January2018
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
January 2018 Edition<br />
January 2018 Edition | GSN Magazine | The News Leader in Physical, IT and Homeland Security<br />
Automated Border Control Kiosks Reach 71% Deployment – Page 6<br />
Pilot Project Helps Secure First Responder Apps From Cyberattacks – Page 6<br />
Also in this issue:<br />
GSN HSA 2017 Awards Winners Announced – Page 45<br />
Departments of Homeland Security and Justice Release Data on Incarcerated Aliens-94%<br />
of all Confirmed Aliens in DOJ Custody are Unlawfully Present – Page 41<br />
Top five emerging cybersecurity trends for 2018 - Page 7
Elephant proof.<br />
Our cameras are much tougher than they look. That’s because we don’t just<br />
give them a few strikes during testing, as you might expect. Instead, we subject<br />
them to about 30 heavy strikes – directly on their weakest spots. Don’t worry<br />
though, we keep them away from elephants.<br />
It’s just one of the tough tests Axis cameras face, so you can be sure you’ll<br />
always get the best image quality and high performance – no matter what’s<br />
thrown at them.<br />
Learn more about Axis’ quality assurance work at axis.com/quality<br />
For more information about our governement solutions, visit www.axis.com/usgov<br />
axis_ad_quality-foot_gsn_fpc_us_1701.indd 1 2017-01-27 09:07:47
NEWS<br />
GSN January 2018 Digital Edition<br />
Table of Contents<br />
6<br />
8<br />
14<br />
18<br />
25<br />
Top five emerging cybersecurity trends for 2018 from Netwrix<br />
Executive Order Blocking the Property of Persons Involved in<br />
Serious Human Rights Abuse or Corruption<br />
Exterior View of the Aircraft Explosive Testing<br />
Simulator during a Test<br />
Departments of Homeland Security and Justice Release Data on<br />
Incarcerated Aliens-94% of all Confirmed Aliens in DOJ Custody<br />
are Unlawfully Present<br />
DHS’s Chemical, Biological, Radiological, and Nuclear Program<br />
Consolidation Efforts<br />
Features<br />
22<br />
Automated Border Control Kiosks Reach 71% Deployment<br />
23<br />
35<br />
The kiosk: 20 years and counting<br />
Pilot Project Helps Secure First Responder Apps From<br />
Cyberattacks<br />
“We’re powered by new challenges.<br />
Our experience has made us experts<br />
at providing total security solutions.”<br />
PHIL BARRETT<br />
8 years • Power/Utility Business Development<br />
Our high standards help you meet yours. Providing superior<br />
perimeter security solutions is not just our mission.<br />
It’s personal. And that mission never stops.<br />
AMERISTARSECURITY.COM | 888-333-3422
PROVEN TECHNOLOGY<br />
FOR SERIOUS THREATS<br />
PERIMETER PROTECTION<br />
FOR HIGH-RISK FACILITIES<br />
Designed to deter and withstand today’s increasing threats<br />
to government buildings, commercial properties and critical<br />
infrastructure, Ross Technology anti-ram vehicle barriers,<br />
bollards, gates and fencing offer unique features that minimize<br />
cost and maximize durability.<br />
We specialize in designing and manufacturing unique products that<br />
are tested to US Department of State (DOS) and ASTM standards,<br />
while addressing common challenges associated with installation,<br />
maintenance, restrictive site conditions and harsh environments.<br />
Trusted in embassies and high-risk facilities across the globe,<br />
Ross Technology offers you powerful protection against serious threats.<br />
Learn more at www.rosstechnology.com/perimeter-security/<br />
ARCHITECTURAL SECURITY | SAFETY WORKS<br />
PERIMETER SECURITY | INDUSTRIAL STORAGE<br />
XT-4000 Anti-Climb Sliding Gate<br />
XL-501 Post & Beam Anti-Ram Fence
NEWS<br />
GSN January 2018 Digital Edition<br />
Table of Contents<br />
27<br />
30<br />
34<br />
39<br />
Using video intelligence to protect critical public<br />
infrastructure<br />
Democrats say Trump to seek federal pay freeze and cuts to<br />
domestic security<br />
Staffing Levels at Immigration and Customs Enforcement<br />
Drone maker says UAVs set to take over at border patrols,<br />
criminal hot spots<br />
2017<br />
43<br />
33<br />
43<br />
45<br />
New NIST Spectrometer Measures Single Photons with<br />
Great Precision<br />
blob:https%3A//<br />
mail.google.com/bebcf019-<br />
U.S. Senate Report Reveals Internal Disagreements over<br />
f8dd-4b56-8c7c-5daf421140a9<br />
Funding Counterterrorism Programs in Administration’s<br />
FY 2019 Budget Proposal<br />
After recent terrorist incidents in U.S., Senators<br />
codify Department of Homeland Security’s Counterterrorism<br />
Advisory Board<br />
GSN HSA2017 Awards Program Winners Announced<br />
“We aim to protect property, and provide<br />
peace of mind by providing remarkable<br />
perimeter security products and<br />
unrivaled service.”<br />
EMILY SULLIVAN<br />
11 years • Mission Critical Business Development<br />
We know people make the difference for your business and ours.<br />
Our experienced team thrives on providing the products and<br />
service that lead to total perimeter security solutions.<br />
AMERISTARSECURITY.COM | 888-333-3422
January 2018 Edition | GSN Magazine | The News Leader in Physical, IT and Homeland Security<br />
Cybersecurity<br />
Top five emerging cybersecurity trends for 2018<br />
Netwrix sums up the top cybersecurity<br />
trends that will define the<br />
way organizations develop their IT<br />
strategies in the coming year.<br />
Netwrix Corporation, provider of a<br />
visibility platform for user behavior<br />
analysis and risk mitigation in hybrid<br />
environments, outlines the top<br />
5 emerging IT security trends likely<br />
to affect the way organizations will<br />
approach cybersecurity in 2018.<br />
Although external cyber attacks<br />
continue to become more sophisticated,<br />
the primary security threat<br />
still comes from insiders. To keep<br />
up with the evolving threat landscape,<br />
organizations may have to<br />
rethink their security strategies<br />
and come up with new approaches<br />
to tackling cybersecurity issues.<br />
Netwrix predicts that the following<br />
trends will play a significant role in<br />
2018:<br />
1. Blockchain for IT security.<br />
Blockchain technology enables<br />
data storage in a decentralized and<br />
distributed manner, which eliminates<br />
a single point of failure and<br />
prevents hackers from compromising<br />
large volumes of data. Due<br />
to its ability to quickly identify the<br />
data that has been manipulated,<br />
blockchain may become the core<br />
technology for highly regulated<br />
industries, like banking and law.<br />
2. Focus on insider threats. Netwrix’s<br />
IT Risks Survey found that most<br />
organizations lack visibility into<br />
user behavior, which makes them<br />
vulnerable to insider threats. The<br />
need to keep sensitive information<br />
secure and prevent insider breaches<br />
will force organizations to make<br />
more efforts to establish stricter<br />
control over user activity in their IT<br />
environments.<br />
3. Continuous Adaptive Risk and<br />
Trust Assessment.<br />
Since protection against behind-the-perimeter<br />
attacks is not<br />
sufficient today, Gartner suggests<br />
a Continuous Risk and Trust<br />
Assessment Approach (CARTA),<br />
which sees security as a continuous<br />
process that changes all the time<br />
and has to be regularly reviewed.<br />
Real-time assessment of risk and<br />
trust will enable organizations to<br />
make better decisions regarding<br />
their cybersecurity posture and<br />
mitigate the risks associated with<br />
aberrant user activities.<br />
4.Growing demand for advanced<br />
analytics.<br />
Because security software generates<br />
massive amounts of data, organizations<br />
need advanced analytics to<br />
gain a complete picture of what’s<br />
going on in their IT environments.<br />
The growing adoption of user and<br />
6<br />
entity behavior analytics (UEBA)<br />
technology will help companies<br />
understand their weak points better<br />
and promptly respond to any activities<br />
that might pose threat to data<br />
integrity.<br />
5. Organization-specific approach to<br />
IT security.<br />
Organizations will expect vendors<br />
to offer more personalized security<br />
solutions that address specific pain<br />
points depending on a company’s<br />
size, IT environment complexity<br />
and budget. This will give businesses<br />
an opportunity to implement<br />
products that better match their<br />
needs, and small vendors with a<br />
single focus will be able to compete<br />
with larger but less flexible software<br />
providers.<br />
In 2017, external threats, such as<br />
state-sponsored attacks and cloud<br />
hacks, were the hottest topics for<br />
IT professionals. We expect that<br />
in 2018, the main focus will be<br />
on insider threats, since rogue or<br />
negligent employees and intruders<br />
with stolen credentials may pose a<br />
bigger risk to security than outsider<br />
hackers. Organizations will likely<br />
do their best to minimize insider<br />
risks — by keeping a closer watch<br />
on user activities, analyzing user<br />
behavior, and regularly assessing<br />
risks to proactively spot weaknesses<br />
and improve their security posture.<br />
Michael Fimin, CEO and Co-founder<br />
of Netwrix
Countering Transnational Organized Crime:<br />
An Important Component of Counter-Terrorism Strategy<br />
REGISTER NOW<br />
JAN 31 - FEB 2, 2018<br />
HENRY B. GONZALEZ CONVENTION CENTER<br />
SAN ANTONIO, TEXAS<br />
www.BorderSecurityExpo.com<br />
For Information on Attending,<br />
Sponsorships & Exhibiting<br />
21
January 2018 Edition | GSN Magazine | The News Leader in Physical, IT and Homeland Security<br />
Federal & Legislative<br />
Executive Order Blocking the Property of Persons<br />
Involved in Serious Human Rights Abuse or Corruption<br />
By the authority vested in me as President by the Constitution and the laws of the United States of America,<br />
including the International Emergency Economic Powers Act (50 U.S.C. 1701 et seq.) (IEEPA), the National<br />
Emergencies Act (50 U.S.C. 1601 et seq.) (NEA), the Global Magnitsky Human Rights Accountability<br />
Act (Public Law 114-328) (the “Act”), section 212(f) of the Immigration and Nationality Act of<br />
1952 (8 U.S.C. 1182(f)) (INA), and section 301 of title 3t, United States Code,<br />
I, DONALD J. TRUMP, President of the United States of America, find that<br />
the prevalence and severity of human rights abuse and corruption that have<br />
their source, in whole or in substantial part, outside the United States, such as<br />
those committed or directed by persons listed in the Annex to this order, have<br />
reached such scope and gravity that they threaten the stability of international<br />
political and economic systems. Human rights abuse and corruption undermine<br />
the values that form an essential foundation of stable, secure, and functioning<br />
societies; have devastating impacts on individuals; weaken democratic<br />
institutions; degrade the rule of law; perpetuate violent conflicts; facilitate the<br />
activities of dangerous persons; and undermine economic markets. The United<br />
States seeks to impose tangible and significant consequences on those who<br />
commit serious human rights abuse or engage in corruption, as well as to protect<br />
the financial system of the United States from abuse by these same persons.<br />
I therefore determine that serious human rights abuse<br />
and corruption around the world constitute an unusual<br />
and extraordinary threat to the national security, foreign<br />
policy, and economy of the United States, and I hereby<br />
declare a national emergency to deal with that threat.<br />
I hereby determine and order:<br />
Section 1. (a) All property and interests in property that<br />
are in the United States, that hereafter come within the<br />
United States, or that are or hereafter come within the<br />
possession or control of any United States person of the<br />
following persons are blocked and may not be transferred,<br />
paid, exported, withdrawn, or otherwise dealt in:<br />
