This publication is now archived.
Security experts emphasize that the “war on terror” is a different sort of conflict than wars past. Nevertheless, at least one commonality links the current struggle to previous wars: an army of private contractors has emerged to supply both governments and private companies with the products and services needed to make fighting more efficient. According to Homeland Security Research Corporation, a consulting firm, the U.S. market for homeland security products and services was $23.8 billion in 2006, and barring any future attacks, that figure is expected to increase roughly 50 percent by 2011 (PDF). Fueled by voracious government and private sector demand, this booming business features a bevy of cutting-edge products designed to perform new functions.
Technology on the Front Lines
The array of homeland security technologies is as varied as the perceived threats to national security. Industry experts and market analysts generally agree that the following sectors will likely see an influx of technologies in the coming years. They are listed in order of spending projections (PDF) from the Civitas Group, a security consulting firm.
- Domestic and Foreign Intelligence: Though much of the intelligence community’s technological needs are classified, experts anticipate a growing demand for data-mining software and improved devices for intercepting communications signals. With information fed in from such sources as overseas operatives and local police, tools that can compare and analyze multiple information streams are also sought.
- Law Enforcement and Counterterrorism: Among the 9/11 Commission recommendations seized upon by the 110th Congress is the need for improved, interoperable communications systems for law enforcement officers and first responders. With the advent of fusion centers at the state and local level and the Office of the Director of National Intelligence at the federal level, communication across agency lines has become increasingly important.
- Border and Physical Security: Renewed focus on border security and infrastructure protection has fueled a growing demand for physical security. This includes a combination of barriers, patrols, and surveillance. Computer networks that integrate these various elements promise to improve security and lower costs.
- Biological, Radiological, and Chemical Agent Prevention: Though originally focused only on acts of terrorism, this area of research has expanded in recent years to include natural hazards, such as bird flu. Demand is greatest for detection devices, which would provide early warning of a chemical, biological, or radiological hazard, as well as vaccines that would be deployed in response to an attack or outbreak. Products that can lock down radioactive particles to facilitate clean-up are also sought after.
- Emergency Preparedness and Response: In addition to such technologies as communications systems or vaccine stockpiles, emergency response professionals have identified a need for improved command and control systems that provide greater situational awareness in the immediate aftermath of a terrorist attack or natural disaster.
- Aviation Security: Aviation security underwent a thorough review in the wake of the 9/11 attacks, but the Civitas Group suggests the initial wave of spending has subsided and will resume when a new generation of technologies are ready for implementation. Though passenger and baggage screening remain high priorities, other areas of development include biometric identification systems for the long-delayed “trusted traveler” program and anti-missile technologies.
- Port Security: Land- and water-based physical security remains a prime concern for ports, and systems that can integrate these efforts are highly sought. Cargo screening and container tracking are also priorities. Testifying before Congress in 2006, CFR’s Stephen Flynn described a pilot program in Hong Kong under which cargo is screened as it’s loaded onto ships. Data captured during the screening process is digitally stored and can be reviewed by officials in the destination port while the cargo is en route.
Gadgets and Gizmos
There exists a wealth of technologies with potential applications to homeland security. Most of these fit into one of the following categories:
- Detection Devices: This is perhaps the area with the broadest array of potential technologies. “You name a threat and there are two or three technologies to help identify it,” explains Dennis Treece, director of corporate security for the Massachusetts Port Authority. Promising technologies include improved x-ray systems such as backscatter or millimeter wave machines, which create an image of a person’s body without clothing. Chemical, biological, and radiation detectors also abound. Treece says one technology still in development—neutron resonance fluorescence imaging—hold particular promise in that it can scan large amounts of cargo or luggage down to an atomic level and quickly detect the presence of hazardous materials. CFR Science and Technology Fellow Michael A. Levi says the greatest challenge with detection devices is with the software designed to interpret readings from the devices themselves. This has proven troublesome in the Secure Border Initiative, U.S. Department of Homeland Security (DHS) project to build high-tech towers along U.S. borders.
- Biometric Identification: Biometrics—using unique physical characteristics to identify a person—holds promise in a number of security-related fields. Fingerprints, the most common biometric identifier, are already used by the US-VISIT program to verify the identity of foreign nationals arriving in theUnited States. The Transportation Security Administration’s (TSA) Registered Traveler program uses fingerprints in conjunction with an iris scan. Other biometric identifiers currently in use include retina scans, face recognition, voice analysis, hand geometry, and palm vein authentication.
- ID Cards: Improved ID cards can benefit many aspects of security. Under the REAL ID program, DHS plans to require that state-issued ID cards contain bar codes to verify authenticity. Some nations have begun placing radio frequency identification (RFID) tags in passports, while other ID cards are increasingly embedded with a biometric identifier to verify authenticity.
