Government Security News February 2017 Digital Edition
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
<strong>Government</strong> <strong>Security</strong> <strong>News</strong><br />
FEBRUARY <strong>2017</strong> DIGITAL EDITION<br />
Photo: Peg Hunter<br />
Outpouring of American and foreign citizens mobilize against President’s<br />
“Executive Order” to ban refugees from U.S. for four weeks and Muslim<br />
nationals for 90 days – Page 8<br />
Also in this issue:<br />
Law suits challenge “Muslim Ban” executive order, citing Constitutional guarantee of equal protection – Page 10<br />
More than 75% of crypto ransomware in 2016 came from Russian-speaking Cybercriminal underground – Page 6
NEWS<br />
GSN <strong>February</strong> <strong>2017</strong> <strong>Digital</strong><br />
4<br />
6<br />
10<br />
11<br />
17<br />
18<br />
26<br />
26<br />
27<br />
28<br />
36<br />
Cyberbit’s ERD platform to help Infor detect malware<br />
that bypasses anti-virus<br />
More than 75% of crypto ransomware in 2016 came<br />
from Russian-speaking cybercriminal underground<br />
Law suits challenge “Muslim Ban” executive order,<br />
citing Constitutional guarantee of equal protection<br />
Chuck Brooks named winner of “Cybersecurity<br />
Marketer of the Year” Excellence Awards<br />
Amico <strong>Security</strong> launches next generation ANC<br />
composite fence system, receives M5.0 security rating<br />
Written testimony of DHS Secretary John F. Kelly for a<br />
House Committee on Homeland <strong>Security</strong> titled “End the Crisis:<br />
America’s Borders and Path to <strong>Security</strong>”<br />
Salient CRBT announces definitive agreement to acquire<br />
Information Innovators, Inc<br />
Federal experts agree that “Internet of Things”<br />
demands simple baked-in security<br />
Farpoint warns access control channel to suggest<br />
customers add anti-hacking measures, as Federal<br />
Trade Commission is now insisting on Cybersecurity protection<br />
Varex Imaging completes separation from<br />
Varian Medical Systems, lists on Nasdaq Stock Market<br />
Expansion of DMARC is critical to reducing<br />
spread of malicious emails, says Global <strong>Security</strong><br />
Alliance, calling on Cyber companies to improve protections<br />
2
<strong>Edition</strong> Table of Contents<br />
37<br />
38<br />
39<br />
Milestone release, enabling record-breaking performance for Xproduct users,<br />
delivers highest performing VMS ever, complete with new Cybersecurity focus<br />
Facial biometric boarding solution by Vision Box being tried at Schipol Airport<br />
Statement from Secretary Kelly on recent ICE enforcement actions<br />
FEATURES<br />
SPECIAL REPORT ON AIRPORT/AVIATION SECURITY<br />
13<br />
First 777-300ER in United’s fleet christened the “New Spirit<br />
of United”<br />
14<br />
15<br />
16<br />
Passenger advocacy group lists concerns before<br />
airline CEO’s meet with President Trump<br />
Southwest and NetJets Pilots urge President Trump to reverse NAI Foreign<br />
Carrier Permit<br />
British air traffic control provider tags Rohde and Schwarz<br />
for second voice system<br />
HOT TOPIC: OPINIONS ON IMMIGRATION<br />
30<br />
New Memos reveal harsh and unforgiving immigration road map, taking<br />
national backwords in guaranteeing due process and providing safe havens<br />
31<br />
32<br />
33<br />
Supreme Court hears case on shooting of 15-year old Sergio Hernandez by<br />
U.S. Border Patrol agent<br />
Abandoning priorities will make immigration enforcement<br />
work much harder<br />
“Expedited Removal” on noncitizens called for<br />
in President’s January 25 executive order<br />
3
Cyberbit’s EDR platform to help Infor detect<br />
malware that bypasses antivirus<br />
AUSTIN, TX – <strong>February</strong> 9th, <strong>2017</strong><br />
– Cyberbit, whose cybersecurity<br />
solutions protect the world’s most<br />
sensitive systems, today announced<br />
it was awarded a contract from Infor<br />
for the supply of Cyberbit’s security<br />
platform for its own internal usage.<br />
Infor selected Cyberbit for its significant<br />
experience, technical acumen,<br />
and outstanding customer<br />
references, and is pleased to have<br />
Cyberbit complement its detection<br />
capability in this increasingly complex<br />
environment of Cyber threats.<br />
Cyberbit’s EDR platform uses a<br />
signature-less approach, proven to<br />
detect unknown threats that bypass<br />
antivirus and next-generation endpoint<br />
security platforms, while minimizing<br />
false positives. The EDR<br />
platform continuously records millions<br />
of low-level endpoint events<br />
across the network and rapidly correlates<br />
traces of malicious activity<br />
to verify an attack within seconds.<br />
Once an attack is detected, the entire<br />
storyline is displayed, enabling<br />
the platform to respond or provide<br />
the analyst with the necessary information<br />
to investigate the attack.<br />
Cyberbit’s unique approach serves<br />
as an “analyst in a box” that expedites<br />
the process of identifying and<br />
hunting down threats. Analysts often<br />
work with fragments of the story<br />
based upon their knowledge and<br />
experience to seek traces of attacks<br />
buried in the data.<br />
Cyberbit’s EDR platform<br />
assists analysts<br />
by automating much<br />
of the hunting process<br />
leveraging behavioral<br />
analytics and machine<br />
learning, which often<br />
saves weeks of investigative<br />
effort.<br />
“We are excited to be working with<br />
Infor to complement their forwardthinking<br />
IT security strategy,” said<br />
Stephen Thomas, VP Sales at Cyberbit.<br />
“Innovative IT organizations<br />
such as Infor’s are adapting this proactive<br />
detection-based strategy and<br />
I look forward to supporting their<br />
organization.”<br />
4<br />
Additional resources<br />
• Request a demo of the Cyberbit<br />
Endpoint Detection and Response<br />
solution.<br />
• Learn about proactive hunting and<br />
endpoint control in this webinar.<br />
• Subscribe to Cyberbit’s blog.<br />
• Follow Cyberbit on Facebook,<br />
LinkedIn and Twitter<br />
(@CYBERBITHQ).<br />
About Cyberbit<br />
Created to protect the most highrisk<br />
organizations in the world, Cyberbit<br />
secures enterprises and critical<br />
infrastructure against advanced<br />
cyberthreats. The company’s battlehardened<br />
cybersecurity solutions<br />
detect, analyze and respond to the<br />
most advanced, complex and targeted<br />
threats. Cyberbit employs a<br />
formidable and diverse team from<br />
both the public and private sector,<br />
including Ph.D.s, hackers, former<br />
CISOs and SOC managers, as well as<br />
seasoned veterans of the intelligence<br />
and military communities. With offices<br />
worldwide, Cyberbit is a subsidiary<br />
of Elbit Systems Ltd. (NAS-<br />
DAQ: ESLT) and has more than 500<br />
personnel in the United States, Europe<br />
and Asia. To learn more about<br />
More on page 40
GSN’s <strong>2017</strong> Airport/Seaport/Border <strong>Security</strong> Awards<br />
Opening for Entries on March 15 with Many New Categories<br />
All Winners in this program are entitled to<br />
a Full-Page Advertisement (8.5” x 9.0”) in<br />
your choice of GSN’s <strong>Digital</strong> Magazine or<br />
Leaderboard in any edition of the Airport,<br />
Seaport, Rail, Border <strong>Security</strong> Weekly<br />
<strong>News</strong>letter.<br />
NEW IN <strong>2017</strong>:<br />
CLICK HERE TO<br />
SUBMIT A NOMINATION<br />
All Finalists are entitled to a Half-Page<br />
Advertisement (8.5” x 4.5”) in your choice<br />
of GSN’s <strong>Digital</strong> Magazine or Leaderboard<br />
in any edition of the Airport, Seaport, Rail,<br />
Border <strong>Security</strong> Weekly <strong>News</strong>letter.<br />
Adrian Courtenay<br />
Managing Partner, CEO<br />
<strong>Government</strong> <strong>Security</strong> <strong>News</strong><br />
917-696-5782<br />
acourtenay@gsnmagazine.com<br />
Steve Bittenbender<br />
Managing Editor<br />
<strong>Government</strong> <strong>Security</strong> <strong>News</strong><br />
502-552-1450<br />
sbittenbender@gsnmagazine.com<br />
Gerry O’Hara<br />
Designer<br />
OHDesign3<br />
203-249-0626<br />
gerry@ohd3.com
More than 75% of crypto ransomware in 2016<br />
came from the Russian-speaking cybercriminal<br />
underground<br />
SAN FRANCISCO, CA and Woburn,<br />
MA – <strong>February</strong> 13, <strong>2017</strong> –<br />
Out of 62 new crypto ransomware<br />
families discovered by Kaspersky<br />
Lab researchers in 2016, at least 47<br />
were developed by Russian-speaking<br />
cybercriminals. This findings<br />
and others are included in an overview<br />
of the Russian-speaking ransomware<br />
underground, conducted<br />
by Kaspersky Lab researchers. The<br />
review also highlights that small<br />
groups with limited capabilities are<br />
transforming into large criminal enterprises<br />
that have the resources and<br />
intent to attack private and corporate<br />
targets worldwide.<br />
Crypto ransomware – a type of<br />
malware which encrypts its victim’s<br />
files and demands a ransom in exchange<br />
for decryption – is one of<br />
the most dangerous types of malware<br />
today. According to Kaspersky<br />
Lab telemetry, in 2016 more than<br />
1,445,000 users (including businesses)<br />
around the globe were attacked<br />
by this type of malware. In the<br />
overview, one of the major conclusions<br />
is that the increase in crypto<br />
ransomware attacks observed in recent<br />
years is the result of a very flexible<br />
and user-friendly underground<br />
ecosystem, allowing criminals to<br />
launch crypto ransomware attack<br />
campaigns with almost any level<br />
of computer skills and financial resources.<br />
Kaspersky Lab researchers identified<br />
three levels of criminal involvement<br />
in the ransomware business:<br />
• The creation and update of<br />
new ransomware families<br />
• The development and support<br />
of affiliate programs<br />
distributing ransomware<br />
• The participation in affiliate<br />
programs as a partner<br />
The first type of involvement requires<br />
a participant to have advanced<br />
code-writing skills. The<br />
cybercriminals who create new ransomware<br />
strains are the most privileged<br />
members of the ransomware<br />
underground world, as they are the<br />
ones who create the key element of<br />
the whole ecosystem.<br />
On the second level of the hierarchy,<br />
there are the developers of<br />
the affiliate programs. These are the<br />
criminal communities which – with<br />
6<br />
the help of different additional tools,<br />
like exploit kits and malicious spam<br />
– deliver the ransomware issued by<br />
the malware creators.<br />
The partners of affiliate programs<br />
are on the lowest level of the whole<br />
system. Utilizing different techniques,<br />
they help the owners of affiliate<br />
programs to distribute the<br />
malware in exchange for a share of<br />
the ransom received by owners of<br />
the program. Only intent, a readiness<br />
to conduct illegal actions, and<br />
a couple of bitcoins are required for<br />
participants of affiliate programs to<br />
enter this business.<br />
According to Kaspersky Lab estimations,<br />
the overall daily revenue<br />
of an affiliate program may reach<br />
tens or even hundreds of thousand<br />
dollars, of which around 60 percent<br />
stays in the criminals’ pockets as net<br />
profit.<br />
Moreover, during their research<br />
into the underground ecosystem<br />
and multiple incident response operations,<br />
Kaspersky Lab researchers<br />
were able to identify several large<br />
groups of Russian-speaking criminals<br />
specializing in crypto ransomware<br />
development and distribution.
These groups may unite tens of different<br />
partners, each with their own<br />
affiliate program, and the list of<br />
their targets includes not only ordinary<br />
internet users, but also small<br />
and medium-sized companies and<br />
even enterprises. Initially targeting<br />
Russian and CIS users and entities,<br />
these groups are now shifting their<br />
attention to companies located in<br />
other parts of the world.<br />
“It is hard to say why so many<br />
ransomware families have a Russian-speaking<br />
origin. What is more<br />
important is that we’re now observing<br />
their development from small<br />
groups with limited capabilities<br />
to large criminal enterprises that<br />
have resources and the intent to<br />
attack more than just Russian targets,”<br />
said Anton Ivanov, security<br />
researcher at Kaspersky Lab, and<br />
the author of the overview. “We’ve<br />
seen something similar with financial<br />
malware groups, like Lurk. They<br />
also started with massive attacks<br />
on online banking users, and then<br />
evolved into sophisticated<br />
groups capable<br />
of robbing large<br />
organizations,<br />
like banks. Sun<br />
Tzu said: ‘If you<br />
know the enemy<br />
and know<br />
yourself, you<br />
need not fear<br />
the result of a<br />
hundred battles.’<br />
That’s why<br />
we’ve created<br />
this overview:<br />
ransomware<br />
gangs are turning<br />
into very powerful enemies,<br />
and for the public and the security<br />
community, it is really important we<br />
learn as much about them as possible.”<br />
Read more about how Russianspeaking<br />
underground ransomware<br />
ecosystem works on Securelist.com<br />
About Kaspersky Lab<br />
7<br />
Kaspersky Lab is a global cybersecurity<br />
company founded in 1997.<br />
Kaspersky Lab’s deep threat intelligence<br />
and security expertise is<br />
constantly transforming into security<br />
solutions and services to protect<br />
businesses, critical infrastructure,<br />
governments and consumers<br />
around the globe. The company’s<br />
comprehensive security portfolio<br />
includes leading endpoint protection<br />
and a number of specialized security<br />
solutions and services to fight<br />
sophisticated and evolving digital<br />
threats. Over 400 million users are<br />
protected by Kaspersky Lab technologies<br />
and we help 270,000 corporate<br />
clients protect what matters<br />
most to them. Learn more at www.<br />
kaspersky.com.<br />
FREE SUBSCRIPTION<br />
SIGN-UP<br />
Monthly <strong>Digital</strong> <strong>Edition</strong><br />
Airport/Seaport <strong>News</strong>letter<br />
Daily Insider <strong>News</strong>letter<br />
Cybersecurity <strong>News</strong>letter<br />
CLICK HERE
Outpouring of American and foreign citizens mobilize<br />
against President’s “Executive Orders” to ban refugees<br />
from U.S. for four weeks and Muslim nationals for 90 days<br />
By Michele Waslin<br />
In his first week as president, President<br />
Donald Trump unleashed a<br />
series of executive orders, thereby<br />
launching his first strikes against<br />
current and future immigrants and<br />
refugees. In response, thousands<br />
of Americans mobilized over the<br />
weekend, demonstrating against the<br />
President’s actions. Strong opposition<br />
continues to come from foreign<br />
leaders, Congressional leaders,<br />
government bureaucrats, business<br />
leaders, university presidents, and<br />
others.<br />
The far-reaching and highly problematic<br />
executive orders on “Border<br />
<strong>Security</strong> and Immigration Enforcement<br />
Improvement” and “Enhancing<br />
Public Safety in the Interior of<br />
the United States” seek to radically<br />
change immigration enforcement<br />
along the U.S.-Mexico border and<br />
throughout the entire country.<br />
Friday’s “Protecting the National<br />
from Terrorist Attacks by Foreign<br />
Nationals” is intended to halt all<br />
refugee admissions for at least four<br />
months and bans nationals from<br />
seven Muslim-majority countries<br />
from entering the U.S. for at least 90<br />
days. Additional executive orders<br />
are expected in the coming days and<br />
weeks.<br />
Given the immediate impact of<br />
the ban, Friday’s executive order<br />
resulted in a great deal of confusion,<br />
frustration, and anger across<br />
the country and around the world.<br />
When the executive order was made<br />
public, large protests erupted at the<br />
White House and at airports around<br />
the country, including large numbers<br />
of attorneys offering free legal<br />
assistance and Members of Congress<br />
leveraging pressure on immigration<br />
officials.<br />
On Friday night and Saturday, the<br />
first travelers from the seven banned<br />
countries arrived at U.S. airports<br />
and were detained by Customs and<br />
Border Patrol (CBP) agents. CBP<br />
had not been issued clear guidance<br />
as to how the executive order was<br />
to be implemented, and as a result,<br />
treatment of foreign nationals differed<br />
by airport.<br />
Among those detained and scheduled<br />
to be returned to their home<br />
8<br />
countries were returning green card<br />
holders who already live and work<br />
in the U.S., as well as first-time green<br />
card holders whose vetting was recently<br />
completed, and temporary<br />
visitors to the U.S. One detainee was<br />
Hameed Khalid Darweesh, who<br />
had worked with the U.S. military<br />
as an interpreter in Iraq. As confusion<br />
and frustration rose and family<br />
members worried about their<br />
detained loved ones, immigration<br />
lawyers went to the airports to represent<br />
those in detention.<br />
The ACLU, National Immigrant<br />
Law Center, and other legal organizations<br />
immediately challenged<br />
the executive order on behalf of<br />
Darweesh and others, and Saturday<br />
night a federal judge in the Eastern<br />
District of New York issued a nationwide<br />
stay of removal, preventing<br />
the Trump administration from<br />
deporting refugees and others who<br />
had lawful authority to enter the<br />
U.S. Similar lawsuits were filed in<br />
other cities: in Boston, the federal<br />
court prohibited the detention and<br />
removal of all those subject to the<br />
executive order but the order was
limited to Logan Airport; in Virginia,<br />
the federal court ordered the<br />
government to give attorneys access<br />
to all green card holders being detained<br />
and prohibit their removal,<br />
and; in Seattle, the court prevented<br />
the removal of plaintiffs subject to<br />
the seven-Muslim-majority country<br />
ban. However, there were reports in<br />
multiple cities that CBP was slow<br />
to comply with the nationwide<br />
and local court<br />
orders, even after the<br />
federal judge’s order was<br />
issued.<br />
Not until Sunday did<br />
the White House clarify<br />
that the order did<br />
not extend to returning<br />
green card holders.<br />
Despite other rumors<br />
about changes to the application<br />
of the policy,<br />
no further official guidance<br />
has been publicly<br />
released.<br />
Democratic and Republican<br />
Members of Congress have also denounced<br />
the Muslim ban. Senate<br />
Minority Leader Chuck Schumer<br />
called the executive order “meanspirited<br />
and un-American,” and said<br />
he would “claw, scrap, and fight with<br />
every fiber of my being until these<br />
orders are overturned.” Republican<br />
Senators McCain and Graham issued<br />
a joint statement saying “We<br />
fear this executive order will become<br />
a self-inflicted wound in the<br />
fight against terrorism.” Some also<br />
criticized the administration for<br />
failing to follow the regular protocols<br />
and consulting with the right<br />
people before issuing an executive<br />
order. “You have an extreme vetting<br />
proposal that didn’t get the vetting<br />
it should have had,” said Ohio Sen.<br />
Rob Portman.<br />
Opposition has appeared from<br />
within the government bureaucracy<br />
as well. Foreign Service officers<br />
from the department of State drafted<br />
a dissent memo in opposition to<br />
the refugee ban, claiming the policy<br />
“runs counter to core American values<br />
of nondiscrimination, fair play,<br />
and extending a warm welcome to<br />
foreign visitors and immigrants.<br />
Alternative solutions are available<br />
to address the risk of terror attacks<br />
9<br />
which are both more effective and<br />
in line with Department of State and<br />
American values.”<br />
Business leaders also condemned<br />
the Administration’s actions, explaining<br />
that the executive orders<br />
could make it more difficult for<br />
America’s companies to compete.<br />
Google ordered its employees traveling<br />
overseas to return to the U.S.<br />
immediately. Google<br />
says at least 187 foreign-born<br />
employees<br />
could be prevented<br />
from entering the<br />
Photo: John Taylor<br />
country. Twitter’s<br />
chief executive tweeted<br />
that the economic<br />
impact of the Muslim<br />
ban is “real and upsetting.”<br />
Netflix chief<br />
executive said that<br />
“Trump’s actions are<br />
hurting Netflix employees<br />
around the<br />
world, and are so un-<br />
American it pains us all…Worse,<br />
these actions will make America<br />
less safe (through hatred and loss of<br />
allies) rather than more safe.”<br />
Thus far, the opposition to Trump’s<br />
immigration agenda has been fast<br />
and furious and will likely continue<br />
as he continues to roll out additional<br />
immigration orders.
