2015 June/July Digital Edition
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
Government Security News<br />
JUNE/JULY <strong>2015</strong> <strong>Digital</strong> <strong>Edition</strong><br />
“The Texas floods are so big they ended the state’s draught. The devastation is heart-wrenching.<br />
After the rain, I-45, one of the biggest freeways for the 4th largest city in the country, looked<br />
like the Mississippi River, with only boats used to transport people.” – Note to GSN from<br />
Dr. George Lane, CEO, Emergency Response Technology. More on Page 14<br />
Also in this issue:<br />
Positions of five Presidential candidates described on topic of immigration – Page 26<br />
OPM to provide employees with credit monitoring and ID theft insurance – Page 4<br />
DHS Science & Technology Awards go to 32 inventors at S&T, TSA, USCG – Page 33
GSN TECHNOLOGY SPOTLIGHT<br />
gSN <strong>June</strong>/<strong>July</strong> <strong>Digital</strong> <strong>Edition</strong><br />
table of Contents<br />
Rodney Caudle, Director of Information Security at NIC Inc, describes<br />
a new phenomenon in denial of service, Distributed Denial<br />
of Service (DDOS), which constitute more serious attacks because<br />
they originate from multiple sources executing synchronized attacks<br />
against a single target. Caudle explains how to prepare for these attacks.<br />
See Page 24<br />
Robert Laughlin, President of Galaxy Control Systems, confirms<br />
that advancements and innovations in software, integration and network<br />
infrastructure are extending access control far beyond simply<br />
managing entry and egress. Municipalities in particular are employing<br />
the advance access control solutions across wide area networks. See<br />
Page 40 for half a dozen potential applications.<br />
NEWS AND FEATURES<br />
OPM to provide affected employees with<br />
credit monitoring and ID theft insurance Page 4<br />
(ISC)2 announces Government Information<br />
Security Leadership winners Page 6<br />
GTL’s Phone IQ combats inmate fraud and<br />
criminal activity by phone type Page 10<br />
exactEarth, Harris Corp provide real-time<br />
global maritime tracking Page 12<br />
Texas disaster illustrates climate change<br />
as security threat – by George Lane Page 14<br />
Secure Identity Biometrics Assn names<br />
Troy Potter of L-3 as chairman Page 18<br />
Denise Krepp Op-Ed: Speaker Hastert<br />
a study in failed leadership Page 20<br />
Senator Ron Johnson, fiscal conservative<br />
from Wisconsin fi elds annoying question Page 23<br />
NIC expert Rodney Caudle explains new,<br />
insidious DDOC attacks on government Page 24<br />
Border Security Expo celebrates 10th<br />
year with move to San Antonio Page 32<br />
CBRNE/Detection<br />
____________________________________<br />
DHS Science & Technology Patent awards<br />
salute 32 inventors at S&T, TSA, USCG Page 33<br />
Implant Sciences Q-B200 European footprint<br />
deepens with sale to 17 French airports Page 36<br />
Romanowich on Surveillance: Protecting<br />
key areas of critical assets Page 38<br />
State/County/Municipal Security<br />
____________________________________<br />
Advanced access control opens new doors<br />
for municipalities, by Robert Laughlin Page 40<br />
Ohio Commission provides $17-million to<br />
bolster school security Page 42<br />
“Learning Through Crisis” program provides<br />
disaster response skills to local offi cials Page 44<br />
DoD awards grants to study how radiation<br />
Affects computer memory Page 45<br />
2 3
B.I.G. A-95_GovSecNews May <strong>2015</strong>.qxp 4/20/15 12:09 PM Page 1<br />
OPM to provide employees impacted by data<br />
breach with credit monitoring and Identity<br />
theft insurance<br />
By Steve Bittenbender<br />
The personal identifiable information<br />
on up to 4 million current<br />
and former public sector workers<br />
may have been compromised in<br />
an attack on federal it systems,<br />
according to the agency responsible<br />
for human resources services<br />
to U.S. government agencies.<br />
The U.S. office of Personnel<br />
Management acknowledged<br />
the intrusion late Thursday by<br />
issuing a statement on its Web<br />
site (www.opm.gov). The agency<br />
said it discovered the breach a<br />
couple of months ago as a part of<br />
its efforts to upgrade its cybersecurity<br />
protocols. Upon realizing<br />
the breach, oPM contacted<br />
the Department of Homeland<br />
Security’s Computer Emergency<br />
Readiness team and the<br />
Federal Bureau of investigations<br />
to begin an investigation.<br />
“The FBi is working with<br />
our interagency partners to investigate<br />
this matter,” the FBi<br />
said in a statement. “We take all<br />
potential threats to public and<br />
private sector systems seriously<br />
and will continue to investigate<br />
and hold accountable those who<br />
pose a threat in cyberspace.”<br />
Both Bloomberg and the<br />
Washington Post reported that<br />
iSight Partners, a private security<br />
firm, linked the attack to the<br />
same group responsible for the<br />
anthem health insurance attack<br />
4<br />
earlier this year. The records of<br />
up to 80 million members were<br />
compromised in that attack.<br />
investigators believe the<br />
anthem attack was carried out by<br />
hackers sponsored by the Chinese<br />
government. However, a Chinese<br />
official said it is difficult to<br />
trace international cyberattacks.<br />
“Jumping to conclusions<br />
and making hypothetical<br />
accusation(s) is not responsible<br />
and counterproductive,” said<br />
Zhu Haiquan, a spokesman for<br />
China’s Washington embassy.<br />
Federal officials vowed to<br />
take steps to improve the country’s<br />
it infrastructure. in a series<br />
of tweets from his account,<br />
California Rep. adam Schiff, the<br />
ranking Democrat on the House<br />
intelligence Committee, called<br />
the breach shocking because people<br />
expect government systems<br />
to be protected from such threats.<br />
“it’s clear a substantial improvement<br />
in our cyber databases<br />
& defenses is perilously<br />
overdue,” said Schiff, who noted<br />
the House passed a bill allowing<br />
for that last year and encouraged<br />
the Senate to follow suit.<br />
The oPM hack is the latest<br />
in a series of high profile attacks<br />
on public-sector and corporate<br />
systems. Besides anthem, hackers,<br />
believed to be connected<br />
with North Korea, accessed<br />
Sony Entertainment systems in<br />
December, publishing employee<br />
information and unreleased<br />
More on page 11<br />
To Secure a Perimeter...<br />
choose the right Guard Houses<br />
We Didn’t Want Standard Shelters, We Wanted B.I.G.<br />
Custom shelters and booths built for challenging locations…“When<br />
I visited the B.I.G. facility, I saw that it was a very well run and lean<br />
ship. Quality workmanship was obvious from the moment I walked<br />
in. Everybody worked as a team to secure this nuclear power facility.<br />
We’re very pleased with B.I.G.’s performance—they made a<br />
big difference.”<br />
— Mission Critical Security Specialist<br />
If you don’t protect your guards,<br />
they can’t protect your operations.<br />
A B.I.G. guardhouse is different from all<br />
others because we have invested<br />
over 40 years in studying and<br />
understanding what goes on<br />
inside—and outside—of a<br />
superior guard station. This expertise<br />
comes to you in the form of a full line of<br />
B.I.G. Enterprises guardhouses—the<br />
cornerstones of your “hardened”<br />
perimeter. With B.I.G. your guardhouse<br />
doesn’t have to appear hard and<br />
unattractive—it can be your steel fist<br />
inside of a velvet glove.<br />
When extreme threats are a real issue, call in the security heavyweights<br />
—because a perimeter without B.I.G. is like a holster without a gun.
(ISC)² announces U.S. Government Information Security<br />
Leadership Award winners<br />
(ISC)2 has recognized leaders in advancing<br />
the government’s cyber security<br />
mission with its annual U.S.<br />
Government Information Security<br />
Leadership Awards (GISLA).<br />
At the May 14 event, the<br />
nonprofit organization of certified<br />
information and software security<br />
professionals announced individual<br />
and team winners in seven<br />
categories during a gathering of<br />
government information security<br />
executives at the GISLA Gala in<br />
Washington, D.C.<br />
These top leaders are<br />
working to mature the government’s<br />
cyber world, encourage<br />
others in professionalism and<br />
training, streamline operations<br />
and share ways to fight emerging<br />
threats. The honorees represent<br />
the best in the industry,<br />
across all levels within the U.S.<br />
government community, according<br />
to Dan Waddell, CISSP,<br />
CAP, PMP, (ISC)² director of<br />
U.S. Government Affairs.<br />
“Competition is tough every<br />
year, but this year seemed<br />
especially challenging,” Waddell<br />
said. “The finalists’ scores were<br />
often separated by a very thin<br />
margin, which really speaks to<br />
their commitment to excellence and<br />
dedication to advancing the security<br />
posture of government.”<br />
The (ISC)²’s <strong>2015</strong> Global Information<br />
Security Workforce<br />
Study shows the gap between the<br />
need of qualified information security<br />
professionals and the supply is<br />
negatively impacting government<br />
security readiness and existing<br />
workers’ morale. “This year’s GISLA<br />
recipients are those who have persisted—and<br />
prevailed—in the midst<br />
of significant obstacles in the areas<br />
On Right: Award Presented by: Peter Gouldmann, CISSP,<br />
Director of Information Risk Programs, Office of Information<br />
Assurance, U.S. Department of State, Co-Chair,<br />
(ISC)² U.S. Government Advisory Council<br />
Winner in Middle: John Simms, CISSP, ITIL 3.0, MCSE,<br />
PMP, requirements and acquisition support branch chief<br />
and Continuous Diagnostics and Mitigation (CDM)<br />
program manager, Department of Homeland Security<br />
(DHS), Office of Cybersecurity and Communications<br />
On Left: David Shearer, CISSP, PMP, (ISC)² Executive<br />
Director<br />
6<br />
istration and others. “It really took<br />
a monumental effort to plan, coordinate,<br />
and orchestrate activities<br />
necessary to get to where we are today<br />
and to see that we, indeed, are<br />
achieving financial cost savings,”<br />
said Simms, who has worked in information<br />
technology for 25 years<br />
and in information security for 15<br />
years.<br />
His innovative approach to<br />
rapidly deploy nearly $60M of CDM<br />
tools to 21 agencies was a productonly<br />
delivery order focused on agencies<br />
that could immediately benefit<br />
from additional tools. While saving<br />
taxpayer dollars and protecting<br />
federal networks, he also ensured<br />
that the agencies acquired critical<br />
capabilities to meet emerging, government-wide<br />
cyber threats. “We’ve<br />
received substantial savings, most in<br />
the form of savings on product delivery<br />
orders.”<br />
Going forward, Simms anticipated<br />
the tools now in place will be<br />
used for continuous monitoring and<br />
will be leveraged as the preferred<br />
approach for federal civilian government.<br />
Within each group, tasks<br />
and processes required to solicit solutions<br />
have been streamlined for<br />
each agency. The impact, he said, is<br />
expected to continue, with followup<br />
orders also including a high percentage<br />
of product discounts based<br />
of funding, policy and rapidly growing<br />
threats,” Waddell said.<br />
For instance, in the category<br />
of Technology Improvement, winner<br />
John Simms, CISSP, ITIL 3.0,<br />
MCSE, PMP, of the Department of<br />
Homeland Security, was honored<br />
for rapidly deploying tools to 21<br />
agencies, saving about $26 million<br />
through cost discounts on a $60<br />
million purchase.<br />
“Obviously, I was very humbled<br />
by the award,” said Simms.<br />
“Being award the GISLA individual<br />
award for technology improvement<br />
under the (ISC)² program<br />
is a huge honor.”<br />
Deep experience in the<br />
field and the collaboration of<br />
more than 60 agency and departmental<br />
partners allowed<br />
Simms, the requirements and<br />
acquisition support branch<br />
chief and Continuous Diagnostics<br />
and Mitigation (CDM)<br />
program manager in the Department<br />
of Homeland Security’s<br />
Office of Cybersecurity and<br />
Communications, to save money<br />
by avoiding significant costs.<br />
To do so involved a threeyear<br />
collaboration with the<br />
upon IT schedule 70 list prices.<br />
security and course development is<br />
odology enhancements to any gov-<br />
Government Services Admin- More on page 8<br />
Other <strong>2015</strong> GISLA recipients are:<br />
Community Awareness: 81<br />
Cyber Protection Team (CPT)<br />
As the U.S. Marine’s first National<br />
Cyber Protection Team, 81<br />
Cyber Protection Team quickly<br />
became the most sophisticated incident<br />
response element in the Department<br />
of Defense (DoD). 81<br />
CPT created innovative approaches<br />
to building an advanced defensive<br />
cyberspace capability in training,<br />
technology employment, methodologies<br />
and mission planning.<br />
Using both proprietary and commercial<br />
technology, the team built<br />
one of the most modern and effective<br />
defensive cyber programs for<br />
the DoD, including a CPT toolkit<br />
that has become the standard for all<br />
CPTs in the department<br />
81 CPT produced experts<br />
capable of conducting incident response,<br />
vulnerability analysis and<br />
mitigation, and procedure/meth-<br />
ernment organization. As a result,<br />
7<br />
81 CPT has shaped the way that the<br />
U.S. Cyber Command implements<br />
CPTs and has set the standard for<br />
other DoD teams.<br />
Workforce Improvement: Michael<br />
C. Redman, CISSP, CISM, CCNA,<br />
CompTIA Network+, CompTIA<br />
Security+, CompTIA A+, Comp-<br />
TIA Linux+, MCP, MCSA, senior<br />
information assurance manager<br />
and chief, Policy and Accreditation<br />
Branch<br />
Redman identified a training<br />
gap for DoD cybersecurity professionals<br />
and delivered in-house<br />
training courses to more than 300<br />
personnel using training materials<br />
that he created. With the knowledge<br />
transfer to students at their level of<br />
learning, 93 percent achieved a pass<br />
rate on certifications such as CISSP,<br />
CISM, Security+ and Linux+. His<br />
holistic approach to information
Information Security Leadership<br />
Award winners<br />
Continued from page 7<br />
bridging the gap between standard<br />
course material and the daily reality<br />
of civil servants and DoD personnel.<br />
On Right: Award Presented by: Charles<br />
“Chuck” McGann, CISSP, CISM, IAM, Chief<br />
Cyber Strategist, CRGT, Manager of Corporate<br />
Information Security, U.S. Postal Service,<br />
Retired, (ISC)² U.S. Government Advisory<br />
Council Member<br />
Winner in Middle: Benjamin Bergersen, cloud<br />
cybersecurity program manager, MAX.gov<br />
Shared Services, U.S. Department of Education<br />
On Left: David Shearer, CISSP, PMP, (ISC)²<br />
Executive Director<br />
Process/Policy: Benjamin Bergersen,<br />
cloud cybersecurity program<br />
manager, MAX.gov Shared Services,<br />
U.S. Department of Education<br />
Bergersen utilized his expertise<br />
in the areas of governmentwide<br />
collaboration, building high<br />
performance teams, business process<br />
transformation, IT governance,<br />
strategy, enterprise architecture,<br />
information security and portfolio<br />
management to lead security transformation<br />
of cybersecurity business<br />
processes for MAX.gov Shared Services.<br />
His ability to coordinate dozens<br />
of staff, multiple major applications,<br />
hundreds of servers and over<br />
120,000 users employing the Federal<br />
Risk Authorization Management<br />
Program (FedRAMP) model<br />
resulted in MAX.gov becoming the<br />
first federal agency application and<br />
software-as-a-service agency to become<br />
FedRAMP authorized.<br />
Most Valuable Industry Partner:<br />
The CERT Coordinating Center,<br />
Vulnerability Research and Coordination<br />
team, Carnegie Mellon<br />
University Software Engineering<br />
Institute<br />
The team pioneered efforts in<br />
vulnerability research automation<br />
for existing and emerging computing<br />
domains that have significantly<br />
strengthened the larger US-CERT<br />
mission of improving information<br />
security and providing value to industry<br />
partners. The team deployed<br />
On Left: David Shearer, CISSP, PMP, (ISC)²<br />
Executive Director<br />
Winner on Right representing Team: The<br />
CERT Coordinating Center (CERT/CC)<br />
Vulnerability Research and Coordination<br />
team, Carnegie Mellon University Software<br />
Engineering Institute<br />
the Tapioca automated vulnerability<br />
discovery tool and applied it to the<br />
11,000 applications available on the<br />
Google Play Store. Within a period<br />
of several days, over 20,000 vulnerabilities—or<br />
15 percent of the total<br />
vulnerabilities identified in 2014—<br />
were discovered. These results are<br />
enabling this new community of<br />
developers and vendors of the platforms<br />
they use to adopt better security<br />
practices and increase the utility<br />
to the expanding universe of mobile<br />
devices.<br />
Up-and-Coming Information Security<br />
Professional: Samuel A.<br />
Maroon, IT operations instructor,<br />
U.S. State Department<br />
Winner On Left: Samuel A. Maroon, IT operations<br />
instructor, U.S. State Department<br />
On Right: David Shearer, CISSP, PMP, (ISC)²<br />
Executive Director<br />
Maroon spends his spare time<br />
teaching and managing the Wounded<br />
Warrior Cyber Combat Academy,<br />
a program administered by<br />
the Federal IT Security Institute on<br />
behalf of the FITSI Foundation. Maroon<br />
has worked with more than 30<br />
injured veterans, volunteering 15-<br />
20 hours per week, to train veterans<br />
to help protect their country against<br />
cyber attacks. By engaging these<br />
male and female wounded warriors,<br />
he is tapping into a very talented<br />
and motivated resource pool to assist<br />
addressing the current shortage<br />
of skilled cybersecurity workers<br />
while helping to protect our national<br />
infrastructure.<br />
F. Lynn McNulty Tribute: W. Hord<br />
Tipton, CISSP, former executive<br />
director, (ISC)²<br />
Tipton was the first government<br />
CIO to obtain a Certified Information<br />
Systems Security Professional,<br />
helping to bring high-profile<br />
attention to the need for a more<br />
professionalized information security<br />
workforce. Throughout his<br />
career, Tipton drove support and<br />
advocated for federal government<br />
workforce initiatives such as the<br />
NICE Framework, DoD Directive<br />
8570 and reform of OPM’s 2210<br />
In Middle: Award presented by Corey Schou,<br />
Chairperson, Ph.D., CSSLP, Fellow of (ISC)²<br />
On Right: W. Hord Tipton, CISSP, former<br />
executive director, (ISC)2<br />
On Left: David Shearer, CISSP, PMP, (ISC)²<br />
Executive Director<br />
Job Series. He spearheaded<br />
major initiatives such as<br />
(ISC)²’s Global Academic<br />
Program and U.S.A Cyber<br />
Warrior Scholarships that<br />
are currently assisting the<br />
government in filling its cybersecurity<br />
workforce gap.<br />
Tipton has been instrumental<br />
in fostering the security<br />
education and certification<br />
of hundreds of thousands of<br />
individuals worldwide. He<br />
has dedicated his life to the<br />
advancement of the information<br />
security profession<br />
in the U.S. government and beyond,<br />
and is considered one of the most<br />
influential people in security.<br />
The U.S.A. Cyber Warrior<br />
Scholarship recipient was also announced<br />
during the GISLA ceremony.<br />
This scholarship program was<br />
developed by the (ISC)² Foundation<br />
in collaboration with Booz Allen<br />
Hamilton to help close the government’s<br />
cyber workforce gap by providing<br />
cyber security career training<br />
to qualified veterans who served<br />
in the U.S. military.<br />
Scholarship recipient Wajahat<br />
Qureshi ended his active duty in the<br />
Navy in 2007.He has served with<br />
Navy Reserve Command, and in<br />
2013 was named Sailor of the Year.<br />
His career goals include attaining<br />
his CISSP and earning a commission<br />
into the U.S. Navy Reserve as<br />
the information warfare designated<br />
officer.<br />
8 9<br />
On Left: David Shearer, CISSP, PMP, (ISC)² Executive<br />
Director<br />
On Right: Scholarship RECIPIENT: Wajahat Qureshi<br />
The winners were selected by<br />
a judging committee of senior information<br />
security experts from<br />
(ISC)2’s U.S. Government Advisory<br />
Council.<br />
For more information on the<br />
GISLA program, including selection<br />
criteria and eligibility requirements,<br />
visit www.isc2.org/gisla. For more<br />
information about the U.S.A. Cyber<br />
Warrior Scholarship, visit https://<br />
www.isc2cares.org.
