Вы находитесь на странице: 1из 39

BBC, llc (Consulting)

Security & Public Safety

Executive Briefing Document


Tuesday, January 05, 2010

By: Byron Bishop, Ph.D.


Chief Executive Officer

Regaining the National Balance between


Liberty and Security

Offered by BBC, llc


RWP #124
7620 W. Judge Perez Dr.
Arabi, LA 70032

A National Security Identification Program

Executive Introduction

The cornerstone of any successful service provider is to provide a comprehensive


analysis resulting in the statement of duties, specific tasks performed, knowledge, skills
or abilities. To maximize the effectiveness of the service and to satisfy the client, there
must be a set standard of measurable data. In addition to providing monthly progress
reports, a method to prepare a validity report that documents the service provider’s
activities (e.g., stop and questions, special services and property safety concerns, etc.)

November 25, 2002 bb IdentiSure, Inc. 1


Our business objective is to work with our clients to plan, develop, implement and
evaluate the most effective and safest public safety/security strategies, while maintaining
a collective balance of security and the individual(s) rights. Since 2002, my team of
experts and I have been working on this brief, developing the Items discussed within this
document. It represents an integrated effort to describe how we (BBC) will partner with
the government to assist or provide additional options with solving the national security
concerns. In this context we have developed a brief that should allow you to evaluate our
ability to plan and execute professionalism for a project of this complexity. We believe
that based upon this proposal and our history of past successes in similar types of
government services, BBC represents a viable contractor/consulter/planner that will meet
and exceed your current needs.

In our business we teach clients that whoever chooses their internal or external
security personnel needs to clearly understand the security business, be willing to plan
with you, and understand all building and public safety concerns. The relationship with
your security contractor must be a partnership. Because you will have to relay on that
partnership during situations, which may cause legal strategies to be reviewed, testifying
in court or writing reports. This is a joint effort. If it is viewed in this manner, you will
have a win-win relationship. We win, the community customers win and our nation
wins.

Chief Executive Officer – Profile of Byron Bishop

PROFILE

Creative and reliable leadership experience in planning and executing all aspects of new
product launches, program implementation, training resources and successful program
implementation within corporate, academic and non-profit organizations. Hands-on
knowledge of strategic planning, multi-discipline team management, complex project
management, new business development and communication assets.

 Demonstrated skills as top project leader, process advocate, change agent and career
pathway planner in diverse professional settings; domain knowledge of the entire
engagement life cycle, from initial concept and work scope definition to final
delivery on time and within budget.
 Full development and execution of successful meetings and events that support and
deliver corporate re-branding initiatives, incentive strategies, employee morale
boosters, and corporate marketing efforts with a creative, visionary approach;
delivery of significant cost savings, greater return on investment, and higher market
awareness levels.
 Expertise in the negotiation and execution of complex contracts and agreements with
top management, multi-industry clients, venue staff and key decision-makers.
 Effective hiring, management, deployment, and development of top-notch talent at
staff and field levels; motivation of teams to achieve peak performance, execute

November 25, 2002 bb IdentiSure, Inc. 2


complex projects, comply with project deadlines & milestones, maintain peak quality
service, and meet aggressive growth objectives.
 Multi-tasking talents in project management, business planning, content
development, multimedia presentations, event production, sponsorship acquisition,
crisis resolution and cost savings.
 Hands-on exposure of HR operations, labor relations, collective bargaining and
contract negotiations in both represented and non-represented environments.

AREAS OF EXPERTISE

Entrepreneur ● Competitive Analysis ● Project Management ● Expense Controls ● Profit


Optimization ● E-Commerce ● Business Acumen ● Fiscal Accountability ●
P&L/Budgeting ● Process Improvements ● Client Relations ● Special Events Planning ●
Resource Allocation ● Community Leadership ● Branding Strategies

EMPLOYMENT & ACCOMPLISHMENTS

City of Hope Youth Development Corps, Arabi, LA 2008 – Present


Program Director

In charge of all operational functions, including budgeting ($768,000), office


administration and field activities, for this non-profit humanitarian workforce planning
effort, funded by a National Emergency Grant (NEG). Develop and implement training in
green technologies, career pathways, life skills, GED testing, Adult Basic Education
(ABE) assistance and PC applications.

 Received the 2008 “Cambridge Who’s Who Award” for superb humanitarian work
through this organization; also recognized as the #1 program in Louisiana by the LA
Workforce Development entity.
 Greatly increased program visibility through aggressive branding and hands-on
strategic planning.
 Analyzed and streamlined operating processes to achieve more efficient workflow.
 Hired as an expert business manager to turn this organization around and roll back
significant losses, meeting all initial goals within 1 week.

Madison Area Technical College, Madison, WI 2007 – 2008


Health Occupations Advisor

Coordinated part-time and volunteer staff in providing health & safety orientation for pre-
college students at meetings at multiple sites throughout the region. Deployed expertise
in special events planning, curriculum development, fundraising, budgetary oversight and
creation of a wide range of marketing materials. Balanced and tracked fiscal management
tasks at both field and office levels.

November 25, 2002 bb IdentiSure, Inc. 3


 Succeeded in improving overall program participation by 100%, instituting more
efficient workflow processes enhancing community visibility with effective branding
and eliminating significant waste.
 Initially hired in a part-time role and gained permanent status because of business
savvy and financial acumen.

APA of Madison Inc., Madison, WI 1985 – 2005

Chief Executive Officer


Started and grew this business from scratch to $5 million in annual contract revenue
through aggressive prospecting, deal negotiations, program implementation, staffing
strategies, regulatory compliance and client satisfaction. Utilized skills in P&L,
budgeting, cost controls and resource allocation. Deployed expertise in leading cross-
function teams and coordinating public safety strategies, threat assessment, crime
prevention and surveillance activities. Planned and conducted detailed presentations and
reports to top executives and a demanding clientele.

 Recognized as “Business Man of the Year” by the Wisconsin State Department of


Commerce, as well as other corporate awards, for excellence in procurement in 2003
and 2004.
 Appointed by a congressional committee to the National Business Advisory Council
in Washington DC.
 Selected as the Mayor of Madison, WI to be Commissioner of the Police and Fire
Departments
 Designed, launched and maintained the #1 public safety program in the entire
Midwest.
 Provided excellent contract security for VIPs and athletes at such world-class events
as the Super Bowl in 2005, the PGA National Championship in 2004-2006 and other
sporting and university events.

MILITARY

US Army Reserves 1986 – 1996

Specialist/E-4
Tasked with a wide range of duties involving ammunition handling, ordnance support
and logistical operations.

 Activated and deployed to active duty in Saudi Arabia during the Gulf War in 1990-
1991.
 Honorable Discharge.

EDUCATION

November 25, 2002 bb IdentiSure, Inc. 4


Trinity, Sioux Falls, SD
Ph.D. Degree in Business Philosophy 2003
M.B.A. Degree in Business Management 2001
B.A. Degree in Business Administration 1999

University of Wisconsin, Platteville, WI


Certificate in Guidance and Counseling 2007

University of Wisconsin, Madison, WI


Certificate in Program Management 1997

Madison Area Technical College, Madison, WI


Police Science Program 1997

PROFESSIONAL TRAINING

- Certified Institute of Professional Management (Cert. #3050).


- 51 CE credits through the American College of Forensic Examiners; Family
Educational Rights and Privacy Act (FERPA) training.
- Completed courses in risk analysis, project management, quality control, staff
development and related topics; fully familiar with MS Office, PeopleSoft/Oracle,
video conferencing and web/podcasting.

ACTIVITIES

* Board member of the Greater Madison Chamber of Commerce and the Homeland
Security Advisory Board of Herzing College.
* Member of the WI Collaboration Council of the City of Madison.

