GSN_Apr_FINAL+links
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
Government Security News<br />
APRIL 2017 DIGITAL EDITION<br />
RVSS deployed for protection across the southern U.S. border, with PureActiv as its central<br />
monitoring and video intelligence platform, receives Full Operating Capability from DHS’<br />
Customs and Border Protection (CBP) – Page 8<br />
Also in this issue:<br />
For proactive security, Major General (res.) Aharon Zeevi Farkash, Founder and President of FST Biometrics,<br />
recommends building an aquarium– Page 6<br />
UTER Professor, Immigration Council question need for additional ICE and Border Patrol Agents,<br />
by Steve Bittenbender– Page 13
<strong>GSN</strong> <strong>Apr</strong>il 2017 Digital Edition Table of Contents<br />
NEWS<br />
FEATURES<br />
4<br />
5<br />
6<br />
8<br />
11<br />
12<br />
13<br />
14<br />
16<br />
American-based Securiport’s intelligent immigration<br />
control aids in capture of two high-level ISIS terrorists<br />
at Senegal Airport<br />
G4S Security Integration achieves<br />
OHSAS 18001:2007 Certification<br />
For proactive security, says Israeli Major General (res.) Aharon Zeevi Farkash,<br />
Founder and President of FST biometrics, suggests building an aquarium<br />
RVSS achieves “Full Operating Capability”<br />
designation on Southern U.S. Border;<br />
CBP deployment features PureActive Geospatial C2<br />
and Video Analytics<br />
Pelco showcases latest technology innovations<br />
and strategic application solutions to Securika/MIPS 2017<br />
OnSSI integration with Jemez Technology improves<br />
perimeter protection surveillance effectiveness<br />
UTEP professor, Immigrant Council, question need for<br />
additional ICE and Border Security Patrol Agents,<br />
by Steve Bittenbender<br />
IRIS enters into global collaboration with TruTag<br />
in alliance that will create global market for the<br />
digitization of mission-critical smartcards and<br />
secure labels<br />
How to improve refugee vetting now –<br />
a 9/11 Commission border council perspective<br />
SPECIAL REPORT ON LAW ENFORCEMENT/PUBLIC SAFETY<br />
18<br />
20<br />
21<br />
22<br />
24<br />
26<br />
28<br />
29<br />
31<br />
32<br />
34<br />
36<br />
37<br />
38<br />
40<br />
San Francisco Department of Emergency Management<br />
selects NICE for 9-1-1 center grade<br />
Chicago considers ordinance requiring Panic Buttons<br />
for hotels<br />
Pro-Vision releases 1080p HD Video systems for law enforcement vehicles<br />
Taming the rising tide of digital evidence,<br />
by Linda Haelsen, NICE<br />
Kansas becomes first statewide deployment site<br />
of AT&T NextGen 911 Soltuion<br />
Rapid SOS secures $14M in investments to develop lifesaving 911 technology<br />
Cubic executive to discuss benefits of cloud hosting at transportation summit<br />
JW Fishers describes equipment now used to locate<br />
weapons and explosives<br />
Raytheon wins $375M contrast to modernize<br />
Air Force air and space operation centers<br />
Hikvision camera system to provide increased security for<br />
Miami Beach Holocaust Memorial<br />
SPECIAL REPORT ON CYBER THREATS & SOLUTIONS<br />
2 3<br />
Beyond Trust survey links breaches to aging federal infrastructure<br />
(ISC) 2 delivers cybersecurity workforce recommendations<br />
to White House Chief of Staff<br />
Imperva executive urges U.S. companies to evaluate pending<br />
EU cyber regulation<br />
Report: Municipal governments lack funding to reach high level of cybersecurity<br />
Cybersecurity executives ‘Wannacrypt’ ransomware attack a wake-up call<br />
for industry, government leaders
American-based Securiport’s intelligent<br />
immigration control aids in the capture of two<br />
high-level ISIS terrorists at Senegal airport<br />
<strong>Apr</strong>il 18, 2017—According to several<br />
media reports, Securiport, a<br />
global leader in intelligent immigration<br />
controls and civil aviation<br />
security solutions, helped Senegalese<br />
authorities apprehend two<br />
high-ranking Daesh—most commonly<br />
referred to as ISIS—jihadists<br />
in the Senegal Airport.<br />
The suspects—of Moroccan descent—were<br />
traveling from Istanbul<br />
when they were flagged by Securiport’s<br />
global security system and<br />
arrested immediately. The names of<br />
the suspects have yet to be released,<br />
but they are the 36th terrorists to be<br />
captured by Senegalese authorities<br />
this year.<br />
In this globally connected world,<br />
ensuring strategic border security<br />
has become a high priority for European,<br />
Middle Eastern and African<br />
nations alike. Terrorists don’t<br />
respect international borders, so the<br />
need for implementing strong immigration<br />
control measures is imperative.<br />
As criminals and terrorists<br />
move across borders undetected,<br />
utilizing intelligent immigration<br />
control is a critical weapon in the<br />
fight against these new threats.<br />
And nowhere is there a greater<br />
need for border security than at<br />
airports. In 2016 Interpol flagged<br />
115,000 people attempting to use<br />
fraudulent passports and travel<br />
documents. That’s why countries<br />
typically ravaged by terrorists and<br />
criminals illegally crossing their<br />
borders are now relying on sophisticated<br />
airport security to assist them<br />
with their security.<br />
With this technology, and with<br />
the assistance of specially trained<br />
personnel, airports now have access<br />
to comprehensive biometric and<br />
passport screening technology in<br />
an integrated system, and real-time<br />
access to Interpol and similar international<br />
security-related databases.<br />
Securiport provides proprietary<br />
security solutions to governments<br />
in need. With state-of-the-art airport<br />
security, Securiport stems the<br />
flow of criminals and terrorists<br />
across borders by maximizing the<br />
usage of the most sophisticated<br />
predictive analytics tools, and big<br />
data, to keep airport passengers,<br />
and the world, safe.<br />
About Securiport<br />
Securiport LLC is a global leader<br />
in the design and implementation<br />
of civil aviation security, biometric<br />
screening, immigration control,<br />
and threat assessment systems.<br />
Headquartered in Washington, DC,<br />
USA, Securiport partners with governments<br />
from around the world.<br />
Securiport’s Civil Aviation and Immigration<br />
Security Services, a comprehensive<br />
security product that<br />
performs secure biometric recognition<br />
of travelers at immigration<br />
posts, provides proprietary systems<br />
for the identification of potential<br />
security risks, criminal activity, and<br />
disease prevention. Learn more at<br />
http://www.securiport.com.<br />
G4S Secure Integration achieves<br />
OHSAS 18001:2007 Certification<br />
Frank Cirone, G4S Secure<br />
Integration President<br />
Omaha, NE, May 1, 2017 – G4S Secure<br />
Integration’s corporate office in<br />
Omaha, NE has recently achieved<br />
registration to the Occupational<br />
Health and Safety Assessment Series<br />
(OHSAS) 18001:2007 specification.<br />
OHSAS is an internationally recognized<br />
standard for safety management<br />
systems; focusing<br />
on the management of<br />
risk, legal compliance<br />
and continuous improvement.<br />
G4S Secure Integration,<br />
part of G4S, is a<br />
leading systems integrator<br />
that brings innovative,<br />
flexible, and<br />
cost-efficient thinking<br />
to the design, construction,<br />
and maintenance of standalone<br />
or integrated communication<br />
networks and electronic security<br />
systems. Headquartered in Omaha,<br />
NE with sales and support nationwide,<br />
G4S Secure Integration provides<br />
customers with industry leading<br />
security solutions.<br />
Frank Cirone, G4S Secure Integration<br />
President, states, “by receiving<br />
this certification, it not only<br />
validates our commitment to a positive<br />
safety culture to employees, but<br />
to customers and business partners<br />
as well.”<br />
G4S Secure Integration partnered<br />
with Lloyd’s Register Quality<br />
Assurance (LRAQ) USA for the<br />
auditing and registration to the<br />
OHSAS 18001 standard. Lloyd’s<br />
Register Quality Assurance<br />
(LRQA) is the<br />
world’s leading provider<br />
of independent<br />
assessment services<br />
including certification,<br />
validation, verification<br />
and training<br />
across a broad spectrum<br />
of standards and<br />
schemes, with recognition<br />
from over 50<br />
accreditation bodies around the<br />
world.<br />
About G4S<br />
4 5<br />
G4S is the leading global, integrated<br />
security company, specializing in<br />
the provision of security services<br />
and solutions to customers. Our<br />
mission is to create material, sustainable<br />
value for our customers<br />
and shareholders by being the supply<br />
partner of choice in all our markets.<br />
G4S is quoted on the London<br />
Stock Exchange and has a secondary<br />
stock exchange listing in Copenhagen.<br />
G4S is active in around<br />
100 countries and has 600,000 employees.<br />
For more information on<br />
G4S, visit www.g4s.us.<br />
FREE SUBSCRIPTION<br />
SIGN-UP<br />
Monthly Digital Edition<br />
Airport/Seaport Newsletter<br />
Daily Insider Newsletter<br />
Cybersecurity Newsletter<br />
CLICK HERE
For proactive security, build an aquarium<br />
Major General (res.)<br />
Aharon Zeevi Farkash,<br />
Founder and President<br />
of FST Biometrics<br />
This year there has been<br />
a significant increase in<br />
global terror. From Nice<br />
to Baghdad, Istanbul to<br />
Belgium and Tel Aviv,<br />
security agencies around the world<br />
are fully engaged in trying to prevent<br />
the next attack. In my extensive<br />
career in the Israel Defense Forces,<br />
and in particular within the intelligence<br />
community, I was constantly<br />
trying to create a “formula”, to look<br />
for that magic source of information<br />
that could help us prevent future attacks.<br />
And in that process, I learned two<br />
important truths:<br />
1. Such a solution does not exist.<br />
There is no one source of information<br />
that can help security forces<br />
prevent the next terror event.<br />
2. The next best thing is to build<br />
yourself an aquarium.<br />
Yes, that’s right. An aquarium. But,<br />
this aquarium isn’t filled with fish<br />
and a sunken plastic pirate ship.<br />
This is an aquarium of<br />
information, an ecosystem<br />
of sensors that combine<br />
to provide a clearer<br />
picture of the situations<br />
that security agencies<br />
must assess to prevent<br />
attacks from happening.<br />
This “intelligence<br />
aquarium” was filled<br />
with an array of sensors: signal intelligence,<br />
cyber intelligence, visual<br />
intelligence - not only from satellites-<br />
surveillance balloons, drones,<br />
special forces, human intelligence,<br />
interrogations and others. Any of<br />
these sources alone would do us<br />
no good; combined, they provided<br />
a clear picture of the security landscape.<br />
We fused all of this information,<br />
almost in real-time, into actionable<br />
intelligence for end-users (special<br />
forces, air force, any actor who<br />
could utilize the intelligence). This<br />
led me to understand the power of<br />
fusion. This real-time data fusion allows<br />
agencies to approach security<br />
with a preventative philosophy. We<br />
don’t want to look back at events after<br />
they happen, or learn lessons after<br />
another tragedy; we want to stop<br />
it before it happens.<br />
The power of fusion is the key to<br />
6<br />
effective preventative security.<br />
How Global Mega Trends Lead to<br />
the Demand for Convenient Security<br />
There are two mega trends in the<br />
world right now: 1) Urbanization<br />
and the rise of the megacities, which<br />
inevitably leads to rising crime rates,<br />
and 2) the need to prevent terrorism,<br />
which has become greater in<br />
the past year. With these two trends,<br />
increased security has become a necessity.<br />
But, security must also fit<br />
the pace of life. We do not want to<br />
live in a police state.<br />
Biometric technology provides an<br />
answer to this. If we can quickly and<br />
securely identify individuals before<br />
they enter a building – or prevent<br />
them from doing so – many security<br />
situations can be prevented before<br />
they take place. However, the lessons<br />
I learned from my intelligence<br />
experience apply to biometrics as<br />
well. Any sensor on its own – facial<br />
recognition, fingerprints, iris recognition,<br />
voice recognition – cannot<br />
provide the accuracy, speed, or the<br />
aesthetics needed for strong security<br />
that is also convenient for the<br />
public.<br />
Developing an effective biometric<br />
technology for secure access<br />
More on page 31<br />
ABOVE.<br />
BEYOND.<br />
Identify high risk individuals and activity<br />
with smarter passenger profiling.<br />
SITA’s iBorders® RiskManagement<br />
takes all available information<br />
and transforms it into actionable<br />
intelligence, both in real time<br />
and as part of building a case<br />
for investigation.<br />
Download our white paper to discover<br />
how SITA iBorders can help build<br />
intelligence into border operations.<br />
DISCOVER MORE
RVSS achieves “Full Operating Capability”<br />
designation on southern U.S. Border<br />
CBP deployment features PureActiv Geospatial C2 and Video Analytics.<br />
PHOENIX, AZ – The recent designation<br />
by the U.S Department of<br />
Homeland Security’s Customs and<br />
Border Protection (CBP) granted<br />
“Full Operating Capability” of<br />
General Dynamics’ Remote Video<br />
Surveillance Systems (RVSS) deployed<br />
for protection across the<br />
southern border of the United<br />
States. An important component<br />
of the RVSS system is PureTech<br />
Systems’ Geospatial Video Management<br />
System for Command<br />
and Control and the PureActiv®<br />
patented video analytics used for<br />
real-time automated long range<br />
detection, classification, and tracking<br />
in support of CBP’s mission<br />
along the U.S southern border.<br />
“Achieving this approval is a<br />
great accomplishment and we’re<br />
honored to be an instrumental part<br />
of the solution that is helping the<br />
great men and women of Customs<br />
and Border Protection protect<br />
our nation’s borders,” commented<br />
Larry Bowe, president and CEO of<br />
PureTech Systems. “Reaching this<br />
milestone was truly a team effort<br />
with all those involved.”<br />
General Dynamics, was awarded<br />
the contract to upgrade the RVSS<br />
capability along the southern U.S.<br />
border in July of 2013 with field<br />
deployments, including the Pure-<br />
Activ system, beginning in 2015.<br />
The RVSS system consists of a series<br />
of elevated towers and structures<br />
equipped with advanced<br />
electro-optical and infrared sensors<br />
enabled with video intelligence<br />
and advanced sensor control<br />
developed by PureTech Systems to<br />
provide persistent ground surveillance<br />
to border patrol agents.<br />
In their release, General Dynamics<br />
Information Technology’s IT<br />
Services and Solutions sector vice<br />
president and general manager,<br />
Dan Busby, quoted that, “Reaching<br />
a full operating capability designation<br />
is a testament to both the<br />
effectiveness of the RVSS solution<br />
and our continued partnership<br />
with CBP. The RVSS upgrade will<br />
continue to provide CBP and U.S.<br />
law enforcement personnel with<br />
the advanced technology necessary<br />
to secure our nation’s borders<br />
and increase agent safety through<br />
enhanced situational awareness.”<br />
Also quoted in the release was<br />
Ronald D. Vitiello, Chief of CBP’s<br />
U.S. Border Patrol, who said “The<br />
deployment of the Remote Video<br />
Surveillance System is important<br />
to the safety of our agents and to<br />
our mission. Successful partnerships<br />
like the one we have with the<br />
General Dynamics team, are necessary<br />
to efficiently and effectively<br />
secure the border.”<br />
The recent “Full Operating Capability”<br />
milestone was the culmination<br />
of two years of deployment<br />
and field testing at key locations<br />
across the southwest, including the<br />
Arizona sites of Nogales, Douglas,<br />
Naco and Ajo, as well as, the McAl-<br />
8 9<br />
len and Laredo locations in Texas.<br />
The RVSS Upgrade program has<br />
a potential 10-year performance<br />
period, during which the General<br />
Dynamics OneSource team, will<br />
manage the operation and maintenance<br />
at all sites.<br />
About PureTech Systems Inc.<br />
PureTech Systems Inc. is a manufacturer<br />
of wide-area perimeter<br />
surveillance software solutions including<br />
internally developed outdoor<br />
video analytics, multi-sensor<br />
integration and a map-based (real<br />
object size) command and control.<br />
PureTech Systems serves fortune<br />
1000 firms, petro-chemical, water<br />
and electric utilities, seaports, airports<br />
and federal, state and local<br />
governments. PureTech Systems,<br />
headquartered in Phoenix, Arizona,<br />
delivers and supports installations<br />
throughout the world. To<br />
find out more about PureTech Systems<br />
Inc. visit our website at www.<br />
puretechsystems.com, follow us at<br />
@PureTechSystems or contact Eric<br />
Olson at 602-424-9842 or Eric.Olson@PureTechSystems.com.
