Salvage Unit (MDSU) 2 from Naval Amphibious Base Little Creek, Va., unload supplies onto the wreckage of the I-35 Bridge Aug. 7, 2007. MDSU-2 was assisting other federal, state, and local authorities managing disaster and recovery efforts at the site.

U.S. Navy photo by MCSN Joshua Adam Nuzzo

Interoperable Communications Tools Besides training, the state’s use of interoperable communications tools, specifically 800 MHz mobile radio communications, also enhanced the bridge collapse response. Utilizing federal grant dollars from the Department of Homeland Security (DHS) and other funding sources, the state, through its Department of Public Safety, established Minnesota’s Emergency Communication Networks. By creating one of the country’s first complete interoperability plans and establishing Statewide Radio Boards to govern its operational protocols, and having the funding (federal, state, local, tribal, and nongovernmental) to support it, Minnesota’s first responders were connected and operational from the moment the first 9-1-1 call came into Minneapolis. While there were still some minor issues that occurred during the I-35 Bridge collapse response, the overall communications system performed exceptionally well under pressure. Minnesota’s investments in training, relationship building, equipment, and operational protocols demonstrated the value of preparedness. Emblematic of the state’s history of “rugged individualism” and Midwest values for collaboration and cooperation amidst various challenges (e.g., severe weather, flooding, etc.), Minnesota’s actions on a tragic August evening helped change what had been the anticipated metric for homeland security action – dysfunction. While there were 13 people killed in the I-35W Bridge collapse incident, this region showed the country and the world what

happens when people plan, prepare, and partner together. The habitual failures that had occurred on 9/11 and the 2005 Gulf Coast hurricanes in communications interoperability, confused incident command structure, lack of coordinated response, and other breakdowns did not occur in Minnesota. When examining the coverage of events from 9/11, the 2003 East Coast blackout, Hurricane Katrina, and so forth, it is easy to track the same recurring failures that have occurred time after time. Minnesota broke that cycle. In spite of the 13 lives lost and over 140 injuries in the I-35W Bridge collapse, Minnesota’s actions were a “tragic success.” While training, exercises, and operational plan development will never provide the photo ops that many elected officials covet when they bring homeland security dollars “home,” they do enable the metric and dividend taxpayers expect – performance when it matters. Knowing what to do, how to do it, and who is ready to assist during an emergency makes the difference every time – a metric Minnesota has shown in action. Metrics of saved lives, coordinated actions, reliable and interoperable communications, and improved emergency response have proven the value of Minnesota’s investment strategy in people, programs, and resources. They recognize that when they all come together, the performance metrics will speak for themselves, and that’s what makes them a national model for homeland security success.

27

, LQGG

30


Shield America By Christopher Prawdzik

lot of everyday products appear rather innocuous to the typical American user. From computers with advanced microprocessors to cell phones and other communication technology, such technologies are taken for granted. Most users just want a fast computer or a cell phone with good reception. But start thinking about such products in the context of terrorism, weapons of mass destruction (WMD), or an improvised explosive device (IED), and these inconspicuous products take on a whole new meaning. It’s something U.S. Immigration and Customs Enforcement (ICE) at the Department of Homeland Security (DHS) thinks about all the time, and it established Project Shield America for such concerns. Essentially, Shield America is part of an effort to stop illegal exporters, unfriendly countries, terrorism suspects, or any other criminal entity from exporting components and outright weapons that could be used or altered as a WMD against U.S. citizens at home or against troops abroad. Before DHS was created after 9/11, a similar program, called Gemini, was in place, but when the world changed in 2001, DHS created Shield America to pick up where Gemini left off. Previously, several departments had their hand in these issues, including the Department of Commerce and the U.S. Bureau of Industry and Security, but U.S. Customs was primarily charged with investigating and enforcing all of the U.S. export laws, according to Clark Settles, unit chief for counterproliferation investigations at ICE. “After 9/11, obviously we really beefed that program up and started targeting speciďŹ c – initially speciďŹ c – companies involved in hightech industry for WMD or anything that we thought could hurt our country,â€? he says. “We kind of prioritized it with the most heinous stuff and worked our way back.â€? Shield America is basically a three-level effort at enforcement that includes inspection/interdiction, investigations, and international cooperation. According to ICE, U.S. Customs and Border Protection (CBP) positions inspectors at “high-threatâ€? ports to inspect questionable and suspect shipments. ICE agents then investigate any of this questionable cargo and ensure four particular laws are obeyed, namely the Export Administration Act, Arms Export Control Act, Trading with the Enemy Act, and International Emergency Economic Powers Act. The entire effort also utilizes cooperation among ICE ofďŹ ces worldwide, often with local government support, to ensure successful domestic investigations. Under the Arms Export Control Act, for example, ICE keeps an eye on “single useâ€? and military applicable materiel. “In order to be able to export those out of the United States, an exporter or a country has to apply, register with the Department of State, and apply for an export license,â€? Settles said. “The Department

of State makes a determination whether or not we would allow [for example] an F-5 part to go to London ‌ but we may not allow that same F-5 part to go to Iran.� Items under the Export Administration Act, on the other hand, include material with both a civilian and a military application. This could include items such as parts for a C-130 aircraft but also could include otherwise innocuous items by themselves that could be converted or adapted for use as a WMD or a chemical, nuclear, or biological weapon. Settles notes that, for example, the vast majority of steel and other components necessary for uranium enrichment are typically harmless on their own. In addition, a lot of chemical/biological items – centrifuges and such – have both medical applications for research but also can be used for developing chemical and biological weapons. According to ICE, several strategic technology items are targets of terrorists and unfriendly countries, many products of which might seem harmless back at home. These can include modern

Photo courtesy ICE

A

28

6KLHOG $PHULFD LQGG

30


DoD photo by Lt. Baranek, USN

An air-to-air left side view of a Marine Corps F-5E Tiger II aircraft, foreground, and a Navy F-14 Tomcat aircraft. Both F-5 and F-14 aircraft were sold to the government of the Shah of Iran before he was deposed. ICE has thwarted attempts to export F-5 and F-14 parts to Iran, and, in a recent case, the attempt to send an entire decomissioned F-14 to the country.

manufacturing technology that is used to produce a variety of “microelectronics, computers, digital electronic components, and signal-processing systems.” In addition, any technology used in aircraft and missile development, tracking system components, and, as Settles noted, any items used to build nuclear weapons or other nuclear materials as well as biological and chemical warfare agents are targets, but so is the equipment used to manufacture such materials. Craig Larrabee, section chief for counterproliferation at ICE, said the key is connecting with industry to discuss these export control laws, which limit their ability to export or just add additional steps to ensure security within a particular transaction.

Arguments supporting Shield America are not difficult to make. “We talk about how we protect our own warfighters, how we protect our technology from countries that are trying to steal our technology; we also discuss the fact that some of this stuff could be used against our troops. I think particularly in times of war when you have our boys over there in Iraq and Afghanistan, that hits home to these guys,” Larrabee said. Settles agreed. “We go out there and … a lot of people may not understand how a seemingly innocuous part could end up really hurting somebody that they love, and we try to demonstrate it to them, show them the laws,” he said. “It does one other thing too … it helps us to demonstrate that if that company does anything wrong, that they also knew the laws.”

29

6KLHOG $PHULFD LQGG

30


Management for the 21st Century

As veterans and Boomers make their exit from the federal workforce, agencies are seeking the best ways to pass the torch to the next generation of federal employees. Many of today’s supervisors and managers also manage a workforce of remote team members. Explore current management challenges facing the federal sector. Generation Shift: The Emerging Federal Workforce MGMT8199D Managing a Virtual Workforce

MGMT9013D

These courses are conducted on-site at your location to eliminate travel costs and maximize employee time.

For additional courses and to register, visit graduateschool.edu or call (888) 744-GRAD.

The solution is clear. For better image quality, consider a cargo screening system with a LinatronÂŽ X-ray source. Varian X-ray accelera-

tel: 702.938.4859 fax: 702.938.4833 www.varian.com/sip

030.indd 1

tors and detectors are used in hundreds of cargo screening systems to help secure ports and borders throughout the world. Varian and Varian Medical Systems are registered trademarks of Varian Medical Systems, Inc.

10/23/09 2:08 PM


Photo courtesy ICE

Qing Li was sentenced in the Southern District of California to 12 months and one day in custody, followed by three years of supervised release, and ordered to pay a fine for conspiracy to smuggle military-grade accelerometers from the United States to the People’s Republic of China for what her co-conspirator described as a “special” scientific agency in China. This accelerometer has military applications in “smart” bombs and missile development and in calibrating the g-forces of nuclear and chemical explosions.

Education is the cornerstone of these efforts. Since Shield America began, ICE has conducted more than 17,000 industry outreaches to explain to industry how a variety of products and technologies could turn into a threat for families or soldiers overseas. But it’s a two-way street. Settles and Larrabee both noted numerous occasions where industry individuals have contacted ICE and simply said, “This just doesn’t seem right.” Long-term contact especially with major defense contractors, has allowed the program to grow and has helped educate all parties about suspicious inquiries that often come from overseas. “The other part is you know there’s always going to be somebody in the U.S. that’s doing things wrong,” Settles said. “If we have a company in the U.S. that is ignoring export control laws and giving

themselves an unfair advantage over other industry, then certainly we want to know about that too.” According to Larrabee and Settles both, industry is more than willing to cooperate to ensure they do their part. “Industry spends millions and millions of dollars developing this technology, and our patents and everything else make a lot of difference here in the U.S., but in those foreign countries, they don’t care what kind of paperwork you have,” Larrabee said. “They’re going to duplicate that, and once it’s duplicated by a foreign government or a foreign entity, [they] can do it for pennies on the dollar.” As a result, the market value of some quite sophisticated material is compromised, therefore damaging an individual company’s ability to make a profit on its own research and development.

31

6KLHOG $PHULFD LQGG

30


connected to the illegal export of “low-noise amplifier chips,” which are crucial components for the Hellfire missile. In February 2005, a Colombian man was sentenced to 25 years in prison for a plan that would have sent 4,000 grenades, 1,800 assault rifles, and dozens of grenade launchers and machine guns to a Colombian terrorist group. And in July 2005, an Iranian man pleaded guilty after attempting to export F-4 and F-14 components to Iran. The plot began with an attempt to get 100 gunnery systems to export to Iran. But additional information obtained by ICE revealed he planned to attempt to send an assembled F-14 fighter jet to Iran. At its heart, however, Shield America is not in the business of discouraging exports. It is a protection mechanism to ensure the know-how and technical superiority that go into making products in the United States do not enter the hands of adversaries who are intent – on several fronts – to stifle, steal, and impede the technological progress that touches everything in the country, from

U.S. Navy photo

“We make some very impressive items here in the United States,” Larrabee said. “We have technology that other countries are still seeking, and sometimes that may be our standard-use widget that goes into our cell phone towers, but other countries may want it for their military radar systems – there’s all kinds of situations like that.” The cooperation among manufacturers and Shield America is quite evident. In recent years, several instances have proved the effectiveness of the program, and the result likely has saved the lives of Americans at home and abroad. For example, in March 2003 – just prior to the beginning of Operation Iraqi Freedom – two defense corporations settled with the State Department for $32 million after charges that indicated the corporations shared illegal satellite technology with China, according to information provided by ICE. The following year, China again entered the picture when the president of a Florida company – a naturalized U.S. citizen – along with a Chinese individual pleaded guilty to “making false statements”

U.S. Marine Corps photo by Cpl. Seth Maggard

ABOVE: Ernest Koh was sentenced in the Eastern District of New York to jail after his conviction at trial for obtaining components that can be used in C-130 military transport planes and P-3 naval aircraft (P-3 Orion pictured), and diverting those parts to Malaysia for ultimate transshipment to Iran. In total, Koh illegally exported roughly $2.6 million in aircraft parts to Iran. RIGHT: EN2 Russell Osbun, Riverine Squadron 3, Detachment 2, Regimental Combat Team 5, looks through his night optic device while acting as a gunner aboard a Riverine Patrol Boat on Lake Quadsiyah, in Haditha, Iraq, on July 11, 2008. An ICE investigation led to the arrest of Zhao Xin Zhu and John Chu for conspiring to violate the Arms Export Control Act through their efforts to obtain U.S. origin Generation III night vision equipment, militarygrade power converters, and traveling wave tubes used in satellite and radar applications for export to the People’s Republic of China.

32

6KLHOG $PHULFD LQGG

30


set up to adapt to the times, [and] our agents are set up to adapt cellular phone and computer technology to those pieces of equipto the times, adapt to threats, and target industries as the threats ment used every day by soldiers, airmen, and Marines stationed come about.â€? overseas. It’s a matter of discovering new threats and addressing them. Ac“It’s kind of a twofold thing: We ‌ educate so we can stop the cording to Larrabee, one of the strengths of the program is that it’s unintentional exports – illegal exports,â€? Larrabee says. “The second adaptable to change based on technology. The challenge is making part of it is really to get the cooperation [with industry] because the sure even the most innocuous items are checked beforehand to enbad guys overseas don’t call ICE to ďŹ nd out. ‌ [Industry are the] ones sure there’s no underlying threat. who get called.â€? “Most of these things are lawful to possess, own, and sell within One thing Shield America continues to emphasize is that it’s not the United States,â€? Settles said. “It’s only [dangerous] when you exjust defense contractors who are targets. Any individual in the priport them.â€? vate sector, military, or technological ďŹ eld performing “research, development, production, or sales,â€? according to ICE, “are potential acquisition targetsâ€? Two tools that Shield America recommends can go a long way toward preventing the wrong technology or item getting in the wrong hands. First, ICE recommends industry indi viduals implement an Export Management System (EMS). This includes developing a policy statement indicating “commitment to export control,â€? and identifying individuals responsible for it. It also includes a strict training regimen for employees, recordkeeping compliant with export regulations, periodic performance reviews of the sys tem, a process to address any violation, and strict reporting policy to U.S. customs. In addition, Shield America also outlines possible indications of illegal export attempts, including customers working on a cash-only basis, customers willing to pay well beyond market value, and “end-useâ€? documentation that is incomplete or the ďŹ nal indicated recipient is another export company or entity, CENTER FOR CONTINUING & PROFESSIONAL EDUCATION separate from the purchaser. Other red ags include a customer unfaEmergency Preparred e nesss miliar with business itself or who is simply & Communicat tion unfamiliar with a given product, a customer using unusual shipping routes, or a package that is improperly marked for its contents. ;40 4 0 A =8=6 With these guidelines and a lot of cooperation from industry, the process tends to run more smoothly, but it’s still a matter of Custom Education Programs ICE and industry being vigilant. “We’re talking about items leaving the Improve Yourself. country that are going to be used by foreign adversaries,â€? Larrabee said. “I think today is as good a reminder every day because our guys are on the ground in other countries – Does your organization have unique needs? that’s really a reality of it.â€?

Industry and individuals must decide whether they want weapons and technolo Communications gy ending up in the hands of insurgents and Management if they want to diminish the country’s miliLeadership tary superiority. In many cases, they must Custom Education also decide if they want to risk going to jail. “Most industry understand that; we’re talking everything from microchips to ďŹ reCCPE.GEORGETOWN.EDU/homeland arms,â€? Larrabee added. “The program is

HOMELAND

SECURITY

6a^f h^da bZX[[[ bTTc 5 [Tg XQ[T 0?? ? ; 8 4 3 Internationa al U^a\Pc cb Migration Studies <d[[cX SXbRX__[X] Pah 8\_a^eT H^da F^a[S

;TPa] <^aT 0__[h =^f

6KLHOG $PHULFD LQGG

30


CDC photo by James Gathany

34

3QGHPLF LQGG

30


Pandemic Preparedness By Christopher Prawdzik

ecretary of Homeland Security Janet Napolitano appeared on NBC’s Today show Sept. 2, and just after a segment showing a student with a mask in his pocket to protect against swine flu – the H1N1 virus – Napolitano said, under her breath (according to host Meredith Viera), “That’s not going to do a thing.” The former Arizona governor then said it’s the “simple things” that can help stop the spread of the disease, such as washing hands and coughing into the sleeve. But even these simple things aren’t likely to be enough. After waning during the summer months, she and a variety of health care officials fear the swine flu will re-emerge in the fall and winter months. “Every state has submitted now a vaccine plan and, you know, the vaccines are really focused at the initial level on those most susceptible … school-age children, adults who have underlying conditions like asthma, [and] pregnant women,” Napolitano said. Fortunately science and medicine have advanced, which has saved lives, but when dealing with an influenza virus, it’s an uphill battle. At the height of the bird flu scare in 2005, the Homeland Security Council released the National Strategy for Pandemic Influenza that illustrated some unknown realities that indicate a pandemic – an epidemic spreading among multiple countries – is only a matter of time. Despite annual vaccinations, the National Strategy noted that the country faces about 36,000 flu deaths and 200,000 hospitalizations each year. The cost to the country is more than $10 billion annually. So, with the possibility – and many believe likelihood – that swine flu sweeps through the country in the 2009/2010 fall and winter months, the Department of Homeland Security (DHS), in conjunction with the Department of Health and Human Services (HHS), Centers for Disease Control (CDC), Department of Commerce, and Department of Education, produced guidelines for the most vulnerable subpopulations in the country. As the school year crept closer in August, CDC released a report of updated federal guidelines for swine flu in schools to stem the tide and educate students and educators on the best ways to contain the virus and limit its spread.

S

CDC’s Dr. Terrence Tumpey, microbiologist for the National Center for Infectious Diseases, examining specimens of the 1918 pandemic influenza virus – a virus that was reconstructed in hopes of combating a future influenza pandemic. Tumpey recreated the 1918 influenza virus to identify the characteristics that made it so harmful. This effort enables researchers to develop new vaccines and treatments for future pandemic influenza viruses. The 1918 flu epidemic was caused by an influenza A virus (H1N1), and killied more than 500,000 people in the United States and up to 50 million worldwide. Influenza A (H1N1) viruses still circulate today after being introduced again into the human population in the 1970s.

35

3QGHPLF LQGG

30


UMUC

HOMELAND SECURITY HZg^djh ^hhjZh# HZg^djh deedgijc^i^Zh#

Biosecurity . . . information assurance . . . emergency management . . . fire science . . . criminal justice. The demand for trained leaders in a wide range of security-related disciplines will grow 23 percent through the next decade. Find out where you fit in. An undergraduate or graduate degree or certificate from University of Maryland University College (UMUC) can get you where you want to be. 8dckZc^Zci dca^cZ VcY dc"h^iZ XaVhhZh 9Zh^\cViZY Vh V CVi^dcVa 8ZciZg [dg 6XVYZb^X :mXZaaZcXZ ^c >c[dgbVi^dc 6hhjgVcXZ Wn i]Z CH6 VcY i]Z 9ZeVgibZci d[ =dbZaVcY HZXjg^in HX]daVgh]^eh! adVch VcY Vc ^ciZgZhi"[gZZ monthly payment plan available

Enroll now. Call 800-888-UMUC or visit umuc.edu/accomplishtoday

Copyright © 2009 University of Maryland University College

umuc on temp.indd 1

3/20/09 11:17 AM


PHIL photo by C. Goldsmith and D. Rollin

CDC photo

LEFT: This colorized transmission electron micrograph (TEM) reveals the presence of a number of novel H1N1 virus virions in this tissue sample. Novel H1N1 (referred to as swine u early on) is a new inuenza virus causing illness in people. This new virus was ďŹ rst detected in people in the United States in April 2009. On June 11, 2009, the World Health Organization signaled that a pandemic of novel H1N1 u was under way. RIGHT: This TEM depicts a number of inuenza A virions. Inuenza A viruses can be broken down into different strains. Current subtypes of inuenza A viruses found in people are inuenza A (H1N1) and inuenza A (H3N2) viruses. In spring 2009, a new inuenza A (H1N1) virus emerged to cause illness in people.

Announcing the guidelines Aug. 7, Napolitano and HHS Secretary Kathleen Sebelius emphasized that a prevention approach requires participation from individuals, not just the government. “The federal government continues to coordinate closely with state and local governments, school districts, and the private sector on H1N1 preparation as we head into the fall u season and upcoming school year,â€? Napolitano said. If the fall 2009 outbreaks are similar to those in the spring, guidelines include the requisite hand washing, but also vigilance in recognizing those with u symptoms. The recommendation is staying home for 24 hours after a fever subsides. In addition, the guidelines encourage schools to have a room away from other students and teachers for sick students until they can go home. On top of that, schools should plan a variety of options for students to continue their studies at home, if possible, through a variety of methods, including Internet, phone, and other distance-learning tools. But if the virus takes off, with “severe illness, hospitalizations, and deaths,â€? educators are encouraged to ratchet up their response to the problem – from encouraging parents to monitor their children’s health closely each day to encouraging schools to get sick students home as soon as possible. SpeciďŹ cally, the guidelines are broken into several sub-categories – targeting preschool and early childhood development programs, kindergarten through 12th grade, and then colleges and universities. The guidelines run the gamut from home approaches to those for the school. The K-12 guidelines, for example, encourage parents to keep sick students home for ďŹ ve days from the beginning of the illness or longer, until the virus runs its course. School responsibilities include ďŹ nding ways to “increase social distances (space between people) at school if possible.â€? The guidelines also recommend “creativeâ€? ways to do this and “still keep students in

school.â€? While there’s no one-size-ďŹ ts-all solution, some recommendations include rotating teachers instead of having students move from class to class. Also, holding class outdoors, where possible, could work – or even moving desks farther apart in a given classroom. Another step is for schools and local ofďŹ cials to work together and coordinate emergency student dismissals if necessary. The community as a whole should then reassess when students should return to school. If dismissals are in order, the guidelines detail three forms of school dismissal: • “selective dismissalâ€? would be favorable for high-risk students, possibly those in schools with children prone to illness or schools with pregnant students. In this instance, some schools might close and others may stay open; • “reactive dismissalâ€? is a closure due to a large number of students or educators already sick, or the result of large numbers of students being sent home; and • “pre-emptive dismissalâ€? is just what it says – a dismissal to hopefully stem the spread of the u to other healthy students. According to the guidelines, “This dismissal is most effective at decreasing u spread and burden on the healthcare system when done early.â€? Regardless of the type of dismissal, ofďŹ cials recommend large gatherings be canceled to prevent the spread as much as possible. These would be local- and community-level decisions, however, with ofďŹ cials assessing the needs and details of each situation. The plan also notes some essential employer support in case of school dismissals in particular communities. For example, if parents can’t be home to care for a sick child, the risk grows for other students at a given school. Again, these would be up to a particular employer, but the guidelines recommend exible leave policies and even telecommute options where possible.

37

3QGHPLF LQGG

30


The CDC’s “Guidance for Businesses and Employers,â€? can help in this area as well. In conjunction with DHS and the Commerce Department, it’s a plan to address not only H1N1 but even seasonal u outbreaks. The guidance recommends adults with u symptoms stay home at least 24 hours after their fever subsides. Not unlike schools, the business guidance notes that workplaces can act as a “point of spreadâ€? in the community. As a result, ofďŹ cials recommend a variety of approaches to stem the u virus spread. For starters, they recommend businesses review – or develop – their own pandemic u plans, familiarize staff regarding the plan, and even explain impacts to salary, leave time, and other beneďŹ ts. The guidance encourages sick-leave policy reviews that not only include solutions for sick employees but also might address leave for employees with children who contract the virus. Other solutions include a “buttonâ€? on the company Web site for employees to get updated information. And just like schools, maintaining cleaning supplies, tissue, soap, and hand cleaners and ensuring common areas are kept clean can go quite far toward preventing disease spread. One of the most crucial components for businesses is encouraging sick employees to stay home if sick. Also, separating the work population, if possible, and eliminating hand contact can reduce the spread of the virus. Recommendations do not encourage employees from a sick household – but who are unaffected – to stay home. Children of infected parents, however, should stay home for ďŹ ve days from the time an adult family member becomes sick. These new guidelines developed in the late summer build on the National Strategy developed by the Bush administration in 2005. Not unlike the changing landscape of homeland security, homeland defense, and disaster preparedness, pandemic planning follows a similar path. In recent years – particularly after September 11 and then the aftermath of Hurricane Katrina – communication across agencies became a focal point and is today considered crucial to a national response to any crisis, whether it be terror-related, a natural disaster, or a pandemic, and it’s a cornerstone to any strategy.

DHS photo

Secretary of Homeland Security Janet Napolitano joined Secretaries Gary Locke of the Department of Commerce (left) and Kathleen Sebelius of the Department of Health and Human Services (right) Aug. 19, 2009, to announce new guidelines for businesses in preparation for u season.

The strategy reects this cross-agency cooperation in its approach to a pandemic. The guiding principles behind the strategy include options for the government to use any instrument necessary to address such threats, state and community preparedness plans, privatesector participation and cooperation, individual citizen involvement, and partnerships around the globe to stem the spread of any virus. Overall, the strategy is built on three pillars: preparedness and communication; surveillance and detection; and response and containment. Bringing all of these together to support the changing landscape of a global pandemic is crucial. The structure of all of these plans, guidelines, and directives has a common thread and can be applied in response to a variety of pandemic threats, not just bird u, swine u, or the next outbreak that emerges when a new strain is resistant to a particular vaccine. With the framework in place, however, federal ofďŹ cials all the way down to state and local ofďŹ cials can more quickly react and prevent the next possible outbreak. Much of this includes common-sense approaches, such as the aforementioned hand washing and limited contact, but it’s the exceptions that can lead to a bigger outbreak. And it likely varies depending on the strain. One of the most difďŹ cult factors of H1N1, for example, is that it’s hard to determine who has it or seasonal u, and health ofďŹ cials will likely not perform tests. People with symptoms are just encouraged to stay home. Those most susceptible to the virus are children younger than 5, those with chronic medical problems and compromised immune systems, pregnant women, and people over 65. Although the threat grows as children return to school and the winter descends on the United States, there were some bright spots in the spring. “The science tells us that this is most likely a milder strain than we ďŹ rst feared,â€? Napolitano said May 6. “But ‌ now is not the time to declare victory; we continue to have cases; we continue to vigilantly monitor the situation; and even if the encouraging signs we are now seeing hold ďŹ rm, we know that this virus could come back stronger in the fall.â€? In September, Napolitano reiterated that the coming winter will likely show an increase in cases. And beyond schools and businesses, Napolitano noted that DHS has met with airlines to ensure hand washing is readily available on ights. But she emphasized that individual airlines would have to make their own decisions if they decide to prevent an individual with u-like symptoms from boarding a given ight. None of these recommendations are mandatory, from employers’ and school’s plans to even requiring a vaccination. “Because health programs generally aren’t mandatory, and you get kind of pushback on that. We think, overall, people will want to get the vaccine when it’s ready,â€? she said. “And we’re going to be pushing it out to the states and then ‌ school districts; cities will be in charge of how they actually distribute it.â€? Congress already has appropriated billions for vaccines, she said, and those funds already were distributed to the states. But Napolitano emphasized the changing environment, and said it’s a situation that must be monitored on a daily basis. “If a further appropriation is necessary by the Congress,â€? she said, I’m sure they’ll consider it.â€? For the latest information on the pandemic, prevention techniques, suggestions, and updates on the latest alerts and news for families, businesses, and individuals, www.u.gov remains up to date and can provide answers to many questions someone might have if exposed to a possible u threat.

