GSN March 2016 Digital Edition
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
Government Security News<br />
MARCH <strong>2016</strong> DIGITAL EDITION<br />
NYPD Commissioner Bratton, NY Mayor DeBlasio, Homeland Security Secretary<br />
Johnson attend active shooter response drill in NYC MTA station, as Guardian<br />
Gateway successfully detects all gunshots – More on Page 26<br />
Also in this issue:<br />
Ensuring that stolen identities and other biometric data is useless to identity thieves – Page 4<br />
Sony to market cloud-based Eagle Eye Camera VMS throughout Japan – Page 6<br />
Electronic Pulse (EMP) is technology’s worst nightmare, says new <strong>GSN</strong> Columnist George Lane – Page 30<br />
Xenophobic immigration policy would wreck U.S. economy: American Immigration Council – Page 47
<strong>GSN</strong> <strong>March</strong> <strong>2016</strong> <strong>Digital</strong> <strong>Edition</strong><br />
Table of Contents<br />
<strong>GSN</strong> TECHNOLOGY SPOTLIGHT<br />
Whitewood Encryption Systems announces awarding of third patent arising<br />
from Los Alamos National Laboratory technology transfer<br />
“It is clear that the unique attributes of quantum mechanics can have a direct benefit<br />
on security systems that use cryptography. In particular, quantum mechanics<br />
enable behavior that is perfectly random and provides a definitive measure of<br />
tampering – both critical aspects of any crypto system,” said Richard Moulds, Vice<br />
President of Strategy at Whitewood. “As the security industry considers the threat<br />
of quantum computers and their impact on today’s encryption capabilities, we must<br />
raise the security bar. In the medium to long term, this means adopting quantumresistant<br />
algorithms and key management systems. But we can also take action<br />
in the short term. Quantum processes can be used today as a true and trusted<br />
source of random numbers and are rapidly being seen as a standard of due care<br />
when generating cryptographic keys that are fundamentally unpredictable.”<br />
Read more on Page 8.<br />
New <strong>GSN</strong> Columnist George Lane describe’s “Technology’s Worst Nightmare”<br />
An electric magnetic pulse (EMP) is a super-energetic radio wave, an intense burst<br />
of electronic energy that caused by abrupt and rapid acceleration of charged particles<br />
that can destroy or damage electronic systems by overloading their circuits.<br />
EMP’s are harmless to people, but catastrophic to critical infrastructure, such as<br />
electric power, telecommunications, transportation. Because of U.S. unpreparedness<br />
for an EMP event, it is estimated that within twelve months of an event, from<br />
two-thirds to ninety present of the U.S. population could perish.<br />
Read more on Page 30.<br />
2
NEWS AND FEATURES<br />
Ensuring biometric data is useless to identity<br />
thieves Page 4<br />
Sony Business to market cloud-based Eagle Eye<br />
Security Camera Video Management System (VMS)<br />
throughout Japan Page 6<br />
Whitewood Encryption System announces awarding<br />
off third patent arising from Los Alamos National Laboratory<br />
technology transfer Page 8<br />
Marrying mobility and location data for effective<br />
disaster response Page 10<br />
Salient CRGT awarded a $9M contract to provide<br />
data analytics services to the DOT Pipeline and Hazardous<br />
Materials Safety Administration Page 12<br />
Intelsat General and L-3 Communications Systems-West<br />
demonstrate automatic beam switching for<br />
unmanned aerial system on Itelsat EpicNG Page 14<br />
Terma and Atlas Telecom sign partnering<br />
agreement Page 16<br />
Alaskan community standardizes on Genetec “Omnicast”<br />
Video Surveillance to secure public facilities,<br />
keep citizens safe and spread benefits to surrounding<br />
villages Page 18<br />
We’re All in This Together: Strategies for an engaged<br />
public workforce / Part 1 Page 20<br />
Intelleges’ innovative approach helps government<br />
contractors assess their cybersecurity strengths<br />
Page 24<br />
Shooter Detection Systems Chief Cris Connors<br />
discusses growing market for active shooter detection<br />
Page 26<br />
New Hazmat Science Column – Electronic Pulse<br />
(EMP): Technology’s Worst Nightmare Page 30<br />
WWF-Canada and RSA team up to advance<br />
employee action on sustainability Page 40<br />
Extreme conditions are no match for latest<br />
Motorola Solutions Radio Page 49<br />
CBRNE Detection<br />
____________________________________<br />
American Science and Engineering debuts advanced<br />
security screening systems at ABU DHABI event<br />
Page 32<br />
Rapiscan MP 100 Backpack radiation detection<br />
system allows detection of radioactive materials<br />
Page 35<br />
Rapiscan launches DETECTRA HX hand-held<br />
explosive trace detection system Page 37<br />
Convy on Netcentric Security<br />
Mustering up better incident response Page 38<br />
Border Security/Immigration<br />
____________________________________<br />
Statement by Secretary Jeh C. Johnson on Southwest<br />
Border Security apprehensions Page 42<br />
What’s next in the Supreme Court Case on<br />
expanded DACA and DAPA Page 44<br />
Nativists line up in support of Trump’s Presidential<br />
Campaign Page 45<br />
New TSA canine training center opens in San Antonio<br />
Page 46<br />
Xenophobic immigration policy would wreck the<br />
U.S. economy Page 47<br />
Coming Attractions Page 56<br />
Masthead Page 57<br />
3
Ensuring biometric data is useless to<br />
identity thieves<br />
Major news sources reported in<br />
mid-2015 that 21.5 million people<br />
were affected by a breach of U.S.<br />
government systems. Identity data<br />
gathered over the last 15 years was<br />
compromised, including personal<br />
information about citizens who were<br />
part of government employee background<br />
checks. Unfortunately, even<br />
the best risk-based, multi-layered<br />
breach defense is imperfect, and incidents<br />
like this are inevitable. For<br />
this reason, there must be greater<br />
focus on controlling what happens<br />
after the breach, including ensuring<br />
that stolen identities are unusable by<br />
anyone but their legitimate owners.<br />
Rendering Stolen Fingerprints<br />
Useless<br />
Biometrics is the only authentication<br />
method that binds a myriad of<br />
digital and physical credentials to a<br />
person. As such, biometrics is playing<br />
an important role in eliminating<br />
digital identity theft in today’s increasingly<br />
complex and vulnerable<br />
digital environment.<br />
Fingerprint images were among<br />
the sensitive information that was<br />
stolen in the 2015 U.S. Office of Personnel<br />
Management (OPM) breach.<br />
Conceivably, this biometric data<br />
4<br />
could be used by the perpetrators<br />
to hijack a user’s identity and gain<br />
fraudulent access to security systems.<br />
It is important to understand that<br />
biometric characteristics are not secrets.<br />
For example, our facial characteristics<br />
are quite public — not<br />
only observable, but also generally<br />
associated with our names and other<br />
personal information. In the OPM<br />
example, now that fingerprints have<br />
been stolen from government databases<br />
and can never be taken back,<br />
the key question becomes what can<br />
or should be done to render this information<br />
useless to any would-be<br />
impostor? Given the premise that<br />
databases are inherently vulnerable<br />
to attack, the challenge is one<br />
of minimizing negative impacts of a<br />
breach on individuals and organizations.<br />
As always, the answer depends on<br />
the use case, and each category of<br />
applications must be examined individually<br />
and its associated threats<br />
assessed. In this complex and interconnected<br />
digital world, systems<br />
must be thoughtfully designed and<br />
deployed in order to protect user<br />
identities and ensure appropriate<br />
levels of security within the context<br />
of the application.<br />
In the case of biometric data that<br />
is already “in the wild” (such as that<br />
stolen from the OPM), numerous<br />
tactics and best practices should<br />
White Paper: Multispectrum Fingerprint Image Acquisition
e considered in order to render<br />
identities useless to anyone but the<br />
legitimate owner. Of critical importance<br />
is the ability to detect fraudulent<br />
attempts to use biometric data.<br />
Liveness detection — the real-time<br />
determination that the biometric<br />
characteristics presented are genuine<br />
and not fake — is one highlyeffective<br />
design feature in solutions<br />
where users physically interact with<br />
authentication systems.<br />
Augmenting biometric liveness<br />
detection with other security layers<br />
for multi-factor authentication will<br />
greatly enhance our digital security<br />
as well as render the theft of any one<br />
personal data element inconsequential.<br />
There are also a number of concepts<br />
that combine biometric data<br />
and other data elements to create an<br />
even more robust digital credential<br />
that will ensure that stolen biometric<br />
data is insufficient and therefore<br />
useless in enabling the fraudulent<br />
use of legitimate identities.<br />
Following are the key elements<br />
in a strategy that extends beyond<br />
breach defense to include tactics for<br />
neutralizing the effects of an identity<br />
breach after it has happened.<br />
Improving Liveness Detection with<br />
Multispectral Imaging Technology<br />
nates the possibility of counterfeit<br />
fingerprints being used for authentication.<br />
The technology is used<br />
to compare the complex optical<br />
characteristics of the material being<br />
presented against known characteristics<br />
of living skin. This unique capability,<br />
in addition to the collection<br />
of unique fingerprint characteristics<br />
from both the surface and subsurface<br />
of the finger, results in superior<br />
and reliable matching performance<br />
paired with the exceptional ability<br />
Comparison Chart:<br />
Lumisigm Multispectral Technology<br />
to detect whether the finger is alive<br />
or not. Key features include:<br />
• Uses multiple sources and types<br />
of light along with advanced polarization<br />
techniques to capture information<br />
from the surface and subsurface<br />
of the finger — all the way<br />
down to capillary beds and other<br />
sub-dermal structures.<br />
• Built from advanced machine<br />
learning algorithms that can be updated<br />
in the field as new threats and<br />
spoofs are identified, enabling multispectral<br />
imaging sensors to very<br />
quickly respond and adapt to new<br />
5<br />
The most effective liveness detection<br />
approach for fingerprint biometrics<br />
uses multispectral imaging<br />
technology, which virtually elimivulnerabilities.<br />
Multi-Factor and Multi-Modal<br />
Authentication<br />
For strong and reliable user authentication,<br />
organizations should consider,<br />
where practical, multi-factor<br />
and even multi-modal authentication.<br />
Today’s authentication technologies<br />
enable solutions that can<br />
enhance security while replacing<br />
passwords and improving convenience<br />
in a seamless way that is<br />
non-intrusive to the legitimate user.<br />
For example, personal devices<br />
like smart phones, wearables, RFID<br />
cards and other intelligent personal<br />
devices can all generally be used as<br />
factors of authentication. Regardless<br />
of which additional authentication<br />
factor is presented by the user, when<br />
it is intelligently combined with<br />
the biometric data associated with<br />
the identity claim, it is possible to<br />
quickly determine a definitive “yes”<br />
or “no”. Strong authentication by<br />
means of two or more factors (with<br />
one being a biometric) is fundamentally<br />
more secure than outdated<br />
username/password alternatives.<br />
When identity is firmly established,<br />
the use of mobile devices in<br />
authentication solutions offers the<br />
opportunity for greater personalization<br />
and a seamless experience for legitimate<br />
users. Information systems<br />
can be tailored to each user’s need,<br />
More on page 50
Sony Business to market cloud-based Eagle Eye<br />
Security Camera Video Management System (VMS)<br />
throughout Japan<br />
Pan-Tilt-Zoom Camera Control<br />
AUSTIN, Texas. <strong>March</strong> 16, <strong>2016</strong> –<br />
Eagle Eye Networks, Inc., today<br />
announced that Tokyo-based Sony<br />
Business Solutions Corporation<br />
will sell and support the cloudbased<br />
Eagle Eye Security Camera<br />
Video Management System (VMS)<br />
throughout Japan.<br />
Sony Business Solutions Corporation<br />
(“Sony Business Solutions”), a<br />
wholly-owned subsidiary of Sony,<br />
provides technology and business<br />
support service to specialized industries,<br />
such as broadcasting, medical,<br />
large facilities and educational,<br />
financial, government and business<br />
offices.<br />
Sony Business Solutions will offer<br />
the Eagle Eye<br />
Security Camera<br />
VMS for its customers<br />
to store and<br />
stream encrypted<br />
video from the cloud,<br />
provide secure remote<br />
access via smartphones,<br />
and deliver motion and system<br />
alerts. Live and recorded video from<br />
multiple premises can be securely<br />
accessed, expanding the system<br />
scalability.<br />
“We are pleased to work with Eagle<br />
Eye Networks to bring their cloud<br />
video surveillance solution to our<br />
customers,” said Kazuo Miyajima,<br />
President, Sony Business Solutions<br />
No open ports,<br />
Eagle Eye Complete Privacy Encryption.<br />
Corporation. “Eagle Eye Networks<br />
has developed the industry’s most<br />
secure and reliable cloud security<br />
camera system. Further, their open<br />
API allows us to customize superior<br />
solutions for our clients.”<br />
Sony Business Solutions will use<br />
Eagle Eye Networks Complete Privacy<br />
Encryption to satisfy customer<br />
desires for privacy. The cloud<br />
video recording will be stored in a<br />
cloud data center located in Tokyo,<br />
with round-the-clock security monitoring,<br />
along with storage redun-<br />
6
dancy to eliminate risk of video loss.<br />
“We are honored to have Sony<br />
Business Solutions adopt our solution<br />
for their customers, especially<br />
given their state-of-the-art video<br />
and audio technology,” said Dean<br />
Drako, President and CEO, Eagle<br />
Eye Networks. “Sony Business Solutions<br />
is adding further value to<br />
their technology by delivering to its<br />
customers the advanced cloud Eagle<br />
Eye Security Camera VMS, with the<br />
same ease of use and innovation<br />
that fits their strong reputation.”<br />
About Eagle Eye Networks<br />
Eagle Eye Networks delivers the first<br />
on-demand cloud based security<br />
and operations video management<br />
system (VMS) providing both cloud<br />
and on-premise recording. Eagle<br />
Eye also provides a cloud video API<br />
for integrations and application development.<br />
The Eagle Eye Platform<br />
offers secure, encrypted recording,<br />
camera management, mobile viewing<br />
and alerts – all 100% cloud managed.<br />
The Eagle Eye Cloud Security<br />
Camera Video Management System<br />
supports a broad array of IP and<br />
analog cameras while using Intelligent<br />
Bandwidth Management,<br />
making it easy to deploy at single<br />
and multiple sites. The API platform<br />
uses the Eagle Eye Big Data Video<br />
Framework, with time based data<br />
structures used for indexing, search,<br />
retrieval and analysis of the live and<br />
archived video. Eagle Eye Networks<br />
sells through authorized reseller and<br />
installation partners. The headquarters<br />
is at 4611 Bee Caves Rd, suite<br />
200, Austin, Texas, 78746.<br />
For more information please visit<br />
www.eagleeyenetworks.com or call<br />
+1-512-473-0500.<br />
DATA THAT MATTERS<br />
SECURITY THAT DELIVERS<br />
AMERISTARSECURITY.COM | 888-333-3422
Whitewood Encryption Systems announces<br />
awarding of third patent arising from Los Alamos<br />
National Laboratory technology transfer<br />
• The new patent addresses the critical need to share cryptographic keys<br />
over untrusted optical networks and embodies inventions that increase<br />
operating distance and simplify deployment.<br />
• This is the company’s third patent that focuses on the long-range requirement<br />
of establishing security systems that can remain secure even<br />
with the arrival of ultra-high performance quantum computers.<br />
• Whitewood’s IP portfolio and related commercialization efforts illustrate<br />
the effectiveness of a public-private partnership in technology transfer<br />
that can stimulate innovation to the benefit of the broader U.S. economy.<br />
8<br />
BOSTON (February 17, <strong>2016</strong>) –<br />
Whitewood Encryption Systems,<br />
Inc., a provider of crypto-security<br />
solutions, is pleased to announce<br />
that the U.S. Patent and Trademark<br />
Office (USPTO) issued a Notice of<br />
Allowance for a patent application<br />
that addresses important practical<br />
issues that arise when employing<br />
quantum communications techniques<br />
to share cryptographic key<br />
material over fiber optic networks.<br />
The patent application, which is<br />
entitled, “Great Circle Solution to<br />
Polarization-based Quantum Communication<br />
(QC) in Optical Fiber,”<br />
describes an advanced method for<br />
correcting the unwanted polarization<br />
effects that are encountered<br />
in today’s optical fiber networks.<br />
This enables the parties wishing to<br />
perform secure key exchanges to<br />
operate over longer distances and<br />
to be less susceptible to signal degradation.<br />
The use of the quantum<br />
mechanical properties of photons<br />
to share secret keys in a way that is<br />
fundamentally resistant to eavesdropping<br />
or man-in–the-middle attacks<br />
has been widely demonstrated<br />
in the lab, but practical limitations<br />
such as optical distortion have severely<br />
limited the number of commercial<br />
deployments. Future products<br />
that embody this patent would<br />
help to address some of those limitations.<br />
The inventors named on the patent<br />
include Jane Nordholt and Richard<br />
Hughes, who co-founded and<br />
co-led the Quantum Communications<br />
team at Los Alamos National<br />
Laboratory in New Mexico for nearly<br />
two decades before retiring, and<br />
who are now consulting physicists<br />
for Whitewood. Their co-inventors<br />
are Raymond Newell and Charles<br />
Glen Peterson, who are still active<br />
researchers at Los Alamos and continue<br />
to support Whitewood product<br />
development activities.<br />
This patent forms part of a portfolio<br />
of intellectual property exclusively<br />
licensed by Whitewood<br />
to commercialize quantum-based<br />
technologies to address the current<br />
and future needs for secure cryptography.<br />
Last year, the same group<br />
of scientists was awarded a patent<br />
that allowed for the miniaturization<br />
of quantum-based key distribution<br />
technology for use on existing optical<br />
fiber networks and from satellite<br />
to ground. Prior to that, they also<br />
received a patent for a technology<br />
that dramatically increased the scalability<br />
of multi-node networks that<br />
employ quantum-based key management<br />
techniques.<br />
“It is clear that the unique attributes<br />
of quantum mechanics can<br />
have a direct benefit on security
Richard Moulds, Vice<br />
President of Strategy<br />
at Whitewood<br />
systems that use cryptography.<br />
In particular, quantum<br />
mechanics enable<br />
behavior that is perfectly<br />
random and provides<br />
a definitive measure of<br />
tampering – both critical<br />
aspects of any crypto system,”<br />
said Richard Moulds,<br />
Vice President of Strategy<br />
at Whitewood. “As the security<br />
industry considers<br />
the threat of quantum computers<br />
and their impact on today’s encryption<br />
capabilities, we must raise the<br />
security bar. In the medium to long<br />
term, this means adopting quantum-resistant<br />
algorithms<br />
and key management<br />
systems. But we can also<br />
take action in the short<br />
term. Quantum processes<br />
can be used today as a<br />
true and trusted source<br />
of random numbers and<br />
are rapidly being seen as<br />
a standard of due care<br />
when generating cryptographic<br />
keys that are fundamentally<br />
unpredictable.”<br />
Last year, Whitewood launched its<br />
first product that incorporated Los<br />
Alamos technology: a quantumpowered<br />
random number generator<br />
(QRNG) called the Entropy EngineTM.<br />
The product solves the problem<br />
of entropy generation, the critical<br />
base to all cryptographic systems<br />
in use today, from encryption, digital<br />
signing and PKI to crypto-currency<br />
and digital payments.<br />
Entropy is what makes random<br />
numbers random — and cryptographic<br />
keys that are derived from<br />
these random numbers rely on this<br />
unpredictability for their security. In<br />
the absence of a true random number<br />
generator, developers are forced<br />
to rely on deterministic software<br />
systems to simulate random num-<br />
More on page 52<br />
POWER TO PROTECT<br />
SECURING WHAT MATTERS MOST<br />
AMERISTARSECURITY.COM | 888-333-3422
Marrying mobility and location data for<br />
effective disaster response<br />
By Scott Lee<br />
TerraGo Technologies<br />
There was a time when disaster<br />
response was planned<br />
in a room among experts<br />
and authorities that would<br />
focus on improving coordination<br />