Pelco showcases latest technology innovations and<br />
strategic application solutions to Securika/MIPS 2017<br />
FROM OUT Of THE BOX<br />
to STATE OF THE ART.<br />
ID CARD PRINTING INNOVATION.<br />
HID Global is leading the industry with the most robust portfolio of secure ID issuance<br />
solutions in the world. Our FARGO® line of printers and encoders provide governments,<br />
financial institutions and businesses of all sizes fast, efficient and reliable solutions that<br />
are as secure as they are affordable.<br />
You’ll call it innovation on demand. We call it, “your security connected.”<br />
YOUR SECURITY. CONNECTED | Visit us at hidglobal.com/printers<br />
© 2016 HID Global Corporation/ASSA ABLOY AB. All rights reserved. HID, HID Global, the HID Blue Brick logo, and the Chain Design are trademarks<br />
or registered trademarks of HID Global or its licensor(s)/supplier(s) in the US and other countries and may not be used without permission.<br />
MOSCOW, RUSSIA (March 7,<br />
2017) – Pelco by Schneider Electric,<br />
a global leader in surveillance and<br />
security products and technologies,<br />
will feature several of the company’s<br />
advanced security solutions at<br />
Securika/MIPS 2017, taking place<br />
at the Expocenter Fairgrounds in<br />
Moscow on March 21-14, 2017.<br />
Highlighted innovations on display<br />
include the powerful open<br />
platform VideoXpert Video Management<br />
Software (VMS) designed<br />
to control with confidence, a sneak<br />
peek of ExSite Enhanced Explosion<br />
Proof IP Cameras engineered<br />
to survive in the most challenging<br />
environments, and Sarix Enhanced<br />
IP Cameras that deliver the highest<br />
levels of low light performance<br />
when nothing but the best will do.<br />
“Security operations and procedures<br />
have become a core priority<br />
for businesses and organizations<br />
across every vertical market around<br />
the world as security professionals<br />
seek the most efficient and effective<br />
means to protect people, property<br />
and assets. This is especially pertinent<br />
for high-traffic public venues<br />
such as casinos and arenas,” said<br />
Diane Feliciano, VP, Global Marketing,<br />
Pelco by Schneider Electric. “At<br />
MIPS, attendees will<br />
witness firsthand how<br />
Pelco video surveillance<br />
and security solutions<br />
deliver higher levels of<br />
situational awareness, protection<br />
and even prevention<br />
when and where customers<br />
need it most.”<br />
In addition to highlighting<br />
system solutions with specific<br />
benefits for the casino and stadium<br />
markets, Pelco’s Securika/MIPS<br />
2017 display features strategic solutions<br />
for the oil and gas, city surveillance<br />
and hospitality vertical<br />
markets, and includes the following<br />
highlighted products:<br />
11<br />
ExSite Enhanced<br />
VideoXpert Video Management<br />
Software (VMS) dramatically improves<br />
the control of integrated surveillance<br />
and security solutions on<br />
a single platform, providing users<br />
with greater situational awareness<br />
so they can make more timely decisions<br />
and execute decisive action.<br />
VideoXpert’s open architecture enables<br />
third-party applications to<br />
be cost-effectively integrated for<br />
highly specialized applications in<br />
the hospitality, gaming and municipal<br />
surveillance markets. Recent<br />
enhancements<br />
to VideoXpert include:<br />
an enhanced<br />
user interface for<br />
improved centralized<br />
system management;<br />
incident management to<br />
easily and quickly correlate<br />
related video files; improved<br />
event management<br />
to customize event alerts with realtime<br />
visual notification; immersive<br />
viewing of 180°, 270° and 360° panoramic<br />
images from Pelco Optera<br />
Multi-Sensor Panoramic Cameras;<br />
and much more.<br />
Sarix Enhanced IP Cameras utilize<br />
Pelco’s exclusive SureVision 3.0<br />
low-light technology making Sarix<br />
imaging solutions ideal for hospitality<br />
and city surveillance, delivering<br />
quality images in as little as 0.05 lux<br />
with an incredible Wide Dynamic<br />
Range (WDR) of 130dB. Sarix Enhanced<br />
cameras are ONVIF Q compliant<br />
and are available in a wide<br />
selection of form factors for ease of<br />
integration into the hospitality and<br />
municipal surveillance markets, as<br />
well as many other mainstream applications.<br />
More on page 17
OnSSI integration with Jemez Technology improves<br />
perimeter surveillance effectiveness<br />
PEARL RIVER, NY (<strong>Apr</strong>il 12,<br />
2017) – OnSSI’s partnering initiative<br />
with Jemez Technology makes<br />
perimeter video surveillance solutions<br />
employing AXIS cameras even<br />
more effective in protecting critical<br />
assets and infrastructure. The Ocularis<br />
5 VMS platform’s open architecture<br />
enables integration with the<br />
Jemez Eagle-i Edge® solution and<br />
AXIS cameras to<br />
deliver a complete<br />
end-to-end<br />
solution.<br />
“The integration<br />
of Ocularis with Jemez software<br />
is a best-in-class fit for security management<br />
tasked with securing widearea,<br />
long-range environments,”<br />
said Mulli Diamant, VP of International<br />
Business Development,<br />
OnSSI. “OnSSI’s ability to embrace<br />
technology innovations from other<br />
leading manufacturers is an important<br />
factor in our continued ability<br />
to deliver cutting-edge VMS solutions<br />
for professional security applications<br />
and beyond.”<br />
Jemez Technology, established<br />
by former engineers and scientists<br />
from the Los Alamos National Laboratory<br />
(LANL), provides advanced<br />
area and perimeter surveillance solutions<br />
for corporate and homeland<br />
security, with emphasis on critical<br />
asset and infrastructure protection.<br />
The company’s Eagle-i Edge<br />
on-camera analytics platform, specifically<br />
designed and optimized forAXIS<br />
camera networks, integrates<br />
with OnSSI solutions to significantly<br />
improve threat detection capability<br />
and lower operational costs.<br />
“The integration<br />
of our Eaglei<br />
Edge platform<br />
with Ocularis<br />
optimizes<br />
system efficiency<br />
and performance,”<br />
said Ted Turner, Director<br />
of Global Sales, Jemez Technology.<br />
“Now, end users have improved<br />
management of high risk surveillance<br />
data with capabilities that enhance<br />
agility and control.”<br />
Ocularis 5 offers a unique combination<br />
of enhanced features, recording<br />
versatility, robust data security,<br />
and overall stability that transcend<br />
conventional VMS solutions. Recent<br />
additions to the Ocularis 5<br />
platform include: an auto-updating<br />
feature like those available on most<br />
smartphones and tablets; Smart<br />
Camera Driver technology that<br />
provides out-of-the-box support<br />
for newly introduced cameras from<br />
industry-leading camera manufacturers;<br />
camera mapping via GPS<br />
on Ocularis Maps; and a new Mobile<br />
app that enables the streaming<br />
of live video from Android smartphones<br />
and devices to and from the<br />
Ocularis 5 VMS.<br />
Ocularis is offered in three models:<br />
Professional, designed for organizations<br />
operating multiple locations<br />
with small to<br />
mid-sized camera<br />
counts; Enterprise, built<br />
for a wide range of mid<br />
to large IT-centric organizations;<br />
and Ultimate, created for<br />
large organizations with extended<br />
command and control needs and<br />
recording server failover.<br />
For more information on OnSSI,<br />
call 845-732-7900, e-mail info@onssi.com<br />
or visit www.onssi.com.<br />
About OnSSI<br />
On-Net Surveillance Systems, Inc.<br />
(OnSSI) was founded in 2002 with<br />
the goal of developing comprehensive<br />
and intelligent IP video surveil-<br />
More on page 42<br />
UTEP professor, Immigration Council question<br />
need for additional ICE and Border Patrol agents<br />
By Steve Bittenbender<br />
Editor, Government Security News<br />
On the same day a federal judge in<br />
California put a temporary halt on<br />
President Trump’s plan to withhold<br />
federal funds from sanctuary cities,<br />
a panel of immigration experts took<br />
aim at another aspect of Trump’s immigration<br />
and border control plan.<br />
The American Immigration<br />
Council held a teleconference Tuesday<br />
afternoon to discuss the Trump<br />
Administration’s plans to bolster<br />
the ranks of both Immigrations and<br />
Customs Enforcement and Border<br />
Patrol. The call came on the heels<br />
of a paper released by the Council<br />
from a University of Texas-El Paso<br />
professor who questioned the need<br />
for those additional agents.<br />
The most noted aspects of Trump’s<br />
immigration plan have been the<br />
proposed border wall between the<br />
United States and Mexico, the focus<br />
on limiting immigration from<br />
predominately Muslim nations and<br />
the emphasis on deporting undocumented<br />
aliens. However, the panel<br />
said Trump’s plan for more agents<br />
deserves greater scrutiny, especially<br />
since the number of undocumented<br />
aliens have dropped.<br />
A Pew Research Center report<br />
– also released on Tuesday – indicated<br />
there were about 11.3 million<br />
such individuals living in the United<br />
States last year. That’s nearly a million<br />
fewer than were here 10 years<br />
ago.<br />
In his paper and in the teleconference,<br />
Josiah McC. Heyman also<br />
expressed concerns about the risk<br />
of corruption within CBP<br />
and ICE as it expands<br />
its ranks. According to a<br />
New York Times report,<br />
CBP officers and Customs<br />
agents have taken more<br />
than $11 million in bribes<br />
from drug cartels and other<br />
criminals.<br />
“These two branches of<br />
the Department of Homeland Security<br />
(DHS) are poorly prepared<br />
to recruit, train, and supervise new<br />
personnel,” said Heyman, a professor<br />
of anthropology at UTEP and<br />
the director of the Center for Interamerican<br />
and Border Studies. “While<br />
the Border Patrol experienced some<br />
improvements in the aftermath of<br />
its last expansion, most recommendations<br />
for reform remain unimplemented.”<br />
In a memo to DHS officials two<br />
12 13<br />
Josiah McC. Heyman<br />
months ago, Homeland Security<br />
Secretary John Kelly said CBP did<br />
not have enough officers “to effectively<br />
detect, track, and apprehend<br />
all aliens illegally entering the United<br />
States.” While he called for the<br />
hiring to begin immediately, Kelly<br />
called on CBP to maintain consistency<br />
in training and standards<br />
when bringing the new agents on<br />
board.<br />
In fiscal year 2016, CBP<br />
had 19,828 agents and<br />
ICE had more than 20,000<br />
employees. Trump’s order<br />
calls for an additional<br />
5,000 CBP agents and<br />
10,000 more ICE staffers.<br />
Joshua Breisblatt, an<br />
analyst for the AIC, noted<br />
CBP, before Trump’s order, already<br />
authorized to have more than<br />
21,300 agents on staff. He added that<br />
Congress is currently considering<br />
Trump’s request for $300 million in<br />
funding to hire CBP and ICE agents<br />
this fiscal year, with more money requested<br />
for 2018.<br />
“These requests have come despite<br />
lower apprehension numbers at the<br />
border over the past few months,”<br />
Breisblatt said.<br />
More on page 42
IRIS enters into global collaboration with TruTag in<br />
alliance that will create global market for the digitization<br />
of mission-critical smartcards and secure labels<br />
KUALA LUMPUR, 2 May 2017 –<br />
IRIS Corporation Bhd (IRIS), a<br />
world leader in Trusted Identification<br />
(ID) will be partnering<br />
with leading U.S. authentication<br />
and digital security company,<br />
TruTag Technologies,<br />
Inc. to look into the potential<br />
for smartcard and secure label applications<br />
globally.<br />
TruTag has developed the world’s<br />
most advanced Optical Memory<br />
(iOM) device: a digital “cookie”<br />
that enables the digitization of the<br />
analogue world. TruTag’s iOM devices<br />
are dust-sized particles that<br />
can be embedded into the very fabric<br />
of a product without the need<br />
for packaging or labels. They are<br />
edible and covert, and can digitize a<br />
plethora of items for product intelligence,<br />
for effectively counteracting<br />
the US$1 trillion global problem of<br />
counterfeit and diverted products.<br />
IRIS Acting CEO Mr. Choong<br />
Choo Hock said the two parties<br />
would look at possible ways to work<br />
together to co-develop and offer a<br />
portfolio of smartcard and secure<br />
label products to customers in both<br />
the government and private sectors<br />
tant element of the corporate restructuring<br />
currently in process in<br />
IRIS, as it puts IRIS a few generations<br />
ahead of its peers in the secure<br />
and trusted ID business,” said Tan<br />
Sri Sharir.<br />
“The combined strengths and<br />
product portfolio of both companies<br />
will enable us to target practically<br />
every aspect of product authentication,<br />
including enhancing the safety<br />
and traceability of food an medicine,<br />
which is an<br />
issue of global<br />
importance.”<br />
said Dr. Hank<br />
Wuh, Founder<br />
and Chairman of<br />
TruTag Technologies.<br />
This collaboration<br />
with TruTag comes just 10 days<br />
after IRIS announced a partnership<br />
with Norway’s Zwipe, a company<br />
that offers biometric contactless<br />
payment cards and fingerprint authentication<br />
technology.<br />
tems integrator for eID, ePassport,<br />
border control, multiple credential<br />
identity management ecosystems,<br />
and payment systems for financial<br />
and transportation industries where<br />
authenticity, improved security,<br />
speed, accuracy and effectiveness<br />
are of paramount importance. IRIS’<br />
innovative solutions, applications<br />
and devices have been deployed in<br />
over 30 countries across the globe,<br />
reaching far into Asia, the Middle<br />
East and Africa.<br />
Learn more at<br />
www.iris.com.my.<br />
around the world.<br />
“As the pioneer of ePassport and<br />
multi-application eID technology,<br />
IRIS has been in trusted ID for<br />
over 20 years, with clients in over<br />
30 countries, including the U.S.,<br />
Canada, Italy, Norway and India.<br />
TruTag, on the other hand, is a leading<br />
U.S. authentication company,<br />
and the only company in the world<br />
with covert and ingestible (edible)<br />
optical memory microtags that can<br />
be applied to both consumables<br />
(pharmaceuticals, food and beverage)<br />
and secure documents. We are<br />
looking to provide multiple layers of<br />
security to secure labels and documents,<br />
including, but not limited to<br />
biometric smartcards and missioncritical<br />
labels such as airline baggage<br />
labels,” said Mr. Choong.<br />
“We are delighted to team up<br />
with IRIS Corporation as a pioneer<br />
and world leader in trusted<br />
Identification. The collaborative<br />
venture will look to<br />
providing secure documents<br />
and labels for various applications<br />
across different countries<br />
and industries, and we look forward<br />
About TruTag<br />
to working together with IRIS to<br />
Technologies,<br />
provide leading-edge authentication<br />
Inc.<br />
and data intelligence solutions<br />
TruTag Tech-<br />
to our customers with high levels<br />
nologies, Inc. is<br />
of security needs,” said Dr. Michael<br />
a leader in product authentication,<br />
Bartholomeusz, CEO of TruTag<br />
brand security and data intelligence<br />
Technologies.<br />
solutions. The TruTag® platform<br />
Federal Land Development Authority<br />
addresses the US$1 trillion global<br />
(“FELDA”), which holds a<br />
challenge of counterfeit, diverted<br />
21.33% stake in IRIS through Felda<br />
