Homeland Security Insider

Calling All Security Threats

Federal judges and court officials are scratching their heads over the increasing array of wireless communication devices, personal digital assistants, mobile phones, BlackBerrys and wireless laptop computers -- not over how to use them, but what to do with them when the devices appear in the courtroom.

Judges across the country are confiscating cell phones to prevent courtroom observers from instantly sending messages that relay witness or case information directly to people outside the courtroom. How would you respond to a picture of your wife on jury duty being sent anonymously to you in an e-mail?

Likewise, police officers and prosecutors are increasingly frustrated by their inability to successfully investigate and prosecute criminal cases when key witnesses refuse to provide critical evidence or to testify for fear of retaliation by the defendant or his or her family and friends. During a recent gang-related trial, friends of the defendant were seen using camera phones to photograph a prosecutor, a police investigator and a witness who was testifying.

Judges across the country are confiscating cell phones to prevent courtroom observers from instantly sending messages that relay witness or case information directly to people outside the courtroom. How would you respond to a picture of your wife on jury duty being sent anonymously to you in an e-mail?

Until recently, wireless communication devices weren't a problem because so few people had them. Today, however, industry statistics reveal that 180 million Americans are wireless subscribers. That's about 60 percent of the total U.S. population. Cell phones with built-in digital cameras and e-mail allow sneaky students to send silent questions and answers to one another -- right under teachers' noses. Students have been caught using a computer's spell checker on a test that evaluated, in part, spelling and listening to iPods with recorded lecture notes. Crib notes and dictionaries can be viewed on digital music players, which have a screen about the size of a postage stamp. These devices become a digital cheat sheet in the hands of unscrupulous students. Cell phone cameras also have created privacy concerns in locker rooms and other places where people expect privacy.

If it isn't enough that mobile phone use in courthouses, classrooms and locker rooms is a big problem, mobile phones also are the No. 1 smuggled contraband item in prisons. A review of contraband reports in Maryland showed 121 cell phones as being confiscated during a sweep of nine of the state's 26 prisons. Although strictly prohibited, cell phones still manage to get into the hands of inmates. In two maximum-security prisons in the same state, 92 cell phones were confiscated over a 10-month period.

These cell phones give inmates the ability to arrange drug deals or to continue direct, outside criminal activity while incarcerated. Now, there is another reason to ban cell phones from prisons. A private company is marketing a device that looks like a cell phone -- but is, in fact, a handgun capable of firing a .22-caliber round.

Signs do not stop people from using cell phones in unauthorized areas or at inappropriate times. On a recent flight, a passenger next to me made a call to family members while we were still in the air right before landing -- a time when interference with the aircraft's avionics potentially has the greatest risk to flight safety. After landing, I observed a number of passengers using cell phones in the passport control area in clear view of Department of Homeland Security signs banning cell phone usage in the area. The only way to prevent inappropriate, dangerous or illegal activity involving cell phone usage is to prevent the phone's entry into restricted areas. This is easier said than done. There are plenty of products on the market that can detect and track a cell phone signal. But these technologies are ineffective when the cell phone is turned off.

Cell phones not only transmit photographs, e-mail, voice or video, but are also the detonator of choice for most improvised explosive devices (IED). The U.S. military in Iraq and Afghanistan is defeating IEDs by use of a dampening field surrounding friendly formations. However, this dampening field does not detect the presence of the explosive -- it only blocks the cell phone signal from reaching the detonator. A patient terrorist will wait until an unprotected target approaches.

Another technique to defeat IEDs is to scan for the presence of either the explosive or the electronics in the detonator. The same technology that screens for the electronic detonator can be used to discover hidden cell phones in restricted areas. The beauty of his technology is that cell phones don't need to be in operation to be detected. The search is for the material from which the device is constructed, not the signal that emanates from it in operation.

It's all too clear that screening people with current-generation metal detectors prior to entering secured areas, such as court houses, is ineffective in preventing some weapons, including cell phones, from getting through. To detect the cell phone in this manner requires the metal detector to be set to such a low tolerance level that it literally picks up the fillings in your teeth, requiring a pat down search of virtually every entrant. To detect cell phones or electronic detonators with any degree of certainty is nearly impossible given the tools screeners have available today.

Screeners need a reliable way to detect and identify non-metallic weapons or other threatening objects that may be concealed under clothing. As I wrote last month, one promising field involves millimeter wave imaging technologies that readily penetrate clothing, thus allowing the visualization of hidden objects to include cell phones.