GTL’s Phone IQ combats inmate fraud and<br />
criminal activity by determining phone type<br />
REStoN, Virginia – global<br />
tel*Link (gtL), the leading provider<br />
of correctional technology<br />
solutions, announces the release<br />
of Phone iQÔ, a new intelligence<br />
application available for its<br />
inmate telephone platforms that<br />
combats fraud and other criminal<br />
activity by detecting a called<br />
party’s phone line type.<br />
Phone iQ detects whether<br />
calls from a correctional facility<br />
are being placed to a traditional<br />
landline, a cellular phone, a<br />
disposable burner cell phone,<br />
or voice over internet protocol<br />
(VoiP) line. The gtL inmate<br />
telephone system user interface<br />
provides a visual indicator<br />
to alert users as to what is the<br />
called party’s phone type. Users<br />
are able to filter call detail reporting<br />
by the phone type detected<br />
and view the phone type<br />
indicator when monitoring calls<br />
in progress.<br />
Determining what type of<br />
phone an inmate is calling can<br />
be invaluable information to an<br />
investigator searching for fraudulent<br />
or other criminal activity,<br />
especially in facilities that limit<br />
the types of phones that inmates<br />
are allowed to call. investigators<br />
can quickly spot frequent changes<br />
of phone numbers, specifically<br />
prepaid burner phones, called<br />
by watched inmates or groups of<br />
inmates. isolating calls to burner<br />
phones can aide in researching<br />
calls with valuable content. it<br />
also increases the facility’s control<br />
in deciding if specific calls<br />
should be flagged and an alert<br />
sent.<br />
Phone iQ is one of many<br />
tools in the iQ family of intelligence<br />
products. together, these<br />
products form the most holistic<br />
approach to intelligence gathering<br />
in the correctional industry,<br />
offering investigators a broad<br />
range of options for gathering<br />
pertinent, actionable intelligence.<br />
For more information<br />
about this new fraud and criminal<br />
activity detection feature,<br />
contact a gtL representative<br />
today for a demonstration or<br />
visit www.gtl.net/phoneiqpr.<br />
About Global Tel*Link<br />
GTL is the leading provider of<br />
integrated correctional technology<br />
solutions, delivering financial<br />
value, security, and ease of operation<br />
to our customers through<br />
visionary products and solutions<br />
at the forefront of corrections<br />
innovation. As a trusted correctional<br />
industry leader, GTL<br />
provides service to approximately<br />
fifty percent of inmates nationwide,<br />
including service to 32 state<br />
departments of corrections, the<br />
District of Columbia, Puerto Rico,<br />
and 32 of the largest city/county<br />
facilities. GTL is headquartered<br />
in Reston, Virginia, with more<br />
than 10 regional offices across the<br />
country. To find out more about<br />
GTL, please visit our website<br />
www.gtl.net.<br />
OPM to provide employees<br />
impacted by data breach with<br />
credit monitoring and identity<br />
theft insurance<br />
Continued from page 4<br />
films. two months prior, the<br />
U.S. Postal Service announced<br />
employee addresses and Social<br />
Security numbers were exposed.<br />
around the same time, the State<br />
Department needed to suspend<br />
its unclassified email system af-<br />
THE NEW ENTRY<br />
for ACCESS CONTROL POINTS<br />
AMERISTARBOOTHS.COM | 855.526.6847<br />
ter breaches were discovered in<br />
State and White House systems.<br />
oPM was a target in an attack<br />
launched last year against<br />
a contractor, KeyPoint government<br />
Solutions, that is responsible<br />
for conducting background<br />
checks on employees and applicants<br />
applying for security<br />
clearances. But that breach exposed<br />
less than 50,000 people.<br />
oPM said it will notify<br />
current and former employees<br />
CITADEL ® Gatehouse<br />
10 11<br />
a<br />
whose information was compromised<br />
beginning on Monday.<br />
it will also offer those impacted<br />
with up to 18 months of credit<br />
monitoring and identity theft<br />
insurance. The agency also encouraged<br />
people to closely monitor<br />
their bank accounts for any<br />
suspicious activity and request a<br />
free copy of their credit report.<br />
GUARANTEED DELIVERY DATES<br />
Established production methods allows us to<br />
provide short and accurate lead-time and delivery,<br />
keeping your project on schedule.<br />
FULLY GALVANIZED FRAMEWORK<br />
Corrosion resistance in trapped areas where heating<br />
and cooling cycles create moisture producing rust<br />
on conventional unprotected framework.<br />
SINGLE SOURCE FOR PHYSICAL SECURITY<br />
Ameristar manufactures an array of perimeter security<br />
products. These products range from active vehicle<br />
barriers, gate systems (gates, operators and access<br />
controls), security fence and now guard booths.
exactEarth, Harris Corporation form strategic<br />
alliance to provide real-rime global maritime tracking<br />
and information solutions<br />
CaMBRiDgE, oN – <strong>June</strong> 8,<br />
<strong>2015</strong>– exactEarth Ltd., the leading<br />
provider of Satellite automatic<br />
identification System<br />
(aiS) data services and Harris<br />
Corporation (NYSE:HRS), a<br />
world leader in space, geospatial<br />
and remote sensing solutions,<br />
have formed an alliance to<br />
provide a new level of aiS data<br />
service that will deliver real-time<br />
global coverage for maritime<br />
vessel tracking. The new service<br />
will leverage the persistent global<br />
coverage and real-time connectivity<br />
of the iridium NEXt<br />
constellation through the implementation<br />
of 58 hosted payloads<br />
covering the Maritime VHF<br />
frequency band.<br />
Compatibility testing of the<br />
hosted payload with the iridium<br />
satellites has been completed and<br />
the first launch is scheduled for<br />
early 2016 with the completed<br />
constellation expected in 2017.<br />
The new service will provide<br />
customers with the fastest, most<br />
accurate vessel information<br />
available. With revisit times and<br />
latency under one minute, the<br />
service expansion represents a<br />
monumental leap forward in the<br />
ability for both Harris and exactEarth<br />
to offer truly unsurpassed<br />
global ship tracking and maritime<br />
information solutions.<br />
The alliance leverages exactEarth’s<br />
proven and patented signal<br />
de-collision detection technology<br />
and Harris’ expertise in satellite<br />
hosted payloads, advanced<br />
radio frequency technology<br />
and antenna solutions. Harris<br />
becomes the exclusive provider<br />
to the US government of aiS<br />
products and services produced<br />
under the alliance, including<br />
exactEarth’s exactaiS product<br />
portfolio, while exactEarth continues<br />
to serve all other global<br />
markets.<br />
“This alliance will expand our<br />
intelliEarth family of innovative<br />
solutions, which leverage<br />
Harris’ world-class remote<br />
sensing capabilities to help customers<br />
around the globe make<br />
smarter operational and business<br />
decisions,” said Bill gattle, Vice<br />
President and general Manager,<br />
National Programs, Harris<br />
government Communications<br />
Systems. “Harris is committed<br />
to exploring new technologies<br />
and partnering with worldleading<br />
organizations to provide<br />
our customers with the greatest<br />
value.”<br />
“as the recognized Satellite aiS<br />
industry leader, this announcement<br />
further strengthens our<br />
commitment to provide bestin-class<br />
maritime intelligence<br />
solutions to our customers<br />
worldwide,” said Peter Mabson,<br />
President of exactEarth. “We<br />
are thrilled to be able to offer the<br />
shortest revisit times and lowest<br />
latency for developing true<br />
maritime domain awareness.<br />
This partnership with Harris will<br />
allow us to significantly expand<br />
the range of advanced valueadded<br />
services and information<br />
solutions that we can bring to<br />
the global maritime market.”<br />
about exactEarth Ltd.<br />
exactEarth, based in Cambridge,<br />
ontario, is a data services company<br />
providing the most advanced<br />
information on global<br />
maritime traffic available today.<br />
our premium service, exactaiS®,<br />
delivers an unrivalled view of the<br />
recognized maritime picture at<br />
a global scale. offering fully secure<br />
data in a variety of industry<br />
standard formats and delivery<br />
methods, exactEarth provides<br />
advanced information services<br />
for a wide range of operational<br />
maritime applications delivering<br />
operational efficiencies, enhancing<br />
security, safeguarding the<br />
environment, and assisting in<br />
saving lives. For more information,<br />
visit our website at exactearth.com.<br />
About Harris Corporation<br />
Harris provides advanced,<br />
technology-based solutions that<br />
solve government and commercial<br />
customers’ mission critical<br />
challenges. The company has<br />
approximately $8 billion in annual<br />
revenue and about 23,000<br />
employees – including 9,000<br />
engineers and scientists – supporting<br />
customers in more than<br />
125 countries. Learn more at<br />
harris.com<br />
PHYSICAL SECURITY<br />
with COMPLETE PERIMETER CONTROL<br />
ANTI-CLIMB FENCE RETRACTABLE WEDGES ANTI-RAM FENCE SECURITY BOLLARDS<br />
Call our perimeter security specialist at 866-467-2773 and visit us online at ameristarsecurity.com<br />
12 13
Texas disaster illustrates climate change as a security threat,<br />
says Dr. George Lane, CEO, Emergency Response Technology<br />
Climate change is not only a matter<br />
of health, environmental concern<br />
and international obligation, President<br />
obama told the graduating<br />
class of the U.S. Coast guard academy.<br />
it is one of national security.<br />
The latest devastating weather<br />
in texas and surrounding states<br />
serves as an unfortunate example of<br />
this security threat, according to Dr.<br />
george Lane, CEo of Emergency<br />
Response technology, a two-time<br />
Winner in gSN’s airport, Seaport,<br />
Border Security awards.<br />
“The driving factor in all this<br />
(extreme weather) is the global<br />
warming and climate change. it’s<br />
basically weather driven by heat being<br />
absorbed into the ocean,” said<br />
Lane, explaining that the ocean acts<br />
as an engine. “That engine’s increasing<br />
energy, so whatever weather<br />
takes place, it is going to have more<br />
energy.”<br />
This ramped-up engine brings<br />
weather, such as the extreme weather<br />
that made the water level rise<br />
30 feet—roughly three stories—in<br />
10 minutes in a small town outside<br />
Houston. “You can’t respond<br />
to that,” Lane said. “Nor could they<br />
(first responders). No way. Nothing<br />
could have been done in that particular<br />
case.”<br />
News reports described fatal<br />
walls of water that knocked houses<br />
off their foundations and submerged<br />
vehicles, then hampered<br />
rescue workers in attempts to save<br />
people and to locate remains.<br />
“They’ve (first responders) got<br />
to get a lot more boats; there’s going<br />
to be a lot more water rescue, there’s<br />
no doubt about that,” Lane said, “We<br />
need to have a better response for<br />
evacuations. They’re going to get a<br />
lot more flooding.”<br />
going forward, Lane prescribed<br />
changes both in construction<br />
methods and public perception.<br />
Weather-resistant houses will<br />
need to be on legs, with garages on<br />
the first floor and living areas on the<br />
second floor. “That’s the only construction<br />
way to prepare,” he said.<br />
The nation also needs to<br />
make more use of—and take better<br />
heed of—technologically advanced<br />
weather forecasts that can do more<br />
than remind people to carry umbrellas.<br />
“The meteorologists have<br />
supercomputers, and people don’t<br />
really believe them. They can pull up<br />
three days in advance when a rainstorm<br />
would be within 20 miles,”<br />
Lane said. “Data collected is being<br />
massively underutilized.”<br />
But Lane also pointed out<br />
that the meteorologists’ knowledge<br />
comes with a certain responsibility—not<br />
only to safeguard people<br />
and property but to protect the<br />
weather industry’s reputation. Forecasters<br />
must be critically aware of<br />
the damage to credibility in reporting<br />
a false positive—or negative—<br />
event, he said. “We’ve got to be very<br />
conservative. if you’re not right,<br />
then no one will take you seriously.”<br />
in the aftermath of the flooding,<br />
southern texas will find itself<br />
in much the same dilemma as<br />
Boston did this spring. Fighting<br />
back against a record snowfall that<br />
topped 108 inches, Boston had to<br />
invent new ways to pile its snow<br />
while digging out; photos of at least<br />
one persistent snow pile made news<br />
in May. Parts of texas will have a<br />
similar issue with flood water, Lane<br />
predicted. “There’s so much of it, it<br />
will probably be the end of <strong>July</strong> till<br />
they get back to normal,” he said.<br />
This standing water will become<br />
stagnant water mixed with<br />
raw sewage runoff in a wider-thanexpected<br />
area across the warm<br />
South—compounding the situation.<br />
“That’s called a breeding ground for<br />
mosquitos,” Lane said. “There might<br />
be epidemics of various diseases carried<br />
by mosquitos because there are<br />
going to be millions of them all over<br />
the South. …Emergency responders<br />
know this; the entire state now<br />
has to be sprayed. There’s just not<br />
enough material available to use—<br />
which might be like running out of<br />
salt for deicing the Northeast.”<br />
Weather extremes could make<br />
these kinds of scenarios—and their<br />
problematic recovery—more prevalent<br />
nationwide. Lest those living<br />
outside the southern shoreline or<br />
the storm-studded Midwest consider<br />
themselves immune from the ravages<br />
of climate change,<br />
Lane shared tales of lake<br />
effect snow hitting him<br />
from three different directions<br />
on the upper<br />
Michigan peninsula.<br />
“Don’t think ‘They’ve got<br />
it made because they’re<br />
inland.’”<br />
Lane recalled how,<br />
only two years ago, Hurricane<br />
Sandy battered<br />
the East Coast, and again emphasized<br />
the power of a vast, overheated<br />
ocean. “The takeaway is this is<br />
what we’re seeing when you get heat<br />
caused by global warming absorbed.<br />
… The temperature in the oceans is<br />
the driving factor in weather, period,<br />
the driving factor in a hurricane.<br />
The more energy you have, the more<br />
extreme the swings in weather.”<br />
Looking ahead, Lane provided<br />
several scenarios illustrating<br />
how weather extremes could impact<br />
personal safety, safety of cities and<br />
ports, even the economy—echoing<br />
the warning obama shared with<br />
the graduating guardsmen. The<br />
president predicted impacts on the<br />
economy, as rising oceans threaten<br />
thousands of miles of highways, railways,<br />
energy facilities and military<br />
installations; greater risks of natural<br />
disaster that increase refugee migrations<br />
and heighten conflicts over<br />
food and water; aggravation of poverty<br />
and political instability that can<br />
lead to terrorists and other violent<br />
actions.<br />
Leaders around the<br />
world agree that climate<br />
change is a security concern.<br />
Secretary of State<br />
John Kerry reported<br />
that climate change and<br />
security was a prime<br />
discussion among leaders<br />
on his recent trip to<br />
George Lane asia. France’s influential<br />
Environment Minister<br />
Segolene Royal, in advance of<br />
a meeting about reducing global<br />
emissions, told the associated Press,<br />
“The climate question is also at the<br />
heart of the security question.”<br />
14 15
DarkFighter Network Camera<br />
Conventional Camera<br />
LightFighter Network Camera<br />
Conventional Camera<br />
DarkFighter and LightFighter cameras provide<br />
superior quality images and high performance.<br />
Both cameras offer full 1080p HD to capture<br />
even the most minute details.<br />
Smart Features:<br />
• 3D digital Noise Reduction (DNR)<br />
• Defogging Technology<br />
• Electronic Image Stabilization (EIS)<br />
Introducing<br />
DarkFighter&LightFighter<br />
Network Cameras<br />
Hikvision USA Inc. • Tel: +1-909-895-0400 • Email: sales.usa@hikvision.com • www.hikvision.com
