20.03.2017 Views

Government Security News February 2017 Digital Edition

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>Government</strong> <strong>Security</strong> <strong>News</strong><br />

FEBRUARY <strong>2017</strong> DIGITAL EDITION<br />

Photo: Peg Hunter<br />

Outpouring of American and foreign citizens mobilize against President’s<br />

“Executive Order” to ban refugees from U.S. for four weeks and Muslim<br />

nationals for 90 days – Page 8<br />

Also in this issue:<br />

Law suits challenge “Muslim Ban” executive order, citing Constitutional guarantee of equal protection – Page 10<br />

More than 75% of crypto ransomware in 2016 came from Russian-speaking Cybercriminal underground – Page 6


NEWS<br />

GSN <strong>February</strong> <strong>2017</strong> <strong>Digital</strong><br />

4<br />

6<br />

10<br />

11<br />

17<br />

18<br />

26<br />

26<br />

27<br />

28<br />

36<br />

Cyberbit’s ERD platform to help Infor detect malware<br />

that bypasses anti-virus<br />

More than 75% of crypto ransomware in 2016 came<br />

from Russian-speaking cybercriminal underground<br />

Law suits challenge “Muslim Ban” executive order,<br />

citing Constitutional guarantee of equal protection<br />

Chuck Brooks named winner of “Cybersecurity<br />

Marketer of the Year” Excellence Awards<br />

Amico <strong>Security</strong> launches next generation ANC<br />

composite fence system, receives M5.0 security rating<br />

Written testimony of DHS Secretary John F. Kelly for a<br />

House Committee on Homeland <strong>Security</strong> titled “End the Crisis:<br />

America’s Borders and Path to <strong>Security</strong>”<br />

Salient CRBT announces definitive agreement to acquire<br />

Information Innovators, Inc<br />

Federal experts agree that “Internet of Things”<br />

demands simple baked-in security<br />

Farpoint warns access control channel to suggest<br />

customers add anti-hacking measures, as Federal<br />

Trade Commission is now insisting on Cybersecurity protection<br />

Varex Imaging completes separation from<br />

Varian Medical Systems, lists on Nasdaq Stock Market<br />

Expansion of DMARC is critical to reducing<br />

spread of malicious emails, says Global <strong>Security</strong><br />

Alliance, calling on Cyber companies to improve protections<br />

2


<strong>Edition</strong> Table of Contents<br />

37<br />

38<br />

39<br />

Milestone release, enabling record-breaking performance for Xproduct users,<br />

delivers highest performing VMS ever, complete with new Cybersecurity focus<br />

Facial biometric boarding solution by Vision Box being tried at Schipol Airport<br />

Statement from Secretary Kelly on recent ICE enforcement actions<br />

FEATURES<br />

SPECIAL REPORT ON AIRPORT/AVIATION SECURITY<br />

13<br />

First 777-300ER in United’s fleet christened the “New Spirit<br />

of United”<br />

14<br />

15<br />

16<br />

Passenger advocacy group lists concerns before<br />

airline CEO’s meet with President Trump<br />

Southwest and NetJets Pilots urge President Trump to reverse NAI Foreign<br />

Carrier Permit<br />

British air traffic control provider tags Rohde and Schwarz<br />

for second voice system<br />

HOT TOPIC: OPINIONS ON IMMIGRATION<br />

30<br />

New Memos reveal harsh and unforgiving immigration road map, taking<br />

national backwords in guaranteeing due process and providing safe havens<br />

31<br />

32<br />

33<br />

Supreme Court hears case on shooting of 15-year old Sergio Hernandez by<br />

U.S. Border Patrol agent<br />

Abandoning priorities will make immigration enforcement<br />

work much harder<br />

“Expedited Removal” on noncitizens called for<br />

in President’s January 25 executive order<br />

3


Cyberbit’s EDR platform to help Infor detect<br />

malware that bypasses antivirus<br />

AUSTIN, TX – <strong>February</strong> 9th, <strong>2017</strong><br />

– Cyberbit, whose cybersecurity<br />

solutions protect the world’s most<br />

sensitive systems, today announced<br />

it was awarded a contract from Infor<br />

for the supply of Cyberbit’s security<br />

platform for its own internal usage.<br />

Infor selected Cyberbit for its significant<br />

experience, technical acumen,<br />

and outstanding customer<br />

references, and is pleased to have<br />

Cyberbit complement its detection<br />

capability in this increasingly complex<br />

environment of Cyber threats.<br />

Cyberbit’s EDR platform uses a<br />

signature-less approach, proven to<br />

detect unknown threats that bypass<br />

antivirus and next-generation endpoint<br />

security platforms, while minimizing<br />

false positives. The EDR<br />

platform continuously records millions<br />

of low-level endpoint events<br />

across the network and rapidly correlates<br />

traces of malicious activity<br />

to verify an attack within seconds.<br />

Once an attack is detected, the entire<br />

storyline is displayed, enabling<br />

the platform to respond or provide<br />

the analyst with the necessary information<br />

to investigate the attack.<br />

Cyberbit’s unique approach serves<br />

as an “analyst in a box” that expedites<br />

the process of identifying and<br />

hunting down threats. Analysts often<br />

work with fragments of the story<br />

based upon their knowledge and<br />

experience to seek traces of attacks<br />

buried in the data.<br />

Cyberbit’s EDR platform<br />

assists analysts<br />

by automating much<br />

of the hunting process<br />

leveraging behavioral<br />

analytics and machine<br />

learning, which often<br />

saves weeks of investigative<br />

effort.<br />

“We are excited to be working with<br />

Infor to complement their forwardthinking<br />

IT security strategy,” said<br />

Stephen Thomas, VP Sales at Cyberbit.<br />

“Innovative IT organizations<br />

such as Infor’s are adapting this proactive<br />

detection-based strategy and<br />

I look forward to supporting their<br />

organization.”<br />

4<br />

Additional resources<br />

• Request a demo of the Cyberbit<br />

Endpoint Detection and Response<br />

solution.<br />

• Learn about proactive hunting and<br />

endpoint control in this webinar.<br />

• Subscribe to Cyberbit’s blog.<br />

• Follow Cyberbit on Facebook,<br />

LinkedIn and Twitter<br />

(@CYBERBITHQ).<br />

About Cyberbit<br />

Created to protect the most highrisk<br />

organizations in the world, Cyberbit<br />

secures enterprises and critical<br />

infrastructure against advanced<br />

cyberthreats. The company’s battlehardened<br />

cybersecurity solutions<br />

detect, analyze and respond to the<br />

most advanced, complex and targeted<br />

threats. Cyberbit employs a<br />

formidable and diverse team from<br />

both the public and private sector,<br />

including Ph.D.s, hackers, former<br />

CISOs and SOC managers, as well as<br />

seasoned veterans of the intelligence<br />

and military communities. With offices<br />

worldwide, Cyberbit is a subsidiary<br />

of Elbit Systems Ltd. (NAS-<br />

DAQ: ESLT) and has more than 500<br />

personnel in the United States, Europe<br />

and Asia. To learn more about<br />

More on page 40


GSN’s <strong>2017</strong> Airport/Seaport/Border <strong>Security</strong> Awards<br />

Opening for Entries on March 15 with Many New Categories<br />

All Winners in this program are entitled to<br />

a Full-Page Advertisement (8.5” x 9.0”) in<br />

your choice of GSN’s <strong>Digital</strong> Magazine or<br />

Leaderboard in any edition of the Airport,<br />

Seaport, Rail, Border <strong>Security</strong> Weekly<br />

<strong>News</strong>letter.<br />

NEW IN <strong>2017</strong>:<br />

CLICK HERE TO<br />

SUBMIT A NOMINATION<br />

All Finalists are entitled to a Half-Page<br />

Advertisement (8.5” x 4.5”) in your choice<br />

of GSN’s <strong>Digital</strong> Magazine or Leaderboard<br />

in any edition of the Airport, Seaport, Rail,<br />

Border <strong>Security</strong> Weekly <strong>News</strong>letter.<br />

Adrian Courtenay<br />

Managing Partner, CEO<br />

<strong>Government</strong> <strong>Security</strong> <strong>News</strong><br />

917-696-5782<br />

acourtenay@gsnmagazine.com<br />

Steve Bittenbender<br />

Managing Editor<br />

<strong>Government</strong> <strong>Security</strong> <strong>News</strong><br />

502-552-1450<br />

sbittenbender@gsnmagazine.com<br />

Gerry O’Hara<br />

Designer<br />

OHDesign3<br />

203-249-0626<br />

gerry@ohd3.com


More than 75% of crypto ransomware in 2016<br />

came from the Russian-speaking cybercriminal<br />

underground<br />

SAN FRANCISCO, CA and Woburn,<br />

MA – <strong>February</strong> 13, <strong>2017</strong> –<br />

Out of 62 new crypto ransomware<br />

families discovered by Kaspersky<br />

Lab researchers in 2016, at least 47<br />

were developed by Russian-speaking<br />

cybercriminals. This findings<br />

and others are included in an overview<br />

of the Russian-speaking ransomware<br />

underground, conducted<br />

by Kaspersky Lab researchers. The<br />

review also highlights that small<br />

groups with limited capabilities are<br />

transforming into large criminal enterprises<br />

that have the resources and<br />

intent to attack private and corporate<br />

targets worldwide.<br />

Crypto ransomware – a type of<br />

malware which encrypts its victim’s<br />

files and demands a ransom in exchange<br />

for decryption – is one of<br />

the most dangerous types of malware<br />

today. According to Kaspersky<br />

Lab telemetry, in 2016 more than<br />

1,445,000 users (including businesses)<br />

around the globe were attacked<br />

by this type of malware. In the<br />

overview, one of the major conclusions<br />

is that the increase in crypto<br />

ransomware attacks observed in recent<br />

years is the result of a very flexible<br />

and user-friendly underground<br />

ecosystem, allowing criminals to<br />

launch crypto ransomware attack<br />

campaigns with almost any level<br />

of computer skills and financial resources.<br />

Kaspersky Lab researchers identified<br />

three levels of criminal involvement<br />

in the ransomware business:<br />

• The creation and update of<br />

new ransomware families<br />

• The development and support<br />

of affiliate programs<br />

distributing ransomware<br />

• The participation in affiliate<br />

programs as a partner<br />

The first type of involvement requires<br />

a participant to have advanced<br />

code-writing skills. The<br />

cybercriminals who create new ransomware<br />

strains are the most privileged<br />

members of the ransomware<br />

underground world, as they are the<br />

ones who create the key element of<br />

the whole ecosystem.<br />

On the second level of the hierarchy,<br />

there are the developers of<br />

the affiliate programs. These are the<br />

criminal communities which – with<br />

6<br />

the help of different additional tools,<br />

like exploit kits and malicious spam<br />

– deliver the ransomware issued by<br />

the malware creators.<br />

The partners of affiliate programs<br />

are on the lowest level of the whole<br />

system. Utilizing different techniques,<br />

they help the owners of affiliate<br />

programs to distribute the<br />

malware in exchange for a share of<br />

the ransom received by owners of<br />

the program. Only intent, a readiness<br />

to conduct illegal actions, and<br />

a couple of bitcoins are required for<br />

participants of affiliate programs to<br />

enter this business.<br />

According to Kaspersky Lab estimations,<br />

the overall daily revenue<br />

of an affiliate program may reach<br />

tens or even hundreds of thousand<br />

dollars, of which around 60 percent<br />

stays in the criminals’ pockets as net<br />

profit.<br />

Moreover, during their research<br />

into the underground ecosystem<br />

and multiple incident response operations,<br />

Kaspersky Lab researchers<br />

were able to identify several large<br />

groups of Russian-speaking criminals<br />

specializing in crypto ransomware<br />

development and distribution.