and adulterated products that impact<br />
the pharmaceutical, life scienc-<br />
Investment Corp. Sdn. Bhd. (“FIC”),<br />
is positive on the partnership between<br />
About IRIS Corporation Berhad<br />
es, food, electronics, industrial, and<br />
the two companies. Felda Founded in 1994, IRIS Corpora-<br />
consumer goods industries. TruTag<br />
chariman Tan Sri Sharir Samad said tion Berhad (ACE Market: IRIS) is iOMTM devices are edible, inert,<br />
the proposal will be discussed by a MSC-status technology innovator covert and can seamlessly integrate<br />
the boards of both FELDA and FIC and leading provider of solutions information into the very fabric of a<br />
to map out the potential markets and advancements for trusted identification<br />
product, independent of packaging<br />
and sectors to target.<br />
and payment. Since pio-<br />
and labels. TruTag can extend the In-<br />
“The expansion of IRIS’ product neering the world’s first electronic ternet of Things (IoT) to a plethora<br />
portfolio to include new, industrydefining<br />
passport in 1998, IRIS has set itself of new, non-web-connected objects<br />
technologies is an impor- apart as a dedicated end-to-end sys-<br />
and products, and are read using<br />
14 15<br />
handheld imagers programmed to<br />
authenticate a product’s provenance<br />
information. TruTag Technologies,<br />
Inc. has been recognized by the Edison<br />
Awards, Fast Company, R&D<br />
100, and was selected a Technology<br />
Pioneer by the World Economic Forum<br />
as one of the most influential<br />
technology companies in the world.<br />
Learn more at www.TruTags.com.<br />
©2016 All rights reserved. TRUTAG and TRUTAGS are registered<br />
trademarks and iOM is a trademark of TruTag Technologies,<br />
Inc.<br />
FREE SUBSCRIPTION<br />
SIGN-UP<br />
Monthly Digital Edition<br />
Airport/Seaport Newsletter<br />
Daily Insider Newsletter<br />
Cybersecurity Newsletter<br />
CLICK HERE
How to improve refugee vetting now – a 9/11<br />
Commission border counsel perspective<br />
Janice Kephart, former<br />
9/11 Commission<br />
border counsel<br />
and partner, IdSP<br />
WASHINGTON, <strong>Apr</strong>il 24, 2017 /<br />
PRNewswire-USNewswire/ -- Janice<br />
Kephart, former 9/11 Commission<br />
border counsel and partner<br />
with Identity Strategy Partners, LLP<br />
(IdSP), today issues the following<br />
statement:<br />
“With or without President<br />
Trump’s March 6, 2017 Executive<br />
Order: Protecting the Nation from<br />
Foreign Terrorist Entry, refugee vetting<br />
can be instilled with greater<br />
confidence, enabling the reactivation<br />
of legitimate refugee resettlement.<br />
(Right now, all refugee applications<br />
are suspended by until at<br />
least July 2017). Improvements in<br />
current refugee vetting will require<br />
a language change to current law,<br />
identity enrollment taking place<br />
earlier in the process, and the implementation<br />
of a long-ignored 9/11<br />
Commission recommendation. But<br />
improvement is doable, and now.<br />
So why does the refugee population<br />
present a threat to national<br />
security? The reason is twofold: (1)<br />
intelligence for years has revealed<br />
a terrorist travel tactic of infiltrating<br />
refugee populations for eventual<br />
resettlement into Europe or the<br />
United States, and (2) by legal definition<br />
refugees are displaced persons<br />
with unknown identity. Even<br />
for those with an ID, establishing<br />
its authenticity or trusting its origin<br />
is difficult since by policy, no information<br />
is shared with the home<br />
country, so there is no country of<br />
origin against which to run checks<br />
as in a regular visa referral. Since<br />
the refugee demographic tends to<br />
be anonymous, it is more difficult to<br />
ensure a person is who they say they<br />
are, and then affiliate that identity<br />
with intelligence and other potentially<br />
significant financial or other<br />
data. In short, limited identity and<br />
intelligence information<br />
diminish confidence in<br />
recommendations about<br />
which refugees to accept<br />
for U.S. resettlement.<br />
The program responsible<br />
for vetting refugees<br />
seeking U.S. resettlement<br />
is the United States Refugee<br />
Admissions Program<br />
(USRAP). It is run jointly<br />
by the State Department,<br />
who receives referrals<br />
from the United Nations<br />
and conducts initial processing including<br />
a biographic name check,<br />
and the U.S. Citizenship and Immigration<br />
Service (USCIS), who conducts<br />
more in-depth interviews and<br />
collects biometrics from applicants.<br />
The program has been fine-tuned<br />
over many years. Yet the program<br />
requires vital improvements, and<br />
the recommendations below should<br />
be considered minimum baseline<br />
requirements.<br />
Congress must change law to<br />
enable U.S. access to refugee<br />
biometric data collected by the<br />
United Nations.<br />
Since 2013, the United Nations has<br />
a sophisticated biometric identity<br />
management system<br />
that collects 10 fingerprints,<br />
two irises, and<br />
face of every refugee,<br />
sometimes two to four<br />
years before a U.S. referral<br />
for initial biographic<br />
screening. Right now,<br />
due to an archaic law<br />
that prevents sharing of<br />
biometric information<br />
collected by a non-U.S.<br />
citizen, the U.S. has no<br />
access to this key identity<br />
information. The law needs to<br />
change to permit that biometric<br />
data be available for vetting against<br />
federal databases from designated<br />
international partners such as the<br />
United Nations.<br />
Refugees must be biometrically<br />
enrolled the first time they enter the<br />
U.S. system.<br />
State does not collect any biometrics<br />
from refugees, and thus only<br />
has the word of the refugee as to<br />
who they are, making the required<br />
biographic checks a potential goose<br />
chase. While USCIS does collect<br />
rolled prints and a face photo at the<br />
time of the interview, current vetting<br />
against some U.S. biometric<br />
holdings do not return results for<br />
up to 24 hours, after the interview<br />
is already over. If State collected<br />
the biometrics as part of their prescreening<br />
interviews conducted<br />
by their Resettlement Service staff,<br />
USCIS interviews would be better<br />
informed, and so would the final assessment.<br />
Implement the 9/11 Commission<br />
recommendation for a<br />
person-centric immigration system.<br />
State and USCIS use different case<br />
filing assignments for refugees.<br />
Policy does not require that State<br />
initiate a file number that USCIS<br />
recognizes or uses in the processing<br />
of the ultimate immigration benefit<br />
the refugee seeks. Thus, each applicant<br />
has two different file numbers,<br />
creating disconnect and potential<br />
for confusion and duplication. Yet<br />
Pelco showcases latest<br />
technology innovations and<br />
strategic application solutions<br />
Continued from page 11<br />
ExSite Enhanced HD Cameras<br />
are explosion proof and virtually<br />
indestructible with performance<br />
features that include: a robotically<br />
welded housing for use in extreme<br />
conditions; a unique patent-pending<br />
pan-tilt drive system devoid of<br />
belts, gears or pulleys; operation in<br />
the problem could be eliminated<br />
entirely if case numbers were eradicated<br />
and the 9/11 Commission<br />
recommendation for a biometricbased<br />
identity number for the entire<br />
immigration system were put in its<br />
place. When biometrics become the<br />
baseline for any immigration encounter,<br />
identity is protected and<br />
the automatic creation of a timeline<br />
of immigration encounters reduces<br />
fraud and increases efficiencies for<br />
legal immigration. Implementation<br />
of this long ignored 9/11 Commission<br />
recommendation could drastically<br />
improve the U.S. immigration<br />
system, and with it, refugee vetting<br />
as it stands today.”<br />
Contact: Janice Kephar , (202) 750-<br />
4858, SOURCE Identity Strategy<br />
Partners (IdSP)<br />
16 17<br />
extreme temperatures; 30X optical<br />
zoom with image stabilization; IR<br />
illumination; 130dB WDR; 0.03 lux<br />
ultra-low light performance; integrated<br />
Ethernet, fiber, Ethernet over<br />
Coax (EoC) and Unshielded Twisted<br />
Pair (UTP) transmission, and<br />
more. ExSite is an exceptional imaging<br />
solution for oil and gas facilities,<br />
chemical plants, manufacturing and<br />
marine facilities, and for numerous<br />
other demanding environments.<br />
For more information or to schedule<br />
a demo, contact evgeni.tochev@<br />
schneider-electric.com or visit www.<br />
pelco.com.<br />
About Pelco by Schneider Electric<br />
Pelco by Schneider Electric is a<br />
global leader in professional video<br />
surveillance and security system<br />
products and technologies with<br />
a local presence in 136 countries<br />
and over 4000 integration partners<br />
worldwide. Our personal engagement<br />
with customers, resellers and<br />
technology partners drives the development<br />
and deployment of surveillance<br />
and security solutions<br />
with meaningful innovation. It’s the<br />
foundation that Pelco has built its<br />
brand upon for over 25 years.
Law Enforcement/Public Safety<br />
San Francisco Department of Emergency Management<br />
selects NICE for 9-1-1 center upgrade<br />
HOBOKEN, NJ – <strong>Apr</strong>il 18, 2017 –<br />
NICE (Nasdaq:NICE) announced<br />
today that the San Francisco Department<br />
of Emergency Management<br />
(SFDEM), a NICE customer<br />
since 2006, has once again selected<br />
NICE solutions for its 9-1-1 center<br />
upgrade. The SFDEM 9-1-1 center<br />
will be taking advantage<br />
of the full range of<br />
NICE Inform’s futureready<br />
applications and<br />
integrations to improve<br />
productivity and effectiveness<br />
across its entire<br />
operation, and ensure the<br />
highest levels of service<br />
for residents of the City<br />
and County of San Francisco,<br />
and large numbers<br />
of tourists who visit the<br />
area as well.<br />
“We’ve been working with NICE<br />
for about 10 years now and it has<br />
been a really good relationship,”<br />
said Mitch Sutton, CIO, San Francisco<br />
Department of Emergency<br />
Management. “We feel that NICE<br />
really ‘gets’ public safety and our requirements.<br />
In addition to meeting<br />
our needs today, the NICE Inform<br />
suite of solutions is well suited to<br />
our future requirements.”<br />
The SFDEM’s 9-1-1 call takers and<br />
dispatchers are a critical lifeline between<br />
the public and first responders.<br />
A staggering 3,474 calls come<br />
into the 9-1-1 center each day and<br />
that number is steadily growing.<br />
The SFDEM is aggressively recruiting<br />
telecommunicators to keep pace<br />
with the workload, while also looking<br />
for other ways to bolster telcommunicator<br />
efficiency and effectiveness.<br />
The SFDEM’s 9-1-1 call takers and<br />
dispatchers are a critical lifeline between<br />
the public and first responders.<br />
With 3,474 calls to the 9-1-1<br />
center daily, the SFDEM 9-1-1 center<br />
will use the full range of NICE<br />
Inform’s future-ready applications<br />
and integrations to improve productivity<br />
and effectiveness across<br />
its entire operation and ensure the<br />
highest levels of service (photo<br />
credit ©Michael Mustacchi)<br />
Boosting Efficiency<br />
and Quality Assurance<br />
“Our telecommunicators<br />
perform difficult<br />
and life-saving work<br />
every day,” said Sutton.<br />
“Here at the SF-<br />
DEM there has been<br />
a big push to process<br />
calls more efficiently<br />
to get first responders<br />
on scene faster. We’re<br />
also placing a heightened emphasis<br />
on quality assurance to ensure our<br />
telecommunicators are handling<br />
calls efficiently and according to<br />
protocols. NICE Inform is going to<br />
help us streamline our quality assurance<br />
process and meet our goals.”<br />
With NICE Inform Evaluator, the<br />
SFDEM will be able to expand its<br />
quality assurance program to sys-<br />
tematically review all call types and<br />
identify areas where call processing<br />
can be improved. NICE Inform<br />
Evaluator combines automated,<br />
rules-based QA call selection with<br />
a form builder for creating customized<br />
evaluation forms for call review<br />
and scoring. Results of evaluations<br />
are automatically tabulated and can<br />
be used to pinpoint coaching and<br />
training gaps, while also improving<br />
feedback and employee retention.<br />
With the addition of NICE screen<br />
recording, supervisors will be able<br />
to hear what was said and at the<br />
same time see what was happening<br />
on the telecommunicator’s screen as<br />
calls were processed.<br />
The SFDEM also expects to achieve<br />
efficiency gains in its records custodians<br />
unit. This unit processes close<br />
to 25,000 requests for 9-1-1 records<br />
annually for District Attorneys and<br />
other requestors. NICE Inform will<br />
streamline the fulfillment of these<br />
requests by making it easier to find,<br />
retrieve and share audio recordings.<br />
Introducing Next Generation<br />
Technologies<br />
Like most 9-1-1 centers, the SF-<br />
DEM is moving to next generation<br />
technologies. NICE’s direct, certified<br />
integration with West Corporation’s<br />
VIPER® Voice over IP solution<br />
means that the SFDEM can record<br />
its IP emergency communications<br />
with confidence. NICE Inform is<br />
also future-ready, so when the SF-<br />
DEM is ready to start accepting SMS<br />
9-1-1 texts, it will be able to leverage<br />
its investment in NICE Inform to<br />
record and manage voice, SMS 9-1-<br />
1 texts, and additional future multimedia<br />
in a unified system.<br />
“NICE values our long-standing<br />
relationship with the San Francisco<br />
Department of Emergency Management,<br />
and we’re honored that<br />
they continue to entrust NICE with<br />
their public safety needs,” said Chris<br />
Wooten, Executive Vice President,<br />
NICE. “NICE is committed to helping<br />
the SFDEM improve its efficiency<br />
and effectiveness to provide<br />
excellent emergency response to the<br />
citizens it serves, while also helping<br />
the SFDEM prepare for the future.”<br />
About the San Francisco Department<br />
of Emergency Management<br />
The San Francisco Department of<br />
Emergency Management (DEM)<br />
leads the City in planning, preparedness,<br />
communication, response,<br />
and recovery for daily emergencies,<br />
large scale citywide events, and major<br />
disasters. DEM is the vital link<br />
in emergency communication between<br />
the public and first responders,<br />
and provides key coordination<br />
and leadership to City departments,<br />
18 19<br />
stakeholders, residents, and visitors.<br />
The San Francisco Division of<br />
Emergency Communications’ 9-1-<br />
1 center serves a city and county of<br />
860,000 people and fields calls for<br />
police, fire and medical emergencies,<br />
as well as calls for nonemergency<br />
services. The center receives<br />
more than 1.2 million emergency<br />
and non-emergency calls per year.<br />
www.sfdem.org.<br />
About NICE<br />
NICE (Nasdaq:NICE) is the worldwide<br />
leading provider of both<br />
cloud and on-premises enterprise<br />
software solutions that empower<br />
organizations to make smarter decisions<br />
based on advanced analytics<br />
of structured and unstructured<br />
data. NICE helps organizations of<br />
all sizes deliver better customer service,<br />
ensure compliance, combat<br />
fraud and safeguard citizens. Over<br />
25,000 organizations in more than<br />
150 countries, including over 85 of<br />
the Fortune 100 companies, are using<br />
NICE solutions. www.nice.com.