Secure Identity & Biometrics Association (SIBA) names<br />
Troy Potter of L-3 National Security Solutions as chairman<br />
WaSHiNgtoN, <strong>June</strong> 8, <strong>2015</strong> /<br />
PRNewswire/ -- The Secure identity<br />
& Biometrics association<br />
(SiBa), announced today their<br />
selection of troy Potter of L-3<br />
National Security Solutions (NSS)<br />
as Chairman, effective immediately.<br />
SiBa is a non-profit association<br />
that was established in February<br />
2014 to steadfastly promote responsible<br />
policy, education and implementation<br />
of solutions that protect<br />
and secure identity across private<br />
and public platforms.<br />
Potter was chosen because of<br />
his vast experience in both the government<br />
and industry. He served as<br />
the identity Services Branch (iSB)<br />
Deputy assistant Director at the<br />
U.S. Visitor and immigrant Status<br />
indicator technology (US-ViSit)<br />
program and was US-ViSit’s Biometrics<br />
Systems Program Manager<br />
for a number of years, responsible<br />
for the management and oversight<br />
of one of the largest biometrics<br />
systems in the world. today Potter<br />
is the vice president of L-3 NSS’<br />
global Solutions Sector and leads<br />
all L-3 NSS Border Security and<br />
Biometrics programs.<br />
“i am very pleased to chair<br />
SiBa, which has rapidly established<br />
itself as the leading resource to proactively<br />
create awareness<br />
and promote<br />
the value of identity<br />
technologies and biometric<br />
solutions to<br />
enhance the security<br />
of individuals as well<br />
as organizations and<br />
the government,”<br />
said Potter. “i look<br />
forward to working<br />
with SiBa CEo Janice<br />
Kephart and the board<br />
to continue the significant progress<br />
the association has made,” he<br />
added.<br />
Potter takes over as Chairman<br />
from former animetrics<br />
CEo Paul Schuepp who served<br />
with outstanding leadership in the<br />
formative stages of SiBa. Schuepp<br />
said, “i believe strongly in the SiBa<br />
mission, and am very proud of how<br />
far SiBa has come in a short while.<br />
With persistence, strategic vision<br />
and credibility, SiBa is already<br />
well-respected by government, the<br />
private sector, and the media. i am<br />
so pleased with how serious our<br />
work is valued.”<br />
Recently CEo Kephart was<br />
asked to testify before the Senate<br />
Homeland Security Committee<br />
on a key biometric border issue.<br />
in addition, SiBa is galvanizing<br />
industry-leading<br />
companies and<br />
trade associations<br />
to come together to<br />
address core federal<br />
government biometric<br />
challenges.<br />
The SiBa<br />
board continues<br />
to attract proven<br />
expertise in identity<br />
management and biometric<br />
solutions, high<br />
technology government relations<br />
and commercialization, and the<br />
defense, intelligence and homeland<br />
security communities both domestically<br />
and overseas.<br />
“When we began on this<br />
journey to create an organization<br />
that was as cutting-edge and gamechanging<br />
as the identity solutions<br />
SiBa sought to represent, we never<br />
imagined the exceptional growth<br />
and quality of membership we<br />
would have,” said Kephart. “i look<br />
forward to working with Mr. Potter,<br />
our Board and our growing membership<br />
to expand our presence in<br />
the identity market,” she added.<br />
in addition to Chairman troy<br />
Potter, SiBa board members are:<br />
• Jim Annulis, President and CEO,<br />
ProQual-i.t., inc.<br />
• Ernest Baynard, President, Merid-<br />
Troy Potter<br />
ian Hill Strategies inc.<br />
• Michael Dougherty, Director of<br />
Law Enforcement Solutions, Raytheon<br />
• Michael Petrov, Managing Director<br />
North america, Vision-Box<br />
• Lester Quintana, Senior Vice<br />
President, Cellucci associates<br />
• Catherine Renner-Amachree, DC<br />
Head of operations and Business<br />
Development, abanacle Corp.<br />
• Paul Schuepp, former President<br />
and CEo, animetrics<br />
“With the increasing threats of<br />
transnational organized crime and<br />
CPL12X<br />
global terrorism, effective public<br />
– private sector collaboration is<br />
essential to strengthen our border<br />
security and public safety,” said Celeste<br />
Thomasson, CEo and President<br />
of Morphotrak. Morphotrak<br />
is one of the newest members of<br />
SiBa. “We look forward to engaging<br />
in this collaboration with SiBa<br />
via its air Entry and Exit Working<br />
group and other activities. We<br />
continuously strive to strengthen<br />
our biometric and identity management<br />
solutions to address the everevolving<br />
challenges of homeland<br />
security,” Thomasson added.<br />
CPL1<br />
CPWP1<br />
© <strong>2015</strong>, CAST Lighting LLC., 1120-A Goffle Rd., Hawthorne, NJ 07506 • Patents Pending<br />
About SIBA<br />
SiBa is a group of vendors and<br />
other stakeholders with a common<br />
interest in proactive thought<br />
leadership, communications and<br />
government relations regarding the<br />
value of solutions that effectively<br />
protect and secure individuals from<br />
identity threats as well as protect<br />
and secure facilities, organizations<br />
and governments.<br />
http://www.sibassoc.org<br />
• Safe 24-Volt System<br />
• Quality Cree® LED’s<br />
• 60,500 Hr. Life (L70)<br />
• Dust & Moisture Resistant<br />
• Surge & Spike Protected<br />
• 4 Available Intensity Settings<br />
For more information, CALL<br />
973•423•2303 or info@cast-lighting.com<br />
www.cast-lighting.com<br />
18 19
Speaker Hastert:<br />
A study of failed leadership<br />
By K Denise Rucker Krepp<br />
When news about the Department<br />
of Justice’s indictment<br />
of former House of<br />
Representatives Speaker Dennis<br />
Hastert was released on Thursday,<br />
i immediately thought<br />
about the scandal that engulfed<br />
the former speaker nine years<br />
earlier. on that September day,<br />
Representative Mark Foley resigned<br />
after being accused of<br />
sending inappropriate email<br />
messages to former male pages.<br />
Speaker Hastert knew about<br />
the messages but failed to take<br />
corrective action until the story<br />
blew up in the press.<br />
on the evening of September<br />
29, 2006, i was sitting in the<br />
chamber of the House of Representatives.<br />
at that time, i was an<br />
attorney working for the Homeland<br />
Security Committee. i had<br />
spent the past several<br />
months working<br />
with my Senate<br />
counterparts on a<br />
major piece of maritime<br />
security legislation.<br />
We finally<br />
reached agreement<br />
on the bill earlier<br />
that week and the entire House<br />
of Representatives was slated to<br />
vote on the compromise legislation<br />
that night.<br />
When we arrived in the<br />
chamber, everyone was talking<br />
about the emails Representative<br />
Foley’s emails. What was in<br />
them? Why did he send them<br />
to the young, underage men?<br />
These questions swirled around<br />
the chamber as staff tried to get<br />
Congress members focused on<br />
legislating.<br />
Suddenly, then Minority<br />
Leader Nancy Pelosi strode<br />
down the chamber. “Mr. Speaker,”<br />
she hollered. Heads swiveled<br />
in the tiny lady’s direction.<br />
“i send to the desk a privileged<br />
resolution.” The resolution<br />
called for an investigation into<br />
Representative Foley’s conduct.<br />
it also highlighted the fact<br />
that senior Republican members<br />
knew about the emails for<br />
months but failed to act.<br />
The Republican leaders<br />
who knew about the emails included<br />
then Majority Leader<br />
John Boehner. Representative<br />
Boehner told the Washington<br />
Post that he spoke with then<br />
Speaker Hastert in the spring<br />
of 2006 and was told that the issue<br />
was ‘”being taken care of ’”.<br />
it wasn’t. Representative Foley<br />
was still a member of Congress<br />
in September.<br />
When the Representative<br />
Foley story exploded on that hot<br />
September day, then Speaker<br />
Hastert didn’t accept responsibility<br />
for failing to act. instead,<br />
he deflected it and blamed his<br />
staff for not properly investigating<br />
the emails. He wasn’t the<br />
only one using these knife-inthe-back<br />
talking points. Shockingly,<br />
former Representative Ray<br />
LaHood told CBS’ Bob Schieffer<br />
that then Speaker Hastert’s staff<br />
had done him a “disservice” for<br />
how they handled them.<br />
Fast forward nine years<br />
and the La times is reporting that former Speaker Hastert<br />
paid over $1.7 million to conceal sexual abuse. The<br />
alleged abuse this time is against a former male student.<br />
Then Speaker Hastert allegedly paid this individual to remain<br />
quiet and then lied to the Federal Bureau of investigations<br />
about the money he was withdrawing to make the<br />
cash payments.<br />
i’m extremely disheartened by this sordid story. Then<br />
Speaker Hastert was the leader of the House of Representatives.<br />
in this role, he was responsible for disciplining<br />
members who misbehaved. But how could do this when<br />
he himself had allegedly sexually assaulted a former male<br />
student?<br />
Disheartenment turns to disgust when realizing how<br />
close then Speaker Hastert was to being President of the<br />
United States. if something had happened to President<br />
Bush or Vice President Cheney, then Speaker Hastert<br />
would have become president. a man who was indicted<br />
last week by DoJ for lying to the FBi about making cash<br />
payment to an alleged sexual abuse victim would have<br />
ruled our country.<br />
K. Denise Rucker Krepp, former Senior Counsel on the<br />
House of Representatives Homeland Security Committee<br />
PERIMETER<br />
S ECURITY<br />
TOTAL SOLUTIONS<br />
Due to the threat of terrorism, sabotage, destruction by<br />
physical damage, theft, or ballistic attack, the<br />
importance of a fully compliant Total Solutions Package<br />
(TSP) is critical. System elements of an effective TSP<br />
should include fencing, vehicle barriers/retractable<br />
bollards, access control, CCTV, and intrusion detection.<br />
Betafence USA can assess your security risks and design<br />
a fully integrated Total Solutions Package (TSP) to assure<br />
a seamless solution. Our offerings include access control,<br />
high security perimeter fencing, SecureUSA ® vehicular<br />
barriers/bollards and a complete Perimeter Intrusion<br />
Detection System (PIDS) to meet your needs.<br />
Total Solutions Package (TSP)<br />
FutureWEDGE SecureUSA ® : ureW<br />
®<br />
Betafence: Guardian 7000<br />
Unique Solutions & Expertise<br />
Services:<br />
• Risk & Needs Analysis<br />
• Security Audit<br />
• Design & Engineering<br />
• Integration<br />
• Project Management<br />
• Installation<br />
• Testing<br />
• Training<br />
• Performance Management<br />
• Maintenance<br />
Products:<br />
• High Security Fence Systems<br />
• Rapid Deployment Barriers<br />
• Crash Rated Barriers<br />
• Access Control<br />
• Vehicle Barriers & Turnstiles<br />
• Intrusion and Proximity Detection<br />
• Lighting, Surveillance, Alarms<br />
• Integration and<br />
Monitoring Software<br />
• Bollards<br />
CIP-014 Compliant<br />
GS07F6097P<br />
20 21<br />
844.354.4785 • www.SecureUSA.net • info@SecureUSA.net
Law enforcement cameras show promise,<br />
but details need due diligence, says SIA panel<br />
By John Wagley<br />
Washington, Sia government<br />
Summit, <strong>June</strong> 9 – one panel at the<br />
recent Securities industry association<br />
summit in Washington focused<br />
on police and body-worn cameras.<br />
The idea of body-worn cameras has<br />
been gaining<br />
traction in the<br />
past year or<br />
so, particularly<br />
as the Department<br />
of<br />
Justice (DoJ)<br />
recently said<br />
it is offering<br />
$20 million to provide departments<br />
with the technology.<br />
There is a long way to go<br />
though before many police departments<br />
are comfortable in outfitting<br />
their officers with the technology,<br />
according to the panel. Questions<br />
included: When should the cameras<br />
be turned off and on?; how should<br />
the video be stored and reviewed?;<br />
and how do departments use cameras<br />
while protecting citizens’ privacy?<br />
Participants agreed that before<br />
cameras are placed on officers,<br />
a strong policy on how and when<br />
cameras are used needs to be in<br />
place.<br />
More than 30 states have introduced<br />
legislation on body-worn<br />
cameras, said Shene Commodore,<br />
government Contracts and Business<br />
Manager at intertek, who moderated<br />
the panel. Legislation focuses<br />
on issues including privacy, video<br />
storage, and the cameras’ practicality,<br />
she said. in a 2014 study, the<br />
Police Executive<br />
Research Forum<br />
found about one<br />
in three police<br />
agencies do not<br />
have a written<br />
policy regarding<br />
the cameras.<br />
Even with<br />
the DoJ’s $20 million grant, one<br />
third of which is meant to help<br />
small law enforcement agencies,<br />
some panelists said many questions<br />
still exist about the technology’s viability<br />
and affordability.<br />
one major concern is whether<br />
officers will be able to turn the cameras<br />
on or off in a stressful situation,<br />
said Carl Maupin, Captain, Leesburg<br />
Police Department (Va). “They may<br />
not think to do it.” Further, taking<br />
the time to turn it on could place<br />
them in “greater jeopardy.”<br />
Police departments do have<br />
experience storing video data, he<br />
said, such as with police car dash<br />
cams. The bigger concern is about<br />
analyzing the video. Most agencies<br />
don’t have the money to get analysts<br />
to view the video, so it could burden<br />
officers.<br />
one reason many departments<br />
are hesitant to use body cameras<br />
concerns privacy, said Mike<br />
Fergus, technology Center Program<br />
Manager, international association<br />
of Chiefs of Police. Perhaps in goes<br />
into a home to interview a witness,<br />
he or she could allay concerns by using<br />
“a very obvious lens cap.”<br />
Due to such concerns, many<br />
agencies are waiting for legislation<br />
and guidance to be worked out before<br />
committing to cameras, said<br />
Fergus. The international association<br />
of Chiefs of Police has a model<br />
policy located at http://www.theiacp.<br />
org/ViewResult?SearchiD=2401.<br />
The DoJ also has a website designed<br />
to help departments get started:<br />
https://www.bja.gov/bwc/.<br />
“i think it’s important agencies<br />
do their due diligence,” said Mark<br />
greene, Director of Policy, Standards<br />
and grants Management Division,<br />
office of Science and technology,<br />
National institute of Justice.<br />
“Jumping into something really<br />
quickly is not the way to go.”<br />
Keynote address by US Senator Johnson<br />
R-Wis covers border security, drugs, TSA,<br />
infrastructure protection and federal debt<br />
at SIA Government Summit<br />
By adrian Courtenay<br />
<strong>June</strong> 16, <strong>2015</strong> - in a lively, occasionally<br />
controversial keynote presentation,<br />
U.S. Senator Ron Johnson,<br />
Chairman of the Senate Homeland<br />
Security and government affairs<br />
Committee, covered a broad range<br />
of prickly topics in his keynote presentation<br />
at last week’s Sia government<br />
Summit in Washington, DC.<br />
although the Senator is clearly a<br />
fiscal conservative, he was very<br />
forceful in stating his belief that the<br />
country is in dire need of dealing<br />
with its crumbling critical infrastructure.<br />
“There’s a $10-$15 billion<br />
shortfall in the Highway trust<br />
Fund,” he pointed out. “We need<br />
to spend money on infrastructure<br />
protection.”<br />
He also exhibited a great sensitivity<br />
to the situation of the many immigrants<br />
that have fled poverty, gang<br />
warfare and murder in their home<br />
countries and risked everything<br />
by migrating to the U.S. in recent<br />
years, presenting many challenges<br />
to the federal, state and local government.<br />
“The number one incentive to<br />
border crossings is a better life,<br />
the same as all of our ancestors.<br />
a functioning guest worker is the<br />
solution that most immigrants are<br />
working under. We need achievable<br />
goals and we need to understand<br />
and admit reality and deal with the<br />
problem on a step by step basis.”<br />
“one of the great strengths of<br />
america,” he said, is “equality for<br />
all.”<br />
But the Senator showed no tolerance<br />
for the drug situation. “our<br />
