Digital Agenda: Homeland security--Throwing money at technology
Strategic conflicts, rampant confusion and election-year politics are slowing the war on terror. A News.com special report.

By Robert Lemos and Mike Yamamoto
Staff Writers, CNET News.com
October 18, 2004, 4:00 AM PDT
As part of California's effort in the war on terror, state legislators this year proposed that trucks hauling hazardous materials be fitted with technologies that would allow authorities to seize control of hijacked vehicles--a law that supporters said should be passed "on an emergency basis."
The bill, however, was voted down after critics contended that the communication signals used in the proposed system could be easily commandeered by the very people it was supposed to stop.

Tech stands guard
Click on an icon on the map above to see some of the projects and technologies for the defense of each sector.

- AIRPORTS
- Projects:
- Secure Flight, now being tested, is aimed at screening passengers using federal terrorist watch lists and possibly commercial databases.
- AACPP uses biometric and ID tools such as iris scans, and fingerprint and facial recognition to guard access to sensitive areas of airports.
- NSSA tests new technologies, such as antimissile systems, to limit access and detect threats in a model environment.
- Primary agency:
- Transportation Security Administration (DHS)

- PUBLIC HEALTH
- Projects:
- Projects Bioshield and Biowatch fund research into new vaccines and detection methods.
- NBACC gathers information using indoor and outdoor monitoring systems to detect bacteria, viruses and toxins. Coordinates response to bioterrorism and agricultural terrorism via the Laboratory Response Network.
- CFSAN monitors safety of the food supply, including the use of a registration database and testing detect adulteration.
- Primary agency:
- Department of Health and Human Services

- INCIDENT RESPONSE
- Projects:
- RapidCom 9/30 promotes interoperability and integration of wireless communications systems used by emergency crews in 10 major cities.
- RTI studies incident response technologies for urban areas with the aim of creating a nationwide standard.
- HSOC gathers information related to domestic terrorism and sends it out to federal, state and local governments.
- Primary agency:
- Information Analysis and Infrastructure Protection Directorate (DHS)

- CRITICAL INFRASTRUCTURE AND CYBERSPACE
- Projects:
- HSIN sends timely data about threats to state, local and private sector partners.
- National Cyber Alert System sends information on the latest threats to public subscribers.
- DETER network tests cybersecurity technologies. Other projects work to counter digital attacks and intrusions on federal systems.
- Primary agency:
- Information Analysis and Infrastructure Protection Directorate (DHS)

- NUCLEAR MATERIAL
- Projects:
- GTRI secures high-risk radiological material around the world.
- PSI is a concerted effort to curtail weapons of mass destruction, their delivery systems and materials.
- MegaPorts Program uses radiation detectors at large seaports worldwide to deter trafficking of nuclear or radioactive materials.
- Primary agency:
- National Nuclear Security Administration (DOE)

- TRANSPORTATION
- Projects:
- FAST allows imports from Canada and Mexico to be verified as safe before they reach the border, using biological and chemical detection tools and information from the National Targeting Center.
- TRIP uses gamma-ray and X-ray technologies for scanning passengers and baggage prior to boarding flights and on trains.
- The High Explosives Countermeasures project will develop technologies to stop car and truck bombs.
- Primary agency:
- Transportation Security Administration (DHS)

- BORDERS
- Projects:
- ISIS detects illegal immigrants using seismic, magnetic and thermal sensors, and remote video.
- US-VISIT tracks visitors into the U.S. using a database of fingerprints and photographs.
- NTC processes reports on border incident data.
- Primary agency:
- Customs Border Protection (DHS)

