Memorial Day originally was called “Decoration Day.” It fixed a time for people to place flowers on the graves of those who fell in the Civil War. Now, on Memorial Day, we remind ourselves of the sacrifices of all veterans.

One person who did not need reminding of his sacrifice was Yale, a friend of my parents. After all, when he looked at the mirror every day, he saw an empty space where one of his arms used to be.

He lost his arm in the Spanish Civil War, while fighting in the Abraham Lincoln brigade, a collection of American volunteers. They were not the first Americans to seek combat overseas. From John Paul Jones serving in the Russian Navy to Ernest Hemingway driving ambulances in Italy before the US entry into World War I, Americans have participated in foreign wars.

Nor was Yale the last American volunteer. There are numerous reports about Western fighters who have volunteered to fight with the Kurdish Peshmerga forces in their war against ISIS. Estimates of their numbers range from “scores” to 2,000. In addition to Americans, volunteers hail from Australia, Great Britain, Germany, Spain, France, Canada, Israel, and the Netherlands.

Many are drawn by the justice of the Kurdish cause. Jason Matson, a former U.S. Army soldier, is typical.  “I’m not going back until the fight is finished and ISIS is crippled,” Matson told the Associated Press. “I decided that if my government wasn’t going to do anything to help this country, especially Kurdish people who stood by us for 10 years and helped us out while we were in this country, then I was going to do something.”

Some veterans see their Kurdish adventure as an opportunity for meaning in their life. They were disappointed with the inconclusive conclusions of the Iraq and Afghanistan conflicts. Returning to civilian life was alienating. The one thing they knew how to do – fight – was not valued by employers or their stateside community. At least with Kurds, they can put their training to good use.

The Kurds are ambivalent about these foreign volunteers. They want arms, night vision goggles, gas masks, artillery, and body armor, not people. Several have expressed astonishment that the volunteers did not bring their own weapons. Some leaders have publicly declared that they do not accept foreign volunteers, but since elements of the Kurdish armed forces are not subject to a central authority, these statements are dubious.

The Americans and other Westerners are also ambivalent. Accustomed to a highly educated professional military force, American veterans look askance at the young poorly trained Kurdish fighters. “There are 17-year-olds with no proper training who have seen their friends being killed. They think everyone is Isis – it sometimes feels like a school trip with guns,” said one Westerner.  A former US Marine explained “For a militia in the Middle East it’s up to standards, for most Americans I’ve met it’s insanity.”

There are other areas of contention. Some Westerners have been put off by ethnic hostility expressed by Kurds toward the Arabs. One Westerner was disciplined about challenging the practice of discarding first-aid kits. Some have criticized the Kurdish leadership for their inflexibility in adopting new methods. There has been a loss of confidence in the competence of their Kurdish commanders. One American explained his decision to leave the fight, by declaring “I realized that if I stayed I would die and I didn’t come here to die.”

Some elements of the Kurdish armed forces have been reluctant to put Americans on the front-lines, which have disappointed adventure-seeking volunteers. Others recognize veterans as a resource and put them to work training young fighters.

Still others view the foreigners as a public relations opportunity. Foreign volunteers are interviewed by the world press and lionized in social media. The Lions of Rojava are especially known for their skillful use of branded images and media outreach. Canadian Dillon Hillier is sometimes cited as an example of a foreign soldier whose fame has been leveraged for publicity by the Kurdish forces.

Social media is a significant element in this fight. Just as Vietnam was the television war, the battle against ISIS is the Facebook war. Both sides aggressively recruit and lobby through Facebook and other social media.

Unfortunately, some pro-Kurdish Facebook pages are a bit suspect. For groups raising funds, there is no way of verifying their legitimacy.

While social media is undoubtedly valuable, it is the call of war that attracts young men. Kevin Williamson, a US Army veteran, who intends to join the Kurdish forces, explained, “Do I think there’s other ways to help, other than picking up a rifle and going overseas? Yeah, there’s multiple ways. People can help fundraise, people can write their congressmen … But my specific skill set? You know, I’m not really that great with anything other than being a soldier.”

Good luck, Kevin. I hope no one will be putting flowers on your grave for a long, long time.