biggest problem is the demand for<br />
drugs. general McCaffrey [former<br />
U.S. Drug Czar] said they were<br />
intercepting only 5-10% of the<br />
narcotics coming in to the country.<br />
The cartels were allowed to be<br />
formed. First it was drugs, now its<br />
drugs, guns and human slavery.”<br />
The Senator’s fiscal security bona<br />
fides became more evident when he<br />
described witnessing “the growing<br />
deficits produced by obama-care”<br />
and “the huge transfer of wealth<br />
from old to young”, not to mention<br />
unfunded liabilities and “the<br />
dysfunction nature of Washington,”<br />
where, he observed, “people talk<br />
about tactics rather than strategy.”<br />
“The Social Security trust fund<br />
is a fiction and has no value,” he<br />
22 23<br />
Senator Ron Johnson R-Wis<br />
asserted. “Medicare has no value<br />
either, since it’s one dollar going in<br />
and three going out. in 30 years,<br />
the country will have a $127 trillion<br />
debt. in fact, he said, “it will<br />
take $71 trillion just to address<br />
the Social Security and Medicare<br />
problem.”<br />
Noting that most of the Senator’s<br />
remarks relating to fiscal issues<br />
were focused mainly on government<br />
spending as opposed to revenues,<br />
a gSN representative could<br />
not resist submitting a question<br />
to Senator Johnson relating to the<br />
revenue side of the ledger:<br />
“Senator Johnson, in light of your<br />
obvious concern about the growing<br />
national debt and the gap between<br />
revenues and spending, can you tell<br />
us how you feel about the fact that a<br />
number of large companies, such as<br />
More on page 46
NIC expert offers solutions for new, insidious DDOS<br />
attacks on government<br />
By Rodney Caudle<br />
Director of Information Security<br />
NIC Inc.<br />
“Traditional” denialof-service<br />
(DoS) attacks,<br />
which originate<br />
from a single source<br />
to target a website or<br />
network, have been<br />
around since networks<br />
first began connecting<br />
to one another. Distributed<br />
denial-of-service<br />
(DDoS) attacks are a<br />
relatively newer phenomenon –<br />
and more insidious, because they<br />
originate from multiple sources<br />
executing synchronized attacks<br />
against a single target.<br />
Attackers also are changing<br />
the ways they utilize these techniques,<br />
and government agencies<br />
may be less familiar with, and<br />
therefore less knowledgeable about<br />
how to mitigate, these new methods.<br />
The changing face<br />
of DDoS attacks<br />
The first well-publicized DDoS attack<br />
occurred in early 2000, when<br />
an attacker took over a university<br />
computer lab and repurposed<br />
its computers to flood traffic on<br />
Yahoo, shutting the Internet portal<br />
down for three hours. While the<br />
first DDoS attacks focused on universities<br />
and other collections<br />
of computers,<br />
the increasing availability<br />
of high-speed<br />
Internet access for the<br />
average home also has<br />
resulted in a growing<br />
pool of sources for<br />
DDoS attacks. More<br />
recently, three other<br />
kinds of DDoS attacks<br />
have appeared:<br />
• Resource consumption. As<br />
if starting the “three-way handshake”<br />
that establishes a connection<br />
between two computers on the<br />
Internet, attackers begin to initiate<br />
multiple bogus requests for a<br />
connection as fast as they can. The<br />
server recognizes and responds to<br />
the requests. However, the attacker<br />
doesn’t send the final pieces of<br />
information required to complete<br />
any of the connections, forcing<br />
the server to wait for the expected<br />
response. If the attacker can tie up<br />
all of the server’s available connections,<br />
it becomes impossible for the<br />
target to communicate with legitimate<br />
users. In another flavor of this<br />
DDoS attack type, an attacker can<br />
use legitimate traffic to force the<br />
target’s server into creating a large<br />
number of log files, possibly consuming<br />
all the server’s disk space.<br />
• Slowloris. Attackers establish<br />
legitimate connections by<br />
completing numerous three-way<br />
handshakes, but then each connection<br />
unavailable due to the surge created<br />
by the attacker. This type of attack<br />
has significant impact because the<br />
DDoS includes the target server<br />
and any servers on the same immediate<br />
network.<br />
DDoS attacks also are changing<br />
in volume. DDoS attacks in the<br />
early 2000s were in the neighborhood<br />
of 4 GB per second. They<br />
now average between 10 GB and<br />
60 GB per second, and one DDoS<br />
launched in February peaked at just<br />
under 400 Gbps. The average DDoS<br />
incident lasts 17 hours.<br />
shot a local teenager.<br />
Hackers typically want to<br />
cause an agency financial harm,<br />
as would be the case if, say, a state<br />
department of revenue were shut<br />
down during tax season to delay or<br />
make it impossible for constituents<br />
to file their taxes on time. Citizens<br />
expect that government officials<br />
should be able to keep an online<br />
service running, so if attackers can<br />
take a service down, they also can<br />
damage an agency’s reputation.<br />
By their nature, government<br />
agencies and the services they of-<br />
agency a less appealing target. The<br />
first step is to distribute your services<br />
in various locations so that a<br />
single DDoS attack cannot take the<br />
entire suite of services offered by<br />
an agency offline. The other disadvantage<br />
of hosting your services in<br />
only one data center is that, if you<br />
come under a DDoS attack, your<br />
Internet services provider will be<br />
the only one who can remedy your<br />
problem, and it will be incredibly<br />
expensive to fix. You’ll be captive<br />
to the ISP’s solution, with very little<br />
power to negotiate its cost.<br />
begins to instruct the target,<br />
fer always will be targets. Taking<br />
You can choose, instead, to<br />
“I got busy. I’ll get back to you in a<br />
Attacks on government<br />
hackers’ motivations and the ease use a content delivery network as a<br />
little while.” The target server waits<br />
are increasing<br />
with which DDoS attacks can be “front door” to your services. CDNs<br />
on the requests, assuming that the<br />
users are on slow or unreliable<br />
networks and that the rest of the<br />
information will arrive in time. The<br />
attackers can send a fragment of<br />
data every few minutes to keep the<br />
Compared to other industries,<br />
the public sector experienced the<br />
greatest escalation in DDoS attacks<br />
in Q4 2014. More frightening still<br />
is that DDoS attacks are easy for<br />
almost anyone to initiate. Attacker<br />
launched into consideration, the<br />
question is no longer if an agency<br />
will be hit. The questions are when<br />
will the attack come, how big will<br />
it be and – most importantly – will<br />
the agency be ready?<br />
can mask your network connections<br />
from attackers so they’re less<br />
likely to target your agency. These<br />
services, while beneficial, also can<br />
be pricey, so consider costs as you<br />
evaluate their benefits.<br />
connections open for extended periods.<br />
The targeted server becomes<br />
for-hire” subscription services that<br />
collectives have announced “DDoS-<br />
Most networks collect samples<br />
every five minutes, and it may<br />
Prepare for an attack<br />
unavailable for legitimate traffic<br />
because it is busy keeping track of<br />
all of the attackers’ connections.<br />
• Bandwidth consumption.<br />
Attackers send bogus network traffic<br />
as quickly as possible toward<br />
the targeted server, consuming all<br />
available bandwidth on the networks<br />
leading to the server. The<br />
network traffic does not have to<br />
be legitimate or even related to the<br />
traffic normally seen as legitimate<br />
by the server. The targeted server<br />
and surrounding networks become<br />
can be purchased for as little as<br />
$5.99 per month. The purchased<br />
service removes the need to be<br />
technologically savvy and purports<br />
to minimize the risk of getting<br />
caught.<br />
Unlike attacks where the goal<br />
is to steal personal data, DDoS attacks<br />
on government typically are<br />
motivated by opposition to legislation<br />
or by political activism – as<br />
demonstrated in the attacks on<br />
Ferguson, Missouri’s, police department<br />
website after one of its officers<br />
Because DDoS attacks provide no<br />
forewarning, you cannot prevent<br />
one from occurring. Further, an<br />
attack can ramp up from beginning<br />
to fully engaged at 10 to 60<br />
Gbps in as little as 60 seconds, so<br />
it is almost impossible to stop an<br />
attack from reaching peak effectiveness<br />
once it begins. Some ISPs offer<br />
automatic responses, but these can<br />
cause outages and shut down legitimate<br />
traffic along with the attack<br />
traffic.<br />
You can, however, make your<br />
require 15 to 20 minutes for your<br />
ISP to identify that an incident is<br />
underway. Consider establishing<br />
a relationship with an eGovernment<br />
services partner that will<br />
host on your behalf and monitor<br />
your system more frequently. Such<br />
a provider might notice an attack<br />
within three minutes and can<br />
work with your ISP to put filters in<br />
place within a couple of minutes to<br />
siphon off the junk traffic so valid<br />
traffic can get through, minimizing<br />
More on page 46<br />
24 25
Editor’s Note: The following articles describing the records of five presidential candidates regarding immigration<br />
have been used with permission of the non-profit, non-partisan American Immigration Council.<br />
Immigration and Border Control: What Graham’s<br />
candidacy brings to the GOP presidential field<br />
By Wendy Feliz<br />
<strong>June</strong> 5, <strong>2015</strong> – Earlier this week,<br />
Lindsey graham became the ninth<br />
candidate to announce his candidacy<br />
for the Republican presidential<br />
nomination. attempting to distinguish<br />
himself from the other candidates,<br />
graham is highlighting his<br />
foreign policy and national security<br />
experience. Yet, the area where he<br />
undoubtedly leads the pack is his<br />
leadership on immigration reform.<br />
With longtime ally Senator John<br />
McCain usually at his side, graham<br />
has been involved in more than one<br />
effort to pass an immigration bill<br />
through the Senate. NBC News reports:<br />
“…he has been a consistent<br />
goP vote for immigration reform<br />
legislation. His history of work on<br />
immigration bills included collaboration<br />
with the late Sen. ted Kennedy,<br />
costing him conservative support<br />
in his 2008 primary. Despite<br />
that, he easily won re-election…<br />
graham also was one of the negotiators<br />
on the 2013 “gang of Eight”<br />
immigration reform bill passed by<br />
the Senate. “<br />
Senator Lindsey Graham<br />
Moreover, graham has continued<br />
to proselytize the need for<br />
immigration reform and has warned<br />
his party that they ignore the immigration<br />
issue at their own peril. He<br />
said in 2014:<br />
“if we become the party of self<br />
deportation, if that again is our position<br />
in 2016, we’re going to drive a<br />
deep wedge between us and Hispanics.”<br />
and “if you solve the immigration<br />
problem in a good, american,<br />
responsible way, our party’s back in<br />
the game and we can dominate the<br />
21st century.”<br />
He’s also using his experience<br />
working on immigration as a selling<br />
point for his presidential nomination.<br />
Bloomberg News reports:<br />
“graham argued that he<br />
would have the most credibility of<br />
26<br />
any presidential candidate to push<br />
through a permanent legislative<br />
solution on immigration. ‘i think<br />
i could sit down with Democrats,<br />
who’ve known i’ve taken a beating<br />
to try to get a fair compromise,’ he<br />
said, referring to his co-authorship<br />
of a sweeping immigration reform<br />
bill that passed the Senate with bipartisan<br />
support in 2013 and died in<br />
the House. ‘and i think i could convince<br />
my party that now’s the time<br />
to get this behind us.’”<br />
Senator graham’s entry into<br />
the 2016 goP presidential mix will<br />
hopefully provoke a conversation on<br />
immigration policy. Where do the<br />
candidates in his party stand on immigration<br />
reform? Will they bring<br />
solutions to the issue or politicize<br />
it as in primaries past? graham has<br />
the opportunity to challenge some<br />
of those who refuse to tackle the<br />
issue pragmatically and fairly. Let’s<br />
hope he continues to champion the<br />
issue for both the sake of his party<br />
and the country.<br />
Photo Courtesy of the Chairman of the Joint<br />
Chiefs of Staff.<br />
Immigration and Border Control: Presidential<br />
candidate O’Malley’s immigration record<br />
By Eric gibble<br />
Former Governor Martin O’Malley<br />
27<br />
<strong>June</strong> 1, <strong>2015</strong> – Former Maryland<br />
governor Martin o’Malley recently<br />
became the third Democratic<br />
candidate to enter the 2016 presidential<br />
race. in his announcement,<br />
o’Malley said that “for the sake<br />
of our country’s security, and our<br />
country’s well-being, and our country’s<br />
economic growth” comprehensive<br />
immigration reform must<br />
include a path to citizenship. However,<br />
o’Malley has not only been<br />
a vocal supporter of immigration<br />
reform on the federal level, he also<br />
took practical measures to welcome<br />
immigrants in Maryland during his<br />
two terms as governor.<br />
o’Malley signed the Maryland<br />
DREaM act, which allows<br />
DREaMers who graduate from<br />
Maryland high schools to pay the<br />
same in-state college tuition rates as<br />
other Marylanders. The bill was put<br />
in limbo after Maryland’s Republican<br />
lawmakers successfully petitioned<br />
for a statewide referendum<br />
on the issue. However, o’Malley<br />
continued to strongly defend the law<br />
by raising funds for the group Educating<br />
Maryland Kids who worked<br />
to defeat the referendum. Maryland<br />
voters went on to defeat it and approve<br />
the law in 2012.<br />
also, under o’Malley, the<br />
Baltimore City Detention Center<br />
stopped automatically honoring detainer<br />
requests from immigration<br />
and Customs Enforcement (iCE)<br />
to hold immigrants for deportation<br />
and only honored these detainer<br />
requests when an immigrant was<br />
charged with or convicted of a felony,<br />
three or more misdemeanors,<br />
or a “serious” misdemeanor—or<br />
the crimes that Secure Communities<br />
was originally meant to target.<br />
o’Malley said instead, resources<br />
should be focused on “complying<br />
with iCE detainers when there is an<br />
actual threat to the public’s safety…<br />
no family should be ripped apart<br />
because the Republican Congress<br />
can’t come to the table and reach a<br />
reasonable compromise on comprehensive<br />
immigration reform.” However,<br />
he did face some criticism that<br />
the measure was too narrow and did<br />
not go far enough.<br />
in 2013, o’Malley also signed<br />
into law a measure that allowed undocumented<br />
immigrants to obtain<br />
drivers licenses. as transportation<br />
expert Sarah Hendricks notes, this<br />
allows Maryland to maximize on<br />
the economic and social contributions<br />
of undocumented immigrants<br />
and improves public safety in the<br />
state.<br />
Then in 2014, when a surge<br />
of Central american mothers and<br />
their children came to the U.S. border<br />
seeking refuge from violence<br />
in their home countries o’Malley<br />
took a distinctively different tone<br />
from rival 2016 candidate Hillary<br />
Clinton. While Clinton said that<br />
those arriving should be sent back<br />
to their home countries because<br />
“we have to send a clear message<br />
just because your child gets across<br />
the border doesn’t mean your child<br />
gets to stay,” o’Malley told reporters<br />
at the National governors association<br />
that “we are not a country that<br />
should send children away and send<br />
them back to certain death.” He also<br />
encouraged members of the Hispanic<br />
National Bar association to<br />
More on page 31
Immigration and Border Control: Where Pataki<br />
stands on immigration policy<br />
By Elijah Levine<br />
Former Governor George Pataki<br />
Former Republican New York governor<br />
george Pataki recently entered<br />