These groups may unite tens of different<br />

partners, each with their own<br />

affiliate program, and the list of<br />

their targets includes not only ordinary<br />

internet users, but also small<br />

and medium-sized companies and<br />

even enterprises. Initially targeting<br />

Russian and CIS users and entities,<br />

these groups are now shifting their<br />

attention to companies located in<br />

other parts of the world.<br />

“It is hard to say why so many<br />

ransomware families have a Russian-speaking<br />

origin. What is more<br />

important is that we’re now observing<br />

their development from small<br />

groups with limited capabilities<br />

to large criminal enterprises that<br />

have resources and the intent to<br />

attack more than just Russian targets,”<br />

said Anton Ivanov, security<br />

researcher at Kaspersky Lab, and<br />

the author of the overview. “We’ve<br />

seen something similar with financial<br />

malware groups, like Lurk. They<br />

also started with massive attacks<br />

on online banking users, and then<br />

evolved into sophisticated<br />

groups capable<br />

of robbing large<br />

organizations,<br />

like banks. Sun<br />

Tzu said: ‘If you<br />

know the enemy<br />

and know<br />

yourself, you<br />

need not fear<br />

the result of a<br />

hundred battles.’<br />

That’s why<br />

we’ve created<br />

this overview:<br />

ransomware<br />

gangs are turning<br />

into very powerful enemies,<br />

and for the public and the security<br />

community, it is really important we<br />

learn as much about them as possible.”<br />

Read more about how Russianspeaking<br />

underground ransomware<br />

ecosystem works on Securelist.com<br />

About Kaspersky Lab<br />

7<br />

Kaspersky Lab is a global cybersecurity<br />

company founded in 1997.<br />

Kaspersky Lab’s deep threat intelligence<br />

and security expertise is<br />

constantly transforming into security<br />

solutions and services to protect<br />

businesses, critical infrastructure,<br />

governments and consumers<br />

around the globe. The company’s<br />

comprehensive security portfolio<br />

includes leading endpoint protection<br />

and a number of specialized security<br />

solutions and services to fight<br />

sophisticated and evolving digital<br />

threats. Over 400 million users are<br />

protected by Kaspersky Lab technologies<br />

and we help 270,000 corporate<br />

clients protect what matters<br />

most to them. Learn more at www.<br />

kaspersky.com.<br />

FREE SUBSCRIPTION<br />

SIGN-UP<br />

Monthly <strong>Digital</strong> <strong>Edition</strong><br />

Airport/Seaport <strong>News</strong>letter<br />

Daily Insider <strong>News</strong>letter<br />

Cybersecurity <strong>News</strong>letter<br />

CLICK HERE


Outpouring of American and foreign citizens mobilize<br />

against President’s “Executive Orders” to ban refugees<br />

from U.S. for four weeks and Muslim nationals for 90 days<br />

By Michele Waslin<br />

In his first week as president, President<br />

Donald Trump unleashed a<br />

series of executive orders, thereby<br />

launching his first strikes against<br />

current and future immigrants and<br />

refugees. In response, thousands<br />

of Americans mobilized over the<br />

weekend, demonstrating against the<br />

President’s actions. Strong opposition<br />

continues to come from foreign<br />

leaders, Congressional leaders,<br />

government bureaucrats, business<br />

leaders, university presidents, and<br />

others.<br />

The far-reaching and highly problematic<br />

executive orders on “Border<br />

<strong>Security</strong> and Immigration Enforcement<br />

Improvement” and “Enhancing<br />

Public Safety in the Interior of<br />

the United States” seek to radically<br />

change immigration enforcement<br />

along the U.S.-Mexico border and<br />

throughout the entire country.<br />

Friday’s “Protecting the National<br />

from Terrorist Attacks by Foreign<br />

Nationals” is intended to halt all<br />

refugee admissions for at least four<br />

months and bans nationals from<br />

seven Muslim-majority countries<br />

from entering the U.S. for at least 90<br />

days. Additional executive orders<br />

are expected in the coming days and<br />

weeks.<br />

Given the immediate impact of<br />

the ban, Friday’s executive order<br />

resulted in a great deal of confusion,<br />

frustration, and anger across<br />

the country and around the world.<br />

When the executive order was made<br />

public, large protests erupted at the<br />

White House and at airports around<br />

the country, including large numbers<br />

of attorneys offering free legal<br />

assistance and Members of Congress<br />

leveraging pressure on immigration<br />

officials.<br />

On Friday night and Saturday, the<br />

first travelers from the seven banned<br />

countries arrived at U.S. airports<br />

and were detained by Customs and<br />

Border Patrol (CBP) agents. CBP<br />

had not been issued clear guidance<br />

as to how the executive order was<br />

to be implemented, and as a result,<br />

treatment of foreign nationals differed<br />

by airport.<br />

Among those detained and scheduled<br />

to be returned to their home<br />

8<br />

countries were returning green card<br />

holders who already live and work<br />

in the U.S., as well as first-time green<br />

card holders whose vetting was recently<br />

completed, and temporary<br />

visitors to the U.S. One detainee was<br />

Hameed Khalid Darweesh, who<br />

had worked with the U.S. military<br />

as an interpreter in Iraq. As confusion<br />

and frustration rose and family<br />

members worried about their<br />

detained loved ones, immigration<br />

lawyers went to the airports to represent<br />

those in detention.<br />

The ACLU, National Immigrant<br />

Law Center, and other legal organizations<br />

immediately challenged<br />

the executive order on behalf of<br />

Darweesh and others, and Saturday<br />

night a federal judge in the Eastern<br />

District of New York issued a nationwide<br />

stay of removal, preventing<br />

the Trump administration from<br />

deporting refugees and others who<br />

had lawful authority to enter the<br />

U.S. Similar lawsuits were filed in<br />

other cities: in Boston, the federal<br />

court prohibited the detention and<br />

removal of all those subject to the<br />

executive order but the order was


limited to Logan Airport; in Virginia,<br />

the federal court ordered the<br />

government to give attorneys access<br />

to all green card holders being detained<br />

and prohibit their removal,<br />

and; in Seattle, the court prevented<br />

the removal of plaintiffs subject to<br />

the seven-Muslim-majority country<br />

ban. However, there were reports in<br />

multiple cities that CBP was slow<br />

to comply with the nationwide<br />

and local court<br />

orders, even after the<br />

federal judge’s order was<br />

issued.<br />

Not until Sunday did<br />

the White House clarify<br />

that the order did<br />

not extend to returning<br />

green card holders.<br />

Despite other rumors<br />

about changes to the application<br />

of the policy,<br />

no further official guidance<br />

has been publicly<br />

released.<br />

Democratic and Republican<br />

Members of Congress have also denounced<br />

the Muslim ban. Senate<br />

Minority Leader Chuck Schumer<br />

called the executive order “meanspirited<br />

and un-American,” and said<br />

he would “claw, scrap, and fight with<br />

every fiber of my being until these<br />

orders are overturned.” Republican<br />

Senators McCain and Graham issued<br />

a joint statement saying “We<br />

fear this executive order will become<br />

a self-inflicted wound in the<br />

fight against terrorism.” Some also<br />

criticized the administration for<br />

failing to follow the regular protocols<br />

and consulting with the right<br />

people before issuing an executive<br />

order. “You have an extreme vetting<br />

proposal that didn’t get the vetting<br />

it should have had,” said Ohio Sen.<br />

Rob Portman.<br />

Opposition has appeared from<br />

within the government bureaucracy<br />

as well. Foreign Service officers<br />

from the department of State drafted<br />

a dissent memo in opposition to<br />

the refugee ban, claiming the policy<br />

“runs counter to core American values<br />

of nondiscrimination, fair play,<br />

and extending a warm welcome to<br />

foreign visitors and immigrants.<br />

Alternative solutions are available<br />

to address the risk of terror attacks<br />

9<br />

which are both more effective and<br />

in line with Department of State and<br />

American values.”<br />

Business leaders also condemned<br />

the Administration’s actions, explaining<br />

that the executive orders<br />

could make it more difficult for<br />

America’s companies to compete.<br />

Google ordered its employees traveling<br />

overseas to return to the U.S.<br />

immediately. Google<br />

says at least 187 foreign-born<br />

employees<br />

could be prevented<br />

from entering the<br />

Photo: John Taylor<br />

country. Twitter’s<br />

chief executive tweeted<br />

that the economic<br />

impact of the Muslim<br />

ban is “real and upsetting.”<br />

Netflix chief<br />

executive said that<br />

“Trump’s actions are<br />

hurting Netflix employees<br />

around the<br />

world, and are so un-<br />

American it pains us all…Worse,<br />

these actions will make America<br />

less safe (through hatred and loss of<br />

allies) rather than more safe.”<br />

Thus far, the opposition to Trump’s<br />

immigration agenda has been fast<br />

and furious and will likely continue<br />

as he continues to roll out additional<br />

immigration orders.


Law suits challenge “Muslim Ban” executive order<br />

citing Constitutional guarantee of equal protection<br />

and statutory prohibitions against discrimination<br />

By Mary Kenney<br />

The fallout continues from last<br />

week’s immigration executive order,<br />

which has been coined the “Muslim<br />

Ban.” Several lawsuits have been<br />

filed to challenge the executive order,<br />

including Ali v. Trump, on the<br />

grounds that it violates the Constitution’s<br />

guarantee of equal protection<br />

under the law and a statutory<br />

prohibition against discrimination.<br />

The American Immigration<br />

Council, Northwest Immigrant<br />

Rights Project, and the National<br />

Immigration Project of the National<br />

Lawyers Guild filed this nationwide,<br />

class action lawsuit in the District<br />

Court for the Western District of<br />

Washington on Monday, January 30.<br />

At issue in this lawsuit is Section<br />

3 of the executive order, through<br />

which President Donald Trump<br />

abruptly suspended immigrant visa<br />

processing for nationals of seven<br />

predominantly Muslim countries,<br />

and prohibited their entry into the<br />

United States. Section 3 violates<br />

Congress’ clear intent in Section<br />

202(a)(1) of the Immigration and<br />

Nationality Act to prevent<br />

discrimination in<br />

the issuance of immigrant<br />

visas “because of<br />

the person’s race, sex,<br />

nationality, place of<br />

birth, or place of residence.”<br />

It also violates Plaintiffs’<br />

constitutionally<br />

protected rights to<br />

family, marriage, and<br />

equal protection under<br />

the law. The lawsuit<br />

was filed on behalf of United States<br />

citizens and lawful permanent residents<br />

who have filed visa petitions<br />

for their close family members who<br />

are nationals of the seven countries.<br />

Reema Dahman, a lawful permanent<br />

resident of the United States,<br />

filed a petition to bring her 16-yearold<br />

son stranded in war-torn Syria to<br />

the United States. The two have not<br />

seen each other since 2012. They are<br />

now at the last stage of processing,<br />

waiting only for an immigrant visa<br />

interview to be scheduled. But the<br />

President’s executive order has suspended<br />

immigrant visa interviews,<br />

10<br />

Photo: Geoff Livingston<br />

putting safety and security further<br />

out of the boy’s reach and further<br />

delaying the boy’s reunification with<br />

his mother.<br />

Ms. Dahman described the moment<br />

she realized her separation<br />

from her son would continue by<br />

saying:<br />

“I’m heartbroken. Every day I am<br />

filled with anguish at what might<br />

become of my son, and this order<br />

just crushed my hopes that I could<br />

get him out of harm’s way anytime<br />

soon.”<br />

Juweiya Ali is also a plaintiff. Her<br />

More on page 40


Chuck Brooks named winner of “Cybersecurity<br />

Marketer of The Year” at the <strong>2017</strong> Cybersecurity<br />

Excellence Awards<br />

WASHINGTON, DC – Chuck<br />

Brooks, Vice President at<br />

Sutherland <strong>Government</strong> Solutions,<br />

and Chairman of The<br />

New Emerging Technologies<br />

Committee for CompTIA, was<br />

named winner of Cybersecurity<br />

Marketer of The Year at the<br />

<strong>2017</strong> Cybersecurity Excellence<br />

Awards.<br />

The <strong>2017</strong> Cybersecurity Excellence<br />

Awards recognize companies,<br />

products and individuals<br />

that demonstrate excellence,<br />

innovation and leadership in<br />

information security. The finalists<br />

and winners were selected<br />

based on the strength of their<br />

nomination and the popular<br />

vote by members of the Information<br />

<strong>Security</strong> Community<br />

(both ratings and comments).<br />

“Congratulations to Chuck<br />

Brooks for winning the Cybersecurity<br />

Marketer of the Year category<br />

in the <strong>2017</strong> Cybersecurity Excellence<br />

Awards,” said Holger Schulze,<br />

founder of the 350,000 member<br />

Information <strong>Security</strong> Community<br />

on LinkedIn which organizes the<br />

awards program. “With over 450<br />

entries, the <strong>2017</strong> awards are highly<br />

competitive. All winners and finalists<br />

reflect the very best in leadership,<br />

excellence and innovation in<br />

today’s cybersecurity industry.”<br />

Chuck’s thought leadership writings<br />

on cybersecurity have helped<br />

shape the public policy debate as he<br />

11<br />

is respected in industry, in the<br />

Federal <strong>Government</strong>, academia,<br />

and on Capitol Hill. He has been<br />

a force in discussing, advocating,<br />

promoting cybersecurity<br />

issues across digital media, at<br />

events, in professional forums,<br />

and with a variety of public policy<br />

organizations.<br />

He has been a leading evangelist<br />

for cybersecurity, homeland<br />

security, and emerging<br />

technologies in both the public<br />

and private sectors. He was selected<br />

by LinkedIn as “One of<br />

the Top 5 Tech People to Follow<br />

On LinkedIn” by LinkedIn. He<br />

has been a featured speaker at<br />

numerous events and conferences.<br />

He recently presented at<br />

a workshop sponsored by The<br />

National Academies of Sciences,<br />

Engineering, and Medicine and the<br />

Federal Bureau of Investigation on<br />

Securing Life Sciences Data. He recently<br />

spoke at George Washington<br />

University event about the Cyber<br />

Threat Spectrum, will be participating<br />

soon at USTRANSCOM Senior<br />

Leader Cyber <strong>Security</strong> Roundtable.


Chuck has authored numerous<br />

articles focusing on cybersecurity,<br />

homeland security and technology<br />

innovation for many publications<br />

including Forbes, Huffington Post,<br />

The Hill, Federal Times, IT <strong>Security</strong><br />

Planet, Bizcatalyst 360, Next Gov,<br />

Alien Vault, Gov<br />

Tech, MIT Sloan<br />

Blog, <strong>Government</strong><br />

<strong>Security</strong> <strong>News</strong>, and<br />

Brink. Chuck is a<br />

pioneer in social<br />

media with over<br />

32,000 followers<br />

on LinkedIn and a<br />

global following and<br />

has brought significant<br />

attention to cyber<br />

issues from his<br />

frequent posts and<br />

commentaries. He<br />

has been involved as a judge for the<br />

past four years as a Judge for <strong>Government</strong><br />

<strong>Security</strong> <strong>News</strong>’ Annual<br />

Homeland <strong>Security</strong> Awards.<br />

As a senior executive in government<br />

relations, marketing, and management,<br />

Chuck brings a unique experience<br />

from service in the public<br />

sector, academia, and industry. He<br />

serves on a variety of boards, many<br />

of them philanthropic. He brings a<br />

substantive knowledge on a broad<br />

range of cyber issues and a special<br />

subject matter expertise of cybersecurity<br />

and homeland security in<br />

government that have benefited<br />

both the not-for-profit, public, and<br />

commercial sectors.<br />

Chuck is one of the original<br />

“plank holders” at the Department<br />

of Homeland <strong>Security</strong> (DHS). Admiral<br />

Jay Cohen, former Under Secretary<br />

for Science & Technology at<br />

DHS stated “Chuck<br />

Brooks. as Director<br />

of Legislative Affairs<br />

at DHS, was<br />

INVALUABLE to<br />

me, the DHS S&T<br />

Directorate, DHS,<br />

the Nation AND<br />

Congress in making<br />

the “reformation”<br />

of DHS S&T<br />

a complete success.<br />

His Hill/DC acumen,<br />

insight, reliability,<br />

ability to<br />

develop highly effective congressional<br />

interaction/communications is<br />

WITHOUT PEER in my nearly 16<br />

years dealing with senior executive<br />

branch officials, industry, academia<br />

and the Congress.”<br />

Dexter Ingram, Senior Advisor to<br />

Interpol, said the following about<br />

Chuck “he is a consummate professional<br />

who has a deep understanding<br />

of the issues, process, and people<br />

involved in the world of homeland<br />

security and Law enforcement. His<br />

breadth of experience derived from<br />

working on The Hill, in government,<br />

in academia, in industry, and with<br />

12<br />

the media make him truly unique.”<br />

Chuck worked for many years<br />

on Capitol Hill for the late Senator<br />

Arlen Specter and covered national<br />

security, foreign affairs, and technology<br />

issues. He also was a member<br />

of the Adjunct Faculty at John<br />

Hopkins University where taught<br />

homeland security for two years.<br />

He has advised a multitude of organizations<br />

including the Bill & Melinda<br />

Gates Foundation, The Cyber<br />

Resilience Institute, and the Center<br />

for Advancing Innovation. He also<br />

serves as Chairman of CompTIA’s<br />

New and Emerging Technologies<br />

Committee, and is a member of the<br />

AFCEA Cybersecurity Committee.<br />

He is on the Board of Advisors<br />

for CyberTech, and on the Board<br />

of Directors at Bravatek, and the<br />

Cyber Resilience Institute. He is<br />

an advisor to R & D cybersecurity<br />

company Inzero Systems. He is a<br />

subject Matter Expert to The Homeland<br />

Defense and <strong>Security</strong> Information<br />

Analysis Center (HDIAC),<br />

a Department of Defense (DoD)<br />

sponsored organization through<br />

the Defense Technical Information<br />

Center (DTIC. Chuck also serves as<br />

a Christian Science Monitor “Passcode<br />

Influencers Panel member” on<br />

Information <strong>Security</strong>. He has a BA<br />

from DePauw University and an<br />

MA from the University of Chicago.


Airport/Aviation <strong>Security</strong><br />

First 777-300ER in United’s fleet christened<br />

the “New Spirit of United,” marking a new<br />

era of passion, service and innovation<br />

CHICAGO, IL – Jan. 17, <strong>2017</strong> /<br />

PR<strong>News</strong>wire/ – Next month, a<br />

brand-new United Airlines plane<br />

will push back from the gate with a<br />

new name: “New Spirit of United.”<br />

This special aircraft is also the company’s<br />

first Boeing 777-300ER featuring<br />

the United Polaris all-aisle<br />

access, lie-flat seat. It represents a<br />

commitment to the future and the<br />

commencement of an exciting new<br />

chapter for the company as it builds<br />

the best airline in the world.<br />

“This aircraft symbolizes the new<br />

spirit, the energy and enthusiasm<br />

that I have seen in our employees<br />

who take great pride in the work<br />

they are doing to take care of our<br />

customers and one another,” said<br />

Oscar Munoz, chief executive officer<br />

of United Airlines. “The new<br />

777-300ER fleet will play a crucial<br />

role in connecting our customers<br />

to far-away destinations and to the<br />

moments that matter most.”<br />

The “New Spirit of United” is exemplified<br />

by the significant progress<br />

the company made in operational<br />

reliability last year – achieving its<br />

best full-year on-time performance<br />

in company history, the<br />

elevated customer experience<br />

and the completion<br />

of new agreements<br />

with every domestic<br />

unionized work group<br />

in 2016. As United Airlines<br />

continues to build<br />

on this momentum, this<br />

new aircraft serves as a<br />

symbol of the hard work,<br />

professionalism and<br />

dedication of the entire United team<br />

to our customers.<br />

The aircraft will start regularly<br />

scheduled service in <strong>February</strong> <strong>2017</strong>.<br />

This is the first of 14 777-300ER aircraft<br />

United expects to place into<br />

service in <strong>2017</strong>.<br />

About United<br />

United Airlines and United Express<br />

operate more than 4,500 flights a<br />

day to 339 airports across five continents.<br />

In 2016, United and United<br />

Express operated more than 1.6 million<br />

flights carrying more than 143<br />

million customers. United is proud<br />

to have the world’s most comprehensive<br />

route network, including U.S.<br />

13<br />

mainland hubs in Chicago, Denver,<br />

Houston, Los Angeles, New York/<br />

Newark, San Francisco and Washington,<br />

D.C. The airline is a founding<br />

member of Star Alliance, which<br />

provides service to 192 countries<br />

via 28 member airlines. For more<br />

information, visit united.com, follow<br />

@United on Twitter or connect<br />

on Facebook. The common stock of<br />

United’s parent, United Continental<br />

Holdings, Inc., is traded on the<br />

NYSE under the symbol UAL.