 

AMREL announced the FBI’s certification of Flexpedient® AT80B Rugged Biometric Tablet.  It is now on the exclusive FBI’s Certified Products Listing.

“The FBI has certified that the AT80B is in compliance with the CJIS Division’s Next Generation Identification System Image Quality Specifications (IQS): EBTS Mobile ID FAP 45 Appendix F Specifications,” explains Richard Lane, AMREL Vice President of Strategic Business Development. “It meets or exceeds the criteria for for Single & Dual Finger Flat & Rolled Print which means it can access the FBI’s Next Generation Identification (NGI) database.”

AMREL developed the AT80B in cooperation with Integrated Biometrics. Fingerprints are captured by the industry-leading Sherlock, an Integrated Biometrics module which utilizes a state-of-the-art Light Emitting Sensor.  This sensor is fully rugged, uses little power, needs less maintenance than traditional methods, and captures FAP-45 quality images.

“Integrated Biometrics is proud that our LES technology is part of the Flexpedient® AT80B Rugged Biometric Tablet, a rugged device serving mobile identity needs in any environment,” said Mike Grimes, President of Integrated Biometrics.

This rugged tablet is designed to meet MIL-STD 810G and boasts an unusually durable IP67 rating. Built from the ground-up to be rugged, it is far tougher than a commercial tablet in a hardened case.

“The Flexpedient® AT80B Biometric Tablet is built on the AT80 platform,” explains Kalvin Chen, AMREL’s VP of Operations. “AT80’s unique channel design enables true off-the-shelf customization in a short period of time. The two-finger biometric sensor was added in less than a week.

AMREL plans to leverage AT80B’s customization capabilities in order to serve the Law Enforcement community. For example, a smart card reader can be easily and quickly integrated into the AT80B platform. AMREL is exploring adding an iris camera.

When asked about this biometric device, Assistant Chief William ‘Bill’ Leist (Ret) California Highway Patrol replied, “The AT80B is designed to fit the needs of modern law enforcement. The enrollment capability for high quality fingerprint capture will save officers from making unnecessary trips to booking stations. Furthermore, its exceptional ruggedness will ensure it will not break down at critical times.”

Although special measures were taken to assist the Public Safety community, the AT80B is designed for use in a variety of situations. For example, this biometric tablet is being used by professional sports franchises to fast track VIP admissions at games. Another example is the Youth Detention Authority in South Africa, which has piloted the AT80B to verify visitors and track residents at facilities across the country.

Standard features include Android 4.3 (Jelly Bean), 8” 10-point multi-touch capacitive touchscreen display, front/back 5 MP cameras, 802.11 b/g/n, GPS, and Bluetooth®.

Learn more at: computers.amrel.com/at80b

sofic 2016.jpg v2

Special Forces need logistics friendly, lightweight mobile computer solutions that never fail, even in the harshest conditions. AMREL’s ultra-rugged SlimLine meet the special needs of Special Forces.

Learn more about:

Make your appointment today to see these and other exciting SlimLine products at SOFIC!

Contact Javier Camarillo, AMREL’s Senior Applications Engineer, at

(800) 882 -6735  or javierc@amrel.com.

 

 

 

A recent blog post described the phenomenon of the “Bow Wave” and its importance to Defense spending priorities. AMREL takes its responsibility of supplying mobile computing solutions to warfighters seriously, so we keep a close eye on how Defense allocates its resources.

Under the “Bow Wave’s” influence, who are the winners and losers? Take a look at what the well-respected experts at the Center for Strategic and International Studies (CSIS) are predicting to be the top acquisition programs.

Defense 2

Defense Modernization Plans through 2020

A cursory analysis reveals that the Air Force, specifically aircraft acquisition (even more specifically the F-35) is the big “Bow Wave” winner.

“The Air Force is the largest contributor to the overall modernization Bow Wave. … funding for Air Force major acquisition programs is projected to grow by 73 percent in real terms from FY 2015 to its projected peak in FY 2023. This growth is driven primarily by aircraft programs. The Air Force’s three largest programs in terms of funding are the F-35A Joint Strike Fighter, Long Range Strike-Bomber (LRS-B), and KC- 46A aerial refueling tanker.”