the 2016 presidential race,<br />
highlighting what his national security<br />
and government reform agenda<br />
would be, but failing to mention<br />
what his policies on immigration<br />
would be as Commander-in-Chief.<br />
However, a quick look into his past<br />
record and public statements on<br />
immigration provide insight into<br />
a policy-maker who took practical<br />
measures to welcome immigrants in<br />
New York and who agreed in principle<br />
with the goal but not the approach<br />
President obama took when<br />
announcing his executive actions<br />
on immigration.<br />
in 2002, when Pataki was<br />
governor, he signed a bill granting<br />
in-state tuition for undocumented<br />
youth at New York public colleges.<br />
This move was a commonsense approach<br />
as New York is home to over<br />
80,000 undocumented children<br />
brought to this country as children,<br />
the fourth highest concentration in<br />
the nation.<br />
in addition he has been a vocal<br />
supporter on the need to reform<br />
our outdated immigration system.<br />
according to Politico:<br />
“Pataki said that it is not realistic<br />
to say the United States will<br />
“send 11 million people back in<br />
railroad cars and buses and trains,”<br />
voicing support for a “pathway to<br />
citizenship at the back of the line”<br />
unless they are members of the military.”<br />
His pragmatic approach goes<br />
back many years. in fact, according<br />
to the New York times, Pataki publicly<br />
opposed California’s controversial<br />
Proposition 187, which was<br />
a restrictive state measure which<br />
would have denied public services<br />
to undocumented immigrants.<br />
While seemingly agreeing<br />
with the idea in principle of finding<br />
solutions to the dilemma of millions<br />
people living in our nation without<br />
proper documentation, Pataki publicly<br />
criticized the President’s executive<br />
action on immigration, which<br />
would defer deportations for up to 4<br />
million immigrants and implement<br />
many critically needed reforms including<br />
initiatives around integration<br />
and visa reform:<br />
“it’s not a question of what you<br />
want to do. it’s what you can do…<br />
i think we do have to have an approach<br />
that provides the ability for<br />
those here illegally to legalize their<br />
status when they’ve obeyed the law,<br />
contributed to america…. But i<br />
don’t think the way the president<br />
did it was right.”<br />
Pataki should continue to<br />
highlight what makes him stand<br />
out from the crowded field of goP<br />
candidates. His record of pursuing<br />
inclusive immigration policies, like<br />
the ones he implemented as governor,<br />
is a great place to start.<br />
Photo by Gage Skidmore<br />
Immigration and Border Control: What you need<br />
to know about Chafee’s immigration record<br />
Lincoln Chafee, a former Republican<br />
Senator (turned Democrat)<br />
and governor from Rhode island<br />
announced presidential bid for the<br />
Democratic nomination for President<br />
of the United States last week.<br />
He joins Hilary Clinton, Martin<br />
o’Malley, and Bernie Sanders in the<br />
race. although Chafee’s initial announcement<br />
focuses in on his opposition<br />
to the war in iraq and how<br />
that differs from the other candidates,<br />
a look back at his record and<br />
public statements on immigration<br />
policy provide some clues into how<br />
he might handle the immigration issue<br />
as commander-in-chief.<br />
as a Senator, Chafee cosponsored<br />
an immigration reform bill in<br />
2005 which included a pathway to<br />
citizenship, as well as border security<br />
measures. in a 2006 gubernatorial<br />
debate, Chafee recalled:<br />
“i co-sponsored the McCain<br />
bill. He came up with a bill, path to<br />
legality but also strong border security.<br />
There was a good compromise.<br />
Bush supports it and others<br />
and that’s the best way to handle<br />
these 11 million illegal immigrants<br />
that are here working illegally in<br />
this country. First, border security.<br />
Second, a path to legality. Pay back<br />
fines. Learn English. get in the back<br />
of the line of the immigration line.<br />
Former Governor Lincoln Chafee<br />
and it’s a big problem. it’s going to<br />
take bipartisan work.”<br />
in 2011, governor, Chafee rescinded<br />
the previous governor’s executive<br />
order which called for local<br />
policy to enforce federal immigration<br />
laws and for employers to participate<br />
in E-Verify.<br />
“My view is that Rhode island<br />
can grow economically by being a<br />
tolerant place to do business… The<br />
immigrant-rich areas, i want to see<br />
them prosper, and they need it.”<br />
Chafee also supported in-state<br />
tuition for young undocumented<br />
immigrants in Rhode island. While<br />
state legislators failed pass the legislation,<br />
the Board of governors for<br />
Higher Education lowered tuition<br />
rates for Rhode island’s immigrant<br />
youth in 2011.<br />
a compassionate and fair approach<br />
to immigration policy seems<br />
to run in the Chafee family. Chafee’s<br />
28 29<br />
father, Senator John Chafee (R-Ri),<br />
was the leading Congressional supporter<br />
of President Ronald Reagan<br />
and george H.W. Bush’s “Family<br />
Fairness” executive actions, the closest<br />
parallel to President obama’s recent<br />
executive actions. Senator John<br />
Chafee sponsored several legislative<br />
provisions to protect the spouses<br />
and children of those able to legalize<br />
under the 1986 immigration reform.<br />
and when President Bush in<br />
1990 took action to protect up to 1.5<br />
million people from deportation,<br />
after Senator Chafee’s proposal had<br />
passed the Senate, the applauded it,<br />
saying “i am delighted, after four<br />
years of hard work, to see this principle<br />
triumph.”<br />
While Chafee does not list immigration<br />
reform as a priority on<br />
his official campaign website, he has<br />
an interesting record and has stood<br />
on the side of problem-solving and<br />
fairness when it comes to reforming<br />
immigration policy.<br />
See more at: http://immigrationimpact.com/<strong>2015</strong>/06/09/lincolnchafee-immigration/#sthash.KUcOHpbA.dpuf<br />
Photo Courtesy of City Year.
Immigration and Border Control: Perry advocates<br />
for enforcement-first immigration strategy in<br />
presidential launch<br />
By Elijah Levine<br />
Former texas governor Rick Perry<br />
announced his bid for the Republican<br />
presidential candidacy last<br />
week. His immigration rhetoric in<br />
the past several years has been one<br />
that focuses more on border enforcement<br />
than providing legal status<br />
to the currently undocumented<br />
population in the U.S.—a solution<br />
an overwhelming majority of americans<br />
now support. However, Perry<br />
also signed the first state law in the<br />
country to provide in-state tuition<br />
to undocumented immigrants in<br />
2001 and has recently said the U.S.<br />
can’t deport 11 million people.<br />
in a recent interview on Fox,<br />
Perry vowed, if elected, to secure the<br />
border as one of his first presidential<br />
actions before a debate on immigration<br />
reform can begin. He went on<br />
to enumerate the specifics of such a<br />
strategy:<br />
“Put the personnel on the border,<br />
the strategic fencing in place,<br />
the aviation assets—so that, that<br />
1800 mile border, from tijuana to<br />
El Paso, from El Paso to Brownsville,<br />
is secure and the american<br />
people will know that it is secure.”<br />
only after these actions, Perry<br />
continued, can americans “have a<br />
Former Governor Rick Perry<br />
conversation about how immigration<br />
reform needs to be conducted<br />
and what have you.”<br />
Perry hasn’t been shy to deploy<br />
troops to the border during<br />
his terms as governor. Last summer,<br />
when thousands of Central american<br />
children and families fleeing<br />
violence arrived at the U.S. border<br />
many states and cities welcomed<br />
them into their communities, providing<br />
basic humanitarian support.<br />
But Perry chose a military response<br />
to this humanitarian challenge by<br />
sending approximately 1,000 National<br />
guard troops to the border,<br />
noting “our citizens are under assault.”<br />
initial reports estimated that<br />
this move cost texas over $12 million<br />
per month.<br />
trying to enforce our way out<br />
of our immigration problems is no<br />
solution. Since 1986, the federal<br />
government has spent an estimated<br />
$186.8 billion on immigration enforcement.<br />
Yet during that time, the<br />
unauthorized population has tripled<br />
in size to 11 million. This is not due<br />
to a lack of enforcement, but rather<br />
a testament to the powerful demand<br />
the U.S. economy has for workers, as<br />
well as the similarly powerful desire<br />
for families to unite across borders.<br />
Perry’s strict border policies,<br />
historically, have been proven not<br />
to reap their intended benefits and<br />
actually encourage lawlessness as<br />
undocumented immigrants entrust<br />
their lives to criminal cartels who<br />
traffic people into the United States.<br />
“Coyotes” prey on vulnerable immigrants<br />
and present a humanitarian<br />
crisis that militarization of the border<br />
is exacerbating.<br />
also, ahead of the announcement<br />
of the President’s executive<br />
action on immigration, Perry anticipated<br />
texas’ plans to sue to the<br />
administration in order to stop it.<br />
While Perry has been a hawk<br />
on immigration in many ways, his<br />
comments at times indicate a different<br />
view. Perry recently said in New<br />
Hampshire that the removal of 11<br />
million undocumented immigrants<br />
from the United States in unrealistic,<br />
“i don’t think anyone with a<br />
sense of reality thinks that we’re go-<br />
ing to ship 11 or 12 million people<br />
back to where they’re from.”<br />
also, in 2001, Perry signed the<br />
texas DREaM act into law –which<br />
was the first measure enacted in<br />
a state to provide undocumented<br />
immigrants with in-state tuition at<br />
state colleges. That same year, however,<br />
Perry vetoed a bill that would<br />
have authorized undocumented immigrants<br />
to obtain drivers’ licenses,<br />
citing his concern that the bill didn’t<br />
provide resources to sufficiently vet<br />
potential candidates and verify birth<br />
foreign birth certificates.<br />
Perry has shown himself hard<br />
to pin down on what his philosophy<br />
is around immigration policy. Perhaps<br />
over the next several months<br />
as the campaign continues, he can<br />
devise a more solid platform and<br />
clearly explain what a Perry administration<br />
would do on immigration<br />
policy.<br />
See more at: http://immigrationimpact.com/<strong>2015</strong>/06/08/rickperry-immigration/#sthash.zeBtcoFX.dpuf<br />
Photo by Michael Vadon.<br />
Immigration: O’Malley<br />
Continued from page 27<br />
assist in the representation of these<br />
immigrant mothers and children to<br />
help them navigate legal process so<br />
“that their hopes and their dignity<br />
is properly represented in this, the<br />
land of the free and the home of the<br />
brave.”<br />
if o’Malley’s record as governor<br />
is any indication of where his<br />
administration will stand on immigration<br />
policy, it is likely he would<br />
take commonsense approaches that<br />
would make real progress on longstanding<br />
immigration challenges.<br />
30
Border Security Expo to celebrate 10th year in<br />
2016 with move to San Antonio, TX<br />
SaN aNtoNio, tX (<strong>June</strong> 11,<br />
<strong>2015</strong>) - on april 13-14, 2016, the<br />
10th annual Border Security Expo<br />
will open at the Henry B. gonzalez<br />
Convention Center, San antonio,<br />
texas.<br />
Border Security Expo draws<br />
attendees from around the world<br />
and has become the most highly<br />
anticipated conference and exhibition<br />
on border security. as<br />
in years past, the exhibit hall will<br />
feature more than 150 companies<br />
showcasing a wide array of cuttingedge<br />
border security products,<br />
technologies and systems aimed at<br />
increasing security while facilitating<br />
legitimate trade and travel. in<br />
addition to the expansive exhibit<br />
hall, attendees benefit from a comprehensive<br />
conference program<br />
covering the key issues addressing<br />
border security, as well as networking,<br />
special events, ceremonies, and<br />
idea-sharing throughout the twoday<br />
event.<br />
“Border Security Expo has<br />
proudly served the needs of federal,<br />
state, local and international law<br />
enforcement, as well as privateindustry<br />
focused on border security,<br />
for the past decade,” said Paul<br />
Mackler, President & CEo of Eagle<br />
Eye Expositions, producers of the<br />
annual event. “given the confluence<br />
of federal<br />
and state<br />
events over<br />
the past year<br />
on the southwest<br />
border,<br />
including<br />
the newly<br />
formed Joint<br />
task Force<br />
West, Southern Border approaches<br />
Campaign, headed up by Director<br />
Robert Harris, being headquartered<br />
in San antonio, and the sweeping<br />
$800 million border security legislation<br />
signed into law by texas gov.<br />
abbott (House Bill 11), a change of<br />
venue to texas in 2016 is in order<br />
to continue to best serve the needs<br />
of the border security community”.<br />
Border Security Expo’s advisory<br />
Board is chaired by Jayson<br />
P. ahern, Principal at The Chertoff<br />
group, and former acting<br />
Commissioner, U.S. Customs and<br />
Border Protection. The advisory<br />
Board includes a diverse and distinguished<br />
group of leading experts<br />
well-versed on all facets of border<br />
security.<br />
While the same high caliber<br />
speaker roster is expected,<br />
event management says there are<br />
new dynamics to the conference<br />
and exhibition that will make the<br />
32<br />
overall event even more productive<br />
for exhibitors and attendees with<br />
the move to San antonio. The full<br />
program will be announced in the<br />
months to come.<br />
For more information, visit<br />
www.BorderSecurityExpo.com.<br />
Interested in exhibiting<br />
or sponsorships?<br />
Eagle Eye Expositions, LLC, (www.<br />
EagleEyeExpos.com) a leading producer<br />
of conferences, tradeshows and<br />
digital media products is the producer<br />
of the 3nd annual US/Canada<br />
Border Conference, October 27-28,<br />
<strong>2015</strong>, Cobo Center, Detroit, MI and<br />
the 10th annual Border Security<br />
Expo, April 13-14, 2016, Henry B.<br />
Gonzalez Convention Center, San<br />
Antonio, TX<br />
CBRNE/Detection<br />
DHS Science & Technology Patent Awards salute<br />
32 inventors from S&T, TSA and U.S. Coast Guard<br />
WaSHiNgtoN, <strong>June</strong> 16 – today,<br />
Deputy Secretary of Homeland Security<br />
alejandro Mayorkas recognized<br />
Department of Homeland Security<br />
(DHS) employees and other<br />
individuals who have been awarded<br />
patents by the U.S. Patent office<br />
for their technology advancements<br />
and inventions contributing to the<br />
homeland security mission. The<br />
event, hosted by the DHS Science<br />
and technology Directorate (S&t),<br />
recognized inventors from across<br />
DHS including the transportation<br />
Security administration (tSa),<br />
U.S. Coast guard, and the office of<br />
the general Counsel.<br />
“at the heart of DHS’s innovation<br />
and success are our employees.<br />
it is my honor today to recognize<br />
these inventors for their efforts to<br />
advance the homeland security mission,”<br />
said Deputy Secretary Mayorkas.<br />
“our inventors have shown<br />
commitment and dedication to<br />
the vision of protecting america<br />
by thinking outside the box, contributing<br />
their ideas and vision,<br />
and working in our labs and with<br />
our partners to create innovative<br />
and useful technologies. They have<br />
demonstrated that creativity and innovation<br />
are alive and well in our<br />
federal workforce.”<br />
Deputy Secretary Mayorkas<br />
was joined by S&t Under Secretary<br />
Dr. Reginald Brothers, tSa Deputy<br />
administrator Mark Hatfield<br />
and other Department leadership,<br />
along with representatives from the<br />
Departments of agriculture and<br />
Energy, and the U.S. Patent and<br />
trademark office in recognizing 32<br />
inventors from across the Department.<br />
together, these individuals<br />
have invented 12 patented technologies<br />
and devices that span several<br />
33<br />