38

3QGHPLF LQGG

30


Â

POC...DELIVERING NEW TECHNOLOGIES THAT MAKE A

POC continues our commitment to develop advanced products and new technologies for the protection of our nation.

DIFFERENCE.

AAR - Advanced Avionics Recorder

WPIC™ - Wireless Personal Information Carrier System IHC™ -Object Oriented Video Compression NVG - VIS/NIR/LWIR SOSILŽ - Solid State Illumination System

WEARNET™ Wearable Personal Area Network FAERITOŽ Digital Video/Audio/Data Recorder

LEXIDÂŽ Handheld X-Ray Imaging

OmniNetwork™ Omni Directional / Surveillance Network

VPDOO V\VWHPV LQWHJUDWRU RI DGYDQFHG WHFKQRORJ\

39rr.indd 1

™

3K\VLFDO 2SWLFV &RUSRUDWLRQÂŽ

www.poc.com 20600 Gramercy Place, Torrance, CA 90501-1821 (USA) 3K ‡ )D[

10/26/09 11:52 AM


Vixen on temp.indd 1

8/10/09 11:04 AM


SPECIAL SECTION • U.S. Customs and Border Protection

SPECIAL SECTION

CBP U.S. Customs and Border Protection By J. R. Wilson

&%3 LQGG

30


SPECIAL SECTION • U.S. Customs and Border Protection

Fighting the War Against Narco-terrorism t is a war that has claimed thousands of lives in the past three years alone. It has seen a surge of U.S. personnel, with new weapons and equipment. It has seen last year’s record successes far surpassed this year – yet everyone agrees all efforts to date have fallen within the enemy’s forecast “expected losses.” While the term “war on drugs” is now out of favor in Washington, those on the front lines along America’s thousands of miles of land and coastal borders know it is a real fight. In Mexico alone, an estimated 1,000 police officers and soldiers have been murdered since President Felipe Calderón took office three years ago and launched a major new crackdown on his nation’s increasingly violent drug cartels.

I

Cities such as Ciudad Juarez, directly across the border from El Paso, Texas, have become bloody war zones, examples of an increase in violence officials fear will spill across the border into the United States. To deal with the rising dangers facing its agents, the Border Patrol (BP) has begun upgrading its helicopters to the first armored platforms in BP history. But the Border Patrol is a law enforcement agency, not a military organization, and it most often relies on non-lethal methods to combat the flow of illegal drugs into the United States. “This is the busiest sector, not only on the Southwest border, but on any given day anywhere between official points of entry. We

Photo courtesy of ICE

CBP Combats Drug Smuggling

42

&%3 LQGG

30


Photo courtesy Office of Field Operations

SPECIAL SECTION • U.S. Customs and Border Protection to be very flexible and nimble in our operations to try to stay ahead of account for 40 to 50 percent of all drugs seized by the Border Patrol them, if we can,” he added. in the United States,” said Rick Moody, the Tucson Sector’s assistant Tucson has the most agents of any sector in the nation – 3,000 chief patrol agent-operations. “We have 262 miles of border and of the BP’s 20,000 total agents nationwide – many of them new to about 90,000 square miles to cover, so this is the centerpiece of the service. activity the Border Patrol encounters. “We have recruited, trained, and deployed a lot of new agents, so “Through FY 2009, we seized more than 1.2 million pounds of we have a lot of young people out there now – dedicated and commarijuana – worth almost $1 billion – a 48 percent increase from mitted and doing a great job,” Moody said, though he added that not FY 08 and 47 percent of all seizures along the Southwest border. everyone understands just how dangerous the job can be. “In the That is pretty significant. However, intelligence indicates the Mexican history of the Border Patrol, 109 agents have been killed in the line of marijuana smuggling cartels factor in a 10 percent loss to seizures. duty, including an agent recently murdered in California. So while we highlight that as a success, we know there are still some “What we do is dangerous, and we work in a lot of unforgiving looming problems out there.” terrain that injures agents every day. But we know that coming in. The smugglers also are versatile and quick to respond to any new We’re out here doing a difficult job under difficult circumstances, day BP tactics or successes. Drugs have been seized inside cars, buses, in and day out.” and tractor-trailer rigs at checkpoints north of the border, from indiTucson also has been a heavy user of technology to reduce that viduals – called mules – who carry 60 to 80 pounds strapped to danger level and enhance its efforts to combat smuggling. their bodies, and, in an increasingly popular new tactic, from ultralight Among those is the mobile surveillance system (MSS), a trucksingle-seat aircraft carrying up to 300 pounds of cargo. mounted package comprising a high-resolution thermal-imaging “We have detected just over 90 incidents of ultralights, although camera slaved to a radar system. The MSS can survey several miles not all detections result in an interdiction or arrest. It’s hard to meaout, with the radar detecting any movement and the camera then sure how many we did not detect,” Moody said. “It’s a new trend, so being used to identify it. If the target is considered suspicious, the we’re working with [CBP] Air and Marine and other law enforcement system also provides coordinates that are relayed to agents on the agencies to try to understand this dynamic a little better and exploit ground or in the air for further investigation or interdiction. some technologies that will help us better detect what is actually beOther sensors include motion detectors, typically buried in the ing flown across the border and interdict it.” ground, and infrared and electro-optic cameras mounted on poles or So far, BP has identified three ways smugglers use ultralights. The carried by UAVs. These can be remotely monitored round the clock, first is an air drop, where they fly over a target area, such as a resienabling one agent to cover a great deal of territory. dential backyard, and drop the drugs. The aircraft can fly about 60 miles north of the border with a 300 pound load and make their drop in seconds, giving them a large area to exploit and making detection – much less interdiction – difficult. Another less-common approach is to land the ultralight, with one car or truck taking the drugs in one direction, a second taking the disassembled aircraft in another. The third method is to land the ultralight, unload the drugs, then refuel and fly back into Mexico. “Every interdiction and arrest we’ve made has involved drugs, so we’re pretty confident that is all they’re flying in,” Moody said. “But as we do a better job with outbound inspections at the ports checking for currency and weapons going south, obviously there is concern these criminal organizations, if they land and refuel, can load up cash or weapons for the return trip south. Our focus is to interdict those before they have a chance to fly back to Mexico with anything on board.” Better coverage of traditional methods of penetrating the border also has led to an increase in the use of tunnels and boats, as well as combining drug and human smuggling, with illegal aliens seeking work in the United States told their trip will be free if they agree to carry drugs. In reality, Moody said, once inside the United States, the OPPOSITE: Ultralight aircraft are a growing trend among smugglers because the single“mules” typically find themselves permanently enseat planes are difficult to detect and can carry up to 300 pounds of cargo. Utilizing radar slaved to the cartels. technology, Border Patrol agents from the Yuma (Ariz.) Station thwarted an aerial smug“The level of violence in Mexico indicates how engling attempt May 30, 2009. ABOVE: U.S. Customs and Border Protection officers stopped trenched these criminal organizations are. They raise a drug-smuggling attempt May 29, 2009, when they seized more than 230 pounds of the stakes because it is a lucrative trade and they marijuana at the Naco port of entry in Arizona. can throw a lot of resources at it, which requires us

43

&%3 LQGG

30


Nucsafe on temp.indd 1

10/19/09 2:49 PM


SPECIAL SECTION • U.S. Customs and Border Protection

CBP photo

Customs and Border Protection officers interrupted a Jamaica-to-Bermuda hashish smuggling route after arresting two “swallowers” attempting to smuggle more than 1.5 pounds of hashish through Philadelphia in the last two weeks. The hashish, packaged in 112 thumb-sized pellets, has a street value of more that $22,000. The second internal smuggler also swallowed one marijuana pellet.

“We’re still looking at other technology that is continually becoming available, testing it for field deployment. Some things work great in the lab but don’t cut the mustard in the field, so sometimes the manufacturer has to go back and make it more durable,” Moody said. “Our agents have a much higher level of technology today than was true in the past, and it has really benefited us to a degree we hadn’t seen before. “As far as tactics, we’re always looking to improve efficiencies and effectiveness. We deploy strategically, 24/7/365, so one thing that is first and foremost is to deploy safely. We do a lot of training on small squad tactics and work as teams, using a lot of tactics a metro police officer might not see. But in the remote, isolated areas in which our agents work, backup isn’t always available on quick response, so they have to have what they need with them when they respond.” Another major new factor is interagency and international cooperation, which Moody said has improved significantly in recent years. “We can’t do our job to the degree we do it without the assistance of our state, local, county partners, and other federal agencies. We all have different ways of dealing with things, but we all face the same threats. Not butting heads in turf battles, but bringing our individual expertise to the table, helps us all do a much better job,” he said.

“We also have a very close, ongoing relationship with our partners in Mexico. We understand they are in a desperate fight and we want to make sure we give our support to those taking a tall stand against criminal organizations in Mexico. We do what we can to support them and track criminal activity. That is a sharing of intelligence that is ongoing at all levels, on the northern border with Canada as well as on the southern border with Mexico.” To the Border Patrol agents tasked with securing the nation’s borders and, among other things, combating the flow of illegal drugs into the United States, it is indeed a war – what Moody calls “narcoterrorism” – that is growing increasingly violent. “A lot of people think of a terrorist as somebody who attacked us on 9/11. But while that is the classic definition, what is being seen today in Mexico is terrorism as well. Some of these criminal organizations have a culture of death that is unprecedented. The Mexican government is taking a strong stance against that, but it is right on our border, right here, right now,” he concluded. “The bottom line for us is securing our nation’s borders within the policy, regulations, and laws Congress has put in place and working with those nations willing to work with us to do our job to a better degree tomorrow than we did yesterday.”

45

&%3 LQGG

30


SPECIAL SECTION • U.S. Customs and Border Protection

he efforts of U.S. Customs and Border Protection (CBP) traditionally have centered on preventing illegal aliens, drugs, other contraband, and, since 9/11, potential terrorists and terrorism-related materiel from entering the United States. In recent years, a new emphasis has arisen regarding efforts to smuggle money and weapons – both typically related to criminal and terrorist organizations – from the United States into Mexico. A new Enhanced Outbound Operations (EOO) effort, begun in March 2009, is targeting money and weapons equally as the most important concerns, but increases also are expected in the capture of fugitives and immigration violators trying to leave the country. While San Diego is the busiest crossing point along the southern border, the greatest number of outbound seizures has been reported from the Laredo, Field Operations office in Texas. San Diego covers six checkpoints within a few miles of each other; Laredo’s eight designated ports of entry stretch across a much longer piece of the border and represent far more variety – from the only hand-drawn ferry on the border to six business and general aviation airports, three major railroad crossings, pedestrian and vehicle bridges, and two government-owned dams used by passenger vehicles.

T

“Laredo is No. 1 for commercial traffic on the southern border and probably tied with Detroit overall for the largest commercial crossings. We also are one of the largest field offices in the country due to the number of ports and size of traffic,” said Leticia Moran, director, Field Operations, Laredo Field Office. “Smugglers try to blend in and have a good cover story, both coming into the U.S. and going out, so we have to look at everything commercial, plus passenger vehicles and private trucks.” In addition to devoting more manpower and resources to outbound inspections, EOO also involves increased cooperation among multiple DHS components – CBP Field Operations and Border Patrol and Immigration & Customs Enforcement (ICE) – as well as non-Homeland Security agencies, primarily the Bureau of Alcohol, Tobacco and Firearms (ATF), the Drug Enforcement Administration (DEA), the FBI, and state and local law enforcement. That includes sharing of intelligence and maintaining open lines of communications among all agencies. “It is important to recognize that, unlike inbound traffic, where we have dedicated lanes and primary booths and technology, such as license plate readers, that infrastructure often does not exist on outbound highway lanes,” noted Todd Owen, executive director for CBP

CBP photo

Outbound Inspections

46

&%3 LQGG

30


Design and Manufacturing Our Specialty! t .BOVGBDUVSJOH $MFBS 4QBO 1PSUBCMF 4USVDUVSFT 5FOUT

CBP photo

OPPOSITE: CBP ofďŹ cers seized 25 ries, two shotguns, and a 9 mm handgun found hidden in the gas tank under the bed of a pickup truck March 2, 2009. ABOVE: DHS Secretary Janet Napolitano addresses the media during a tour of the El Paso port of entry April 15, 2009. Also in the photo (left to right) are White House Deputy National Security Advisor John Brennan; U.S. Border Patrol Chief David Aguilar; U.S. Border Patrol El Paso Sector Deputy Chief Joe Gleason; DHS Assistant Secretary for International Affairs Alan Bersin; and Harry Teague, U.S. Congressman, N.M.

t 2VJDL *OTUBMMBUJPO "OZXIFSF t 5FNQPSBSZ PS 4FNJ QFSNBOFOU

Field Operations Cargo & Conveyance Security. “We do this at a regular, sustained basis at all crossings, but that does not mean it is 100 percent all the time because we don’t have special lanes where everyone comes to a stop and is checked by an ofďŹ cer. “So we rely on pulse-and-surge operations, set up for a short period of time. We prefer that because it quickly becomes evident on the Southwest border that we have set up; if we are predictable, we would be much less effective, because the spotters on the other side can see what we are doing and adjust their tactics accordingly. We have four ďŹ eld ofďŹ ces that carve up that 2,000-mile border – San Diego, Tucson, El Paso, and Laredo. Our efforts are pretty consistent, regardless of ofďŹ ce, because all four are signiďŹ cant, both inbound and outbound.â€? In the ďŹ rst six months of EOO, the four ofďŹ ces seized $18.3 million in bulk currency, 34 weapons (handguns, shotguns, and hunting ries – none military grade), and more than 8,000 rounds of ammunition and made 221 arrests, including fugitives and state and local charges. During that same period, they signiďŹ cantly increased the number of trafďŹ c control devices, non-intrusive inspection equipment (such as mobile X-rays), dual-trained K9 units to detect currency and ďŹ rearms, and ofďŹ cers to conduct inspections and interviews – 1.4 million interviews and some 900,000 vehicle and cargo inspections. “We always have to be on guard because, as we devote resources to one particular area or mode of transport, the criminals will adjust,â€? Owen said. “We’ve made seizures inside commercial buses, trucks, passenger vehicles, and even on pedestrians with money wrapped around their torsos. There is a lot of effort to get currency and ďŹ rearms out of the country and, through our pulse-and-surge operations, we hope to make them much less successful at that. “Even prior to March, Laredo had a dedicated outbound inspection team, where the others were devoting resources when and where available. With years to develop some of the needed skills, Laredo has become a model for the others. I think all four ofďŹ ces have adopted these efforts pretty well; the TTPs [tactics, techniques, and procedures] are the same skill set we use on inbound, so it really was more a change of focus than having to learn any new techniques or technologies.â€? In addition to increased help from local law enforcement, ďŹ eld ofďŹ ce staffs also have been supplemented with CBP mobile response teams and ofďŹ cers pulled from other locations to help saturate speciďŹ c ports of entry on an unpredictable schedule.

47

&%3 LQGG

t &OHJOFFSFE GPS )JHI 8JOET 4OPX -PBET t *#$ o *OUFSOBUJPOBM #VJMEJOH $PEF

t %FQMPZBCMF t 3F MPDBUBCMF t *OUFSJN 'BDJMJUJFT

530-938-1133 Toll Free 888.484.8368 www.creativetent.us GSA Contract GS-07F-0317T

30


SPECIAL SECTION • U.S. Customs and Border Protection

“Having all that is a force multiplier to our ofďŹ cers,â€? Moran said. “All our ports also have Anti-Terrorism Contraband Enforcement Teams [ATCET] who specialize in inspection tools, such as X-ray equipment. And we have currency and ďŹ rearms K9 teams assigned to work alongside the ATCET members to provide an additional layer of enforcement. We also work closely with ATF; some of our seizures have helped ATF and ICE on their investigations, with leads that take them from the border into the interior of the U.S. “We’ve always done outbound in this area because we’ve always seen it as a threat. EOO enhances our operations. Before, a lot of concentration was on passenger vehicles and rail, but now we are doing 100 percent screening of outbound rail, which is new. We’ve always been successful with outbound operations, but as we inspect more, we ďŹ nd more. And while shared intel has helped, I would say the bulk of our seizures come from our ofďŹ cers doing what they are trained to do.â€? One natural advantage for Laredo is the Rio Grande River, which creates a natural chokepoint, especially with most bridge owners requiring vehicles to stop and pay a toll before entering Mexico. Even so, there are vulnerabilities. “As we try to stop an outbound vehicle, the driver may simply gun it across the border and disappear, so we have worked with locals to minimize port running with the use of tire shredders and other barriers,â€? Moran said. “We’ve had that happen coming into the U.S., as well, when someone with a load of drugs runs the port, but it’s easier to ďŹ nd them in the U.S. than when they do that going into Mexico. “It’s a challenge because most of those facilities were not built with inspection booths or areas to do outbound inspections. A lot of locals have given us space, detention rooms, even something as simple as shade, which can be really important to both our human and K9 ofďŹ cers when it is 110 degrees. In addition, Mexico

is implementing a new program on their side, almost mirroring our operations, such as enhanced primary inspections for vehicles entering Mexico. We also meet frequently with our Mexican counterparts to talk about how to deal with border violence issues and improve collaboration.â€? Located at about the midpoint of the Texas border, directly north of Mexico City, Laredo also is one of the busiest U.S. crossings for commercial buses. “If you are coming from the interior of Mexico, you probably would go to Mexico City and then up to Laredo. Most highways in Mexico lead to or connect to Laredo, as do many major highways in the United States. So we have about 100 to125 buses a day moving through Laredo,â€? Moran said. “Recently, our ofďŹ cers stopped a commercial bus and the currency K9 team alerted. They found a compartment in the oor containing more than $3 million cash, probably our biggest outbound currency seizure this year. “In April, while inspecting commercial tractor-trailer rigs, we found more than $1 million under the mattress in a sleeper cab. We’ve had several seizures at Hidalgo, Falcon Dam, and Eagle Pass ranging from $350,000 to $500,000. It is not illegal to import or export more than $10,000, but you have to report it.â€? The checkpoints also support local law enforcement, especially on vehicle theft, which is a major problem along the border. But the vast majority of trafďŹ c, inbound and out, involves legitimate activities, both business and personal – sometimes including large amounts of cash. The challenge is to locate contraband and determine intent, thoroughly but quickly, without impeding travel and trade or endangering border agents or civilians. “Firearms and currency are our top concern outbound,â€? Moran concluded. “That is how we can most hurt the drug cartels, especially by intercepting their money.â€?

CBP photo

U.S. Customs and Border Protection (CBP) ofďŹ cers seized $3 million from the oor of a bus at Lincoln-Juarez Bridge in Laredo, Texas, on March 19, 2009.

48

&%3 LQGG

30


SPECIAL SECTION • U.S. Customs and Border Protection

Travel Programs ince 9/11, the U.S. government has instituted a number of new programs designed to screen incoming travelers to facilitate security while also ensuring that legitimate travel, both business and personal, flows smoothly and with as little interruption and delay as possible. Many are part of the Trusted Traveler Programs (TTP) within the Department of Homeland Security’s Customs and Border Protection (CBP) component. Some fall under the guidance of the Western Hemisphere Travel Initiative (WHTI), established by the Intelligence Reform and Terrorism Prevention Act of 2004 to require all travelers to present a passport or other document proving identity and citizenship before entering the United States. Others are related to the Electronic System for Travel Authorization (ESTA), an Internet-based system to screen Visa Waiver Program (VWP) applicants prior to traveling to the United States. “WHTI’s original intent was not only to secure the border, but to simplify the process. We had over 8,000 documents U.S. and Canadian citizens could submit to us; we’ve narrowed that down to six,” noted Colleen Manaher, director of the WHTI Program Management Office. “And before WHTI, U.S. and Canadian citizens could cross the border on an oral declaration alone; that was eliminated in January 2008, requiring some kind of ID and citizenship document. “We also have worked closely with the State Department and the states to enable RFID [radio frequency identification]-enabled documents to help facilitate travelers through the land borders. WHTI is an extensive partnership program, working closely not only with our own Trusted Traveler Programs, but also with the states to produce an enhanced driver’s license. In addition, we had to establish a strong partnership with Canada because their provinces wanted to issue enhanced licenses, as well. Those really help us in finding fraudulent and counterfeit documents.” The 9/11 Commission found the use of oral declarations at the Canadian border represented a serious security lapse. “Mexicans have always had a secure document requirement. The 9/11 Commission clearly recognized it was Canadians and the U.S. that did not,” Manaher said. “They also were very clear that terrorists are as important as weapons and any opportunity we have to question or look at any information is an opportunity we can’t squander. A mere oral declaration obviously is much more open to fraud than a secure document that is authenticated back to the source agency.” However, new border crossing cards, with RFID incorporated, have been issued to Mexican citizens. Using an RFID-enabled document at a land border allows traveler information to be pre-positioned for the border officer, who then can move directly to an interview, which shortens and simplifies the entire process. “Our initial results show our process time is saving anywhere from 6 to 10 seconds per inspection if you have an RFID-enabled document. And in a place like San Diego, seconds count,” Manaher said. “It also is important to note, if you consider there were hardly any such documents a few years ago, today we have more than 3.1 million. State alone has issued more than 1.1 million passport cards. And while it is still early, our compliance rates have exceeded expectation and continue to increase, averaging more than 95 percent since implementation.

Photo by Gerald L. Nino

S

“I think any change sometimes is met with a bit of hesitation, but American citizens are showing their documents and want to move across the border more efficiently and quickly. Nothing has really changed for Mexican citizens, and Canadians have an even higher compliance than U.S. citizens – at about 98 percent – with a law that only went into effect June 1st.” ESTA was designed to deal with citizens of visa waiver countries – 35 in all – who are eligible to travel to the United States for up to 90 days, on business or as tourists, without obtaining a visa. ESTA was enacted by Congress in 2007 to enhance the security of the visa waiver program by pre-screening applicants. “There are several rules nations must meet to be eligible [for visa waiver participation],” ESTA Program Management Office Acting Director Suzanne Shepherd explained. “Essentially, they have to be low risk in terms of how many people from that nation have violated their status in the U.S. They also have to sign a bilateral agreement with the United States and have a low visa denial rate. “Essentially the only change is that users go to a user-friendly Web site and provide information prior to boarding the plane so we can pre-screen them for the same things we normally screen for on visa applications – such as making sure they are not on a watch list. Approval is good for two years, unless their passports expire or they change their names. It currently is free and all-electronic – no passport stamp. It’s almost like purchasing your ticket online; you provide date of travel and time.” ESTA became mandatory for visa waiver on Jan. 12, 2009, and Shepherd said about 99 percent of the more than 10 million

Howard Josephs, U.S. Department of State, holds up the new border crossing identification card at the RFID press event held at the San Ysidro port of entry Feb. 26, 2009.

49

&%3 LQGG

30


SPECIAL SECTION • U.S. Customs and Border Protection

applicants processed through mid-2009 had been approved, with new applications arriving at an average rate of 40,000 every day. Prior to ESTA, more than 18 million travelers used the visa waiver system every year. Despite a global economic downturn that has reduced overall travel numbers, the program appeared on target to match that ďŹ gure, although approval is not linked to any immediate travel plans. “ESTA is another tool for CBP to use to try to keep those who might want to harm the United States out of the country while still facilitating all others. I think it has helped with U.S. security, although I obviously can’t get into speciďŹ c examples. But we have had several people apply who turned out to be on some watch list, either terrorist or a criminal history,â€? Shepherd said. “Like all other non-citizens, ESTA applicants are required to provide biometric information – the 10-print record – although they also are supposed to have an e-passport or at the very least a machine-readable passport. An e-passport has a chip in it containing a link to their biographic information in a database, usually in their home nation, but shared with the U.S. The only country with a program like ESTA is Australia. Their ETA [Electronic Travel Authority] program is much older than ESTA, but otherwise quite similar.â€? While WHTI is the law with which many travel programs must comply and ESTA is a new requirement on an existing program, four new Trusted Traveler Programs are now in place, three of them focused on travelers and goods crossing the U.S. borders with Canada and Mexico.

NEXUS is a joint program designed to let pre-approved, low-risk travelers cross the U.S.-Canada border quickly. SENTRI (Secure Electronic Network for Travelers Rapid Inspection) provides similar expedited CBP processing at the U.S./Mexico border. FAST (Free and Secure Trade) is intended to increase the integrity of supply chain security by offering expedited clearance to carriers and importers enrolled in CBP’s Customs Trade Partnership Against Terrorism (C-TPAT) or Canada’s Partners in Protection (PIP). It currently applies to truck drivers who are permanent residents of the United States or Canada and citizens of the United States, Canada, or Mexico. The fourth Trusted Traveler Program – Global Entry – expedites screening and processing for U.S. citizens and permanent residents entering the United States by air from anywhere in the world. “When they land in the U.S., they go directly to an automated kiosk, which reads a machine-readable zone on the passport and conďŹ rms their ďŹ ngerprints match those of the person enrolled. Then they answer customs declaration questions on a touchscreen. It prints out a receipt that is handed in to exit the facility,â€? TTP director John Wagner said. “People can process in about 40 seconds, where an ofďŹ cer in a booth requires 3 or 4 minutes. And you don’t have to wait in line. “We just struck a deal with the government of the Netherlands to allow their citizens to apply, similar to how NEXUS works with the Canadian government. We’re in discussions to accept Canadian citizens who have a NEXUS membership, so a Canadian citizen ying from Europe to JFK could process through the Global Entry kiosk if they are

DHS photo

A CBP ofďŹ cer explains RFID screening procedures to a traveler entering the United States.