I have a strong background in government and have worked with a variety of


elected officials in local, state, and national positions. In 1995, I was appointed by the
Mayor of Madison to a five-year term as Commissioner to the Police and Fire
Department, and served two years as the Legislative Chair for the Wisconsin Association
of Black State Employees (WABSE). I am a member if the National Black Law
Enforcement Executives, and a Gulf War Veteran.

In February of 2002, I was appointed to the National Business Advisory


Committee in Washington D.C. As the chairman for Wisconsin, this national committee
is responsible for making decisions and advising the president regarding business affairs
across the nation, such as; Health Care, Tax Reform and Homeland Security.

November 25, 2002 bb IdentiSure, Inc. 5


I am a member of the national Bio-Security team. I have been asked to participate
in National Summit meetings and upon request have drafted security briefs for the FAA
and US Department of Transportation. By the invitation of the FAA and the US
Department of Transportation, I participated in the National Security Summit in Chicago
in February 2002, and in March of 2003, I was awarded the Businessman of the Year
Award by the National Business Advisory Committee in Washington D.C.

History – Political and Public Opinions

I see the Federal Government taking great strides to ensure our nations safety with
airline security. With all of the solutions introduced to the public, they all appear to still
have an ancillary tone attached.

In becoming an expert in the field of security for the last 15 years, I have gone
back to the basics to understand trends within the field and human behaviors that are
associated with these trends. For example: my administration employs security specialist
that we train in house. What we sell to our corporate and government customers is an
image. An image that is wrapped in a package that we the (Administrators) present, this
in addition to the services we offer. Actually what the customer buys is we - the
presenters. They buy in to the leadership of the organization and partner with their
vision, as it is most likely congruent with their own.

So the challenge that I or any other service industry business has, is hiring and
training employees to buy into the same sell the client does, understanding our
company’s philosophy, training and style. Our individual success is deemed on how well
we in the service industry accomplish this objective.

Our company has been fighting an uphill battle for over a decade. We have been
trying to educate government as well as corporations on the premises “You get what you
pay for”. Too many times we run into the potential client that wants the Cadillac package
but wants it at the Saturn price. Unless something happens that warrants an increase
spending for their security - then and only then will a change in their thinking occur?
Yet, these tend to be the same individuals that complain about having poor looking, low
skilled, low waged and poorly trained individuals contracted at their locations.

Many assume that an increased wage will produce a better worker or applicant.
In my experience, this is nothing further from the truth. Increasing a person’s wages only
makes a person that is already good in what they do or dedicated to their work feel
appreciated. Unless, you have a work environment that employs everyone that loves
their job, then the pay for the job is of no great issue to them. The monetary rewards
really do nothing for these other individuals. Monetary rewards for those whom are not
dedicated to their work, leaves you with a higher paid undedicated worker that is now
sticking around a little while longer because of the raise they just received. Many
workers stay with a job they do not like, are bored with or have no real dedication

November 25, 2002 bb IdentiSure, Inc. 6


because of the benefits they receive for themselves or their family. How do you sell
dedication as a part of the increased image to an employee?

Our research indicates as our community’s change so should our philosophy


regarding security services. What we have found is the opposite. We believe it has to do
with the trends of private policing vs. public police officers. In 1980, you could put a
body in a uniform; send them out in the community and people felt safe. A lot of times
you could put a retired person in this capacity and it was a good way to keep the retired
busy. Back then a watchman guard primarily walked a property and checked and locked
doors or had rounds, which they recorded as a specific timed checkpoint.

Later in 1990, there was a spike in private security services. Crime was on an all
time high, dangerous drugs were being reintroduced, juvenile delinquency was at an all
time high, unemployment was high and this was the beginning of gangs moving from
adults to teens.

With the gangs, came teens carrying and concealing weapons or firearms,
loitering issues, AODA issues, fights and no respect for any authority. Throughout the
90's as these teens grew up and became adults, the lack of respect for authority stayed
with them. A behavior of disrespect to police officers by the community was present.
Typically followed by a blatant disregard to security officers from the community.

Anyone in a uniform that resembled a police officer was an automatic target.


What we found - a police officer could not even approach someone in a helping manner
without someone getting defensive. Even worse a security officer was viewed as a joke.
The police despised private security because they felt they were not trained to deal with
the real issues of the 90's. In all actuality, in most cases they were right.

Today, this still is a challenge. Some security organizations have changed their
uniform to look less like law enforcement. In our company (APA), we also do not want
security abusing their authority because they are in a uniform that looks like law
enforcement. By altering the appearance of the uniform, our research showed this has
helped with the cooperation of police officers and the public tends to respond less
defensively. Until September 11, 2001 - overall the public and businesses generally felt
secure as a Nation. Many managers prior to Sept. 11th looked as security concerns as
nuisance or as an aside measure. This approach later showed how unprepared and
vulnerable we as a nation can be. If we are all striving for the same goal, we do not want
to have anything defeat us before we even get started. Many options have already been
presented to the public. Many have already failed.

One alternative security option presented to the public was making the current
airport luggage screeners federal employees. This plan over an aggressive course of 1.5
years was to have all airport security workers federal employees. Increasing their wages
and training in hopes to make them better, more effective or attentive in their roles. Thus
forcing many current screeners to compete for their existing positions.

November 25, 2002 bb IdentiSure, Inc. 7


If we look at this realistically, increasing the wage and benefits will allow those
federal employees currently at that wage to transfer into a position. But then you will
have a person that transferred into a security position with no security or screening
experience. The second option is, you allow those currently working, with the poor
image, attitude but with some (very little) luggage scanning experience, to compete. The
fact that they have already worked the position and have a familiarization with the
requirements will ultimately give them a leg up.

The last group to apply will be the general public. Here you might find some
great individuals, prior military, etc. However not enough to fill all the vacancies. The
best thing about this group of applicants is they have no pre-learned bad habits associated
with this position. This by far will be your easiest group to work with and train. The
downside of this group is that you do not know where their dedication and commitments
are, as well as not being aware of this group of applicant’s work ethics or work habits.

Hiring the wrong person(s) from this group can lead to a disastrous situation.
The only thing in the security service industry we cannot control is the wills and hearts of
these human beings that work for us. We don’t know what makes a person strive or fail
in this field. We have determined we can teach some skills to give them a better chance
at being successful while working in this field. We believe if you always do what you
have always done, you will always get what you always got.

So how does one ensure they do not get what they always got? It appears the
government has placed a great deal of focus on changing the people or type of person(s)
working airport security. As it is typical human nature to blame people when things go
wrong, but I do believe you are only as successful as the process in place. If something
does not work, don’t look to change your people first, look at changing and evaluating
your process.

During our survey, managers told us in an emergency situation the only thing
their security could do is pick up a phone and call for help. The more they thought about
it, the more they came to realize, anyone could do this and they really felt they did not
need to pay for someone to do this for them. This calls for a great training program.

Training continues to be a major concern foe everyone with a risk involved.


Thirty-four states do not mandate that anyone working in a private security capacity
need any formal training. However just because it is not mandated, does not mean any
company should put an untrained individual on a property – being responsible for the
facility, lives and safety of others. Not only should there be training to deal with public
safety issue, for your facility, there also needs to be facility/property training dealing with
fires, tornadoes, winter storms, parking, evacuation plans, public/private property patrols,
etc.

In addition to the training, poor communication with workers and managers


resulted in many concerns. It is also a frustration to a potential customer when they
cannot get in touch with a supervisor from the contracted company in a timely fashion. It

November 25, 2002 bb IdentiSure, Inc. 8


was a frustration to the security employee who had no contact with a supervisor during a
second or third shift for both parties involved. No employee should be left alone
unsupervised.

Everyone we spoke with requested well-trained, well-groomed, well-mannered


higher end security staff. However, they all wanted it at the pay of the lower end. Today
organizations do understand that quality costs. Government organizations are slowly
moving away from the old bidding processes. Usually getting stuck with the lowest
bidder and the lowest level of service. They have learned the hard way you may not get
the quality you seek being forced to choose from the lowest bidder. If all a client or
service purchaser is looking for is a change in service providers, simply changing the
uniforms will never fix the problem, because the people typically remain at the same
level or caliper. A complete overhaul and upgrade in the process to include training and
wage increases is the only way to achieve this goal.