(i) the persons listed in the Annex to this order;<br />
(ii) any foreign person determined by the Secretary<br />
of the Treasury, in consultation with the<br />
Secretary of State and the Attorney General:<br />
(A) to be responsible for or complicit in, or to<br />
have directly or indirectly engaged in, serious<br />
human rights abuse;<br />
(B) to be a current or former government official,<br />
or a person acting for or on behalf of such<br />
an official, who is responsible for or complicit<br />
in, or has directly or indirectly engaged in:<br />
(1) corruption, including the misappropriation<br />
of state assets, the expropriation of<br />
private assets for personal gain, corruption<br />
8
January 2018 Edition | GSN Magazine | The News Leader in Physical, IT and Homeland Security<br />
related to government contracts or the extraction<br />
of natural resources, or bribery; or<br />
(2) the transfer or the facilitation of the<br />
transfer of the proceeds of corruption;<br />
(C) to be or have been a leader or official of:<br />
(1) an entity, including any government<br />
entity, that has engaged in, or whose members<br />
have engaged in, any of the activities<br />
described in subsections (ii)(A), (ii)(B)(1),<br />
or (ii)(B)(2) of this section relating to the<br />
leader’s or official’s tenure; or<br />
(2) an entity whose property and interests<br />
in property are blocked pursuant to this<br />
order as a result of activities related to the<br />
leader’s or official’s tenure; or<br />
(D) to have attempted to engage in any of the<br />
activities described in subsections (ii)(A), (ii)<br />
(B)(1), or (ii)(B)(2) of this section; and<br />
(iii) any person determined by the Secretary of the<br />
Treasury, in consultation with the Secretary of State<br />
and the Attorney General:<br />
(A) to have materially assisted, sponsored, or<br />
provided financial, material, or technological<br />
support for, or goods or services to or in support<br />
of:<br />
(1) any activity described in subsections<br />
(ii)(A), (ii)(B)(1), or (ii)(B)(2) of this section<br />
that is conducted by a foreign person;<br />
(2) any person whose property and interests<br />
in property are blocked pursuant to<br />
this order; or<br />
(3) any entity, including any government<br />
entity, that has engaged in, or whose members<br />
have engaged in, any of the activities<br />
described in subsections (ii)(A), (ii)(B)<br />
(1), or (ii)(B)(2) of this section, where the<br />
activity is conducted by a foreign person;<br />
(B) to be owned or controlled by, or to have<br />
acted or purported to act for or on behalf<br />
of, directly or indirectly, any person whose<br />
property and interests in property are blocked<br />
pursuant to this order; or<br />
(C) to have attempted to engage in any of the<br />
activities described in subsections (iii)(A) or<br />
(B) of this section.<br />
(b) The prohibitions in subsection (a) of this section<br />
apply except to the extent provided by statutes, or in<br />
regulations, orders, directives, or licenses that may be<br />
issued pursuant to this order, and notwithstanding<br />
any contract entered into or any license or permit<br />
granted before the effective date of this order.<br />
Sec. 2. The unrestricted immigrant and nonimmigrant<br />
entry into the United States of aliens determined<br />
to meet one or more of the criteria in section<br />
1 of this order would be detrimental to the interests<br />
of the United States, and the entry of such persons<br />
into the United States, as immigrants or nonimmigrants,<br />
is hereby suspended. Such persons shall be<br />
treated as persons covered by section 1 of Proclamation<br />
8693 of July 24, 2011 (Suspension of Entry of<br />
Aliens Subject to United Nations Security Council<br />
Travel Bans and International Emergency Economic<br />
Powers Act Sanctions).<br />
Sec. 3. I hereby determine that the making of donations<br />
of the types of articles specified in section<br />
203(b)(2) of IEEPA (50 U.S.C. 1702(b)(2)) by, to, or<br />
for the benefit of any person whose property and interests<br />
in property are blocked pursuant to this order<br />
would seriously impair my ability to deal with the national<br />
emergency declared in this order, and I hereby<br />
prohibit such donations as provided by section 1 of<br />
this order.<br />
Sec. 4. The prohibitions in section 1 include:<br />
(a) the making of any contribution or provision of<br />
funds, goods, or services by, to, or for the benefit of<br />
any person whose property and interests in property<br />
are blocked pursuant to this order; and<br />
(b) the receipt of any contribution or provision of<br />
funds, goods, or services from any such person.<br />
Sec. 5. (a) Any transaction that evades or avoids, has<br />
9
January 2018 Edition | GSN Magazine | The News Leader in Physical, IT and Homeland Security<br />
Federal & Legislative<br />
...Continued from page 9<br />
the purpose of evading or avoiding, causes a violation<br />
of, or attempts to violate any of the prohibitions<br />
set forth in this order is prohibited.<br />
(b) Any conspiracy formed to violate any of the prohibitions<br />
set forth in this order is prohibited.<br />
Sec. 6. For the purposes of this order:<br />
(a) the term “person” means an individual or entity;<br />
(b) the term “entity” means a partnership, association,<br />
trust, joint venture, corporation, group, subgroup,<br />
or other organization; and<br />
(c) the term “United States person” means any United<br />
States citizen, permanent resident alien, entity<br />
organized under the laws of the United States or any<br />
jurisdiction within the United States (including foreign<br />
branches), or any person in the United States.<br />
Sec. 7. For those persons whose property and interests<br />
in property are blocked pursuant to this order<br />
who might have a constitutional presence in the<br />
United States, I find that because of the ability to<br />
transfer funds or other assets instantaneously, prior<br />
notice to such persons of measures to be taken pursuant<br />
to this order would render those measures ineffectual.<br />
I therefore determine that for these measures<br />
to be effective in addressing the national emergency<br />
declared in this order, there need be no prior notice<br />
of a listing or determination made pursuant to this<br />
order.<br />
Sec. 8. The Secretary of the Treasury, in consultation<br />
with the Secretary of State, is hereby authorized to<br />
take such actions, including adopting rules and regulations,<br />
and to employ all powers granted to me by<br />
IEEPA and the Act as may be necessary to implement<br />
this order and section 1263(a) of the Act with respect<br />
to the determinations provided for therein. The Secretary<br />
of the Treasury may, consistent with applicable<br />
law, redelegate any of these functions to other officers<br />
and agencies of the United States. All agencies shall<br />
take all appropriate measures within their authority<br />
to implement this order.<br />
Sec. 9. The Secretary of State is hereby authorized<br />
to take such actions, including adopting rules and<br />
regulations, and to employ all powers granted to me<br />
by IEEPA, the INA, and the Act as may be necessary<br />
to carry out section 2 of this order and, in consultation<br />
with the Secretary of the Treasury, the reporting<br />
requirement in section 1264(a) of the Act with<br />
respect to the reports provided for in section 1264(b)<br />
(2) of that Act. The Secretary of State may, consistent<br />
with applicable law, redelegate any of these functions<br />
to other officers and agencies of the United States<br />
consistent with applicable law.<br />
Sec. 10. The Secretary of the Treasury, in consultation<br />
with the Secretary of State and the Attorney General,<br />
is hereby authorized to determine that circumstances<br />
no longer warrant the blocking of the property and<br />
interests in property of a person listed in the Annex<br />
to this order, and to take necessary action to give<br />
effect to that determination.<br />
Sec. 11. The Secretary of the Treasury, in consultation<br />
with the Secretary of State, is hereby authorized to<br />
submit recurring and final reports to the Congress<br />
on the national emergency declared in this order,<br />
consistent with section 401(c) of the NEA (50 U.S.C.<br />
1641(c)) and section 204(c) of IEEPA (50 U.S.C.<br />
1703(c)).<br />
Sec. 12. This order is effective at 12:01 a.m., Eastern<br />
Standard Time, December 21, 2017.<br />
Sec. 13. This order is not intended to, and does not,<br />
create any right or benefit, substantive or procedural,<br />
enforceable at law or in equity by any party against<br />
the United States, its departments, agencies, or entities,<br />
its officers, employees, or agents, or any other<br />
person.<br />
DONALD J. TRUMP<br />
THE WHITE HOUSE,<br />
December 20, 2017.<br />
10
January 2018 Edition | GSN Magazine | The News Leader in Physical, IT and Homeland Security<br />
ANNEX<br />
1. Mukhtar Hamid Shah; Date of Birth<br />
(DOB) August 11, 1939; alt. DOB November<br />
8, 1939; nationality, Pakistan<br />
2. Angel Rondon Rijo; DOB July 16, 1950;<br />
nationality, Dominican Republic<br />
3. Dan Gertler; DOB December 23, 1973;<br />
nationality, Israel; alt. nationality, Democratic<br />
Republic of the Congo<br />
4. Maung Maung Soe; DOB March 1964;<br />
nationality, Burma<br />
5. Yahya Jammeh; DOB May 25, 1965;<br />
nationality, The Gambia<br />
6. Sergey Kusiuk; DOB December 1,<br />
1966; nationality, Ukraine; alt. nationality,<br />
Russia<br />
7. Benjamin Bol Mel; DOB January 3,<br />
1978; alt. DOB December 24, 1978;<br />
nationality, South Sudan; alt. nationality,<br />
Sudan<br />
8. Julio Antonio Juárez Ramírez; DOB<br />
December 1, 1980; nationality, Guatemala<br />
9. Goulnora Islamovna Karimova; DOB<br />
July 8, 1972; nationality, Uzbekistan<br />
10. Slobodan Tesic; DOB December 21,<br />
1958; nationality, Serbia<br />
11. Artem Yuryevich Chayka; DOB September<br />
25, 1975; nationality, Russia<br />
12. Gao Yan; DOB April 1963; nationality,<br />
China<br />
13. Roberto Jose Rivas Reyes; DOB July 6,<br />
1954; nationality, Nicaragua<br />
11
Special Year- End Focus Coming in December:<br />
Continued from page 33<br />
The GSN 2017 DIGITAL YEARBOOK<br />
OF<br />
Airport/Seaport and Homeland Security Awards Programs<br />
A Message to the GSN’s 2017 Awards Winners:<br />
In order to optimize worldwide exposure and publicity for all Winners and Finalists in our<br />
2017 Awards Programs, GSN has decided to combine the Yearbooks of the “Airport, Seaport,<br />
Border Security Awards” and the “Homeland Security Awards” into one Annual Yearbook that<br />
salutes Winners and Finalists in both programs. Here are the reasons that this is one of the<br />
best promotional opportunities of the year for our Awards Winners:<br />
• Each participating Winner or Finalist in these programs is entitled to a two-page<br />
spread in the Annual Yearbook at a cost deeply discounted from regular rates.<br />
• You don’t have to spend any time, effort or money creating an advertisement, because<br />
our designer posts your spread in an attractive 2-page format with logo and links<br />
• Based on our long experience with Awards Winners and the recognition generally<br />
received from Google and other search engines, plus social media, you’ll receive<br />
exemplary coverage on your accomplishments, which is further enhanced by a month’s<br />
exposure on our website.<br />
To Reserve Your 2-Page Spread in the 2017 Digital Yearbook of Awards Winners<br />
Contact GSN Publisher Chris Zawadzki, 914-888-6843<br />
chriszawadzki@gsnmagazine.com
HIGH-ENERGY SCREENING<br />
FOR INCREASED SECURITY<br />
At Varex Imaging, our Linatron® technology is designed to scan,<br />
identify and detect potential threats. With a variety of high-energy<br />
imaging linear accelerators, we are your source solution.<br />
To learn more about Varex Imaging and our products, visit<br />
www.vareximaging.com.
