11.01.2018 Views

January2018

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

January 2018 Edition<br />

January 2018 Edition | GSN Magazine | The News Leader in Physical, IT and Homeland Security<br />

Automated Border Control Kiosks Reach 71% Deployment – Page 6<br />

Pilot Project Helps Secure First Responder Apps From Cyberattacks – Page 6<br />

Also in this issue:<br />

GSN HSA 2017 Awards Winners Announced – Page 45<br />

Departments of Homeland Security and Justice Release Data on Incarcerated Aliens-94%<br />

of all Confirmed Aliens in DOJ Custody are Unlawfully Present – Page 41<br />

Top five emerging cybersecurity trends for 2018 - Page 7


Elephant proof.<br />

Our cameras are much tougher than they look. That’s because we don’t just<br />

give them a few strikes during testing, as you might expect. Instead, we subject<br />

them to about 30 heavy strikes – directly on their weakest spots. Don’t worry<br />

though, we keep them away from elephants.<br />

It’s just one of the tough tests Axis cameras face, so you can be sure you’ll<br />

always get the best image quality and high performance – no matter what’s<br />

thrown at them.<br />

Learn more about Axis’ quality assurance work at axis.com/quality<br />

For more information about our governement solutions, visit www.axis.com/usgov<br />

axis_ad_quality-foot_gsn_fpc_us_1701.indd 1 2017-01-27 09:07:47


NEWS<br />

GSN January 2018 Digital Edition<br />

Table of Contents<br />

6<br />

8<br />

14<br />

18<br />

25<br />

Top five emerging cybersecurity trends for 2018 from Netwrix<br />

Executive Order Blocking the Property of Persons Involved in<br />

Serious Human Rights Abuse or Corruption<br />

Exterior View of the Aircraft Explosive Testing<br />

Simulator during a Test<br />

Departments of Homeland Security and Justice Release Data on<br />

Incarcerated Aliens-94% of all Confirmed Aliens in DOJ Custody<br />

are Unlawfully Present<br />

DHS’s Chemical, Biological, Radiological, and Nuclear Program<br />

Consolidation Efforts<br />

Features<br />

22<br />

Automated Border Control Kiosks Reach 71% Deployment<br />

23<br />

35<br />

The kiosk: 20 years and counting<br />

Pilot Project Helps Secure First Responder Apps From<br />

Cyberattacks<br />

“We’re powered by new challenges.<br />

Our experience has made us experts<br />

at providing total security solutions.”<br />

PHIL BARRETT<br />

8 years • Power/Utility Business Development<br />

Our high standards help you meet yours. Providing superior<br />

perimeter security solutions is not just our mission.<br />

It’s personal. And that mission never stops.<br />

AMERISTARSECURITY.COM | 888-333-3422


PROVEN TECHNOLOGY<br />

FOR SERIOUS THREATS<br />

PERIMETER PROTECTION<br />

FOR HIGH-RISK FACILITIES<br />

Designed to deter and withstand today’s increasing threats<br />

to government buildings, commercial properties and critical<br />

infrastructure, Ross Technology anti-ram vehicle barriers,<br />

bollards, gates and fencing offer unique features that minimize<br />

cost and maximize durability.<br />

We specialize in designing and manufacturing unique products that<br />

are tested to US Department of State (DOS) and ASTM standards,<br />

while addressing common challenges associated with installation,<br />

maintenance, restrictive site conditions and harsh environments.<br />

Trusted in embassies and high-risk facilities across the globe,<br />

Ross Technology offers you powerful protection against serious threats.<br />

Learn more at www.rosstechnology.com/perimeter-security/<br />

ARCHITECTURAL SECURITY | SAFETY WORKS<br />

PERIMETER SECURITY | INDUSTRIAL STORAGE<br />

XT-4000 Anti-Climb Sliding Gate<br />

XL-501 Post & Beam Anti-Ram Fence


NEWS<br />

GSN January 2018 Digital Edition<br />

Table of Contents<br />

27<br />

30<br />

34<br />

39<br />

Using video intelligence to protect critical public<br />

infrastructure<br />

Democrats say Trump to seek federal pay freeze and cuts to<br />

domestic security<br />

Staffing Levels at Immigration and Customs Enforcement<br />

Drone maker says UAVs set to take over at border patrols,<br />

criminal hot spots<br />

2017<br />

43<br />

33<br />

43<br />

45<br />

New NIST Spectrometer Measures Single Photons with<br />

Great Precision<br />

blob:https%3A//<br />

mail.google.com/bebcf019-<br />

U.S. Senate Report Reveals Internal Disagreements over<br />

f8dd-4b56-8c7c-5daf421140a9<br />

Funding Counterterrorism Programs in Administration’s<br />

FY 2019 Budget Proposal<br />

After recent terrorist incidents in U.S., Senators<br />

codify Department of Homeland Security’s Counterterrorism<br />

Advisory Board<br />

GSN HSA2017 Awards Program Winners Announced<br />

“We aim to protect property, and provide<br />

peace of mind by providing remarkable<br />

perimeter security products and<br />

unrivaled service.”<br />

EMILY SULLIVAN<br />

11 years • Mission Critical Business Development<br />

We know people make the difference for your business and ours.<br />

Our experienced team thrives on providing the products and<br />

service that lead to total perimeter security solutions.<br />

AMERISTARSECURITY.COM | 888-333-3422


January 2018 Edition | GSN Magazine | The News Leader in Physical, IT and Homeland Security<br />

Cybersecurity<br />

Top five emerging cybersecurity trends for 2018<br />

Netwrix sums up the top cybersecurity<br />

trends that will define the<br />

way organizations develop their IT<br />

strategies in the coming year.<br />

Netwrix Corporation, provider of a<br />

visibility platform for user behavior<br />

analysis and risk mitigation in hybrid<br />

environments, outlines the top<br />

5 emerging IT security trends likely<br />

to affect the way organizations will<br />

approach cybersecurity in 2018.<br />

Although external cyber attacks<br />

continue to become more sophisticated,<br />

the primary security threat<br />

still comes from insiders. To keep<br />

up with the evolving threat landscape,<br />

organizations may have to<br />

rethink their security strategies<br />

and come up with new approaches<br />

to tackling cybersecurity issues.<br />

Netwrix predicts that the following<br />

trends will play a significant role in<br />

2018:<br />

1. Blockchain for IT security.<br />

Blockchain technology enables<br />

data storage in a decentralized and<br />

distributed manner, which eliminates<br />

a single point of failure and<br />

prevents hackers from compromising<br />

large volumes of data. Due<br />

to its ability to quickly identify the<br />

data that has been manipulated,<br />

blockchain may become the core<br />

technology for highly regulated<br />

industries, like banking and law.<br />

2. Focus on insider threats. Netwrix’s<br />

IT Risks Survey found that most<br />

organizations lack visibility into<br />

user behavior, which makes them<br />

vulnerable to insider threats. The<br />

need to keep sensitive information<br />

secure and prevent insider breaches<br />

will force organizations to make<br />

more efforts to establish stricter<br />

control over user activity in their IT<br />

environments.<br />

3. Continuous Adaptive Risk and<br />

Trust Assessment.<br />

Since protection against behind-the-perimeter<br />

attacks is not<br />

sufficient today, Gartner suggests<br />

a Continuous Risk and Trust<br />

Assessment Approach (CARTA),<br />

which sees security as a continuous<br />

process that changes all the time<br />

and has to be regularly reviewed.<br />

Real-time assessment of risk and<br />

trust will enable organizations to<br />

make better decisions regarding<br />

their cybersecurity posture and<br />

mitigate the risks associated with<br />

aberrant user activities.<br />

4.Growing demand for advanced<br />

analytics.<br />

Because security software generates<br />

massive amounts of data, organizations<br />

need advanced analytics to<br />

gain a complete picture of what’s<br />

going on in their IT environments.<br />

The growing adoption of user and<br />

6<br />

entity behavior analytics (UEBA)<br />

technology will help companies<br />

understand their weak points better<br />

and promptly respond to any activities<br />

that might pose threat to data<br />

integrity.<br />

5. Organization-specific approach to<br />

IT security.<br />

Organizations will expect vendors<br />

to offer more personalized security<br />

solutions that address specific pain<br />

points depending on a company’s<br />

size, IT environment complexity<br />

and budget. This will give businesses<br />

an opportunity to implement<br />

products that better match their<br />

needs, and small vendors with a<br />

single focus will be able to compete<br />

with larger but less flexible software<br />

providers.<br />

In 2017, external threats, such as<br />

state-sponsored attacks and cloud<br />

hacks, were the hottest topics for<br />

IT professionals. We expect that<br />

in 2018, the main focus will be<br />

on insider threats, since rogue or<br />

negligent employees and intruders<br />

with stolen credentials may pose a<br />

bigger risk to security than outsider<br />

hackers. Organizations will likely<br />

do their best to minimize insider<br />

risks — by keeping a closer watch<br />

on user activities, analyzing user<br />

behavior, and regularly assessing<br />

risks to proactively spot weaknesses<br />

and improve their security posture.<br />

Michael Fimin, CEO and Co-founder<br />

of Netwrix


Countering Transnational Organized Crime:<br />

An Important Component of Counter-Terrorism Strategy<br />

REGISTER NOW<br />

JAN 31 - FEB 2, 2018<br />

HENRY B. GONZALEZ CONVENTION CENTER<br />

SAN ANTONIO, TEXAS<br />

www.BorderSecurityExpo.com<br />

For Information on Attending,<br />

Sponsorships & Exhibiting<br />

21


January 2018 Edition | GSN Magazine | The News Leader in Physical, IT and Homeland Security<br />

Federal & Legislative<br />

Executive Order Blocking the Property of Persons<br />

Involved in Serious Human Rights Abuse or Corruption<br />

By the authority vested in me as President by the Constitution and the laws of the United States of America,<br />

including the International Emergency Economic Powers Act (50 U.S.C. 1701 et seq.) (IEEPA), the National<br />

Emergencies Act (50 U.S.C. 1601 et seq.) (NEA), the Global Magnitsky Human Rights Accountability<br />

Act (Public Law 114-328) (the “Act”), section 212(f) of the Immigration and Nationality Act of<br />

1952 (8 U.S.C. 1182(f)) (INA), and section 301 of title 3t, United States Code,<br />

I, DONALD J. TRUMP, President of the United States of America, find that<br />

the prevalence and severity of human rights abuse and corruption that have<br />

their source, in whole or in substantial part, outside the United States, such as<br />

those committed or directed by persons listed in the Annex to this order, have<br />

reached such scope and gravity that they threaten the stability of international<br />

political and economic systems. Human rights abuse and corruption undermine<br />

the values that form an essential foundation of stable, secure, and functioning<br />

societies; have devastating impacts on individuals; weaken democratic<br />

institutions; degrade the rule of law; perpetuate violent conflicts; facilitate the<br />

activities of dangerous persons; and undermine economic markets. The United<br />

States seeks to impose tangible and significant consequences on those who<br />

commit serious human rights abuse or engage in corruption, as well as to protect<br />

the financial system of the United States from abuse by these same persons.<br />

I therefore determine that serious human rights abuse<br />

and corruption around the world constitute an unusual<br />

and extraordinary threat to the national security, foreign<br />

policy, and economy of the United States, and I hereby<br />

declare a national emergency to deal with that threat.<br />

I hereby determine and order:<br />

Section 1. (a) All property and interests in property that<br />

are in the United States, that hereafter come within the<br />

United States, or that are or hereafter come within the<br />

possession or control of any United States person of the<br />

following persons are blocked and may not be transferred,<br />

paid, exported, withdrawn, or otherwise dealt in:<br />

(i) the persons listed in the Annex to this order;<br />

(ii) any foreign person determined by the Secretary<br />

of the Treasury, in consultation with the<br />

Secretary of State and the Attorney General:<br />

(A) to be responsible for or complicit in, or to<br />

have directly or indirectly engaged in, serious<br />

human rights abuse;<br />

(B) to be a current or former government official,<br />

or a person acting for or on behalf of such<br />

an official, who is responsible for or complicit<br />

in, or has directly or indirectly engaged in:<br />

(1) corruption, including the misappropriation<br />

of state assets, the expropriation of<br />

private assets for personal gain, corruption<br />

8


January 2018 Edition | GSN Magazine | The News Leader in Physical, IT and Homeland Security<br />