with one another<br />
when the next hurricane or earthquake<br />
struck.<br />
Understandably, their plans<br />
relied upon the traditional networks,<br />
telecommunications<br />
and computer systems. But<br />
Hurricanes Katrina and Sandy,<br />
disasters in Haiti and Japan,<br />
wildfires in the Northwest,<br />
winter floods along the Mississippi<br />
and terrorist attacks<br />
in Paris and San Bernardino<br />
have given us numerous examples<br />
of how mobile technology<br />
can improve our<br />
ability to respond and recover<br />
from these types of<br />
events.<br />
Those events also have raised<br />
government and public awareness<br />
of mobile devices as crowdsourcing<br />
tools that have spawned masses<br />
of eyewitnesses eager to share<br />
their observations. In this case,<br />
the smartphone in the<br />
hands of the public provided<br />
faster and better<br />
situational awareness<br />
than traditional systems.<br />
The mobile revolution,<br />
which accelerated<br />
in 2008 when geospatial<br />
chips turned cell phones<br />
into smart phones, has produced<br />
a worldwide cadre of trained data<br />
collectors ready to help at the speed<br />
of thumbs on<br />
phone screens.<br />
But in all too many cases, state and<br />
local relief agencies are unable to<br />
take full advantage of this resource,<br />
or unwilling to rely on public net-<br />
10<br />
works.<br />
The Department of Homeland Security<br />
ranks inability to act without<br />
network connectivity as the chief<br />
issue hindering disaster response,<br />
just ahead of the lack of capability<br />
– or unwillingness – to share data<br />
horizontally and vertically over local<br />
and state stove-piped legacy<br />
systems. The priority remains, even<br />
though the geospatial industry began<br />
working offline in 2005, three<br />
years before the mobile phone added<br />
geospatial capability. Today’s<br />
mobile users cache maps<br />
and forms that enable<br />
them continue collecting<br />
location-based data without<br />
network access, and to<br />
sync seamlessly into a common<br />
operating picture when<br />
connectivity is restored.<br />
Mobile users are constantly<br />
producing geo-tagged location<br />
reports, with supporting<br />
images and video to enhance<br />
the operating picture. These<br />
observations contain real-time<br />
geographic reference points<br />
that allow responders to mobile<br />
resources faster, saving time and<br />
lives.<br />
Enlightened officials are includ-
ing critical infrastructure in those<br />
reference points, in effect enhancing<br />
security with necessary detail about<br />
places where security is most vital.<br />
Even the issue of legacy systems<br />
that plague so many governments<br />
and first responders has been solved<br />
with open standards technology<br />
that cuts across networks, leaving<br />
knocked-down stovepipes in its<br />
wake and allowing a real-time common<br />
operating picture to police<br />
and fire, ambulances and hospitals,<br />
Homeland Security, National Guard<br />
and Red Cross, and to government<br />
officials whose decisions have to be<br />
fluid to cope with the moving target<br />
of disaster.<br />
Lessons learned drive evolving<br />
plans and technology solutions, but<br />
often on parallel paths and usually<br />
not at the same pace. Technology always<br />
moves faster than public adoption.<br />
Today it’s because industry’s<br />
agile development processes move<br />
at the speed of innovation, faster<br />
than first responders can adjust and<br />
adapt to – and pay for – changing<br />
emergency requirements.<br />
Often answers are available before<br />
officials know the questions.<br />
But there is a way to find both<br />
questions and answers.<br />
By conducting an inventory of requirements<br />
necessary to cope with<br />
potentially anticipated emergencies,<br />
such as weather, earthquakes,<br />
chemical spills, industrial fires and<br />
the like; and unanticipated events,<br />
such as issues in schools and public<br />
More on page 54<br />
Gartner Security &<br />
Risk Management<br />
Summit <strong>2016</strong><br />
June 13 – 16 | National Harbor, MD<br />
gartner.com/us/securityrisk<br />
Learn how to address the new threats<br />
and challenges of digital business<br />
Government IT topics to be covered:<br />
• Cybersecurity threats<br />
• Cloud security and the role of FedRAMP<br />
• Secure mobile operations<br />
• The role of analytics in cybersecurity<br />
© <strong>2016</strong> Gartner, Inc. and/or its affiliates. All rights reserved. Gartner is a registered trademark of Gartner, Inc. or its affiliates.<br />
For more information, email info@gartner.com or visit gartner.com.<br />
Save $200 on the standard registration<br />
rate with priority code GART<strong>GSN</strong>
Salient CRGT has been awarded a $9M contract to<br />
provide data analytics services to the DOT Pipeline<br />
and Hazardous Materials Safety Administration<br />
FAIRFAX, VA – <strong>March</strong> 10, <strong>2016</strong> –<br />
Salient CRGT, Inc., a leading provider<br />
of full lifecycle information<br />
technology and data analytics services,<br />
today announced a prime contract<br />
award from the Department<br />
of Transportation (DOT) Pipeline<br />
and Hazardous Materials Safety<br />
Administration (PHMSA). Salient<br />
CRGT will continue to provide data<br />
warehousing support, dashboards,<br />
reports, and applications that integrate<br />
more than 4 million multiagency<br />
records originating from 70<br />
data sources in to a single operating<br />
picture. This five-year effort is valued<br />
at approximately $9 million.<br />
For the past seven years, Salient<br />
CRGT has developed, maintained,<br />
and operated the Multimodal<br />
HazMat Intelligence Portal (HIP)<br />
and Pipeline Data Mart (PDM). An<br />
eGovernment initiative, HIP is an<br />
essential system for the secure sharing<br />
of critical hazardous material<br />
information.<br />
The PHMSA mission is to protect<br />
people and the environment from<br />
the risks of hazardous materials<br />
transportation. To do this, the agency<br />
establishes national policy, sets<br />
and enforces standards, educates,<br />
12<br />
and conducts research to prevent<br />
incidents. The agency also prepares<br />
the public and first responders to<br />
reduce consequences if an incident<br />
does occur.<br />
“Our team is very proud to continue<br />
our relationship with the<br />
PHMSA. The agency’s mission of<br />
protecting our public safety is an<br />
incredible responsibility,” says Brad<br />
Antle, CEO of Salient CRGT. “The<br />
agency is dedicated to continuous<br />
improvement of our citizens’ safety<br />
through collaboration and visibility<br />
of the multiple modes of transportation.<br />
We are committed to supporting<br />
the agency’s efforts through our<br />
data integration, analytics, and visualization.”<br />
This award was through its wholly<br />
owned subsidiary, Guident Inc.<br />
This work was funded in part, under<br />
the Department of Transportation,<br />
Pipeline and Hazardous Materials<br />
Safety Administration. The<br />
views and conclusions contained in<br />
this document are those of the authors<br />
and should not be interpreted<br />
as representing the official policies,<br />
either expressed or implied, of the<br />
Pipeline and Hazardous Materials
Safety Administration, the Department<br />
of Transportation, or the U.S.<br />
Government.<br />
About Salient CRGT<br />
Salient CRGT provides federal civilian,<br />
defense, homeland, and intelligence<br />
agencies with expert depth<br />
in Agile software development,<br />
data analytics, mobility, cyber security<br />
and infrastructure. We support<br />
these core capabilities with full lifecycle<br />
IT services and training—to<br />
help our customers meet critical<br />
goals for pivotal missions. The most<br />
innovative talent delivery model in<br />
the industry, scientifically providing<br />
exactly the right people for the<br />
customers’ most pressing requirements,<br />
fuels these critical capabilities.<br />
Salient CRGT has earned a record<br />
of success with integration and<br />
operations of large‐scale, high‐volume<br />
solutions. On September 15,<br />
2015, Salient and CRGT announced<br />
closing of the merger transactions –<br />
visit newsroom.<br />
For additional information, visit<br />
www.salientcrgt.com<br />
13
Intelsat General and L-3 Communication<br />
Systems-West demonstrate automatic beam<br />
switching for unmanned aerial system on<br />
Intelsat EpicNG<br />
MCLEAN, VA, <strong>March</strong> 7, <strong>2016</strong> –<br />
Intelsat General Corporation, a<br />
wholly owned subsidiary of Intelsat<br />
S.A. (NYSE: I), operator of the<br />
world’s first Globalized Network<br />
powered by its leading satellite<br />
backbone, and L-3 Communication<br />
Systems-West (L-3 CS-West) announced<br />
today the successful<br />
demonstration<br />
of new automatic beam<br />
switching technology<br />
that enables Unmanned<br />
Airborne Systems (UAS)<br />
fitted with L-3 CS-West<br />
satellite communications<br />
packages to operate on<br />
Intelsat’s high-throughput<br />
satellite (HTS) platform,<br />
Intelsat EpicNG.<br />
This software upgrade<br />
was funded and developed through<br />
a partnership between Intelsat General<br />
and L-3 CS-West to ensure that<br />
the existing unmanned aircraft systems<br />
(UAS) platforms can take advantage<br />
of the 3x–4x throughput<br />
improvement that Intelsat EpicNG<br />
enables. This demonstration was<br />
part of Intelsat’s ongoing ecosystem<br />
work validating the compatibility<br />
of existing hardware with Intelsat’s<br />
EpicNG high-throughput satellites.<br />
This over-the-satellite demonstration<br />
was conducted on Intelsat’s<br />
Horizons-1 satellite using three<br />
separate bandwidth segments and a<br />
navigation simulator representing a<br />
UAS flying through three separate<br />
high-throughput spot beams on a<br />
single Intelsat EpicNG-class satellite.<br />
Using an L-3 CS-West hub and terminal<br />
modems for the end-to-end<br />
test, engineers measured the performance<br />
of full-motion video and IP<br />
data between the UAS and the hub<br />
14<br />
controller as the system automatically<br />
switched both frequency and<br />
polarization while the aircraft flew<br />
through the three separate beams.<br />
The new Intelsat EpicNG satellites<br />
are designed to increase UAS<br />
data rate performance by 200 to 300<br />
percent via their high-throughput<br />
spot beams and enable<br />
broadband performance<br />
to antennas with apertures<br />
smaller than 30 cm.<br />
This demonstration validated<br />
that the UAS could<br />
automatically switch<br />
between these beams<br />
without user intervention,<br />
thereby simplifying<br />
operations while fully<br />
leveraging this increased<br />
throughput.<br />
“Through our collaboration with<br />
Intelsat, both airborne and ground<br />
users will be able to upgrade the<br />
software on existing L-3 wideband<br />
modems to provide automatic beam<br />
switching capabilities for service<br />
on high-throughput satellites like<br />
Intelsat’s EpicNG,” said Andy Iv-<br />
More on page 52
FENCE LINE FIRST LINE OUR LINE <br />
Find us at ISC West <strong>2016</strong>!<br />
Booth #20130<br />
✓ Increase Camera Image Quality. Contract #GS-07F-183CA<br />
✓ Simple, Durable, and Inexpensive.<br />
✓ Attaches to existing fence or wall.<br />
✓ Safe Low-Voltage System.<br />
✓ Glare-Free Patented LED Technology.<br />
✓ Visible Light and Infrared (IR) Solutions.<br />
CPWP1<br />
For more information, CALL<br />
973•423•2303 or perimeter@cast-lighting.com<br />
www.cast-lighting.com<br />
CPL1<br />
CPL12X<br />
© <strong>2016</strong>, CAST Lighting LLC., 1120-A Goffle Rd., Hawthorne, NJ 07506 • US Patent 8, 845,124; Intl Patents; Patents Pending.
Terma and Atlas Telecom sign<br />
partnering agreement<br />
ABU DHABI – Danish Aerospace,<br />
Defense, and Security<br />
Group Terma and Atlas Telecom<br />
signed a long term partnering<br />
agreement covering<br />
T.react CIP solutions for wide<br />
area protection of critical infrastructure.<br />
The agreement was signed<br />
by Terma President and CEO<br />
Jens Maaløe and Atlas Telecom<br />
Chairman Ahmed Seddiq<br />
Al Mutawaa at a ceremony<br />
in Abu Dhabi.<br />
As part of the agreement, a<br />
comprehensive demo system<br />
will be set up in the Emirate<br />
of Abu Dhabi where customers can<br />
experience the frontier of wide area<br />
protection technology available in<br />
the world today.<br />
“I am happy and proud to enter<br />
this agreement with Atlas Telecom”,<br />
said Terma President Jens Maaløe.<br />
“Atlas Telecom is a well-known and<br />
highly estimated integrated solutions<br />
supplier. The company has<br />
a long history of delivering high<br />
quality systems and services to the<br />
market. In such a challenging environment,<br />
this really is something<br />
of an achievement. The fact that we<br />
share so many core customer values<br />
makes this a perfect match for both<br />
companies”.<br />
Atlas Telecom Chairman Ahmed<br />
Seddiq Al Mutawaa said: “<br />
“As Atlas Telecom is<br />
a trusted partner<br />
for different entities<br />
in the UAE<br />
and the region, we<br />
are very selective with<br />
our partners. We handpick them in<br />
accordance with the quality expected<br />
from us to serve our Clients in<br />
the UAE, and our partnership with<br />
Terma fits this criteria.<br />
This partnership will add to Atlas<br />
16<br />
Telecom’s portfolio in providing the<br />
latest and most advanced wide area<br />
perimeter protection solution at the<br />
market today. Having seen lengthy<br />
live demonstrations of the T.react<br />
CIP perimeter system, we are<br />
in no doubt that Terma has<br />
developed a best-in-class system<br />
for the global markets.”<br />
About Atlas Telecommunication<br />
Establishment<br />
Atlas Telecom is a comprehensive<br />
regional company that<br />
delivers technology and applications<br />
in turnkey solutions to<br />
businesses and governments.<br />
All of the systems that we design<br />
and build are developed<br />
to provide world-class communications<br />
and security solutions<br />
that are highly secure,<br />
reliable, and robust. We work<br />
with a number of critical and often<br />
highly sensitive national security<br />
and safety organizations that depend<br />
on the very latest technologies.<br />
Atlas Telecom’s<br />
suite of services<br />
include: Critical<br />
Communications,<br />
Mobility,<br />
Surveillance and Physical<br />
Security, Satellite, Tracking,<br />
Data Centers and Fibre Optics, and<br />
Command and Control.<br />
Visit www.atlastelecom.ae
Alaskan community standardizes on Genetec Omnicast <br />
Video Surveillance to secure public facilities, keep citizens<br />
safe and spread benefits to surrounding villages<br />
Located above the Arctic Circle, the<br />
Community of Barrow is the northernmost<br />
city in the United States.<br />
About 1,300 miles (2,100 km) south<br />
of the North Pole on the Chukchi<br />
Sea Coast, the city is home to just<br />
over 4000 people. Barrow is<br />
also the hub for the North<br />
Slope Borough’s seven<br />
arctic coastal villages,<br />
where another 5000<br />
people reside.<br />
Even as a small city,<br />
the community is still<br />
susceptible to random<br />
acts of violence and crime.<br />
In an effort to better secure<br />
its public facilities, the Community<br />
of Barrow decided to upgrade its citywide<br />
surveillance, and standardize on<br />
a more robust IP-based video surveillance<br />
system.<br />
After considering many solutions,<br />
the North Slope Borough selected<br />
Genetec Omnicast IP video surveillance<br />
and eventually enlisted the<br />
expertise of Arctic Fire & Security, a<br />
highly-knowledgeable and certified<br />
Alaskan-based integrator for installation<br />
and maintenance. Omnicast<br />
is part of the Genetec unified security<br />
platform, Security Center, which<br />
offers advanced functionality like an<br />
intuitive mobile client, a map-based<br />
interface and more capabilities.<br />
Police Department Improves<br />
Remote Village Operations<br />
Currently, Omnicast is managing<br />
just over 110 cameras<br />
throughout numerous<br />
public facilities in Barrow,<br />
including the fire<br />
and police departments,<br />
the Children’s<br />
Youth Services (CYS)<br />
facility, Arctic Women<br />
in Crisis (AWIC) facility<br />
and senior citizen<br />
facility. Each organization<br />
monitors and manages its own<br />
Omnicast system, reviewing and<br />
exporting video archives when necessary.<br />
With all the systems up and running,<br />
the North Slope Borough Police<br />
Department (NSBPD) has expanded<br />
its surveillance to nearby village precincts,<br />
improving its remote operations.<br />
The NSBPD installed the Genetec<br />
SV-PRO, a network security<br />
appliance which comes pre-loaded<br />
with Omnicast, at its police precincts<br />
in the villages of Point Hope,<br />
Nuiqsut and Kaktovik, adding 10 to<br />
12 cameras to each facility.<br />
18<br />
While monitoring and video playback<br />
is available at each precinct from<br />
the SV-PRO, the video is also linked<br />
to the main police precinct in the<br />
Community of Barrow, about 300<br />
miles away through the Federation<br />
feature. This enables all police systems<br />
to be monitored as one virtual<br />
system, making it easier for police officers<br />
in Barrow to assist local village<br />
officers who work alone.<br />
Fire Department Watches Over Equipment<br />
and Narcotics<br />
The North Slope Borough Fire Department<br />
(NSBFD) has been able<br />
to leverage the video surveillance<br />
system to safeguard its high-value<br />
equipment and adhere to federallymandated<br />
laws concerning controlled<br />
substances.<br />
According to Shannon Esparza,<br />
Deputy Director, NSBFD, “We<br />
house controlled substances in<br />
our fire station and they have<br />
to be refrigerated, so we<br />
have two cameras set up to<br />
monitor the fridge. Each<br />
paramedic swipes an access<br />
control badge, inputs<br />
their code, and takes an allotted<br />
amount of narcotics for<br />
their mission. They do a count
efore leaving and upon returning, all<br />
in front of the cameras.”<br />
The surveillance system has helped<br />
to deter delinquent behaviour, significantly<br />
reducing property vandalism<br />
and theft. Esparza has used the video<br />
surveillance system to monitor the<br />
response efficiency of her team when<br />
called out to handle a fire. One time,<br />
she noticed a hose dragging on the<br />
back of a truck. “I was able to radio<br />
into them and let them know, avoiding<br />
any damage or loss of equipment,”<br />
she explained.<br />
Omnicast Keeps Barrow Students<br />
Safe Even from Afar<br />
When the community of Barrow<br />
began standardizing on Genetec<br />
Omnicast for all of its public facilities,<br />
the North Slope Borough School<br />
District (NSBSD) soon followed the<br />
Borough’s lead by installing the IP<br />
video surveillance system at its<br />
high school.<br />
According to Sherry<br />
McKenzie, Barrow High<br />
School Principal, NSBSD,<br />
“I don’t always have time<br />
to get to the other side of<br />
property when someone<br />
calls to report an incident.<br />
Omnicast has been a huge<br />
time-saver, because I can just log into<br />
the system and see what happened.”<br />
McKenzie monitors the system<br />
when time allows, but mainly relies<br />
on it for reference when students or<br />
staff report events. Already, the system<br />
has been helpful in identifying a<br />
prankster who tampered with hallway<br />
lighting, and video has also been exported<br />
as evidence in a more serious<br />
assault charge. The Security Center<br />
mobile app has also been very helpful<br />
to Mckenzie, who can log into the<br />
system from anywhere in the school,<br />
or even when travelling, by using her<br />
mobile phone or laptop.<br />
Evolving the Borough-Wide<br />
Platform One Facility and Village<br />
at a Time<br />
The next phase of deployment includes<br />
bringing all police precincts in<br />
the five remaining villages online, and<br />
eventually expanding the system to<br />
encompass more schools and all other<br />
public facilities. Each organization<br />
is also adding more cameras, covering<br />
blind spots that may have been<br />
missed in the initial implementation.<br />
“Our community and villages are<br />
safer and more<br />
vibrant than<br />
ever before,<br />
19<br />
and we have realized numerous costsaving<br />
efficiencies across our public<br />
organizations with the help of Arctic<br />
Fire & Security and Genetec Omnicast.<br />
We look forward to growing<br />
our borough-wide surveillance<br />
system and uncovering even greater<br />
community benefits,” Mayor Charlotte<br />
E. Brower at the North Slope<br />
Borough.<br />
Infrastructure at a Glance<br />
Omnicast is managing over 110<br />
cameras installed in various public facilities<br />
in the Community of Barrow,<br />
where each facility chose its preferred<br />
brand of cameras from vendors Axis<br />
Communications, Bosch and Sony.<br />
All video is stored locally in each facility<br />
with servers ranging from 4TB<br />
to 32TB of storage. More specifically<br />
at the NSBPD headquarters, there<br />
are two servers with 16TB of storage,<br />
which provides 30-day minimum retention.<br />
Two SV-PRO network security<br />
appliances have been installed at<br />
three remote locations and video is<br />
federated back to the central police<br />
headquarters in Barrow.
