The Port of Seattle says that three Automated Screening Lanes have been installed at Seattle-Tacoma International Airport’s security checkpoint 5. The ASLs were provided by Vanderlande. Key features of the ASLs include multiple divestment stations, mechanized conveyor belts, automated bin return, larger bins, automated diversion of alerted carry-on bags, RFID tags attached to each bin, and cameras that capture photographic images of the contents of each bin and are linked side-by-side to the X-Ray image of a bag’s contents.

The Navy plans to acquire from Crossmatch Technologies on a sole source basis NOMAD biometric jumpkits for use by the Naval Criminal Investigative Service. The NCIS currently uses the SEEK multimodal handheld biometric device and Mobile Operations Biometrics Software supplied by Crossmatch and now seeks a highly compatible, compacted model, which allows the user to have quick mobility in completing mission requirements in the field and be compatible with the MOBS software. The NCIS currently uses more than 160 biometric devices worldwide. The NOMAD kits can capture fingerprints, iris, facial photos, and biographic information.

The Department of Homeland Security Science and Technology Directorate has awarded $190,000 to London-based iProov Ltd. to develop a proof of concept for an integrated solution to allow travelers to quickly transit remote border ports of entry. The Remote ID Interrogation and Verification for Borders projects would allow users to optionally use their personal electronic devices to report their entry and exit to U.S. Customs and Border Protection with a secure, privacy-focused mobile application. The award was made under the Silicon Valley Innovation Program and is the first to an international company under the program.

The Department of Homeland Security this month concluded its sixth biennial cyber security exercise, Cyber Storm VI, a simulated national and international crisis that involved attacks on the critical manufacturing and transportation sectors. The attack scenario was such that no single organization could stop it, so “the scenario promoted cooperation and information sharing across the United States government, states, the private sector, and international partners,” Jeanette Manfra, the department’s chief cyber security official, says in an April 13 blog post. She says there will be an after-action “process” to “discuss initial, high-level findings” and be followed by an after-action conference … to validate these findings and inform the development of an after action report.” There were more than 1,000 participants in the three-day distributed exercise.