Law Enforcement/Public Safety<br />
Chicago considers ordinance requiring<br />
panic buttons for hotel staff<br />
BROOKFIELD, WI <strong>Apr</strong>il 28, 2017<br />
RF Technologies (RFT) HELP<br />
ALERT® Panic Alert System for<br />
Hospitality was recently featured in<br />
a news story (WLS-TV, Chicago)<br />
highlighting the need to protect<br />
hospitality workers from violence<br />
and assault in the workplace. The<br />
story outlined an ordinance introduced<br />
on <strong>Apr</strong>il 19, now under<br />
consideration by the Chicago City<br />
Council, which would require that<br />
certain staff in Chicago hotels be<br />
equipped with panic alert devices to<br />
protect them while they work. RFT’s<br />
Marina Willis, president, Pinpoint<br />
Technologies, was interviewed for<br />
the story.<br />
According to a Chicago Tribune<br />
report, the bill, sponsored by Alderman<br />
Michele Harris, 8th Ward, and<br />
backed by labor unions including<br />
Unite Here Local 1, would require<br />
that employees working alone in<br />
Chicago hotels be issued panic buttons<br />
(such as RFT’s HELP ALERT<br />
wireless pendant) that would enable<br />
them to warn security quickly<br />
if they encounter potentially dangerous<br />
situations in guests’ rooms.<br />
The ordinance would also require<br />
that hotels post sexual harassment<br />
and assault policies and promise no<br />
retaliation against workers who report<br />
encountering such treatment.<br />
Hotels that do not provide the panic<br />
alert buttons and adhere to other<br />
parts of the measure could be fined<br />
up to $500 per incident.<br />
“Has this prevented things from<br />
escalating? Absolutely,” says Willis,<br />
of RF Technologies. “We’ve had<br />
situations where we have<br />
had housekeepers go into<br />
a room, start cleaning, and<br />
someone comes out of the<br />
bathroom not wearing any<br />
clothes and blocks them<br />
from leaving the room.” Hotel<br />
workers are already wearing<br />
these devices in New<br />
York and Washington, D.C. Similar<br />
mandates and/or ordinances will<br />
soon be adopted in cities including<br />
Seattle, San Francisco, and areas<br />
in Southern California, where they<br />
are being requested with increased<br />
frequency by staff members and local<br />
unions representing hospitality<br />
workers.<br />
RFT is pleased to be a part of such<br />
an important initiative focused on<br />
keeping hospitality workers safe. We<br />
are ready to put to work our 30 years<br />
of experience keeping people safe<br />
in hospitals, schools, colleges and<br />
universities, senior living facilities,<br />
and hotels, with our HELP ALERT<br />
Panic Alert System.<br />
For additional information on this<br />
important issue, follow these news<br />
links:<br />
•http://www.mychinews.com/<br />
news/chicago-hotel-workersmay-soon-have-a-pani...<br />
•http://www.chicagotribune.<br />
com/news/local/politics/ctrahm-emanuel-chicag...<br />
•http://chicago.suntimes.<br />
com/news/hotels-urged-tocombat-sexual-harassmen...<br />
Also, a July 2016 report issued by<br />
Unite Here Local 1:<br />
•http://abc7chicago.com/<br />
news/panic-button-ordinanceproposed-to-protect-h...<br />
•https://www.handsoffpantson.org/wp-content/uploads/<br />
HandsOffReportWeb.pdf<br />
About RF Technologies<br />
RF Technologies provides safety solutions<br />
at over 10,000 senior living,<br />
healthcare, education and hospitality<br />
facilities nationwide. Life safety<br />
solutions such as CODE ALERT®<br />
Wander Management, QUICK RE-<br />
SPONSE® Wireless Nurse Call, SAFE<br />
PLACE® Infant Security, and HELP<br />
ALERT® reduce risk for residents,<br />
staff, and the facility; innovations<br />
such as RFT CARES® smartphone<br />
application improve caregiver coordination<br />
and efficiency. Backed<br />
by 30 years of experience in senior<br />
living, RF Technologies’ solutions<br />
are UL-certified to meet today’s life<br />
safety standards. For information<br />
visit: http://www.rft.com<br />
PRO-VISION releases 1080p HD video<br />
system for law enforcement vehicles<br />
BYRON CENTER, MI <strong>Apr</strong>il 26,<br />
2017 PRO-VISION® Video Systems,<br />
the leader in mobile video technology<br />
and software for law enforcement,<br />
announced today the release<br />
of its new 1080p High-Definition<br />
In-Car Video System for police vehicles.<br />
The PRO-VISION®<br />
HD In-Car Video<br />
System is the only<br />
1080p True HD system<br />
capable of providing<br />
360 degree<br />
vehicle coverage, capturing highfidelity<br />
audio and video that’s more<br />
than twice the quality of 720p HD<br />
cameras on up to eight cameras.<br />
An interior camera provides 180<br />
degree door-to-door HD coverage<br />
of the rear seat area in any lighting<br />
condition, while a compact forwardfacing<br />
camera records the front of<br />
the vehicle without obstructing the<br />
view of the road like bulky cameras<br />
featured in other systems.<br />
Combining industry-leading features<br />
with a rugged Solid-State design,<br />
a 5-Year Warranty and a price<br />
over 50 percent less than other<br />
brands, the PRO-VISION® HD In-<br />
Car Video System is the most Reli-<br />
20 21<br />
able, Simple and Affordable in-car<br />
video system available.<br />
About PRO-VISION ®<br />
Since 2003, PRO-VISION® has been<br />
engineering, manufacturing and<br />
installing Reliable, Simple, Affordable<br />
mobile video<br />
recording systems<br />
and software solutions<br />
for the school<br />
bus, transit, law enforcement<br />
and commercial<br />
markets.<br />
Specializing in back-up, dash-cam,<br />
in-car and body-worn video; PRO-<br />
VISION® products increase safety<br />
and reduce liability for thousands of<br />
organizations in nearly 50 countries<br />
around the globe. Recently recognized<br />
as a Deloitte Technology Fast<br />
500 company and by Inc. magazine<br />
as one of the fastest growing private<br />
companies in America for the sixth<br />
consecutive year, PRO-VISION®<br />
takes pride in offering the highest<br />
quality products backed by the absolute<br />
best customer and technical<br />
support. For more information, visit<br />
http://www.provisionusa.com.
Law Enforcement/Public Safety<br />
Taming the rising tide of digital evidence<br />
By Linda Haelsen, NICE<br />
Crime solving in the 21st century<br />
hinges on digital evidence. Paper silos<br />
have been replaced by digital silos<br />
and these silos are growing faster<br />
than ever, creating a rising tide of<br />
digital evidence that’s increasingly<br />
challenging to collect, analyze and<br />
share.<br />
For police departments, this is<br />
creating a big problem. There’s so<br />
much data, coming from so many<br />
silos that it’s becoming increasingly<br />
difficult for investigators to ingest it,<br />
correlate it, and absorb the relevant<br />
facts of a case.<br />
Put another way, the growing variety<br />
and volume of digital evidence<br />
has outpaced the tools investigators<br />
have to collect, analyze and share it.<br />
While CCTV video has certainly<br />
taken off, the spectrum of digital<br />
evidence is far wider. Think of all<br />
of the abundantly available sources<br />
of digital evidence that address<br />
many of the questions investigators<br />
once labored to answer. There’s<br />
in-car video, interview recordings,<br />
crowd-sourced information (like<br />
citizen tips, photos, and videos),<br />
911 recordings, and information<br />
from other systems, like Automatic<br />
License Plate Recognition<br />
(ALPR), Computer Aided<br />
Dispatch (CAD), and Records<br />
Management Systems<br />
(RMS). There are also<br />
body-worn cameras, which<br />
are being adopted by police<br />
departments in growing<br />
numbers.<br />
With digital evidence<br />
growing exponentially and<br />
coming from more places,<br />
it’s clear that police departments<br />
need better tools so they can<br />
leverage all of the available digital<br />
evidence to improve case solvability<br />
and reduce crime rates.<br />
Collecting evidence:<br />
the conundrum<br />
Consider how investigators gather<br />
evidence and build cases today.<br />
They often have to log on to a dozen<br />
or more systems to collect evidence<br />
and then manually search for connections<br />
in cases, which wastes time<br />
and increases the likelihood that<br />
crucial evidence will be missed.<br />
Even though CCTV is now commonplace<br />
in investigations, collecting<br />
it is still incredibly time<br />
consuming. It’s not uncommon for<br />
a detective to physically drive to<br />
a crime scene to canvas for video<br />
cameras. The cameras can be hard to<br />
spot, especially in high rises where<br />
they’re not always visible. When<br />
video is located, the investigator<br />
then needs to download a copy and<br />
bring it back to the station.<br />
Despite the fact that citizens are<br />
readily willing to share it, departments<br />
also lack scalable solutions<br />
for crowdsourcing evidence. According<br />
to a recent Nielsen survey<br />
recently conducted by NICE, 95<br />
percent of Americans polled said<br />
they’d be willing to share pictures,<br />
videos, tips, or other evidence if<br />
they witnessed a crime or serious<br />
incident, providing they were given<br />
an easy means to do so.<br />
Still, too many police departments<br />
don’t provide an easy way for citizens<br />
to submit photos, video or tips.<br />
They don’t have the systems or the<br />
infrastructure to readily accept this<br />
evidence for everyday investigations,<br />
and especially for large-scale<br />
events.<br />
Investigators also waste incredible<br />
amounts of time emailing, phoning,<br />
filling out paperwork, even driving<br />
from place to place to manually<br />
collect digital evidence. All of<br />
this evidence is then painstakingly<br />
copied and saved on CDs, DVDs or<br />
USB drives, and added to paper case<br />
folders.<br />
How new digital investigation<br />
and evidence management<br />
technology can help<br />
New digital investigation and evidence<br />
management technology is<br />
now helping to break down these<br />
barriers by enabling police departments<br />
to seamlessly connect all of<br />
their digital silos through one application.<br />
The technology provides<br />
a one-stop shop for gathering evidence<br />
so investigators don’t have to<br />
waste time logging on to all of the<br />
individual systems to manually collect<br />
evidence to build their cases.<br />
In addition to simplifying access,<br />
the technology is able to search<br />
across all connected systems and<br />
recommend evidence that is potentially<br />
relevant to the case.<br />
Advanced content analytics make<br />
both structured and unstructured<br />
data sources searchable. This includes<br />
audio recordings, databases,<br />
narratives from CAD comments,<br />
incident reports, FI cards, reports,<br />
documents, and more. This means<br />
that investigators can uncover connections<br />
and generate new leads,<br />
which ultimately helps them solve<br />
cases faster.<br />
An investigator also has the ability<br />
to add key words to a search.<br />
Let’s say, for example, a witness in<br />
a homicide investigation said they<br />
saw a panel van with ‘Joe’s Plumbing’<br />
marked on the side, fleeing the<br />
scene. By adding ‘Joe’s Plumbing’<br />
to a key word search, all connected<br />
sources – from incident reports in<br />
the CAD system to tagged crime<br />
scene photos and witness statements<br />
– would be searched for those<br />
two key words.<br />
In addition to searching docu-<br />
22 23<br />
ments and databases, the technology<br />
can convert audio to text to<br />
make it searchable, so for example,<br />
911 calls and interview room recordings<br />
could be searched for the<br />
words ‘Joe’s Plumbing’ as well. All<br />
the investigator would need to do is<br />
review the suggested evidence, and<br />
select it to add it to a virtual case<br />
folder.<br />
Investigators can also initiate and<br />
track evidence requests using built<br />
in workflows, and receive automatic<br />
notifications when those requests<br />
are fulfilled. This makes it easier for<br />
an investigator to stay on top of active<br />
cases, while not losing track of<br />
evidence or leads.<br />
Furthermore, citizens can submit<br />
video, photos and tips through a secure<br />
public portal. Private businesses<br />
can also use the portal to register<br />
their CCTV cameras and provide<br />
contact details, making it easier for<br />
law enforcement agencies to crowdsource<br />
evidence. By geo-locating<br />
both city-owned and private CCTV<br />
cameras, the technology enables investigators<br />
to look at the area where<br />
a crime occurred and know where<br />
cameras are located, minimizing<br />
time spent canvassing for video.<br />
The technology is also cloudbased<br />
so it can scale to growing evidence<br />
storage requirements if there’s<br />
More on page 42
Law Enforcement/Public Safety<br />
Kansas becomes first statewide deployment<br />
site of AT&T NextGen 911 solution<br />
TOPEKA, KS, <strong>Apr</strong>il 27, 2017 AT&T<br />
and the Kansas 9-1-1 Coordinating<br />
Council continue to improve the<br />
9-1-1 experience in the state. Kansas<br />
will be the first statewide deployment<br />
of AT&T ESInet.<br />
AT&T ESInet is a new NextGen<br />
9-1-1 solution that provides IPbased<br />
call routing services to emergency<br />
response centers. It will help<br />
Kansas boost 9-1-1 reliability, speed<br />
emergency responsiveness and improve<br />
disaster recovery. For Kansans,<br />
this means a faster, more reliable<br />
9-1-1 experience.<br />
This builds on Kansas’ previous<br />
investment to modernize its outdated<br />
public safety technology with a<br />
NextGen 9-1-1 hosted call handling<br />
solution from AT&T.<br />
“Updating our 9-1-1 infrastructure<br />
is key to keeping our<br />
people safe, and selecting AT&T<br />
was an obvious choice,” said Dick<br />
Heitschmidt, chairman of the Kansas<br />
9-1-1 Coordinating Council and<br />
Hutchinson chief of police. “AT&T<br />
provides our public safety community<br />
with a comprehensive NextGen<br />
9-1-1 solution, delivering the value,<br />
expertise and teamwork needed to<br />
create the current and future experiences<br />
our residents expect. It’s our<br />
goal to stay on the cutting edge of<br />
public safety, and AT&T ESInet will<br />
help to make that a reality.”<br />
With AT&T ESInet, Kansas will<br />
have more sophisticated capabilities<br />
to route calls based on the caller’s<br />
geographic location. Public Safety<br />
Answering Points (PSAPs) will also<br />
be able to manage and route advanced<br />
communications like text<br />
messaging to 9-1-1. In the future,<br />
Kansas PSAPs will be able to support<br />
pictures and videos sent via<br />
text message. This is crucial in today’s<br />
mobile environment where<br />
more than 70% of the calls made to<br />
9-1-1 come from a mobile device.<br />
“AT&T ESInet will help propel<br />
Kansas into the next generation of<br />
public safety. It’ll give Kansas emergency<br />
services an advanced network<br />
to better meet the needs of residents,<br />
first responders and 9-1-1 call takers<br />
today and tomorrow,” said Jon<br />
Wellinger, assistant vice president,<br />
AT&T Global Public Sector.<br />
Since AT&T ESInet is a highly<br />
secure and resilient nationwide<br />
service, it will give Kansas access<br />
to geographically diverse and redundant<br />
call processing locations<br />
throughout the country.<br />
This will let the state work with<br />
other ESInet-enabled 9-1-1 agencies<br />
nationwide to:<br />
• Maintain service during a natural<br />
or man-made disaster.<br />
• Help save precious time by routing<br />
calls and texts correctly.<br />
• Automatically route calls to<br />
neighboring PSAPs when call volumes<br />
spike.<br />
Other benefits include access to:<br />
• A defense-in-depth, private network<br />
with multiple layers of security<br />
– like firewalls and intrusion<br />
detection/prevention. This will<br />
help protect Kansas 9-1-1 infrastructure<br />
from cyber threats.<br />
• Industry standard components<br />
that will give the state backward<br />
compatibility with legacy 9-1-1<br />
systems and services.<br />
The capabilities that NextGen 9-1-1<br />
technologies will give to PSAPs and<br />
the public will become a necessity.<br />
Working with AT&T, Kansas is on<br />
track to move 75% of its PSAPs to<br />
NextGen 9-1-1 hosted call handling<br />
by the end of this year.<br />
“We’ve long supported Kansas<br />
public safety needs, and we are<br />
proud to continue our great relationship,<br />
helping Kansas on its mission<br />
to future-proof its 9-1-1 infrastructure,”<br />
said Wellinger.<br />
By making it easier to manage<br />
9-1-1 calls, AT&T ESInet will help<br />
Kansas public safety resources go<br />
further, so they can focus on what<br />
matters most: protecting people and<br />
saving lives.<br />
AT&T is a leader in first responder<br />
connectivity. We’ve been enabling<br />
and innovating public safety communications<br />
for nearly 140 years.<br />
We will continue this commitment<br />
as we build America’s first-ever nationwide<br />
broadband network dedicated<br />
to first responders.<br />
To learn more about AT&T ESInet,<br />
check out corp.att.com/publicsafety.<br />
For more information on how<br />
Kansas has been updating its 9-1-1<br />
infrastructure, visit kansas911.org.<br />
About AT&T<br />
AT&T Inc. (NYSE: T) helps millions<br />
around the globe connect with leading<br />
entertainment, business, mobile<br />
and high speed internet services.<br />
We offer the nation’s best data network*<br />
and the best global coverage<br />
of any U.S. wireless provider.**<br />
We’re one of the world’s largest<br />
24 25<br />
providers of pay TV. We have TV<br />
customers in the U.S. and 11 Latin<br />
American countries. Nearly 3.5 million<br />
companies, from small to large<br />
businesses around the globe, turn to<br />
AT&T for our highly secure smart<br />
solutions.<br />
Additional information about<br />
AT&T products and services is available<br />
at about.att.com. Follow our<br />
news on Twitter at @ATT, on Facebook<br />
at facebook.com/att and You-<br />
Tube at youtube.com/att.<br />
FREE SUBSCRIPTION<br />
SIGN-UP<br />
Monthly Digital Edition<br />
Airport/Seaport Newsletter<br />
Daily Insider Newsletter<br />
Cybersecurity Newsletter<br />
CLICK HERE
Law Enforcement/Public Safety<br />
RapidSOS secures $14M in investments to develop<br />
life-saving 911 technology<br />
NEW YORK, <strong>Apr</strong>il 25, 2017 RapidSOS,<br />
an emergency technology<br />
start-up, today announced the closing<br />
of a $14 million Series A funding<br />
round led by Highland Capital<br />
Partners with participation from A3<br />
Ventures (the innovation subsidiary<br />
of AAA Northern California, Nevada<br />
& Utah), The Westly Group,<br />
Two Sigma Ventures, Motorola Solutions<br />
Venture Capital, Responder<br />
Ventures, and several notable individuals<br />
including three former FCC<br />
