INSIGHT & ANALYSIS FOR GOVERNMENT DECISION MAKERSMarch/April 2017 | Vol.14, No.2
www.HSToday.us
Brick by BrickBorder wall plans continue to take shape alongside overall efforts to better secure the country’s southwest flank
Platform PreferencesJihadis thrive on ‘Telegram’ app’s
versatility, making it a top online terror tool
Collective PalpitationsEuropean nations must come to grips with a
president who does what he says he’s going to do
Also Inside:
Fluid Terrain
Vast Coast Guard responsibilities test limits of US reach for maritime border defense
EXCLUSIVE
DEPARTMENTS2 UPDATES & RESPONSES
Considering Airport Insider Threats, Cyber Intruders and Perimeter SecurityBy Anthony Kimery
3 EDITOR’S LETTERVacancies, Placeholders, Morale Take Center Stage at DHSBy Anthony Kimery
4 OPINIONS & POLITICS CBP Ignores Mandate Under 2006 Safe Port ActBy Jim Giermanski
7 BORDER SECURITY DHS Feeling Pressure to Improve Biometrics ProgramBy Sylvia Longmire
8 AGENCY SPOTLIGHT DEA Relies on Multiagency Collaborationin Drug Smuggling FightBy Krysta Dodd
10 EMERGENCY PREPAREDNESS 21st Century Information Sharing and Communication Requirements Pose Significant ChallengesBy Sam McGhee
12 CYBERCOMCybersecurity Takes Pages fromSwiss Bank PlaybookBy Mike Baker
14 ACADEMIC INSIGHTS Homeland Security Studies React to NewAdministrationBy Godfrey Garner
16 GLOBAL WATCH News from Around the WorldBy Dave Sloggett
18 INDUSTRY NEWSIndustry Roster
44 TOOLS & TECHNOLOGY47 RESOURCES Advertiser Index Tradeshow Circuit
48 GROUNDBREAKERS & POWERHOUSES
George Zoulias, President, CEO and Founder, Perfecta Federal
www.facebook.com/HSToday twitter.com/HSTodayMag www.linkedin.com/groups?gid=4364804
JOIN THE DISCUSSION
Photos courtesy of CBP, composition by John Foradaris
YOU ARE DRIVEN TO
LEADWE ARE DRIVEN TO HELP YOU GET THERE.
To learn more, visit www.PublicSafetyatAMU.com/HSTODAY
At American Military University, we understand where you’ve been, what you’ve done and what you’d like your team to achieve. Choose from more than 90 career-relevant online degrees — respected by the intelligence community — which can help your squad advance their careers while serving their country. Your team will join a network of professionals gaining relevant skills than can be put into practice the same day. Take the next step, and learn from the leader.
PLATFORM PREFERENCESJihadis thrive on ‘Telegram’ app’s versatility, making it a top online terror toolBy Steven Stalinsky
PANDEMIC CROSSROADSAs border security and public health intersect, the threat may outweigh US response capabilitiesBy Robert C. Hutchinson
36
40
COLLECTIVE PALPITATIONSEuropean nations must come to grips with a president who does what he says he’s going to do By Dave Sloggett
30
BRICK BY BRICKBorder wall plans continue to take shape alongside overall efforts to better secure the country’s southwest flankBy Anthony Kimery
FLUID TERRAINVast Coast Guard responsibilities test limits of US reach for maritime border defenseBy Dana Brooke Reid & Torrey Bertheau
20
26
1563 East Dorothy Lane, Suite 300B, Dayton, Ohio 45429phone: 1-888-348-7281 fax: 937-890-0221
www.HSToday.uS
PublisherKimberley S. Hanson-Brown
Editor-in-ChiefAnthony L. Kimery
Managing EditorChristopher Prawdzik
Art/Creative DirectorJohn Foradaris
Senior Contributing Editors, Funding & Procurement James Kim | Dr. Nick Nayak
Senior Contributing Editor, Public Health Preparedness/Trauma Care
Connie Potter
Senior Contributing Editor, CBRN/Emergency PreparednessDr. Pietro D. Marghella
Senior Contributing Editor, Border SecuritySylvia Longmire
Senior Contributing Editor, Middle EastJoe Charlaff
Senior Contributing Editor, InternationalDavid Sloggett
Senior Contributing Editor, WMD and CounterterrorismCharles Faddis
Contributing Writers Clay Biles | David Cid | Krysta Dodd | Godfrey Garner
Sam McGhee | Zudi Jasser M.D.