January 2018 Edition | GSN Magazine | The News Leader in Physical, IT and Homeland Security<br />
Airport & Aviation Security<br />
Exterior View of the Aircraft Explosive Testing<br />
Simulator during a Test<br />
Each day, more than twenty-six<br />
thousand commercial flights<br />
transport passengers and cargo to<br />
destinations around the world. Several<br />
U.S. government agencies work<br />
together to secure these flights,<br />
including the Department of<br />
Homeland Security (DHS) Science<br />
and Technology Directorate (S&T).<br />
S&T’s Commercial Aircraft Vulnerability<br />
and Mitigation (CAVM)<br />
program, part of the Homeland Security<br />
Advanced Research Projects<br />
Agency Explosives Division, supports<br />
testing and evaluation efforts<br />
to assess potential vulnerabilities<br />
and evaluate countermeasures that<br />
can mitigate the impact of explosives<br />
on commercial aircraft. Recently,<br />
CAVM partnered with the<br />
Federal Aviation Administration<br />
(FAA) and U.S. Army Aberdeen<br />
Test Center (ATC) to develop a<br />
reusable Aircraft Explosive Testing<br />
Simulator that facilitates the explosive<br />
testing of new generation<br />
commercial aircraft.<br />
The majority of current commercial<br />
aircraft have aluminum fuselages,<br />
and CAVM has conducted a significant<br />
amount of explosive vulnerability<br />
testing on a wide range<br />
of those aircraft types. However,<br />
newer generations of commercial<br />
aircraft fuselages are being made<br />
with composite materials, such<br />
as carbon fiber reinforced plastic.<br />
Understanding the potential vulnerability<br />
of composite aircraft to<br />
explosives requires testing, but the<br />
new generation composite aircraft<br />
fuselages are less available and<br />
more expensive than legacy aluminum<br />
fuselage structures. This made<br />
it essential to develop a sustainable<br />
and representative testing solution<br />
so evaluations of new composite<br />
aircraft structures to explosive-based<br />
threats could continue<br />
as needed.<br />
“The lack of availability of new<br />
generation composite commercial<br />
aircraft structures for use in destructive<br />
explosive testing necessitated<br />
development of alternate test<br />
methods and tools,” said Nelson<br />
Carey, CAVM Program Manager.<br />
Interior View of the Simulator’s Composite Panel Test Fixture<br />
“Doing so is essential to provide<br />
S&T and its U.S. government customers<br />
with accurate and efficient<br />
methods for conducting commercial<br />
aircraft explosive vulnerability<br />
assessments.”<br />
Based on this need, ATC developed<br />
the Aircraft Explosive Testing<br />
Simulator that could be used for<br />
repeated explosive testing. The<br />
simulator consists of a steel cylinder<br />
that can be pressurized to<br />
simulate conditions of an in-flight<br />
aircraft. The cylinder has an opening<br />
where composite test panels are<br />
installed and subjected to testing<br />
for a variety of explosive threat<br />
scenarios. The composite aircraft<br />
test panels are provided through<br />
an interagency agreement with the<br />
14
January 2018 Edition | GSN Magazine | The News Leader in Physical, IT and Homeland Security<br />
FAA and the National Institute for<br />
Aviation Research, an FAA Center<br />
of Excellence.<br />
aircraft structural response to internal<br />
explosive threats,” Carey explains,<br />
highlighting the impact the<br />
tool has on testing efforts.<br />
composite structure response for<br />
different and more complex threat<br />
scenarios. Additionally, CAVM<br />
recently hosted a round of tests<br />
with TSA, FAA, DoD, TSL, and<br />
the French government’s Alternative<br />
Energies and Atomic Energy<br />
Commission (CEA). The event<br />
was part of an international effort<br />
to strengthen aviation security by<br />
bringing together officials from<br />
around to globe to share findings<br />
and discuss shared goals.<br />
The Aircraft Explosive Testing<br />
Simulator is the latest S&T-funded<br />
technology that will help enhance<br />
the nation’s aviation security. As<br />
“ Interagency cooperation<br />
in support of CAVM efforts<br />
is essential for extending<br />
limited resources and insuring<br />
a maximum rate of return<br />
on research and development<br />
investment”<br />
During a test, evaluators place an<br />
explosive threat inside the simulator,<br />
which is then pressurized to<br />
simulate airline operational flight<br />
profiles. Once the explosive is detonated,<br />
instrumentation gathers data<br />
on internal and external pressure<br />
resulting from the blast, and high<br />
speed video instruments gather<br />
information on the panel’s physical<br />
condition, looking for any deformation,<br />
breach, or crack growth.<br />
Aircraft vulnerability experts from<br />
S&T’s Transportation Security Laboratory<br />
then conduct a post-blast<br />
inspection and analysis to determine<br />
the structural response of the<br />
composite test panel to the specific<br />
explosive threat condition. Finally,<br />
evaluators remove the panel from<br />
the simulator and install a new one<br />
in its place, allowing for multiple<br />
tests to be conducted within a short<br />
time period.<br />
“The Aircraft Explosive Testing<br />
Simulator provides a rapid, reconfigurable<br />
and cost effective tool for<br />
acquiring test data on composite<br />
Exterior View of the Aircraft Explosive Testing Simulator during a Test<br />
Not only does the Aircraft Explosive<br />
Testing Simulator help S&T<br />
develop a better understanding of<br />
how explosives affect composite<br />
commercial aircraft, it also allows<br />
experts to compare results<br />
with previous tests on aluminum<br />
structures. CAVM researchers will<br />
use the data to learn about composite-based<br />
commercial aircraft<br />
structure vulnerability to terrorist-based<br />
internal explosive threats.<br />
This research supports the Transportation<br />
Security Administration’s<br />
sponsor requirements to investigate<br />
the vulnerability of new generation<br />
composite construction commercial<br />
aircraft to internal explosive<br />
threats.<br />
S&T is already sharing its findings<br />
from the simulator with other<br />
government partners. The Department<br />
of Defense’s (DoD) U.S. Army<br />
Research Laboratory is using the<br />
data to develop numerical analysis<br />
models and tools to help simulate<br />
threats continue to evolve, it is crucial<br />
to have tools that can efficiently<br />
gather accurate data on potential<br />
vulnerabilities and the countermeasures<br />
employed to overcome them.<br />
15
®<br />
Performance. Protection. Dependabilit
PINPOINT THREAT<br />
with the world’s most trusted metal detectors.<br />
y. Since 1964.<br />
garrett.com<br />
Toll Free: 800.234.6151 (U.S. & Canada)
January 2018 Edition | GSN Magazine | The News Leader in Physical, IT and Homeland Security<br />
Border Control<br />
Departments of Homeland Security and<br />
Justice Release Data on Incarcerated Aliens-<br />
94% of all Confirmed Aliens in DOJ Custody<br />
are Unlawfully Present<br />
WASHINGTON – President Trump’s<br />
Executive Order on Enhancing Public<br />
Safety in the Interior of the United<br />
States requires the Department of<br />
Homeland Security<br />
(DHS) and the Department<br />
of Justice<br />
(DOJ) to collect<br />
relevant data and<br />
provide quarterly<br />
reports on data collection<br />
efforts. On<br />
December 18, 2017,<br />
DHS and DOJ released<br />
the FY 2017 4th Quarter Alien<br />
Incarceration Report, complying with<br />
this order.[1] The report found that<br />
more than one-in-five of all persons<br />
in Bureau of Prisons custody were<br />
foreign born, and that 94 percent of<br />
confirmed aliens in custody were unlawfully<br />
present.<br />
“While the administration is working<br />
diligently to remove dangerous<br />
criminal aliens from our streets, this<br />
report highlights the fact that more<br />
must be done,” said Secretary of<br />
Homeland Security Kirstjen M. Nielsen.<br />
“We will continue to pursue<br />
President Trump’s immigration priorities,<br />
including securing the border,<br />
enhancing interior enforcement, and<br />
pursuing a merit-based immigration<br />
system, but Congress must act immediately<br />
to adopt obvious solutions to<br />
strengthen DHS and DOJ efforts to<br />
confront dangerous criminal aliens.”<br />
“The American people deserve a lawful<br />
system of immigration that serves<br />
the national interest,” Attorney General<br />
Sessions said. “But at the border<br />
“Congress must act immediately<br />
to adopt obvious solutions to<br />
strengthen DHS and DOJ efforts to<br />
..confront dangerous criminal aliens.”<br />
18<br />
and in communities across America,<br />
our citizens are being victimized<br />
by illegal aliens who commit crimes.<br />
Nearly 95 percent of confirmed aliens<br />
in our federal prisons are here illegally.<br />
We know based on sentencing<br />
data that non-citizens<br />
commit a substantially<br />
disproportionate<br />
number of drug-related<br />
offenses, which<br />
contributes to our national<br />
drug abuse crisis.<br />
The simple fact is<br />
that any offense committed<br />
by a criminal<br />
alien is ultimately preventable.<br />
One victim is<br />
too many. It’s time for<br />
Congress to enact the<br />
President’s immigration<br />
reform agenda so<br />
that we start welcoming<br />
the best and brightest while turning<br />
away drug dealers, gang members,<br />
and other criminals.”<br />
Section 16 of the<br />
Executive Order<br />
directs the Secretary<br />
of Homeland<br />
Security and the<br />
Attorney General<br />
to collect relevant<br />
data and provide<br />
quarterly reports<br />
regarding: (a) the<br />
immigration status<br />
of all aliens incarcerated under the<br />
supervision of the Federal Bureau of<br />
Prisons; (b) the immigration status of<br />
all aliens incarcerated as federal pretrial<br />
detainees under the supervision<br />
of the United States Marshals Service;
January 2018 Edition | GSN Magazine | The News Leader in Physical, IT and Homeland Security<br />
and (c) the immigration status of all<br />
convicted aliens in state prisons and<br />
local detention centers throughout<br />
the United States.<br />
A total of 58,766 known or suspected<br />
aliens were in in DOJ custody at the<br />
end of FY 2017, including 39,455 persons<br />
in BOP custody and 19,311 in<br />
USMS custody. Of this total, 37,557<br />
people had been confirmed by U.S.<br />
Immigration and Customs Enforcement<br />
(ICE) to be aliens (i.e., non-citizens<br />
and non-nationals), while 21,209<br />
foreign-born people were still under<br />
investigation by ICE to determine<br />
alienage and/or removability.<br />
Among the 37,557 confirmed aliens,<br />
35,334 people (94 percent) were unlawfully<br />
present. These numbers<br />
include a 92 percent unlawful rate<br />
among 24,476 confirmed aliens in<br />
BOP custody and a 97 percent unlawful<br />
rate among 13,081 confirmed<br />
aliens in USMS custody.<br />
This report does not include data on<br />
the foreign-born or alien populations<br />
in state prisons and local jails because<br />
state and local facilities do not<br />
routinely provide DHS or DOJ with<br />
comprehensive information about<br />
their inmates and detainees—which<br />
account for approximately 90 percent<br />
of the total U.S. incarcerated population.<br />
Information Regarding Immigration<br />
Status of Aliens Incarcerated Under<br />
the Supervision of the Federal Bureau<br />
of Prisons<br />
The Department of Justice’s Bureau<br />
of Prisons (BOP) has an operational<br />
process for maintaining data regarding<br />
foreign-born inmates in its custody.<br />
On a quarterly basis, BOP supplies<br />
this information to U.S. Immigration<br />
and Customs Enforcement (ICE).<br />
ICE, in turn, analyzes that information<br />
to determine the immigration<br />
status of each inmate and provides<br />
that information back to BOP.<br />
Out of the 185,507 inmates in BOP<br />
custody, 39,455 (21%) were reported<br />
by BOP as foreign-born. Further<br />
details regarding these 39,455 foreign-born<br />
inmates are as follows:<br />
• 20,240 (51%) were<br />
unauthorized aliens who<br />
are subject to a final order<br />
of removal;<br />
• 14,979 (38%) remain<br />
under ICE investigation;<br />
• 2,374 (6%) were<br />
unlawfully present and<br />
now in removal proceedings;<br />
• 1,852 (less than<br />
5%) were lawfully present<br />
aliens but are now in<br />
removal proceedings; and<br />
• 10 were alienswho<br />
have been granted relief or<br />
protection from removal.<br />
Information Regarding the Immigration<br />
Status of Aliens Incarcerated as<br />
Federal Pretrial Detainees<br />
USMS identified 19,311 aliens and<br />
foreign-born inmates under ICE investigation<br />
detained at USMS facilities.<br />
Further details regarding these<br />
19,311 foreign-born inmates are as<br />
follows:<br />
• 11,459 (59%) were aliens who<br />
are subject to a final order of<br />
removal;<br />
• 6,230 (32%) remain under ICE<br />
investigation;<br />
• 1,261 (6.5%) were unlawfully<br />
present and now in removal proceedings;<br />
• 358 (less than 2%) were lawfully<br />
present but are now in removal<br />
proceedings; and<br />
• 3 were aliens who have been<br />
granted relief or protection from<br />
removal.<br />
Immigration Status of All Convicted<br />
Aliens Incarcerated in State Prisons<br />
and Local Detention Centers<br />
Throughout the United States<br />
The Departments continue to progress<br />
towards establishing data collection<br />
of the immigration status of<br />
convicted aliens incarcerated in state<br />
prisons and local detention centers<br />
through the Department of Justice’s<br />
Office of Justice Programs, Bureau of<br />
Justice Statistics and the Department<br />
of Homeland Security’s Office of Immigration<br />
Statistics.<br />
# # #<br />
19
January 2018 Edition | GSN Magazine | The News Leader in Physical, IT and Homeland Security<br />
Border Control<br />
FROM OUT Of THE BOX<br />
to STATE OF THE ART.<br />
ID CARD PRINTING INNOVATION.<br />
HID Global is leading the industry with the most robust portfolio of secure ID issuance<br />