related to government contracts or the extraction<br />

of natural resources, or bribery; or<br />

(2) the transfer or the facilitation of the<br />

transfer of the proceeds of corruption;<br />

(C) to be or have been a leader or official of:<br />

(1) an entity, including any government<br />

entity, that has engaged in, or whose members<br />

have engaged in, any of the activities<br />

described in subsections (ii)(A), (ii)(B)(1),<br />

or (ii)(B)(2) of this section relating to the<br />

leader’s or official’s tenure; or<br />

(2) an entity whose property and interests<br />

in property are blocked pursuant to this<br />

order as a result of activities related to the<br />

leader’s or official’s tenure; or<br />

(D) to have attempted to engage in any of the<br />

activities described in subsections (ii)(A), (ii)<br />

(B)(1), or (ii)(B)(2) of this section; and<br />

(iii) any person determined by the Secretary of the<br />

Treasury, in consultation with the Secretary of State<br />

and the Attorney General:<br />

(A) to have materially assisted, sponsored, or<br />

provided financial, material, or technological<br />

support for, or goods or services to or in support<br />

of:<br />

(1) any activity described in subsections<br />

(ii)(A), (ii)(B)(1), or (ii)(B)(2) of this section<br />

that is conducted by a foreign person;<br />

(2) any person whose property and interests<br />

in property are blocked pursuant to<br />

this order; or<br />

(3) any entity, including any government<br />

entity, that has engaged in, or whose members<br />

have engaged in, any of the activities<br />

described in subsections (ii)(A), (ii)(B)<br />

(1), or (ii)(B)(2) of this section, where the<br />

activity is conducted by a foreign person;<br />

(B) to be owned or controlled by, or to have<br />

acted or purported to act for or on behalf<br />

of, directly or indirectly, any person whose<br />

property and interests in property are blocked<br />

pursuant to this order; or<br />

(C) to have attempted to engage in any of the<br />

activities described in subsections (iii)(A) or<br />

(B) of this section.<br />

(b) The prohibitions in subsection (a) of this section<br />

apply except to the extent provided by statutes, or in<br />

regulations, orders, directives, or licenses that may be<br />

issued pursuant to this order, and notwithstanding<br />

any contract entered into or any license or permit<br />

granted before the effective date of this order.<br />

Sec. 2. The unrestricted immigrant and nonimmigrant<br />

entry into the United States of aliens determined<br />

to meet one or more of the criteria in section<br />

1 of this order would be detrimental to the interests<br />

of the United States, and the entry of such persons<br />

into the United States, as immigrants or nonimmigrants,<br />

is hereby suspended. Such persons shall be<br />

treated as persons covered by section 1 of Proclamation<br />

8693 of July 24, 2011 (Suspension of Entry of<br />

Aliens Subject to United Nations Security Council<br />

Travel Bans and International Emergency Economic<br />

Powers Act Sanctions).<br />

Sec. 3. I hereby determine that the making of donations<br />

of the types of articles specified in section<br />

203(b)(2) of IEEPA (50 U.S.C. 1702(b)(2)) by, to, or<br />

for the benefit of any person whose property and interests<br />

in property are blocked pursuant to this order<br />

would seriously impair my ability to deal with the national<br />

emergency declared in this order, and I hereby<br />

prohibit such donations as provided by section 1 of<br />

this order.<br />

Sec. 4. The prohibitions in section 1 include:<br />

(a) the making of any contribution or provision of<br />

funds, goods, or services by, to, or for the benefit of<br />

any person whose property and interests in property<br />

are blocked pursuant to this order; and<br />

(b) the receipt of any contribution or provision of<br />

funds, goods, or services from any such person.<br />

Sec. 5. (a) Any transaction that evades or avoids, has<br />

9


January 2018 Edition | GSN Magazine | The News Leader in Physical, IT and Homeland Security<br />

Federal & Legislative<br />

...Continued from page 9<br />

the purpose of evading or avoiding, causes a violation<br />

of, or attempts to violate any of the prohibitions<br />

set forth in this order is prohibited.<br />

(b) Any conspiracy formed to violate any of the prohibitions<br />

set forth in this order is prohibited.<br />

Sec. 6. For the purposes of this order:<br />

(a) the term “person” means an individual or entity;<br />

(b) the term “entity” means a partnership, association,<br />

trust, joint venture, corporation, group, subgroup,<br />

or other organization; and<br />

(c) the term “United States person” means any United<br />

States citizen, permanent resident alien, entity<br />

organized under the laws of the United States or any<br />

jurisdiction within the United States (including foreign<br />

branches), or any person in the United States.<br />

Sec. 7. For those persons whose property and interests<br />

in property are blocked pursuant to this order<br />

who might have a constitutional presence in the<br />

United States, I find that because of the ability to<br />

transfer funds or other assets instantaneously, prior<br />

notice to such persons of measures to be taken pursuant<br />

to this order would render those measures ineffectual.<br />

I therefore determine that for these measures<br />

to be effective in addressing the national emergency<br />

declared in this order, there need be no prior notice<br />

of a listing or determination made pursuant to this<br />

order.<br />

Sec. 8. The Secretary of the Treasury, in consultation<br />

with the Secretary of State, is hereby authorized to<br />

take such actions, including adopting rules and regulations,<br />

and to employ all powers granted to me by<br />

IEEPA and the Act as may be necessary to implement<br />

this order and section 1263(a) of the Act with respect<br />

to the determinations provided for therein. The Secretary<br />

of the Treasury may, consistent with applicable<br />

law, redelegate any of these functions to other officers<br />

and agencies of the United States. All agencies shall<br />

take all appropriate measures within their authority<br />

to implement this order.<br />

Sec. 9. The Secretary of State is hereby authorized<br />

to take such actions, including adopting rules and<br />

regulations, and to employ all powers granted to me<br />

by IEEPA, the INA, and the Act as may be necessary<br />

to carry out section 2 of this order and, in consultation<br />

with the Secretary of the Treasury, the reporting<br />

requirement in section 1264(a) of the Act with<br />

respect to the reports provided for in section 1264(b)<br />

(2) of that Act. The Secretary of State may, consistent<br />

with applicable law, redelegate any of these functions<br />

to other officers and agencies of the United States<br />

consistent with applicable law.<br />

Sec. 10. The Secretary of the Treasury, in consultation<br />

with the Secretary of State and the Attorney General,<br />

is hereby authorized to determine that circumstances<br />

no longer warrant the blocking of the property and<br />

interests in property of a person listed in the Annex<br />

to this order, and to take necessary action to give<br />

effect to that determination.<br />

Sec. 11. The Secretary of the Treasury, in consultation<br />

with the Secretary of State, is hereby authorized to<br />

submit recurring and final reports to the Congress<br />

on the national emergency declared in this order,<br />

consistent with section 401(c) of the NEA (50 U.S.C.<br />

1641(c)) and section 204(c) of IEEPA (50 U.S.C.<br />

1703(c)).<br />

Sec. 12. This order is effective at 12:01 a.m., Eastern<br />

Standard Time, December 21, 2017.<br />

Sec. 13. This order is not intended to, and does not,<br />

create any right or benefit, substantive or procedural,<br />

enforceable at law or in equity by any party against<br />

the United States, its departments, agencies, or entities,<br />

its officers, employees, or agents, or any other<br />

person.<br />

DONALD J. TRUMP<br />

THE WHITE HOUSE,<br />

December 20, 2017.<br />

10


January 2018 Edition | GSN Magazine | The News Leader in Physical, IT and Homeland Security<br />

ANNEX<br />

1. Mukhtar Hamid Shah; Date of Birth<br />

(DOB) August 11, 1939; alt. DOB November<br />

8, 1939; nationality, Pakistan<br />

2. Angel Rondon Rijo; DOB July 16, 1950;<br />

nationality, Dominican Republic<br />

3. Dan Gertler; DOB December 23, 1973;<br />

nationality, Israel; alt. nationality, Democratic<br />

Republic of the Congo<br />

4. Maung Maung Soe; DOB March 1964;<br />

nationality, Burma<br />

5. Yahya Jammeh; DOB May 25, 1965;<br />

nationality, The Gambia<br />

6. Sergey Kusiuk; DOB December 1,<br />

1966; nationality, Ukraine; alt. nationality,<br />

Russia<br />

7. Benjamin Bol Mel; DOB January 3,<br />

1978; alt. DOB December 24, 1978;<br />

nationality, South Sudan; alt. nationality,<br />

Sudan<br />

8. Julio Antonio Juárez Ramírez; DOB<br />

December 1, 1980; nationality, Guatemala<br />

9. Goulnora Islamovna Karimova; DOB<br />

July 8, 1972; nationality, Uzbekistan<br />

10. Slobodan Tesic; DOB December 21,<br />

1958; nationality, Serbia<br />

11. Artem Yuryevich Chayka; DOB September<br />

25, 1975; nationality, Russia<br />

12. Gao Yan; DOB April 1963; nationality,<br />

China<br />

13. Roberto Jose Rivas Reyes; DOB July 6,<br />

1954; nationality, Nicaragua<br />

11


Special Year- End Focus Coming in December:<br />

Continued from page 33<br />

The GSN 2017 DIGITAL YEARBOOK<br />

OF<br />

Airport/Seaport and Homeland Security Awards Programs<br />

A Message to the GSN’s 2017 Awards Winners:<br />

In order to optimize worldwide exposure and publicity for all Winners and Finalists in our<br />

2017 Awards Programs, GSN has decided to combine the Yearbooks of the “Airport, Seaport,<br />

Border Security Awards” and the “Homeland Security Awards” into one Annual Yearbook that<br />

salutes Winners and Finalists in both programs. Here are the reasons that this is one of the<br />

best promotional opportunities of the year for our Awards Winners:<br />

• Each participating Winner or Finalist in these programs is entitled to a two-page<br />

spread in the Annual Yearbook at a cost deeply discounted from regular rates.<br />

• You don’t have to spend any time, effort or money creating an advertisement, because<br />

our designer posts your spread in an attractive 2-page format with logo and links<br />

• Based on our long experience with Awards Winners and the recognition generally<br />

received from Google and other search engines, plus social media, you’ll receive<br />

exemplary coverage on your accomplishments, which is further enhanced by a month’s<br />

exposure on our website.<br />

To Reserve Your 2-Page Spread in the 2017 Digital Yearbook of Awards Winners<br />

Contact GSN Publisher Chris Zawadzki, 914-888-6843<br />

chriszawadzki@gsnmagazine.com


HIGH-ENERGY SCREENING<br />

FOR INCREASED SECURITY<br />

At Varex Imaging, our Linatron® technology is designed to scan,<br />

identify and detect potential threats. With a variety of high-energy<br />

imaging linear accelerators, we are your source solution.<br />

To learn more about Varex Imaging and our products, visit<br />

www.vareximaging.com.


January 2018 Edition | GSN Magazine | The News Leader in Physical, IT and Homeland Security<br />

Airport & Aviation Security<br />

Exterior View of the Aircraft Explosive Testing<br />

Simulator during a Test<br />

Each day, more than twenty-six<br />

thousand commercial flights<br />

transport passengers and cargo to<br />

destinations around the world. Several<br />

U.S. government agencies work<br />

together to secure these flights,<br />

including the Department of<br />

Homeland Security (DHS) Science<br />

and Technology Directorate (S&T).<br />

S&T’s Commercial Aircraft Vulnerability<br />

and Mitigation (CAVM)<br />

program, part of the Homeland Security<br />

Advanced Research Projects<br />

Agency Explosives Division, supports<br />

testing and evaluation efforts<br />

to assess potential vulnerabilities<br />

and evaluate countermeasures that<br />

can mitigate the impact of explosives<br />

on commercial aircraft. Recently,<br />

CAVM partnered with the<br />

Federal Aviation Administration<br />

(FAA) and U.S. Army Aberdeen<br />

Test Center (ATC) to develop a<br />

reusable Aircraft Explosive Testing<br />

Simulator that facilitates the explosive<br />

testing of new generation<br />

commercial aircraft.<br />

The majority of current commercial<br />

aircraft have aluminum fuselages,<br />

and CAVM has conducted a significant<br />

amount of explosive vulnerability<br />

testing on a wide range<br />

of those aircraft types. However,<br />

newer generations of commercial<br />

aircraft fuselages are being made<br />

with composite materials, such<br />

as carbon fiber reinforced plastic.<br />

Understanding the potential vulnerability<br />

of composite aircraft to<br />

explosives requires testing, but the<br />

new generation composite aircraft<br />

fuselages are less available and<br />

more expensive than legacy aluminum<br />

fuselage structures. This made<br />

it essential to develop a sustainable<br />

and representative testing solution<br />

so evaluations of new composite<br />

aircraft structures to explosive-based<br />

threats could continue<br />

as needed.<br />

“The lack of availability of new<br />

generation composite commercial<br />

aircraft structures for use in destructive<br />

explosive testing necessitated<br />

development of alternate test<br />

methods and tools,” said Nelson<br />

Carey, CAVM Program Manager.<br />

Interior View of the Simulator’s Composite Panel Test Fixture<br />

“Doing so is essential to provide<br />

S&T and its U.S. government customers<br />

with accurate and efficient<br />

methods for conducting commercial<br />

aircraft explosive vulnerability<br />

assessments.”<br />

Based on this need, ATC developed<br />

the Aircraft Explosive Testing<br />

Simulator that could be used for<br />

repeated explosive testing. The<br />

simulator consists of a steel cylinder<br />

that can be pressurized to<br />

simulate conditions of an in-flight<br />

aircraft. The cylinder has an opening<br />

where composite test panels are<br />

installed and subjected to testing<br />

for a variety of explosive threat<br />

scenarios. The composite aircraft<br />

test panels are provided through<br />

an interagency agreement with the<br />

14


January 2018 Edition | GSN Magazine | The News Leader in Physical, IT and Homeland Security<br />