areas of the homeland security mission.<br />
From transportation-related<br />
inventions that improve screening<br />
and detection capabilities at ports<br />
and borders, to inventions that assist<br />
the U.S. Coast guard in air and<br />
sea rescue operations, to a foot-andmouth<br />
disease vaccine that received<br />
the Secretary’s Exceptional Service<br />
gold Medal in 2014, these inventions<br />
have helped to enhance the<br />
More on page 34
CBRNE/Detection<br />
DHS Science & Technology<br />
Patent Awards<br />
Continued from page 33<br />
homeland security mission while<br />
adapting to current and evolving<br />
threats.<br />
“The technologies developed<br />
by our employees that culminate in<br />
patent awards are vitally important<br />
for the Department in attracting<br />
scientific talent, and to our industry<br />
partners that commercialize these<br />
products and capabilities,” said DHS<br />
Under Secretary for Science and<br />
technology Dr. Reginald Brothers.<br />
“i am proud to have S&t serve as<br />
the Department’s hub for innovation<br />
in helping to make a difference<br />
in our ability to do our jobs smarter,<br />
faster and with greater accuracy.”<br />
The awardees recognized today<br />
are:<br />
Dry Transfer Method for the Preparation<br />
of Explosives Test Samples<br />
U.S. Patent Number: 6,470,730 – issued<br />
October 29, 2002<br />
Robert T. Chamberlain (Transportation<br />
Security Laboratory)<br />
improves the quality of test<br />
samples by duplicating the way<br />
minute quantities of substances are<br />
placed on and released from surfaces<br />
like luggage handles, packages, or<br />
clothing for testing. Thus, drug and<br />
explosives detector manufacturers<br />
have a quick and easy method that<br />
reliably indicates how machines will<br />
operate in real-world situations.<br />
Method and Apparatus for Obtaining<br />
Spatial Information and Measuring<br />
the Dielectric Constant of an<br />
Object<br />
U.S. Patent Number: 7,378,849 – issued<br />
May 27, 2008<br />
James C. Weatherall and Joseph<br />
A. Gatto (Transportation Security<br />
Laboratory)<br />
Determines information<br />
about an unknown object or confirms<br />
information about an object,<br />
such as its composition, construction,<br />
or spatial characteristics. it is<br />
useful in detecting dangerous or<br />
potentially dangerous objects, such<br />
as weapons or explosives, at places<br />
where screening is a priority, such as<br />
airports and public buildings.<br />
Very Thin Dosimeter Filters and Low<br />
Profile Dosimeter Incorporating the<br />
Same<br />
U.S. Patent Number: 7,781,747 – issued<br />
August 24, 2010<br />
Gladys Klemic, Paul Bailey, and<br />
Cecilia Murtagh (National Urban<br />
Security Transportation Laboratory)<br />
a wearable “card-like” dosimeter<br />
featuring two combined equilibrium<br />
and energy compensation<br />
filters that sandwich an optically<br />
stimulated luminescent material.<br />
Useful for workers and citizens in<br />
the event of radiation exposure, the<br />
device measures and records the<br />
amount of radiation and can connect<br />
to a central database or be sent<br />
to a processing center for readout.<br />
Adenoviral Vector-based Foot-and-<br />
Mouth Disease Vaccine<br />
U.S. Patent Number: 8,323,663 – issued<br />
December 4, 2012<br />
Douglas E. Brough, Joseph T.<br />
Bruder, C. Richter King, Marvin<br />
J. Grubman, and John G. Neilan<br />
(Plum Island Animal Disease Center)<br />
Elicits a more rapid and complete<br />
immune response against<br />
foot-and-mouth disease and prevents<br />
the adenovirus from replicating<br />
by deleting whole or partial<br />
genes needed for viral replication.<br />
This vaccine can be used as a tool to<br />
stop the spread of this highly contagious<br />
disease.<br />
curity Laboratory)<br />
Uses collisional focusing to<br />
transfer ion beams of trace explosives<br />
between the mass spectrometer<br />
and the ion mobility spectrometer<br />
without distorting the beams.<br />
Explosive trace detector manufacturers<br />
can use this method and apparatus<br />
to fine-tune system performance<br />
by focusing on the precise<br />
chemical signatures unique to each<br />
kind of explosive.<br />
Inert and Non-toxic Explosive Simulants<br />
and Method of Production<br />
U.S. Patent Number: 8,563,316 – issued<br />
October 22, 2013<br />
Ronald A. Krauss, Stephen F.<br />
Duffy, and Stephen J. Goettler III<br />
(Transportation Security Laboratory)<br />
imitates characteristics of<br />
known explosives at the microscopic<br />
and macroscopic levels. Developers<br />
and manufacturers can use this<br />
method to safely verify the detection<br />
capabilities of X-ray-based explosives<br />
detection systems and to<br />
ensure proper calibration of screening<br />
systems, such as those used to<br />
screen airline passenger luggage.<br />
High-volume Sampling Front-end<br />
Collection Device<br />
U.S. Patent Number: 8,578,796 – issued<br />
November 12, 2013<br />
Inho Cho (Transportation Security<br />
Laboratory)<br />
a portable, pocket-sized<br />
front-end device that can brush off<br />
particles from a surface or collect<br />
a large volume of air, as in a cargo<br />
container, capturing threat particles<br />
with a specialized system of filters.<br />
The hand-held nature of this device<br />
allows users to quickly collect<br />
samples, and the device can attach<br />
to analytical screening systems to<br />
identify threat particles.<br />
Quick Release Flare Tube Adapter<br />
U.S. Patent Number: 8,770,083 – issued<br />
<strong>July</strong> 8, 2014<br />
Charles A. Hatfield, Thomas Morrow,<br />
Alexander Brown, Trent Meyers,<br />
and Katie Spira (U.S. Coast<br />
Guard Academy)<br />
an illumination flare mounting<br />
arrangement for use in an aircraft.<br />
Flares are essential in nighttime,<br />
over-water search and rescue;<br />
reconnaissance; and law enforcement<br />
missions when visibility is<br />
vital. Police, military, and paramilitary<br />
organization aircrews can<br />
quickly install or remove this adapter<br />
on a variety of aircraft without<br />
tools or special equipment.<br />
Method and Device for Detecting<br />
Moving Radiation Sources<br />
U.S. Patent Number: 8,916,832 – issued<br />
December 23, 2014<br />
Thomas E. Albert (Domestic Nuclear<br />
Detection Office)<br />
Detects radioactive sources<br />
34 35<br />
Ion Mobility Spectrometer to Mass<br />
Spectrometer Interface<br />
U.S. Patent Number: 8,536,518 – issued<br />
September 17, 2013<br />
Joseph Kozole (Transportation Sethat<br />
are in motion and facilitates the<br />
rapid and accurate identification of<br />
the source of radioactive material.<br />
This invention is intended for use at<br />
seaports and border crossings that<br />
screen cargo containers, vehicles,<br />
or pedestrians for radiological or<br />
nuclear materials and in mobile radiation<br />
detectors deployed in search<br />
operations.<br />
Buoy Split Key Removal Device<br />
U.S. Patent Number: 8,914,962 – issued<br />
December 23, 2014<br />
Jessica Rozzi-Ochs, Bret Jacobson,<br />
Khiem Nagy, Erin Nolan, Evan<br />
Rice, and Sarah Troch (U.S. Coast<br />
Guard Academy)<br />
Utilizing a power screw that<br />
applies steady and controllable compression<br />
to the split key, the device<br />
allows USCg buoy tender crewmembers<br />
to quickly remove split<br />
keys in a safe and efficient manner.<br />
The split key is a butterflied key that<br />
holds a pin in place, connecting a<br />
chain between the buoy and a concrete<br />
block on the floor of a body of<br />
water.<br />
Nuclear Magnetic Resonance Scanning<br />
of Metal Containers Using Medium-field<br />
Technology<br />
U.S. Patent Number: 8,912,795 – issued<br />
December 16, 2014<br />
Joseph S. Broz and Stephen W.<br />
Surko (Contract Laboratory)<br />
More on page 46
CBRNE/Detection<br />
Implant Science’s QS-B220s scores<br />
again in Europe, deepens footprint at<br />
17 airports in France<br />
WiLMiNgtoN, Mass., <strong>June</strong> 11,<br />
<strong>2015</strong> /PRNewswire/ -- implant<br />
Sciences Corporation (otCQB:<br />
iMSC), a leading manufacturer<br />
of explosives trace detection<br />
(EtD) and drugs trace detection<br />
solutions for homeland security<br />
applications, today announced<br />
that it has signed a contract for<br />
up to 304 of its QS-B220 desktop<br />
explosives trace detectors<br />
across 17 regional airports in<br />
France. The first 106 units are<br />
committed to being delivered<br />
over the next several months.<br />
additional units are expected<br />
to be delivered through fiscal<br />
year 2016 and 2017. The sale was<br />
made through the Company’s<br />
in-country, full-service distributor,<br />
Hi-tech Detection Systems<br />
(HtDS).<br />
“The fact that our QS-B220<br />
had StaC certification prior to<br />
the creation ECaC standards<br />
gave us additional insight into<br />
the French aviation market. our<br />
systems are highly regarded in<br />
the region, and we believe that<br />
procurement agents look to the<br />
QS-B220’s value and performance<br />
and view the choice of<br />
selecting our unit as a ‘smart’<br />
decision,” said Dr. Darryl Jones,<br />
implant Sciences’ Vice President<br />
of global Sales and Marketing.<br />
“We are very proud of the fact<br />
By Steve Bittenbender<br />
The U.S. Department of Health and<br />
About the QS-B220 Desktop<br />
Human Services (HHS) has announced<br />
it awarded a contract to<br />
Explosives Trace Detector<br />
The QS-B220 uses ion<br />
a Pennsylvania firm to develop a<br />
Mobility Spectrometry (iMS)<br />
test kit that will help physicians and<br />
to rapidly detect and identify<br />
other medical personnel quickly<br />
trace amounts of a wide variety<br />
detect if a patient has contracted<br />
of military, commercial, and<br />
the deadly Ebola virus.<br />
homemade explosives. With<br />
The three-year agreement with<br />
significantly lower maintenance<br />
oraSure technologies, inc. includes<br />
requirements than competing<br />
nearly $2 million and options for<br />
more than $8.5 million in additional<br />
funding for possible clinical<br />
systems, the QS-B220 can be<br />
deployed for a much lower total<br />
work and regulatory requirements.<br />
cost of ownership than other<br />
The funding comes from HHS’<br />
approved products. Featuring a<br />
Biomedical advanced Research and<br />
radioactive material-free design,<br />
Development authority (BaRDa).<br />
push-button maintenance and<br />
The company currently uses its<br />
diagnostics, and a patented in-<br />
oraQuick technology to quickly<br />
Cal internal automatic calibration<br />
system, the QS-B220 brings<br />
immunodeficiency Virus is people.<br />
detect Hepatitis C and the Human<br />
new levels of performance and<br />
it was the first company to get Food<br />
convenience to desktop trace detection<br />
users with unsurpassed<br />
approval for the rapid HiV test,<br />
and Drug administration (FDa)<br />
ease of use.<br />
and it’s the only firm with FDa approval<br />
to sell an in-home HiV test.<br />
oraSure announced earlier this<br />
year that it developed an Ebola test<br />
More on page 46<br />
36 00<br />
OS-B220 Desktop<br />
Explosives & Drugs Trace Detector<br />
that this is the second major victory<br />
for us in France.”<br />
“HtDS is an excellent<br />
long-term partner in France.<br />
Their ability to provide superior<br />
in-country support, such as service<br />
and training, makes them<br />
a strong ally and value-add for<br />
implant Sciences. Their sound<br />
customer support capabilities<br />
also proved to be a deciding factor<br />
for this procurement,” stated<br />
Richard Nelson, implant Sciences’<br />
general Manager, EMEa.<br />
OraSure wins $10M<br />
HHS contract to<br />
develop system that<br />
quickly detects Ebola
ROMANOWICH ON SURVEILLANCE John Romanowich, CEO, SightLogix, Inc.<br />
Protecting key areas of critical assets with<br />
wide area solutions<br />
Securing outdoor assets is a challenging task,<br />
and nowhere is that more true than in the protection<br />
of critical infrastructure. Security managers<br />
must understand and predict a wide range of possible<br />
threats, ensure accurate detection, plan for<br />
incident confirmation and response, and given<br />
budget constraints, often try to do more with less.<br />
and many critical assets are remotely located and<br />
spread over huge areas – many miles, in some cases<br />
- making it a greater challenge to deploy technologies<br />
that deliver cost-effective and comprehensive<br />
protection. However, a new way of thinking, supported<br />
by new technology, transcends the concept<br />
of perimeter protection and offers a solution that<br />
focuses on the most important areas inside the perimeter,<br />
reducing costs while increasing security<br />
effectiveness.<br />
The Challenge of Critical Assets<br />
High-profile incidents at critical sites around the<br />
country have raised the awareness that much of<br />
our infrastructure remains vulnerable to vandalism,<br />
theft, and sabotage. These critical assets include<br />
airports, utility substations and transmission<br />
lines, power plants and dams, communication<br />
relay stations, rail lines and bridges, airports, and<br />
pipelines, among others. together, these systems<br />
support the everyday operation of our communities,<br />
as well as general commerce and transportation.<br />
a common thread among these systems<br />
is that a single point of disruption can have farreaching<br />
effects. a break-in at a substation can affect<br />
an entire region. Rail incidents can cause huge<br />
amounts of lost revenue. a single intruder can<br />
put an entire airport at risk and cause a general<br />
shutdown. and beyond the inconvenience, these<br />
breaches expose serious vulnerabilities to national<br />
security.<br />
Security personnel are aware of this predicament,<br />
and can identify specific locations where<br />
the greatest security risks are located, such as gates<br />
into fenced airports or equipment at a substation.<br />
The challenge is to provide real-time intrusion<br />
detection with enough wide-area coverage to adequately<br />
protect the most important areas of the<br />
perimeter, while also providing enough spot coverage<br />
for sensitive locations within a reasonable<br />
overall budget.<br />
Thermal Cameras Match the Need<br />
For protecting critical asset facilities, it is imperative<br />
to know the nature and location of an intrusion<br />
in real time to be able to mount an effective<br />
response. traditionally, a range of approaches have<br />
been used, from fiber-based or vibration-based<br />
fence line sensors, to PtZ video cameras. today’s<br />
smart thermal cameras offer a unique set of capabilities<br />
and performance that often far exceed the<br />
capabilities of traditional systems at a lower cost,<br />
creating a compelling solution for critical infrastructure<br />
protection.<br />
Smart thermal cameras with on-board video<br />
analytics surpass traditional approaches in a<br />
number of ways. For one, they “see” heat, and are<br />
a perfect human detector in fog, rain, snow, bright<br />
sun or complete darkness. They are immune to<br />
the false alerts generated by visible cameras from<br />
headlights and reflections, while providing very<br />
accurate size filters that ignore small animals,<br />
blowing trash and other movement. Thermal<br />
cameras combine two systems in one – an accurate<br />
detection source with visual verification,<br />
reducing complexity. and they cover very large<br />
areas – a single smart thermal camera can detect<br />
an intruder with accuracy over an area as large as<br />
a football field. This can save construction costs<br />
that would otherwise be spent on poles, power<br />
and communication, costs which often exceed the<br />
price of the detection system itself.<br />
Wide-Area Coverage for Spot Protection<br />
While perimeter protection is essential to critical<br />
infrastructure security, it can be expensive to protect<br />
the entire perimeter. as a result, many sites<br />
which are unable to secure funding for reliable<br />
perimeter detection systems will often stick with<br />
whatever system they have in place, regardless of<br />
how susceptible it may be to nuisance alarms or<br />
how limited its ability to provide reliable detection.<br />
given this reality, in situations where budgetary<br />
limitations simply won’t allow for systems<br />
that protect the entire perimeter, an emerging approach<br />
focuses on securing the most vulnerable<br />
areas within the perimeter using wide-area thermal<br />
detection solutions.<br />