ContributorsApostolos Giannakidis | Anthony Bevers
Robert C. Hutchinson | Roger G. Johnston Steven Stalinsky | John Ubaldi
Homeland Security Today (USPS 24484, ISSN 1553-3670) HSToday magazine is published in December/January, February/
March, April, May, June/July, August/September, October and November by Five T Ventures LLC, 1563 East Dorothy Lane, Suite
300B, Dayton, Ohio 45429.Annual subscription rates: $49.95 for 8 issues US domestic mail:
$69.95 Canada; $99.95 international mail.Periodical Postage Paid at Dayton, OH and at additional mailing
offices.POSTMASTER: Send address changes to Homeland Security Today,
PO Box 292995 Dayton, OH 45429-0995.Copyright 2016 HSToday. All rights reserved.
2007 Central-Southeast Region
2007 Central-Southeast Region
Bronze Bronze Special Section Special Supplement
2005 Central- Southeast Region
2005 Central- Southeast Region
Silver Bronze Special Section Regular Department
2005 Central- Southeast Region
2005 Central- Southeast Region
Silver Bronze Special Section Regular Department
2007 Central-Southeast Region
2007 Central-Southeast Region
Bronze Bronze Special Section Special Supplement
JOURNALISMTHAT
MATTERS
2012 RegionalSILVER
EDITORIALAward Winner
2012 NationalSILVER
EDITORIALAward Winner
BRONZE
2012 RegionalSILVERDESIGN
Award Winner
2010 NationalGOLD
omeland Security Today reported in February that the House Committee
on Homeland Security majority staff report, America’s Airports: The Threat From Within, found the majority of the nation’s airports do not have full employee screening at secure ac-cess points, resulting in a serious insider threat vulnerability, and “are unable to demonstrate the security effectiveness of their existing em-ployee screening efforts, which consist largely of randomized screening by Transportation Security Administration [TSA] officers or airport law enforcement personnel.”
Disturbingly, the report noted that the De-partment of Homeland Security (DHS) inspector general revealed in 2015 that “73 aviation workers with links to terrorism were either currently or recently employed at airports across the United States with access to secure and sterile areas,” and that, “[s]ub-sequent oversight efforts revealed that while TSA reviewed each individual and deter-mined whether they were a threat to aviation security, the agency had missed terrorist ties due to a lack of access to certain data sets held by other entities within the US government. Despite longstanding efforts to be granted ac-cess to additional intelligence databases, DHS and TSA were met with resistance and delay by other federal agencies.”
The Government Accountability Office (GAO) had already noted in an audit report that TSA officials have long acknowledged the potential threat from airport workers, but deemed the threat a “known and accepted risk.”
In response to the Homeland Security Today re-port, Arbor Networks Chief Security Tech-nologist Darren Anstee told Homeland Security Today that, “While the Homeland Security Committee report focuses on the physical se-curity risks posed by the ‘lone wolf’ insider threat at American airports, it is important to note that there is also a significant [insider threat] cyber risk.”
Anstee explained that, “Many organizations have focused their cybersecurity at the pe-rimeter of their networks to stop bad actors getting in. While this is important, many are blind to what goes on within their infra-structures. This is a key problem which is il-lustrated by previous leaks of classified data where insiders have been seen to hoard, and then extract, large amounts of data while re-
maining undetected. Data thefts are one thing, but imagine the ramifications this can cause at airports. If an air traffic control system, or even just an airline check-in system was tar-geted by an insider intent on disrupting sys-tem continuity, there would be wide-spread disruption, costing the economy millions of dollars and causing major inconvenience – and possibly personal risk to many travelers.”
