Homeland Security Watch

News and analysis of critical issues in homeland security

February 3, 2006

Los Angeles strengthens its intelligence fusion center

Filed under: Intelligence and Info-Sharing,State and Local HLS — by Christian Beckner on February 3, 2006

The Los Angeles Times writes today about the LA’s decision to enhance its intelligence analysis capabilities:

Warning that Los Angeles remains a prime target for terrorists, Mayor Antonio Villaraigosa announced an initiative Thursday to permanently fund expanded counter-terrorism and disaster response units in the police and fire departments.

The proposal would assign four LAPD anti-terrorism officers to a new “intelligence fusion center,” to be staffed by federal, state and local law enforcement officers in Norwalk in the next few weeks, according to Police Chief William J. Bratton.

In the facility, called the Joint Regional Intelligence Center, LAPD officers would coordinate intelligence-gathering and analysis with their counterparts in the FBI and other agencies.

This intelligence fusion center actually isn’t new – it’s mentioned in this LAPD fact sheet from 2004 – but the announcement yesterday signals new resource commitments to it.

The creation of state and local “intelligence fusion centers” seems to be a growing trend. I wrote last week about the state of Ohio’s decision to create a similar intelligence fusion center. I noted in that post that these types of centers are good investments if they can be stood up cheaply, but that they’re no substitute for an effective national system to share intelligence among federal, state and local officials.

The article also discusses other counterterrorism initiatives in the city of Los Angeles, such as increased funding for Operation Archangel, which assesses risk and develops response plans for critical infrastructure assets. It’s good to see the city taking what seems like a thoughtful and strategic approach to its homeland security and counterterrorism challenges.

Share and Enjoy:
  • Digg
  • Reddit
  • Facebook
  • Yahoo! Buzz
  • Google Bookmarks
  • email
  • Print
  • LinkedIn



Comment by Brian Humphrey

February 5, 2006 @ 4:21 pm

Mr. Beckner:

You wrote…

It’s good to see the city taking what seems like a thoughtful and strategic approach to its homeland security and counterterrorism challenges

Thank you for sharing sentiments that convey great confidence in the leaders of Los Angeles and the men and women of the Los Angeles Fire Department.

We can assure you that keeping our City safe from natural and non-natural disasters has been and will remain a core part of the LAFD’s mission.

Respectfully Yours in Safety and Service,

Brian Humphrey
Public Service Officer
Los Angeles Fire Department

LAFD Home Page: http://www.lafd.org
LAFD News Blog: http://www.lafd.org/blog.htm

Comment by Sherrie Adcock

July 28, 2006 @ 5:58 pm

24591 Seth Circle Dana Point CA 92629

Phone: 949-493-4030

Dear Reader;

If this EMAIL has reached you by mistake, please forward it to the proper authority in your Organization, i.e.; Partnership / Collaboration Manager, CTO, R&D manger, etc.


Voice Security Systems has developed a patented technology*(see below) utilizing a biometric** (voice) signature to authenticate Users, allowing them to:

| Login to their PDAs

| Activate their Cell Phones

| Login to their computers

| Access their data.

| Perform transactions.

| Gain access to restricted areas.

This unique, safe, secure and easy to implement technology helps solve the problem of (illegal) users gaining access to unauthorized equipment, data or places.

This technology can be integrated into your product by either incorporating the technology into your application with minimal impact on your product ‘ s design, or by using a smart-card /reader and a microphone.

Typical applications for Voice Security ‘ s Technology:

1) Secure Access: To your; PDA, Cell Phone, PC – access can only be gained by owner’s live voice (i.e. not recorded).

2) Secure Data: Protect user’s data; i.e. directories/files; access can only be gained by owner’s live voice.

3) Windows Login: Voice Security’s Technology releases the login credentials after a successful biometric verification.

4) Certificate Management: Email Signing, Web Access, etc. The card’s owner must authorize the use of the certificate (digital ID) on the card with a valid biometric signature each time it is used.

5) One Time PIN / Transaction: The owner authorizes a subsequent transaction on a legacy terminal (paying for dinner, ATM, etc.) The card will only be valid for a single transaction with the specified terminal type. This prevents double charges in restaurants, and can be used to generate PIN # for access at legacy terminals such as payphones. The PIN is displayed on a key chain LCD reader equipped with a microphone, into which the card is inserted. If the request is accepted, the reader displays the PIN for use in the terminal. Enter an incorrect PIN or stick it into the wrong terminal and the transaction must be approved again.

This list goes on and on… Voice Security ‘ s Engineers have been able to demonstrate this technology on a $10 smart card using Voice Security’s API. We can integrate this technology into several platforms; smart cards, door locks, cell phones, PDAs, computers, garage door openers, automobiles, aircrafts, plus any and all other electronic devices that are utilized in access control.

Why is Voice Security ‘ s Technology better?

1) We believe that the current trend of simply using a smart card as secure data storage for the biometric data, which by request, is sent to every terminal for verification is a BAD IDEA !!! – All I’d need to do is write a rouge terminal application and the cards will give up biometric information to my program.

2) By using Voice Security’ s Technology – the card OR your product does the verification itself.

3) Language/accent independent use any language or invent your own phrase/sounds

Visit our web site for a free (and anonymous) demo of our Biometric Speaker Verification Technology*** (see below);

Our Technology can be adjusted to the level of security needed for various platforms. Please try different languages so you can see this performance. You can even pick your own phrase.

We would like to demonstrate how this technology could improve your sales, by increasing your customer satisfaction.

Please call me at 949-493-4030 for additional information on how you can become involved with a complete solution for your future security needs.

Best of Everything to You

Sherrie Adcock


Voice Security Systems



RSS feed for comments on this post. TrackBack URI

Leave a comment

XHTML: You can use these tags: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong>