30.01.2017 Views

Government Security News January 2017 Digital Edition

Government Security News January 2017 Digital Edition. Available on the GSN Magazine Website at www.gsnmagazine.com

Government Security News January 2017 Digital Edition. Available on the GSN Magazine Website at www.gsnmagazine.com

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>Government</strong> <strong>Security</strong> <strong>News</strong><br />

JANUARY <strong>2017</strong> DIGITAL EDITION<br />

Louisiana parish protects children in schools with real-time chemical detection<br />

technology, by George Lane – Page 6<br />

Also in this issue:<br />

Amico <strong>Security</strong> expects to play major role in Trump’s border security initiative – Page 10<br />

DHS Science and Technology Explosive Division (EXD) releases new incident management tool for first<br />

responders – Page 46


NEWS<br />

GSN <strong>January</strong> <strong>2017</strong> <strong>Digital</strong><br />

4<br />

6<br />

10<br />

12<br />

13<br />

16<br />

18<br />

26<br />

28<br />

37<br />

38<br />

42<br />

More than 170 members of House of Representatives Join Effort to Create<br />

Independent Commission to investigate foreign interference in U.S. Elections<br />

Louisiana parish protects children in schools with<br />

real-time chemical detection technology,<br />

by George Lane<br />

AMICO <strong>Security</strong> expects to play major role<br />

in Trump’s border security initiative<br />

USCIC updates how processing times are posted:<br />

specific dates rather than weeks or months<br />

States and localities respond to Donald Trump’s immigration plans<br />

Robots, not immigrants, are replacing<br />

U.S. manufacturing workers<br />

Rule will streamline approval of new technologies<br />

DOJ issues final rule about unfair<br />

immigration-related employment practices<br />

GSN announces Winners and Finalists<br />

in the 2016 Homeland <strong>Security</strong> Awards Program<br />

Will Congress fund President Trump’s executive<br />

order on border enforcement?<br />

Resentment and hatred from the Middle East:<br />

Why they hate us<br />

Cloudera and Docker, Inc. partner to<br />

vastly improve the security of data<br />

2


<strong>Edition</strong> Table of Contents<br />

44<br />

45<br />

46<br />

47<br />

48<br />

50<br />

LGBT Military Community calls on General Mattis to make clear his support for<br />

ALL service members & their families during confirmation hearing<br />

General Mattis says no to roll back open LGBT Military Service<br />

as Secretary of Defense<br />

DHS Science and Technology Directive Explosive Division<br />

(EXD) releases new incident management planning tool<br />

for first responders<br />

GTT solutions awarded supplier status for Crown Commercial Service TMT2<br />

framework agreement<br />

Upgrades to allow for more frequent, reliable and faster rail service along the<br />

Northeast Corridor recommended<br />

The Chemistry behind the Flint Water Crisis:<br />

Corrosion of Pipes, Erosion of Trust, by George Lane<br />

FEATURES<br />

SPECIAL REPORT ON ACCESS CONTROL & IDENTIFICATION<br />

20<br />

22<br />

24<br />

HID Global predicts top trends for <strong>2017</strong> in the Identity<br />

Technology industry<br />

Heightening security verification with self-service kiosks<br />

Card personalization now making <strong>Government</strong> ID cards<br />

more secure with better visual security<br />

SPECIAL REPORT ON VIDEO SURVEILLANCE, SOFTWARE, MANAGEMENT<br />

32<br />

34<br />

Hikvision supports school security and success<br />

for students with disabilities<br />

New Thermal Chassis Surveillance Camera<br />

Offers Continuous Zoom<br />

3


More than 170 members of House of Representatives join<br />

effort to create independent commission to investigate<br />

foreign interference in U.S. elections<br />

WASHINGTON, DC – Jan 6, <strong>2017</strong>,<br />

Rep. Eric Swalwell (CA-15), the<br />

Ranking Member of the CIA Subcommittee<br />

of the House Permanent<br />

Select Committee on Intelligence,<br />

and Rep. Elijah Cummings (MD-<br />

07), the Ranking Member of the<br />

House Committee on Oversight<br />

and <strong>Government</strong> Reform, are reintroducing<br />

their Protecting Our<br />

Democracy Act to establish an independent,<br />

bipartisan commission<br />

to investigate foreign interference in<br />

the 2016 election.<br />

They originally introduced their<br />

legislation on December 7, 2016,<br />

at the end of the 114th Congress.<br />

Since then, they have obtained the<br />

support of more than 170 Members<br />

of the House of Representatives, including<br />

Democratic Leader Nancy<br />

Pelosi, Democratic Whip Steny<br />

Hoyer, and all members of House<br />

Democratic leadership; the Ranking<br />

Members of all House Committees;<br />

and all Democratic members of the<br />

House Permanent Select Committee<br />

on Intelligence and the House<br />

Committee on Oversight and <strong>Government</strong><br />

Reform.<br />

Their bill would create a 12-member,<br />

bipartisan, independent commission<br />

empowered to interview<br />

witnesses, obtain documents, issue<br />

subpoenas, and receive public testimony<br />

to examine attempts<br />

by the Russian<br />

government or others to<br />

use electronic means to<br />

influence, interfere with,<br />

or undermine trust in last<br />

year’s U.S. elections. The<br />

commission would examine<br />

any similar efforts<br />

by any other foreign governments<br />

or entities and<br />

would issue a final report<br />

with recommendations to Congress<br />

and the President within 18 months<br />

of enactment.<br />

“There’s overwhelming agreement<br />

across America that our democracy<br />

was attacked this past presidential<br />

election. Now everyone’s asking<br />

what our nation’s leaders will do<br />

about it. Our legislation answers<br />

that question by identifying who<br />

was responsible and telling Americans<br />

what we will do to secure our<br />

next election,” said Ranking Member<br />

Swalwell. “We continue to seek<br />

Republican cosponsors because this<br />

Elijah E. Cummings,<br />

Ranking Member of<br />

House Committee on<br />

<strong>Government</strong> Oversite<br />

must be about country, not party.<br />

If we do nothing, we are telling the<br />

world our elections are open for influence<br />

by the most aggressive meddler.<br />

With 17 intelligence<br />

agencies agreeing that<br />

Russia interfered in our<br />

election, we most move<br />

quickly to have an independent,<br />

bipartisan, depoliticized<br />

commission<br />

to fully examine the circumstances,<br />

inform the<br />

public of its findings, and<br />

develop a plan to prevent<br />

this from ever happening<br />

again.”<br />

“The most senior leaders of our<br />

Intelligence Community testified<br />

yesterday that Russia interfered in<br />

our elections, which Republicans<br />

and Democrats alike have compared<br />

to an act of war,” said Ranking<br />

Member Cummings. “This grave<br />

threat calls for a truly bipartisan<br />

and independent commission that<br />

can put politics aside and conduct<br />

a complete review of this interference<br />

in our democratic process, and<br />

make concrete recommendations to<br />

protect our nation from being un-<br />

4


dermined by any foreign<br />

power. We cannot allow<br />

this to become the new<br />

normal for what we will<br />

accept as Americans.”<br />

The 12 members of the<br />

independent commission<br />

would be appointed<br />

within 90 days of enactment<br />

of the Swalwell-<br />

Cummings bill by the Speaker of<br />

the House (3), Senate Majority<br />

Leader (3), House Minority Leader<br />

(3), and Senate Minority Leader<br />

(3). The commission would choose<br />

a chair and vice chair of different<br />

Steny Hoyer,<br />

Democratic Whip<br />

parties. No federal officers<br />

or employees would<br />

be eligible to serve on the<br />

commission. Appointees<br />

would be prominent U.S.<br />

citizens with national<br />

recognition and significant<br />

depth of experience<br />

in governmental service,<br />

law enforcement, armed<br />

services, law, public administration,<br />

intelligence gathering, foreign<br />

affairs, cybersecurity, and federal<br />

elections.<br />

This week, a bipartisan group of<br />

former senior intelligence and defense<br />

officials – including former<br />

Secretary of State Madeleine Albright,<br />

former Secretary of Defense<br />

Leon Panetta, former Acting Director<br />

of Central Intelligence Michael<br />

Morrell, and former Member<br />

of Congress and 9/11 Commission<br />

Vice Chair Lee Hamilton – sent a<br />

letter urging Congress to create an<br />

“independent, bipartisan commission”<br />

to “understand fully and publicly<br />

what happened, how we were<br />

so vulnerable, and what we can do<br />

to protect our democracy in future<br />

elections.”<br />

The bill’s original cosponsors include:<br />

1.Eric Swalwell<br />

2.Elijah Cummings<br />

3.Sheila Jackson Lee<br />

4.Alma Adams<br />

5.Pete Aguilar<br />

6.Nanette Barragan<br />

7.Karen Bass<br />

8.Joyce Beatty<br />

9.Sanford Bishop<br />

10.Earl Blumenauer<br />

11.Lisa Blunt-Rochester<br />

12.Suzanne Bonamici<br />

13.Madeleine Bordallo<br />

14.Brendan Boyle<br />

15.Robert Brady<br />

16.Anthony Brown<br />

17.Julia Brownley<br />

18.Cheri Bustos<br />

19.G.K. Butterfield<br />

20.Michael Capuano<br />

21.Salud Carbajal<br />

22.Tony Cardenas<br />

23.Matt Cartwright<br />

24.Andre Carson<br />

25.Kathy Castor<br />

26.Joaquin Castro<br />

27.Judy Chu<br />

28.David Cicilline<br />

29.Katherine Clark<br />

30.Yvette Clarke<br />

31.William Lacy Clay<br />

32.Emanuel Cleaver<br />

33.James Clyburn<br />

34.Steve Cohen<br />

35.Gerald E Connolly<br />

36.John Conyers, Jr.<br />

37.Jim Cooper<br />

38.J. Luis Correa<br />

39.Jim Costa<br />

40.Joe Courtney<br />

41.Joseph Crowley<br />

42.Henry Cuellar<br />

43.Danny K. Davis<br />

44.Susan Davis<br />

45.Peter DeFazio<br />

46.Diana DeGette<br />

47.John Delaney<br />

48.Rosa DeLauro<br />

49.Mark DeSaulnier<br />

50.Theodore Deutch<br />

51.Debbie Dingell<br />

52.Lloyd Doggett<br />

53.Michael Doyle<br />

54.Keith Ellison<br />

55.Eliot Engel<br />

56.Anna Eshoo<br />

57.Adriano Espaillat<br />

58.Elizabeth Esty<br />

59.Dwight Evans<br />

60.Bill Foster<br />

61.Lois Frankel<br />

62.Marcia Fudge<br />

63.Ruben Gallego<br />

64.John Garamendi<br />

65.Vicente Gonzalez<br />

66.Tulsi Gabbard<br />

67.Al Green<br />

68.Gene Green<br />

69.Raul Grijalva<br />

70.Luis Gutiérrez<br />

71.Alcee Hastings<br />

72.Denny Heck<br />

73.Jim Himes<br />

74.Steny Hoyer<br />

75.Jared Huffman<br />

76.Pramila Jayapal<br />

77.Hakeem Jeffries<br />

78.Eddie Bernice Johnson<br />

79.Hank Johnson<br />

80.Marcy Kaptur<br />

81.William Keating<br />

82.Robin Kelly<br />

83.Joseph P. Kennedy III<br />

84.Ro Khanna<br />

85.Ruben Kihuen<br />

86.Daniel Kildee<br />

87.Derek Kilmer<br />

88.Ron Kind<br />

89.Raja Krishnamoorthi<br />

90.Ann McLane Kuster<br />

91.James Langevin<br />

More on page 27<br />

5


Louisiana parish protects<br />

children in schools with real-time<br />

chemical detection technology<br />

By George Lane<br />

The RFLM (Regional Fence<br />

Line Monitor) chemical security<br />

network, funded by<br />

the State of Louisiana and<br />

the Pointe Coupe Parish<br />

Police Jury, was demonstrated<br />

December 2 at the<br />

Pointe Coupee Parish Sheriff ’s Office<br />

Emergency Operations Center<br />

in Louisiana near Baton Rouge. The<br />

standoff sensor in RFLM detects and<br />

identifies chemicals in real-time from<br />

up to 3 miles away from any direction<br />

while identifying the source of the release<br />

with video surveillance, providing<br />

integrated situational awareness<br />

and CONOPS.<br />

The RFLM chemical security network<br />

consists of a fixed standoff<br />

chemical detector operating with<br />

a video camera, multiple portable<br />

chemical detectors, a fixed video<br />

camera, and chemical sensor data<br />

integrated with local meteorological<br />

data at the Pointe Coupe Parish “911”<br />

Center.<br />

The fixed standoff chemical detector<br />

uses an FTIR (Fourier Transform<br />

Infrared) sensor with a video camera.<br />

The RAPID (Remote Air Pollution<br />

Infrared Detector) chemical detector<br />

George Lane<br />

in RFLM is produced by<br />

Bruker Detection and detects<br />

and identifies chemical<br />

threats and risks from 3<br />

miles away.<br />

Ground level video provides<br />

surveillance of RAP-<br />

ID as well as security and a<br />

PZT-enabled video camera<br />

operating on the 300-foot microwave<br />

communication tower provides wide<br />

area surveillance.<br />

Primary critical infrastructure and<br />

public health in Pointe Coupee Parish<br />

protected by the RFLM chemical<br />

security network include Valverda<br />

Elementary School, Livonia High<br />

School, and residents of the Town of<br />

Livonia and surrounding rural areas<br />

in Valverda, living adjacent to the<br />

Union Pacific Rail Yard, Union Pacific’s<br />

second largest rail yard in North<br />

America.<br />

RFLM uses local wind speed, direction,<br />

and concentration to provide<br />

location and time of impact of chemical<br />

releases. RFLM contacts local citizens<br />

and students, faculty, and staff in<br />

schools at risk to chemical releases,<br />

determining whether to evacuate or<br />

“shelter-in-place”. Group text messaging<br />

and social media enable real-time<br />

response to chemical releases.<br />

6<br />

Current Pointe Coupee Parish<br />

School “shelter-in-place” emergency<br />

response procedures call for duct tape<br />

to be used to completely seal windows<br />

and doors to stop chemical releases.<br />

However, if students remain in sealed<br />

rooms, Carbon dioxide buildup in<br />

rooms can become a major threat to<br />

health. To mitigate these effects, activated<br />

Carbon is added to air conditioner<br />

filters operating in “shelter in<br />

place” locations to provide protection<br />

during extended chemical threats and<br />

risks.<br />

The RFLM chemical security network<br />

was developed by Emergency<br />

Response Technology (ERT) and<br />

selected “Best Rail Yard Hazmat<br />

Monitoring and Detection” and “Best<br />

Integration of Cameras, Sensors,<br />

Communications for Rail Safety” by<br />

<strong>Government</strong> <strong>Security</strong> <strong>News</strong> (GSN)<br />

in 2016; (http://gsnmagazine.com/<br />

node/46657?c=airport_aviation_security).<br />

ERT’s chemical security network<br />

designed for the Port of Greater Baton<br />

Rouge was selected as “Best Integrated<br />

Harbor <strong>Security</strong> Program” by GSN<br />

in 2015 (pages 58-59); www.yumpu.<br />

com/en/document/view/55008535/<br />

the-gsn-2015-digital-yearbook-ofawards.


Operating beneath the I-10 Bridge<br />

in Baton Rouge, RAPID’s 3-mile<br />

standoff detection and identification<br />

range will provide chemical security<br />

for the Port of<br />

Greater Baton Rouge,<br />

the Port Allen lock of<br />

the Gulf Intracoastal<br />

Waterway, downtown<br />

Baton Rouge,<br />

the city of Port Allen,<br />

the Placid Refinery<br />

in Port Allen, the<br />

ExxonMobil refinery<br />

in Baton Rouge,<br />

and transportation<br />

of commerce on the<br />

Lower Mississippi River (LMR).<br />

ERT’s chemical security network<br />

designed for the Port of New Orleans<br />

was selected as “Best Integrated<br />

3-mile<br />

3-mile<br />

radius<br />

radius<br />

of<br />

of<br />

3-mile radius of RAPID<br />

RAPID<br />

RAPID<br />

operating<br />

operating<br />

under<br />

under<br />

I-10<br />

I-10<br />

Bridge<br />

Bridge<br />

Harbor <strong>Security</strong> Program” by GSN in<br />

2014. DHS has approved funds for<br />

a chemical security network using<br />

RAPIDs at the Port of New Orleans<br />

that will be operated by the New Orleans<br />

Office of Homeland <strong>Security</strong> &<br />

Emergency Preparedness.<br />

Operating beneath the Crescent<br />

City Connection Bridge over the LMR<br />

in New Orleans, the 3-mile range of<br />

RAPID standoff detection and identification<br />

will protect the Port of New<br />

Orleans, cruise ships and terminals<br />

at the port, trucks transporting commerce<br />

at the port, the New Orleans<br />

Public Belt rail line at the port, the<br />

Gulf Intracoastal Waterway at the<br />

“We’re powered by new challenges.<br />

Our experience has made us experts<br />

at providing total security solutions.”<br />

PHIL BARRETT<br />

8 years • Power/Utility Business Development<br />

Our high standards help you meet yours. Providing superior<br />

perimeter security solutions is not just our mission.<br />

It’s personal. And that mission never stops.<br />

AMERISTARSECURITY.COM | 888-333-3422<br />

7


LMR, the Mercedes Benz<br />

Superdome, residents living<br />

and working in Uptown and<br />

the Central Business District<br />

(CBD), visitors in the French<br />

Quarter, and transportation<br />

on the LMR.<br />

In 2008 a tanker collided<br />

with a barge near the Port of<br />

New Orleans, releasing over<br />

419,000 gallons of diesel, and<br />

interrupting transportation<br />

of commerce on the LWR for<br />

11 days. In 2010 the Aspen<br />

Institute, and the Ford Foundation,<br />

conducted a vulnerability assessment<br />

at Tulane University to calculate the<br />

economic consequences of the interruption<br />

of transportation of commerce<br />

on the LWR.<br />

Because the LMR provides transportation<br />

for over 45% of all U.S.<br />

energy products and over 60% of all<br />

U.S. commerce, the study concluded<br />

that interrupting the transportation<br />

of commerce on the LWR costs the<br />

domestic economy over $275 million<br />

per day, and international commerce<br />

over $500 million each day. The release<br />

of common diesel in 2008 cost<br />

the domestic economy over $3 billion<br />

and international commerce over $6<br />

billion.<br />

But without the capability to detect<br />

and identify secondary chemical releases<br />

and their sources, the collision<br />

at the Port of New Orleans could have<br />

been much worse. The tanker had just<br />

uploaded approximately 3 million<br />

Bruker RAPID (Remote Air<br />

Pollution Infrared Detector)<br />

The fixed standoff<br />

chemical detector uses an<br />

FTIR (Fourier Transform<br />

Infrared) sensor and a<br />

video camera.<br />

RAPID monitors chemical<br />

threats and risks from an<br />

elevated platform.<br />

December 2, 2016<br />

RFLM Field Demonstration<br />

gallons of Styrene monomer, which<br />

can violently react with itself, known<br />

in chemistry as “autopolymerization”.<br />

If the Styrene monomer had “autopolymerized”,<br />

the tanker would have<br />

exploded, causing extensive collateral<br />

damage, and closed the LMR even<br />

longer. RAPID would have detected<br />

both diesel and Styrene monomer<br />

simultaneously, and directed emergency<br />

responders to the primary<br />

chemical threat, Styrene monomer,<br />

8<br />

Video camera<br />

FTIR<br />

sensor<br />

Fig. 1: Bruker RAPID<br />

1<br />

providing the source of both releases<br />

for quick response.<br />

If RAPID determines the<br />

source of a hazardous chemical<br />

release is on land, from rail,<br />

trucks, or chemical facilities on<br />

the river, the Captain of the Port<br />

may elect not to close the LMR,<br />

saving the domestic economy<br />

over $275 million per day and<br />

international commerce over<br />

$500 million per day.<br />

Below is an interactive screenshot<br />

of the video (click to view)<br />

of the December 2 field demonstration<br />

in which Sulfur hexafluoride<br />

(SF6), an inert gas, was released at the<br />

Emergency Operations Center approximately<br />

300 yards away from the<br />

Bruker RAPID.<br />

The RAPID FTIR standoff chemical<br />

sensor uses proprietary software to<br />

colorize chemical releases, allowing<br />

emergency responders and managers<br />

to visually determine the source as<br />

well the dispersion of chemicals from<br />

Click to view video of the December 2 field demonstration


up to 3 miles away in any direction.<br />

In the RAPID video a yellow dot in<br />

a surveillance box highlighted in blue<br />

progresses from right to left and then<br />

down, representing surveillance by<br />

RAPID as it scans the selected area.<br />

The small box on the lower right represents<br />

what the video camera is seeing<br />

as it moves from left to right with<br />

the FTIR chemical sensor.<br />

RAPID detects and identifies the<br />

location of the release of SF6, dispersing<br />

to the southwest (left in the video).<br />

SF6 appears in yellow at the top of the<br />

screen, and is highlighted in yellow<br />

at the bottom of the screen as one<br />

of a list of toxic industrial chemicals<br />

(TICs) in the RAPID library. Within<br />

6 seconds, the color of SF6 changes<br />

to red, indicating an increased confidence<br />

in detection and identification.<br />

SF6 appears in a red circle in the<br />

alarm box and also changes color to<br />

red in the chemical library at the bottom<br />

of the screen.<br />

blob:https%3A//<br />

mail.google.com/bebcf019-<br />

f8dd-4b56-8c7c-5daf421140a9<br />

Another demonstration was conducted<br />

using an industrial grade of<br />

Freon used to clean computer keyboards.<br />

Three additional chemicals in<br />

the Freon-based cleaner were autonomously<br />

detected and identified by<br />

RAPID and were visible as they dispersed.<br />

RAPID can be programmed<br />

to follow dispersion into selected areas.<br />

As soon as chemicals are detected<br />

and their sources identified, a single<br />

portable chemicals sensor is deployed<br />

to the source of the release to both<br />

confirm chemical-specific identification<br />

and provide measurement in sub<br />

parts per million. The ERT chemical<br />

security network is being deployed at<br />

fixed locations and portable on maritime<br />

emergency response vessels on<br />

water and in SUV vehicles on land.<br />

“We aim to protect property, and provide<br />

peace of mind by providing remarkable<br />

perimeter security products and<br />

unrivaled service.”<br />

EMILY SULLIVAN<br />

11 years • Mission Critical Business Development<br />

We know people make the difference for your business and ours.<br />

Our experienced team thrives on providing the products and<br />

service that lead to total perimeter security solutions.<br />

AMERISTARSECURITY.COM | 888-333-3422<br />

9


AMICO <strong>Security</strong> expects to play major<br />

role in Trump’s border security initiative<br />

BIRMINGHAM, AL — <strong>January</strong><br />

11, <strong>2017</strong> — AMICO <strong>Security</strong> announced<br />

today that its AMIGUARD<br />

system, considered one of the most<br />

secure and cost effective border solutions<br />

available on the market, is<br />

expected to play a large role in President-elect<br />

Donald Trump’s plan<br />

to build a border wall between the<br />

United States and Mexico.<br />

AMICO <strong>Security</strong> brings to the<br />

market extensive experience in<br />

building border walls and fences.<br />

The company’s high security fence<br />

system currently secures a 36-mile<br />

stretch along the United States and<br />

Mexico Border near Yuma Ariz., at<br />

the San Luis Crossing and an 18-<br />

mile area at the Otay Mesa Crossing<br />

in California.<br />

With President-elect Trump’s call<br />

to expand the border wall between<br />

the United States and Mexico,<br />

AMICO <strong>Security</strong> has already seen a<br />

sharp increase in interest from several<br />

government agencies.<br />

“AMICO <strong>Security</strong> is one of the<br />

only truly U.S.-owned manufacturers<br />

of high-security border fencing,”<br />

said Gary Baltz, an AMICO<br />

<strong>Security</strong> spokesperson. “In many<br />

speeches on President-elect Donald<br />

Trump’s ‘Thank You Tour,’ he stated<br />

that the policy of his administration<br />

will be to buy American and to create<br />

American jobs.”<br />

AMICO <strong>Security</strong> buys U.S.-made<br />

steel and produces its security fence<br />

panels in its U.S. factories with<br />

American workers, while many other<br />

competitors are foreign-owned<br />

and purchase raw materials from<br />

producers in Mexico and China.<br />

“We hope that our government<br />

will be vetting out those that are not<br />

in compliance with the buy America<br />

10<br />

policy,” added Baltz.<br />

AMICO is considered the largest<br />

manufacturer of <strong>Security</strong> Mesh in<br />

the world and has the capacity to<br />

meet a large demand. <strong>Security</strong> Mesh<br />

is an extremely cost effective way<br />

to build a barrier and allows border<br />

guards to see through the fence<br />

structure and wind to pass through<br />

thereby reducing wind resistance.<br />

These high security meshes can be<br />

produced to meet anti-climb and<br />

cut requirements making it very difficult<br />

to breach.<br />

AMIGUARD’s patent pending<br />

design allows for the simple integration<br />

of technology such as radar<br />

systems, which can classify targets<br />

and track movement along the border,<br />

in addition to anti-tunneling<br />

More on page 33


GSN: What are your general thoughts on the<br />

2015 awards?<br />

8<br />

GSN: You spent many years on Capitol Hill and<br />

also at the Department of Homeland <strong>Security</strong>.<br />

As we head into 2016, what do you envision as<br />

homeland security spending priorities? Awards Category:<br />

––––––––––––––––––––––––––––––––––––––––<br />

GSN 2015<br />

GSN:<br />

DIGITAL<br />

What area/issue<br />

YEARBOOK<br />

pending<br />

OF AIRPORT/SEAPORT/BORDER<br />

trends do you<br />

SECURITY AWARDS RECIPIENTS<br />

see as priorities for the homeland security<br />

community?<br />

Name of Nominated Product, Service,<br />

or Program:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Reason this entry deserves to win:<br />