50

&%3 LQGG

30


%80/3% #(%-)#!, (!:!2$3

!0 # (!.$(%,$ #(%-)#!,

CBP photo

Starting June 9, 2009, ďŹ ngerprint readers on all Global Entry airport kiosks were changed to an upgraded technology. Instead of providing right and left index prints, ofďŹ cials now require the prints of four ďŹ ngers of the left or right hand (no thumb).

!,!2- $%4%#4/2

a NEXUS member. We’re also talking to Mexico, the U.K., Germany, Australia, New Zealand, and a few other European countries.â€? SENTRI, NEXUS, and FAST require cards produced by the U.S. Government Printing OfďŹ ce that incorporate a photo, microstrip, RFID chip (ďŹ le number only, no personal data stored on the chip itself), and multiple security features (microprinting, hard-to-counterfeit inks and patterns). The only difference in the cards is the name at the top. Global Entry does not have a card. Under WHTI, NEXUS, SENTRI, and FAST also are accepted in lieu of a passport for U.S. and most Canadian citizens, so they can be used in a regular lane as an acceptable travel document. “Private boaters can use their NEXUS card and phone in their arrival in the U.S. or Canada rather than appearing in person. Also people in passenger vehicles or on commercial aircraft; it isn’t currently set up to handle private aircraft, primarily because there are no NEXUS kiosks set up at general aviation terminals. Those on commercial ights go through a pre-cleared site where we have kiosks that do an iris scan, which pulls up the individual’s record on ďŹ le and does all the processing,â€? Wagner said, adding travelers must have the card with them, but don’t actually scan it at the kiosk. “For passenger vehicles, there are exclusive lanes at each border for their use. They have the same card as the aviation passengers, but it contains an RFID chip that is read and calls up their record from the database, which the ofďŹ cer then compares with the people in the vehicle to speed processing. If even one passenger does not have a card, they have to go through regular entry lanes and processing.â€? The key result of these programs, according to Wagner, is a substantial increase in information about travelers entering the United States under the Trusted Traveler Programs, which provide for thorough background checks, collection of ďŹ ngerprint biometrics, and vetting of that information to automate the routine elements of CBP entry point processing. All applicant data are rerun against the DHS law enforcement database, which contains all enforcement data, watch lists, immigration or customs violations and data fed into it from other agencies, such as FBI watches and warrants, as well as the terrorist database and some Interpol records. “Not only do we do comprehensive database checks against known sources of information, we do personal information with each and every applicant, who also

51

&%3 LQGG

s .O /N 3HELF #OST s %ASY /PERATION s 3INGLE HANDED /PERATION s &AST 3TART 2ECOVERY s &AST -INUTE 2ESPONSE s 3IMULTANEOUS $ETECTION s 0ORTABLE #OMPACT $ESIGN s 2UGGED #ONSTRUCTION

!$6!.#%$ 30%#42/ 0(/4/-%429 15)#+,9 $%4%#43 .ERVE "LISTER "LOOD !GENTS 4)#S 4)-S 0RECURSORS 6OMITING !GENTS (OMEMADE !GENTS (YDROCARBONS.

t XXX QSPFOHJOVTB DPN F NBJM DPOUBDU!QSPFOHJO DPN

30


SPECIAL SECTION • U.S. Customs and Border Protection meets with a CBP officer. We look at their travel histories, where and why they traveled to some locations, etc. The countries we work with also check against their databases without the U.S. actually running those checks,” Wagner said. “The Dutch government will vet their citizens against their internal databases and we have negotiated what would disqualify someone. A U.S. citizen goes through the U.S. database checks and we would tell the other government if that individual passes or fails when applying for a dual program. So that gives checks against two or more national databases and interviews by border patrol agents in both countries.” There also are random checks built into the system, along with other layers of security, including some focused enforcement compliance checks on travelers from time to time. So while travelers still undergo extensive inspection, the routine elements of CBP processing are now automated. “Not only does the traveler save time, so does the government, in not having to go through rechecking these people every time. That means we can rededicate resources to people we know less about and might be considered higher risk passengers,” Wagner explained. “Global Entry has been used about 83,000 times to date, which means about 83,000 minutes of officer time saved that we could rededicate to inspecting other passengers. “In places like San Ysidro [California], the busiest U.S. land crossing, about 18 percent of the traffic there uses the SENTRI lanes. The SENTRI inspection takes about 15 seconds to process versus about a minute in a non-SENTRI lane. This is why we market these to frequent travelers, because the more they use the program, the higher the cost benefit to us.” About 95 to 97 percent of applicants get approved for TTPs. The remainder are denied for a variety of reasons, from criminal backgrounds that don’t meet the vetting requirement to failure to properly complete the paperwork to not showing up for the interview. “Once you are in the program, we rerun the database every 24 hours to ensure there is no new information; we do the same every time a traveler uses it. And, if there is new derogatory information, the approval is revoked. And we have caught some people who were on watch lists,” Wagner added. “We do perhaps 20 to 30 revocations a month out of 620,000 people enrolled in all four programs. We’ve been getting, consistently, about 15,000 to 20,000 applications per month across all the programs since inception. The last few months, however, that has jumped to 20,000 to 25,000. “NEXUS is by far the most popular, with about 12,000 to 15,000 new applicants per month. We had about 20 Global Entry sites by the end of August, covering all major international airports in the United States, so we expect applications for it to increase. Once we expanded NEXUS to all the pre-clearance airports in Canada and put the application online, making it easier to apply, we saw the number of applications triple. Once we have all 20 sites up for Global Entry, which has only been around for one year, and get airlines and airports to help us with the marketing, I think we will see similar types of increases,” he said. SENTRI applications have averaged about 5,000 every month since 2007, about 60 percent of those from Americans. Canadians make up about 60 percent of NEXUS applications, along with the majority of truck drivers applying under FAST. All 16,000 of the initial Global Entry applications were Americans, although about 1,000 Dutch applications were received shortly after the agreement with the Netherlands went into effect. “Every country struggles with how to process people and segregate out the low-risk travelers based on some risk-based analysis,”

Wagner said. “A lot of other countries already have similar programs or are considering starting them and are interested in linking to our programs, which would allow their citizens to enroll and would enable U.S. citizens to enroll in their programs. “From what I’ve seen, a lot of the other programs out there are only focused on the identity or immigration status or citizenship of the individual and don’t fully encompass the trusted aspect of the U.S. TTPs. Through reciprocal arrangements, we are working to increase the security of those other programs to provide a more comprehensive approach than just the identity piece. As a U.S. citizen, you have the right to enter the United States, but there are other processes you have to go through, such as customs and agricultural, where a lot of other countries only focus on citizenship status.” Biometrics, primarily 10-point fingerprints but also iris scans in some cases, are key to the success of TTPs, but because the programs are voluntary, there have been few complaints, despite a small number of people who feel the regulations are too strict. “The biometrics are crucial for identifying it is the same person who applied and went through the interview. The fingerprints also allow us to check criminal history records and other biometric databases to which we have access,” Wagner said. “In the airport programs, you’re using an automated kiosk for self-clearance, so the biometrics are essential. “If there is a negative response, a big X appears on the receipt that prints out. That can be due to several different things, from a hit on a database to a revoked clearance. The reason is printed on the receipt, which is required to get out of the secured area. And the kiosks are located where they are clearly visible to the officers.” Each program’s process is subject to constant review and refinement. With Global Entry, for example, if people have a problem using the kiosk or are unable to complete the process, CBP sends them an e-mail asking what happened, then compares what they think happened against what the system logs indicate. That information is used to help pinpoint any IT problems with the kiosks. “We’ve automated the application process using the Internet – you can apply, pay fees, schedule interviews, all online, which has reduced a lot of paperwork on our end and helped us keep up with those 20,000 applications a month,” Wagner said. “If it were a manual paper-based system, we would never be able to keep up with that. We’ve been keeping to about a four-week process – Global Entry about one week – where in the past, using paper, it took us as long as eight months.” WHTI is viewed as an integrated solution of watch lists and law enforcement queries, which Manaher would like to see applied to other modes of transport, such as small boats and pedestrians, an element she said has been long overlooked. “We’ve started to see a lot of benefits and would like to build upon that foundation. I really want to emphasize what an innovative effort WHTI is, the result of terrific partnerships with the states, State Department, government of Canada, and other stakeholders. We delivered this solution in less than 11 months, on time and on budget, which is virtually unheard of. We also were the first fully implemented 9/11 border recommendation,” she concluded. “For the first time, since WHTI, we actually know a date, place, time, entry, type of vehicle – where before, you would just know a vehicle crossed the border. Overall, having secured documents and knowing who is entering the country can only bolster our own security and that of Mexico and Canada. Most countries have required documents to enter for a long time. It just took us a little bit longer to get there.”

52

&%3 LQGG

30


SPECIAL SECTION • U.S. Customs and Border Protection

Air & Marine echnology is a key element cited by U.S. Customs and Border Protection (CBP) in improving the ability of agents and officers to detect and interdict both drug and human smuggling. In some cases, that is new technology, such as advanced sensors and communications systems; in others, it is upgrading – and often expanding – existing capabilities, such as helicopters. A major user and beneficiary of these improvements is CBP’s Office of Air and Marine (OAM), a multi-function component with a primary focus on supporting land and maritime border security operations. In that role, they provide everything from surveillance assets to direct support of interdiction, using both their own assets and in cooperation with the U.S. Coast Guard and Navy. An integrated air operations picture is provided by OAM’s Air and Marine Operations Center in Riverside, Calif., the only place in the world where some 450 Federal Aviation Administration (FAA) and Department of Defense (DoD) unclassified radar feeds come together in a single location. While CBP hosts the center as a Department of Homeland Security capability, it does not own any ground radar

Photos courtesy of CBP

T

infrastructure of its own, instead combining other government systems with OAM aerial surveillance assets. “Air interdiction is a mission that is exclusively ours, with aircraft outfitted to detect and interdict fast-moving as well as low-and-slow aircraft,” according to Doug Koupash, executive director of OAM Mission Support. “Once an aircraft is identified as a target of interest, usually by the OAM site at Riverside, we track it. “If it comes across the border or, more commonly than you might think, disappears, we will dispatch a fixed-wing aircraft, such as our jet interceptor, which makes a dash to the location and attempts to find the target and, if necessary, get it to land. Sometimes those are harmless – the pilot just made a mistake – and sometimes they don’t want to be caught. Once on the ground, we coordinate a ground intercept [typically by local law enforcement or Border Patrol (BP) agents].” OAM has two groups of armed officers with full arrest authority – Air Interdiction Agents (AIA), both pilots and Aviation Enforcement Officers (AEOs), and Marine Interdiction Agents (MIAs).

CBP’s Office of Air and Marine (OAM) is converting its older UH-60A Black Hawks to UH-60L variants.

53

&%3 LQGG

30


054.indd 1

10/23/09 2:23 PM


SPECIAL SECTION • U.S. Customs and Border Protection

Doing smart things with aging aircraft, such as the venerable “Huey” helicopter shown here, allows OAM to acquire new capabilities more quickly and cheaply.

While the AIAs usually transport teams and their equipment into remote areas in search of suspects, AEOs are armed and available as backup to those agents. On most missions, OAM’s UH-60 Black Hawk helicopters carry two AEOs, while the smaller Hueys only have one. MIAs use fast, high-powered coastal interceptor boats and SafeBoat interceptors to patrol the immediate maritime approaches to the country, with the Coast Guard providing longer range, longer endurance vessels. The MIAs perform frequent interdiction missions, approaching suspect vessels, disabling the engines when necessary, boarding vessels and, where appropriate, making arrests. They operate both independently of and in conjunction with the Coast Guard. Many of their arrests are close to the coast, with MIA pursuits often supported by OAM air assets. As with the USCG and BP, Air and Marine covers a broad range of law enforcement and homeland security missions. In the past year or two, that has included interdiction of an increasing number of singleseat ultralight aircraft and Self-Propelled Semi-Submersible (SPSS) boats. As CBP and USCG have made traditional air, land, and sea routes more difficult for smugglers, they have turned to platforms that

are far more difficult to detect. In countering those and other methods, OAM, the Coast Guard, and the Navy coordinate their maritime efforts – both air and sea – through the Joint Interagency Task ForceSouth, headquartered in Key West, Fla. “Drugs certainly occupy a lot of our resources, but we also assist the Border Patrol and Coast Guard in intercepting undocumented aliens,” Koupash said. “We also have an anti-terrorist mission. “Any of the assets used by drug or human smugglers also can be used to bring harmful materials or terrorists into the country. People have been tracked from the Middle East to Europe and to Mexico, apparently scouting means to get into the U.S. But most of that side of our operations I’m not cleared to talk about publicly.” As it seeks to strengthen its hand against smugglers, OAM is bringing a number of new and improved assets on board. Chief among those are the UH-60M Black Hawk, which Koupash calls a radical departure from previous models; conversion of Vietnam-era UH-1 Huey helicopters to the more advanced Huey II configuration; new wings, tails, and stress upgrades to P-3 Orion patrol aircraft; acquisition of a new 38-foot SafeBoat marine interceptor patrol boat; utilizing lessons learned from an Advanced Concept Technology

55

&%3 LQGG

30


SPECIAL SECTION • U.S. Customs and Border Protection

OAM utilized lessons learned from an Advanced Concept Technology Demonstrator in the acquisition of a new high-speed coastal interceptor boat.

Demonstrator (ACTD) in the acquisition of a new high-speed coastal interceptor; and development and deployment of the Maritime Predator B unmanned aerial vehicle. “Predator has always been used over the land borders, but didn’t have the sensor systems to be an effective open-ocean surveillance platform. On a very fast track – less than a year – we worked to introduce a maritime version that carries a Raytheon Seaview radar, which has been very successful on our P-3s and smaller Bombardier Dash 8 patrol aircraft,” Koupash said. “We just completed a major technical review and are on track for delivery of the first maritime Predator in late December to begin test and evaluation operations in January 2010. We then intend to use that asset to supplement our P-3 long-range and Dash 8 mediumrange aircraft. The Predator has a normal patrol time of 18-to-20 hours, which, coupled with the Seaview radar, should give us pretty good legs and impressive results.” The ACTD is being used to test capabilities for a replacement for OAM’s aging fleet of 36 Midnight Express high-speed coastal interceptors. With a new hull that can do 67 knots, the production model

will feature a more robust sensor and communications suite, upgraded engines, and high-shock seats to protect the crew from injury during high-speed pursuits. The exact number of boats to be sought will be revealed in a request for proposal to be released in FY10. Acquisition already has begun on the new 38-foot SafeBoat, primarily for use on the Great Lakes. It offers greater stability on cold, choppy seas and a more robust display package for sensor data, such as moving maps. As with the 33-footer, the new vessel also has an enclosed cockpit. The 33-footers will remain in service, with several new ones on order, combining with the new 38-foot SafeBoat and 43 vessels transferred from the Coast Guard to CBP since the start of 2008 – including 30 smaller 25-foot SafeBoats for riverine operations. By refurbishing decommissioned USCG boats, Koupash explained, OAM can increase its fleet for a fraction of the cost of buying new vessels. And the money saved may help get additional funding for the new 38-footers. In September 2009, OAM awarded a contract for a new multipurpose enforcement aircraft for air interdiction and personnel deployment. It is being designed to provide coastal maritime surveillance

56

&%3 LQGG

30


OAM expects delivery of its first maritime Predator B late in 2009, with test and evaluation operations to begin January 2010.

capability, air surveillance for low-and-slow aircraft, and a sensor suite that will enable its use over both land and water. While declining to release many details pending contract award, Koupash did say it will be a fixed-wing, twin-engine aircraft with a robust new sensor package. OAM’s strategic plan calls for up to 40 of the new aircraft, with the first probably not delivered before early 2011. The P-3 Service Life Extension Program began in 2006, with an initial phase of structural inspections ensuring the aircraft were safe to continue flying until they could be given new wings and tails. Delivery of the first fully renovated P-3 is expected by April 2010, adding about 15,000 hours of service life – another 18 years flying OAM missions. In all, 14 aircraft are scheduled for the fixes through the end of FY 15. OAM took delivery of its first UH-60M Black Hawk in August and has three more on order, although Koupash said they hope to increase that number, “resources permitting.” The “Mike” version will offer a more robust lift capability, improved reliability and maneuverability, compatibility with OAM’s new sensor and communications suite, and CBP’s first aircraft armor, to better protect the crew and passengers from increasing levels of drug-related border violence. The upgraded engines and drive train of the Huey II provide many of the same type of capabilities to the smaller helicopters – except the armor – but will be a slow process. With the first three deliveries in November and December 2009 and a fourth conversion planned for 2010, Koupash said OAM’s hopes for the conversion of another seven to 10 aircraft is largely a factor of timing. “We have to be careful how many we pull offline – the conversion can take a year to 18 months – because that is one less asset we have in the field. So we are working closely with the Army to see if they have any extra assets we can use in the interim,” he concluded. “We have a similar program ongoing with our 16 older UH60A Black Hawks being converted to UH-60L. The Army estimates this will lower maintenance costs by 37 percent and extend their service lives by an additional 12 to 15 years. “The bottom line is, we are doing a lot of smart things with aging aircraft, instead of buying all new platforms, to give us the capabilities we need as fast and cheaply as we can get them.”

57

&%3 LQGG

30


READY FOR ANYTHING.

TOMCAR® produces military grade, commercial highperformance vehicles that are meeting the needs of militaries and a wide range of industries all over the world. From moving equipment to front line troops, to patrolling international borders, TOMCAR gets the job done. Designed for off-road conditions, TOMCAR is proven to have an unflinching determination that tackles any challenge, giving you the confidence to go wherever work takes you. Affordability, Reliability, Durability and Safety – TOMCAR has it all.

Take a look at some of the key vehicle charactersistics

that make TOMCAR a leader – not a follower: 3URSULHWDU\ ´$QWL 6TXDWµ 'ULYH 6\VWHP /RZ &HQWHU RI *UDYLW\ :KHHO ,QGHSHQGHQW 6XVSHQVLRQ µ RI 6XVSHQVLRQ 7UDYHO )XOO OHQJWK 6NLG 3ODWH $UPRU 3URWHFWHG )LQDO 'ULYHV &RPSOHWHO\ :HOGHG 6WHHO )UDPH µ RI *URXQG &OHDUDQFH &RQWDFW XV WRGD\ WR ILQG RXW KRZ TOMCAR can work for you!

TOMCAR.COM 1-866-4-TOMCAR Tomcar on temp.indd 1

8/7/09 2:38 PM


SPECIAL SECTION • U.S. Customs and Border Protection

Smugglers’ Gulch n complying with a 1996 congressional mandate to construct a multi-tiered obstacle along the U.S./Mexico border at San Diego, U.S. Customs and Border Protection found itself revisiting a natural corridor with a long history of use by drug and gun smugglers, cattle rustlers, Prohibition-era bootleggers and, more recently, illegal aliens. Smugglers’ Gulch was a remote, mostly out-of-sight natural canyon, running from a couple of miles inside Mexico to about half a mile into the United States. In an effort to curtail illegal activities, the U.S. Cavalry patrolled the area from a nearby post until about the mid-1930s. Major changes came on the Mexican side with the beginning of significant development in the 1980s, including construction of a major four- to six-lane highway crossing the canyon about 1,000 feet south of the border, flood control projects, many homes built on fill ground, and low-lying areas turned into horse stables and parks. Everything north of the border is part of San Diego County’s Tijuana River Valley Regional Park. In the early 1990s, the San Diego area was being completely overrun by illegal aliens. Statistics show the apprehension rate for San Diego Sector exceeded the high 500,000s, representing only two or three out of 10 estimated to have come across, yet still more than half of all illegals captured throughout the United States. The ability to move vehicles – and so, heavy contraband – south outside official crossing points has been blocked by various obstacles since the mid-1990s. But smugglers are, if nothing else, imaginative. “We broke up a ring that was smuggling horses south in the late 1990s, taking them from the racetrack [near the border just inside the United States], where it would have cost big money to move them through customs, and riding them over the dirt mounds into Mexico,” Mike Hance, Border Patrol operations officer for San Diego Sector tactical infrastructure, recalled. “We know things were smuggled, we just aren’t sure what. So any number of things could have been moving south that we weren’t aware of.” Construction to shut down Smugglers’ Gulch got under way in mid-2008 and was completed in 2009. “To protect homes being built in the area, we had to rescue a small section of the U.S. right at the border. That’s what we did,” Hance said. “Smugglers’ is just part of an overall project. The section that was put in was 3.5 miles of 14-foot-high secondary fence, asphalt roads, lighting, drainage, and reinforcing area access. “It was intended to be a physical obstacle to people coming in. So where we did have thousands of people waiting on the levee to get in, now only a fraction of that number could get over the obstacles we’ve put in place, which has reduced the number of illegals crossing from hundreds to fewer than 10 at a time.” Smugglers’ Gulch ran from high ground down into a marshy area, where authorities could not pursue in vehicles and where even foot pursuit was difficult before illegals could disappear into shopping malls and residential areas. By controlling the high ground, they could be stopped at the border.

USACE photo by Jim Frisinger

I

“Smugglers were prone to start a group on one side and draw in all our agents, then move their real effort on the other side and we couldn’t get to them in time,” Hance said. “They also could set up lookouts to see where agents were and coordinate their activities. We’ve now taken the high ground, eliminated those lookouts, and regained control.” In addition, the number of agents in the sector has more than tripled, from 700 in the early 1990s to more than 2,500 today. The Border Patrol also believes its apprehension rate has jumped from 25 to 30 percent, when capture numbers peaked at more than half a million a year, to estimates approaching 90 percent now. Even with that higher apprehension rate, the number of illegal aliens caught in fiscal year 2008 was only 134,000 – with FY 09 rates 22 percent below that – all of which Hance attributes to those recent changes. “Homeowners, business people, and local law enforcement on the border have seen crime rates drop, so they overwhelmingly have been glad to see this effort. On the Mexican side, they are glad the crowds are gone from the border. We also reduced our footprint of patrolling about 4,800 acres to only some 200 acres right at the border. And if we can control the illegal foot traffic that causes its own environmental damage, we think we’ve actually improved things,” Hance concluded. “So it was tremendously important to us, because of the terrain, to build what we did at Smugglers’ and take that out of the playbook for the smugglers. It was an important linchpin in our sector operations to secure that area.”

Former U.S. Representative Duncan Hunter and San Diego Border Patrol Sector Chief Mike Fisher cut the ribbon during a ceremony marking the completion of the $59 million border infrastructure project in southern San Diego County’s Smugglers’ Gulch.

59

&%3 LQGG

30


SPECIAL SECTION • U.S. Customs and Border Protection

he U.S. Border Patrol (BP) is responsible for preventing and detecting illegal activity – in either direction – along the nation’s borders with Mexico and Canada, each of which has its own difďŹ culties and requirements. Unlike the deserts that dominate the southern border, the northern is largely a combination of rugged mountains, protected wilderness areas, national forests, and the Great Lakes. While Canadian authorities have a network of roads that assist their patrols along much of the border, the majority of the American side is wild and undeveloped. In the past, the Spokane Sector leased horses to assist their effort, but that program was not the most costeffective method nor did it address the need for a durable horse that was acclimated to the rugged terrain. “Leasing horses to patrol the border in remote areas was quite expensive. Oftentimes we patrolled with different horses that we were not familiar with. Conversely, they often were not accustomed to what we needed in those rough areas,â€? noted Assistant Chief Patrol Agent (ACPA) Lee Pinkerton of the BP’s Spokane Sector. “So we looked to developing a horse patrol that other sectors could use as a model. “Then I found that BLM [Bureau of Land Management] was in search of places to adopt mustangs and there was a prison in Colorado that was under contract to break and train them, something we didn’t have the time or manpower to do. So the three components came together – our need for durable horses, assisting BLM in ďŹ nding caring homes for the mustangs, and the Wild Horse Inmate Program [WHIP].â€? That was the beginning of Project Noble Mustang in the spring of 2007 and the adoption of 21 mustangs from BLM’s Wild Horse and Burro Program. Descendants of animals that were released by or escaped from Spanish explorers, ranchers, miners, the U.S. Cavalry, and Native Americans, mustangs have distinctive anatomical features that have

T

enabled their survival in the wild and are a perfect match for mounted patrols along the often-rugged U.S./Canadian border. Those include exceptional sure-footedness, strength, intelligence, and endurance. “The training methods used by the inmates were quite good by my evaluation and I was able to select the mustangs that would be trained, which was conducted under the watchful eyes of professional trainers who were working with the inmates,â€? Pinkerton said. “These horses are physically capable of performing the types of patrol duties we conduct. “We can provide good homes for these horses, help another federal agency manage these herd sizes around the country, and provide an avenue for these inmates to learn a trade that will sustain them when they are released from prison. These mustangs are true American legends and we are putting them to use protecting America. There is something inherently good about that.â€? In the two-and-a-half years of Project Noble Mustang, no mustang has missed a single day of work due to injury, which Pinkerton considers remarkable given the rugged terrain in which they work. “Not to mention their stamina in going up into hard-to-reach areas, which is a big beneďŹ t to us. Usually, after a 12-hour ride to base camp, most horses need a day’s rest and then only can handle a short ride. But these mustangs are ready to go even minutes after we reach our daily destination. That has made them a very good ďŹ t for our operations,â€? he said. Recently, the Spokane Sector adopted three additional mustangs and retired two due to non-service-related issues. ACPA Pinkerton’s goal is to have 24 active mustangs spread across the sector, based on manpower and available resources in each station’s area. “The areas where we use the mustangs are perhaps the most rugged terrain in the U.S., much of it not just national forest but

Border Patrol photo

Noble Mustangs

60

&%3 LQGG

30


SPECIAL SECTION • U.S. Customs and Border Protection

Border Patrol photo

OPPOSITE: The BP Spokane Sector’s horses prove their strength, durability, and sure-footedness as they patrol the rugged and remote terrain along the 308mile stretch of the U.S./Canada border. LEFT: The mustangs undergo extensive training to desensitize their instinctive ight reaction so that they are able to participate in community events and perform crowd control when needed. designated wilderness areas, including the west slope of Glacier National Park, where motorized or mechanical transport is banned or otherwise impossible,â€? he said. “We patrol much of our 308 miles of border on them just as we would in a vehicle. “Recently, the mustangs and riders completed crowd-control training and the mustangs help to train our new riders on horseback law enforcement. We also participate in numerous parades and community events. Therefore, we want to make sure they are gentle enough for those types of situations. We put them through extensive training to desensitize their natural response to ee. We also train them around ďŹ rearms to expose them to potential law enforcement actions.â€? Other sectors are beginning to follow Spokane Sector’s lead. The El Paso Sector currently has six mustangs and a standing order for more, while the San Diego Sector has two and more ordered.

