Government Security News
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
<strong>Government</strong> <strong>Security</strong> <strong>News</strong><br />
FEBRUARY/MARCH 2015 DIGITAL EDITION<br />
Secretary of Homeland <strong>Security</strong> Jeh Johnson and Canadian Minister of Public Safety and Emergency<br />
Preparedness Steven Blaney sign the Agreement on Land, Rail, Marine, and Air Transport Preclearance<br />
Between the <strong>Government</strong> of the United States of America and the <strong>Government</strong> of Canada. Page 4<br />
Also in this issue:<br />
GSN Technology Spotlight – Page 2<br />
Technology update on Access Control, Identification, Biometrics – Page 21<br />
Special Report on Protecting the Grid – Page 26
GSN February/March Digital Edition<br />
Table of Contents<br />
GSN TECHNOLOGY SPOTLIGHT<br />
Quantum Technology’s breakthrough in modern<br />
perimeter intrusion systems<br />
Mark Tinker is a scientist with a PHD in seismology. His company Quantum<br />
Technology has created a ground sensor system that measures vibrations<br />
in the earth from a distance beyond perimeter fences. With this technology,<br />
the company can provide earlier detection and classification of threat<br />
profiles ranging from vehicle activity, pedestrian activity, gunfire and lightning.<br />
Read all about this major breakthrough technology in the article by Mr.<br />
Tinker on Page 32<br />
InZero’s “WorkPlay” separates work and play at<br />
the hardware level<br />
In light of the kerfuffle regarding Hillary Clinton’s personal and official<br />
emails, the “WorkPlay Technology” from InZero Systems is starting to look<br />
like a very significant invention. Which is not surprising at all, when you<br />
consider that WorkPlay is the brainchild of Louis Hughes, who previously<br />
served as President of Lockheed Martin, CEO of General Motors International<br />
and Chief of Staff of the State Department’s Afghanistan Reconstruction.<br />
With Work/Play, there are two operating systems in a computer<br />
separated at the hardware level, one for work, one for play. Pretty simple?<br />
Not quite. Read more on Page Page 18<br />
2
NEWS AND FEATURES<br />
U.S. Canada Preclearance agreement Page 4<br />
Data Conversion Labs seeking participants in<br />
survey of content delivery outlets Page 6<br />
Federal Transit Administration awards nearly<br />
$55M for low and no emission buses Page 8<br />
International training essential to global stability<br />
and security Page 9<br />
PortVision CE0 blog discusses benefits and<br />
limitations of Automatic Identification<br />
Systems (AIS) Page 14<br />
Why small may be the new big for government<br />
access control providers, by Robert Laughlin,<br />
President, Galaxy Control Systems Page 16<br />
GSN Interviews Louis R. Hughes, CEO of<br />
cybersecurity start-up InZero Systems Page 18<br />
Curtiss-Wright and Airbus collaboration delivers<br />
pre-validated digital map solution Page 20<br />
Largest vessel ever calls on Savannah Page 22<br />
Transporting oil by rail: Is this a risk to national<br />
security? By K. Denise Rucker Krepp Page 24<br />
Access Control/ID and Biometrics Special Section<br />
Entrust Datacard announces new software suite<br />
for secure identification card issuance Page 27<br />
Identiv announces U.S. <strong>Government</strong><br />
FICAM Certification of uTrust TS <strong>Government</strong><br />
Readers for premises access Page 28<br />
Iris ID to enhance Canada Border Service<br />
NEXUS program using Iris Recognition Page 29<br />
Sonavation launches IDKEY featuring 3D biometric<br />
ultrasound surface scan technology Page 30<br />
Zwipe introduces HID Technology biometric<br />
cards for iCLASS ® and ProxCard ® Readers<br />
Page 31<br />
Protecting the Grid Special Section<br />
Quantum Technology’s breakthrough in modern<br />
perimeter intrusion systems, by Mark A. Tinker, PhD<br />
Page 32<br />
Challenges and solutions for substation security<br />
– applying smart thermal technology to prevent intrusions,<br />
by John Romanowich, CEO, SightLogix, Inc.<br />