We’re All in This Together: Strategies for<br />
an engaged public workforce / Part One<br />
By Assistant Fire Chief<br />
John Linstrom (Retired)<br />
It is an unfortunate reality<br />
that we must discuss workplace<br />
security. In an age<br />
where the threat of domestic<br />
and foreign terrorism is<br />
real, and “active shooters”<br />
have become far too commonplace,<br />
the world cannot ignore this facet of<br />
emergency management and business<br />
continuity.<br />
When it comes to workplace security,<br />
a vigilant workforce begins with<br />
senior leadership. They must be the<br />
ones to recognize the need to invest<br />
in security, both with finances and<br />
with time allocated to training. By<br />
implementing security-minded policies<br />
and procedures, and investing<br />
in some essential tools, management<br />
can create a culture of safety and security,<br />
produce a sufficient hardening<br />
of the worksite, and foster a confident<br />
and engaged workforce.<br />
The fact remains that<br />
the higher the security<br />
profile of a company, the<br />
less likely an attacker will<br />
be to consider that site as<br />
a target. When employees<br />
understand that we are all<br />
in this together, security<br />
becomes a mindset, and workplace<br />
safety is amplified. Here are some<br />
simple strategies to move your workplace<br />
toward a culture of security.<br />
Implement Processes<br />
20<br />
Prevention should be the first priority.<br />
Tagged entry or swipe cards for<br />
entry make it difficult for an attacker<br />
to roam freely about a business or<br />
campus. Expanding this to visitors,<br />
by requiring everyone to have escorts<br />
or badges, is another best practice.<br />
Certainly, there have been instances<br />
where authorized individuals have<br />
used their issued badges and credentials<br />
to gain access to engage in a<br />
violent act, but the implementation<br />
of these practices have undoubtedly<br />
deterred non-employees and contractors<br />
from perpetrating a shooting at<br />
more hardened locations.<br />
It is important to have response<br />
processes in place from the mundane<br />
to the serious. If employees can be<br />
confident in the process, they can engage<br />
in it more efficiently.<br />
Encourage Vigilance and Reporting<br />
Organizations that have a collective<br />
awareness of hazards, threats, and<br />
suspicious activities are better able<br />
to identify the elements of concern<br />
quickly. This information is processed<br />
and collated to develop intelligence<br />
that may assist authorities in preventing<br />
an attack. Using technology<br />
to enable shared situational awareness<br />
allows every team member to be<br />
a sensor and all can contribute to a<br />
clear picture of how secure the work<br />
environment is at any given time.<br />
Employees should be advised to<br />
report individuals who have been<br />
spotted taking pictures of security<br />
gates, rear doors, and service areas,<br />
as this may lead to disrupting a “dry<br />
run” or rehearsal by a group planning<br />
violence. Bad actors trying to “piggyback”<br />
on an authorized person using<br />
their swipe card to enter a secure door,<br />
or drive-through gate, may be pursuing<br />
an array of criminal intents. All<br />
members of the organization should<br />
be trained not only to observe, but<br />
also to challenge anyone unescorted,<br />
who is attempting to gain unauthorized<br />
access with no visible visitors<br />
badge. Vigilance is the keyword.<br />
All team members have a shared<br />
responsibility to patrol and observe
NORTH AMERICA’S<br />
MOST TRUSTED LICENSE<br />
PLATE IMAGING, OPTIMIZED<br />
FOR INVESTIGATIVE AND<br />
INTELLIGENCE INITIATIVES.<br />
Perceptics delivers the most accurate and high<br />
performance imaging systems in the industry. Our<br />
technologies produce highly accurate intelligence to<br />
help our customers make optimal decisions. For more<br />
than 35 years we have been the LPR technology of choice<br />
to secure North America’s borders, leveraging that<br />
experience for Highway and City Security initiatives.<br />
Visit Us At Our Next Event<br />
Border Security Expo, Sept. 28-Oct. 1,<br />
Anaheim California: BOOTH 4245<br />
Learn more about Perceptics<br />
online at perceptics.com
the workplace for any suspicious or<br />
unusual attitude among people in the<br />
workplace. Indications of disgruntled<br />
employees, unfamiliar people asking<br />
questions about security, access, workflow,<br />
or occupancy of gathering areas<br />
on the campus should be reported<br />
through a “tip line” or another process<br />
to support a “see something, say something”<br />
program.<br />
Provide Training<br />
Responding to an active shooter in<br />
the workplace is a supremely terrifying<br />
experience. This level of fear and<br />
anxiety can be reduced through multiple<br />
training sessions and “no-notice”<br />
exercises that reinforce the expected<br />
behavior of the team. People are more<br />
likely to reach a high level of trust and<br />
confidence with realistic training and<br />
an on-going reward system.<br />
The first level of training is creating<br />
awareness and providing didactic information<br />
to the attendees. Training<br />
should be factual, and based on reality.<br />
It needs to be more than just a plan or<br />
series of exercises – it needs to foster<br />
and support a strong survival mindset.<br />
The second level of training is to<br />
develop some “muscle memory” by<br />
actually walking through the process<br />
of running, hiding, and fighting. Try<br />
these three scenarios in multiple areas<br />
of the workplace so that these options<br />
are viable in your mind.<br />
The likelihood of being involved in<br />
a workplace shooting is infinitesimally<br />
small. These are low probability, high<br />
consequence incidents. Successfully<br />
interdicting and surviving one of these<br />
improbable events takes training,<br />
practice, and preparedness exercises<br />
conducted with real-world conditions.<br />
Senior leaders, security officers, emergency<br />
managers, and trainers should<br />
be vocal advocates and champions in<br />
making the workplace more resilient.<br />
Active Shooter Protocols<br />
For business leaders, staying informed<br />
of industry best practices for workplace<br />
security is paramount for maintaining<br />
an atmosphere of vigilance as<br />
well as a safe and secure environment<br />
for your employees.<br />
While it is true that your chances of<br />
being killed in an automobile-related<br />
incident are far higher than being<br />
killed at work or in a public place by<br />
a deranged shooter, being prepared is<br />
still the best option. In a world where<br />
these tragedies do sometimes happen,<br />
having a plan and procedure for how<br />
your organization will respond in a<br />
threat scenario is an important contributor<br />
to employee morale and productivity<br />
on a daily basis.<br />
With this in mind, here is a simple<br />
plan for training your workforce to respond<br />
to an active shooter threat.<br />
Alerts and Warning<br />
22<br />
Constructing the alert messages to<br />
go out to everyone on site should be<br />
viewed as an essential part of the preparedness<br />
effort. These messages must<br />
attract immediate attention, and move<br />
people to comply with the directive<br />
being transmitted. The specific verbiage<br />
relating to the source of the alert<br />
and the action words that describe the<br />
immediate options available should be<br />
clearly communicated.<br />
The mode and medium of communications<br />
should be chosen carefully<br />
to include text messages, email, voice<br />
announcements, desktop alerts, and<br />
other push notification apps. It must<br />
be decided if it would be advantageous<br />
to activate strobe lights, fire alarm<br />
enunciators, and speakerphones, or<br />
consider whether silent alerts would<br />
be a better option to allow people to be<br />
quiet and less noticeable when hiding<br />
from to perpetrators.<br />
It might make sense in one building<br />
to make loud noises to distract a<br />
potential attacker while in another<br />
building keep all messages silent after<br />
the initial alert. This has to be evaluated<br />
and worked out for each discrete<br />
environment.<br />
The planning and development of<br />
a series of alerts, warning messages,<br />
and status updates should be done by<br />
architects who possess training and<br />
experience in designing and communicating<br />
critical messages. The choice<br />
of words and subtle nuances must be<br />
carefully crafted to elicit the desired<br />
response from both employees and<br />
visitors, including those who may not<br />
More on page 27
Exciting News from the<br />
News Leader in Physical, IT and Homeland Security<br />
Government Security News announces<br />
two major initiatives<br />
New, Mobile-Friendly Website<br />
<strong>GSN</strong>’s website has shown the highest homeland security<br />
visitor traffic for 2 years, according to Alexa.com. And it<br />
will only grow when visitors discover the fabulous new<br />
introductory rates being offered below for advertisers:<br />
Buy a monthly Wide Skyscraper, Large Rectangle or<br />
Leaderboard and get a same-size additional insertion<br />
at no cost. Offer is valid for all advertisers in the first<br />
six months of <strong>2016</strong>!<br />
Expanded Schedule of <strong>Digital</strong> <strong>Edition</strong>s<br />
As the <strong>Digital</strong> revolution attracts ever more readers and<br />
advertisers, <strong>GSN</strong> is welcoming the new year with an<br />
expanded schedule of <strong>Digital</strong> editions – monthly <strong>Digital</strong><br />
issues each month, supplemented by Print editions at all<br />
major conferences and expos.<br />
Advertisers get lower rates, readers enjoy links to websites,<br />
case studies, white papers, plus video integration,<br />
click to purchase and content delivery around the world!<br />
Gartner Security &<br />
Risk Management<br />
Summit <strong>2016</strong><br />
June 13 – 16 | National Harbor, MD<br />
gartner.com/us/securityrisk<br />
Learn how to address the new threats<br />
and challenges of digital business<br />
Government IT topics to be covered:<br />
• Cybersecurity threats<br />
• Cloud security and the role of FedRAMP<br />
• Secure mobile operations<br />
• The role of analytics in cybersecurity<br />
© <strong>2016</strong> Gartner, Inc. and/or its affiliates. All rights reserved. Gartner is a registered trademark of Gartner, Inc. or its affiliates.<br />
For more information, email info@gartner.com or visit gartner.com.<br />
Save $200 on the standard registration<br />
rate with priority code GART<strong>GSN</strong>
Intelleges’ innovative approach helps government<br />
contractors assess their cybersecurity strengths<br />
By Steve Bittenbender<br />
As the federal government now requires<br />
defense contractors to assess<br />
the security of their information<br />
technology systems, a New York<br />
company has come up with an innovative<br />
way to help those companies<br />
evaluate their systems and identify<br />
opportunities for improvements<br />
and enhancements.<br />
Intelleges is a New York-based<br />
company that provides proprietary<br />
software to corporate leaders and<br />
government agencies that need to<br />
collect data and documentation for<br />
a variety of reasons. through a proprietary<br />
solution that allows its clients<br />
to develop customizable questionnaires<br />
and store the results and<br />
documents gathered in a FedRAMP<br />
certified cloud-based system.<br />
Last fall, the Department of Defense’s<br />
Federal Acquisition Regulation<br />
(FAR) supplement issued new<br />
guidelines requiring contractors<br />
and their subcontractors to safeguard<br />
sensitive defense data that it<br />
stores or handles. As defense contractors<br />
began to evaluate how they<br />
were protecting that critical information,<br />
some began reaching out<br />
to Intelleges to help them. That led<br />
to the development of the compa-<br />
24<br />
John Betancourt<br />
Founder, Intelleges<br />
ny’s Stacked Information<br />
Technology Cybersecurity<br />
Assessment Maturity<br />
Model (SIT-CAMM).<br />
John Betancourt, the<br />
company’s founder, said<br />
the company has been doing<br />
this work for its existing<br />
clients for more than<br />
15 years, but now with the<br />
government’s new regulation<br />
regarding cybersecurity,<br />
it’s essential that all government<br />
contractors – as well as other<br />
organizations that handle sensitive<br />
personal data such as an individual’s<br />
credit cards or personal health records<br />
– get an assessment as quickly<br />
as possible.<br />
As part of the Intelleges’ assessment<br />
system, the company created<br />
a matrix to determine a company’s<br />
strengths when it comes to IT security.<br />
The system, which is based<br />
on the Capability Maturity Model<br />
Integration scale, evaluates companies<br />
across 15 areas related to information<br />
technology. SIT-CAMM<br />
uses NIST and ISO 2700 standards<br />
in developing the questions for the<br />
assessment. Those questions are tailored<br />
specifically for each company.<br />
Among the items SIT-CAMM assesses<br />
includes: a company’s IT usage,<br />
its business process<br />
management, its regulatory<br />
compliance and its<br />
training program.<br />
“Using our proprietary<br />
software, we can create<br />
and distribute a series of<br />
electronic questionnaires<br />
designed to determine<br />
software, hardware and<br />
network usage, compliance,<br />
mission alignment,<br />
satisfaction levels, usability, and<br />
cybersecurity compliance,” Betancourt<br />
said. “These questionnaires<br />
will provide insight into possible<br />
strengths, weaknesses, opportunities<br />
and threats (SWOT) that the IT<br />
department will need to address.”<br />
Companies then receive a rating<br />
based on where their assessed areas<br />
stand. Companies that are just beginning<br />
to identify their needs may<br />
be assessed at a Level 1, while those<br />
who have fully optimized their departments<br />
may receive a Level 5 rating.<br />
As part of its assessment, Intelleges<br />
will work with companies and identify<br />
ways to improve their scores in<br />
certain areas. That includes developing<br />
recommendations based on<br />
industry best practices. Those recommendations<br />
will help companies
establish their own procedures, and<br />
then they can set realistic benchmarks<br />
to evaluate their performance<br />
against those standards.<br />
Intelleges delivers the recommendations<br />
to the organization’s CIO<br />
in a report similar to an audit. The<br />
recommendations are prioritized to<br />
highlight the most critical findings<br />
that put the company in serious risk.<br />
In addition, Intelleges can bring in a<br />
partner company that provides intrusion<br />
detection consulting to give<br />
IT leaders and other decision makers<br />
greater peace of mind regarding<br />
their systems.<br />
“These reports are specifically intended<br />
for managers responsible for<br />
the day-to-day decision making and<br />
long-term strategic planning,” Betancourt<br />
said. “It also designed to<br />
be used by corporate leaders as they<br />
seek to improve their knowledge<br />
and understanding of their internal<br />
IT departments.”<br />
Betancourt offers more than 20<br />
years of high-level professional IT<br />
and software development experience.<br />
He started by developing an<br />
interest rate forecasting tool for the<br />
U.S Bureau of Labor Statistics. He’s<br />
also worked as the chief software<br />
architect for the Federal Reserve’s<br />
New York office. He worked there<br />
until he started Intelleges 16 years<br />
ago.<br />
It’s not just companies working<br />
with the federal government that<br />
need to consider requesting a SIT-<br />
CAMM for their organization. Betancourt<br />
said any company that<br />
handles sensitive data needs to find<br />
a way to safeguard themselves from<br />
potential attacks and the lawsuits<br />
and hefty civil fines that can come<br />
about because of them.<br />
For more information on how Intelleges<br />
can help your company better<br />
understand its IT security needs, go<br />
to Intelleges.com.<br />
25
Chris Connors: Awareness of gunshot detections<br />
systems rising as Shooter Detection Systems<br />
continues to grow<br />
By Steve Bittenbender<br />
Guardian Gateway uses color coded alerts to track shooter movement.<br />