Anstee said, “It is becoming increasingly im-perative for organizations to instrument the interior of their networks so that they can see what is going on everywhere, so that they can detect suspicious or malicious behavior quickly wherever it occurs. This is not easy for large, geographically distributed sites with many terminals of different types – like air-ports - unless the network is harnessed to provide the necessary visibility. The network is the conduit for all inter-device commu-nication, and thus can be harnessed for per-vasive visibility. Internal network analysis has a become a key part of the fight against cyber-criminals in the enterprise space, and this kind of monitoring needs to be mandated in areas critical to national security – such as transport hubs, utilities etc.”
Meanwhile, new video analytics software designed to provide advanced analytics and generate real-time alerts designed with gov-ernment entities such as airports, can alert to intrusion detection, left-behind object detec-tion, facial recognition and camera tampering alerts. All of these technologies serve as a se-curity force multiplier.
These technologies are vital. John Halinski, a former TSA deputy administrator and former chief operating officer for TSA, warned in his Homeland Security Today report, “Curbside Vulnerability,” about the lack of security outside and immediately inside the nation’s airports.
“The street side of an airport historically has been susceptible to attack by terrorists, and this vulnerability is now being exploited,” Halinski said, adding however, “Unfortu-nately, this zone from the front of the airport to the federal checkpoint is many times a ‘no-man’s land’ lacking any real security person-nel, adequate physical protective structures, a general lack of security technology and effec-tive coordinated security policies.”
– Anthony Kimery, Editor-in-Chief
UPDATES & RESPONSES
Considering Airport Insider Threats, Cyber Intruders and Perimeter Security
H
October 2016 | Homeland Security Today Magazine2
irst responders in the 21st century in-creasingly face multifaceted active threat
scenarios. The complexity of recent national and global attacks, as well as the potential of extreme natural disasters and weather emer-gencies, challenge those charged with saving lives and ensuring the best possible outcomes during these events more than ever.
While the challenges seem more complicated and potential outcomes more intense, there is a dichotomy between required response and available resources to manage these types of events. On one hand, post-9/11 state, local, federal and private sector entities are expected to work together during preparation and coop-erate fully during emergency response. Obvious complications emanate from these relation-ships, as they represent multiple disciplines and jurisdictions. Related issues regarding their respective structures may be incompatible as well. On the other hand, technology has ad-vanced and relationships have been created or improved to meet these uncommon demands. In addition, there are many agencies and ju-risdictions who’s after-action reports offer key information through improvement matrices that would serve any jurisdiction in planning for a potential emergency or an attack. Planners must take advantage of these resources in the earliest stages of planning.
Today’s Challenges
Due to the nature of social media, governmen-tal organizations may be exposed more quickly and judged more harshly than ever before for decisions made during crises. There is a height-ened awareness of emergency management responsibilities and results produced within American culture. Social and mass media re-ports can quickly influence public sentiment.
Further, the characteristics of an active shooter or terrorist attack can include multiple, si-multaneous attacks on soft targets in a large geographic area. This can swiftly evolve into a multijurisdictional cross discipline and rapidly developing threat requiring real-time informa-tion management. In the United States, active shooter cases continue to increase in frequency and complexity. Constantly morphing meth-ods among attackers put emergency plans and procedures to the test. This requires leaders to
be resilient in assessing dynamic threat envi-ronments and quickly and effectively shifting priorities. How? By ensuring information is collected, analyzed and distributed rapidly. Leaders will be judged on how they respond to such complex environments, and given the predictability of an unpredictable scenario oc-curring, the public pressures of crisis decision-making will be in the forefront.
The previous barriers created through silo-thinking between agencies and disciplines have softened significantly since 9/11. Pre-event in-formation sharing is a much-improved realm, with the increase in joint intelligence bulletins disseminated to state and local agencies from the FBI, Department of Homeland Security and others. With the advent of fusion cen-ters and their ability to serve as central clear-ing houses of information pertinent to local constituents while coordinating with national information-sharing resources, the first re-sponder community can rely on this aspect of information sharing as a basis for awareness and preparation. This, however, does not necessarily solve the challenge of the need for situational awareness or understanding rapidly morphing threat dynamics in each incident.