––––––––––––––––––––––––––––––––––––––––<br />

54<br />

9<br />

GSN: What future areas of homeland security<br />

interest would you advise companies to explore?<br />

Continued on next page<br />

Awards Category:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Name of Nominated Product, Service,<br />

or Program: Link to Web Page of Nominated Organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

www.networkharbor.com<br />

Reason this Link entry to additional deserves to information win: on product,<br />

––––––––––––––––––––––––––––––––––––––––<br />

service or program, with brief description:<br />

––––––––––––––––––––––––––––––––––––––––<br />

https://youtu.be/-ucfAR5psac<br />

Name and organization of nominating<br />

contact for this entry, including name, title,<br />

organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

55<br />

GSN 2015 DIGITAL YEARBOOK OF AIRPORT/SEAPORT/BORDER SECURITY AWARDS RECIPIENTS<br />

Nominating contact’s office telephone and cell<br />

phone:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Nominating contact’s email address:<br />

––––––––––––––––––––––––––––––––––––––––<br />

john@convyassociates.com<br />

30<br />

31<br />

http://www.rapiscansystems.com<br />

Link to additional information on product,<br />

service or program, with brief description:<br />

––––––––––––––––––––––––––––––––––––––––<br />

http://www.rapiscansystems.com/en/products/<br />

radiation_detection<br />

Name and organization of nominating<br />

contact for this entry, including name, title,<br />

Nominating contact’s office telephone and cell<br />

jedgerly@speakerboxpr.com<br />

The Winners and Finalists have<br />

been selected. Now our national<br />

and international readers want<br />

to know what the strategies,<br />

technologies and innovations<br />

were that gave you the<br />

advantage. Let them know with<br />

a 2-page spread in the<br />

2016 <strong>Digital</strong> Yearbook of<br />

Award Winners.<br />

The GSN<br />

2016 <strong>Digital</strong> Yearbook<br />

OF<br />

Homeland <strong>Security</strong><br />

Awards<br />

CLICK HERE TO VIEW<br />

LAST YEAR’S YEARBOOK<br />

The GSN<br />

2015 <strong>Digital</strong> Yearbook<br />

OF<br />

Airport/Seaport/<br />

Border <strong>Security</strong> Awards<br />

AND<br />

Homeland <strong>Security</strong> Awards<br />

National Programs and Protection Directorate.<br />

ed world. New legislation pending in Congress formalizes<br />

the increased DHS role in public/private partnering.<br />

GSN 2015 DIGITAL YEARBOOK OF HOMELAND SECURITY<br />

and<br />

Global spending also parallels the DHS spending raise.<br />

AIRPORT, SEAPORT, BORDER SECURITY AWARDS PROGRAMS<br />

A new market research report, “Global Homeland <strong>Security</strong><br />

and Emergency Management Market, 2013–2018”, Information <strong>Security</strong> Management Act (FISMA) and de-<br />

New legislation also would update the 12-year-old Federal<br />

published by MarketsandMarkets is expected to reach lineate DHS’s role in guarding government networks and<br />

$544.02 Billion by 2018. Unfortunately, those numbers websites.<br />

could go even higher if there are more incidents similar to A priority for 2016 will be to accelerate rollout of<br />

GSN INTERVIEW<br />

what happened in Paris, Mali, and San Bernardino, CA. Einstein III Accelerated (E3A), the latest phase of DHS’s<br />

Best Detection Solutions<br />

automated network-security correcting systems. DHS has<br />

established memoranda of agreement with 55 federal<br />

Chuck Brooks, Distinguished Judge<br />

agencies to implement Einstein to provide horizon scanning<br />

and automated monitoring, detection, and remedia-<br />

GSN 2015 Homeland <strong>Security</strong> and<br />

Best Integrated <strong>Security</strong> Programs<br />

Rapiscan Systems<br />

CB: Counterterrorism and the counter CBRNE (chemical<br />

Airport, Seaport, Border <strong>Security</strong> Awards programs<br />

tion of government networks. DHS is also planning for<br />

2015 Winner<br />

, biological, Radiological, Nuclear, and Explosive) mission<br />

new cyber technologies that provide advanced defense of<br />

Network will always Harbor, be fundamental Inc. to homeland planning and<br />

network framework layers, including authentication, better<br />

encryption, biometrics, and data analytical tools”.<br />

spending. Those are the most catastrophic threats. In<br />

2015 Winner<br />

addition to CBRNE DHS has assumed more and more of a<br />

leadership role in cybersecurity derived from both Presidential<br />

mandates and congressional legislation.<br />

Best Nuclear/Radiation Detection<br />

CB: For me it was a real pleasure judging this year’s<br />

Cybersecurity is indeed a top priority as government agencies<br />

and mega corporations experience more data breach-<br />

IPM (integrated process management) provides an<br />

annual Homeland <strong>Security</strong> and Airport, Seaport, Border<br />

CB:<br />

CB: Macro spending will increase across the board on<br />

The key word really is “future” and it is already additional element of extensibility and power for policy<br />

<strong>Security</strong> Awards programs. The submissions this year<br />

Best Physical <strong>Security</strong> Information Management<br />

homeland security products and services In accordance<br />

es with each passing year. I recently published an article<br />

around the corner with the Internet of Things (IoT). management and workflow processing that is virtually<br />

Rapiscan Systems<br />

were frankly quite amazing. The capabilities and technical<br />

System - PSIM<br />

to the new threats we are especially facing from ISIS and<br />

in The Federal Times on Key homeland security priorities<br />

Recently both the FBI and DHS issued warnings about unlimited IoT in its capabilities. The end result is an intuitive,<br />

comprehensive automated security management<br />

merits of the IT and Physical security products/solutions<br />

from other terrorist actors, and global instabilities. This<br />

to watch in 2016 (http://www.federaltimes.com/story/<br />

and pending threats. The reality is that we have become<br />

platform that operates identically, anywhere within the<br />

of all the vendors made it especially difficult to judge. In<br />

was reflected in the recent passage of the 2016 omnibus<br />

government/dhs/blog/2015/12/15/key-homeland-securitypriorities-watch-2016/77368604/)<br />

My thoughts in regards<br />

immersed in a new digital era comprised of more organization. than 50 There’s no need to retrain staff when Rapiscan they Systems, a leading provider of security screening<br />

solutions, is well known for the high quality, reliment<br />

or integrated with Rapiscan’s X-ray and metal-<br />

detection products can be used in a standalone deploy-<br />

my opinion they were all winners because they are leading<br />

technological contributors to the current and future<br />

LightHouse<br />

spending Bill recently passed by Congress by Congress.<br />

billion interfaced devices. Anything connected is move vulnerable.<br />

Expect significant investments in smart cities, nents smart are connected to the platform, which in turn ability saves and affordability of its solutions. With products based threat detection solutions. The newest addition to<br />

from one facility to another, or when new compo-<br />

The bill provides DHS with $40.96 billion, which is an<br />

to cybersecurity verbatim:<br />

security of our nation. It is good to know that very talented<br />

people in industry and government are continually<br />

Network Harbor’s LightHouse platform delivers dent management, too.<br />

increase of $1.33 billion over the fiscal year 2015 enacted<br />

“The 2015 DHS budget directed more than $1.25 billion<br />

to cybersecurity and that trend will continue in 2016.<br />

homes, smart businesses, and smart governments customers in the significant amounts of time and money. sold into four market segments, including Baggage and Rapiscan’s radiation detection product line is the Rapiscan<br />

MP100 Backpack Radiation Detection system. A high<br />

Parcel Inspection, Cargo and Vehicle Inspection, Hold<br />

levels. It included increased funding levels for Customs<br />

next Its decade. click-and-go For the ability security to adopt community this conveys<br />

Baggage Screening and People Screening, the company performance, easy to use radiation monitor combining<br />

designing and upgrading security solutions to fill gaps as<br />

unified security management for enterprise organizations,<br />

extending the capabilities of physical security its own capabilities means that there’s no “dumbing<br />

the full functionality of any security system’s API within<br />

and Border Protection, Immigration and Customs Enforcement<br />

and for DHS Cybersecurity programs in the incident DHS management DHS’s (PSIM) inception to include as we geographical have become a more down” interconnect-<br />

of features or for functions threat detection, – just a seamless, surveillance, con-predictive data analytics,<br />

tion situations Convy its customers Associatescould face. An important a lightweight, compact commercial backpack, making<br />

Cybersecurity and IT have moved to the forefront since<br />

opportunities in developing and integrating new sensors<br />

has a solution John for Convy, the most Principal demanding threat detec-<br />

gamma and optional neutron detection is housed in<br />

adversaries are becoming more hostile and sophisticated.<br />

part of Rapiscan’s product portfolio is its radiation the system perfect for covert inspection situations. The<br />

information system (GIS) and non-physical products in sistent user interface, anywhere across the enterprise.<br />

detection product line, which addresses the need for MP100 is ideal for supporting security operations and<br />

a truly comprehensive safety and security management It installs easily, and is quickly mastered by administrators<br />

and end users alike. LightHouse supports almost<br />

global governments and organizations to monitor and performing radiation surveys in a variety of markets –<br />

environment. LightHouse is unique in that it integrates<br />

locate radioactive threat materials that can be used in including critical infrastructure, customs and border<br />

every security system, physical or non-physical, into a all major security product manufacturers including<br />

office: 202-421-3777<br />

atomic weapons and dirty bombs. The product line is control, event security, defense and law enforcement<br />

single, seamless oversight system. Its intuitive interface access control, video, audio, mass notification, IDS,<br />

comprised of software and hardware based solutions applications. All of the features required for radiation<br />

drives faster recognition of potential threats, as well RTLS and more. LightHouse has been designed to add<br />

for inspecting vehicles, packages and people. Radiation detection are integrated in the MP100 so it can be used<br />

as gives first responders the information they need to additional system integration’s to the platform without<br />

make better informed, more appropriate decisions. disruption or encumbrance of any existing integration<br />

LightHouse is designed to support the IT side of inci- in an expedient, stable and secure process. LightHouse<br />

Address of nominating contact’s organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

8380 Greensboro Drive Suite 514<br />

McLean, VA 22102<br />

as a standalone device and connected wirelessly to a Link to Web Page of Nominated Organization:<br />

Rapiscan oversight system for remote data collection<br />

––––––––––––––––––––––––––––––––––––––––<br />

and display. Using the MP100 is as easy as slipping<br />

the backpack on and walking around. Weighing just<br />

18 pounds, the MP100 is lightweight and easy to use.<br />

Additionally, the onboard battery enables 16 hours of<br />

continuous operation in a wide range of environments.<br />

The Rapiscan RadviewerTM Android app displays the<br />

operator’s current position and direction toward the<br />

radiation source. The design of the MP100’s radiation<br />

detectors provides increased directional sensitivity of<br />

the radiation detection. A radiation alarm is signaled audibly<br />

via a headphone jack on the backpack or visually ––––––––––––––––––––––––––––––––––––––––<br />

organization:<br />

via RadviewerTM. In this way, the MP100 enables users Jennifer Edgerly, Senior Account Director,<br />

to effectively detect and locate radioactive threats. The SpeakerBox Communications<br />

MP100 is manufactured by Rapiscan’s Radiation Detection<br />

Products division, which has supplied thousands of<br />

radiation monitors that are deployed at border crossings,<br />

seaports, airports and facilities around the world. office: 703-287-7809<br />

phone:<br />

––––––––––––––––––––––––––––––––––––––––<br />

The MP100 uses Rapiscan’s proven radiation detection cell: 202-486-0518<br />

technology adapted for a backpack deployment. The<br />

radiation detection performance meets the requirements<br />

of ANSI N42.53. The MP100 offers customers ––––––––––––––––––––––––––––––––––––––––<br />

Nominating contact’s email address:<br />

efficient, easy to use and reliable man-portable radiation<br />

detection with high performance at an affordable cost of<br />

acquisition and operation.<br />

Address of nominating contact’s organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

7900 Westpark Drive, Suite T410, McLean, VA<br />

Contact Adrian Courtenay at 917-696-5782 to get more information<br />

and reserve your 2-page spread.


USCIC updates how processing times are posted:<br />

specific dates rather than weeks or months<br />

By Michele Waslin<br />

United States Citizenship and Immigration<br />

Services (USCIS) announced<br />

that beginning on <strong>January</strong> 4, <strong>2017</strong>,<br />

it has changed how it posts processing<br />

times. Rather that listing weeks<br />

or months, it now provides specific<br />

dates. This is a small initial step toward<br />

providing better customer service<br />

and giving individuals and employers<br />

the information they need<br />

about their immigration cases. However,<br />

the dates listed are still not based<br />

on real-time information and are outdated<br />

when they are published.<br />

USCIS provides its customers with<br />

estimates of how long the waiting<br />

time is because individuals who submit<br />

petitions or applications for immigration<br />

benefits to USCIS often<br />

have to wait lengthy periods for the<br />

transaction to be completed. These<br />

processing times are posted on the<br />

USCIS website. Processing times are<br />

available by location (e.g. National<br />

Benefits Center, service center, or<br />

field office) and by filing type. The<br />

American Immigration Council’s fact<br />

sheet on processing times explains<br />

how these processing times are calculated.<br />

In the past, processing times were<br />

listed in one of two ways:<br />

1. Processing times related to publicly-announced<br />

production goals.<br />

USCIS established production<br />

goals for certain filing types. For<br />

example, USCIS set a five month<br />

processing time goal for N-400s<br />

(naturalization applications). If the<br />

office was meeting or exceeding the<br />

goal, meaning applications were<br />

being processed in five months or<br />

less, the processing time was listed<br />

as five months. In other words, the<br />

customer doesn’t have specific information<br />

about how long applications<br />

are actually taking, just that<br />

they are being processed within five<br />

months.<br />

2. If the office was not meeting its<br />

production goal, the chart listed the<br />

date of the last application the office<br />

worked on at the time the data was<br />

sent to the Office of Performance<br />

and Quality (OPQ), which is the<br />

office that regularly calculates processing<br />

times. This does not mean<br />

12<br />

that all applications received as of<br />

that date had been adjudicated.<br />

According to the USCIS announcement,<br />

the agency will now be using<br />

the second method for publishing<br />

processing times. The tables available<br />

on the USCIS processing times webpage<br />

now list a “Processing Cases As<br />

of Date.” Presumably, the date listed<br />

is the date of the last application that<br />

particular office worked on at the moment<br />

the processing data was sent to<br />

OPQ. This new format also means<br />

that USCIS no longer informs the<br />

public of its processing goals.<br />

While having a date is helpful in<br />

that it is less confusing, it does not resolve<br />

all problems.<br />

For example, USCIS does not post<br />

processing times for all applications,<br />

and processing times do not reflect<br />

any delays related to Requests for Evidence.<br />

Furthermore, processing times<br />

are generally out of date by the time<br />

they are published. This is because<br />

OPQ takes time to receive and aggregate<br />

data from the various offices, calculate<br />

processing times, and publish<br />

them. Months can pass between the<br />

first day of the performance month<br />

and publication. Currently, the processing<br />

times were last updated De-<br />

More on page 49


States and localities respond to<br />

Donald Trump’s immigration plans<br />

By Michele Waslin<br />

With all the focus on what to expect at<br />

the national level on immigration under<br />

President-elect Donald Trump’s<br />

administration, it’s easy to overlook<br />

the states and localities, which are<br />

reacting to the presidential elections<br />

and previewing their intentions on<br />

immigration.<br />

Elections for governor were held<br />

in 12 states, with Democrats and Republicans<br />

each winning six. Republicans<br />

increased the number of states<br />

in which they control both legislative<br />

chambers from 30 to 32 states. Republicans<br />

have control of the governor’s<br />

office and both legislative houses<br />

in 24 states. Democrats control both<br />

Houses in 13 states, and have full control<br />

in six.<br />

Given the harsh anti-immigrant<br />

tone Trump took, some states and<br />

localities are doubling down on protecting<br />

their immigrant communities,<br />

push back on federal attempts to<br />

increase deportations, and make their<br />

communities more welcoming for all<br />

residents. For example:<br />

• In Chicago, a $1 million legal defense<br />

fund for immigrants was recently<br />

created. Mayor Rahm Emanuel also<br />

promised to keep Chicago a “sanctuary<br />

city” and restrict its collaboration<br />

with federal enforcement authorities,<br />

even if the city loses federal funding<br />

as a result.<br />

• In New York City, Mayor Bill De-<br />

Blasio has voiced strong support for<br />

immigrants and the city’s protective<br />

policies. Most recently, he vowed that<br />

the federal government would not be<br />

able to use information from municipal<br />

ID cards to target immigrants for<br />

deportation. Approximately 900,000<br />

New York CIty residents have these<br />

ID cards and had submitted documents<br />

proving identity and city residency<br />

in order to receive them.<br />

13<br />

• In California, lawmakers are considering<br />

a series of bills to protect unauthorized<br />

immigrants from deportation.<br />

One bill would create a fund to<br />

pay for legal counsel for immigrants<br />

facing deportation. Another would<br />

train criminal defense attorneys in<br />

immigration law so they could better<br />

protect their clients. The California<br />

Values Act (SB 54) would ban state<br />

and local police from performing the<br />

functions of a federal immigration officer<br />

and would create “safe zones” at<br />

public schools, hospitals, and courthouses.<br />

- Also in California, the Dignity Not<br />

Detention Act was re-introduced. It


would prohibit local cities and counties<br />

from entering into new contracts<br />

with private, for-profit detention facilities<br />

and would require detention<br />

facilities to comply with standards of<br />

humane treatment.<br />

• In Detroit, the city council approved<br />

municipal ID cards, which will allow<br />

all city residents to have identification<br />

documents regardless of immigration<br />

status. According to City Council<br />

Member Raquel Castaneda Lopez,<br />

“We do not stand down to our commitment<br />

to being a sanctuary city. We<br />

don’t stand down to our commitment<br />

to being a welcoming city. We do not<br />

stand down to our commitment to<br />

welcoming refugees.”<br />

• Churches and universities around<br />

the nation have also vowed to push<br />

back against any federal policies that<br />

endanger immigrants.<br />

At the same time, some states and<br />

localities will likely feel emboldened<br />

by Trump’s victory to push for greater<br />

restrictions on immigrants and immigration.<br />

In the past, we have seen state policies<br />

aimed at making life more difficult<br />

for immigrants living in the community,<br />

encouraging them to leave.<br />

Bolstered by likely expansions of collaboration<br />

between federal immigration<br />

enforcement agencies and states,<br />

we are likely to see legislation affirming<br />

such cooperation. We may also<br />

see new attempts to cut refugee resettlement,<br />

and there may also be attempts<br />

to roll back previously passed<br />

immigrant integration policies. For<br />

example:<br />

• In Florida, State Senator Greg Steube<br />

filed a bill (SB 82) to repeal in-state<br />

tuition for undocumented students<br />

who graduated from Florida high<br />

schools. The current law providing<br />

for in-state tuition went into effect in<br />

July 2014. According to Sen. Steube,<br />

who was just named chairman of the<br />

Senate Judiciary Committee, “I don’t<br />

think it’s appropriate that illegal immigrants<br />

should get tax-subsidized<br />

tuition.”<br />

• Some states will be trying to prohibit<br />

so-called “sanctuary cities” that<br />

limit cooperation with the federal<br />

immigration authorities.<br />

For example, Arkansas<br />

SB14 would prohibit<br />

sanctuary policies and<br />

deny state funds to<br />

municipalities that do<br />

not comply. The bill defines<br />

a sanctuary policy as<br />

one that limits reporting of immigration<br />

status to federal authorities,<br />

restricts custody transfers to ICE, requires<br />

ICE to obtain a warrant before<br />

making a custody transfer, prevents<br />

law enforcement officers from asking<br />

about immigration status, or grants<br />

unauthorized immigrants “the right<br />

to lawful presence or status within<br />

the municipality in violation of federal<br />

law.” Senator Gary Stubblefield,<br />

the bill’s sponsor, said he is unaware<br />

14<br />

of any actual sanctuary cities in the<br />

state and claimed his bill is “preemptive.”<br />

Anti-sanctuary legislation has<br />

been pre-filed in Texas as well.<br />

• In 2016, dozens of bills were introduced<br />

in state legislatures aimed at<br />

preventing refugees from being resettled<br />

in the state. In Michigan, House<br />

Concurrent Resolution 28 is a nonbinding<br />

anti-refugee resolution that<br />

urges the U.S. government to stop<br />

refugee resettlement in Michigan until<br />

the federal government increases<br />

screening and security checks. It<br />

passed the House Local <strong>Government</strong><br />

Committee.<br />

• In Texas, where the legislature<br />

meets every other year, we can expect<br />

debate on a number of immigration-related<br />

issues in<br />

<strong>2017</strong> including making<br />

any crime committed<br />

by an unauthorized<br />

immigrant a felony and<br />

a bill to amend the state’s<br />

constitution to deny bail to<br />

anyone in the country unlawfully.<br />

As the federal government presses<br />

for more collaboration between states<br />

and localities in order to pursue a deportation<br />

agenda in the future, it will<br />

be more critical than ever to monitor<br />

state and local laws and policies.