- Surveillance: Closed-circuit television, especially in Britain, has proven an indispensable tool in investigating terror plots. But surveillance cameras can also be a preventive measure. Some software developers have designed programs that help identify suspicious behavior. These programs can detect intruders, loiterers, or people moving against the flow of pedestrian traffic (for instance, walking into the exit of a secure area). Customs and Border Protection has begun using unmanned surveillance aircraft similar to those used by the U.S. military to help provide aerial surveillance footage. Other private and government agencies admit they are attempting to develop smaller surveillance drones (WashPost) for use in urban environments.
- Data Storage: With so much information being collected—from video cameras, detection devices, and data mining software, to name a few sources—data storage can pose a challenge. According to the Congressional Research Service, some intelligence databases (PDF) grow at a rate of four petabytes (equal to 4 million gigabytes) each month. This has resulted in a growing demand for bigger, more efficient storage devices.
- Behavioral Profiling: In recent years, the TSA has begun using a technique known as behavior pattern recognition. Developed in Israel, the practice uses highly trained airport screeners who can detect passenger behaviors, such as facial expressions, that may betray malicious intent. Positive reviews of this program have led to research into computer programs that might be able to assist. In addition to monitoring facial expressions, a computerized system could use sensors to analyze a person’s vital signs, like blood pressure, pulse rate, and perspiration. In October 2006 the U.S. Air Force released findings of a study into this technology.
Who Builds It
During the initial rush of post-9/11 security spending, small firms already specializing in homeland security technologies enjoyed considerable gains. As the market for such technologies has grown, many large companies with a history of government contracting joined the field. Today, those are the companies vying for the large government contracts, though many smaller niche firms continue to attract government contracts. The field of companies consists of some three-hundred firms, large and small, according to a directory maintained by HSToday, an industry magazine. In fiscal year 2006, 33 percent of DHS contract dollars went to small contractors through direct contract (USAToday). In addition, DHS’s procurement office says about 40 percent of the contracts with large companies are subcontracted out to smaller firms. Much of the spending stays in and around the Washington, D.C. area; according to census data (PDF) for fiscal year 2005, 39 percent of DHS contracts were awarded to firms in the capital or its two neighboring states.
In 2006, when DHS awarded a $2.5 billion contract for border surveillance, Boeing beat out a list of familiar competitors for the Defense Department contract, including Lockheed Martin, Raytheon, Northrop Grumman, and the wireless company Ericsson. Delays in implementing Boeing’s plan—due to difficulties making widely dispersed sensors communicate—have garnered congressional criticism. Other large DHS contracts include a deal with Accenture to provide biometric identification for the US-VISIT program worth up to $10 billion, and a $750 million contract with Unisys for building and operating the DHS and TSA computer networks.
Who Buys It
Both the private and public sectors are expected to invest heavily in new homeland security technologies in the coming years. Homeland Security Research Corporation predicts (PDF) private sector demand for homeland security products and services will increase 50 percent over the next five years, with total spending over that span reaching $28.5 billion. Federal, state, and local government spending over the same period is estimated at $123 billion, with DHS agencies fueling more than half that demand. The international homeland security market is estimated at nearly $25 billion annually.
As the largest consumer of homeland security products, DHS plays a considerable role in defining the market. To date, however, this has occurred largely in fits and starts. “When DHS began, procurement was a mess and a lot of it was done under duress,” says David Silverberg, editor of HSToday. As a result, a 2006 congressional inquiry (PDF) seized upon widespread waste and a high number of no-bid contracts; in 2005 alone, 55 percent of DHS contract dollars were awarded without competition. A 2007 GAO report (PDF) noted DHS procurement processes still lacked sufficient oversight and recommended external reviews of acquisitions.
DHS has since attempted to change the way it procures new technologies; rather than specifying the requirements for each new product, DHS now specifies the functions new products should perform. This so-called performance-based contracting allows more room for new ideas and creative solutions, but it can create problems when contractors don’t deliver. “We don’t know how to gauge contractors’ performance at the end of the day,” says Nick Schwellenbach of the Project on Government Oversight, an independent government watchdog group.
DHS has a science and technology directorate tasked with overseeing research and implementation. The DHS strategy (PDF) for this outlines several steps to develop improved expertise in the field, both in government laboratories and in universities. In addition, the Homeland Security Advanced Research Projects Agency (HSARPA) solicits private-sector bids for specific technology needs on its website.
DHS has made some efforts to ensure coordination among federal, state, and local government technology purchases. For instance, when the department hired Northrop Grumman to help improve its first responder communications systems, it required the company to also help refine federal standards (PDF) for communications and interoperability. These standards can help state and local governments ensure interoperability in their own communications systems. However, coordination between state and federal offices still leaves something to be desired: A 2006 survey (PDF) of state homeland security directors found states feel left out of the loop when it comes to federal policy decisions.