- PORTS
- Projects:
- CSI uses gamma-ray and X-ray imaging to scan containers at departure port to guarantee ships' cargos are safe. Promotes "smart" containers with tamper-resistant seals and RFID tags.
- C-TPAT is a joint government-business initiative that uses an information network to track goods from the factory to the store.
- NTC processes reports on border incident data.
- Primary agency:
- Customs Border Protection (DHS)
"Satellite or cell phone links can be jammed by even a dull terrorist with a $20 device," said California State University professor Bill Wattenburg, a Lawrence Livermore National Laboratory consultant and inventor of of truck-stopping technology. "A smart hijacker can kill communications and make a truck go blind when he wants to move in."
The ill-fated legislation underscores the myriad problems facing the government agencies, law enforcement authorities and industry contractors charged with developing and purchasing technologies in the name of homeland security. As the nation rushes to spend billions of dollars on technology for domestic defense, the Department of Homeland Security remains mired in strategic conflicts, bureaucratic inertia, intra-agency rivalries and election-year politicking.
Since the attacks of Sept. 11, 2001, a pro-security stance has been a necessity for any national political platform, and the 2004 campaign has been no exception.
But how much is enough? As with any political initiatives that are relatively free of opposition, homeland security programs have the potential to spin out of control without adequate oversight. That, in turn, could slow the fight against terrorism by wasting crucial resources and distracting government bodies from the mission at hand.
To address these issues, CNET News.com recommends a three-point policy agenda that encompasses concerns raised in scores of interviews with government officials, industry executives, policy researchers and taxpayer advocates: Change the "target-based" strategies used to assess terrorist threats today; enforce stringent oversight of spending, especially when secrecy rules limit public knowledge of contracts; and ensure interoperability of technologies and communication networks at all levels of government.
In addition, the government must throughout these reforms address privacy concerns that consistently dog proposals for new surveillance, identification and data analysis tools. Technology projects must respect constitutional safeguards of privacy, even as greater levels of information are called for in the defense against terrorism.
"You can collect all the information that you want, but unless you can get the right information to the right people, it doesn't really matter," said Gilman Louie, chief executive of In-Q-Tel, a CIA-affiliated venture capital firm, and member of the Markle Foundation's task force on digital security. "Historically we are, as a government, good at big defense projects but not big information technology programs. IT is a much murkier area."
The numbers seem to reflect that ambiguity. In a June report, the nonprofit National Taxpayers Union estimated that more than half of new homeland security funding since 2001--$164 billion--is being spent on programs unrelated to defense or response to terrorist attacks. As an example, the organization cited the renaming of the Agriculture Act of 2001 as the "Farm Security Act" after Sept. 11.
"As if chickpeas, lentils and mohair have anything to do with national security. One congressman even stated that a peanut subsidy, with a $3.5 billion price tag, 'strengthens America's national security,'" the 335,000-member group said. "Members of Congress have been cloaking old-fashioned pork in the robes of 'security' for the 'homeland.'"
Making matters worse, local districts that receive such security windfalls often have no idea what they are supposed to do with the money. As a result, many state and regional agencies are simply buying ambulances, fire trucks and other equipment that can be used for public safety but are not necessarily earmarked for homeland security--an accounting sleight of hand known as "supplantation" in the language of procurement.
These concerns were brought into sharp relief last year in a Rand study based on interviews with 190 "first responders," or emergency workers, from 83 organizations across the country. The workers "felt they did not know what they needed to protect against, what protection was appropriate and where to look for it," according to the report, which was conducted for the federal Centers for Disease Control and Prevention.
In remarks to emergency workers and business leaders last month in Arizona, Homeland Security Secretary Tom Ridge acknowledged that improvements are needed in communication and direction but stressed his department's progress. "If you're thinking that there's more that we can do, you're right. But after three years, in every way possible, we've made a real difference in securing our people and our homeland. The successful integration of people and technology for a greater purpose has had a genuine result," he said.
Still, when specific security technologies do receive government funding, law enforcement and other agencies have been known to spend large sums on products and services that are unproven or have shown dubious results. So-called biometric technologies such as iris-scanning identification systems have , where test versions failed to work for people with contact lenses, long eyelashes and watery eyes.
Many states, airports and agencies have begun using despite concerns among law enforcement authorities such as the Tampa Police Department, which because it had not helped catch a single criminal. Chicago police recently announced plans to install thousands of cameras around the city that track unusual movements by individuals, even though this "content analysis" surveillance technology has yet to be proven.
"Facial recognition got a lot of hype after 9/11, but it has problems," said Steven Gish, senior research analyst at Roth Capital Partners. "They don't have one that can do one-to-many matches. It is really good at doing one-to-one matching--when you are at a counter to get a ticket--but not picking a face out of a crowd."
The government's withdrawal of the "" project, which would have linked databases to compile composite "signature" behavior of terrorists, was a significant setback for the large-scale use of such security technologies. Groups such as the Association of Computing Machinery told Congress that the massive system risked opening the door to identity theft or generating "false positives" from imperfect analytical tools.
Before the federal government can decide which technologies are valuable to U.S. security, officials must define the threat they are working against. To date, the White House has described domestic defense goals in only general terms in the seven strategic reports it has issued over the last two years.
"We found there was no commonly accepted set of characteristics used for an effective national strategy," wrote the authors of a February report by the Government Accountability Office (GAO), the investigative arm of Congress. "The seven national strategies related to homeland security and combating terrorism vary considerably in the extent to which they address the desirable characteristics that we identified."