Airport/Aviation <strong>Security</strong><br />

Passenger advocacy group lists<br />

concerns before airline CEOs meet with<br />

President Trump<br />

WASHINGTON, DC – Feb. 6, <strong>2017</strong><br />

CEOs from the major U.S. Airlines<br />

will meet with President<br />

Trump on Thursday and<br />

will likely discuss air<br />

traffic control privatization<br />

and further limitations<br />

on foreign air competition.<br />

As profits soar<br />

to record levels, passengers<br />

face a reduction in<br />

flights, shrinking seats,<br />

and less reliable air travel<br />

especially from small<br />

and medium size cities,<br />

noted FlyersRights.org.<br />

Being exempt from state consumer<br />

protection laws is not enough for<br />

the airlines. They seek to block foreign<br />

competition from airlines such<br />

as Norwegian Air, WOW Airlines,<br />

and Emirates. Blocking foreign<br />

competition will result in higher<br />

Paul Hudson<br />

Flyer’s Rights Pres<br />

prices and fewer choices for consumers.<br />

Paul Hudson, president<br />

of FlyersRights.org and<br />

member of the FAA Aviation<br />

Rulemaking Advisory<br />

Committee, noted the<br />

similarities between the<br />

airline industry now and<br />

the railroad industry in<br />

the 19th century, “Then,<br />

railroads controlled long<br />

distance transportation,<br />

as well as the courts and<br />

government regulators.<br />

A new word was coined to describe<br />

their abusive treatment of the public:<br />

being railroaded. Today, Americans<br />

are being ‘airlined’.”<br />

Additionally, the airlines are<br />

pushing for privatization of the Air<br />

Traffic Control system. The plan<br />

for privatization leaves little room<br />

for government oversight over an<br />

inherently governmental function,<br />

would transfer all government air<br />

traffic control to a AMTRAK like<br />

entity controlled by the airlines, and<br />

grant a long list of demands sought<br />

by air controller union including<br />

the right to strike. Such legislation<br />

was passed by the House in the last<br />

Congress but not acted on by the<br />

Senate.<br />

FlyersRights.org is the United<br />

States’ largest airline passenger advocacy<br />

group. The organization is<br />

most famous for spearheading the<br />

Passenger Bill of Rights and the<br />

rule against tarmac confinements.<br />

Among the many services it provides<br />

for airline passengers, it operates<br />

a toll-free hotline and publishes<br />

a weekly newsletter. FlyersRights.<br />

org is currently appealing the FAA’s<br />

refusal to enact a rulemaking to<br />

address the problems of shrinking<br />

seat sizes to the D.C. Circuit Court<br />

of Appeals. (Case 16-1101, FlyersRights<br />

Education Fund v. FAA).<br />

14


Southwest and NetJets Pilots Urge President-elect<br />

Trump to Reverse NAI Foreign Carrier Permit<br />

DALLAS, TX – The Southwest Airlines<br />

Pilots’ Association (SWAPA)<br />

is partnering with the NetJets Association<br />

of Shared Aircraft Pilots<br />

(NJASAP) to urge President-elect<br />

Trump to reverse the decision to<br />

grant Norwegian Air International<br />

a foreign carrier permit. The two<br />

groups will meet in the nation’s capital<br />

for a Rally for U.S. Aviation Jobs<br />

on January 24.<br />

In the final days of his administration,<br />

President Obama granted<br />

Norwegian Air International (NAI)<br />

a foreign carrier permit, placing<br />

tens of thousands of U.S. jobs at risk.<br />

“This decision is just another failed<br />

trade deal by the Obama administration,<br />

giving foreign companies an<br />

unfair advantage over U.S.<br />

companies,” said Captain<br />

Jon Weaks, SWAPA<br />

President. “Only President-elect<br />

Trump has the<br />

power to reverse the lame<br />

duck Obama Administration’s<br />

reckless approval of<br />

Captain Jon Weaks<br />

SWAPA President<br />

NAI before it takes effect<br />

on January 29.”<br />

The late-December decision<br />

to grant NAI a foreign carrier<br />

permit paves the way for NAI<br />

to execute on its flag of convenience<br />

(FOC) scheme. This permit allows<br />

for Norwegian to establish an Irish<br />

subsidiary in order to take advantage<br />

of Ireland’s impotent labor, tax,<br />

and social laws. This is exactly the<br />

type of scheme that decimated the<br />

U.S. shipping industry and will be<br />

the catalyst for a race to the bottom<br />

in the U.S. airline industry.<br />

<strong>Government</strong> affairs representatives<br />

from SWAPA and NJASAP<br />

continue to work every possible avenue<br />

to garner the attention of the<br />

president-elect and right this wrong.<br />

With the January 29 deadline looming,<br />

the groups believe that time<br />

is of the essence, and the<br />

time for action is now.<br />

“The Obama administration<br />

has tilted the field<br />

of play in favor of a foreign<br />

competitor and put<br />

thousands of good-paying,<br />

middle-class, U.S. aviation<br />

jobs at risk. It will be up to<br />

the Trump administration<br />

to save them,” said SWAPA<br />

15<br />

<strong>Government</strong>al Affairs Committee<br />

Chair Chip Hancock. Added<br />

Weaks, “President-elect Trump was<br />

elected on a pro-American worker<br />

platform and has already delivered<br />

wins for several American companies.<br />

It is our sincere desire that the<br />

president-elect will right this wrong<br />

by repealing this detrimental ruling.”<br />

About SWAPA<br />

Located in Dallas, Texas, the Southwest<br />

Airlines Pilots’ Association<br />

(SWAPA) is a non-profit employee<br />

organization representing the more<br />

than 8,500 pilots of Southwest Airlines.<br />

SWAPA works to provide a<br />

secure and rewarding career for<br />

Southwest pilots and their families<br />

through negotiating contracts,<br />

defending contractual rights and<br />

actively promoting professionalism<br />

and safety. For more information<br />

on the Southwest Airlines Pilots’<br />

Association, visit www.swapa.<br />

org. Rally Hashtags: #DenyNAI<br />

#MakeItRight #ReverseObama


Airport/Aviation <strong>Security</strong><br />

British air traffic control provider tabs<br />

Rohde & Schwarz for second voice system<br />

MUNICH – Feb. 7, <strong>2017</strong> NATS has<br />

selected the R&S VCS-4G IP-based<br />

voice communications system from<br />

Rohde & Schwarz as its second<br />

voice system for its air traffic control<br />

(ATC) communications in UK<br />

airspace. The voice over IP (VoIP)<br />

COTS solution from the Munichbased<br />

electronics firm was chosen<br />

based on its reliability, innovation<br />

and flexibility to create a single<br />

platform across NATS’ Swanwick<br />

and Prestwick control centers. In<br />

addition, the company has agreed<br />

to an accelerated delivery schedule<br />

to support NATS in their “Deploying<br />

SESAR” transformation programme.<br />

Rohde & Schwarz will provide the<br />

British air traffic service provider<br />

NATS with the IP-based voice communications<br />

system R&S VCS-4G.<br />

Within the framework of the Single<br />

European Sky (SES) initiative, NATS<br />

will modernize its entire air traffic<br />

management (ATM) infrastructure<br />

over the next few years. Tim Bullock,<br />

Director Supply Chain Management<br />

at NATS, explains: “NATS<br />

controls more than 2.4 million<br />

flights every year. Our systems must<br />

16<br />

be both flexible and<br />

able to handle heavy<br />

workloads in order<br />

to ensure efficient operations<br />

for airlines<br />

and passengers alike.<br />

We have found in Rohde<br />

& Schwarz an innovative<br />

and reliable<br />

partner. We welcome<br />

them to the collaborative<br />

team of suppliers joining us on<br />

our ATM transformation journey<br />

towards SESAR deployment.”<br />

Rohde & Schwarz will begin the<br />

implementation of the second voice<br />

system in <strong>2017</strong>. It will provide enhanced<br />

resilience for voice based<br />

radio communications in UK airspace.<br />

The air traffic control centers<br />

in Swanwick and Prestwick as well<br />

as the NATS corporate and technical<br />

centre in Whiteley will all be<br />

equipped in a phased deployment<br />

that will be completed by 2020. The<br />

order includes the delivery, implementation<br />

and through-life support<br />

of more than 450 R&S VCS-4G controller<br />

working positions (CWP).<br />

Up to 1700 radios and various<br />

ground-ground lines will be connected<br />

to the system.<br />

According to Bosco Novak, Executive<br />

Vice President Secure Communications<br />

Division at Rohde &<br />

Schwarz: “NATS is a forerunner in<br />

the deployment of SESAR and introducing<br />

new technologies. It will<br />

be the first air traffic control provider<br />

in Europe to completely migrate<br />

all of its ATC communications to<br />

IP. Deploying our technology as the<br />

second voice system will increase<br />

service resilience and add operational<br />

flexibility to NATS business<br />

operation.”<br />

As airspace becomes more crowded,<br />

there is an increased demand for<br />

flexible, load-based reallocation of<br />

resources while ensuring efficient<br />

More on page 40


AMICO <strong>Security</strong> launches next generation<br />

ANC composite fence system, receives M5.0<br />

security rating<br />

BIRMINGHAM, AL — December<br />

30, 2016 — AMICO <strong>Security</strong> announced<br />

today that its ANC fence<br />

system has received an M5.0 security<br />

rating in compliance with the<br />

ASTM F2781-10 standard, which is<br />

used to test the forced entry resistance<br />

of security fence systems, an<br />

important designation for the military,<br />

the U.S. Department of Homeland<br />

<strong>Security</strong>, industrial businesses<br />

and utilities.<br />

The next generation ANC fence<br />

system is a uniquely designed,<br />

non-metallic fencing system that is<br />

non-conductive and radar friendly,<br />

making it ideal for the protection of<br />

The non-conductive, radar friendly ANC fence system is ideal for<br />

17<br />

utility substations, airports and military<br />

applications. The ANC fence<br />

system is made up of a proprietary<br />

composite blend of non-conductive<br />

materials configured to increase the<br />

strength to weight ratio and greatly<br />

improve the level of security.<br />

The ANC fence system uses a<br />

unique self-draining diamond<br />

design and is a medium<br />

security alternative<br />

to traditional chain link<br />

fence products, which offers<br />

minimal security and<br />

can easily be compromised<br />

with simple hand tools.<br />

Because the system is non metallic,<br />

the ANC fence system<br />

is non-conductive<br />

and does not require<br />

grounding like a traditional<br />

chain link fence,<br />

significantly reducing<br />

the time and cost of engineering<br />

and fence installation.<br />

The system<br />

is ideal for use around<br />

power plants and sub<br />

stations, where the<br />

metal fencing can conduct<br />

electricity and become dangerous<br />

to the touch, and is widely used<br />

around (static synchronous compensators)<br />

STATCOMs, (switched<br />

virtual circuits) SVCs and reactors<br />

due to their high magnetic fields.<br />

The ANC fence system does not interfere<br />

with radar signals due to its<br />

non-metallic composition.<br />

“The unique design and<br />

high strength of the ANC<br />

fence system provides a<br />

safe, secure, aesthetic option<br />

to utilities, military<br />

bases and airports,” said<br />

Gary Baltz, Director of<br />

Marketing for AMICO <strong>Security</strong>.<br />

“Our product provides safety to the<br />

public and utility workers against<br />

step and touch potential, while at<br />

the same time greatly enhancing<br />

the security of our power grid and<br />

infrastructure. The system is easy to<br />

install in both new construction or<br />

retrofit situations.”<br />

The ANC fence system can be assembled<br />

up to 20 feet high and integrates<br />

with vehicular and pedestrian<br />

sliding automatic gate systems. The<br />

use in multiple perimeter security applications More on page 41


Written testimony of DHS Secretary John F. Kelly for a House<br />

Committee on Homeland <strong>Security</strong> hearing titled “Ending the<br />

Crisis: America’s Borders and the Path to <strong>Security</strong>”<br />

Release Date:<br />

<strong>February</strong> 7, <strong>2017</strong><br />

210 House Capitol Visitor Center,<br />

U.S. Capitol<br />

Mr. Chairman, Ranking Member<br />

Thompson, and distinguished<br />

Members of the Committee:<br />

It is a great honor and privilege to<br />

appear before you today to discuss<br />

the crucial mission of the Department<br />

of Homeland <strong>Security</strong> (DHS)<br />

to protect the homeland and secure<br />

our nation’s borders.<br />

Over the past 45 years, I have<br />

been privileged to serve my nation<br />

as both an enlisted Marine and an<br />

officer. I have worked with our allies<br />

across agencies, the private sector,<br />

and with independent experts to<br />

identify innovative, comprehensive<br />

solutions to current and emerging<br />

threats. These assignments—while<br />

varied—shared the common characteristics<br />

of working within and<br />

leading large, complex, and diverse<br />

mission-focused organizations<br />

while under great pressure to produce<br />

results.<br />

I am humbled to once again be<br />

called to serve, this time<br />

with the men and women<br />

of DHS. As a Department,<br />

we face diverse<br />

challenges and adversaries<br />

that do not respect<br />

our rule of law or our<br />

borders. As Secretary,<br />

you have my commitment<br />

to tirelessly protect<br />

our country from<br />

threats, secure the border, and enforce<br />

the law while expediting lawful<br />

trade and travel. In pursuit of those<br />

missions, please know that I take<br />

seriously our legal responsibilities<br />

to balance the security of our homeland<br />

with the protection of privacy,<br />

civil rights, and civil liberties.<br />

The President’s Executive Orders<br />

During his first two weeks in office,<br />

President Trump issued executive<br />

orders to secure our borders, enforce<br />

our immigration laws, and protect<br />

the nation from foreign terrorist entry<br />

into the United States. The President<br />

has gotten right to work, fighting<br />

on behalf of American families<br />

and workers—and these moves will<br />

18<br />

DHS Secretary<br />

John F. Kelly<br />

strengthen our national<br />

security.<br />

The purpose of the<br />

order on border security<br />

is to direct executive<br />

departments and agencies<br />

to deploy all lawful<br />

means to secure the nation’s<br />

southern border,<br />

prevent further illegal<br />

immigration into the<br />

United States, and to repatriate illegal<br />

aliens swiftly, consistently, and<br />

humanely.<br />

This executive order establishes<br />

the foundation for securing our<br />

southern border by providing the<br />

tools, resources, and policy direction<br />

for DHS’s dedicated men and<br />

women who are responsible for securing<br />

the border—to prevent illegal<br />

immigration, drug and human<br />

trafficking, and acts of terrorism.<br />

In accordance with existing law,<br />

DHS is immediately taking all appropriate<br />

steps to plan, design, and<br />

construct a physical wall along the<br />

southern border, using the materials<br />

and technology that will most<br />

effectively achieve operational con-


trol of the southern border. In addition,<br />

DHS is immediately taking<br />

all appropriate action to ensure that<br />

the parole and asylum provisions of<br />

federal immigration law are applied<br />

consistent with the requirements of<br />

the law, and not exploited to prevent<br />

the removal of otherwise removable<br />

aliens.<br />

The executive order on interior<br />

immigration enforcement provides<br />

DHS with the tools it needs<br />

to enforce federal immigration laws<br />

within the United States. It will remove<br />

many of the obstacles that<br />

have been making it more difficult<br />

for the dedicated men and women<br />

of U.S. Immigration and Customs<br />

Enforcement (ICE) to carry out<br />

their mission, which includes arresting,<br />

detaining, and removing illegal<br />

aliens from the United States.<br />

Essentially, it will restore the highly<br />

successful Secure Communities<br />

Program, which allows ICE to more<br />

easily target criminal aliens for removal.<br />

A third executive order, signed<br />

by the President on January 27, will<br />

protect all Americans from certain<br />

foreign nationals who intend<br />

to commit terrorist attacks in the<br />

United States by preventing such<br />

individuals from exploiting our immigration<br />

laws. The order suspends<br />

entry into the United States from<br />

Iran, Iraq, Somalia, Sudan Syria,<br />

Libya and Yemen until a comprehensive<br />

review has been completed;<br />

directs Federal agencies to implement<br />

uniform screening standards<br />

across all immigration programs;<br />

suspends the Refugee Admissions<br />

Program for 120 days to assess the<br />

vulnerabilities in the program and<br />

establish additional procedures to<br />

ensure refugees admitted do not<br />

pose a threat to national security or<br />

public safety; orders completion of<br />

the biometric entry-exit system; and<br />

ensures that applicants for visas are<br />

personally interviewed before their<br />

visas are approved in compliance<br />

with INA 222.<br />

As the President has stated,<br />

“Homeland <strong>Security</strong> is in the business<br />

of saving lives, and that mandate<br />

will guide our actions.” These<br />

executive orders further that goal<br />

by enhancing border security, promoting<br />

public safety, and minimizing<br />

the threat of terrorist attacks by<br />

foreign nationals in the homeland.<br />

More important, however, these executive<br />

orders emphasize the rule<br />

of law as a bedrock principle of our<br />

immigration system and provide<br />

clearly defined consequences for<br />

those who would violate our laws.<br />

Border <strong>Security</strong><br />

and Immigration Enforcement<br />

As a nation, control of our borders<br />

is paramount. Without that control,<br />

every other form of threat—illicit<br />

drugs, unauthorized immigrants,<br />

19<br />

transnational organized crime, certain<br />

dangerous communicable diseases,<br />

terrorists—could enter at will.<br />

DHS was created to prevent terrorist<br />

attacks against the United States.<br />

The principal means of prevention<br />

within the United States is effective<br />

border control, denying admission<br />

to aliens who seek to harm Americans<br />

or violate our laws, and countering<br />

efforts to recruit individuals<br />

to undertake terrorist acts.<br />

Achieving this priority begins<br />

with physical obstacles like a border<br />

barrier and supporting infrastructure<br />

and surveillance capabilities.<br />

In this effort, I am committed to<br />

executing President Trump’s plan to<br />

secure our southern border with effective<br />

physical barriers, advanced<br />

technology, and strategic deployment<br />

of law enforcement personnel.<br />

While the presence of physical<br />

barriers and additional technology<br />

is essential, it must be bolstered by<br />

persistent patrol and the vigilance<br />

of the dedicated men and women of<br />

DHS.<br />

We must augment our expanded<br />

border security initiatives with<br />

vigorous interior enforcement and<br />

administration of our immigration<br />

laws in a manner that serves the<br />

national interest. This effort will include<br />

greater cooperation and coordination<br />

between DHS’s operational<br />

components, which are responsible<br />

for administering immigration ben-


DHS Secretary Kelly: “Ending the Crisis: America’s Borders and the Path to <strong>Security</strong>”<br />