Page 34<br />
Utah-Based Washakie Renewable Energy, LLC<br />
settles renewable fuel standard violations Page 36<br />
Excerpts from Chuck Brooks 2014 radio interview<br />
on the Dick Morris Show Page 38<br />
3
U.S./Canada sign preclearance agreement to<br />
reduce border congestion, increase efficiency<br />
WASHINGTON – Consistent<br />
with the initiatives outlined in<br />
the 2011 Beyond the Border Action<br />
Plan, Secretary of Homeland<br />
<strong>Security</strong> Jeh Johnson and Canadian<br />
Minister of Public Safety<br />
and Emergency Preparedness<br />
Steven Blaney today signed the<br />
Agreement on Land, Rail, Marine,<br />
and Air Transport Preclearance<br />
Between the <strong>Government</strong><br />
of the United States of America<br />
and the <strong>Government</strong> of Canada.<br />
This new agreement reaffirms the<br />
United States and Canada’s commitment<br />
to enhancing security<br />
while facilitating lawful travel<br />
and trade, and supersedes the existing<br />
U.S.-Canada Air Preclearance<br />
agreement signed in 2001.<br />
“After years of hard work<br />
and negotiations, today we have<br />
one of the most significant, visible,<br />
and anticipated products of<br />
the Beyond the Border initiative<br />
– a major achievement that will<br />
produce significant benefits for<br />
the United States and Canada,”<br />
said Secretary Johnson. “This<br />
agreement will help facilitate the<br />
legitimate trade and travel that<br />
keeps our economy thriving as<br />
we maintain utmost vigilance to<br />
the security of our borders. We<br />
remain committed to our deep<br />
partnership with Canada, a true<br />
ally, neighbor and friend of the<br />
United States.”<br />
“Our <strong>Government</strong>’s top priority<br />
remains creating jobs and<br />
opportunities for Canadians,”<br />
said Minister Blaney. “This historic<br />
new agreement builds on<br />
decades of successful preclearance<br />
operations in Canadian airports.<br />
It will enhance the security<br />
at our border and create jobs and<br />
growth in Canada by improving<br />
the flow of legitimate goods and<br />
4<br />
people between our two countries.”<br />
This Preclearance agreement<br />
– allowing for the immigration,<br />
customs and agriculture<br />
inspections required for entry<br />
into either country to occur on<br />
foreign soil – will reduce congestion<br />
and delays at the border<br />
and increase efficiency and predictability<br />
in cross-border travel,<br />
tourism and transportation. The<br />
new agreement provides officials<br />
of U.S. Customs and Border Protection<br />
(CBP) and Canada Border<br />
Services Agency (CBSA) with<br />
the requisite authorities and tools<br />
to conduct their border security,<br />
facilitation, and inspection processes<br />
in the other country.<br />
This agreement will:<br />
• Allow for the consideration<br />
of requests for new preclearance<br />
locations across all modes;<br />
• Enable exploration of co-location<br />
at small and remote ports,<br />
if desired;<br />
• Provide updates to the Air<br />
Preclearance Agreement to better<br />
reflect the post 9/11 operating
environment, including policies<br />
and tools utilized at domestic<br />
ports of entry;<br />
• Enable Canada to request<br />
that the United States regularize<br />
existing U.S. immigration preinspection<br />
sites – for example at<br />
cruise, rail and ferry terminals in<br />
British Columbia;<br />
• Enhance authorities for preclearance<br />
officers including the<br />
ability to carry firearms, defensive<br />
tools, and restraint devices to<br />
the same extent that Host Party<br />
officers are permitted to carry in<br />
the relevant operating environments;<br />
• Address officer privileges<br />
and immunities through a shared<br />
jurisdictional framework in<br />
which the sending country may<br />
generally exercise primary criminal<br />
jurisdiction for acts committed<br />
by its officers in the performance<br />
of official duties in the<br />
Host country; and<br />
• Retain the civil and administrative<br />