What protective measures are being done today or tried yesterday?


Policing, whether public or private, primarily exists for selected individuals to do
things that most people don't want to do for themselves. The work is always stressful,
exciting, dangerous and boring. Police are the most visible symbol of authority in any
government. Citizens rely on them to perform a variety of functions, such as catching
criminals, preventing crime, keeping the peace, maintaining order, interpreting the law,
making people feel good, knowing the answers to miscellaneous questions, and in
general, keeping things on an even keel. It was Ramsey Clark who once said, “Police
officers have to be a lawyer, scientist, medic, psychologist, athlete, and public servant".

Undoubtedly, police are a conservative institution because their mission is so


closely tied into maintaining the status quo. It's not that they preserve the status quo at all
costs or lack any innovation; it's just that successful accomplishment of their mission is
driven toward an idyllic, almost utopian, society of yesteryear -- a communal, crime-free
society where people settled minor disputes peacefully between themselves. It's doubtful
if societies like that ever existed and debatable if the ultimate function of policing is to
put itself out of business, but the point is clear -- police are expected to do the impossible
and always do it efficiently -- that are, with limited resources.

The roles that police play have an intimate connection with the idea of a free and
open society. They must always be shining examples of the judicious use of power. The
police have many powers, from the right to know more information about citizens than
the average person needs to know to the right to bully people around without any
backtalk when it's necessary. How wisely, or judiciously, they use these powers is the
primary determinant of how free and open a society is. Whether they know it or not, the
police are the guardians of human rights, but they must operate in a political environment

November 25, 2002 bb IdentiSure, Inc. 9


where others (politicians and judges) get to determine whose rights and what rights are
most important for a stable democracy.

There are approximately 18,760 total police agencies in the U.S. with
approximately 940,275 employees and a combined annual budget of about $51 billion
(year 2000 data). There are approximately 60 different federal police agencies, and most
of them are in the departments of Justice or Treasury. There are 26 agencies called
Highway Patrol and 23 agencies called State Police (Hawaii doesn't have a state police
agency per se, but a Department of Public Safety). Thirty-five states have additional state
agencies with limited purpose or special investigative powers. There are 3,088 sheriffs
departments in the U.S. There are about 15,000 municipal police departments in the
U.S. No other nation in the world has ever had as many different types of police
departments as the U.S., a fact that means no two police agencies in America are
structured alike or function in the same way.

The federal agencies are specialized, having specific mandates to enforce certain
types of federal laws (there are only about 200 federal crimes). They are also starting to
station their agents overseas, in efforts to deal with the growing problem of transnational
crime. The top five largest agencies (in terms of sworn officers) are the INS
(Immigration and Naturalization Service), BOP (Bureau of Prisons), FBI (Federal Bureau
of Investigation), Customs, and the Secret Service. No federal police agencies have
peacekeeping or order maintenance duties typical of local law enforcement. No federal
police agency, not even the FBI, is considered a "national" police force. The following
table contains some selected examples of how federal agencies function:

INS: Monitor and control the flow of immigrants by patrolling borders and
territories; apprehend, charge, and deport aliens who have entered the country
illegally and violated naturalization laws. The southern border with Mexico is a
violent place, and the "soft" border with Canada raises national security concerns.
Since 9/11, the INS plans to add 1,000 new Border Patrol agents a year until 2008.
FAA: The Federal Aviation Administration is poised to become the nation's largest
federal police agency with plans to hire between 15,000 and 20,000 Air Marshals as
quickly as possible. This would make them as large as or larger than the INS, which
along with the U.S. Marshals and Customs, is helping provide necessary security and
profiling on aircraft.
FBI: Leadership in investigations over terrorism, espionage, organized crime, white
collar crime, and selected federal drug offenses; assist state and local agencies thru
training, information databases, fingerprinting, DNA, and laboratory services;
operate legal attaché offices in 57 different countries.
DEA: Enforce national drug laws and assist other federal and foreign agencies in
combating illegal drug manufacture and trade on an international level; also enforce
the Controlled Substances Act, which includes prescription drugs; operate a network
of regional laboratories to test and categorize drugs; provide state and local agencies
with access to those labs; register physicians who can prescribe drugs.

November 25, 2002 bb IdentiSure, Inc. 10


ATF: Police the illegal sale, possession, and use of firearms, explosives, bombs, and
untaxed tobacco and liquor products; also enforce the Gun Control Act on the sale
and trade of firearms; also enforce federal gambling and wagering laws; form
multijurisdictional task forces to investigate drug crimes involving firearms.

The state agencies were created for four reasons: (1) to assist local law
enforcement; (2) to investigate cross-county crime; (3) to provide a law enforcement
presence in areas that have no local or county presence; (4) to break strikes and control
labor movements. For many years, the state police were the personal tool of governors,
but evolved into general all-purpose law enforcement. Some of the earliest state agencies
were the Texas Rangers, which from 1835-1874 was just a mercenary army, and the
Pennsylvania Constabulary, formed in 1905 and recognized as the first modern state
police force. By 1925, each state formed either a state police force (centralized all-
purpose policing) or a highway patrol department (with separate bureaus of investigation,
identification, crime labs, alcohol and drug control, and driver’s license examination).
All state agencies administer computer systems that link up with federal computer
systems, and most concentrate on criminal violations that occur on state property,
including roads and highways.

The county agencies are usually run by an elected sheriff, and consist of sworn
deputies, civilians, and special deputies (part-timers or private security personnel are
sworn in for crowd control or special purposes). They perform a wide variety of
functions, including the investigation of crime, traffic enforcement, civil process paper
service, courtroom security, and confinement and transport of prisoners. Some county
jails house hundreds and thousands of prisoners.

For example, the Los Angeles County Sheriff's Department employs over 3,500
employees in its custodial division alone. The elected nature of the sheriff's office has
both advantages and disadvantages. Sheriffs generally have a freer hand in running their
agencies than police chiefs, but partisan politics sometimes intrudes - as doe’s political
patronage. Seventeen states have done away with or are doing away with the election of
sheriffs. County agencies often lack jurisdiction over cities and towns, their authority
being relegated to unincorporated areas or small towns that have no police forces of their
own.

The municipal agencies are a category that would include specialized groups such
as campus police; capitol police and transit police are an example of "local" law
enforcement. The U.S. is a nation of small, local police forces. Every incorporated
municipality in the U.S. has the authority to create its own police force. Small
communities hire only one officer, others about five officers, and the national average
size is 10 full-time officers. Some communities with no police force of their own make
contracts with private security or a sheriff's office. In stark contrast are large agencies
like the New York City Police Department with over 40,000 employees. Municipal
agencies are the workhorses of U.S. law enforcement, and have broad authority to
apprehend suspects, maintain order, and provide community services. Duties range from
investigating homicides, burglaries, and thefts to intervening in domestic disputes to

November 25, 2002 bb IdentiSure, Inc. 11


responding to noise complaints or chasing bats out of a caller's house. It is sometimes
said the acronym PEPPAS best describes the functions of municipal police:

P -- Protect life and property (via patrol, crime scene control, recovery of stolen goods)
E -- Enforce the law (via warnings, tickets, complaints, and seizures)
P -- Prevent crime (by giving advice, directed patrol, or through DARE programs)
P -- Preserve the peace (visibility, disband disorderly groups, neighborhood intervention)
A -- Arrest violators (apprehend suspects, conduct raids, stings, and other crackdowns)
S -- Serve the public (give directions, first aid, and emergency services)

Everything listed above, is exactly what today’s professional security organizations are
training for or are already providing services that meet or exceed the capabilities of some
law enforcement agencies.