Law suits challenge “Muslim Ban” executive order<br />
citing Constitutional guarantee of equal protection<br />
and statutory prohibitions against discrimination<br />
By Mary Kenney<br />
The fallout continues from last<br />
week’s immigration executive order,<br />
which has been coined the “Muslim<br />
Ban.” Several lawsuits have been<br />
filed to challenge the executive order,<br />
including Ali v. Trump, on the<br />
grounds that it violates the Constitution’s<br />
guarantee of equal protection<br />
under the law and a statutory<br />
prohibition against discrimination.<br />
The American Immigration<br />
Council, Northwest Immigrant<br />
Rights Project, and the National<br />
Immigration Project of the National<br />
Lawyers Guild filed this nationwide,<br />
class action lawsuit in the District<br />
Court for the Western District of<br />
Washington on Monday, January 30.<br />
At issue in this lawsuit is Section<br />
3 of the executive order, through<br />
which President Donald Trump<br />
abruptly suspended immigrant visa<br />
processing for nationals of seven<br />
predominantly Muslim countries,<br />
and prohibited their entry into the<br />
United States. Section 3 violates<br />
Congress’ clear intent in Section<br />
202(a)(1) of the Immigration and<br />
Nationality Act to prevent<br />
discrimination in<br />
the issuance of immigrant<br />
visas “because of<br />
the person’s race, sex,<br />
nationality, place of<br />
birth, or place of residence.”<br />
It also violates Plaintiffs’<br />
constitutionally<br />
protected rights to<br />
family, marriage, and<br />
equal protection under<br />
the law. The lawsuit<br />
was filed on behalf of United States<br />
citizens and lawful permanent residents<br />
who have filed visa petitions<br />
for their close family members who<br />
are nationals of the seven countries.<br />
Reema Dahman, a lawful permanent<br />
resident of the United States,<br />
filed a petition to bring her 16-yearold<br />
son stranded in war-torn Syria to<br />
the United States. The two have not<br />
seen each other since 2012. They are<br />
now at the last stage of processing,<br />
waiting only for an immigrant visa<br />
interview to be scheduled. But the<br />
President’s executive order has suspended<br />
immigrant visa interviews,<br />
10<br />
Photo: Geoff Livingston<br />
putting safety and security further<br />
out of the boy’s reach and further<br />
delaying the boy’s reunification with<br />
his mother.<br />
Ms. Dahman described the moment<br />
she realized her separation<br />
from her son would continue by<br />
saying:<br />
“I’m heartbroken. Every day I am<br />
filled with anguish at what might<br />
become of my son, and this order<br />
just crushed my hopes that I could<br />
get him out of harm’s way anytime<br />
soon.”<br />
Juweiya Ali is also a plaintiff. Her<br />
More on page 40
Chuck Brooks named winner of “Cybersecurity<br />
Marketer of The Year” at the <strong>2017</strong> Cybersecurity<br />
Excellence Awards<br />
WASHINGTON, DC – Chuck<br />
Brooks, Vice President at<br />
Sutherland <strong>Government</strong> Solutions,<br />
and Chairman of The<br />
New Emerging Technologies<br />
Committee for CompTIA, was<br />
named winner of Cybersecurity<br />
Marketer of The Year at the<br />
<strong>2017</strong> Cybersecurity Excellence<br />
Awards.<br />
The <strong>2017</strong> Cybersecurity Excellence<br />
Awards recognize companies,<br />
products and individuals<br />
that demonstrate excellence,<br />
innovation and leadership in<br />
information security. The finalists<br />
and winners were selected<br />
based on the strength of their<br />
nomination and the popular<br />
vote by members of the Information<br />
<strong>Security</strong> Community<br />
(both ratings and comments).<br />
“Congratulations to Chuck<br />
Brooks for winning the Cybersecurity<br />
Marketer of the Year category<br />
in the <strong>2017</strong> Cybersecurity Excellence<br />
Awards,” said Holger Schulze,<br />
founder of the 350,000 member<br />
Information <strong>Security</strong> Community<br />
on LinkedIn which organizes the<br />
awards program. “With over 450<br />
entries, the <strong>2017</strong> awards are highly<br />
competitive. All winners and finalists<br />
reflect the very best in leadership,<br />
excellence and innovation in<br />
today’s cybersecurity industry.”<br />
Chuck’s thought leadership writings<br />
on cybersecurity have helped<br />
shape the public policy debate as he<br />
11<br />
is respected in industry, in the<br />
Federal <strong>Government</strong>, academia,<br />
and on Capitol Hill. He has been<br />
a force in discussing, advocating,<br />
promoting cybersecurity<br />
issues across digital media, at<br />
events, in professional forums,<br />
and with a variety of public policy<br />
organizations.<br />
He has been a leading evangelist<br />
for cybersecurity, homeland<br />
security, and emerging<br />
technologies in both the public<br />
and private sectors. He was selected<br />
by LinkedIn as “One of<br />
the Top 5 Tech People to Follow<br />
On LinkedIn” by LinkedIn. He<br />
has been a featured speaker at<br />
numerous events and conferences.<br />
He recently presented at<br />
a workshop sponsored by The<br />
National Academies of Sciences,<br />
Engineering, and Medicine and the<br />
Federal Bureau of Investigation on<br />
Securing Life Sciences Data. He recently<br />
spoke at George Washington<br />
University event about the Cyber<br />
Threat Spectrum, will be participating<br />
soon at USTRANSCOM Senior<br />
Leader Cyber <strong>Security</strong> Roundtable.
Chuck has authored numerous<br />
articles focusing on cybersecurity,<br />
homeland security and technology<br />
innovation for many publications<br />
including Forbes, Huffington Post,<br />
The Hill, Federal Times, IT <strong>Security</strong><br />
Planet, Bizcatalyst 360, Next Gov,<br />
Alien Vault, Gov<br />
Tech, MIT Sloan<br />
Blog, <strong>Government</strong><br />
<strong>Security</strong> <strong>News</strong>, and<br />
Brink. Chuck is a<br />
pioneer in social<br />
media with over<br />
32,000 followers<br />
on LinkedIn and a<br />
global following and<br />
has brought significant<br />
attention to cyber<br />
issues from his<br />
frequent posts and<br />
commentaries. He<br />
has been involved as a judge for the<br />
past four years as a Judge for <strong>Government</strong><br />
<strong>Security</strong> <strong>News</strong>’ Annual<br />
Homeland <strong>Security</strong> Awards.<br />
As a senior executive in government<br />
relations, marketing, and management,<br />
Chuck brings a unique experience<br />
from service in the public<br />
sector, academia, and industry. He<br />
serves on a variety of boards, many<br />
of them philanthropic. He brings a<br />
substantive knowledge on a broad<br />
range of cyber issues and a special<br />
subject matter expertise of cybersecurity<br />
and homeland security in<br />
government that have benefited<br />
both the not-for-profit, public, and<br />
commercial sectors.<br />
Chuck is one of the original<br />
“plank holders” at the Department<br />
of Homeland <strong>Security</strong> (DHS). Admiral<br />
Jay Cohen, former Under Secretary<br />
for Science & Technology at<br />
DHS stated “Chuck<br />
Brooks. as Director<br />
of Legislative Affairs<br />
at DHS, was<br />
INVALUABLE to<br />
me, the DHS S&T<br />
Directorate, DHS,<br />
the Nation AND<br />
Congress in making<br />
the “reformation”<br />
of DHS S&T<br />
a complete success.<br />
His Hill/DC acumen,<br />
insight, reliability,<br />
ability to<br />
develop highly effective congressional<br />
interaction/communications is<br />
WITHOUT PEER in my nearly 16<br />
years dealing with senior executive<br />
branch officials, industry, academia<br />
and the Congress.”<br />
Dexter Ingram, Senior Advisor to<br />
Interpol, said the following about<br />
Chuck “he is a consummate professional<br />
who has a deep understanding<br />
of the issues, process, and people<br />
involved in the world of homeland<br />
security and Law enforcement. His<br />
breadth of experience derived from<br />
working on The Hill, in government,<br />
in academia, in industry, and with<br />
12<br />
the media make him truly unique.”<br />
Chuck worked for many years<br />
on Capitol Hill for the late Senator<br />
Arlen Specter and covered national<br />
security, foreign affairs, and technology<br />
issues. He also was a member<br />
of the Adjunct Faculty at John<br />
Hopkins University where taught<br />
homeland security for two years.<br />
He has advised a multitude of organizations<br />
including the Bill & Melinda<br />
Gates Foundation, The Cyber<br />
Resilience Institute, and the Center<br />
for Advancing Innovation. He also<br />
serves as Chairman of CompTIA’s<br />
New and Emerging Technologies<br />
Committee, and is a member of the<br />
AFCEA Cybersecurity Committee.<br />
He is on the Board of Advisors<br />
for CyberTech, and on the Board<br />
of Directors at Bravatek, and the<br />
Cyber Resilience Institute. He is<br />
an advisor to R & D cybersecurity<br />
company Inzero Systems. He is a<br />
subject Matter Expert to The Homeland<br />
Defense and <strong>Security</strong> Information<br />
Analysis Center (HDIAC),<br />
a Department of Defense (DoD)<br />
sponsored organization through<br />
the Defense Technical Information<br />
Center (DTIC. Chuck also serves as<br />
a Christian Science Monitor “Passcode<br />
Influencers Panel member” on<br />
Information <strong>Security</strong>. He has a BA<br />
from DePauw University and an<br />
MA from the University of Chicago.
Airport/Aviation <strong>Security</strong><br />
First 777-300ER in United’s fleet christened<br />
the “New Spirit of United,” marking a new<br />
era of passion, service and innovation<br />
CHICAGO, IL – Jan. 17, <strong>2017</strong> /<br />
PR<strong>News</strong>wire/ – Next month, a<br />
brand-new United Airlines plane<br />
will push back from the gate with a<br />
new name: “New Spirit of United.”<br />
This special aircraft is also the company’s<br />
first Boeing 777-300ER featuring<br />
the United Polaris all-aisle<br />
access, lie-flat seat. It represents a<br />
commitment to the future and the<br />
commencement of an exciting new<br />
chapter for the company as it builds<br />
the best airline in the world.<br />
“This aircraft symbolizes the new<br />
spirit, the energy and enthusiasm<br />
that I have seen in our employees<br />
who take great pride in the work<br />
they are doing to take care of our<br />
customers and one another,” said<br />
Oscar Munoz, chief executive officer<br />
of United Airlines. “The new<br />
777-300ER fleet will play a crucial<br />
role in connecting our customers<br />
to far-away destinations and to the<br />
moments that matter most.”<br />
The “New Spirit of United” is exemplified<br />
by the significant progress<br />
the company made in operational<br />
reliability last year – achieving its<br />
best full-year on-time performance<br />
in company history, the<br />
elevated customer experience<br />
and the completion<br />
of new agreements<br />
with every domestic<br />
unionized work group<br />
in 2016. As United Airlines<br />
continues to build<br />
on this momentum, this<br />
new aircraft serves as a<br />
symbol of the hard work,<br />
professionalism and<br />
dedication of the entire United team<br />
to our customers.<br />
The aircraft will start regularly<br />
scheduled service in <strong>February</strong> <strong>2017</strong>.<br />
This is the first of 14 777-300ER aircraft<br />
United expects to place into<br />
service in <strong>2017</strong>.<br />
About United<br />
United Airlines and United Express<br />
operate more than 4,500 flights a<br />
day to 339 airports across five continents.<br />
In 2016, United and United<br />
Express operated more than 1.6 million<br />
flights carrying more than 143<br />
million customers. United is proud<br />
to have the world’s most comprehensive<br />
route network, including U.S.<br />
13<br />
mainland hubs in Chicago, Denver,<br />
Houston, Los Angeles, New York/<br />
Newark, San Francisco and Washington,<br />
D.C. The airline is a founding<br />
member of Star Alliance, which<br />
provides service to 192 countries<br />
via 28 member airlines. For more<br />
information, visit united.com, follow<br />
@United on Twitter or connect<br />
on Facebook. The common stock of<br />
United’s parent, United Continental<br />
Holdings, Inc., is traded on the<br />
NYSE under the symbol UAL.