prosecutorial jurisdictions<br />
for preclearance officers<br />
provided for in the current Air<br />
Preclearance Agreement.<br />
Given the groundbreaking<br />
nature of the agreement, the<br />
United States and Canada must<br />
enact legislation for it to be implemented.<br />
The Civilian Extraterritorial<br />
Jurisdiction Act was<br />
introduced in the last Congress,<br />
and we are hopeful of its reintroduction<br />
in this Congress. Currently,<br />
the 2001 U.S.-Canada Air<br />
Transport Preclearance Agreement<br />
continues to apply.<br />
Preclearance is the process<br />
More on page 42<br />
THE NEW ENTRY<br />
for ACCESS CONTROL POINTS<br />
GUARANTEED DELIVERY DATES<br />
Established production methods allows us to<br />
provide short and accurate lead-time and delivery,<br />
keeping your project on schedule.<br />
FULLY GALVANIZED FRAMEWORK<br />
Corrosion resistance in trapped areas where heating<br />
and cooling cycles create moisture producing rust<br />
on conventional unprotected framework.<br />
CITADEL ® Gatehouse<br />
SINGLE SOURCE FOR PHYSICAL SECURITY<br />
Ameristar manufactures an array of perimeter security<br />
products. These products range from active vehicle<br />
barriers, gate systems (gates, operators and access<br />
controls), security fence and now guard booths.<br />
a<br />
AMERISTARBOOTHS.COM | 855.526.6847<br />
5
Data Conversion Labs seeking participants in<br />
survey of content delivery outlets<br />
Technical communicators, tools<br />
vendors, consultants, and even<br />
client organizations and end users<br />
all feel the rapid changes<br />
coming to content preparation,<br />
delivery and consumption. To<br />
better understand these changes<br />
over time Data Conversion Laboratory<br />
(DCL) and The Center<br />
for Information-Development<br />
Management (CIDM) are now<br />
conducting their third annual<br />
survey of practitioners, Following<br />
the Trends — Is Your Content<br />
Ready?, which is open now until<br />
March 16, 2015.<br />
“Content creation, management<br />
and delivery grows more<br />
complex, seemingly daily,” said<br />
DCL CEO Mark Gross. “Understanding<br />
the trends, challenges<br />
and needs of the technical communications<br />
industry, and how<br />
they change over time opens the<br />
doors to provide better solutions<br />
and evolving best practices to<br />
benefit practitioners, their organizations<br />
and their customers.”<br />
The first survey, conducted in<br />
early 2013, found that content<br />
providers in most organizations<br />
take on multiple roles. And a<br />
comparison<br />
of those roles<br />
with 2014 results<br />
shows an<br />
increasing percentage<br />
have<br />
responsibilities<br />
in technical<br />
support and in<br />
customer service.<br />
In addition,<br />
the number<br />
and variety<br />
of channels to<br />
which content is published are<br />
increasing, especially in the areas<br />
of mobile apps and mobile device<br />
delivery. The 2015 survey should<br />
uncover how these and other key<br />
areas are continuing to shift.<br />
“While many technical<br />
communicators believe their<br />
competitors are ahead of them in<br />
delivering quality content electronically,<br />
roughly half of our<br />
respondents in 2014 believe they<br />
are ready to support their organizations’<br />
business requirements<br />
for digital content,” notes Joann<br />
Hackos, Director for CIDM. “We<br />
think it’s critical to stay on top<br />
of the barriers to digital content<br />
6<br />
delivery from the business and<br />
technology perspectives, so that<br />
providers can plan for and actually<br />
meet their organization’s<br />
business requirements.”<br />
Invitations to participate<br />
in the survey have been sent to<br />
previous participants; the survey<br />
is available at: http://www.dclab.<br />
com/resources/surveys/dcl-cidm-trends-survey-2015.<br />
About Data Conversion<br />
Laboratory, Inc. (DCL)<br />
DCL (www.dclab.com) is a leader<br />
in helping organizations grow<br />
