+ All Categories
Home > Documents > March/April 2017 | Vol.14, No.2 INSIGHT &...

March/April 2017 | Vol.14, No.2 INSIGHT &...

Date post: 24-May-2020
Category:
Upload: others
View: 1 times
Download: 0 times
Share this document with a friend
5
INSIGHT & ANALYSIS FOR GOVERNMENT DECISION MAKERS March/April 2017 | Vol.14, No.2 www.HSToday.us Brick by Brick Border wall plans continue to take shape alongside overall efforts to better secure the country’s southwest flank Platform Preferences Jihadis thrive on ‘Telegram’ app’s versatility, making it a top online terror tool Collective Palpitations European nations must come to grips with a president who does what he says he’s going to do Also Inside: Fluid Terrain Vast Coast Guard responsibilities test limits of US reach for maritime border defense EXCLUSIVE
Transcript
Page 1: March/April 2017 | Vol.14, No.2 INSIGHT & …ksjoa.org/doc/Homeland_Security_Today_March-April_2017.pdfMarch/April 2017 | Vol.14, No.2 INSIGHT & ANALYSIS FOR GOVERNMENT DECISION MAKERS

INSIGHT & ANALYSIS FOR GOVERNMENT DECISION MAKERSMarch/April 2017 | Vol.14, No.2

www.HSToday.us

Brick by BrickBorder wall plans continue to take shape alongside overall efforts to better secure the country’s southwest flank

Platform PreferencesJihadis thrive on ‘Telegram’ app’s

versatility, making it a top online terror tool

Collective PalpitationsEuropean nations must come to grips with a

president who does what he says he’s going to do

Also Inside:

Fluid Terrain

Vast Coast Guard responsibilities test limits of US reach for maritime border defense

EXCLUSIVE

Page 2: March/April 2017 | Vol.14, No.2 INSIGHT & …ksjoa.org/doc/Homeland_Security_Today_March-April_2017.pdfMarch/April 2017 | Vol.14, No.2 INSIGHT & ANALYSIS FOR GOVERNMENT DECISION MAKERS

DEPARTMENTS2 UPDATES & RESPONSES

Considering Airport Insider Threats, Cyber Intruders and Perimeter SecurityBy Anthony Kimery

3 EDITOR’S LETTERVacancies, Placeholders, Morale Take Center Stage at DHSBy Anthony Kimery

4 OPINIONS & POLITICS CBP Ignores Mandate Under 2006 Safe Port ActBy Jim Giermanski

7 BORDER SECURITY DHS Feeling Pressure to Improve Biometrics ProgramBy Sylvia Longmire

8 AGENCY SPOTLIGHT DEA Relies on Multiagency Collaborationin Drug Smuggling FightBy Krysta Dodd

10 EMERGENCY PREPAREDNESS 21st Century Information Sharing and Communication Requirements Pose Significant ChallengesBy Sam McGhee

12 CYBERCOMCybersecurity Takes Pages fromSwiss Bank PlaybookBy Mike Baker

14 ACADEMIC INSIGHTS Homeland Security Studies React to NewAdministrationBy Godfrey Garner

16 GLOBAL WATCH News from Around the WorldBy Dave Sloggett

18 INDUSTRY NEWSIndustry Roster

44 TOOLS & TECHNOLOGY47 RESOURCES Advertiser Index Tradeshow Circuit

48 GROUNDBREAKERS & POWERHOUSES

George Zoulias, President, CEO and Founder, Perfecta Federal

www.facebook.com/HSToday twitter.com/HSTodayMag www.linkedin.com/groups?gid=4364804

JOIN THE DISCUSSION

Photos courtesy of CBP, composition by John Foradaris

YOU ARE DRIVEN TO

LEADWE ARE DRIVEN TO HELP YOU GET THERE.

To learn more, visit www.PublicSafetyatAMU.com/HSTODAY

At American Military University, we understand where you’ve been, what you’ve done and what you’d like your team to achieve. Choose from more than 90 career-relevant online degrees — respected by the intelligence community — which can help your squad advance their careers while serving their country. Your team will join a network of professionals gaining relevant skills than can be put into practice the same day. Take the next step, and learn from the leader.