efits and enforcing our nation’s existing<br />

immigration laws.<br />

Within DHS and our Federal,<br />

State, local, and international partners,<br />

we must expand our vetting<br />

of those seeking to enter our country—particularly<br />

of those individuals<br />

from high-risk countries—including<br />

refugees. We<br />

currently lack a comprehensive<br />

strategy<br />

with uniform screening<br />

standards to prevent<br />

terrorists from<br />

entering the country.<br />

Unfortunately, our<br />

country has recently<br />

admitted some foreign nationals<br />

without an adequate understanding<br />

of their allegiances and intentions.<br />

Additionally, because they are apprehended<br />

by DHS law enforcement<br />

agents, we know there continue to<br />

be any number of so-called “special<br />

interest aliens” that make their way<br />

into our country illegally each year.<br />

Last year, over 415,816 migrants,<br />

mostly from Central America and<br />

Mexico—including over 137,614<br />

unaccompanied children and individuals<br />

travelling in family units—<br />

were apprehended on our southern<br />

border. Many of those arriving at<br />

our southern border have fled violence,<br />

poverty, criminal networks,<br />

and gangs in their native countries.<br />

Border security requires a layered approach<br />

that extends far beyond our shores, throughout<br />

the hemisphere, in partnership with our<br />

neighbors to the south and north.<br />

20<br />

While the vast majority are fleeing<br />

violence or seeking economic opportunity,<br />

a small number of individuals<br />

could potentially be seeking<br />

to do us harm or commit crimes.<br />

Regardless of purpose or circumstance,<br />

the ease with which human<br />

smugglers have moved tens of thousands<br />

of people to our nation’s doorstep<br />

also serves as another warning<br />

sign: these smuggling routes are a<br />

potential vulnerability of our homeland.<br />

Our vigorous response to these<br />

threats must include increased border<br />

security infrastructure, personnel,<br />

and technology. However, we<br />

cannot just play defense in securing<br />

our borders. Border security<br />

requires a layered approach that<br />

extends far beyond our shores,<br />

throughout the hemisphere, in partnership<br />

with our neighbors to the<br />

south and north.<br />

Along nearly 7,000 miles of land<br />

border, approximately 95,000 miles<br />

of shoreline, and at 328 ports of entry<br />

and numerous locations abroad,<br />

U.S. Customs and Border Protection<br />

(CBP) has a critical role in preventing<br />

the illegal entry of people and<br />

goods into the United States.<br />

Across the wide expanses of our<br />

nation’s land, air, and maritime environments,<br />

CBP has worked to<br />

address the changing<br />

demographics<br />

of attempted border<br />

crossers and to<br />

maintain border security<br />

through significant<br />

investments<br />

in enforcement resources,<br />

technology,<br />

infrastructure, and enhanced<br />

operational tactics and strategy.<br />

Through advances in detection capabilities,<br />

such as fixed, mobile,<br />

and agent-portable surveillance<br />

systems, tethered and tactical aerostats,<br />

unmanned aircraft systems,<br />

and ground sensors, which work<br />

in conjunction with tactical border<br />

infrastructure and agent deployment,<br />

CBP is enhancing its ability<br />

to quickly detect, identify, and respond<br />

to illegal border crossings.<br />

At our nation’s air, land, and sea<br />

ports of entry, more travelers and<br />

cargo are arriving than ever before.<br />

To maintain the security of growing<br />

volumes of international travelers,<br />

CBP performs a full range of inspec-


tion activities and continues to enhance<br />

its pre-departure traveler vetting<br />

systems and integrate biometric<br />

technologies. CBP has also made<br />

significant developments in its intelligence<br />

and targeting capabilities<br />

to segment and target shipments<br />

and individuals by potential level of<br />

risk to identify and stop potentially<br />

dangerous travelers or cargo before<br />

boarding an aircraft or conveyance<br />

bound for the United States.<br />

Beyond managing the influx of<br />

people and cargo arriving in the<br />

United States, CBP is working with<br />

other DHS agencies to strengthen<br />

its capabilities to identify foreign<br />

nationals who have violated our immigration<br />

laws, as well as to track<br />

suspect persons and cargo exiting<br />

the country. CBP is also leveraging<br />

its newly-established Counter Network<br />

Program, which focuses on<br />

detecting, disrupting, and dismantling<br />

transnational criminal organizations,<br />

by expanding information<br />

sharing, increasing partnerships<br />

and collaboration that enhance<br />

border security, conducting joint<br />

exploitation of intelligence, and comanaging<br />

of operations with interagency<br />

and international partners.<br />

These efforts are building toward a<br />

safer and more secure border environment,<br />

one that supports the<br />

safety and success of each agent and<br />

21<br />

officer in the field.<br />

In the maritime environment,<br />

the U.S. Coast<br />

Guard (USCG) utilizes<br />

a multi-faceted layered approach<br />

to interdict threats far from<br />

the borders of our nation to combat<br />

the efforts of transnational criminal<br />

organizations. Targeting the primary<br />

flow of illicit drug traffic has a direct<br />

and damaging impact on these<br />

networks.<br />

Successful Coast Guard interdictions<br />

in the maritime transit zones<br />

feed a cycle of success—subsequent<br />

prosecutions lead to actionable intelligence<br />

on future events, which<br />

produces follow-on seizures and additional<br />

intelligence. Suspects from<br />

these cases divulge information<br />

during prosecution and sentencing<br />

that is critical to indicting, extraditing,<br />

and convicting drug kingpins<br />

and dismantling these sophisticated<br />

networks.<br />

USCG secures the maritime domain<br />

by conducting patrols and<br />

coordinating with other federal<br />

agencies and foreign countries to<br />

interdict aliens at sea, denying them<br />

illegal entry via maritime routes to<br />

the United States, its territories and<br />

possessions. Thousands of aliens attempt<br />

to enter this country illegally<br />

every year using maritime routes,<br />

many via smuggling operations. Interdicting<br />

these aliens at<br />

sea reduces the safety risks<br />

involved in such transits.<br />

Interdicted aliens can<br />

be quickly returned to their<br />

countries of origin, avoiding the<br />

costlier processes required if they<br />

successfully enter the United States.<br />

Interagency and International<br />

Cooperation<br />

As Secretary, I will advocate for expanding<br />

cooperation inside the interagency<br />

and with partner nations,<br />

particularly Canada and Mexico.<br />

Interagency relationships and bilateral<br />

cooperation are critical to identifying,<br />

monitoring, and countering<br />

threats to U.S. national security and<br />

regional stability. While DHS possesses<br />

unique authorities and capabilities,<br />

we must enhance and leverage<br />

our coordination with federal,<br />

state, local, and tribal partners. The<br />

magnitude, scope, and complexity<br />

of the challenges we face—illegal<br />

immigration, transnational crime,<br />

human smuggling and trafficking,<br />

and terrorism—demand an integrated<br />

counter-network approach.<br />

Regionally, we must continue to<br />

build partner capacity. Illegal immigration<br />

and transnational organized<br />

crime threaten not only our<br />

own security, but also the stability<br />

and prosperity of our Latin Ameri-


DHS Secretary Kelly: “Ending the Crisis: America’s Borders and the Path to <strong>Security</strong>”<br />

can neighbors. In Colombia, for<br />

example, we learned that key principles<br />

to defeating large cartels and<br />

insurgents are the same as defeating<br />

criminal networks: a strong, accountable<br />

government that protects<br />

its citizens, upholds the rule of law,<br />

and expands economic opportunity<br />

for all. It taught us that countering<br />

illicit trafficking and preventing terrorism<br />

often go hand-in- hand, and<br />

that U.S. interagency cooperation,<br />

coupled with a committed international<br />

partner, can help bring a<br />

country back from the brink. I believe<br />

these lessons can be applied<br />

across our many international partnerships,<br />

and in furtherance of our<br />

government’s many missions beyond<br />

our borders.<br />

Presently, we have a great opportunity<br />

in Central America to<br />

capitalize on the region’s growing<br />

political will to combat criminal<br />

networks and control hemispheric<br />

migration. Leaders in many of our<br />

partner nations recognize the magnitude<br />

of the tasks ahead and are<br />

prepared to address them, but they<br />

need our support. As we learned in<br />

Colombia, sustained engagement<br />

by the United States can make a real<br />

and lasting difference.<br />

Conclusion<br />

The security challenges facing DHS<br />

and our nation are considerable,<br />

particularly along the southern border.<br />

We have the laws in place to secure<br />

our borders. We also have outstanding<br />

men and women working<br />

at DHS, and in other federal, state,<br />

local, and tribal law enforcement<br />

agencies, who are committed to the<br />

border security mission. Finally, we<br />

now have a clear mission objective<br />

and the will to complete that mission<br />

successfully. We must accelerate<br />

our collective efforts to enforce<br />

the laws on the books and support<br />

those sworn to uphold the law. You<br />

have my commitment to work tirelessly<br />

to ensure that the men and<br />

women of DHS are empowered do<br />

their jobs.<br />

I believe in America and the principles<br />

upon which our country and<br />

way of life are guaranteed, and I<br />

believe in respect, tolerance, and<br />

diversity of opinions. I have a profound<br />

respect for the rule of law and<br />

will always strive to preserve it. As<br />

I mentioned in my confirmation<br />

hearing, I have never had a problem<br />

speaking truth to power, and I<br />

firmly believe that those in power<br />

deserve full candor and my honest<br />

assessment and recommendations.<br />

As Secretary, I recognize the<br />

many challenges facing DHS and I<br />

will do everything within my ability<br />

to meet and overcome those chal-<br />

22<br />

lenges, while preserving our liberty,<br />

upholding our laws, and protecting<br />

our citizens.<br />

Thank you again for the opportunity<br />

to appear before you today and<br />

for your continued support of DHS.<br />

I am confident that we will continue<br />

to build upon the momentum generated<br />

as a result of our previous operational<br />

achievements around the<br />

world. I remain committed to working<br />

with this Committee to forge a<br />

strong and productive relationship<br />

going forward to secure our borders<br />

and help prevent and combat<br />

threats to our nation.<br />

I would be pleased to answer any<br />

questions.


GSN’s <strong>2017</strong> Airport/Seaport/Border <strong>Security</strong> Awards<br />

Opening for Entries on March 15 with Many New Categories<br />

All Winners in this program are entitled to<br />

a Full-Page Advertisement (8.5” x 9.0”) in<br />

your choice of GSN’s <strong>Digital</strong> Magazine or<br />

Leaderboard in any edition of the Airport,<br />

Seaport, Rail, Border <strong>Security</strong> Weekly<br />

<strong>News</strong>letter.<br />

NEW IN <strong>2017</strong>:<br />

CLICK HERE TO<br />

SUBMIT A NOMINATION<br />

All Finalists are entitled to a Half-Page<br />

Advertisement (8.5” x 4.5”) in your choice<br />

of GSN’s <strong>Digital</strong> Magazine or Leaderboard<br />

in any edition of the Airport, Seaport, Rail,<br />

Border <strong>Security</strong> Weekly <strong>News</strong>letter.<br />

Adrian Courtenay<br />

Managing Partner, CEO<br />

<strong>Government</strong> <strong>Security</strong> <strong>News</strong><br />

917-696-5782<br />

acourtenay@gsnmagazine.com<br />

Steve Bittenbender<br />

Managing Editor<br />

<strong>Government</strong> <strong>Security</strong> <strong>News</strong><br />