the value of their content assets<br />
investment. With digitization
and content management expertise<br />
across multiple industries<br />
including publishing, life sciences,<br />
government, manufacturing,<br />
technology and professional<br />
organizations, DCL uses its advanced<br />
technology and U.S.-<br />
based project management teams<br />
to help solve the most complex<br />
conversion challenges securely,<br />
accurately and on time. Founded<br />
in 1981, DCL was named to<br />
EContent’s Top 100 Companies<br />
in the Digital Content Industry<br />
in 2014 for the fourth straight<br />
year.<br />
About the Center for<br />
Information-Development<br />
Management (CIDM)<br />
The Center for Information-Development<br />
Management (CIDM)<br />
brings together the most highly<br />
skilled and talented managers<br />
in the field of information development<br />
from across the US<br />
and internationally to facilitate<br />
the sharing of information about<br />
current trends, best practices,<br />
and developments within the industry,<br />
from information development<br />
to training and support.<br />
Contact: Ariane Doud, Warner<br />
Communications,<br />
(978) 283-2674, Email<br />
PHYSICAL SECURITY<br />
with COMPLETE PERIMETER CONTROL<br />
ANTI-CLIMB FENCE RETRACTABLE WEDGES ANTI-RAM FENCE SECURITY BOLLARDS<br />
Call our perimeter security specialist at 866-467-2773 and visit us online at ameristarsecurity.com<br />
7
Federal Transit Administration awards nearly<br />
$55M for low and no emission buses<br />
The Federal Transit Administration<br />
(FTA) has announced<br />
awards to 10 project teams to<br />
deploy 55 low and no emission<br />
fuel cell, battery electric and electric<br />
hybrid buses in neighborhoods<br />
from Stockton, California<br />
to Canto, Ohio. 38 of the 55 will<br />
be either electric or fuel cell powered<br />
and produce zero tailpipe<br />
emissions.<br />
“This critical FTA program<br />
will help spur the growth of the<br />
advanced tech bus industry in<br />
the United States, which is a crucial<br />
part of the effort to meet our<br />
national air quality and climate<br />
challenges,” said CALSTART<br />
President and CEO John Boesel.<br />
“We are especially pleased to be<br />
working with three of the FTA<br />
awardees and helping to make<br />
zero buses competitive with existing<br />
diesel technology,” he continued.<br />
Newly established under the<br />
Moving Ahead for Progress in the<br />
21st Century Act (MAP-21), the<br />
FTA’s LoNo program focuses on<br />
deploying the cleanest and most<br />
energy-efficient U.S.-made transit<br />
buses designed to cut carbon<br />
8<br />
pollution and other traditional<br />
pollutants. Grants from the LoNo<br />
program help transit agencies<br />
integrate more of these cuttingedge<br />
buses into their fleets.<br />
The FTA provided a total of<br />
$54,469,249 in total for 10 projects<br />
nationwide. FTA received<br />
50 project proposals requesting<br />
a total of $200 million. See<br />
the FTA’s web site for more details:<br />
http://www.fta.dot.gov/<br />
grants/15926_16268.html<br />
CALSTART will work with<br />
three partner transit agencies on<br />
projects totaling nearly $24 million.<br />
The organization will assist<br />
its partners by providing various<br />
consulting services, such as<br />
data collection, analysis, surveys,<br />
specification alignment, and<br />
transit bus acquisition services.<br />
CALSTART partners awarded<br />
grants include the following projects:<br />
• Stark Area Regional Transit<br />
Authority (SARTA) will receive<br />
$8,877,405 to purchase and<br />
deploy five hydrogen fuel cell<br />
buses from the Integrated Product<br />
Team of Ballard Power Systems,<br />
BAE Systems, and ElDorado<br />
National. The agency will use<br />
the new zero-emission buses in a<br />
variety of operating conditions,<br />
including congested downtown<br />
streets, major urban roads and<br />
rural highways. SARTA provides<br />
more than 2.7 million rides per<br />
year throughout Stark County,<br />
Ohio, including servicing Canton,<br />