Robots, not immigrants, are replacing U.S.<br />

manufacturing workers<br />

By Michele Waslin<br />

There is significant evidence that<br />

immigrants boost the economy,<br />

create jobs, and bolster innovation.<br />

However, President-elect Donald<br />

Trump has repeatedly stated he<br />

wants to “put American workers<br />

first” by restricting immigration.<br />

Some Americans who are justifiably<br />

concerned about the economy,<br />

unemployment, and offshoring mistakenly<br />

believe that immigrants are<br />

responsible for the country’s economic<br />

woes. But the manufacturing<br />

industry shows that the story is<br />

much more complicated. In fact, a<br />

recent article in Fusion makes the<br />

case “that machines–not Mexicans–<br />

are perhaps the main culprit for U.S.<br />

job-loss in the manufacturing sector.”<br />

The manufacturing industry–<br />

which includes companies that<br />

make non-durable (quickly consumed)<br />

and durable goods (those<br />

that last a long time)–in the U.S. has<br />

been particularly hard hit in recent<br />

years. Manufacturing used to be<br />

the nation’s biggest employer, but<br />

today it is the fourth largest industry<br />

by employment. Ten percent of<br />

all workers in the U.S.<br />

work in the manufacturing<br />

industry.<br />

According to a 2016<br />

Georgetown University<br />

study, manufacturing<br />

was the hardest-hit industry<br />

in the Great Recession. 2.7 million<br />

jobs were lost between December<br />

2007 and <strong>January</strong> 2010 and workers<br />

with a high school diploma or less<br />

suffered the most, accounting for<br />

1.6 million lost jobs. Manufacturing<br />

has since recovered and added<br />

1.7 million new jobs, still falling one<br />

million jobs short of pre-recession<br />

levels.<br />

Scholars have found that more<br />

than 80 percent of the job losses in<br />

manufacturing between 2000 and<br />

2010 can be attributed to increased<br />

per-worker production. Because<br />

of automation and technological<br />

change, workers in the manufacturing<br />

sector are much more productive<br />

than they were a decade ago.<br />

The industry can produce more<br />

with fewer workers. According to a<br />

2015 study by Ball State University’s<br />

Center for Business and Economic<br />

16<br />

Photo by Engineering at Cambridge<br />

Research, if 2000 levels of productivity<br />

were applied to 2010 levels of<br />

production, 20.9 million manufacturing<br />

workers would have been required.<br />

However, only 12.1 million<br />

were employed.<br />

In other words, the manufacturing<br />

industry has continued to grow and<br />

remains very important to the U.S.<br />

economy. However, employment in<br />

manufacturing has not increased,<br />

primarily due to growth in productivity.<br />

As technology continues<br />

to advance, other sectors may also<br />

see job losses. According to Wilson<br />

Center scholar Chris Wilson,<br />

“We can make more stuff with fewer<br />

people. The real enemy is robots…”<br />

The bottom line is manufacturing<br />

jobs are not disappearing because<br />

of immigration. In fact, immigrants<br />

are key to the expansion and growth<br />

of the American economy.


SECURE CARD READERS<br />

FOR ANY NEED<br />

THE CHERRY LINE OF SECURE KEYBOARDS<br />

AND CARD READERS OFFERS A BROAD<br />

SELECTION TO SUIT YOUR EXACT NEEDS!<br />

LOOKING FOR<br />

VAR / INTEGRATOR<br />

PARTNERS!<br />

Add the Popular CHERRY Line to<br />

Your Portfolio and Increase Your<br />

Business! Download the Details at:<br />

www.cherryamericas.com/partner<br />

SMART CARD READERS<br />

Contact (FIPS 201), contactless<br />

and combination options<br />

BASIC USE<br />

USB SMART CARD READERS<br />

FIPS 201 certified; standalone unit<br />

with weighted base.<br />

HEAVY USE<br />

SMART CARD KEYBOARDS<br />

FIPS 210 certified, PC/SC smart<br />

card reader and secure PIN entry.<br />

MAXIMUM USE<br />

FREE<br />

WHITE<br />

PAPER<br />

THE TRENDS AND<br />

BENEFITS OF SMART CARD<br />

AND BIOMETRIC DE V ICES.<br />

1-800-844-0797<br />

www.cherryamericas.com<br />

http://bit.ly/1C1pnlY<br />

© 2016, Cherry Americas, LLC


Rule will streamline approval of<br />

new technologies<br />

WASHINGTON, DC – The U.S. Department<br />

of Transportation’s Federal<br />

Aviation Administration (FAA)<br />

today issued a final rule that overhauls<br />

the airworthiness standards<br />

for small general aviation airplanes.<br />

This innovative rule will reduce the<br />

time it takes to move safety enhancing<br />

technologies for small airplanes<br />

into the marketplace and will also<br />

reduce costs for the aviation industry.<br />

“Aviation manufacturing is our<br />

nation’s top export and general aviation<br />

alone contributes approximately<br />

$80 billion and 400,000 jobs to<br />

our economy,” said U.S. Transportation<br />

Secretary Anthony Foxx. “The<br />

FAA’s rule replaces prescriptive<br />

design requirements with performance-based<br />

standards, which will<br />

reduce costs and leverage innovation<br />

without sacrificing safety.”<br />

FAA’s new Part 23 rule establishes<br />

performance-based standards for<br />

airplanes that weigh less than 19,000<br />

pounds with 19 or fewer seats and<br />

recognizes consensus-based compliance<br />

methods for specific designs<br />

and technologies. It also adds new<br />

certification standards to address<br />

general aviation loss of control accidents<br />

and in-flight icing conditions.<br />

“The rule is a model of what we<br />

can accomplish for American competitiveness<br />

when government and<br />

industry work together and demonstrates<br />

that we can simultaneously<br />

enhance safety and reduce burdens<br />

on industry,” said FAA Administrator<br />

Michael Huerta.<br />

18<br />

The rule responds to the FAA<br />

Modernization and Reform Act of<br />

2012 and the Small Airplane Revitalization<br />

Act of 2013, which directed<br />

the FAA to streamline the<br />

approval of safety advancements<br />

for small general aviation aircraft.<br />

It also addresses recommendations<br />

from the FAA’s 2013 Part 23 Reorganization<br />

Aviation Rulemaking<br />

Committee, which recommended a<br />

more streamlined approval process<br />

for safety equipment on small general<br />

aviation aircraft.<br />

The new rule also promotes regulatory<br />

harmonization among the<br />

FAA’s foreign partners, including<br />

the European Aviation Safety Agency<br />

(EASA), Transport Canada Civil<br />

Aviation (TCCA), and Brazil’s Civil<br />

Aviation Authority (ANAC). This<br />

harmonization may help minimize<br />

costs for airplane and engine manufacturers<br />

and operators of affected<br />

equipment who seek certification to<br />

sell products globally.<br />

The rule affects airplane manufacturers,<br />

engine manufacturers, and<br />

operators of affected equipment.<br />

Click here to learn more from the<br />

FAA and industry about the benefits<br />

of streamlined certification.<br />

This regulatory change is a leading<br />

example of how the FAA is<br />

transforming its Aircraft Certification<br />

Service into an agile organization<br />

that can support aviation<br />

industry innovation in the coming<br />

years. The Service is focused on using<br />

risk-based oversight to refresh<br />

the certification strategy, investing<br />

in management systems to improve<br />

performance, and improving the<br />

overall organization.<br />

The rule will be effective eight<br />

months from publication in the<br />

Federal Register.


Countering Transnational Organized Crime:<br />

An Important Component of Counter-Terrorism Strategy<br />

APRIL 11-13, <strong>2017</strong> | SAN ANTONIO, TX<br />

■ The largest gathering of border security leaders and field commanders<br />

■ Largest exhibition of border technology products, systems and solutions anywhere<br />

■ Daily keynotes, luncheons and awards ceremonies<br />

■ Demo Day at an outdoor venue on April 13 for testing equipment in the field<br />

■ Host to the Salute to Fallen Heroes Memorial Ceremony<br />

■ Networking events throughout<br />

Visit www.Border<strong>Security</strong>Expo.com<br />

For Information on Attending, Sponsorships & Exhibiting


Access Control & Identification<br />

HID Global predicts top trends for <strong>2017</strong> in the<br />

Identity Technology industry<br />

AUSTIN, TX, <strong>January</strong> 11, <strong>2017</strong> –<br />

HID Global®, a worldwide leader in<br />

trusted identity solutions, forecasts<br />

a shift in the use of identity technology<br />

that will lead to increased adoption<br />

of mobile devices and the latest<br />

smart card technology, a greater<br />

emphasis and reliance on the cloud,<br />

and a radical new way of thinking of<br />

trust in smart environments and Internet<br />

of Things (IoT).<br />

Ultimately, HID Global predicts the<br />

<strong>2017</strong> trends will transform the way<br />

trusted identities are used with smart<br />

cards, mobile devices, wearables,<br />

embedded chips and other “smart”<br />

objects, particularly in industries focused<br />

on regulatory compliance, such<br />

as government, finance and healthcare<br />

markets. This shift will precipitate<br />

the move from legacy systems<br />

to NFC, Bluetooth Low Energy and<br />

advanced smart card technology to<br />

meet the evolving needs of enterprises<br />

and governments worldwide.<br />

The forecast for <strong>2017</strong> is also based<br />

on a breakthrough in adoption of mobile<br />

identity technology in 2016. Exemplifying<br />

industry-wide trending,<br />

HID Global experienced tremendous<br />

uptick in customer deployments of<br />

its broad mobility solutions and has<br />

a strong pipeline of future customer<br />

installations in the works to make<br />

verification of identities optimized<br />

for mobile applications.<br />

“HID Global has forecasted top<br />

trends based on our broad view of the<br />

market in close collaboration with<br />

customers and partners who are assessing<br />

and deploying innovative solutions<br />

across markets worldwide,”<br />

said Stefan Widing, President and<br />

CEO of HID Global. “We have been<br />

at the forefront of major technology<br />

shifts over the years and HID Global<br />

believes <strong>2017</strong> will mark an important<br />

phase in the industry, as organizations<br />

seek to use the broadest range of<br />

smart devices ever. This will directly<br />

impact how customers view and use<br />

trusted identities on both mobile devices<br />

and smart cards for more activities<br />

in more connected environments<br />

in the years ahead.”<br />

HID Global focuses on four significant<br />

trends in <strong>2017</strong> that will influence<br />

20<br />

how organizations create, manage<br />

and use trusted identities in a broad<br />

range of existing and new use cases.<br />

Stronger adoption of<br />

mobile devices and advanced smart<br />

cards underscores the need<br />

for trusted identities<br />

• Similar to the adoption of consumer<br />

trends to IT in past years, <strong>2017</strong> will<br />

also see further consumerization of<br />

security, with heightened demand<br />

from users seeking to open doors,<br />

and login to cloud-based resources,<br />

as well as have personalized on-demand<br />

printing of documents, and to<br />

deploy printed credentials remotely<br />

or conduct other transactions and<br />

daily activities using trusted IDs on<br />

their phone, wearable or smart card.<br />

• Trusted IDs that integrate security,<br />

privacy and convenience will provide<br />

a new level of assurance to these applications<br />

and transactions, while being<br />

uniquely positioned to make secure<br />

access more personalized to the<br />

individual.<br />

• The industry will look towards complete<br />

identity relationship management<br />

that considers the need to grant<br />

access based on the context or circumstances<br />

for risk-appropriate au-


thentication across trusted identities<br />

assigned to people, devices, data and<br />

things in smart offices, buildings and<br />

other environments that are becoming<br />

more connected every day.<br />

Greater emphasis on the cloud<br />

through “hybrid” solutions that<br />

combine on-premises and the cloud<br />

to create common management<br />

platforms for digital IDs<br />

• Organizations are recognizing the<br />

interdependencies of technologies<br />

and platforms needed for business<br />

agility, cost management and providing<br />

a better user experience within a<br />

mobile workforce, or for digital commerce<br />

and relationship management<br />

that continues to require more reach,<br />

flexibility, security.<br />

• In banking, government, healthcare<br />

and other regulated markets, multifactor<br />

authentication for physical and<br />

IT access control will have more opportunities<br />

to merge into integrated<br />

systems that will also provide a more<br />

convenient experience for users and<br />

increase security.<br />

• This model will make it easier for<br />

administrators to deploy and maintain<br />

an integrated system throughout<br />

the complete identity lifecycle -- from<br />

onboarding to offboarding;<br />

• It will make it possible to monitor<br />

and manage employees’ access rights<br />

as their role changes within an organization,<br />

ensuring employees only<br />

have access to what they need in a<br />

current role.<br />

• Credential issuance for physical ID<br />

cards will also experience a digital<br />

transformation, as the use of cloud<br />

technologies will enable managed<br />

service models for badge printing and<br />

encoding.<br />

Emerging IoT uses cases to<br />

connect, more people, places and<br />

things, increasing the need to ensure<br />

the Internet of Trusted Things (IoTT)<br />

• Trusted identities will increasingly<br />

be employed to help secure, customize<br />

and enhance the user experience<br />

across a growing range of industry<br />

segments that are embracing the<br />

power of the IoT.<br />

• Organizations will look towards<br />

streamlining processes and operations<br />

using real-time location systems,<br />

presence- and proximity-based<br />

location functionality, condition<br />

monitoring solutions, beacons and<br />

cloud-based models for<br />

emerging IoT applications<br />

using Bluetooth<br />

Low Energy. These applications<br />

will include<br />

a growing number of<br />

energy efficient, productivity<br />

and safetyoriented<br />

use cases that<br />

will need to know the<br />

identity of occupants<br />

in a physical space to<br />

manage environmental<br />

conditions, book meet-<br />

21<br />

ing rooms and auto-configure audio<br />

visual equipment and alarms.<br />

• Bluetooth Low Energy-based solutions<br />

will also advance existing secure<br />

proof of presence capabilities to<br />

include the predictive analytics and<br />

functionality based on location-based<br />

technologies.<br />

Embedding trusted identities more<br />

deeply in everyday activities for<br />

businesses and consumers<br />

• Trusted identities will become an<br />

embedded feature of more use cases<br />

rather than simply an add-on capability.<br />

This trend of “security by design”<br />

will lead to many more convenient<br />

approaches to using digital identities<br />

across a growing variety of activities,<br />

services and industries.<br />

• Along with popular secure access<br />

use cases, new applications will<br />

emerge, such as employee mustering<br />

capabilities to address emergencies as<br />

well as the need to more<br />

accurately determine<br />

who is in a building in<br />

real-time.<br />

• New capabilities for<br />

managing and using<br />

trusted IDs will be driven<br />

by the increase of<br />

temporary offices, mobile<br />

knowledge workers<br />

and the evolution of the<br />

workplace, where adapting<br />

to the preferences of<br />

More on page 54


Access Control & Identification<br />

Heightening security verification with<br />

self-service kiosks<br />

The issuance and verification of<br />

identity credentials are currently<br />

managed by different agencies in<br />

different ways. Given the variations<br />

in resources, technology and<br />

security requirements, this is not<br />

surprising. Emerging technologies<br />

are now creating opportunities to<br />

achieve greater consistency across<br />

platforms and agencies which may<br />

enable greater efficiencies and better<br />

accuracy throughout the spectrum<br />

of security needs.<br />

One promising modality is the<br />

standalone, self-service ID kiosk.<br />

Its simplest form is similar to the<br />

electronic check-in kiosks at airports,<br />

where passengers insert their<br />

credit cards or scan their passports<br />

to verify identity. Those kiosks serve<br />

as an initial security point, but they<br />

do not support biometric data recognition<br />

(such as fingerprints, iris<br />

scan or facial recognition). They reduce<br />

the need for clerks to perform<br />

the check-in at the airline counter,<br />

without replacing TSA check-points<br />

where passengers show picture IDs<br />

along with boarding passes.<br />

Still, the check-in machine allows<br />

reasonable labor savings for airlines.<br />

22<br />

It also provides a conceptual backdrop<br />

for the type of self-service kiosks<br />

that could enable greater levels<br />

of efficiency, savings and accuracy<br />

in security credentials issuance and<br />

authentication. This could be useful<br />

in government embassies and facilities,<br />

as well as in airports and other<br />

locations where security needs are<br />

high.<br />

The enrollment process for issuing<br />

ID credentials must still begin<br />

with a face-to-face encounter with<br />

an officer or agent of the issuing<br />

body. For example a passport, driver’s<br />

license or global entry pass requires<br />

the completion and transfer<br />

of data such as birth certificates, fingerprints,<br />

signature, etc. Biometric<br />

data capture can be performed automatically<br />

with the use of a machine,<br />

such as the Speed Identity kiosk, or<br />

by a trained security agent. A combination<br />

of the two can also be used<br />

to speed up the process. The security<br />

officer is usually vested with the<br />

skills to recognize human factors,<br />

such as nervousness, that provide<br />

subjective cues about an applicant’s<br />

authenticity, for example. While fingerprints<br />

and photographs are collected<br />

automatically, the officer’s attention<br />

can be focused on observing<br />

behaviors that a machine can’t see<br />

or understand.<br />

The real benefit of a self-service


ID kiosk is after the credentials have<br />

been issued – when they are checked<br />

at the point of entry to an airport<br />

terminal, area or building. Here,<br />

biometric data can be matched<br />

against a central database. Fingerprints<br />

can be quickly scanned and<br />

matched. A signature can be validated.<br />

Or a photo can be used for a<br />

facial recognition (FR) comparison.<br />

Many of the security functions enabled<br />

by the technology can take<br />

place seamlessly without the user’s<br />

explicit step-by-step direction because<br />

they occur in the background.<br />

Once an individual’s background<br />

and identity are vetted through the<br />

appropriate authoritative agencies,<br />

it won’t have to be done repeatedly.<br />

All of the work is done up front and<br />

subsequent screenings are virtually<br />

instantaneous.<br />

Gaining entry to a secure area –<br />

for example, a particular work area<br />

in a mission critical facility or location<br />

– can be done at an unattended<br />

gate, simply by requiring a quick<br />

fingerprint, iris scan, or FR comparison.<br />

The potential for unauthorized<br />

access, fraud and human error is reduced.<br />

Re-entering the US after a trip<br />

abroad can also be made faster<br />

and easier with self-service kiosks.<br />

Instead of manually completing a<br />

US customs form and handing it,<br />

with a passport, to a customs agent<br />

for checking, questions can be answered<br />

on an electronic screen and<br />

the passport can be authenticated at<br />

the same time. The machine does<br />

more than visual inspection of an<br />

ID credential – it can also scan for<br />

invisible security features. The time<br />

and labor savings can be invaluable.<br />

This technology is already being<br />

used at international points of entry.<br />

A common credential for government<br />

facilities and agencies could<br />

also be accommodated. This would<br />

allow authentication between agencies<br />

with a high degree of confidence.<br />

The migration to self-service kiosks<br />

will require planning. Traffic<br />

volume must be carefully considered<br />

when deciding how many machines<br />

to install and in what locations.<br />

They must be easy to find, and<br />

it’s important to install enough of<br />

them to prevent long lines. Bottlenecks<br />

would defeat their purpose of<br />

convenience, and discourage use.<br />

The interface and workflow are<br />

critical points for user adoption. The<br />

kiosk should be inviting and easy to<br />

use and understand. It’s possible for<br />

the interface to adjust workflow in<br />

accordance with the user’s demographic<br />

(age, for example). The user<br />

won’t realize it, but the speed of the<br />

question/answer workflow will be<br />

23<br />

adjusted to meet the user’s anticipated<br />

needs.<br />

Anti-fraud measures can be<br />

built in as well. Biometrics can be<br />

proofed with background adjudication.<br />

The interactive technology will<br />

detect inconsistencies and adjust<br />

the workflow to allow correction or<br />

to automatically abort an attempt.<br />

Conclusion<br />

The use of self-service kiosks for<br />

identity authentication will become<br />

commonplace in areas, like airports<br />

and government facilities, where a<br />

high degree of security is required.<br />

These new technologies will enable<br />

faster and more accurate checking<br />

of credentials, saving time and<br />

money and providing a new level of<br />

convenience to the users.