502-552-1450<br />

sbittenbender@gsnmagazine.com<br />

Gerry O’Hara<br />

Designer<br />

OHDesign3<br />

203-249-0626<br />

gerry@ohd3.com


Salient CRGT Announces Definitive Agreement<br />

to Acquire Information Innovators, Inc.<br />

FAIRFAX, VA – <strong>February</strong> 6, <strong>2017</strong><br />

– Salient CRGT, Inc. (“Salient<br />

CRGT”), a leading provider of agile<br />

software development, data analytics,<br />

mobility, cyber security, and<br />

infrastructure solutions, today announced<br />

that it has signed a definitive<br />

agreement for the acquisition<br />

of Springfield, VA-based Information<br />

Innovators, Inc. (“Triple-i”), a<br />

technology and missionfocused<br />

company serving<br />

the federal government,<br />

with particular strength<br />

in the healthcare information<br />

technology (“IT”) arena. The<br />

agreement is expected to close within<br />

the first quarter of <strong>2017</strong>. Salient<br />

CRGT is backed by two private equity<br />

firms, Bridge Growth Partners,<br />

LLC and Frontenac Co, and Triple-i<br />

is backed by DFW Capital Partners.<br />

The transaction combines two<br />

highly complementary businesses.<br />

Triple-i has spent the past 16 years<br />

building and delivering a full suite of<br />

next generation solutions, including<br />

healthcare IT services, enterprise IT<br />

solutions, cloud services and agile<br />

development capabilities focused<br />

on the needs of customers within<br />

federal healthcare, civilian, national<br />

security, and defense markets. With<br />

the acquisition, Salient CRGT will<br />

increase its revenues to more than<br />

$500 million, solidifying the company’s<br />

position in the mid-tier federal<br />

IT services market and allowing<br />

it to effectively compete with largescale<br />

professional services providers<br />

while maintaining its agile, innovative,<br />

quality-driven, and customercentric<br />

approach.<br />

24<br />

“Salient<br />

CRGT’s acquisition<br />

of Triple-i directly supports<br />

the company’s long-term growth objectives<br />

to create a premier mid-tier<br />

agile software development, data<br />

analytics, cyber security and mobility<br />

solution and services company.<br />

By combining the ingenuity, creativity,<br />

and commitment of Salient<br />

CRGT and Triple-i employees, we<br />

will be able to deliver expanded services<br />

to our existing customers and<br />

offer compelling solutions to new<br />

customers,” said Brad Antle, Chief<br />

Executive Officer, Salient CRGT.<br />

“Now positioned firmly in this midtier<br />

market segment, Salient CRGT<br />

will compete more successfully and<br />

profitably in the federal IT market<br />

space with notable new capabilities<br />

in healthcare IT and consulting, IT<br />

infrastructure, network engineering<br />

and operations management, and<br />

cloud-based technologies.”<br />

“This exciting transaction is a strategic<br />

step forward for Salient CRGT<br />

that is consistent with the goals we<br />

set together with our private equity<br />

partners Bridge Growth<br />

and Frontenac, when<br />

we decided to merge Salient<br />

and CRGT in 2015.<br />

Triple-i has supported 11<br />

out of the 15 cabinet-level federal<br />

departments to design, implement,<br />

sustain and manage their IT and<br />

healthcare services requirements,”<br />

said Tom Ferrando, President of<br />

Salient CRGT. “By combining their<br />

experience and our network, this<br />

acquisition expands Salient CRGT’s<br />

portfolio of high-profile agencies,<br />

including Health and Human Services,<br />

Department of Veterans Affairs,<br />

Defense Health Agency, and<br />

Department of Homeland <strong>Security</strong><br />

while adding important contracts to<br />

our portfolio, including VA T4NG,


CMS SPARC, GSA PSS, and US-<br />

AMRAA TEAMS, among others.”<br />

Commenting on the strategic<br />

nature of the acquisition, Steve<br />

Ikirt, President and Chief Executive<br />

Officer of Triple-i said, “Over<br />

the years, there have been several<br />

companies interested in having<br />

Triple-i become part of their<br />

team. We determined that Salient<br />

CRGT had the strength of management,<br />

clear strategic direction,<br />

proven financial performance,<br />

and the right mix of capabilities<br />

and customers to be an ideal fit<br />

for Triple-i. With Salient CRGT,<br />

we will be even better positioned<br />

to serve our customers’ needs with<br />

a broader and more diverse set of<br />

services.”<br />

Terms of the transaction were not<br />

disclosed. RBC Capital Markets and<br />

Sagent Advisors served as Salient<br />

CRGT’s financial advisors, and KippsDeSanto<br />

& Co. served as Triplei’s<br />

financial advisor. Willkie Farr &<br />

Gallagher LLP and Garvey Schubert<br />

Barer served as legal advisor for<br />

Salient CRGT. Holland & Knight<br />

served as legal advisor for Triple-i.<br />

About Salient CRGT<br />

Salient CRGT provides agile software<br />

development, data analytics,<br />

mobility, cyber security and infrastructure<br />

solutions. We support<br />

these core capabilities with full lifecycle<br />

IT services and training—to<br />

Enterprise IT<br />

Ensuring technology platforms are secure,<br />

efficient, and reliable.<br />

help our customers meet critical<br />

goals for pivotal missions. We are<br />

purpose built for IT transformation<br />

supporting federal civilian, defense,<br />

homeland, and intelligence agencies,<br />

as well as Fortune 1000 companies.<br />

We use the most innovative<br />

talent delivery model in the industry,<br />

scientifically providing exactly<br />

the right people for the customers’<br />

most pressing requirements. Salient<br />

CRGT has earned a record of success<br />

with integration and operations<br />

of large‐scale, high‐volume solutions.<br />

For additional information<br />

on Salient CRGT, visit www.salientcrgt.com.<br />

About Information Innovators, Inc.<br />

Information Innovators Inc. (Triple-i)<br />

delivers solutions and services<br />

to IT and health-focused clients<br />

across the federal government. The<br />

25<br />

Company defines, develops, and<br />

implements innovations that help<br />

solve its customers’ hardest problems<br />

while saving them money,<br />

modernizing their systems, and<br />

achieving their mission objectives.<br />

Triple-i serves federal departments<br />

including Health and Human<br />

Services, Veterans Affairs,<br />

Homeland <strong>Security</strong>, Defense,<br />

Commerce, Transportation, Education,<br />

Housing and Urban Development,<br />

and the Intelligence<br />

Community through its core capabilities—enterprise<br />

IT services,<br />

cloud and hosting solutions, cyber<br />

security, software development and<br />

implementation, data and analytics,<br />

and health services. For more information,<br />

visit www.iiinfo.com.<br />

About Bridge Growth Partners<br />

Bridge Growth Partners, LLC brings<br />

together significant investment,<br />

financial, operating and strategic<br />

business building expertise and talent<br />

for the purpose of investing in<br />

carefully selected, growing and important<br />

segments of the technology<br />

and technology-enabled financial<br />

services sectors. For more information,<br />

visit www.bridgegrowthpartners.com.<br />

About Frontenac<br />

Frontenac is a leading private equity<br />

More on page 42


Federal experts agree that ‘Internet of Things’<br />

demands simple baked-in security<br />

By Tom O’Keefe<br />

As the federal government<br />

begins to<br />

incorporate mobile<br />

devices and the Internet<br />

of Things<br />

(IoT), security must<br />

be “baked in,” not “sprinkled on” as<br />

an afterthought to avoid hacking.<br />

That’s the verdict from experts<br />

in government and the contractor<br />

community, who recently met for<br />

a panel discussion on “Uniting Cybersecurity,<br />

Mobility and the Internet<br />

of Things” at immixGroup’s annual<br />

government summit on federal<br />

budgeting.<br />

The risk of cyber attack through<br />

IoT-enabled devices made headlines<br />

late last year when a highprofile<br />

internet-monitoring and<br />

traffic-routing company was hacked<br />

in a distributed denial of service<br />

(DDOS) attack. A simple malware<br />

called Mirai infected consumer<br />

DVRs, flooding the company with<br />

millions of bogus information requests.<br />

The company’s servers were<br />

overwhelmed, temporarily knocking<br />

out some of the nation’s most<br />

visited websites.<br />

Old security precautions<br />

don’t fit IoT<br />

Among federal agencies, current<br />

security requirements don’t necessarily<br />

fit in the new IoT environment.<br />

According to Jose Padin,<br />

sales engineering director,<br />

Federal Civilian & SI for Citrix, the<br />

fed’s approach to security “doesn’t<br />

always translate into consumerbased<br />

electronics.”<br />

The answer is for government organizations<br />

to develop or purchase<br />

new mobile and IoT solutions with<br />

security built in, said Michael Theis,<br />

with the CERT Insider Threat Center<br />

Software Engineering Institute.<br />

“I don’t think anyone’s really widely<br />

codified how you go about making<br />

sure that things are secure from the<br />

beginning,” said Theis.<br />

Padin noted that hardware, firmware<br />

and software for IoT-enabled<br />

products is “the wild west.” He said<br />

government must add security controls<br />

into procurement processes<br />

for these devices. He also acknowledged<br />

that industry must make investments<br />

in applying these requirements<br />

to all devices, rather than<br />

creating government versions.<br />

26<br />

Bad actors, Padin said, “realize<br />

that the weakest link is the consumer.”<br />

By building security provisions<br />

to products from the start, consumers<br />

will no longer be a vulnerability<br />

when they buy IoT-enabled appliances.<br />

At a more technical level, the challenge<br />

for government is to have the<br />

appropriate identity management<br />

requirements for mobility and IoT,<br />

according to Donna Dodson, director<br />

of the IT laboratory and chief<br />

cybersecurity advisor for NIST. A<br />

personal identity verification card,<br />

for example, “works nicely in a laptop<br />

or desktop but in a mobile device,<br />

not so much.”<br />

“The end users really matter here,”<br />

Dodson said. “We need to give them<br />

answers that are easy for them to<br />

do the right thing, hard to do the<br />

wrong thing and easy to back up if<br />

the wrong thing is done.” It’s important<br />

to think about identity management<br />

in the IoT space, she added.<br />

In many cases that may start “at<br />

the silicon level,” said Ashish Parikh,<br />

vice president of software and solutions<br />

at Arrow’s systems integration<br />

business. Silicon vendors are<br />

More on page 41


Farpointe warns access control channel to suggest customers<br />

add anti-hacking measures, as Federal Trade Commission is<br />

now insisting on cyber security protection<br />

SUNNYVALE, CA – <strong>February</strong><br />

14, <strong>2017</strong> – Farpointe Data, the access<br />

control industry’s trusted<br />

global partner for RFID solutions,<br />

is notifying its access control manufacturers,<br />

distributors, integrators<br />

and dealers that hacking of access<br />

control systems has become a threat<br />

far bigger than most think. Protecting<br />

their end-users from hackers is<br />

imperative for channel partners.<br />

“The U.S. federal government<br />

suffered a staggering 61,000 cybersecurity<br />

breaches, that it knows of,<br />

last year alone,” reports Farpointe<br />

Data President Scott Lindley. “Several<br />

recent events highlight the importance<br />

of why the access control<br />

channel must work with their customers<br />

to deal with accelerating<br />

hacking attacks.”<br />

According to Lindley, the most<br />

important is that the U.S. Federal<br />

Trade Commission (FTC) has decided<br />

that it will hold the business<br />

community responsible for failing<br />

to implement good cyber security<br />

practices and is now filing lawsuits<br />

against those that don’t. An appeals<br />

court has backed its lawsuit against<br />

the hotel chain operator Wyndham<br />

Worldwide for not protecting<br />

consumers’ information and, just<br />

recently, the FTC filed a lawsuit<br />

against D-Link and its U.S. subsidiary,<br />

alleging that it used inadequate<br />

safeguards on its wireless routers<br />

and IP cameras that left them vulnerable<br />

to hackers.<br />

“Prospective penalties go beyond<br />

FTC threats, though,” Lindley<br />

warns. “A luxury hotel in Austria,<br />

the Romantik Seehotel Jaegerwirt,<br />

recently had to pay hackers a ransom<br />

after they managed to access<br />

its electronic key system and lock all<br />

the hotel guests in their rooms. Approximately<br />

180 people were staying<br />

at the hotel on that day. Many<br />

were locked in their rooms, while<br />

others were locked out of theirs. The<br />

hackers demanded €1,500, about<br />

$1,600. The hotel decided to pay, explaining<br />

that they felt that they had<br />

no other choice, especially because<br />

neither police nor insurance could<br />

help them.”<br />

Adding to the problem, states<br />

Lindley, is that Wiegand, the industry<br />

standard over-the-air protocol<br />

commonly used to communicate<br />

credential data from a card to an<br />

27<br />

electronic<br />

access<br />

reader, is<br />

no longer<br />

inherently<br />

s e c u r e<br />

due to its<br />

original<br />

obscure<br />

and non-standard nature.<br />

For this reason, Farpointe has introduced<br />

features such as potting all<br />

readers and options that can be added<br />

to the readers. The first is MAX-<br />

Secure, which provides a higher-security<br />

handshake, or code, between<br />

the proximity or smart card, tag and<br />

reader to help ensure that readers<br />

will only accept information from<br />

specially coded credentials. The second<br />

is Valid ID, a new anti-tamper<br />

feature available with contactless<br />

smartcard readers, cards and tags.<br />

It can add an additional layer of<br />

authentication assurance to NXP’s<br />

MIFARE DESFire EV1 smartcard<br />

platform, operating independently,<br />

in addition to, and above the significant<br />

standard level of security that<br />

DESFire EV1 delivers. Valid ID lets<br />

More on page 40


Varex Imaging completes separation from Varian<br />

Medical Systems, Lists on Nasdaq Stock Market<br />

SALT LAKE CITY, UT – January 30,<br />

<strong>2017</strong> – Varex Imaging Corporation<br />

(Nasdaq: VREX) today announced<br />

that its spin-off from Varian Medical<br />

Systems (NYSE: VAR) has been<br />

successfully completed. The common<br />

stock of Varex Imaging, a new<br />

independent public company, will<br />

begin trading “regular way” today<br />

on the Nasdaq Global Select Market<br />

under the ticker symbol “VREX”.<br />

Under the terms of the previously<br />

announced separation, Varian<br />

stockholders received 0.4 of a share<br />

of Varex stock for every one share of<br />

Varian stock they held as of the record<br />

date of January 20, <strong>2017</strong>. Varex<br />

shares were distributed at 12:01 am<br />

Pacific Time on January 28, <strong>2017</strong> in<br />

a distribution that is intended to be<br />

tax-free for U.S. federal income tax<br />

purposes. Varex has approximately<br />

38 million shares outstanding.<br />

In connection with the separation,<br />

Varex made a $200 million cash payment<br />

to Varian. Varex funded this<br />

payment and related expenses from<br />

its $300 million revolving credit facility.<br />

The balance of undrawn funds<br />

remain available to fund working<br />

capital needs and other general corporate<br />

purposes.<br />

Varex Imaging Corporation is the world’s largest independent supplier of medical X-ray tubes<br />

and image processing solutions.<br />

28<br />

“The past few months have been<br />

very busy as we prepared for the<br />

spin-off of Varex Imaging and also<br />

announced the planned acquisition<br />

of the Medical Imaging business of<br />

PerkinElmer,” said Sunny Sanyal,<br />

President and Chief Executive Officer<br />

of Varex Imaging. “Much of our<br />

time recently has been filled with<br />

meetings, calls and roadshow presentations<br />

with the investor and analyst<br />

community. Overall, the past<br />

year has been an exciting time for us<br />

and I want to thank all the people<br />

at Varian and Varex who devoted so<br />

much time and effort to make the<br />

separation a success,” Sanyal added.<br />

Varex Management<br />

The new President and Chief Executive<br />

Officer of Varex Imaging is<br />

Sunny Sanyal (previously President<br />

of the Varian Imaging Components<br />

business). The new Chief Financial<br />

Officer is Clarence Verhoef (previously<br />

Varian Corporate Controller).<br />

The new General Counsel and<br />

Corporate Secretary is Kim Honeysett<br />

(previously Vice President and<br />

Assistant General Counsel and Assistant<br />

Corporate Secretary for Varian).


Varex Board Members<br />

• Dr. Ruediger Naumann-Etienne<br />

is Chairman of the Board of Varex<br />

Imaging Corporation. He has<br />

been the Owner and Managing<br />

Director of Intertec Group, an in<br />

vestment company specializing in<br />

the medical device field, since<br />

1989.<br />

• Sunny Sanyal is Varex’s President<br />

and Chief Executive Officer.<br />

• Christine A. Tsingos has been<br />

the Chief Financial Officer of<br />

Bio-Rad Laboratories, Inc. a<br />

global provider of life science<br />

research and clinical diagnostic<br />

products, since 2002.<br />

• Dow R. Wilson is President and<br />

Chief Executive Officer of Varian<br />

Medical Systems.<br />

• Dr. Erich R. Reinhardt is<br />

currently the Chairman of the<br />

Board of Medical Valley<br />

Europaische Metropol Region in<br />

Nürnberg in Germany. Previously,<br />

he was President and Chief<br />

Executive Officer of Siemens<br />

Healthcare (formerly<br />

Siemens Medical Solutions).<br />

• Jay K. Kunkel is Senior Vice<br />

President and President, Asia-<br />

Pacific Operations of Leer<br />

Corporation. He has extensive<br />

experience in Asia that includes<br />

his current role and previous<br />

senior management positions<br />

with Continental A.G. and SRP<br />

International Group Ltd.<br />

Additional information about Varex’s<br />

management, board of directors<br />

and corporate governance can be accessed<br />

via the Investors section of the<br />

company’s website at www.vareximaging.com.<br />

As previously disclosed, Varex expects<br />

revenues for fiscal year <strong>2017</strong><br />

to grow by 3-4 percent over the approximately<br />

$620 million recorded<br />

for fiscal year 2016 as set forth in the<br />

company’s Form 10 filing with the<br />

SEC. Assuming approximately 38<br />

million shares outstanding and a 35<br />

percent tax rate, Varex anticipates<br />

that GAAP net earnings per diluted<br />

share for the second through the<br />

fourth quarters of fiscal year <strong>2017</strong><br />

will be in the range of $1.20 to $1.30.<br />

Going forward Varex will provide<br />

annual guidance.<br />

Varex intends to file a 10-Q for<br />

the first quarter of fiscal year <strong>2017</strong><br />

approximately at the end of <strong>February</strong><br />

<strong>2017</strong>. Prior to the filing of Varex’s<br />

10-Q, Varian is expected to file<br />

financial information related to the<br />

discontinued operations of its Imaging<br />

Components business that is<br />

not anticipated to be comparable to<br />

the financial information included<br />

in Varex’s Form 10.<br />

J.P. Morgan Securities LLC and<br />

Wachtell, Lipton, Rosen & Katz acted<br />

as the respective financial and legal<br />

advisors in connection with the<br />

separation.<br />

29<br />

About Varex Imaging<br />

Varex Imaging Corporation is a<br />

leading innovator, designer and<br />

manufacturer of X-ray imaging<br />

components, which include tubes,<br />

digital flat panel detectors and other<br />

image processing solutions, which<br />

are key components of X-ray imaging<br />

systems. Varex’s components are<br />

used in medical imaging as well as<br />

in industrial and security imaging<br />

applications. With a 65+ year history<br />

of successful innovation, global<br />

OEM manufacturers of X-ray imaging<br />

system use the company’s X-ray<br />

sources, digital detectors, connecting<br />

devices and imaging software<br />

as components in their systems to<br />

detect, diagnose and protect. Varex<br />

employs approximately 1,400 people<br />

located at manufacturing and<br />

service center sites in North America,<br />

Europe, and Asia. For more information<br />

about Varex, visit www.<br />

vareximaging.com.<br />

Varex Imaging Corporation is the<br />

world’s largest independent supplier<br />

of medical X-ray tubes and image<br />

processing solutions. From medical<br />

imaging, to cargo screening and<br />

border security, our components are<br />

used by X-ray imaging system manufacturers<br />

everywhere to detect, diagnose,<br />

and protect.