Chairmen (Tom Wheeler, Julius<br />
Genachowski, Dennis Patrick).<br />
Technology has dramatically<br />
changed our lives over the last 50<br />
years, except for when we need it<br />
most. Over 240 million 911 calls<br />
are made each year, all reliant on a<br />
voice connection with less data than<br />
was originally transmitted through<br />
the first trans-Atlantic cable in 1858.<br />
The FCC estimates that improved<br />
information flow to 911 and first<br />
responders could save over 10,000<br />
lives annually.<br />
“For the last 50 years – we’ve relied<br />
on a voice-only connection when<br />
our lives were on the line – whether<br />
from us or through a home security,<br />
medical alert, or roadside assistance<br />
call center,” said Dan Nova, Partner<br />
at Highland Capital Partners and<br />
RapidSOS Board Member. “Rapid-<br />
SOS’ technology eliminates the need<br />
for clunky third-party call centers –<br />
providing a transformative platform<br />
for safety, security, and wellness.”<br />
RapidSOS spent four years working<br />
closely with thousands of public<br />
safety officials across the United<br />
States to develop a universal data<br />
link into 911 and first responder<br />
networks. The result is a transformation<br />
from a voice-only system into a<br />
rich data link connecting millions<br />
of smartphones, wearables, connected<br />
cars, and home IoT products<br />
directly to 911 and first responders.<br />
Wearables powered by RapidSOS<br />
automatically detect health emergencies<br />
– transmitting rich data to<br />
responding ambulances.<br />
Connected cars provide key<br />
telematics data to 911 and responders.<br />
Connected homes linked through<br />
RapidSOS inform firefighters with<br />
real-time data including smoke<br />
density, temperature, and location<br />
of trapped occupants.<br />
“Over the past four years I’ve<br />
witnessed the incredible heroism<br />
of public safety officials who manage<br />
millions of emergencies with<br />
little more than a distraught caller’s<br />
voice,” said Michael Martin, CEO of<br />
RapidSOS. “I’m excited to be partnering<br />
with thought leaders across<br />
public safety, telecom, and technology<br />
to link any device with rich data<br />
directly to 911 and first responders.”<br />
“Working with RapidSOS brings<br />
a new dimension to our portfolio<br />
of integrated software solutions for<br />
the public safety command center,”<br />
said Eduardo Conrado, Executive<br />
Vice President, Strategy & Innovation<br />
Office, Motorola Solutions.<br />
“Our work together creates end-to-<br />
Michael Martin<br />
RapidSOS Founder<br />
Nick Horelik, PhD<br />
RapidSOS Founder<br />
end emergency data connectivity,<br />
enabling third-party data to flow<br />
through Motorola Solutions’ emergency<br />
response systems to personnel<br />
in the field. It provides critical<br />
information that can accelerate<br />
response times and improve outcomes.”<br />
“Having served as State Controller<br />
and CFO of California, I know<br />
firsthand that 911 centers face significant<br />
funding and technological<br />
challenges impacting lives,” said<br />
Steve Westly, Founder and Managing<br />
Partner at The Westly Group.<br />
“We are thrilled to work with the<br />
top engineers at RapidSOS to solve<br />
this global challenge.”<br />
RapidSOS’ technology platform,<br />
originally developed by Martin,<br />
Nick Horelik and a team of engineers<br />
out of MIT and Harvard University,<br />
provides a rich data link<br />
into any 911 dispatch system and a<br />
platform for advanced emergency<br />
analytics. “We’ve already seen how<br />
emergencies are often predictable<br />
and preventable,” said Horelik, RapidSOS<br />
CTO. “In the future, our users<br />
will get advanced warning about<br />
car accidents and potential medical<br />
emergencies before they occur.”<br />
“AAA is constantly looking for innovative<br />
ways to serve its 56 million<br />
members across the United States<br />
and Canada,” said Dillon McDonald,<br />
Managing Partner at A3 Ventures,<br />
the innovation subsidiary of<br />
AAA Northern California, Nevada<br />
& Utah. “We couldn’t have asked for<br />
a better company to be the first investment<br />
from the newly formed A3<br />
Ventures. It is only fitting that we are<br />
working with RapidSOS not only as<br />
an investor, but also as a partner to<br />
bring unprecedented safety, security,<br />
and wellness to millions of our<br />
members.”<br />
“I spent much of my career as<br />
Chairman of the FCC working to<br />
strengthen public safety and make<br />
improvements to our nation’s 911<br />
system,” said Tom Wheeler, Former<br />
Chairman of the FCC. “I am thrilled<br />
to have the opportunity to work directly<br />
with RapidSOS as they deploy<br />
their emergency platform to enhance<br />
the data available to 911 and<br />
first responder systems nationwide.”<br />
“We are humbled to be collaborating<br />
with such thought leaders across<br />
public safety and technology,” said<br />
26 27<br />
Martin. “Every day 650,000 emergency<br />
calls are placed across the<br />
United States, in partnership with<br />
the public safety community we are<br />
transforming the outcomes of millions<br />
of these emergencies.”<br />
About RapidSOS<br />
RapidSOS is an advanced emergency<br />
technology company. RapidSOS<br />
is developing technology to predict<br />
and preempt emergencies before<br />
they occur, dynamically warn<br />
people in harm’s way, and link data<br />
from any connected device directly<br />
to first responders in an emergency.<br />
The result is faster, more effective<br />
emergency response leading to a<br />
projected 2-10% reduction in mortality,<br />
6.9% reduction in healthcare<br />
treatment costs, and 20% reduction<br />
in property damage4. Formed<br />
in 2013 and backed by some of the<br />
world’s top technologists, RapidSOS<br />
was named “2016 Start-Up of the<br />
Year” by the Consumer Technology<br />
Association, a Top Innovation<br />
of 2015 by MIT News, and Top 3<br />
Innovative World Technologies by<br />
SXSW. Learn more at www.Rapid-<br />
SOS.com.
Cubic executive to discuss benefits of cloud<br />
hosting at transportation summit<br />
JW Fishers describes equipment now<br />
used to locate weapons and explosives<br />
SAN DIEGO <strong>Apr</strong>il 27, 2017 Cubic<br />
Transportation Systems (CTS),<br />
a business unit of Cubic Corporation<br />
(NYSE:CUB), today announced<br />
Chris Bax, vice president of global<br />
ITS strategy, will participate<br />
in a panel discussion<br />
on the benefits of cloudbased<br />
technologies for traffic<br />
management systems<br />
at the ITS Heartland 2017<br />
Annual Meeting in Wichita,<br />
Kansas from May 1 – 3.<br />
Population growth is<br />
increasing the demands<br />
placed on roads and associated infrastructure<br />
around the world. Inevitably,<br />
pressure to expand and support<br />
transportation infrastructure growth<br />
is placed on the transit authorities<br />
that manage them. During the panel,<br />
Bax will cover “smart city” technology<br />
and how cloud hosting can be<br />
used to meet the needs of advanced<br />
traffic management solutions. He<br />
will highlight the benefits of cloudbased<br />
platforms, from integration<br />
capabilities to cost-effectiveness, resiliency<br />
and reliability. Additionally,<br />
Bax will address how cloud hosting<br />
is being applied, the long-term<br />
advantage and its ability to support<br />
Chris Bax<br />
smart cities.<br />
“Transportation infrastructure will<br />
constantly evolve in order to meet<br />
population growth,” said Bax. “It’s<br />
imperative for traffic management to<br />
be efficient now and in the<br />
future, as the only way we<br />
can maximize the lifetime<br />
performance of transport<br />
solutions is to rely on new<br />
technologies.”<br />
Bax will take part in the<br />
following panel session:<br />
Session 3A: Beyond the<br />
Signal – What’s New in Traffic Management<br />
and Operations<br />
Wednesday, May 3, 8:30 – 10:00 a.m.<br />
(local time); Riverview Ballroom,<br />
Hyatt Regency, Wichita, Kansas<br />
Moderator: Ron Hall, ITS Heartland,<br />
State Director, Kansas Department<br />
of Transportation (DOT); Panelists:<br />
Zach Hansen, SRF Consulting<br />
Group; Tom Hein, Kansas DOT;<br />
Brian Sovik, Data Transfer Solutions<br />
Follow Cubic Transportation Systems<br />
at @CubicTS or use the<br />
hashtags #THISisITS and #realITS<br />
to join the conversation. For updates<br />
or participation in the ITS Heartland<br />
conversation during the event, use<br />
the hashtag #ITSHeartland.<br />
About Cubic Corporation<br />
Cubic Corporation designs, integrates<br />
and operates systems, products<br />
and services focused in the<br />
transportation, defense training and<br />
secure communications markets.<br />
Cubic Transportation Systems is a<br />
leading integrator of payment and<br />
information technology and services<br />
to create intelligent travel solutions<br />
for transportation authorities and<br />
operators. Cubic Global Defense is<br />
a leading provider of live, virtual,<br />
constructive and game-based training<br />
solutions, special operations and<br />
intelligence for the U.S. and allied<br />
forces. Cubic Mission Solutions provides<br />
networked Command, Control,<br />
Communications, Computers,<br />
Intelligence, Surveillance and Reconnaissance<br />
(C4ISR) capabilities<br />
for defense, intelligence, security<br />
and commercial missions. For more<br />
information about Cubic, please visit<br />
the company’s website at www.cubic.<br />
com or on Twitter @CubicCorp.<br />
Before 1970 the widely accepted solution<br />
for disposal of old munitions,<br />
typically called unexploded ordnance<br />
(UXO), was to dump them<br />
into rivers, lakes and oceans. Today<br />
we know this creates a multitude of<br />
problems, the worst of which are<br />
pollution and the risk of an explosion.<br />
Many people have already<br />
lost their lives to these underwater<br />
booby traps. The uncertainties<br />
surrounding their precise location<br />
and degree of decomposition,<br />
makes attempting to recover these<br />
dangerous devices an even more<br />
difficult task.<br />
Several international organizations<br />
have been formed to address<br />
the problem of UXO on land<br />
and underwater, and a variety of<br />
tools and techniques are being<br />
employed to locate and remove<br />
them. One of the groups working<br />
the problem is the Japan Mine Action<br />
Service (JMAS), a non-profit<br />
engaged in humanitarian activities<br />
to create better and safer living<br />
conditions. Since its inception in<br />
2001, JMAS has implemented UXO<br />
clearance projects in a host of countries<br />
from Japan to Afghanistan. JW<br />
Fishers Pulse 12 boat-towed metal<br />
detector is assisting in these operations.<br />
The detector will locate both<br />
ferrous and nonferrous metals, an<br />
important feature as munitions<br />
can be made of a variety of metals<br />
including brass and steel. It’s large<br />
rectangular search coil can find<br />
metal buried up to 16 feet, and the<br />
Pulse 12 works equally well on land<br />
and in the water. With three detection<br />
heads attached to the master<br />
control console, an area up to 72<br />
feet wide can be swept in one pass;<br />
28 29<br />
saving time, fuel, and manpower. To<br />
inspect sites on land, the coil can be<br />
mounted on the front of an ATV or<br />
other vehicle allowing large areas to<br />
be swept quickly. This powerful machine<br />
is now helping a JMAS team<br />
uncover lethal UXO in Palau reports<br />
representative Terada Yasuo.<br />
Another organization using<br />
Fishers equipment in a similar operation<br />
is the Regional Centre for<br />
Underwater De-mining (RCUD)<br />
in Montenegro, which was part of<br />
the former Yugoslavia. A bloody<br />
civil war in the 1990’s left the<br />
country littered with unexploded<br />
ordnance and waterways unsafe to<br />
travel because of many scattered<br />
mines. After numerous fishermen<br />
and boaters were killed from these<br />
deadly devices, RCUD acquired a<br />
Fisher side scan to help locate the<br />
mines. The operation was a success.<br />
With the help of the sonar<br />
and trained divers, many explosives<br />
were found and removed<br />
from the country’s lakes and rivers.<br />
Today the sonar is being used for<br />
more peaceful purposes. RCUD is<br />
working in cooperation with RPM<br />
Nautical Foundation and the Center<br />
for Conservation and Archaeology
to locate historic shipwrecks and<br />
map other underwater sites of significance.<br />
Evgeniy Pozharsky is a Polish<br />
patriot. He has taken it upon himself<br />
to try and locate and remove<br />
as many UXO as possible from his<br />
native land. Using his Fisher Pulse<br />
10 metal detector with a detection<br />
range of over 2 meters, Evgeniy has<br />
searched lakes, rivers and fields all<br />
over the country. Through hard<br />
work and dogged determination he<br />
has been able to locate a and recover<br />
a significant number of WWII munitions<br />
from sites on land and underwater.<br />
Evgeniy has put his life on<br />
the line to ensure no one else will be<br />
killed or injured<br />
by these perilous<br />
weapons.<br />
Law enforcement<br />
agencies<br />
around the<br />
world are acquiring<br />
underwater<br />
metal detectors<br />
(UMD)<br />
to ensure their<br />
dive teams have the right equipment<br />
to effectively do their job. An<br />
essential tool for locating evidence<br />
disposed of in a waterway, metal detectors<br />
routinely assist public safety<br />
divers in finding weapons, shell casings,<br />
stolen objects, and explosive<br />
devices. UMD are so effective, and<br />
their use has become so widespread,<br />
that agencies<br />
training public<br />
safety divers<br />
are developing<br />
courses<br />
on how to best<br />
utilize these<br />
devices. Dive<br />
Rescue International<br />
in Colorado<br />
and Lifeguard<br />
Systems<br />
in New York<br />
offer courses<br />
in aquatic preparedness to ensure<br />
public safety dive teams respond<br />
effectively to water incident scenes.<br />
Their instructors combine knowledge<br />
with experience<br />
in the use<br />
of state of the<br />
equipment. The<br />
detectors both<br />
companies are<br />
using in their<br />
evidence recovery<br />
training<br />
are JW Fishers<br />
Pulse 8X.<br />
Goodhue County Sheriff ’s Office<br />
in Minnesota is employing this<br />
technology in their underwater<br />
search operations. Dive Team Leader<br />
Steve Sutton-Brown reports using<br />
Fishers new SAR-1 detector in a recent<br />
training exercise. “We’re regularly<br />
called on to search for evidence<br />
such as guns, knives, bullet casings,<br />
etc. We generally dive in visibility<br />
that is zero to one foot, which is one<br />
of the reasons we choose this machine.<br />
In this exercise we planted a<br />
pistol on the lake bottom. The diver<br />
was given only an approximate area<br />
of where the weapon might be, just<br />
as would happen in a real call out.<br />
Although visibility was almost zero,<br />
each diver was able to quickly located<br />
the weapon. The high intensity<br />
LED light bar was fairly easy to see<br />
and the vibration feature was appreciated<br />
by all. We really like that<br />
there are no exposed wires since we<br />
already have enough entanglement<br />
issues to deal with. The consensus<br />
is; the SAR-1 works awesome!”<br />
For more information on JW Fishers<br />
complete line of underwater<br />
search equipment go to www.jwfishers.com.<br />
Raytheon wins $375M contract to<br />
modernize Air Force air and space<br />
operations centers<br />
Dave Wajsgras<br />
HAMPTON, VA <strong>Apr</strong>il 26, 2017 The<br />
U.S. Air Force Materiel Command<br />
has awarded Raytheon Company<br />
(NYSE: RTN) a contract with an initial<br />
value of up to $375 million over<br />
six years to sustain and modernize<br />
the Air and Space Operations<br />
Center Weapon System,<br />
or AOC WS. Under<br />
the contract, Raytheon will<br />
update the existing AOC WS<br />
baseline software and develop<br />
and deploy new software<br />
upgrades to improve air and<br />
space command and control<br />
operations.<br />
Air and Space Operations Centers<br />
provide a strategic capability for the<br />
U.S. Air Force with operators at 22<br />
global locations using the AOC WS<br />
to command and control aircraft<br />
through all of the Air Force’s critical<br />
missions.<br />
“Raytheon will use our unmatched<br />
cyber, automation and analytics expertise<br />
to modernize the Air Force’s<br />
weapons system, providing an advantage<br />
in everything from security to<br />
actionable insight in the digital battlespace,”<br />
said Dave Wajsgras, president<br />
of Raytheon Intelligence, Information<br />
and Services.<br />
“Raytheon’s innovative modernization<br />
through sustainment approach<br />
incrementally improves systems without<br />
interruption to critical missions,”<br />
said Todd Probert, vice president of<br />
Mission Support and Modernization<br />
at Raytheon IIS. “In addition, the use<br />
of software development best<br />
practices, such as Agile and<br />
DevOps, speeds up the delivery<br />
of these systems to the<br />
warfighter.”<br />
Raytheon is hiring for the<br />
new team based in Hampton,<br />
Virginia. Open positions include<br />
system architects, software<br />
developers, cyber engineers, IT<br />
help desk and more.<br />
About Raytheon<br />
Raytheon Company, with 2016 sales<br />
of $24 billion and 63,000 employees,<br />
is a technology and innovation leader<br />
specializing in defense, civil government<br />
and cybersecurity solutions.<br />
With a history of innovation spanning<br />
95 years, Raytheon provides state-ofthe-art<br />
electronics, mission systems<br />
integration, C5ITM products and<br />
services, sensing, effects, and mission<br />
support for customers in more than<br />
80 countries. Raytheon is headquartered<br />
in Waltham, Massachusetts.<br />
30 31<br />
For proactive security,<br />
build an aquarium<br />
Continued from page 6<br />
requires us to build an aquarium<br />
again – a fusion of technologies that<br />
provide speed and accuracy, and are<br />
simple for the end-user.<br />
The most secure and convenient<br />
biometric technology identity verification<br />
must use ‘the power of fusion.’<br />
By fusing face recognition,<br />
body behavior analytics – including<br />
height, gait and body type – and<br />
even voice recognition, we create a<br />
fusion that is highly accurate, and<br />
does not require a user to stop for<br />
identification. This fusion of sensors<br />
allows us to understand a person’s<br />
identity in real-time, with high accuracy<br />
and speed.<br />
Building this aquarium and utilizing<br />
a fusion of technologies for<br />
multimodal biometrics, we can<br />
make identification and secure access<br />
simple and secure. And most<br />
importantly, we can apply the power<br />
of fusion to prevent incidents before<br />
they happen.