Access Control & Identification<br />

Card personalization now making <strong>Government</strong> ID<br />

cards more secure with better visual security<br />

by Josh Nippoldt<br />

Director, Product Marketing,<br />

Consumables<br />

24<br />

It is estimated that more than<br />

90 percent of photo ID card inspections<br />

are undertaken visually<br />

and in the field. In fact, visual<br />

inspections are often the first and<br />

primary form of document investigation<br />

and validation. Any decisions<br />

to use a secondary inspection<br />

criteria are often based on the outcome<br />

of the visual inspection. For<br />

this reason, good badge design and<br />

the selection of the right custom ID<br />

card printing solution is so important.<br />

These components are crucial<br />

in creating visually secure credentials<br />

that incorporate elements that<br />

can be scrutinized and validated<br />

during the initial inspection.<br />

The speed, cost-effectiveness,<br />

convenience and simplicity of visual<br />

inspections have made them<br />

particularly popular in government<br />

applications including national<br />

ID cards, permit and enforcement<br />

documents, and federal ID credentials.<br />

These cards, documents and<br />

credentials must be clearly authentic<br />

and genuine, so the<br />

importance of having<br />

a well-designed visual<br />

security solution cannot<br />

be overstated.<br />

Typical visual security<br />

features include<br />

holographic overlaminates and card<br />

pre-printing. Holographic overlaminates<br />

may include numerous overt,<br />

covert and forensic features, while<br />

pre-printing options range from<br />

holograms and various types of security<br />

printing to special inks, relief<br />

structures, laser images, optical<br />

variable ink (OVI), hidden features,<br />

and randomized UV markings.<br />

There are dozens of visual security<br />

combinations that can be considered,<br />

and HID Global and its partners<br />

are available to help customers<br />

make the right choices for their requirements.<br />

It’s important to note that most of<br />

the visual security solutions that are<br />

offered today are one-size-fits-all,<br />

meaning they are exactly the same<br />

on every single document. While<br />

this is still a very effective solution,<br />

an additional level of defense can<br />

be applied by utilizing card printing<br />

features including personalizing<br />

IDs with on-card visual security options.<br />

The ID designs can now play<br />

a role in the first line defense against<br />

counterfeiting by taking visual security<br />

features and customizing them<br />

to each unique card holder or user.<br />

HID Global delivers this capability<br />

to its customers with its One-2-<br />

One custom card printing offerings,<br />

which make visual security<br />

solutions unique to each individual<br />

and their credential. These One-2-<br />

One solutions can be created on the<br />

company’s vanGO® cards which are<br />

stamped with a unique and specialized<br />

foil developed by HID Global.<br />

In addition, numerous One-2-One<br />

visual security elements can be<br />

placed onto the cards’ foil including<br />

a picture of the card holder, a<br />

unique identification number, or<br />

even a combination of items, such<br />

as a unique ID plus the organization’s<br />

logo, for example. The alternative<br />

One-2-One option of laser<br />

engraving offers the advantage of<br />

being able to place images either at<br />

the surface or beneath the surface of<br />

the ID card, and supports more detailed<br />

images as well as the ability to


create microtext lettering. The personalization<br />

of these One-2-One solutions<br />

are done by using available<br />

modules that can be attached to the<br />

HID FARGO® HDP8500 industrial<br />

ID card printer and encoder. The<br />

HDP8500LW laser writing module<br />

is used for creating the unique personalization<br />

of the foil on vanGO<br />

cards while the HDP8500LE laser<br />

engraver module can be used to<br />

apply numerous types of laser engraving<br />

options onto cards made of<br />

polycarbonate or laserable PVC materials.<br />

As with other forms of security,<br />

visual security solutions take time<br />

to develop and implement, so plan<br />

ahead. Remember that visual security<br />

is the first line of defense against<br />

threats to people, property, assets,<br />

information and infrastructure. Be<br />

sure to implement visual security as<br />

part of a well-developed and managed,<br />

multi-level security solution.<br />

And consider One-2-One card personalization<br />

solutions that are easy<br />

to validate and deliver increased<br />

counterfeit resistance.<br />

Sign-up for Free<br />

GSN <strong>Digital</strong> <strong>Edition</strong>s<br />

and Email <strong>News</strong>letters<br />

Free subscription to your selection of GSN digital editions<br />

and daily/weekly email newsletters. Add new selections or<br />

opt-out of any selections at any time.<br />

GSN Monthly <strong>Digital</strong> <strong>Edition</strong><br />

GSN Airport, Seaport, Rail, Border <strong>Security</strong> Weekly<br />

GSN Daily Insider <strong>News</strong>letter (5 Days Weekly)<br />

GSN Cybersecurity <strong>News</strong>letter<br />

GSN Media Kit<br />

CLICK HERE<br />

The <strong>News</strong> Leader in Physical, IT and Homeland <strong>Security</strong><br />

www.gsnmagazine.com<br />

25


DOJ issues final rule about unfair<br />

immigration-related employment practices<br />

By Leslie Dellon<br />

The U.S. Department of Justice’s<br />

(DOJ) Civil Rights Division recently<br />

issued a final rule, effective <strong>January</strong><br />

18, to update regulations that the<br />

agency uses to enforce employmentrelated<br />

anti-discrimination provisions<br />

that Congress included in the<br />

“unfair immigration-related employment<br />

practices” section of the Immigration<br />

and Nationality Act (INA).<br />

The agency maintains that the update<br />

clarifies the procedures for investigations<br />

and charges of discrimination.<br />

With the Immigration Reform and<br />

Control Act of 1986, Congress added<br />

a section to the Immigration and<br />

Nationality Act that made it illegal<br />

for employers to hire unauthorized<br />

workers. In the same legislation, Congress<br />

also added a section prohibiting<br />

immigration-related discrimination<br />

in the employment context. Congress<br />

also created a Special Counsel for<br />

Immigration-Related Unfair Employment<br />

Practices within DOJ to enforce<br />

the anti-discrimination provisions.<br />

This was out of concern that overlycautious<br />

employers would refuse to<br />

hire, or take other discriminatory employment-related<br />

actions against, U.S.<br />

citizens or certain immigrants who<br />

had work authorization but looked or<br />

sounded “foreign.”<br />

The law protects against discrimination<br />

based on “national origin,”<br />

which refers to being from a particular<br />

country or region of the world, or<br />

having an accent or appearing to be<br />

of a particular ethnicity. The law also<br />

protects against “citizenship status”<br />

discrimination for U.S. citizens, nationals,<br />

permanent residents (“green<br />

card” holders), refugees, asylees, and<br />

certain temporary residents. However,<br />

those who are not U.S. citizens<br />

or nationals will lose this additional<br />

protection if they do not take steps to<br />

become U.S. citizens within a specified<br />

time period. The law does not<br />

protect people not authorized to work<br />

in the U.S. and excludes employers<br />

with three or fewer employees, jobs<br />

with a lawful citizenship requirement<br />

or when a national origin discrimination<br />

claim would be covered by a different<br />

law.<br />

In 1990, Congress added a protection<br />

against a new form of immigration-related<br />

discrimination. When<br />

workers present documentation<br />

proving they are authorized to work<br />

26<br />

Photo by John Taylor<br />

in the U.S., an employer cannot require<br />

that they provide more or different<br />

documents, such as rejecting<br />

any documents other than a “green<br />

card” from permanent residents.<br />

In 1996, Congress amended this<br />

documentation provision to specify<br />

that an employer who requires “more<br />

or different documents,” or refuses to<br />

accept a document that “reasonably”<br />

appears to be genuine would be acting<br />

unlawfully only if the employer<br />

acted “for the purpose or with the intent<br />

of discriminating.”<br />

In December, DOJ finally issued<br />

regulations implementing this<br />

amendment and making certain other<br />

changes. Key elements of the new<br />

regulations include:<br />

• The name of the Special Counsel’s<br />

office is changed to the Immigrant<br />

and Employee Rights Section (which<br />

remains part of DOJ’s Civil Rights Division)<br />

because having more than one<br />

Special Counsel’s office has caused<br />

confusion. The Special Counsel’s title,<br />

which is specified by the law, remains<br />

unchanged.<br />

• The new regulations include a definition<br />

of “discriminate,” which the<br />

agency maintains has clarified that<br />

an employer’s intent to discriminate<br />

must be based on national origin or<br />

citizenship status. Some employers<br />

remain concerned because the definition<br />

of intent does not consider what


eason an employer may have had.<br />

For example, an employer may try to<br />

be helpful by letting a person who has<br />

identified herself as a permanent resident<br />

know that she could provide her<br />

green card for documentation. The<br />

employer’s intent is to be helpful, not<br />

to discriminate. This is different than<br />

requiring all foreign-born employees<br />

to present a green card, which is<br />

clearly discriminatory. However, the<br />

final rule does not ultimately resolve<br />

this issue because DOJ also explains<br />

that if the employer is intentionally<br />

treating the permanent resident differently,<br />

i.e., because of her citizenship<br />

status, then the employer has<br />

discriminated.<br />

• Individuals who submit a discrimination<br />

claim within the 180-day time<br />

period provided by law now have an<br />

additional 45 days to submit information<br />

if the Special Counsel decides<br />

that they did not provide enough information<br />

to meet the requirements<br />

for a “charge.”<br />

• The DOJ Special Counsel may accept<br />

charges filed after the 180-day<br />

time limit under certain circumstances.<br />

• The Special Counsel may file a<br />

complaint based on an investigation<br />

the office initiated, up to five years after<br />

the date of alleged discrimination.<br />

While the final rule still does not provide<br />

answers to all of the questions<br />

raised by employers, the agency has<br />

clarified its position as to enforcement<br />

of the law.<br />

House members join effort to<br />

create independent commission<br />

Continued from page 5<br />

92.Rick Larsen<br />

93.John Larson<br />

94.Brenda Lawrence<br />

95.Barbara Lee<br />

96.Sander Levin<br />

97.John Lewis<br />

98.Ted Lieu<br />

99.David Loebsack<br />

100.Zoe Lofgren<br />

101.Alan Lowenthal<br />

102.Nita Lowey<br />

103.Ben Ray Lujan<br />

104.Michelle Lujan Grisham<br />

105.Stephen Lynch<br />

106.Carolyn Maloney<br />

107.Doris Matsui<br />

108.Betty McCollum<br />

109.A. Donald McEachin<br />

110.James P. McGovern<br />

111.Jerry McNerney<br />

112.Gregory Meeks<br />

113.Grace Meng<br />

114.Seth Moulton<br />

115.Gwen Moore<br />

116.Stephanie Murphy<br />

117.Jerrold Nadler<br />

118.Grace Napolitano<br />

119.Richard Neal<br />

120.Donald Norcross<br />

121.Eleanor Holmes Norton<br />

122.Beto O’Rourke<br />

123.Frank Pallone<br />

124.Jimmy Panetta<br />

125.Bill Pascrell<br />

126.Nancy Pelosi<br />

127.Ed Perlmutter<br />

128.Scott Peters<br />

129.Collin Peterson<br />

130.Stacey Plaskett<br />

131.Mark Pocan<br />

132.Jared Polis<br />

27<br />

133.David Price<br />

134.Mike Quigley<br />

135.Jamie Raskin<br />

136.Kathleen Rice<br />

137.Cedric Richmond<br />

138.Jacky Rosen<br />

139.Lucille Roybal-Allard<br />

140.Raul Ruiz<br />

141.C.A. Dutch Ruppersberger<br />

142.Bobby Rush<br />

143.Tim Ryan<br />

144.Gregorio Sablan<br />

145.Linda Sanchez<br />

146.John Sarbanes<br />

147.Janice Schakowsky<br />

148.Adam Schiff<br />

149.Bradley Schneider<br />

150.Bobby Scott<br />

151.Jose Serrano<br />

152.Terri Sewell<br />

153.Carol Shea-Porter<br />

154.Brad Sherman<br />

155.Kyrsten Sinema<br />

156.Albio Sires<br />

157.Louise Slaughter<br />

158.Adam Smith<br />

159.Darren Soto<br />

160.Jackie Speier<br />

161.Thomas Suozzi<br />

162.Mark Takano<br />

163.Bennie Thompson<br />

164.Mike Thompson<br />

165.Dina Titus<br />

166.Paul Tonko<br />

167.Norma Torres<br />

168.Niki Tsongas<br />

169.Juan Vargas<br />

170.Marc Veasey<br />

171.Filemon Vela<br />

172.Nydia Velazquez<br />

173.Debbie Wasserman Schultz<br />

174.Maxine Waters<br />

175.Bonnie Watson Coleman<br />

176.Peter Welch<br />

177.John Yarmuth


GSN announces<br />

Winners and Finalists in the<br />

2016 Homeland <strong>Security</strong> Awards Program<br />

By Adrian Courtenay<br />

<strong>Government</strong> <strong>Security</strong> <strong>News</strong> is<br />

pleased to announce the Winners<br />

and Finalists in its 8th annual<br />

Homeland <strong>Security</strong> Awards Program,<br />

and to thank the indefatigable<br />

Chuck Brooks and his team for<br />

serving as expert judges with great<br />

distinction. Not surprisingly, Chuck<br />

Brooks is once again the odds-on favorite<br />

to become the “Cybersecurity<br />

Marketer of the Year”.<br />

It is similarly no surprise, in light<br />

of what took place in the recent<br />

Presidential election, that the subject<br />

of Cybersecurity attracted more<br />

entries in the 2016 Awards Program<br />

than any other topic.<br />

On a very important note on<br />

the subject of Cybersecurity, GSN<br />

would like to take this opportunity<br />

to salute Brigadier General (retired)<br />

Gregory Touhill, who has been<br />

named as the First Federal Chief<br />

Information Officer of the United<br />

States. He was previously the Deputy<br />

Assistant Secretary, Office of Cybersecurity<br />

and Communications,<br />

National Programs and Protection<br />

Directorate, Department of Homeland<br />

<strong>Security</strong>. Additionally, he was<br />

Chief Information Officer and Director<br />

of Command, Control,<br />

Communications and<br />

Cyber Systems at the U.S.<br />

Transportation Command.<br />

In 2014, General Touhill<br />

authored a book titled “Cybersecurity<br />

for Executives.”<br />

Before moving on to the<br />

announcement of Winners<br />

and Finalists, I would like to<br />

share with everyone the comments<br />

that Chuck Brooks made about the<br />

quality of the entries in the Awards<br />

Program, which I believe described<br />

this year’s Awards perfectly. His<br />

comments also explain why you will<br />

see a number of categories which<br />

have more than one Winner. In Mr<br />

Brooks’ words:<br />

“These are my general perceptions<br />

of the Awards: Each year the quality<br />

and scope of the submissions makes<br />

it more difficult to judge. They are<br />

all deserving. There are no inferior<br />

security products or services that I<br />

evaluated – they are all stellar. The<br />

approaches and methods sometimes<br />

differ among the entries and that is<br />

largely because they are highly fo-<br />

28<br />

Chuck Brooks<br />

cused on their specific client needs.<br />

As to the government entries, these<br />

submissions exemplify the<br />

best in public/private cooperation.<br />

<strong>Government</strong><br />

is moving rapidly into the<br />

digital era and integrating<br />

technologies, processes<br />

and accordingly new mandates<br />

of their government<br />

agencies and programs.”<br />

With that introduction from Mr.<br />

Brooks, here are the 2016 Winners<br />

and Finalists:<br />

Category #1: Vendors of<br />

IT <strong>Security</strong> Products and Solutions<br />

Judging in this category is based on<br />

a combination of:<br />

• Increase in client organization’s<br />

security<br />

• Technological innovation or<br />

improvement<br />

• Filling a recognized government<br />

IT security need<br />

• Flexibility of solution to meet<br />

current and future organizational<br />

needs


The GSN 2016 Homeland <strong>Security</strong> Awards<br />

Best User & Entity Behavior<br />

Analytics (UEBA) Solution<br />

Amplivox - Finalist<br />

Identive - Finalist<br />

Inmarsat - Winner<br />

FLIR - Finalist<br />

Rave Mobile <strong>Security</strong> – Finalist<br />

Gurucul - Winner<br />

Best Industrial<br />

Cybersecurity Solution<br />

Aperio - Winner<br />

Claroty - Finalist<br />

Darktrace - Winner<br />

Indegy - Winner<br />

Best Application <strong>Security</strong> Solution<br />

Waratec - Winner<br />

Best Multifactor<br />

Authentication Solution<br />

No entries<br />

Best Anti-Malware Solution<br />

Blue Ridge - Winner<br />

Bromium - Winner<br />

Passages - Finalist<br />

Best Identity Management Platform<br />

Centrify - Winner<br />

Forum Systems - Finalist<br />

HID Global - Winner<br />

Best Enterprise File Solution<br />

No entries<br />

Best Compliance/Vulnerability<br />

Assessment Solution<br />

Netwrix Corporation - Finalist<br />

Risk Vision - Finalist<br />

Solar Winds - Winner<br />

Wombat - Finalist<br />

Best Cyber Operational Risk<br />

Intelligence<br />

Red Seal - Winner<br />

Best Data <strong>Security</strong>/Loss<br />

Management Solution<br />

Spiron - Winner<br />

Best Email <strong>Security</strong><br />

and Integrity Solution<br />

Wombat <strong>Security</strong> Technologies -<br />

Winner<br />

Best Endpoint Detection<br />

and Response Solution<br />

Bromium - Winner<br />

Illusive Networks - Winner<br />

Tychon - Finalists<br />

Best Forensic Software<br />

No Entries<br />

Best Big Data Analytics Solution<br />

Securiport - Winner<br />

Best Threat Intelligence Solution<br />

Securiport - Winner<br />

ViaSat - Finalist<br />

29<br />

Best Network<br />

<strong>Security</strong>/Enterprise Firewall<br />

Forcepoint - Winner<br />

Best Physical Logical Privileged<br />

Access Management Solution<br />

Beyond Trust - Winner<br />

Centrify Corporation - Finalist<br />

EKUSA - Finalist<br />

Forum Systems - Finalist<br />

Identive - Winner<br />

Best Continuous Monitoring<br />

and Mitigation Solution<br />

Cyber Ark – Winner<br />

Darktrace - Winner<br />

Netwrix - Finalist<br />

Passages - Finalist<br />

Securiport - Finalist<br />

Solar Winds Worldwide - Finalist<br />

Best <strong>Security</strong> Incident & Event<br />

Management (SIEM) Solution<br />

Cyber Ark - Finalist<br />

Netwrix - Winner<br />

Solar Winds Worldwide - Winner<br />

Best <strong>Security</strong> Infrastructure<br />

Orchestration<br />

Phantom - Winner<br />

Best Server <strong>Security</strong> Solution<br />

BlueRidge - Winner


Category #2: Vendors of Physical<br />

<strong>Security</strong> Products and Solutions<br />

Judging in this category is based on<br />

a combination of:<br />

• Increase in client organization<br />

Technological innovation or<br />

improvement<br />

• Filling a recognized government<br />

IT security need<br />

• Flexibility of solution to meet<br />

current and future organizational<br />

needs<br />

PHYSICAL SECURITY, ACCESS<br />

CONTROL, IDENTIFICATION,<br />

COMMUNICATIONS<br />

Best Biometric Identification<br />

System<br />

No Entry<br />

Best Access Control Hardware<br />

Identive - Winner<br />

Best Asset Tracking<br />

With Pairing Technology<br />

Offsite Vision Holdings - Winner<br />

Best Mass Notification System<br />

Amplifox Sound Systems - Winner<br />

LRAD 2 - Finalist<br />

Rave Mobile <strong>Security</strong> - Finalist<br />

Best Acoustic Hailing Service<br />

Amplivox Sound System - Finalist<br />

LRAD - Winner<br />

Best Lock-Down and<br />

9-1-1 Notification<br />

in Active Shooter Situations<br />

Rave Mobile Safety - Winner<br />

Best Active Shooter<br />

Gunshot Detection Solution<br />

Shooter Detection System - Winner<br />

DETECTION PRODUCTS<br />

Best Chemical Detection Product<br />

or Solution<br />

FLIR - Winner<br />

Best Explosives Detection Product<br />

or Solution<br />

FLIR - Winner<br />

Best Nuclear/Radiation Detection<br />

Solution<br />

FLIR - Winner<br />

Best Automated License Plate<br />

Recognition (ALPAR)<br />

Perceptics LLC - Winner<br />

Best Spherical Situational<br />

Awareness Imaging Technology<br />

IC Realtime - Winner<br />

OTHER PRODUCTS<br />

Best Perimeter Protection,<br />

Intrusion Detection System<br />

Ross Technology Corporation -<br />

Winner<br />

30<br />

Best Crash Barriers<br />

(Gates, Fences, Barriers, Bollards)<br />

Best Guard Booths<br />

B.I.G Enterprises – Winner<br />

SERVICES/EDUCATION<br />

Best Disaster Preparedness,<br />

Recovery, Clean-up<br />

High Rise Escape Systems Inc -<br />

Winner<br />

Category #3: GSN 2016<br />

<strong>Government</strong> Excellence Award<br />

Judging in this category will be<br />

based on one or more of the following<br />

criteria:<br />

• Development of successful<br />

strategy and increase in public<br />

safety<br />

• Providing a notable solution to a<br />

recognized problem<br />

• Reduction in cost and/or major<br />

increase in efficiency and<br />

effectiveness<br />

• Decisive, successful action to<br />

respond to threat or emergency<br />

Special note on this year’s <strong>Government</strong><br />

Awards: Rather than relying on<br />

predetermined categories, the judges<br />

decided instead to select five entries<br />

that would best represented the term<br />

<strong>Government</strong> Excellence.


The GSN 2016 Homeland <strong>Security</strong> Awards<br />

Readers who would like to learn<br />

more about the selected entries may<br />

go to the GSN 2016 <strong>Digital</strong> Yearbook<br />

of Homeland <strong>Security</strong> Awards, where<br />

descriptions of the <strong>Government</strong> Excellence<br />

Winner’s entries will be posted<br />

shortly.<br />

2016 <strong>Government</strong> Excellence Entry<br />

selected by judges:<br />

Agency: USDA Agricultural Research<br />

Service (USDA-ARS)<br />

Category: Most Notable Federal<br />

<strong>Government</strong> Program, Project or<br />

Initiative<br />

Product: BeyondTrust Powerbroker<br />

2016 <strong>Government</strong> Excellence Entry<br />

selected by judges:<br />

Agency: Federal Emergency Management<br />

Agency (FEMA)<br />

Category: Most Notable Cybersecurity<br />

Program or Technology<br />

Product, Service or Program: Personal<br />

Identity Verification (PIV)<br />

and Single Sign On (SSO) enablement<br />

2016 <strong>Government</strong> Excellence Entry<br />

selected by judges:<br />

Agency: Department of Homeland<br />

<strong>Security</strong>, Office of Cybersecurity<br />

and Communications<br />

Category: Most Notable Cybersecurity<br />

Program or Technology<br />

Product: National Cybersecurity<br />

Assessments and Technical Services<br />

(NCATS)<br />

2016 <strong>Government</strong> Excellence Entry<br />

selected by judges:<br />

Agency: State of Montana<br />

Category: Most Notable State<br />

<strong>Government</strong> Program, Project<br />

or Initiative<br />

Program: State Information Technology<br />

Services Division (SITSD),<br />

State of Montana<br />

2016 <strong>Government</strong> Excellence Entry<br />

selected by judges:<br />

Agency: DOJ, OPM<br />

Category: Most Notable <strong>Government</strong><br />

<strong>Security</strong> Program, Project of<br />

Initiative<br />

Product, Service or Program: Interagency<br />

<strong>Security</strong> Committee Risk<br />

Management Process (ISCRMP)<br />

Training Program<br />

2016 <strong>Government</strong> Excellence Entry<br />

selected by judges:<br />

Agency: Wombat <strong>Security</strong> Technologies<br />

Category: Most Notable Cybersecurity<br />

Program or Technology<br />

Product, Service or Program: Wombat<br />

<strong>Security</strong> Education Platform<br />

31<br />

Nomination process<br />

Vendors of IT security or physical<br />

security products or solutions<br />

may nominate themselves<br />

or be nominated by a federal,<br />

state or local government official.<br />

<strong>Government</strong> agencies or departments<br />

may nominate their<br />

own agency or department, or<br />

another government agency or<br />

department, or may be nominated<br />

by a vendor of IT <strong>Security</strong><br />

or Physical <strong>Security</strong> products<br />

and solutions.<br />

Entrants in any category may<br />

enter for multiple awards.<br />

Entry procedure<br />

Each entrant, or representative<br />

of entrant’s company or government<br />

agency, must fill out a separate<br />

entry form for each award<br />

being sought.<br />

A written narrative of company<br />

or agency’s achievements<br />

and credentials for the award<br />

being sought should not exceed<br />

500 words. Entrants are<br />

welcome to provide supporting<br />

documentation such as Web<br />

links, supporting letters or favorable<br />

press coverage of their<br />

company or agency.