solutions in the world. Our FARGO® line of printers and encoders provide governments,<br />
financial institutions and businesses of all sizes fast, efficient and reliable solutions that<br />
are as secure as they are affordable.<br />
You’ll call it innovation on demand. We call it, “your security connected.”<br />
YOUR SECURITY. CONNECTED | Visit us at hidglobal.com/printers<br />
© 2016 HID Global Corporation/ASSA ABLOY AB. All rights reserved. HID, HID Global, the HID Blue Brick logo, and the Chain Design are trademarks<br />
or registered trademarks of HID Global or its licensor(s)/supplier(s) in the US and other countries and may not be used without permission.<br />
20
January 2018 Edition | GSN Magazine | The News Leader in Physical, IT and Homeland Security<br />
Airport & Aviation Security<br />
Automated Border Control Kiosks Reach 71% Deployment<br />
According to Acuity Market Intelligence,<br />
border authorities have<br />
embraced digital identification<br />
and biometric-based automation<br />
to simplify and accelerate border<br />
control processing. Acuity’s latest<br />
report on border control kiosks reveals<br />
that 71 installations deploying<br />
2283 border control kiosks are active<br />
at 59 ports of entry across the<br />
globe. These include Automated<br />
Border Control (ABC) Kiosks, Automated<br />
Passport Control (APC)<br />
Kiosks, and Primary Inspection Kiosks<br />
(PIK).<br />
“As airports and other ports of entry<br />
struggle to keep up with increasing<br />
volumes of global travelers, automation<br />
is the only solution for border<br />
control,” says Maxine Most, Principal<br />
at Acuity Market Intelligence.<br />
“integrated digital Identification<br />
technology, including document<br />
readers and biometrics, allow border<br />
agents to securely facilitate low<br />
risk international travelers while<br />
focusing expensive, high value human<br />
resources on genuine threats.”<br />
Global Airport ABC eGates & Kiosks Annual Revenue<br />
“The number of border control kiosks<br />
increased more than 60% over<br />
last year with CAGR projected to<br />
exceed 20% for the next 3 years,”<br />
Most says. “The US and Canada<br />
dominate the market landscape<br />
with 60% and 35% of all border<br />
control kiosks deployed. Though<br />
only about 100 kiosks are deployed<br />
at ten locations across the Caribbean,<br />
Pacific, Europe, and the Middle<br />
East, Acuity expects the use of these<br />
highly efficient and cost-effective<br />
border control solutions to migrate<br />
broadly within existing regions<br />
while expanding to include Asia,<br />
Latin America, and Africa over the<br />
next few years.”<br />
Today, kiosks are deployed at just a<br />
few cruise ports, but Acuity expects<br />
broader use of kiosks at more seaports<br />
and land crossings over the<br />
next three to five years. Vancouver<br />
Airport’s Innovative Travel Solutions<br />
group dominates the global<br />
market with more than 60% kiosks<br />
unit and installation market share.<br />
21
January 2018 Edition | GSN Magazine | The News Leader in Physical, IT and Homeland Security<br />
Airport & Aviation Security<br />
The kiosk: 20 years and counting<br />
by Rico Barandun , Head of Solution<br />
Specialists, Passenger and Bags, SITA<br />
What a great 20 years the SITA kiosk has had. As we<br />
approach the end of its 20th anniversary year, it’s exciting<br />
to think about what lies ahead as kiosks continue their<br />
rise in smoothing the flow of passengers, both on and off<br />
airport.<br />
It’s true that some naysayers have in the past pondered<br />
the demise of the kiosk. But we’ve witnessed the opposite<br />
to be the case. SITA kiosk use, the world over, has done<br />
nothing but spread.<br />
In fact, as of today SITA has installed 6,000-plus kiosks at<br />
more than 225 common-use airports.<br />
Far from retreating into the background, we’ve seen<br />
kiosks emerge out of the check-in domain and into the<br />
forefront of other airport activities, taking on more and<br />
different responsibilities along the steps of the journey.<br />
Myriad tasks<br />
Today they’re relied on for myriad tasks, from check-in<br />
to bag tagging, and more. Some 55% of airports have already<br />
implemented bag-tag printing at kiosks, for example<br />
(2017 SITA Airline & Airport IT Trends Insights).<br />
In the kiosk’s 20th year we also saw a milestone development<br />
as SITA introduced a Common Use Payment<br />
Service - the first and only payment solution allowing<br />
transactions by multiple airlines through a single payment<br />
terminal, which is now being deployed at SITA’s<br />
common-use kiosks and bag-drop stations.<br />
Eyes on the border<br />
Now, all eyes are on border, where - with the rise of<br />
biometrics - we see great opportunities for kiosks as we<br />
at SITA continue to work with airports, governments and<br />
border agencies around the world to bring in the changes.<br />
Indeed our work in the US shows that our biometric-enabled<br />
kiosks can securely process passengers on arrival,<br />
reducing the time passengers spend in line by as much as<br />
40%.<br />
I recall an Acuity Market Intelligence study a couple of<br />
years ago on airport eGates and kiosks at the border. It<br />
talked about the role of kiosks and the ‘holy grail’ for<br />
immigration and passenger processing being to provide a<br />
truly seamless and almost unnoticeable airport experience.<br />
Making air travel easier<br />
That is embodied in the visions and goals of strategic<br />
industry initiatives to enhance the passenger experience,<br />
such as Simplifying the Business, Fast Travel, Smart Security,<br />
and now the IATA and ACI initiative NEXTT (New<br />
Experience in Travel and Technologies).<br />
Proving its longevity, the kiosk has been very much part<br />
and parcel of these key industry-wide initiatives, making<br />
air travel ever easier and meeting air transport community<br />
needs as they evolve. So here’s to the kiosk, for the next<br />
20 years and beyond …<br />
23
January 2018 Edition | GSN Magazine | The News Leader in Physical, IT and Homeland Security<br />
Kiosk advances<br />
It’s 20 years since changed<br />
the face of airport departure<br />
halls with the introduction<br />
of self-service<br />
kiosks. With more<br />
than 12,000 installed<br />
worldwide, they<br />
now offer<br />
everything<br />
from check-in to<br />
border control to<br />
autonomous robotics.<br />
SITA’s first kiosks were introduced<br />
as a trial in 1997 by Air Alaska,<br />
designed not only to improve the<br />
check-in process for passengers by<br />
reducing queuing, but also to test<br />
the appetite for self-service.<br />
Twenty years on, nine out of 10<br />
airports have kiosks. What started<br />
as an efficient and simple platform<br />
for check-in has evolved to include<br />
bag tagging, lost baggage tracking,<br />
flight transfers, and border control.<br />
Today, a chip & pin and contactless<br />
payment facility allows passengers<br />
to pay for flights, upgrades, meals,<br />
even media downloads for the<br />
flight.<br />
Pervasive<br />
Kiosks today are all-pervasive<br />
across the airport, both landside<br />
and airside. SITA’s latest iteration<br />
of the kiosk can even do both, as<br />
an autonomous robot able to move<br />
independently around the airport<br />
as needed.<br />
And soon passengers will be able to<br />
use kiosks with fast, secure biometric<br />
enrolment and registration<br />
capabilities to create a secure single<br />
token as they first enter the airport,<br />
removing the need to show a<br />
passport or boarding card as they<br />
21<br />
progress to the aircraft.<br />
The humble kiosk of the 1990s has<br />
certainly matured in the past 20<br />
years, to become a core part of the<br />
airport infrastructure.<br />
Easier, cheaper<br />
“Kiosks were seen from the outset as<br />
offering tangible benefits for everyone,”<br />
according to Rico Barandun,<br />
Portfolio Director at SITA.<br />
“They could make check-in easier<br />
for passengers, save expensive<br />
terminal space, cut airline costs<br />
and speed up the whole process for<br />
everyone.<br />
“But I don’t think anyone anticipated<br />
how they would evolve into<br />
today’s increasingly sophisticated<br />
interface between passenger and<br />
airline/airport.”<br />
BORDER BENEFITS<br />
The border is a relatively new frontier<br />
for kiosks. “A key development<br />
has been the introduction of kiosks<br />
designed to speed up and simplify<br />
immigration procedures,” continues<br />
Barandun.<br />
“The use of secure self-service<br />
kiosks for verification of biometric<br />
travel documents is increasingly<br />
adopted as a means not only of<br />
enhancing passenger service, but at<br />
the same time allowing immigration<br />
specialists time to focus on the<br />
minority of higher risk travelers.<br />
“With an average transaction time<br />
of just 90 seconds, wait times for<br />
users of SITA iBorders® BorderAutomation<br />
ABCKiosks are reduced<br />
by up to 60%.”
January 2018 Edition | GSN Magazine | The News Leader in Physical, IT and Homeland Security<br />
CRNE<br />
DHS’s Chemical, Biological, Radiological, and<br />
Nuclear Program Consolidation Efforts<br />
What GAO Found<br />
GAO’s prior work has shown that<br />
the Department of Homeland<br />
Security (DHS) should complete,<br />
document, and make available<br />
analyses of key questions related<br />
to its ,. In August 2016, GAO<br />
reported that several key factors<br />
were not included when DHS<br />
evaluated its organizational consolidation<br />
of CBRNE functions.<br />
For example, DHS did not fully<br />
assess and document potential<br />
problems that could result from<br />
consolidation or include a comparison<br />
of benefits and costs. Further,<br />
DHS conducted limited external<br />
stakeholder outreach, thus<br />
the proposal may not sufficiently<br />
account for stakeholder concerns.<br />
Attention to these key areas,<br />
identified from GAO’s analysis of<br />
previous organizational consolidations,<br />
would help provide DHS,<br />
Congress, and other stakeholders,<br />
such as DHS components with<br />
assurance that important aspects<br />
of effective organizational changes<br />
are addressed as part of the<br />
agency’s CBRNE reorganization<br />
decision-making process. GAO<br />
previously recommended that<br />
DHS complete, document, and<br />
make available analyses of key<br />
questions related to its consolidation<br />
proposal, including: (1) what<br />
problems, if any, consolidation<br />
may create; (2) a comparison of<br />
the benefits and costs the consolidation<br />
may entail; and (3) a<br />
broader range of external stakeholder<br />
input including a discussion<br />
of how it was obtained and<br />
considered. DHS did not concur,<br />
asserting that the recommendation<br />
did not acknowledge the<br />
extent to which these questions<br />
were discussed both internally<br />
within DHS and externally with<br />
Congress and that DHS’s decision<br />
to consolidate CBRNE functions<br />
had already been made which<br />
would make additional analysis<br />
redundant. GAO closed this<br />
recommendation as not implemented.<br />
While GAO has not fully<br />
assessed DHS’s most recent reorganization<br />
plans, GAO continues<br />
to believe that documenting<br />
information and analyses used to<br />
assess the benefits and limitations<br />
of its consolidation plan would<br />
assist DHS in fully demonstrating<br />
how its proposal will lead to<br />
an integrated, high-performance<br />
organization.<br />
GAO’s prior work found that key<br />
mergers and organizational transformation<br />
practices could further<br />
benefit DHS in its proposed<br />
CBRNE consolidation. GAO<br />
reported in July 2003 on key practices<br />
and implementation steps<br />
for mergers and organizational<br />
transformations that range from<br />
ensuring top leadership drives<br />
the transformation to involving<br />
employees in the implementation<br />
process to obtain their ideas<br />
and gain their ownership for the<br />
transformation. In August 2016,<br />
GAO recommended that DHS use<br />
key mergers and organizational<br />
transformation practices identified<br />
in GAO’s previous work to<br />
help ensure that lessons learned<br />
from other reorganizations are<br />
considered during the consolidation<br />
effort. DHS concurred with<br />
the recommendation and stated<br />
in its October 2017 consolidation<br />
notice to Congress that it will<br />
consult the practices during consolidation<br />
implementation. GAO<br />
will monitor DHS’s implementation<br />
of the key practices which<br />
will help to ensure that lessons<br />
learned from other organizations<br />
are considered during the consolidation<br />
effort.<br />
More on page 31<br />
25
January 2018 Edition | GSN Magazine | The News Leader in Physical, IT and Homeland Security<br />
21
January 2018 Edition | GSN Magazine | The News Leader in Physical, IT and Homeland Security<br />
Infrastructure Protection<br />
Using video intelligence to protect critical public<br />
By Kimbry McClure<br />
infrastructure Solutions Architect, Office of CTO at Hitachi Data Systems Federal Corporation<br />
Law enforcement and other entities<br />
charged with protecting national<br />
security are spending more time<br />
than ever planning and implementing<br />
security measures that ensure<br />
national security and improve<br />
public safety. This is for good<br />
reason: from the energy grid<br />
to sporting events to airports,<br />
security personnel know these<br />
venues are enticing targets for<br />
terrorist attacks due to the large<br />
amount of people and resources<br />
clustered together in one place.<br />
In a world of heightened extremism,<br />
lone wolf attacks, and<br />
general global instability, it is not<br />
beyond imagination to foresee<br />
a scenario where a small team<br />
of terrorists seizes a U.S. airport.<br />
With the prospect of hostage taking<br />
and hijackings looming large,<br />
the response time for<br />
emergency personnel<br />
and law enforcement<br />
becomes critical. First<br />
responders must locate<br />
the terrorists and<br />
their hostages quickly<br />
to coordinate an effective response.<br />