FAA and the National Institute for<br />

Aviation Research, an FAA Center<br />

of Excellence.<br />

aircraft structural response to internal<br />

explosive threats,” Carey explains,<br />

highlighting the impact the<br />

tool has on testing efforts.<br />

composite structure response for<br />

different and more complex threat<br />

scenarios. Additionally, CAVM<br />

recently hosted a round of tests<br />

with TSA, FAA, DoD, TSL, and<br />

the French government’s Alternative<br />

Energies and Atomic Energy<br />

Commission (CEA). The event<br />

was part of an international effort<br />

to strengthen aviation security by<br />

bringing together officials from<br />

around to globe to share findings<br />

and discuss shared goals.<br />

The Aircraft Explosive Testing<br />

Simulator is the latest S&T-funded<br />

technology that will help enhance<br />

the nation’s aviation security. As<br />

“ Interagency cooperation<br />

in support of CAVM efforts<br />

is essential for extending<br />

limited resources and insuring<br />

a maximum rate of return<br />

on research and development<br />

investment”<br />

During a test, evaluators place an<br />

explosive threat inside the simulator,<br />

which is then pressurized to<br />

simulate airline operational flight<br />

profiles. Once the explosive is detonated,<br />

instrumentation gathers data<br />

on internal and external pressure<br />

resulting from the blast, and high<br />

speed video instruments gather<br />

information on the panel’s physical<br />

condition, looking for any deformation,<br />

breach, or crack growth.<br />

Aircraft vulnerability experts from<br />

S&T’s Transportation Security Laboratory<br />

then conduct a post-blast<br />

inspection and analysis to determine<br />

the structural response of the<br />

composite test panel to the specific<br />

explosive threat condition. Finally,<br />

evaluators remove the panel from<br />

the simulator and install a new one<br />

in its place, allowing for multiple<br />

tests to be conducted within a short<br />

time period.<br />

“The Aircraft Explosive Testing<br />

Simulator provides a rapid, reconfigurable<br />

and cost effective tool for<br />

acquiring test data on composite<br />

Exterior View of the Aircraft Explosive Testing Simulator during a Test<br />

Not only does the Aircraft Explosive<br />

Testing Simulator help S&T<br />

develop a better understanding of<br />

how explosives affect composite<br />

commercial aircraft, it also allows<br />

experts to compare results<br />

with previous tests on aluminum<br />

structures. CAVM researchers will<br />

use the data to learn about composite-based<br />

commercial aircraft<br />

structure vulnerability to terrorist-based<br />

internal explosive threats.<br />

This research supports the Transportation<br />

Security Administration’s<br />

sponsor requirements to investigate<br />

the vulnerability of new generation<br />

composite construction commercial<br />

aircraft to internal explosive<br />

threats.<br />

S&T is already sharing its findings<br />

from the simulator with other<br />

government partners. The Department<br />

of Defense’s (DoD) U.S. Army<br />

Research Laboratory is using the<br />

data to develop numerical analysis<br />

models and tools to help simulate<br />

threats continue to evolve, it is crucial<br />

to have tools that can efficiently<br />

gather accurate data on potential<br />

vulnerabilities and the countermeasures<br />

employed to overcome them.<br />

15


®<br />

Performance. Protection. Dependabilit


PINPOINT THREAT<br />

with the world’s most trusted metal detectors.<br />

y. Since 1964.<br />

garrett.com<br />

Toll Free: 800.234.6151 (U.S. & Canada)


January 2018 Edition | GSN Magazine | The News Leader in Physical, IT and Homeland Security<br />

Border Control<br />

Departments of Homeland Security and<br />

Justice Release Data on Incarcerated Aliens-<br />

94% of all Confirmed Aliens in DOJ Custody<br />

are Unlawfully Present<br />

WASHINGTON – President Trump’s<br />

Executive Order on Enhancing Public<br />

Safety in the Interior of the United<br />

States requires the Department of<br />

Homeland Security<br />

(DHS) and the Department<br />

of Justice<br />

(DOJ) to collect<br />

relevant data and<br />

provide quarterly<br />

reports on data collection<br />

efforts. On<br />

December 18, 2017,<br />

DHS and DOJ released<br />

the FY 2017 4th Quarter Alien<br />

Incarceration Report, complying with<br />

this order.[1] The report found that<br />

more than one-in-five of all persons<br />

in Bureau of Prisons custody were<br />

foreign born, and that 94 percent of<br />

confirmed aliens in custody were unlawfully<br />

present.<br />

“While the administration is working<br />

diligently to remove dangerous<br />

criminal aliens from our streets, this<br />

report highlights the fact that more<br />

must be done,” said Secretary of<br />

Homeland Security Kirstjen M. Nielsen.<br />

“We will continue to pursue<br />

President Trump’s immigration priorities,<br />

including securing the border,<br />

enhancing interior enforcement, and<br />

pursuing a merit-based immigration<br />

system, but Congress must act immediately<br />

to adopt obvious solutions to<br />

strengthen DHS and DOJ efforts to<br />

confront dangerous criminal aliens.”<br />

“The American people deserve a lawful<br />

system of immigration that serves<br />

the national interest,” Attorney General<br />

Sessions said. “But at the border<br />

“Congress must act immediately<br />

to adopt obvious solutions to<br />

strengthen DHS and DOJ efforts to<br />

..confront dangerous criminal aliens.”<br />

18<br />

and in communities across America,<br />

our citizens are being victimized<br />

by illegal aliens who commit crimes.<br />

Nearly 95 percent of confirmed aliens<br />

in our federal prisons are here illegally.<br />

We know based on sentencing<br />

data that non-citizens<br />

commit a substantially<br />

disproportionate<br />

number of drug-related<br />

offenses, which<br />

contributes to our national<br />

drug abuse crisis.<br />

The simple fact is<br />

that any offense committed<br />

by a criminal<br />

alien is ultimately preventable.<br />

One victim is<br />

too many. It’s time for<br />

Congress to enact the<br />

President’s immigration<br />

reform agenda so<br />

that we start welcoming<br />

the best and brightest while turning<br />

away drug dealers, gang members,<br />

and other criminals.”<br />

Section 16 of the<br />

Executive Order<br />

directs the Secretary<br />

of Homeland<br />

Security and the<br />

Attorney General<br />

to collect relevant<br />

data and provide<br />

quarterly reports<br />

regarding: (a) the<br />

immigration status<br />

of all aliens incarcerated under the<br />

supervision of the Federal Bureau of<br />

Prisons; (b) the immigration status of<br />

all aliens incarcerated as federal pretrial<br />

detainees under the supervision<br />

of the United States Marshals Service;


January 2018 Edition | GSN Magazine | The News Leader in Physical, IT and Homeland Security<br />

and (c) the immigration status of all<br />

convicted aliens in state prisons and<br />

local detention centers throughout<br />

the United States.<br />

A total of 58,766 known or suspected<br />

aliens were in in DOJ custody at the<br />

end of FY 2017, including 39,455 persons<br />

in BOP custody and 19,311 in<br />

USMS custody. Of this total, 37,557<br />

people had been confirmed by U.S.<br />

Immigration and Customs Enforcement<br />

(ICE) to be aliens (i.e., non-citizens<br />

and non-nationals), while 21,209<br />

foreign-born people were still under<br />

investigation by ICE to determine<br />

alienage and/or removability.<br />

Among the 37,557 confirmed aliens,<br />

35,334 people (94 percent) were unlawfully<br />

present. These numbers<br />

include a 92 percent unlawful rate<br />

among 24,476 confirmed aliens in<br />

BOP custody and a 97 percent unlawful<br />

rate among 13,081 confirmed<br />

aliens in USMS custody.<br />

This report does not include data on<br />

the foreign-born or alien populations<br />

in state prisons and local jails because<br />

state and local facilities do not<br />

routinely provide DHS or DOJ with<br />

comprehensive information about<br />

their inmates and detainees—which<br />

account for approximately 90 percent<br />

of the total U.S. incarcerated population.<br />

Information Regarding Immigration<br />

Status of Aliens Incarcerated Under<br />

the Supervision of the Federal Bureau<br />

of Prisons<br />

The Department of Justice’s Bureau<br />

of Prisons (BOP) has an operational<br />

process for maintaining data regarding<br />

foreign-born inmates in its custody.<br />

On a quarterly basis, BOP supplies<br />

this information to U.S. Immigration<br />

and Customs Enforcement (ICE).<br />

ICE, in turn, analyzes that information<br />

to determine the immigration<br />

status of each inmate and provides<br />

that information back to BOP.<br />

Out of the 185,507 inmates in BOP<br />

custody, 39,455 (21%) were reported<br />

by BOP as foreign-born. Further<br />

details regarding these 39,455 foreign-born<br />

inmates are as follows:<br />

• 20,240 (51%) were<br />

unauthorized aliens who<br />

are subject to a final order<br />

of removal;<br />

• 14,979 (38%) remain<br />

under ICE investigation;<br />

• 2,374 (6%) were<br />

unlawfully present and<br />

now in removal proceedings;<br />

• 1,852 (less than<br />

5%) were lawfully present<br />

aliens but are now in<br />

removal proceedings; and<br />

• 10 were alienswho<br />

have been granted relief or<br />

protection from removal.<br />

Information Regarding the Immigration<br />

Status of Aliens Incarcerated as<br />

Federal Pretrial Detainees<br />

USMS identified 19,311 aliens and<br />

foreign-born inmates under ICE investigation<br />

detained at USMS facilities.<br />

Further details regarding these<br />

19,311 foreign-born inmates are as<br />

follows:<br />

• 11,459 (59%) were aliens who<br />

are subject to a final order of<br />

removal;<br />

• 6,230 (32%) remain under ICE<br />

investigation;<br />

• 1,261 (6.5%) were unlawfully<br />

present and now in removal proceedings;<br />

• 358 (less than 2%) were lawfully<br />

present but are now in removal<br />

proceedings; and<br />

• 3 were aliens who have been<br />

granted relief or protection from<br />

removal.<br />

Immigration Status of All Convicted<br />

Aliens Incarcerated in State Prisons<br />

and Local Detention Centers<br />

Throughout the United States<br />

The Departments continue to progress<br />

towards establishing data collection<br />

of the immigration status of<br />

convicted aliens incarcerated in state<br />

prisons and local detention centers<br />

through the Department of Justice’s<br />

Office of Justice Programs, Bureau of<br />

Justice Statistics and the Department<br />

of Homeland Security’s Office of Immigration<br />

Statistics.<br />

# # #<br />

19


January 2018 Edition | GSN Magazine | The News Leader in Physical, IT and Homeland Security<br />

Border Control<br />

FROM OUT Of THE BOX<br />

to STATE OF THE ART.<br />

ID CARD PRINTING INNOVATION.<br />

HID Global is leading the industry with the most robust portfolio of secure ID issuance<br />

solutions in the world. Our FARGO® line of printers and encoders provide governments,<br />

financial institutions and businesses of all sizes fast, efficient and reliable solutions that<br />

are as secure as they are affordable.<br />

You’ll call it innovation on demand. We call it, “your security connected.”<br />

YOUR SECURITY. CONNECTED | Visit us at hidglobal.com/printers<br />

© 2016 HID Global Corporation/ASSA ABLOY AB. All rights reserved. HID, HID Global, the HID Blue Brick logo, and the Chain Design are trademarks<br />

or registered trademarks of HID Global or its licensor(s)/supplier(s) in the US and other countries and may not be used without permission.<br />

20


January 2018 Edition | GSN Magazine | The News Leader in Physical, IT and Homeland Security<br />

Airport & Aviation Security<br />

Automated Border Control Kiosks Reach 71% Deployment<br />

According to Acuity Market Intelligence,<br />

border authorities have<br />

embraced digital identification<br />

and biometric-based automation<br />

to simplify and accelerate border<br />

control processing. Acuity’s latest<br />

report on border control kiosks reveals<br />

that 71 installations deploying<br />

2283 border control kiosks are active<br />

at 59 ports of entry across the<br />

globe. These include Automated<br />

Border Control (ABC) Kiosks, Automated<br />

Passport Control (APC)<br />

Kiosks, and Primary Inspection Kiosks<br />

(PIK).<br />

“As airports and other ports of entry<br />

struggle to keep up with increasing<br />

volumes of global travelers, automation<br />

is the only solution for border<br />

control,” says Maxine Most, Principal<br />

at Acuity Market Intelligence.<br />

“integrated digital Identification<br />

technology, including document<br />

readers and biometrics, allow border<br />

agents to securely facilitate low<br />

risk international travelers while<br />

focusing expensive, high value human<br />

resources on genuine threats.”<br />

Global Airport ABC eGates & Kiosks Annual Revenue<br />

“The number of border control kiosks<br />

increased more than 60% over<br />

last year with CAGR projected to<br />

exceed 20% for the next 3 years,”<br />

Most says. “The US and Canada<br />

dominate the market landscape<br />

with 60% and 35% of all border<br />

control kiosks deployed. Though<br />

only about 100 kiosks are deployed<br />

at ten locations across the Caribbean,<br />

Pacific, Europe, and the Middle<br />

East, Acuity expects the use of these<br />

highly efficient and cost-effective<br />

border control solutions to migrate<br />

broadly within existing regions<br />

while expanding to include Asia,<br />

Latin America, and Africa over the<br />

next few years.”<br />

Today, kiosks are deployed at just a<br />

few cruise ports, but Acuity expects<br />

broader use of kiosks at more seaports<br />

and land crossings over the<br />

next three to five years. Vancouver<br />

Airport’s Innovative Travel Solutions<br />

group dominates the global<br />

market with more than 60% kiosks<br />

unit and installation market share.<br />

21


January 2018 Edition | GSN Magazine | The News Leader in Physical, IT and Homeland Security<br />