Hikvision camera system to provide increased security<br />
for Miami Beach Holocaust Memorial<br />
CITY OF INDUSTRY, CA May 2,<br />
2017 A security system provided<br />
by Hikvision, the North American<br />
leader in innovative, award-winning<br />
video surveillance products and solutions,<br />
will help increase security at<br />
the iconic Holocaust Memorial in<br />
Miami Beach, Fla.<br />
Founded 27 years ago by a group<br />
of community leaders, Holocaust<br />
survivors and the children of survivors,<br />
the Memorial is sited on two<br />
acres and features a series of openair<br />
rooms. Volunteers, including<br />
Holocaust survivors, lead tours of<br />
the Memorial’s exhibits and participate<br />
in other educational programs<br />
open to the public.<br />
The Memorial hosts more than<br />
130,000 visitors every year, including<br />
thousands of schoolchildren<br />
and people from around the world.<br />
Professionals and volunteers work<br />
to educate visitors about the time<br />
before and during the Holocaust.<br />
The Memorial also provides a place<br />
for people to reflect and explore<br />
how they feel about what they are<br />
seeing, to think about their role as<br />
citizens and their relationship with<br />
other people, and to discuss anti-<br />
Semitism and intolerance.<br />
Security is challenging in any<br />
open-air venue, and the Memorial’s<br />
previous analog security system was<br />
”extremely outdated,” according to<br />
Brenda Moxley, director of community<br />
security for the Greater Miami<br />
Jewish Federation.<br />
Moxley is the retired FBI Assistant<br />
Special Agent in Charge, Miami Division,<br />
whose background includes<br />
counter-terrorism. Hired by Federation<br />
to provide security consultation<br />
to 120 Jewish organizations<br />
in the Miami-Dade area, Moxley is<br />
working to improve critical security<br />
infrastructure, crisis management<br />
and education.<br />
The Hikvision security camera<br />
system will provide much needed<br />
security improvements at the memorial<br />
and enable Moxley to implement<br />
a coordinated and integrated<br />
security plan.<br />
Jeffrey He, president of Hikvision<br />
USA Inc., and Hikvision Canada<br />
Inc., said Hikvision is pleased to<br />
work with Moxley and the Greater<br />
Miami Jewish Federation. He noted<br />
that China has an important historic<br />
connection with the Jewish<br />
people. “Shanghai, a city one hour<br />
away from Hikvision headquarters<br />
in Hangzhou, China provided a safe<br />
haven for Jewish refugees during<br />
32<br />
the Holocaust,” He said. More than<br />
25,000 Jews came to Shanghai between<br />
the years 1937 and 1941.<br />
“Safeguarding people and protecting<br />
property is why Hikvision is in<br />
the security business,” He added.<br />
About Hikvision<br />
Hikvision is the world’s leading supplier<br />
of video surveillance solutions.<br />
Featuring the industry’s strongest<br />
R&D workforce, Hikvision designs,<br />
develops, and manufactures standard-<br />
and high-definition cameras,<br />
including a variety of IP cameras,<br />
analog cameras, and cameras featuring<br />
the latest in high-definition<br />
analog technology. Hikvision’s<br />
product suite also includes digital<br />
video servers, hybrid and standalone<br />
DVRs, NVRs, and other elements<br />
of sophisticated security systems<br />
for both indoor and outdoor<br />
use.<br />
<strong>GSN</strong>’s 2017 Airport/Seaport/Border Security Awards<br />
Now Including Cybersecurity Solutions for Airport, Seaport, Border Security Markets<br />
All Winners in this program are entitled to<br />
a Full-Page Advertisement (8.5” x 9.0”) in<br />
your choice of <strong>GSN</strong>’s Digital Magazine or<br />
Leaderboard in any edition of the Airport,<br />
Seaport, Rail, Border Security Weekly<br />
Newsletter.<br />
Adrian Courtenay<br />
Managing Partner, CEO<br />
Government Security News<br />
917-696-5782<br />
acourtenay@gsnmagazine.com<br />
NEW IN 2017:<br />
CLICK HERE TO SUBMIT ENTRIES<br />
All Finalists are entitled to a Half-Page<br />
Advertisement (8.5” x 4.5”) in your choice<br />
of <strong>GSN</strong>’s Digital Magazine or Leaderboard<br />
in any edition of the Airport, Seaport, Rail,<br />
Border Security Weekly Newsletter.<br />
Steve Bittenbender<br />
Managing Editor<br />
Government Security News<br />
502-552-1450<br />
sbittenbender@gsnmagazine.com<br />
Gerry O’Hara<br />
Designer<br />
OHDesign3<br />
203-249-0626<br />
gerry@ohd3.com
Cyber Threats & Solutions<br />
BeyondTrust survey links breaches to<br />
aging federal infrastructure<br />
Federal Government loses $637 Million to Breaches annually<br />
PHOENIX, AZ – May 3, 2017 – BeyondTrust,<br />
the leading cyber-security<br />
company dedicated to preventing<br />
privilege misuse and stopping unauthorized<br />
access, today unveiled the<br />
results of its Federal Cyber-Security<br />
Threat Survey Report 2017. Based<br />
on a comprehensive survey of senior<br />
Federal IT professionals, the study<br />
exposes an aging Federal computing<br />
infrastructure which has led to an environment<br />
with an alarmingly high<br />
risk of breaches.<br />
105 senior IT professionals working<br />
for federal agencies were asked about<br />
their computing infrastructure, security,<br />
breaches and IT modernization.<br />
A summary of the findings is included<br />
below.<br />
Federal IT managers concerned<br />
about antiquated infrastructure.<br />
An overwhelming majority of Federal<br />
IT managers (81 percent) say aging<br />
IT infrastructures have a somewhat<br />
to extremely large impact on their<br />
cyber-security risk. Further, three of<br />
five (61 percent) say aging infrastructure<br />
is a roadblock to achieving federal<br />
cyber-security mandate compliance.<br />
We found ample examples of aging<br />
infrastructure in our survey. For<br />
example, a surprising 47 percent of<br />
Federal agencies still use Windows<br />
XP, driving a third of respondents (35<br />
percent) to report that this kind of aging<br />
infrastructure had a somewhat to<br />
large impact on their ability to affect<br />
vulnerability patching.<br />
The impacts of aging federal infrastructure<br />
don’t stop there …<br />
• Three of four say aging infrastructure<br />
is a somewhat to extremely large<br />
risk to their ability to achieve their<br />
mission.<br />
• The biggest impacts include inefficiency,<br />
increased cyber risk and problems<br />
with compliance.<br />
• Specific to cyber-security, the top<br />
impacts of an aging infrastructure are<br />
difficulty with patching, password<br />
management and privileged account<br />
management (PAM).<br />
• Respondents cite aging infrastructure<br />
as the top roadblock in the way<br />
of achieving federal cyber-security<br />
mandates<br />
Aging Infrastructure Leads to<br />
Breaches<br />
Aging infrastructure is not just a<br />
problem in theory; aging infrastructure<br />
makes federal systems more vulnerable<br />
to attack, which has led to an<br />
environment that could be rife for<br />
breaches.<br />
• 42 percent have experienced a<br />
data breach within the past 6 months.<br />
• A staggering one in eight has experienced<br />
a data breach within the<br />
past 30 days.<br />
• Put another way, the typical federal<br />
IT system experiences one breach<br />
every 347 days.<br />
• Respondents report that the<br />
typical data breach costs more than<br />
$91,000.<br />
• The total cost due for data breaches<br />
is $637 million every year.<br />
• The most frequently reported<br />
costs include loss of productivity,<br />
loss of reputation and pure monetary<br />
damages.<br />
Privileged Account Management:<br />
Gap Between Theory and Practice<br />
We asked respondents what tools<br />
were most important to them in<br />
terms of securing their information<br />
environment. Here they ranked privileged<br />
access management and vulnerability<br />
patching as most important.<br />
This is significant as these technolo-<br />
gies restrict user privileges and close<br />
off security weaknesses in systems.<br />
Yet, despite understanding the importance<br />
of such measures, most<br />
(56 percent) use alternate solutions<br />
to manage privileged passwords and<br />
nearly two-thirds (63 percent) report<br />
less than fully mature vulnerability<br />
remediation programs. In fact, 6 percent<br />
have NO remediation plan, and<br />
another 14 percent do only the bare<br />
minimum required by compliance<br />
mandates.<br />
What IT Can Do Mitigate<br />
the Security Risk of<br />
Aging Federal Infrastructure<br />
The BeyondTrust 2017 US federal<br />
government study points to four best<br />
practices that any agency can implement.<br />
• Manage privileged credentials<br />
with greater discipline, eliminate<br />
administrator rights and enforce<br />
least privilege<br />
Thirty percent of respondents believe<br />
that insider threats pose a significant<br />
threat and 35 percent believe<br />
their users have more privileges than<br />
are required. To mitigate insider<br />
threats and the exploitation of privileges,<br />
adopt a least privilege model<br />
by removing admin rights from users<br />
and storing all privileged credentials<br />
in a secure safe. Known escalation attacks<br />
have been around for years and<br />
are still being used. These attacks require<br />
local administrator rights. It’s<br />
not just about insiders. Enforcing<br />
least privilege prevents lateral movement<br />
within an organization if a<br />
breach does occur.<br />
• Isolate Legacy Systems to reduce<br />
attack surfaces<br />
Modernization of federal IT infrastructure<br />
is a priority for most survey<br />
34 35<br />
respondents, but realistically this will<br />
not happen quickly. These aging systems<br />
have known risks. Reduce the<br />
attack surface by isolating legacy systems.<br />
Segment these systems to force<br />
all traffic through a proxy to reduce<br />
attack vectors. Deploy an automated<br />
password and session management<br />
solution that provides secure access<br />
control, auditing, alerting and recording<br />
for any privileged account. This<br />
will provide segmented access to critical<br />
systems, manage passwords, and<br />
monitor when tasks and operations<br />
are committed to a managed system.<br />
• Improve the maturity of vulnerability<br />
management through automated<br />
patching<br />
Even in today’s sophisticated threat<br />
landscape, the majority of attacks target<br />
known vulnerabilities that can be<br />
easily patched. Effective patch management<br />
goes a long way in reducing<br />
a network’s overall attack surface. To<br />
be truly effective, patch management<br />
requires intelligent prioritization and<br />
broad coverage for common business<br />
applications. To improve the efficiency<br />
and effectiveness of an agency<br />
patch process deploy a solution<br />
that provides integrated, automated<br />
patching. Implementing a solution<br />
that delivers analytics and trending<br />
across the threat lifecycle for multidimensional<br />
reports on assets, vulnerabilities,<br />
attacks and remediation<br />
allows prioritized patch management<br />
More on page 44
Cyber Threats & Solutions<br />
(ISC)² delivers cybersecurity workforce<br />
recommendations to White House Chief of Staff<br />
Imperva executive urges U.S. companies<br />
to evaluate pending EU cyber regulation<br />
ALEXANDRIA, VA, <strong>Apr</strong>il 19, 2017<br />
– (ISC)2® today announced a set of<br />
recommendations for the Trump<br />
Administration to consider as it approaches<br />
its 100th day in office. The<br />
recommendations were delivered<br />
to White House Chief of Staff and<br />
others on President Trump’s team in<br />
order to urge prioritization of workforce<br />
development within the pending<br />
cybersecurity executive order<br />
and beyond.<br />
During a December 2016 gathering<br />
sponsored by the (ISC)2 U.S.<br />
Government Advisory Council<br />
(USGAC), participants, including<br />
former Federal Chief Information<br />
Security Officer (CISO) Gregory<br />
Touhill and federal agency CISOs<br />
and executives, discussed transition<br />
planning from the cybersecurity<br />
workforce perspective. The following<br />
is an abridged list of areas that<br />
(ISC)2 has since identified as critical<br />
for the new administration to<br />
address. An expanded list can be<br />
viewed in today’s (ISC)2 blog post.<br />
– Time Is of The Essence. The<br />
widespread and damaging effects of<br />
cyber threats are revealed on a daily<br />
basis. At the same time,<br />
the demand for skilled<br />
cybersecurity workers is<br />
rapidly increasing.<br />
– Consider the Progress<br />
Already Made. Cybersecurity<br />
is a bi-partisan issue. Critical<br />
work has been done over the last<br />
eight years to advance the cybersecurity<br />
workforce.<br />
– Harden the Workforce. Everyone<br />
must learn cybersecurity. We<br />
have to break the commodity focus<br />
of simply buying technology and<br />
stopping there, without focusing on<br />
training all users.<br />
– Incentivize Hiring and Retention.<br />
In today’s world, a sense of<br />
mission doesn’t always override<br />
good pay — incentives work.<br />