This requires enhanced detection capabilities<br />
that can seamlessly distribute<br />
information to decision makers and<br />
emergency personnel to identify and<br />
respond to threats in real time.<br />
To stay a step ahead of attackers,<br />
security and emergency personnel<br />
need a common operational picture<br />
to communicate with civil and federal<br />
Deploying a video intelligence platform<br />
gives law enforcement a technological<br />
asset that keeps pace with terrorists<br />
agency authorities. This picture is not<br />
only essential in coordinating a rescue,<br />
but also in securing additional areas<br />
of the airport facility that the terrorists<br />
have yet to seize as well as collect evidence<br />
for both investigative and legal<br />
purposes.<br />
With many entities tasked with restoring<br />
airport security, organizations need<br />
the right technology to assist them.<br />
An important tool emerging in security<br />
today is a video intelligence system<br />
that assists emergency responders and<br />
officials in reaching their security<br />
objectives.<br />
Not Your Old-School CC-TV Cameras<br />
Many people imagine video surveillance<br />
cameras to be a single camera<br />
mounted on a wall pointing in a<br />
particular direction and transmitting<br />
video to a single television. In<br />
this scenario, multiple cameras<br />
in different locations within the<br />
same building work in isolation<br />
and only detect motion and<br />
images.<br />
Most people do not realize that<br />
video intelligence has evolved<br />
tremendously in recent years.<br />
Today’s video intelligence system<br />
consists of a wide range of<br />
disparate sensor data combined<br />
into a single portal. The integration<br />
of sensor data into one<br />
place is a critical development<br />
for law enforcement working in<br />
time sensitive situations.<br />
Back in our besieged<br />
airport, authorities<br />
do not have time to<br />
monitor separate video<br />
camera, alarm systems,<br />
GPS, and other audio,<br />
visual, and social media monitoring<br />
systems separately. Officials need<br />
data from these sensors to be organized<br />
in such a way that patterns can<br />
be quickly detected to ensure rapid<br />
decision-making.<br />
As law enforcement officials analyze<br />
the data received from multiple<br />
sensors, a video intelligence system<br />
triages the data received. During<br />
27
January 2018 Edition | GSN Magazine | The News Leader in Physical, IT and Homeland Security<br />
the airport terrorist attack, law enforcement<br />
is able to discern that the<br />
screaming coming from an airport<br />
personnel-only hallway is more<br />
important to respond to than the<br />
traveling high school band playing<br />
their instruments in the airport<br />
concourse. First responders have the<br />
ability to triage behaviors because<br />
the video intelligence system has automated<br />
the monitoring process on<br />
a scale much larger than manpower<br />
can provide.<br />
Automating data collection, organization<br />
and storage gives law enforcement<br />
attempting to prevent or<br />
respond to a terrorist attack a more<br />
speedy, meticulous and effective<br />
overall security strategy. Authorities<br />
no longer have to allocate manpower<br />
to spending time searching and<br />
investigating each person who is<br />
in a facility. Since different people<br />
present various behaviors, some that<br />
indicate a higher security risk than<br />
others, video intelligence systems<br />
flag these behaviors for law enforcement<br />
and give them the knowledge<br />
needed to make critical decisions.<br />
Overcoming the Unknown<br />
Adding automation to data collection<br />
and analysis provides other benefits.<br />
Criminals and terrorists are<br />
constantly changing their tactics. As<br />
a result, law enforcement does not<br />
always know the behavior profile to<br />
match the changing tactics. The integration<br />
of a video intelligence system<br />
provides law enforcement flexibility<br />
to quickly and easily input into the<br />
system new behaviors for the sensors<br />
to monitor. Without unified<br />
data management, authorities would<br />
need to take more time and manpower<br />
to update the sensors on what<br />
new behaviors to track.<br />
Authorities may also face uncertainty<br />
over which agencies, groups<br />
and decision makers need access to<br />
which data points. Today’s homeland<br />
security and emergency response<br />
strategies involve multiple<br />
agencies, organizations and decision<br />
makers. These groups require<br />
that data be shared in real-time to<br />
establish a common operating picture.<br />
The video intelligence system<br />
overcomes data sharing challenges<br />
by creating a single portal to store<br />
and view information. As a<br />
result, information can<br />
be shared with ease<br />
between various<br />
coordinating<br />
entities.<br />
How to Implement a<br />
Modern Video Intelligence<br />
System<br />
Many in government<br />
are concerned about<br />
how much value they<br />
will receive when implementing<br />
new technology<br />
systems. The good<br />
news is a modern video intelligence<br />
system is not only effective,<br />
but also simple to implement. The<br />
system’s design focuses on an interface<br />
that is integrated into an organization’s<br />
current IT systems, including<br />
legacy IT. Therefore, the video<br />
intelligence system is built based<br />
on customization and flexibility.<br />
Additionally, the video intelligence<br />
system includes sensors, compute<br />
power and on-board storage that<br />
can be installed and implemented<br />
rapidly.<br />
Deploying a video intelligence<br />
platform gives law enforcement a<br />
technological asset that keeps pace<br />
with terrorists and criminals today<br />
and in the future. By placing these<br />
tools under a single management<br />
layer, law enforcement can devote<br />
more resources to what truly matters:<br />
ensuring public safety.<br />
28
January 2018 Edition | GSN Magazine | The News Leader in Physical, IT and Homeland Security<br />
Border Control<br />
20
January 2018 Edition | GSN Magazine | The News Leader in Physical, IT and Homeland Security<br />
Federal and Legislative<br />
Democrats say Trump to seek federal pay freeze<br />
and cuts to domestic security<br />
Federal employees dodged a bullet<br />
this year, with the flop of proposed<br />
cuts to their retirement and health<br />
benefits, but they shouldn’t put away<br />
the flak jackets yet.<br />
After proposing a 1.9 percent federal<br />
pay raise for next year, President<br />
Trump will urge a pay freeze for<br />
federal employees and call for cuts to<br />
domestic security programs in fiscal<br />
2019, according to reports released<br />
by Senate Homeland Security and<br />
Governmental Affairs Committee<br />
Democrats.<br />
Ironically, this comes as Congress<br />
nears passage of tax legislation that<br />
Trump claims will significantly stimulate<br />
the economy. If that’s the case,<br />
then why is a freeze necessary?<br />
If you believe federal employees are<br />
over compensated, then no other<br />
rational is needed.<br />
That rationale was behind failed<br />
Republican proposals to cut federal<br />
retirement and health insurance<br />
benefits.<br />
The two reports are based on budget<br />
guidance from the Office of Management<br />
and Budget (OMB), dated Nov.<br />
28, overruling Department of Homeland<br />
Security (DHS) requests. The<br />
guidance was leaked to the panel’s<br />
Democratic staff by a whistleblower.<br />
Sen. Claire McCaskill (Mo.), the<br />
committee’s top Democrat, had the<br />
staff issue summaries of the OMB<br />
document. One report focuses on<br />
personnel, the other on counterterrorism<br />
programs.<br />
Although the budget documents<br />
concern DHS, the personnel summary<br />
says “OMB intends to issue a pay<br />
freeze for federal civilian employees<br />
in 2019.” Quoting the administration’s<br />
document, the staff report<br />
adds: “OMB has instructed DHS:<br />
‘Per governmentwide guidance, no<br />
civilian pay raise is included in the<br />
recommended level for the FY 2019<br />
Budget.’ ”<br />
The counterterrorism report says the<br />
administration “intends to seek $568<br />
million in cuts to counterterrorism<br />
programs” from 2017 levels. That<br />
would include decreases in programs<br />
on violent extremism, port and public<br />
transportation security, domestic<br />
nuclear detection and emergency<br />
management grants.<br />
According to the staff report, OMB<br />
wants to eliminate Visible Intermodal<br />
Prevention and Response teams,<br />
which “are multidisciplinary groups<br />
of security officers deployed to various<br />
locations to prevent and deter<br />
acts of terrorism” and cut $27 million<br />
from Federal Air Marshals.<br />
“I’m worried that the Office of Management<br />
and Budget is overriding<br />
what local, state, and national leaders<br />
have told me they most need to keep<br />
us safe,” McCaskill said. “With recent<br />
terrorist attacks in our country and<br />
throughout the globe, counterterrorism<br />
programs shouldn’t be on the<br />
chopping block.”<br />
The staff noted that OMB’s budget<br />
“Federal employees all across<br />
the country go to work every day<br />
to serve our veterans, secure our skies,<br />
and support our troops. And yet<br />
federal employees make around<br />
35 percent less than private setor”<br />
guidance does not necessarily represent<br />
the administration’s final spending<br />
plan. Agencies can appeal budget<br />
office guidance. The DHS appeal was<br />
due Dec. 1.<br />
Federal employees had a three-year<br />
freeze on their basic pay rates during<br />
the Obama administration. Another<br />
freeze “may present challenges for<br />
DHS components wishing to retain<br />
qualified employees. Morale and<br />
attrition within DHS have long been<br />
problems that the Department has<br />
struggled to fix,” the committee staff<br />
report said.<br />
continued...<br />
30
January 2018 Edition | GSN Magazine | The News Leader in Physical, IT and Homeland Security<br />
...Continued from page 31<br />
“The absence of a pay increase for<br />
law enforcement personnel may not<br />
allow DHS to remain competitive<br />
with other law enforcement agencies<br />
with whom they compete for qualified<br />
applicants. This is especially true<br />
as DHS components have historically<br />
struggled to meet hiring mandates.”<br />
OMB did not respond to a request<br />
for comment. Leaders of the two<br />
largest federal employee unions that<br />
represent DHS staffers and employees<br />
in many other agencies blasted<br />
the proposed cuts.<br />
“Federal employees all across the<br />
country go to work every day to<br />
serve our veterans, secure our skies,<br />
and support our troops. And yet federal<br />
employees make around 35 percent<br />
less than private sector workers<br />
in the same jobs.,” said J. David Cox<br />
Sr., president of the American Federation<br />
of Government Employees.<br />
His figure refers to data developed by<br />
the Federal Salary Council, but it is<br />
disputed by conservative researchers.<br />
“For the Administration to say they<br />
are going to freeze government<br />
employees’ pay next year is insulting<br />
to these hardworking civil servants<br />
and the sacrifices they make for our<br />
country. They know they’ll never get<br />
rich working for the federal government,<br />
but they believe in the mission<br />
and are willing to accept a lighter<br />
paycheck for the privilege of serving<br />
their country…Federal employees<br />
deserve a pay raise, not a pay freeze.”<br />
National Treasury Employees Union<br />
President Tony Reardon said “we are<br />
alarmed by media reports that internal<br />
documents contain a proposal to<br />
freeze pay for all civilian federal employees.<br />
We are still fighting for a fair<br />
raise in 2018, above the 1.4 percent<br />
across the board raise the administration<br />
is calling for. Private-sector<br />
wages for 2018 are expected to rise<br />
by 3 percent.<br />
“Unlike previous years without pay<br />
increases,” he added, “a pay freeze<br />
in 2019 would come during a time<br />
when the private-sector job market<br />
is healthy and the overall economy<br />
is growing…It would make it harder<br />
for the government to recruit and<br />
retain the highly-skilled professionals<br />
needed to protect our security, our<br />
economy and our public health. A<br />
pay freeze would be a callous attack<br />
on middle-class Americans who have<br />
chosen to serve their country and<br />
their fellow citizens.”<br />
...Continued from page 31<br />
Why GAO Did This Study<br />
Chemical, biological, radiological, nuclear, and<br />
explosive weapons, also known as weapons of mass<br />
destruction (WMD), have the potential to kill thousands<br />
of people in a single incident. In 2013 Congress<br />
directed DHS to review its WMD programs,<br />
including the consolidation of CBRNE mission<br />
functions. DHS recently notified Congress that consolidation<br />
would begin in December 2017.<br />
This testimony is based on GAO findings from an<br />
August 2016 report on (1) the extent to which DHS’s<br />
CBRNE consolidation proposal assessed the benefits<br />
and limitations of consolidation and (2) GAO’s key<br />
practices from past organizational transformations<br />
that could benefit the CBRNE consolidation effort.<br />
GAO reviewed DHS consolidation planning documents,<br />
interviewed relevant officials and obtained<br />
selected updated information on DHS planning<br />
efforts.<br />
31<br />
What GAO Recommends<br />
GAO made two recommendations to DHS in 2016<br />
to (1) complete, document, and make available<br />
analyses of key questions related to its consolidation<br />
proposal; and (2) use the key mergers and organizational<br />
transformation practices identified in GAO’s<br />
previous work. DHS did not concur with the first<br />
recommendation and it was closed as not implemented.<br />
DHS concurred with the second recommendation<br />
and has not yet implemented it. GAO<br />
will continue to monitor DHS’s efforts to address<br />
the second recommendation.