Airport & Aviation Security<br />

The kiosk: 20 years and counting<br />

by Rico Barandun , Head of Solution<br />

Specialists, Passenger and Bags, SITA<br />

What a great 20 years the SITA kiosk has had. As we<br />

approach the end of its 20th anniversary year, it’s exciting<br />

to think about what lies ahead as kiosks continue their<br />

rise in smoothing the flow of passengers, both on and off<br />

airport.<br />

It’s true that some naysayers have in the past pondered<br />

the demise of the kiosk. But we’ve witnessed the opposite<br />

to be the case. SITA kiosk use, the world over, has done<br />

nothing but spread.<br />

In fact, as of today SITA has installed 6,000-plus kiosks at<br />

more than 225 common-use airports.<br />

Far from retreating into the background, we’ve seen<br />

kiosks emerge out of the check-in domain and into the<br />

forefront of other airport activities, taking on more and<br />

different responsibilities along the steps of the journey.<br />

Myriad tasks<br />

Today they’re relied on for myriad tasks, from check-in<br />

to bag tagging, and more. Some 55% of airports have already<br />

implemented bag-tag printing at kiosks, for example<br />

(2017 SITA Airline & Airport IT Trends Insights).<br />

In the kiosk’s 20th year we also saw a milestone development<br />

as SITA introduced a Common Use Payment<br />

Service - the first and only payment solution allowing<br />

transactions by multiple airlines through a single payment<br />

terminal, which is now being deployed at SITA’s<br />

common-use kiosks and bag-drop stations.<br />

Eyes on the border<br />

Now, all eyes are on border, where - with the rise of<br />

biometrics - we see great opportunities for kiosks as we<br />

at SITA continue to work with airports, governments and<br />

border agencies around the world to bring in the changes.<br />

Indeed our work in the US shows that our biometric-enabled<br />

kiosks can securely process passengers on arrival,<br />

reducing the time passengers spend in line by as much as<br />

40%.<br />

I recall an Acuity Market Intelligence study a couple of<br />

years ago on airport eGates and kiosks at the border. It<br />

talked about the role of kiosks and the ‘holy grail’ for<br />

immigration and passenger processing being to provide a<br />

truly seamless and almost unnoticeable airport experience.<br />

Making air travel easier<br />

That is embodied in the visions and goals of strategic<br />

industry initiatives to enhance the passenger experience,<br />

such as Simplifying the Business, Fast Travel, Smart Security,<br />

and now the IATA and ACI initiative NEXTT (New<br />

Experience in Travel and Technologies).<br />

Proving its longevity, the kiosk has been very much part<br />

and parcel of these key industry-wide initiatives, making<br />

air travel ever easier and meeting air transport community<br />

needs as they evolve. So here’s to the kiosk, for the next<br />

20 years and beyond …<br />

23


January 2018 Edition | GSN Magazine | The News Leader in Physical, IT and Homeland Security<br />

Kiosk advances<br />

It’s 20 years since changed<br />

the face of airport departure<br />

halls with the introduction<br />

of self-service<br />

kiosks. With more<br />

than 12,000 installed<br />

worldwide, they<br />

now offer<br />

everything<br />

from check-in to<br />

border control to<br />

autonomous robotics.<br />

SITA’s first kiosks were introduced<br />

as a trial in 1997 by Air Alaska,<br />

designed not only to improve the<br />

check-in process for passengers by<br />

reducing queuing, but also to test<br />

the appetite for self-service.<br />

Twenty years on, nine out of 10<br />

airports have kiosks. What started<br />

as an efficient and simple platform<br />

for check-in has evolved to include<br />

bag tagging, lost baggage tracking,<br />

flight transfers, and border control.<br />

Today, a chip & pin and contactless<br />

payment facility allows passengers<br />

to pay for flights, upgrades, meals,<br />

even media downloads for the<br />

flight.<br />

Pervasive<br />

Kiosks today are all-pervasive<br />

across the airport, both landside<br />

and airside. SITA’s latest iteration<br />

of the kiosk can even do both, as<br />

an autonomous robot able to move<br />

independently around the airport<br />

as needed.<br />

And soon passengers will be able to<br />

use kiosks with fast, secure biometric<br />

enrolment and registration<br />

capabilities to create a secure single<br />

token as they first enter the airport,<br />

removing the need to show a<br />

passport or boarding card as they<br />

21<br />

progress to the aircraft.<br />

The humble kiosk of the 1990s has<br />

certainly matured in the past 20<br />

years, to become a core part of the<br />

airport infrastructure.<br />

Easier, cheaper<br />

“Kiosks were seen from the outset as<br />

offering tangible benefits for everyone,”<br />

according to Rico Barandun,<br />

Portfolio Director at SITA.<br />

“They could make check-in easier<br />

for passengers, save expensive<br />

terminal space, cut airline costs<br />

and speed up the whole process for<br />

everyone.<br />

“But I don’t think anyone anticipated<br />

how they would evolve into<br />

today’s increasingly sophisticated<br />

interface between passenger and<br />

airline/airport.”<br />

BORDER BENEFITS<br />

The border is a relatively new frontier<br />

for kiosks. “A key development<br />

has been the introduction of kiosks<br />

designed to speed up and simplify<br />

immigration procedures,” continues<br />

Barandun.<br />

“The use of secure self-service<br />

kiosks for verification of biometric<br />

travel documents is increasingly<br />

adopted as a means not only of<br />

enhancing passenger service, but at<br />

the same time allowing immigration<br />

specialists time to focus on the<br />

minority of higher risk travelers.<br />

“With an average transaction time<br />

of just 90 seconds, wait times for<br />

users of SITA iBorders® BorderAutomation<br />

ABCKiosks are reduced<br />

by up to 60%.”


January 2018 Edition | GSN Magazine | The News Leader in Physical, IT and Homeland Security<br />

CRNE<br />

DHS’s Chemical, Biological, Radiological, and<br />

Nuclear Program Consolidation Efforts<br />

What GAO Found<br />

GAO’s prior work has shown that<br />

the Department of Homeland<br />

Security (DHS) should complete,<br />

document, and make available<br />

analyses of key questions related<br />

to its ,. In August 2016, GAO<br />

reported that several key factors<br />

were not included when DHS<br />

evaluated its organizational consolidation<br />

of CBRNE functions.<br />

For example, DHS did not fully<br />

assess and document potential<br />

problems that could result from<br />

consolidation or include a comparison<br />

of benefits and costs. Further,<br />

DHS conducted limited external<br />

stakeholder outreach, thus<br />

the proposal may not sufficiently<br />

account for stakeholder concerns.<br />

Attention to these key areas,<br />

identified from GAO’s analysis of<br />

previous organizational consolidations,<br />

would help provide DHS,<br />

Congress, and other stakeholders,<br />

such as DHS components with<br />

assurance that important aspects<br />

of effective organizational changes<br />

are addressed as part of the<br />

agency’s CBRNE reorganization<br />

decision-making process. GAO<br />

previously recommended that<br />

DHS complete, document, and<br />

make available analyses of key<br />

questions related to its consolidation<br />

proposal, including: (1) what<br />

problems, if any, consolidation<br />

may create; (2) a comparison of<br />

the benefits and costs the consolidation<br />

may entail; and (3) a<br />

broader range of external stakeholder<br />

input including a discussion<br />

of how it was obtained and<br />

considered. DHS did not concur,<br />

asserting that the recommendation<br />

did not acknowledge the<br />

extent to which these questions<br />

were discussed both internally<br />

within DHS and externally with<br />

Congress and that DHS’s decision<br />

to consolidate CBRNE functions<br />

had already been made which<br />

would make additional analysis<br />

redundant. GAO closed this<br />

recommendation as not implemented.<br />

While GAO has not fully<br />

assessed DHS’s most recent reorganization<br />

plans, GAO continues<br />

to believe that documenting<br />

information and analyses used to<br />

assess the benefits and limitations<br />

of its consolidation plan would<br />

assist DHS in fully demonstrating<br />

how its proposal will lead to<br />

an integrated, high-performance<br />

organization.<br />

GAO’s prior work found that key<br />

mergers and organizational transformation<br />

practices could further<br />

benefit DHS in its proposed<br />

CBRNE consolidation. GAO<br />

reported in July 2003 on key practices<br />

and implementation steps<br />

for mergers and organizational<br />

transformations that range from<br />

ensuring top leadership drives<br />

the transformation to involving<br />

employees in the implementation<br />

process to obtain their ideas<br />

and gain their ownership for the<br />

transformation. In August 2016,<br />

GAO recommended that DHS use<br />

key mergers and organizational<br />

transformation practices identified<br />

in GAO’s previous work to<br />

help ensure that lessons learned<br />

from other reorganizations are<br />

considered during the consolidation<br />

effort. DHS concurred with<br />

the recommendation and stated<br />

in its October 2017 consolidation<br />

notice to Congress that it will<br />

consult the practices during consolidation<br />

implementation. GAO<br />

will monitor DHS’s implementation<br />

of the key practices which<br />

will help to ensure that lessons<br />

learned from other organizations<br />

are considered during the consolidation<br />

effort.<br />

More on page 31<br />

25


January 2018 Edition | GSN Magazine | The News Leader in Physical, IT and Homeland Security<br />

21


January 2018 Edition | GSN Magazine | The News Leader in Physical, IT and Homeland Security<br />

Infrastructure Protection<br />

Using video intelligence to protect critical public<br />

By Kimbry McClure<br />

infrastructure Solutions Architect, Office of CTO at Hitachi Data Systems Federal Corporation<br />

Law enforcement and other entities<br />

charged with protecting national<br />

security are spending more time<br />

than ever planning and implementing<br />

security measures that ensure<br />

national security and improve<br />

public safety. This is for good<br />

reason: from the energy grid<br />

to sporting events to airports,<br />

security personnel know these<br />

venues are enticing targets for<br />

terrorist attacks due to the large<br />

amount of people and resources<br />

clustered together in one place.<br />

In a world of heightened extremism,<br />

lone wolf attacks, and<br />

general global instability, it is not<br />

beyond imagination to foresee<br />

a scenario where a small team<br />

of terrorists seizes a U.S. airport.<br />

With the prospect of hostage taking<br />

and hijackings looming large,<br />

the response time for<br />

emergency personnel<br />

and law enforcement<br />

becomes critical. First<br />

responders must locate<br />

the terrorists and<br />

their hostages quickly<br />

to coordinate an effective response.<br />

This requires enhanced detection capabilities<br />

that can seamlessly distribute<br />

information to decision makers and<br />

emergency personnel to identify and<br />

respond to threats in real time.<br />

To stay a step ahead of attackers,<br />

security and emergency personnel<br />

need a common operational picture<br />

to communicate with civil and federal<br />

Deploying a video intelligence platform<br />

gives law enforcement a technological<br />

asset that keeps pace with terrorists<br />

agency authorities. This picture is not<br />

only essential in coordinating a rescue,<br />

but also in securing additional areas<br />

of the airport facility that the terrorists<br />

have yet to seize as well as collect evidence<br />

for both investigative and legal<br />

purposes.<br />

With many entities tasked with restoring<br />

airport security, organizations need<br />

the right technology to assist them.<br />

An important tool emerging in security<br />

today is a video intelligence system<br />

that assists emergency responders and<br />

officials in reaching their security<br />

objectives.<br />

Not Your Old-School CC-TV Cameras<br />

Many people imagine video surveillance<br />

cameras to be a single camera<br />

mounted on a wall pointing in a<br />

particular direction and transmitting<br />

video to a single television. In<br />

this scenario, multiple cameras<br />

in different locations within the<br />

same building work in isolation<br />

and only detect motion and<br />

images.<br />

Most people do not realize that<br />

video intelligence has evolved<br />

tremendously in recent years.<br />

Today’s video intelligence system<br />

consists of a wide range of<br />

disparate sensor data combined<br />

into a single portal. The integration<br />

of sensor data into one<br />

place is a critical development<br />

for law enforcement working in<br />

time sensitive situations.<br />

Back in our besieged<br />

airport, authorities<br />

do not have time to<br />

monitor separate video<br />

camera, alarm systems,<br />

GPS, and other audio,<br />

visual, and social media monitoring<br />

systems separately. Officials need<br />

data from these sensors to be organized<br />

in such a way that patterns can<br />

be quickly detected to ensure rapid<br />

decision-making.<br />

As law enforcement officials analyze<br />

the data received from multiple<br />

sensors, a video intelligence system<br />

triages the data received. During<br />

27


January 2018 Edition | GSN Magazine | The News Leader in Physical, IT and Homeland Security<br />