Video Surveillance, Software, Management<br />

Hikvision supports school security and success for<br />

students with disabilities<br />

CITY OF INDUSTRY, CA —<strong>January</strong><br />

16, <strong>2017</strong>— Hikvision USA Inc.,<br />

the North American leader in innovative,<br />

award-winning video surveillance<br />

products, delivered a new<br />

security system that will be used for<br />

classroom instruction as well as security<br />

at Kids World, a non-profit<br />

school for students with disabilities,<br />

located in Taylorsville, Utah.<br />

The system was installed over<br />

the holidays. Since its founding in<br />

2005, Kids World has helped<br />

students (pre-school<br />

to 7th grade) with<br />

a variety of challenging<br />

disabilities,<br />

said Kids<br />

Worldfounder<br />

Brandon Francis.<br />

“We help students get<br />

their behavior, social skills, and<br />

academics to the point where they<br />

can be successful in school and in<br />

their community,” Francis said.<br />

“We become a family to our students<br />

and I always hate to see them<br />

graduate our program,but it’s great<br />

to see them confident and ready to<br />

flourish in their next educational<br />

setting.”<br />

Several Kids World graduates<br />

have moved on to public school settings.<br />

One child, who was nonverbal<br />

initially, started speaking after<br />

participating in an auditory therapy<br />

program at Kids World.<br />

The Hikvision solution replaced<br />

an outdated system. Cameras are<br />

used for security when the school is<br />

vacant, during recess on the school’s<br />

playground, in the classrooms, and<br />

in the pickup/drop-off area. Inside<br />

the classrooms, teachers use<br />

video for monitoring<br />

and visual feedback.<br />

Kids World’s<br />

new Hikvision<br />

system is designed<br />

for very easy installation,<br />

versatility<br />

and is ideally suited<br />

to a small education-vertical<br />

environment. The system includes<br />

three Hikvision DS-2CD2432F-IW<br />

3MP Indoor IR Wifi Cube cameras;<br />

one DS-2CD2542FWD-IWS 4MP<br />

WDR Mini Dome Network camera;<br />

four DS-2CD2132F-IWS MP Vandal-proof<br />

Network Dome cameras;<br />

and aDS-7716NI-I4/16P Embedded<br />

Plug & Play 4K NVR, with a built-in<br />

32<br />

POE switch.<br />

All of the cameras feature higher<br />

definition, affording better security<br />

and better coverage for the safety<br />

of the children. The outdoor cameras<br />

provide a wide coverage area<br />

for effective perimeter protection.<br />

The indoor cameras are low profile,<br />

which makes them unobtrusive in<br />

theclassroom.<br />

The 4MP indoor dome camera<br />

features very wide, 106-degree coverage<br />

for the classroom, and all indoor<br />

cameras have audio recording<br />

capability, which Kids World teachers<br />

will use for instructional purposes.<br />

All of the cameras are also<br />

Wifi capable for a dynamic range of<br />

deployment opportunities.<br />

Kids World has two classrooms


and 16- to 20 students. In addition<br />

to regular school hours, Kids World<br />

offers one-on-one therapy, tutoring<br />

and after-school programs. Hikvision<br />

has solutions that are tailored<br />

specifically to the education market,<br />

with systems that are appropriate<br />

for a wide variety of K-12 and higher<br />

education applications.<br />

“We’re particularly pleased to provide<br />

technical expertise and video<br />

surveillance equipment to help support<br />

KidsWorld teachers and students,”<br />

said Alex Asnovich, director<br />

of marketing for Hikvision USA.<br />

“This is one example of the many<br />

ways that Hikvision invests in the<br />

communities where we do business,”<br />

he added.<br />

A few years ago, Kids World<br />

moved from its original location in<br />

a commercial park to a residential<br />

neighborhood. “I did an extensive<br />

study and found that a home-like<br />

environment is the most beneficial<br />

for students with and without disabilities.<br />

This type of environment<br />

helps students feel safe, secure, and<br />

at home. As a result, students have<br />

a higher self-esteem, are more ready<br />

to learn, have higher outcomes, and<br />

feel less anxiety then in a commercial<br />

building,” Francis said. “The<br />

Hikvision cameras will really make<br />

a difference for our students and<br />

their families, providing security<br />

and a helping hand in the classroom<br />

too,” Francis added.<br />

About Hikvision<br />

Hikvision is the world’s leading supplier<br />

of video surveillance solutions.<br />

Featuring the industry’s strongest<br />

R&D workforce, Hikvision designs,<br />

develops, and manufactures standard-<br />

and high-definition cameras,<br />

including a variety of IP cameras,<br />

analogcameras, and cameras featuring<br />

the latest in high-definition<br />

analog technology. Hikvision’s<br />

product suite also includes digital<br />

video servers, hybrid and standalone<br />

DVRs, NVRs, and other elements<br />

of sophisticated security systems<br />

for both indoor and outdoor<br />

use.<br />

33<br />

AMICO <strong>Security</strong> to play major<br />

role in Trump’s border security<br />

initiative<br />

Continued from page 10<br />

technology, detection devices, and<br />

video surveillance, all of which are<br />

currently used on the Israel border.<br />

“We are a 76-year-old Alabamabased<br />

steel fabrication company,<br />

which has been hit hard by foreign<br />

imports, dumping and an un-level<br />

playing field,” said Baltz. “We are extremely<br />

excited to have the opportunity<br />

to increase production and put<br />

American workers back to work.”<br />

About AMICO <strong>Security</strong><br />

AMICO <strong>Security</strong> is an industry<br />

leader in manufacturing medium<br />

to high security perimeter systems.<br />

AMICO has been in business for<br />

over 76 years and our patented<br />

proprietary systems protect infrastructure<br />

and boarders throughout<br />

the world. The new AMIGUARD<br />

perimeter system is the gold standard<br />

for perimeter protection and<br />

is rapidly becoming the number<br />

one choice for infrastructure protection<br />

worldwide.<br />

http://www.amicosecurity.com


Video Surveillance, Software, Management<br />

New Thermal Chassis Surveillance Camera<br />

Offers Continuous Zoom<br />

Sierra-Olympic Technologies, a supplier<br />

of infrared (IR) and thermal<br />

imaging components, cameras, and<br />

systems solutions for innovative<br />

imaging applications, has developed<br />

a new thermal chassis camera<br />

with a continuous zoom that is<br />

built for integrators and thermal<br />

video end-users, the Vinden 150 EX<br />

640 x 480 (see Fig. 1). The affordable<br />

camera provides<br />

highly-sensitive thermal<br />

imaging using<br />

advanced, uncooled<br />

VOx microbolometer<br />

technology and<br />

an extremely efficient<br />

continuous zoom optic.<br />

The highly parfocal<br />

optic keeps objects<br />

in perfect focus<br />

throughout the zoom range.<br />

The new Vinden 150 EX features<br />

a total 12X zoom factor and a remarkable<br />

1.5 degree HFOV in full<br />

optical plus digital zoom. The 640 x<br />

480 camera is available in 30 Hz and<br />

9Hz models, depending on export<br />

requirements. Specially designed<br />

for critical pan-tilt-zoom (PTZ) security<br />

and surveillance applications,<br />

the camera offers advanced thermal<br />

image processing for integrators or<br />

other users who require exceptional<br />

Figure 1 - Sierra-Olympic’s Vinden<br />

150 EX 640 x 480 thermal imaging<br />

camera for video surveillance and<br />

security.<br />

zoom imaging capabilities (see Fig. 2<br />

- Side-by-side Visible vs. Vinden 150<br />

EX thermal camera views).<br />

The Vinden 150 EX uncooled<br />

camera offers IP-video output with<br />

H.264 and MJPG streams and Ethernet<br />

control, for maximum flexibility<br />

and integration into new or existing<br />

security and surveillance systems.<br />

Simultaneous analog video (NTSC<br />

or PAL) and 14-bit<br />

Camera Link digital<br />

outputs are also available.<br />

Optional control<br />

via a serial communication<br />

port (serial<br />

com) is offered; other<br />

options include individual<br />

harness microconnectors<br />

or 30-pin<br />

FFC connectors.<br />

An ideal imaging tool for systems<br />

integrators, Sierra-Olympic’s Vinden<br />

150 EX is used for infrastructure security,<br />

thermal PTZ systems, port<br />

and harbor security,<br />

and a variety of defense<br />

applications.<br />

To learn more about<br />

the new Vinden 150<br />

EX 640 x 480 thermal<br />

camera, please go to:<br />

www.sierraolympic.<br />

com/products/lwir-<br />

34<br />

optics/vinden-cz/vinden-150-ex-<br />

640x480.<br />

About Sierra-Olympic<br />

Technologies, Inc.<br />

Sierra-Olympic Technologies, Inc.<br />

(www.sierraolympic.com Hood<br />

River, Oregon), experts in thermal<br />

imaging technology, provides cameras,<br />

components, and systems solutions<br />

for infrared camera users and<br />

integrators. Sierra-Olympic partners<br />

with industry-leading manufacturers<br />

to offer complete solutions for<br />

SWIR, MWIR, and LWIR imaging<br />

applications. The company offers numerous<br />

products for online purchase<br />

and immediate shipment. Products<br />

include LWIR OEM imaging cores,<br />

cooled cameras for science and industry,<br />

cooled cameras for OEM<br />

customers, SWIR cameras, and thermography<br />

systems for temperaturemeasurement<br />

applications.<br />

Figure 2 - Side-by-side Visible vs. Thermal camera viewsviews from a<br />

visible camera and a thermal camera of smoky hills and power lines).


Elephant proof.<br />

Our cameras are much tougher than they look. That’s because we don’t just<br />

give them a few strikes during testing, as you might expect. Instead, we subject<br />

them to about 30 heavy strikes – directly on their weakest spots. Don’t worry<br />

though, we keep them away from elephants.<br />

It’s just one of the tough tests Axis cameras face, so you can be sure you’ll<br />

always get the best image quality and high performance – no matter what’s<br />

thrown at them.<br />

Learn more about Axis’ quality assurance work at axis.com/quality<br />

For more information about our governement solutions, visit www.axis.com/usgov


Will Congress fund President Trump’s executive<br />

order on border enforcement?<br />

By Joshua Breisblatt<br />

President Donald Trump’s Border<br />

<strong>Security</strong> and Immigration Enforcement<br />

Improvements executive order<br />

is an attempt to fulfill his campaign<br />

pledge to build a wall at the<br />

southern border, to provide additional<br />

resources to Border Patrol<br />

agents, to curtail due process<br />

at the border, and to increase detention<br />

along the southern border,<br />

including for those who are<br />

seeking protection. Much of this<br />

order will require more funding<br />

from Congress, and that is by no<br />

means guaranteed.<br />

The executive order directs the<br />

Department of Homeland <strong>Security</strong><br />

(DHS) to take immediate steps<br />

to allocate available funds to start<br />

constructing a wall, as well as creating<br />

a long-term funding plan for<br />

it. As a practical matter, with estimated<br />

costs of $15 to $25 billion<br />

to build the remaining border wall<br />

segments, Congress would have to<br />

appropriate significant additional<br />

funding for construction and annual<br />

maintenance.<br />

Apart from the wasteful expense,<br />

construction of additional border<br />

fencing is unnecessary; as of early<br />

<strong>2017</strong>, approximately 650 miles of<br />

border fence already exists. Even<br />

the head of the National Border Patrol<br />

Council, a union representing<br />

16,000 Border Patrol agents which<br />

endorsed Trump during his campaign,<br />

said, “We do not need a wall<br />

along the entire 2,000 miles of border.”<br />

The order also directs DHS to immediately<br />

construct detention facilities<br />

at or near the southern border<br />

and to hire an additional 5,000 Border<br />

Patrol agents. The federal government<br />

is operating under a Continuing<br />

Resolution until April 28,<br />

<strong>2017</strong>, and it is doubtful that significant<br />

funds exist to implement these<br />

plans. Construction and maintenance<br />

costs for new detention facilities<br />

are exorbitant; spending on<br />

ICE’s 34,000 detention beds costs<br />

taxpayers over $2 billion each year.<br />

37<br />

Hiring additional border patrol<br />

agents is going to be a tall order as<br />

well. Currently, Border Patrol is required<br />

to have 21,370 agents but as of<br />

October 2016, they only had 19,828,<br />

nearly 1,500 below the required levels.<br />

Border Patrol has significant<br />

issues with its hiring process, low<br />

morale and high attrition rates,<br />

making it hard to increase staff<br />

quickly even it were to get additional<br />

funds from Congress. Not<br />

to mention, the fact that Border<br />

Patrol staffing doubled in the early<br />

2000s, which has led to it being<br />

Photo by John Taylor<br />

considered “America’s most outof-control<br />

law enforcement agency.”<br />

DHS is also directed to expand<br />

“expedited removal” to the full extent<br />

the law permits. This type of<br />

summary removal procedure was<br />

previously restricted to wide border<br />

regions (within 100 miles of<br />

any US border) and recent unlawful<br />

entrants (within 14 days). The<br />

order would expand application of<br />

expedited removal throughout the<br />

country, to individuals who unlawfully<br />

entered the U.S. and cannot<br />

prove to DHS that they have been<br />

continuously present for the previous<br />

two years.<br />

More on page 56


Resentment and hatred from the Middle East: Why they hate us –<br />

is by Michael Conti, Cal State, Fullerton, photos contributed by GSN.<br />

Resentment and hatred from the Middle East:<br />

Why they hate us<br />

By Michael Conti<br />

12/14/16 – The Middle East in recent<br />

times has been seen as a place of chaos<br />

and civil unrest. To us, they seem<br />

backwards and outright barbaric as we<br />

see beheadings in news feeds, headlines<br />

of suicide bombings, and terrorist<br />

attacks throughout the world.<br />

To the common citizen of the United<br />

States, this aggression is unwarranted<br />

and it seems as though they simply<br />

hate us for existing. While that would<br />

put us in a good light and provide<br />

the moral high ground, this is simply<br />

not the case. As we look through the<br />

past seven decades, we see that the<br />

United States government has had a<br />

paramount role in what we see today.<br />

Modernized countries in Europe look<br />

as the US and see a trusted and amiable<br />

ally. However, those of less developed<br />

countries in the Third World see<br />

us as a tyrannical force that has forced<br />

upon them the will of imperialism. To<br />

put it simply, the US has been a police<br />

force for the world and has done well<br />

through humanitarian efforts, but<br />

they have also committed egregious<br />

acts including meddling in the affairs<br />

of sovereign countries, overthrowing<br />

rulers, and undermining governments<br />

by backing rebel forces in the<br />

Middle East under the pretense of defending<br />

democracy and its values. It<br />

is because of these acts that they hate<br />

us and have caused us harm.<br />

In order to fully understand the<br />

mindset of the US government in the<br />

20th century, we must look at its beginnings<br />

when they achieved sovereignty<br />

as a result of the Revolutionary<br />

War. While this was a victory in itself,<br />

the fleeting US government was weak<br />

and needed to expand its borders in<br />

order to survive and thrive. It was<br />

thought to be their Manifest Destiny,<br />

a term used to describe and justify the<br />

taking of the rest of the modern day<br />

United States from Native Americans<br />

and Spain. While much of the territory<br />

came from the French in the form<br />

of the Louisiana Purchase, the rest of<br />

it was taken through federal acts and<br />

military force. To best explain this,<br />

Odd Arne Westad, a historian who<br />

specializes in the Third World and<br />

author of, The Global Cold War, gives<br />

a simple explanation for how the US<br />

operates when he states, “From its<br />

inception the United States was an<br />

interventionist power that based its<br />

foreign policy on territorial expansion.<br />

Its revolutionary message- free<br />

38<br />

men and free enterprise…” (Westad,<br />

9-10). As we see from this quote, it<br />

not only goes along with the theme<br />

of having to expand to survive, but it<br />

also shows us how this idea evolved<br />

to be a mantra for future events under<br />

the guise of promoting freedom with<br />

a global economy. It is this idea that<br />

later justified intruding in the affairs<br />

of the Middle East. While it seems irrelevant<br />

to study the past, this piece<br />

of information is important as we can<br />

now look into future events with an<br />

understanding of the US’s motives.<br />

Now that we know the US has been<br />

an imperialist power from its inception,<br />

we can take a relatively clear<br />

look at past events and understand<br />

why the US acted the way they did in<br />

the Middle East. An example to look<br />

at comes in the form of a book written<br />

by Douglass Little titled, American<br />

Orientalism, The United States<br />

And The Middle East Since 1945. He<br />

delves into the era of the 1940s-1950s<br />

when the United States emerged as<br />

an economic super power following<br />

World War Two while the rest of<br />

Europe was in ruin. Under the Truman<br />

administration, financial aid was<br />

given to the allied powers to rebuild.<br />

However the source of this aid is re-


vealed when Little states,<br />

“To fuel the European<br />

Recovery Program that<br />

Secretary of State George<br />

Marshall unveiled in June<br />

1947, the Truman administration<br />

intended to rely<br />

not on the oil fields of east<br />

Texas or Venezuela but,<br />

rather, on the 300,000<br />

barrels of Saudi crude…”<br />

(Little, 53). Indeed, rather<br />

than looking to their own<br />

secured resources in order<br />

to help the recovery effort, the US<br />

government decided to impose itself<br />

by taking oil from Saudi Arabia in addition<br />

to other Middle Eastern countries<br />

such as Kuwait and Lebanon.<br />

The book goes on to say that they did<br />

this in order to maintain their status<br />

as auto-manufacturing giants. It’s<br />

not surprising given the context that<br />

under the ideas of Manifest Destiny,<br />

the Saudis are uncivilized barbarians<br />

and that it is justifiable to take from<br />

them as a result. While it may seem<br />

relatively harmless to take resources,<br />

oil is the livelihood of Middle Eastern<br />

countries as it is their single most<br />

profitable export. To take this from<br />

them would be to threaten their way<br />

of sustainability. It’s no wonder as to<br />

why they would resent such a thing.<br />

However, the taking of their resources<br />

is relatively tame when we look<br />

further and see that the US, along<br />

the other Allied Powers, stirred civil<br />

unrest in the Middle East after establishing<br />

the Jewish nation of Israel by<br />

taking the holy city of Jerusalem from<br />

Palestine in the post-World War Two<br />

era.<br />

The establishment of Israel in 1948<br />

was backed by the Allied Powers and<br />

came as a grave insult to Palestine.<br />

The holy and ancestral lands of Jerusalem<br />

were taken from them and given<br />

to their sworn enemies, the Jews.<br />

This almost immediately caused a<br />

massive conflict known as the Israeli<br />

War in which Israel emerged victorious<br />

and had taken yet more land. The<br />

textbook Major Problems in American<br />

Foreign Relations, Volume II:<br />

Since 1914, a series of documents<br />

and essays on US foreign relations<br />

gives us a glimpse into the predicament<br />

that the Arab nations such as<br />

Palestine were in before Israel came<br />

to be when it states, “The Arabs, no<br />

less than the Jews, are victims of history.<br />

Four centuries of Turkish rule<br />

hurt them at least as badly as a decade<br />

39<br />

of Naziism hurt the Jews.<br />

Now, in their morning of<br />

independence, the Arabs<br />

have suffered defeats<br />

at the hands of a small,<br />

despised people” (Major<br />

Problems, 319). As this<br />

quote eloquently shows<br />

us, the Palestinians and<br />

other Arabs were also<br />

victims of oppression<br />

just as the Jews were. The<br />

seizing of their lands was<br />

kicking them back down<br />

as they were getting back up. With<br />

such blatant encroachment and arrogance,<br />

further resentment from the<br />

Middle East toward the US and the<br />

West undoubtedly developed. One of<br />

the final series of acts that solidified<br />

this hatred is seen after we look into<br />

the overthrowing of rulers in order<br />

to create pro-American regimes that<br />

would allow for further meddling.<br />

Not only has the United States government<br />

meddled by leeching resources<br />

and usurping ancestral lands,<br />

they made matters worse by overthrowing<br />

governments in order to insert<br />

pro-American regimes that would<br />

be willing to resist the Soviet Union<br />

during the Cold War. With the backing<br />

of the US government, countries<br />

such as Iran, Pakistan, Indonesia, and<br />

Egypt underwent political coups that<br />

overturned the ruling government.<br />

All of this went relatively unknown to<br />

neighboring nations until the Iranian<br />

Revolution that overthrew the pro-


American Shah and subsequent takeover<br />

of the embassy revealed it. This<br />

is conveyed by Mahmood Mamdani<br />

in his book, Good Muslim, Bad Muslim,<br />

America, the Cold War, and the<br />

Roots of Terror. He shows us that US<br />

actions were revealed when he states,<br />

“Secret American aid to opponents of<br />

the pro-Soviet regime in Kabul had<br />

begun before the Soviet army invaded<br />

Afghanistan. CIA and State Department<br />

documents seized during the<br />

embassy takeover in Tehran reveal<br />

the United States had begun quietly<br />

meeting Afghan-rebel representatives<br />

in Pakistan in April 1979, eight<br />

months before Soviet military intervention”<br />

(Mamdani, 123). Essentially,<br />

the Iranian Revolution that ended in<br />

the overthrowing of the pro-American<br />

Shah concretely revealed with<br />

evidence to the Arab nations, the fact<br />

that the United States was meddling<br />

in their affairs. Moreover, it shows us<br />

that they provoked the conflict that<br />

would occur in Afghanistan when<br />

they met with rebel groups such as<br />

the mujahedeen (a group that would<br />

later create splinter groups such as<br />

the Taliban and Al-Qaeda) in order to<br />

overthrow the regime, and that this is<br />

why the Soviets invaded. When added<br />

to the other aforementioned factors,<br />

it becomes more apparent as to why<br />

this hatred eventually boiled over<br />

into counter-aggression. However,<br />

U.S. intelligence experts were certain<br />

that retaliation would occur in some<br />

form of economic or political<br />

means. They couldn’t<br />

even fathom the idea of an<br />

outright attack on home soil<br />

because they thought they<br />

were dealing with other government<br />

leaders. What they<br />

didn’t realize was that the<br />

very people they armed to<br />

fight the Soviets were to be<br />

the people that would attack<br />

due to the fact that the mujahedeen,<br />

a radical nationalist<br />

group, saw both Soviet and<br />

American interventionism<br />

as incursions that would not<br />

go unpunished.<br />

The term for these unintended<br />

consequences is<br />

blowback as Chalmers John-<br />

40<br />

son explains in his book titled, The<br />

Costs and Consequences of American<br />

Empire. The book gives a detailed<br />

account of how the term came to be<br />

and how it is used to described consequences<br />

that are known or unknown<br />

based on the actions taken by the U.S.<br />

government. It goes further to say<br />

that this kind of information is largely<br />

kept from the American people and<br />

that this is the reason behind their ignorance<br />

of why these people hate us.<br />

The more significant part of this book<br />

however, is the direct correlation that<br />

it draws between the arming of the<br />

rebels in Afghanistan to the 9/11 attacks.<br />

Johnson brings up a classified<br />

CIA document post-action report<br />

and reveals its contents when he<br />

states, “The attacks of September 11<br />

descend in a direct line from events in<br />

1979, the year in which the CIA, with<br />

full presidential authority, began carrying<br />

out its largest ever clandestine<br />

operation—the secret arming of Afghan<br />

freedom fighters (mujahedeen)<br />

to wage a proxy war against the Soviet<br />

Union…” (Johnson, 12). It would<br />

seem that the arrogant and careless<br />

actions in Afghanistan came back to<br />

haunt the US. While there is no condoning<br />

the terrorist attacks of 9/11,<br />

these events were not unprovoked<br />

as Americans were led to believe by<br />

presidents such as George W. Bush.<br />

In conclusion, the Middle East is<br />

a place of chaos and hatred for the<br />

West. However, after looking into the<br />

not-so-well-known history of the US,


we have a better understanding as to<br />

why they are this way. It is due to the<br />

outright arrogance of an outdated<br />

ideology that these people were put<br />

through political and civil instability.<br />

After learning what we have today a<br />

clearer picture can be seen that is the<br />

US is a police force that has done well<br />

through humanitarian efforts such as<br />

the Peace Corps, but has been an oppressive<br />

force that imposed its will on<br />

a people that would not be willing to<br />

take it laying down.<br />

Michael Conti is an undergraduate<br />

student at California State University,<br />

Fullerton, and is working on degrees in<br />

history and political science. He plans<br />

to be a historical analyst, specializing<br />

in comparative politics.<br />

Works Cited<br />

Johnson, Chalmers. Blowback: The Costs and<br />

Consequences of American Empire. New York:<br />

Henry Holt, 2004. 12-13. Print.<br />

Little, Douglas. “American Orientalism.” American<br />

Orientalism : The United States and The<br />

Middle East Since 1945. The University of North<br />

Carolina Press, 2008. 53-54. Print.<br />

Mamdani, Mahmood. Good Muslim, Bad Muslim:<br />

America, the Cold War, and the Roots of<br />

Terror. New York: Pantheon, 2004. 123-124.<br />

Print.<br />

Merrill, Dennis, and Thomas G. Paterson. Major<br />

Problems in American Foreign Relations:<br />

Documents and Essays. Boston, 2010. 319-320.<br />

Print.<br />

Westad, Odd Arne. The Global Cold War: Third<br />

World Interventions and the Making of Our<br />

Times. Cambridge: Cambridge University Press,<br />

2007. 39-72. Print.<br />

Sign-up for Free<br />

GSN <strong>Digital</strong> <strong>Edition</strong>s<br />

and Email <strong>News</strong>letters<br />

Free subscription to your selection of GSN digital editions<br />

and daily/weekly email newsletters. Add new selections or<br />

opt-out of any selections at any time.<br />

GSN Monthly <strong>Digital</strong> <strong>Edition</strong><br />

GSN Airport, Seaport, Rail, Border <strong>Security</strong> Weekly<br />

GSN Daily Insider <strong>News</strong>letter (5 Days Weekly)<br />

GSN Cybersecurity <strong>News</strong>letter<br />

GSN Media Kit<br />

The <strong>News</strong> Leader in Physical, IT and Homeland <strong>Security</strong><br />