Hot Topics: More opinions on Immigration<br />

New memos reveal harsh and unforgiving immigration road<br />

map, taking nation backwards in guaranteeing due process and<br />

providing safe havens, as Department of Homeland <strong>Security</strong><br />

implements President Trump’s immigration Executive Orders<br />

By Beth Werlin<br />

The White House released the<br />

implementation memos and other<br />

information on Monday about<br />

how the Department of Homeland<br />

<strong>Security</strong> (DHS) will begin<br />

implementing President Trump’s<br />

immigration Executive Orders<br />

on border security and immigration<br />

enforcement. The memos<br />

reveal that DHS intends to take<br />

our nation backwards in terms of<br />

guaranteeing due process, providing<br />

a safe haven for those who<br />

need it, and building productive<br />

and safe communities where everyone<br />

can thrive.<br />

What is in the memos?<br />

An end to long-standing protections<br />

for children. DHS intends<br />

to strip many children<br />

arriving alone at our border of<br />

basic protections and to penalize<br />

their parents for seeking to<br />

reunite with their children in<br />

the United States. They will do<br />

this by narrowing<br />

the definition<br />

of “unaccompanied<br />

alien child”<br />

in order to limit<br />

those protections<br />

and by launching<br />

either civil or<br />

criminal enforcement<br />

against the<br />

parents. This will<br />

result not only in scaring parents<br />

from coming forward to reunite<br />

with their children but also lead<br />

to more young children representing<br />

themselves in immigration<br />

court against a seasoned<br />

government attorney.<br />

A massive expansion of detention.<br />

The memos contemplate<br />

a massive expansion of detention,<br />

including a requirement<br />

that DHS officers detain nearly<br />

everyone they apprehend at or<br />

near the border. This detention<br />

space expansion—a boon to the<br />

private prison industry—means<br />

30<br />

Photo: Chucky Eager<br />

that more children, families and<br />

other vulnerable groups seeking<br />

protection in the United States<br />

will end up detained, at great financial<br />

and human cost.<br />

Prosecution priorities and discretion<br />

are gone. The new memos<br />

rescind earlier policies on<br />

whom to prosecute and deport<br />

and whom to deprioritize because<br />

they pose no threat to our<br />

communities. The new enforcement<br />

priorities are extremely<br />

broad covering nearly all undocumented<br />

individuals in the<br />

More on page 42


Supreme Court hears case on shooting of 15-year<br />

old Sergio Hernandez by U.S. Border Patrol Agent<br />

By Walter Ewing<br />

Officers with U.S. Customs and Border<br />

Protection (CBP)—the federal<br />

agency which includes the Border<br />

Patrol—are rarely held accountable<br />

for their actions. Nowhere is this<br />

more apparent than in the case of<br />

Sergio Hernandez, a 15-year-old<br />

boy shot dead in 2010 in Mexico by<br />

a Border Patrol agent who fired on<br />

him from the U.S. side of the border.<br />

The agent in question has never<br />

faced criminal charges for the<br />

killing. The boy’s mother brought<br />

a civil suit against the agent for<br />

damages, and her case was argued<br />

before the Supreme Court on <strong>February</strong><br />

21.<br />

The central question before the<br />

Court is whether a federal court<br />

has the authority to consider a<br />

civil suit such as this. The Court<br />

will determine, then, whether the<br />

agent must stand trial to account<br />

for his deadly conduct. But this case<br />

will have ramifications well beyond<br />

the actions of one Border Patrol<br />

agent because his actions represent<br />

a systemic lack of accountability<br />

within CBP.<br />

Rather than fix the system, the<br />

Trump administration is proposing<br />

to throw gasoline on the fire; adding<br />

thousands of new CBP officers to<br />

the mix without doing anything to<br />

ensure that the rights of the people<br />

whom CBP encounters are respected.<br />

The results could well prove fatal<br />

to more immigrants, regardless of<br />

which side of the border they find<br />

themselves on.<br />

The Hernandez case is egregious<br />

in a number of ways. According to<br />

the brief filed by his family, Sergio<br />

was playing with two friends just<br />

over the border from El Paso in<br />

Juarez. As is common among the<br />

children of Juarez, Sergio and his<br />

companions were running up the<br />

31<br />

side of a concrete culvert and touching<br />

that 18-foot-high border fence<br />

before running back down. Since<br />

they were playing and not trying to<br />

enter the United States, they did this<br />

in plain view of the Paso del Norte<br />

Port of Entry.<br />

Needless to say, they were unarmed.<br />

Nevertheless, a Border Patrol<br />

agent named Jesus Mesa took<br />

exception to this behavior and<br />

grabbed one of the boys as they ran<br />

back down the culvert. Mesa then<br />

drew his weapon and fired down<br />

into the culvert, hitting Sergio in<br />

the head. Mesa claimed that Sergio<br />

was throwing rocks at him.<br />

Because Sergio was standing in<br />

Mexico when Mesa killed him, the<br />

U.S. government is claiming that<br />

Mesa cannot be sued for violating<br />

Sergio’s rights.<br />

If the Supreme Court sides with<br />

Photo: Pete Jordan<br />

Mesa in this case, it is tantamount<br />

to declaring open season on anyone<br />

standing on the wrong side of<br />

the U.S.-Mexico borderline. Then<br />

again, it was already a declaration<br />

of open season when no criminal<br />

charges were filed against Mesa. In<br />

More on page 44


Hot Topics: More opinions on Immigration<br />

Abandoning priorities will make immigration<br />

enforcement work much harder<br />

Photo: t3hWIT<br />

By Mary Giovagnoli<br />

The Trump administration ensured<br />

this week that its immigration<br />

enforcement policies will be<br />

a chaotic affair marked by mistakes,<br />

civil rights violations and<br />

overzealous enforcement. They<br />

did this by outlining measures<br />

that they claim simply return<br />

power to immigration agents to<br />

do their jobs—measures such as<br />

authorizing the hiring of thousands<br />

more border and interior<br />

enforcement officers, eliminating<br />

targeted priorities for removal,<br />

and creating an aggressive<br />

plan to deputize local law<br />

enforcement.<br />

Significantly,<br />

the administration also rescinded<br />

virtually all guidance on the<br />

use of prosecutorial discretion.<br />

In the short-term, this dramatic<br />

rescission of guidance leaves<br />

officers with no framework for<br />

decision-making, except the<br />

vague idea that their mission is<br />

to deport as many unauthorized<br />

immigrants as possible. In the<br />

long-term, it turns the authority<br />

to arrest, detain, and deport individuals<br />

into a type of unchecked<br />

power that once unleashed is<br />

hard to pull back and is bound to<br />

create chaos.<br />

One of the defining measures<br />

of the Obama administration’s<br />

Priority Enforcement Program<br />

was discretion. Over the<br />

years, officers were given<br />

a set of enforcement priorities<br />

that emphasized<br />

the removal of persons<br />

convicted of serious<br />

crimes, or who were national<br />

security threats,<br />

or who had recently<br />

crossed the border. The<br />

memos categorized enforcement<br />

priorities not to<br />

32<br />

keep officers from doing their<br />

job, but to ensure that officers<br />

had guidance that gave them a<br />

framework for using their resources<br />

and making good choices<br />

about individual cases based<br />

on more than just the authority<br />

to arrest and detain someone.<br />

The November 2014 memos<br />

issued by former Secretary Jeh<br />

Johnson emphasized that even<br />

within these priority categories<br />

there were reasons why an individual<br />

case might merit a decision<br />

to decline to prosecute.<br />

These memos and others emphasized<br />

the favorable exercise of<br />

discretion—in other words, the<br />

need to triage cases, starting first<br />

with the nature of the violation<br />

(is this person a convicted killer<br />

or a jaywalker?) and then walking<br />

progressively through other factors<br />

such as whether this person<br />

was a victim of domestic abuse,<br />

or an asylum seeker, or had U.S.<br />

citizen children. The goal was<br />

to ensure that limited resources<br />

were used to remove those who<br />

posed a threat to safety or securi-<br />

More on page 42


“Expedited removal” of noncitizens called for<br />

in President’s January 25 executive order<br />

President Trump’s January<br />

25, <strong>2017</strong>, executive<br />

order directs the Department<br />

of Homeland <strong>Security</strong><br />

(DHS) to dramatically<br />

expand the use of<br />

“expedited removal.” Created<br />

in 1996, expedited<br />

removal is a process by<br />

which low-level immigration<br />

officers can quickly<br />

deport certain noncitizens<br />

who are undocumented or<br />

have committed fraud or misrepresentation.<br />

Since 2004, immigration<br />

officials have used expedited removal<br />

to deport individuals who arrive<br />

at our border, as well as individuals<br />

who entered without authorization<br />

if they are apprehended within<br />

two weeks of arrival and within 100<br />

miles of the Canadian or Mexican<br />

border.<br />

One of the major problems with<br />

expedited removal is that the immigration<br />

officer making the decision<br />

virtually has unchecked authority.<br />

Individuals subject to expedited<br />

removal rarely see the inside of a<br />

courtroom because they are not afforded<br />

a regular immigration court<br />

hearing before a judge. In essence,<br />

the immigration officer serves both<br />

as prosecutor and judge. Further,<br />

given the speed at which the process<br />

takes place, there is rarely an opportunity<br />

to collect evidence or consult<br />

with an attorney, family member, or<br />

friend before the decision is made.<br />

Such a truncated process means<br />

there is a greater chance that persons<br />

are being erroneously deported<br />

from the United States, potentially<br />

to imminent harm or death. Moreover,<br />

individuals who otherwise<br />

might qualify for deportation relief<br />

if they could defend themselves<br />

in immigration court are unjustly<br />

deprived of any opportunity to do<br />

so. Yet expedited removal has been<br />

33<br />

increasingly applied in<br />

recent years; 44 percent<br />

of all removals from the<br />

United States were conducted<br />

through expedited<br />

removal in Fiscal Year<br />

(FY) 2013, the most recent<br />

government data available.<br />

A dramatic expansion,<br />

as directed by President<br />

Trump, might result<br />

in thousands of additional<br />

deportations without due process.<br />

What the Law Says<br />

“Expedited removal” refers to the<br />

legal authority given to even lowlevel<br />

immigration officers to order<br />

the deportation of some non-U.S.<br />

citizens without any of the dueprocess<br />

protections granted to most<br />

other people—such as the right to<br />

an attorney and to a hearing before<br />

a judge. The Illegal Immigration<br />

and Immigrant Responsibility Act<br />

of 1996 created expedited removal,<br />

but the federal government subsequently<br />

expanded it significantly.<br />

As it now stands, immigration officers<br />

can summarily order the removal<br />

of nearly any foreign national


Hot Topics: More opinions on Immigration<br />

who arrives at the border without<br />

proper documents; additionally, undocumented<br />

immigrants who have<br />

been in the United States 14 days or<br />

less since entering without inspection<br />

are subject to expedited removal<br />

if an immigration officer encounters<br />

them within 100 miles of the<br />

U.S. border with either Mexico or<br />

Canada. As a general rule, however,<br />

DHS applies expedited removal to<br />

only those Mexican and Canadian<br />

nationals with histories of criminal<br />

or immigration violations, as well as<br />

persons from other countries who<br />

are transiting through Mexico or<br />

Canada. There is no right to appeal<br />

an immigration officer’s decision to<br />

deport someone via expedited removal.<br />

Individuals in expedited removal<br />

are detained until removed.<br />

By law, expedited removal may<br />

not be applied to certain individuals.<br />

U.S. citizens or lawful permanent<br />

residents (LPRs, or “green<br />

card” holders) should not be subject<br />

to expedited removal. Nor should<br />

it be used against refugees, asylees,<br />

or asylum seekers (people who fear<br />

persecution in their home countries<br />

or indicate an intention to apply for<br />

asylum).<br />

Asylum seekers are instead referred<br />

to an asylum officer for an<br />

interview to determine if they have<br />

a “credible fear” of persecution. If<br />

an individual has been previously<br />

deported, an asylum officer determines<br />

if the person has a “reasonable<br />

fear” of persecution—a higher<br />

standard than “credible fear.” If the<br />

asylum officer fails to find that the<br />

person has a credible or reasonable<br />

fear of return, that person is ordered<br />

removed. Before deportation, the<br />

individual may challenge the asylum<br />

officer’s adverse finding by requesting<br />

a hearing before an immigration<br />

judge, who must review the<br />

case “to the maximum extent practicable<br />

within 24 hours, but in no<br />

case later than 7 days….” The judge’s<br />

review is limited solely to assessing<br />

whether the individual’s fear is credible<br />

or reasonable.<br />

Individuals found to have a credible<br />

or reasonable fear of persecution<br />

are detained pending further<br />

review of their asylum case. In limited<br />

circumstances, these individuals<br />

may be paroled—that is, released<br />

from detention—and permitted to<br />

remain in the United States while<br />

their asylum case is pending.<br />

Until January <strong>2017</strong>, an exception<br />

to expedited removal had been<br />

made for “an alien who is a native<br />

or citizen of a country in the Western<br />

Hemisphere with whose government<br />

the United States does not<br />

have full diplomatic relations and<br />

who arrives by aircraft at a port of<br />

34<br />

entry.” Cubans arriving by aircraft<br />

had been exempted from expedited<br />

removal under this provision, but in<br />

the closing days of the Obama administration,<br />

DHS published a regulation<br />

eliminating Cuban nationals<br />

from the exemption.<br />

Use of Expedited Removal<br />

Is on the Rise<br />

The use of expedited removal to deport<br />

people has risen substantially<br />

over the past two decades. In FY<br />

2013, approximately 193,000 persons<br />

were deported from the United<br />

States through expedited removal.<br />

That represents 44 percent of all<br />

438,000 removals from the United<br />

States in 2013<br />

CONCERNS ABOUT<br />

EXPEDITED REMOVAL<br />

Erroneous Deportations<br />

There are few checks on the authority<br />

of immigration officers to place<br />

non-citizens in expedited removal<br />

proceedings. In essence, the law<br />

permits the immigration officer to<br />

serve both as prosecutor (charged<br />

with enforcing the law) and judge<br />

(rendering a final decision on the<br />

case). Generally, the entire process<br />

consists of an interview with the inspecting<br />

officer, so there is little or<br />

no opportunity to consult with an<br />

attorney or to gather any evidence


that might prevent deportation. For<br />

those who are traumatized from<br />

their journey or harm they fled,<br />

the short timelines can make it extremely<br />

difficult to clearly explain<br />

why they need protection in the<br />

United States.<br />

The abbreviated process increases<br />

the likelihood that a person who is<br />

not supposed to be subject to expedited<br />

removal—such as a U.S. citizen<br />

or LPR—will be erroneously removed.<br />

Moreover, individuals who<br />

otherwise would be eligible to make<br />

a claim for “relief from removal”<br />

(to argue they should be permitted<br />

to stay in the United States) may be<br />

unjustly deprived of any opportunity<br />

to pursue relief. For example, a<br />

witness or victim of a crime might<br />

be eligible for status but is prohibited<br />

from making such a claim in<br />

expedited removal proceedings.<br />

Inadequate Protection<br />

of Asylum Seekers<br />

In practice, not all persons expressing<br />

a fear of persecution if returned<br />

to their home countries are provided<br />

a credible or reasonable fear screening.<br />

Studies by the U.S. Commission<br />

on International Religious Freedom<br />

(USCIRF) noted that, in some cases,<br />

immigration officers pressured<br />

individuals expressing fear into<br />

withdrawing their application for<br />

admission—and thus their request<br />

for asylum—despite DHS policies<br />

forbidding the practice. In other<br />

cases, government officers failed to<br />