the airport terrorist attack, law enforcement<br />

is able to discern that the<br />

screaming coming from an airport<br />

personnel-only hallway is more<br />

important to respond to than the<br />

traveling high school band playing<br />

their instruments in the airport<br />

concourse. First responders have the<br />

ability to triage behaviors because<br />

the video intelligence system has automated<br />

the monitoring process on<br />

a scale much larger than manpower<br />

can provide.<br />

Automating data collection, organization<br />

and storage gives law enforcement<br />

attempting to prevent or<br />

respond to a terrorist attack a more<br />

speedy, meticulous and effective<br />

overall security strategy. Authorities<br />

no longer have to allocate manpower<br />

to spending time searching and<br />

investigating each person who is<br />

in a facility. Since different people<br />

present various behaviors, some that<br />

indicate a higher security risk than<br />

others, video intelligence systems<br />

flag these behaviors for law enforcement<br />

and give them the knowledge<br />

needed to make critical decisions.<br />

Overcoming the Unknown<br />

Adding automation to data collection<br />

and analysis provides other benefits.<br />

Criminals and terrorists are<br />

constantly changing their tactics. As<br />

a result, law enforcement does not<br />

always know the behavior profile to<br />

match the changing tactics. The integration<br />

of a video intelligence system<br />

provides law enforcement flexibility<br />

to quickly and easily input into the<br />

system new behaviors for the sensors<br />

to monitor. Without unified<br />

data management, authorities would<br />

need to take more time and manpower<br />

to update the sensors on what<br />

new behaviors to track.<br />

Authorities may also face uncertainty<br />

over which agencies, groups<br />

and decision makers need access to<br />

which data points. Today’s homeland<br />

security and emergency response<br />

strategies involve multiple<br />

agencies, organizations and decision<br />

makers. These groups require<br />

that data be shared in real-time to<br />

establish a common operating picture.<br />

The video intelligence system<br />

overcomes data sharing challenges<br />

by creating a single portal to store<br />

and view information. As a<br />

result, information can<br />

be shared with ease<br />

between various<br />

coordinating<br />

entities.<br />

How to Implement a<br />

Modern Video Intelligence<br />

System<br />

Many in government<br />

are concerned about<br />

how much value they<br />

will receive when implementing<br />

new technology<br />

systems. The good<br />

news is a modern video intelligence<br />

system is not only effective,<br />

but also simple to implement. The<br />

system’s design focuses on an interface<br />

that is integrated into an organization’s<br />

current IT systems, including<br />

legacy IT. Therefore, the video<br />

intelligence system is built based<br />

on customization and flexibility.<br />

Additionally, the video intelligence<br />

system includes sensors, compute<br />

power and on-board storage that<br />

can be installed and implemented<br />

rapidly.<br />

Deploying a video intelligence<br />

platform gives law enforcement a<br />

technological asset that keeps pace<br />

with terrorists and criminals today<br />

and in the future. By placing these<br />

tools under a single management<br />

layer, law enforcement can devote<br />

more resources to what truly matters:<br />

ensuring public safety.<br />

28


January 2018 Edition | GSN Magazine | The News Leader in Physical, IT and Homeland Security<br />

Border Control<br />

20


January 2018 Edition | GSN Magazine | The News Leader in Physical, IT and Homeland Security<br />

Federal and Legislative<br />

Democrats say Trump to seek federal pay freeze<br />

and cuts to domestic security<br />

Federal employees dodged a bullet<br />

this year, with the flop of proposed<br />

cuts to their retirement and health<br />

benefits, but they shouldn’t put away<br />

the flak jackets yet.<br />

After proposing a 1.9 percent federal<br />

pay raise for next year, President<br />

Trump will urge a pay freeze for<br />

federal employees and call for cuts to<br />

domestic security programs in fiscal<br />

2019, according to reports released<br />

by Senate Homeland Security and<br />

Governmental Affairs Committee<br />

Democrats.<br />

Ironically, this comes as Congress<br />

nears passage of tax legislation that<br />

Trump claims will significantly stimulate<br />

the economy. If that’s the case,<br />

then why is a freeze necessary?<br />

If you believe federal employees are<br />

over compensated, then no other<br />

rational is needed.<br />

That rationale was behind failed<br />

Republican proposals to cut federal<br />

retirement and health insurance<br />

benefits.<br />

The two reports are based on budget<br />

guidance from the Office of Management<br />

and Budget (OMB), dated Nov.<br />

28, overruling Department of Homeland<br />

Security (DHS) requests. The<br />

guidance was leaked to the panel’s<br />

Democratic staff by a whistleblower.<br />

Sen. Claire McCaskill (Mo.), the<br />

committee’s top Democrat, had the<br />

staff issue summaries of the OMB<br />

document. One report focuses on<br />

personnel, the other on counterterrorism<br />

programs.<br />

Although the budget documents<br />

concern DHS, the personnel summary<br />

says “OMB intends to issue a pay<br />

freeze for federal civilian employees<br />

in 2019.” Quoting the administration’s<br />

document, the staff report<br />

adds: “OMB has instructed DHS:<br />

‘Per governmentwide guidance, no<br />

civilian pay raise is included in the<br />

recommended level for the FY 2019<br />

Budget.’ ”<br />

The counterterrorism report says the<br />

administration “intends to seek $568<br />

million in cuts to counterterrorism<br />

programs” from 2017 levels. That<br />

would include decreases in programs<br />

on violent extremism, port and public<br />

transportation security, domestic<br />

nuclear detection and emergency<br />

management grants.<br />

According to the staff report, OMB<br />

wants to eliminate Visible Intermodal<br />

Prevention and Response teams,<br />

which “are multidisciplinary groups<br />

of security officers deployed to various<br />

locations to prevent and deter<br />

acts of terrorism” and cut $27 million<br />

from Federal Air Marshals.<br />

“I’m worried that the Office of Management<br />

and Budget is overriding<br />

what local, state, and national leaders<br />

have told me they most need to keep<br />

us safe,” McCaskill said. “With recent<br />

terrorist attacks in our country and<br />

throughout the globe, counterterrorism<br />

programs shouldn’t be on the<br />

chopping block.”<br />

The staff noted that OMB’s budget<br />

“Federal employees all across<br />

the country go to work every day<br />

to serve our veterans, secure our skies,<br />

and support our troops. And yet<br />

federal employees make around<br />

35 percent less than private setor”<br />

guidance does not necessarily represent<br />

the administration’s final spending<br />

plan. Agencies can appeal budget<br />

office guidance. The DHS appeal was<br />

due Dec. 1.<br />

Federal employees had a three-year<br />

freeze on their basic pay rates during<br />

the Obama administration. Another<br />

freeze “may present challenges for<br />

DHS components wishing to retain<br />

qualified employees. Morale and<br />

attrition within DHS have long been<br />

problems that the Department has<br />

struggled to fix,” the committee staff<br />

report said.<br />

continued...<br />

30


January 2018 Edition | GSN Magazine | The News Leader in Physical, IT and Homeland Security<br />

...Continued from page 31<br />

“The absence of a pay increase for<br />

law enforcement personnel may not<br />

allow DHS to remain competitive<br />

with other law enforcement agencies<br />

with whom they compete for qualified<br />

applicants. This is especially true<br />

as DHS components have historically<br />

struggled to meet hiring mandates.”<br />

OMB did not respond to a request<br />

for comment. Leaders of the two<br />

largest federal employee unions that<br />

represent DHS staffers and employees<br />

in many other agencies blasted<br />

the proposed cuts.<br />

“Federal employees all across the<br />

country go to work every day to<br />

serve our veterans, secure our skies,<br />

and support our troops. And yet federal<br />

employees make around 35 percent<br />

less than private sector workers<br />

in the same jobs.,” said J. David Cox<br />

Sr., president of the American Federation<br />

of Government Employees.<br />

His figure refers to data developed by<br />

the Federal Salary Council, but it is<br />

disputed by conservative researchers.<br />

“For the Administration to say they<br />

are going to freeze government<br />

employees’ pay next year is insulting<br />

to these hardworking civil servants<br />

and the sacrifices they make for our<br />

country. They know they’ll never get<br />

rich working for the federal government,<br />

but they believe in the mission<br />

and are willing to accept a lighter<br />

paycheck for the privilege of serving<br />

their country…Federal employees<br />

deserve a pay raise, not a pay freeze.”<br />

National Treasury Employees Union<br />

President Tony Reardon said “we are<br />

alarmed by media reports that internal<br />

documents contain a proposal to<br />

freeze pay for all civilian federal employees.<br />

We are still fighting for a fair<br />

raise in 2018, above the 1.4 percent<br />

across the board raise the administration<br />

is calling for. Private-sector<br />

wages for 2018 are expected to rise<br />

by 3 percent.<br />

“Unlike previous years without pay<br />

increases,” he added, “a pay freeze<br />

in 2019 would come during a time<br />

when the private-sector job market<br />

is healthy and the overall economy<br />

is growing…It would make it harder<br />

for the government to recruit and<br />

retain the highly-skilled professionals<br />

needed to protect our security, our<br />

economy and our public health. A<br />

pay freeze would be a callous attack<br />

on middle-class Americans who have<br />

chosen to serve their country and<br />

their fellow citizens.”<br />

...Continued from page 31<br />

Why GAO Did This Study<br />

Chemical, biological, radiological, nuclear, and<br />

explosive weapons, also known as weapons of mass<br />

destruction (WMD), have the potential to kill thousands<br />

of people in a single incident. In 2013 Congress<br />

directed DHS to review its WMD programs,<br />

including the consolidation of CBRNE mission<br />

functions. DHS recently notified Congress that consolidation<br />

would begin in December 2017.<br />

This testimony is based on GAO findings from an<br />

August 2016 report on (1) the extent to which DHS’s<br />

CBRNE consolidation proposal assessed the benefits<br />

and limitations of consolidation and (2) GAO’s key<br />

practices from past organizational transformations<br />

that could benefit the CBRNE consolidation effort.<br />

GAO reviewed DHS consolidation planning documents,<br />

interviewed relevant officials and obtained<br />

selected updated information on DHS planning<br />

efforts.<br />

31<br />

What GAO Recommends<br />

GAO made two recommendations to DHS in 2016<br />

to (1) complete, document, and make available<br />

analyses of key questions related to its consolidation<br />

proposal; and (2) use the key mergers and organizational<br />

transformation practices identified in GAO’s<br />

previous work. DHS did not concur with the first<br />

recommendation and it was closed as not implemented.<br />

DHS concurred with the second recommendation<br />

and has not yet implemented it. GAO<br />

will continue to monitor DHS’s efforts to address<br />

the second recommendation.


Special Year- End Focus Coming in December:<br />

The GSN 2017 DIGITAL YEARBOOK<br />

OF<br />

Airport/Seaport and Homeland Security Awards Programs<br />

A Message to the GSN’s 2017 Awards Winners:<br />

In order to optimize worldwide exposure and publicity for all Winners and Finalists in our<br />

2017 Awards Programs, GSN has decided to combine the Yearbooks of the “Airport, Seaport,<br />

Border Security Awards” and the “Homeland Security Awards” into one Annual Yearbook that<br />

salutes Winners and Finalists in both programs. Here are the reasons that this is one of the<br />

best promotional opportunities of the year for our Awards Winners:<br />

• Each participating Winner or Finalist in these programs is entitled to a two-page<br />

spread in the Annual Yearbook at a cost deeply discounted from regular rates.<br />

• You don’t have to spend any time, effort or money creating an advertisement, because<br />

our designer posts your spread in an attractive 2-page format with logo and links<br />

• Based on our long experience with Awards Winners and the recognition generally<br />

received from Google and other search engines, plus social media, you’ll receive<br />

exemplary coverage on your accomplishments, which is further enhanced by a month’s<br />

exposure on our website.<br />

To Reserve Your 2-Page Spread in the 2017 Digital Yearbook of Awards Winners<br />

Contact GSN Publisher Chris Zawadzki, 914-888-6843<br />

chriszawadzki@gsnmagazine.com


January 2018 Edition | GSN Magazine | The News Leader in Physical, IT and Homeland Security<br />

Border Control<br />

U.S. Senate Report Reveals Internal Disagreements<br />

over Funding Counterterrorism Programs in<br />

Administration’s FY 2019 Budget Proposal<br />

After receiving whistleblower document, Democratic staff of the Homeland Security and<br />

Governmental Affairs Committee issues report showing that the White House rejected key<br />

counterterrorism elements of the Department of Homeland Security’s budget request<br />