Defense Modernization Plans through 2020

In spite of the presence of some big-ticket seafaring items on the above chart, the CSIS claims that the Navy and Marines do not much to look forward to in their future, at least according to a strict “Bow Wave’ analysis. However, I have doubts this will prove to be true. For one thing, they have plans:

“The Navy has been able to modernize by incorporating economically efficient capabilities, but much remains to be done. The sea service is making significant investments in aviation, he (Adm. Mulloy) noted, but it needs the RAQ-25 unmanned aerial vehicle quickly. Other critical capabilities include the SM-6, the LRASM, the HVP and maritime TACTOM.”

Signal

If things heat up in the South China Sea, I suspect the Navy won’t have any problems getting funding.

The CSIS analysis says that the Army will be another big winner.

“The Army’s budget for major acquisition programs is projected to increase 28 percent in real terms from FY 2015 to the peak in FY 2022. The Army’s plans indicate a significant Bow Wave in funding for ground systems…

“… the Army plans to ramp up funding for five major vehicle programs over the next five years… The largest of these programs is the Joint Light Tactical Vehicle (JLTV), a replacement for the Humvee. The program plans to reach full rate production of 2,200 vehicles per year by FY 2040. The Army is also developing the Armored Multi- Purpose Vehicle (AMPV), with low rate production planned to begin in FY 2020 and a total planned procurement of 2,897 vehicles. Programs are also planned to replace the Paladin self-propelled Howitzer, to upgrade Abrams tanks, and to modernize the fleet of Bradley Infantry Fighting Vehicles. Together these programs will increase funding for the Army’s major ground systems nearly threefold between FY 2015 an FY 2021.

“The Army has several modernization programs for communications systems planned as well. The Warfighter Information Network-Tactical (WIN-T) plans to continue fielding Increment 2 capabilities… The Army also plans to ramp up production of two variants of the Joint Tactical Radio System (JTRS): the Handheld, Manpack, and Small Form Fit (HMS radio and the Airborne, Maritime, and Fixed (AMF) radio. Having already experienced cost overruns, schedule slips, and many program changes, these three major Army communications programs are poised to more than double in funding between FY 2015 and FY 2021.”

Defense Modernization Plans through 2020

Then there are the non-service specific programs that can be expected to be well-funded. For example, cyber security will be favored in the budget process.

“Cyber right now is the cat’s meow—a notion sure to keep funding flowing for technological solutions, at least in the near term, to counter the emerging threats, according to Col. Gary Salmans, USAF, senior materiel leader of the Cryptologic and Cyber Systems Division within the Air Force Materiel Command.”

Signal

“President Barack Obama championed cybersecurity efforts Tuesday in seeking $19 billion for the cause as part of his fiscal year 2017 budget proposal. …The budget proposal for FY17, which begins October 1, is a 35 percent increase over the current fiscal year.”

Signal

Everybody loves SOCOM, so expect them to be eating steak, not hamburger. Space is being heavily militarized, so that’s another market Defense vendors should consider.

“In its enduring space race to narrow the materializing gap between the United States and peer competitors, the Air Force’s fiscal year 2017 budget emphasizes sustaining mission capabilities and improving space resilience by investing in command and control programs, situational awareness technologies, expendable launch systems and satellite communications.”

Signal

“U.S. officials to make recent bold leaps in their approaches, including establishing the Joint Interagency Combined Space Operations Center and making the Air Force secretary the principal DoD space adviser. With a goal to shift the Air Force’s space culture to one of warfighting, the center and the service secretary’s office will oversee a five-year, $5 billion budget increase for industry and allies to test new capabilities.”

Signal

 If I wanted to pick the fattest single Defense target, I would say it was retrofitting.

“Upgrades and retrofits of existing programs appear to give the greatest number of opportunities for COTS systems. These are often replacing proprietary systems for more open standards that are ultimately easier and cheaper to maintain going forward.”

Robert Day, Vice President, Sales & Marketing, Lynx Software Technologies,  Military Embedded Systems

The military can’t afford new stuff, so they want to make the old stuff last longer. At AMREL, we are very excited about this opportunity.  Our platform flexibility, extensive technical support, and customization capabilities make us a very good fit for this. In fact, many of the programs favored by the “Bow Wave” (communication, vehicles, SOCOM, etc.) present excellent opportunities for us and our partners.