Special Year- End Focus Coming in December:<br />
The GSN 2017 DIGITAL YEARBOOK<br />
OF<br />
Airport/Seaport and Homeland Security Awards Programs<br />
A Message to the GSN’s 2017 Awards Winners:<br />
In order to optimize worldwide exposure and publicity for all Winners and Finalists in our<br />
2017 Awards Programs, GSN has decided to combine the Yearbooks of the “Airport, Seaport,<br />
Border Security Awards” and the “Homeland Security Awards” into one Annual Yearbook that<br />
salutes Winners and Finalists in both programs. Here are the reasons that this is one of the<br />
best promotional opportunities of the year for our Awards Winners:<br />
• Each participating Winner or Finalist in these programs is entitled to a two-page<br />
spread in the Annual Yearbook at a cost deeply discounted from regular rates.<br />
• You don’t have to spend any time, effort or money creating an advertisement, because<br />
our designer posts your spread in an attractive 2-page format with logo and links<br />
• Based on our long experience with Awards Winners and the recognition generally<br />
received from Google and other search engines, plus social media, you’ll receive<br />
exemplary coverage on your accomplishments, which is further enhanced by a month’s<br />
exposure on our website.<br />
To Reserve Your 2-Page Spread in the 2017 Digital Yearbook of Awards Winners<br />
Contact GSN Publisher Chris Zawadzki, 914-888-6843<br />
chriszawadzki@gsnmagazine.com
January 2018 Edition | GSN Magazine | The News Leader in Physical, IT and Homeland Security<br />
Border Control<br />
U.S. Senate Report Reveals Internal Disagreements<br />
over Funding Counterterrorism Programs in<br />
Administration’s FY 2019 Budget Proposal<br />
After receiving whistleblower document, Democratic staff of the Homeland Security and<br />
Governmental Affairs Committee issues report showing that the White House rejected key<br />
counterterrorism elements of the Department of Homeland Security’s budget request<br />
WASHINGTON - The Democratic<br />
staff of the Senate Homeland Security<br />
and Governmental Affairs Committee<br />
today issued a report detailing<br />
the Administration’s intended funding<br />
cuts to Department of Homeland<br />
Security (DHS) state, local, and<br />
national counterterrorism programs<br />
based on an FY 2019 budget document<br />
DHS received from the Office<br />
of Management and Budget (OMB),<br />
which was provided to the Committee<br />
by a whistleblower.<br />
“I’m worried that the Office of Management<br />
and Budget is overriding<br />
what local, state, and national leaders<br />
have told me they most need to keep<br />
us safe,” McCaskill said. “With recent<br />
terrorist attacks in our country and<br />
throughout the globe, counterterrorism<br />
programs shouldn’t be on the<br />
chopping block.”<br />
Federal agencies develop their budgets<br />
for the upcoming fiscal year and<br />
submit a request to OMB, typically<br />
in the fall. OMB then reviews the<br />
proposed budget, ensuring it aligns<br />
with the President’s priorities, and<br />
communicates its funding decisions<br />
to the agency through a process<br />
referred to as “passback.” At times,<br />
OMB provides less money than<br />
requested; in other instances it provides<br />
more. In late November 2017,<br />
a whistleblower provided OMB’s<br />
nonpublic “passback” document to<br />
the Democratic staff of the Senate<br />
Homeland Security and Governmental<br />
Affairs Committee. The document<br />
is titled the Department of Homeland<br />
Security Fiscal Year 2019 Budget<br />
and Policy Guidance and details<br />
OMB guidance from the President<br />
to the Department of Homeland<br />
Security regarding its FY 2019 budget<br />
proposal. The Senate Homeland<br />
Security and Governmental Affairs<br />
Committee Democrat Staff report<br />
examines counterterrorism cuts in<br />
the “passback” document, including<br />
DHS’s initial FY 2019 budget proposal<br />
and OMB’s responsive guidance<br />
directing more drastic cuts.<br />
Key findings from the report, Overruled:<br />
White House Overrules<br />
Department of Homeland Security<br />
Budget Requests for Counterterrorism<br />
Programs:<br />
• Visible Intermodal Prevention<br />
and Response (VIPR) teams are<br />
multi-disciplinary groups of security<br />
officers deployed to various locations<br />
to prevent and deter acts of<br />
terrorism. Rejecting DHS’s request,<br />
OMB instructed DHS to completely<br />
eliminate VIPR Teams and cut an additional<br />
$27 million for Federal Air<br />
Marshals.<br />
• Denying DHS’s request, OMB<br />
ordered DHS to seek $11 million<br />
in additional cuts for the Domestic<br />
Nuclear Detection Office.<br />
• The Administration intends<br />
to seek $568 million in total cuts to<br />
DHS counterterrorism programs<br />
from FY 2017 enacted budget levels.<br />
McCaskill has previously emphasized<br />
the importance of DHS’s counterterrorism<br />
programs. She has repeatedly<br />
questioned DHS and other national<br />
security officials about potential<br />
cuts to the programs during Senate<br />
hearings, and a report issued by the<br />
Homeland Security and Governmental<br />
Affairs Committee Democratic<br />
staff earlier this year highlighted the<br />
impact of the Administration’s proposed<br />
FY 2018 budget cuts.<br />
The report from the Senate Homeland<br />
Security and Governmental<br />
Affairs Committee’s Democratic staff,<br />
led by the staff of Ranking Member<br />
Claire McCaskill, is available online.<br />
33
January 2018 Edition | GSN Magazine | The News Leader in Physical, IT and Homeland Security<br />
Staffing Levels at Immigration and Customs Enforcement<br />
On January 25, 2017, President<br />
Donald Trump signed an executive<br />
order which called for Immigration<br />
and Customs Enforcement (ICE) to<br />
hire 10,000 additional ICE Agents.<br />
ICE enforces federal laws governing<br />
border control, customs, trade and<br />
immigration to promote homeland<br />
security and public safety. For enforcement<br />
purposes, ICE’s jurisdiction<br />
is the U.S. interior, as opposed<br />
to the ports of entry or the border.<br />
ICE’s principal law enforcement<br />
components are Homeland Security<br />
Investigations and Enforcement and<br />
Removal Operations.<br />
OMB provided ICE with<br />
a total discretionary<br />
budget of $8.08 billion<br />
in FY 2019. OMB stated<br />
that this funding level<br />
“supports key Administration<br />
immigration priorities<br />
… such as hiring<br />
of 2,000 additional Law<br />
Enforcement Officers<br />
(LEOs); resources to<br />
support that hiring effort<br />
will be augmented by<br />
United States Citizenship<br />
and Immigration Services (USCIS)<br />
fees. Additionally, guidance is provided<br />
to fund 47,656 beds.”<br />
The OMB document indicates that<br />
hiring at ICE is prioritized to “enable<br />
additional enforcement actions within<br />
the interior of the United States.”<br />
OMB instructed the Department to<br />
hire more ICE law enforcement officers<br />
that the Department originally<br />
requested, explaining:<br />
In order to ensure the Department<br />
is prepared to reach the total hiring<br />
goal of 2,000 new law enforcement<br />
officers in FY 2019, OMB instructed<br />
ICE to provide a briefing by January<br />
15, 2018 on its hiring and staffing<br />
plan, mission support and attorney<br />
positions.<br />
OMB provides nearly $2 billion for<br />
the Homeland Security Investigations<br />
efforts, including funding to<br />
support the hiring of 300 new law<br />
enforcement officers in that unit.<br />
OMB anticipates these positions “will<br />
support the prevention and detection<br />
of immigration benefit fraud and the<br />
investigatory work necessary to adjudicate<br />
applications, including visa<br />
overstay and worksite enforcement, if<br />
applicable.”<br />
OMB provided $1.7 billion for<br />
Domestic Investigations, including<br />
a program increase of $13 million to<br />
cover the expansion of Visa Security<br />
Program locations. Enforcement and<br />
34<br />
Removal Operations (ERO) will be<br />
funded at $5.2 billion, which OMB<br />
asserted “includes adequate funding<br />
for the annualization of new ERO<br />
staff hired in 2018 and supports an<br />
additional 1,700 [law enforcement<br />
officers] in FY 2019.<br />
In order to support the new law<br />
enforcement officers in FY 2019,<br />
OMB includes $44 million above the<br />
Department’s original request to fund<br />
additional training and infrastructure.<br />
Additionally, OMB requested<br />
ICE to collaborate with DHS components<br />
and other federal agencies<br />
with a role in the Administration and<br />
“The Department’s 2019 request supports hiring just<br />
1,000 new [law enforcement officers].Because of the<br />
Administration’s priority to increase the ICE [law<br />
enforcement officer] workforce, additional resources<br />
are provided … to hire an additional 1,000 [law enforcement<br />
officers] above the Department’s request, for a<br />
total hiring goal of 2,000 new law enforcement officers<br />
in 2019.”<br />
enforcement of immigration laws to<br />
determine how agencies can perform<br />
immigration functions more efficiently<br />
and effectively.
January 2018 Edition | GSN Magazine | The News Leader in Physical, IT and Homeland Security<br />
Cybersecurity<br />
Pilot Project Helps Secure First Responder<br />
Apps From Cyberattacks<br />
Washington, D.C.—A pilot project<br />
by the Department of Homeland<br />
Security (DHS) Science and Technology<br />
Directorate (S&T) resulted in the<br />
successful remediation of potential<br />
cybersecurity vulnerabilities in mobile<br />
applications (apps) used by the<br />
nation’s public-safety professionals,<br />
supporting the creation of an on-going<br />
mobile app-testing program.<br />
In emergency and disaster situations,<br />
mobile devices and apps enable<br />
public-safety professionals to receive<br />
and share critical information in real-time,<br />
which enhances the delivery<br />
of life-saving services. As reliance<br />
on mobile technology grows, it is<br />
important that mobile apps used by<br />
public safety are free of malware or<br />
vulnerabilities.<br />
The pilot testing project—“Securing<br />
Mobile Applications for First<br />
Responders”—was a joint effort of<br />
the Homeland Security Advanced<br />
Research Project Agency’s Cyber<br />
Security Division, S&T’s First Responder<br />
Group (FRG), Association<br />
of Public-Safety Communications<br />
Officials (APCO) and Kryptowire,<br />
LLC, the developer of a leading<br />
mobile app-vetting platform that was<br />
funded by S&T.<br />
Its dual goals were to improve mobile<br />
app security for the public-safety<br />
community and determine the need<br />
for a sustainable model for testing<br />
the security and privacy-protection<br />
capabilities of public-safety apps.<br />
To these ends, the pilot sought to<br />
determine the degree to which the<br />
selected public-safety apps are vulnerable<br />
to cyberattacks—malware,<br />
ransomware and spyware—or had<br />
coding vulnerabilities that could<br />
compromise the device’s security,<br />
expose personal data or allow for<br />
eavesdropping.<br />
“This pilot project illustrates the<br />
efficacy, benefits and value an ongoing<br />
app-testing program will provide<br />
to the public-safety community and<br />
the nation,” said Vincent Sritapan,<br />
S&T’s Program Manager for Mobile<br />
Security Research and Development.<br />
“During the testing phase, numerous<br />
cyber vulnerabilities were identified<br />
and remediated. This model can be<br />
used to ensure all apps used by the<br />
public-safety professionals are secured<br />
against cyberattacks and other<br />
security and privacy weaknesses.”<br />
For the study, APCO selected 33<br />
popular apps (iOS and Android<br />
versions counted separately) created<br />
by 20 developers that are offered<br />
through AppComm, its public-safety<br />
application directory. The pilot was<br />
conducted over three months by the<br />
team using Kryptowire’s mobile app<br />
software testing platform integrated<br />
into APCO’s AppComm website.<br />
The testing scrutinized each app’s<br />
35
January 2018 Edition | GSN Magazine | The News Leader in Physical, IT and Homeland Security<br />
security, privacy, and information<br />
and device access.<br />
The pilot-testing project discovered<br />
potential security and privacy concerns—such<br />
as access to the device<br />
camera, contacts or Short Message<br />
Service messages—in 32 of 33 popular<br />
apps that were tested. Eighteen<br />
apps were discovered to have critical<br />
flaws such as hard-coded credentials<br />
stored in binary, issues with handling<br />
Secure Sockets Layer certificates or<br />
susceptibility to “man-in-the-middle”<br />
attacks.<br />
Pilot project leaders worked with<br />
each app developer to remediate<br />
identified vulnerabilities. So far, ten<br />
developers successfully remediated<br />
their apps, and as a result of the pilot<br />
project, the security and privacy<br />
concerns of 14 mobile apps were<br />
addressed.<br />
Most developers who fixed their app’s<br />
vulnerability(ies) reported investing<br />
approximately one hour on remediation.<br />
Remediation steps included removing<br />
old or unused code, enabling<br />
built-in security provided by the<br />
operating system, and ensuring the<br />
functionality requested is necessary<br />
for operations.<br />
“As more apps are adopted for public-safety<br />
missions, it is critical that<br />
a formal, ongoing app-evaluation<br />
process with incentives for developer<br />
participation be adopted to ensure<br />
current and new mobile apps are free<br />
of vulnerabilities,” said John Merrill,<br />
Director of the S&T FRG Next<br />
Generation First Responder Apex<br />
program.<br />
For more information about the pilot<br />
testing project results and recommendations,<br />
please visit our<br />
“Securing Mobile Applications for<br />
First Responders” website.<br />
ADDITIONAL INFO: PDF icon DHS S&T Report:<br />
Securing Mobile Apps for First Responders<br />
(December 2017482.29 KB)<br />
36
January 2018 Edition | GSN Magazine | The News Leader in Physical, IT and Homeland Security<br />
Conclusion and Next Steps<br />
• Mobile apps used by first responders<br />
and members of the public for emergency<br />