WASHINGTON - The Democratic<br />

staff of the Senate Homeland Security<br />

and Governmental Affairs Committee<br />

today issued a report detailing<br />

the Administration’s intended funding<br />

cuts to Department of Homeland<br />

Security (DHS) state, local, and<br />

national counterterrorism programs<br />

based on an FY 2019 budget document<br />

DHS received from the Office<br />

of Management and Budget (OMB),<br />

which was provided to the Committee<br />

by a whistleblower.<br />

“I’m worried that the Office of Management<br />

and Budget is overriding<br />

what local, state, and national leaders<br />

have told me they most need to keep<br />

us safe,” McCaskill said. “With recent<br />

terrorist attacks in our country and<br />

throughout the globe, counterterrorism<br />

programs shouldn’t be on the<br />

chopping block.”<br />

Federal agencies develop their budgets<br />

for the upcoming fiscal year and<br />

submit a request to OMB, typically<br />

in the fall. OMB then reviews the<br />

proposed budget, ensuring it aligns<br />

with the President’s priorities, and<br />

communicates its funding decisions<br />

to the agency through a process<br />

referred to as “passback.” At times,<br />

OMB provides less money than<br />

requested; in other instances it provides<br />

more. In late November 2017,<br />

a whistleblower provided OMB’s<br />

nonpublic “passback” document to<br />

the Democratic staff of the Senate<br />

Homeland Security and Governmental<br />

Affairs Committee. The document<br />

is titled the Department of Homeland<br />

Security Fiscal Year 2019 Budget<br />

and Policy Guidance and details<br />

OMB guidance from the President<br />

to the Department of Homeland<br />

Security regarding its FY 2019 budget<br />

proposal. The Senate Homeland<br />

Security and Governmental Affairs<br />

Committee Democrat Staff report<br />

examines counterterrorism cuts in<br />

the “passback” document, including<br />

DHS’s initial FY 2019 budget proposal<br />

and OMB’s responsive guidance<br />

directing more drastic cuts.<br />

Key findings from the report, Overruled:<br />

White House Overrules<br />

Department of Homeland Security<br />

Budget Requests for Counterterrorism<br />

Programs:<br />

• Visible Intermodal Prevention<br />

and Response (VIPR) teams are<br />

multi-disciplinary groups of security<br />

officers deployed to various locations<br />

to prevent and deter acts of<br />

terrorism. Rejecting DHS’s request,<br />

OMB instructed DHS to completely<br />

eliminate VIPR Teams and cut an additional<br />

$27 million for Federal Air<br />

Marshals.<br />

• Denying DHS’s request, OMB<br />

ordered DHS to seek $11 million<br />

in additional cuts for the Domestic<br />

Nuclear Detection Office.<br />

• The Administration intends<br />

to seek $568 million in total cuts to<br />

DHS counterterrorism programs<br />

from FY 2017 enacted budget levels.<br />

McCaskill has previously emphasized<br />

the importance of DHS’s counterterrorism<br />

programs. She has repeatedly<br />

questioned DHS and other national<br />

security officials about potential<br />

cuts to the programs during Senate<br />

hearings, and a report issued by the<br />

Homeland Security and Governmental<br />

Affairs Committee Democratic<br />

staff earlier this year highlighted the<br />

impact of the Administration’s proposed<br />

FY 2018 budget cuts.<br />

The report from the Senate Homeland<br />

Security and Governmental<br />

Affairs Committee’s Democratic staff,<br />

led by the staff of Ranking Member<br />

Claire McCaskill, is available online.<br />

33


January 2018 Edition | GSN Magazine | The News Leader in Physical, IT and Homeland Security<br />

Staffing Levels at Immigration and Customs Enforcement<br />

On January 25, 2017, President<br />

Donald Trump signed an executive<br />

order which called for Immigration<br />

and Customs Enforcement (ICE) to<br />

hire 10,000 additional ICE Agents.<br />

ICE enforces federal laws governing<br />

border control, customs, trade and<br />

immigration to promote homeland<br />

security and public safety. For enforcement<br />

purposes, ICE’s jurisdiction<br />

is the U.S. interior, as opposed<br />

to the ports of entry or the border.<br />

ICE’s principal law enforcement<br />

components are Homeland Security<br />

Investigations and Enforcement and<br />

Removal Operations.<br />

OMB provided ICE with<br />

a total discretionary<br />

budget of $8.08 billion<br />

in FY 2019. OMB stated<br />

that this funding level<br />

“supports key Administration<br />

immigration priorities<br />

… such as hiring<br />

of 2,000 additional Law<br />

Enforcement Officers<br />

(LEOs); resources to<br />

support that hiring effort<br />

will be augmented by<br />

United States Citizenship<br />

and Immigration Services (USCIS)<br />

fees. Additionally, guidance is provided<br />

to fund 47,656 beds.”<br />

The OMB document indicates that<br />

hiring at ICE is prioritized to “enable<br />

additional enforcement actions within<br />

the interior of the United States.”<br />

OMB instructed the Department to<br />

hire more ICE law enforcement officers<br />

that the Department originally<br />

requested, explaining:<br />

In order to ensure the Department<br />

is prepared to reach the total hiring<br />

goal of 2,000 new law enforcement<br />

officers in FY 2019, OMB instructed<br />

ICE to provide a briefing by January<br />

15, 2018 on its hiring and staffing<br />

plan, mission support and attorney<br />

positions.<br />

OMB provides nearly $2 billion for<br />

the Homeland Security Investigations<br />

efforts, including funding to<br />

support the hiring of 300 new law<br />

enforcement officers in that unit.<br />

OMB anticipates these positions “will<br />

support the prevention and detection<br />

of immigration benefit fraud and the<br />

investigatory work necessary to adjudicate<br />

applications, including visa<br />

overstay and worksite enforcement, if<br />

applicable.”<br />

OMB provided $1.7 billion for<br />

Domestic Investigations, including<br />

a program increase of $13 million to<br />

cover the expansion of Visa Security<br />

Program locations. Enforcement and<br />

34<br />

Removal Operations (ERO) will be<br />

funded at $5.2 billion, which OMB<br />

asserted “includes adequate funding<br />

for the annualization of new ERO<br />

staff hired in 2018 and supports an<br />

additional 1,700 [law enforcement<br />

officers] in FY 2019.<br />

In order to support the new law<br />

enforcement officers in FY 2019,<br />

OMB includes $44 million above the<br />

Department’s original request to fund<br />

additional training and infrastructure.<br />

Additionally, OMB requested<br />

ICE to collaborate with DHS components<br />

and other federal agencies<br />

with a role in the Administration and<br />

“The Department’s 2019 request supports hiring just<br />

1,000 new [law enforcement officers].Because of the<br />

Administration’s priority to increase the ICE [law<br />

enforcement officer] workforce, additional resources<br />

are provided … to hire an additional 1,000 [law enforcement<br />

officers] above the Department’s request, for a<br />

total hiring goal of 2,000 new law enforcement officers<br />

in 2019.”<br />

enforcement of immigration laws to<br />

determine how agencies can perform<br />

immigration functions more efficiently<br />

and effectively.


January 2018 Edition | GSN Magazine | The News Leader in Physical, IT and Homeland Security<br />

Cybersecurity<br />

Pilot Project Helps Secure First Responder<br />

Apps From Cyberattacks<br />

Washington, D.C.—A pilot project<br />

by the Department of Homeland<br />

Security (DHS) Science and Technology<br />

Directorate (S&T) resulted in the<br />

successful remediation of potential<br />

cybersecurity vulnerabilities in mobile<br />

applications (apps) used by the<br />

nation’s public-safety professionals,<br />

supporting the creation of an on-going<br />

mobile app-testing program.<br />

In emergency and disaster situations,<br />

mobile devices and apps enable<br />

public-safety professionals to receive<br />

and share critical information in real-time,<br />

which enhances the delivery<br />

of life-saving services. As reliance<br />

on mobile technology grows, it is<br />

important that mobile apps used by<br />

public safety are free of malware or<br />

vulnerabilities.<br />

The pilot testing project—“Securing<br />

Mobile Applications for First<br />

Responders”—was a joint effort of<br />

the Homeland Security Advanced<br />

Research Project Agency’s Cyber<br />

Security Division, S&T’s First Responder<br />

Group (FRG), Association<br />

of Public-Safety Communications<br />

Officials (APCO) and Kryptowire,<br />

LLC, the developer of a leading<br />

mobile app-vetting platform that was<br />

funded by S&T.<br />

Its dual goals were to improve mobile<br />

app security for the public-safety<br />

community and determine the need<br />

for a sustainable model for testing<br />

the security and privacy-protection<br />

capabilities of public-safety apps.<br />

To these ends, the pilot sought to<br />

determine the degree to which the<br />

selected public-safety apps are vulnerable<br />

to cyberattacks—malware,<br />

ransomware and spyware—or had<br />

coding vulnerabilities that could<br />

compromise the device’s security,<br />

expose personal data or allow for<br />

eavesdropping.<br />

“This pilot project illustrates the<br />

efficacy, benefits and value an ongoing<br />

app-testing program will provide<br />

to the public-safety community and<br />

the nation,” said Vincent Sritapan,<br />

S&T’s Program Manager for Mobile<br />

Security Research and Development.<br />

“During the testing phase, numerous<br />

cyber vulnerabilities were identified<br />

and remediated. This model can be<br />

used to ensure all apps used by the<br />

public-safety professionals are secured<br />

against cyberattacks and other<br />

security and privacy weaknesses.”<br />

For the study, APCO selected 33<br />

popular apps (iOS and Android<br />

versions counted separately) created<br />

by 20 developers that are offered<br />

through AppComm, its public-safety<br />

application directory. The pilot was<br />

conducted over three months by the<br />

team using Kryptowire’s mobile app<br />

software testing platform integrated<br />

into APCO’s AppComm website.<br />

The testing scrutinized each app’s<br />

35


January 2018 Edition | GSN Magazine | The News Leader in Physical, IT and Homeland Security<br />

security, privacy, and information<br />

and device access.<br />

The pilot-testing project discovered<br />

potential security and privacy concerns—such<br />

as access to the device<br />

camera, contacts or Short Message<br />

Service messages—in 32 of 33 popular<br />

apps that were tested. Eighteen<br />

apps were discovered to have critical<br />

flaws such as hard-coded credentials<br />

stored in binary, issues with handling<br />

Secure Sockets Layer certificates or<br />

susceptibility to “man-in-the-middle”<br />

attacks.<br />

Pilot project leaders worked with<br />

each app developer to remediate<br />

identified vulnerabilities. So far, ten<br />

developers successfully remediated<br />

their apps, and as a result of the pilot<br />

project, the security and privacy<br />

concerns of 14 mobile apps were<br />

addressed.<br />

Most developers who fixed their app’s<br />

vulnerability(ies) reported investing<br />

approximately one hour on remediation.<br />

Remediation steps included removing<br />

old or unused code, enabling<br />

built-in security provided by the<br />

operating system, and ensuring the<br />

functionality requested is necessary<br />

for operations.<br />

“As more apps are adopted for public-safety<br />

missions, it is critical that<br />

a formal, ongoing app-evaluation<br />

process with incentives for developer<br />

participation be adopted to ensure<br />

current and new mobile apps are free<br />

of vulnerabilities,” said John Merrill,<br />

Director of the S&T FRG Next<br />

Generation First Responder Apex<br />

program.<br />

For more information about the pilot<br />

testing project results and recommendations,<br />

please visit our<br />

“Securing Mobile Applications for<br />

First Responders” website.<br />

ADDITIONAL INFO: PDF icon DHS S&T Report:<br />

Securing Mobile Apps for First Responders<br />

(December 2017482.29 KB)<br />

36


January 2018 Edition | GSN Magazine | The News Leader in Physical, IT and Homeland Security<br />

Conclusion and Next Steps<br />

• Mobile apps used by first responders<br />

and members of the public for emergency<br />

response or other public safety purposes<br />

are vulnerable<br />

• App security evaluation s can be accomplished<br />

using semi -automated testing<br />

based on established criteria, combined<br />

with human analysis to make a risk -based<br />

assessment<br />

• Continuous app security evaluations are<br />

necessary any time a mobile app is updated<br />

or a new version is submitted<br />

• Developers are willing to pay for app evaluations<br />

if the right incentives are in place<br />

• Education for the first responder community<br />

is needed to raise awareness of the<br />

state of mobile app security and increase<br />

demand for app security evaluation<br />

A foundational question of the pilot<br />

was whether there is a financial<br />

model to support public safety app<br />

evaluations . The pilot’s findings provide<br />

preliminary evidence for this<br />

financial model to be true. Developers<br />

recognize sufficient value in an<br />

app evaluation process to support a<br />

model in which developers pay for<br />

a subscription to a public safety app<br />

certification program. Not only did<br />

this finding validate the importance<br />

of the pilot, it suggests that expanding<br />

and refining a testing program for the<br />

broader public safety app ecosystem<br />

is feasible and desirable.<br />

Engagement with the app developer<br />

community for public safety apps<br />

is necessary to encourage and raise<br />

awareness of the need to build security<br />

in during the development process<br />

and to test the security of the apps<br />

prior to releasing them to an app store<br />

and the public . DHS S&T is investing<br />

in mobile app security R&D to integrate<br />

security into mobile app development<br />

platforms. The result of this<br />

research will enable developers using<br />

the platform to improve the security<br />

of their mobile apps.<br />

The pilot also generated several lessons<br />

learned about the security criteria,<br />

testing platform and workflow.<br />

Notably, a knowledgeable mobile app<br />

security evaluator is essential to effective<br />

remediation and confidence in<br />

the evaluations. A mobile app analysis<br />

tool, although automated, should still<br />

require a human in the loop to make<br />

a risk- based assessment and decision.<br />

It is expected that introducing additional<br />

variables such as the preferences,<br />

policies and laws for individuals or<br />

sponsoring public safety agencies will<br />

increase the nuances of app evaluations<br />

and the need for human judgment<br />

as part of the process.<br />

The next step is to carry the lessons<br />

learned from the app testing pilot<br />

into consultation with public safety<br />

stakeholders , including state and local<br />

public safety agencies and entities<br />

such as the First Responder Network<br />

Authority (FirstNet) and SAFECOM.<br />

The preferences, policies and laws affecting<br />

public safety organization use<br />

of mobile apps will dictate the ultimate<br />

form of a sustainable app evaluation<br />

process. Ongoing consultation<br />

and an awareness program for public<br />

safety stakeholders at the local, tribal,<br />

state and federal levels is essential<br />

for the establishment and continued<br />

success of an app evaluation process<br />

supporting the public safety mission.<br />

37


January 2018 Edition | GSN Magazine | The News Leader in Physical, IT and Homeland Security<br />