41<br />

CLICK HERE<br />

www.gsnmagazine.com


Cloudera and Docker, Inc. partner to vastly<br />

improve the security of data<br />

MCLEAN, VA — December 19,<br />

2016 — Cloudera, the global provider<br />

of the fastest, easiest, and most<br />

secure data management, analytics<br />

and machine learning platform built<br />

on the latest open source technologies,<br />

today announced that it has<br />

partnered with Docker, Inc. to provide<br />

Commercially Supported (CS)<br />

Docker Engines with a jointly developed<br />

solution to secure Docker<br />

container volumes. This integrated<br />

solution allows government agencies<br />

to share data via cryptographically<br />

secure containers as part of a<br />

partnership where Cloudera provides<br />

level one and level two technical<br />

support backed by Docker, Inc.<br />

Docker and Cloudera worked in<br />

close collaboration to meet the specific<br />

needs of government agencies.<br />

Because these agencies often have<br />

sensitive workloads where portability<br />

and security are necessary, the<br />

two companies worked together on<br />

an integration that would protect<br />

the code and data running in containerized<br />

workloads. Docker and<br />

Cloudera made sure that all data<br />

and code are protected both in transit,<br />

at rest, and at runtime.<br />

The integrated solution is based<br />

on Cloudera Navigator Encrypt<br />

running on Docker, Inc’s CS Engine.<br />

Cloudera Navigator Encrypt transparently<br />

encrypts and secures data<br />

at rest without requiring changes to<br />

applications and ensuring there is<br />

minimal performance lag in the encryption<br />

or decryption process. Advanced<br />

key management with Cloudera<br />

Navigator Key Trustee Server<br />

and process-based access controls<br />

in Navigator Encrypt enable organizations<br />

to meet compliance regulations<br />

and help protect organizations<br />

from unauthorized parties or<br />

malicious actors gaining access to<br />

encrypted data. Docker wraps software<br />

in a complete filesystem aka<br />

container that includes an application<br />

and its dependencies which allows<br />

applications to run anywhere.<br />

In addition, Docker Content Trust<br />

based on The Update Framework<br />

(TUF) provides the most secure<br />

content distribution model for verifying<br />

the creator of a specific dockerized<br />

application.<br />

Cloudera Navigator Encrypt<br />

Key Trustee Server and Client already<br />

possess Federal Information<br />

Processing Standard (FIPS) 140-2<br />

compliance, the U.S. government<br />

42<br />

computer security standard used<br />

to approve cryptographic modules.<br />

The partnership with Docker, Inc.<br />

enables the pursuit of an end-to-end<br />

FIPS-validated product to include<br />

the Docker platform itself, as well<br />

as the encryption and key management<br />

platform.<br />

Docker provides an abstraction<br />

layer for Cloudera’s Navigator Encrypt<br />

and the Key Trustee Server,<br />

allowing the exchange of dockerized<br />

applications so they can be run,<br />

but not seen, modified, or tampered<br />

with. It has complete administrative<br />

separation of duties where administrators,<br />

platform owners and users,<br />

whether trusted or untrusted,<br />

cannot impact each other. Multiple<br />

points of control, application<br />

fingerprinting, and user roles and<br />

network-based authentication are<br />

included.<br />

“Cloudera is committed to delivering<br />

the highest levels of data security<br />

for Docker workloads,” said<br />

Charles Zedlewski, senior vice president,<br />

Products at Cloudera. “We are<br />

pleased to have the opportunity to<br />

bring the industry leading security<br />

controls that are already a core part<br />

of Cloudera’s business to the realm


of dockerized applications<br />

and supporting<br />

the U.S. <strong>Government</strong><br />

with their most challenging<br />

problems.”<br />

“Docker is increasingly<br />

becoming a<br />

critical platform for<br />

Federal agencies as<br />

they modernize their<br />

applications, while<br />

making them even<br />

more secure through<br />

Docker’s isolation capabilities<br />

and content<br />

security framework,”<br />

said Nathan McCauley,<br />

Director of <strong>Security</strong> for Docker.<br />

“This partnership with Cloudera<br />

further elevates the security posture<br />

of Dockerized applications by protecting<br />

against data leaks through<br />

secure encrypted data volumes.”<br />

The joint solution is both operating<br />

system and cloud agnostic. This<br />

early access product is currently<br />

available to U.S. government agencies.<br />

About Cloudera<br />

Cloudera delivers the modern data<br />

management, analytics and machine<br />

learning platform built on<br />

the latest open source technologies.<br />

Many of the world’s leading organizations<br />

trust Cloudera to help solve<br />

their most challenging business<br />

problems with Cloudera Enterprise,<br />

the fastest, easiest and most secure<br />

data platform available for the modern<br />

world. Our customers efficiently<br />

capture, store, process and analyze<br />

vast amounts of data, empowering<br />

them to use advanced analytics and<br />

machine learning to drive business<br />

decisions quickly, flexibly and at<br />

lower cost than has been possible<br />

before. To ensure our customers are<br />

successful, we offer comprehensive<br />

support, training and professional<br />

services. Learn more at cloudera.<br />

com.<br />

Connect with Cloudera<br />

About Cloudera: cloudera.com/<br />

content/cloudera/en/about/company-profile.html<br />

Read our blogs: blog.cloudera.com/<br />

and vision.cloudera.com/<br />

43<br />

Follow us on Twitter: twitter.com/<br />

cloudera<br />

Visit us on Facebook: facebook.<br />

com/cloudera<br />

Join the Cloudera Community:<br />

community.cloudera.com<br />

Cloudera, Hue, and associated marks<br />

are trademarks or registered trademarks<br />

of Cloudera Inc. All other company and<br />

product names may be trademarks of<br />

their respective owners.


LGBT military community calls on General Mattis to<br />

make clear his support for ALL service members &<br />

their families during confirmation hearing<br />

WASHINGTON, <strong>January</strong> 11, <strong>2017</strong><br />

– Today, the nation’s leading organizations<br />

for lesbian, gay, bisexual,<br />

and transgender (LGBT) service<br />

members and their families – the<br />

American Military Partner Association<br />

(AMPA) and OutServe-SLDN<br />

– issued the following joint statement<br />

ahead of the U.S. Senate confirmation<br />

hearing of retired USMC<br />

General James Mattis, who<br />

was nominated by Presidentelect<br />

Donald Trump to serve<br />

as Secretary of Defense. The<br />

confirmation hearing for<br />

General Mattis is scheduled for<br />

Thursday morning.<br />

“Over the last eight years, the United<br />

States has made profound progress<br />

for LGBT service members and<br />

their families under the leadership of<br />

President Obama. No longer forced<br />

to hide something as fundamental as<br />

who we are, LGBT service members<br />

can serve openly and honestly. LGBT<br />

service members and their families<br />

take great pride in our service to the<br />

nation and are finally able to express<br />

that pride publicly. Our organizations<br />

stand ready to protect and build upon<br />

this vitally important progress.”<br />

“We respect General Mattis’ service<br />

and dedication to our country.<br />

Because questions have been raised<br />

regarding Mattis’ commitment to<br />

the diversity of our fighting force, we<br />

feel, as the leading advocates for our<br />

modern military families, a responsibility<br />

to call for clarity. During the<br />

confirmation process, we urge General<br />

Mattis to make clear his full and<br />

unequivocal support for all of our<br />

nation’s heroes and their families,<br />

including those who are<br />

LGBT. It is absolutely crucial<br />

that the next Secretary<br />

of Defense is committed to<br />

ensuring all service members<br />

and their families -- no matter their<br />

sexual orientation or gender identity<br />

-- have the support they need<br />

and deserve. These military families<br />

sacrifice each and every day for our<br />

nation, and it is imperative that they<br />

know the senior civilian leadership<br />

has their back.”<br />

The American Military Partner Association<br />

(AMPA) is the nation’s largest<br />

organization of LGBT military spouses,<br />

their families, and allies. With more<br />

than 50,000 members and supporters,<br />

AMPA is committed to education, advocacy,<br />

and support for our “modern<br />

44<br />

military families.” For more information,<br />

visit www.MilitaryPartners.org<br />

OutServe-SLDN (OS-SLDN) is the<br />

largest non-profit, legal services, advocacy<br />

and policy organization dedicated<br />

to bringing about full LGBT equality<br />

to America’s military and ending all<br />

forms of discrimination and harassment<br />

of military personnel on the basis<br />

of sexual orientation and gender identity.<br />

With more than fifty chapters and<br />

70,000 subscribers around the world,<br />

OS-SLDN supports a professional network<br />

of LGBT military personnel and<br />

strives to create an environment of<br />

respect in the military with regard to<br />

sexual orientation and gender identity.<br />

OS-SLDN provides free and direct legal<br />

assistance to service members and<br />

veterans affected by the repealed “Don’t<br />

Ask, Don’t Tell” law and the prior regulatory<br />

ban on open service, as well as<br />

those currently serving who may experience<br />

harassment or discrimination.<br />

For more information, visit www.outserve-sldn.org.