Airport/Aviation <strong>Security</strong><br />
Passenger advocacy group lists<br />
concerns before airline CEOs meet with<br />
President Trump<br />
WASHINGTON, DC – Feb. 6, <strong>2017</strong><br />
CEOs from the major U.S. Airlines<br />
will meet with President<br />
Trump on Thursday and<br />
will likely discuss air<br />
traffic control privatization<br />
and further limitations<br />
on foreign air competition.<br />
As profits soar<br />
to record levels, passengers<br />
face a reduction in<br />
flights, shrinking seats,<br />
and less reliable air travel<br />
especially from small<br />
and medium size cities,<br />
noted FlyersRights.org.<br />
Being exempt from state consumer<br />
protection laws is not enough for<br />
the airlines. They seek to block foreign<br />
competition from airlines such<br />
as Norwegian Air, WOW Airlines,<br />
and Emirates. Blocking foreign<br />
competition will result in higher<br />
Paul Hudson<br />
Flyer’s Rights Pres<br />
prices and fewer choices for consumers.<br />
Paul Hudson, president<br />
of FlyersRights.org and<br />
member of the FAA Aviation<br />
Rulemaking Advisory<br />
Committee, noted the<br />
similarities between the<br />
airline industry now and<br />
the railroad industry in<br />
the 19th century, “Then,<br />
railroads controlled long<br />
distance transportation,<br />
as well as the courts and<br />
government regulators.<br />
A new word was coined to describe<br />
their abusive treatment of the public:<br />
being railroaded. Today, Americans<br />
are being ‘airlined’.”<br />
Additionally, the airlines are<br />
pushing for privatization of the Air<br />
Traffic Control system. The plan<br />
for privatization leaves little room<br />
for government oversight over an<br />
inherently governmental function,<br />
would transfer all government air<br />
traffic control to a AMTRAK like<br />
entity controlled by the airlines, and<br />
grant a long list of demands sought<br />
by air controller union including<br />
the right to strike. Such legislation<br />
was passed by the House in the last<br />
Congress but not acted on by the<br />
Senate.<br />
FlyersRights.org is the United<br />
States’ largest airline passenger advocacy<br />
group. The organization is<br />
most famous for spearheading the<br />
Passenger Bill of Rights and the<br />
rule against tarmac confinements.<br />
Among the many services it provides<br />
for airline passengers, it operates<br />
a toll-free hotline and publishes<br />
a weekly newsletter. FlyersRights.<br />
org is currently appealing the FAA’s<br />
refusal to enact a rulemaking to<br />
address the problems of shrinking<br />
seat sizes to the D.C. Circuit Court<br />
of Appeals. (Case 16-1101, FlyersRights<br />
Education Fund v. FAA).<br />
14
Southwest and NetJets Pilots Urge President-elect<br />
Trump to Reverse NAI Foreign Carrier Permit<br />
DALLAS, TX – The Southwest Airlines<br />
Pilots’ Association (SWAPA)<br />
is partnering with the NetJets Association<br />
of Shared Aircraft Pilots<br />
(NJASAP) to urge President-elect<br />
Trump to reverse the decision to<br />
grant Norwegian Air International<br />
a foreign carrier permit. The two<br />
groups will meet in the nation’s capital<br />
for a Rally for U.S. Aviation Jobs<br />
on January 24.<br />
In the final days of his administration,<br />
President Obama granted<br />
Norwegian Air International (NAI)<br />
a foreign carrier permit, placing<br />
tens of thousands of U.S. jobs at risk.<br />
“This decision is just another failed<br />
trade deal by the Obama administration,<br />
giving foreign companies an<br />
unfair advantage over U.S.<br />
companies,” said Captain<br />
Jon Weaks, SWAPA<br />
President. “Only President-elect<br />
Trump has the<br />
power to reverse the lame<br />
duck Obama Administration’s<br />
reckless approval of<br />
Captain Jon Weaks<br />
SWAPA President<br />
NAI before it takes effect<br />
on January 29.”<br />
The late-December decision<br />
to grant NAI a foreign carrier<br />
permit paves the way for NAI<br />
to execute on its flag of convenience<br />
(FOC) scheme. This permit allows<br />
for Norwegian to establish an Irish<br />
subsidiary in order to take advantage<br />
of Ireland’s impotent labor, tax,<br />
and social laws. This is exactly the<br />
type of scheme that decimated the<br />
U.S. shipping industry and will be<br />
the catalyst for a race to the bottom<br />
in the U.S. airline industry.<br />
<strong>Government</strong> affairs representatives<br />
from SWAPA and NJASAP<br />
continue to work every possible avenue<br />
to garner the attention of the<br />
president-elect and right this wrong.<br />
With the January 29 deadline looming,<br />
the groups believe that time<br />
is of the essence, and the<br />
time for action is now.<br />
“The Obama administration<br />
has tilted the field<br />
of play in favor of a foreign<br />
competitor and put<br />
thousands of good-paying,<br />
middle-class, U.S. aviation<br />
jobs at risk. It will be up to<br />
the Trump administration<br />
to save them,” said SWAPA<br />
15<br />
<strong>Government</strong>al Affairs Committee<br />
Chair Chip Hancock. Added<br />
Weaks, “President-elect Trump was<br />
elected on a pro-American worker<br />
platform and has already delivered<br />
wins for several American companies.<br />
It is our sincere desire that the<br />
president-elect will right this wrong<br />
by repealing this detrimental ruling.”<br />
About SWAPA<br />
Located in Dallas, Texas, the Southwest<br />
Airlines Pilots’ Association<br />
(SWAPA) is a non-profit employee<br />
organization representing the more<br />
than 8,500 pilots of Southwest Airlines.<br />
SWAPA works to provide a<br />
secure and rewarding career for<br />
Southwest pilots and their families<br />
through negotiating contracts,<br />
defending contractual rights and<br />
actively promoting professionalism<br />
and safety. For more information<br />
on the Southwest Airlines Pilots’<br />
Association, visit www.swapa.<br />
org. Rally Hashtags: #DenyNAI<br />
#MakeItRight #ReverseObama
Airport/Aviation <strong>Security</strong><br />
British air traffic control provider tabs<br />
Rohde & Schwarz for second voice system<br />
MUNICH – Feb. 7, <strong>2017</strong> NATS has<br />
selected the R&S VCS-4G IP-based<br />
voice communications system from<br />
Rohde & Schwarz as its second<br />
voice system for its air traffic control<br />
(ATC) communications in UK<br />
airspace. The voice over IP (VoIP)<br />
COTS solution from the Munichbased<br />
electronics firm was chosen<br />
based on its reliability, innovation<br />
and flexibility to create a single<br />
platform across NATS’ Swanwick<br />
and Prestwick control centers. In<br />
addition, the company has agreed<br />
to an accelerated delivery schedule<br />
to support NATS in their “Deploying<br />
SESAR” transformation programme.<br />
Rohde & Schwarz will provide the<br />
British air traffic service provider<br />
NATS with the IP-based voice communications<br />
system R&S VCS-4G.<br />
Within the framework of the Single<br />
European Sky (SES) initiative, NATS<br />
will modernize its entire air traffic<br />
management (ATM) infrastructure<br />
over the next few years. Tim Bullock,<br />
Director Supply Chain Management<br />
at NATS, explains: “NATS<br />
controls more than 2.4 million<br />
flights every year. Our systems must<br />
16<br />
be both flexible and<br />
able to handle heavy<br />
workloads in order<br />
to ensure efficient operations<br />
for airlines<br />
and passengers alike.<br />
We have found in Rohde<br />
& Schwarz an innovative<br />
and reliable<br />
partner. We welcome<br />
them to the collaborative<br />
team of suppliers joining us on<br />
our ATM transformation journey<br />
towards SESAR deployment.”<br />
Rohde & Schwarz will begin the<br />
implementation of the second voice<br />
system in <strong>2017</strong>. It will provide enhanced<br />
resilience for voice based<br />
radio communications in UK airspace.<br />
The air traffic control centers<br />
in Swanwick and Prestwick as well<br />
as the NATS corporate and technical<br />
centre in Whiteley will all be<br />
equipped in a phased deployment<br />
that will be completed by 2020. The<br />
order includes the delivery, implementation<br />
and through-life support<br />
of more than 450 R&S VCS-4G controller<br />
working positions (CWP).<br />
Up to 1700 radios and various<br />
ground-ground lines will be connected<br />
to the system.<br />
According to Bosco Novak, Executive<br />
Vice President Secure Communications<br />
Division at Rohde &<br />
Schwarz: “NATS is a forerunner in<br />
the deployment of SESAR and introducing<br />
new technologies. It will<br />
be the first air traffic control provider<br />
in Europe to completely migrate<br />
all of its ATC communications to<br />
IP. Deploying our technology as the<br />
second voice system will increase<br />
service resilience and add operational<br />
flexibility to NATS business<br />
operation.”<br />
As airspace becomes more crowded,<br />
there is an increased demand for<br />
flexible, load-based reallocation of<br />
resources while ensuring efficient<br />
More on page 40
AMICO <strong>Security</strong> launches next generation<br />
ANC composite fence system, receives M5.0<br />
security rating<br />
BIRMINGHAM, AL — December<br />
30, 2016 — AMICO <strong>Security</strong> announced<br />
today that its ANC fence<br />
system has received an M5.0 security<br />
rating in compliance with the<br />
ASTM F2781-10 standard, which is<br />
used to test the forced entry resistance<br />
of security fence systems, an<br />
important designation for the military,<br />
the U.S. Department of Homeland<br />
<strong>Security</strong>, industrial businesses<br />
and utilities.<br />
The next generation ANC fence<br />
system is a uniquely designed,<br />
non-metallic fencing system that is<br />
non-conductive and radar friendly,<br />
making it ideal for the protection of<br />
The non-conductive, radar friendly ANC fence system is ideal for<br />
17<br />
utility substations, airports and military<br />
applications. The ANC fence<br />
system is made up of a proprietary<br />
composite blend of non-conductive<br />
materials configured to increase the<br />
strength to weight ratio and greatly<br />
improve the level of security.<br />
The ANC fence system uses a<br />
unique self-draining diamond<br />
design and is a medium<br />
security alternative<br />
to traditional chain link<br />
fence products, which offers<br />
minimal security and<br />
can easily be compromised<br />
with simple hand tools.<br />
Because the system is non metallic,<br />
the ANC fence system<br />
is non-conductive<br />
and does not require<br />
grounding like a traditional<br />
chain link fence,<br />
significantly reducing<br />
the time and cost of engineering<br />
and fence installation.<br />
The system<br />
is ideal for use around<br />
power plants and sub<br />
stations, where the<br />
metal fencing can conduct<br />
electricity and become dangerous<br />
to the touch, and is widely used<br />
around (static synchronous compensators)<br />
STATCOMs, (switched<br />
virtual circuits) SVCs and reactors<br />
due to their high magnetic fields.<br />
The ANC fence system does not interfere<br />
with radar signals due to its<br />
non-metallic composition.<br />
“The unique design and<br />
high strength of the ANC<br />
fence system provides a<br />
safe, secure, aesthetic option<br />
to utilities, military<br />
bases and airports,” said<br />
Gary Baltz, Director of<br />
Marketing for AMICO <strong>Security</strong>.<br />
“Our product provides safety to the<br />
public and utility workers against<br />
step and touch potential, while at<br />
the same time greatly enhancing<br />
the security of our power grid and<br />
infrastructure. The system is easy to<br />
install in both new construction or<br />
retrofit situations.”<br />
The ANC fence system can be assembled<br />
up to 20 feet high and integrates<br />
with vehicular and pedestrian<br />
sliding automatic gate systems. The<br />
use in multiple perimeter security applications More on page 41
Written testimony of DHS Secretary John F. Kelly for a House<br />
Committee on Homeland <strong>Security</strong> hearing titled “Ending the<br />
Crisis: America’s Borders and the Path to <strong>Security</strong>”<br />
Release Date:<br />
<strong>February</strong> 7, <strong>2017</strong><br />
210 House Capitol Visitor Center,<br />
U.S. Capitol<br />
Mr. Chairman, Ranking Member<br />
Thompson, and distinguished<br />
Members of the Committee:<br />
It is a great honor and privilege to<br />
appear before you today to discuss<br />
the crucial mission of the Department<br />
of Homeland <strong>Security</strong> (DHS)<br />
to protect the homeland and secure<br />
our nation’s borders.<br />
Over the past 45 years, I have<br />
been privileged to serve my nation<br />
as both an enlisted Marine and an<br />
officer. I have worked with our allies<br />
across agencies, the private sector,<br />
and with independent experts to<br />
identify innovative, comprehensive<br />
solutions to current and emerging<br />
threats. These assignments—while<br />
varied—shared the common characteristics<br />
of working within and<br />
leading large, complex, and diverse<br />
mission-focused organizations<br />
while under great pressure to produce<br />
results.<br />
I am humbled to once again be<br />
called to serve, this time<br />
with the men and women<br />
of DHS. As a Department,<br />
we face diverse<br />
challenges and adversaries<br />
that do not respect<br />
our rule of law or our<br />
borders. As Secretary,<br />
you have my commitment<br />
to tirelessly protect<br />
our country from<br />
threats, secure the border, and enforce<br />
the law while expediting lawful<br />
trade and travel. In pursuit of those<br />
missions, please know that I take<br />
seriously our legal responsibilities<br />
to balance the security of our homeland<br />
with the protection of privacy,<br />
civil rights, and civil liberties.<br />
The President’s Executive Orders<br />
During his first two weeks in office,<br />
President Trump issued executive<br />
orders to secure our borders, enforce<br />
our immigration laws, and protect<br />
the nation from foreign terrorist entry<br />
into the United States. The President<br />
has gotten right to work, fighting<br />
on behalf of American families<br />
and workers—and these moves will<br />
18<br />
DHS Secretary<br />
John F. Kelly<br />
strengthen our national<br />
security.<br />
The purpose of the<br />
order on border security<br />
is to direct executive<br />
departments and agencies<br />
to deploy all lawful<br />
means to secure the nation’s<br />
southern border,<br />
prevent further illegal<br />
immigration into the<br />
United States, and to repatriate illegal<br />
aliens swiftly, consistently, and<br />
humanely.<br />
This executive order establishes<br />
the foundation for securing our<br />
southern border by providing the<br />
tools, resources, and policy direction<br />
for DHS’s dedicated men and<br />
women who are responsible for securing<br />
the border—to prevent illegal<br />
immigration, drug and human<br />
trafficking, and acts of terrorism.<br />
In accordance with existing law,<br />
DHS is immediately taking all appropriate<br />
steps to plan, design, and<br />
construct a physical wall along the<br />
southern border, using the materials<br />
and technology that will most<br />
effectively achieve operational con-
trol of the southern border. In addition,<br />
DHS is immediately taking<br />
all appropriate action to ensure that<br />