For over 30 years, AMREL has been proud to provide mobile computer solutions for American Defense needs. Whatever requirements arise, you can be sure that we will be there to meet them.

AMREL announced that it is launching two new lines of rugged mobile network communication equipment:  HalfRack 19” and FullRack 19”.

“AMREL is mostly known for its mobile rugged computing solutions,” explains Kalvin Chen, AMREL’s Vice President of Operations.  “Our tablets, laptops and handhelds have been used for over 30 years by warfighters around the world.

“Working with multiple rugged mobile IT equipment suppliers can be a challenge for our clients.  To simplify procurement and technical hurdles in development and system integration, we have greatly expanded our offerings. Our goal is to provide one-stop convenience by supplying an unusually extensive line of rugged mobile network communication equipment.”

Equipment in AMREL’s HalfRack 19” line are fully rugged and fully functional, but only ¼ the size of normal rack-mounted devices. This compact form factor saves space, reduces heat, and decreases energy use. The HalfRack 19″ line includes switches, routers, network attached storage, VoIP, video matrix, and PDU.

AMREL is also supplying the rack-mounted, full-sized FullRack 19″ line. These fully rugged products include servers, computers, all-in-one, Cisco-based switches, routers, IP-phone, firewall, and KVM.

Both HalfRack 19” and FullRack 19” lines are designed to operate in the most challenging environments. They both fully comply with military’s ruggedness standards, including MIL-STD 810, MIL-STD 461, and MIL-STD 1275D. There is also an option for TEMPEST SDIP-27 Level A, B, or C.

In addition to the HalfRack 19” and FullRack 19” lines, AMREL is offering rack-mounted rugged displays, mini keyboards, power distribution unit, power supplies, accessories, and other peripherals.

See the updated product lines at: computers.amrel.com/rugged-mobile-network-equipment.

Does the FBI have to tell Apple how it cracked the iPhone? The answer is not straightforward, and is illustrative of the many problems surrounding encryption.

 

The many discontents of encryption

Encryption is a very important security measure and it is also a real pain. For one thing, once encrypted, devices have a shorter battery life, and transmit data at a slower speed. In order to encrypt a device, valuable real estate can be taken up by the security hardware. At AMREL, we are familiar with this challenge, because our customization services are often asked to add Trusted Platform Modules (TPM) to our computer platforms.

In addition, high-security encrypted devices create bizarre unforeseen consequences. Soldiers are sometimes ordered to use systems for which that they are not cleared. Repairmen often lack clearance, so a broken encrypted device must be disposed rather than fixed.

 

Apple vs. FBI

In the latest round of “Game of Phones,” another unforeseen consequence appears possible. After months of applying legal pressure to Apple, is it the FBI who will ironically be forced to yield up their secrets? Will they be forced to tell Apple how they did their hack?

How did the FBI crack the iPhone in the first place?  Rumors have been circulating that the Israeli company Cellebrite Mobile Synchronization cracked the iPhone used in the San Bernardino terrorist shootings. That the FBI had to use an outside contractor to crack the iPhone is plausible. For one thing, there is a reason that the phrases “FBI” and “leading-edge technological capabilities” rarely appear together.

That an Israeli company did the hack is also believable, for that country has earned a reputation for expertise in encryption. Israel has developed these skills because its computer networks are under constant attacks. In addition, it has the highest number of programmers per capita of any country in the world. There is even a highly developed ancient tradition of cryptology and secret codes within Jewish mysticism.

Still any rumor in the Middle East has to be greeted with skepticism. I have met hackers who have valued reputation over the risk of legal retribution by falsely claiming exploits. The Cellebrite rumor appears to have some credibility. Around the time of the hack, it is a matter of official record that the FBI paid over $200,000 to this company.  A lot of people seem to believe this rumor, because the shares of its parent company, Japan’s Sun Corporation, have risen 40% since March 2.

 

Our lips are sealed

The fact that it is likely that a private corporation was the one to hack the iPhone is significant in the issue of who tells what to whom. Supposedly, the government is bound to inform companies of vulnerabilities in their encrypted systems, as determined by something called the “Vulnerabilities Equities Process” (VEP).