By Robert Lemos and Mike Yamamoto
Staff Writers, CNET News.com
October 18, 2004, 4:00 AM PDT
As part of California's effort in the war on terror, state legislators this year proposed that trucks hauling hazardous materials be fitted with technologies that would allow authorities to seize control of hijacked vehicles--a law that supporters said should be passed "on an emergency basis."
The bill, however, was voted down after critics contended that the communication signals used in the proposed system could be easily commandeered by the very people it was supposed to stop.

Tech stands guard
Click on an icon on the map above to see some of the projects and technologies for the defense of each sector.

- AIRPORTS
- Projects:
- Secure Flight, now being tested, is aimed at screening passengers using federal terrorist watch lists and possibly commercial databases.
- AACPP uses biometric and ID tools such as iris scans, and fingerprint and facial recognition to guard access to sensitive areas of airports.
- NSSA tests new technologies, such as antimissile systems, to limit access and detect threats in a model environment.
- Primary agency:
- Transportation Security Administration (DHS)

- PUBLIC HEALTH
- Projects:
- Projects Bioshield and Biowatch fund research into new vaccines and detection methods.
- NBACC gathers information using indoor and outdoor monitoring systems to detect bacteria, viruses and toxins. Coordinates response to bioterrorism and agricultural terrorism via the Laboratory Response Network.
- CFSAN monitors safety of the food supply, including the use of a registration database and testing detect adulteration.
- Primary agency:
- Department of Health and Human Services

- INCIDENT RESPONSE
- Projects:
- RapidCom 9/30 promotes interoperability and integration of wireless communications systems used by emergency crews in 10 major cities.
- RTI studies incident response technologies for urban areas with the aim of creating a nationwide standard.
- HSOC gathers information related to domestic terrorism and sends it out to federal, state and local governments.
- Primary agency:
- Information Analysis and Infrastructure Protection Directorate (DHS)

- CRITICAL INFRASTRUCTURE AND CYBERSPACE
- Projects:
- HSIN sends timely data about threats to state, local and private sector partners.
- National Cyber Alert System sends information on the latest threats to public subscribers.
- DETER network tests cybersecurity technologies. Other projects work to counter digital attacks and intrusions on federal systems.
- Primary agency:
- Information Analysis and Infrastructure Protection Directorate (DHS)

- NUCLEAR MATERIAL
- Projects:
- GTRI secures high-risk radiological material around the world.
- PSI is a concerted effort to curtail weapons of mass destruction, their delivery systems and materials.
- MegaPorts Program uses radiation detectors at large seaports worldwide to deter trafficking of nuclear or radioactive materials.
- Primary agency:
- National Nuclear Security Administration (DOE)

- TRANSPORTATION
- Projects:
- FAST allows imports from Canada and Mexico to be verified as safe before they reach the border, using biological and chemical detection tools and information from the National Targeting Center.
- TRIP uses gamma-ray and X-ray technologies for scanning passengers and baggage prior to boarding flights and on trains.
- The High Explosives Countermeasures project will develop technologies to stop car and truck bombs.
- Primary agency:
- Transportation Security Administration (DHS)

- BORDERS
- Projects:
- ISIS detects illegal immigrants using seismic, magnetic and thermal sensors, and remote video.
- US-VISIT tracks visitors into the U.S. using a database of fingerprints and photographs.
- NTC processes reports on border incident data.
- Primary agency:
- Customs Border Protection (DHS)