General Mattis says no to roll back open LGBT military<br />

service as Secretary of Defense<br />

WASHINGTON – Today, the nation’s<br />

leading organizations for lesbian, gay,<br />

bisexual, and transgender (LGBT)<br />

service members and their families –<br />

the American Military Partner Association<br />

(AMPA) and OutServe-SLDN<br />

– issued the following joint statement<br />

following comments made by President-elect<br />

Donald Trump’s nominee<br />

for Secretary of Defense, retired General<br />

James Mattis, during confirmation<br />

hearings this morning. General<br />

Mattis indicated he will not work to<br />

reverse the current policies that allow<br />

any qualified person to serve, including<br />

LGBT people.<br />

“We are heartened by General Mattis’<br />

stated commitment during his testimony<br />

not to reverse the profound<br />

progress we have made in ensuring<br />

LGBT service members and their<br />

families are able to serve our nation<br />

with pride,” said AMPA President<br />

Ashley Broadway-Mack and Out-<br />

Serve-SLDN Executive Director Matt<br />

Thorn. “Because questions had been<br />

raised about his commitment on this<br />

front, uncertainty in the future had<br />

given our military families great cause<br />

for concern. His comments today give<br />

us hope for a working relationship between<br />

our organizations and the new<br />

Defense Department leadership. If<br />

confirmed, we look forward to working<br />

with General Mattis in supporting<br />

our nation’s brave heroes and their<br />

families. We are committed to holding<br />

the incoming administration accountable<br />

and ensuring all who serve,<br />

regardless of their sexual orientation<br />

or gender identity, have the support<br />

and respect they need and deserve.”<br />

During his prepared testimony,<br />

General Mattis said, “We open the<br />

door to all patriots who are eligible<br />

and meet the standards, provide them<br />

with the training, equipment, and<br />

leadership that’s central to their success,<br />

and ensure all service members<br />

are treated with dignity and respect.”<br />

When asked by Senator Kirsten<br />

Gillibrand (D-NY) about his support<br />

for LGBT service members currently<br />

serving our nation, General Mattis<br />

said, “Senator, my belief is that we<br />

have to stay focused on a military<br />

that’s so lethal that on the battlefield<br />

it will be the enemies’ longest day<br />

45<br />

and their worst day when they run<br />

into that force. I believe that military<br />

service is a touchstone for patriots of<br />

whatever stripe. It’s simply the way<br />

that they demonstrate their commitment.<br />

And I believe right now that<br />

the policies that are in effect, unless<br />

a service chief brings something<br />

to me where there’s a problem that’s<br />

been proven, then I’m not going in<br />

with the idea that I’m going to review<br />

these and right away start rolling<br />

something back.” He went on to say,<br />

“Frankly, I’ve never cared much about<br />

two consenting adults and who they<br />

go to bed with.”<br />

Later, Senator Mazie Hirono (D-<br />

HI) asked him directly, “Is there<br />

something innate in being a woman<br />

or LGBT that would cause you to believe<br />

that they could not be part of a<br />

lethal force?” General Mattis replied<br />

with a simple, “no.”<br />

Yesterday in a joint statement,<br />

AMPA and OutServe-SLDN called<br />

on General Mattis to make clear his<br />

full and unequivocal support for all of<br />

our nation’s heroes and their families,<br />

including those who are LGBT.<br />

The American Military Partner Association<br />

(AMPA) is the nation’s largest<br />

organization of LGBT military spous-<br />

More on page 55


DHS Science and Technology Directive Explosive<br />

Division (EXD) releases new incident management<br />

planning tool for first responders<br />

A suspicious package is found in a<br />

public park. An unattended bag is<br />

found by a trash can at the metro<br />

or a street corner. A person with a<br />

weapon is reported at a school or<br />

mall or other public location. Unfortunately,<br />

these are not uncommon<br />

occurrences, and<br />

responder agencies –<br />

from small towns to big<br />

cities – must all know<br />

how to respond and<br />

work together. That requires<br />

training, technology,<br />

tools, and time. The<br />

Department of Homeland<br />

<strong>Security</strong> Science<br />

and Technology Directorate<br />

(S&T) Explosives<br />

Division (EXD) has a<br />

solution.<br />

EXD has funded research<br />

at the Oak Ridge National<br />

Laboratory to continue development<br />

of the Incident Management<br />

Preparedness and Coordination<br />

Toolkit (IMPACT), a geospatial<br />

tool designed to enhance situational<br />

awareness, communication, and<br />

collaboration during and for security<br />

events. This tool was originally<br />

funded by the DHS Office of<br />

Bombing Prevention to help bomb<br />

squads assess impacts from improvised<br />

explosive devices (IEDs).<br />

Since its original release, IMPACT<br />

has expanded its capabilities to provide<br />

tools to assist in active shooter<br />

planning, downwind hazards from<br />

A built-in wizard calculates active shooter line-of-sight overlays.<br />

the release of dangerous chemicals,<br />

large stadium evacuation and casualty<br />

simulations, security surveys,<br />

and monitoring large event social<br />

networks for emergency response<br />

support.<br />

“IMPACT is a free, all-hazards<br />

planning tool for first responders,<br />

emergency managers, and other<br />

security professionals. It combines<br />

46<br />

simulation, visualization, and mapping<br />

into an integrated user interface<br />

similar to a smart phone or tablet,”<br />

explained S&T Program Manager<br />

Elizabeth Obregon. “First responders<br />

can use it for planning, situation<br />

awareness, and response to natural<br />

and man-made disasters. It<br />

uses common data formats<br />

to easily exchange data with<br />

other map-based tools.”<br />

IMPACT is currently being<br />

used and evaluated by<br />

more than 400 agencies at<br />

the federal, state, and local<br />

levels including the Transportation<br />

<strong>Security</strong> Administration,<br />

the Federal<br />

Emergency Management<br />

Agency, the Centers for<br />

Disease Control and Prevention,<br />

and police departments<br />

at the state and local levels.<br />

The only Geographic Information<br />

System tool specifically tailored<br />

for counter-improvised explosive<br />

devices, homemade explosives, active<br />

shooter responses, and first<br />

responder use, IMPACT allows responders<br />

to conduct both live and<br />

table top exercises for simulated<br />

More on page 55


GTT solutions awarded supplier status for Crown<br />

Commercial Service TMT2 framework agreement<br />

ST. PAUL, MN – 15 December<br />

2016 – Global Traffic Technologies<br />

is pleased to announced that it has<br />

been awarded supplier status for its<br />

traffic preemption solutions on the<br />

UK <strong>Government</strong>’s Crown Commercial<br />

Service Traffic Management<br />

2 (TMT2) framework agreement.<br />

TMT2 provides public sector customers<br />

with access to industry leading,<br />

innovative traffic management<br />

solutions.<br />

The framework aims to deliver<br />

local, regional and national traffic<br />

management technologies through<br />

a qualified supply chain, ensuring<br />

reliability and resilience. TMT2 allows<br />

direct and standardised procurement<br />

of small components<br />

through to large, complex systems.<br />

It was developed to create<br />

a competitive and<br />

fast route to market for<br />

the provision of traffic<br />

management solutions,<br />

by streamlining procurement<br />

processes and increasing<br />

the number and<br />

selection of suppliers.<br />

Richard Eltze, GTT Vice President<br />

EMEA Markets, said being<br />

awarded the framework supplier<br />

Richard Eltze<br />

status was good news for all existing<br />

and potential public sector GTT<br />

customers. “The fact that the UK<br />

<strong>Government</strong>’s Crown<br />

Commercial Service has<br />

awarded us a place on<br />

the TMT2 agreement is<br />

evidence of how valuable<br />

the <strong>Government</strong><br />

considers GTT’s solutions<br />

to be,” he said. “This is very<br />

encouraging for GTT and shows<br />

clearly our customer focus and<br />

commitment to providing innovative<br />

and effective traffic preemption<br />

solutions. Such solutions often have<br />

many stakeholders, even if it is one<br />

agency that is responsible for the<br />

procurement of the technology, and<br />

for GTT it is vital that the needs of<br />

all stakeholders are taken<br />

into account.<br />

“The benefit of having<br />

an Emergency Vehicle<br />

Preemption system in<br />

place in case of a major<br />

emergency cannot be emphasised<br />

enough, especially<br />

when it comes to<br />

very congested areas in large cities<br />

and on motorways. Our experience<br />

with cities such as New York, San<br />

47<br />

Francisco, Las Vegas, and Calgary<br />

in Canada, as well as Doha in Qatar<br />

and several Eastern European<br />

implementations, gives<br />

testament and proof of<br />

concept to our EVP solutions.”<br />

Global Traffic Technologies’<br />

Opticom systems<br />

work with traffic<br />

signals to provide emergency and<br />

public transportation vehicles with<br />

priority green lights at intersections.<br />

These can help get an ambulance,<br />

fire engine or police car to the scene<br />

of an incident quickly and safely, or<br />

reduce delays and increase efficiencies<br />

in bus services.<br />

TMT2 is divided into 15 service<br />

options, also known as ‘lots’,<br />

of which GTT applied for and has<br />

been awarded supplier status in five.<br />

These are: Lot 1: Traffic Signal Junctions,<br />

Controlled Pedestrian Crossings<br />

and Ramp Metering; Lot 2:<br />

Traffic Monitoring and Traffic Enforcement<br />

Cameras; Lot 7: Urban<br />

Traffic Management Control and<br />

Common Database Systems; Lot 14:<br />

Intelligent Transport Systems (ITS)<br />

and Lot 15: Catalogue.<br />

More on page 56


Upgrades to allow for more frequent, reliable and faster<br />

rail service along the Northeast Corridor recommended<br />

Anthony Foxx<br />

WASHINGTON – After four years<br />

of working with the Northeast<br />

states, federal and state partner<br />

agencies and dozens and dozens of<br />

public meetings, the Federal Railroad<br />

Administration (FRA) today<br />

recommended a vision to build a<br />

better and stronger Northeast Corridor<br />

(NEC) over the next 30 years.<br />

“The Department of Transportation<br />

believes that investing in this<br />

vision for the Northeast Corridor<br />

must happen—because rail does<br />

more than take us places; it provides<br />

us with opportunities<br />

and connects us to the<br />

future,” said U.S. Transportation<br />

Secretary Anthony<br />

Foxx. “While building this<br />

recommendation would<br />

require significant investment,<br />

the cost of doing<br />

nothing is much greater.<br />

The communities and the economies<br />

of the Northeast cannot grow<br />

and flourish without significant,<br />

new investment.”<br />

In 2012, at the urging of Congress,<br />

all Northeast states and the Federal<br />

Railroad Administration began<br />

working together to develop a vision<br />

that would help guide and coordinate<br />

planning and investments. For<br />

more than four years, and including<br />

numerous agency and public meetings,<br />

the Northeast states and FRA<br />

have engaged stakeholders about<br />

their ideas, hopes, recommendations<br />

and concerns about the future<br />

of the NEC. The extensive outreach<br />

has included broad stakeholder engagement<br />

from individuals, elected<br />

leaders, civic organizations in small<br />

townships and business leaders.<br />

What quickly became clear, and<br />

was universally agreed, is that the<br />

corridor’s current capacity<br />

is vastly inadequate. Today’s<br />

NEC simply cannot<br />

meet the demands of today—or<br />

tomorrow.<br />

48<br />

The recommendation announced<br />

today by the FRA<br />

would increase reliability<br />

and provide more options by:<br />

• Adding new tracks to increase the<br />

Northeast Corridor to four tracks in<br />

most locations, which would allow<br />

for more frequent and faster service.<br />

Additional tracks would be added<br />

to areas with greater demand.<br />

• Providing intercity access to<br />

Philadelphia Airport so that passengers<br />

do not have to change trains<br />

at 30th Street.<br />

• Adding direct and frequent service<br />

to Hartford, Conn., and Springfield,<br />

Mass.<br />

• Increasing, and in some cases<br />

doubling, the number of regional<br />

trains and providing up to five times<br />

more intercity trains.<br />

The recommendation would improve<br />

travel times:<br />

• Travel from Boston to New York<br />

City would be 45 minutes faster (total<br />

time of 2 hours, 45 minutes).<br />

• Travel from New York City to<br />

Washington, D.C., would be 35<br />

minutes faster (total time of 2 hours,<br />

10 minutes).<br />

While the recommendation made<br />

today would grow the role of rail<br />

along the Northeast Corridor, it<br />

prioritizes bringing the current corridor<br />

back to good condition, or a<br />

state of good repair, first.<br />

With the corridor returned to<br />

good condition, the recommendation<br />

includes projects that will allow<br />

for even faster and more reliable<br />

service, along with more options for<br />

commuters and travelers. The recommendation<br />

is also projected to


USCIC updates how processing<br />

times are posted<br />

Continued from page 12<br />

create 47,000 jobs each year, for 30<br />

years.<br />

The recommendation FRA released<br />

today is just that – a recommendation<br />

for what FRA believes<br />

the Northeast Corridor could be<br />

in the future. In fact, it will now be<br />

up to states, cities and railroads to<br />

take next steps and decide whether<br />

to move forward with any specific<br />

projects. Each individual project,<br />

just like any other infrastructure<br />

project in this country, will require<br />

more review and more environmental<br />

studies, as well as significant<br />

funding.<br />

“In order to keep moving forward,<br />

we need a new vision for the Northeast<br />

Corridor – a corridor that can<br />

move an ever-increasing population<br />

safer, faster and more reliably<br />

than before,” said FRA Administrator<br />

Sarah E. Feinberg. “We need<br />

Click to view the video “NEC Future”<br />

a corridor that provides more options<br />

and more trains for commuters.<br />

One that allows for seamless<br />

travel between the nation’s capital<br />

and New York, and New York and<br />

Providence and Boston. A corridor<br />

that provides streamlined connections<br />

between a city’s airports and<br />

its city center. And a corridor that<br />

can efficiently and reliably serve a<br />

population that is growing quickly.”<br />

FRA believes that today’s recommendation<br />

is a strong one and<br />

should move forward. To do that,<br />

it will require the business community,<br />

railroads, states, Congress<br />

and the millions of people who use<br />

the NEC every day to make it clear<br />

that this is a necessary and worthy<br />

investment.<br />

For more information, visit www.<br />

necfuture.com<br />

49<br />

cember 29, 2016 based on data as of<br />

October 31, 2016.<br />

The Administrative Appeals Office<br />

(AAO) of USCIS also announced that<br />

it had modified how it presents its<br />

processing time information on appeals<br />

cases. In the past, AAO provided<br />

information on the average completion<br />

time for the month’s cases. Now,<br />

AAO will provide the total number<br />

of completions for the quarter and<br />

the percentage completed within its<br />

180 day goal, by form type and case<br />

type. The 180 day goal begins after<br />

the office that issued the unfavorable<br />

decision forwards the case to AAO,<br />

which is supposed to be done within<br />

45 days. However, this initial field review<br />

can take longer. This means the<br />

AAO’s figures don’t reflect the total<br />

time for completion of a case.<br />

Processing times are important<br />

pieces of information since employers,<br />

individuals, family members, and<br />

their attorneys need to know how<br />

long an application or petition will<br />

take to be adjudicated. Delays can<br />

have serious implications for many<br />

people. Now that USCIS has raised<br />

its fees significantly, hopefully more<br />

progress will be made towards resolving<br />

delays and making their processes<br />

more transparent.


The Chemistry behind the Flint Water Crisis:<br />

Corrosion of Pipes, Erosion of Trust<br />

By George Lane<br />

When Flint, Michigan changed its<br />

water supply in 2014, it initiated a<br />

cascade of chemical reactions inside<br />

decades-old water pipes that caused<br />

Lead to leach into its drinking water,<br />

triggering a major public health crisis.<br />

When Flint used its own river as<br />

a water supply, drinking water contained<br />

a staggering 13,200 parts per<br />

billion (ppb) Lead, almost 900 times<br />

higher than the 15 ppb regulatory<br />

limit set by the Environmental Protection<br />

Agency (EPA). Some water<br />

samples exceeded the EPA criteria<br />

for Lead concentration in hazardous<br />

waste, 5,000 ppb (1) .<br />

Although Lead pipes have been<br />

used for water distribution for over<br />

two thousand years beginning with<br />

the Romans, the use of Lead pipes carrying<br />

water in the United States on a<br />

major scale began in the late<br />

1800s, particularly in larger<br />

urban cities. By 1900, more<br />

than 70% of cities with populations<br />

greater than 30,000<br />

used Lead-lined pipes for<br />

drinking water (2) .<br />

The use of Lead pipes to<br />

carry drinking water was<br />

recognized as a cause of<br />

Lead poisoning by the late<br />

1800s in the United States.<br />

50<br />

George Lane<br />

In 1890 the Massachusetts<br />

State Board of Health advised<br />

the state’s cities and<br />

towns to avoid using Lead<br />

pipes to transport drinking<br />

water. By the 1920s, many<br />

cities and towns were prohibiting<br />

or restricting their<br />

use. To combat this trend,<br />

the Lead industry carried out an effective<br />

campaign to promote the use<br />

of Lead pipes, affecting public health<br />

and delaying the replacement of Lead<br />

water pipes (3) .<br />

Normally water managers add<br />

chemicals to water, such as orthophosphates,<br />

to prevent corrosion.<br />

Orthophosphates bond with Lead in<br />

pipes, creating a protective coating<br />

between Lead and water. When that<br />

shield is intact, corrosive chemicals<br />

like Dissolved Oxygen (DO) can’t<br />

interact with the Lead; however, orthophosphates<br />

have to be<br />

added continually or the<br />

barrier breaks down. If the<br />

barrier does break down,<br />

DO combines with Lead<br />

atoms, oxidizing them.<br />

Oxygen takes electrons<br />

from Lead, grabs its Hydrogen<br />

protons, turning<br />

into water, and allows Lead to leach<br />

into drinking water. Once oxidized,<br />

Lead dissolves into the water instead<br />

of sticking to the pipe.<br />

Flint’s water treatment plant did not<br />

add orthophosphates, allowing the<br />

pipes to corrode, and Lead quickly<br />

contaminated the drinking water.<br />

Additionally, Flint River water had<br />

high levels of chlorides, which accelerate<br />

corrosion. There were two other<br />

sources of chloride: Ferric chloride<br />

used in Chlorine disinfection of water<br />

and road salt applied during tough<br />

Michigan winters. Switching<br />

from Detroit’s Lake<br />

Huron to Flint River water<br />

created a perfect storm for<br />

Lead leaching into Flint<br />

drinking water.<br />

A complex brew of acids,<br />

salts, Chlorine and many<br />

other chemicals were involved<br />

in oxidizing Flint’s<br />

metal pipes and releasing<br />

Lead. High levels of Lead in


Flint drinking water weren’t reported<br />

to the public for 18 months; however,<br />

the corrosion happened quickly,<br />

especially in the warmer summer<br />

months. Without effective treatment<br />

to control corrosion, Flint’s water<br />

leached high levels of Lead from the<br />

city’s pipes into city drinking water.<br />

Following the switch, E. coli bacteria<br />

was also found in the water.<br />

To combat E. coli, extra Chlorine<br />

was added as a disinfectant to remove<br />

it. Ferric chloride was also added as<br />

a coagulant to remove organic matter<br />

from the water, initiating a domino<br />

effect of chemical causes and effects.<br />

Flint’s water quality problems were<br />

also caused by corrosion in both the<br />

Lead and Iron pipes that distribute<br />

water. When city residents began using<br />

the Flint River as its water source,<br />

the water’s ability to corrode those<br />

pipes wasn’t adequately controlled.<br />

This led to high Lead levels, rustcolored<br />

tap water, and the growth of<br />

pathogenic microbes.<br />

When Flint changed its water supply,<br />

the city didn’t adequately control<br />

corrosion. Flint isn’t the only city susceptible<br />

to these problems. The pipes<br />

in its old distribution system had seen<br />

the same water for decades, similar to<br />

many other cities. Switching water<br />

supplies changed the chemistry of the<br />

water flowing through those pipes.<br />

When a switch like this happens,<br />

the chemistry in the water system<br />

moves toward a new equilibrium. In<br />

Flint the change was catastrophic.<br />

Flint was getting its water from the<br />

Detroit Water & Sewerage Department,<br />

which would draw water from<br />

Lake Huron and then treat it before<br />

sending it to Flint.<br />

To lower the city’s water costs, in<br />

2013 Flint officials decided to take<br />

water from another source which was<br />

building its own pipeline from the<br />

lake. Shortly after that, Detroit told<br />

Flint it would terminate their original<br />

long-term water agreement within a<br />

year and offered to negotiate a new,<br />

short-term agreement. Flint declined<br />

the offer. While waiting for the new<br />

51<br />

Pipeline under construction will supply Flint, Michigan with water from Lake Huron.<br />

pipeline to be finished, Flint began<br />

taking water from the Flint River and<br />

treating it at the city plant.<br />

Problems with the city’s tap water<br />

started the summer after the switch<br />

in 2014. First, residents noticed foultasting,<br />

reddish water coming out of<br />

their taps. In August, the city issued<br />

alerts about E-coli contamination and<br />

told people to boil the water before<br />

using it. A General Motors plant in<br />

Flint stopped using the water because<br />

it was corroding steel parts.<br />

In early 2015 Lead reached Flint’s<br />

University of Michigan campus. Researchers<br />

sampled water from 252<br />

Flint homes and reported the results<br />

(www.flintwaterstudy.org). Hurley<br />

Children’s Hospital in Flint released<br />

data showing that since the water<br />

change, the number of Flint children<br />

with elevated levels of lead in their<br />

blood had increased from 2.4% to<br />

4.9% (4) .<br />

Lead is neurotoxic, causing behavioral<br />

problems and decreased intelligence.<br />

The Blood Brain Barrier limits<br />

the passage of ions, but because it has<br />

not formed in children, they can absorb<br />

from 40% to 50% of water-soluble<br />

Lead compared with 3% to 10%<br />

for adults (5) .<br />

So why did the switch to Flint’s river<br />

water cause this catastrophe? As water<br />

travels through the miles of pipes in a<br />

city’s distribution system, molecules<br />

of contaminants in the water react<br />

with the pipes themselves, acting as a<br />

geochemical reactor. There are miles<br />

and miles of pipes, some Iron, some


Copper, some Lead, that got corroded.<br />

Corrosion occurs when oxidants,<br />

such as DO or Chlorine, react with<br />

elemental metals in the pipes.<br />

Cities no longer install lead pipes.<br />

But older cities such as Flint still rely<br />

on them, usually as water mains in<br />

the street to a home’s water meter. Because<br />

of Lead pipes, some states regulate<br />

the corrosivity of water to deposit<br />

a protective coating on the pipes.<br />

A 1990 report from the American<br />

Water Works Association estimated<br />

there are over 3 million Lead-lined<br />

pipes transporting drinking water in<br />

the Northeastern U.S. alone (6) . According<br />

to EPA, nationwide over 10<br />

million American homes and buildings<br />

receive water from Lead-lined<br />

pipes (7) .<br />

52<br />

So why is Lead<br />

used in water<br />

pipes? The answer<br />

can be found literally<br />

thousands of<br />

years ago in the<br />

first “plumbing”<br />

systems, named for<br />

the word “Lead” in<br />

Latin, “plumbum”.<br />

Tap water in ancient<br />

Rome had 100<br />

times more Lead<br />

than local spring<br />

waters. Lead piping<br />

was used because<br />

of its unique ability<br />

to resist pinhole<br />

leaks while still<br />

malleable enough<br />

to be formed into shapes that deliver<br />

water. Lead was used in many other<br />

common products, such as Tetra Ethyl<br />

Lead in gasoline and Lead-based<br />

paint, until scientific advancements<br />

in the 20th century demonstrated<br />

its toxicity. With passage of the Safe<br />

Drinking Water Act Amendments of<br />

1986, installation of Lead water pipes<br />

was finally prohibited nationwide (8) .<br />

Today utilities treat their water to<br />

maintain a mineral crust on the inside<br />

surfaces of their pipes. This socalled<br />

“passivation layer” protects the<br />

pipes’ metal from oxidants in the water.<br />

The coatings consist of insoluble<br />

oxidized metal compounds produced<br />

as the pipe slowly corrodes.<br />

If the water chemistry isn’t optimized,<br />

the passivation layer may dissolve<br />

and allow mineral particles to<br />

flake off of the pipe’s crust. This exposes<br />

bare metal, allowing the Iron,<br />

Lead, or Copper to oxidize and leach<br />

into the water. Flint water chemistry<br />

was not optimized to control corrosion.<br />

Most importantly, the treated<br />

Flint River water lacked one chemical<br />

that the treated Detroit water had:<br />

Phosphate. Cities such as Detroit add<br />

orthophosphates to their water as<br />

part of their corrosion control plans<br />

because of the formation of Lead<br />

phosphates, which are largely insoluble<br />

and add to the passivation layer.<br />

The entire Flint water crisis could<br />

have been avoided if the city had added<br />

orthophosphates, commercially<br />

available chemicals, used in Detroit.<br />

After just five weeks in the Flint water,<br />

the pipes leached 16 times as much<br />

Lead as those in the Detroit water,<br />

demonstrating just how corrosive the<br />

treated Flint water was. But orthophosphates<br />

aren’t the only corrosion<br />

solution. Some water utilities treat<br />

water so it has a high pH, a high alkalinity.<br />

These conditions decrease the<br />

solubility of Lead carbonates, which<br />

also contribute to the pipe’s protective<br />

mineral layer.<br />

The pH drop over time indicates<br />

that plant operators in Flint didn’t<br />

have a target pH as part of a corrosion<br />

plan. Water utilities usually find a pH<br />

that’s optimal for preventing corrosion<br />

in their system. For example, in<br />

Boston, another city with old Lead<br />

pipes, average water pH held steady<br />

around 9.6 in 2015, according to re-


ports from the Massachusetts Water<br />

Resources Authority.<br />

Problems with Flint’s pipes started<br />

quickly. The rust color and bad taste<br />

of the water coming out of residents’<br />

taps in the summer of 2014 was a sign<br />

that the passivation layer on was dissolving<br />

into the water. Iron corrosion<br />

also encourages the growth of pathogens<br />

in the distribution system. As the<br />

mineral layer in iron pipes falls off,<br />

it exposes bare iron that can reduce<br />

free Chlorine added to the water as<br />

a pathogen-killing disinfectant. One<br />

home with Lead levels almost 900<br />

times higher than the EPA limit had<br />

no detectable Chlorine levels over 18<br />

days of monitoring.<br />

Although Flint has switched back<br />

to the Detroit water, it may take years<br />

for pipes to regain their passivation<br />

layers for corrosion to slow to normal<br />

levels, and for Lead concentrations to<br />

drop back into an acceptable range.<br />

However Joel Beauvais, Deputy Assistant<br />

Administrator of EPA’s Office<br />

of Water, emphasizes “EPA’s position<br />

is there is no safe level of lead exposure.”<br />

While the drinking water crisis<br />

has focused on Flint, almost 2,000 additional<br />

water systems in all 50 states<br />

have shown excessive levels of Lead<br />

contamination over the past four<br />

years.<br />

The lesson from Flint is to continually<br />

monitor water chemistry, especially<br />

when switching water supplies.<br />

Water utility officials were already<br />

collecting all the data they needed,<br />

pH, alkalinity, chloride levels, to determine<br />

if the water was too corrosive.<br />

The message is to consider the connections<br />

between the stability of the<br />

water infrastructure and the chemistry<br />

of the water flowing through that<br />

infrastructure. That will inevitably<br />

control the water quality at the tap.<br />

By not adding a corrosion inhibitor,<br />

Flint expected to save about $140<br />

per day. But the human costs of the<br />

errors made in Flint will reverberate<br />

through the community forever and<br />

their magnitude will dwarf the original<br />

planned savings. According to<br />

Flint Mayor Karen Weaver, replacement<br />

of Flint’s Lead water lines is now<br />

estimated to cost up to $1.5 billion.<br />

On December 20, 2016, Michigan’s<br />

Attorney General announced felony<br />

charges against two former Flint<br />

emergency managers and two other<br />

former city officials linked to the city’s<br />

disastrous decision to switch water<br />

sources, which resulted in widespread<br />

and dangerous Lead contamination<br />

of Flint drinking water. These latest<br />

charges bring the total number of<br />

people charged to thirteen.<br />

On December 30, the Louisiana<br />

Department of Health and Human<br />

Resources (DHHR) reported unsafe<br />

levels of Lead in the drinking water in<br />

over 20% of the homes and businesses<br />

of St. Joseph, a rural city in North<br />

Louisiana. Dr. Jimmy Guidry, Louisiana<br />

DHHR Director, warned citizens<br />

saying “The message to the folks who<br />

live there is not to drink the water” (9) .<br />

53<br />

References<br />

1. Miguel A. Del Toral, “High Lead Levels in<br />

Flint, Michigan - Interim Report”, USEPA Regulations<br />

Manager, Ground Water and Drinking<br />

Water; Branch; www.documentcloud.org/<br />

documents/2696671-2015-06-24-Miguel-Del-<br />

Toral-Memo.html<br />

2. W. Troesken, “The Great Lead Water Pipe<br />

Disaster”, Cambridge, MA: MIT Press; 2006<br />

3. Richard Rabin, “The Lead Industry and<br />

Lead Water Pipes”, Am J Public Health, 2008<br />

September; 98(9): 1584–1592; www.ncbi.nlm.<br />

nih.gov/pmc/articles/PMC2509614/<br />

4. Siddhartha Roy, “Pediatric Lead Exposure<br />

Presentation from Hurley Medical Center doctors<br />

concerning Flint Michigan”, September 24, 2015;<br />

http://flintwaterstudy.org/2015/09/pediatriclead-exposure-presentation-from-hurley-medical-center-doctors-concerning-flint-mi/<br />

5. Mona Hanna-Attisha, MD, “Elevated Blood<br />

Lead Levels in Children Associated with the Flint<br />

Drinking Water Crisis: A Spatial Analysis of<br />

Risk and Public Health Response”, Am J Public<br />

Health, February 2016; 106(2): 283–290; http://<br />

ajph.aphapublications.org/doi/abs/10.2105/<br />

AJPH.2015.303003<br />

6. “Selecting Lead Pipe Rehabilitation and Replacement<br />

Technologies”, American Water Works<br />

Association, July 2001, pgs. 74-87; www.Waternet.0054574.pdf<br />

7. “Flint Water Crisis Shines Light on Lead<br />

Pipes Across U.S.”, Wall Street Journal, <strong>January</strong><br />

28, 2016; www.wsj.com/articles/flint-watercrisis-shines-light-on-lead-pipes-crisscrossingthe-u-s-1453977180<br />

8. “Prohibition on Use of Lead Pipes to Carry<br />

Drinking Water”, Safe Drinking Water Act 1986:<br />

Section 1417<br />

9. Mark Ballard, “Lead found in Saint Joseph<br />

drinking water in 20-plus percent of homes,<br />

businesses”, Baton Rouge Advocate, December<br />

31, 2016; www.theadvocate.com/baton_rouge/<br />

news/politics/article_40b6dfea-ce2d-11e6-<br />

a1f1-a73640428e2e.html


HID Global predicts top trends<br />

for <strong>2017</strong><br />

Continued from page 21<br />

today’s talent pool is driving the need<br />

for more open, flexible workspaces.<br />

Consumers also will begin seeing<br />

trusted identities used in many everyday<br />

scenarios, such as guaranteeing<br />

authorized use of corporate and<br />

heavy machinery fleets, as well as creating<br />

new ways to safeguard students<br />

and validate drivers.<br />

These trends will drive new user experiences<br />

that are tailored to vertical<br />

market requirements. Following are<br />

three particularly compelling examples:<br />

Banking: A digital identity transformation<br />

will drive consistency across<br />

multiple service channels to improve<br />

the user experience, from faster instant<br />

issuance that is revolutionizing<br />

the way customers receive new or<br />

replacement debit and credit cards,<br />

to “out-of-band” mobile push capabilities<br />

that increase trust and reduce<br />

fraud for consumers, and deliver a<br />

much easier path to compliance for<br />

financial institutions. <strong>Digital</strong> IDs will<br />

also push the industry to increase<br />

trust levels by better associating a<br />

user’s true identity (biometrics) with<br />

their digital identities.<br />

<strong>Government</strong>: Trusted identities will<br />

change the way citizens interact with<br />

government agencies and systems.<br />

Passports, national IDs, driver licenses<br />

and other credentials will co-exist<br />

with new disruptive technologies to<br />

change the way IDs are issued by government<br />

agencies and used by citizens.<br />

Citizen IDs are poised to move<br />

to mobile phones this year, where<br />

state and national governments will<br />

begin offering mobile driver’s licenses<br />

and other mobile identity IDs as an<br />

option alongside the physical document.<br />

Meanwhile, the combination of<br />

mobile with innovative physical and<br />

logical features will provide more options<br />

for government agencies to stay<br />

ahead of the counterfeiters by advancing<br />

the security, personalization,<br />

management and issuance of physical<br />

documents.<br />

Healthcare: In the increasingly connected<br />

healthcare environment, institutions<br />

will seek to implement better<br />

systems to improve the patient experience<br />

and enhance efficiencies, while<br />

safeguarding and managing access<br />

to equipment, facilities, patient data<br />

and electronic prescriptions of controlled<br />

substances (EPCS) across the<br />

healthcare continuum. From hospital<br />

to home, healthcare organizations<br />

will seek to employ a combination of<br />

strong authentication, and new IoT<br />

applications to address these challenges.<br />

HID Global anticipates the shift in<br />

the use of identity technology will<br />

drive industry trends in <strong>2017</strong>, along<br />

with new solutions and capabilities<br />

that enhance the user experience for<br />

years to come.<br />

54<br />

Connect with HID Global<br />

Visit our Industry Blog, and follow us<br />

on Facebook and Twitter.<br />

About HID Global<br />

HID Global is the trusted source for<br />

innovative products, services, solutions,<br />

and know-how related to the<br />

creation, management, and use of<br />

secure identities for millions of endusers<br />

around the world. The company’s<br />

served markets include physical<br />

and logical access control, including<br />

strong authentication and credential<br />

management; card printing and personalization;<br />

visitor management systems;<br />

highly secure government and<br />

citizen ID; and identification RFID<br />

technologies used in animal ID and<br />

industry and logistics applications.<br />

The company’s primary brands include<br />

ActivID®, EasyLobby®, FAR-<br />

GO®, IdenTrust®, LaserCard®, Lumidigm®,<br />

Quantum Secure, and HID®.<br />

Headquartered in Austin, Texas, HID<br />

Global has over 2,700 employees<br />

worldwide and operates international<br />

offices that support more than 100<br />

countries. HID Global® is an ASSA<br />

ABLOY Group brand. For more information,<br />

visit http://www.hidglobal.<br />

com.<br />

® HID and the HID logo are trademarks or registered trademarks<br />

of HID Global or its licensors in the U.S. and/or other<br />

countries. All other trademarks, service marks, and product<br />

or service names are trademarks or registered trademarks of<br />

their respective owners.