Border Control<br />

Drone maker says UAVs set to take over at border<br />

patrols, criminal hot spots<br />

Autonomous drones are set to take<br />

over border patrols, crime hotspot<br />

monitoring and more, says South<br />

Africa’s Unmanned aerial vehicles<br />

(UAV)s, commonly known as<br />

drones, will soon be a common sight<br />

over border zones, crime hotspots<br />

and city streets, as public safety and<br />

security officials and police departments<br />

discover the cost saving and<br />

efficiencies offered by drone patrol<br />

‘armies’, says Airborne Drones, a<br />

South African-based international<br />

manufacturer of enterprise-grade<br />

drones.<br />

“Drones provide the ideal solution to<br />

the problems and limitations faced<br />

by other surveillance methods such<br />

as GPS tracking, CCTV camera<br />

observation, biometric surveillance<br />

and ground patrols,” says Airborne<br />

Drones South Africa. “Aerial surveillance<br />

is increasingly being harnessed<br />

for security monitoring; but traditionally,<br />

this has been carried out using<br />

helicopters - which are costly to<br />

deploy - and with drones controlled<br />

by a user - which can be somewhat<br />

limited in terms of operating hours.<br />

However, drone surveillance does<br />

present an easier, faster, and cheaper<br />

method of data collection, as well<br />

as a number of other key advantages.<br />

Specialised security drones can<br />

enter narrow and confined spaces,<br />

produce minimal noise, and can be<br />

equipped with night vision cameras<br />

and thermal sensors, allowing them<br />

to provide imagery that the human<br />

eye is unable to detect. In addition,<br />

these UAVs can quickly cover large<br />

and difficult-to-reach areas, reducing<br />

staff numbers and costs, and do not<br />

require much space for their operators.”<br />

39<br />

“Autonomous, long-range security<br />

drones are at the vanguard of new<br />

policing methods”, says Airborne<br />

Drones South Africa. “Offering live<br />

video feeds to ground control stations,<br />

these drones can range autonomously<br />

over pre-programmed flight<br />

paths for extended periods of time,<br />

allowing for ongoing routine patrols<br />

across wide areas such as borders,<br />

maritime regions and high security<br />

installations. Should an incident be<br />

detected, ground crews can then follow<br />

objects or intruders from a safe<br />

distance, providing visual support to<br />

safety and security teams. UAVs can<br />

provide detailed visual documentation<br />

of sites, enabling effective analysis,<br />

risk management and security<br />

planning.”<br />

“Numerous countries are already<br />

rolling out security drones to support<br />

their public safety and defence initiatives”,<br />

says Airborne Drones. UAVs<br />

are also instrumental in managing<br />

transport infrastructure safety and<br />

security and event security, from<br />

event security infrastructure through<br />

to spectator and crowd control and<br />

safety, to overall health and safety<br />

planning around the world.<br />

Israel has long harnessed advanced<br />

drones for military surveillance, and<br />

recently sold a fleet of so-called ‘spy<br />

drones’ to the Irish army; the US<br />

FBI has also used drones for surveillance<br />

and tracking for several years.<br />

In Australia, a new $50 million Defence<br />

Cooperative Research Centre


January 2018 Edition | GSN Magazine | The News Leader in Physical, IT and Homeland Security<br />

will develop long-range drones,<br />

automated vehicles and robots to<br />

help Australian soldiers fight the<br />

wars of the future. India is currently<br />

looking to military-grade UAVs for<br />

maritime and other surveillance and<br />

intelligence gathering, Brazil’s São<br />

Paulo last month became the first<br />

Latin American city to use drones for<br />

public security surveillance, and the<br />

German city of Hamburg this week<br />

said it would deploy surveillance<br />

drones as part of its arsenal against<br />

an expected 100,000 demonstrators<br />

at the G20 summit this weekend.<br />

In Australia’s New South Wales, the<br />

authorities are even using helicopter<br />

and drone surveillance along the<br />

coast to protect holiday makers from<br />

rip currents and sharks.<br />

“Drones are ideally suited for reconnaissance<br />

or rapid situation awareness<br />

with application for ground<br />

force units to detect and monitor<br />

potential threats; and they also<br />

provide an additional oversight in<br />

instances where security guards are<br />

deployed to ensure their adherence<br />

to patrolling routines. Their speed,<br />

size, maneuverability and additional<br />

technologies make UAVs the perfect<br />

supplement to ground security teams<br />

seeking to perform monitoring tasks<br />

more quickly and efficiently. Drones<br />

have a competitive edge over stationary<br />

cameras, as intruders can’t easily<br />

step out of sight, and they can cover<br />

areas that are normally out of reach.<br />

Security drones add a whole new<br />

dimension to surveillance, safety and<br />

security, and as such, we can expect<br />

them to be commonly in use in every<br />

country in the world within just a<br />

few years,” says Airborne Drones.<br />

40


January 2018 Edition | GSN Magazine | The News Leader in Physical, IT and Homeland Security<br />

Communications<br />

New NIST Spectrometer Measures Single Photons<br />

with Great Precision<br />

Future communications networks<br />

that are less vulnerable to hacking<br />

could be closer to reality with an invention<br />

that measures the properties<br />

of single-photon sources with high<br />

accuracy.<br />

Built by scientists at the National Institute<br />

of Standards and Technology<br />

(NIST), the device could help bring<br />

about “quantum communications”<br />

networks, which would use individual<br />

particles of light to send bits<br />

of information. Because each bit of<br />

information can be embedded in the<br />

quantum properties of a single photon,<br />

the laws of quantum mechanics<br />

make it difficult, if not impossible,<br />

for an enemy to intercept the message<br />

undetected.<br />

Both the telecommunications and<br />

computer industries would like such<br />

networks to keep information secure.<br />

The NIST method may help overcome<br />

one of the technical barriers<br />

standing in their way by measuring<br />

photons’ spectral properties—essentially<br />

their color—10,000 times better<br />

than conventional spectrometers.<br />

“ ...information can be embedded in<br />

the quantum properties of a single<br />

photon, the laws of quantum<br />

mechanics make it difficult, if not<br />

impossible, for an enemy to intercept<br />

the message undetected.”<br />

Individual photons have a limitation:<br />

They cannot travel through fiber-optic<br />

cables for more than about 100<br />

kilometers (about 60 miles) without<br />

likely being absorbed. A quantum<br />

network able to handle worldwide<br />

communications would need periodic<br />

way stations that could catch<br />

photons and retransmit their information<br />

without loss. The NIST team’s<br />

invention could help such a “quantum<br />

repeater” interact effectively<br />

with photons.<br />

Key to the operation of the quantum<br />

repeater would be a memory component<br />

that uses an ensemble of atoms<br />

to store the photon’s information<br />

briefly and retransmit it at the right<br />

moment. Its operation would involve<br />

an atom’s energy structure: As an<br />

atom catches the photon, the atom’s<br />

energy level rises to a higher state.<br />

At the desired moment, the atom<br />

returns to its original state and emits<br />

the energy as another photon.<br />

Not just any photon can readily<br />

interact with this atom, though. It<br />

needs to be exactly the right color,<br />

or wavelength, needed to make the<br />

atom’s outer electron jump to a higher<br />

state. To make usable repeaters,<br />

engineers need to measure photons’<br />

wavelengths far more precisely than<br />

conventional spectrometers can.<br />

The NIST team goes past convention<br />

with a technique called electromagnetically<br />

induced transparency<br />

(EIT), which starts out by using<br />

atoms’ ability to block light of a specific<br />

wavelength.<br />

Astronomers can tell what gases<br />

form the atmosphere of a far-off<br />

world because light passing through<br />

it makes the gas molecules vibrate<br />

at frequencies that block out light<br />

of particular colors, creating telltale<br />

dark lines in the light’s spectrum.<br />

EIT essentially creates a single dark<br />

line by beaming a laser at atoms<br />

whose vibrations block much of its<br />

light. A second laser, tuned to nearly<br />

the same wavelength as the first, is<br />

directed at the same atom and the interference<br />

between these two nearly<br />

identical beams alters the darkness.<br />

Instead of a simple dark line, it creates<br />

a line with a narrow transparent<br />

hole through which photons only of<br />

an extremely specific wavelength can<br />

pass.<br />

41


January 2018 Edition | GSN Magazine | The News Leader in Physical, IT and Homeland Security<br />

By making fine adjustments to the<br />

second laser’s wavelength, the team<br />

found it could move the hole back<br />

and forth across the dark line’s<br />

width, giving them a way to make<br />

highly precise measurements of a<br />

passing photon’s wavelength.<br />

To give a sense of how precise their<br />

spectrometer is, the team gave the<br />

example of a common laser pointer<br />

that shines in a single narrow color<br />

range, creating a pure-colored point<br />

on a screen. The typical spectrum<br />

width of a laser pointer is right<br />

around 1 terahertz (THz). The NIST<br />

invention can measure the color of a<br />

single-photon-level signal that has a<br />

spectrum 10 million times narrower<br />

than the laser pointer, resulting in<br />

a performance 10,000 times better<br />

than typical conventional spectrometers.<br />

“Additionally, we can extend our<br />

EIT spectrometer’s performance to<br />

any other wavelength range using<br />

other processes developed by our<br />

group without sacrificing its spectral<br />

resolution, high wavelength<br />

accuracy and high detection sensitivity,”<br />

said Lijun Ma, an optical engineer<br />

on the NIST team. “We think<br />

this will give the industry the tool<br />

it needs to build effective quantum<br />

repeaters.”<br />

21


January 2018 Edition | GSN Magazine | The News Leader in Physical, IT and Homeland Security<br />

Federal and Legislative<br />

After recent terrorist incidents in U.S., Senators<br />

codify Department of Homeland Security’s Counterterrorism<br />

Advisory Board<br />

WASHINGTON – In the aftermath<br />

of recent terrorist incidents, U.S.<br />

Senators Claire McCaskill (D-Mo.),<br />

Marco Rubio (R-Fla.), and Maggie<br />

Hassan (D-N.H.) today introduced<br />

bipartisan legislation authorizing the<br />

Department of Homeland Security’s<br />

(DHS) Counterterrorism Advisory<br />

Board, whose mission is to bring together<br />

the intelligence, operational,<br />

and policy-making elements from<br />

across DHS to devise joint strategies<br />

to deter and disrupt potential terrorist<br />

attacks.<br />

<br />

“This bill is about ensuring that everyone<br />

inside the Department of<br />

Homeland Security committed to<br />

preventing and responding<br />

to terrorist incidents are able<br />

to communicate and coordinate<br />

effectively with each<br />

other,” said McCaskill, the<br />

top-ranking Democrat on<br />

the Senate Homeland Security<br />

and Governmental Affairs<br />

Committee. “The men<br />

and women heroically contributing<br />

to our counterterrorism<br />

efforts are the best in<br />

the world and this bill will augment<br />

their efforts.”<br />

“The Counterterrorism Advisory<br />

Board (CTAB) is an important component<br />

of the Department of Homeland<br />

Security’s work in preventing<br />

terrorist attacks by identifying and reducing<br />

security threats and vulnerabilities,”<br />

said Senator Rubio. “This bill<br />

will ensure that the CTAB facilitates a<br />

cohesive operational strategy so that<br />

DHS components and their partners<br />

are best enabled to detect, deter and<br />

disrupt terrorist operations.”<br />

“ This bill will ensure that the CTAB facilitates<br />

a cohesive operational strategy so that DHS<br />

components and their partners are best enabled<br />

to detect, deter and disrupt terrorist operations.”<br />

— Senator Marco Rubio<br />

“The Department of Homeland Security<br />

is tasked with preventing terrorist<br />

attacks on our homeland, and we<br />

must ensure that the full resources of<br />

the Department and the entire federal<br />

government are coordinated in focusing<br />

on this critical mission,” said Senator<br />

Hassan. “I call on members of<br />

both parties to support this bipartisan<br />

bill that will help ensure coordination<br />

of the Department’s counter-terrorism<br />

operations and keep our communities<br />

safe.”<br />

The Counterterrorism Advisory<br />

Board (CTAB) was established in<br />

2010 after the failed “underwear<br />

bomber” attack on a Northwest Airlines<br />

flight in 2009 revealed a need<br />

for better coordination and ongoing<br />

situational awareness for senior leadership.<br />

Since its creation, CTAB has met<br />

to make recommendations about<br />

whether to issue a National Threat<br />

Alert System alert, and has aided<br />

in the response to aviation threats,<br />

border threats, homegrown violent<br />

extremists, and cyber threats. The<br />

Senator’s Counterterrorism Advisory<br />

Board (CTAB) Authorization<br />

Act of 2017 codifies<br />

the board for four years and<br />

ensures that DHS will continue<br />

to succeed in its counterterrorism<br />

mission.<br />

43


Special Year- End Focus Coming in December:<br />

The GSN 2017 DIGITAL YEARBOOK<br />

OF<br />

Airport/Seaport and Homeland Security Awards Programs<br />

A Message to the GSN’s 2017 Awards Winners:<br />

In order to optimize worldwide exposure and publicity for all Winners and Finalists in our<br />