While we wait for these technologies to make their way into the marketplace, we can take comfort that the average criminal in the United States often proves to be from the bottom of the gene pool. Recently, a fellow was convicted and imprisoned for six years after leaving his camera phone -- with photos of him and his wife -- at the scene of the crime. He dropped his phone when he and his accomplice were switching cars after the robbery.

Featured

  • New Report Reveals Top Trends Transforming Access Controller Technology

    Mercury Security, a provider in access control hardware and open platform solutions, has published its Trends in Access Controllers Report, based on a survey of over 450 security professionals across North America and Europe. The findings highlight the controller’s vital role in a physical access control system (PACS), where the device not only enforces access policies but also connects with readers to verify user credentials—ranging from ID badges to biometrics and mobile identities. With 72% of respondents identifying the controller as a critical or important factor in PACS design, the report underscores how the choice of controller platform has become a strategic decision for today’s security leaders. Read Now

  • Overwhelming Majority of CISOs Anticipate Surge in Cyber Attacks Over the Next Three Years

    An overwhelming 98% of chief information security officers (CISOs) expect a surge in cyber attacks over the next three years as organizations face an increasingly complex and artificial intelligence (AI)-driven digital threat landscape. This is according to new research conducted among 300 CISOs, chief information officers (CIOs), and senior IT professionals by CSC1, the leading provider of enterprise-class domain and domain name system (DNS) security. Read Now

  • ASIS International Introduces New ANSI-Approved Investigations Standard

    • Guard Services
  • Cloud Security Alliance Brings AI-Assisted Auditing to Cloud Computing

    The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards, certifications, and best practices to help ensure a secure cloud computing environment, today introduced an innovative addition to its suite of Security, Trust, Assurance and Risk (STAR) Registry assessments with the launch of Valid-AI-ted, an AI-powered, automated validation system. The new tool provides an automated quality check of assurance information of STAR Level 1 self-assessments using state-of-the-art LLM technology. Read Now

  • Report: Nearly 1 in 5 Healthcare Leaders Say Cyberattacks Have Impacted Patient Care

    Omega Systems, a provider of managed IT and security services, today released new research that reveals the growing impact of cybersecurity challenges on leading healthcare organizations and patient safety. According to the 2025 Healthcare IT Landscape Report, 19% of healthcare leaders say a cyberattack has already disrupted patient care, and more than half (52%) believe a fatal cyber-related incident is inevitable within the next five years. Read Now

New Products

  • Mobile Safe Shield

    Mobile Safe Shield

    SafeWood Designs, Inc., a manufacturer of patented bullet resistant products, is excited to announce the launch of the Mobile Safe Shield. The Mobile Safe Shield is a moveable bullet resistant shield that provides protection in the event of an assailant and supplies cover in the event of an active shooter. With a heavy-duty steel frame, quality castor wheels, and bullet resistant core, the Mobile Safe Shield is a perfect addition to any guard station, security desks, courthouses, police stations, schools, office spaces and more. The Mobile Safe Shield is incredibly customizable. Bullet resistant materials are available in UL 752 Levels 1 through 8 and include glass, white board, tack board, veneer, and plastic laminate. Flexibility in bullet resistant materials allows for the Mobile Safe Shield to blend more with current interior décor for a seamless design aesthetic. Optional custom paint colors are also available for the steel frame.

  • HD2055 Modular Barricade

    Delta Scientific’s electric HD2055 modular shallow foundation barricade is tested to ASTM M50/P1 with negative penetration from the vehicle upon impact. With a shallow foundation of only 24 inches, the HD2055 can be installed without worrying about buried power lines and other below grade obstructions. The modular make-up of the barrier also allows you to cover wider roadways by adding additional modules to the system. The HD2055 boasts an Emergency Fast Operation of 1.5 seconds giving the guard ample time to deploy under a high threat situation.

  • ResponderLink

    ResponderLink

    Shooter Detection Systems (SDS), an Alarm.com company and a global leader in gunshot detection solutions, has introduced ResponderLink, a groundbreaking new 911 notification service for gunshot events. ResponderLink completes the circle from detection to 911 notification to first responder awareness, giving law enforcement enhanced situational intelligence they urgently need to save lives. Integrating SDS’s proven gunshot detection system with Noonlight’s SendPolice platform, ResponderLink is the first solution to automatically deliver real-time gunshot detection data to 911 call centers and first responders. When shots are detected, the 911 dispatching center, also known as the Public Safety Answering Point or PSAP, is contacted based on the gunfire location, enabling faster initiation of life-saving emergency protocols.