The Private Security Past


On average, the private security sector is twice (2x) as large as the public law
enforcement sector. There are four times (4x) as many personnel, and spending is 73%
higher than for public law enforcement. It's also a more efficient sector, on average,
producing about twice as much a drop in crime that the public sector is capable of. In
1987 I wrote a program called the (P3 Program) private property patrol for my
community. This program used private security personnel that worked in conjunction
with law enforcement to patrol by foot – high crime districts or neighborhoods. The
program within six months reduced the crime in the selected site by 60%. Our local law
enforcement used this program with a few modifications and turned it into our cities blue
blanket program. This was the first time documented that local law enforcement and
private security partnered for a joint effort combating crime, drugs, gangs and all public
safety concerns.

The U.S. Department of Labor has long classified private security as one of the
fastest growing industries in the country. The first private agency was started in 1860 as
the Pinkerton National Detective Agency, and today includes over 4,000 separate
agencies, the big ones being Pinkerton, Burns, Wackenhut, Guardsmark, Wells Fargo,
Allied and APA, and a number of more bodyguard-oriented firms with names such as
APA, Globe, Trojan, and American Protective Services. The big firms are involved in
everything from department store loss prevention to shopping mall, hospital, and nuclear
security. There is a growing proliferation of bodyguard firms. In addition, there are
about 40,000 private detectives and investigators in the U.S., and a growing number of
bounty hunter firms.

The greatest good for the greatest number – How do we get there?

America’s first line of defense in any terrorist attack is the “first responder”
community-local police, firefighters, emergency medical teams and private security
professionals. Properly trained and equipped first responders have the greatest potential
to save lives and limit casualties after a terrorist attack. Currently, our capabilities for
responding to a terrorist attack vary widely across the country. Many areas have little or

November 25, 2002 bb IdentiSure, Inc. 12


no capability to respond to terrorist attack using weapons of mass destruction. Even the
best prepared States and localities do not possess adequate resources to respond to the full
range of terrorist threats we face.

The President’s 2003 Budget proposes to spend $3.5 billion on enhancing the
homeland security response capabilities of America’s first responders-a greater than 10-
fold increase in Federal resources. This initiative will accomplish the following
objectives:

Provide the first responder community with much-needed funds to conduct


important planning and exercises, purchase equipment, and train their personnel.

Provide States and localities with the flexibility they require to ensure that the
funds are used to address the needs of their local communities.

Establish a consolidated, simple, and quick method for dispersing Federal


assistance to States and localities.

Encourage mutual aid across the Nation so that the entire local, State, Federal, and
volunteer network can operate together effectively.

Establish a process for evaluation the effort to build response capabilities, in order
to validate that effort and direct future resources.

Encourage citizens to participate actively in preparing their communities for the


threat of terrorism and other disastrous events.

To achieve these objectives, the Federal Emergency Management Agency (FEMA)


will implement a streamlined and simple procedure designed to speed the flow of
resources to the States and localities. The funds may be used for the following types of
first responder activities:

Planning: The program will support State and local governments in developing
comprehensive plans to prepare for the respond to a terrorist attack.

Equipment: The program will allow State and local first responder agencies to
purchase a wide range of equipment needed to respond effectively to a terrorist
attack, including personal protective equipment, chemical and biological detection
systems, and interoperable communications gear.

Training: The First Responder Initiative will also provide resources to train
firefighters, police officers, security personnel and emergency medical technicians
to respond and operate in a chemical or biological environment.

November 25, 2002 bb IdentiSure, Inc. 13


Exercises: The program will support a coordinated, regular exercise program to
improve response capabilities, practice mutual aid, and assess operational
improvements and deficiencies.

Strengthening all first responder communities will make our nation safer. Nearly four
million private and public first responders regularly put their lives at risk to save lives of
others and make our communities safer.

Hundreds of firefighters, police officers, security personnel and emergency medical


workers gave their lives on September 11th as they worked to save others. A state level
First Responder Initiative will help these brave Americans do their jobs better. Building
on existing capabilities at the Federal, State, and local level, the First Responder Initiative
provides an incentive to develop mutually supportive programs that maximize effective
response capability. Through joint planning, clear communication, comprehensive
coordination, mutual aid at all levels and increased information sharing, America’s first
responders can be trained and equipped to save lives in the event of a terrorist attack.

The benefits of building up our first responder capabilities are immediate and
widespread-making US safer from terrorist attacks while also bolstering our everyday
response capabilities.

Knowing or controlling of movement of people: (Stopping terrorist at the door)


Al Qa’ida preparations for terrorism have continued in past months and at least some
of the plots appear ready for implementation. Based on past experience, the most
attractive targets to Al Qa’ida leaders would be strikes against:

The transportation or energy sectors, which they have regarded as key to U.S.
economic health.
Facilities or gatherings that would be recognized worldwide as symbols of
American power or security. (For example, U.S. military facilities and U.S.
Embassies, monuments and U.S. Icons).

Many individuals and groups specialize in hurling accusations of racism, and


police become vulnerable to such accusations when they concentrate their efforts where
crime is. If public accusations begin to control policing (which it has), ultimately public
safety will suffer. In short, politics, policy and public opinion should never precede
people. Especially when it is the publics’ safety that is involved.

If we truly wish to secure the public while traveling, we must first know whom
we are securing and exactly what from? Listed below is some travel information we can
use as a base. This information was gathered from the CIA World Fact Book 2001.

November 25, 2002 bb IdentiSure, Inc. 14


Total Domestic U.S. Person-Trips, 2001 1017.8 Million
Purpose of Trip
Leisure Travel (Pleasure, Personal) 76%
Business/Convention 13%
Combined Business/Pleasure 8%
Other 3%
Modes of Transportation Used
Auto, Truck, RV 74%
Airplane 17%
Bus 2%
Train/Ship/Other 4%
Rental Car (Primary Mode) 3%
Top Activities for Domestic Travelers
Shopping First
Outdoor Activities Second
Visiting Museums and/or Historic Sites Third
A person-trip is one person traveling 50 miles (one way) or more away from home
and/or overnight. A trip is one or more persons from the same household traveling
together.
Source: Travel Industry Association of America; Travel Scope

U.S. Resident Travel Volume 1994-2001

Domestic U.S. travel in the U.S. has increased 8 percent from 1994 to 2001, slightly
lower than the 9 percent increase in the total U.S. population during the same period.

Total U.S. Domestic Travel Volume in


Millions of Person Trips*
1994 941
1995 966
1996 967
1997 999
1998 1004
1999 987
2000 998
2001 1018
A person-trip is one person traveling 50 miles (one way) or more away from home
and/or overnight. A trip is one or more persons from the same household traveling
together.
Source: Travel Industry Association of America; Travel Scope

November 25, 2002 bb IdentiSure, Inc. 15


So how do we balance privacy, liberty and security with the use of technology?
The public may not demanded it, government can't be the one to regulate it (Political
action, may urge action not compatible with a scientific, practical or logical response),
there's probably no court that will mandate it, and because of the cost involved the
technologists will not willingly offer it. This is why the answer can only be offered from
the private sector. Preferably someone who understands security from a state, national,
and a global perspective.

There have been any attempts already to create this balance the most recent
attempt tested is the naked machine. In Orlando, FL a 3-D holographic imaging machine
called the naked machine allows passengers traveling to pass through this device. This
machine does reveal plastics and ceramics that might be hidden on the body. Passengers
are given a voluntary choice to go through this first to expedite the checkpoint process, if
they choose to go through this machine; they are actually viewed being naked. Some
look at this as a privacy violation, but people generally felt safer with the naked machine.
Studies have shown, there is a psychological need to feel safe, then actually being same.
Most people fear the risks they can't control.