2017 Awards Programs, GSN has decided to combine the Yearbooks of the “Airport, Seaport,<br />

Border Security Awards” and the “Homeland Security Awards” into one Annual Yearbook that<br />

salutes Winners and Finalists in both programs. Here are the reasons that this is one of the<br />

best promotional opportunities of the year for our Awards Winners:<br />

• Each participating Winner or Finalist in these programs is entitled to a two-page<br />

spread in the Annual Yearbook at a cost deeply discounted from regular rates.<br />

• You don’t have to spend any time, effort or money creating an advertisement, because<br />

our designer posts your spread in an attractive 2-page format with logo and links<br />

• Based on our long experience with Awards Winners and the recognition generally<br />

received from Google and other search engines, plus social media, you’ll receive<br />

exemplary coverage on your accomplishments, which is further enhanced by a month’s<br />

exposure on our website.<br />

To Reserve Your 2-Page Spread in the 2017 Digital Yearbook of Awards Winners<br />

Contact GSN Publisher Chris Zawadzki, 914-888-6843<br />

chriszawadzki@gsnmagazine.com


January 2018 Edition | GSN Magazine | The News Leader in Physical, IT and Homeland Security<br />

GSN’s Homeland Security Awards<br />

CATEGORY #1<br />

GSN HSA2017<br />

AWARDS<br />

CYBER SECURITY PRODUCTS AND SOLUTIONS<br />

Judging in this category is based on a combination of client organization, technological<br />

innovation or improvement, filling a recognized government IT security<br />

need and flexibility of a solution to meet current and future organizational needs.<br />

Best Mobile Application Security Solution<br />

Appthority – Platinum Winner<br />

Best User & Entity Behavior Analytics Solution<br />

Bay Dynamics – Platinum Winner<br />

Gurucul – Gold Winner<br />

Best Anti-Malware Solution<br />

Bromium – Platinum Winner<br />

Best Application Security Solution<br />

Waratek – Platinum Winner<br />

Code Dx, Inc – Gold Winner<br />

Sargent and Greenleaf – Silver Winner<br />

Bromium - Finalist<br />

Best Email Security/ Loss Management<br />

Solution<br />

Bromium – Platinum Winner<br />

Best identity Management Platform<br />

Centrify – Platinum Winner<br />

CyberArk – Gold Winner<br />

Forum Systems – Silver Winner<br />

Lieberman Software Corporation - Finalist<br />

Best Continuous Monitoring &<br />

Mitigation Solution<br />

DFLabs – Platinum Winner<br />

Netwrix Corporation – Gold Winner<br />

SolarWinds Worldwide, LLC – Silver Winner<br />

CyberArk - Finalist<br />

Best Physical Logical Privileged Access<br />

Management Solutions<br />

CyberArk – Platinum Winner<br />

Forum Systems – Gold Winner<br />

Best Cyber Operational Risk Intelligence<br />

DFLabs – Platinum Winner<br />

RedSeal – Gold Winner<br />

RiskSense – Silver Winner<br />

Best Compliance/Vulnerability Assessment<br />

Netwrix Corporation – Platinum Winner<br />

Wombat Security Technologies, Inc. – Gold Winner<br />

Best Network Security/Enterprise Firewall<br />

OPAQ Networks – Platinum Winner<br />

Best Multifactor Authentication Solutions<br />

Optimal IdM – Platinum Winner<br />

45


January 2018 Edition | GSN Magazine | The News Leader in Physical, IT and Homeland Security<br />

Best Endpoint Detection and Response<br />

Solution<br />

Secdo – Platinum Winner<br />

Best Security Incident and Event (SIEM)<br />

Management<br />

SolarWinds Worldwide, LLC – Platinum Winner<br />

Best Industrial Cybersecurity Solution<br />

Veracity Industrial Networks, Inc – Platinum Winner<br />

CATEGORY #2<br />

VENDORS OF PHYSICAL SECURITY<br />

PRODUCTS AND SOLUTIONS<br />

Judging in this category is based on a combination of<br />

an increase in client organization, technological innovation<br />

or improvement, filling a recognized government<br />

IT security need and flexibility of a solution to<br />

meet current and future organizational needs.<br />

VIDEO SURVEILLANCE SOLUTIONS<br />

Best Thermo, Nightvision, Infrared<br />

Cameras<br />

FLIR Systems, Inc. – Platinum Winner<br />

CohuHD Costar Gold Winner – Gold Winner<br />

Best City-Wide Video Surveillance​<br />

Logos Technologies - – Platinum Winner<br />

COMMUNICATIONS SOLUTIONS<br />

Best Interoperable First Responder<br />

Communications<br />

LRAD Corporation – Platinum Winner<br />

Best Mass Notification System<br />

Desktop Alert – Platinum Winner<br />

Best Tactical Mesh Radio<br />

Persistent Systems – Platinum Winner<br />

46<br />

BARRIERS<br />

Best Perimeter Protection, Intrusion<br />

Detection System<br />

AMICO – Platinum Winner<br />

PureTech Systems – Gold Winner<br />

FLIR Systems, Inc. – Silver Winner<br />

Best Crash Barriers (Fences, Gates,<br />

Barriers, Bollards)<br />

TCP-Security Solutions – Platinum Winner<br />

DETECTION PRODUCTS<br />

Best Nuclear/Radiation Detection Solution<br />

FLIR Systems, Inc. – Platinum Winner<br />

Best Chemical Detection Product or Solution<br />

Rapiscan Systems – Platinum Winner<br />

FLIR Systems, Inc. – Gold Winner<br />

Teknoscan Systems Inc. – Silver Winner<br />

Best Explosives Detection Product or<br />

Solution<br />

Rapiscan Systems – Platinum Winner<br />

Best Active Shooter Gunshot Detection<br />

Solution<br />

Shooter Detection Systems – Platinum Winner<br />

SERVICES EDUCATION<br />

Best College/University in Homeland Security<br />

Bellevue University – Platinum Winner<br />

Best Disaster Preparedness, Recovery,<br />

Clean-up<br />

High Rise Escape Systems Inc. – Platinum Winner<br />

Vendors of IT<br />

Best Access Control Hardware<br />

Sargent and Greenleaf – Platinum Winner<br />

CATEGORY 3


January 2018 Edition | GSN Magazine | The News Leader in Physical, IT and Homeland Security<br />

GSN’s Homeland Security Awards<br />

Special Year- End Focus Coming in December:<br />

CATEGORY 3 Special Year- End Focus Most Coming Notable in December:<br />

The GSN 2017 Federal DIGITAL Government YEARBOOK<br />

Security<br />

GSN 2017 Government<br />

The<br />

Excellence<br />

GSN 2017<br />

Award<br />

DIGITAL Program, YEARBOOK<br />

Project of OF Initiative<br />

OFFederal Risk Management Process Training Program<br />

Judging in this Airport/Seaport category will be based on and one Homeland or more Security Awards Programs<br />

of the following criteria in the development of successful<br />

strategy and increase in public safety, providing a<br />

notable solution to a recognized problem, reduction in<br />

cost and or major increase in efficiency and effectiveness,<br />

decisive successful action and response to threat<br />

or emergency.<br />

Airport/Seaport and Homeland Security Awards Pro<br />

Year- End Focus Coming in December:<br />

SN 2017 DIGITAL YEARBOOK<br />

OF<br />

Special (RMPTP) Year- End Focus Coming in December:<br />

Department of Homeland<br />

OFSecurity Science and<br />

Technology Directorate<br />

Most Notable Law Enforcement Interdiction,<br />

Arrest, Counter Terrorism or Crime Protection<br />

Program – Federal, State or Local<br />

Federal Risk Management Process Training Program<br />

t and Homeland Security Awards (RMPTP) Programs<br />

A Message to the GSN’s 2017 Awards Winners:<br />

A Message to the GSN’s 2017 Awards Winners:<br />

In order to optimize worldwide exposure and publicity A Message for all Winners to the GSN’s and Finalists 2017 Awards in our Winners:<br />

2017 Awards Programs, GSN has decided to combine the Yearbooks of the “Airport, Seaport,<br />

In order to<br />

In<br />

optimize<br />

order to optimize worldwide exposure and publicity for all<br />

for<br />

Winners<br />

all Winners<br />

and Finalists<br />

and<br />

in our<br />

Finalists in<br />

Border Security Awards” and the “Homeland 2017 Awards Security Programs, Awards” GSN into has decided one Annual to combine Yearbook the Yearbooks that of the “Airport, Seaport,<br />

salutes Winners and Finalists<br />

2017<br />

in<br />

Awards<br />

both programs. Border<br />

Programs,<br />

Security Here Awards” are<br />

GSN<br />

the and<br />

has<br />

reasons the<br />

decided<br />

“Homeland that this<br />

to<br />

Security<br />

combine<br />

is one Awards” of the<br />

the<br />

into<br />

Yearbooks<br />

one Annual Yearbook<br />

of the<br />

that<br />

“Airport, Se<br />

best promotional opportunities Border of Security the year salutes for Awards” Winners our Awards and and Finalists Winners: the “Homeland both programs. Security Here are the Awards” reasons that into this one is one Annual of the Yearboo<br />

best promotional opportunities of the year for our Awards Winners:<br />

salutes Winners and Finalists in both programs. Here are the reasons that this is one of t<br />

• Each participating Winner or Finalist in these programs is entitled to a two-page<br />

best promotional • Each opportunities participating Winner of the or year Finalist for in these our Awards programs is Winners: entitled to a two-page<br />

spread in the Annual Yearbook at a cost spread deeply in the discounted Annual Yearbook from at regular a cost deeply rates. discounted from regular rates.<br />

• You don’t have to spend • any Each time, participating • effort You don’t or money have Winner to creating spend or any an Finalist time, advertisement, effort in these or money because programs creating an advertisement, is entitled to because a two-page<br />

our designer posts your spread in in an the our attractive designer Annual 2-page posts Yearbook your format spread at with in a an cost logo attractive deeply and links 2-page discounted format with logo from and regular links rates.<br />

• Based on our long experience with Awards Winners and the recognition generally<br />

• Based on our long experience • You don’t with Awards have to Winners spend and any the time, recognition effort or generally<br />

received from Google and other search engines, money plus social creating media, you’ll an receive advertisement, be<br />

received from Google and other search engines, plus social media, you’ll receive<br />

our designer exemplary posts coverage your spread on your accomplishments, in an attractive which 2-page is further format enhanced with by a logo month’s and links<br />

exemplary coverage on your accomplishments, exposure on our which website. is further enhanced by a month’s<br />

exposure on our website.<br />

• Based on our long experience with Awards Winners and the recognition general<br />

To Reserve Your 2-Page Spread in the 2017 Digital Yearbook of Awards Winners<br />

received from Google Contact and GSN other Publisher search Chris engines, Zawadzki, plus 914-888-6843 social media, you’ll receive<br />

To Reserve Your 2-Page Spread in the 2017 Digital Yearbook of Awards Winners<br />

exemplary coverage on your chriszawadzki@gsnmagazine.com<br />

accomplishments, which is further enhanced by a mo<br />

Contact GSN Publisher Chris Zawadzki, 914-888-6843<br />

chriszawadzki@gsnmagazine.com<br />

exposure on our website.<br />

Message to the GSN’s 2017 Awards Winners:<br />

GSN | HSA2017AWARDS<br />

The GSN 2017 DIGITAL YEARBOOK<br />

Airport/Seaport and Homeland Security Awards Programs<br />

ze worldwide exposure and publicity for all Winners and Finalists in our<br />

47<br />

To Reserve Your 2-Page Spread in the 2017 Digital Yearbook of Awards W<br />

Contact GSN Publisher Chris Zawadzki, 914-888-6843<br />

ms, GSN has decided to combine the Yearbooks of the “Airport, Seaport,

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!