PLATFORM PREFERENCESJihadis thrive on ‘Telegram’ app’s versatility, making it a top online terror toolBy Steven Stalinsky

PANDEMIC CROSSROADSAs border security and public health intersect, the threat may outweigh US response capabilitiesBy Robert C. Hutchinson

36

40

COLLECTIVE PALPITATIONSEuropean nations must come to grips with a president who does what he says he’s going to do By Dave Sloggett

30

BRICK BY BRICKBorder wall plans continue to take shape alongside overall efforts to better secure the country’s southwest flankBy Anthony Kimery

FLUID TERRAINVast Coast Guard responsibilities test limits of US reach for maritime border defenseBy Dana Brooke Reid & Torrey Bertheau

20

26

Page 3: March/April 2017 | Vol.14, No.2 INSIGHT & …ksjoa.org/doc/Homeland_Security_Today_March-April_2017.pdfMarch/April 2017 | Vol.14, No.2 INSIGHT & ANALYSIS FOR GOVERNMENT DECISION MAKERS

1563 East Dorothy Lane, Suite 300B, Dayton, Ohio 45429phone: 1-888-348-7281 fax: 937-890-0221

www.HSToday.uS

PublisherKimberley S. Hanson-Brown

[email protected]

Editor-in-ChiefAnthony L. Kimery

[email protected]

Managing EditorChristopher Prawdzik

Art/Creative DirectorJohn Foradaris

Senior Contributing Editors, Funding & Procurement James Kim | Dr. Nick Nayak

Senior Contributing Editor, Public Health Preparedness/Trauma Care

Connie Potter

Senior Contributing Editor, CBRN/Emergency PreparednessDr. Pietro D. Marghella

Senior Contributing Editor, Border SecuritySylvia Longmire

Senior Contributing Editor, Middle EastJoe Charlaff

Senior Contributing Editor, InternationalDavid Sloggett

Senior Contributing Editor, WMD and CounterterrorismCharles Faddis

Contributing Writers Clay Biles | David Cid | Krysta Dodd | Godfrey Garner

Sam McGhee | Zudi Jasser M.D.

ContributorsApostolos Giannakidis | Anthony Bevers

Robert C. Hutchinson | Roger G. Johnston Steven Stalinsky | John Ubaldi

Homeland Security Today (USPS 24484, ISSN 1553-3670) HSToday magazine is published in December/January, February/

March, April, May, June/July, August/September, October and November by Five T Ventures LLC, 1563 East Dorothy Lane, Suite

300B, Dayton, Ohio 45429.Annual subscription rates: $49.95 for 8 issues US domestic mail:

$69.95 Canada; $99.95 international mail.Periodical Postage Paid at Dayton, OH and at additional mailing

offices.POSTMASTER: Send address changes to Homeland Security Today,

PO Box 292995 Dayton, OH 45429-0995.Copyright 2016 HSToday. All rights reserved.

2007 Central-Southeast Region

2007 Central-Southeast Region

Bronze Bronze Special Section Special Supplement

2005 Central- Southeast Region

2005 Central- Southeast Region

Silver Bronze Special Section Regular Department

2005 Central- Southeast Region

2005 Central- Southeast Region

Silver Bronze Special Section Regular Department

2007 Central-Southeast Region

2007 Central-Southeast Region

Bronze Bronze Special Section Special Supplement

JOURNALISMTHAT

MATTERS

2012 RegionalSILVER

EDITORIALAward Winner

2012 NationalSILVER

EDITORIALAward Winner

BRONZE

2012 RegionalSILVERDESIGN

Award Winner

2010 NationalGOLD

omeland Security Today reported in February that the House Committee

on Homeland Security majority staff report, America’s Airports: The Threat From Within, found the majority of the nation’s airports do not have full employee screening at secure ac-cess points, resulting in a serious insider threat vulnerability, and “are unable to demonstrate the security effectiveness of their existing em-ployee screening efforts, which consist largely of randomized screening by Transportation Security Administration [TSA] officers or airport law enforcement personnel.”

Disturbingly, the report noted that the De-partment of Homeland Security (DHS) inspector general revealed in 2015 that “73 aviation workers with links to terrorism were either currently or recently employed at airports across the United States with access to secure and sterile areas,” and that, “[s]ub-sequent oversight efforts revealed that while TSA reviewed each individual and deter-mined whether they were a threat to aviation security, the agency had missed terrorist ties due to a lack of access to certain data sets held by other entities within the US government. Despite longstanding efforts to be granted ac-cess to additional intelligence databases, DHS and TSA were met with resistance and delay by other federal agencies.”

The Government Accountability Office (GAO) had already noted in an audit report that TSA officials have long acknowledged the potential threat from airport workers, but deemed the threat a “known and accepted risk.”

In response to the Homeland Security Today re-port, Arbor Networks Chief Security Tech-nologist Darren Anstee told Homeland Security Today that, “While the Homeland Security Committee report focuses on the physical se-curity risks posed by the ‘lone wolf’ insider threat at American airports, it is important to note that there is also a significant [insider threat] cyber risk.”