the parole and asylum provisions of<br />
federal immigration law are applied<br />
consistent with the requirements of<br />
the law, and not exploited to prevent<br />
the removal of otherwise removable<br />
aliens.<br />
The executive order on interior<br />
immigration enforcement provides<br />
DHS with the tools it needs<br />
to enforce federal immigration laws<br />
within the United States. It will remove<br />
many of the obstacles that<br />
have been making it more difficult<br />
for the dedicated men and women<br />
of U.S. Immigration and Customs<br />
Enforcement (ICE) to carry out<br />
their mission, which includes arresting,<br />
detaining, and removing illegal<br />
aliens from the United States.<br />
Essentially, it will restore the highly<br />
successful Secure Communities<br />
Program, which allows ICE to more<br />
easily target criminal aliens for removal.<br />
A third executive order, signed<br />
by the President on January 27, will<br />
protect all Americans from certain<br />
foreign nationals who intend<br />
to commit terrorist attacks in the<br />
United States by preventing such<br />
individuals from exploiting our immigration<br />
laws. The order suspends<br />
entry into the United States from<br />
Iran, Iraq, Somalia, Sudan Syria,<br />
Libya and Yemen until a comprehensive<br />
review has been completed;<br />
directs Federal agencies to implement<br />
uniform screening standards<br />
across all immigration programs;<br />
suspends the Refugee Admissions<br />
Program for 120 days to assess the<br />
vulnerabilities in the program and<br />
establish additional procedures to<br />
ensure refugees admitted do not<br />
pose a threat to national security or<br />
public safety; orders completion of<br />
the biometric entry-exit system; and<br />
ensures that applicants for visas are<br />
personally interviewed before their<br />
visas are approved in compliance<br />
with INA 222.<br />
As the President has stated,<br />
“Homeland <strong>Security</strong> is in the business<br />
of saving lives, and that mandate<br />
will guide our actions.” These<br />
executive orders further that goal<br />
by enhancing border security, promoting<br />
public safety, and minimizing<br />
the threat of terrorist attacks by<br />
foreign nationals in the homeland.<br />
More important, however, these executive<br />
orders emphasize the rule<br />
of law as a bedrock principle of our<br />
immigration system and provide<br />
clearly defined consequences for<br />
those who would violate our laws.<br />
Border <strong>Security</strong><br />
and Immigration Enforcement<br />
As a nation, control of our borders<br />
is paramount. Without that control,<br />
every other form of threat—illicit<br />
drugs, unauthorized immigrants,<br />
19<br />
transnational organized crime, certain<br />
dangerous communicable diseases,<br />
terrorists—could enter at will.<br />
DHS was created to prevent terrorist<br />
attacks against the United States.<br />
The principal means of prevention<br />
within the United States is effective<br />
border control, denying admission<br />
to aliens who seek to harm Americans<br />
or violate our laws, and countering<br />
efforts to recruit individuals<br />
to undertake terrorist acts.<br />
Achieving this priority begins<br />
with physical obstacles like a border<br />
barrier and supporting infrastructure<br />
and surveillance capabilities.<br />
In this effort, I am committed to<br />
executing President Trump’s plan to<br />
secure our southern border with effective<br />
physical barriers, advanced<br />
technology, and strategic deployment<br />
of law enforcement personnel.<br />
While the presence of physical<br />
barriers and additional technology<br />
is essential, it must be bolstered by<br />
persistent patrol and the vigilance<br />
of the dedicated men and women of<br />
DHS.<br />
We must augment our expanded<br />
border security initiatives with<br />
vigorous interior enforcement and<br />
administration of our immigration<br />
laws in a manner that serves the<br />
national interest. This effort will include<br />
greater cooperation and coordination<br />
between DHS’s operational<br />
components, which are responsible<br />
for administering immigration ben-
DHS Secretary Kelly: “Ending the Crisis: America’s Borders and the Path to <strong>Security</strong>”<br />
efits and enforcing our nation’s existing<br />
immigration laws.<br />
Within DHS and our Federal,<br />
State, local, and international partners,<br />
we must expand our vetting<br />
of those seeking to enter our country—particularly<br />
of those individuals<br />
from high-risk countries—including<br />
refugees. We<br />
currently lack a comprehensive<br />
strategy<br />
with uniform screening<br />
standards to prevent<br />
terrorists from<br />
entering the country.<br />
Unfortunately, our<br />
country has recently<br />
admitted some foreign nationals<br />
without an adequate understanding<br />
of their allegiances and intentions.<br />
Additionally, because they are apprehended<br />
by DHS law enforcement<br />
agents, we know there continue to<br />
be any number of so-called “special<br />
interest aliens” that make their way<br />
into our country illegally each year.<br />
Last year, over 415,816 migrants,<br />
mostly from Central America and<br />
Mexico—including over 137,614<br />
unaccompanied children and individuals<br />
travelling in family units—<br />
were apprehended on our southern<br />
border. Many of those arriving at<br />
our southern border have fled violence,<br />
poverty, criminal networks,<br />
and gangs in their native countries.<br />
Border security requires a layered approach<br />
that extends far beyond our shores, throughout<br />
the hemisphere, in partnership with our<br />
neighbors to the south and north.<br />
20<br />
While the vast majority are fleeing<br />
violence or seeking economic opportunity,<br />
a small number of individuals<br />
could potentially be seeking<br />
to do us harm or commit crimes.<br />
Regardless of purpose or circumstance,<br />
the ease with which human<br />
smugglers have moved tens of thousands<br />
of people to our nation’s doorstep<br />
also serves as another warning<br />
sign: these smuggling routes are a<br />
potential vulnerability of our homeland.<br />
Our vigorous response to these<br />
threats must include increased border<br />
security infrastructure, personnel,<br />
and technology. However, we<br />
cannot just play defense in securing<br />
our borders. Border security<br />
requires a layered approach that<br />
extends far beyond our shores,<br />
throughout the hemisphere, in partnership<br />
with our neighbors to the<br />
south and north.<br />
Along nearly 7,000 miles of land<br />
border, approximately 95,000 miles<br />
of shoreline, and at 328 ports of entry<br />
and numerous locations abroad,<br />
U.S. Customs and Border Protection<br />
(CBP) has a critical role in preventing<br />
the illegal entry of people and<br />
goods into the United States.<br />
Across the wide expanses of our<br />
nation’s land, air, and maritime environments,<br />
CBP has worked to<br />
address the changing<br />
demographics<br />
of attempted border<br />
crossers and to<br />
maintain border security<br />
through significant<br />
investments<br />
in enforcement resources,<br />
technology,<br />
infrastructure, and enhanced<br />
operational tactics and strategy.<br />
Through advances in detection capabilities,<br />
such as fixed, mobile,<br />
and agent-portable surveillance<br />
systems, tethered and tactical aerostats,<br />
unmanned aircraft systems,<br />
and ground sensors, which work<br />
in conjunction with tactical border<br />
infrastructure and agent deployment,<br />
CBP is enhancing its ability<br />
to quickly detect, identify, and respond<br />
to illegal border crossings.<br />
At our nation’s air, land, and sea<br />
ports of entry, more travelers and<br />
cargo are arriving than ever before.<br />
To maintain the security of growing<br />
volumes of international travelers,<br />
CBP performs a full range of inspec-
tion activities and continues to enhance<br />
its pre-departure traveler vetting<br />
systems and integrate biometric<br />
technologies. CBP has also made<br />
significant developments in its intelligence<br />
and targeting capabilities<br />
to segment and target shipments<br />
and individuals by potential level of<br />
risk to identify and stop potentially<br />
dangerous travelers or cargo before<br />
boarding an aircraft or conveyance<br />
bound for the United States.<br />
Beyond managing the influx of<br />
people and cargo arriving in the<br />
United States, CBP is working with<br />
other DHS agencies to strengthen<br />
its capabilities to identify foreign<br />
nationals who have violated our immigration<br />
laws, as well as to track<br />
suspect persons and cargo exiting<br />
the country. CBP is also leveraging<br />
its newly-established Counter Network<br />
Program, which focuses on<br />
detecting, disrupting, and dismantling<br />
transnational criminal organizations,<br />
by expanding information<br />
sharing, increasing partnerships<br />
and collaboration that enhance<br />
border security, conducting joint<br />
exploitation of intelligence, and comanaging<br />
of operations with interagency<br />
and international partners.<br />
These efforts are building toward a<br />
safer and more secure border environment,<br />
one that supports the<br />
safety and success of each agent and<br />
21<br />
officer in the field.<br />
In the maritime environment,<br />
the U.S. Coast<br />
Guard (USCG) utilizes<br />
a multi-faceted layered approach<br />
to interdict threats far from<br />
the borders of our nation to combat<br />
the efforts of transnational criminal<br />
organizations. Targeting the primary<br />
flow of illicit drug traffic has a direct<br />
and damaging impact on these<br />
networks.<br />
Successful Coast Guard interdictions<br />
in the maritime transit zones<br />
feed a cycle of success—subsequent<br />
prosecutions lead to actionable intelligence<br />
on future events, which<br />
produces follow-on seizures and additional<br />
intelligence. Suspects from<br />
these cases divulge information<br />
during prosecution and sentencing<br />
that is critical to indicting, extraditing,<br />
and convicting drug kingpins<br />
and dismantling these sophisticated<br />
networks.<br />
USCG secures the maritime domain<br />
by conducting patrols and<br />
coordinating with other federal<br />
agencies and foreign countries to<br />
interdict aliens at sea, denying them<br />
illegal entry via maritime routes to<br />
the United States, its territories and<br />
possessions. Thousands of aliens attempt<br />
to enter this country illegally<br />
every year using maritime routes,<br />
many via smuggling operations. Interdicting<br />
these aliens at<br />
sea reduces the safety risks<br />
involved in such transits.<br />
Interdicted aliens can<br />
be quickly returned to their<br />
countries of origin, avoiding the<br />
costlier processes required if they<br />
successfully enter the United States.<br />
Interagency and International<br />
Cooperation<br />
As Secretary, I will advocate for expanding<br />
cooperation inside the interagency<br />
and with partner nations,<br />
particularly Canada and Mexico.<br />
Interagency relationships and bilateral<br />
cooperation are critical to identifying,<br />
monitoring, and countering<br />
threats to U.S. national security and<br />
regional stability. While DHS possesses<br />
unique authorities and capabilities,<br />
we must enhance and leverage<br />
our coordination with federal,<br />
state, local, and tribal partners. The<br />
magnitude, scope, and complexity<br />
of the challenges we face—illegal<br />
immigration, transnational crime,<br />
human smuggling and trafficking,<br />
and terrorism—demand an integrated<br />
counter-network approach.<br />
Regionally, we must continue to<br />
build partner capacity. Illegal immigration<br />
and transnational organized<br />
crime threaten not only our<br />
own security, but also the stability<br />
and prosperity of our Latin Ameri-
DHS Secretary Kelly: “Ending the Crisis: America’s Borders and the Path to <strong>Security</strong>”<br />
can neighbors. In Colombia, for<br />
example, we learned that key principles<br />
to defeating large cartels and<br />
insurgents are the same as defeating<br />
criminal networks: a strong, accountable<br />
government that protects<br />
its citizens, upholds the rule of law,<br />
and expands economic opportunity<br />
for all. It taught us that countering<br />
illicit trafficking and preventing terrorism<br />
often go hand-in- hand, and<br />
that U.S. interagency cooperation,<br />
coupled with a committed international<br />
partner, can help bring a<br />
country back from the brink. I believe<br />
these lessons can be applied<br />
across our many international partnerships,<br />
and in furtherance of our<br />
government’s many missions beyond<br />
our borders.<br />
Presently, we have a great opportunity<br />
in Central America to<br />
capitalize on the region’s growing<br />
political will to combat criminal<br />
networks and control hemispheric<br />
migration. Leaders in many of our<br />
partner nations recognize the magnitude<br />
of the tasks ahead and are<br />
prepared to address them, but they<br />
need our support. As we learned in<br />
Colombia, sustained engagement<br />
by the United States can make a real<br />
and lasting difference.<br />
Conclusion<br />
The security challenges facing DHS<br />
and our nation are considerable,<br />
particularly along the southern border.<br />
We have the laws in place to secure<br />
our borders. We also have outstanding<br />
men and women working<br />
at DHS, and in other federal, state,<br />
local, and tribal law enforcement<br />
agencies, who are committed to the<br />
border security mission. Finally, we<br />
now have a clear mission objective<br />
and the will to complete that mission<br />
successfully. We must accelerate<br />
our collective efforts to enforce<br />
the laws on the books and support<br />
those sworn to uphold the law. You<br />
have my commitment to work tirelessly<br />
to ensure that the men and<br />
women of DHS are empowered do<br />
their jobs.<br />
I believe in America and the principles<br />
upon which our country and<br />
way of life are guaranteed, and I<br />
believe in respect, tolerance, and<br />
diversity of opinions. I have a profound<br />
respect for the rule of law and<br />
will always strive to preserve it. As<br />
I mentioned in my confirmation<br />
hearing, I have never had a problem<br />
speaking truth to power, and I<br />
firmly believe that those in power<br />
deserve full candor and my honest<br />
assessment and recommendations.<br />
As Secretary, I recognize the<br />
many challenges facing DHS and I<br />
will do everything within my ability<br />
to meet and overcome those chal-<br />
22<br />
lenges, while preserving our liberty,<br />
upholding our laws, and protecting<br />
our citizens.<br />
Thank you again for the opportunity<br />
to appear before you today and<br />
for your continued support of DHS.<br />
I am confident that we will continue<br />
to build upon the momentum generated<br />
as a result of our previous operational<br />
achievements around the<br />
world. I remain committed to working<br />
with this Committee to forge a<br />
strong and productive relationship<br />
going forward to secure our borders<br />
and help prevent and combat<br />
threats to our nation.<br />
I would be pleased to answer any<br />
questions.