Shooter Detection Systems was created<br />
with one goal in mind – to produce<br />
the world’s most accurate system<br />
to detect gunshots inside buildings.<br />
The Massachusetts-based company<br />
sells its Guardian Indoor Active<br />
Shooter Detection System, which<br />
uses both sound and infrared sensor<br />
data to confirm an active shooting<br />
event has occurred. Across the<br />
country, school districts, shopping<br />
malls and other public facilities have<br />
signed on to use the innovative system,<br />
which also can send alerts to<br />
building occupants, facility management,<br />
law enforcement and/or other<br />
key stakeholders who need to know<br />
what’s happening.<br />
“Sensor-based gunshot detection<br />
can play an important role as part of<br />
an active shooter preparedness program<br />
alongside more traditional security<br />
technology like access control,<br />
video surveillance and mass notification<br />
systems,” said Matthew Frowert,<br />
the director of marketing, financial<br />
services and government for Tyco<br />
Federal Systems, an SDS partner. “Integrating<br />
these technologies into a<br />
single system can provide security operators<br />
a powerful, centralized command<br />
center view to strengthen situational<br />
awareness.”<br />
Recently, Chris Connors, chief executive<br />
officer for SDS, spoke with<br />
<strong>GSN</strong> to discuss the latest happenings<br />
in the industry and with his company.<br />
Here are excerpts from that conversation.<br />
Q: <strong>GSN</strong> ran an interview last year<br />
about SDS’s capabilities, what has<br />
changed in the marketplace over the<br />
last 12 months?<br />
Chris Connors: I think the awareness<br />
that our capabilities exist and how we<br />
stand out against others attempting<br />
to compete in the marketplace has<br />
improved. This awareness isn’t everywhere,<br />
but it’s growing quite a bit with<br />
media and the events that have been<br />
26<br />
happening with active shooters. We’ve<br />
been very successful in winning jobs<br />
with federal and state governments.<br />
We’ve also been successful in the<br />
commercial space, including major<br />
corporations and public venues such<br />
as convention centers, airports and<br />
court systems. So, I think that people<br />
are, now that they know it exists, are<br />
getting more comfortable with what it<br />
can do in an active shooter event.<br />
Q: Has the system been used by a<br />
State or Federal Government customer?<br />
CC: We are not permitted to give specifics<br />
on them yet, but we have several<br />
contracts in place with state and<br />
government customers. It’s a market
that we’re looking to grow, especially<br />
in the court systems.<br />
Q: How has the system been received<br />
by law enforcement and local police?<br />
CC: In the beginning, they were a<br />
little hesitant because they were worried<br />
about false alerts and about how<br />
some other companies approached<br />
this capability. Seven major city police<br />
commissioners in the last few<br />
months have asked me to explain the<br />
capabilities to them. They know better<br />
than anyone else that an active<br />
shooter event requires immediate<br />
information, such as a shooter’s location.<br />
False alerts are unacceptable to<br />
our customers and law enforcement<br />
is starting to understand that our system<br />
does not false alert. They’ve been<br />
extremely receptive once they understand<br />
what we can provide.<br />
Q: Does the system require SDS personnel<br />
to monitor the sensor?<br />
CC: No. Once we do an installation,<br />
the system is fully integrated and automated,<br />
and the customer controls<br />
where the information goes and how<br />
it’s distributed. That’s one of the features<br />
that I think has been well received.<br />
They can manage it on their<br />
own and without any IT or network<br />
security issues because everything is<br />
behind their firewall.<br />
Q: In all of your installations, has<br />
the system ever reported on an active<br />
shooter?<br />
CC: Fortunately, there has not been an<br />
active shooter event, yet, in locations<br />
where the system is deployed. We’ve<br />
done around 30,000 rounds of testing<br />
at customer locations, ranges, schools<br />
and courthouses. It has picked up every<br />
shot. It’s somewhat of an unusual<br />
business to spend a lot of time and<br />
money on a product you hope never<br />
gets used, but government and private<br />
industry customers look at the<br />
active shooter as a “when”, not “if ”<br />
possibility.<br />
Q: Has the system false alerted at any<br />
customer locations?<br />
CC: Our systems have had approximately<br />
12 million hours of operational<br />
time and never once has the system<br />
falsely alerted. I think that builds a<br />
lot of credibility with our customers<br />
when we can refer them to other customers<br />
who can testify to that.<br />
Q: What’s the future hold in store for<br />
the technology overall and for the<br />
company?<br />
CC: It appears there is wider acceptance<br />
of gunshot detection capabilities<br />
in today’s world. We have designed<br />
and shipped detection systems<br />
for over a decade. We have about a<br />
$60 million investment into all the<br />
research and development and about<br />
$500 million worth of systems that<br />
have been fielded. So, our job is to<br />
stay technically ahead and always<br />
look for ways to improve not just the<br />
sensor itself but the cost to own and<br />
install the system. We’re coming out<br />
with some new products in the next<br />
year that will address that.<br />
27<br />
We’re All in This Together:<br />
Strategies for an engaged public<br />
workforce / Part One<br />
Continued from page 22<br />
have adequate training.<br />
In the upcoming part two of this<br />
article, we will discuss how to build<br />
a foundation for more effective preparedness<br />
and practice drills, active<br />
shooter defensive strategies, law enforcement<br />
response, psychological<br />
first aid, stress management, and a<br />
brief list of best practices for navigating<br />
the aftermath of tragic incidents.<br />
Retired Assistant Fire Chief John Linstrom<br />
resides in San Bernardino County,<br />
CA, and serves as Business Development<br />
Manager at the AtHoc Division of<br />
BlackBerry, for Public Safety and Aviation.<br />
He has thirty years’ experience in<br />
municipal, special district, state, military,<br />
and federal government agencies<br />
as an emergency manager, fire chief,<br />
and mass fatality team commander.<br />
John wrote the Part 139/107 Emergency<br />
Plan for Southern California Logistics<br />
Airport, and served on the Mayor’s<br />
Blue Ribbon Panel for Homeland Security<br />
and Emergency Management in<br />
Los Angeles. He has also contributed to<br />
the Federal Interoperable Mass Fatality<br />
Concept of Operations Plan, and the<br />
National Transportation Safety Board<br />
(NTSB) Interagency Agreement (IAA)<br />
and Memorandum of Understanding<br />
(MOU) with the U.S. Department of<br />
Health and Human Services.
ACTIVE SHOOTER DETECTION AND REPORTING SYSTEM:<br />
ENHANCE YOUR ACTIVE SHOOTER RESPONSE PROTOCOLS<br />
www.shooterdetectionsystems.com<br />
1-844-SHOT911<br />
www.shooterdetection<br />
Featured on the TODAY Show<br />
The Guardian Indoor Active Shooter<br />
Detection System<br />
The Guardian is the worlds most trusted and<br />
installed Active Shooter Detection and<br />
Reporting System on the market. Fortune<br />
500 corporations, court systems, convention centers, universities, government<br />
buildings, banks and K-12 public, private, and vocational schools have all chosen<br />
to protect their staff, visitors and students with Shooter Detection Systems’<br />
revolutionary sensors.<br />
Visit us at ISC West Booth 2059<br />
Whitepaper: The Use of Technology to Improve Active Shooter Response
THIS IS<br />
NOT JUST<br />
A BOX!<br />
systems.com<br />
This “box” is part of a solution— an X-ray imaging solution. Designed for mobility, the portable Varian<br />
Linatron® Xp brings practical, high-energy imaging capability to security and NDT field applications.<br />
This “box” has the ability to image the finest detail. The mobile system includes an X-ray head<br />
(33”x20”x16”), a modulator (32”x20”x16”) and an optional control pendant. The Xp can also be used<br />
as an alternative to gamma.<br />
To learn more, visit our website at varian.com/sip<br />
© <strong>2016</strong> Varian Medical Systems, Inc. Varian, Varian Medical Systems and Linatron are registered trademarks. All rights reserved.
Hazmat Science and Public Policy with George Lane<br />
Electromagnetic Pulse (EMP):<br />
Technology’s Worst Nightmare<br />
By George Lane<br />
“The supreme art of war is to subdue<br />
your enemy without fighting”<br />
(Sun Tzu 544 - 496 BC)<br />
An electromagnetic pulse (EMP) is<br />
a super-energetic radio wave, an intense<br />
burst of electromagnetic energy<br />
caused by an abrupt and rapid acceleration<br />
of charged particles that can destroy<br />
or damage electronic systems by<br />
overloading their circuits. EMPs are<br />
harmless to people, but catastrophic<br />
to critical infrastructure, such as<br />
electric power, telecommunications,<br />
transportation, and<br />
banking, that sustain<br />
modern civilization.<br />
Nature generates<br />
EMPs as solar flares<br />
from the Sun, causing<br />
great geomagnetic<br />
storms on Earth with catastrophic<br />
consequences. These natural events<br />
occur every 150 years, with the last<br />
recorded major storm 155 years ago.<br />
A single nuclear weapon detonated<br />
at high-altitude generates an EMP<br />
that could cause catastrophic damage<br />
across the entire contiguous U.S. Because<br />
of U.S. unpreparedness for an<br />
EMP event, it is estimated that within<br />
12 months of a major EMP event,<br />
from two-thirds to ninety percent of<br />
the U.S. population could perish.<br />
The national security threat<br />
The nuclear EMP threat is not merely<br />
theoretical. As Tom Clancy wrote, “it<br />
is real, a clear and present danger”.<br />
An EMP attack is the perfect asymmetric<br />
weapon for state actors who<br />
wish to level the battlefield by neutralizing<br />
the technological advantage<br />
of U.S. military forces. EMPs provide<br />
rogue states or terrorists with a<br />
nuclear weapon to cripple the U.S.<br />
Russia, China, North Korea, and Iran<br />
have already incorporated EMP attacks<br />
into their military arsenals...<br />
with a single blow. Russia, China,<br />
North Korea, and Iran have already<br />
incorporated EMP attacks into their<br />
military arsenals, and openly describe<br />
making EMP attacks against the U.S.<br />
Rogue states and terrorists could use<br />
short-range missiles that can deliver<br />
a nuclear warhead to exact a catastrophic<br />
EMP attack on the U.S. Iran<br />
has practiced ship-launched EMP<br />
attacks using Scud missiles, used by<br />
30<br />
scores of nations and even some terrorist<br />
groups.<br />
For the past decade, the “Commission<br />
to Assess the Threat to the United<br />
States from Electromagnetic Pulse<br />
Attack”, chaired by Dr. William Graham,<br />
has investigated the EMP threat<br />
to the U.S. and how it can be reduced.<br />
The Graham commission’s bottom<br />
line is that an EMP attack can end<br />
the functioning of the U.S. electrical<br />
infrastructure and much of the hardware<br />
that supports everyday life (William<br />
R. Graham et al., “Report of the<br />
Commission to Assess<br />
the Threat to the United<br />
States from Electromagnetic<br />
Pulse (EMP) Attack:<br />
Critical National<br />
Infrastructures,” April<br />
2008; www.empcommission.org/docs/A2473-EMP_Commission-7MB.pdf<br />
).<br />
North Korea could obtain<br />
EMP weapons from Russia<br />
South Korea’s National Intelligence<br />
Service (NIS) reports that North Korea<br />
is developing an EMP weapon.<br />
A modest North Korean EMP could<br />
damage electronic equipment south<br />
of the Korean DMZ. At higher yield,
an EMP device could disable electronic<br />
devices for hundreds of miles.<br />
The EMP weapon would be part of<br />
North Korea’s larger cyber-warfare<br />
efforts, which have so far been mainly<br />
focused on gathering intelligence by<br />
hacking South Korean computer networks<br />
and devices.<br />
According to NIS, North Korea<br />
has purchased EMP technology from<br />
Russia and is now developing its own<br />
version. EMPs are the ultimate weapon<br />
against anything electronic, from<br />
telephone wires to the power grid to<br />
the computer chips that control cars,<br />
planes, and smartphones.<br />
Nuclear bombs like those dropped<br />
on Hiroshima and Nagasaki create<br />
a huge amount of gamma radiation<br />
when they explosively fission atoms.<br />
This gamma radiation ionizes and<br />
strips electrons away from atoms in<br />
the atmosphere, creating a huge mass<br />
of free electrons. These electrons are<br />
then deflected by the Earth’s magnetic<br />
field, creating a huge EMP. In<br />
1962, the U.S. tested a 1.44-megaton<br />
nuclear weapon, “Starfish Prime”,<br />
above the Pacific Ocean, creating an<br />
EMP that caused electrical damage<br />
900 miles away in Hawaii. Kilotonyield<br />
nukes would still be very effective<br />
as well (David Portree, “Starfish<br />
and Apollo“, Science, <strong>March</strong> 21, 2012;<br />
www.wired.com/2012/03/starfishandapollo-1962/).<br />
To maximize the size<br />
of the EMP it’s actually better for the<br />
nuclear weapon to be fission, rather<br />
than thermonuclear fusion devices. If<br />
a big EMP was detonated above the<br />
U.S., the burst would probably disable<br />
most of the electronics within 1,000<br />
miles.<br />
The Soviet Union also performed<br />
some successful EMP tests in the<br />
early 1960s, disabling hundreds of<br />
miles of telephone wire and burning<br />
down a power plant. In 1962, the<br />
Soviet Union performed three EMPproducing<br />
nuclear tests in space over<br />
Kazakhstan (Jerry Emanuelson, “Soviet<br />
Test 184”, Futurescience; www.<br />
futurescience.com/emp/test184.<br />
html). Although these weapons were<br />
much smaller (300 kiloton) than the<br />
“Starfish Prime” test, they were over<br />
a populated, large land mass and at a<br />
location where the Earth’s magnetic<br />
field was greater. The damage caused<br />
by the resulting EMP was reportedly<br />
much greater than in “Starfish Prime”.<br />
After the collapse of the Soviet Union,<br />
the level of this damage was communicated<br />
informally to U.S. scientists.<br />
Effects of Hurricane Katrina<br />
on New Orleans are an example of<br />
the effects of an EMP<br />
On August 29, 2005, Hurricane Katrina<br />
struck the city of New Orleans,<br />
providing the best model for studying<br />
the effects of an EMP attack, since the<br />
hurricane and subsequent flooding<br />
disabled the city’s power and transportation<br />
infrastructure. Similar to<br />
an EMP attack, a large proportion of<br />
the population was not able to leave<br />
the disaster zone where power and<br />
transportation critical infrastructures<br />
had been disabled. When New<br />
31<br />
Orleans’s levees failed, the area lost<br />
power and chaos broke out. Federal<br />
as well as local disaster response did<br />
not anticipate the near-immediate<br />
and complete breakdown of the social<br />
order. Fuel could not be delivered,<br />
shutting down emergency generators<br />
for cell phone towers, shutting down<br />
communications. Electrical failure<br />
resulted in widespread looting and<br />
the spoilage of food supplies throughout<br />
the city. Disabling of both power<br />
and transportation created a catastrophe<br />
of unprecedented proportion and<br />
threatened to destroy one of America’s<br />
major cities. Federal, state, and local<br />
governments failed to adequately<br />
respond to Katrina during the first<br />
week of disaster. With a major EMP<br />
attack, the entire country’s disasterresponse<br />
capacity may collapse.<br />
George Lane has 25 years of experience<br />
in the development of chemical<br />
security systems, conducting research<br />
as a NASA Fellow at the Stennis Space<br />
Center and as a NSF Fellow. Lane was<br />
air quality SME for the University of<br />
California at Berkeley Center for Catastrophic<br />
Risk Management during the<br />
BP Oil Spill. Lane is currently chemical<br />
security SME for the Naval Postgraduate<br />
School Maritime Interdiction<br />
Operations in the Center for Network<br />
Innovation and Experimentation.