&%3 LQGG

“Each mustang that the Spokane Sector adopts undergoes 120 days of training as part of the WHIP, which costs the Border Patrol $900. By comparison, the price tag of comparable training by a private trainer might be two to three times that amount. Additionally, the adoption fee for each mustang is just $125.00, so we are paying a total of $1,025.00 for the full package. To purchase a good, well-trained horse for that amount of money elsewhere would be difďŹ cult, at best. I expect that we will get in excess of 20 years out of each of the mustangs, barring injury since we adopt them at a young age,â€? Pinkerton concluded. “Every day is a law enforcement activity for us. We want to maintain a high visibility so that people know we are patrolling these remote areas. We measure our success in our ability to deter people from illegally entering the U.S., and the mustangs have enhanced our efforts in accomplishing that.â€?

30


Center for Domestic Preparedness By Christopher Prawdzik

n 1995, 12 people died and more than 6,000 were injured when a Japanese terrorist group released sarin gas into parts of the Tokyo subway system. Back in the United States, big-city ofďŹ cials in places such as New York realized ďŹ rsthand the threat and damage a terrorist could inict and wanted to be better prepared in case of such an event. As a result, ofďŹ cials – in New York in particular – went right to the Department of Defense (DoD) and requested permission to train at the Fort McLellan Chemical Defense Training Facility (CDTF) in Anniston, Ala., to prepare for a situation such as the Tokyo attack. The ďŹ rst class of civilians to attend CDTF graduated in late 1995. There was a bit of a hitch, however. The McLellan CDTF – the entire base, as a matter of fact – was slated for closure under the 1995 Base Realignment and Closure (BRAC) Commission. But with the early successes with civilian training, ofďŹ cials decided in 1998 – just before McLellan’s ofďŹ cial closure – to establish the Center for Domestic Preparedness (CDP) training facility for civilian responders on the McLellan site. The CDP ofďŹ cially opened its doors in June 1998. CDP is actually part of the larger National Domestic Preparedness Consortium. According to the Department of Homeland Security (DHS), the consortium is “the principal vehicle through which the [Federal Emergency Management Agency] identiďŹ es, develops, tests, and delivers training to state and local emergency responders. In addition to CDP, the consortium includes New Mexico Institute of Mining and Technology, Louisiana State University, Texas A&M University, and the Department of Energy’s Nevada Test site. “At that time there was a need to train ďŹ rst responders in that new emerging threat, and Fort McLellan, at the time, was the home of the Army Chemical School,â€? said Dr. Christopher Jones, CDP superintendent. “It had the facility that was known as the COBRATF – the Chemical Ordnance Biological and Radiological Training Facility – and at that time there was a need to train folks who had never responded or prepared to respond to that kind of threat.â€?

I

Essentially, the CDP’s mission is to “train emergency response providers from state, local, and tribal governments, as well as the federal government, foreign governments, and private entities.â€? For state and local ofďŹ cials, training is fully funded by DHS. Private entities can attend for a fee, based on space available. Training targets cover several speciďŹ c disciplines, according to CDP, including emergency management, emergency medical services, ďŹ re service, governmental administrative, hazardous materials, health care, law enforcement, public health, public safety, communications, and public works. The CDP consists of its primary educational facilities, but also includes the COBRATF, the only program in the nation that can train civilians in a toxic environment. And in 2007, the Noble Training Facility (NTF) was established – a former base hospital that was converted to a training site for health care professionals and others to simulate situations that could occur as a result of a terrorist attack. “Our mission has emerged to train ďŹ rst responders in all hazards, but our emphasis still remains in the WMD [weapons of mass destruction] arena,â€? Jones said. Unlike many programs that began from scratch after September 11, the CDP was already up and running. The attacks on New York and the Pentagon just increased its proďŹ le and importance. “At 9/11, there was a signiďŹ cant emphasis placed on that state and local training,â€? Jones said. “I think that that really, as a singular event, created the broad awareness that this is not something that is going to be short-lived – that we’re in this for the long run.â€? As with many aspects of homeland defense and homeland security at the time, Congress allocated additional funds, followed by an exponential increase in training for state and local ofďŹ cials and responders. “The whole mental model around terrorist-preparedness training changed, because while the effects were most notable, of course, in New York and in D.C. ‌ you’re [now] looking at the kind of size and scope of disaster related to these kinds of events even occurring in a small borough in Pennsylvania,â€? Jones said.

62

&HQWHU IUR 'RPHVWLF 3UHSDUHGQHVV LQGG

30


Photo by Shannon Arledge, CDP Public Affairs

Emergency response personnel rush a simulated victim from the accident scene for decontamination, or cleaning, before medical attention may be rendered. Responding to all-hazards, mass-casualty events is a highlight and core principle behind CDP training.

63

&HQWHU IUR 'RPHVWLF 3UHSDUHGQHVV LQGG

30


Collapsible & Reusable Containers Save Money & Resources! Reduce Waste & Damage! Ergonomic!

Containers When & Where You Need Them Ship Flat! Store Flat! Stack Flat! Unique panel design and easy snap-on fasteners provide ultimate strength and durability. Designed to our customer’s speciďŹ cations! Learn More! (866) 928-5710 www.versi-panelenclosures.com

064.indd 1

10/23/09 2:30 PM


Photo by Shannon Arledge, CDP Public Affairs

As the word got out about CDP training, it trickled down from other big cities – Miami, Chicago, Los Angeles – to smaller jurisdictions that found out and wanted to get the training they needed as well. Although it had been up and running for a couple of years, events like September 11 simply raised everyone’s awareness, Jones said. This exponential growth translated directly to an increase in curriculum choices and a growing understanding about various situations after listening to responders of subsequent events. Jones said it has helped the CDP understand better the needs and learning objectives to address a variety of new challenges. “It became clear that many of the competencies that we train, relative to the roots of our beginning back [with] WMD, personal protective equipment, [decontamination], they’re just as applicable to an industrial/ chemical accident [or] a traditional tanker car [accident] on an interstate,â€? Jones said. “It’s a set of competencies that transfers over into any kind of hazard.â€? Perhaps above all, CDP can simulate what other locations can’t. For example, the NTF is the only hospital setting equipped to train health care professionals in preparedness activities for chemical, biological, radiological, or nuclear attacks, as well as other hazards. Since McLellan closed, the hospital has retained many hospital capabilities as they relate to the CDP’s training activities for health care professionals. “It’s very unique in a sense that it’s the only hospital of its kind, so that we can be able to provide real-world simulated activity to the participants,â€? said Bernice Zaidel, assistant director of curriculum development and evaluation. “The primary audience will be the health care professionals, which could be emergency physicians, nurses, any of the hospital staff, but it could also be folks from the state and county health department.â€? The NTF isn’t just reserved for health care professionals, though. Fire, law enforcement, emergency medical technicians, and many other entities are encouraged to train at NTF for “cross-disciplineâ€? beneďŹ ts, Zaidel said. The 125-bed facility is a relatively small- to medium-sized hospital, but Zaidel said that’s particularly beneďŹ cial when larger jurisdictions train, for they have a better appreciation of what the smaller hospitals deal with in emergency situations. “It’s also a great learning opportunity for people to learn what other disciplines are,

A physician intubates a simulated patient during the ďŹ nal exercise of a health care related course. In 2007, the CDP welcomed the Noble Training Facility into its training venue. The former Army Noble Hospital was converted into a training site for health and medical education in disasters and mass casualty events. It serves as the only operational hospital in the United States dedicated to training.

65

&HQWHU IUR 'RPHVWLF 3UHSDUHGQHVV LQGG

30


what their roles and responsibilities would be to a variety of events against all hazards – not just against weapons of mass destruction,” Zaidel said. “It’s a great opportunity for people to do cross-training and actually learn about each other’s capabilities and shortfalls.” One often unrecognized benefit to such an equipped hospital is that with no real patients and no real emergencies, professionals during training can focus solely on training. A real hospital has real patients and real responsibilities that will cut into training every time. “Hospitals are 24/7 operations, and when staff are there, it’s very hard to get hands-on training,” Jones said. “They’ll ‘right-plan,’ they’ll put those plans kind of on the shelf, but because hospitals function all the time, it’s hard to take the hospital environment, bring your team together, and exercise that plan and go through all the things that occur that aren’t in the plan that cause your plan to change in real-time.” The NTF solves that problem. In 2007, NTF began with five courses, and the center is always exploring possible new courses in the future. According to Denis Campeau, director of training and education, NTF relies heavily on student input, after-action reports, and instructors who are constantly looking for ways to improve training. In addition,

a large majority of instructors are those already working in the field, exposed to many of these real-life challenges on a daily basis. At the COBRATF, students have the opportunity to get as close to the danger of a true WMD, chemical or biological attack with the security of knowing it’s the only approved facility in the country to test responders in situations with live chemical agents, nerve gas, and other possible terrorist scenarios. “[They] can actually build confidence in their own equipment, go into a toxic environment, and conduct these scenario-based [exercises],” said Don Cornell, COBRATF’s assistant director. “It serves as a major confidence-builder to the communities and is all taken back to their communities where they can pass on that knowledge for allhazard preparedness.” Confidence in life-threatening situations is perhaps the biggest benefit of COBRATF, and serves as a “training multiplier,” Cornell said. It’s training they simply can’t receive anywhere else. Overall, however, CDP maintains its focus on an “all-hazards” training approach, regardless of whether it’s a health care course or a law enforcement or hazardous material session.

Photo by Shannon Arledge, CDP Public Affairs

State veterinarians evaluate two goats prior to drawing blood in the WMD Basic Agricultural Emergency Response Training (AgERT) course. Veterinarians and traditional emergency responders team up during this course as they respond to a simulated agro-terrorism event or CBRNE hazard affecting local livestock. The course culminates at the University of Auburn's Veterinary School with a scenario-driven practical exercise involving a response to a hazardous event in an agricultural environment.

66

&HQWHU IUR 'RPHVWLF 3UHSDUHGQHVV LQGG

30


Photo by Shannon Arledge, CDP Public Affairs

CDP students survey a simulated accident scene that poses a radiological threat. The CDP is a partner with the Radiological Emergency Preparedness Program (REPP), and students learn to respond to, and manage, radiological operations. The course also focuses on response plans and procedures for complex incidents such as a terrorist event.

“The training that someone receives here, they can take it back and apply it to just about any emergency situation that could require a response,” said Shannon Arledge, CDP public affairs specialist. Training also is focused on “learn by doing” – or not doing – in some cases. “We don’t let them do anything dangerous … but if our facilitators/instructors see something going wrong, they’ll interrupt and try to guide them in the correct direction so that they don’t endanger anybody, but they also throw in [challenges],” Campeau said. “We may give them a piece of equipment if they ask for it, but it may not have any batteries in it because they didn’t ask for batteries; it kind of raises a level of learning that we have not really addressed before.” Jones also emphasizes CDP’s hands-on benefits: First trainees will be in the COBRATF, then the emergency room, with an experience that goes beyond the most serious scenarios imaginable. Where the worst many have seen is an emergency room after a multi-car collision, the NTF’s training facility will test emotions and abilities with an ER filled with 200 patients right after a terrorist attack.

“Just that chaos that we create creates this mentally challenging and emotionally challenging situation that not only tests your confidence, but it also tests your leadership skills,” Jones said. “From that standpoint, we’ve come as a culture of preparedness to a different place where the profession has now evolved, where what were trying to do is be the center of excellence.” Essentially, the training isn’t from yesterday, it’s for the future – but it’s based on those past lessons. While the sarin attacks may have been the wake-up call, it wasn’t a month later that domestic terrorist Timothy McVeigh parked a truck filled with explosives outside the Alfred P. Murrah Federal Building in Oklahoma City, Okla., detonated it, and killed nearly 170, while injuring five times as many. Cornell notes that many often think of such things as individual incidents, but they’re really not. They’re all just portions of a larger puzzle for which CDP can prepare first responders. In 2001, September 11 was, of course, the biggest event of that particular year, but then the anthrax letters became the next challenge. At CDP, all of these

67

&HQWHU IUR 'RPHVWLF 3UHSDUHGQHVV LQGG

30


events form a training foundation that is modiďŹ ed and improved with each new class that enters. “You look and say Tokyo could have been thought of as a single event,â€? he said. “But ‌ look at the other instances where we have not only terrorist use of bad things; look at people who go in on a daily basis and ďŹ nd a meth[amphetamine] lab.â€? This diversity relates directly to the diversity of the student population at CDP. In 1998, CDP opened with three courses; now it’s up to 42, with many specialized. Arledge noted that some are only for lawenforcement ofďŹ cers.

Ultimately, it’s up to supervisors and superiors in the various jurisdictions across the country to decide the best courses necessary for professional development. “We believe that’s a role between the individual and their supervisor to have a conversation and understand what their development requirements are,� Jones said. Once students reach CDP, however, they receive a comprehensive education to address not only instances for which instructors might have experience, but get insight into what might be the next event for which no one has trained.

Photo by Shannon Arledge, CDP Public Affairs

Law enforcement ofďŹ cers enter a smoke-ďŹ lled room and search for suspects who may have released CBRNE material during scenario-based exercises. CDP law enforcement related courses provide instruction regarding WMD-related topics that include terrorist tactics and targeting, as well as hands-on training designed to show CBRNE-speciďŹ c response skills.

68

&HQWHU IUR 'RPHVWLF 3UHSDUHGQHVV LQGG

30


Presenting ScanX Scout™ Digital Imaging

The Most Portable, Rugged and Affordable Digital Imaging Solution for Your Critical Applications. ^ĐĂŶy ^ĐŽƵƚ ŝƐ ƐŽ ĞĂƐLJ ƚŽ ƚƌĂŶƐƉŽƌƚ ĂŶĚ ĚĞƉůŽLJ͘ sŝĞǁ Ă ĚĞƚĂŝůͲƌŝĐŚ ĚŝŐŝƚĂů yͲƌĂLJ ŽĨ Ă ƐƵƐƉĞĐƚ ƉĂĐŬĂŐĞ ŽŶ LJŽƵƌ ůĂƉƚŽƉ ŝŶ ƐĞĐŽŶĚƐ͘ ĂƐLJ ƚŽ ƵƐĞ ƐŽŌǁĂƌĞ ĞŶŚĂŶĐĞŵĞŶƚ ƚŽŽůƐ ďƌŝŶŐ ŽƵƚ ƚŚĞ ŝŶĨŽƌŵĂƟŽŶ LJŽƵ ŶĞĞĚ ƚŽ ŵĂŬĞ ĐƌŝƟĐĂů ĚĞĐŝƐŝŽŶƐ ŽŶ ƚŚĞ ƐƉŽƚ͘ ^ĐĂŶy ^ĐŽƵƚ ŝƐ ƚŚĞ ŵŽƐƚ ĐŽŶǀĞͲ ŶŝĞŶƚ ĂŶĚ ĂīŽƌĚĂďůĞ ǁĂLJ ƚŽ ƵƉŐƌĂĚĞ ƚŽ ĚŝŐŝƚĂů͘

ZƵŐŐĞĚ ĚƵƌĂďŝůŝƚLJ ĂŶĚ ĞdžĐĞƉƟŽŶĂů͕ ĐŽŶƐŝƐƚĞŶƚ ŝŵĂŐĞ ƋƵĂůŝƚLJ ŵĂŬĞ ^ĐĂŶy ^ĐŽƵƚ ƚŚĞ ƉĞƌĨĞĐƚ Įƚ ĨŽƌ LJŽƵƌ ƚŽƵŐŚĞƐƚ ĂƉƉůŝĐĂƟŽŶƐ͘

Some of the many advantages of ScanX Scout: ͻ ,ŝŐŚͲƌĞƐŽůƵƟŽŶ ŝŵĂŐĞƐ ŝŶ ĂƐ ůŝƩůĞ ĂƐ ϯϱ ƐĞĐŽŶĚƐ͘ ͻ >ĂƌŐĞƐƚ ŝŵĂŐŝŶŐ ĂƌĞĂ͖ ƵƉ ƚŽ ϭϰ͟ ǁŝĚĞ ďLJ ĂŶLJ ƉƌĂĐƟĐĂů ůĞŶŐƚŚ͘ ͻ ,ĂƌĚ ĂŶĚ ƐŽŌͲƐŝĚĞĚ ĐĂƌƌLJŝŶŐ ŽƉƟŽŶƐ͘ ͻ >ŝŐŚƚǁĞŝŐŚƚ͖ ŽŶůLJ ϰϮ ƉŽƵŶĚƐ͘ ͻ WŚŽƐƉŚŽƌ ƉůĂƚĞƐ ĂƌĞ ƌĞƵƐĂďůĞ ĂŶĚ ŇĞdžŝďůĞ͘ ͻ WĂƚĞŶƚĞĚ ďƵŝůƚͲŝŶ ƉůĂƚĞ ĞƌĂƐĞƌ ;ĂƵƚŽŵĂƟĐ Žƌ ŵĂŶƵĂů͖ LJŽƵ ƐĞůĞĐƚͿ͘ ͻ ĂŶ ŽƉĞƌĂƚĞ ŝŶ ĚŝƌĞĐƚ ƐƵŶůŝŐŚƚ͘ ͻ ƵŝůƚͲŝŶ ƌĞĐŚĂƌŐĞĂďůĞ ďĂƩĞƌLJ ŽƉƟŽŶ͘ Call 888-862-4050 today to learn more about the ScanX Scout.

www.allproimaging.com

069R.indd 1

10/28/09 11:41 AM


The Arctic Challenge The Northwest Passage and Homeland Security By Dr. Joe DiRenzo III and Chris Doane

uddenly the Arctic is hot … not only in the sense of what climate experts have dubbed global warming, but also politically and economically. This barren and isolated world, which in decades past usually was documented by National Geographic video teams, is now the center of international debate from Washington to Moscow. The debate topics, which have gained global attention, are wide-ranging – from mineral and drilling rights to the opportunities and challenges created by the opening of the Northwest Passage as a much more economical way to move maritime goods. The interests are many, but the discussion usually defaults to a growing need for fossil fuels by the world, especially by nations such as China and India, and the promise of vast new oil deposits beneath the Arctic. All of this potential increase in activity in the Arctic creates a host of national and homeland security concerns for the United States. The international stakeholders in this debate continue to multiply ... as do their collective actions. In 2007, the Russian icebreaker Akademik Federov deployed two deep diving submersibles to plant a small national flag attached to a titanium capsule on the ocean floor, with the intention of claiming ownership to a swath of Arctic seabed totaling 460,000 square miles. The Russians have deployed TU-95 “Bear” strategic bombers right along the Canadian territorial-claimed airspace in the Arctic. In a page straight from a Cold War script, these bombers were met by U.S. and Canadian interceptors. The Russians also have a “base” in the polar region. According to the U.K.’s Daily Mail, the station’s name is “North Pole-35.” The Daily Mail also reported, “For the past year, the inhabitants of this real-life Ice Station Zebra have been the closest human inhabitants to the North Pole – until the station was abandoned early in the summer as the ice drifted rather close to Canada’s Fram Strait.” Finally, the Russians are developing plans to conduct an Arctic paratrooper drop in spring 2010 to mark the 60th anniversary of a similar drop by two Russian scientists – Andrei Medvedev and Vitaly Volovich – in May 1949. All in all, the Russians have shown a very aggressive and confrontational demeanor with regard to the Arctic, increasing international tensions and highlighting the economic and strategic importance of the region. Not too far behind the Russians are the Canadians. Canada has designed and is busy building its Arctic Operations Ship (AOPS) while continuing to conduct Arctic exercises. Published reports in The Canadian Press indicate that a dedicated base will be established at Yellowknife in the Northwest Territories. In July 2009, Canada’s federal government released a new Arctic strategy entitled, “Canada’s Northern Strategy: Our North, Our Heritage, Our Future,” which centers on four key areas of concern, including: (1) sovereignty, (2) social and economic development, (3) governance,

U.S. Air Force photo

S

70

$UWLF &KDOOHQJH LQGG

30


U.S. Coast Guard/Petty Officer Third Class Veronica Rzotkiewicz

OPPOSITE: Russian TU-95 “Bear” strategic bombers, once again active along the Canadian territorial-claimed airspace in the Arctic, have been intercepted by aircraft of the United States and Canada. ABOVE: Members of the Applied Physics Laboratory Ice Station clear ice from the hatch of the Los Angeles-class submarine USS Annapolis (SSN 760) March 21, 2009, after the sub broke through the ice while participating in Ice Exercise (ICEX) 2009 in the Arctic Ocean. Annapolis and the Los Angeles-class attack submarine USS Helena (SSN 725) were participating in ICEX to operate and train in the challenging and unique environment that characterizes the Arctic region.

and (4) environmental protection. Details of their effort can be found at northernstrategy.gc.ca. The strategy concludes that Canada is a “global leader in Arctic science.” In addition, Canada is moving forward with its “Polar Epsilon” project, which provides space-based maritime surveillance of the Arctic and its ocean approaches. Denmark has also entered the arena with an eye toward the future. The Canadian Press in a July 26 article noted that Denmark “released an all-party defence position paper that suggests substantial

improvements to the country’s northern capabilities. It says the country should create a dedicated Arctic military contingent that draws on army, navy and air force assets with ship-based helicopters able to drop troops anywhere. Danish fighter planes could be patrolling Greenlandic airspace.” (Greenland is owned by Denmark.) Also, according to the article, “Surveillance systems are expected to be upgraded. Inspection vessels replaced.” There is even significant discussion that a new Arctic Command will be established.

71

$UWLF &KDOOHQJH LQGG

30


Criminal Justice and Law Enforcement Training for Post-conflict Nations USIS is known for its contributions to homeland security as the largest commercial supplier of background investigations to the federal government. In the national and international security arenas—through multiple contracts at the federal, state, and local government levels—we provide a wide range of comprehensive security-based information, training, and security services. A major focus of our efforts is providing experienced law enforcement trainers and criminal justice thought experts who assist emerging nations in creating institutions that become the foundation of selfoperated criminal justice systems. This is only one example of the solutions USIS provides, in our country and overseas, in the areas of homeland and international security. For opportunities to work with top professionals in this field, visit www.usisengage.com. With comprehensive solutions built upon insight, intelligence, and integrity, we provide our customers with the confidence to address tough challenges and focus on mission critical objectives.

Ensuring a Safer Future Today® www.usis.com

An Altegrity Company For a listing of state Private Investigation licensing information for Altegrity, Inc. companies, go to www.altegrity.com/compliance.

&RUS 7HQ RQ WHPS LQGG

30


U.S. Coast Guard photo/PA3 Charly Hengen

To better understand the Arctic region and maintain national security interests, the Coast Guard and Navy have increased their patrols of the area to monitor infrastructure, sea ice, and vessel traffic. The melting of Arctic ice and opening of the Northwest Passage will spawn more development like this above the Arctic Circle.

The serious nature of the Arctic and the challenge and impact that it has to the United States’ homeland security was emphasized by former President George W. Bush in his National Security Presidential Directive 66/Homeland Security Presidential Directive 25 – The United States Arctic Region Policy, signed Jan. 12, 2009. The policy notes, “The United States is an Arctic nation, with varied and compelling interests in that region.” It added, “The United States has broad and fundamental national security interests in the Arctic region and is prepared to operate either independently or in conjunction with other states to safeguard its interests.” To back up this position, the United States, via the U.S. Coast Guard and U.S. Navy, has increased the presence of Coast Guard icebreakers, Navy warships, and fixed-wing patrols in the Arctic region. Is all of this posturing necessary? Are the Arctic and the Northwest Passage really opening? The answer is yes. Speaking before the 2009 Maritime Security Conference at Halifax, Canada’s Dalhouise University Centre for Foreign Policy Studies’ Dr. Stanley Weeks noted that climate change, especially in the Arctic, will have a significant and direct effect on vital maritime activities and the homeland security policies that protect their operations. Weeks, a former CBS military expert, quoted the “Findings of the Fourth Assessment Report (4AR) of the Intergovernmental Panel on Climate Change”: “The earth’s climate is changing ... The magnitude of future climate change, and the severity of its impacts, will largely depend on what mitigating actions are taken over the next few years and decades.” Added Weeks, who

is an Institute for Defense Analyses fellow, “No matter what actions are taken to reduce greenhouse gas emissions, the Earth will most likely continue warming for the next 30 years, causing a range of impacts on human and natural systems.” Despite where a reader is on the cause, the fact remains that according to a report by Norway’s Ministry of Defense – “Arctic Challenges – The Fine Art of Dealing with Change“ – “portions of Arctic ice are in fact disappearing.” To understand the homeland security issues posed by the Arctic region, one should consider what treaties and law currently apply. Two diplomatic efforts are typically highlighted in this regard: the United Nations Convention of the Law of the Sea (UNCLOS) and the Arctic Environmental Protection Strategy (AEPS). UNCLOS, which went into effect in 1994, has 155 signatories, including Russia, Denmark, Norway, and Canada – four of the nations that have been in the forefront of the Arctic debate. The United States is not a signatory, despite the fact that UNCLOS has been open for national acceptance since 1982. In 1994, then-President Bill Clinton signed the agreement – but it has never received congressional ratification. In 2007, Reuters’ Kevin Drawbaugh reported that Bush engaged the Senate in a significant lobbying effort to gain ratification of UNCLOS. The same article reported that it passed the U.S. Senate’s Foreign Relations Committee, but has never been voted on by the full Senate. Opponents of the measure state that this is a direct affront to U.S. sovereignty and should never be ratified. Why does the U.S. Senate have such an issue with UNCLOS? The reason lies in a statement within the convention that allows for the

73

$UWLF &KDOOHQJH LQGG

30


extension of the seabed resources over 150 miles more than the traditional economic exclusive zone (EEZ) of 200 miles. The issue comes down to a matter of sovereign boundaries, and who, in turn, would control the drilling and mineral rights. After Russia planted their underwater ag in 2007, they immediately cited UNCLOS as their justiďŹ cation, based on the law’s deďŹ nitions and application of the term “continental shelf.â€? A July 30, 2009, New York Times article reports that the efforts by the administration of President Barack Obama to get UNCLOS passed have been ramped up. In AEPS, the United States, Russia, Canada, Denmark, Finland, Iceland, Norway, and Sweden in 1991 pledged to work together to protect the Arctic environment through a variety of monitoring, response, and conservation activities. A May 19, 2009, article in the Daily Mail by Owen Matthews explains the economic importance of the Arctic, and hence the aggressive actions by so many nations. According to Matthews, “The last untapped reserves of oil and gas lie in the most extreme environment on the planet – the North Pole – where an estimated bonanza of 100 billion barrels are buried deep beneath the Arctic seabed.â€? Matthews further underscored the concerns that the opening of the Arctic could bring: “Only recently respected British think-tank Jane’s Review warned that a polar war could be a reality within 12 years. And the Russians have already taken the race to the North Pole’s oil wealth deadly seriously. Indeed, the Kremlin will spend tens of millions upgrading Russia’s Northern Fleet [based in Murmansk] over the next eight

years. And its Atomic Energy Agency has already begun building a eet of oating nuclear power stations to power undersea drilling for the Arctic’s vast oil and gas reserves. A prototype is under construction at the SevMash shipyard in Severodvinsk.â€? (Fully twothirds of the Russian’s blue-water navy resides in Murmansk.) Concluded Matthews, “The prospect of an undersea Klondike, near the North Pole, powered by oating nuclear plants, has environmentalists deeply worried – not least because Russia has such a dismal record on nuclear safety and disposal of radioactive waste.â€? The second reason this region of the world has a direct linkage to a nation’s homeland security concerns revolves around the prospect of the opening of the Northwest Passage and the North Sea route to more commercial trafďŹ c. As noted by The New York Times in a July 28, 2009, “Dot Earthâ€? blog post, “Since 1553, when Sir Hugh Willoughby led an expedition north in search of a sea passage over Russia to the Far East, mariners have dreamed of such a shortcut.â€? The blog post, written by Andrew Revkin, continued, “Russian vessels have long-hauled ore and oil along the country’s sprawling northern coast, but no commercial ships under other ags have passed between Asia and Western Europe.â€? The article concluded, “Last year, for the ďŹ rst time in the era of satellite monitoring, both Arctic passages were briey open at the same time.â€? These potential shifts in the maritime transportation system hold great signiďŹ cance to those that use the global maritime commons to move goods and services. Transit through the Northwest Passage would shorten the journey between Europe and Asia by over 4,000

U.S. Coast Guard photo by Petty OfďŹ cer 3rd Class Michael Anderson

The Canadian Coast Guard Ship Louis S. St-Laurent maneuvers into position to moor up with the U.S. Coast Guard Cutter Healy during a cooperative science mission to the Arctic Ocean between the United States and Canada Sept. 25, 2008.