GSN’s <strong>2017</strong> Airport/Seaport/Border <strong>Security</strong> Awards<br />
Opening for Entries on March 15 with Many New Categories<br />
All Winners in this program are entitled to<br />
a Full-Page Advertisement (8.5” x 9.0”) in<br />
your choice of GSN’s <strong>Digital</strong> Magazine or<br />
Leaderboard in any edition of the Airport,<br />
Seaport, Rail, Border <strong>Security</strong> Weekly<br />
<strong>News</strong>letter.<br />
NEW IN <strong>2017</strong>:<br />
CLICK HERE TO<br />
SUBMIT A NOMINATION<br />
All Finalists are entitled to a Half-Page<br />
Advertisement (8.5” x 4.5”) in your choice<br />
of GSN’s <strong>Digital</strong> Magazine or Leaderboard<br />
in any edition of the Airport, Seaport, Rail,<br />
Border <strong>Security</strong> Weekly <strong>News</strong>letter.<br />
Adrian Courtenay<br />
Managing Partner, CEO<br />
<strong>Government</strong> <strong>Security</strong> <strong>News</strong><br />
917-696-5782<br />
acourtenay@gsnmagazine.com<br />
Steve Bittenbender<br />
Managing Editor<br />
<strong>Government</strong> <strong>Security</strong> <strong>News</strong><br />
502-552-1450<br />
sbittenbender@gsnmagazine.com<br />
Gerry O’Hara<br />
Designer<br />
OHDesign3<br />
203-249-0626<br />
gerry@ohd3.com
Salient CRGT Announces Definitive Agreement<br />
to Acquire Information Innovators, Inc.<br />
FAIRFAX, VA – <strong>February</strong> 6, <strong>2017</strong><br />
– Salient CRGT, Inc. (“Salient<br />
CRGT”), a leading provider of agile<br />
software development, data analytics,<br />
mobility, cyber security, and<br />
infrastructure solutions, today announced<br />
that it has signed a definitive<br />
agreement for the acquisition<br />
of Springfield, VA-based Information<br />
Innovators, Inc. (“Triple-i”), a<br />
technology and missionfocused<br />
company serving<br />
the federal government,<br />
with particular strength<br />
in the healthcare information<br />
technology (“IT”) arena. The<br />
agreement is expected to close within<br />
the first quarter of <strong>2017</strong>. Salient<br />
CRGT is backed by two private equity<br />
firms, Bridge Growth Partners,<br />
LLC and Frontenac Co, and Triple-i<br />
is backed by DFW Capital Partners.<br />
The transaction combines two<br />
highly complementary businesses.<br />
Triple-i has spent the past 16 years<br />
building and delivering a full suite of<br />
next generation solutions, including<br />
healthcare IT services, enterprise IT<br />
solutions, cloud services and agile<br />
development capabilities focused<br />
on the needs of customers within<br />
federal healthcare, civilian, national<br />
security, and defense markets. With<br />
the acquisition, Salient CRGT will<br />
increase its revenues to more than<br />
$500 million, solidifying the company’s<br />
position in the mid-tier federal<br />
IT services market and allowing<br />
it to effectively compete with largescale<br />
professional services providers<br />
while maintaining its agile, innovative,<br />
quality-driven, and customercentric<br />
approach.<br />
24<br />
“Salient<br />
CRGT’s acquisition<br />
of Triple-i directly supports<br />
the company’s long-term growth objectives<br />
to create a premier mid-tier<br />
agile software development, data<br />
analytics, cyber security and mobility<br />
solution and services company.<br />
By combining the ingenuity, creativity,<br />
and commitment of Salient<br />
CRGT and Triple-i employees, we<br />
will be able to deliver expanded services<br />
to our existing customers and<br />
offer compelling solutions to new<br />
customers,” said Brad Antle, Chief<br />
Executive Officer, Salient CRGT.<br />
“Now positioned firmly in this midtier<br />
market segment, Salient CRGT<br />
will compete more successfully and<br />
profitably in the federal IT market<br />
space with notable new capabilities<br />
in healthcare IT and consulting, IT<br />
infrastructure, network engineering<br />
and operations management, and<br />
cloud-based technologies.”<br />
“This exciting transaction is a strategic<br />
step forward for Salient CRGT<br />
that is consistent with the goals we<br />
set together with our private equity<br />
partners Bridge Growth<br />
and Frontenac, when<br />
we decided to merge Salient<br />
and CRGT in 2015.<br />
Triple-i has supported 11<br />
out of the 15 cabinet-level federal<br />
departments to design, implement,<br />
sustain and manage their IT and<br />
healthcare services requirements,”<br />
said Tom Ferrando, President of<br />
Salient CRGT. “By combining their<br />
experience and our network, this<br />
acquisition expands Salient CRGT’s<br />
portfolio of high-profile agencies,<br />
including Health and Human Services,<br />
Department of Veterans Affairs,<br />
Defense Health Agency, and<br />
Department of Homeland <strong>Security</strong><br />
while adding important contracts to<br />
our portfolio, including VA T4NG,
CMS SPARC, GSA PSS, and US-<br />
AMRAA TEAMS, among others.”<br />
Commenting on the strategic<br />
nature of the acquisition, Steve<br />
Ikirt, President and Chief Executive<br />
Officer of Triple-i said, “Over<br />
the years, there have been several<br />
companies interested in having<br />
Triple-i become part of their<br />
team. We determined that Salient<br />
CRGT had the strength of management,<br />
clear strategic direction,<br />
proven financial performance,<br />
and the right mix of capabilities<br />
and customers to be an ideal fit<br />
for Triple-i. With Salient CRGT,<br />
we will be even better positioned<br />
to serve our customers’ needs with<br />
a broader and more diverse set of<br />
services.”<br />
Terms of the transaction were not<br />
disclosed. RBC Capital Markets and<br />
Sagent Advisors served as Salient<br />
CRGT’s financial advisors, and KippsDeSanto<br />
& Co. served as Triplei’s<br />
financial advisor. Willkie Farr &<br />
Gallagher LLP and Garvey Schubert<br />
Barer served as legal advisor for<br />
Salient CRGT. Holland & Knight<br />
served as legal advisor for Triple-i.<br />
About Salient CRGT<br />
Salient CRGT provides agile software<br />
development, data analytics,<br />
mobility, cyber security and infrastructure<br />
solutions. We support<br />
these core capabilities with full lifecycle<br />
IT services and training—to<br />
Enterprise IT<br />
Ensuring technology platforms are secure,<br />
efficient, and reliable.<br />
help our customers meet critical<br />
goals for pivotal missions. We are<br />
purpose built for IT transformation<br />
supporting federal civilian, defense,<br />
homeland, and intelligence agencies,<br />
as well as Fortune 1000 companies.<br />
We use the most innovative<br />
talent delivery model in the industry,<br />
scientifically providing exactly<br />
the right people for the customers’<br />
most pressing requirements. Salient<br />
CRGT has earned a record of success<br />
with integration and operations<br />
of large‐scale, high‐volume solutions.<br />
For additional information<br />
on Salient CRGT, visit www.salientcrgt.com.<br />
About Information Innovators, Inc.<br />
Information Innovators Inc. (Triple-i)<br />
delivers solutions and services<br />
to IT and health-focused clients<br />
across the federal government. The<br />
25<br />
Company defines, develops, and<br />
implements innovations that help<br />
solve its customers’ hardest problems<br />
while saving them money,<br />
modernizing their systems, and<br />
achieving their mission objectives.<br />
Triple-i serves federal departments<br />
including Health and Human<br />
Services, Veterans Affairs,<br />
Homeland <strong>Security</strong>, Defense,<br />
Commerce, Transportation, Education,<br />
Housing and Urban Development,<br />
and the Intelligence<br />
Community through its core capabilities—enterprise<br />
IT services,<br />
cloud and hosting solutions, cyber<br />
security, software development and<br />
implementation, data and analytics,<br />
and health services. For more information,<br />
visit www.iiinfo.com.<br />
About Bridge Growth Partners<br />
Bridge Growth Partners, LLC brings<br />
together significant investment,<br />
financial, operating and strategic<br />
business building expertise and talent<br />
for the purpose of investing in<br />
carefully selected, growing and important<br />
segments of the technology<br />
and technology-enabled financial<br />
services sectors. For more information,<br />
visit www.bridgegrowthpartners.com.<br />
About Frontenac<br />
Frontenac is a leading private equity<br />
More on page 42
Federal experts agree that ‘Internet of Things’<br />
demands simple baked-in security<br />
By Tom O’Keefe<br />
As the federal government<br />
begins to<br />
incorporate mobile<br />
devices and the Internet<br />
of Things<br />
(IoT), security must<br />
be “baked in,” not “sprinkled on” as<br />
an afterthought to avoid hacking.<br />
That’s the verdict from experts<br />
in government and the contractor<br />
community, who recently met for<br />
a panel discussion on “Uniting Cybersecurity,<br />
Mobility and the Internet<br />
of Things” at immixGroup’s annual<br />
government summit on federal<br />
budgeting.<br />
The risk of cyber attack through<br />
IoT-enabled devices made headlines<br />
late last year when a highprofile<br />
internet-monitoring and<br />
traffic-routing company was hacked<br />
in a distributed denial of service<br />
(DDOS) attack. A simple malware<br />
called Mirai infected consumer<br />
DVRs, flooding the company with<br />
millions of bogus information requests.<br />
The company’s servers were<br />
overwhelmed, temporarily knocking<br />
out some of the nation’s most<br />
visited websites.<br />
Old security precautions<br />
don’t fit IoT<br />
Among federal agencies, current<br />
security requirements don’t necessarily<br />
fit in the new IoT environment.<br />
According to Jose Padin,<br />
sales engineering director,<br />
Federal Civilian & SI for Citrix, the<br />
fed’s approach to security “doesn’t<br />
always translate into consumerbased<br />
electronics.”<br />
The answer is for government organizations<br />
to develop or purchase<br />
new mobile and IoT solutions with<br />
security built in, said Michael Theis,<br />
with the CERT Insider Threat Center<br />
Software Engineering Institute.<br />
“I don’t think anyone’s really widely<br />
codified how you go about making<br />
sure that things are secure from the<br />
beginning,” said Theis.<br />
Padin noted that hardware, firmware<br />
and software for IoT-enabled<br />
products is “the wild west.” He said<br />
government must add security controls<br />
into procurement processes<br />
for these devices. He also acknowledged<br />
that industry must make investments<br />
in applying these requirements<br />
to all devices, rather than<br />
creating government versions.<br />
26<br />
Bad actors, Padin said, “realize<br />
that the weakest link is the consumer.”<br />
By building security provisions<br />
to products from the start, consumers<br />
will no longer be a vulnerability<br />
when they buy IoT-enabled appliances.<br />
At a more technical level, the challenge<br />
for government is to have the<br />
appropriate identity management<br />
requirements for mobility and IoT,<br />
according to Donna Dodson, director<br />
of the IT laboratory and chief<br />
cybersecurity advisor for NIST. A<br />
personal identity verification card,<br />
for example, “works nicely in a laptop<br />
or desktop but in a mobile device,<br />
not so much.”<br />
“The end users really matter here,”<br />
Dodson said. “We need to give them<br />
answers that are easy for them to<br />
do the right thing, hard to do the<br />
wrong thing and easy to back up if<br />
the wrong thing is done.” It’s important<br />
to think about identity management<br />
in the IoT space, she added.<br />
In many cases that may start “at<br />
the silicon level,” said Ashish Parikh,<br />
vice president of software and solutions<br />
at Arrow’s systems integration<br />
business. Silicon vendors are<br />
More on page 41
Farpointe warns access control channel to suggest customers<br />
add anti-hacking measures, as Federal Trade Commission is<br />
now insisting on cyber security protection<br />
SUNNYVALE, CA – <strong>February</strong><br />
14, <strong>2017</strong> – Farpointe Data, the access<br />
control industry’s trusted<br />
global partner for RFID solutions,<br />
is notifying its access control manufacturers,<br />
distributors, integrators<br />
and dealers that hacking of access<br />
control systems has become a threat<br />
far bigger than most think. Protecting<br />
their end-users from hackers is<br />
imperative for channel partners.<br />
“The U.S. federal government<br />
suffered a staggering 61,000 cybersecurity<br />
breaches, that it knows of,<br />
last year alone,” reports Farpointe<br />
Data President Scott Lindley. “Several<br />
recent events highlight the importance<br />
of why the access control<br />
channel must work with their customers<br />
to deal with accelerating<br />
hacking attacks.”<br />
According to Lindley, the most<br />
important is that the U.S. Federal<br />
Trade Commission (FTC) has decided<br />
that it will hold the business<br />
community responsible for failing<br />
to implement good cyber security<br />
practices and is now filing lawsuits<br />
against those that don’t. An appeals<br />
court has backed its lawsuit against<br />
the hotel chain operator Wyndham<br />
Worldwide for not protecting<br />
consumers’ information and, just<br />
recently, the FTC filed a lawsuit<br />
against D-Link and its U.S. subsidiary,<br />
alleging that it used inadequate<br />
safeguards on its wireless routers<br />
and IP cameras that left them vulnerable<br />
to hackers.<br />
“Prospective penalties go beyond<br />
FTC threats, though,” Lindley<br />
warns. “A luxury hotel in Austria,<br />
the Romantik Seehotel Jaegerwirt,<br />
recently had to pay hackers a ransom<br />
after they managed to access<br />
its electronic key system and lock all<br />
the hotel guests in their rooms. Approximately<br />
180 people were staying<br />
at the hotel on that day. Many<br />
were locked in their rooms, while<br />
others were locked out of theirs. The<br />
hackers demanded €1,500, about<br />
$1,600. The hotel decided to pay, explaining<br />
that they felt that they had<br />
no other choice, especially because<br />
neither police nor insurance could<br />
help them.”<br />
Adding to the problem, states<br />
Lindley, is that Wiegand, the industry<br />
standard over-the-air protocol<br />
commonly used to communicate<br />
credential data from a card to an<br />
27<br />
electronic<br />
access<br />
reader, is<br />
no longer<br />
inherently<br />
s e c u r e<br />
due to its<br />
original<br />
obscure<br />
and non-standard nature.<br />
For this reason, Farpointe has introduced<br />
features such as potting all<br />
readers and options that can be added<br />
to the readers. The first is MAX-<br />
Secure, which provides a higher-security<br />
handshake, or code, between<br />
the proximity or smart card, tag and<br />
reader to help ensure that readers<br />
will only accept information from<br />
specially coded credentials. The second<br />
is Valid ID, a new anti-tamper<br />
feature available with contactless<br />
smartcard readers, cards and tags.<br />
It can add an additional layer of<br />
authentication assurance to NXP’s<br />
MIFARE DESFire EV1 smartcard<br />
platform, operating independently,<br />
in addition to, and above the significant<br />
standard level of security that<br />
DESFire EV1 delivers. Valid ID lets<br />
More on page 40
Varex Imaging completes separation from Varian<br />
Medical Systems, Lists on Nasdaq Stock Market<br />
SALT LAKE CITY, UT – January 30,<br />
<strong>2017</strong> – Varex Imaging Corporation<br />
(Nasdaq: VREX) today announced<br />
that its spin-off from Varian Medical<br />
Systems (NYSE: VAR) has been<br />
successfully completed. The common<br />
stock of Varex Imaging, a new<br />
independent public company, will<br />
begin trading “regular way” today<br />
on the Nasdaq Global Select Market<br />
under the ticker symbol “VREX”.<br />
Under the terms of the previously<br />
announced separation, Varian<br />
stockholders received 0.4 of a share<br />
of Varex stock for every one share of<br />
Varian stock they held as of the record<br />
date of January 20, <strong>2017</strong>. Varex<br />
shares were distributed at 12:01 am<br />
Pacific Time on January 28, <strong>2017</strong> in<br />
a distribution that is intended to be<br />
tax-free for U.S. federal income tax<br />
purposes. Varex has approximately<br />
38 million shares outstanding.<br />
In connection with the separation,<br />
Varex made a $200 million cash payment<br />
to Varian. Varex funded this<br />
payment and related expenses from<br />
its $300 million revolving credit facility.<br />
The balance of undrawn funds<br />
remain available to fund working<br />
capital needs and other general corporate<br />
purposes.<br />
Varex Imaging Corporation is the world’s largest independent supplier of medical X-ray tubes<br />
and image processing solutions.<br />
28<br />
“The past few months have been<br />
very busy as we prepared for the<br />
spin-off of Varex Imaging and also<br />
announced the planned acquisition<br />
of the Medical Imaging business of<br />
PerkinElmer,” said Sunny Sanyal,<br />
President and Chief Executive Officer<br />
of Varex Imaging. “Much of our<br />
time recently has been filled with<br />
meetings, calls and roadshow presentations<br />
with the investor and analyst<br />
community. Overall, the past<br />
year has been an exciting time for us<br />
and I want to thank all the people<br />
at Varian and Varex who devoted so<br />
much time and effort to make the<br />
separation a success,” Sanyal added.<br />
Varex Management<br />
The new President and Chief Executive<br />
Officer of Varex Imaging is<br />
Sunny Sanyal (previously President<br />
of the Varian Imaging Components<br />
business). The new Chief Financial<br />
Officer is Clarence Verhoef (previously<br />
Varian Corporate Controller).<br />
The new General Counsel and<br />
Corporate Secretary is Kim Honeysett<br />
(previously Vice President and<br />
Assistant General Counsel and Assistant<br />
Corporate Secretary for Varian).
Varex Board Members<br />
• Dr. Ruediger Naumann-Etienne<br />
is Chairman of the Board of Varex<br />
Imaging Corporation. He has<br />
been the Owner and Managing<br />
Director of Intertec Group, an in<br />
vestment company specializing in<br />
the medical device field, since<br />
1989.<br />
• Sunny Sanyal is Varex’s President<br />
and Chief Executive Officer.<br />
• Christine A. Tsingos has been<br />
the Chief Financial Officer of<br />
Bio-Rad Laboratories, Inc. a<br />
global provider of life science<br />
research and clinical diagnostic<br />
products, since 2002.<br />
• Dow R. Wilson is President and<br />
Chief Executive Officer of Varian<br />
Medical Systems.<br />
• Dr. Erich R. Reinhardt is<br />
currently the Chairman of the<br />
Board of Medical Valley<br />
Europaische Metropol Region in<br />
Nürnberg in Germany. Previously,<br />
he was President and Chief<br />
Executive Officer of Siemens<br />
Healthcare (formerly<br />
Siemens Medical Solutions).<br />
• Jay K. Kunkel is Senior Vice<br />
President and President, Asia-<br />
Pacific Operations of Leer<br />
Corporation. He has extensive<br />
experience in Asia that includes<br />
his current role and previous<br />
senior management positions<br />
with Continental A.G. and SRP<br />
International Group Ltd.<br />
Additional information about Varex’s<br />
management, board of directors<br />
and corporate governance can be accessed<br />
via the Investors section of the<br />
company’s website at www.vareximaging.com.<br />
As previously disclosed, Varex expects<br />
revenues for fiscal year <strong>2017</strong><br />
to grow by 3-4 percent over the approximately<br />
$620 million recorded<br />
for fiscal year 2016 as set forth in the<br />
company’s Form 10 filing with the<br />
SEC. Assuming approximately 38<br />
million shares outstanding and a 35<br />
percent tax rate, Varex anticipates<br />
that GAAP net earnings per diluted<br />
share for the second through the<br />
fourth quarters of fiscal year <strong>2017</strong><br />
will be in the range of $1.20 to $1.30.<br />
Going forward Varex will provide<br />
annual guidance.<br />
Varex intends to file a 10-Q for<br />
the first quarter of fiscal year <strong>2017</strong><br />
approximately at the end of <strong>February</strong><br />
<strong>2017</strong>. Prior to the filing of Varex’s<br />
10-Q, Varian is expected to file<br />
financial information related to the<br />
discontinued operations of its Imaging<br />
Components business that is<br />
not anticipated to be comparable to<br />
the financial information included<br />
in Varex’s Form 10.<br />
J.P. Morgan Securities LLC and<br />
Wachtell, Lipton, Rosen & Katz acted<br />
as the respective financial and legal<br />
advisors in connection with the<br />
separation.<br />
29<br />
About Varex Imaging<br />
Varex Imaging Corporation is a<br />
leading innovator, designer and<br />
manufacturer of X-ray imaging<br />
components, which include tubes,<br />
digital flat panel detectors and other<br />
image processing solutions, which<br />
are key components of X-ray imaging<br />
systems. Varex’s components are<br />
used in medical imaging as well as<br />
in industrial and security imaging<br />
applications. With a 65+ year history<br />
of successful innovation, global<br />
OEM manufacturers of X-ray imaging<br />
system use the company’s X-ray<br />
sources, digital detectors, connecting<br />
devices and imaging software<br />
as components in their systems to<br />
detect, diagnose and protect. Varex<br />
employs approximately 1,400 people<br />
located at manufacturing and<br />
service center sites in North America,<br />
Europe, and Asia. For more information<br />
about Varex, visit www.<br />
vareximaging.com.<br />
Varex Imaging Corporation is the<br />
world’s largest independent supplier<br />
of medical X-ray tubes and image<br />
processing solutions. From medical<br />
imaging, to cargo screening and<br />
border security, our components are<br />
used by X-ray imaging system manufacturers<br />
everywhere to detect, diagnose,<br />
and protect.