12/30/02 I recently traveled through Orlando’s airport. As I went through the


second security checkpoint in Florida, just prior to boarding the plane, I was flagged as a
passenger to have an additional screening. My process was the following; I was taken 5
ft for the line to a seating area, I sat in a chair and removed my shoes, which a metal
detection wand was placed over and under them, I them was asked to stand up so I could
have the same metal detection go over my body.
As this process was being conducted I asked what was the security purpose for
wanding my shoes? The reply was Sir, this is just procedure and we have to do this.
These are things that just keep us all safe. So I asked again, how does this keep me safe?
The end result was they could not answer my question. The entire security team was not
sure either. If the workers do not believe in what they are doing is actually making a
difference, eventually the process will start to show its’ flaws.

Another example is looking at London England they have 2.5 million cameras
scattered in London. These cameras are mounted all over the city. The average person is
captured a 300 times a day moving about the city. Taking pictures or images of a face
and stored in into a blob database, for face recognition security. This type of security is
comparable to those working at a fixed post.

Taking this concept to a step further, the United States government is now
attempting to categorize people so they can that they capture and store specific data on
specific groups of people. This is nothing more than the profiling of American citizens,
or the profiling of the people within America. As my opinion, this attempt will get us
into trouble and most likely in a number of lawsuits against the government, which in
turn will cause Americans to pay for it later through taxes.

November 25, 2002 bb IdentiSure, Inc. 16


A look at the private security future

Once again history repeats itself, this time an element with a new twist. The
developmental placed security forces seem to follow no predictable pattern of the past
except the industry developments were traditionally in response to public pressure for
action. The slow development of public law-enforcement agencies, both state and
federal, combined with the steady escalation of crime in an increasingly urban
industrialized societies, created security needs that that by what might be called the first
professional private security responses in the second half of 19th-century.

There's always an intimate link between cultural and social change crime, just as
there is between crime and security measures adopted to combat threat. All the social
and economic causes are cited for the rising crime in this era. Among them is the erosion
of family and religious restraints, the trend toward permissiveness, the decline in feelings
of worker loyalty toward the company, and a general decline in morality accompanied by
the position of young workers entering the workforce that there's no such thing as right
wrong but rather only feels good or what do I get.

In addition to the cultural and social changes being very significant is the
realization that crime in our society prevents the criminal justice system by itself to
adequately control or prevent crime. Citizen fear of crime and the awareness that the
criminal justice resources alone cannot effectively control crime has led to the growing
use of the individual and corporate protective measures, including private security
services and neighborhood based crime prevention.

The private security industry is now on America's blueprint for public safety. It
no longer can be looked at as an irrelevant force. It must be professionalized in all areas -
as it has great importance to law-enforcement as well as the communities they serve. The
private security industry makes significant contributions to crime control and corporate
maintenance. The private security industry must develop opportunities for improved
cooperation and coordination with the regular working relationships between security and
law-enforcement agencies.

The BBC Answer:

The government sponsors periodical analyses of private security via reports


written by Hallcrest Systems called the Hallcrest Reports. Private policing is tailored
policing funded by the guard organization rather than by public money. Many wealthy
neighborhoods and suburbs in America also have their own private police force. Private
security services are commonly classified as either contract or proprietary. Contract
security is fee-for-service/extra protection, such as that provided at sporting events or
dignitary protection during a trip. Proprietary security is the ongoing provision of an in-
house security staff which act as the company's own security staff. The qualifications
and salaries of proprietary security personnel are generally higher than those of contract
security officers.

November 25, 2002 bb IdentiSure, Inc. 17


Although many superbly qualified people work in private security, the vast
majority has less training and education than police officers. In most states, for example,
becoming a private security officer requires little more than a weeklong training course
and a practical firearms proficiency test. There are other issues too, with police officers
"moonlighting" in private security, and concerns over the few constitutional limitations
that private security operates under. The notion of diminished public responsibility
adequately sums up many concerns about private security. Law Enforcement and federal
agencies need help.

The police spend a lot of time handling mundane incidents and poring over a great
deal of paperwork. Actual crime fighting is a rare activity, and there's plenty of
unsupervised time, which allows for discretionary decision-making. The irony is that the
lowest paid employees, with the least amount of authority, do most of the work and make
the most important day-to-day decisions. This is typically the same in the security
industry. There is a good deal of debate over how to make police or security more
effective, how they should use their discretionary spare time, and what responsibilities
should be given priority. As an organization, police agencies have been unreceptive to
many efforts at reform. Since Sept. 11th 2001 and now clearly understanding the first
responders are, police and security must now look at ways to collectively reform and
standardize processes so they can work together.

For example, many people believe that the military chain of command structure is
dysfunctional for police work because it inspires fear, impedes communication, and
inhibits good community relations. Attempts to change the military structure have met
with great resistance. Another area of reform involves experimenting with the source of
executive authority in the police chief position, removing political interference from
mayors, managers, and city councils. So far, nothing has been found that works at
eliminating the last vestiges of politics from policing. There is also the issue of
educational qualifications. Most experts would say that the variety of skills expected of
police should require a graduate degree, yet employees with an average high school
degree and “some” college characterizes the field. Better educated, and more women and
minority officers would go a long way in accomplishing the police mission.

The police responsibilities include crime fighting, crime prevention,


peacekeeping, and providing service. These require the police be extremely
knowledgeable about criminal nature (if not human nature), be able to detect a threat to
society and take reasonable action to prevent that threat from maturing; be able to make
trustworthy decisions that "fix" or "handle" complex, peacekeeping situations; and
provide numerous types of assistance in areas that are not ordinarily police business. All
these, and the ability to protect oneself and others from danger, are in a nutshell the
police responsibilities. We have forced our police to be more customer service oriented.
Americans want their public safety protectors to be friendly and courteous. Why?
Because rude gets you sued.

This behavior almost handed down to the security industry has caused everyone’s
focus and emphasis to change. Thus losing site of our primary mission to protect first.

November 25, 2002 bb IdentiSure, Inc. 18


Not to their fault, but of our own - this is my view as to how police agencies (local, state
and federal levels) nation-wide has developed an ancillary approach to their tasks and
responsibilities.

The Plan or Perceived Goal: 100% Positive Identification

We must now recognize the inevitable fact that the private protection service
industry has a legitimate role in crime prevention and property protection. It has not been
lost on the private security industry that recent government reorientation, which includes
finding alternative ways such as privatization to deliver government services, is an
opportunity for expansion. In addition to such usual functions as property protection and
property crime prevention, private security companies are now offering quasi-police
services in both low-income housing projects and affluent neighborhoods, acting as
municipal law enforcement officers, and carrying out complex white-collar crime
investigations. The result is that they where formerly or are largely confined to property
matters, they are now assuming responsibilities that put them into situations where they
have some control over the public.

This new role challenges the common view of private security, blurs the
distinction between private security and public police and raises questions about the
desirability of private security assuming functions normally performed by public police
officers. Thus the expanding role of private security is viewed as something of a threat to
the status and authority of the public police. The evolution of governance and policing
make it certain that the roles of both public police and private security will change.
Neither is likely to disappear. What is now important is how, in changing circumstances,
the two different approaches can be used to the maximum advantage of society without
impeding the evolution of either.

Society is thus becoming a network of inter-connecting responsibilities and


authorities influenced and supported by networked information technology systems.
Policing in this context is no longer the sole domain of agents appointed by the state. Nor
is it restricted to the notions of crime, justice and law enforcement, but encompasses
broader concerns of security, safety and risk. Policing, by this definition, includes any
measure taken by an institution or agency to protect safety, ensure security and order or
minimize risk. Policing has thus become everybody's business.

Information technology, by which much policing will be done in the future, is an


influence in broadening this notion of policing. It automates and standardizes the
provision of information so that people can adjust their behavior to conform to what is
required of them at any particular moment to ensure safety and security and to minimize
risk and it prevents incidents occurring, thereby reducing the need for police intervention.
Such technological security systems require skills and knowledge different from those of
public police officers and are managed and operated by private sector expertise.