74

$UWLF &KDOOHQJH LQGG

30


U.S. Coast Guard photo by Petty OfďŹ cer 3rd Class Michael Anderson

The U.S. Coast Guard Polar Star-class icebreaker USCG Polar Sea (WAGB 11), one of only four U.S. icebreakers in commission, received a life-extension overhaul and is now operational through 2014.

miles. The problem is that both Canada, since 1970, and Russia have claimed that both routes are in their territorial seas. Since 2007, the primary countries have had survey teams in the Arctic to justify their claims in a manner that resembles the California Gold Rush; everyone wants to “stake their claim.â€? The third reason that the Arctic has suddenly become “hotâ€? from a homeland security perspective involves the migration of ďŹ sh. For a nation to defend itself there are many requirements – but none is more basic than food. With global warming and documented ice melting, ďŹ sh stocks are moving north to the warmer water. This means that the commercial ďŹ shing eets that harvest these critical components of a national diet must also move north to a more treacherous and demanding operating environment. The net result of all of this increased activity in the Arctic is a signiďŹ cant potential for economic, environmental, or human disaster – accidental or intentional. With the tremendous economic value at stake as well as the increasing presence of cruise ships and other vessels, the Arctic region is quickly becoming a tempting target for anyone seeking to disrupt or undermine the efforts of legitimate nations. So how is the United States positioned to address security issues in the Arctic? The truth is, not very well. Simple math supports this conclusion. The U.S. Coast Guard currently has the only four U.S. icebreakers in commission: One breaker is operating in the Great Lakes; the Polar Star, which hasn’t been under way on an operational mission since 2006, is undergoing a massive overhaul; Polar Sea received a service life-extension overhaul and is now operational through 2014; and Healy, commissioned in 2000, operates with a crew of 80 and deployed in 2009 to support the Bering Ecosystem Study (BEST) with a scientiďŹ c team that will use different sampling strategies to test the ecosystem in the Bering Sea. The Healy is designed to break ice that is 4.5 feet thick, as compared to the 6 feet of ice the Polar-class breakers can handle. The Canadians have 13 operational icebreakers, and the Russians have nine nuclear-powered icebreakers, with plans to build more in the next few years. In July 2009, while speaking before the U.S. Senate Subcommittee on Oceans, Atmosphere, Fisheries, and the Coast Guard, Adm.

Thad Allen, commandant of the Coast Guard, said, “our icebreaker eet is atrophying, and we run the risk of losing that national capability.â€? Allen’s comments regarding the need for additional icebreaking capacity were underscored by U.S. Sen. Lisa Murkowski, R-Alaska, who was quoted in the July 23, 2009, Alaska Journal of Commerce: “These vessels are becoming increasingly important as access to the Arctic and its resources increases due to climate change and a reduction in sea ice. Activities such as energy development, tourism, marine transportation and shipping will increase, and the Coast Guard must have the resources to respond.â€? During a speech at the U.S. Naval Academy-hosted Third Symposium on the Impacts of an Ice-Diminishing Arctic on Naval and Maritime Operations, Allen further noted that he has several concerns, including a “casualty to a cruise ship.â€? His reason for concern: “We don’t have a presence there.â€? The effects of a cruise ship hitting an iceberg in the Arctic would be a difďŹ cult situation because of the distances involved. Compounding the problem is a lack of medical facilities and fuel storage. If a large cruise ship did indeed hit an iceberg or come under attack, there is little that could be done. With the shortfalls in its capacity well documented, the United States continues to work jointly in the region by conducting bilateral explorations with Canada. The next stage of this effort was to draw respective territorial sea boundaries using an icebreaker from each country – for the United States, USCGC Healy, for the Canadians, the Louis S. St-Laurent. From Aug. 7 to Sept. 16, 2009, the joint team was slated to explore north of the state of Alaska into the Alpha-Mendeleev Ridge, which is an underwater mountain range and an area composing a portion of the Canadian Arctic Archipelago. This is the second joint U.S.-Canadian effort and the ďŹ fth survey mission for the U.S. Coast Guard since 2003. Canadian Minister of Foreign Affairs Lawrence Cannon, in prepared remarks, noted that the joint effort was critical to national and homeland security. “The joint Arctic survey by Canada and the U.S. is an example of an exceptional and valued partnership. Canada is an Arctic power. Our government has a clear vision for the North. Determining where Canada can exercise its sovereign rights over seabed resources by delineating the outer edge of the country’s continental shelf in the Arctic is an important element of our Northern Strategy.â€? Canada’s leading Arctic expert, Dr. Rob Huebert, a political scientist at the University of Calgary, has penned a white paper that labels the United States as “The Reluctant Arctic Power.â€? The paper has received extensive attention throughout Canada and the United States. Huebert’s paper was meant to be a true wake-up call to the United States. His recommendation is direct and straightforward: “The United States must abandon its unilateral (perhaps even isolationist) tendency when dealing with its neighbors. It must accede to the United Nations Convention on the Law of The Sea. It was never in the American interest to sit on the sidelines; it deďŹ nitely makes no sense in terms of the Arctic.â€? Concluded Huebert, “After efforts to ‘go it alone,’ U.S. leaders again realize the value of multilateralism. The developing challenges in the Arctic are multi-dimensional and do not stop at the borders of each Arctic state. They require solutions that are not unilateral.â€? The opening of the Arctic is coming. At stake are billions in natural resources as well as the safety of life and the preservation of a fragile ecosystem. The United States is an Arctic nation with signiďŹ cant interest in the future of the Arctic. Such an increase in activity within a fragile environment creates opportunities for those who would do us and other legitimate nations harm. At present, the United States is far behind in the ability to project a security presence in the Arctic; this must change.

75

$UWLF &KDOOHQJH LQGG

30


U.S. Navy photo

The crew of a self-propelled semisubmersible drug-trafďŹ cking vessel attempt to abandon their boat before being intercepted and detained by the Coast Guard approximately 150 miles northwest of the Colombian/Ecuador border on Jan. 8, 2009.

76

6XEV LQGG

30


What the Submersibles Mean: Transnational Gangs, Drugs, and Terrorism By Dr. Joe DiRenzo III and Chris Doane

ince the days of the United States’ Revolutionary War and Connecticut patriot David Bushnell’s Turtle, the idea of a vessel operating just under the surface of the water to launch an attack has been a concern of military, national security, and maritime industry stakeholders. Submerged or semi-submerged craft are incredibly hard to detect, track, and interdict. Therefore, it was only a matter of time before smugglers and terrorists began using these craft for their illegal purposes. Over the past couple of years maritime security forces have confronted the increasing use of self-propelled semi-submersibles (SPSSs) to smuggle drugs into the United States. If SPSSs prove an effective means for transporting drugs into the country, there should be little doubt that terrorists will begin using them to smuggle operatives and weapons, including possibly weapons of mass destruction, into the country. SPSSs represent a serious threat to the security of the United States that must be countered quickly. As demonstrated centuries ago, an SPSS does not have to be sophisticated. Bushnell, working with his brother Ezra Bushnell, used hand-cranked propellers and quick-release lead ballast for buoyancy. The first attack with this weapon occurred on Sept. 7, 1776, when Turtle’s operator, Sgt. Ezra Lee, attacked HMS Eagle, the British flagship, as it lay at anchor in New York Harbor. The attack failed due to several factors, but the concept remained valid and was improved upon as warfare matured. Today, submersibles range from sophisticated machines of war operated by nation-states to oceanographic research vessels operated by private foundations to tour vessels used by private companies and now criminal organizations. The technology and capability for designing, building, and operating submersibles and semi-submersibles is readily available to all. Today, as the effectiveness of law enforcement in interdicting surface vessels improves, rumors of drug-trafficking organizations turning to submersibles to counter law enforcement arise frequently, creating a clear concern for both law enforcement and the military. Whether criminal organizations have submersibles or not, there is no doubt that they have and are using SPSSs, as seizures at sea and on shore are increasing. As the former commander of Joint Interagency Task Force South, Coast Guard Rear Adm. Joseph L. Nimmich noted, “Every time we turn around, the smugglers remind us they are extraordinarily creative, extraordinarily adaptive.” There is no doubt that the enemy is adaptive; therefore security forces must be just as creative, agile, and adaptive. To counter the SPSS threat requires an understanding of that threat. One of the best definitions describing SPSS-like vessels is found on the U.S. Southern Command Web site, which notes:

S

Self-Propelled Semi-Submersibles (SPSS) represent the emerging sophistication and innovation of drug traffickers to adapt to U.S. and regional counter-drug capabilities. The vessels are designed and built by narco-terrorists in Colombia to smuggle large volumes of cocaine over long distances in a manner that is difficult to detect. Since the vessels have a low profile – the hulls only rise about a foot above the waterline – they are hard to see from a distance, leave little wake and produce a small radar signature. U.S. counter-drug officials estimate that SPSS are responsible for 32% of all cocaine movement in the transit zone. U.S. Southern Command, the U.S. Coast Guard and regional officials consider SPSS a serious threat to U.S. and regional security … [they are] 4080 feet in length with a freeboard (exposed area above the waterline) of approximately 18 inches, a crew of 4 persons, and able to carry 4 to 12 metric tons of cocaine … We assess the use of SPSS vessels has grown in recent years as a means to counter effective U.S. drug interdiction efforts. Since 2006, there have been multiple known SPSS events. Drug traffickers continue to adapt to law enforcement successes. The SPSS, once perceived as an impractical and risky smuggling tool, has proven successful as an innovative and highly mobile, asymmetrical method of conveyance. SPSSs are exceptionally difficult to detect and track due to their low radar profile and nearly undetectable deep water (dark blue) paint scheme. Built in relative secrecy and “unregistered” or “undocumented” status makes it relatively impossible to accurately assess how many such vessels are in production or operating. The U.S. Coast Guard San Diego Public Affairs Detachment noted in a March 25, 2009 release: They are often referred to by some as “Sasquatch of the Pacific.” They are rarely seen and almost never apprehended, and have emerged as the prevailing smuggling threat in the vast ocean waters of the Eastern Pacific. To make apprehension even more difficult, the crews piloting the SPSS have consistently scuttled or intentionally flooded their vessel, sending the craft and its multi-ton load of cocaine to the bottom of the ocean. Through the activation of one or more scuttling valves, the SPSS operators can sink their vessel in minutes. Upon being detected and after seeing Coast Guard or Navy ships move in for the intercept, the SPSS crews often climb on top of the SPSS, don lifejackets, and literally let the vessel sink beneath them. The smugglers’ intentional sinking turns into a fabricated search and rescue case as the smugglers are in the water, now victims of the sea.

77

6XEV LQGG

30


THE YEAR IN

DEFENSE ONLINE

Ǎ Ǎ Ǎ ƺ Ǎ Ǎ lj ƺ ƺ Ǎ Ǎ Ǎ Ǎ Ǎ Ǎ Ǎ

Ƹ Ƹ Ƹ YiD full page ad.indd 2

9/14/09 11:16 AM


U.S. Navy photo/Petty Officer 1st Class Nico Figueroa

U.S. Coast Guard and Navy law enforcement seized 37 bales of cocaine from a self-propelled semi-submersible (SPSS) craft Sept. 13, 2008. A Coast Guard Law Enforcement Detachment (LEDET) was embarked aboard the USS McInerney, and a Navy maritime patrol aircraft spotted the SPSS and vectored the McInerney to the location of the smuggling vessel. Four suspected smugglers were taken into custody.

The difficulty of capture has been recognized internationally. As the June 16, 2008, online edition of the internationally respected Jane’s Defence Weekly (www.janes.com/news/security/terrorism/ jtsm/jtsm080616_1_n.shtml) noted: A terrorist submarine attack might seem like a James Bond scenario, but drug smugglers linked to the Revolutionary Armed Forces of Colombia (Fuerzas Armadas Revolucionarias de Colombia: FARC) are already using semisubmersible vessels to transport multi-tonne cargoes of cocaine. Up to 40 such vessels left South American shores in 2007 and more are expected in 2008 … Captain Robert Watts, a United States Coast Guard officer who has tracked maritime drug smuggling trends, told Jane’s that the first experimental SPSS was found in Colombia in 1989. However, such vessels did not become practical until global position system (GPS) technology became widely available and the US and Colombian authorities began to effectively counter the ‘go-fast’ speedboats typically used by the smugglers, according to Capt Watts. The growing numbers of SPSS vessels indicates that their stealthy characteristics and ability to carry many tonnes of cocaine have helped them develop into what now seems to be a major component of the narcotics logistics chain. The Colombian Navy believes that during the past two to three years, cocaine smuggling SPSS vessels have been arranged mostly by the drug trafficking factions of the FARC, probably in association with organized crime groups also involved in drug trafficking.

While the use of SPSSs so far appears to have been limited to drug smuggling, their potential as a means for conveying terrorists and/or their weapon systems is clear. This concern was best stated by one of the most visible Department of Defense combatant commanders. Writing in the U.S. Naval Academy Alumni Association’s Shipmate magazine, the then-commander of U.S. Southern Command, Adm. James Stavridis, noted: Gangs and smugglers use their enormous profits to secure and preserve positions of power by whatever means necessary, resulting in mass homicides, corruption, and subversion of rule of law. We also know that drug traffickers use illegal drug money to assist rogue states and international terrorist organizations that are determined to build and use weapons of mass destruction, such as the FARC narco-terrorists in Colombia. In this sense, growing global demand for drugs such as cocaine, heroin, and marijuana directly links the world drug trade to international terrorism … Semi-submersible, low-profile vessels transport drugs for profit, and they do so effectively. It does not take a great leap to imagine what danger awaits us if drug traffickers choose to link trafficking routes and methods with another – perhaps even more profitable – payload. In simple terms, if drug cartels can ship up to ten tons of cocaine in a semi-submersible, they can clearly ship or “rent space” to a terrorist organization for a weapon of mass destruction or a high-profile terrorist … In ever-increasing numbers, these stealthy, pod-like vessels depart expeditionary shipyards nested deep in the dense

79

6XEV LQGG

30


jungles and estuaries of the Andes region of Latin America. Carefully ballasted and well camouaged, they ride so low in the water that they are nearly impossible to detect visually or by radar at any range greater than 3,000 yards. Loaded to capacity with tons of drugs they plod steadily and generally unobserved at less than ten knots toward designated dropoff points, depositing their payloads of sorrow and death – translating into thousands of deaths in the USA – for further transit to global consumer markets. Despite their stealth-like characteristics, there have been successful interdictions of SPSSs over the past few years. In August 2007, the Australian Broadcasting Company (ABC) reported on a joint interdiction of an SPSS off of Central America with $352 million worth of cocaine. The article continued: U.S. Customs and Border Protection said the semi-submersible vessel – which was only partially visible from the surface – was spotted by a surveillance plane 482 kilometers southwest of the Mexico-Guatemala border on Monday. The plane then guided a U.S. Navy ship to the scene as the four suspected drug smugglers scuttled the vessel, along with the bulk of its cargo, believed to be around 5,000 kilograms of cocaine. The suspects and 11 bales of cocaine weighing around 548 kilograms were eventually recovered from the scene. On Sept. 17, 2008, the U.S. Coast Guard Cutter Midgett, a 40-year-old Coast Guard high-endurance cutter, interdicted a 60-foot stateless SPSS vessel carrying over 14,000 pounds (approximately 7 metric tons) of cocaine valued at over $196 million approximately 400 nautical miles south of the Mexico/Guatemala border. This was a joint interdiction with the U.S. Navy. This interdiction followed a nationally covered nighttime boarding and seizure of another SPSS on Sept. 12-13, in which a Coast Guard boarding team surprised the SPSS captain and crew with a no-notice boarding. Despite the best efforts of the SPSS’s crew to drown the boarding team by scuttling, they eventually complied with orders to disengage the scuttling devices on the vessel. The boarding team discovered 7 metric tons of cocaine and the four-man crew faces prosecution in the United States.

U.S. Navy photo/Petty OfďŹ cer 1st Class Nico Figueroa

The U.S. Coast Guard seized this self-propelled semi-submersible (SPSS) vessel carrying 7 tons of cocaine Sept. 12, 2009.

Another successful interdiction occurred in January 2009, when the USCGC Chase, another aging high-endurance cutter, with an embarked helicopter from Coast Guard Air Station Port Angeles, Wash., stopped a 50-foot SPSS. Initially the smugglers had thought that they had successfully scuttled the vessel. Their attempt failed and the Coast Guard boarding team got aboard. After what seemed like an extensive period of time, the boarding team reported “touchdownâ€? ‌ ďŹ nding 199 50-pound bales and 2,293 kilogram-weight “bricksâ€? of cocaine. The interdicted vessel was later dubbed “Big Foot.â€? According to an April 28, 2009 article in The Tampa Tribune, “Crews from about a dozen semisubs have been prosecuted in federal court in Tampa as part of Operation Panama Express, a long-term Tampa investigation into Colombian maritime drug smuggling.â€? As the effort continues to thwart these vessels, U.S. law enforcement agencies now have a new law to support their efforts. On Jan. 3, 2008, Public Law 110-407, The Drug TrafďŹ cking Vessel Interdiction Act of 2008, was signed into law. Sponsored by current Vice President Joe Biden, then a U.S. senator, the law speciďŹ cally targeted SPSS vessels by stating: “Congress ďŹ nds and declares that operating or embarking in a submersible vessel or semi-submersible vessel without nationality and on an international voyage is a serious international problem, facilitates transnational crime, including drug trafďŹ cking, and terrorism, and presents a speciďŹ c threat to the safety of maritime navigation and the security of the United States.â€? The law goes on to clarify the offense: “Whoever knowingly operates, or attempts or conspires to operate, by any means, or embarks in any submersible vessel or semisubmersible vessel that is without nationality and that is navigating or has navigated into, through, or from waters beyond the outer limit of the territorial sea of a single country or a lateral limit of that country’s territorial sea with an adjacent country, with the intent to evade detection, shall be ďŹ ned under this title, imprisoned not more than 15 years, or both.â€? While dramatic at-sea interdictions have garnered much press, perhaps the best counter strategy is destroying the SPSSs during construction. The U.S. government has been working with many South American countries from which these vessels originate to locate and destroy them before they are launched. For example, Colombia passed a law criminalizing the ďŹ nancing, construction, storage, transport, or use of semi-submersibles or submersibles with illicit intent. Such parliamentary action as this, coupled with aggressive action by law enforcement, offers a signiďŹ cant counter to a serious threat. The issue will continue to be an ongoing effort of adaption. In an article written by Gordon Lubold from The Christian Science Monitor, dated Aug. 25, 2008, the writer quoted the current U.S. Northern Command Commander, Air Force Gen. Victor “Geneâ€? Renuart, during the general’s interview on C-SPAN’s Newsmakers: “These narcotics trafďŹ ckers, much like terrorists in other parts of the world, are learning adversaries ‌ As you close one loop, they will open another ‌ If we believe we have solved the problem, we are almost guaranteeing it will come back. You can’t take your eye off the ball in this kind of solution.â€? SPSSs offer a signiďŹ cant threat to the security of the nation’s maritime borders. If smugglers realize signiďŹ cant success employing these insidious craft, there can be little doubt that terrorists will follow suit. Therefore law enforcement agencies, supported by the military and in partnership with other nations, must act aggressively to counter the threat. However, in the forthcoming period of austere if not declining agency budgets, the ability to act aggressively will be severely challenged, putting the outcome in doubt.

80

6XEV LQGG

30


INDUSTRY VIEWPOINT

D

epartment of Homeland Security (DHS) Secretary Janet Napolitano has identiďŹ ed “unifying the Department of Homeland Securityâ€? as one of ďŹ ve mission areas and strategic thrusts. The initiative, also referred to as achieving “One DHS,â€? is to be a multifaceted effort to create operational efďŹ ciencies and effective mission achievement strategies. It is expected that process consistencies and consolidated infrastructures will promote the seamless operations, unity of purpose, speed and agility required to address man-made and naturally occurring challenges that DHS must address. “One DHSâ€? has various deďŹ nitions – and all are valid. For some, “One DHSâ€? means consolidating the department’s organizational entities physically or logically. That can be achieved largely through combining the multiple physical locations into a single or reduced number of real property locations. For others, “One DHSâ€? is largely an information technology activity to consolidate the IT networks and major systems that support the department’s operations. Some say “One DHSâ€? is achieved through single or common administrative backbones that support resource management, human capital management, procurement and operations management. Finally, there are those who deďŹ ne “One DHSâ€? as achieving greater levels of cultural integration of the federal agencies that were combined to form DHS. From our perspective, “One DHSâ€? is all the above dimensions of uniďŹ cation, integration and cohesion‌and then some.

$FFHQWXUH $GYHUWRULDO LQGG

DHS should ensure its “One DHSâ€? strategic initiative is indeed comprehensive and multi-dimensional. The dimensions of “onenessâ€? cited above are interrelated. Pursued in coordinated and purposeful ways, the beneďŹ ts become exponentially greater than if they were addressed individually. For example, consolidating an IT infrastructure achieves cost savings and efďŹ ciencies, but adding large elements of cultural integration would enable that infrastructure to be used more effectively in achieving common missions. Likewise, breaking down cultural barriers is noble, but supporting that effort with common learning and administrative systems would yield much more meaningful results. In its post-merger integration phase, the department may be uniquely poised to launch a “One DHSâ€? initiative that can provide immediate and ever-increasing beneďŹ ts to U.S security. Over the years, federal departments born from the merger of previously independent agencies have attempted variations of “One DHSâ€? programs. Efforts have included creating common store-fronts for serving constituents, or consolidating and removing redundant capabilities within their operations. DHS should articulate the level of “onenessâ€? it desires to achieve across multiple dimensions. That oneness goal should provide desired outcomes against which the current state is measured. Ongoing and future initiatives should be assessed for their contributions to achieving “One DHS.â€? The bottom line is the sobering reality that the enemies of the United States seek vulnerabilities to exploit. Unifying DHS would go a long way toward reducing gaps and vulnerabilities in its operations, ultimately enhancing the nation’s security.

30


Critical Infrastructure Protection Tools for Homeland Security Partners rotecting the nation’s critical infrastructure and key resources (CIKR) is a shared responsibility among government and private industry. The Department of Homeland Security (DHS) has established a comprehensive national program to collect, manage, and share vital infrastructure information to support public and private CIKR protection efforts across the United States and its territories. In less than three years, the program has produced several important data collection and usage tools to help homeland security professionals and CIKR owners and operators build and sustain their own CIKR protection programs.

P

The Need for CIKR Protection When DHS came together after September 11, bringing nearly two dozen existing organizations under a single umbrella, it quickly became evident that one of the most important ďŹ rst steps to secure the nation was to establish a unifying structure of partnerships, plans, and programs to protect the national infrastructure. The Homeland Security Act of 2002 established the OfďŹ ce of Infrastructure Protection (IP) to lead the coordinated national program to reduce risks to national CIKR posed by acts of terrorism, and to strengthen national preparedness, timely response, and rapid recovery in the event of an attack, natural disaster, or other emergency. One of the most important aspects of this mission is the establishment of infrastructure protection programs and capabilities at the state, local, and regional levels as well as within private industry. OfďŹ cials quickly determined there was a need to acquire and share standardized, relevant, and user-focused infrastructure data, tools, and services with ďŹ rst responders and state and local homeland security organizations on a vast array of publicly and privately owned CIKR. At the national level, CIKR are deďŹ ned in the National Infrastructure Protection Plan (NIPP) as assets, systems, networks, and functions that are essential to national security, public health and safety, economic vitality, and our way of life.

The Importance of Partnerships The key to all CIKR protection efforts is data. Data drives protection and resiliency efforts and allows an informed response that can only be effective if the information is current. Information can only be effectively gathered and managed through a partnership model, with all parties having an active role in preparedness, response, and recovery.