Hot Topics: More opinions on Immigration<br />
New memos reveal harsh and unforgiving immigration road<br />
map, taking nation backwards in guaranteeing due process and<br />
providing safe havens, as Department of Homeland <strong>Security</strong><br />
implements President Trump’s immigration Executive Orders<br />
By Beth Werlin<br />
The White House released the<br />
implementation memos and other<br />
information on Monday about<br />
how the Department of Homeland<br />
<strong>Security</strong> (DHS) will begin<br />
implementing President Trump’s<br />
immigration Executive Orders<br />
on border security and immigration<br />
enforcement. The memos<br />
reveal that DHS intends to take<br />
our nation backwards in terms of<br />
guaranteeing due process, providing<br />
a safe haven for those who<br />
need it, and building productive<br />
and safe communities where everyone<br />
can thrive.<br />
What is in the memos?<br />
An end to long-standing protections<br />
for children. DHS intends<br />
to strip many children<br />
arriving alone at our border of<br />
basic protections and to penalize<br />
their parents for seeking to<br />
reunite with their children in<br />
the United States. They will do<br />
this by narrowing<br />
the definition<br />
of “unaccompanied<br />
alien child”<br />
in order to limit<br />
those protections<br />
and by launching<br />
either civil or<br />
criminal enforcement<br />
against the<br />
parents. This will<br />
result not only in scaring parents<br />
from coming forward to reunite<br />
with their children but also lead<br />
to more young children representing<br />
themselves in immigration<br />
court against a seasoned<br />
government attorney.<br />
A massive expansion of detention.<br />
The memos contemplate<br />
a massive expansion of detention,<br />
including a requirement<br />
that DHS officers detain nearly<br />
everyone they apprehend at or<br />
near the border. This detention<br />
space expansion—a boon to the<br />
private prison industry—means<br />
30<br />
Photo: Chucky Eager<br />
that more children, families and<br />
other vulnerable groups seeking<br />
protection in the United States<br />
will end up detained, at great financial<br />
and human cost.<br />
Prosecution priorities and discretion<br />
are gone. The new memos<br />
rescind earlier policies on<br />
whom to prosecute and deport<br />
and whom to deprioritize because<br />
they pose no threat to our<br />
communities. The new enforcement<br />
priorities are extremely<br />
broad covering nearly all undocumented<br />
individuals in the<br />
More on page 42
Supreme Court hears case on shooting of 15-year<br />
old Sergio Hernandez by U.S. Border Patrol Agent<br />
By Walter Ewing<br />
Officers with U.S. Customs and Border<br />
Protection (CBP)—the federal<br />
agency which includes the Border<br />
Patrol—are rarely held accountable<br />
for their actions. Nowhere is this<br />
more apparent than in the case of<br />
Sergio Hernandez, a 15-year-old<br />
boy shot dead in 2010 in Mexico by<br />
a Border Patrol agent who fired on<br />
him from the U.S. side of the border.<br />
The agent in question has never<br />
faced criminal charges for the<br />
killing. The boy’s mother brought<br />
a civil suit against the agent for<br />
damages, and her case was argued<br />
before the Supreme Court on <strong>February</strong><br />
21.<br />
The central question before the<br />
Court is whether a federal court<br />
has the authority to consider a<br />
civil suit such as this. The Court<br />
will determine, then, whether the<br />
agent must stand trial to account<br />
for his deadly conduct. But this case<br />
will have ramifications well beyond<br />
the actions of one Border Patrol<br />
agent because his actions represent<br />
a systemic lack of accountability<br />
within CBP.<br />
Rather than fix the system, the<br />
Trump administration is proposing<br />
to throw gasoline on the fire; adding<br />
thousands of new CBP officers to<br />
the mix without doing anything to<br />
ensure that the rights of the people<br />
whom CBP encounters are respected.<br />
The results could well prove fatal<br />
to more immigrants, regardless of<br />
which side of the border they find<br />
themselves on.<br />
The Hernandez case is egregious<br />
in a number of ways. According to<br />
the brief filed by his family, Sergio<br />
was playing with two friends just<br />
over the border from El Paso in<br />
Juarez. As is common among the<br />
children of Juarez, Sergio and his<br />
companions were running up the<br />
31<br />
side of a concrete culvert and touching<br />
that 18-foot-high border fence<br />
before running back down. Since<br />
they were playing and not trying to<br />
enter the United States, they did this<br />
in plain view of the Paso del Norte<br />
Port of Entry.<br />
Needless to say, they were unarmed.<br />
Nevertheless, a Border Patrol<br />
agent named Jesus Mesa took<br />
exception to this behavior and<br />
grabbed one of the boys as they ran<br />
back down the culvert. Mesa then<br />
drew his weapon and fired down<br />
into the culvert, hitting Sergio in<br />
the head. Mesa claimed that Sergio<br />
was throwing rocks at him.<br />
Because Sergio was standing in<br />
Mexico when Mesa killed him, the<br />
U.S. government is claiming that<br />
Mesa cannot be sued for violating<br />
Sergio’s rights.<br />
If the Supreme Court sides with<br />
Photo: Pete Jordan<br />
Mesa in this case, it is tantamount<br />
to declaring open season on anyone<br />
standing on the wrong side of<br />
the U.S.-Mexico borderline. Then<br />
again, it was already a declaration<br />
of open season when no criminal<br />
charges were filed against Mesa. In<br />
More on page 44
Hot Topics: More opinions on Immigration<br />
Abandoning priorities will make immigration<br />
enforcement work much harder<br />
Photo: t3hWIT<br />
By Mary Giovagnoli<br />
The Trump administration ensured<br />
this week that its immigration<br />
enforcement policies will be<br />
a chaotic affair marked by mistakes,<br />
civil rights violations and<br />
overzealous enforcement. They<br />
did this by outlining measures<br />
that they claim simply return<br />
power to immigration agents to<br />
do their jobs—measures such as<br />
authorizing the hiring of thousands<br />
more border and interior<br />
enforcement officers, eliminating<br />
targeted priorities for removal,<br />
and creating an aggressive<br />
plan to deputize local law<br />
enforcement.<br />
Significantly,<br />
the administration also rescinded<br />
virtually all guidance on the<br />
use of prosecutorial discretion.<br />
In the short-term, this dramatic<br />
rescission of guidance leaves<br />
officers with no framework for<br />
decision-making, except the<br />
vague idea that their mission is<br />
to deport as many unauthorized<br />
immigrants as possible. In the<br />
long-term, it turns the authority<br />
to arrest, detain, and deport individuals<br />
into a type of unchecked<br />
power that once unleashed is<br />
hard to pull back and is bound to<br />
create chaos.<br />
One of the defining measures<br />
of the Obama administration’s<br />
Priority Enforcement Program<br />
was discretion. Over the<br />
years, officers were given<br />
a set of enforcement priorities<br />
that emphasized<br />
the removal of persons<br />
convicted of serious<br />
crimes, or who were national<br />
security threats,<br />
or who had recently<br />
crossed the border. The<br />
memos categorized enforcement<br />
priorities not to<br />
32<br />
keep officers from doing their<br />
job, but to ensure that officers<br />
had guidance that gave them a<br />
framework for using their resources<br />
and making good choices<br />
about individual cases based<br />
on more than just the authority<br />
to arrest and detain someone.<br />
The November 2014 memos<br />
issued by former Secretary Jeh<br />
Johnson emphasized that even<br />
within these priority categories<br />
there were reasons why an individual<br />
case might merit a decision<br />
to decline to prosecute.<br />
These memos and others emphasized<br />
the favorable exercise of<br />
discretion—in other words, the<br />
need to triage cases, starting first<br />
with the nature of the violation<br />
(is this person a convicted killer<br />
or a jaywalker?) and then walking<br />
progressively through other factors<br />
such as whether this person<br />
was a victim of domestic abuse,<br />
or an asylum seeker, or had U.S.<br />
citizen children. The goal was<br />
to ensure that limited resources<br />
were used to remove those who<br />
posed a threat to safety or securi-<br />
More on page 42
“Expedited removal” of noncitizens called for<br />
in President’s January 25 executive order<br />
President Trump’s January<br />
25, <strong>2017</strong>, executive<br />
order directs the Department<br />
of Homeland <strong>Security</strong><br />
(DHS) to dramatically<br />
expand the use of<br />
“expedited removal.” Created<br />
in 1996, expedited<br />
removal is a process by<br />
which low-level immigration<br />
officers can quickly<br />
deport certain noncitizens<br />
who are undocumented or<br />
have committed fraud or misrepresentation.<br />
Since 2004, immigration<br />
officials have used expedited removal<br />
to deport individuals who arrive<br />
at our border, as well as individuals<br />
who entered without authorization<br />
if they are apprehended within<br />
two weeks of arrival and within 100<br />
miles of the Canadian or Mexican<br />
border.<br />
One of the major problems with<br />
expedited removal is that the immigration<br />
officer making the decision<br />
virtually has unchecked authority.<br />
Individuals subject to expedited<br />
removal rarely see the inside of a<br />
courtroom because they are not afforded<br />
a regular immigration court<br />
hearing before a judge. In essence,<br />
the immigration officer serves both<br />
as prosecutor and judge. Further,<br />
given the speed at which the process<br />
takes place, there is rarely an opportunity<br />
to collect evidence or consult<br />
with an attorney, family member, or<br />
friend before the decision is made.<br />
Such a truncated process means<br />
there is a greater chance that persons<br />
are being erroneously deported<br />
from the United States, potentially<br />
to imminent harm or death. Moreover,<br />
individuals who otherwise<br />
might qualify for deportation relief<br />
if they could defend themselves<br />
in immigration court are unjustly<br />
deprived of any opportunity to do<br />
so. Yet expedited removal has been<br />
33<br />
increasingly applied in<br />
recent years; 44 percent<br />
of all removals from the<br />
United States were conducted<br />
through expedited<br />
removal in Fiscal Year<br />
(FY) 2013, the most recent<br />
government data available.<br />
A dramatic expansion,<br />
as directed by President<br />
Trump, might result<br />
in thousands of additional<br />
deportations without due process.<br />
What the Law Says<br />
“Expedited removal” refers to the<br />
legal authority given to even lowlevel<br />
immigration officers to order<br />
the deportation of some non-U.S.<br />
citizens without any of the dueprocess<br />
protections granted to most<br />
other people—such as the right to<br />
an attorney and to a hearing before<br />
a judge. The Illegal Immigration<br />
and Immigrant Responsibility Act<br />
of 1996 created expedited removal,<br />
but the federal government subsequently<br />
expanded it significantly.<br />
As it now stands, immigration officers<br />
can summarily order the removal<br />
of nearly any foreign national
Hot Topics: More opinions on Immigration<br />
who arrives at the border without<br />
proper documents; additionally, undocumented<br />
immigrants who have<br />
been in the United States 14 days or<br />
less since entering without inspection<br />
are subject to expedited removal<br />
if an immigration officer encounters<br />
them within 100 miles of the<br />
U.S. border with either Mexico or<br />
Canada. As a general rule, however,<br />
DHS applies expedited removal to<br />
only those Mexican and Canadian<br />
nationals with histories of criminal<br />
or immigration violations, as well as<br />
persons from other countries who<br />
are transiting through Mexico or<br />
Canada. There is no right to appeal<br />
an immigration officer’s decision to<br />
deport someone via expedited removal.<br />
Individuals in expedited removal<br />
are detained until removed.<br />
By law, expedited removal may<br />
not be applied to certain individuals.<br />
U.S. citizens or lawful permanent<br />
residents (LPRs, or “green<br />
card” holders) should not be subject<br />
to expedited removal. Nor should<br />
it be used against refugees, asylees,<br />
or asylum seekers (people who fear<br />
persecution in their home countries<br />
or indicate an intention to apply for<br />
asylum).<br />
Asylum seekers are instead referred<br />
to an asylum officer for an<br />
interview to determine if they have<br />
a “credible fear” of persecution. If<br />
an individual has been previously<br />
deported, an asylum officer determines<br />
if the person has a “reasonable<br />
fear” of persecution—a higher<br />
standard than “credible fear.” If the<br />
asylum officer fails to find that the<br />
person has a credible or reasonable<br />
fear of return, that person is ordered<br />
removed. Before deportation, the<br />
individual may challenge the asylum<br />
officer’s adverse finding by requesting<br />
a hearing before an immigration<br />
judge, who must review the<br />
case “to the maximum extent practicable<br />
within 24 hours, but in no<br />
case later than 7 days….” The judge’s<br />
review is limited solely to assessing<br />
whether the individual’s fear is credible<br />
or reasonable.<br />
Individuals found to have a credible<br />
or reasonable fear of persecution<br />
are detained pending further<br />
review of their asylum case. In limited<br />
circumstances, these individuals<br />
may be paroled—that is, released<br />
from detention—and permitted to<br />
remain in the United States while<br />
their asylum case is pending.<br />
Until January <strong>2017</strong>, an exception<br />
to expedited removal had been<br />
made for “an alien who is a native<br />
or citizen of a country in the Western<br />
Hemisphere with whose government<br />
the United States does not<br />
have full diplomatic relations and<br />
who arrives by aircraft at a port of<br />
34<br />
entry.” Cubans arriving by aircraft<br />
had been exempted from expedited<br />
removal under this provision, but in<br />
the closing days of the Obama administration,<br />
DHS published a regulation<br />
eliminating Cuban nationals<br />
from the exemption.<br />
Use of Expedited Removal<br />
Is on the Rise<br />
The use of expedited removal to deport<br />
people has risen substantially<br />
over the past two decades. In FY<br />
2013, approximately 193,000 persons<br />
were deported from the United<br />
States through expedited removal.<br />
That represents 44 percent of all<br />
438,000 removals from the United<br />
States in 2013<br />
CONCERNS ABOUT<br />
EXPEDITED REMOVAL<br />
Erroneous Deportations<br />
There are few checks on the authority<br />
of immigration officers to place<br />
non-citizens in expedited removal<br />
proceedings. In essence, the law<br />
permits the immigration officer to<br />
serve both as prosecutor (charged<br />
with enforcing the law) and judge<br />
(rendering a final decision on the<br />
case). Generally, the entire process<br />
consists of an interview with the inspecting<br />
officer, so there is little or<br />
no opportunity to consult with an<br />
attorney or to gather any evidence
that might prevent deportation. For<br />
those who are traumatized from<br />
their journey or harm they fled,<br />
the short timelines can make it extremely<br />
difficult to clearly explain<br />
why they need protection in the<br />
United States.<br />
The abbreviated process increases<br />
the likelihood that a person who is<br />
not supposed to be subject to expedited<br />
removal—such as a U.S. citizen<br />
or LPR—will be erroneously removed.<br />
Moreover, individuals who<br />
otherwise would be eligible to make<br />
a claim for “relief from removal”<br />
(to argue they should be permitted<br />
to stay in the United States) may be<br />
unjustly deprived of any opportunity<br />
to pursue relief. For example, a<br />
witness or victim of a crime might<br />
be eligible for status but is prohibited<br />
from making such a claim in<br />
expedited removal proceedings.<br />
Inadequate Protection<br />
of Asylum Seekers<br />
In practice, not all persons expressing<br />
a fear of persecution if returned<br />
to their home countries are provided<br />
a credible or reasonable fear screening.<br />
Studies by the U.S. Commission<br />
on International Religious Freedom<br />
(USCIRF) noted that, in some cases,<br />
immigration officers pressured<br />
individuals expressing fear into<br />
withdrawing their application for<br />
admission—and thus their request<br />
for asylum—despite DHS policies<br />
forbidding the practice. In other<br />
cases, government officers failed to<br />
ask if the arriving individual feared<br />
return. In addition, the Commission<br />
found that the government did<br />
not have sufficient quality assurance<br />
mechanisms in place to ensure that<br />
asylum seekers were not improperly<br />
being turned back.<br />
A Growing Backlog of<br />
Asylum Applications<br />
Individuals expressing fear of return<br />
who are diverted from expedited<br />
removal are referred to asylum officers<br />
for screening. These officers<br />
are often the same corps handling<br />
affirmative asylum applications (i.e.,<br />
cases filed by individuals not in removal<br />
proceedings). Since these<br />
asylum seekers are detained pending<br />
completion of the credible or<br />
reasonable fear process, their cases<br />
are prioritized by the government.<br />
Asylum Office resources are therefore<br />
diverted to these interviews,<br />
contributing to the backlog of affirmative<br />
asylum cases.<br />
Further expansion of expedited<br />
removal will require significantly<br />
more asylum officers, or the backlog<br />
of affirmative asylum cases will<br />
continue to grow. This workload<br />
management crisis could be avoided<br />
35<br />
entirely if DHS personnel placed all<br />
asylum seekers apprehended at the<br />
border in regular immigration court<br />
proceedings and paroled them<br />
pending their hearings. Providing<br />
the immigration court system with<br />
enough funds to sufficiently staff<br />
immigration judge teams would<br />
help ensure that asylum seekers get<br />
a prompt court hearing.<br />
FREE SUBSCRIPTION<br />
SIGN-UP<br />
Monthly <strong>Digital</strong> <strong>Edition</strong><br />
Airport/Seaport <strong>News</strong>letter<br />
Daily Insider <strong>News</strong>letter<br />
Cybersecurity <strong>News</strong>letter<br />
CLICK HERE
Expansion of DMARC is critical to reducing spread of<br />
malicious emails, says Global Cyber Alliance, calling on<br />
leading Cyber companies to improve email protections<br />
SAN FRANCISCO, CA – <strong>February</strong><br />
14, <strong>2017</strong> – There is a fix that can prevent<br />
a great amount of email-born<br />
attacks on consumers and businesses.<br />
Unfortunately, the vast majority<br />
of public and private organizations<br />
globally, including leading<br />
cybersecurity companies, have not<br />
deployed DMARC (Domain-based<br />
Message Authentication, Reporting<br />
& Conformance) to prevent<br />
spammers and phishers from<br />
using an organization’s name to<br />
conduct cyber attacks, according<br />
to new research from the Global<br />