ask if the arriving individual feared<br />

return. In addition, the Commission<br />

found that the government did<br />

not have sufficient quality assurance<br />

mechanisms in place to ensure that<br />

asylum seekers were not improperly<br />

being turned back.<br />

A Growing Backlog of<br />

Asylum Applications<br />

Individuals expressing fear of return<br />

who are diverted from expedited<br />

removal are referred to asylum officers<br />

for screening. These officers<br />

are often the same corps handling<br />

affirmative asylum applications (i.e.,<br />

cases filed by individuals not in removal<br />

proceedings). Since these<br />

asylum seekers are detained pending<br />

completion of the credible or<br />

reasonable fear process, their cases<br />

are prioritized by the government.<br />

Asylum Office resources are therefore<br />

diverted to these interviews,<br />

contributing to the backlog of affirmative<br />

asylum cases.<br />

Further expansion of expedited<br />

removal will require significantly<br />

more asylum officers, or the backlog<br />

of affirmative asylum cases will<br />

continue to grow. This workload<br />

management crisis could be avoided<br />

35<br />

entirely if DHS personnel placed all<br />

asylum seekers apprehended at the<br />

border in regular immigration court<br />

proceedings and paroled them<br />

pending their hearings. Providing<br />

the immigration court system with<br />

enough funds to sufficiently staff<br />

immigration judge teams would<br />

help ensure that asylum seekers get<br />

a prompt court hearing.<br />

FREE SUBSCRIPTION<br />

SIGN-UP<br />

Monthly <strong>Digital</strong> <strong>Edition</strong><br />

Airport/Seaport <strong>News</strong>letter<br />

Daily Insider <strong>News</strong>letter<br />

Cybersecurity <strong>News</strong>letter<br />

CLICK HERE


Expansion of DMARC is critical to reducing spread of<br />

malicious emails, says Global Cyber Alliance, calling on<br />

leading Cyber companies to improve email protections<br />

SAN FRANCISCO, CA – <strong>February</strong><br />

14, <strong>2017</strong> – There is a fix that can prevent<br />

a great amount of email-born<br />

attacks on consumers and businesses.<br />

Unfortunately, the vast majority<br />

of public and private organizations<br />

globally, including leading<br />

cybersecurity companies, have not<br />

deployed DMARC (Domain-based<br />

Message Authentication, Reporting<br />

& Conformance) to prevent<br />

spammers and phishers from<br />

using an organization’s name to<br />

conduct cyber attacks, according<br />

to new research from the Global<br />

Cyber Alliance (GCA).<br />

DMARC provides insight into<br />

any attempts to spam, phish or<br />

spear-phish using an organization’s<br />

brand or name. DMARC is supported<br />

by 85 percent of consumer<br />

email inboxes in the United States<br />

(including Gmail, Yahoo, Microsoft,<br />

etc.) and more than 2.5 billion<br />

email inboxes worldwide. However,<br />

DMARC adoption rates among enterprises<br />

and government remains<br />

low.<br />

The UK <strong>Government</strong>’s guidance<br />

for government agencies directs<br />

them to implement DMARC but<br />

as of December 2016 only five percent<br />

of UK public sector domains<br />

had done so. A mere 16 percent of<br />

the healthcare sector has adopted<br />

DMARC.<br />

The latest research from GCA, an<br />

international cross-sector organization<br />

dedicated to confronting systemic<br />

cyber risk, finds that adoption<br />

remains low in the cybersecurity industry<br />

as well.<br />

Only 15 percent of the 587 email<br />

domains (that were scanned) for<br />

companies exhibiting at the RSA<br />

Conference -- one of the world’s<br />

largest gatherings of cybersecurity<br />

experts -- use DMARC. Of the<br />

90 RSA exhibiting organizations<br />

that do use DMARC, more than<br />

66 percent use the DMARC policy<br />

of “none,” which only monitors for<br />

email domains, greatly reducing the<br />

effectiveness of DMARC.<br />

36<br />

It is time for the cybersecurity industry<br />

to lead the charge and push<br />

for DMARC use across the globe.<br />

GCA strongly advocates that organizations<br />

implement DMARC and<br />

has developed a free DMARC Setup<br />

Guide to make DMARC implementation<br />

easier (https://dmarc.globalcyberalliance.org/).<br />

The value of correctly implementing<br />

DMARC is clear as studiesiii<br />

have shown that organizations<br />

that use DMARC correctly receive<br />

just 23 percent of the email<br />

threats that those who do not<br />

use DMARC.<br />

“As world leaders in cybersecurity,<br />

we can do better. DMARC protects<br />

brands and preserves consumer<br />

confidence. While no security effort<br />

is cost-free, clear guidance and<br />

tools, such as the GCA DMARC<br />

Setup Guide, make DMARC implementation<br />

practical, and the benefits<br />

are considerable. DMARC is<br />

one of the cybersecurity protocols<br />

that can broadly reduce risk, and the<br />

more it is implemented, the more<br />

protection if offers for everyone,”<br />

said Philip Reitinger, President and


CEO of GCA. “I’m placing a stake<br />

in the ground and calling on the<br />

cybersecurity industry to lead the<br />

adoption of DMARC, with a goal<br />

that 50 percent of the companies<br />

that exhibit at the 2018 RSA Conference<br />

implement DMARC prior<br />

to the conference, and that 90 percent<br />

implement prior to the 2019<br />

RSA Conference. Working together<br />

the cybersecurity industry can be a<br />

role model and make a difference.”<br />

About The Global Cyber Alliance<br />

The Global Cyber Alliance (GCA)<br />

is an international, cross-sector effort<br />

dedicated to confronting cyber<br />

risk and improving our connected<br />

world. It is a catalyst to bring communities<br />

of interest and affiliations<br />

together in an environment that<br />

sparks innovation with concrete,<br />

measureable achievements. While<br />

most efforts at addressing cyber risk<br />

have been industry, sector, or geographically<br />

specific, GCA partners<br />

across borders and sectors. GCA’s<br />

mantra “Do Something. Measure It.”<br />

is a direct reflection of its mission to<br />

eradicate systemic cyber risks.<br />

GCA, a 501(c)3, was founded in<br />

September 2015 by the Manhattan<br />

District Attorney’s Office, the City<br />

of London Police and the Center<br />

for Internet <strong>Security</strong>. Learn more at<br />

www.globalcyberalliance.org.<br />

Milestone release, enabling<br />

record-breaking performance for<br />

XProtect users, delivers highest<br />

performing VMS ever, complete with<br />

new Cybersecurity focus.<br />

COPENHAGEN – <strong>February</strong> 15,<br />

<strong>2017</strong> – Milestone Systems, the open<br />

platform company in networked<br />

video management software (VMS),<br />

has released XProtect <strong>2017</strong> R1.<br />

Milestone is committed to delivering<br />

three VMS product releases every<br />

year, in addition to bi-monthly<br />

device pack releases supporting<br />

third-party devices. This frequent<br />

release schedule will ensure Milestone’s<br />

rapid response to market and<br />

Milestone community needs.<br />

Highest VMS Performance<br />

Thanks to the true open platform<br />

technology in XProtect, Milestone<br />

can rapidly respond to community<br />

needs and enable cost-efficiency in<br />

large installations. For XProtect,<br />

this entails a recording server performance<br />

of 3.1 Gigabit/S. This high<br />

performance level enables Milestone<br />

community partners to offer<br />

large solutions using a reduced<br />

number of servers, or even smaller<br />

servers. This contributes to hardware<br />

costs savings and a simplified<br />

37<br />

infrastructure. In short, it significantly<br />

reduces the total cost of a<br />

Milestone solution.<br />

Pioneering Hardware Acceleration<br />

In the latest XProtect releases, Milestone<br />

has harvested the advantages<br />

of the close<br />

relationships<br />

with Intel and<br />

Microsoft by<br />

implementing<br />

hardware acceleration.<br />

The<br />

processor-intensive<br />

task of<br />

decoding (rendering)<br />

video is<br />

offloaded to the<br />

Bjorn Skou Eilertsen<br />

CTO<br />

dedicated graphics system (GPU)<br />

inside the processer, leaving the<br />

main processor free to take on other<br />

tasks. The GPU is optimized to handle<br />

computer graphics and video,<br />

meaning these tasks will be greatly<br />

accelerated. Using the technology in<br />

servers can save even more expen-<br />

More on page 43


Facial biometric boarding solution by<br />

Vision Box being tried at Schipol Airport<br />

AMSTERDAM, <strong>February</strong> 10th,<br />

<strong>2017</strong> – Boarding quickly and easily<br />

without showing your boarding<br />

pass or passport is the goal of the<br />

biometric boarding trial in operation<br />

at Schiphol Airport. Involving<br />

KLM, the three-month initiative<br />

intends to test facial recognition to<br />

expedite and speed up passenger<br />

boarding, recognizing them by their<br />

face.<br />

At a specially selected gate at the<br />

airport, a dedicated kiosk was made<br />

available for passengers to register<br />

for the trial, by scanning their passport<br />

and their boarding pass, as well<br />

as enroll their face image. This will<br />

allow them to quickly go through a<br />

biometric eGate simply looking at a<br />

camera, without showing any document.<br />

Vision-Box and Schiphol have<br />

been working together in the scope<br />

of the recently announced framework<br />

agreement, developing innovations<br />

and creating smart ways of<br />

improving ease of travel, speed, and<br />

airport processes. As the airport<br />

aims to become “Leading <strong>Digital</strong><br />

Airport” in 2018, Vision-Box was<br />

the partner allowing one further<br />

step in that direction.<br />

It is expected that after the trial,<br />

biometric boarding will roll out to<br />

more boarding gates at the airport.<br />

About Vision-Box<br />

Founded in 2001, Vision-Box is<br />

the leading provider of electronic<br />

identity solutions, intelligent security<br />

management, and automated<br />

border control systems that use<br />

ICAO- compliant standards.<br />

The biometric border control<br />

portfolio aimed at airports, airlines<br />

and immigration authorities, includes<br />

solutions addressing a variety<br />

of business scenarios which englobe<br />

38<br />

security check-points, self-boarding<br />

gates and automated border control<br />

gates.<br />

Every second, millions of images<br />

are being captured and processed<br />

by Vision-Box systems, installed<br />

right at the heart of the most prestigious<br />

organizations, who trust our<br />

biometric identity and digital video<br />

management solutions for their<br />

critical applications.<br />

Covering the entire ID management<br />

life cycle, Vision-Box also<br />

delivers, to governments and issuing<br />

authorities, solutions ranging<br />

from live biometric enrollment stations,<br />

document verification kiosks<br />

and digital document dispensers.<br />

Starting with the process of identity<br />

enrollment, covering the life cycle<br />

of a biometric identity document<br />

and finally assuring its verification<br />

and identification towards the user,<br />

Vision-Box’s product portfolio is<br />

linked together through a powerful<br />

service platform, which orchestrates<br />

the trusted chain of identity of the<br />

citizen. Vision-Box’s solution portfolio<br />

enables the implementation<br />

of advanced border management<br />

systems, integrated with advanced<br />

More on page 43


Statement from Secretary Kelly on recent<br />

ICE enforcement actions<br />

WASHINGTON, DC – <strong>February</strong><br />

14 – Last week, U.S. Immigration<br />

and Customs Enforcement (ICE)<br />

launched a series of targeted enforcement<br />

operations across the<br />

country. These operations targeted<br />

public safety threats, such as convicted<br />

criminal aliens and gang<br />

members, as well as individuals who<br />

have violated our nation’s immigration<br />

laws, including those who illegally<br />

re-entered the country after<br />

being removed and immigration fugitives<br />

ordered removed by federal<br />

immigration judges.<br />

ICE officers in the Los Angeles,<br />

Chicago, Atlanta, San Antonio and<br />

New York City areas of responsibility<br />

arrested more than 680 individuals<br />

who pose a threat to public safety,<br />

border security or the integrity<br />

of our nation’s immigration system.<br />

Of those arrested, approximately 75<br />

percent were criminal aliens, convicted<br />

of crimes including, but not<br />

limited to, homicide, aggravated<br />

sexual abuse, sexual assault of a minor,<br />

lewd and lascivious acts with<br />

a child, indecent liberties with a<br />

minor, drug trafficking, battery, assault,<br />

DUI and weapons charges.<br />

ICE conducts these kind of targeted<br />

enforcement operations regularly<br />

and has for many years. The focus<br />

of these enforcement operations is<br />

consistent with the routine, targeted<br />

arrests carried out by ICE’s Fugitive<br />

Operations teams on a daily basis.<br />

President Trump has been clear<br />

in affirming the critical mission of<br />

DHS in protecting the nation and<br />

directed our Department to focus<br />

on removing illegal aliens who have<br />

violated our immigration laws, with<br />

a specific focus on those who pose<br />

a threat to public safety, have been<br />

charged with criminal offenses,<br />

have committed immigration violations<br />

or have been deported and reentered<br />

the country illegally.<br />

I commend the heroic efforts of<br />

the dedicated officers of ICE’s Office<br />

of Enforcement and Removal<br />

Operations and those who provided<br />

assistance from ICE Homeland <strong>Security</strong><br />

Investigations, the U.S. Marshals<br />

Service, as well as cooperating<br />

state and local law enforcement<br />

agencies. These professionals put<br />

their lives on the line to protect our<br />

communities and country. There is<br />

no greater calling than to serve and<br />

protect our nation – a mission that<br />

the men and women of ICE perform<br />

39<br />

with professionalism and courage<br />

every single day.<br />

Fact Sheets<br />

• 190 arrested in Georgia, the<br />

Carolinas, during ICE operation<br />

targeting criminal aliens, illegal<br />

re-entrants and immigration<br />

fugitives<br />

• 235 arrested in six Midwestern<br />

states during ICE operation<br />

targeting criminal aliens, illegal<br />

re-entrants, and immigration<br />

fugitives<br />

• ICE arrests 161 in Los Angelesarea<br />

operation targeting criminal<br />

aliens, illegal re-entrants, and<br />

immigration fugitives<br />

• 41 arrested in New York-area ICE<br />

operation targeting criminal<br />

aliens, illegal re-entrants, and<br />

immigration fugitives<br />

• 28 arrested in San Antonio-area<br />

ICE operation targeting criminal<br />

aliens, illegal re-entrants, and<br />

immigration fugitives<br />

ICE Fugitive Enforcement Operations


Cyberbit’s EDR Platform to help<br />

Infor detect Malware that bypasses<br />

antivirus<br />

Continued from page 4<br />

how Cyberbit maximizes protection<br />

against today’s signature-less<br />

threats, visit www.cyberbit.net.<br />

About Infor<br />

Infor builds business software for<br />

specific industries in the cloud.<br />

With 15,000 employees and over<br />

90,000 customers in more than 170<br />

countries, Infor software is designed<br />

for progress. To learn more about Infor,<br />

please visit www.infor.com.<br />

Farpointe warns access control<br />

channel to suggest customers add<br />

Anti-Hacking measures<br />

Continued from page 27<br />

a smartcard reader effectively help<br />

verify that the sensitive access control<br />

data programmed to a card or<br />

tag is not counterfeit.<br />

“With the increasing incidences<br />

of hacking throughout the world<br />

and the fact that the FTC is now reviewing<br />

such cyber security lapses<br />

should make channel partners providing<br />

access control products and<br />

systems take notice and suggest<br />

anti-hacking solutions to their customers,”<br />

Lindley argues.<br />

British air traffic control provider<br />

tabs Rohde & Schwarz<br />

Continued from page 16<br />

and sustainable air traffic control<br />

in line with the highest safety standards.<br />

Rohde & Schwarz is a proven<br />

provider on the market offering the<br />

ability to create virtual control centres.<br />

The electronics firm meets this<br />

challenge with the R&S VCS-4G IP<br />

based voice communications system.<br />

The fully VoIP-based system<br />

in line with the EUROCAE ED-137<br />

B standard features a distributed,<br />

redundant architecture. It will link<br />

the control centres in Swanwick<br />

and Prestwick and provide the geographic<br />

flexibility to manage their<br />

operations as one operational environment<br />

in the future.<br />

Rohde & Schwarz is participating<br />

in the World ATM Congress <strong>2017</strong><br />

in Madrid. From March 7 to 9, the<br />

company will showcase its comprehensive<br />

portfolio for state-of-the-art<br />