General Mattis says no to roll back<br />

open LGBT Military Service<br />

Continued from page 45<br />

es, their families, and allies. With more<br />

than 50,000 members and supporters,<br />

AMPA is committed to education, advocacy,<br />

and support for our “modern<br />

military families.” For more information,<br />

visit www.MilitaryPartners.org<br />

OutServe-SLDN (OS-SLDN) is the<br />

largest non-profit, legal services, advocacy<br />

and policy organization dedicated<br />

to bringing about full LGBT equality<br />

to America’s military and ending all<br />

forms of discrimination and harassment<br />

of military personnel on the basis<br />

of sexual orientation and gender identity.<br />

With more than fifty chapters and<br />

70,000 subscribers around the world,<br />

OS-SLDN supports a professional network<br />

of LGBT military personnel and<br />

strives to create an environment of<br />

respect in the military with regard to<br />

sexual orientation and gender identity.<br />

OS-SLDN provides free and direct<br />

legal assistance to service members<br />

and veterans affected by the repealed<br />

“Don’t Ask, Don’t Tell” law and the<br />

prior regulatory ban on open service,<br />

as well as those currently serving who<br />

may experience harassment or discrimination.<br />

For more information,<br />

visit www.outserve-sldn.org.<br />

DHS Science and Technology<br />

Directive Explosive Division<br />

releases new incident management<br />

planning tool<br />

Continued from page 46<br />

active shooter and IED attacks, Obregon<br />

explained.<br />

Repeatedly tested in the field by<br />

numerous law enforcement and<br />

first responder organizations, IM-<br />

PACT has been successfully used to<br />

mitigate real world incidents. It was<br />

briefed to the United States Capitol<br />

Police immediately after a March<br />

2016 incident in which live shots<br />

were fired at the Capitol Visitors<br />

Center. Since that briefing, USCP<br />

has become a growing end user of<br />

the tool and plans to use it for a<br />

number of upcoming gatherings in<br />

<strong>2017</strong>. In addition, table top exercises<br />

generated by IMPACT were<br />

credited with mitigating an active<br />

shooter event at a school in Louisville,<br />

Kentucky, in September 2014.<br />

The tool is Section 508 compliant,<br />

enabling it to be used across the federal<br />

government and by its mission<br />

partners.<br />

S&T was interested in developing<br />

this tool as it gives first responders<br />

a free, easy to use capability to<br />

conduct better organized and more<br />

efficient exercises, provide for facility<br />

protection, and plan for major<br />

public and security events, Obregon<br />

said. IMPACT can be considered a<br />

success as many organizations that<br />

55<br />

have been briefed on the tool, including<br />

the Secret Service, Capitol<br />

Police, Washington Metropolitan<br />

Area Transit Authority, the Transportation<br />

<strong>Security</strong> Administration,<br />

and others, have expressed interest<br />

in adopting the tool and are currently<br />

in the process of doing so.<br />

In addition, IMPACT has provided<br />

hundreds of agencies at the federal,<br />

state and local level with an exercise,<br />

protection and planning capability<br />

that they did not have before but urgently<br />

needed.<br />

Responder agencies interested<br />

in accessing and using the tool can<br />

download it at http://geo.ornl.gov/<br />

impact and start using it immediately.<br />

FREE SUBSCRIPTION<br />

SIGN-UP<br />

Monthly <strong>Digital</strong> <strong>Edition</strong><br />

Airport/Seaport <strong>News</strong>letter<br />

Daily Insider <strong>News</strong>letter<br />

Cybersecurity <strong>News</strong>letter<br />

CLICK HERE


GTT solutions awarded supplier<br />

status for Crown Commercial Service<br />

TMT2 framework agreement<br />

Continued from page 47<br />

More information on TMT2 can be<br />

found at http://ccs-agreements.cabinetoffice.gov.uk/contracts/rm1089.<br />

About Global Traffic<br />

Technologies, LLC<br />

GTT, formed in 2007 from 3M’s<br />

pioneering Intelligent Transportation<br />

Systems business, is the manufacturer<br />

of Opticom priority control<br />

systems and Canoga traffic-sensing<br />

systems. These systems have provided<br />

safe and reliable traffic solutions<br />

to communities for over 45 years.<br />

GTT proactively delivers advanced<br />

transportation<br />

solutions to help<br />

emergency, transit<br />

and traffic personnel<br />

increase<br />

safety, minimize<br />

traffic congestion and reduce<br />

greenhouse gas emissions, while<br />

maximizing resource efficiency and<br />

performance. Headquartered in St.<br />

Paul, Minnesota, GTT is the market<br />

leader in traffic management<br />

systems, having an installed base of<br />

over 70,000 intersections and 70,000<br />

vehicles in over 3,100 municipalities<br />

worldwide, including 41 of the 50<br />

largest U.S. cities.<br />

To find out more about GTT, visit<br />

their website (www.gtt.com).<br />

About the<br />

Crown Commercial Service<br />

The Crown Commercial Service<br />

(CCS) has brought together <strong>Government</strong>’s<br />

central commercial<br />

capability into a single organisation,<br />

amalgamating <strong>Government</strong><br />

Procurement Service with other<br />

commercial teams from the Cabinet<br />

Office and central government<br />

departments. CCS is an executive<br />

agency of the Cabinet Office and<br />

operates as a trading fund under<br />

the <strong>Government</strong> Trading Funds Act<br />

1973. Their remit is to work with<br />

both departments and organisations<br />

across the whole of the public<br />

sector to ensure maximum value is<br />

extracted from every commercial<br />

relationship and improve the quality<br />

of service delivery. The CCS goal is<br />

to become the “go-to” place for expert<br />

commercial and procurement<br />

services. With both service delivery<br />

and advisory capability, services include<br />

contract<br />

management<br />

and supplier<br />

performance<br />

management<br />

to ensure<br />

that the <strong>Government</strong> acts as a true,<br />

single customer; freeing up individual<br />

organisations to focus their<br />

procurement expertise on what is<br />

unique to them.<br />

56<br />

Will Congress fund President<br />

Trump’s executive order on border<br />

enforcement?<br />

Continued from page 37<br />

This change would eviscerate due<br />

process for huge numbers of undocumented<br />

individuals already in<br />

the U.S., even those with deep roots<br />

in our families and communities.<br />

Expedited removal allows DHS enforcement<br />

officers to deport individuals<br />

without ever seeing an immigration<br />

judge – often in as little<br />

as 24 hours – with no guarantee of<br />

legal counsel and little chance to obtain<br />

an attorney while detained.<br />

The order also directs the Attorney<br />

General to prioritize the prosecution<br />

of unlawful border crossers<br />

in group hearings with little-to-no<br />

due process. These prosecutions, often<br />

referred to as Operation Streamline,<br />

were intended to deter illegal<br />

entry and reentry. Instead, they have<br />

clogged the federal courts by taking<br />

up 52 percent of the federal docket<br />

and wasted precious government<br />

resources with little evidence that<br />

the program is achieving its goals.<br />

This executive order is an attempt<br />

by Trump to keep his campaign<br />

promise of building a wall along the<br />

Southern border and getting tough<br />

on unauthorized immigration.<br />

However, these proclamations will<br />

soon run into the reality of needing<br />

funding from Congress.


GSN: What are your general thoughts on the<br />

2015 awards?<br />

8<br />

GSN: You spent many years on Capitol Hill and<br />

also at the Department of Homeland <strong>Security</strong>.<br />

As we head into 2016, what do you envision as<br />

homeland security spending priorities? Awards Category:<br />

––––––––––––––––––––––––––––––––––––––––<br />

GSN 2015<br />

GSN:<br />

DIGITAL<br />

What area/issue<br />

YEARBOOK<br />

pending<br />

OF AIRPORT/SEAPORT/BORDER<br />

trends do you<br />

SECURITY AWARDS RECIPIENTS<br />

see as priorities for the homeland security<br />

community?<br />

Name of Nominated Product, Service,<br />

or Program:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Reason this entry deserves to win:<br />

––––––––––––––––––––––––––––––––––––––––<br />

54<br />

9<br />

GSN: What future areas of homeland security<br />

interest would you advise companies to explore?<br />

Continued on next page<br />

Awards Category:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Name of Nominated Product, Service,<br />

or Program: Link to Web Page of Nominated Organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

www.networkharbor.com<br />

Reason this Link entry to additional deserves to information win: on product,<br />

––––––––––––––––––––––––––––––––––––––––<br />

service or program, with brief description:<br />

––––––––––––––––––––––––––––––––––––––––<br />

https://youtu.be/-ucfAR5psac<br />

Name and organization of nominating<br />

contact for this entry, including name, title,<br />

organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

55<br />

GSN 2015 DIGITAL YEARBOOK OF AIRPORT/SEAPORT/BORDER SECURITY AWARDS RECIPIENTS<br />

Nominating contact’s office telephone and cell<br />

phone:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Nominating contact’s email address:<br />

––––––––––––––––––––––––––––––––––––––––<br />

john@convyassociates.com<br />

30<br />

31<br />

http://www.rapiscansystems.com<br />

Link to additional information on product,<br />

service or program, with brief description:<br />

––––––––––––––––––––––––––––––––––––––––<br />

http://www.rapiscansystems.com/en/products/<br />

radiation_detection<br />

Name and organization of nominating<br />

contact for this entry, including name, title,<br />

Nominating contact’s office telephone and cell<br />

jedgerly@speakerboxpr.com<br />

The Winners and Finalists have<br />

been selected. Now our national<br />

and international readers want<br />

to know what the strategies,<br />

technologies and innovations<br />

were that gave you the<br />

advantage. Let them know with<br />

a 2-page spread in the<br />

2016 <strong>Digital</strong> Yearbook of<br />

Award Winners.<br />

The GSN<br />

2016 <strong>Digital</strong> Yearbook<br />

OF<br />

Homeland <strong>Security</strong><br />

Awards<br />

CLICK HERE TO VIEW<br />

LAST YEAR’S YEARBOOK<br />

The GSN<br />

2015 <strong>Digital</strong> Yearbook<br />

OF<br />

Airport/Seaport/<br />

Border <strong>Security</strong> Awards<br />

AND<br />

Homeland <strong>Security</strong> Awards<br />

National Programs and Protection Directorate.<br />

ed world. New legislation pending in Congress formalizes<br />

the increased DHS role in public/private partnering.<br />

GSN 2015 DIGITAL YEARBOOK OF HOMELAND SECURITY<br />

and<br />

Global spending also parallels the DHS spending raise.<br />

AIRPORT, SEAPORT, BORDER SECURITY AWARDS PROGRAMS<br />

A new market research report, “Global Homeland <strong>Security</strong><br />

and Emergency Management Market, 2013–2018”, Information <strong>Security</strong> Management Act (FISMA) and de-<br />

New legislation also would update the 12-year-old Federal<br />

published by MarketsandMarkets is expected to reach lineate DHS’s role in guarding government networks and<br />

$544.02 Billion by 2018. Unfortunately, those numbers websites.<br />

could go even higher if there are more incidents similar to A priority for 2016 will be to accelerate rollout of<br />

GSN INTERVIEW<br />

what happened in Paris, Mali, and San Bernardino, CA. Einstein III Accelerated (E3A), the latest phase of DHS’s<br />

Best Detection Solutions<br />

automated network-security correcting systems. DHS has<br />

established memoranda of agreement with 55 federal<br />

Chuck Brooks, Distinguished Judge<br />

agencies to implement Einstein to provide horizon scanning<br />

and automated monitoring, detection, and remedia-<br />

GSN 2015 Homeland <strong>Security</strong> and<br />

Best Integrated <strong>Security</strong> Programs<br />

Rapiscan Systems<br />

CB: Counterterrorism and the counter CBRNE (chemical<br />

Airport, Seaport, Border <strong>Security</strong> Awards programs<br />

tion of government networks. DHS is also planning for<br />

2015 Winner<br />

, biological, Radiological, Nuclear, and Explosive) mission<br />

new cyber technologies that provide advanced defense of<br />

Network will always Harbor, be fundamental Inc. to homeland planning and<br />

network framework layers, including authentication, better<br />

encryption, biometrics, and data analytical tools”.<br />

spending. Those are the most catastrophic threats. In<br />

2015 Winner<br />

addition to CBRNE DHS has assumed more and more of a<br />

leadership role in cybersecurity derived from both Presidential<br />

mandates and congressional legislation.<br />

Best Nuclear/Radiation Detection<br />

CB: For me it was a real pleasure judging this year’s<br />

Cybersecurity is indeed a top priority as government agencies<br />

and mega corporations experience more data breach-<br />

IPM (integrated process management) provides an<br />

annual Homeland <strong>Security</strong> and Airport, Seaport, Border<br />

CB:<br />

CB: Macro spending will increase across the board on<br />

The key word really is “future” and it is already additional element of extensibility and power for policy<br />

<strong>Security</strong> Awards programs. The submissions this year<br />

Best Physical <strong>Security</strong> Information Management<br />

homeland security products and services In accordance<br />

es with each passing year. I recently published an article<br />

around the corner with the Internet of Things (IoT). management and workflow processing that is virtually<br />

Rapiscan Systems<br />

were frankly quite amazing. The capabilities and technical<br />

System - PSIM<br />

to the new threats we are especially facing from ISIS and<br />

in The Federal Times on Key homeland security priorities<br />

Recently both the FBI and DHS issued warnings about unlimited IoT in its capabilities. The end result is an intuitive,<br />

comprehensive automated security management<br />

merits of the IT and Physical security products/solutions<br />

from other terrorist actors, and global instabilities. This<br />

to watch in 2016 (http://www.federaltimes.com/story/<br />

and pending threats. The reality is that we have become<br />

platform that operates identically, anywhere within the<br />

of all the vendors made it especially difficult to judge. In<br />

was reflected in the recent passage of the 2016 omnibus<br />

government/dhs/blog/2015/12/15/key-homeland-securitypriorities-watch-2016/77368604/)<br />

My thoughts in regards<br />

immersed in a new digital era comprised of more organization. than 50 There’s no need to retrain staff when Rapiscan they Systems, a leading provider of security screening<br />

solutions, is well known for the high quality, reliment<br />

or integrated with Rapiscan’s X-ray and metal-<br />

detection products can be used in a standalone deploy-<br />

my opinion they were all winners because they are leading<br />

technological contributors to the current and future<br />

LightHouse<br />

spending Bill recently passed by Congress by Congress.<br />

billion interfaced devices. Anything connected is move vulnerable.<br />

Expect significant investments in smart cities, nents smart are connected to the platform, which in turn ability saves and affordability of its solutions. With products based threat detection solutions. The newest addition to<br />

from one facility to another, or when new compo-<br />

The bill provides DHS with $40.96 billion, which is an<br />

to cybersecurity verbatim:<br />

security of our nation. It is good to know that very talented<br />

people in industry and government are continually<br />

Network Harbor’s LightHouse platform delivers dent management, too.<br />

increase of $1.33 billion over the fiscal year 2015 enacted<br />

“The 2015 DHS budget directed more than $1.25 billion<br />

to cybersecurity and that trend will continue in 2016.<br />

homes, smart businesses, and smart governments customers in the significant amounts of time and money. sold into four market segments, including Baggage and Rapiscan’s radiation detection product line is the Rapiscan<br />

MP100 Backpack Radiation Detection system. A high<br />

Parcel Inspection, Cargo and Vehicle Inspection, Hold<br />

levels. It included increased funding levels for Customs<br />

next Its decade. click-and-go For the ability security to adopt community this conveys<br />

Baggage Screening and People Screening, the company performance, easy to use radiation monitor combining<br />

designing and upgrading security solutions to fill gaps as<br />

unified security management for enterprise organizations,<br />

extending the capabilities of physical security its own capabilities means that there’s no “dumbing<br />

the full functionality of any security system’s API within<br />

and Border Protection, Immigration and Customs Enforcement<br />

and for DHS Cybersecurity programs in the incident DHS management DHS’s (PSIM) inception to include as we geographical have become a more down” interconnect-<br />

of features or for functions threat detection, – just a seamless, surveillance, con-predictive data analytics,<br />

tion situations Convy its customers Associatescould face. An important a lightweight, compact commercial backpack, making<br />

Cybersecurity and IT have moved to the forefront since<br />

opportunities in developing and integrating new sensors<br />

has a solution John for Convy, the most Principal demanding threat detec-<br />

gamma and optional neutron detection is housed in<br />

adversaries are becoming more hostile and sophisticated.<br />

part of Rapiscan’s product portfolio is its radiation the system perfect for covert inspection situations. The<br />

information system (GIS) and non-physical products in sistent user interface, anywhere across the enterprise.<br />

detection product line, which addresses the need for MP100 is ideal for supporting security operations and<br />

a truly comprehensive safety and security management It installs easily, and is quickly mastered by administrators<br />

and end users alike. LightHouse supports almost<br />

global governments and organizations to monitor and performing radiation surveys in a variety of markets –<br />

environment. LightHouse is unique in that it integrates<br />

locate radioactive threat materials that can be used in including critical infrastructure, customs and border<br />

every security system, physical or non-physical, into a all major security product manufacturers including<br />

office: 202-421-3777<br />

atomic weapons and dirty bombs. The product line is control, event security, defense and law enforcement<br />

single, seamless oversight system. Its intuitive interface access control, video, audio, mass notification, IDS,<br />

comprised of software and hardware based solutions applications. All of the features required for radiation<br />

drives faster recognition of potential threats, as well RTLS and more. LightHouse has been designed to add<br />

for inspecting vehicles, packages and people. Radiation detection are integrated in the MP100 so it can be used<br />

as gives first responders the information they need to additional system integration’s to the platform without<br />

make better informed, more appropriate decisions. disruption or encumbrance of any existing integration<br />

LightHouse is designed to support the IT side of inci- in an expedient, stable and secure process. LightHouse<br />

Address of nominating contact’s organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

8380 Greensboro Drive Suite 514<br />

McLean, VA 22102<br />

as a standalone device and connected wirelessly to a Link to Web Page of Nominated Organization:<br />

Rapiscan oversight system for remote data collection<br />

––––––––––––––––––––––––––––––––––––––––<br />

and display. Using the MP100 is as easy as slipping<br />

the backpack on and walking around. Weighing just<br />

18 pounds, the MP100 is lightweight and easy to use.<br />

Additionally, the onboard battery enables 16 hours of<br />

continuous operation in a wide range of environments.<br />

The Rapiscan RadviewerTM Android app displays the<br />

operator’s current position and direction toward the<br />

radiation source. The design of the MP100’s radiation<br />

detectors provides increased directional sensitivity of<br />

the radiation detection. A radiation alarm is signaled audibly<br />

via a headphone jack on the backpack or visually ––––––––––––––––––––––––––––––––––––––––<br />

organization:<br />

via RadviewerTM. In this way, the MP100 enables users Jennifer Edgerly, Senior Account Director,<br />

to effectively detect and locate radioactive threats. The SpeakerBox Communications<br />

MP100 is manufactured by Rapiscan’s Radiation Detection<br />

Products division, which has supplied thousands of<br />

radiation monitors that are deployed at border crossings,<br />

seaports, airports and facilities around the world. office: 703-287-7809<br />

phone:<br />

––––––––––––––––––––––––––––––––––––––––<br />

The MP100 uses Rapiscan’s proven radiation detection cell: 202-486-0518<br />

technology adapted for a backpack deployment. The<br />

radiation detection performance meets the requirements<br />

of ANSI N42.53. The MP100 offers customers ––––––––––––––––––––––––––––––––––––––––<br />

Nominating contact’s email address:<br />

efficient, easy to use and reliable man-portable radiation<br />

detection with high performance at an affordable cost of<br />

acquisition and operation.<br />

Address of nominating contact’s organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

7900 Westpark Drive, Suite T410, McLean, VA<br />

Contact Adrian Courtenay at 917-696-5782 to get more information<br />

and reserve your 2-page spread.


The <strong>News</strong> Leader in Physical, IT and Homeland <strong>Security</strong><br />

CEO/Editorial Director<br />

Adrian Courtenay<br />

917-696-5782<br />

acourtenay@gsnmagazine.com<br />

Editor<br />

Steve Bittenbender<br />

502-552-1450<br />

sbittenbender@gsnmagazine.com<br />

Senior Writer<br />

Karen Ferrick-Roman<br />

412-671-1456<br />

karenferrickroman@gmail.com<br />

Columnist<br />

Shawn Campbell<br />

Campbell on Crypto<br />

shawn.campbell@safenetat.com<br />

Columnist<br />

George Lane<br />

Hazmat Science & Public Policy<br />

georgelane@hotmail.com<br />

Contributing Author<br />

Lloyd McCoy Jr<br />

Immix Group<br />

Contributing Author<br />

Walter Ewing<br />

Contributing Author<br />

Wendy Feliz<br />

Contributing Author<br />

Joshua Breisblatt<br />

Contributing Author<br />

J. Michael Barrett<br />

Contributing Author<br />

Christopher Millar<br />

Gatekeeper <strong>Security</strong><br />

Art Director<br />

Gerry O’Hara, OHDesign3<br />

gerry@ohd3.com<br />

203-249-0626<br />

Production Manager<br />

Brenden Hitt<br />

Brenden.hitt@gsnmagazine.com<br />

Direct: 203-216-7798<br />

COMING ATTRACTIONS<br />

February<br />

Late <strong>News</strong><br />

Tech Focus<br />

Airport/Aviation <strong>Security</strong><br />

Market Sector<br />

Critical Infrastructure, Protection<br />

March<br />

Late <strong>News</strong><br />

Tech Focus<br />

Perimeter Protection,<br />

Intrusion Detection<br />

Market Sector<br />

Border <strong>Security</strong> & Immigration<br />

April<br />

Late <strong>News</strong><br />

Tech Focus<br />

Law Enforcement,<br />

Public Safety<br />

Market Sector<br />

Cybersecurity Threats,<br />

Solutions<br />

58

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!