November 25, 2002 bb IdentiSure, Inc. 19


There is some technology in use today by law enforcement that could be learned
and shared within the security industry. Technology such as: The Automated Fingerprint
Identification System (AFIS). AFIS is a biometric identification (ID) methodology that
uses digital imaging technology to obtain, store, and analyze fingerprint data. AFIS was
originally used by the U.S. Federal Bureau of Investigation (FBI) for criminal cases.

Today, it has gained favor for general identification and fraud prevention.
Fingerprinting, as a form of personal identification, is a refined methodology that is
proven in practice and accepted in courts of law. AFIS itself has been around for more
than 25 years. Recently, a more advanced form of AFIS uses a process called plain-
impression live scanning.

We are designing somewhat of a portable AFIS system that can maintain


databases of tens of millions of finger images and process hundreds of thousands of
fingerprint transactions daily within seconds. Coupled with a photo display for additional
verification, the US now could regain control with travelers exiting and/or entering our
country, by 100% positively identifying who these travelers are. We call this the
“Identifly” system.

November 25, 2002 bb IdentiSure, Inc. 20


November 25, 2002 bb IdentiSure, Inc. 21
With the ever-increasing demand for positive identification in the business and
government marketplace, the IdentiSure, Inc. “Identifly” system will bring proven
fingerprint technology to airport security via a computer laptop system.

With our plan we emphasize the importance of sound perimeter and travel
security, thorough a variety of access control procedures or clearances. The plan would
start out as a pilot program for 1 year working with business travelers only. Here the
traveler would (for a small administrative fee) be entered into our national system.
Applicant information will update in real time nationally. There are 170,000 business
travelers per year. We would pilot's program targeting those business travelers for a year
asking them if they would be willing to be a part of our experiment.

Upon arriving at the ticket counter, the traveler would take their “Identifly” card
and swipe it to activate the system, place his/her hand and upon handprint/fingerprint
scanner that is equipped with a gel pad, the prints will be read in the standard type ten
record within the FBI ANSI/NIST format. A picture or photo that was previously taken
digitally in color and stored on the database will appear on a screen with the fingerprints.
Our plan is to partner with a local airline industry to support and promote this plan.

We plan to convince business travelers and airline employees to agree to be part


of our experiment voluntarily. We would take the necessary information from them that
would identify them with specific levels of a security clearance for travel and access. A
background investigation would be conducted, an NCIC check would be conducted, their
fingerprints would be scanned, and the photo ID would be stored. Upon this information,
we then allow the people to clear that for travel/access, assigning a level of travel
security, print them all of travel identification “Identifly” card, which could be used in
linked card reader system across all participating United States airports.

The advantage that one gains by using our system would be eliminating business
professionals to have to go through unnecessary hassles of security checkpoints and/or
eliminating the time burdens of coming to an airport two or three hours in advance
wasting valuable business time. The “Identifly” system would allow the traveler to arrive
to the airport approximately 20 to 30 minutes before departure, swiped their card, place
their hand on the gel-pad fingerprint reader, which would pull up their prints and photo,
and 100% positively identify the traveler.

After identifying the security level of the traveler and showing them as a trusted
US citizen, thus allowing Mr. /Ms. Corp. Exec. cleared for travel. The traveler would be
allowed to go through the security metal detection center and other security checkpoints
without hassle. However, travel across the ocean, cruises or any travel outside of the US,
will require higher levels of security clearances.

Another area this program can be beneficial, is with cargo security within our
ports. Cargo security has been growing security problems since 1970, the Senate select
committee on small business estimated that almost $1.5 million was attributed to cargo
theft. The shipment of goods is vital to the economy and ultimately to the survival this

November 25, 2002 bb IdentiSure, Inc. 22


country. Since the 1970’s international transportation systems containers they can be
transported by truck or ship, and has developed to the extent that land bridges,
particularly in the United States, have been thoroughly established.

The security concerns for the safe handling of these goods belong to many
different groups: port police, state and local police, customs officials as well as other
federal authorities. With our proposed plan of being able to 100% positively identify the
airline, trucking, rail, luxury liner and cargo industry personnel, we should drastically
eliminate potential terrorist action/tampering and dramatically reduce dishonest employee
action.

Other Global uses of “IdentiSure”

November 25, 2002 bb IdentiSure, Inc. 23


Initial Application
and Card Issue
Process
Application
Submitted
Previously
Denied

Check for Central


Previous Identification
Application
Application Database
Fee Paid

Check for
Card
Fraudulent
Already
Acquisition
Exist?
Disposition Attempt
Sent to Database
Applicant
Background
Check

If Lost or Stolen
Check for Lost
Go To Reissue
Reasons for or Stolen Card
Process
Denial and
Offer of Appeal
No
Eligible for
Card?
Inform ation Populated to
Database and Card Activated

All Data
Yes Daily T ransmission of Centers
Smart Card Issues and Updated within
Card Issued Status Changes
24 Hours

November 25, 2002 bb IdentiSure, Inc. 24


Card Renewal Process
Renewal Notice
Issued 6 Weeks
Prior to Expiration

Check for Central


Verification of Identification
Renewal Application User Status Database
and Fee Submitted

Disposition
Sent to Database
Applicant
Background
Check

Reasons for
Denial and
Offer of Appeal
No
Eligible for
Card?
Inform ation Populated to
Database and Card Activated

All Data
Yes Daily T ransmission of Centers
Smart Card Issues and Updated within
Card Issued Status Changes
24 Hours

November 25, 2002 bb IdentiSure, Inc. 25


Card Replacement Process
Card Reported
Lost or Stolen

Check for Central


Verification of Identification
Identity Verified
User Status Database
Through Scan and
Key Word Search

Disposition
Current ID Sent to Database
Deactivated
and Flagged

Reasons for
Denial and
Applicant
Offer of Appeal
Background
Check

No Inform ation Populated to


Database and Card Activated

All Data
Eligible for Daily T ransmission of Centers
New Smart Card Issues and Updated within
Card? Status Changes
Card Issued 24 Hours

Yes

November 25, 2002 bb IdentiSure, Inc. 26


User arrives at
Airport for Card Use Process
Checkin

All Data
Individual Daily T ransmission of Centers
Travel Card Issues and Updated within
Profiles Status Changes
24 Hours
Updated

Central
Airline Verifies Identity
Identification
Using Smart Card
Database

Scan ID Confirmed
Boarding Pass Completed Cleared to Quick Carryon
Issued Fly Baggage Check

ID Not Confirmed
or Flagged by Airline or Security

User Proceeds
to Airport
Security
Extensive ID and Proceed to Gate
Passed
Carryon
Baggage Check

Print Scan and


ID Check Failed
Performed Boarding Pass
Revoked
Detained by
Security for
In Depth Check

November 25, 2002 bb IdentiSure, Inc. 27


Real-time network
with a 120 bit encryption triple
Level Backup Redundancy

Proposed Network Example

Finger Print Scanner


Identification
Station

Minneapolis

Intake Data
Intake Station
Sent to State/FBI
for Clearance
Finger Print Scanner
Identification
Station

Madison Location
Madison
Data Server
Data Center
High Speed Satatlight
T3 Backup

Triple Redundant
Fault Tolerance

Las Vegas Atlanta


Miami
Data Center Data Center

Los Angeles

November 25, 2002 bb IdentiSure, Inc. 28


Set Up Detail
Test Phase
Total Phase Cost $142,000.00
Step 1 Cost $36,500.00
Step 2 Cost $105,500.00

In House Test Phase


Step 1 Items Needed Cost Long term use Phase Cost
Dedicated Computer to house data base,
P4 2gRAM, High Speed NIC, $2,500.00In Hose Test Machine $36,500.00
FP Scanner $18,000.00Location Scanner
Software to include, Windows, Office, Transfer Data software
Data software, and communications to work machine, All else
software $5,000.00remains with machine
Minor Equipment Cost $1,000.00Stays with PC
Manpower to Build and test $10,000.00