air traffic management at booth 586,<br />

hall 9. More information: https://atc.<br />

rohde-schwarz.com.<br />

About Rohde & Schwarz<br />

The Rohde & Schwarz electronics<br />

group is a leading supplier of solutions<br />

in the fields of test and measurement,<br />

broadcasting, secure<br />

communications, and radiomonitoring<br />

and radiolocation. Founded<br />

80 years ago, this independent global<br />

company has an extensive sales<br />

network and is present in more than<br />

40<br />

Law suits challenge “Muslim Ban”<br />

executive order<br />

Continued from page 10<br />

6-year-old Somali son is also in limbo.<br />

Ms. Ali, a U.S. citizen, began the<br />

process to bring him to the United<br />

States in August 2016. But they too<br />

now are left to worry that the visa<br />

process will remain suspended indefinitely.<br />

Like thousands before them, these<br />

plaintiffs have diligently pursued the<br />

rigorous immigrant visa process,<br />

which includes paying hundreds<br />

of dollars in filing fees, undergoing<br />

security screenings and medical examinations,<br />

and attending an interview<br />

before a consular officer.<br />

The arbitrary and unfair nature<br />

of the ban will be difficult to defend<br />

in court. There are multiple challenges<br />

afoot and likely many more<br />

to come as the President seeks to<br />

close America’s doors to the rest of<br />

the world.<br />

70 countries. It has around 9300 employees<br />

and achieved a net revenue<br />

of EUR 1.9 billion (USD 2.5 billion)<br />

in fiscal year 2012/2013 (July 2012<br />

through June 2013). The company is<br />

headquartered in Munich, Germany.<br />

R&S ® is a registered trademark<br />

of Rohde & Schwarz GmbH & Co.<br />

KG


AMICO <strong>Security</strong> Launches Next<br />

Generation ANC Composite Fence<br />

System<br />

Continued from page 17<br />

fence system is fire retardant and<br />

corrosion resistant. Laboratory testing<br />

of leakage current and flashover<br />

voltage shows the ANC fence system<br />

revealed no electrical conductivity<br />

for up to 650,000 volts.<br />

About AMICO <strong>Security</strong><br />

AMICO security is an industry<br />

leader in manufacturing medium<br />

to high security perimeter systems.<br />

AMICO has been in business<br />

for over 76 years and our patented<br />

proprietary systems protect infrastructure<br />

and boarders throughout<br />

the world. The new AMIGUARD<br />

perimeter system is the gold standard<br />

for perimeter protection and<br />

is rapidly becoming the number one<br />

choice for infrastructure protection<br />

worldwide.<br />

Federal Experts Agree that<br />

‘Internet of Things’ Demands<br />

Simple Baked-In <strong>Security</strong><br />

Continued from page 26<br />

becoming concerned with identity<br />

and maintaining a “chain of custody<br />

to the device, to the network, to the<br />

solution,” to ensure appropriate access.<br />

The cloud’s role<br />

in IoT development<br />

When it comes to application development<br />

incorporating mobility and<br />

IoT, panelists concurred that the<br />

cloud offers a means of shortcutting<br />

the process, with minimal risk to security.<br />

<strong>Government</strong> versions of the<br />

cloud are usually more secure than<br />

enterprise offerings, which allows<br />

people to focus on solving their<br />

problem, rather than on building<br />

out infrastructure, said Parikh.<br />

“When we talk about IoT and you<br />

say, ‘Yes, I’m going to build it from<br />

the sensor all the way up to the<br />

cloud and I’m going to have all that<br />

in my agency,’ good luck. We’ll see<br />

you in a couple of decades and you’ll<br />

be left behind,” Parikh noted.<br />

Padin agreed that the cloud offers<br />

a more practical environment<br />

for the coming wave of IoT applications.<br />

IoT sensors, Padin said,<br />

generate “tons of data,” and it isn’t<br />

“realistic” to house that data in an<br />

on-premise system.<br />

41<br />

What’s more, the data generated<br />

by IoT devices ties back to mobility,<br />

Padin said. “We have this great<br />

pool of data, what do we do with it?<br />

People want access to it in real-time,<br />

but how?” Mobility can provide active<br />

alerting to take action on data<br />

in real-time, extended to the mobile<br />

device. “All of this is interconnected,”<br />

he said. “It’s a system that needs<br />

to be thought about completely.”<br />

Despite concerns about security,<br />

panelists agreed that there is huge<br />

upside potential to IoT for government<br />

applications.<br />

“These are really quite exciting<br />

times,” said Dodson. “The changes<br />

we will see in this nation in the next<br />

10 years will really dwarf what we<br />

saw with the IT revolution.”<br />

BIO: Tom O’Keefe<br />

is a consultant with<br />

immixGroup, an<br />

Arrow company<br />

that helps technology<br />

companies<br />

do business with<br />

the government. Tom focuses on IT<br />

trends in civilian agencies, as well<br />

as the Internet of Things and mobility.<br />

He can be reached at Tomas_<br />

Okeefe@immixgroup.com, or connect<br />

with him on LinkedIn at www.<br />

linkedin.com/in/tmokeefe.


Abandoning priorities will make<br />

immigration enforcement work<br />

much harder<br />

Continued from page 32<br />

ty, or in the case of recent border<br />

crossers, whose unauthorized<br />

presence undermined efforts to<br />

secure the border. At each step<br />

of the way, the emphasis was on<br />

assessing individual equities.<br />

Balancing equities is hard<br />

work, and the series of memos<br />

issued from 2010 to 2014 on<br />

enforcement priorities and the<br />

exercise of discretion were attempts<br />

to ensure that people did<br />

the hard work of individually<br />

reviewing and thinking through<br />

the implications of each case.<br />

Many officers will continue to<br />

make their decisions to arrest<br />

and detain based on a belief that<br />

exercising favorable discretion is<br />

part of their job. But some, especially<br />

those who didn’t like the<br />

idea that they were being told<br />

how to prioritize their work, may<br />

not do so. In fact, some will see<br />

it as their duty and obligation to<br />

arrest everyone, no matter the<br />

compelling circumstances. And<br />

that is what can lead to chaos.<br />

Does guidance serve as a constraint<br />

on power? Of course, but<br />

that isn’t a bad thing. Everyone<br />

needs guidance to do their jobs,<br />

especially when their jobs have<br />

Salient CRGT Announces<br />

Agreement to Acquire<br />

Information Innovators, Inc.<br />

Continued from page 25<br />

firm based in Chicago. The firm focuses<br />

on investing in lower middle<br />

market buyout transactions in the<br />

food, industrial, and services industries.<br />

Frontenac works in partnership<br />

with proven operating leaders,<br />

through our executive-centric approach<br />

called CEO1st®, to identify,<br />

acquire, and build market leading<br />

companies through transformational<br />

acquisitions and operational<br />

excellence. The firm has built a leading<br />

franchise working with over 225<br />

owners of mid-sized businesses, almost<br />

always families or founders,<br />

as they address complex transition<br />

issues of liquidity, management enhancement,<br />

and growth planning.<br />

For more information, please visit<br />

www.frontenac.com.<br />

life and death implications for<br />

others. By stripping away much,<br />

if not all, of the guidance of the<br />

last eight years, and offering<br />

nothing in its place, DHS just<br />

made its officers’ jobs harder,<br />

not easier.<br />

42<br />

New memos reveal harsh and<br />

unforgiving immigration road<br />

map as DHS implements President<br />

Trump’s Executive Orders<br />

Continued from page 30<br />

United States. They even include<br />

individuals simply charged or<br />

suspected of having committed<br />

crimes.<br />

Creation of a deportation force.<br />

The memos order the hiring of<br />

5,000 additional Customs and<br />

Border Protection (CBP) agents<br />

and 10,000 additional Immigration<br />

and Customs Enforcement<br />

(ICE) agents. They direct a massive<br />

expansion of 287(g)—a law<br />

that allows DHS to deputize state<br />

and local law enforcement officers<br />

to perform the functions<br />

of immigration agents. And,<br />

they reinstate Secure Communities<br />

and terminate the Priority<br />

Enforcement Program, which<br />

expand the ways in which local<br />

police collaborate with ICE. This<br />

approach will have devastating<br />

consequences for immigrant<br />

communities and undermine<br />

public safety rather than make<br />

our nation more secure.<br />

Plans to bypass immigration<br />

courts and short-circuit due<br />

process. The memos indicate<br />

that many people in the interior<br />

of the country – not just those at<br />

the border – could be subject to<br />

expedited deportation without


going before a judge, the details<br />

of which DHS said will be forthcoming<br />

in a notice in the Federal<br />

Register. This expansion of “expedited<br />

removal,” will allow the<br />

government to bypass the backlogged<br />

immigration courts in order<br />

to deport people rapidly and<br />

with little-to-no due process.<br />

While the feasibility of many of<br />

these policies depends on Congressional<br />

willingness to fund<br />

them and whether they pass<br />

muster in the courts, undeniably,<br />

these policies are thin on humanity<br />

and thick on punishment.<br />

They will separate families, cultivate<br />

fear among immigrant<br />

communities, and destabilize<br />

our economy.<br />

Facial biometric boarding solution<br />

by Vision Box being tried at<br />

Schipol Airport<br />

Continued from page 38<br />

digital video analytics solutions, intelligent<br />

biometric and biographic<br />

data management engines and danger<br />

management functionalities.<br />

Vision-Box operates over 1200<br />

Automated Border Control solutions<br />

in more than 70 international<br />

airports and has over 3000 electronic<br />

identity systems deployed across<br />

the globe. www.vision-box.com<br />

Milestone release delivers highest<br />

performing VMS ever for XProtect<br />

users<br />

Continued from page 37<br />

sive computer muscle.<br />

Hardware-accelerated video motion<br />

detection is new in XProtect<br />

<strong>2017</strong> R1 - another industry first for<br />

VMS software. Customers can have<br />

twice as many cameras on the same<br />

server with the same CPU load, or<br />

experience up to 90 percent reduction<br />

in the CPU load with the same<br />

number of cameras on the server*.<br />

This use of hardware acceleration<br />

lets mid- to large-scale installations<br />

experience improved performance<br />

at a lower hardware cost.<br />

Hardware acceleration was already<br />

implemented in the XProtect<br />

2016 Smart Client. This provided an<br />

80 percent reduction in the processor<br />

load on computers with selected<br />

Intel processors, firmware, drivers<br />

and Microsoft operating systems.<br />

This paves the way for the use of 4K<br />

cameras and processing-intensive<br />

video compressions like H.265.<br />

New Cybersecurity Features<br />

As video management systems are<br />

becoming more and more businesscritical,<br />

cybersecurity is a natural<br />

focus. In 2016, Milestone launched<br />

several initiatives aimed at strengthening<br />

security in Milestone software.<br />

Like the Hardening Guide that<br />

details how an XProtect installation<br />

43<br />

can be better secured against cyber<br />

threats and the Kerberos strict userverification<br />

in XProtect.<br />

The XProtect <strong>2017</strong> R1 update includes<br />

several security enhancements<br />

for improved cybersecurity,<br />

including two-step verification and<br />

greater control when granting user<br />

permissions for the Milestone Advanced<br />

VMS products.<br />

Two-step verification is an industry-first<br />

security feature for<br />

XProtect <strong>2017</strong> R1. It is designed to<br />

prevent unauthorized access to the<br />

VMS when a password is compromised,<br />

as a code from the user’s mobile<br />

phone is needed to complete<br />

login.<br />

Keeping VMS systems isolated<br />

from the Internet is one important<br />

element when it comes to keeping a<br />

high security level. XProtect Smart<br />

Maps (introduced last year) now include<br />

support for OpenStreetMap<br />

offline maps: This means that customers<br />

with offline installations can<br />

take advantage of improved situational<br />

awareness by using maps,<br />

without exposing their XProtect<br />

system to online threats.<br />

“We take cybersecurity very seriously.<br />

Milestone is constantly adding<br />

security features to XProtect<br />

software and helping the Milestone<br />

community focus on VMS security,”<br />

Eilertsen says.<br />

XProtect <strong>2017</strong> R1 is available to<br />

the Milestone community now.


Supreme Court hears case on<br />

shooting of 15-year old by U.S.<br />

Border Patrol Agent<br />

Continued from page 31<br />

short, this is an extreme example of<br />

a system lacking even the most basic<br />

mechanisms of accountability.<br />

And now, the Trump administration’s<br />

Executive Order and subsequent<br />

implementation memo on<br />

border security and immigration<br />

enforcement would amount to a<br />

“surge” of 5,000 new Border Patrol<br />

agents with very few checks on<br />

their behavior in dealing with any<br />

non-U.S. citizen, particularly if that<br />

non-citizen has the misfortune to be<br />

standing in Mexico. Moreover, the<br />

drive to grab every unauthorized<br />

immigrant in sight without regard<br />

for any reasonable enforcement priorities—as<br />

reflected in the Executive<br />

Order—is a recipe for the use of<br />

excessive force.<br />

Pouring more resources and personnel<br />

into a dysfunctional system<br />

is not going to make that system<br />

any more functional. It’s just going<br />

to create an even bigger dysfunctional<br />

system. CBP—and the Border<br />

Patrol in particular—is already<br />

out of control. Even in cases where<br />

CBP officers injure or kill someone,<br />

they rarely suffer any serious<br />

consequences. This case speaks to<br />

a broader, systemic problem within<br />

CBP—an organizational culture in<br />

which anything goes.<br />

GSN’s <strong>2017</strong><br />

Airport/Seaport/Border <strong>Security</strong> Awards<br />

Opening for Entries on March 15 with Many New Categories<br />

All Winners in this program are<br />

entitled to a Full-Page Advertisement<br />

(8.5” x 9.0”) in your choice of GSN’s<br />

<strong>Digital</strong> Magazine or Leaderboard in<br />

any edition of the Airport, Seaport,<br />

Rail, Border <strong>Security</strong> Weekly<br />

<strong>News</strong>letter.<br />

Adrian Courtenay<br />

Managing Partner, CEO<br />

<strong>Government</strong> <strong>Security</strong> <strong>News</strong><br />

917-696-5782<br />

acourtenay@gsnmagazine.com<br />

NEW IN <strong>2017</strong>:<br />

CLICK HERE TO<br />

SUBMIT A NOMINATION<br />

All Finalists are entitled to a Half-<br />

Page Advertisement (8.5” x 4.5”) in<br />

your choice of GSN’s <strong>Digital</strong> Magazine<br />

or Leaderboard in any edition of the<br />

Airport, Seaport, Rail, Border <strong>Security</strong><br />

Weekly <strong>News</strong>letter.<br />

Steve Bittenbender<br />

Managing Editor<br />

<strong>Government</strong> <strong>Security</strong> <strong>News</strong><br />

502-552-1450<br />

sbittenbender@gsnmagazine.com<br />

Gerry O’Hara<br />

Designer<br />

OHDesign3<br />

203-249-0626<br />

gerry@ohd3.com<br />

44


The <strong>News</strong> Leader in Physical, IT and Homeland <strong>Security</strong><br />

CEO/Editorial Director<br />

Adrian Courtenay<br />

917-696-5782<br />

acourtenay@gsnmagazine.com<br />

Editor<br />

Steve Bittenbender<br />

502-552-1450<br />

sbittenbender@gsnmagazine.com<br />

Senior Writer<br />

Karen Ferrick-Roman<br />

412-671-1456<br />

karenferrickroman@gmail.com<br />

Columnist<br />

Shawn Campbell<br />

Campbell on Crypto<br />

shawn.campbell@safenetat.com<br />

Columnist<br />

George Lane<br />

Hazmat Science & Public Policy<br />

georgelane@hotmail.com<br />

Contributing Author<br />

Lloyd McCoy Jr<br />

Immix Group<br />

Contributing Author<br />

Walter Ewing<br />

Contributing Author<br />

Wendy Feliz<br />

Contributing Author<br />

Joshua Breisblatt<br />

Contributing Author<br />

J. Michael Barrett<br />

Contributing Author<br />

Christopher Millar<br />

Gatekeeper <strong>Security</strong><br />

Art Director<br />

Gerry O’Hara, OHDesign3<br />

gerry@ohd3.com<br />

203-249-0626<br />

Production Manager<br />

Brenden Hitt<br />

Brenden.hitt@gsnmagazine.com<br />

Direct: 203-216-7798<br />

COMING ATTRACTIONS<br />

March<br />

Late <strong>News</strong><br />

Tech Focus<br />

Perimeter Protection,<br />

Intrusion Detection<br />

Market Sector<br />

Border <strong>Security</strong> & Immigration<br />

April<br />

Late <strong>News</strong><br />

Tech Focus<br />

Law Enforcement,<br />

Public Safety<br />

Market Sector<br />

Cybersecurity Threats,<br />

Solutions<br />

45

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!