Such a strategy limits detection to specific,<br />
vulnerable areas. Rather than the entire perimeter,<br />
often consisting of miles of fencing, you can start<br />
with defined areas where the most critical incidents<br />
may occur. For example, airports can focus<br />
first on protecting fuel, planes and the main entry<br />
and exit points, solving their most important outdoor<br />
security problems quickly and affordably.<br />
This is where recent innovations play a big<br />
role. today, a single smart thermal camera can detect<br />
intruders with great accuracy over huge areas<br />
covering hundreds of square meters. in this way,<br />
critical sites can immediately address their security<br />
challenges with great effectiveness for the cost<br />
of a few cameras. Such systems can easily be expanded<br />
into a full-scale perimeter system at a later<br />
date as budgets permit.<br />
By using wider-area thermal systems, you<br />
can leverage existing infrastructure where power<br />
and mounting options are already available, while<br />
still securing expansive areas at very low costs.<br />
The result is a cost-effective, highly reliable system<br />
that can be quickly deployed to protect the most<br />
vulnerable assets now, while planning for the entire<br />
perimeter system in the future.<br />
John Romanowich is president/CEO and founder of<br />
SightLogix. He is also chairman of SIA’s Perimeter<br />
Security Workgroup.<br />
38 39
State/County/Municipal Security<br />
Advanced access control software opens new doors<br />
for municipalities<br />
by Robert Laughlin,<br />
President, Galaxy Control Systems<br />
advancements and<br />
innovation in software,<br />
integration and<br />
network infrastructure<br />
are expanding<br />
traditional systems<br />
models for access<br />
control far beyond<br />
simply managing entry<br />
and egress. today’s solutions<br />
have become more robust, providing<br />
a higher level of access<br />
control than ever before.<br />
Municipalities in particular<br />
increasingly recognize the potential<br />
today’s advanced access<br />
control solutions offer and are<br />
employing them across wide area<br />
networks to control, monitor and<br />
manage multiple tenants across<br />
multiple facilities. to further enhance<br />
these solutions, many municipalities<br />
are also implementing<br />
mobile and remote devices<br />
for applications that range from<br />
emergency call centers to mass<br />
transit monitoring and scheduling.<br />
These large-scale security<br />
networks are intricate but robust,<br />
and are playing a critical role in<br />
the revitalization of communities<br />
and major metropolitan<br />
areas across the country.<br />
With networked<br />
platforms driving demand<br />
for higher-level<br />
systems that offer increased<br />
integration and<br />
scalability, innovation<br />
continues to come rapidly<br />
to access control systems,<br />
providing end users with greater<br />
situational awareness and more<br />
heightened security in general.<br />
For municipalities and security<br />
professionals alike, outside-ofthe-box<br />
thinking around the advanced<br />
functionalities of these<br />
systems allows them to implement<br />
truly innovative solutions<br />
in a variety of traditional and<br />
non-traditional applications at<br />
the municipal level. Below are<br />
just some of the potential applications<br />
for which advanced access<br />
control systems can be deployed.<br />
employ multiple access control<br />
systems from multiple manufacturers.<br />
These legacy systems may<br />
not able to communicate or integrate<br />
with each other, making<br />
management and maintenance<br />
tremendously – and needlessly<br />
– complicated. By deploying an<br />
advanced access control solution,<br />
municipalities can create custom<br />
systems that standardize this array<br />
of diverse solutions into a single<br />
interconnected system. Many<br />
of today’s access control solutions<br />
are designed to be backward compatible<br />
with legacy systems while<br />
also offering the ability to rapidly<br />
grow and expand as municipalities’<br />
needs evolve, ensuring that<br />
municipalities’ past and present<br />
investments will continue to offer<br />
innovation and advanced functionality<br />
in the future.<br />
Flexibility<br />
is different – even among facilities<br />
that have been built using the<br />
same design and construction<br />
models – and each location presents<br />
a unique set of challenges.<br />
Leading access control systems<br />
allow custom deployments that<br />
meet each facility’s specific needs.<br />
an example of an innovative application<br />
of this capability can be<br />
seen in custom elevator interfaces<br />
to establish specific rules for each<br />
credential holder that restrict unauthorized<br />
floor access to potentially<br />
sensitive areas for buildings<br />
that include both municipal offices<br />
and non-municipal tenants.<br />
Integration<br />
in addition to buildings that<br />
Network<br />
house municipal offices, many<br />
Municipal applications involve a<br />
other locations must also be secured;<br />
this includes maintenance<br />
ployees spread across a variety of<br />
potentially large number of em-<br />
Standardization facilities, parking garages, transit<br />
stations and more. Every site tials. another potential applica-<br />
backbone on which advanced ac-<br />
sites, which makes the network<br />
Many municipalities currently<br />
40 41<br />
tion would be to integrate access<br />
control and video surveillance<br />
systems with facial recognition<br />
technology to verify that a person<br />
using credentials to enter a<br />
maintenance facility is who they<br />
say they are.<br />
Management<br />
Networked access control systems<br />
enable a number of advanced capabilities,<br />
such as real-time identity<br />
management, individualized<br />
identity-based door access and<br />
the ability to generate specific reports<br />
for each credential holder.<br />
integrated systems also allow a<br />
wide variety of data to be fed into<br />
a central command center, where<br />
staff can perform photo and/or<br />
badging functions and overall<br />
monitoring of the various facilities<br />
within the access control network.<br />
This approach significantly<br />
streamlines the process, making<br />
operations and personnel more<br />
efficient and offering municipalities<br />
the potential to save significantly<br />
on staff costs.<br />
advanced access control solutions<br />
are capable of integrating<br />
with parking, video, time and attendance,<br />
identity management<br />
and other security and non-security<br />
systems to provide more<br />
complete information that enables<br />
better management of access<br />
control, including policies<br />
and procedures. For example,<br />
municipalities can integrate human<br />
resources and access control<br />
systems to allow personnel<br />
data to be used to populate and<br />
program identity card data fields<br />
to create access control creden-<br />
cess control systems live crucial.<br />
of the available network topologies,<br />
fiber optic offers the fastest<br />
and most reliable communication<br />
between devices at multiple<br />
locations and the access control<br />
management software. While the<br />
initial planning and installation<br />
logistics of bringing these networks<br />
to fruition can be difficult,<br />
the payoff is well worth the cost<br />
and effort. in situations where<br />
video surveillance is integrated<br />
with access control, municipalities<br />
benefit from the real-time<br />
situational awareness these combined<br />
solutions can deliver.<br />
Wireless<br />
The emergence of wireless readers<br />
and networks has brought<br />
further innovation and heightened<br />
performance by expanding<br />
the capabilities of access control<br />
solutions. For example, municipalities<br />
are capable of deploying<br />
wireless access control and other<br />
solutions at remote sites and/or<br />
in mobile locations, such as transit<br />
facilities, buses and trains. innovation<br />
in wireless technologies<br />
allows these systems to tie in with<br />
each other and with access control<br />
software to provide real-time<br />
situational awareness when and<br />
More on page 43
State/County/Municipal Security<br />
Ohio commission provides $17 million<br />
funding to bolster school security<br />
The state of ohio is making $17 million available<br />
to schools in the state to reimburse them for<br />
making security upgrades.<br />
it’s the second year for the program, which<br />
is run by the ohio School Facilities Commission,<br />
said Rick Savors, a spokesman with the ohio<br />
Facilities Construction Commission. Last year,<br />
about $12 million was made available to school<br />
districts through the oFCC’s School Facilities<br />
Commission. More than 600 districts submitted<br />
more than 3,700 applications, according to the<br />
School Facilities Commission.<br />
While the latest round precludes recipients<br />
from the initial funding, state lawmakers decided<br />
to expand the program and allow private, parochial<br />
and nonpublic charter schools to receive<br />
funding. The funding originates from state capital<br />
bonds, and as such, they cannot be used to hire<br />
personnel, including resource officers.<br />
Specifically, the funding can be used for one<br />
of two grant programs. Schools can receive up<br />
to $2,000 per eligible building for an emergency<br />
communications system, or they can receive up<br />
to $5,000 per building for entrance improvements.<br />
The deadline to apply is oct. 16.<br />
The grant program comes at a time when<br />
more school districts are spending funds on<br />
increasing or enhancing security. according to<br />
the U.S. Department of Education, 75 percent of<br />
schools surveyed said they use at least one camera,<br />
up from about 60 percent five years ago.<br />
The Loveland City School District, which is<br />
located just outside of Cincinnati in the southwest<br />
corner of the state, received funds to have<br />
cameras installed outside entry doors at the<br />
middle, elementary and early childhood center.<br />
it also paid for a wide-angle camera positioned<br />
outside of the high school. That camera allows<br />
the receptionist and attendance clerk to better<br />
monitor arrivals. Both personnel have the ability<br />
to put the school on lockdown, if necessary, according<br />
to a district release.<br />
“The district strives to be as open and welcoming<br />
as possible,” said John ames, Loveland’s<br />
business manager. “all secretaries and receptionists<br />
plan to operate their entryways as they have<br />
in the past with the door being open during the<br />
school day. However, the new security measures<br />
give those professionals the ability to secure the<br />
doors on a moment’s notice should the need<br />
arise.”<br />
The Northwest Local School District, which<br />
is also near Cincinnati, announced last month<br />
that it received $10,000 to purchase a communications<br />
system for its schools and a couple nearby<br />
private schools. The system will give each school<br />
the ability to contact first responders immediately<br />
in times of crisis.<br />
in order to receive the communications<br />
grant, the system<br />
purchased for the school must<br />
be compatible to ohio’s Multiagency<br />
Radio Communications<br />
System or another local emergency<br />
system if first responders<br />
in the area are not a part of<br />
MaRCS, Savors said.<br />
Several schools have used<br />
grant funding to purchase wireless<br />
communications systems,<br />
such as the tattletale alarms<br />
marketed by argus agents. Using<br />
technology that has been<br />
proven effective at banks and<br />
hospitals, tattletale gives teachers<br />
a panic button they can use<br />
to alert first responders and<br />
school officials.<br />
Lial Catholic School, located<br />
near toledo, and Cleveland’s<br />
Ruffing Montessori used grant<br />
money to buy tattletale systems.<br />
“our schools are underfunded<br />
and grants like the oSFC<br />
are essential to improve student<br />
safety. in many applications a<br />
$2,000 grant can fully cover the<br />
cost of a tattletale Panic Button<br />
System,” argus CEo David Wahl<br />
said.<br />
For more information about<br />
the commission and its grant program,<br />
go to: http://ofcc.ohio.gov/<br />
ServicesPrograms/SchoolSecurity-<br />
Grants/RoundTwo.aspx<br />
Advanced access control software<br />
Continued from page 39<br />
where it is needed.<br />
The combination of solidly<br />
built hardware and a variety of<br />
robust software-based capabilities<br />
allow access control systems<br />
to transcend their traditional<br />
roles and become the single platform<br />
that allows users to monitor<br />
facilities and share data with<br />
other systems. The potential innovative<br />
applications these advanced<br />
solutions enable have the<br />
potential to deliver heightened<br />
situational awareness and overall<br />
security, and their possible<br />
uses are seemingly limited only<br />
by the imagination. as a result,<br />
advanced access control software<br />
and solutions are ideally suited<br />
for municipalities and security<br />
professionals who can think creatively<br />
to identify non-traditional<br />
applications and implement truly<br />
innovative solutions on the metro<br />
level.<br />
42 43
State/County/Municipal Security<br />
Leading Through Crisis workshop provides<br />
life-saving disaster response and recovery skills to<br />
local elected and appointed officials<br />
When disaster strikes, county<br />
executives, mayors, city managers<br />
and other elected or appointed officials<br />
can find themselves in deep<br />
and swift unknown waters, making<br />
decisions that impact the lives and<br />
safety of their friends, neighbors<br />
and other constituents.<br />
All too often in recent years,<br />
catastrophes and natural disasters<br />
have demonstrated that many local<br />
government leaders have found<br />
themselves unprepared to respond<br />
to and recover from a disaster impacting<br />
their communities – even<br />
though they may have run outstanding<br />
campaigns to get elected<br />
in the first place.<br />
It seems that, as<br />
matter of public safety<br />
and security, they would<br />
have an understanding<br />
of emergency preparedness<br />
before reaching the<br />
point of decision making.<br />
But many admittedly<br />
do not, according to<br />
Paul Goldenberg, CEO<br />
of New Jersey-based Cardinal Point<br />
Strategies, which has developed a<br />
training program called “Leading<br />
Paul Goldenberg<br />
through Crisis” that is specifically<br />
geared to elected officials in state,<br />
county and municipal government.<br />
The program provides a<br />
four-hour training course in crisis<br />
planning, crisis decision making,<br />
economic risk management, crisis<br />
communications, and jurisdictional<br />
capabilities, resources and systems,<br />
says Goldenberg. Using a collection<br />
of several case studies as a defining<br />
focus, subject matter experts<br />
develop training modules along six<br />
domains:<br />
• Understanding the role of the<br />
Elected Official: A 360 Snapshot<br />
• Emergency Decision-Making<br />
• Emergency Planning<br />
• Economic Risk<br />
Management<br />
• Jurisdictional Capabilities,<br />
Resources and<br />
Systems<br />
• Emergency Communications<br />
Kevin Child, part-time<br />
emergency management coordinator<br />
for the town of Avon-by-the sea,<br />
and a full-time risk control con-<br />
sultant for 36 municipalities, was<br />
among the attendees at a Leading<br />
through Crisis program sponsored<br />
by the Monmouth County, N.J.<br />
Sheriff ’s Department on <strong>June</strong> 1, the<br />
official start of hurricane season,<br />
attracting many full- and even parttime<br />
officials, though some elected<br />
officials still delegated attendance<br />
at the training to others in their<br />
municipalities.<br />
“This is a game plan that<br />
helps you determine what are your<br />
resources? Who can you turn to, to<br />
get help?” Child says. He describes<br />
the training as a framework that allows<br />
leaders to essentially fill in the<br />
blanks about what they have readily<br />
available, what they could need in<br />
event of a crisis and where they<br />
might find it. “The planning book<br />
doesn’t give you all the answers, but<br />
steers you to find those answers.<br />
“It’s important, especially<br />
for a newly elected official, to look<br />