CBRNE Detection<br />
American Science and Engineering debuts advanced<br />
security screening systems at ABU DHABI event<br />
ABU DHABI, U.A.E. , <strong>March</strong><br />
15, <strong>2016</strong> – American Science<br />
and Engineering, Inc. (“AS&E”)<br />
(Nasdaq:ASEI), a leading worldwide<br />
supplier of innovative X-ray<br />
detection solutions, today introduced<br />
three innovative scanning<br />
systems to the Middle East which<br />
are ideally suited for helping authorities<br />
combat terrorism and other<br />
security threats. New products<br />
include the next generation Z Portal®<br />
system that combines multiple<br />
detection technologies for up to six<br />
views of cargo and vehicles; the Car-<br />
View portal, a high-throughput,<br />
relocatable, multi-technology scan-<br />
Z Portal for Trucks and Cargo<br />
ning system for threats concealed<br />
in cars and small vehicles; and the<br />
Tx-View dual-energy transmission<br />
option for the top-selling line<br />
of ZBV® mobile cargo and vehicle<br />
screening systems.<br />
During ISNR <strong>2016</strong> (<strong>March</strong> 15—<br />
17), AS&E will feature the next generation<br />
Z Portal system, CarView<br />
portal, Tx-View option for ZBV, and<br />
MINI Z® handheld imaging system<br />
in our channel partner Al Hamra’s<br />
stand #4230.<br />
“Security agencies in the Middle<br />
East have experienced first-hand<br />
how our systems help reduce the<br />
level of vulnerability to explosive<br />
threats and contraband,”<br />
said Chuck<br />
Dougherty, President<br />
and CEO of AS&E.<br />
“We are confident<br />
they will find that our<br />
new offerings address<br />
high-priority security<br />
objectives and<br />
trengthen their ability<br />
to protect residents,<br />
visitors, and critical<br />
infrastructure against<br />
terrorist threats.”<br />
For a list of recent seizures with<br />
AS&E’s range of detection solutions,<br />
click here.<br />
The Next Generation Z Portal:<br />
Multi-view, multi-technology cargo<br />
and vehicle screening system<br />
The next generation Z Portal system<br />
is the only drive-through cargo and<br />
vehicle inspection system that uses<br />
multiple detection technologies to<br />
provide up to six views—including<br />
dual-energy transmission, Z Backscatter®,<br />
and Forwardscatter® images—of<br />
scanned passenger vehicles,<br />
trucks, buses, and cargo. The new Z<br />
Portal system incorporates AS&E’s<br />
latest source and detector innovations<br />
in a more compact design,<br />
enabling improved image quality<br />
at higher throughput in space-constrained<br />
locations such as checkpoints<br />
at high-threat facilities. View<br />
the video.<br />
CarView Portal: Cost-effective,<br />
high-throughput, superior inspection<br />
of small vehicles<br />
The CarView portal screens occupied<br />
cars and small vehicles to<br />
help secure special events, parking<br />
32
garages, and high-threat locations.<br />
The system uses innovative Wave<br />
Shifting Fibers (WSF) detector technology<br />
to simultaneously produce<br />
two top-down images: a high-quality<br />
dual-energy transmission image<br />
and a Z Backscatter image of the<br />
scanned vehicle. The dual-energy<br />
transmission image offers material<br />
discrimination technology to detect<br />
metallic and organic threats and<br />
contraband, while the photo-like Z<br />
Backscatter image offers enhanced<br />
detection of organic threats such as<br />
explosives, drugs, and stowaways.<br />
This cost-effective, versatile system<br />
is easily relocatable and its compact<br />
footprint meets the physical<br />
requirements of standard tollbooth<br />
lanes. View the video.<br />
ZBV with Tx-View:<br />
Dual-energy transmission option<br />
for the ZBV system<br />
Tx-View is a dual-energy transmission<br />
option for AS&E’s industryleading<br />
line of ZBV mobile cargo<br />
and vehicle screening systems. This<br />
ZBV with Tx-View option allows<br />
security personnel to simultaneously<br />
acquire dual-energy transmission<br />
images for detection of metallic<br />
threats such as weapons and artillery<br />
shells, and Z Backscatter images<br />
for superior detection of organic<br />
More on page 36<br />
PINPOINT THREAT<br />
with the world’s most trusted metal detectors.<br />
Performance. Protection. Dependability. Since 1964.<br />
®<br />
garrett.com<br />
Toll Free: 800.234.6151 (U.S. & Canada)<br />
garrett_march_<strong>2016</strong>.indd 1<br />
33<br />
2/19/<strong>2016</strong> 3:56:22 PM
CBRNE Detection<br />
Rapiscan MP100 Backpack radiation<br />
detection system allows detection of<br />
radioactive materials<br />
FEBRUARY 10, <strong>2016</strong>, Rapiscan<br />
Systems, a leading global supplier<br />
of security inspection systems, today<br />
announced the expansion of its<br />
radiation detection product line to<br />
include the Rapiscan MP100 Backpack<br />
radiation detection system.<br />
The MP100 is a lightweight, high<br />
performance solution<br />
that can<br />
detect radiological<br />
and nuclear<br />
materials and is<br />
housed within a<br />
compact commercial<br />
backpack,<br />
making it ideal for covert radiation<br />
inspection.<br />
President Obama has cited the<br />
danger of a terrorist acquiring nuclear<br />
weapons as “the most immediate<br />
and extreme threat to global<br />
security,” and U.S. Customs and<br />
Border Protection has indicated<br />
that “nuclear and radiological materials<br />
are of particular concern<br />
because of their potential to harm<br />
large numbers of people and disrupt<br />
the U.S. economy.” In fact, over the<br />
last two decades more than 2,500<br />
incidents of trafficking radioactive<br />
material have been reported to the<br />
International Atomic Energy Agency<br />
(IAEA) by member states.<br />
The MP100 Backpack radiation<br />
detection system is designed for<br />
ease of operation and makes radiation<br />
detection as easy as simply<br />
walking around.<br />
It includes a long<br />
battery life that<br />
supports extended<br />
deployment,<br />
as well as the following<br />
additional<br />
features:<br />
· Gamma and optional neutron<br />
radiation detection. The MP100’s<br />
PVT gamma radiation detectors<br />
detect gamma radiation emitted<br />
by medical and industrial isotopes,<br />
which can be used in a dirty bomb.<br />
They also detect Special Nuclear<br />
Materials, such as uranium and<br />
plutonium, which are needed for<br />
a nuclear weapon. The addition of<br />
optional Boron-10 neutron radiation<br />
detectors enables the MP100<br />
to detect Special Nuclear Materials<br />
that are shielded, such as in a dense<br />
35<br />
metal container.<br />
· Meets U.S. and international<br />
standards. The radiation detection<br />
performance of the MP100 meets<br />
the requirements of U.S. and international<br />
standards for backpack radiation<br />
monitors. The U.S. standard,<br />
ANSI N42.53, and its international<br />
equivalent, IEC 62694, address<br />
homeland security concerns and illicit<br />
trafficking inspection applications.<br />
· Integrates with Android mobile<br />
devices. The MP100 can be operated<br />
as a standalone radiation monitor<br />
with alarms signaled audibly in the<br />
operator’s earpiece. Alternatively,<br />
the MP100 can connect wirelessly<br />
to a mobile Android device, such as<br />
a smartphone or tablet, running the<br />
free Rapiscan RadViewer app. With<br />
its intuitive graphical user interface,<br />
Rapiscan’s RadViewer presents a<br />
wealth of information about radiation<br />
measurements and alarms and<br />
helps direct the operator to a radiation<br />
source.<br />
“Today’s terrorists don’t need<br />
special nuclear materials, such as<br />
uranium and plutonium, to create<br />
chaos. A small quantity of radioactive<br />
material that is routinely and<br />
safely employed in medical and industrial<br />
applications can cause significant<br />
radiation contamination<br />
to a wide area when part of a dirty<br />
bomb,” said Pak Chin, president
CBRNE Detection<br />
of Rapiscan Systems. “The MP100<br />
applies Rapiscan design principles<br />
and technology to a practical, high<br />
performing, portable radiation detection<br />
solution that is suitable for<br />
a variety of use cases. It’s one of the<br />
lightest and easiest to use systems<br />
available today.”<br />
The MP100 was designed for<br />
many different applications. Operators<br />
can use the solution to inspect<br />
areas where crowds have gathered<br />
for an event, such as stadiums or<br />
arenas; to detect radioactive material<br />
at mass transit stations and vehicle<br />
checkpoints; and to protect<br />
critical infrastructure and measure<br />
radiation around a facility, such as a<br />
nuclear power plant.<br />
About Rapiscan Systems<br />
Rapiscan Systems, a division of OSI<br />
Systems, Inc., is a leading global<br />
supplier of security inspection solutions<br />
utilizing advanced threat identification<br />
techniques. The company’s<br />
products are sold into the following<br />
market segments: Baggage and Parcel<br />
Inspection; Cargo and Vehicle<br />
Inspection; Hold (checked) Baggage<br />
Screening; People Screening; Explosive<br />
and Narcotics Trace Detection;<br />
and Radiation Detection. Rapiscan<br />
Systems product lines are supported<br />
by a global service network. As<br />
the world’s leading security screening<br />
provider, Rapiscan Systems<br />
AS&E debuts advanced security<br />
screening systems<br />
Continued from page 29<br />
threats and contraband. Deployed<br />
quickly and easily, the Tx-View option<br />
is completely self-contained in<br />
a trailer for storage and transport,<br />
providing customs and security officials<br />
with the lowest cost, most<br />
versatile, multi-technology, mobile<br />
cargo and vehicle screening system<br />
available today.<br />
MINI Z: Handheld Z Backscatter<br />
imaging system<br />
The MINI Z system enables law enforcement,<br />
public safety, and other<br />
security professionals to scan in<br />
places other systems can’t reach and<br />
determine “on-the-go” if drugs, explosives,<br />
or other threats are present<br />
provides state-of-the-art products,<br />
solutions and services to meet our<br />
customers’ most demanding threat<br />
detection needs. For more information,<br />
visit www.rapiscansystems.com<br />
36<br />
in difficult-to-reach locations such<br />
as car interiors and aircraft compartments.<br />
The MINI Z system was<br />
also named winner of the R&D 100<br />
Award for Top Innovation, an ASIS<br />
Accolades Award winner and Best<br />
of What’s New Award for 2014 in<br />
Popular Science Magazine. Experience<br />
the MINI Z system at http://<br />
www.meetminiz.com/.<br />
About AS&E<br />
American Science and Engineering,<br />
Inc. (AS&E) is the trusted global<br />
provider of threat and contraband<br />
detection solutions for ports, borders,<br />
military, critical infrastructure,<br />
law enforcement, and aviation.<br />
With over 50 years of experience,<br />
AS&E offers proven, advanced X-<br />
ray inspection systems to combat<br />
terrorism, drug smuggling, illegal<br />
immigration, and trade fraud. AS&E<br />
systems are designed in a variety of<br />
configurations for cargo and vehicle<br />
inspection, parcel inspection,<br />
and personnel screening. Using a<br />
combination of technologies, these<br />
systems provide superior detection<br />
capabilities, with high-energy, dualenergy,<br />
and Z Backscatter X-rays<br />
— pioneered by AS&E. Learn more<br />
about AS&E products and technologies<br />
at www.as-e.com and follow us<br />
on Twitter @ase_detects.
Rapiscan Systems Launches DETECTRA HX Hand-Held<br />
Explosive Trace Detection System<br />
signed to minimize operating costs<br />
and increase uptime, the DETECTRA<br />
HX requires only two consumables<br />
and does not require many of the<br />
maintenance steps that are typically<br />
associated with explosive trace detection<br />
systems.<br />
“The RAPISCAN DETECTRA HX<br />
was completely designed with the<br />
end-user in mind,” said Brad Buswell,<br />
President, Rapiscan Systems North<br />
America. “Not only does the solution<br />
detect threats with tremendous accuracy,<br />
it also features an intuitive user<br />
interface with just three-buttons and<br />
detects threats in seconds. Operator<br />
training can take as little as an hour,<br />
which means that the DETECTRA<br />
HX is easy to deploy.”<br />
The system uses a unique, ionization<br />
source that carries U.S. Nuclear<br />
Regulatory Commission (NRC) Exempt<br />
Distribution status. As such<br />
there are no end-user radiation licensing<br />
requirements for use within<br />
37<br />
Rapiscan Systems, Inc., a leading<br />
global supplier of security inspection<br />
systems, has announced the launching<br />
of its RAPISCAN DETECTRA<br />
HX, a lightweight and low-cost handheld,<br />
explosive trace detection solution.<br />
Featuring rapid<br />
and accurate detection<br />
capabilities, DETEC-<br />
TRA HX is designed<br />
with high throughput<br />
and high detection capabilities<br />
that are essential<br />
for law enforcement,<br />
event and border<br />
protection professionals,<br />
among others.<br />
The RAPISCAN DETECTRA HX<br />
is an easy-to-operate handheld device<br />
capable of detecting trace explosives<br />
in both particulate and vapor form<br />
on surfaces that may have directly or<br />
indirectly absorbed explosive residues.<br />
For more sensitive, accurate<br />
and rapid detection, the DETECTRA<br />
HX offers a swipe sampling system<br />
and includes a touch-free inhalation<br />
sampling method for threat scenarios<br />
that involve highly unpredictable explosives<br />
compositions.<br />
The RAPISCAN DETECTRA HX<br />
is designed to detect a broad range<br />
of common commercial and homemade<br />
explosive materials that may<br />
exist within a single sample, thereby<br />
achieving lower false alarm rates. Dethe<br />
United States.<br />
About Rapiscan Systems<br />
Rapiscan Systems, a division of OSI<br />
Systems, Inc., is a leading global supplier<br />
of security inspection solutions<br />
utilizing X-ray and<br />
gamma-ray imaging,<br />
and advanced threat<br />
identification techniques<br />
such as neutron<br />
and diffraction<br />
analysis. The company’s<br />
products are<br />
sold into four market<br />
segments: Baggage<br />
and Parcel Inspection,<br />
Cargo and Vehicle Inspection,<br />
Hold Baggage Screening and People<br />
Screening. The company has an installed<br />
base globally of more than<br />
100,000 security and inspection systems.<br />
Rapiscan Systems products are<br />
supported by a global support service<br />
network. As the world’s leading<br />
security screening provider, Rapiscan<br />
Systems provides state of the art<br />
products, solutions and services that<br />
meet our customers’ most demanding<br />
threat detection needs – while<br />
improving operational efficiency.<br />
For more information, visit http://<br />
www.rapiscansystems.com.
Convy on Netcentric Security<br />
RFID Technology: Mustering up<br />
better incident response<br />
By John Convy, Convy Associates, Washington, DC<br />
Radio-Frequency Identification<br />
(RFID) tags have become a fixture<br />
in the commercial sector, proving an<br />
invaluable tool for retailers against<br />
loss prevention and for inventory<br />
tracking. But, what if this technology,<br />
previously limited to<br />
tracking cattle, could<br />
be used to protect government<br />
assets and<br />
personnel in the event<br />
of an emergency?<br />
It turns out, this can<br />
be done!<br />
The progress in<br />
RFID technology has made it more<br />
accessible and prominent, and has<br />
reduced costs for widespread use<br />
among cost-conscious organizations<br />
and agencies that might benefit from<br />
it. Active, semi-passive, and passive<br />
RFID tags are less expensive to produce<br />
than in the past, and can now<br />
be made small enough to fit in virtually<br />
any device or product.<br />
The federal government has already<br />
implemented RFID technology<br />
in numerous ways, partly in<br />
response to the September 11 attacks.<br />
For example, the Department<br />
of State is now issuing e-passports,<br />
embedded with RFID chips that act<br />
as a biometric identifier, making the<br />
passport impossible to forge. Also,<br />
the government’s “Real ID” program<br />
has seen many states adopting<br />
In the event of an evacuation, managers<br />
can quickly account for all employees, and<br />
alert authorities to any discrepancies in<br />
their locations.<br />
driver’s license chipping to improve<br />
identification monitoring at border<br />
crossings and federal facilities.<br />
In the security sector, RFID technology<br />
is making significant strides<br />
in how organizations view and execute<br />
personnel management, particularly<br />
in the event of a crisis or<br />
incident. I recently spoke with Steve<br />
Pisciotta, founder and president of<br />
RTS (Remote Tracking Systems).<br />
His Arizona-based company’s asset<br />
tracking solutions are helping address<br />
critical security threats to highvalue<br />
facilities, such as military bases,<br />
38<br />
weapons facilities, airports, seaports,<br />
and other critical infrastructure.<br />
RTS is using integrated Active<br />
RFID, coupled with remote data<br />
servers and strategically placed badge<br />
readers or “muster points” on the exterior<br />
of buildings, and<br />
“inventory points” on<br />
the interior, that enable<br />
real-time tracking<br />
and inventory of<br />
personnel. These solutions<br />
represent an opportunity<br />
for agencies<br />
to become more efficient<br />
at protecting both infrastructure<br />
and personnel.<br />
Pisciotta explained that an RTS solution<br />
is designed by implementing<br />
an “Employee Muster System,” where<br />
nondescript reader boxes or muster<br />
points are installed around the<br />
perimeter of a building or campus,<br />
and employees are given wearable<br />
RFID badges, which communicate<br />
with the muster points to track, in<br />
real-time, the locations of personnel<br />
on campus. This information is then<br />
relayed to an off-site Remote Data<br />
Server where the software checks the
data against the personnel inventory<br />
system to inform and report on the<br />
personnel located inside the building.<br />
In the event of an evacuation,<br />
managers can quickly account for all<br />
employees, and alert authorities to<br />
any discrepancies in their locations.<br />
To illustrate the usefulness of this<br />
‘mustering’ technology, Pisciotta<br />
suggested that we walk through a<br />
scenario.<br />
“Imagine a large federal healthcare<br />
facility with around 2,000 employees,<br />
four acres of campus space,<br />
and a fairly high level of security.<br />
Employees are assigned badges<br />
equipped with active RFID technology,<br />
which identifies each individual,<br />
and a ‘panic button’ that can be activated<br />
as a silent alarm sent to the<br />
remote server. Any number of incidents<br />
could prompt a security response<br />
– white powder found in the<br />
mailroom, a toxic spill of infectious<br />
substance, a natural disaster such as<br />
a tornado or earthquake, a fire, an active<br />