Anstee explained that, “Many organizations have focused their cybersecurity at the pe-rimeter of their networks to stop bad actors getting in. While this is important, many are blind to what goes on within their infra-structures. This is a key problem which is il-lustrated by previous leaks of classified data where insiders have been seen to hoard, and then extract, large amounts of data while re-

maining undetected. Data thefts are one thing, but imagine the ramifications this can cause at airports. If an air traffic control system, or even just an airline check-in system was tar-geted by an insider intent on disrupting sys-tem continuity, there would be wide-spread disruption, costing the economy millions of dollars and causing major inconvenience – and possibly personal risk to many travelers.”

Anstee said, “It is becoming increasingly im-perative for organizations to instrument the interior of their networks so that they can see what is going on everywhere, so that they can detect suspicious or malicious behavior quickly wherever it occurs. This is not easy for large, geographically distributed sites with many terminals of different types – like air-ports - unless the network is harnessed to provide the necessary visibility. The network is the conduit for all inter-device commu-nication, and thus can be harnessed for per-vasive visibility. Internal network analysis has a become a key part of the fight against cyber-criminals in the enterprise space, and this kind of monitoring needs to be mandated in areas critical to national security – such as transport hubs, utilities etc.”

Meanwhile, new video analytics software designed to provide advanced analytics and generate real-time alerts designed with gov-ernment entities such as airports, can alert to intrusion detection, left-behind object detec-tion, facial recognition and camera tampering alerts. All of these technologies serve as a se-curity force multiplier.

These technologies are vital. John Halinski, a former TSA deputy administrator and former chief operating officer for TSA, warned in his Homeland Security Today report, “Curbside Vulnerability,” about the lack of security outside and immediately inside the nation’s airports.

“The street side of an airport historically has been susceptible to attack by terrorists, and this vulnerability is now being exploited,” Halinski said, adding however, “Unfortu-nately, this zone from the front of the airport to the federal checkpoint is many times a ‘no-man’s land’ lacking any real security person-nel, adequate physical protective structures, a general lack of security technology and effec-tive coordinated security policies.”

– Anthony Kimery, Editor-in-Chief

UPDATES & RESPONSES

Considering Airport Insider Threats, Cyber Intruders and Perimeter Security

H

October 2016 | Homeland Security Today Magazine2

Page 4: March/April 2017 | Vol.14, No.2 INSIGHT & …ksjoa.org/doc/Homeland_Security_Today_March-April_2017.pdfMarch/April 2017 | Vol.14, No.2 INSIGHT & ANALYSIS FOR GOVERNMENT DECISION MAKERS

irst responders in the 21st century in-creasingly face multifaceted active threat

scenarios. The complexity of recent national and global attacks, as well as the potential of extreme natural disasters and weather emer-gencies, challenge those charged with saving lives and ensuring the best possible outcomes during these events more than ever.

While the challenges seem more complicated and potential outcomes more intense, there is a dichotomy between required response and available resources to manage these types of events. On one hand, post-9/11 state, local, federal and private sector entities are expected to work together during preparation and coop-erate fully during emergency response. Obvious complications emanate from these relation-ships, as they represent multiple disciplines and jurisdictions. Related issues regarding their respective structures may be incompatible as well. On the other hand, technology has ad-vanced and relationships have been created or improved to meet these uncommon demands. In addition, there are many agencies and ju-risdictions who’s after-action reports offer key information through improvement matrices that would serve any jurisdiction in planning for a potential emergency or an attack. Planners must take advantage of these resources in the earliest stages of planning.

Today’s Challenges

Due to the nature of social media, governmen-tal organizations may be exposed more quickly and judged more harshly than ever before for decisions made during crises. There is a height-ened awareness of emergency management responsibilities and results produced within American culture. Social and mass media re-ports can quickly influence public sentiment.

Further, the characteristics of an active shooter or terrorist attack can include multiple, si-multaneous attacks on soft targets in a large geographic area. This can swiftly evolve into a multijurisdictional cross discipline and rapidly developing threat requiring real-time informa-tion management. In the United States, active shooter cases continue to increase in frequency and complexity. Constantly morphing meth-ods among attackers put emergency plans and procedures to the test. This requires leaders to

be resilient in assessing dynamic threat envi-ronments and quickly and effectively shifting priorities. How? By ensuring information is collected, analyzed and distributed rapidly. Leaders will be judged on how they respond to such complex environments, and given the predictability of an unpredictable scenario oc-curring, the public pressures of crisis decision-making will be in the forefront.

The previous barriers created through silo-thinking between agencies and disciplines have softened significantly since 9/11. Pre-event in-formation sharing is a much-improved realm, with the increase in joint intelligence bulletins disseminated to state and local agencies from the FBI, Department of Homeland Security and others. With the advent of fusion cen-ters and their ability to serve as central clear-ing houses of information pertinent to local constituents while coordinating with national information-sharing resources, the first re-sponder community can rely on this aspect of information sharing as a basis for awareness and preparation. This, however, does not necessarily solve the challenge of the need for situational awareness or understanding rapidly morphing threat dynamics in each incident.