- PORTS
- Projects:
- CSI uses gamma-ray and X-ray imaging to scan containers at departure port to guarantee ships' cargos are safe. Promotes "smart" containers with tamper-resistant seals and RFID tags.
- C-TPAT is a joint government-business initiative that uses an information network to track goods from the factory to the store.
- NTC processes reports on border incident data.
- Primary agency:
- Customs Border Protection (DHS)
"Satellite or cell phone links can be jammed by even a dull terrorist with a $20 device," said California State University professor Bill Wattenburg, a Lawrence Livermore National Laboratory consultant and inventor of of truck-stopping technology. "A smart hijacker can kill communications and make a truck go blind when he wants to move in."
The ill-fated legislation underscores the myriad problems facing the government agencies, law enforcement authorities and industry contractors charged with developing and purchasing technologies in the name of homeland security. As the nation rushes to spend billions of dollars on technology for domestic defense, the Department of Homeland Security remains mired in strategic conflicts, bureaucratic inertia, intra-agency rivalries and election-year politicking.
Since the attacks of Sept. 11, 2001, a pro-security stance has been a necessity for any national political platform, and the 2004 campaign has been no exception.
But how much is enough? As with any political initiatives that are relatively free of opposition, homeland security programs have the potential to spin out of control without adequate oversight. That, in turn, could slow the fight against terrorism by wasting crucial resources and distracting government bodies from the mission at hand.
To address these issues, CNET News.com recommends a three-point policy agenda that encompasses concerns raised in scores of interviews with government officials, industry executives, policy researchers and taxpayer advocates: Change the "target-based" strategies used to assess terrorist threats today; enforce stringent oversight of spending, especially when secrecy rules limit public knowledge of contracts; and ensure interoperability of technologies and communication networks at all levels of government.
In addition, the government must throughout these reforms address privacy concerns that consistently dog proposals for new surveillance, identification and data analysis tools. Technology projects must respect constitutional safeguards of privacy, even as greater levels of information are called for in the defense against terrorism.
"You can collect all the information that you want, but unless you can get the right information to the right people, it doesn't really matter," said Gilman Louie, chief executive of In-Q-Tel, a CIA-affiliated venture capital firm, and member of the Markle Foundation's task force on digital security. "Historically we are, as a government, good at big defense projects but not big information technology programs. IT is a much murkier area."
The numbers seem to reflect that ambiguity. In a June report, the nonprofit National Taxpayers Union estimated that more than half of new homeland security funding since 2001--$164 billion--is being spent on programs unrelated to defense or response to terrorist attacks. As an example, the organization cited the renaming of the Agriculture Act of 2001 as the "Farm Security Act" after Sept. 11.
"As if chickpeas, lentils and mohair have anything to do with national security. One congressman even stated that a peanut subsidy, with a $3.5 billion price tag, 'strengthens America's national security,'" the 335,000-member group said. "Members of Congress have been cloaking old-fashioned pork in the robes of 'security' for the 'homeland.'"
Making matters worse, local districts that receive such security windfalls often have no idea what they are supposed to do with the money. As a result, many state and regional agencies are simply buying ambulances, fire trucks and other equipment that can be used for public safety but are not necessarily earmarked for homeland security--an accounting sleight of hand known as "supplantation" in the language of procurement.
These concerns were brought into sharp relief last year in a Rand study based on interviews with 190 "first responders," or emergency workers, from 83 organizations across the country. The workers "felt they did not know what they needed to protect against, what protection was appropriate and where to look for it," according to the report, which was conducted for the federal Centers for Disease Control and Prevention.
In remarks to emergency workers and business leaders last month in Arizona, Homeland Security Secretary Tom Ridge acknowledged that improvements are needed in communication and direction but stressed his department's progress. "If you're thinking that there's more that we can do, you're right. But after three years, in every way possible, we've made a real difference in securing our people and our homeland. The successful integration of people and technology for a greater purpose has had a genuine result," he said.
Still, when specific security technologies do receive government funding, law enforcement and other agencies have been known to spend large sums on products and services that are unproven or have shown dubious results. So-called biometric technologies such as iris-scanning identification systems have , where test versions failed to work for people with contact lenses, long eyelashes and watery eyes.
Many states, airports and agencies have begun using despite concerns among law enforcement authorities such as the Tampa Police Department, which because it had not helped catch a single criminal. Chicago police recently announced plans to install thousands of cameras around the city that track unusual movements by individuals, even though this "content analysis" surveillance technology has yet to be proven.
"Facial recognition got a lot of hype after 9/11, but it has problems," said Steven Gish, senior research analyst at Roth Capital Partners. "They don't have one that can do one-to-many matches. It is really good at doing one-to-one matching--when you are at a counter to get a ticket--but not picking a face out of a crowd."
The government's withdrawal of the "" project, which would have linked databases to compile composite "signature" behavior of terrorists, was a significant setback for the large-scale use of such security technologies. Groups such as the Association of Computing Machinery told Congress that the massive system risked opening the door to identity theft or generating "false positives" from imperfect analytical tools.
Before the federal government can decide which technologies are valuable to U.S. security, officials must define the threat they are working against. To date, the White House has described domestic defense goals in only general terms in the seven strategic reports it has issued over the last two years.
"We found there was no commonly accepted set of characteristics used for an effective national strategy," wrote the authors of a February report by the Government Accountability Office (GAO), the investigative arm of Congress. "The seven national strategies related to homeland security and combating terrorism vary considerably in the extent to which they address the desirable characteristics that we identified."