Step 2 Airport Test Phase


Items Needed Cost Long term use Phase Cost
3 Computers for terminal management. Work Machine to stay
High End P4, 2 g ram, Durable Daily Use $7,500.00with project $105,500.00
2 additional FP Scanner $36,000.00Location Scanner
Data Server to Handel Data Transfer and Work Machine to stay
Recognition $5,000.00with project
Minor Equipment Cost $2,000.00Stays with PC
Software for new Machines $20,000.00Stays with PC
Employees to man Test $20,000.00
Database software $15,000.00

Cost per Station Total= $ 31,840.00


System $ 28,000.00
Manpower (2 employees per shift @ $10
and one site supervisor @ $12) $ 3,840.00

November 25, 2002 bb IdentiSure, Inc. 29


Implementation Detail

Airport Examples
ATL Atlanta Hartsfield International Airport Qty Cost Each Totals

Current Check-in Stations 21


Est. Scan Stations needed first year 6 $28,000.00 $ 168,000.00
Est. Manpower First Year $1,186,889.60
Maintenance Costs $ 16,800.00

ATL Total $1,371,689.60

MSN Madison Regional Airport Qty Cost Each Totals

Current Check-in Stations 3


Est. Scan Stations needed first year 2 $28,000.00 $ 56,000.00
Est. Manpower First Year $ 393,624.40
Maintenance Costs $ 5,600.00

MSN Total $ 455,224.40

Employee Costs Weekly


Level Hr. Rate # Stations Total Hours Admin % Total Cost
Atlanta Operators $ 10.00 6 2016 0.05 $20,764.80
Supervisors $ 12.00 3 120 0.05 $ 1,458.00
Site Maint. $ 15.00 1 40 0.05 $ 602.00
Atlanta Total $22,824.80
Madison Operators $ 10.00 2 672 0.05 $ 6,787.20
Supervisors $ 12.00 1 40 0.05 $ 482.00
Site Maint. $ 15.00 0.5 20 0.05 $ 300.50
Madison Total $ 7,569.70

Estimated Business Travelers to Destination


Volume Est. Ann. Rev Rev. Vs. Cost
Atlanta 750,000.00 $37,500,000.00 $36,128,310.40
Madison 50,000.00 $ 2,500,000.00 $ 2,044,775.60

November 25, 2002 bb IdentiSure, Inc. 30


Example (A) of a similar fingerprint system

November 25, 2002 bb IdentiSure, Inc. 31


Example (B) of a similar fingerprint system

November 25, 2002 bb IdentiSure, Inc. 32


Minimizing harm or resistances by maximizing the good

Despite many efforts to professionalize the field of private security, there still are
many that feel there are major obstacles that need to be overcome. The most persistent
arguments are the ones that have to deal with training and education of contract security
guards. In the past, (proprietary guards) guards hired directly by company used to be
better trained and received better pay than of their contract counterparts.

As I no longer support this opinion, it is my belief that today more and more
private security personnel are spending time to upgrade their resources, training and
technology to compete and in some cases with services offered, allowing security to
compete at the same level of law-enforcement. There are now today security forces that
provide services to the community that surpassed the capabilities with individualized or
personalized attention/service of their law-enforcement counterparts. However there are
not many of these organizations available nationally or globally.

Supporting the Cause for Homeland Security Effectiveness

If the broader definition of policing is used, then private policing is indeed in the
process of transformation. It is practiced by a wide variety of private, public and non-
governmental institutions that employ or contract agents to act on their behalf. Use of
private sector personnel to monitor infra-red traffic cameras, or to disseminate traffic
control information, mechanisms an organization puts into place to protect employee
health and safety, the collection of debts, electronic monitoring or camera surveillance of
all kinds, watching premises, public sites, or insurance claims forms, and even levying a
fine on an overdue library book can be regarded as policing. In this sense the distinctions
between the private and the public domain or between civil/criminal - administrative
matters disappear and public police become very much a minority among the plethora of
other private and non-governmental bodies.

An effective antiterrorism program requires sound intelligence on the nature of


the terrorist threat and an appreciation of the strengths and weaknesses of existing force
protection programs. DOD's combating terrorism program is part of a coordinated
United States government interagency team response. No single agency possesses the
authorities or response mechanisms and capabilities to effectively deter and resolve
terrorist incidents.

The Department of Defense plays an important supporting role in assisting the


lead Federal agencies in their response to terrorist incidents. Certainly as a major
supporting agency, DOD brings a wealth of unique resources to this effort.

Obtaining the background checks for the “Identifly” projects can be done in only
two different ways. The first being that the FFA directly obtain this information from the
FBI and supply it to us for input into our secure identification system. BBC would
reimburse the FFA via invoices generated for cost of information obtained.

November 25, 2002 bb IdentiSure, Inc. 33


The second option would be that BBC be assigned as a vendor for the FFA and we
directly obtain the background information on all new subscribers and periodic follow-
ups.

BBC, llc would partner with a variety of different airline carriers for the
“Identifly” identification project. This partnership would allow the airline and BBC to
co-exist at the same check-in point. The airline would promote the use of the “Identifly”
system as both a more secure way of scanning passengers and also as a time saver during
the check-in phase. This system could practically eliminate the waiting and delays of
anywhere from 2 to 5 hours time frames that are now being experienced at check-in.
This secure identification system will be a mainstay for carriers from this point on. To
initiate this project and encompass the vast majority of travelers as quick as possible we
will be compensating the airlines 10% of our initial sign on fee for every new passenger
enlisted within the first year. This amount will be paid on a timely manner directly to the
airline carrier.

Intelligence is critical to our success across all areas of combating terrorism components.

Recommendations

I recommend that US FAA/ US DOT/ FBI/TSA/Local Enforcement and the Military


jointly develop a computer interface through Triple “I” and IAFIS systems across the
county or develop another network for this purpose. The key features of the interface
would be these:

1. The Government suspected terrorist registry information would reside on a computer


data server accessible through airlines security checkpoints. The Identifly systems
would cross-reference this database.
2. This data server would be available 24x365, and sized to handle the data input needs
of responding to inquiries each day from law enforcement, security etc.
3. Transactions would be developed for the following purposes:

a) Coordinating index identifiers


b) Adding, changing, and editing traveler information
c) Query’s from pre-approved public safety officials (Determined by
Homeland Security)
d) Criminal background checks inquiries
e) Identification inquiries: For on the spot photo or positive Print-
verification

Additional Benefits:

1. Automate and enhance automation of registries.


2. Support automated inputs from corrections. (Once opened to the
public, convicted felons and certain criminal offenses would never be
allowed on this system)

November 25, 2002 bb IdentiSure, Inc. 34


3. Develop procedures and software to permit automated input to “III” or
any established FBI system.
4. Develop procedures and provide appropriate training to persons
responsible for airline public safety, inputting personnel safety data for
airline workers.
5. Establish an instant and complete "photo" identification capability.
6. Establish operating procedures to ensure that data in the registries are
accurate complete and secure.
7. Make registry data available for background checks at the airlines
8. Develop an audit, evaluate training, and participate at national/
regional/ local conferences and provide training/ public educational
sessions.

Marketing Analysis

With the safety of the American people on everyone’s mind our thought is to
initially target the transportation industry with this Secure Identification Program. Since
the travel industry stretches coast-to-coast and border-to-border we would be able to
encompass the greatest amount of people who would be at a potential risk.

When analyzing the transportation industry we would include in this sector all
modes of travel such as air, water, rail, and land. Our plan on introducing this program
would be through a variety of different venues and processes.