Critical Need for Immediate Planning
Pre-event planning for dynamic threat sce-narios has taken on emerging features. It may have been sufficient at one time to plan, train, equip and exercise emergency plans intermit-tently. In today’s environment, while cer-tain facets of a plan may remain more static – such as equipment needs and types – as-pects involving information sharing require constant monitoring, updating and mainte-nance. Technological advances in real-time information sharing offer the opportunity for rapid assessment, allowing rapid decision making among emergency response leaders in adjusting to the threat’s rapidly changing scenario. Examples of these include apps for smart phones, Web-based secured portals for broad-based communication efforts among responder partners during events, social net-work applications, radio interoperability be-tween disciplines and jurisdictions, to name a few. However, it is essential to begin iden-
tifying and establishing these capabilities im-mediately for these resources to be realized. The common thread among these solutions is to :
1. Establish potential partners (followers, in the case of social media applications) necessary to maximize these modes of information-sharing.
2. Establish common objectives.
3. Create necessary informal or formal agree-ments to support the understanding and use of such technology.
Established Resources
Post-9/11 efforts have emphasized regionalized approaches to improvements in capability areas where gaps in mitigation, prevention, response and recovery exist. For many communities, funding for resources is scarce; this does not have to remain a constraint. Fusion centers are established in almost every state in the coun-try to serve its communities in crucial infor-mation-sharing needs during critical events. The National Network of Fusion Centers is constantly assessing and upgrading ways in which fusion centers communicate with their respective communities. Emergency planners should contact their fusion center directors,
F
21st Century Information-Sharing and Communication Requirements Pose Significant Challenges
SAM MCGHEE
Police arrive at Sandy Hook Elementary after the shooting on December 14, 2012.
10 March/April 2017 | Homeland Security Today Magazine
who should have immediate suggestions for connecting to established best practices in in-formation-sharing measures. This may include rapid information-sharing smart phone apps utilized by the fusion center and key partners during emergency incidents.
Further, most fusion centers have some version of a terrorism liaison officer program where local agency representatives are trained, then incorporated into an information-sharing ar-chitecture. This creates an expanded network
of collection points, which may support real-time information-sharing needs. In addition, the National Network of Fusion Centers has created a real-time information-sharing portal on the Homeland Security Information Net-work. This secure chat forum was created after some of the more notable active shooter attacks: The Century 16 shooting in Aurora, Colo.; the Sikh temple shooting in Oak Creek, Wis.; the Clackamas Town Center shooting in Portland, Ore.; and the Sandy Hook school shooting in Newtown, Conn. This capability allows fusion centers to communicate in real time about facts and circumstances of a given incident, manage tips and leads, and coordinate information-sharing partnerships among fusion centers in contiguous states – including sharing analytical and intelligence product capabilities.
Today’s emergency management and first re-sponder planners are challenged more than ever to effectively plan and execute emergency response measures for the myriad of rapidly developing and dynamic threats. Often, these threats cross jurisdictional borders and require multiple disciplines to respond to the incident. Central to this critical planning is the need
for real-time situational awareness and infor-mation-sharing. To accomplish this requires pre-establishing alliances, intergovernmental agreements and multilayered, redundant com-munication methods. While the challenge may seem daunting, the solutions to these issues can be found among agencies who have dealt with these incidents and implemented methods to improve their short-comings. Leveraging les-sons learned from past events can significantly reduce a planner’s learning curve, and the methods may be of little or no cost with effec-tive pre-planning. HST
EMERGENCY PREPAREDNESS
HOMELAND SECURITY equals
For our students,
JOB SECURITY.
EARN YOUR DEGREE ONLINE. waldorf.edu // 877.267.2157
WU-HalfPageAd-HLSToday-Jan2017.indd 1 1/27/17 1:53 PM
A lieutenant with the Aurora, Colorado Police Department, Sam McGhee currently is the Professional Standards Section/Emergency Services Coordinator. For two years he served as deputy executive director of the Colorado In-formation Analysis Center and served a one-year fellowship with the Interagency Threat Assessment and Coordination Group located in the National Counterterrorism Center in Washington, DC. In 2015, he helped create the implementa-tion plan for the National Network of Fusion Centers. He’s also a member of the Committee on Homeland Security for the International Association of Chiefs of Police.
Central to this critical planning is the
need for real-time situational awareness
and information-sharing.
11Go online today for exclusive online content and eNewsletters