shooter on campus, or the worstcase<br />
possibility – blatant terrorism.”<br />
In his fictional scenario, Pisciotta<br />
described a supervisor arriving at<br />
work and noticing a man she does<br />
not recognize, loitering by the employee<br />
entrance.<br />
“As she passes through the door,<br />
the inventory point captures her<br />
identifying data, and makes a digital<br />
record that she is in the building, just<br />
as it does for every employee on that<br />
39<br />
morning,” he described. “Moments<br />
later, she sees the unauthorized man<br />
enter the building behind another<br />
employee, and dart into the elevator.<br />
Immediately, she activates her RFID<br />
panic button while arriving her office.<br />
As she sits down, she hears shots<br />
in the hallway upstairs, signaling that<br />
an active shooter is on campus. As<br />
security protocols are implemented,<br />
she evacuates her team and meets up<br />
with other employees at a preplanned<br />
mustering location. There, she accesses<br />
the remote data server to take<br />
inventory of her team, and discovers<br />
that one of her team members is still<br />
inside. The system’s real-time tracking<br />
enables law enforcement to know<br />
that one of her employees is hiding<br />
in the men’s restroom. With law enforcement<br />
already notified earlier by<br />
her panic button activation, their response<br />
time is quick, and officers are<br />
on scene within moments of the first<br />
report of shots fired.”<br />
Because of the RFID technology,<br />
law enforcement is able to intercept<br />
the innocent employee as he exits<br />
the men’s room, and evacuate him<br />
safely – avoiding any chance of him<br />
encountering the shooter.<br />
“Throughout this scenario,” Pisciotta<br />
added, “the system reports<br />
that a small group of employees –<br />
still inside the building, as reported<br />
by their RFID badges – are huddled<br />
together in an upstairs closet. This allows<br />
officers to see that they are hiding<br />
from the shooter, directing them<br />
to search that part of the building,<br />
where they apprehend the shooter,<br />
and release the employees from their<br />
hiding spot after the area is secure.”<br />
Pisciotta believes that integrating<br />
real-time tracking solutions can be a<br />
powerful means of identifying unauthorized<br />
activity, and ultimately protecting<br />
employees and infrastructure.<br />
He is enthusiastic about the<br />
potential for federal, state, and local<br />
agencies to implement this technology,<br />
and about the positive impact<br />
it can have on government security<br />
response capabilities.<br />
Looking forward, I expect we will<br />
be seeing broader implementation<br />
of RFID technology across government,<br />
and the development of new<br />
and better RFID technologies as new<br />
RFID innovators emerge in this market.<br />
John Convy and Convy Associates<br />
provide strategic alliance, A&E consultant,<br />
technology ecosystem, and<br />
lead generation programs to monetize<br />
relationships and accelerate demand<br />
for leading security industry manufacturers.<br />
John is the Founder and<br />
Managing Director of the Open Standards<br />
Security Alliance and the IP<br />
Security Academy, and a speaker at<br />
many global industry events. Email:<br />
John@ConvyAssociates.com
WWF-Canada and RSA team up to advance<br />
employee action on sustainability<br />
TORONTO, <strong>March</strong> 15, <strong>2016</strong> /<br />
CNW/ - WWF-Canada and RSA<br />
Canada kicked off a new five-year<br />
partnership today to inspire and<br />
engage employees in workplaces<br />
across Canada to take environmental<br />
action.<br />
With this partnership, RSA becomes<br />
the new presenting sponsor<br />
of Living Planet @ Work, WWF-<br />
Canada’s environmental employee<br />
engagement program. In doing so,<br />
RSA demonstrates and promotes<br />
the benefits of integrating<br />
employee engagement and<br />
corporate responsibility<br />
initiatives.<br />
Through this partnership,<br />
WWF-Canada will<br />
support RSA, Canada’s<br />
third-largest general insurer,<br />
to develop a robust national<br />
green team program<br />
in order to engage employees<br />
coast to coast to take<br />
action on sustainability.<br />
This is part of RSA Canada’s<br />
corporate responsibility commitments<br />
to reduce the carbon<br />
emissions from their internal operations<br />
by 12 per cent per employee by<br />
2018 (2015 baseline) as well as support<br />
customers with tools and solutions<br />
to better respond to changing<br />
environmental risks and opportunities.<br />
Quote from Rowan Saunders, President<br />
and CEO of RSA Canada<br />
“Our employees are our biggest asset<br />
and engaging them on sustainability<br />
– an issue that they care<br />
deeply about – is directly linked to<br />
our success. Combined with WWF’s<br />
inspiration and guidance, we can<br />
bring together our people to create<br />
a more sustainable future.”<br />
Quote from David Miller,<br />
President and CEO of WWF-Canada<br />
40<br />
“Canadians have a growing desire to<br />
lighten the human load on our planet.<br />
They’re taking action, seeking solutions<br />
and building a future where<br />
nature and the economy thrive together.<br />
WWF-Canada’s partnership<br />
with RSA Canada harnesses that<br />
drive to help Canadians in workplaces<br />
across the country nurture a<br />
deeper connection with nature.”<br />
Why integrating a company’s employee<br />
engagement and corporate<br />
responsibility initiatives matters:<br />
• High employee engagement can<br />
lead to 19 per cent profit increase,<br />
20 per cent improved performance<br />
and 87 per cent<br />
turnover reduction (Corporate<br />
Leadership Council)<br />
• Lack of employee engagement<br />
is the top issue<br />
currently facing 87 per cent<br />
of HR and business leaders<br />
(Deloitte, 2015) and less<br />
than one-third of workers<br />
felt engaged in their jobs in<br />
2014, according to the U.S.<br />
study. The majority (51 per<br />
cent) were “not engaged”, and 17.5<br />
per cent were “actively disengaged.”<br />
• Millennials, the least engaged<br />
generation (Gallup, 2014) and the<br />
generation that will form half of the<br />
global workforce by 2020 and 75
per cent by 2025, want their work to<br />
have a purpose, to contribute something<br />
to the world and they want to<br />
be proud of their employer (PwC,<br />
2011)<br />
WWF and RSA Partnership History<br />
For more than five years, WWF and<br />
RSA have partnered on research<br />
and employee engagement initiatives<br />
that have strengthened our<br />
organizations. As a leading renewable<br />
energy and marine insurer,<br />
RSA has supported WWF’s efforts<br />
to better understand the impacts of<br />
our changing climate and environment<br />
and to help RSA employees,<br />
customers and brokers mitigate and<br />
adapt to those risks. A report commissioned<br />
by RSA to understand<br />
the insurance risks of Arctic shipping<br />
is informing industries. RSA’s<br />
recognition of the important role<br />
that employees play in creating positive<br />
change is helping to advance<br />
workplace sustainability. By working<br />
with WWF, RSA is expanding<br />
its influence and gaining valuable<br />
insights for its future.<br />
About Living Planet @ Work:<br />
Living Planet @ Work was launched<br />
in 2011 to inspire, empower and engage<br />
environmentally minded employees<br />
to lead footprint reduction<br />
initiatives, sustainability awareness<br />
campaigns at work and build support<br />
for WWF’s conservation efforts<br />
across Canada. Today, more than<br />
1,200 champions from more than<br />
900 companies use the program and<br />
are taking action for the good of<br />
business and the planet.<br />
About WWF-Canada<br />
WWF-Canada is part of WWF<br />
(World Wildlife Fund), one of the<br />
world’s largest and most respected<br />
conservation organizations. WWF-<br />
Canada has close to 50 years of<br />
experience implementing sciencebased<br />
knowledge and research into<br />
on-the-ground projects. WWF creates<br />
solutions to the most serious<br />
conservation challenges facing our<br />
planet, helping people and nature<br />
thrive. Visit wwf.ca for more information.<br />
About RSA Canada<br />
RSA Canada is one of the oldest insurance<br />
companies in the country<br />
with roots dating back to 1833. The<br />
RSA Canada group of companies<br />
includes Roins Financial Services<br />
Limited, Royal & Sun Alliance Insurance<br />
Company of Canada, Quebec<br />
Assurance Company, Johnson<br />
Inc., Unifund Assurance Company,<br />
Western Assurance Company, Ascentus<br />
Insurance Ltd., Canadian<br />
Northern Shield Insurance Company<br />
and RSA Travel Insurance Inc.<br />
(collectively, “RSA Canada”) and is<br />
part of RSA Insurance Group Plc.<br />
SOURCE WWF-Canada<br />
41<br />
For further information:<br />
Philippe Devos, director of communications<br />
and media, WWF-<br />
Canada, pdevos@wwfcanada.org,<br />
416-453-0092; Brodie Bott, media<br />
relations manager, RSA Canada,<br />
media@rsagroup.ca; Diane Bégin,<br />
account director, APEX Public Relations,<br />
dbegin@apexpr.com, 416-<br />
934-2116<br />
This information is being distributed<br />
to you by CNW Group Ltd. 88 Queens<br />
Quay West, Suite 3000 Toronto ON<br />
M5J 0B8 www.newswire.ca<br />
Sign-up for Free <strong>GSN</strong><br />
Print/<strong>Digital</strong> <strong>Edition</strong>s<br />
& Email Newsletters<br />
CLICK HERE
Border Security/Immigration<br />
Statement by Secretary Jeh C. Johnson on Southwest<br />
Border Security apprehensions<br />
MARCH 9, <strong>2016</strong> – In connection<br />
with the latest monthly release of<br />
the numbers of apprehensions on<br />
our southwest border, Secretary<br />
Johnson made the following statement:<br />
“In February <strong>2016</strong>, apprehensions<br />
by the Border Patrol on our<br />
southwest border – an indicator of<br />
total attempts to cross the border<br />
illegally – increased slightly from<br />
January, but remained substantially<br />
below the month-to-month numbers<br />
of apprehensions we saw in the<br />
latter part of 2015. The numbers of<br />
unaccompanied children and family<br />
members remained at the same<br />
levels as January, which is greatly reduced<br />
from the apprehension numbers<br />
at the end of 2015. The overall<br />
10 percent increase from January is<br />
due to an increase in apprehensions<br />
of single adults, from 17,505 in<br />
January to 19,917 in February, 71.5<br />
percent of whom are from Mexico.<br />
Notably, one year ago, in February<br />
2015, the number of apprehensions<br />
of single adults was 19,950, and in<br />
February 2014 the number was<br />
July 2015<br />
August 2015<br />
September 2015<br />
October 2015<br />
November 2015<br />
December 2015<br />
January <strong>2016</strong><br />
February <strong>2016</strong><br />
28,277.<br />
Recent enforcement actions,<br />
which focus on those apprehended<br />
at the border on or after January 1,<br />
2014, continue. On January 4, I announced<br />
enforcement actions that<br />
took place on January 2-3. Further,<br />
at my direction, beginning January<br />
23 ICE has been conducting<br />
“Operation Border Guardian,” by<br />
which ICE has taken into custody<br />
336 individuals. The focus of this<br />
operation are those who came here<br />
illegally as unaccompanied children<br />
after January 1, 2014, and are now<br />
42<br />
UACs<br />
4,182<br />
4,638<br />
4,485<br />
4,944<br />
5,610<br />
6,775<br />
3,111<br />
3,113<br />
Family<br />
Members<br />
4,503<br />
5,159<br />
5,273<br />
6,026<br />
6,471<br />
8,974<br />
3,145<br />
3,048<br />
All<br />
28,388<br />
30,239<br />
30,286<br />
32,726<br />
32,845<br />
37,014<br />
23,761<br />
26,078<br />
over 18, have been ordered removed<br />
by an immigration court, and have<br />
no pending appeal or claim of asylum<br />
or other relief. Others who are<br />
priorities for removal have been apprehended<br />
as part of this operation.<br />
When enforcing the immigration<br />
laws, our personnel will not, except<br />
in emergency circumstances, apprehend<br />
an individual at a place of worship,<br />
a school, a hospital or doctor’s<br />
office or other sensitive location.<br />
These actions are part of our<br />
broader and ongoing efforts to enforce<br />
our immigration laws, in line
with our stated priorities. Since October<br />
1, ICE has repatriated a total<br />
of 28,808 individuals to Central<br />
America, and ICE and the Border<br />
Patrol have either repatriated or<br />
returned approximately 128,000 to<br />
Mexico. Since October 1, there have<br />
been a total of 290 removal flights<br />
to Central America. We are working<br />
with the Mexican government to increase<br />
the number of removal flights<br />
there from two to three flights per<br />
week. On February 23, we entered<br />
into new agreements with the Mexican<br />
government for the more efficient<br />
repatriation of adults, and safe<br />
and timely repatriation of families<br />
and unaccompanied children.<br />
As I have said repeatedly, our borders<br />
are not open to illegal migration.<br />
If someone was apprehended<br />
at the border, has been ordered removed<br />
by an immigration court,<br />
has no pending appeal, and does<br />
not qualify for asylum or other relief<br />
from removal under our laws, he<br />
or she must be sent home. We must<br />
and we will enforce the law in accordance<br />
with our enforcement priorities.<br />
I have also been working closely<br />
with the Department of Justice to<br />
ensure that as many unaccompanied<br />
children as possible have appropriate<br />
representation during immigration<br />
proceedings. We support<br />
improving the process for all those<br />
in immigration<br />
proceedings<br />
and have<br />
requested over<br />
$17 million as<br />
part of the President’s<br />
FY17<br />
budget request DHS Secretary<br />
to support critical<br />
initiatives<br />
Jeh Johnson<br />
that provide legal assistance services<br />
to vulnerable immigrants, including<br />
$2 million for Justice AmeriCorps -<br />
a program that specifically provides<br />
legal representation to unaccompanied<br />
minors. We need every element<br />
of the court process to work<br />
effectively to accomplish the goal of<br />
both honoring humanitarian claims<br />
and processing those who do not<br />
qualify for relief.<br />
With the Department of Justice,<br />
we are also doubling down on our<br />
efforts to apprehend and prosecute<br />
smugglers. Through initiatives like<br />
Operation Coyote, we are targeting<br />
the transnational criminal organizations<br />
that profit from human smuggling.<br />
Since its launch in summer<br />
2014, Operation Coyote has to date<br />
resulted in the criminal arrest of<br />
1,124 individuals, 877 indictments,<br />
and 829 convictions.<br />
Finally, as I have said in the past,<br />
we recognize that many who seek<br />
to flee Central America may be<br />
regarded as refugees. We are ex-<br />
43<br />
panding our Refugee Admissions<br />
Program to help vulnerable men,<br />
women and children in Central<br />
America. In partnership with the<br />
UN High Commissioner for Refugees<br />
and non-governmental organizations<br />
in the region, we have taken<br />
preliminary steps to ensure we are<br />
able to implement this new program<br />
as soon as possible. This approach<br />
builds on our recently established<br />
Central American Minors program,<br />
which is now providing an in-country<br />
refugee processing option for<br />
certain children with parents in the<br />
United States, as well as the existing<br />
asylum process; to date, the State<br />
Department has received 7,606 applications<br />
for this Program.<br />
Again, our policy is clear: We will<br />
continue to enforce the immigration<br />
laws and secure our borders<br />
consistent with our priorities and<br />
values. At the same time, we will offer<br />
vulnerable populations in Central<br />
America an alternate, safe and<br />
legal path to a better life.”
Border Security/Immigration<br />
What’s next in the Supreme Court Case<br />
on expanded DACA and DAPA?<br />
By Mellissa Crow<br />
JANUARY 20, <strong>2016</strong> – This week, the<br />
Supreme Court announced it would<br />
hear arguments in United States v.<br />
Texas. The highest court will now<br />
determine whether the President’s<br />
deferred action initiatives announced<br />
in November 2014,<br />
known as expanded DACA and<br />
DAPA, constitute a lawful exercise<br />
of executive discretion. The<br />
Supreme Court’s decision could<br />
clear the way for the initiatives<br />
to go forward as early as June of<br />
<strong>2016</strong>. If that happens, expanded<br />
DACA and DAPA could provide<br />
temporary relief from deportation<br />
to as many as five million<br />
people. It’s important to note that<br />
the current, active DACA program<br />
that began in 2012, which now has<br />
more than half a million people enrolled,<br />
is not being challenged in<br />
this lawsuit.<br />
Some court watchers were surprised<br />
to see the court direct both<br />
sides to address whether the President’s<br />
actions violated the “Take<br />
Care” Clause of the Constitution,<br />
which states that the President must<br />
“take Care that the Laws be faithfully<br />
executed.” Neither the Texas district<br />
court nor the Fifth Circuit Court of<br />
Appeals addressed this legal claim;<br />
instead, the lower courts based their<br />
decisions on the government’s alleged<br />
failure to comply with certain<br />
technical requirements under<br />
the Administrative Procedure Act.<br />
The Court’s request for additional<br />
briefing on this issue suggests that it<br />
wants to resolve all the issues in the<br />
case, rather than leaving a loophole<br />
that could be the basis for a future<br />
decision by the district court, which<br />
could further delay the implementation<br />
of expanded DACA and DAPA.<br />
However, the Court may not end<br />
up reaching the merits of this case<br />
at all and may instead dismiss the<br />
44<br />
case for lack of standing, or legal capacity<br />
to bring the case. This is the<br />
best case scenario. Texas and the 25<br />
other plaintiff states are arguing that<br />
they have standing because additional<br />
costs Texas might incur to issue<br />
drivers’ licenses to beneficiaries<br />
of the deferred action programs<br />
give them enough of a stake in<br />
the case to challenge federal immigration<br />
policy. If the Court<br />
were to affirm this rationale, it<br />
would mean that states have an<br />
unprecedented role in an area<br />
that has always been an exclusively<br />
federal domain.<br />
Oral arguments in the case<br />
will likely be scheduled for April<br />
<strong>2016</strong>. The Court will issue a decision<br />
before its current term ends in<br />
June <strong>2016</strong>. For the sake of the immigrant<br />
families whose lives are riding<br />
on this decision, let’s hope that the<br />
Court makes clear that President<br />
Obama, like every President before<br />
him dating back to Eisenhower, has<br />
the authority to take executive action<br />
on immigration.<br />
Photo Courtesy of Photo Phiend.