for this before you need it rather<br />
than when you need it,” Child says.<br />
“FEMA (Federal Emergency Management<br />
Administration) will help,<br />
but will not bail out poor decision-<br />
More on page 48<br />
DoD awards grant to study how radiation affects<br />
computer memory<br />
By Steve Bittenbender<br />
The Department of Defense has<br />
awarded the University of Louisville<br />
a $1 million grant to study the<br />
effect radiation produces devices<br />
and chips that store memory for<br />
computers and peripherals.<br />
Professors from UofL’s J.B.<br />
Speed School of Engineers are<br />
leading the three-year program to<br />
develop systems that will protect<br />
memory devices from radiation<br />
exposure. Specifically, the DoD’s<br />
Defense Threat Reduction Agency<br />
is looking for a way to protect<br />
memory and access from a dirty<br />
bomb or reactor meltdown.<br />
Louisville engineers believe<br />
implementing electrical and mechanical<br />
elements – otherwise<br />
known as micro-electro-mechanical<br />
systems or MEMS – that are<br />
thinner than a strand of human<br />
hair could harden the electronics<br />
enough to protect the memory<br />
stored on devices.<br />
While more is known about<br />
the impact an electromagnetic<br />
pulse can have on electronic equipment,<br />
according to UofL officials,<br />
studying radiation’s effects is the<br />
first of its kind.<br />
“People haven’t done a lot of<br />
work in this area, so<br />
we don’t know exactly<br />
what to expect,” said<br />
Dr. Bruce Alphenaar,<br />
who chairs the school’s<br />
electrical and computer<br />
engineering department.<br />
“But this type of<br />
study is essential before<br />
MEMS can be used<br />
in radiation-exposed<br />
environments.”<br />
If successful, the<br />
program could help develop hardware<br />
that allows first responders<br />
to gain and maintain access to the<br />
systems critical to restore essential<br />
services. Those responders could be<br />
on or near-site, like a NEST team<br />
or federal officials miles away who<br />
need to access data from systems in<br />
hot zones.<br />
“If they do function, then<br />
these mechanical memories could<br />
be a viable replacement for normal<br />
standard electronic memory and<br />
logic devices,” he added.<br />
It also could protect the<br />
encryption protocols that radiation<br />
can render useless. If the encryption<br />
becomes corrupted, then you<br />
run a serious risk of losing data<br />
stored on those systems or make<br />
it available to hackers and other<br />
44 45<br />
Dr. Bruce Alphenaar<br />
cybercriminals, said<br />
Alphenaar.<br />
University officials<br />
developed the first<br />
devices earlier this year,<br />
Alphenaar said. Those<br />
devices have been<br />
exposed to radiation<br />
at Vanderbilt University’s<br />
Institute for Space<br />
and Defense Electronics.<br />
Once Vanderbilt<br />
researchers finish their<br />
tests, the devices will go back to<br />
UofL for further research and development.<br />
While the grant is for three<br />
years, Alphenaar said there’s a<br />
five-year research plan in place if<br />
it proves to be viable. The possibility<br />
also exists, he said, for possible<br />
technology transfer opportunities<br />
down the road.<br />
As the project moves forward,<br />
Alphenaar said the University plans<br />
to hire someone with advanced<br />
manufacturing experience so they<br />
can help researchers develop future<br />
prototypes<br />
In addition to Alphenaar,<br />
Kevin Walsh, Samuel T. Fife Endowed<br />
Professor of Electrical and<br />
Computer Engineering and the<br />
More on page 48
Keynote address: Senator Johnson<br />
Continued from page 23<br />
general Electric, pay<br />
no taxes at all in the<br />
United States, pursuant<br />
to laws that they<br />
actually wrote?”<br />
Responding to this question,<br />
the Senator gave some perfectly<br />
reasonable answers in his 20-25<br />
minute response. “The solution is<br />
economic growth”, he said. “You<br />
are always going to have overseas<br />
taxes.” These proposed solutions,<br />
however, trended quickly toward<br />
more debatable ones, including:<br />
getting all business taxes from<br />
employees, making every business<br />
a pass-through entity, taxing only<br />
business owners, and increasing<br />
taxes on capital gains, capped off<br />
by one of the all-time fiscal security<br />
favorites: “get rid of the tax code.”<br />
Following that, we could presumably<br />
adopt a variation on the old<br />
Russian proverb: “The shortage will<br />
be divided among the peasants”,<br />
which could be updated to “The<br />
shortage will be covered by cuts<br />
from Social Security, Medicare and<br />
Public School education.”<br />
NIC expert offers solutions<br />
Continued from page 25<br />
the attack’s impact.<br />
DDoS attacks are solvable<br />
problems, but agencies should seek<br />
out expert partners and be proactive<br />
in determining – before an<br />
incident occurs – what the solution<br />
will be.<br />
About the author: Rodney Caudle is<br />
Director of Information Security at<br />
NIC Inc., the nation’s largest eGovernment<br />
services provider. He has<br />
more than 20 years of experience<br />
in information security. He can be<br />
reached at rodney.caudle at egov.<br />
comt.<br />
DHS Science & Technology<br />
Patent Awards<br />
Continued from page 35<br />
Scans metal containers and discriminates<br />
benign liquids, such as<br />
lotions, drinks, and pharmaceutical<br />
liquids, from threat liquids, such as<br />
components of homemade explosives.<br />
These advances in scanning<br />
will help the civil aviation industry,<br />
as well as other mass transportation<br />
agencies, detect liquid explosive<br />
threats.<br />
Method for Identifying Materials Using<br />
Dielectric Properties through<br />
Active Millimeter Wave Illumination<br />
U.S. Patent Number: 8,946,641 – issued<br />
February 3, <strong>2015</strong><br />
Barry T. Smith, James C. Weatherall,<br />
and Jeffrey B. Barber (Transportation<br />
Security Laboratory)<br />
Helps detect concealed explosives,<br />
narcotics, weapons, and other<br />
contraband based on the reflected<br />
radiation returned from the body of<br />
an inspected subject. This screening<br />
method is noninvasive and does not<br />
require contact as the millimeter<br />
waves can penetrate clothing and<br />
distinguish benign materials from<br />
contraband.<br />
OraSure wins $10M HHS contract<br />
Continued from page 37<br />
using the same platform. The test<br />
can identify the virus’ presence just<br />
from using the patient’s blood or<br />
saliva on test strips much like the<br />
ones used for other ailments, like<br />
strep throat.<br />
The Ebola threat made headlines in<br />
the United States and other parts of<br />
the world last year, but only person<br />
in america died as a result. While<br />
there appears to be no evidence<br />
of the virus in the U.S. right now,<br />
health officials take the threat the<br />
virus poses very seriously, as it has<br />
led to more than 11,000 deaths in<br />
guinea, Liberia and Sierra Leone in<br />
the last 15 months.<br />
oraSure’s technology could enable<br />
medical professionals to detect<br />
Ebola’s presence in as little as 20<br />
minutes. With a virus as deadly as<br />
Ebola, the response time is critical<br />
to save lives and limit exposure to<br />
the public.<br />
“We believe that the availability<br />
of an accurate and simple rapid<br />
Ebola antigen test will be critical to<br />
containing and controlling current<br />
and future Ebola outbreaks,” said<br />
Douglas a. Michels, President and<br />
Chief Executive officer of oraSure<br />
technologies. “We are grateful<br />
to BaRDa for making this funding<br />
available as it will enable us to<br />
complete key clinical activities and<br />
obtain important regulatory approvals<br />
for this product.”<br />
according to BaRDa officials, the<br />
oraSure project is that latest in the<br />
agency’s effort to advance testing<br />
and development of products<br />
that will help prevent and detect<br />
public health emergencies. Those<br />
emergencies include chemical,<br />
biological, radiological and nuclear<br />
(CBRN) agents, flu pandemics and<br />
other serious contagious diseases.<br />
“Fast and inexpensive point-of-care<br />
diagnostics will improve our ability<br />
to control Ebola virus disease<br />
outbreaks,” said Robin Robinson,<br />
Ph.D., director of aSPR’s Biomedical<br />
advanced Research and Development<br />
authority (BaRDa), which<br />
will oversee this development<br />
program for HHS. “Faster diagnosis<br />
of Ebola virus infections allows<br />
for more immediate treatment and<br />
an earlier response to protect public<br />
health worldwide.”<br />
if successful, oraSure officials plan<br />
to market the test kit to both government<br />
agencies and non-governmental<br />
organizations. it currently<br />
sells its other products to laboratories,<br />
health care providers, colleges<br />
and other commercial entities.<br />
New from Government Security News:<br />
Post Your Video on the Busiest Website<br />
in Homeland Security!<br />
Selections from 20 Targeted Categories including Home Page<br />
Technology Sectors<br />
Access Control/Identification CBRNE/<br />
Detection Communications<br />
Cyber Security<br />
Disaster Preparedness/Emergency<br />
Response<br />
Education/Training<br />
IT Security<br />
Perimeter Protection<br />
Video Surveillance/Analytics<br />
CLICK HERE TO VIEW VIDEO<br />
Market Sectors<br />
Airport Aviation<br />
Border Security<br />
Federal Agencies & Legislative<br />
Infrastructure Protection<br />
Law Enforcement/First Responders<br />
Maritime/Port Security Military/Force<br />
Protection<br />
State & Local Security<br />
Security Services<br />
Your Video Posting includes:<br />
• Posting of your Video(s) on GSN website channel(s) for one month<br />
• Headline and 100 word description of each Video, created by your team<br />
• Notice of your videos on home page, sector channels of GSN website and in<br />
GSN’s Daily Insider newsletter, <strong>Digital</strong> and Print editions<br />
Sign up for your company’s Video Posting here and join<br />
colleagues that have received thousands of downloads!<br />
Home Page of GSN website – $500 per month; $200 each additional Channel<br />
All other Channels – $300 first channel; $200 each additional Channel<br />
Contact GSN Publisher Mike Madsen by phone or email at:<br />
Phone: 732-233-8119 • Email: mmadsen@gsnmagazine.com<br />
46
Leading Through Crisis workshop<br />
Continued from page 44<br />
making.”<br />
In the case of a resource-strapped or small town,<br />
Child says, the training shares how preparation might<br />
mean looking at businesses and residents in a new light.<br />
While the town may not have a tree expert on staff, it<br />
might have a local tree cutting business or demolition<br />
company that could help in case of a crisis. “Maybe you<br />
can’t afford all these things but there are people within<br />
every town that have certain talents and abilities.”<br />
Having these contacts and relationships in place<br />
before a crisis happens is critical, the experts say.<br />
“We don’t appreciate or value training until we’re<br />
standing in front of a judge, until we’re meeting with<br />
the family or loved ones of someone who was killed in a<br />
flood or by an active shooter, or we’re answering a lawsuit,<br />
spending tens of millions where we could have spent tens<br />
of thousands on training,” says Paul Goldenberg, Cardinal<br />
Point Strategies CEO.<br />
“I don’t think some of them realize<br />
how things can happen,” says Child.<br />
“Sometimes, they don’t think they<br />
need it until they’re hit with that situation<br />
or crisis.”<br />
For additional information please<br />
contact CPS Director of Training & Development Tom Walton<br />
at twalton@cpsinc.us.<br />
DoD awards grant to study how radiation affects<br />
computer memory<br />
Continued from page 45<br />
founding director of the Micro/Nano Technology Center,<br />
and Shamus McNamara, associate professor of electrical<br />
and computer engineering, are co-principal investigators.<br />
“This is a great example of the kind of groundbreaking<br />
research that our engineers do every day,” said John<br />
Usher, acting dean of the Speed School. “They are working<br />
– often in partnerships with other universities, agencies and<br />
companies – to make our world a better, and safer, place.”<br />
Coming Attractions<br />
<strong>July</strong> – September <strong>2015</strong><br />
<strong>July</strong> Print <strong>Edition</strong>:<br />
Technology Focus –<br />
Law Enforcement/Public Safety Communications<br />
Market Sector Focus –<br />
Education and Training Resources<br />
August <strong>Digital</strong> <strong>Edition</strong>:<br />
Technology Focus –<br />
Cybersecurity & Convergence<br />
Market Sector Focus –<br />
Emergency Preparedness/Disaster Response<br />
September Print <strong>Edition</strong>:<br />
Technology Focus –<br />
Mass Notification/Short Wave Infrared<br />
Market Sector Focus –<br />
Maritime/Port Security<br />
For GSN Media Kit or Advertising Rates,<br />
contact Publisher Mike Madsen<br />
at 732-233-8119<br />
or by email at mmadsen@gsnmagazine.com<br />
Publisher:<br />
Michael Madsen<br />
(O) 212-344-0759, X1<br />
(C) 732-233-8119<br />
mmadsen@gsnmagazine.com<br />
Executive Editor:<br />
John Wagley<br />
(O) 212-344-0759, X2<br />
(C) 202-425-0196<br />
wagley.jr@gmail.com<br />
Senior Writer:<br />
Lorrie Barclay<br />
(O) 212-344-0759, X5<br />
(C) 508-685-0652<br />
lorriebarclay@gmail.com<br />
Senior Writer:<br />
Steve Bittenbender<br />
(C) 502-552-1450<br />
freelancehack@gmail.com<br />
The News Leader in Physical, IT and Homeland Security<br />
Columnist:<br />
John Convy<br />
Convy on Netcentric Security<br />
john@convyassociates.com<br />
Columnist:<br />
John Romanowich<br />
Romanowich on Video Surveillance<br />
jromanowich@sightloxic.com<br />
Guest Expert Contributor:<br />
Denise Rucker Krepp<br />
(C) 202-546-2533<br />
kdrkrepp@hotmail.com<br />
Art Director:<br />
Gerry O’Hara<br />
OHDesign3<br />
(C) 203-249-0626<br />
gerry@ohd3.com<br />
Production/Design Specialist:<br />
Brenden Hitt<br />
(C) 315-723-6203<br />
brenden@ihitt.com<br />
Editorial Director/CEO:<br />
Adrian Courtenay<br />
(O) 212-344-0759, X3<br />
(C) 917-696-5782<br />
acourtenay@gsnmagazine.com<br />
Mailing Address:<br />
Government Security News<br />
P.O. Box 7608<br />
Greenwich, CT 06836<br />
Government Security News (ISSN 1548-940X and UPS 022-845) is published in six print editions (Jan, Mar, May, Jul, Sep, Nov) and<br />
six digital editions (Feb, Apr, Jun, Aug, Oct, Dec) per year by World Business Media, LLC, P.O. Box 7608, Greenwich, CT 06836.<br />
Telephone (212) 344-0759. Periodicals postage paid at New York, NY and additional mailing offices. POSTMASTER: Send address<br />
changes to GSN: Government Security News, Subscription Department, P.O. Box 316, Congers, NY 10920-0316. For Government<br />
decision makers and business executives involved with security products, systems and series. Qualified U.S. subscribers received<br />
GSN: Government Security News at no charge. Non-qualified subscribers in the U.S. are charged $75.00 per year. Canadian and<br />
foreign subscribers are charged $140 International Airmail. Copyright <strong>2015</strong> by GSN: Government Security News. All rights reserved.<br />
Printed in the U.S.A. GSN: Government Security News assumes resonsibility for validity of claims in items reported.<br />
48 49
Secure access<br />
to cloud, data<br />
and door<br />
Go beyond simple passwords. Protect your<br />
organisation with cost-effective, risk appropriate<br />
Identity Assurance Solutions from HID Global.<br />
With the ever increasing risk from advanced IT security threats, organisations are looking to take authentication<br />
beyond passwords, while lowering cost at the same time. HID Global’s authentication solution provides you<br />
with the convenience, flexibility and comprehensive control you need to deliver secure access, without<br />
compromising on security. HID Global can empower your employee’s, partners and customers with anytime,<br />
anywhere access to enterprise cloud applications, data and the door.<br />
Experience authentication beyond passwords. hidglobal.com<br />
© <strong>2015</strong> HID Global Corporation/ASSA ABLOY AB. All rights reserved. HID, HID Global, the HID Blue Brick logo, and the Chain Design are trademarks or registered trademarks of HID Global or its<br />
licensor(s)/supplier(s) in the US and other countries and may not be used without permission.