Richard Driggers, director of the department’s Infrastructure Information Collection Division (IICD), oversees the DHS CIKR information collection program. “Critical infrastructure is an interesting term,â€? he noted during a recent interview, “because what is critical is dependent on your perspective. At the federal level we are concerned about infrastructure that if destroyed or disrupted would have catastrophic impacts to our national security, economy, or signiďŹ cant loss of life. However, there are many infrastructure assets that a state or local region would deem critical to that geographic area that would not have national impacts. Additionally, there are infrastructure assets, such as shelters, that become nationally critical due to an evolving situation such as a hurricane or other natural disaster. “Forming long-lasting effective partnerships is one of the critical aspects to successfully implement our mission within the OfďŹ ce of Infrastructure Protection. It can also be one of our most signiďŹ cant challenges. Infrastructure protection requires partners at all levels of government and within the private sector. Approximately 85 percent of the nation’s infrastructure is owned and operated by the private sector. However, 100 percent of the nation’s infrastructure is located in a state, city, or jurisdiction whose ďŹ rst-responder community has a responsibility to protect and respond to incidents that impact the infrastructure,â€? he added. Driggers continued, “No one organization is responsible for infrastructure protection; and the security of infrastructure assets, systems, and networks is widely unregulated across all levels of government. Enhancing the protection and resilience of our nation’s infrastructure depends on trusting partnerships that promote collaboration and information sharing. The NIPP established an unprecedented partnership model to bring the state and local community and private sector into the fold to provide subject matter expertise on infrastructure protection issues. Unfortunately, it takes time and patience to build effective partnerships across such a diverse landscape of infrastructure sectors, cities, and states. However, we have made signiďŹ cant progress in the last three to four years and continue that progress every day.â€? The Infrastructure Information Collection Division’s guiding principle is to promote partnerships by providing support for the establishment of infrastructure protection programs and capabilities within state and local regions and the private sector. IICD was established in 2007 to integrate and align various tools, technologies, and data sets used within the infrastructure protection community into a federated technical architecture. This architecture

82

,,&' LQGG

30


All photos courtesy of OfďŹ ce of Infrastructure Protection

With access to the Constellation/Automated Critical Asset Management System (C/ACAMS) tools and CIKR asset data, prevention, and protection information, emergency responders have the ability to communicate between agencies.

will be speciďŹ cally designed to provide risk and vulnerability assessment tools, visualization, and geospatial applications, as well as infrastructure data services. “We are very excited about the direction we have taken these last two-and-a-half years,â€? Driggers said. “We have opened the books, so to speak, to ensure our customers and stakeholders at all levels of government and the private sector can inuence and provide requirements to ensure we are meeting their mission needs and continuously improving our products and services. We have developed or enhanced our programs through direct feedback or in support of requirements provided from the state and local community; federal partners, such as the Environmental Protection Agency [EPA] and the National GeospatialIntelligence Agency; and industry, such as the chemical sector.

The Infrastructure Information Collection Collecting data on the nation’s entire critical infrastructure, in addition to being time-consuming and potentially extremely expensive, requires advanced technologies to organize, maintain, and protect the data and to provide a wide array of applications to use the data

for analysis, modeling, visualization, and other mission functions. IICD oversees three major projects that support infrastructure information collection, data management, and visualization. IICD works closely with governments, CIKR owners and operators, and other stakeholders to identify their data needs and data use requirements. Once acquired, the data are put through a rigorous quality assurance process that is aligned to the Infrastructure Data Taxonomy. IICD collects data via three methods: targeted collection for a speciďŹ c requirement, voluntary sharing by the private sector or other government agency at the federal or state level, and through risk and vulnerability assessment tools. This data provides a foundation for the National Critical Asset List, which helps drive DHS grant programs for infrastructure protection and emergency response and preparedness by state and local agencies. Among the tools employed in the infrastructure protection collection effort are the Constellation/Automated Critical Asset Management System (C/ACAMS) and risk-assessment tools created under the Methodology Technical Implementation (MTI) project. These collect CIKR information that ďŹ rst responders and recovery teams need in the event of natural or man-made disasters.

83

,,&' LQGG

30


THE YEAR IN

DEFENSE ONLINE

Ǎ Ǎ Ǎ ƺ Ǎ Ǎ lj ƺ ƺ Ǎ Ǎ Ǎ Ǎ Ǎ Ǎ Ǎ

Ƹ Ƹ Ƹ

4HEô#AREERô"OOSTô 9OU REô,OOKINGô&OR !PPLIEDô)NFORMATIONô-ANAGEMENTô -ASTER Sô$EGREEô0ROGRAM 7HENôATTEMPTINGôTOôNEGOTIATEôAô RAISEôATôWORK ô)ôWASôTOLDô)ôWOULDôNOTô ADVANCEôWITHOUTôFURTHERôHIGHERôEDUCA TION ô)ôCHOSEô!)-ôBECAUSEô)ôWANTEDôAô CHALLENGINGôACADEMICôENVIRONMENTô ô ô 4RAVISô,

HTTP AIM UOREGON EDUô ô

%/ !! !$!ôINSTITUTIONôCOMMITTEDôTOôCULTURALôDIVERSITY

082.indd 1

10/23/09 2:50 PM


The Voluntary Chemical Assessment Tool (VCAT) is intended for use by non-regulated chemical facilities in the chemical sector to help owners and operators identify security gaps, determine the facility’s current risk level, and conduct cost-beneďŹ t analysis of options for enhancing the facility’s security posture.

The C/ACAMS Advantage C/ACAMS has a wide range of users, from ďŹ rst responders and state and local homeland security organizations, to facility owner/ operators and industry organizations, to federal agencies, such as the Federal Emergency Management Agency (FEMA), EPA, and the U.S. Coast Guard. Ollie Gagnon, a DHS protective security advisor from Tampa, Fla., uses C/ACAMS frequently. “On a day-to-day effort, we’re actually identifying, prioritizing, protecting critical infrastructure; C/ACAMS enables us to have all the partners look at the same information together so that we can work as a uniďŹ ed team,â€? he said. C/ACAMS is currently being used in 35 states by approximately 4,300 state and local users, with 75,000 assets entered. How C/ ACAMS is employed varies from state to state. How it will be used depends on how many users there will be, how familiar they are with risk management, and how much focus the state places on infrastructure protection. For example, the Los Angeles Police Department (LAPD) has deployed C/ACAMS in incident command mobile communications vehicles to help protect large, highly visible events such as the 2009 World Baseball Classic ďŹ nals and the Academy Awards ceremony. C/ACAMS depends on the partnerships created between users such as LAPD and asset owners and operators to successfully support these events. “C/ACAMS is not used the same way by every user,â€? noted Driggers. “Some use it simply as an inventory tool, others as a vulnerability assessment tool and as a response tool to assist with planning. Different localities and jurisdictions use different tools and applications to meet their unique mission requirements, so we try to build tools and services that are exible and scalable to meet those differing requirements. A fairly complex state like New Jersey has a high density of infrastructure, while a more rural state like Iowa does not. We try to ensure our tools and services support or enhance a state or local region’s capabilities to provide a level playing ďŹ eld, especially for those states that do not have a lot of resources for the infrastructure protection mission.â€?

In addition to developing tools for state and local use, IICD also partners with the 18 CIKR sectors to create risk and vulnerability assessment tools for private-sector use.

Reducing Risk with MTI MTI supports the development of sector-speciďŹ c automated tools designed to meet individual, unique needs. One of these tools is the Risk Self-Assessment Tool (RSAT), built in partnership with the Commercial Facilities Sector and the National Stadium Managers Association, and primarily used by performing arts centers, racetracks, sports stadiums, and similar venues with unique requirements. Another tool, the Voluntary Chemical Assessment Tool (VCAT), was developed in partnership with the Chemical Sector SpeciďŹ c Agency lead (DHS) and chemical industry experts. VCAT allows owners and operators to identify their facilities’ current risk level using an all-hazards approach and facilitates cost-beneďŹ t analysis by allowing them to select the best combination of physical security countermeasures and mitigation strategies to reduce overall risk.

Infrastructure Data Management Infrastructure data management focuses on setting standards for data collection to ensure the data is accurate and infrastructure is described using the same terminology. To support users, IICD has developed a comprehensive infrastructure data catalog, a data taxonomy, and a thorough use of a Quality Assurance/Quality Control process developed in conjunction with Argonne National Labs. This process provides a structured approach for increasing accuracy and completeness of infrastructure data submitted by states, territories, sector-speciďŹ c agencies, and other IP mission partners. Collected information is aligned to the Infrastructure Data Taxonomy, which organizes and standardizes the terminology used to identify critical infrastructure and allows for sharing of data across state, local, and national governments. IICD has disseminated the taxonomy to 150 mission partners throughout the public and

85

,,&' LQGG

30


LEFT: The OfďŹ ce of Infrastructure Protection monitors nuclear reactors, materials, and waste of facilities (Byron Nuclear Plant pictured). By using the Infrastructure Data Taxonomy provided by the IICD, the government and private sector can further categorize the plant by sector, sub-sector, segment, and sub-segment. RIGHT: DHS Earth provides a data feed of information on infrastructure and 3-D visuals that allow users to determine the impact of a natural disaster or other emergency on known infrastructure.

private sectors and is working with partners to develop data models to ensure interoperability so that state and local partners can readily access the data and incorporate it into their environment to use with their tools. The Infrastructure Data Taxonomy has helped the New York City OfďŹ ce of Emergency Management organize their data sets using a common language for classifying data and move toward better coordination across all levels of government. Noted one of their analysts: “Taxonomies such as this one are useful, not only in organizing existing data sets, but in providing a road map for future data development and acquisition. If local, state, and federal data sets can be aligned using these taxonomies, we’re one step closer to developing common operating data.â€? In addition to setting infrastructure data standards, IICD provides data protection through the Protected Critical Infrastructure Information (PCII) program. PCII facilitates the voluntary sharing of proprietary CIKR information by ensuring that the information in the government’s hands will not be disclosed under federal, state, or local disclosure laws or used in civil litigation or for regulatory purposes: PCII is a mechanism to encourage CIKR owners and operators to voluntarily submit their information to DHS so that DHS and other government entities at the federal, state, and local levels can use the information in C/ACAMS, MTI, and other assessment tools.

Infrastructure Visualization Another primary mission of IICD is the visualization of infrastructure data, both with geographic information system (GIS) and aerial imagery taken before and after incidents. IICD’s two primary visualization products, iCAV and DHS Earth, have become critical tools used to secure high-proďŹ le events by providing detailed infrastructure maps to homeland security partners and ďŹ rst responders. In 2009 alone, the tools were used to provide situational awareness for the security of the inauguration, the Super Bowl, the Major League Baseball All-Star game, and the papal visit to Washington, D.C.

“We take the authoritative infrastructure data IICD collects and turn it into easily understood, visually appealing formats,â€? explained Michael Clements, IICD’s Infrastructure Visualization Branch chief. “It’s difďŹ cult in many cases to understand infrastructure data by simply looking at a spreadsheet; so our function is to provide some geospatial context to that data, how infrastructure is laid out across the map, how it relates to its environment and other infrastructure around it.â€? Richard Benjamin, a U.S. Secret Service geospatial analyst and iCAV user, agreed. “It’s been said that ‘a picture is worth a thousand words’; iCAV gives you that picture. You can manipulate it the way that you want in order to get across the point you are trying to portray. It’s important for an emergency responder, as well as for high-ranking ofďŹ cials, to be aware of the critical infrastructure in and around your area. Having an overall picture from iCAV is a huge beneďŹ t to the guys on the ground because it allows them to reallocate resources in the ďŹ eld and gives them awareness – what’s going on, where do I need to go next? The majority of the work is done for you – the data is already there and that is a huge beneďŹ t to any geospatial analyst.â€? iCAV also uses Google™ Earth technology to provide DHS-speciďŹ c data through DHS Earth, a data feed of infrastructure information. iCAV and DHS Earth are intuitive to use and have gained popularity because users with differing geospatial analysis skills can see what they want and need. At the same time, those who do want to tackle the analysis themselves have the imagery, software, and other tools they need from the same source. DHS Earth provides 3-D visuals, while iCAV uses 2-D imagery for its mapping. “More importantly, we develop software products to depict our data, where DHS Earth is a data service that users can use any application to view,â€? Clements added. “The beneďŹ t of offering the data in those multiple ways is greater user exibility in both how they view the data and what they do with it. A lot of our users aren’t interested in asking questions of the data, they just want to see it on a map. DHS Earth is much better at doing that. “Most of our iCAV users are state and local partners who can’t access classiďŹ ed information. So, while we also serve the DHS enterprise, we want to make our data as widely available as possible to

86

,,&' LQGG

30


MT94™ state and local ďŹ rst responders, fusion centers, and the entire homeland security community, not just those operating on the classiďŹ ed side.â€? In addition to the creation of geospatial tools, IICD works with other federal agencies to provide imagery before and after incidents. The Infrastructure Visualization Project leverages a variety of resources – from satellites or aircraft – to determine the impact of a natural disaster on known infrastructure. A number of federal agencies – EPA, the National Oceanic and Atmospheric Administration (NOAA), Civil Air Patrol, even Department of Defense in some limited instances – typically y over disaster areas and take pictures, often both during and after the incident. “We rely heavily on those organizations to share their imagery with us. Last year, during Hurricanes Ike and Gustav, NOAA was one of the ďŹ rst federal agencies in the air taking pictures after the event, and all their imagery is publicly available,â€? he added. “We worked with NOAA to turn their imagery into a data feed that we provided to our user community through iCAV and DHS Earth. This was a huge win for us and NOAA and provided the community working in the ďŹ eld with timely post-event imagery.â€?

The Way Ahead for Critical Infrastructure: Protection and Resiliency Musing on where future challenges lie, Driggers observed: “In the years before September 11, there was no infrastructure protection plan, no coordinated effort across the federal government, no partnerships with state and local governments, no group of people at the federal, state, local, and private-sector levels focused on infrastructure beyond immediate response to natural disasters. Now we have people looking at the interdependencies of infrastructure and have a much deeper understanding of the intricacies of the nation’s infrastructure, across all levels.â€? Clements agreed. “State and local communities are starting to see the value of doing infrastructure protection, not just after an incident, but planning up front to support incident response and recovery. I see a lot more proactive engagement to build infrastructure protection programs and capabilities. And I think DHS has helped that by offering FEMA grant money to state and local municipalities.â€? Today, ďŹ rst responders and those working at the state and local level are using the same terminology and tools to assess infrastructure vulnerabilities and plan how to deal with potential disasters. “IICD tools enhance situational awareness by providing information – immediate information – to commanders, to operational people, even planning people, as to critical infrastructure, how to protect it, how to prevent attacks, how to respond, and how to recover from them,â€? said Sgt. William Ross, from the Arizona Counterterrorism Information Center. “The private sector also is heavily engaged in what we are doing in terms of infrastructure protection policies and planning. When we do tabletop exercises to prepare for hurricane season, the OfďŹ ce of Infrastructure Protection’s Contingency Planning and Incident Management Division brings in the private sector to provide subject matter expertise and to assist with coordination,â€? Driggers concluded. “I absolutely believe we are better prepared today to understand and respond to events that impact our nation’s infrastructure. Our knowledge is ever-increasing. And not just federal knowledge, but also within the private sector and state and local communities – all brought together in a very collaborative fashion to develop integrated protection plans.â€? IICD has made signiďŹ cant headway developing new capabilities and tools in an area where little or nothing previously existed. By forming strong partnerships with state and local agencies, IICD has identiďŹ ed their needs and built tools to make it easier for them to fulďŹ ll their responsibilities. Collaboration with key federal partners has made it possible to provide important data sets to end users and streamline processes that eliminate duplication of effort. Despite much success in a relatively short time frame, much more needs to be done. In the years ahead, IICD plans to further consolidate system development capabilities to create more robust data collection, management, and visualization tools. Videos about IICD tools and other information about the CIKR information collection program are posted on the DHS Web site at www.dhs.gov/xabout/structure/ gc_1227556492382.shtm.

Multi-Threat Protection in a Multi-Wear Garment Provides vapor, liquid and FR protection to ďŹ re, law enforcement and emergency service personnel at chemical/biological terrorism incidents. t 4 8 " 5 ‰ /BSDPUJDT High-Risk Entries t #PNC ‰ 4FDPOEBSZ 5ISFBU 1SPUFDUJPO t 5FDIOJDBM 3FTDVF t $POUBNJOBUFE 3FTDVF t )";."5 t $POmOFE 4QBDF 3FTDVF t %FDPO

www.lionapparel.com/cbrn.shtml

87

,,&' LQGG

30


A Byting Challenge – The Cyber Security Problem By Rich Cooper

or thousands of years, infrastructure connectivity has been key to the security, successes, and failures of citizens, countries, and their economies. Driving this connectivity are technologies that ultimately deďŹ ne the ways people, countries, and commerce connect. From the ancient Appian Way, which sped information, military forces, and wealth throughout the Roman Empire, to today’s cyberspace, which transmits news, encrypted security information, and ďŹ nancial transactions in nanoseconds, human dependence on assured infrastructure connectivity remains essential to life. Hence the challenge of dealing with today’s cyber infrastructure. There is no facet of life on Earth today that is not affected or dependent upon cyber infrastructure. Public and private sectors of every size and shape are involved with its creation, maintenance, and operation. Opinions on how to preserve and protect it are as varied as their originators and the threats and challenges they must mitigate against. As part of its overowing â€?to doâ€? list of things to take care of, the newly installed administration of President Barack Obama took active ownership of the issue in early 2009 and tasked Elizabeth Hathaway, (who had served as one of the Bush administration’s leads for cyber security in the OfďŹ ce of Director of National Intelligence), to lead a top-to-bottom 60-day review of the nation’s cyber architecture. Released at the end of May 2009, Hathaway’s work, the “Cyberspace Policy Review,â€? became the epicenter of one of the most complex policy and operational debates to hit Washington in years. It involved all of the players you would expect from a Washington Beltway drama too: power, money, turf control, ego, ďŹ nger-pointing, and much more. With literally every sector of America involved with the cyber arena, the administration’s cyber approach would ďŹ nd no shortage of stakeholders, critics, or intrigue. In the federal government, cabinet departments battled over roles, budgets and authorities on the issue. In Congress, jurisdictional battles between committees and members appeared with multiple directions. Solutions have been numerous, along with competing, and often conicting, remedies being proposed. Privacy fears, civil rights protections, and concerns about the roles and responsibilities of the intelligence community, U.S. military, and governmental and law enforcement agencies also emerged. The liabilities and responsibilities of private-sector members, infrastructure owners, and operators as well as individual citizens also took shape. Amongst all of these players were growing and emerging threats, including: • The role of nation-states (e.g., China, Russia, etc.) using cyberwarfare to disrupt or take down the infrastructures of others (e.g., communications and power infrastructures in Estonia and Georgia by Russia; penetration of the U.S. power grid by China);

F

engage in espionage (e.g., Chinese hacking of congressional computers on Capitol Hill); or commit economic espionage of U.S. companies; • The rise of organized crime and other criminal enterprises using cyber tools and architectures to commit complex and intricate crimes, including identity theft, bank fraud, illegal transactions, etc. • Terrorist organizations that by a stroke on a keyboard (instead of pressing the button on a bomb detonator), could cause infrastructure disruption or destruction, incurring the loss of property and lives; • Disgruntled employees, hackers, or “lone individuals,â€? who by using computer viruses, malicious code, and other cyber methods could deface, disrupt, or cause havoc to companies, communities or citizens; and, • Increasing demands, interdependencies, and reliance upon cyber tools to operate and monitor existing infrastructures around the world. In looking to prescribe its plan of action, the administration understood early on that when dealing with this issue, it had to form a broad-based strategy that would have the buy-in of not just the federal government but the range of international, as well as other public, private, and nongovernmental organization (NGO) stakeholders that also held responsibilities with cyber. Central to the White House’s cyber security strategy recommendations was establishing a position within the Executive OfďŹ ce of the President that would be responsible for coordinating the various national policies associated with cyber security. With a pledge by the president to personally select this individual, the post of White House cyber security advisor was greeted with a great deal of fanfare by the news media and cyber-focused constituencies when it was announced. Dubbed by many early on as the “cyber czar,â€? the much heralded position that had been called for by many government sponsored and independent studies, including the congressionally mandated, Center for Strategic & International Studies (CSIS), “Securing Cyberspace for the 44th Presidency.â€? The position quickly became seen as a position with no authority, little strength or even real meaning when numerous efforts by the administration failed to ďŹ ll the post with a qualiďŹ ed individual. With no statutory authority to move budgets or direct resources to respond to emerging threats or cyber events, administration ofďŹ cials began to play down the signiďŹ cance of the position in favor of reinvigorated and federally capitalized efforts at DHS, the Pentagon and within the intelligence community. While the White House grappled with its inability to ďŹ nd someone for the position, the turf battle over what department led what in the cyber arena took shape.

88

&\EHU 6HFXULW\ LQGG

30


Taking over in late January 2009 as the new secretary of Homeland Security, former Arizona Gov. Janet Napolitano took her department’s existing authorities and resources in cyber and consolidated them into one area of DHS. Bringing in new leadership in the form of former government and Microsoft executive Phil Reitinger, to serve as director of the National Cybersecurity Center (NCSC) and former Alltel Communications executive and Justice Department computer crime prosecutor Greg Schaffer to serve as the assistant secretary for cyber security and telecommunications, Napolitano’s team got off to a relatively fast start. With established authority over the “.gov� domain, Napolitano’s team and DHS began to implement new security protocols for federal government agencies in terms of entrance portals to the Internet. As part of its Einstein Program (started during the previous Bush

administration) these DHS efforts consolidated the previous entrance portals. By reducing the number of entry points, the security focus could be centralized into those areas instead of being distributed over too wide an area as had been the previous case. While Reitinger and Schaffer’s team moved out on implementing Einstein and other cyber security safeguards in the federal sphere, they encountered a problem that has long plagued the federal government – retaining executive leadership. In the same week, two high-proďŹ le resignations – Melissa Hathaway from her post as acting White House cyber security advisor, and Mischel Kwon, as director of the U.S. Computer Emergency Readiness Team (CERT) – occurred, putting the administration on the defensive in terms of its ability to retain top talent to lead its cyber security efforts.

89

&\EHU 6HFXULW\ LQGG

30


We support the Department of Homeland Security. It secures our way of life and responds to threats and hazards to America. The Department of Homeland Security did not select or approve this advertiser and does not endorse and isn’t responsible for the views or statements contained in this advertisement. T-Mobile and the magenta color are registered trademarks of Deutsche Telekom AG. Stick together is a registered trademark of T-Mobile USA, Inc. Š 2009 T-Mobile USA, Inc.

088.indd 1

10/23/09 2:56 PM


U.S. Navy photo by Mass Communication Specialist 2nd Class Justin Ailes

Terry Halvorsen, U.S. Naval Network Warfare Command deputy commander, speaks about the ever-growing concerns of cyber security as the featured guest speaker during the monthly Armed Forces Communications and Electronics Association luncheon at Norfolk, Va., April 14, 2009.

Starting in the Bush administration, DHS, as well as other federal components, have been in an uphill ďŹ ght trying to attract new talent to work in the cybersecurity arena. With an overowing inbox, enormous demands and pressures, and too few employees to handle all of the load, DHS’ and the federal government’s cyber team remains an active work in progress. To address the long-standing personnel problem, Napolitano announced in late September 2009 DHS’ intention to hire up to 1,000 new employees over the next three years to serve in the cyber arena. The challenge before DHS is competing for a limited talent pool when the private sector is able to offer potential applicants more options and money than traditionally offered by a government position. DHS was not the only federal entity to have a challenging 2009 in the cyber arena. The Pentagon had its share of challenges as well. With published reports of successful Chinese government efforts to access sensitive plans on U.S. military aircraft as well as other sensitive national security matters, the Pentagon leadership went on the offensive to address the threats it faced from nation-states, terrorist groups, spies and more. While recognizing that U.S. forces needed to do a better job in safeguarding critical and sensitive information from enemy forces,

the Pentagon was quick to note that their cyber efforts would not just be a defensive posture. In his July 23 memorandum establishing the U.S. Cyber Command (which would be part of the U.S. Strategic Command) for military cyberspace operations, Defense Secretary Robert M. Gates explained: “Cyberspace and its associated technologies offer unprecedented opportunities to the United States and are vital to our nation’s security and, by extension, to all aspects of military operations. Yet our increasing dependency on cyberspace, alongside a growing array of cyber threats and vulnerabilities, adds a new element of risk to our national security. To address this risk effectively and to secure freedom of action in cyberspace, the Department of Defense requires a command that possesses the required technical capability and remains focused on the integration of cyberspace operations.â€? After three-weeks of Russian cyber attacks on Estonia in May 2007 that crippled the small Baltic country’s government computers, national media, ďŹ nancial systems and other infrastructures (without ďŹ ring one gun shot) and the subsequent Russian cyber attack on the nation of Georgia in August 2008 prior to its military invasion, the Pentagon and U.S. allies (NATO), were aware that a new era in warfare had begun.

91

&\EHU 6HFXULW\ LQGG

30


Military-style “blitzkriegâ€? tactics now had a new weapon – the keyboard – which, like the bombs of old, could destroy or disrupt communications, cut off information ow, shut down power sources, and more. Having an edge in this environment has now become the greatest tactical weapon a nation can have, and the Pentagon’s efforts were meant to show they took the threat and the ability to have an offensive capability very seriously. As U.S. Marine Corps Gen. James E. Cartwright described in his June 4 remarks at the Center for International and Strategic Studies (CSIS), “There will be a cyber capability at the tactical level, and ‌ we [will] deploy it forward.â€? The fact that the Pentagon has made the move on establishing a cyber command brought a sense of security to many, but nowhere were there more concerns about the role of government in cybersecurity than the operations of U.S. intelligence services.

In a blistering resignation letter to Napolitano in March 2009, then-NCSC Director Rod BeckstrĂśm described the National Security Agency (NSA) as “effectivelyâ€? controlling “DHS cyber efforts through detailees, technology insertionsâ€? and more. He went on to say: “NSA currently dominates most national cyber efforts. While acknowledging the critical importance of NSA to our intelligence efforts, I believe this is a bad strategy on multiple grounds. The intelligence culture is very different than a network operations or security culture. In addition, the threats to our democratic processes are signiďŹ cant if all top level government network security and monitoring are handled by any one organization either directly or indirectly.â€? BeckstrĂśm’s very public resignation and ďŹ nger-pointing at the NSA spoke to the fears of many civil liberties groups and concerned citizens about the role of the intelligence community.