Nativists line up in support of Trump’s<br />
Presidential campaign<br />
By Walter Ewing<br />
If one is judged by the company<br />
one keeps, then Donald<br />
Trump needs some new<br />
friends. The now-undisputed<br />
frontrunner in the Republican<br />
presidential primary<br />
campaign has been receiving<br />
endorsements from a rogue’s<br />
gallery of nativists. Not surprisingly,<br />
Trump and his buddies fail to offer<br />
any constructive, realistic, or humane<br />
means of fixing the myriad<br />
problems that plague the U.S. immigration<br />
system. For instance, a<br />
key component of the Trump immigration<br />
doctrine is the deportation<br />
of all 11 million unauthorized men,<br />
women, and children now living in<br />
the United States—no matter how<br />
much it costs or how many lives it<br />
needlessly destroys.<br />
This kind of immigration “reform”<br />
plays well in white-supremacist<br />
circles. David Duke, the ardent<br />
white nationalist and former Ku<br />
Klux Klansman, has told his followers<br />
that “voting against Donald<br />
Trump at this point is really treason<br />
to your heritage.” During an inter-<br />
responsible for the words of<br />
his supporters, but it should be<br />
taken as a warning sign when<br />
his supporters include a flock<br />
of white nationalists. As Richard<br />
Cohen, president of the<br />
Southern Poverty Law Center,<br />
puts it: “You can’t help who<br />
Photo: Darron Birgenheier<br />
admires you, but when white<br />
supremacists start endorsing<br />
view on CNN, Trump repeatedly<br />
declined to disavow any ideological<br />
allegiance with Duke—an incident<br />
which he later blamed on a faulty<br />
earpiece worn during the interview.<br />
He subsequently disavowed Duke in<br />
a tweet, but Duke took no offense,<br />
saying: “Look, Donald Trump, do<br />
whatever you need to do to get<br />
elected to this country because we<br />
you for president, you ought<br />
to start asking why.” Similarly, one<br />
might ask why so many of Trump’s<br />
retweets are words of praise from<br />
white supremacists. One might also<br />
question the wisdom of Trump’s decision<br />
to tweet a quote from World<br />
War II fascist dictator Benito Mussolini:<br />
“It is better to live one day as<br />
a lion than 100 years as a sheep.”<br />
need a change.”<br />
White nationalist connections<br />
Trump has received similar words<br />
of praise from Jared Taylor, founder<br />
of the New Century Foundation<br />
and editor of its website, American<br />
Renaissance. Taylor says that<br />
“someone who wants to send home<br />
all illegal immigrants…is acting in<br />
the interest of whites, whether consciously<br />
or not.”<br />
Of course, Trump cannot be held<br />
aside, the Trump immigration plan<br />
has also been embraced by anti-immigration<br />
advocates who are more<br />
mainstream in their rhetoric. Senator<br />
Jeff Sessions (R-AL) states that:<br />
“Politicians have promised for<br />
30 years to fix illegal immigration.<br />
Have they done it? Donald Trump<br />
will do it. I’ve told Donald Trump<br />
More on page 54<br />
45
Border Security/Immigration<br />
New TSA canine training<br />
center opens in San Antonio<br />
SAN ANTONIO – The Transportation<br />
Security Administration today<br />
announced the dedication of a new<br />
canine training center at Joint Base<br />
San Antonio-Lackland.<br />
The new facility is designed to<br />
support the mission to provide,<br />
train and certify highly effective<br />
explosives detection canine teams.<br />
The 25,000 square-foot facility has<br />
seven new classrooms and a 100-<br />
seat auditorium and administrative<br />
space, along with a parking lot<br />
and courtyard. The new building is<br />
a partnership among TSA, JBSA-<br />
Lackland and the U.S. Army Corps<br />
of Engineers, which built the facility<br />
in a little more than a year.<br />
The new $12 million training facility<br />
is “an ideal complement to<br />
the existing training center campus,<br />
where our canines and their handlers<br />
come to learn the skills necessary<br />
to demonstrate proficiency in<br />
four key elements: the canine’s ability<br />
to recognize explosives odors, the<br />
handler’s ability to interpret the canine’s<br />
change of behavior, the handler’s<br />
ability to conduct logical and<br />
systematic searches and the team’s<br />
ability to locate the explosives odor<br />
source,” said TSA Administrator Peter<br />
Neffenger during a ribbon-cutting<br />
ceremony held earlier today to<br />
mark the completion of the facility.<br />
The program outgrew the original<br />
facility, which was located on<br />
base but not adjacent to where the<br />
dogs and handlers train at venues<br />
that replicate real-life scenarios. The<br />
new facility is now across the street<br />
from the field training center and<br />
kennels. The structure will be certified<br />
at the LEED Silver standard<br />
for sustainability set by the Leadership<br />
in Energy and Environmental<br />
Design of the U.S. Green Building<br />
Council. This energy-efficient, water-conserving<br />
building was erected<br />
using green resources and materials<br />
as part of federal leadership in sustainable<br />
construction.<br />
TSA trains and deploys both TSAled<br />
and state and local law enforcement-led<br />
canine teams in support of<br />
day-to-day activities that protect the<br />
transportation domain and provide<br />
a visible deterrent to terrorism. Annually,<br />
TSA trains about 250 canine<br />
teams at JBSA-Lackland to operate<br />
in the aviation, multimodal, mass<br />
transit, and cargo environments.<br />
Federal, state and local law enforcement<br />
officers from across the<br />
46<br />
country travel to San Antonio to<br />
take the 10 - 12 week courses. They<br />
are paired with a canine teammate<br />
and undergo strenuous training.<br />
These very effective, mobile teams<br />
can quickly locate and identify dangerous<br />
materials that may present a<br />
threat to transportation systems.<br />
The classrooms will be used to<br />
conduct sessions on canine health<br />
and wellness care, obedience, search<br />
patterns and techniques, explosives<br />
handling and safety, and myriad<br />
other mission critical topics. Thirteen<br />
indoor venues are located on<br />
the premises that mimic a variety of<br />
transportation sites, such as a cargo<br />
facility, an airport gate, a checkpoint,<br />
a baggage claim area, the interior<br />
of an aircraft, a vehicle parking<br />
lot, a light rail station, a light rail<br />
car, and an air cargo facility.
Xenophobic immigration policy<br />
would wreck the U.S. Economy<br />
Written by Walter Ewing,<br />
American Immigration Council<br />
The GOP candidates for President<br />
are falling over one another to demonstrate<br />
who would be the “toughest”<br />
on immigrants and who would<br />
finally make U.S. borders “secure.”<br />
Leading the way is Donald Trump,<br />
who issued shrill declarations during<br />
the January 14 GOP debate that<br />
“We have no borders” and “Illegal<br />
immigration is beyond belief ”—all<br />
of which is hard to reconcile with<br />
the fact that more Mexicans are now<br />
leaving the country than coming.<br />
Nevertheless, Trump promises to<br />
fix many of the nation’s problems<br />
by building a Great Wall along the<br />
U.S.-Mexico border and deporting<br />
all immigrants not legally authorized<br />
to be in the country. Not<br />
wanting to be outdone, Senator Ted<br />
Cruz of Texas has also called for<br />
the building of a wall—which has<br />
prompted Trump to accuse him of<br />
being a copycat. Moreover, while<br />
Trump would allow some of the unauthorized<br />
immigrants he deports<br />
to apply to come back to the United<br />
States if they prove themselves to be<br />
47<br />
“very good,” Cruz’s plan would allow<br />
none of them to return.<br />
Much of this tough talk may be<br />
bluff and bluster; the verbal smoke<br />
and mirrors that is so often employed<br />
by political candidates in a<br />
tough election. But at least some of<br />
it may be for real, which raises serious<br />
questions about its practicality,<br />
social repercussions, and economic<br />
impact. Let’s consider just the likely<br />
economic aspect of policies that<br />
would kick out all unauthorized<br />
immigrants and build a 2,000 milelong<br />
wall between the United States<br />
and Mexico.<br />
Various sources consulted by<br />
CNBC found that it would probably<br />
cost about $12 billion to build a<br />
Trump Wall along the border —plus<br />
$750 million per year to maintain it<br />
(not counting all of the Border Patrol<br />
agents, helicopters, airplanes,<br />
and drones needed to monitor the<br />
wall for breaches). In a 2013 Forbes<br />
story, Rep. Henry Cuellar (D-Texas)<br />
aptly described a border fence as<br />
“a 14th century solution to a 21st<br />
century problem.” It is a “solution”<br />
that fails to account for the fact that<br />
roughly 40 percent of currently unauthorized<br />
immigrants came to the<br />
United States on valid visas and<br />
stayed after those visas expired. Nor<br />
does it account for the unknown<br />
share of the unauthorized who are<br />
led by smugglers through ports of<br />
entry rather than through expanses<br />
of empty desert. In other words, a<br />
border fence would have no impact<br />
on at least half of the unauthorized<br />
immigrants entering the country,<br />
and its impact on the other half<br />
would be partial at best given the<br />
proven ability of smuggling organizations<br />
to go under, through, or<br />
over the stretches of border fence<br />
that already exist.<br />
Leaving the cost of a border wall<br />
aside, what about the Trump Mass<br />
Deportation Plan? Not surprisingly,<br />
More on page 55
<strong>GSN</strong>’s <strong>2016</strong> Airport, Seaport, Border Security<br />
Awards Program<br />
OPENING FOR ENTRIES ON MONDAY, MARCH 28 AT:<br />
www.asbsecurityawards.com<br />
Join the hundreds of national and international security<br />
vendors and government agencies that were honored<br />
in prior <strong>GSN</strong> programs for notable contributions to<br />
Airport and Aviation Security, Maritime/Port Security,<br />
Border Security and Immigration.<br />
Important Dates:<br />
<strong>March</strong> 28 – Program opens for entries<br />
May 3 – Program closes for entries<br />
May 9 – Finalists Announced<br />
May 16 – Awards Dinner, Washington DC<br />
Past Awards Dinner Speakers have included Fran Townsend,<br />
who was Advisor to President George W. Bush after 9/11,<br />
Four Star General Barry McCaffrey (RET), the highly decorated<br />
General who also served as U.S. Drug Czar, and Coast Guard<br />
Admiral Thad Allen, who came out of retirement twice to serve<br />
his country – the first time during Hurricane Katrina and the<br />
second time in the BP Oil Spill.<br />
See photos of seven years of <strong>GSN</strong> Awards Programs at:<br />
https://www.flickr.com/photos/44536438@N06/
Extreme Conditions are no match for latest<br />
Motorola Solutions Radio<br />
Motorola Solutions listens to firefighters,<br />
delivers rugged APXTM<br />
8000XE portable radio with allband<br />
and Wi-Fi access and enhanced<br />
APX XE500 remote speaker<br />
microphone provides superior<br />
sound quality<br />
• Next-generation of APX extreme<br />
radio and remote speaker microphone<br />
(RSM) built for harsh environments<br />
• APX 8000XE provides interoperability<br />
across public safety networks<br />
SCHAUMBURG, Ill. – <strong>March</strong> 10,<br />
<strong>2016</strong> – Motorola Solutions (NYSE:<br />
MSI) continues its legacy of designing<br />
best-in-class digital radio<br />
solutions for firefighters and other<br />
professionals who face extreme<br />
conditions with the introduction<br />
of the APX 8000XE two-way radio<br />
and APX XE500 RSM. The newest<br />
entries into Motorola Solutions’<br />
award-winning APX<br />
portfolio of Project 25 (P25)<br />
digital radios have been developed<br />
using the company’s<br />
well-established practice<br />
of hands-on research<br />
with firefighters<br />
and other first<br />
responders who<br />
need the most<br />
reliable missioncritical<br />
communications to do their<br />
jobs efficiently, effectively and safely<br />
every day.<br />
The APX 8000XE features allband<br />
functionality and is a rugged<br />
P25 two-way radio that can be used<br />
in either analog or digital mode<br />
across 700/800MHz, VHF and UHF<br />
bands. Time is of the essence for<br />
firefighters and they can be ready<br />
in moments by programming the<br />
radio remotely via Wi-Fi<br />
and radio management<br />
software to operate securely<br />
on different radio<br />
networks, allowing them<br />
to quickly help neighboring<br />
counties during<br />
large-scale emergencies.<br />
Motorola Solutions<br />
works closely with firefighters<br />
and other radio<br />
49<br />
users to find out exactly what they<br />
need and the APX 8000XE is the latest<br />
example of that thinking. It features<br />
the trusted ergonomics<br />
of the APX XE radio series,<br />
designed for easy operation in<br />
harsh conditions. The rightsized<br />
radio has a large top<br />
display, exaggerated controls<br />
for gloved hands<br />
and a dedicated pushto-talk<br />
button. It also<br />
provides best-in-class audio with a<br />
1-watt speaker, three built-in microphones<br />
and automatic noise suppression<br />
for clarity in the loudest of<br />
environments.<br />
“The APX 8000XE is an all-band<br />
rugged and submersible portable<br />
radio made for firefighters,” said<br />
Lieutenant David Hudik, Elgin, Illinois<br />
Fire Department. “With Wi-Fi<br />
access, we can reprogram the APX<br />
8000XE on the fly when we are providing<br />
mutual aid assistance out-ofstate.”<br />
Most firefighters use a remote<br />
speaker microphone with their radios<br />
and the APX XE500 RSM is<br />
designed specifically for demanding<br />
environments, whether combating<br />
a fire or providing medical services<br />
at the scene of an accident.<br />
• With five strategically placed mi-
crophones and automatic noise suppression,<br />
the APX XE500 provides<br />
clear communications when worn on<br />
either shoulder, center chest, or over<br />
the shoulder<br />
• It can be submersed in 2 meters of<br />
water for up to 4 hours<br />
• It withstands heat conditions of up<br />
to 500°F (260°C) for up to 5 minutes<br />
• A channel knob automatically<br />
controls the channels of the user’s<br />
portable APX radio<br />
“With the APX XE500 RSM, I can<br />
completely control my APX radio<br />
without having to hunt under my<br />
bunker coat for it,” said Lieutenant<br />
David Hudik, Elgin Fire Department.<br />
“With improved water porting, you<br />
can carry the APX XE500 upright or<br />
upside down for fast water drainage<br />
while maintaining clear voice communications.”<br />
“Customer input is essential to our<br />
design and the Elgin Fire Department<br />
was right at our side as we tested<br />
the capabilities of the APX 8000XE<br />
and APX XE500 RSM,” said Claudia<br />
Rodriguez, vice president, Devices<br />
Product Management, Motorola Solutions.<br />
“The latest XE radio means<br />
firefighters will be able to talk with<br />
other first responders at the scene and<br />
across municipalities and regions.<br />
The new rugged RSM means they can<br />
communicate clearly in the loudest<br />
fireground environments, including<br />
blaring horns and wailing sirens.”<br />
The APX 8000XE and XE500 RSM<br />
will be available in North America.<br />
Ensuring biometric data is useless<br />
to identity thieves<br />
Continued from page 5<br />
resulting in enhanced, individualized<br />
security, allowing individuals to fully<br />
control their real identity. Instead of<br />
the system blocking the legitimate<br />
user — an unintended consequence<br />
of blocking an attacker — the system<br />
is made more secure and efficient and<br />
thus returns a higher ROI for both the<br />
consumer and system administrator.<br />
More Robust Biometric Templates<br />
with Enhancements<br />
Resources<br />
• APX 8000XE and APX XE500<br />
RSM video<br />
• Learn more about the APX<br />
8000XE two-way radio and the APX<br />
XE500 RS<br />
About Motorola Solutions<br />
Motorola Solutions (NYSE: MSI) creates<br />
innovative, mission-critical communication<br />
solutions and services<br />
that help public safety and commercial<br />
customers build safer cities and<br />
thriving communities. For ongoing<br />
news, visit http://newsroom.motorolasolutions.com<br />
or subscribe to a<br />
news feed.<br />
50<br />
It may be desirable in some application-dependent<br />
situations to construct<br />
and enforce the use of enhanced<br />
biometric templates. The use<br />
of a “super template” that uniquely<br />
combines biometric data with other<br />
information — perhaps even an OTP<br />
or other out-of-band data — enables<br />
the system to recognize and reject a<br />
biometric template that was created<br />
from a stolen fingerprint image. Templates<br />
can reside on a card or chip or<br />
in a smartphone or personal wearable.<br />
In the case of a government or civil<br />
application, this approach would prevent<br />
any would-be attacker from simply<br />
using the stolen biometric data,<br />
alone, to compromise either physical<br />
or data security.<br />
In the case of commercial markets<br />
(e.g., a banking application), we<br />
might see an institution deploying a<br />
similar approach to protect user identity<br />
during online transactions. As<br />
some do today, institutions could enable<br />
multi-factor authentication and<br />
require that both the biometric and<br />
some other data be provided. Alternatively,<br />
they could enroll biometric<br />
data and then “sign and encrypt” the<br />
template with unique or closed-system<br />
data.<br />
The creation of a guaranteed unique<br />
“super template” might combine standard<br />
(interoperable) and proprietary<br />
data. This is the approach that HID<br />
Global takes with its Secure Identity<br />
Object (SIO), which is a data model<br />
for storing and transporting identity<br />
information in a single object. SIOs<br />
can be deployed in any number of
form factors including contactless and<br />
contact smart cards, smart phones<br />
and USB tokens, and ensure that any<br />
of these items and the data associated<br />
with them are, in turn, only associated<br />
with the owner’s identity. The SIO is<br />
digitally signed using proven cryptographic<br />
techniques as part of a seamless<br />
and secure process. Various data<br />
objects can be added, encrypted, and<br />
signed – i.e., biometric data, as well as<br />
data for computer log-on and other<br />
secure identity applications. Then,<br />
all content is secured with a wrapper<br />
and bound to the device with another<br />
signature.<br />
Identity Proofing<br />
Lastly, it’s important to remember<br />
that the chain of trust is only as strong<br />
as the weakest link. The biometric solution<br />
used in identity-proofing must<br />
interoperate with trusted devices at<br />
each verification point. An example<br />
of this approach is HID Global’s<br />
Seos-based solutions, which create<br />
a device-independent, trusted physical<br />
identity verification process. Additionally,<br />
the physical devices themselves<br />
must be tamper-resistant to<br />
ensure that all transaction integrity<br />
is preserved. The HID Global Lumidigm<br />
biometric authenticator is a<br />
good example of this approach:<br />
• Trusted devices must be encryption-enabled<br />
with various tamper<br />
resistance and detection capabilities<br />
that protect the integrity of the communication<br />
between the client and<br />
the sensor.<br />
• The chain of trust must be preserved<br />
end-to-end if the goal is, for<br />
example, to simplify financial transactions<br />
for users while eliminating<br />
fraud for financial institutions.<br />
• This generally implies that the<br />
device connects to the institution’s<br />
systems through a cryptographically<br />
secure channel protected by hardware<br />
tamper detection and response,<br />
which establishes trust between the<br />
device and the institution’s systems<br />
independent of intermediate systems<br />
and networks.<br />
• A trusted biometric device must<br />
be able to perform a live scan of a<br />
finger with strong liveness detection<br />
to ensure that the person making the<br />
transaction is who they claim to be<br />
(that is, the same person that enrolled<br />
their biometric fingerprint).<br />
And finally, by extension, if a card,<br />
smartphone, PIN, or other forms of<br />
authentication are used for authentication,<br />
each must also be confirmed<br />
by the biometric -- a biometric that is<br />
associated with a specific individual<br />
through a robust identity-proofing<br />
process at enrollment. This ensures<br />
that true identity verification has<br />
been performed and maintained in a<br />
trusted manner.<br />
Moving Forward<br />
Biometrics solutions offer the ideal<br />
balance of convenience and security<br />
because they are simple to use and<br />
increasingly more robust and reliable.<br />
Biometrics is also the only authentication<br />
method that “binds” a user’s<br />
51<br />
digital credentials to a person. As<br />
such, biometrics is playing an important<br />
role in eliminating digital identity<br />
theft in today’s increasingly complex<br />
and vulnerable environment.<br />
Making security more robust and<br />
reliable without adding complexity<br />
is difficult. But as our environment<br />
becomes more complex and open to<br />
attacks, we simply have to find a way<br />
to enhance both trust and user convenience.<br />
Combining the universality<br />
and sophistication of biometrics with<br />
things we have (like personal devices,<br />
phones, wearables, etc.) and things<br />
we know (like PINs or passwords) is<br />
one important step. The other is to<br />
rely on vendor technologies and solutions<br />
that can effectively guarantee a<br />
high level of trust without raising the<br />
complexity for the user.<br />
Regretfully, we need to accept the<br />
fact that biometrics or other personal<br />
data cannot be completely protected<br />
from a breach. All we can do is design<br />
systems that preserve the integrity of<br />
user’s true identities - even in situations<br />
like the OPM data breach. And<br />
perhaps the best way to discourage<br />
any future breaches is to simply render<br />
the stolen data useless to anyone<br />
except the legitimate owner.