Air - Airports, airlines, reservation/travel agents


Selected Sites--Chicago, LA, NY, DC, Atlanta, Miami

Waterways - Cruise ships, international shippers, ports, fresh water supply


Selected Sites - Chicago, LA, NY, Seattle, Miami, Boston

Rail - Amtrak, freight trains, passenger trains

Land - “Over the Road” haulers, shipping companies, rental vehicles

Marketing Strategies:
Decide on target cities
Obtain listing of all companies associated with targeted location
Provide marketing disc to company
Obtain support of unions¹ associated with targets
Follow-up conversations and discussions
Site visit for demo or to close contract

The medical field would be another sector of business world that mandates
positive identification of an individual both for health reasons and to avoid fraud within
the system. We would promote the “Identifly” technology to hospitals, clinics, and

November 25, 2002 bb IdentiSure, Inc. 35


outpatient facilities within our designated target area in the same manner as done with the
transportation industry. Positive identification within this industry would also have the
ability to reduce lawsuits and in turn reduce health care cost because of lower malpractice
cost to providers.

Being able to ensure the identification of a person when it comes to “money”


industries is a major selling advantage for the security system that we have. Credit Card
companies, banks, credit unions, investment companies would all benefit at being able to
verify a person identity before a transaction took place. The verification would ideally
eliminate the potential of loss for both the companies and their investors. We would not
only approach this establishment in a similar mode as above but we would also show
them how they could use this tool with their top business customers. We would
implement a process where we would let our customer sell in turn to “their’ loyal
customer. Big business would see the advantage of always knowing whom they are
dealing with.

Another area that we would target would be the education arena. There are
multiple foreign students in our school systems. We would market this to
schools/universities so they would have the ability to track student attendance. This
would be presented to administrators and school boards in selected cities as an issue
where they could lessen their liability.

The final piece of our target market would be to the government. The U.S.
government probably has the greatest need to be able to track people’s movement. With
the vast entities, department, and multiple locations that are combined within this
establishment a positive identification system is a necessity. Our presentation to the
Homeland Security Administration will be a hands on demonstration and discussion on
the unlimited uses now and in the future that this system has in regards to positive
identification, time savings, and a secure technical system.

¹International Union of Industrial and Independent Workers


US Airways MEC and the Air Line Pilots Association
National Air Traffic Controllers Association
Brotherhood of Locomotive Engineers
United Transportation Union
Banking, Insurance & General Workers Union
American Federation of Government Employees, AFL-CIO

Desktop Operational Testing (Diagrams and Flow Charts)

Terrorists are like a virus; the only way to control them is to contain them. Once
they are contained within, you control the movement by isolating their spread. The
United States can't do anything about controlling the terrorist’s cells in the United States
today, but what can do is contain or control their movement. It's pretty unlikely that any
terrorists in this country will be willing sign up for our system. But eventually, all

November 25, 2002 bb IdentiSure, Inc. 36


terrorists will need to leave the country to obtain training or to gain additional resources.
If our system acts as a preventive measure, then we are already headed in the right
direction.

Choosing not to go on our system, would automatically flag a person to go


through a higher security process or whatever other means is available for travel. This
flag will allow high level of scrutiny to be activated when traveling without having
specified clearance for travel. Let’s us keep in mind that once a person leaves our
country, you'll know who they are when they left, and anyone coming into the country
with our system or without our system - will be identified right away. If there are on our
system - we have achieved a 100% positive identification as to whom they are, where
they came from, where they're going, and what level of travel security they have. If they
are not on our system, they'll be subject to high levels of scrutiny and may be denied
access into the country.

There are anywhere from a few members to 700 terrorist groups around the world,
totaling about 3000 members. 10 percent of those extremist groups are in the United
States. In the last few years, terrorist organizations have shifted their targets from
government to business. Despite this vulnerability, the cost of the additional security
measures must always be justified because businesses are profit oriented. The creative
use of private security, human resources, and technology may be the one viable option
left to control crime or terrorist crime within our communities

Transition and Implementation

The “Identifly” system being as portable as it is, can be put in all airports,
trucking companies, cruise ships, ports, U.S. Customs, etc. uses of misinformation must
be maintained privately what can be shared if necessary. Government cannot have
involvement in the process because it will give the appearance of “Big Brother”. To
maintain the integrity of the program and the database, limited levels of access control
will be applied. Multiple levels of encryption code will be applied to secure the
environment. A triple level of redundancy in a minimal of three locations will minimize
any downtime or loss of data.

With badge systems of the past, personal identification of employees by a


receptionist or trusted employee was adequate protection against intruders entering. This
type identification operation has proven to be very inadequate. The opportunity for error
is simply too great. A more practical generally accepted system is the use of access
badge identification cards. This system should designate when, where, how, and to
whom passes should be displayed. There also needs to be an understanding of process of
what is done in case of a loss badge/access pass, procedures for retrieving badges from
terminating employees, and a system for the cancellation and the reissue of all badges or
access passes.

November 25, 2002 bb IdentiSure, Inc. 37


To be effective, badges must be tamper-resistant, which means they should be
printed or embossed on a distinctive stock with graphic signs that are difficult to
reproduce. They should contain a clear recent photograph of the barrier, in color. The
photograph should be updated every two to three years or there is a significant change in
the person’s appearance. It should be printed with a thumbprint and/or additional
information for added for security. For our “Identifly” system we really recommend a
single pass badge process for pre-approved travelers/employees. This would be a coded
authorization to enter specific areas to pass security checkpoints. All travelers will
maintain this authorization until it is renewed annually.

If a traveler loses their Identifly identification, loses their flight tickets, loses their
credit cards, or loses their personal identification, we will be able to offer help at our
airport centers where a person can obtain a re-issue identification for travel and
deactivate the old card free of charge. All a person has to do is go through the same
process mentioned above by placing their hand on the scanner to positively identify the
individual, and then a new identification card can be printed in seconds. This same
process should also be utilized for employees who work within the travel industry,
transportation-shipping industry.

Employee honesty is a control variable, and how much control is necessary


depends on the degree of honesty of each individual. An individuals’ honesty can be
evaluated by assessing the degree of two types of honesty - moral and conditional. Moral
honesty is a feeling of responsibility and respect that develops during an individual's
formative years this type of honesty is subconscious. Conditional honesty results from
feeling the potential consequences of being caught. If the decision or actions is made
without a conscious decision, it is because of subconscious moral honesty, but if the act is
based on the conscious consideration of the consequences, this act results from a
conditioned honesty.

Unfortunately there's no sure way by which potentially dishonest employees or


travelers can be recognized. Proper screening procedures can eliminate applicants with
unsavory past, unstable, unsuitable or deemed possibly untrustworthy. As I have
mentioned before, “The one thing the private security industry can not control is the
hearts and wills of human beings”. But we can control the movement of people within
our walls and boarders.

Monitoring, Backups, Reports and Reviews


For successful partnering, once every quarter, intelligence meetings are conducted
where police and security executives discuss crime trends, repeat offenders, problems and
potential solutions in their jurisdiction. The partnership is a successful one not only
because it saves police/government resources but also because this private entity becomes
a primary non-threatening tool to gather and share pertinent information with its
counterparts.

November 25, 2002 bb IdentiSure, Inc. 38


Summary
My entire life I have maintained an attitude of placing service before self. It is
my personal challenge everyday to try to make a difference either personally or
professionally. I have been very blessed to be able to help and assist many people in my
career. My greatest accomplishment however, (which too is a blessing) is finding and
putting together the team that I have working with me.

Our government has acquired and maintained a superior reputation within the
public safety and transportation industry for providing quality service within our country.
This achievement has established our nation as the leader and has placed us in a strong
global competitive position to initiate upcoming changes within the public safety and
transportation industry across the planet.

As a professional planner and security expert consultant, I would like to present a


demonstration or facilitate an Executive Level discussion in order to implement the further
research and planning teams so we can gain cooperation and support from key government
agencies/officials, joining our efforts addressing our national public safety and
transportation concerns. I am best reached M-F between 9am and 3:00pm central standard
time at (608) 222-3804. My Fax Number is (608) 222-4649. Please send me a response or
a letter to the address indicated above.

November 25, 2002 bb IdentiSure, Inc. 39

Вам также может понравиться