DoD photo by Air Force Master Sgt. Adam M. Stump

Vice Chairman of the Joint Chiefs of Staff Gen. James E. Cartwright speaks at the Air Force Cyberspace Symposium in Marlborough, Mass., about the importance of experimenting with cyber warfare implementation for the battleďŹ eld.

92

&\EHU 6HFXULW\ LQGG

30


With fears of privacy infringements, domestic spying, and other prospective civil rights abuses being echoed nationally, the president sought to allay those fears by declaring that his administration’s “pursuit of cyber security will not – I repeat, will not – include monitoring private-sector networks or Internet trafďŹ c. We will preserve and protect the personal privacy and civil liberties that we cherish as Americans. Indeed, I remain ďŹ rmly committed to net neutrality so we can keep the Internet as it should be – open and free.â€? While suspicions remain for many about the roles of U.S. intelligence and government agencies in monitoring the nation’s cyber security interests, few proposals drew more concern from the private sector than those proposed in the initial draft of legislation proposed by U.S. Senator’s Jay Rockefeller (D-W.V.) and Olympia Snowe (R-Maine). Seeking to create a centralized point for the federal government for cybersecurity, a presidentially appointed individual would oversee all federal computer networks, but their authorities would not stop there. In this legislation, if a cyber attack were under way, this person would have the authority to shut down private sector cyber networks, regardless of liability or impact. With additional authorities to provide oversight over the various federal budgets, programs and policies in these areas, as well as cyber security standards for the public and private sectors, the scale and scope of this proposed position was described by intelligence ofďŹ cials as “unprecedented.â€? The size, scale and scope of the Rockefeller-Snowe legislation raised enormous concerns with private industry, as well as other federal agencies, but their legislation was not the only congressional voice on cyber security. By October 2009, numerous other drafts of various legislative bills were being shared for comments among congressional members, staffers, lobbyists, and industry groups. At stake in this legislative debate were more than just new titles for government positions and statutory guidance on who would do what to whom in the cyber arena. Billions of dollars were involved in the public and private sectors and who controlled where and how those dollars were spent would be at the center of the debate when it came to dealing with this issue. More than any other U.S. infrastructure, the cyber arena would be the recipient of more money, resources, and attention and as such it had captivated the interests of everyone. As to the future of cyber security, it remains an unsettled ďŹ eld, with threats and challenges expanding more rapidly than ever before. While DHS, because of its existing programs and authorities, is home to the majority of efforts in cyber security, the role that the private sector plays cannot be understated or discounted. Nowhere is cyber more prevalent than in the world that has deďŹ ned and revolutionized its uses – the private sector. New technologies, cyber-enabled tools (e.g., social media sites), emerging applications (e.g., iPhones), and infrastructure dependence arrive daily, and as citizens, companies, and conglomerates begin to adapt them into their lives, the fact remains that actors with less than diplomatic intentions and other nefarious users will use the same breakthroughs for their ill-intended purposes as well. As ongoing attacks against U.S. forces in the Middle East and the November 2008 attacks in Mumbai, India, have revealed, terrorists are becoming increasingly sophisticated in using new technologies and tools. This includes using cyber methods to execute their assaults. In remarks at the National Spy Museum in Washington, D.C., in early October, the former director of national intelligence, Mike McConnell, observed that, “When terrorist groups have the sophistication, they’ll use it.â€? In their crosshairs will be public utilities (power, water, etc.), ďŹ nancial institutions, public health centers, transportation networks and other critical infrastructures. With more than 80 percent of U.S. infrastructure either owned or operated by the private sector, more of the private sector is directly on the front lines. As such, the private sector has been more than proactive in securing its own self-interests and those of its customers, but like its public-sector counterparts, there remains more to be done. To secure an ever-evolving and dynamic infrastructure, such as cyberspace, it will require patience and partnership with multiple parties. Those are items in short supply when assaults and infractions are continuous, and coming from all sides. Those same items, though, will be necessary as cyber security strategies are shaped and executed in 2010 and beyond. The consequences of failure will have negative ramiďŹ cations to every part of American life, and those are costs no one wants to bear. In the words made famous by NASA’s Apollo 13 mission, “Failure is not an option.â€?

Our four-dimensional browser enables automated situational awareness for human interaction, analysis and response by integrating geo-spatial data from disparate sources into a single, 4 dimensional unCommon Operating Picture . TM

The patented fourDscapeÂŽ solution can also integrate live smart sensors, providing actionable information for Incident Commanders, First Responders, Law Enforcement, Security Personnel and others responsible for securing and protecting infrastructure and human assets.

Seeing is believing. fourDscapeÂŽ. Only from Balfour

(516) 513-0030 www.fourDscape.com B E C A U S E I T ’ S R E A L LY H A P P E N I N G .

93

&\EHU 6HFXULW\ LQGG

BALFOUR TECHNOLOGIES New York, USA

30


By Christopher Prawdzik

continual search for the “best and the brightestâ€? is a practice the U.S. government constantly strives for. Add a conict, a life-changing moment such as September 11, or a threat beyond the grasp of the most highly skilled professional – particularly stopping a terrorist act before it happens – and an entirely new dynamic to the “best and brightestâ€? emerges. In the military it’s a typical way of life as top individuals in a variety of ďŹ elds employ the most sophisticated weapons, equipment, and

A

materiel that often are the difference between an enemy advancing or retreating. It’s a process that never ends. When the Department of Homeland Security (DHS) was created within months of September 11, however, it was a brand-new venture, with components of other agencies folded into it. With a new and evolving makeup – adapting to the world and domestic security situation at the border or at the local airport – an abundance of opportunities emerged for literally thousands of professionals from all

Photo courtesy of the Oak Ridge Institute for Science and Education

An Education in Homeland Security

94

(GXFDWLRQ LQGG

30


Photos by Jean Wulfson, courtesy of Texas A&M University

OPPOSITE: DHS promotes a variety of academic programs, grants, and fellowship opportunities for students interested in pursuing homeland security careers. Chelsea DeCapua, a participant in the ORISE-managed DHS Scholarship and Fellowship Program, uses geographic information systems to identify new ways to improve emergency response and disaster management in the wake of the destruction brought by the 2005 Atlantic hurricane season. THIS PAGE, CLOCKWISE FROM TOP LEFT: David McIntyre, director, Integrative Center for Homeland Security, Texas A&M University; the Homeland Security and Defense Education Consortium (HSDEC) and the Integrative Center for Homeland Security at Texas A&M co-hosted a very successful “Workshop on National Needs� May 17-18, 2007, which focused on continuing the development of core requirements for a nationwide curriculum for homeland security graduate education; and Dr. Stan Supinski, director, Partnership Program, Naval Postgraduate School/Center for Homeland Defense and Security.

walks of life to lend their expertise to DHS. What they didn’t have was the educational foundation to produce a career at DHS. But it exists today, and continues to grow. In 2005, North American Aerospace Defense Command (NORAD) and U.S. Northern Command (NORTHCOM), in conjunction with the University of Colorado at Colorado Springs (UCCS), University of Denver, and U.S. Naval Postgraduate School (NPS) established the Homeland Security/Defense Education Consortium (HSDEC) to give colleges and universities a focal point for a variety of studies. Dr. Stan Supinski, the consortium’s founder, outlined education and training for homeland defense at the Yale New Haven International Conference on Disaster Medicine and Emergency Management in 2005, which detailed HSDEC’s mission, examining historical precedents and also noting what was educationally lacking for those working in homeland security and homeland defense. In a presentation to the conference, Supinski noted how academia, from World War II through the Cold War, had assisted in a variety of study areas, but no academic programs for homeland defense or homeland security existed before September 11. HSDEC, however, became the institutional network that promotes homeland security and defense education and research.

Supinski also outlined a curriculum that could work for a variety of institutions that wanted to begin programs in conjunction with HSDEC. Curriculum recommendations included focuses on DHS, the Department of Defense and other agencies as well as topics such as “Emergency Management,â€? “The Threat and the Adversary,â€? “Policy and Strategy,â€? as well as “Risk Assessmentâ€? and “Asymmetric Thinking.â€? With an ever-increasing number of higher learning institutions, the program now includes more than 225 academic programs that speciďŹ cally address homeland security education. And while DHS is looking for specialists in a variety of ďŹ elds, the core knowledge set and education that anyone should possess for a possible career in homeland security and homeland defense is one quite familiar. “Our primary mission was to support United States Northern Command at Peterson Air Force Base here in Colorado Springs, providing education, research, and outreach opportunities in support of not only their mission but also the school,â€? said Rick White, associate director for curriculum development and technology at UCCS. “One of the major tasks that NORTHCOM worked with HSDEC [on] was speciďŹ cally education standards for the many homeland security programs that were sprouting up across the nation.â€? The result was a multi-pronged approach to education, with the ultimate goal of strengthening homeland security. According to White, the standards UCCS looks for in homeland security students are the same as those for most academic pursuits.

95

(GXFDWLRQ LQGG

30


Homeland Security Degrees developed by and for Homeland Security Professionals

100% ONLINE DEGREES Bachelor’s, Master’s, and Doctoral SPECIALIZATIONS INCLUDE:

Organizational Leadership Criminal Justice Homeland Security Public Administration

Take your Homeland Security career to the next level with a degree from Northcentral University - one of the nation’s premiere public safety universities, offering unparalleled flexibility, contemporary course subjects, and affordable prices.

Convenient. Affordable. Accredited.

Contact us at 866-776-0331 www.ncu.edu/YIHS

U.S. Coast Guard Petty OfďŹ cer 2nd Class Shawn Beaty looks for survivors in the wake of Hurricane Katrina as he ies in an HH-60J Jayhawk helicopter over New Orleans, Aug. 30, 2005. Beaty was a member of an HH-60J Jayhawk helicopter rescue crew sent from Clearwater, Fla., to assist in search and rescue efforts. One of the goals of HSDEC is to train students on how to respond to such natural disasters.

After attending a particular workshop at Texas A&M University in 2007, he says employers are generally looking at three general areas: “They’re looking for required characteristics – character, behavior – to include honesty, integrity, and initiative ‌ basically, leadership skills,â€? White said. Employers are also looking for required skills in writing, presentation acumen, and very sharp analytic skills, he said. In addition, they’re looking for specialized knowledge in areas of the National Response Framework, National Incident Management System, and the National Strategy for Homeland Security.

U.S. Coast Guard photo by Petty OfďŹ cer 2nd Class NyxoLyno Cangemi

Business, Corporate & Campus Security

96

(GXFDWLRQ LQGG

30


“The single most widely expressed preference was that students could cut through heavy reading and write clearly and succinctly, regardless of academic background,” White said. “That was the biggest thing that people were looking for, so if you look at that, that’s kind of surprising [that] those are general characteristics not necessarily as specific as you might expect.” He said that the cross-disciplinary reality of homeland security makes these basic characteristics extremely important, and they can be applied to virtually every major discipline within a university. “So, within that context … it gets back to the required specialized knowledge, and we here have developed our program specifically for Northern Command,” White said. “Our programs here focus on introduction to the topic: What is it, and why do we need it?” After UCCS’ introduction to homeland defense, a graduate-level course and part of a four-course graduate certificate in homeland security, the second course is “Understanding the Threat.” “We take an all-hazards approach, looking at the threats to our critical infrastructure,” White said. “I’d like to say we have the answers, too, but we don’t.”

97

(GXFDWLRQ LQGG

30


In the third discipline, they take a close look at interagency issues and interaction among federal, state, and local ofďŹ cials. “[It] requires the interaction, coordination of many agencies, both horizontally, across the federal government, but also vertically from the federal government,â€? he said. “We have a course on interagency relationships, and it’s just a tour of who’s who and what do they do, but it also gets into the mechanics and also the psychology of interagency and group dynamics.â€? The fourth and ďŹ nal course offered is a capstone course in critical infrastructure protection. “At its heart, homeland security is about preventing widespread damage and destruction that could seriously incapacitate our economy, our security, or kill large numbers of people, and critical infrastructure is the key, and understanding that most critical infrastructure was not designed for deliberate attack and therefore is vulnerable,â€? White said. UCCS has recently expanded, however, and has added two more certiďŹ cates in two different areas. Each one has four courses. One focuses on disaster and public health. It examines medical issues that arise during disaster response. The other is a “security and intelligenceâ€? certiďŹ cate. White said the school also has plans to increase offerings, but funding is critical and it has been delayed. “We hope to have both an undergraduate, master’s, and a Ph.D. program through our afďŹ liate in Denver in homeland security,â€? he said. “These will be unique in that they will be degrees in homeland security; most degrees in homeland security today are concentrations, not actual degrees.â€?

The classes incorporate “blended learningâ€? techniques, White said, a combination of online and in-class teaching. “Because of our proximity and our relationship with NORTHCOM, we bring in a lot of the experts, and we have professionals with experience in those ďŹ elds actually teaching subjects,â€? he said. There are even more opportunities on the horizon, however. Kurt Johnson, an attorney and associate director for Homeland Defense/Homeland Security Government & Private Sector Programs at the Center for Homeland Security at UCCS, said, in his opinion, when discussing homeland security, particularly issues of forces operating within the country’s borders, everything begins and ends with the law. With experience as senior NORTHCOM legal adviser, including during the post-Hurricane Katrina period and other disasters at home, he recognizes the elusive balance between maintaining national security and protecting civil liberties. As a result, he’s developing a course loosely titled “Homeland Security and Homeland Defense Under the U.S. Constitutionâ€? to outline the basic tenets of constitutional and international law considerations as they pertain to responders, decision-makers, and anyone thrust into a disaster response scenario. “We think there’s a void out there in the education system on that topic, and because of some unique experiences I’ve had and we’ve had here, related to U.S. Northern Command ‌ we think we’re going to develop a pretty interesting course that will have national appeal – and I think international appeal,â€? Johnson said. Characterizing it as an “adult professional civics class,â€? Johnson said it is designed for everyone, not just lawyers.

Prepare yourself to meet tomorrow’s challenges with an MPA in Emergency and Disaster Management. Our unique three semester long MPA in Emergency and Disaster Management can be completed in as little as 16 months and has been designed speciďŹ cally for working professionals in private, not-for-proďŹ t, and federal and state agencies. It provides students with the management skills and knowledge necessary to safeguard communities and organizations in times of crisis through our applied approach to learning, or what we call “Constructive Actionâ€?. Call MCNY at 1.800.33.THINK, or go online at mcny.edu. Military veterans, ask about Operation Tuition Freedom. 431 Canal Street (off Varick)

(GXFDWLRQ LQGG

30


But these courses at UCCS are just a portion of the hundreds of programs offered across the country. At the Naval Postgraduate School, its 18-month master’s degree program, according to NPS information, is designed to “develop strategies, plans and programs to prevent terrorist attacks within the United States and reduce America’s vulnerability to terrorism; build the organizational arrangements needed to strengthen homeland security, including local, tribal, state, federal, civil-military and interagency cooperation;” and “help mayors, governors and federal officials improve homeland security preparedness by conducting ‘real world’ actionable policy and strategy development.” The NPS program is not designed around semesters, but quarters. To accommodate students’ often-varying schedules, they must attend only two weeks each quarter – 12 weeks through the entire program – and the rest of their requirements are completed via the Internet. According to NPS, the “distance learning” portion requires about 15 hours per week. Texas A&M’s Bush School of Government and Public Service offers a Certificate in Homeland Security that also can be completed online. It is a 15-hour graduatelevel certificate offered to those who work in “public safety, security management, and law enforcement; executives in corporations responsible for overseeing in-house security programs; military personnel – regardless of duty station; city managers and other city government or public sector positions; and information technology and systems professionals,” according to Texas A&M. The program is also offered to law students. The 10-week program focuses on policy and strategy, and courses are designed for anyone wishing to add a homeland security certificate to their experience. With the growth of HSDEC and its more than 225 programs across the country, it’s not stopping there. White notes some international programs in the works for the future that will expand the reach of HSDEC. One is a program developed for the Marshall Center in Germany. At this U.S. facility, they promote cooperation among many Eastern European and Central Asian countries. The primary program is “Seminars in Transatlantic Civil Security.” “The program that we teach over there is mostly European-based, looking at homeland security and homeland defense and civil defense as collective assets of a term they coined called civil security,” White said. “We provide a four-week concentrated program to representatives from approximately 35 countries from Eurasia and North America in promoting best practices and concepts in civil security.” There are nuances to these international programs, however. “There’s a different focus from the American view compared to the European or Central Asian view,” he added. “[With] the American view, we’re focused mostly on terrorism and terrorist acts; the European view, they’re more concerned about migration issues and open borders.” The next step is in the Balkans. White said the program is making inroads in Croatia, where they’re discussing programs suited for the University of Zagreb. “They want us to develop and deliver a master’s program in homeland security, resulting in an internationally recognized degree,” he said. For White, it all goes back to 2005, when HSDEC got its legs and began to grow, however. Calling it a “seminal event,” it was a natural transition from what had happened early in the decade. “Following 2001, the approach was more guns, gates, and guards to stop the terrorists,” he said. “Following 2005, the all-hazards – looking more toward encompassing and embracing the natural disasters and what are called ‘technical’ or ‘technological’ disasters … has also evolved and [provided] changes to our programs to expand and broaden on those particular topics.” At UCCS, White said the school is primarily interested in the “second half” of NORTHCOM’s mission. “The first half is to prevent the terrorist attack, but failing to do so, that civil support mission here at NORTHCOM, we’re interested in helping not only study and research that area but helping lash up the state and local with the federal support,” he said. “Despite our experience with Katrina … we still haven’t cracked that nut of how we’re going to come together in the next Katrina or San Francisco earthquake.”

99

(GXFDWLRQ LQGG

30


Homeland Security Professionals to Watch By Rich Cooper

While the era of homeland security may still be less than a decade old, the people leading it are as diverse and experienced as the challenges they face. On the ensuing pages are some brief profiles of people from around America that are making a difference to the country’s homeland security agenda and its day-in, day-out operations.

Henry Cuellar U.S. Representative, 29th District, Texas While he may only be in his third term in the U.S. House of Representatives, Rep. Henry Cuellar, D-Texas, has put together an impressive record on homeland security issues. As chairman of the Homeland Security Subcommittee on Emergency Communications, Preparedness & Response, he has offered a civil, centrist, and proactive voice on some of the most contentious homeland security issues, including interoperability communications; grants; emergency management processes management and response; and information sharing. As a result, Cuellar has earned high marks from both sides of the political aisle as well as a range of public- and private-sector members. Besides earning the respect of congressional colleagues, Cuellar is also the most “degreed” member of the U.S. House, with five advanced degrees, and that does not include his third-degree black belt in Karate. This native-born Texan from Laredo also has a passion for analyzing performance metrics, and anyone appearing before him in any of the three congressional committees that he serves is guaranteed to be questioned by him about the measures that define progress and success.

Erroll Southers Administrator (nominee), Transportation Security Administration, U.S. Department of Homeland Security Few people wear as many career hats as Erroll Southers has worn – FBI agent, SWAT team member, assistant police chief, police detective, California’s deputy director of homeland security, university professor, and more. Southers has one of the widest-ranging backgrounds of any of the Obama administration’s executive ranks. Charged with leading the ”first-born child” of the post 9/11 U.S. government era – the Transportation Security Administration (TSA) – all of his experience will be tested as he leads one of U.S. Homeland Security’s most visible and public-engaging entities. From asking you to take off your shoes and empty your pockets before going through the airport X-ray machine, to monitoring rail and other transportation safety, TSA has been the target of jokes, poor press, constant second guessing by everyone, and contempt by a lot of people. While the agency’s performance has improved dramatically over the past several years, Southers’ challenge will be to continue the evolution of TSA to adapt to constant threats; respond to demanding congressional directives (100 percent cargo screening mandates); implement new technologies; and contend with the daily and dynamic operational demands that TSA must serve.

100

3URILOHV LQGG

30


Ellis Stanley Lead, Los Angeles Project Office, Dewberry Inc. If you can think of the major events and happenings that have occurred in American life over the past 25 years, from Super Bowls, political conventions, Olympic Games, Papal visits, and World Series Championships, as well as earthquakes, floods, fires, and terror attacks, Ellis Stanley has likely had some role in planning, managing, or responding to them. One of the most approachable people you can meet, Stanley has been able to come into numerous situations where organizations are struggling to plan, prepare, and respond, only to turn them around to make them an absolute success. He proved that in early 2008 when he was brought in to help the city of Denver with their preparations for the 2008 Democratic National Convention. As its acting director of emergency management, Stanley worked with the city’s leadership, the U.S. Secret Service, regional public safety leaders, and convention organizers to pull off an event that was problem-free and executed without significant disruptions or problems. His collaborative leadership style has won him numerous admirers from notable public officials to junior-level staff – something truly impressive when you consider the intensity of the events that have occurred on his watch.

Maria Luisa O’Connell Assistant Commissioner for Public Affairs, Customs and Border Protection, U.S. Department of Homeland Security As U.S. Customs and Border Protection’s new assistant commissioner for public affairs, Maria Luisa O’Connell brings hands-on perspective and experience to the job. Before officially joining the Obama administration in August 2009, the native of Bogotá, Colombia, spent more than a decade leading the Border Trade Alliance (BTA) as its president. With firsthand knowledge and deep familiarity with the United States’ northern and southern borders and the various ports of entry, O’Connell knows the complexity and needed balance between the economic and security issues faced by the public and private sectors whose livelihoods depend upon the border. While a known commodity to many of the borders’ major and most vocal stakeholders, O’Connell brings not just a valuable Rolodex to her job, but an experienced voice and perspective to the economics and impacts of the policies and programs associated with the U.S. border and the trade that extends far beyond it. While at BTA, O’Connell worked tirelessly to bring a broader understanding and perspective to the role that trade and border communities have in the life and well-being of the U.S. economy and the economies external to the United States that are interdependent with it. Her alliances with commercial partners (transportation and shipping interests, etc.) as well as state, local, and regional governments could not be easily ignored. The interests that she brought to the table were often the ones that had been overlooked or disregarded in the past, but her ability to mobilize the BTA’s partners made DHS and its components (particularly CBP) take notice before fully implementing efforts in any number of areas. Her positive touch to what are often very contentious and inflammatory issues is as refreshing as it is rewarding for those that work with her.

101

3URILOHV LQGG

30


Emily Walker Member, DHS Private Sector Advisory Council; former banking executive; former Professional Staff Member – 9/11 Commission While the subject of business continuity existed prior to the attacks of September 11, it did not really garner much attention until after the tragic events of eight years ago. If you had to point to one person who made the recognition of this subject matter change, you’d have to point to Emily Walker. The successful banking executive was in the World Trade Center in NYC when it was struck by aircraft that morning, and while she knew the events of that day had changed her and the rest of the world, she decided to take action. Loaned by her employer, CitiGroup, to the 9/11 Commission, Walker served as a professional staff member to the commission, working as a liaison to the families of those killed in the attacks. In working with them as well as those who were fortunate to escape the towers prior to their collapse, she had heard several refrains time and again: “We didn’t know how to get out,” “We never had a plan for anything like this,” and “We didn’t know what to do.” Recognizing the failures that had been shared with her, Walker took on the issue of business preparedness, and brought it to the attention of the 9/11 Commissioners for consideration. The Commissioners agreed with her, and as a result of her efforts, the 9/11 Commission put forward in its Final Report its recommendation that DHS and the nation endorse NFPA 1600 as a voluntary preparedness standard for use by the private sector and other enterprises. In their words, “Private-sector preparedness is not a luxury; it is a cost of doing business in the post-9/11 world. It is ignored at a tremendous potential cost in lives, money, and national security.” Some might consider that achievement as a successful end point. Not Walker. She has continued to push for greater corporate leadership and awareness on preparedness and business continuity issues, and her subsequent work with international banking, the U.N. World Food Program, international disaster relief, and more have made her one of the most powerful and significant voices on this subject.

Craig Fugate Administrator, Federal Emergency Management Agency (FEMA), U.S. Department of Homeland Security No component of DHS has faced more challenges and criticisms than FEMA. While significant reforms, resources, and improvements have taken place in the agency since the 2005 Hurricane Katrina disaster, FEMA remains an agency fighting to re-establish its credibility and restore public confidence. Charged with leading the agency is one of the emergency management community’s most recognized leaders, Craig Fugate. As the former director of the state of Florida’s emergency management efforts, Fugate regularly found himself and the Sunshine State in the crosshairs of hurricanes, fires, tornadoes, and other weather-induced strikes that often upset the balance of life in a state that most Americans associate with sunny beaches and tourism. One of the first states to integrate the private sector into its planning, response, and operations, Florida’s emergency management practices became a national model for readiness and resiliency when responding to events – one of the primary reasons the Obama administration tapped him for one of the country’s toughest and most thankless jobs. The words, “public-private partnerships” are not just buzzwords to Fugate; they were a part of his operational practice in Florida emergency management and are key components for the strategies he is now leading in Florida. A straight-shooter not afraid to say what’s on his mind, Fugate has made his intent known that under his watch, FEMA will treat, “the public as a resource, not as a liability,” because “a better prepared public helps us all and allows us to focus more attention to vulnerable populations who may need an extra hand.” Having led one of the country’s most disaster/emergency active populations in Florida for over a decade, he brings unparalleled experience to one of the world’s most difficult jobs.

102

3URILOHV LQGG

30


Matthew Bettenhausen Acting Secretary, California Emergency Management Agency (CalEMA); Director, Governor’s Office of Homeland Security, State of California No U.S. state is probably more prone to emergencies and headline making disasters than California. With an almost endless fire season fueled by dry conditions, constant winds, and enough natural fuel (brush and other environmental conditions) to make the blazes almost unstoppable, as well as the threats of earthquakes and mudslides, not a day goes by when the Golden State is not in the midst of some sort of crisis. On top of these circumstances, there are the always constant pressures and threats faced by the state’s critical infrastructures (ports, airports, utilities, hospitals, etc.) from terrorists as well as the strain and demands of everyday operations. Helping the “Governator” manage all of these challenges is Matt Bettenhausen, the state’s homeland security director and its acting secretary for the newly formed California Emergency Management Agency (CalEMA). While California may be one of 50 states, it is also one of the world’s largest economies, whose importance far transcends its geographic boundaries. As home to the largest port in the United States (Los Angeles/Long Beach); one of the world’s busiest airports (LAX); tremendous agricultural resources; and a tourism and commerce center that the citizens of the world engage daily, the complexities in working with these components are enormous. Safeguarding and preserving those resources and working with the multitude of local jurisdictions in public safety, emergency management, and other areas requires a unique skill set of leadership and collaboration – skills Matt Bettenhausen has demonstrated through some of the Golden State’s most significant trials. A stalwart advocate for improved information sharing with state, local, and tribal governments, as well as coordination in emergency response efforts where federal resources are involved, Bettenhausen has challenged DHS leaders, programs and policies to be more proactive than reactive in addressing emerging threats and challenges. As a long-time champion of local leadership in response efforts, Bettenhausen’s voice was one of the loudest and most significant calling for changes to the first publicly released draft of the National Response Framework issued by DHS in 2007. Because of his voice and the others that joined him, DHS and FEMA constructed an improved framework that is successfully operating today.