Critical Need for Immediate Planning

Pre-event planning for dynamic threat sce-narios has taken on emerging features. It may have been sufficient at one time to plan, train, equip and exercise emergency plans intermit-tently. In today’s environment, while cer-tain facets of a plan may remain more static – such as equipment needs and types – as-pects involving information sharing require constant monitoring, updating and mainte-nance. Technological advances in real-time information sharing offer the opportunity for rapid assessment, allowing rapid decision making among emergency response leaders in adjusting to the threat’s rapidly changing scenario. Examples of these include apps for smart phones, Web-based secured portals for broad-based communication efforts among responder partners during events, social net-work applications, radio interoperability be-tween disciplines and jurisdictions, to name a few. However, it is essential to begin iden-

tifying and establishing these capabilities im-mediately for these resources to be realized. The common thread among these solutions is to :

1. Establish potential partners (followers, in the case of social media applications) necessary to maximize these modes of information-sharing.

2. Establish common objectives.

3. Create necessary informal or formal agree-ments to support the understanding and use of such technology.

Established Resources

Post-9/11 efforts have emphasized regionalized approaches to improvements in capability areas where gaps in mitigation, prevention, response and recovery exist. For many communities, funding for resources is scarce; this does not have to remain a constraint. Fusion centers are established in almost every state in the coun-try to serve its communities in crucial infor-mation-sharing needs during critical events. The National Network of Fusion Centers is constantly assessing and upgrading ways in which fusion centers communicate with their respective communities. Emergency planners should contact their fusion center directors,

F

21st Century Information-Sharing and Communication Requirements Pose Significant Challenges

SAM MCGHEE

Police arrive at Sandy Hook Elementary after the shooting on December 14, 2012.

10 March/April 2017 | Homeland Security Today Magazine

Page 5: March/April 2017 | Vol.14, No.2 INSIGHT & …ksjoa.org/doc/Homeland_Security_Today_March-April_2017.pdfMarch/April 2017 | Vol.14, No.2 INSIGHT & ANALYSIS FOR GOVERNMENT DECISION MAKERS

who should have immediate suggestions for connecting to established best practices in in-formation-sharing measures. This may include rapid information-sharing smart phone apps utilized by the fusion center and key partners during emergency incidents.

Further, most fusion centers have some version of a terrorism liaison officer program where local agency representatives are trained, then incorporated into an information-sharing ar-chitecture. This creates an expanded network

of collection points, which may support real-time information-sharing needs. In addition, the National Network of Fusion Centers has created a real-time information-sharing portal on the Homeland Security Information Net-work. This secure chat forum was created after some of the more notable active shooter attacks: The Century 16 shooting in Aurora, Colo.; the Sikh temple shooting in Oak Creek, Wis.; the Clackamas Town Center shooting in Portland, Ore.; and the Sandy Hook school shooting in Newtown, Conn. This capability allows fusion centers to communicate in real time about facts and circumstances of a given incident, manage tips and leads, and coordinate information-sharing partnerships among fusion centers in contiguous states – including sharing analytical and intelligence product capabilities.

Today’s emergency management and first re-sponder planners are challenged more than ever to effectively plan and execute emergency response measures for the myriad of rapidly developing and dynamic threats. Often, these threats cross jurisdictional borders and require multiple disciplines to respond to the incident. Central to this critical planning is the need

for real-time situational awareness and infor-mation-sharing. To accomplish this requires pre-establishing alliances, intergovernmental agreements and multilayered, redundant com-munication methods. While the challenge may seem daunting, the solutions to these issues can be found among agencies who have dealt with these incidents and implemented methods to improve their short-comings. Leveraging les-sons learned from past events can significantly reduce a planner’s learning curve, and the methods may be of little or no cost with effec-tive pre-planning. HST

EMERGENCY PREPAREDNESS

HOMELAND SECURITY equals

For our students,

JOB SECURITY.

EARN YOUR DEGREE ONLINE. waldorf.edu // 877.267.2157

WU-HalfPageAd-HLSToday-Jan2017.indd 1 1/27/17 1:53 PM

A lieutenant with the Aurora, Colorado Police Department, Sam McGhee currently is the Professional Standards Section/Emergency Services Coordinator. For two years he served as deputy executive director of the Colorado In-formation Analysis Center and served a one-year fellowship with the Interagency Threat Assessment and Coordination Group located in the National Counterterrorism Center in Washington, DC. In 2015, he helped create the implementa-tion plan for the National Network of Fusion Centers. He’s also a member of the Committee on Homeland Security for the International Association of Chiefs of Police.

Central to this critical planning is the

need for real-time situational awareness

and information-sharing.

11Go online today for exclusive online content and eNewsletters


Recommended