response or other public safety purposes<br />
are vulnerable<br />
• App security evaluation s can be accomplished<br />
using semi -automated testing<br />
based on established criteria, combined<br />
with human analysis to make a risk -based<br />
assessment<br />
• Continuous app security evaluations are<br />
necessary any time a mobile app is updated<br />
or a new version is submitted<br />
• Developers are willing to pay for app evaluations<br />
if the right incentives are in place<br />
• Education for the first responder community<br />
is needed to raise awareness of the<br />
state of mobile app security and increase<br />
demand for app security evaluation<br />
A foundational question of the pilot<br />
was whether there is a financial<br />
model to support public safety app<br />
evaluations . The pilot’s findings provide<br />
preliminary evidence for this<br />
financial model to be true. Developers<br />
recognize sufficient value in an<br />
app evaluation process to support a<br />
model in which developers pay for<br />
a subscription to a public safety app<br />
certification program. Not only did<br />
this finding validate the importance<br />
of the pilot, it suggests that expanding<br />
and refining a testing program for the<br />
broader public safety app ecosystem<br />
is feasible and desirable.<br />
Engagement with the app developer<br />
community for public safety apps<br />
is necessary to encourage and raise<br />
awareness of the need to build security<br />
in during the development process<br />
and to test the security of the apps<br />
prior to releasing them to an app store<br />
and the public . DHS S&T is investing<br />
in mobile app security R&D to integrate<br />
security into mobile app development<br />
platforms. The result of this<br />
research will enable developers using<br />
the platform to improve the security<br />
of their mobile apps.<br />
The pilot also generated several lessons<br />
learned about the security criteria,<br />
testing platform and workflow.<br />
Notably, a knowledgeable mobile app<br />
security evaluator is essential to effective<br />
remediation and confidence in<br />
the evaluations. A mobile app analysis<br />
tool, although automated, should still<br />
require a human in the loop to make<br />
a risk- based assessment and decision.<br />
It is expected that introducing additional<br />
variables such as the preferences,<br />
policies and laws for individuals or<br />
sponsoring public safety agencies will<br />
increase the nuances of app evaluations<br />
and the need for human judgment<br />
as part of the process.<br />
The next step is to carry the lessons<br />
learned from the app testing pilot<br />
into consultation with public safety<br />
stakeholders , including state and local<br />
public safety agencies and entities<br />
such as the First Responder Network<br />
Authority (FirstNet) and SAFECOM.<br />
The preferences, policies and laws affecting<br />
public safety organization use<br />
of mobile apps will dictate the ultimate<br />
form of a sustainable app evaluation<br />
process. Ongoing consultation<br />
and an awareness program for public<br />
safety stakeholders at the local, tribal,<br />
state and federal levels is essential<br />
for the establishment and continued<br />
success of an app evaluation process<br />
supporting the public safety mission.<br />
37
January 2018 Edition | GSN Magazine | The News Leader in Physical, IT and Homeland Security<br />
Border Control<br />
Drone maker says UAVs set to take over at border<br />
patrols, criminal hot spots<br />
Autonomous drones are set to take<br />
over border patrols, crime hotspot<br />
monitoring and more, says South<br />
Africa’s Unmanned aerial vehicles<br />
(UAV)s, commonly known as<br />
drones, will soon be a common sight<br />
over border zones, crime hotspots<br />
and city streets, as public safety and<br />
security officials and police departments<br />
discover the cost saving and<br />
efficiencies offered by drone patrol<br />
‘armies’, says Airborne Drones, a<br />
South African-based international<br />
manufacturer of enterprise-grade<br />
drones.<br />
“Drones provide the ideal solution to<br />
the problems and limitations faced<br />
by other surveillance methods such<br />
as GPS tracking, CCTV camera<br />
observation, biometric surveillance<br />
and ground patrols,” says Airborne<br />
Drones South Africa. “Aerial surveillance<br />
is increasingly being harnessed<br />
for security monitoring; but traditionally,<br />
this has been carried out using<br />
helicopters - which are costly to<br />
deploy - and with drones controlled<br />
by a user - which can be somewhat<br />
limited in terms of operating hours.<br />
However, drone surveillance does<br />
present an easier, faster, and cheaper<br />
method of data collection, as well<br />
as a number of other key advantages.<br />
Specialised security drones can<br />
enter narrow and confined spaces,<br />
produce minimal noise, and can be<br />
equipped with night vision cameras<br />
and thermal sensors, allowing them<br />
to provide imagery that the human<br />
eye is unable to detect. In addition,<br />
these UAVs can quickly cover large<br />
and difficult-to-reach areas, reducing<br />
staff numbers and costs, and do not<br />
require much space for their operators.”<br />
39<br />
“Autonomous, long-range security<br />
drones are at the vanguard of new<br />
policing methods”, says Airborne<br />
Drones South Africa. “Offering live<br />
video feeds to ground control stations,<br />
these drones can range autonomously<br />
over pre-programmed flight<br />
paths for extended periods of time,<br />
allowing for ongoing routine patrols<br />
across wide areas such as borders,<br />
maritime regions and high security<br />
installations. Should an incident be<br />
detected, ground crews can then follow<br />
objects or intruders from a safe<br />
distance, providing visual support to<br />
safety and security teams. UAVs can<br />
provide detailed visual documentation<br />
of sites, enabling effective analysis,<br />
risk management and security<br />
planning.”<br />
“Numerous countries are already<br />
rolling out security drones to support<br />
their public safety and defence initiatives”,<br />
says Airborne Drones. UAVs<br />
are also instrumental in managing<br />
transport infrastructure safety and<br />
security and event security, from<br />
event security infrastructure through<br />
to spectator and crowd control and<br />
safety, to overall health and safety<br />
planning around the world.<br />
Israel has long harnessed advanced<br />
drones for military surveillance, and<br />
recently sold a fleet of so-called ‘spy<br />
drones’ to the Irish army; the US<br />
FBI has also used drones for surveillance<br />
and tracking for several years.<br />
In Australia, a new $50 million Defence<br />
Cooperative Research Centre
January 2018 Edition | GSN Magazine | The News Leader in Physical, IT and Homeland Security<br />
will develop long-range drones,<br />
automated vehicles and robots to<br />
help Australian soldiers fight the<br />
wars of the future. India is currently<br />
looking to military-grade UAVs for<br />
maritime and other surveillance and<br />
intelligence gathering, Brazil’s São<br />
Paulo last month became the first<br />
Latin American city to use drones for<br />
public security surveillance, and the<br />
German city of Hamburg this week<br />
said it would deploy surveillance<br />
drones as part of its arsenal against<br />
an expected 100,000 demonstrators<br />
at the G20 summit this weekend.<br />
In Australia’s New South Wales, the<br />
authorities are even using helicopter<br />
and drone surveillance along the<br />
coast to protect holiday makers from<br />
rip currents and sharks.<br />
“Drones are ideally suited for reconnaissance<br />
or rapid situation awareness<br />
with application for ground<br />
force units to detect and monitor<br />
potential threats; and they also<br />
provide an additional oversight in<br />
instances where security guards are<br />
deployed to ensure their adherence<br />
to patrolling routines. Their speed,<br />
size, maneuverability and additional<br />
technologies make UAVs the perfect<br />
supplement to ground security teams<br />
seeking to perform monitoring tasks<br />
more quickly and efficiently. Drones<br />
have a competitive edge over stationary<br />
cameras, as intruders can’t easily<br />
step out of sight, and they can cover<br />
areas that are normally out of reach.<br />
Security drones add a whole new<br />
dimension to surveillance, safety and<br />
security, and as such, we can expect<br />
them to be commonly in use in every<br />
country in the world within just a<br />
few years,” says Airborne Drones.<br />
40
January 2018 Edition | GSN Magazine | The News Leader in Physical, IT and Homeland Security<br />
Communications<br />
New NIST Spectrometer Measures Single Photons<br />
with Great Precision<br />
Future communications networks<br />
that are less vulnerable to hacking<br />
could be closer to reality with an invention<br />
that measures the properties<br />
of single-photon sources with high<br />
accuracy.<br />
Built by scientists at the National Institute<br />
of Standards and Technology<br />
(NIST), the device could help bring<br />
about “quantum communications”<br />
networks, which would use individual<br />
particles of light to send bits<br />
of information. Because each bit of<br />
information can be embedded in the<br />
quantum properties of a single photon,<br />
the laws of quantum mechanics<br />
make it difficult, if not impossible,<br />
for an enemy to intercept the message<br />
undetected.<br />
Both the telecommunications and<br />
computer industries would like such<br />
networks to keep information secure.<br />
The NIST method may help overcome<br />
one of the technical barriers<br />
standing in their way by measuring<br />
photons’ spectral properties—essentially<br />
their color—10,000 times better<br />
than conventional spectrometers.<br />
“ ...information can be embedded in<br />
the quantum properties of a single<br />
photon, the laws of quantum<br />
mechanics make it difficult, if not<br />
impossible, for an enemy to intercept<br />
the message undetected.”<br />
Individual photons have a limitation:<br />
They cannot travel through fiber-optic<br />
cables for more than about 100<br />
kilometers (about 60 miles) without<br />
likely being absorbed. A quantum<br />
network able to handle worldwide<br />
communications would need periodic<br />
way stations that could catch<br />
photons and retransmit their information<br />
without loss. The NIST team’s<br />
invention could help such a “quantum<br />
repeater” interact effectively<br />
with photons.<br />
Key to the operation of the quantum<br />
repeater would be a memory component<br />
that uses an ensemble of atoms<br />
to store the photon’s information<br />
briefly and retransmit it at the right<br />
moment. Its operation would involve<br />
an atom’s energy structure: As an<br />
atom catches the photon, the atom’s<br />
energy level rises to a higher state.<br />
At the desired moment, the atom<br />
returns to its original state and emits<br />
the energy as another photon.<br />
Not just any photon can readily<br />
interact with this atom, though. It<br />
needs to be exactly the right color,<br />
or wavelength, needed to make the<br />
atom’s outer electron jump to a higher<br />
state. To make usable repeaters,<br />
engineers need to measure photons’<br />
wavelengths far more precisely than<br />
conventional spectrometers can.<br />
The NIST team goes past convention<br />
with a technique called electromagnetically<br />
induced transparency<br />
(EIT), which starts out by using<br />
atoms’ ability to block light of a specific<br />
wavelength.<br />
Astronomers can tell what gases<br />
form the atmosphere of a far-off<br />
world because light passing through<br />
it makes the gas molecules vibrate<br />
at frequencies that block out light<br />
of particular colors, creating telltale<br />
dark lines in the light’s spectrum.<br />
EIT essentially creates a single dark<br />
line by beaming a laser at atoms<br />
whose vibrations block much of its<br />
light. A second laser, tuned to nearly<br />
the same wavelength as the first, is<br />
directed at the same atom and the interference<br />
between these two nearly<br />
identical beams alters the darkness.<br />
Instead of a simple dark line, it creates<br />
a line with a narrow transparent<br />
hole through which photons only of<br />
an extremely specific wavelength can<br />
pass.<br />
41
January 2018 Edition | GSN Magazine | The News Leader in Physical, IT and Homeland Security<br />
By making fine adjustments to the<br />
second laser’s wavelength, the team<br />
found it could move the hole back<br />
and forth across the dark line’s<br />
width, giving them a way to make<br />
highly precise measurements of a<br />
passing photon’s wavelength.<br />
To give a sense of how precise their<br />
spectrometer is, the team gave the<br />
example of a common laser pointer<br />
that shines in a single narrow color<br />
range, creating a pure-colored point<br />
on a screen. The typical spectrum<br />
width of a laser pointer is right<br />
around 1 terahertz (THz). The NIST<br />
invention can measure the color of a<br />
single-photon-level signal that has a<br />
spectrum 10 million times narrower<br />
than the laser pointer, resulting in<br />
a performance 10,000 times better<br />
than typical conventional spectrometers.<br />
“Additionally, we can extend our<br />
EIT spectrometer’s performance to<br />
any other wavelength range using<br />
other processes developed by our<br />
group without sacrificing its spectral<br />
resolution, high wavelength<br />
accuracy and high detection sensitivity,”<br />
said Lijun Ma, an optical engineer<br />
on the NIST team. “We think<br />
this will give the industry the tool<br />
it needs to build effective quantum<br />
repeaters.”<br />
21
January 2018 Edition | GSN Magazine | The News Leader in Physical, IT and Homeland Security<br />
Federal and Legislative<br />
After recent terrorist incidents in U.S., Senators<br />
codify Department of Homeland Security’s Counterterrorism<br />
Advisory Board<br />
WASHINGTON – In the aftermath<br />
of recent terrorist incidents, U.S.<br />
Senators Claire McCaskill (D-Mo.),<br />
Marco Rubio (R-Fla.), and Maggie<br />
Hassan (D-N.H.) today introduced<br />