Brig. Gen. Michael McDaniel Deputy Assistant Secretary of Defense for Homeland Defense Strategy, Prevention and Mission Assurance; former Assistant Adjutant General and former Homeland Security Advisor, State of Michigan Before joining the Obama administration’s leadership team in early August 2009 as the deputy assistant secretary for homeland defense strategy, prevention and mission assurance, Brig. Gen. Michael McDaniel served as the state of Michigan’s homeland security advisor and assistant adjutant general. Known for his common sense, accessible, and consensus-building approaches to mission planning and execution, McDaniel now finds himself at the operational intersection of homeland security and homeland defense. His skills, networks, and experiences as the former chair of DHS’ State, Local, Tribal and Territorial Government Coordinating Council and advisor to the National Governors Association of Homeland Security issues should serve him well in planning for those difficult emergencies that every state and community encounter at some point. An ardent practitioner of the adage “how you train is how you fight,” McDaniel has been a strong proponent for exercises (table-top, full-scale, etc.) that bring various parties together to understand their roles, responsibilities, and capabilities before an emergency unfolds. Although he has served in many official roles, McDaniel is also called upon privately by public and private sector officials to provide counsel and insight to a range of issues related to planning, preparing, and partnering to protect critical infrastructures around the nation. While his career has been in a National Guard uniform, he is not immune or unfamiliar to the critical role that the private sector and other organizations (NGOs, educational institutions, etc.) can play in safeguarding and securing communities. His leadership style has invited them to participate in the planning and operations of Michigan’s homeland interests as well as the various exercises that are held throughout the nation several times a year. That style will serve him well with his new assignments at the Pentagon given his responsibilities for the Defense Critical Infrastructure and the Global Antiterrorism/Force Protection programs. Both involve the concept of protecting facilities or people and McDaniel and his staff are developing a Mission Assurance Strategy that addresses both and incorporates a common approach.

103

3URILOHV LQGG

30


Veronique Pluviose-Fenton Founder & Principal, Mayet, LLC When you combine work on civil rights, presidential impeachment and emergency management and response with expertise in working with Congress and U.S. cities, you get someone with all of the diversity and talent of Veronique Pluvoise-Fenton. The former staff director for the U.S. House of Representative’s Subcommittee on Emergency Communications, Preparedness and Response and former principal legislative counsel for the National League of Cities was one of the architects for the series of “Resilience” hearings held by the U.S. House’s Homeland Security Committee in the spring of 2008. The native New Yorker’s drive for ensuring local capabilities, accountability, and performance measures in emergency management made her one of the most important counselors to members of Congress as they shaped the post-Katrina reforms for FEMA and DHS. Now leading her own consulting firm, Mayet, LLC, Pluviose-Fenton is still one of the most knowledgeable minds and sought-after voices on the topic of national resilience and how the Congress can shape its future.

Andrew Weis Minority General Counsel, U.S. Senate’s Homeland Security & Government Affairs Committee Today there are very few congressional staffers working on homeland security issues that can say they were there from the beginning. Andrew “Andy” Weis is one of them. Working as the majority senior counsel for the U.S. House of Representative’s then-Select Committee on Homeland Security and as a subcommittee staff director when the committee became permanent, the distinguished graduate of Stanford Law worked to shape some of the nation’s earliest, post-9/11 legislation dealing with intelligence and FEMA reform, critical infrastructure protection, homeland security grants, communications interoperability, and more. Today he supports the Senate’s ranking Republican on homeland security, Sen. Susan Collins, R-Maine, serving as the Senate committee’s minority general counsel. With extensive experience as a senior staffer on both sides of Capitol Hill, Weis is one of the most knowledgeable hands when it comes to homeland security legislation. There are very few bills on homeland security that have been enacted or are being debated today in which he has not been involved. And his collegial manner in working highly technical and challenging issues has won him the admiration and respect of not just his Republican staff colleagues but those of Democratic staff as well.

Dr. Richard Besser Director, Coordinating Office for Terrorism Preparedness and Emergency Response, Centers for Disease Control (CDC) When the H1N1 flu first struck the American public in early 2009, the Obama administration had barely taken office; media hype and cable-news panic were under way and the American public was concerned and confused about what to do in response to the first large-scale public health emergency in decades. Enter Dr. Richard Besser, who, serving as the acting director for the CDC, became America’s doctor on call answering the questions of the president, the Congress, the media, and an extremely anxious public. Standing at the podium in the White House Briefing Room alongside DHS Secretary Janet Napolitano, Besser became the calming voice of reason explaining the facts and prescriptive measures people could take to mitigate the effects of the H1N1 virus. In responding to the H1N1 outbreak, Besser was able to practice not just his craft of medicine but rather meta-leadership – the ability to work cooperatively and across different leadership disciplines toward the fulfillment of strategic end goals. Besser’s performance helped calm the nation during the initial H1N1 virus outbreak, and while he was not tapped to be the new director of the CDC, his leadership helped set the stage for continued coordination and preparedness planning for H1N1 and other threats across the public and private sectors. As the CDC’s director for terrorism preparedness and emergency response, Besser’s medical practice now encompasses a country that needs to build resilient capacities and teams to adapt and respond to threats and conditions in every form.

104

3URILOHV LQGG

30


Master’s Degree in: Instructional & Performance Technology Graduate Certificates in: Human Performance Technology Workplace E-Learning and Performance Support

Resurgens Risk Management, Inc is a Risk Management and Insurance Firm specializing in working with government entities. We are currently providing automobile coverage for vehicles crossing the border for several federal agencies. Here is a list of other coverage’s that we provide:

IPT online or on-campus programs offer: !

professionals to transfer knowledge and skills learned in the classroom to their organization's critical values, goals and missions.

‡ 3URSHUW\ ,QVXUDQFH ‡ *HQHUDO /LDELOLW\ ‡ ,QODQG 0DULQH ‡ 2FHDQ 0DULQH ‡ :RUNHUV &RPSHQVDWLRQ ‡ 6XUHW\ %RQGV ‡ 5HWLUHPHQW 3ODQV ‡ (PSOR\HH %HQHÀWV ‡ 9ROXQWDU\ %HQHÀWV ‡ 7KLUG 3DUW\ $GPLQLVWUDWLRQ 73$

‡ (PSOR\HH $VVLVWDQFH 3URJUDPV ($3

‡ 3UHVFULSWLRQ 'UXJ 3ODQ

3HDFKWUHH 6W 1( 6XLWH ‡ $WODQWD *$ 2I¿FH ‡ )DFVLPLOH www.rrmgt.com

IPT students have opportunities to: ! !

%

Real Education for Rigorous, Respectful, Responsible, and Reflective Professionals

For more information E-mail: jfenner@boisestate.edu Call: 208-424-5135 Visit: http://ipt.boisestate.edu

Accredited by the Northwest Commission of Colleges and Universities .

On-Campus Graduate Assistantships and Financial Aid Available

YX Alarming Dosimeter & Ratemeter

7KH 5DGLDWLRQ $OHUWÂŽ 6HQWU\ LV GHVLJQHG WR HQVXUH WKH VDIHW\ RI VW UHVSRQGHUV DQG +RPHODQG 6HFXULW\ SHUVRQQHO 7KH SRFNHW VL]HG XQLW KDV EXLOW LQ PHPRU\ IRU WKH SXUSRVH RI WUDFNLQJ H[SRVXUH

‡ $XGLR DQG 9LEUDWLQJ ‡ ‡ $ODUPV ‡ &RPSDFW 'HVLJQ ‡ +HDGSKRQH -DFN ‡ 'DWD &ROOHFWLRQ ‡ 6RIWZDUH DQG 5XJJHG ‡ &DVH $YDLODEOH Ž

105.indd 1

S.E. INTERNATIONAL, INC. 436 Farm Rd Summertown, TN 38483 USA TEL:1-800-293-5759 FAX:931-964-3564 radiationinfo@seintl.com www.seintl.com

10/26/09 4:53 PM


Ann Beauchesne Vice President, National Security & Emergency Preparedness Department, U.S. Chamber of Commerce No organization has a more recognized or effective voice on the issues affecting America’s private enterprise than the U.S. Chamber of Commerce. That recognition and effectiveness extends to the realm of homeland security, and Anne Beauchesne, the Chamber’s vice president for national security and emergency preparedness is the reason for it. From private sector preparedness and critical infrastructure protection to cyber security and pandemic flu planning, Beauchesne and the Chamber have been at the center of it all. Prior to coming to the Chamber, she worked at the National Governors Association (NGA), where she served as their first director for homeland security and emergency management, responsible for identifying policy priorities for governors and their homeland security advisors. Her experiences and understanding of the priorities of governors, state legislatures, and the private sector in homeland security issues have made her a valuable, dependable, and always accessible resource to the public and private sectors alike. That’s just one of the many reasons she was tapped as a member of FEMA’s National Advisory Council and has been sought out by other administration officials, congressional members and staff, and private sector leaders for her counsel.

Evan Wolff Director of the Homeland Security Practice, Hunton & Williams, LLP As counsel and director of the homeland security practice for one of Washington, D.C.’s leading law firms, Evan Wolff has become one of the most informed and influential voices on some of its most technical matters. From advising clients like chemical, energy, and manufacturing companies on compliance with the Chemical Facility Anti-Terrorism Standards (CFATS) and critical infrastructure companies on liability and regulations associated with terrorism and natural disasters, Wolff is one of the few Washington attorneys to have real, hands-on practical experience in the policies, programs, rules, and regulations that govern them. Before entering private practice, Wolff served as the senior advisor to the assistant secretary of infrastructure protection of DHS. The one-time geologist with the U.S. Nuclear Regulatory Commission played key roles in the formation of CFATS and other key DHS critical infrastructure policies and programs. His experiences as a scientist, lawyer, and program manager helped bring credibility and foundation to these important areas.

Scott Louis Weber Partner, Patton Boggs First entering the homeland security arena as DHS Secretary Michael Chertoff’s senior counselor, Scott Weber’s impact at the newest Cabinet department was quite significant. Having worked with Chertoff in prior years, Weber came to DHS knowing full well the drive, demands, and determination of DHS’ second secretary. Taking on some of DHS’ most contentious issues, Weber showed no wariness in taking on bureaucracies, institutional attitudes, or preconceived notions about the way things ought to be when it came to homeland security policies, programs, and procedures. The successful New Jersey trial attorney challenged those assertions to streamline decision-making and improve effectiveness for Chertoff and the department’s executive leadership. Now back in private practice as a partner with Patton Boggs, Weber has become one of the most recognized voices on homeland issues today, with frequent appearances and contributions on CNN, Fox News, MSNBC, Forbes, Security Debrief, and more.

106

3URILOHV LQGG

30


Scott Wiggins Director, Division of Emergency Communication Networks, Minnesota Department of Public Safety As any successful journalist will tell you, to get a good story you have to listen clearly and get your facts straight. That’s probably why Scott Wiggins has been successful in his job in leading Minnesota’s Emergency Communication Networks. The former radio broadcaster has helped build one of the country’s most successful interoperable public safety communications networks. As a result, his work has garnered the positive attention and recognition of the National Governors Association and DHS’ own Office of Emergency Communications. Dealing with one of the most technically and politically cumbersome issues faced in the homeland security arena, Wiggins, working with his colleagues around Minnesota, has created not just the state’s first complete interoperability plan but the Statewide Radio Boards to govern it and the funding (federal, state, local, tribal, and nongovernmental) to make it all come together. Emblematic of his work were the two big tests he and his communications network faced: the August 2007 I-35W Bridge collapse and the September 2008 Republican National Convention. In both circumstances, Minnesota’s public safety communications network performed exceptionally well under pressure. While pleased with their success, Wiggins and his team aren’t resting on their laurels. They are still pursuing improvements, knowing bigger tests may be ahead, and they want to make sure all voices and directions are heard, loud and clear.

Jarret Brachman, Ph.D. Professor, North Dakota State University Fargo, N.D., is about the last place on Earth you would think you’d find an expert on al Qaeda, but few people take greater pride at incurring their slurs than Jarret Brachman, Ph.D. The former director of research of the Combating Terrorism Center at West Point has become one of the world’s foremost experts on al Qaeda, particularly in its use of media and technology to serve its mission. Described by one al Qaeda sympathizer as the “excrement from Satan’s butt,” Brachman’s research and writings have been called upon by the British House of Lords and the U.S. Congress, as well as numerous law-enforcement, counter-terrorism, and intelligence experts from around the world. His most notorious research reviewer is al Qaeda’s No. 2 official, Dr. Ayman al-Zawahiri, who has challenged his work by name in some of the terrorist group’s frequent media pronouncements. While he may be a whole world away from the terrorist strongholds of Pakistan and Afghanistan, his writings and regular blog entries (www.jarretbrachman.net) are must-reads as to the dynamic nature of al Qaeda and the ever-evolving terror threat.

Sareth Neak Founder, Homeland Security Outlook Out of the most difficult of circumstances, leaders and innovation can find inspiration and success. Such is the mantra of Sareth Neak, the founder of HS Outlook (www.hsoutlook.com) who, from the ashes of the now-defunct Homeland Defense Journal, is merging homeland security content and information with new media tools and technologies. Seeing an undeveloped market desperate for sharper information and more diverse perspectives, the University of Connecticut graduate started his own media company, Neak Media, LLC, in the summer of 2009 to fill the void. The successful trade media expert, who was recognized in 2005 as one of the Top 50 Asian Americans in Business by the Asian American Business Development Center, has set his initial sights on the homeland security community by providing online and in-person training services as well as Web-based information services to serve the diverse homeland security community.

107

3URILOHV LQGG

30


Joe Catalino Director, Private Sector Engagement Program for NORAD and USNORTHCOM (N-NC) Headquarters (PSC Incorporated) While most of the attention on homeland issues has been focused at DHS, NORTHCOM has also sought to establish its presence on these critical issues, particularly as it relates to the private sector. Helping to lead those efforts is Joe Catalino, whose nearly two decades of service in the private sector and DoD community (where he continues to serve as a Medical Service Corps ofďŹ cer in the Air Force Reserve), is helping build relationships that were previously nonexistent. In 2006, he established NORTHCOM’s Private Sector Engagement Program to enhance understanding and coordination between the homeland defense community and private sector. Through table-top and joint exercises, mutual planning activities, and other coordination efforts, the relationship between these two different worlds has grown signiďŹ cantly. Under Catalino’s direction, the Private Sector Engagement Program has received multiple “Best Practiceâ€? recognitions from the Joint WarďŹ ghting Center and U.S. Joint Forces Command. His proactive willingness to build relationships for NORTHCOM is a long-term investment from which the homeland defense community will reap dividends for years to come. Those rewards have already started to yield fruit via improved relations between the two distinct communities, especially during joint planning and exercises. The real dividends of Catalino’s work and that of NORTHCOM will be revealed when a catastrophic national emergency occurs and both forces – homeland defense and the private sector – deploy along with homeland security to react, respond, and recover.

Ira Tannenbaum Manager of Public-Private Initiatives, New York City’s OfďŹ ce of Emergency Management In New York City, anything is possible. From power blackouts, tornadoes in Brooklyn, and planes landing in the Hudson to ongoing threats of terrorism, the “city that never sleepsâ€? requires special people to be at the ready to plan, prepare, and respond. Such are the qualities of an EMT/ crew chief from the largest all-volunteer Ambulance Service in the United States, the Hatzolah Volunteer Ambulance Corps, who is also responsible for building public-private partnerships for New York City’s OfďŹ ce of Emergency Management (OEM). Tannenbaum’s path to emergency management literally starts from his work as an EMT in college (Yeshiva University) through his early career working health care issues for the city and in the private sector. In working with diverse people with even more diverse demands, Tannenbaum was able to recognize and mobilize the collective interests and goals that could bring these communities of interest and partnerships together. Those are skills that are regularly challenged when working to assemble private sector and community preparedness plans; coordination of city-wide logistics systems with the private sector; enhancing information sharing systems; and training civilian volunteers for Community Emergency Response Teams (CERT). There is probably no bigger stage in the world than New York City where his work and that of OEM’s is more visible or effective. What else would you expect from the capital of the planet?

108

3URILOHV LQGG

30


Robert Connors Director, Preparedness & Crisis Management, Raytheon Corporation There are a lot of senior emergency managers who have oversight responsibilities over several facilities, but Robert “Bobâ€? Connors may be the only one whose scope covers all seven continents. As the director for preparedness and crisis management for Raytheon Corporation, Connors looks after the business continuity and crisis management efforts for one of the world’s best known and accomplished defense companies. With operations around the globe, Connors and his team have to be ready for anything, ranging from weather emergencies, industrial accidents, and workplace violence to terror attacks and espionage. Some of those locations are truly remote, so training, regular exercises, and partnership development are fundamentals he stresses with his team. It was for those reasons and more that he was asked to join FEMA’s ďŹ rst ever National Advisory Council in 2006 and why he is continually sought out by public and private sector emergency managers from around the world for his strategic counsel and insight. He is a strong proponent for private sector preparedness and for cultivating partnerships between federal, state, local, tribal, NGO, and private sector agencies.

Matthew Foosaner Vice President, Government Sales, SkyTerra Communications No other performance area is more critical during any emergency event than communications. The ability of ďŹ rst responders to interact with one another and share mission-critical information is central to unfolding response and recovery operations. Someone who has made sure that these people can communicate during the most challenging of circumstances, including hurricanes, oods, wildďŹ res, terrorist incidents, and presidential events is Matt Foosaner. Currently serving as the vice president for government sales for SkyTerra Communications, one of the nation’s leading satellite communications providers, Foosaner built his accomplished reputation during his 15 years with Sprint Nextel, where he led the company’s Emergency Response Team. Responding to events like 9/11; the D.C. sniper attacks; Hurricanes Katrina, Rita, Wilma, etc; and more than two dozen presidential declared disasters and National Special Security Events (NSSEs), Foosaner has built a reputation for being able to work with multiple and diverse law enforcement and public safety organizations in complex situations and making sure that every one of those communications users can hear one another. His leadership in these areas has had federal, state, and local governments seek his counsel on their current and future communications plans and architectures.

/NLINE )! 0ROFESSIONAL $EVELOPMENT 4RAINING AND $EGREE 0ROGRAMS The Christian Regenhard Center for Emergency Response Studies The OfďŹ ce of Continuing and Professional Studies 555 West 57th Street, Suite 601 • New York, NY 10019 • 212-484-1364

WWW CAPITOL COLLEGE EDU CICPC

www.jjay.cuny.edu

3URILOHV LQGG

30


PRODUCTS AND SERVICES

When experienced and dedicated professionals, the most extensive selection of operational equipment in the industry, a broad range of contractual vehicles, and technologically advanced logistics solutions are brought together under one roof, the result is ADS, the industry-leading operational equipment solutions provider. Year after year, countless men and women in uniform rely on ADS to provide the operational equipment they require. ADS provides equipment and logistics support solutions to all DoD and Federal Agencies in support of homeland defense and homeland security. ADS also specializes in working with defense and security contractors as well as protective services organizations. No matter what uniform you wear, our mission is to provide the specialized equipment and related services you need to complete your mission at home, in theater, or around the globe. From tactical and special operational equipment to ďŹ re and emergency response equipment, our broad spectrum of products and services eliminates the need to buy from multiple sources. ADS features a wide range of contractual vehicles to make product acquisition as easy as possible. Our contractual vehicles are simple to use and each one has its own advantages dependent upon speciďŹ c customer requirements.

ADS Customer’s Missions Include: • Special Operations • Special Warfare • Homeland Defense • Homeland Security • Tactical Operations • Law Enforcement & Corrections • Fire & Emergency Services • Marine Operations • Defense & Security Contracting

ADS Procurement Advantages: • Multiple GSA Schedules • Special Operational Equipment TLS Program (formerly Prime Vendor) • DoD EMALL Contract • Fire & Emergency Services TLS Contract • 8(a) Through SEK Solutions • SDVOSB through MJL Enterprises • FAR & DFAR Supplement Compliant • Government approved accounting system

For more information, visit www.adstactical.com or contact us toll-free: 800.948.9433

Be Prepared on BlackBerry BlackBerryÂŽ Solutions help Homeland Security agencies and personnel coordinate and implement responses and stay on top of developing situations by ensuring they always have access to key information no matter where they are. The BlackBerry Enterprise Solution is the leading wireless platform for connecting mobile users and ďŹ eld employees in a highly secure manner to the information, back-end systems and applications they rely upon to do their jobs effectively. Designed with security at the core and incorporating built-in advanced security features, the BlackBerry platform meets or exceeds the needs and policies of most organizations. Highly secure wireless access to criminal and Hazmat database information, video surveillance, emergency procedures, contacts, maps and oor plans means response teams can make informed decisions and respond quickly as events unfold. When time is of the essence, mobile access to information, people and procedures helps ensure the right steps are taken to prevent or contain known, avoidable risks, and reduce potential impacts on public safety. For more information please visit www.blackberry.com/gov

3URGXFWV DQG 6HUYLFHV LQGG

30


PRODUCTS AND SERVICES

GLARE® non-lethal lasers from B.E. Meyers set the standard for warning and visual deterrent devices in Escalation of Force situations. The overtly bright green beam is effective day and night and in most weather conditions. A GLARE laser sends a clear warning out to 4 km over land or water, informing civilians to stop and move away. At closer distances, the visual disruption deters hostile activity by impeding operation of vehicles and weapons. GLARE lasers have proven to save lives of both civilian bystanders and servicemen by providing a clear and instantaneous warning that crosses linguistic and cultural barriers. B.E. Meyers offers a full line of GLARE visual disruption lasers® designed to meet specific situational needs. For more information, contact sales@bemeyers.com, (425)881-6648, or visit our website at www.bemeyers.com.

3URGXFWV DQG 6HUYLFHV LQGG

30


PRODUCTS AND SERVICES

The ScanX Scout™

from ALLPRO Imaging is the most lightweight, easily deployable, rugged and affordable computed radiography system that is capable of the largest imaging area. The ScanX Scout is designed for bomb detection specialists including EOD/IEDD squads, border patrols, airport security, and homeland security agencies. Its high resolution images are ready for viewing in as little as 35 seconds for a 10x12 plate or 55 seconds for a 14x17 plate. Cushioned, shock-resistant panels and a high-strength extruded aluminum exterior stand up to the toughest work environment. Sturdy, rubberized feet add stability and reduce vibration. And, an optional built-in rechargeable battery enables operation in any setting. ScanX Scout operates in daylight and with all brands of imaging plates in all sizes. Lightweight phosphor storage plates can be reused many times and they are less costly to replace than direct at panel systems. The ScanX Scout scans and erases images in the same continuous cycle with the patented in-line erase feature. ScanX Scout’s premium digital radiographs enable technicians to see more and make timely, accurate threat assessments via a compact system that can be taken anywhere. For more information, contact your local, authorized ALLPRO Imaging dealer or visit the ALLPRO Imaging Web site at www.allproimaging.com

3URGXFWV DQG 6HUYLFHV LQGG

30


#F 1SFQBSFE 0O #MBDL#FSSZ

*EFBM TPMVUJPOT UP TUBZ DPOOFDUFE BOE SFTQPOTJWF #MBDL#FSSZ¥ 4PMVUJPOT IFMQ )PNFMBOE 4FDVSJUZ BHFODJFT BOE QFSTPOOFM DPPSEJOBUF BOE JNQMFNFOU SFTQPOTFT BOE TUBZ PO UPQ PG EFWFMPQJOH TJUVBUJPOT CZ FOTVSJOH UIFZ IBWF BDDFTT UP UIF NPTU BDDVSBUF JOGPSNBUJPO BWBJMBCMF OP NBUUFS XIFSF UIFZ BSF 'PS NPSF JOGPSNBUJPO WJTJU VT BU XXX CMBDLCFSSZ DPN HPW ª 3FTFBSDI *O .PUJPO -JNJUFE "MM SJHIUT SFTFSWFE #MBDL#FSSZ¥ 3*.¥ 3FTFBSDI *O .PUJPO¥ 4VSF5ZQF¥ BOE SFMBUFE USBEFNBSLT OBNFT BOE MPHPT BSF UIF QSPQFSUZ PG 3FTFBSDI *O .PUJPO -JNJUFE BOE BSF SFHJTUFSFE BOE PS VTFE JO UIF 6 4 BOE DPVOUSJFT BSPVOE UIF XPSME "MM PUIFS QSPEVDU PS DPNQBOZ OBNFT BSF GPS JEFOUJGJDBUJPO QVSQPTFT POMZ BOE NBZ CF USBEFNBSLT PG UIFJS SFTQFDUJWF PXOFST 5IF %FQBSUNFOU PG )PNFMBOE 4FDVSJUZ EJE OPU TFMFDU PS BQQSPWF UIJT BEWFSUJTFS BOE EPFT OPU FOEPSTF BOE JT OPU SFTQPOTJCMF GPS UIF WJFXT PS TUBUFNFOUT DPOUBJOFE JO UIJT BEWFSUJTFNFOU

research in motion.indd 1

10/23/09 3:30 PM


5V [PTL [V SVZL In the heat of a mission, our nation’s federal officers and agents don’t have time to think about the benefits of reliable communications and on-demand interoperability. They need to be able to communicate within and across agencies and share critical information.

Integrated Wireless Communications Our systems integration, secure wireless communications, and networking solutions enable them to get the word out, get the information they need, and get the job done. www.gdc4s.com/homeland

© 2009 General Dynamics. All rights reserved.

GeneraldynamicsR on temp.indd 1

10/20/09 2:01 PM


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.