The VEP was developed in a thoroughly transparent process and actively shared with the public by the administration. Just kidding. Everything about the VEP is opaque. The Electronic Freedom Foundation (EFF) had to sue under the Freedom Information Act to get a highly redacted version of the VEP, which can be viewed here.  The EFF is not impressed with this document. Judging by information about government actions as revealed by the Snowden leaks, the EFF has dubbed the VEP as “…so much vaporware.”

 

The weird world of administrative law

Or is it? Just how meaningful is the VEP?  IF Apple could persuade a court that according to VEP, the government has to reveal the vulnerabilities of their encryption, would the administration have to follow their own rules? The VEP belongs to that surreal realm of “administrative law.”  Congress didn’t pass it. By and large, it’s not determined by court rulings or precedent. It’s just something that a bunch of administrative agencies made up.

I called a lawyer who has more than fifty years of experience of using the law to annoy the government. I asked, “Do government agencies have to follow their own made-up rules?” Her answer was a definitive, absolute, unqualified “Maybe.” In addition, she said that whatever decision is made by the courts, it will be “political.”

 

“It is a tale told by an idiot, full of sound and fury signifying nothing”

It is extremely unlikely a court will determine if the VEP applies or not. The fact that a private party (Cellebrite) probably hacked the iPhone is significant, because the VEP does not apply to private parties. The VEP only applies to vulnerabilities discovered directly by government agencies themselves.

Furthermore, according to the Washington Post, “FBI Director James B. Comey has said that the solution works only on iPhone 5Cs running the iOS 9 operating system — what he calls a ‘narrow slice’ of phones. Apple said last week that it would not sue the government to gain access to the solution.”

So after months of the FBI pressuring Apple to hack its own iPhone, it withdraws from the case, and says never mind. After months of declaring that the iPhone hack will endanger all iPhones, Apple has similarly dismissed its efforts to force the FBI to reveal its secrets. Some have suggested that the “narrow slice” description is accurate and Apple is not truly worried about the security of its future platforms.

The one thing that is clear from all this brouhaha is that our legal structure is completely inadequate for dealing with issues raised by new technologies. In the original court case, the FBI sued Apple on the basis of a law written in 1789.

In the meantime, I have a sinking feeling that the privacy of the average user was not a great concern in this latest round of legal wrangling. As Elliot Hannon wrote in Slate, “We’re all digital piñatas really.”

 

AMREL has announced the launch of APEX PX5, a 10.1” fully rugged, sunlight readable tablet with one of the brightest and sharpest displays on the market.

“What sets the APEX PX5 apart is the crisp image quality,” explained Kalvin Chen, AMREL’s Vice President of Operations. “Its visual excellence is a result of more than the 1000 nits rating. It also has a bright backlight, anti-reflective coatings, WUXGA 1920 x 1200 resolution, and directly bonded LCD layers. Very simply, the APEX PX5 has one of the best displays on any rugged tablet in the world.”

Built into the APEX PX5 is AMREL’s 30 years of expertise of supplying fully rugged computers to the frontline warfighters as well as Public Safety officers. In addition to its enviable IP65 rating, it complies with MIL-STD 810G, the military’s premier ruggedness standard.

“With scratch-resistant Corning Gorilla Glass 3, tough magnesium chassis, and a durable ABS plastic cover, you can have complete confidence in the APEX PX5 Tablet no matter where you take it,” declares Mr. Chen.  “In spite of all this ruggedness, the lightweight APEX PX5 is less than an inch thick.”

The APEX PX5 is built to meet modern demands. Boasting a speedy 4th generation Intel® Haswell Core ™ i5 processor, the APEX PX5 Tablet is ideal for graphic and other data-intensive applications. Its capacitive multi-touch supports glove touch, and a digitizer option. Other options include snap-on modules for magnetic stripe reader, smart card (CAC), NFC, as well as 2D barcode. To complete the tablet’s offering, it has a vehicle dock, desktop dock, VESA mount bracket, 2-bay battery charger, and dual capacity battery pack for extended use. The APEX PX5 supports Public Safety, industrial, field service, and commercial applications.