Cyber Alliance (GCA).<br />
DMARC provides insight into<br />
any attempts to spam, phish or<br />
spear-phish using an organization’s<br />
brand or name. DMARC is supported<br />
by 85 percent of consumer<br />
email inboxes in the United States<br />
(including Gmail, Yahoo, Microsoft,<br />
etc.) and more than 2.5 billion<br />
email inboxes worldwide. However,<br />
DMARC adoption rates among enterprises<br />
and government remains<br />
low.<br />
The UK <strong>Government</strong>’s guidance<br />
for government agencies directs<br />
them to implement DMARC but<br />
as of December 2016 only five percent<br />
of UK public sector domains<br />
had done so. A mere 16 percent of<br />
the healthcare sector has adopted<br />
DMARC.<br />
The latest research from GCA, an<br />
international cross-sector organization<br />
dedicated to confronting systemic<br />
cyber risk, finds that adoption<br />
remains low in the cybersecurity industry<br />
as well.<br />
Only 15 percent of the 587 email<br />
domains (that were scanned) for<br />
companies exhibiting at the RSA<br />
Conference -- one of the world’s<br />
largest gatherings of cybersecurity<br />
experts -- use DMARC. Of the<br />
90 RSA exhibiting organizations<br />
that do use DMARC, more than<br />
66 percent use the DMARC policy<br />
of “none,” which only monitors for<br />
email domains, greatly reducing the<br />
effectiveness of DMARC.<br />
36<br />
It is time for the cybersecurity industry<br />
to lead the charge and push<br />
for DMARC use across the globe.<br />
GCA strongly advocates that organizations<br />
implement DMARC and<br />
has developed a free DMARC Setup<br />
Guide to make DMARC implementation<br />
easier (https://dmarc.globalcyberalliance.org/).<br />
The value of correctly implementing<br />
DMARC is clear as studiesiii<br />
have shown that organizations<br />
that use DMARC correctly receive<br />
just 23 percent of the email<br />
threats that those who do not<br />
use DMARC.<br />
“As world leaders in cybersecurity,<br />
we can do better. DMARC protects<br />
brands and preserves consumer<br />
confidence. While no security effort<br />
is cost-free, clear guidance and<br />
tools, such as the GCA DMARC<br />
Setup Guide, make DMARC implementation<br />
practical, and the benefits<br />
are considerable. DMARC is<br />
one of the cybersecurity protocols<br />
that can broadly reduce risk, and the<br />
more it is implemented, the more<br />
protection if offers for everyone,”<br />
said Philip Reitinger, President and
CEO of GCA. “I’m placing a stake<br />
in the ground and calling on the<br />
cybersecurity industry to lead the<br />
adoption of DMARC, with a goal<br />
that 50 percent of the companies<br />
that exhibit at the 2018 RSA Conference<br />
implement DMARC prior<br />
to the conference, and that 90 percent<br />
implement prior to the 2019<br />
RSA Conference. Working together<br />
the cybersecurity industry can be a<br />
role model and make a difference.”<br />
About The Global Cyber Alliance<br />
The Global Cyber Alliance (GCA)<br />
is an international, cross-sector effort<br />
dedicated to confronting cyber<br />
risk and improving our connected<br />
world. It is a catalyst to bring communities<br />
of interest and affiliations<br />
together in an environment that<br />
sparks innovation with concrete,<br />
measureable achievements. While<br />
most efforts at addressing cyber risk<br />
have been industry, sector, or geographically<br />
specific, GCA partners<br />
across borders and sectors. GCA’s<br />
mantra “Do Something. Measure It.”<br />
is a direct reflection of its mission to<br />
eradicate systemic cyber risks.<br />
GCA, a 501(c)3, was founded in<br />
September 2015 by the Manhattan<br />
District Attorney’s Office, the City<br />
of London Police and the Center<br />
for Internet <strong>Security</strong>. Learn more at<br />
www.globalcyberalliance.org.<br />
Milestone release, enabling<br />
record-breaking performance for<br />
XProtect users, delivers highest<br />
performing VMS ever, complete with<br />
new Cybersecurity focus.<br />
COPENHAGEN – <strong>February</strong> 15,<br />
<strong>2017</strong> – Milestone Systems, the open<br />
platform company in networked<br />
video management software (VMS),<br />
has released XProtect <strong>2017</strong> R1.<br />
Milestone is committed to delivering<br />
three VMS product releases every<br />
year, in addition to bi-monthly<br />
device pack releases supporting<br />
third-party devices. This frequent<br />
release schedule will ensure Milestone’s<br />
rapid response to market and<br />
Milestone community needs.<br />
Highest VMS Performance<br />
Thanks to the true open platform<br />
technology in XProtect, Milestone<br />
can rapidly respond to community<br />
needs and enable cost-efficiency in<br />
large installations. For XProtect,<br />
this entails a recording server performance<br />
of 3.1 Gigabit/S. This high<br />
performance level enables Milestone<br />
community partners to offer<br />
large solutions using a reduced<br />
number of servers, or even smaller<br />
servers. This contributes to hardware<br />
costs savings and a simplified<br />
37<br />
infrastructure. In short, it significantly<br />
reduces the total cost of a<br />
Milestone solution.<br />
Pioneering Hardware Acceleration<br />
In the latest XProtect releases, Milestone<br />
has harvested the advantages<br />
of the close<br />
relationships<br />
with Intel and<br />
Microsoft by<br />
implementing<br />
hardware acceleration.<br />
The<br />
processor-intensive<br />
task of<br />
decoding (rendering)<br />
video is<br />
offloaded to the<br />
Bjorn Skou Eilertsen<br />
CTO<br />
dedicated graphics system (GPU)<br />
inside the processer, leaving the<br />
main processor free to take on other<br />
tasks. The GPU is optimized to handle<br />
computer graphics and video,<br />
meaning these tasks will be greatly<br />
accelerated. Using the technology in<br />
servers can save even more expen-<br />
More on page 43
Facial biometric boarding solution by<br />
Vision Box being tried at Schipol Airport<br />
AMSTERDAM, <strong>February</strong> 10th,<br />
<strong>2017</strong> – Boarding quickly and easily<br />
without showing your boarding<br />
pass or passport is the goal of the<br />
biometric boarding trial in operation<br />
at Schiphol Airport. Involving<br />
KLM, the three-month initiative<br />
intends to test facial recognition to<br />
expedite and speed up passenger<br />
boarding, recognizing them by their<br />
face.<br />
At a specially selected gate at the<br />
airport, a dedicated kiosk was made<br />
available for passengers to register<br />
for the trial, by scanning their passport<br />
and their boarding pass, as well<br />
as enroll their face image. This will<br />
allow them to quickly go through a<br />
biometric eGate simply looking at a<br />
camera, without showing any document.<br />
Vision-Box and Schiphol have<br />
been working together in the scope<br />
of the recently announced framework<br />
agreement, developing innovations<br />
and creating smart ways of<br />
improving ease of travel, speed, and<br />
airport processes. As the airport<br />
aims to become “Leading <strong>Digital</strong><br />
Airport” in 2018, Vision-Box was<br />
the partner allowing one further<br />
step in that direction.<br />
It is expected that after the trial,<br />
biometric boarding will roll out to<br />
more boarding gates at the airport.<br />
About Vision-Box<br />
Founded in 2001, Vision-Box is<br />
the leading provider of electronic<br />
identity solutions, intelligent security<br />
management, and automated<br />
border control systems that use<br />
ICAO- compliant standards.<br />
The biometric border control<br />
portfolio aimed at airports, airlines<br />
and immigration authorities, includes<br />
solutions addressing a variety<br />
of business scenarios which englobe<br />
38<br />
security check-points, self-boarding<br />
gates and automated border control<br />
gates.<br />
Every second, millions of images<br />
are being captured and processed<br />
by Vision-Box systems, installed<br />
right at the heart of the most prestigious<br />
organizations, who trust our<br />
biometric identity and digital video<br />
management solutions for their<br />
critical applications.<br />
Covering the entire ID management<br />
life cycle, Vision-Box also<br />
delivers, to governments and issuing<br />
authorities, solutions ranging<br />
from live biometric enrollment stations,<br />
document verification kiosks<br />
and digital document dispensers.<br />
Starting with the process of identity<br />
enrollment, covering the life cycle<br />
of a biometric identity document<br />
and finally assuring its verification<br />
and identification towards the user,<br />
Vision-Box’s product portfolio is<br />
linked together through a powerful<br />
service platform, which orchestrates<br />
the trusted chain of identity of the<br />
citizen. Vision-Box’s solution portfolio<br />
enables the implementation<br />
of advanced border management<br />
systems, integrated with advanced<br />
More on page 43
Statement from Secretary Kelly on recent<br />
ICE enforcement actions<br />
WASHINGTON, DC – <strong>February</strong><br />
14 – Last week, U.S. Immigration<br />
and Customs Enforcement (ICE)<br />
launched a series of targeted enforcement<br />
operations across the<br />
country. These operations targeted<br />
public safety threats, such as convicted<br />
criminal aliens and gang<br />
members, as well as individuals who<br />
have violated our nation’s immigration<br />
laws, including those who illegally<br />
re-entered the country after<br />
being removed and immigration fugitives<br />
ordered removed by federal<br />
immigration judges.<br />
ICE officers in the Los Angeles,<br />
Chicago, Atlanta, San Antonio and<br />
New York City areas of responsibility<br />
arrested more than 680 individuals<br />
who pose a threat to public safety,<br />
border security or the integrity<br />
of our nation’s immigration system.<br />
Of those arrested, approximately 75<br />
percent were criminal aliens, convicted<br />
of crimes including, but not<br />
limited to, homicide, aggravated<br />
sexual abuse, sexual assault of a minor,<br />
lewd and lascivious acts with<br />
a child, indecent liberties with a<br />
minor, drug trafficking, battery, assault,<br />
DUI and weapons charges.<br />
ICE conducts these kind of targeted<br />
enforcement operations regularly<br />
and has for many years. The focus<br />
of these enforcement operations is<br />
consistent with the routine, targeted<br />
arrests carried out by ICE’s Fugitive<br />
Operations teams on a daily basis.<br />
President Trump has been clear<br />
in affirming the critical mission of<br />
DHS in protecting the nation and<br />
directed our Department to focus<br />
on removing illegal aliens who have<br />
violated our immigration laws, with<br />
a specific focus on those who pose<br />
a threat to public safety, have been<br />
charged with criminal offenses,<br />
have committed immigration violations<br />
or have been deported and reentered<br />
the country illegally.<br />
I commend the heroic efforts of<br />
the dedicated officers of ICE’s Office<br />
of Enforcement and Removal<br />
Operations and those who provided<br />
assistance from ICE Homeland <strong>Security</strong><br />
Investigations, the U.S. Marshals<br />
Service, as well as cooperating<br />
state and local law enforcement<br />
agencies. These professionals put<br />
their lives on the line to protect our<br />
communities and country. There is<br />
no greater calling than to serve and<br />
protect our nation – a mission that<br />
the men and women of ICE perform<br />
39<br />
with professionalism and courage<br />
every single day.<br />
Fact Sheets<br />
• 190 arrested in Georgia, the<br />
Carolinas, during ICE operation<br />
targeting criminal aliens, illegal<br />
re-entrants and immigration<br />
fugitives<br />
• 235 arrested in six Midwestern<br />
states during ICE operation<br />
targeting criminal aliens, illegal<br />
re-entrants, and immigration<br />
fugitives<br />
• ICE arrests 161 in Los Angelesarea<br />
operation targeting criminal<br />
aliens, illegal re-entrants, and<br />
immigration fugitives<br />
• 41 arrested in New York-area ICE<br />
operation targeting criminal<br />
aliens, illegal re-entrants, and<br />
immigration fugitives<br />
• 28 arrested in San Antonio-area<br />
ICE operation targeting criminal<br />
aliens, illegal re-entrants, and<br />
immigration fugitives<br />
ICE Fugitive Enforcement Operations
Cyberbit’s EDR Platform to help<br />
Infor detect Malware that bypasses<br />
antivirus<br />
Continued from page 4<br />
how Cyberbit maximizes protection<br />
against today’s signature-less<br />
threats, visit www.cyberbit.net.<br />
About Infor<br />
Infor builds business software for<br />
specific industries in the cloud.<br />
With 15,000 employees and over<br />
90,000 customers in more than 170<br />
countries, Infor software is designed<br />
for progress. To learn more about Infor,<br />
please visit www.infor.com.<br />
Farpointe warns access control<br />
channel to suggest customers add<br />
Anti-Hacking measures<br />
Continued from page 27<br />
a smartcard reader effectively help<br />
verify that the sensitive access control<br />
data programmed to a card or<br />
tag is not counterfeit.<br />
“With the increasing incidences<br />
of hacking throughout the world<br />
and the fact that the FTC is now reviewing<br />
such cyber security lapses<br />
should make channel partners providing<br />
access control products and<br />
systems take notice and suggest<br />
anti-hacking solutions to their customers,”<br />
Lindley argues.<br />
British air traffic control provider<br />
tabs Rohde & Schwarz<br />
Continued from page 16<br />
and sustainable air traffic control<br />
in line with the highest safety standards.<br />
Rohde & Schwarz is a proven<br />
provider on the market offering the<br />
ability to create virtual control centres.<br />
The electronics firm meets this<br />
challenge with the R&S VCS-4G IP<br />
based voice communications system.<br />
The fully VoIP-based system<br />
in line with the EUROCAE ED-137<br />
B standard features a distributed,<br />
redundant architecture. It will link<br />
the control centres in Swanwick<br />
and Prestwick and provide the geographic<br />
flexibility to manage their<br />
operations as one operational environment<br />
in the future.<br />
Rohde & Schwarz is participating<br />
in the World ATM Congress <strong>2017</strong><br />
in Madrid. From March 7 to 9, the<br />
company will showcase its comprehensive<br />
portfolio for state-of-the-art<br />
air traffic management at booth 586,<br />
hall 9. More information: https://atc.<br />
rohde-schwarz.com.<br />
About Rohde & Schwarz<br />
The Rohde & Schwarz electronics<br />
group is a leading supplier of solutions<br />
in the fields of test and measurement,<br />
broadcasting, secure<br />
communications, and radiomonitoring<br />
and radiolocation. Founded<br />
80 years ago, this independent global<br />
company has an extensive sales<br />
network and is present in more than<br />
40<br />
Law suits challenge “Muslim Ban”<br />
executive order<br />
Continued from page 10<br />
6-year-old Somali son is also in limbo.<br />
Ms. Ali, a U.S. citizen, began the<br />
process to bring him to the United<br />
States in August 2016. But they too<br />
now are left to worry that the visa<br />
process will remain suspended indefinitely.<br />
Like thousands before them, these<br />
plaintiffs have diligently pursued the<br />
rigorous immigrant visa process,<br />
which includes paying hundreds<br />
of dollars in filing fees, undergoing<br />
security screenings and medical examinations,<br />
and attending an interview<br />
before a consular officer.<br />
The arbitrary and unfair nature<br />
of the ban will be difficult to defend<br />
in court. There are multiple challenges<br />
afoot and likely many more<br />
to come as the President seeks to<br />
close America’s doors to the rest of<br />
the world.<br />
70 countries. It has around 9300 employees<br />
and achieved a net revenue<br />
of EUR 1.9 billion (USD 2.5 billion)<br />
in fiscal year 2012/2013 (July 2012<br />
through June 2013). The company is<br />
headquartered in Munich, Germany.<br />
R&S ® is a registered trademark<br />
of Rohde & Schwarz GmbH & Co.<br />
KG
AMICO <strong>Security</strong> Launches Next<br />
Generation ANC Composite Fence<br />
System<br />
Continued from page 17<br />
fence system is fire retardant and<br />
corrosion resistant. Laboratory testing<br />
of leakage current and flashover<br />
voltage shows the ANC fence system<br />
revealed no electrical conductivity<br />
for up to 650,000 volts.<br />
About AMICO <strong>Security</strong><br />
AMICO security is an industry<br />
leader in manufacturing medium<br />
to high security perimeter systems.<br />
AMICO has been in business<br />
for over 76 years and our patented<br />
proprietary systems protect infrastructure<br />
and boarders throughout<br />
the world. The new AMIGUARD<br />
perimeter system is the gold standard<br />
for perimeter protection and<br />
is rapidly becoming the number one<br />
choice for infrastructure protection<br />
worldwide.<br />
Federal Experts Agree that<br />
‘Internet of Things’ Demands<br />
Simple Baked-In <strong>Security</strong><br />
Continued from page 26<br />
becoming concerned with identity<br />
and maintaining a “chain of custody<br />
to the device, to the network, to the<br />
solution,” to ensure appropriate access.<br />
The cloud’s role<br />
in IoT development<br />
When it comes to application development<br />
incorporating mobility and<br />
IoT, panelists concurred that the<br />
cloud offers a means of shortcutting<br />
the process, with minimal risk to security.<br />
<strong>Government</strong> versions of the<br />
cloud are usually more secure than<br />
enterprise offerings, which allows<br />
people to focus on solving their<br />
problem, rather than on building<br />
out infrastructure, said Parikh.<br />
“When we talk about IoT and you<br />
say, ‘Yes, I’m going to build it from<br />
the sensor all the way up to the<br />
cloud and I’m going to have all that<br />
in my agency,’ good luck. We’ll see<br />
you in a couple of decades and you’ll<br />
be left behind,” Parikh noted.<br />
Padin agreed that the cloud offers<br />
a more practical environment<br />
for the coming wave of IoT applications.<br />
IoT sensors, Padin said,<br />
generate “tons of data,” and it isn’t<br />
“realistic” to house that data in an<br />
on-premise system.<br />
41<br />
What’s more, the data generated<br />
by IoT devices ties back to mobility,<br />
Padin said. “We have this great<br />
pool of data, what do we do with it?<br />
People want access to it in real-time,<br />
but how?” Mobility can provide active<br />
alerting to take action on data<br />
in real-time, extended to the mobile<br />
device. “All of this is interconnected,”<br />
he said. “It’s a system that needs<br />
to be thought about completely.”<br />
Despite concerns about security,<br />
panelists agreed that there is huge<br />
upside potential to IoT for government<br />
applications.<br />
“These are really quite exciting<br />
times,” said Dodson. “The changes<br />
we will see in this nation in the next<br />
10 years will really dwarf what we<br />
saw with the IT revolution.”<br />
BIO: Tom O’Keefe<br />
is a consultant with<br />
immixGroup, an<br />
Arrow company<br />
that helps technology<br />
companies<br />
do business with<br />
the government. Tom focuses on IT<br />
trends in civilian agencies, as well<br />
as the Internet of Things and mobility.<br />
He can be reached at Tomas_<br />
Okeefe@immixgroup.com, or connect<br />
with him on LinkedIn at www.<br />
linkedin.com/in/tmokeefe.
