Homeland Security Insider

Calling All Security Threats

Federal judges and court officials are scratching their heads over the increasing array of wireless communication devices, personal digital assistants, mobile phones, BlackBerrys and wireless laptop computers -- not over how to use them, but what to do with them when the devices appear in the courtroom.

Judges across the country are confiscating cell phones to prevent courtroom observers from instantly sending messages that relay witness or case information directly to people outside the courtroom. How would you respond to a picture of your wife on jury duty being sent anonymously to you in an e-mail?

Likewise, police officers and prosecutors are increasingly frustrated by their inability to successfully investigate and prosecute criminal cases when key witnesses refuse to provide critical evidence or to testify for fear of retaliation by the defendant or his or her family and friends. During a recent gang-related trial, friends of the defendant were seen using camera phones to photograph a prosecutor, a police investigator and a witness who was testifying.

Judges across the country are confiscating cell phones to prevent courtroom observers from instantly sending messages that relay witness or case information directly to people outside the courtroom. How would you respond to a picture of your wife on jury duty being sent anonymously to you in an e-mail?

Until recently, wireless communication devices weren't a problem because so few people had them. Today, however, industry statistics reveal that 180 million Americans are wireless subscribers. That's about 60 percent of the total U.S. population. Cell phones with built-in digital cameras and e-mail allow sneaky students to send silent questions and answers to one another -- right under teachers' noses. Students have been caught using a computer's spell checker on a test that evaluated, in part, spelling and listening to iPods with recorded lecture notes. Crib notes and dictionaries can be viewed on digital music players, which have a screen about the size of a postage stamp. These devices become a digital cheat sheet in the hands of unscrupulous students. Cell phone cameras also have created privacy concerns in locker rooms and other places where people expect privacy.

If it isn't enough that mobile phone use in courthouses, classrooms and locker rooms is a big problem, mobile phones also are the No. 1 smuggled contraband item in prisons. A review of contraband reports in Maryland showed 121 cell phones as being confiscated during a sweep of nine of the state's 26 prisons. Although strictly prohibited, cell phones still manage to get into the hands of inmates. In two maximum-security prisons in the same state, 92 cell phones were confiscated over a 10-month period.

These cell phones give inmates the ability to arrange drug deals or to continue direct, outside criminal activity while incarcerated. Now, there is another reason to ban cell phones from prisons. A private company is marketing a device that looks like a cell phone -- but is, in fact, a handgun capable of firing a .22-caliber round.

Signs do not stop people from using cell phones in unauthorized areas or at inappropriate times. On a recent flight, a passenger next to me made a call to family members while we were still in the air right before landing -- a time when interference with the aircraft's avionics potentially has the greatest risk to flight safety. After landing, I observed a number of passengers using cell phones in the passport control area in clear view of Department of Homeland Security signs banning cell phone usage in the area. The only way to prevent inappropriate, dangerous or illegal activity involving cell phone usage is to prevent the phone's entry into restricted areas. This is easier said than done. There are plenty of products on the market that can detect and track a cell phone signal. But these technologies are ineffective when the cell phone is turned off.

Cell phones not only transmit photographs, e-mail, voice or video, but are also the detonator of choice for most improvised explosive devices (IED). The U.S. military in Iraq and Afghanistan is defeating IEDs by use of a dampening field surrounding friendly formations. However, this dampening field does not detect the presence of the explosive -- it only blocks the cell phone signal from reaching the detonator. A patient terrorist will wait until an unprotected target approaches.

Another technique to defeat IEDs is to scan for the presence of either the explosive or the electronics in the detonator. The same technology that screens for the electronic detonator can be used to discover hidden cell phones in restricted areas. The beauty of his technology is that cell phones don't need to be in operation to be detected. The search is for the material from which the device is constructed, not the signal that emanates from it in operation.

It's all too clear that screening people with current-generation metal detectors prior to entering secured areas, such as court houses, is ineffective in preventing some weapons, including cell phones, from getting through. To detect the cell phone in this manner requires the metal detector to be set to such a low tolerance level that it literally picks up the fillings in your teeth, requiring a pat down search of virtually every entrant. To detect cell phones or electronic detonators with any degree of certainty is nearly impossible given the tools screeners have available today.

Screeners need a reliable way to detect and identify non-metallic weapons or other threatening objects that may be concealed under clothing. As I wrote last month, one promising field involves millimeter wave imaging technologies that readily penetrate clothing, thus allowing the visualization of hidden objects to include cell phones.

While we wait for these technologies to make their way into the marketplace, we can take comfort that the average criminal in the United States often proves to be from the bottom of the gene pool. Recently, a fellow was convicted and imprisoned for six years after leaving his camera phone -- with photos of him and his wife -- at the scene of the crime. He dropped his phone when he and his accomplice were switching cars after the robbery.

Featured

  • Maximizing Your Security Budget This Year

    7 Ways You Can Secure a High-Traffic Commercial Security Gate  

    Your commercial security gate is one of your most powerful tools to keep thieves off your property. Without a security gate, your commercial perimeter security plan is all for nothing. Read Now

  • Nevada Transportation Commission Adopts AI-Based Gun Detection Technology

    ZeroEyes, the creators of the only AI-based gun detection video analytics platform that holds the US Department of Homeland Security SAFETY Act Designation, announced it has been chosen by the Regional Transportation Commission of Southern Nevada (RTC) for wide-scale implementation. This marks the first transit agency in the United States to fully deploy weapons detection analytics, with RTC adding ZeroEyes to its state-of-the-art network to protect residents and visitors against gun-related violence. Read Now

  • Busy South Africa Building Integrates Custom Access Control System

    Nicol Corner, based in Bedfordview, Johannesburg, South Africa, is home to a six-star fitness club, prime office space, and an award-winning rooftop restaurant. This is the first building in South Africa to have its glass façade fully incorporate fritted glazing, saving 35% on energy consumption. Nicol Corner (Pty) LTD has developed a landmark with sophisticated design and unique architecture by collaborating with industry-leading partners and specifying world-class equipment throughout the project. This includes installing a high-spec, bespoke security and access control system. Read Now

  • Only 13 Percent of Research Institutions Are Prepared for AI

    A new survey commissioned by SHI International and Dell Technologies underscores the transformative potential of artificial intelligence (AI) while exposing significant gaps in preparedness at many research institutions. Read Now

Featured Cybersecurity

Webinars

New Products

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities 3

  • Mobile Safe Shield

    Mobile Safe Shield

    SafeWood Designs, Inc., a manufacturer of patented bullet resistant products, is excited to announce the launch of the Mobile Safe Shield. The Mobile Safe Shield is a moveable bullet resistant shield that provides protection in the event of an assailant and supplies cover in the event of an active shooter. With a heavy-duty steel frame, quality castor wheels, and bullet resistant core, the Mobile Safe Shield is a perfect addition to any guard station, security desks, courthouses, police stations, schools, office spaces and more. The Mobile Safe Shield is incredibly customizable. Bullet resistant materials are available in UL 752 Levels 1 through 8 and include glass, white board, tack board, veneer, and plastic laminate. Flexibility in bullet resistant materials allows for the Mobile Safe Shield to blend more with current interior décor for a seamless design aesthetic. Optional custom paint colors are also available for the steel frame. 3

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3