“We’re proud of the flexibility of the operating systems,” states Mr. Chen. “You can choose to use either full Windows 7, or Windows Professional or Embedded 8.1. You even have an option to install Windows 10 Internet of Things Enterprise.”

Learn more at computers.amrel.com/apex-px5

At AMREL we play close attention to pressures placed on the Department of Defense (DoD) budgets. We strive to respond to ever changing needs of our clients and market forces.

How are things going for the DoD? If you listen to the leadership, not so good.

“Every single time I stand on stage, I tell people the budget is getting worse and worse, and I’ve always proven to be correct,” said Tony Montemarano, executive deputy director (Defnse Information Systems Agency) … “there are a lot of legacy programs … that now will lose funding.” Signal

“Adm. Mulloy cited an old saying about Navy chiefs squeezing nickels ‘until the buffalo squeaks,’ advising chiefs today to watch their spares closely…” Signal

“The Navy continues to postpone much needed repairs and upgrades for the majority of our infrastructure,” said Admiral Michelle Howard, vice chief of naval operations. “We are still paying down the readiness debt we accrued over the last decade, but more slowly than we would prefer and at continued risk to our shore infrastructure.” VOA

The above represents just a small sample of the grumblings emanating from our military leadership. Complaints about budgetary limitations are ringing across the land. A half-trillion dollar Defense budget is just not enough.

 

Defense budget

What’s going on here? Is this just business as usual? After all, no officer ever advanced his career by loudly proclaiming his command had too much money. Let’s look at the Defense budget:

Defense 1

DoD Budget Request 2017

The budget for 2017 is $521.7 billion, which is down from previous requests (2013 was $525. 4 billion). As can be seen from the above chart, procurement funding has decreased, while funding for research has increased. Of course, this doesn’t include the Overseas Contingency Operations (OCO) budget, which has been slashed. Supposedly OCO doesn’t affect base expenses and is used only for actual war operations.

Could these relatively modest decreases be responsible for the economic squeeze that Defense is so vigilantly complaining about?

 

War is bad for living things and new acquisitions

During the Iraqi and Afghanistan campaigns, the DoD had to divert funding from upgrades, maintenance, readiness, and acquisitions to pay for the land wars. Furthermore, the money spent the land wars did not contribute to DoD’s assets or goals. Equipment was scraped, abandoned, or given away.

“For the most part, war-related acquisition funding was not used to modernize and recapitalize the inventory of equipment.”

Defense Modernization Plans through 2020

Bow Wave

As a result of this diversion, the programs for new acquisitions were stalled and goals became delayed to an unknown time. This created the phenomenon known as “Bow Wave.”  Think of the bow of a ship pushing into the ocean. The wave it creates is constantly moving forward. The defense community uses this as a metaphor for the current state of funding. A “Bow Wave” in defense parlance, is the delay into the indefinite future of major expenses. It’s sort of like a balloon payment at the end of a mortgage.

The “Bow Wave” is expected to suck all available funding, causing non-prioritized projects to suffer. As a result, the brass is scrambling to declare that their individual programs are overwhelmingly important, while the other guys’ pet projects are just waste.

In the big fight about defining what is and what is not waste, we could simply build the kind of military we need and get rid of everything else. One small problem with that way of thinking; take a look at DoD’s goals as outlined in the DoD Budget Request 2017.

“Funds a joint force with the capacity and capability to:

– Defend the homeland

– Respond to five challenges

o Russia

o China

o North Korea

o Iran

o Global counter-terrorism”

As you might expect, the forces required to deter Russia are quite a bit different from those that would engage China and so on. No one really knows what war we are going to fight next.

How is the “Bow Wave” going to affect defense-spending priorities?  A future blog post will discuss winners and losers in upcoming Defense budgets.

 

AMREL has announced the FBI’s certification of XP7-ID, the world’s most rugged biometric handheld.xp7

“This is an important milestone not just for us, but for the security and law enforcement community,” explains Richard Lane, AMREL Vice President of Strategic Business Development. “This certification will expand access to the XP7-ID, which is quite simply the most rugged highly integrated biometric smartphone in the world,”

To be on this exclusive FBI’s Certified Products Listing, the XP7-ID was tested and found to be in compliance with the FBI’s Next Generation Identification (NGI) System Image Quality Specifications. The review of the test data was conducted by the Technology Evaluation Standards Test Unit, a part of the Biometric Center of Excellence led by the Criminal Justice Information Services Division.