bipartisan legislation authorizing the<br />
Department of Homeland Security’s<br />
(DHS) Counterterrorism Advisory<br />
Board, whose mission is to bring together<br />
the intelligence, operational,<br />
and policy-making elements from<br />
across DHS to devise joint strategies<br />
to deter and disrupt potential terrorist<br />
attacks.<br />
<br />
“This bill is about ensuring that everyone<br />
inside the Department of<br />
Homeland Security committed to<br />
preventing and responding<br />
to terrorist incidents are able<br />
to communicate and coordinate<br />
effectively with each<br />
other,” said McCaskill, the<br />
top-ranking Democrat on<br />
the Senate Homeland Security<br />
and Governmental Affairs<br />
Committee. “The men<br />
and women heroically contributing<br />
to our counterterrorism<br />
efforts are the best in<br />
the world and this bill will augment<br />
their efforts.”<br />
“The Counterterrorism Advisory<br />
Board (CTAB) is an important component<br />
of the Department of Homeland<br />
Security’s work in preventing<br />
terrorist attacks by identifying and reducing<br />
security threats and vulnerabilities,”<br />
said Senator Rubio. “This bill<br />
will ensure that the CTAB facilitates a<br />
cohesive operational strategy so that<br />
DHS components and their partners<br />
are best enabled to detect, deter and<br />
disrupt terrorist operations.”<br />
“ This bill will ensure that the CTAB facilitates<br />
a cohesive operational strategy so that DHS<br />
components and their partners are best enabled<br />
to detect, deter and disrupt terrorist operations.”<br />
— Senator Marco Rubio<br />
“The Department of Homeland Security<br />
is tasked with preventing terrorist<br />
attacks on our homeland, and we<br />
must ensure that the full resources of<br />
the Department and the entire federal<br />
government are coordinated in focusing<br />
on this critical mission,” said Senator<br />
Hassan. “I call on members of<br />
both parties to support this bipartisan<br />
bill that will help ensure coordination<br />
of the Department’s counter-terrorism<br />
operations and keep our communities<br />
safe.”<br />
The Counterterrorism Advisory<br />
Board (CTAB) was established in<br />
2010 after the failed “underwear<br />
bomber” attack on a Northwest Airlines<br />
flight in 2009 revealed a need<br />
for better coordination and ongoing<br />
situational awareness for senior leadership.<br />
Since its creation, CTAB has met<br />
to make recommendations about<br />
whether to issue a National Threat<br />
Alert System alert, and has aided<br />
in the response to aviation threats,<br />
border threats, homegrown violent<br />
extremists, and cyber threats. The<br />
Senator’s Counterterrorism Advisory<br />
Board (CTAB) Authorization<br />
Act of 2017 codifies<br />
the board for four years and<br />
ensures that DHS will continue<br />
to succeed in its counterterrorism<br />
mission.<br />
43
Special Year- End Focus Coming in December:<br />
The GSN 2017 DIGITAL YEARBOOK<br />
OF<br />
Airport/Seaport and Homeland Security Awards Programs<br />
A Message to the GSN’s 2017 Awards Winners:<br />
In order to optimize worldwide exposure and publicity for all Winners and Finalists in our<br />
2017 Awards Programs, GSN has decided to combine the Yearbooks of the “Airport, Seaport,<br />
Border Security Awards” and the “Homeland Security Awards” into one Annual Yearbook that<br />
salutes Winners and Finalists in both programs. Here are the reasons that this is one of the<br />
best promotional opportunities of the year for our Awards Winners:<br />
• Each participating Winner or Finalist in these programs is entitled to a two-page<br />
spread in the Annual Yearbook at a cost deeply discounted from regular rates.<br />
• You don’t have to spend any time, effort or money creating an advertisement, because<br />
our designer posts your spread in an attractive 2-page format with logo and links<br />
• Based on our long experience with Awards Winners and the recognition generally<br />
received from Google and other search engines, plus social media, you’ll receive<br />
exemplary coverage on your accomplishments, which is further enhanced by a month’s<br />
exposure on our website.<br />
To Reserve Your 2-Page Spread in the 2017 Digital Yearbook of Awards Winners<br />
Contact GSN Publisher Chris Zawadzki, 914-888-6843<br />
chriszawadzki@gsnmagazine.com
January 2018 Edition | GSN Magazine | The News Leader in Physical, IT and Homeland Security<br />
GSN’s Homeland Security Awards<br />
CATEGORY #1<br />
GSN HSA2017<br />
AWARDS<br />
CYBER SECURITY PRODUCTS AND SOLUTIONS<br />
Judging in this category is based on a combination of client organization, technological<br />
innovation or improvement, filling a recognized government IT security<br />
need and flexibility of a solution to meet current and future organizational needs.<br />
Best Mobile Application Security Solution<br />
Appthority – Platinum Winner<br />
Best User & Entity Behavior Analytics Solution<br />
Bay Dynamics – Platinum Winner<br />
Gurucul – Gold Winner<br />
Best Anti-Malware Solution<br />
Bromium – Platinum Winner<br />
Best Application Security Solution<br />
Waratek – Platinum Winner<br />
Code Dx, Inc – Gold Winner<br />
Sargent and Greenleaf – Silver Winner<br />
Bromium - Finalist<br />
Best Email Security/ Loss Management<br />
Solution<br />
Bromium – Platinum Winner<br />
Best identity Management Platform<br />
Centrify – Platinum Winner<br />
CyberArk – Gold Winner<br />
Forum Systems – Silver Winner<br />
Lieberman Software Corporation - Finalist<br />
Best Continuous Monitoring &<br />
Mitigation Solution<br />
DFLabs – Platinum Winner<br />
Netwrix Corporation – Gold Winner<br />
SolarWinds Worldwide, LLC – Silver Winner<br />
CyberArk - Finalist<br />
Best Physical Logical Privileged Access<br />
Management Solutions<br />
CyberArk – Platinum Winner<br />
Forum Systems – Gold Winner<br />
Best Cyber Operational Risk Intelligence<br />
DFLabs – Platinum Winner<br />
RedSeal – Gold Winner<br />
RiskSense – Silver Winner<br />
Best Compliance/Vulnerability Assessment<br />
Netwrix Corporation – Platinum Winner<br />
Wombat Security Technologies, Inc. – Gold Winner<br />
Best Network Security/Enterprise Firewall<br />
OPAQ Networks – Platinum Winner<br />
Best Multifactor Authentication Solutions<br />
Optimal IdM – Platinum Winner<br />
45
January 2018 Edition | GSN Magazine | The News Leader in Physical, IT and Homeland Security<br />
Best Endpoint Detection and Response<br />
Solution<br />
Secdo – Platinum Winner<br />
Best Security Incident and Event (SIEM)<br />
Management<br />
SolarWinds Worldwide, LLC – Platinum Winner<br />
Best Industrial Cybersecurity Solution<br />
Veracity Industrial Networks, Inc – Platinum Winner<br />
CATEGORY #2<br />
VENDORS OF PHYSICAL SECURITY<br />
PRODUCTS AND SOLUTIONS<br />
Judging in this category is based on a combination of<br />
an increase in client organization, technological innovation<br />
or improvement, filling a recognized government<br />
IT security need and flexibility of a solution to<br />
meet current and future organizational needs.<br />
VIDEO SURVEILLANCE SOLUTIONS<br />
Best Thermo, Nightvision, Infrared<br />
Cameras<br />
FLIR Systems, Inc. – Platinum Winner<br />
CohuHD Costar Gold Winner – Gold Winner<br />
Best City-Wide Video Surveillance<br />
Logos Technologies - – Platinum Winner<br />
COMMUNICATIONS SOLUTIONS<br />
Best Interoperable First Responder<br />
Communications<br />
LRAD Corporation – Platinum Winner<br />
Best Mass Notification System<br />
Desktop Alert – Platinum Winner<br />
Best Tactical Mesh Radio<br />
Persistent Systems – Platinum Winner<br />
46<br />
BARRIERS<br />
Best Perimeter Protection, Intrusion<br />
Detection System<br />
AMICO – Platinum Winner<br />
PureTech Systems – Gold Winner<br />
FLIR Systems, Inc. – Silver Winner<br />
Best Crash Barriers (Fences, Gates,<br />
Barriers, Bollards)<br />
TCP-Security Solutions – Platinum Winner<br />
DETECTION PRODUCTS<br />
Best Nuclear/Radiation Detection Solution<br />
FLIR Systems, Inc. – Platinum Winner<br />
Best Chemical Detection Product or Solution<br />
Rapiscan Systems – Platinum Winner<br />
FLIR Systems, Inc. – Gold Winner<br />
Teknoscan Systems Inc. – Silver Winner<br />
Best Explosives Detection Product or<br />
Solution<br />
Rapiscan Systems – Platinum Winner<br />
Best Active Shooter Gunshot Detection<br />
Solution<br />
Shooter Detection Systems – Platinum Winner<br />
SERVICES EDUCATION<br />
Best College/University in Homeland Security<br />
Bellevue University – Platinum Winner<br />
Best Disaster Preparedness, Recovery,<br />
Clean-up<br />
High Rise Escape Systems Inc. – Platinum Winner<br />
Vendors of IT<br />
Best Access Control Hardware<br />
Sargent and Greenleaf – Platinum Winner<br />
CATEGORY 3
January 2018 Edition | GSN Magazine | The News Leader in Physical, IT and Homeland Security<br />
GSN’s Homeland Security Awards<br />
Special Year- End Focus Coming in December:<br />
CATEGORY 3 Special Year- End Focus Most Coming Notable in December:<br />
The GSN 2017 Federal DIGITAL Government YEARBOOK<br />
Security<br />
GSN 2017 Government<br />
The<br />
Excellence<br />
GSN 2017<br />
Award<br />
DIGITAL Program, YEARBOOK<br />
Project of OF Initiative<br />
OFFederal Risk Management Process Training Program<br />
Judging in this Airport/Seaport category will be based on and one Homeland or more Security Awards Programs<br />
of the following criteria in the development of successful<br />
strategy and increase in public safety, providing a<br />
notable solution to a recognized problem, reduction in<br />
cost and or major increase in efficiency and effectiveness,<br />
decisive successful action and response to threat<br />
or emergency.<br />
Airport/Seaport and Homeland Security Awards Pro<br />
Year- End Focus Coming in December:<br />
SN 2017 DIGITAL YEARBOOK<br />
OF<br />
Special (RMPTP) Year- End Focus Coming in December:<br />
Department of Homeland<br />
OFSecurity Science and<br />
Technology Directorate<br />
Most Notable Law Enforcement Interdiction,<br />
Arrest, Counter Terrorism or Crime Protection<br />
Program – Federal, State or Local<br />
Federal Risk Management Process Training Program<br />
t and Homeland Security Awards (RMPTP) Programs<br />
A Message to the GSN’s 2017 Awards Winners:<br />
A Message to the GSN’s 2017 Awards Winners:<br />
In order to optimize worldwide exposure and publicity A Message for all Winners to the GSN’s and Finalists 2017 Awards in our Winners:<br />
2017 Awards Programs, GSN has decided to combine the Yearbooks of the “Airport, Seaport,<br />
In order to<br />
In<br />
optimize<br />
order to optimize worldwide exposure and publicity for all<br />
for<br />
Winners<br />
all Winners<br />
and Finalists<br />
and<br />
in our<br />
Finalists in<br />
Border Security Awards” and the “Homeland 2017 Awards Security Programs, Awards” GSN into has decided one Annual to combine Yearbook the Yearbooks that of the “Airport, Seaport,<br />
salutes Winners and Finalists<br />
2017<br />
in<br />
Awards<br />
both programs. Border<br />
Programs,<br />
Security Here Awards” are<br />
GSN<br />
the and<br />
has<br />
reasons the<br />
decided<br />
“Homeland that this<br />
to<br />
Security<br />
combine<br />
is one Awards” of the<br />
the<br />
into<br />
Yearbooks<br />
one Annual Yearbook<br />
of the<br />
that<br />
“Airport, Se<br />
best promotional opportunities Border of Security the year salutes for Awards” Winners our Awards and and Finalists Winners: the “Homeland both programs. Security Here are the Awards” reasons that into this one is one Annual of the Yearboo<br />
best promotional opportunities of the year for our Awards Winners:<br />
salutes Winners and Finalists in both programs. Here are the reasons that this is one of t<br />
• Each participating Winner or Finalist in these programs is entitled to a two-page<br />
best promotional • Each opportunities participating Winner of the or year Finalist for in these our Awards programs is Winners: entitled to a two-page<br />
spread in the Annual Yearbook at a cost spread deeply in the discounted Annual Yearbook from at regular a cost deeply rates. discounted from regular rates.<br />
• You don’t have to spend • any Each time, participating • effort You don’t or money have Winner to creating spend or any an Finalist time, advertisement, effort in these or money because programs creating an advertisement, is entitled to because a two-page<br />
our designer posts your spread in in an the our attractive designer Annual 2-page posts Yearbook your format spread at with in a an cost logo attractive deeply and links 2-page discounted format with logo from and regular links rates.<br />
• Based on our long experience with Awards Winners and the recognition generally<br />
• Based on our long experience • You don’t with Awards have to Winners spend and any the time, recognition effort or generally<br />
received from Google and other search engines, money plus social creating media, you’ll an receive advertisement, be<br />
received from Google and other search engines, plus social media, you’ll receive<br />
our designer exemplary posts coverage your spread on your accomplishments, in an attractive which 2-page is further format enhanced with by a logo month’s and links<br />
exemplary coverage on your accomplishments, exposure on our which website. is further enhanced by a month’s<br />
exposure on our website.<br />
• Based on our long experience with Awards Winners and the recognition general<br />
To Reserve Your 2-Page Spread in the 2017 Digital Yearbook of Awards Winners<br />
received from Google Contact and GSN other Publisher search Chris engines, Zawadzki, plus 914-888-6843 social media, you’ll receive<br />
To Reserve Your 2-Page Spread in the 2017 Digital Yearbook of Awards Winners<br />
exemplary coverage on your chriszawadzki@gsnmagazine.com<br />
accomplishments, which is further enhanced by a mo<br />
Contact GSN Publisher Chris Zawadzki, 914-888-6843<br />
chriszawadzki@gsnmagazine.com<br />
exposure on our website.<br />
Message to the GSN’s 2017 Awards Winners:<br />
GSN | HSA2017AWARDS<br />
The GSN 2017 DIGITAL YEARBOOK<br />
Airport/Seaport and Homeland Security Awards Programs<br />
ze worldwide exposure and publicity for all Winners and Finalists in our<br />
47<br />
To Reserve Your 2-Page Spread in the 2017 Digital Yearbook of Awards W<br />
Contact GSN Publisher Chris Zawadzki, 914-888-6843<br />
ms, GSN has decided to combine the Yearbooks of the “Airport, Seaport,