Whitewood Encryption Systems<br />
announces third patent from<br />
Los Alamos National Laboratory<br />
technology transfer<br />
Continued from page 9<br />
bers by capturing apparently random<br />
events from the local physical<br />
environment, such as user behavior,<br />
network activity or other sources of<br />
noise.<br />
“It’s an important part of our mission<br />
to help technology move from<br />
the lab environment to full-scale<br />
commercialization,” said Duncan<br />
McBranch, Chief Technology Officer<br />
at Los Alamos. “Patents such as<br />
these lay the foundation for a strong<br />
U.S. industry in next-generation<br />
cryptographic systems. These systems<br />
are required to protect trusted<br />
transactions across the public and<br />
private sector today, and to guard<br />
against future technology breakthroughs<br />
that may make current<br />
cryptography approaches obsolete.”<br />
Whitewood is a subsidiary company<br />
of Allied Minds (LSE: ALM).<br />
More information on Whitewood<br />
can be found at: www.whitewoodencryption.com.<br />
About Whitewood Encryption<br />
Systems, Inc.<br />
Whitewood® is addressing one of<br />
the most fundamental challenges<br />
associated with all modern cryptosystems<br />
– entropy management.<br />
Whitewood’s products exploit<br />
quantum mechanics to meet demand<br />
for high-quality entropy used<br />
for random data and key generation<br />
at scale. Building upon a base<br />
of quantum cryptography capabilities<br />
developed over the course of<br />
the past two decades at Los Alamos<br />
National Laboratory, Whitewood<br />
addresses operational vulnerabilities<br />
in any application that employs<br />
encryption, certificates and keys in<br />
clouds, devices and browsers. More<br />
information on Whitewood can be<br />
found at: www.whitewoodencryption.com.<br />
About Los Alamos National<br />
Laboratory (www.lanl.gov)<br />
Los Alamos National Laboratory, a<br />
multidisciplinary research institution<br />
engaged in strategic science<br />
on behalf of national security, is<br />
operated by Los Alamos National<br />
Security, LLC, a team composed of<br />
Bechtel National, the University of<br />
California, BWX Technologies, Inc.<br />
and URS Corporation for the Department<br />
of Energy’s National Nuclear<br />
Security Administration. Los<br />
Alamos enhances national security<br />
by ensuring the safety and reliability<br />
of the U.S. nuclear stockpile, developing<br />
technologies to reduce threats<br />
from weapons of mass destruction,<br />
and solving problems related to energy,<br />
environment, infrastructure,<br />
health and global security concerns.<br />
About Allied Minds<br />
52<br />
Intelsat General and L-3 Communication<br />
Systems-West demonstrate<br />
automatic beam switching<br />
Continued from page 14<br />
Allied Minds is an innovative U.S.<br />
science and technology developers,<br />
president of L-3 Communication<br />
Systems-West. “These results mark<br />
an important milestone in providing<br />
our customers the ability to modernize<br />
their existing assets within today’s<br />
fiscally constrained defense budget<br />
environment.”<br />
“This demonstration proves that<br />
modems using beam-switching<br />
technology will support UAS operations<br />
at very high data rates on highthroughput<br />
satellites,” said Skot Butler,<br />
vice president, Satellite Networks<br />
& Space Services at Intelsat General.<br />
“This capability is an important step<br />
in the evolution of satellite communications<br />
for these critical platforms.<br />
ment and commercialization company.<br />
Operating since 2006, Allied<br />
Minds forms, funds, manages and<br />
builds products and businesses<br />
based on innovative technologies<br />
developed at leading U.S. universities<br />
and federal research institutions.<br />
Allied Minds serves as a<br />
diversified holding company that<br />
supports its businesses and product<br />
development with capital, central<br />
management and shared services.<br />
More information about the Bostonbased<br />
company can be found at www.<br />
alliedminds.com.
Intelsat’s EpicNG also provides inherent<br />
protection from signal jamming<br />
and greater throughput for full-motion<br />
video and other bandwidth-hungry<br />
payloads.”<br />
Following this successful demonstration,<br />
Intelsat General and L-3<br />
CS-West plan to conduct further tests<br />
with user platforms employing the<br />
recently launched Intelsat EpicNG IS-<br />
29 satellite.<br />
Intelsat EpicNG is a high performance,<br />
next generation satellite<br />
platform that delivers global highthroughput<br />
technology via an innovative<br />
approach to satellite and network<br />
architecture utilizing C-, Ku- and<br />
Ka-bands, wide beams, spot beams,<br />
and frequency reuse technology to<br />
provide a host of customer-centric<br />
benefits. The Intelsat EpicNG series<br />
digital payload will be instrumental<br />
in allowing flexible and efficient use<br />
of spectrum, resulting in a dramatic<br />
increase in the amount of throughput<br />
delivered on these satellites. Intelsat<br />
EpicNG is based on open architecture<br />
and engineered for backwards compatibility,<br />
allowing broadband, media,<br />
mobility and government organizations<br />
to realize the cost-efficiency<br />
of using existing hardware. At the<br />
same time, increased control means<br />
these organizations can build on their<br />
success by offering their end-users<br />
customized, differentiated solutions<br />
— even defining such service characteristics<br />
as speed, hardware and network<br />
topology.<br />
See the demo video here.<br />
About Intelsat General Corp.<br />
Intelsat General provides satellite<br />
communications solutions to military,<br />
commercial and government<br />
customers over Intelsat’s fleet of approximately<br />
50 satellites and a global<br />
terrestrial network of teleports and<br />
fiber infrastructure. Intelsat General<br />
also offers these customers the option<br />
of placing a dedicated hosted<br />
communications payload aboard an<br />
Intelsat satellite. From remote military<br />
outposts, disaster recovery sites<br />
and U.S. embassies to health and<br />
homeland security agencies, Intelsat<br />
General’s solutions support even the<br />
most complex operations, from routine<br />
to mission-critical, anywhere on<br />
the globe. These solutions address<br />
the numerous communications challenges<br />
inherent in a wide range of applications.<br />
From Airborne ISR/UAV<br />
scenarios to Distance Learning to<br />
Logistics, Intelsat General engineers<br />
can enhance government, military<br />
and commercial communications to<br />
allow customers to achieve their mission<br />
objectives. www.intelsatgeneral.<br />
com<br />
About Intelsat<br />
Intelsat S.A. (NYSE: I) operates the<br />
world’s first Globalized Network, delivering<br />
high-quality, cost-effective<br />
video and broadband services anywhere<br />
in the world. Intelsat’s Globalized<br />
Network combines the world’s<br />
largest satellite backbone with terrestrial<br />
infrastructure, managed<br />
services and an open, interoperable<br />
53<br />
architecture to enable customers to<br />
drive revenue and reach through a<br />
new generation of network services.<br />
Thousands of organizations serving<br />
billions of people worldwide rely on<br />
Intelsat to provide ubiquitous broadband<br />
connectivity, multi-format video<br />
broadcasting, secure satellite communications<br />
and seamless mobility<br />
services. The end result is an entirely<br />
new world, one that allows us to envision<br />
the impossible, connect without<br />
boundaries and transform the ways in<br />
which we live. For more information,<br />
visit www.intelsat.com.<br />
About L-3 Communication<br />
Systems-West<br />
L-3 Communication Systems-West<br />
(L-3 CS-West) is a leader in communications<br />
systems for high-performance<br />
intelligence collection,<br />
imagery processing and satellite communications<br />
for the DoD and other<br />
government agencies. The company<br />
provides high data rate, wideband,<br />
protected, real-time communications<br />
systems for surveillance, reconnaissance<br />
and other airborne intelligence<br />
collection systems. To learn<br />
more about L-3 CS-West, please visit<br />
the company’s website at www.L-3com.<br />
com/csw.
Marrying mobility and location<br />
data for effective disaster response<br />
Continued from page 11<br />
gatherings, officials can draw from<br />
lessons learned in other locales.<br />
A second inventory, of resources,<br />
should go beyond the number of<br />
vehicles, responders and facilities to<br />
include participation by an enlightened<br />
public and an understanding<br />
that the list of agencies involved<br />
grows longer.<br />
Combining those inventories<br />
should generate programs and test<br />
scenarios to determine their validity<br />
and shortcomings. Using those<br />
programs and test scenarios, which<br />
are part every emergency response<br />
system, officials individually or in<br />
concert with others in the region<br />
should take on the responsibility of<br />
engaging with industry to find the<br />
gaps between the two inventories<br />
and build solutions to bridge those<br />
gaps.<br />
Waiting for a vendor to knock<br />
on a door isn’t enough. Emergency<br />
response planners need to be proactive<br />
in learning what is available.<br />
The answers are there. Planners just<br />
need to ask the questions.<br />
In many cases, solutions involve<br />
making sure that public involvement<br />
is encouraged through intuitive<br />
interaction. Those mobile device<br />
contributors by and large aren’t<br />
GIS trained and don’t care to be.<br />
They just want the wherewithal to<br />
help get data that decision-makers<br />
can use to solve a problem.<br />
In most cases, solutions are specific<br />
to unique problems of a city<br />
or state or geographic region. With<br />
disaster relief, there is no one-sizefits-all.<br />
People just want the right response<br />
at the right place at the right<br />
time.<br />
Disaster relief can and should<br />
work this way: adapting and responding<br />
to evolving requirements<br />
with emerging solutions that marry<br />
mobility and data sharing in a way<br />
that allows both to cope with everchanging<br />
needs generated by disasters.<br />
These are the real lessons of Katrina,<br />
of Haiti and Japan and elsewhere,<br />
and to Paris and San Bernardino.<br />
They are lessons that, once<br />
learned, can help responders to be<br />
better ready for the next emergency.<br />
Scott Lee is director of federal sales<br />
for TerraGo Technologies. For more<br />
information, visit: http://www.terragotech.com/<br />
54<br />
Nativists line up in support of<br />
Trump’s Presidential campaign<br />
Continued from page 41<br />
this isn’t a campaign, this is a movement.”<br />
Former Arizona governor Jan<br />
Brewer opines that:<br />
“A nation without borders is like<br />
a house without walls–it collapses.<br />
As Arizona’s Governor, I witnessed<br />
too much heartache, loss and suffering<br />
caused by illegal immigration.<br />
For years I pleaded with the federal<br />
government to do their job and secure<br />
our border. Today, we can elect<br />
a President who will do just that—<br />
Donald J. Trump.”<br />
And Kris Kobach, the Kansas<br />
secretary of state who crafted antiimmigrant<br />
laws in Arizona and Alabama,<br />
declares that:<br />
“Now, more than ever, America<br />
needs Mr. Trump’s aggressive approach<br />
to the problem of illegal<br />
immigration. Our porous borders<br />
constitute a huge national security<br />
threat, and our refugee system has<br />
been abused by terrorists in the past<br />
and is likely to be abused by ISIS<br />
terrorists today. Moreover, there are<br />
too many Americans who are out<br />
of work because of illegal immigration.”<br />
It should be noted that mass deportation<br />
is just one element of<br />
Trump’s immigration platform that<br />
nativists find so appealing. There is<br />
also the plan to build a wall along
the entire U.S.-Mexico border (and<br />
somehow making the Mexican government<br />
pay for it). And there is<br />
the proposed banning of all Muslim<br />
immigration to the United States.<br />
These and the other immigrationrelated<br />
proposals of the Trump<br />
campaign are as impractical as they<br />
are inhumane.<br />
Moreover, they take no account<br />
of the economic damage that policies<br />
of this kind would inflict upon<br />
the United States. Consider just the<br />
mass deportation plan. According<br />
to the conservative American Action<br />
Forum:<br />
“… it will cost $100-$300 billion<br />
to implement, and require a minimum<br />
of 17,296 chartered flights<br />
and 30,701 chartered bus trips each<br />
year. Additionally, the federal government<br />
would need to increase<br />
federal immigration apprehension<br />
personnel from 4,844 to 90,582; increase<br />
immigration courts from 58<br />
to 1,316; and increase the number<br />
of federal attorneys from 1,430 to<br />
32,445. Lastly, AAF also found that<br />
the proposal would slow U.S. economic<br />
growth by $1 trillion.”<br />
Leaving aside the sheer inhumanity<br />
of the proposal, this is an economic<br />
disaster waiting to happen.<br />
It’s not exactly the kind of policy<br />
prescription you’d expect from a<br />
businessman.<br />
Xenophobic immigration policy<br />
would wreck the U.S. Economy<br />
Continued from page 43<br />
the economic damage wrought by<br />
the expulsion of millions of people<br />
from the country would be massive<br />
and would ripple through a wide<br />
range of industries. As a January 11<br />
story in Politico describes:<br />
“If 11 million immigrants were<br />
rounded up and removed from the<br />
country, many of the jobs they do —<br />
including restaurant, hotel and lowend<br />
construction work — could<br />
go largely unfilled, economists say.<br />
That would create a large and immediate<br />
hit to gross domestic product<br />
growth and the effects would<br />
ripple out to companies that supply<br />
goods and services to all those businesses.<br />
There would also be 11 million<br />
fewer people consuming goods<br />
and services, further driving down<br />
economic activity.”<br />
According to a 2015 report from<br />
the conservative American Action<br />
Forum, the effort to actually remove<br />
that many people from the United<br />
States, and prevent any new unauthorized<br />
immigrants from coming<br />
in their place, would be enormous:<br />
“Depending on how the government<br />
conducts its apprehensions, it<br />
would need to spend $100 billion to<br />
$300 billion arresting and removing<br />
all undocumented immigrants residing<br />
in the country, a process that<br />
55<br />
we estimate would take 20 years. In<br />
addition, to prevent any new undocumented<br />
immigrants going forward,<br />
the government would at a<br />
minimum have to maintain current<br />
immigration enforcement levels.<br />
This results in an additional $315<br />
billion in continuing enforcement<br />
costs over that time period.”<br />
On top of that would be the<br />
broader economic impact of losing<br />
so many workers and consumers:<br />
“Removing all undocumented<br />
immigrants would cause the labor<br />
force to shrink by 6.4 percent, which<br />
translates to a loss of 11 million<br />
workers. As a result, 20 years from<br />
now the economy would be nearly 6<br />
percent or $1.6 trillion smaller than<br />
it would be if the government did<br />
not remove all undocumented immigrants.<br />
While this impact would<br />
be found throughout the economy,<br />
the agriculture, construction, retail<br />
and hospitality sectors would be especially<br />
strongly affected.”<br />
Building and maintaining an ineffective<br />
border wall will waste tens of<br />
billions of dollars. Mass deportation<br />
will result in a smaller labor force,<br />
declining levels of consumer spending,<br />
and a diminished GDP. This is<br />
a recipe for economic catastrophe.<br />
And this is what the Trump/Cruz<br />
approach to immigration heralds<br />
for the United States.
Coming Attractions – <strong>2016</strong><br />
April <strong>Digital</strong><br />
Technology Focus:<br />
Video Surveillance<br />
Market Focus:<br />
Maritime/Coastal<br />
Port Security<br />
Plus<br />
Guest Cyber Expert<br />
May <strong>Digital</strong><br />
Technology Focus:<br />
Satellite Communications<br />
Market Focus:<br />
Law Enforcement/<br />
Public Safety<br />
Plus Education Profile<br />
June <strong>Digital</strong><br />
Technology Focus:<br />
Disaster Preparation<br />
And Response<br />
Market Focus:<br />
City/State/County/<br />
Municipal Security<br />
Plus<br />
Guest Cyber Expert<br />
July Print<br />
Technology Focus:<br />
Perimeter Protection/<br />
Intrusion Detection<br />
Market Focus:<br />
Airport/Aviation<br />
Security<br />
Plus<br />
Facility Security Expert<br />
For <strong>GSN</strong> Media Kit or Advertising Rates,<br />
contact Publisher Mike Madsen<br />
at 732-233-8119<br />
or by email at<br />
mmadsen@gsnmagazine.com<br />
56
The News Leader in Physical, IT and Homeland Security<br />
CEO/Editorial Director:<br />
Adrian Courtenay<br />
(O) 212-344-0759, X3<br />
(C) 917-696-5782<br />
acourtenay@gsnmagazine.com<br />
Publisher:<br />
Michael Madsen<br />
(O) 212-344-0759, X1<br />
(C) 732-233-8119<br />
mmadsen@gsnmagazine.com<br />
Senior Writer:<br />
Steve Bittenbender<br />
(C) 502-552-1450<br />
sbittenbender@gsnmagazine.com<br />
Senior Writer:<br />
Karen Ferrick-Roman<br />
(C) 412-671-1456<br />
karenferrickroman@gmail.com<br />
Columnist:<br />
John Convy<br />
Convy on Netcentric Security<br />
john@convyassociates.com<br />
Columnist:<br />
Shawn Campbell<br />
shawn.campbell@safenetat.com<br />
Columnist:<br />
George Lane<br />
georgelane@hotmail.com<br />
Art Director:<br />
Gerry O’Hara<br />
OHDesign3<br />
(C) 203-249-0626<br />
gerry@ohd3.com<br />
Production Director:<br />
Tammy Waitt<br />
(O) 732-233-0245<br />
twaitt@gsnmagazine.com<br />
Mailing Address:<br />
Government Security News<br />
P.O. Box 7608<br />
Greenwich, CT 06836<br />
Government Security News (ISSN 1548-940X and UPS 022-845) is published in six print editions (Jan, Mar, May, Jul, Sep, Nov) and<br />
six digital editions (Feb, Apr, Jun, Aug, Oct, Dec) per year by World Business Media, LLC, P.O. Box 7608, Greenwich, CT 06836.<br />
Telephone (212) 344-0759. Periodicals postage paid at New York, NY and additional mailing offices. POSTMASTER: Send address<br />
changes to <strong>GSN</strong>: Government Security News, Subscription Department, P.O. Box 316, Congers, NY 10920-0316. For Government<br />
decision makers and business executives involved with security products, systems and series. Qualified U.S. subscribers received<br />
<strong>GSN</strong>: Government Security News at no charge. Non-qualified subscribers in the U.S. are charged $75.00 per year. Canadian and<br />
foreign subscribers are charged $140 International Airmail. Copyright <strong>2016</strong> by <strong>GSN</strong>: Government Security News. All rights reserved.<br />
Printed in the U.S.A. <strong>GSN</strong>: Government Security News assumes resonsibility for validity of claims in items reported.<br />
57