“This certification is just one step on the XP7-ID journey into widespread adoption,” states Mr. Lane, “AMREL worked hard to create a ‘best of breed’ total solution platform that meets the needs of end-users. XP7-ID works on all the carrier networks including AT&T, Verizon, and FirstNet. XP7-ID has features that rival Push-To-Talk radios, live-scan booking stations, in-vehicle computers, as well as body-worn video cameras.”

AMREL developed the XP7-ID in cooperation with Integrated Biometrics. Fingerprints are captured by the industry-leading Sherlock, an Integrated Biometric module which utilizes a state-of-the-art Light Emitting Sensor.  This sensor is fully rugged, uses little power, needs less maintenance than traditional methods, and captures FAP-45 quality images.

“Integrated Biometrics is proud that our LES technology is part of the AMREL XP7-ID Biometric Smartphone, a rugged device serving mobile identity needs in any environment,” said Mike Grimes, President of Integrated Biometrics.

Although the XP7-ID is designed for use in a variety of situations, special measures were taken to serve the Public Safety community. When asked about this biometric device, Assistant Chief William ‘Bill’ Leist (Ret) California Highway Patrol replied, “The XP7-ID is designed to fit the needs of modern law enforcement. The enrollment capability for high quality fingerprint capture will save officers from making unnecessary trips to booking stations.  Furthermore, its exceptional ruggedness will ensure it will not break down at critical times.”

For system integrators as well as Automated Fingerprint Identification System (AFIS) software developers and vendors, the XP7-ID is the ultimate Android hardware solution platform. Supported with full application program interface (API), Software Development Kit (SDK) and developer portal, independent developers will be able to connect with every resource needed to build highest quality solutions for mobile identification.

Read more about the AMREL XP7-ID here.

As images of bloody bodies flow in from Brussels and Pakistan, we once again search for an appropriate response to the horror of a successful terrorist attack. Some people call for revenge. Others declare liberties are a luxury that we can no longer afford. Many seem stunned into inaction. What are we to do?

At AMREL, we watch these events with keen interest. Of course, like all citizens, we are concerned about terrorism, but we also wonder what our role will be in future counter-terrorism efforts. We have been supplying warfighters and security personnel with rugged mobile computing solutions for over 30 years. What will we be called on to supply next?  Will we be asked for our mobile biometric devices? Our Defense solutions?  Our Public Safety equipment? Something completely new?

I watch these events with a sickening sense of familiarity. I lived in Israel at a time of intense terrorist activity.  No country in world has been more subjected to terrorism than Israel. None take their security more seriously than Israel does.

While living there, I had an opportunity to see firsthand a country fighting terror every day. I also had numerous conversations about terrorism with Israeli intelligence, government, and military professionals (this isn’t unusual; Israel is a small country where everyone knows everyone else).

The following represents some of the lessons that I learned about terrorism while living in Israel.

Even under continuous terrorist threat, it is possible to have a free society. Of everything I experienced in Israel, this was the thing that impressed me the most. Despite a wide range of security measures, and a state of constant hyper-vigilance, Israel enjoys a robust, free-wheeling democracy. Israel may have an impressive multi-layered security regime, but Israelis did not seem intimidated by it in the slightest. Certainly, it did not restrain them from loudly expressing their opinions about the government in general and politicians in particular.

Of course, I write this as someone who is not an Arab. Arab citizens bitterly complain of discrimination. Jews counterclaim that Arabs living in Israel are freer there than they are in any other country in the Middle East.

I am not qualified to discuss the experiences of Israeli Arabs. If you wish to learn about their life in Israel, I strongly recommend the outrageously funny television show, Arab Labor. Written by an Israeli Arab, it humorously explores the bizarre experiences of living as suspected minority in a society dominated by terrorist fear. You can watch it online in a number of places, including here.

Most of impositions to liberty seem relatively trivial. In Israel, I had to carry an internal passport at all times. Can you imagine the howls from both the Left and the Right if the federal government tried to impose a system of national identification here? It’s not that Israelis are less jealous of their liberties than Americans (if anything, they distrust their government more), it’s just that they’re more accepting of the necessity of security measures. Carrying an internal passport all the time is really no different than how I teat my drivers license in the US.