Abandoning priorities will make<br />
immigration enforcement work<br />
much harder<br />
Continued from page 32<br />
ty, or in the case of recent border<br />
crossers, whose unauthorized<br />
presence undermined efforts to<br />
secure the border. At each step<br />
of the way, the emphasis was on<br />
assessing individual equities.<br />
Balancing equities is hard<br />
work, and the series of memos<br />
issued from 2010 to 2014 on<br />
enforcement priorities and the<br />
exercise of discretion were attempts<br />
to ensure that people did<br />
the hard work of individually<br />
reviewing and thinking through<br />
the implications of each case.<br />
Many officers will continue to<br />
make their decisions to arrest<br />
and detain based on a belief that<br />
exercising favorable discretion is<br />
part of their job. But some, especially<br />
those who didn’t like the<br />
idea that they were being told<br />
how to prioritize their work, may<br />
not do so. In fact, some will see<br />
it as their duty and obligation to<br />
arrest everyone, no matter the<br />
compelling circumstances. And<br />
that is what can lead to chaos.<br />
Does guidance serve as a constraint<br />
on power? Of course, but<br />
that isn’t a bad thing. Everyone<br />
needs guidance to do their jobs,<br />
especially when their jobs have<br />
Salient CRGT Announces<br />
Agreement to Acquire<br />
Information Innovators, Inc.<br />
Continued from page 25<br />
firm based in Chicago. The firm focuses<br />
on investing in lower middle<br />
market buyout transactions in the<br />
food, industrial, and services industries.<br />
Frontenac works in partnership<br />
with proven operating leaders,<br />
through our executive-centric approach<br />
called CEO1st®, to identify,<br />
acquire, and build market leading<br />
companies through transformational<br />
acquisitions and operational<br />
excellence. The firm has built a leading<br />
franchise working with over 225<br />
owners of mid-sized businesses, almost<br />
always families or founders,<br />
as they address complex transition<br />
issues of liquidity, management enhancement,<br />
and growth planning.<br />
For more information, please visit<br />
www.frontenac.com.<br />
life and death implications for<br />
others. By stripping away much,<br />
if not all, of the guidance of the<br />
last eight years, and offering<br />
nothing in its place, DHS just<br />
made its officers’ jobs harder,<br />
not easier.<br />
42<br />
New memos reveal harsh and<br />
unforgiving immigration road<br />
map as DHS implements President<br />
Trump’s Executive Orders<br />
Continued from page 30<br />
United States. They even include<br />
individuals simply charged or<br />
suspected of having committed<br />
crimes.<br />
Creation of a deportation force.<br />
The memos order the hiring of<br />
5,000 additional Customs and<br />
Border Protection (CBP) agents<br />
and 10,000 additional Immigration<br />
and Customs Enforcement<br />
(ICE) agents. They direct a massive<br />
expansion of 287(g)—a law<br />
that allows DHS to deputize state<br />
and local law enforcement officers<br />
to perform the functions<br />
of immigration agents. And,<br />
they reinstate Secure Communities<br />
and terminate the Priority<br />
Enforcement Program, which<br />
expand the ways in which local<br />
police collaborate with ICE. This<br />
approach will have devastating<br />
consequences for immigrant<br />
communities and undermine<br />
public safety rather than make<br />
our nation more secure.<br />
Plans to bypass immigration<br />
courts and short-circuit due<br />
process. The memos indicate<br />
that many people in the interior<br />
of the country – not just those at<br />
the border – could be subject to<br />
expedited deportation without
going before a judge, the details<br />
of which DHS said will be forthcoming<br />
in a notice in the Federal<br />
Register. This expansion of “expedited<br />
removal,” will allow the<br />
government to bypass the backlogged<br />
immigration courts in order<br />
to deport people rapidly and<br />
with little-to-no due process.<br />
While the feasibility of many of<br />
these policies depends on Congressional<br />
willingness to fund<br />
them and whether they pass<br />
muster in the courts, undeniably,<br />
these policies are thin on humanity<br />
and thick on punishment.<br />
They will separate families, cultivate<br />
fear among immigrant<br />
communities, and destabilize<br />
our economy.<br />
Facial biometric boarding solution<br />
by Vision Box being tried at<br />
Schipol Airport<br />
Continued from page 38<br />
digital video analytics solutions, intelligent<br />
biometric and biographic<br />
data management engines and danger<br />
management functionalities.<br />
Vision-Box operates over 1200<br />
Automated Border Control solutions<br />
in more than 70 international<br />
airports and has over 3000 electronic<br />
identity systems deployed across<br />
the globe. www.vision-box.com<br />
Milestone release delivers highest<br />
performing VMS ever for XProtect<br />
users<br />
Continued from page 37<br />
sive computer muscle.<br />
Hardware-accelerated video motion<br />
detection is new in XProtect<br />
<strong>2017</strong> R1 - another industry first for<br />
VMS software. Customers can have<br />
twice as many cameras on the same<br />
server with the same CPU load, or<br />
experience up to 90 percent reduction<br />
in the CPU load with the same<br />
number of cameras on the server*.<br />
This use of hardware acceleration<br />
lets mid- to large-scale installations<br />
experience improved performance<br />
at a lower hardware cost.<br />
Hardware acceleration was already<br />
implemented in the XProtect<br />
2016 Smart Client. This provided an<br />
80 percent reduction in the processor<br />
load on computers with selected<br />
Intel processors, firmware, drivers<br />
and Microsoft operating systems.<br />
This paves the way for the use of 4K<br />
cameras and processing-intensive<br />
video compressions like H.265.<br />
New Cybersecurity Features<br />
As video management systems are<br />
becoming more and more businesscritical,<br />
cybersecurity is a natural<br />
focus. In 2016, Milestone launched<br />
several initiatives aimed at strengthening<br />
security in Milestone software.<br />
Like the Hardening Guide that<br />
details how an XProtect installation<br />
43<br />
can be better secured against cyber<br />
threats and the Kerberos strict userverification<br />
in XProtect.<br />
The XProtect <strong>2017</strong> R1 update includes<br />
several security enhancements<br />
for improved cybersecurity,<br />
including two-step verification and<br />
greater control when granting user<br />
permissions for the Milestone Advanced<br />
VMS products.<br />
Two-step verification is an industry-first<br />
security feature for<br />
XProtect <strong>2017</strong> R1. It is designed to<br />
prevent unauthorized access to the<br />
VMS when a password is compromised,<br />
as a code from the user’s mobile<br />
phone is needed to complete<br />
login.<br />
Keeping VMS systems isolated<br />
from the Internet is one important<br />
element when it comes to keeping a<br />
high security level. XProtect Smart<br />
Maps (introduced last year) now include<br />
support for OpenStreetMap<br />
offline maps: This means that customers<br />
with offline installations can<br />
take advantage of improved situational<br />
awareness by using maps,<br />
without exposing their XProtect<br />
system to online threats.<br />
“We take cybersecurity very seriously.<br />
Milestone is constantly adding<br />
security features to XProtect<br />
software and helping the Milestone<br />
community focus on VMS security,”<br />
Eilertsen says.<br />
XProtect <strong>2017</strong> R1 is available to<br />
the Milestone community now.
Supreme Court hears case on<br />
shooting of 15-year old by U.S.<br />
Border Patrol Agent<br />
Continued from page 31<br />
short, this is an extreme example of<br />
a system lacking even the most basic<br />
mechanisms of accountability.<br />
And now, the Trump administration’s<br />
Executive Order and subsequent<br />
implementation memo on<br />
border security and immigration<br />
enforcement would amount to a<br />
“surge” of 5,000 new Border Patrol<br />
agents with very few checks on<br />
their behavior in dealing with any<br />
non-U.S. citizen, particularly if that<br />
non-citizen has the misfortune to be<br />
standing in Mexico. Moreover, the<br />
drive to grab every unauthorized<br />
immigrant in sight without regard<br />
for any reasonable enforcement priorities—as<br />
reflected in the Executive<br />
Order—is a recipe for the use of<br />
excessive force.<br />
Pouring more resources and personnel<br />
into a dysfunctional system<br />
is not going to make that system<br />
any more functional. It’s just going<br />
to create an even bigger dysfunctional<br />
system. CBP—and the Border<br />
Patrol in particular—is already<br />
out of control. Even in cases where<br />
CBP officers injure or kill someone,<br />
they rarely suffer any serious<br />
consequences. This case speaks to<br />
a broader, systemic problem within<br />
CBP—an organizational culture in<br />
which anything goes.<br />
GSN’s <strong>2017</strong><br />
Airport/Seaport/Border <strong>Security</strong> Awards<br />
Opening for Entries on March 15 with Many New Categories<br />
All Winners in this program are<br />
entitled to a Full-Page Advertisement<br />
(8.5” x 9.0”) in your choice of GSN’s<br />
<strong>Digital</strong> Magazine or Leaderboard in<br />
any edition of the Airport, Seaport,<br />
Rail, Border <strong>Security</strong> Weekly<br />
<strong>News</strong>letter.<br />
Adrian Courtenay<br />
Managing Partner, CEO<br />
<strong>Government</strong> <strong>Security</strong> <strong>News</strong><br />
917-696-5782<br />
acourtenay@gsnmagazine.com<br />
NEW IN <strong>2017</strong>:<br />
CLICK HERE TO<br />
SUBMIT A NOMINATION<br />
All Finalists are entitled to a Half-<br />
Page Advertisement (8.5” x 4.5”) in<br />
your choice of GSN’s <strong>Digital</strong> Magazine<br />
or Leaderboard in any edition of the<br />
Airport, Seaport, Rail, Border <strong>Security</strong><br />
Weekly <strong>News</strong>letter.<br />
Steve Bittenbender<br />
Managing Editor<br />
<strong>Government</strong> <strong>Security</strong> <strong>News</strong><br />
502-552-1450<br />
sbittenbender@gsnmagazine.com<br />
Gerry O’Hara<br />
Designer<br />
OHDesign3<br />
203-249-0626<br />
gerry@ohd3.com<br />
44
The <strong>News</strong> Leader in Physical, IT and Homeland <strong>Security</strong><br />
CEO/Editorial Director<br />
Adrian Courtenay<br />
917-696-5782<br />
acourtenay@gsnmagazine.com<br />
Editor<br />
Steve Bittenbender<br />
502-552-1450<br />
sbittenbender@gsnmagazine.com<br />
Senior Writer<br />
Karen Ferrick-Roman<br />
412-671-1456<br />
karenferrickroman@gmail.com<br />
Columnist<br />
Shawn Campbell<br />
Campbell on Crypto<br />
shawn.campbell@safenetat.com<br />
Columnist<br />
George Lane<br />
Hazmat Science & Public Policy<br />
georgelane@hotmail.com<br />
Contributing Author<br />
Lloyd McCoy Jr<br />
Immix Group<br />
Contributing Author<br />
Walter Ewing<br />
Contributing Author<br />
Wendy Feliz<br />
Contributing Author<br />
Joshua Breisblatt<br />
Contributing Author<br />
J. Michael Barrett<br />
Contributing Author<br />
Christopher Millar<br />
Gatekeeper <strong>Security</strong><br />
Art Director<br />
Gerry O’Hara, OHDesign3<br />
gerry@ohd3.com<br />
203-249-0626<br />
Production Manager<br />
Brenden Hitt<br />
Brenden.hitt@gsnmagazine.com<br />
Direct: 203-216-7798<br />
COMING ATTRACTIONS<br />
March<br />
Late <strong>News</strong><br />
Tech Focus<br />
Perimeter Protection,<br />
Intrusion Detection<br />
Market Sector<br />
Border <strong>Security</strong> & Immigration<br />
April<br />
Late <strong>News</strong><br />
Tech Focus<br />
Law Enforcement,<br />
Public Safety<br />
Market Sector<br />
Cybersecurity Threats,<br />
Solutions<br />
45