– Prioritize Investment in Acquisition,<br />
Legal and Human Resources<br />
(HR) Personnel. Acquisition, legal<br />
and HR professionals are essential<br />
players within the federal cybersecurity<br />
ecosystem.<br />
– Prevent Getting Lost in Translation.<br />
The government needs effective<br />
communicators who can<br />
translate technical risk to business<br />
leaders.<br />
– Civil Service Reform. The civil<br />
service system is broken and does<br />
not meet the government’s needs.<br />
– Compliance Does Not Equal Security.<br />
Embrace Risk Management.<br />
In the government’s quest for cyber<br />
resiliency, a risk management perspective<br />
will be essential.<br />
– A Standard Cyber Workforce<br />
Lexicon. Once finalized, the NICE<br />
Cybersecurity Workforce Framework<br />
should provide an excellent resource<br />
for workforce development.<br />
“In a recent congressional hearing,<br />
(ISC)2 had the opportunity to<br />
present these recommendations in<br />
an effort to advocate for our members<br />
and the broader cybersecurity<br />
profession during the presidential<br />
transition and beyond,” said Dan<br />
Waddell, (ISC)² managing director,<br />
North America Region. “Significant<br />
progress has been made over the<br />
past decade to advance the federal<br />
More on page 44<br />
REDWOOD SHORES, CA <strong>Apr</strong>il<br />
27, 2017 Imperva, Inc. (NASDAQ:<br />
IMPV), committed to protecting<br />
business-critical data and applications<br />
in the cloud and on-premises,<br />
today announced the results of a<br />
survey on the current state of company<br />
preparedness for the European<br />
General Data Protection Regulation<br />
(GDPR). The survey of 170 security<br />
professionals was taken at RSA<br />
2017, the world’s largest security<br />
conference.<br />
GDPR protects the privacy of European<br />
citizens and applies to all<br />
businesses that hold and process<br />
personal data collected in the European<br />
Union, regardless of their industry<br />
or location. It becomes effective<br />
on May 25, 2018. Organizations<br />
are focusing on GDPR compliance<br />
because fines for certain violations<br />
may be up to the greater of €20 million<br />
or four percent of total worldwide<br />
annual turnover. Companies<br />
with significant revenue could face<br />
billions of dollars in fines.<br />
According to the survey, 51 percent<br />
of respondents said GDPR<br />
would impact their companies,<br />
nearly a third of the respondents<br />
didn’t see the GDPR regulations<br />
impacting them, while 11 percent<br />
were unsure if GDPR would impact<br />
their companies and 5 percent<br />
were not familiar with<br />
GDPR.<br />
The survey also showed<br />
an overall lack of urgency<br />
among the IT professionals<br />
surveyed with 43 percent<br />
of respondents indicating<br />
that they are evaluating or<br />
implementing change in preparation<br />
for GDPR, 29 percent indicating<br />
that they were not preparing,<br />
and another 28 percent signifying<br />
that they were unaware of specific<br />
preparations.<br />
“U.S. companies should be evaluating<br />
the impact GDPR will have on<br />
their data practices, given the major<br />
fines for non-compliance,” said<br />
Terry Ray, chief product strategist at<br />
Imperva.<br />
“Companies need to begin the<br />
GDPR legwork now by documenting<br />
how personal data is collected<br />
and processed in their organizations.<br />
From what we’ve seen in<br />
working with our clients on GDPR<br />
readiness, the projects are complex<br />
36 37<br />
Terry Ray<br />
and involve multiple teams, technologies<br />
and systems.”<br />
In asking survey respondents<br />
about who is driving GDPR<br />
compliance in their organization,<br />
49 percent of survey<br />
respondents cited their organization’s<br />
legal department,<br />
while 8 percent said<br />
the IT department is managing<br />
the process.<br />
Imperva provides data<br />
discovery and classification tools,<br />
user access controls, data masking,<br />
data breach detection, data transfer<br />
controls and other data compliance<br />
solutions that can assist organizations<br />
in their GDPR compliance efforts.<br />
To learn how Imperva helps<br />
organizations prepare for GDPR,<br />
visit http://bit.ly/2ouojYO.<br />
Survey Methodology<br />
Conducted Feb. 13-17, at RSA<br />
Conference 2017, the trade show<br />
with the largest concentration of security<br />
professionals, the in-person<br />
survey is based on responses from<br />
170 attendees including IT professionals,<br />
managers and executives<br />
from the U.S. (77 percent), EMEA<br />
More on page 43
Page 1 of 12<br />
Cyber Threats & Solutions<br />
Report: Municipal governments lack funding to<br />
reach high level of cybersecurity<br />
WASHINGTON May 2, 2017 The<br />
inability to pay competitive salaries,<br />
insufficient cybersecurity staff, and<br />
a general lack of funds present serious<br />
barriers to local governments<br />
achieving the highest levels of cybersecurity,<br />
according to a survey of<br />
local government chief information<br />
officers conducted by ICMA, the International<br />
City/County<br />
Management Association,<br />
in partnership with<br />
the University of Maryland<br />
Baltimore County.<br />
The goal of the Cybersecurity<br />
2016 Survey was<br />
to better understand current<br />
local government<br />
cybersecurity practices and their related<br />
issues, including what capacities<br />
cities and counties possess, what<br />
kind of barriers they face, and what<br />
type of support they have to implement<br />
cybersecurity programs.<br />
Despite nearly a third (32 percent)<br />
of respondents reporting an increase<br />
in cyber attacks to their local<br />
government information during the<br />
past 12 months, 58 percent indicated<br />
that the inability to pay competitive<br />
salaries prohibited them from<br />
achieving high levels of cybersecurity.<br />
Fifty-three percent cited an insufficient<br />
number of cybersecurity<br />
staff as the primary obstacle, and 52<br />
percent said it was a general lack of<br />
funds.<br />
The public sector pays considerably<br />
less than the private sector<br />
“Because the costs to restore compromised<br />
data are staggering, local governments must<br />
understand what resources they need to<br />
achieve their cybersecurity objectives and<br />
ensure the safety of their data.”<br />
for cybersecurity expertise, which<br />
places further pressure on U.S. local<br />
governments to find ways to<br />
fund compensation in this explosive<br />
industry. Currently, this booming<br />
field has zero unemployment and<br />
one million unfilled jobs, and experts<br />
estimate that the shortfall will<br />
reach 1.5 million by 2019.<br />
When asked to rank the top three<br />
things most needed to ensure the<br />
highest level of cybersecurity for<br />
their local government, respondents<br />
cited greater funding as number<br />
one, better cybersecurity policies as<br />
number two, and greater cybersecurity<br />
awareness among local government<br />
employees as number three in<br />
importance.<br />
“As local governments become<br />
increasingly reliant on technology<br />
and the Internet, they must<br />
also become increasingly<br />
diligent about the security<br />
they provide for the data<br />
and information they collect<br />
and manage,” said ICMA<br />
Executive Director Marc<br />
Ott. “Because the costs to restore<br />
compromised data are<br />
staggering, local governments must<br />
understand what resources they<br />
need to achieve their cybersecurity<br />
objectives and ensure the safety of<br />
their data. The results of the ICMA-<br />
UMBC Cybersecurity 2016 Survey<br />
can help local leaders identify and<br />
evaluate critical resource shortages.”<br />
Other highlights of the ICMA/<br />
UMBC cybersecurity survey results<br />
include:<br />
Only 1 percent of responding lo-<br />
cal governments<br />
have a stand-alone<br />
cybersecurity department<br />
or unit.<br />
Primary responsibility<br />
for cybersecurity is most<br />
often located within the IT department.<br />
Roughly 62 percent of responding<br />
jurisdictions have developed a<br />
formal policy governing the use of<br />
personally-owned devices by governmental<br />
officials and employees.<br />
Nearly 70 percent of responding<br />
local governments have not developed<br />
a formal, written cybersecurity<br />
risk management plan, but nearly<br />
41 percent conduct an annual risk<br />
assessment and an additional 16<br />
percent take stock of their risk at<br />
least every two years.<br />
The Cybersecurity 2016 Survey<br />
was mailed (with an online option)<br />
to the chief information officers of<br />
3,423 U.S. municipalities and counties<br />
with populations of 25,000 or<br />
greater. Responses were received<br />
from 411 local governments for a<br />
response rate of 12 percent.<br />
Review the complete results of<br />
the survey at: http://icma.org/cybersecurity2016surveyresults.<br />
About ICMA<br />
ICMA, the International City/<br />
County Management Association,<br />
advances professional local government<br />
worldwide through leadership,<br />
management, innovation, and ethics.<br />
ICMA is second only to the federal<br />
government in the collection,<br />
analysis, and dissemination of data<br />
focused on issues related to local<br />
government management. Through<br />
expansive partnerships with local<br />
governments, federal agencies, nonprofits,<br />
and philanthropic funders,<br />
the organization gathers information<br />
on topics such as sustainability,<br />
health care, aging communities,<br />
38 39<br />
Introduction<br />
In 2016, the International City/County Management Association (ICMA), in partnership with the University of Maryland,<br />
Baltimore County (UMBC), conducted a survey to be ter understand local government cybersecurity practices. The<br />
results of this survey provide insights into the cybersecurity issues faced by U.S. local governments, including wha their<br />
capacities are, what kind of ba riers they face, and wha type of suppor they have to implement cybersecurity programs.<br />
Methodology<br />
The survey was sent on paper via postal mail to the chief information o ficers of 3,423 U.S. local governments with<br />
populations of 25,000 or greater. An online submission option was also made available to survey recipients.<br />
Responses were received from 411 of the governments surveyed, yielding a response rate of 12%. Cities were<br />
ove represented among respondents while counties were underrepresented. Similarly, higher percentage of responses<br />
received from larger communities compared to sma ler communities. Further, jurisdictions in the Mountain region of the<br />
U.S. were ove represented, while jurisdictions in the Mid-Atlantic and East South-Central regions were<br />
unde represented. The following report reflects trends among the unweighted survey responses, and should only be<br />
considered to be representative of the responding governments. Weighting should be applied to achieve representation<br />
of the broader survey population.<br />
Cybersecurity 2016 Survey<br />
Summary Report of Survey Results<br />
Cybersecurity 2016 Survey<br />
Number Surveyed Number Responding Response Rate<br />
Total 3423 411 12.0%<br />
Population Size<br />
Over 1,000,000 42 11 26.2%<br />
500,000 - 1,000,000 98 20 20.4%<br />
250,000 - 499,999 168 26 15.5%<br />
100,000 - 249,999 532 63 11.8%<br />
50,000 - 99,999 939 108 11.5%<br />
25,000 - 49,999 1644 183 11.1%<br />
Geographic Division<br />
New England 183 23 12.6%<br />
Mid-Atlantic 391 23 5.9%<br />
East North-Central 782 94 12.0%<br />
West North-Central 266 26 9.8%<br />
South Atlantic 541 79 14.6%<br />
East South-Central 253 20 7.9%<br />
West South-Central 354 41 11.6%<br />
Mountain 220 48 21.8%<br />
Pacific Coast 433 57 13.2%<br />
Type of Government<br />
Municipalities 1893 267 14.1%<br />
Counties 1530 144 9.4%<br />
economic development, homeland<br />
security, alternative service delivery,<br />
as well as performance measurement<br />
and management data on a<br />
variety of local government services—all<br />
of which support related<br />
training, education, and technical<br />
assistance.<br />
About the University of Maryland<br />
Baltimore County<br />
UMBC is a dynamic public research<br />
university integrating teaching, research,<br />
and service to benefit the<br />
citizens of Maryland. As an Honors<br />
University, the campus offers academically<br />
talented students a strong<br />
undergraduate liberal arts foundation<br />
that prepares them for graduate<br />
and professional study, entry into<br />
the workforce, and community service<br />
and leadership. UMBC emphasizes<br />
science, engineering, information<br />
technology, human services<br />
and public policy at the graduate<br />
level. UMBC contributes to the economic<br />
development of the State and<br />
the region through entrepreneurial<br />
initiatives, workforce training, K-16<br />
partnerships, and technology commercialization<br />
in collaboration with<br />
public agencies and the corporate<br />
community. UMBC is dedicated to<br />
cultural and ethnic diversity, social<br />
responsibility and lifelong learning.