Profiling works, just not in the way that you think it does. I have heard self-appointed “security experts” envy the Israeli freedom in profiling Arab minorities.

Of course, Israeli officials target Arabs for extra security measures. And young European women as well. Several years ago there was a highly publicized incident in which a terrorist tricked a young Irish woman into carrying a bomb aboard an airplane. Ever since then, Israeli security at airports carefully screens single young women. I knew one foreign visitor who had an Israeli acquaintance accompany her to airports and pretend to be her boyfriend, specifically so she could avoid the extra level of scrutiny.

Do not assume profiling will not apply to you, because…

Everybody is profiled. It’s very simple. If security only subjected Arabs to extra inspections, then terrorists would use people who didn’t look like Arabs. If security places restrictions on young men, then terrorists use women. If both young men and women are subjected to extra scrutiny, then terrorists would use old folks.

Several times a year, a high level representative of a church or government complains to a local Israeli newspaper about the “outrageous” security measures he endured at an Israeli airport. I always laugh at these tirades, because the measures he describes are the exact same ones that I and everyone else must undergo.

The next time you see a grandmother in a wheelchair being searched at an airport, don’t bemoan it as political correctness gone amuck. It’s simple common sense. Security personnel have learned what the classic cartoon Pogo once so wisely observed, “We have met the enemy, and he is us.”

Bigotry is a poor counter-terrorist strategy. Very few genuine counter-terrorists experts in the United States embrace the view that all Arabs or all Moslems are our enemy. They are fully aware that Arabs and Moslems are the primary victims of radicalized Islamic terror, and serve as our allies (if uneasy ones) in the war against terror.

In Israel, “They all want to kill us” is an extremely popular view. However, this hasn’t stopped Israeli military and intelligence from cooperating with Palestinian authorities on counter-terrorists actions. It’s not unusual to read a complaint from the Israeli Prime Minister’s office about the Palestinian leadership inciting violence, while in the same newspaper the head of an Army unit is quoted as praising his Palestinian counterpart for a successfully destroying a terrorist cell.

Painting all Moslems or Arabs with the same terrorist brush turns assets into liabilities and converts allies into enemies. We have to be smarter than that.

Kabuki theater works. Waiting in line to enter a mall while some under-paid guard searches backpacks and women’s purses, someone will inevitably comment that these inconvenient security measures are stupid and pointless. No determined terrorist would be deterred by these farcically ineffective procedures.

Except that they are. I’ve read interviews with would-be suicide bombers and other terrorists about their thought processes as they prepare to attack. A major factor in their consideration is the same silly security measures that are widely mocked. What seems stupid to us, is intimidating to a terrorist.

Terrorism is the new normal. While writing this article, I talked to a people who had traveled through the Philippines, Singapore, Indonesia, and South Korea. Each of these countries has experienced problems with terrorism and has instituted counter-measures.

Along with cell phones, television, and the internet, magnetic wands and metal detectors are the technologies that will define our time.

Terrorists adapt. Every few years Israel experiences waves of terror. A while back, suicide bombers were a problem. At the time, the problem seemed insurmountable. None of Israel’s traditional security methods seemed effective.

So, Israel developed new security methods. Among other things, they built a highly controversial security wall to keep out terrorists. Israelis increased surveillance on possible terrorists and with more help from the Palestinian security services than they like to admit, this particular wave of attacks has been thwarted. Deaths and incidents died down.

And then they started again. It hasn’t gotten much publicity in this country, but Israel is undergoing what is sometimes referred to as the “Lone Wolf” Intifada. Individuals, seemingly unconnected to any organization, are randomly stabbing people. In the last 6 months, 34 Israelis have been killed and 404 have been wounded.

Just like with earlier wave of terrorism, no one seems to know what to do. No one is sure what will be effective countermeasures. Despite the anxieties being expressed now in the Israeli media, I have no doubt that Israel’s highly motivated security establishment will eventually devise effective defense actions.

Unfortunately, their enemies will then figure out a new way of attacking them. In a war of terror, the side that is the most innovative and flexible will always have the advantage.