Cyber Threats & Solutions<br />
Cybersecurity executives ‘Wannacrypt’ ransomware<br />
attack a wake-up call for industry, government leaders<br />
By Steve Bittenbender<br />
Editor, Government Security News<br />
The ransomware attack that plagued<br />
the globe on Friday must serve as a<br />
“wake-up call” to both industry and<br />
government leaders that the time for<br />
urgent action is now. That’s how one<br />
of Microsoft’s top executives reacted<br />
to the “WannaCrypt” attack that<br />
targeted computer systems in various<br />
industries worldwide, including<br />
healthcare and government systems.<br />
“WannaCrypt,” also dubbed<br />
“WannaCry,” was a ransomware attack<br />
that paralyzed hospitals in Great<br />
Britain and even FedEx in the United<br />
States, although the attack seemed<br />
to focus mainly on Russian servers<br />
based on information provided from<br />
Kapersky Labs. A ransomware attack<br />
is where a hacker encrypts files and<br />
threatens to destroy the data if the<br />
ransom – in the case of “WannaCrypt,”<br />
it was at least $300 in Bitcoin<br />
– is not paid within a certain time.<br />
In a Sunday blog post on Microsoft’s<br />
Web site, company President<br />
and Chief Legal Officer Brad Smith<br />
said the hackers used material stolen<br />
from the National Security Agency<br />
Brad Smith<br />
to perpetrate the attack. The NSA<br />
breach had been previously reported,<br />
and, in March, Microsoft released<br />
a patch to its users to protect<br />
them from an attack. While some users<br />
updated their systems, others did<br />
not, and they were the ones scrambling<br />
on Friday.<br />
The ransomware attack<br />
“demonstrates the degree to<br />
which cybersecurity has become<br />
a shared responsibility<br />
between tech companies<br />
and customers,” Smith said.<br />
“The fact that so many computers<br />
remained vulnerable<br />
two months after the release<br />
of a patch illustrates this aspect. As<br />
cybercriminals become more sophisticated,<br />
there is simply no way<br />
for customers to protect themselves<br />
against threats unless they update<br />
their systems. Otherwise they’re literally<br />
fighting the problems of the<br />
present with tools from the past.”<br />
Dan Matthews, a sales engineer<br />
with Lastline, said network managers<br />
had another option to prevent the<br />
attack if they were not able to get the<br />
patch installed in time.<br />
He, like other experts, said the ransomware<br />
attack served as an important<br />
reminder of being proactive in<br />
managing cybersecurity risks.<br />
“In practice things are often more<br />
complicated and there are legitimate<br />
reasons for needing more time to<br />
implement a patch,” Matthews said.<br />
“Organizations who are unable to<br />
deploy Microsoft’s (or other<br />
software vendors’) critical<br />
patches in a timely manner<br />
can instead implement advanced<br />
email and network<br />
protections that are capable<br />
of detecting ransomware<br />
and preventing the delivery<br />
of these payloads to unpatched<br />
computers.”<br />
Ofer Israeli, CEO and founder of<br />
Illusive Networks, said he expects<br />
hackers will continue to use the stolen<br />
NSA material for other attacks.<br />
“In this case, we are seeing an opportunistic<br />
ransomware operation,<br />
but we can expect the exploit is already<br />
being used for surgical targeted<br />
attacks, the outcome of which will<br />
only be revealed in a few months,<br />
due to the time it takes to execute<br />
a sophisticated targeted attack,” he<br />
said.<br />
Brian Lord, OBE, managing director<br />
for British-based PGI Cyber, said<br />
the attacks were “always inevitable.”<br />
Lord also echoed Smith’s comments<br />
on this being a wake-up call.<br />
“While organizations are distracted<br />
by high profile dramatized threats,<br />
such as Russian election hacking,<br />
they are neglecting basic cyber hygiene<br />
measures which can prevent<br />
the mass effectiveness of mass ransomware<br />
attacks like this,” said Lord,<br />
the former director of deputy director<br />
for intelligence and cyber operations<br />
for Britain’s Government Communications<br />
Headquarters.<br />
Smith added that it’s time government<br />
leaders readdress their<br />
cybersecurity policies, as attacks<br />
like “WannaCrypt” are becoming<br />
an emerging problem this year. He<br />
equated the NSA losing its coding to<br />
the military having a few Tomahawk<br />
missiles taken.<br />
“This is one reason we called in<br />
February for a new ‘Digital Geneva<br />
Convention’ to govern these issues,<br />
including a new requirement for<br />
governments to report vulnerabilities<br />
to vendors, rather than stockpile,<br />
sell, or exploit them,” Smith said.<br />
“And it’s why we’ve pledged our support<br />
for defending every customer<br />
everywhere in the face of cyberattacks,<br />
regardless of their nationality.”<br />
40 41<br />
<strong>GSN</strong>’s 2017<br />
Airport/Seaport/Border Security Awards<br />
Now Including Cybersecurity Solutions for Airport, Seaport,<br />
Border Security Markets<br />
All Winners in this program are<br />
entitled to a Full-Page Advertisement<br />
(8.5” x 9.0”) in your choice of <strong>GSN</strong>’s<br />
Digital Magazine or Leaderboard in<br />
any edition of the Airport, Seaport,<br />
Rail, Border Security Weekly<br />
Newsletter.<br />
Adrian Courtenay<br />
Managing Partner, CEO<br />
Government Security News<br />
917-696-5782<br />
acourtenay@gsnmagazine.com<br />
NEW IN 2017:<br />
CLICK HERE TO SUBMIT ENTRIES<br />
All Finalists are entitled to a Half-<br />
Page Advertisement (8.5” x 4.5”) in<br />
your choice of <strong>GSN</strong>’s Digital Magazine<br />
or Leaderboard in any edition of the<br />
Airport, Seaport, Rail, Border Security<br />
Weekly Newsletter.<br />
Steve Bittenbender<br />
Managing Editor<br />
Government Security News<br />
502-552-1450<br />
sbittenbender@gsnmagazine.com<br />
Gerry O’Hara<br />
Designer<br />
OHDesign3<br />
203-249-0626<br />
gerry@ohd3.com
OnSSI integration with Jemez<br />
Technology improves perimeter<br />
surveillance effectiveness<br />
Continued from page 12<br />
lance management software. OnSSI’s<br />
Ocularis IP security and surveillance<br />
VMS platform increases security,<br />
reduces operational costs, and<br />
helps organizations move closer to<br />
prevention. Ocularis delivers open<br />
architecture, flexibility, and scalability<br />
for a range of applications including<br />
education, gaming, government,<br />
healthcare, manufacturing, public<br />
safety, transportation, and utilities.<br />
OnSSI is headquartered in Pearl<br />
River, New York and has representation<br />
in over 100 countries. With its<br />
acquisition of Germany-based VMS<br />
company, SeeTec GmbH and the<br />
launch of Ocularis 5, OnSSI continues<br />
to drive global expansion and<br />
technological innovations.<br />
About Jemez Technology<br />
Jemez Technology provides stateof-the-art<br />
video analytic surveillance<br />
technology delivering dramatically<br />
enhanced perimeter and area<br />
surveillance for critical asset and<br />
infrastructure protection. Products<br />
and services from Jemez Technology<br />
leverage their patent-pending<br />
Eagle-i Edge technology and the<br />
AXIS Camera Application Platform<br />
(ACAP).<br />
UTEP professor, Immigration<br />
Council question need for<br />
additional ICE and Border Patrol<br />
agents<br />
Continued from page 13<br />
Heyman said the additional staffing<br />
would increase the DHS budget<br />
by more than $3.14 billion the<br />
administration gets its 15,000 new<br />
agents. In his report, he believes<br />
that money could be better spent<br />
elsewhere within DHS.<br />
For example, he noted that U.S.<br />
immigration courts are currently<br />
understaffed. There are 300 judges<br />
now, about 75 short of what’s currently<br />
budgeted. These judges oversee<br />
more than a half-million cases<br />
and the average time for a case to be<br />
resolved is more than 670 days. In<br />
order to alleviate the backlog within<br />
six years, Heyman said the government<br />
would need more than 500<br />
judges.<br />
Heyman also noted that CBP’s Office<br />
of Field Operations is not slated<br />
to receive any additional agents,<br />
even though the office is responsible<br />
for inspecting trade and travel at<br />
ports of entry. He noted an internal<br />
DHS study showing that one additional<br />
OFO agent would boost by<br />
the national economy by millions<br />
because the agent would help reduce<br />
the amount of time needed to<br />
inspect cargo containers.<br />
While additional OFO agents also<br />
run the same risk of corruption as<br />
Taming the rising tide of<br />
digital evidence<br />
Continued from page 23<br />
an investigation involving large<br />
amounts of crowdsourced data.<br />
Analyzing evidence:<br />
putting the pieces together<br />
Collecting digital evidence is just the<br />
beginning. Today, crime recreations<br />
can be very complex thanks in large<br />
part to all of the different sources<br />
of digital evidence, which could include<br />
hours of video footage from<br />
different CCTV cameras, audio recordings,<br />
body-worn footage, interview<br />
room recordings and so on. At<br />
some point, digital evidence has to<br />
be sorted and put into context based<br />
on time sequence and location. An<br />
investigator can spend grueling<br />
hours manually sifting through evidence<br />
and trying to make sense of it.<br />
Another problem investigators<br />
need to contend with is the large<br />
range of video and audio formats,<br />
their colleagues along the border,<br />
“attention to ports of entry represents<br />
an important policy alternative<br />
to repeating the misplaced pattern<br />
of Border Patrol and border<br />
wall expansion,” Heyman said.<br />
codecs and proprietary players. An<br />
investigator might obtain a copy of<br />
a CCTV video and bring it back to<br />
the station, only to realize it can’t be<br />
played back without a proprietary<br />
player or codec. A forensic technician<br />
could spend days trying to locate<br />
the needed codec.<br />
Digital investigation and evidence<br />
management technology solves this<br />
problem by automatically creating a<br />
working copy of the video that can<br />
be played on any standard PC, tablet<br />
or smartphone browser (while<br />
retaining the original). Investigators<br />
can easily visualize the sequence<br />
of events from multiple angles, for<br />
example by combining video from<br />
different CCTV cameras in chronological<br />
sequence, along with bodyworn<br />
camera video, in-car video,<br />
and 911 and radio recordings.<br />
Visualization tools enable the investigator<br />
to assemble and visualize<br />
these media files in meaningful<br />
ways, for example on maps or timelines.<br />
Sharing evidence: the hard way<br />
or the easy way<br />
After digital evidence is collected<br />
and analyzed, investigators then<br />
need to package it up for the prosecution.<br />
This is where the process<br />
gets even more labor intensive and<br />
time consuming. Today, all of the<br />
different pieces of digital evidence<br />
– interview recordings, audio recordings,<br />
photographs, in-car video,<br />
documents, etc. – are typically<br />
copied onto CDs, DVDs, or thumb<br />
drives and hand delivered to the DA.<br />
With new digital investigation and<br />
evidence management technology,<br />
evidence can now be securely shared<br />
electronically. This means investigators<br />
can spend less time copying and<br />
transporting evidence, and focus<br />
more of their time and attention on<br />
solving cases. A built in audit trail<br />
even tracks chain of custody to ensure<br />
the integrity and admissibility<br />
of digital evidence for court.<br />
Crime-solving in the 21st century:<br />
taming the rising tide of digital<br />
evidence<br />
Police departments everywhere are<br />
investing in digital policing initiatives<br />
to better safeguard the public,<br />
and this is having an unintended<br />
consequence. As paper silos are replaced<br />
by digital silos it’s creating a<br />
rising tide of digital evidence that<br />
needs to be collected, analyzed and<br />
shared. Digital investigation and evidence<br />
management technology can<br />
help police departments tame this<br />
rising tide of digital evidence and<br />
improve case solvability, while also<br />
saving time, money and taxpayer<br />
dollars.<br />
42 43<br />
Imperva executive urges U.S.<br />
companies to evaluate pending EU<br />
cyber regulation<br />
Continued from page 37<br />
(13 percent) and other regions (11<br />
percent). To view the full survey results,<br />
visit bit.ly/2p5kYkS.<br />
About Imperva<br />
Imperva® (NASDAQ: IMPV) is a<br />
leading provider of cyber security<br />
solutions that protect businesscritical<br />
data and applications. The<br />
company’s SecureSphere, Counter-<br />
Breach, Incapsula and Camouflage<br />
product lines enable organizations<br />
to discover assets and risks, protect<br />
information wherever it lives – in<br />
the cloud and on-premises – and<br />
comply with regulations. The Imperva<br />
Defense Center, a research<br />
team comprised of some of the<br />
world’s leading experts in data and<br />
application security, continually enhances<br />
Imperva products with upto-the-minute<br />
threat intelligence,<br />
and publishes reports that provide<br />
insight and guidance on the latest<br />
threats and how to mitigate them.<br />
Imperva is headquartered in Redwood<br />
Shores, California. Learn<br />
more: www.imperva.com, our blog<br />
or on Twitter.
BeyondTrust survey links breaches<br />
to aging federal infrastructure<br />
Continued from page 35<br />
based or risk profile.<br />
• Unite threat intelligence from<br />
multiple sources to better prioritize<br />
risks across the environment<br />
Since the asset risk-to-user privilege<br />
risk pattern is a common attack<br />
vector, deploy solutions that correlate<br />
asset-based risk with user-based activity<br />
to gain a more complete picture<br />
of risks, gaining<br />
needed prioritization<br />
of the most<br />
impactful risks. For<br />
example, advanced<br />
persistent threats<br />
(APTs) can be analyzed<br />
against privileged<br />
password,<br />
user, and account<br />
activity, along with<br />
asset characteristics<br />
such as vulnerability<br />
count, vulnerability level, attacks<br />
detected, risk score, applications, services,<br />
software and ports. Consuming<br />
multiple data feeds from in-place solutions<br />
into a single console can help<br />
mitigate additional costs and reduce<br />
complexity.<br />
“The federal government is moving<br />
to modernize its aging infrastructure,”<br />
said Kevin Hickey, President<br />
and CEO at BeyondTrust. “But that<br />
takes time, and in the meantime, federal<br />
systems face a real risk. These are<br />
simple steps IT can take today to help<br />
mitigate that risk.”<br />
Federal Cyber-Security<br />
Threat Survey Report<br />
For more information on the 2017 US<br />
Federal Government Security Survey,<br />
please visit: https://beyondtrust.com/<br />
aging-fed-it-risky.<br />
About BeyondTrust<br />
BeyondTrust is a global information<br />
security software company that<br />
helps organizations prevent cyber attacks<br />
and unauthorized data access<br />
due to privilege abuse. Our solutions<br />
give you the visibility to<br />
confidently reduce risks<br />
and the control to take<br />
proactive, informed action<br />
against data breach<br />
threats. And because<br />
threats can come from<br />
anywhere, we built a<br />
platform that unifies the<br />
most effective technologies<br />
for addressing both<br />
internal and external<br />
risk: Privileged Access Management<br />
and Vulnerability Management. Our<br />
solutions grow with your needs, making<br />
sure you maintain control no matter<br />
where your company goes. BeyondTrust’s<br />
security solutions are trusted<br />
by over 4,000 customers worldwide,<br />
including half of the Fortune 100. To<br />
learn more about BeyondTrust, please<br />
visit www.beyondtrust.com.<br />
(ISC)² delivers cybersecurity<br />
workforce recommendations to<br />
White House<br />
Continued from page 36<br />
cyber workforce; our recommendations<br />
reflect the importance of<br />
building future cybersecurity policy<br />
— including the pending executive<br />
order — on the existing foundation.”<br />
About (ISC)²<br />
(ISC)² is an international nonprofit<br />
membership association focused<br />
on inspiring a safe and secure cyber<br />
world. Best known for the acclaimed<br />
Certified Information Systems Security<br />
Professional (CISSP®) certification,<br />
(ISC)2 offers a portfolio of<br />
credentials that are part of a holistic,<br />
programmatic approach to security.<br />
Our membership, over 120,000<br />
strong, is made up of certified cyber,<br />
information, software and infrastructure<br />
security professionals who<br />
are making a difference and helping<br />
to advance the industry. Our vision<br />
is supported by our commitment to<br />
educate and reach the general public<br />
through our charitable foundation<br />
– The Center for Cyber Safety<br />
and EducationTM. For more information<br />
on (ISC)², visit www.isc2.<br />
org, follow us on Twitter or connect<br />
with us on Facebook.<br />
© 2017 (ISC)² Inc., (ISC)², CISSP, SSCP, CCSP, CAP,<br />
CSSLP, HCISPP, CCFP, ISSAP, ISSEP, ISSMP and CBK<br />
are registered marks, of (ISC)², Inc.<br />
CEO/Editorial Director<br />
Adrian Courtenay<br />
917-696-5782<br />
acourtenay@gsnmagazine.com<br />
Editor<br />
Steve Bittenbender<br />
502-552-1450<br />
sbittenbender@gsnmagazine.com<br />
Senior Writer<br />
Karen Ferrick-Roman<br />
412-671-1456<br />
karenferrickroman@gmail.com<br />
Columnist<br />
Shawn Campbell<br />
Campbell on Crypto<br />
shawn.campbell@safenetat.com<br />
Columnist<br />
George Lane<br />
Hazmat Science & Public Policy<br />
georgelane@hotmail.com<br />
Contributing Author<br />
Lloyd McCoy Jr<br />
Immix Group<br />
The News Leader in Physical, IT and Homeland Security<br />
Contributing Author<br />
Walter Ewing<br />
Contributing Author<br />
Wendy Feliz<br />
Contributing Author<br />
Joshua Breisblatt<br />
Contributing Author<br />
J. Michael Barrett<br />
Contributing Author<br />
Christopher Millar<br />
Gatekeeper Security<br />
Art Director<br />
Gerry O’Hara, OHDesign3<br />
gerry@ohd3.com<br />
203-249-0626<br />
Production Manager<br />
Brenden Hitt<br />
Brenden.hitt@gsnmagazine.com<br />
Direct: 203-216-7798<br />
COMING ATTRACTIONS<br />
May<br />
Special Reports:<br />
Technology Focus<br />
License Plate Detection,<br />
Smart Vehicle Surveillance<br />
Market Sector Focus<br />
Maritime, Coastal, Port Security<br />
FREE SUBSCRIPTION<br />
SIGN-UP<br />
Monthly Digital Edition<br />
Airport/Seaport Newsletter<br />
Daily Insider Newsletter<br />
Cybersecurity Newsletter<br />
CLICK HERE<br />
44 45