where the NFL Hall of Fame<br />
is located.<br />
• SunLine Transit Agency<br />
will receive $9,803,860 to build<br />
and deploy five hydrogen electric<br />
hybrid fuel cell buses. BAE Systems,<br />
Ballard Power Systems and<br />
ElDorado National will team up<br />
to build the new zero-emission<br />
buses. This project will increase<br />
SunLine’s current fleet of hydro-
gen electric hybrid fuel cell buses<br />
and allow the agency to offer<br />
expanded transit service in the<br />
Coachella Valley area of Southern<br />
California.<br />
• San Joaquin Regional<br />
Transit District (RTD) will receive<br />
$ 4,702,011 and purchase<br />
five Proterra battery-electric buses<br />
and a charging station. RTD,<br />
the transit provider for Stockton<br />
and San Joaquin County<br />
in California, plans to add the<br />
zero-emission buses and charging<br />
station to expand service and<br />
increase capacity at the Stockton<br />
Downtown Transit Center, which<br />
is the transfer point for nearly all<br />
of the RTD’s routes. Under a previous<br />
grant from the California<br />
Energy Commission the RTD<br />
purchased its first two zero emission<br />
electric buses.<br />
About CALSTART<br />
CALSTART and its 140+ member<br />
companies are dedicated<br />
to expanding and supporting a<br />
clean transportation industry<br />
that cleans the air, creates jobs<br />
and economic opportunities, reduces<br />
greenhouse gas emissions<br />
and secures our transportation<br />
energy future. For further information<br />
visit www.calstart.org/<br />
International training essential<br />
to global stability and security<br />
By Scott Seavers,<br />
Salient Federal Solutions<br />
As long as there are people<br />
on this great planet, there will be<br />
conflict and a natural tendency<br />
toward instability, regionally at a<br />
minimum. While we can’t change<br />
that, we can set the best conditions<br />
possible to avoid escalation<br />
and to minimize the periods of<br />
insecurity and security assistance,<br />
specifically international<br />
training, plays a critical role in<br />
the overall outcome.<br />
The U.S. military is shrinking,<br />
the U.S. alone cannot maintain<br />
global stability, and security<br />
assistance missions are some of<br />
the first cuts as the U.S. defense<br />
budget wanes. While cutting U.S.<br />
defense budgets is a stark reality<br />
of our time, cutting security assistance<br />
runs counter to President<br />
Obama’s recently released<br />
2015 National <strong>Security</strong> Strategy<br />
which highlights the need for the<br />
U.S. to “lead with capable partners”<br />
and acknowledges the fact<br />
that global problems require U.S.<br />
participation, but that few can be<br />
9<br />
solved by the U.S. alone. While a<br />
robust Department of Defense is<br />
absolutely essential and a critical<br />
component in ensuring national<br />
and global security, increasing<br />
partner nation capability is a costeffective<br />
force multiplier. Now is<br />
hardly the time to pull back from<br />
training our partners to defend<br />
themselves and to function effectively<br />
in coalitions.<br />
Language and cultural differences<br />
make training together<br />
far from easy, yet militaries have<br />
been training together for centuries.<br />
Foreign militaries that can<br />
defend their homelands autonomously<br />
and contribute to coalitions<br />
enhance global security exponentially.<br />
We are all firsthand<br />
witnesses to the results effective<br />
international training can attain.<br />
More on page 26
Sponsored by:<br />
ONE EVENT<br />
EVERYTHING SECURITY<br />
REGISTER TODAY AT ISCWEST.COM/GSN<br />
10
2015 Airport/Seaport/Border <strong>Security</strong> Awards<br />
Now Accepting Entries!<br />
<strong>Government</strong> <strong>Security</strong> <strong>News</strong> would like to take this opportunity to invite all Technology<br />
Vendors, Airport, Seaport and Border <strong>Security</strong> Officers, Executives and <strong>Security</strong> Teams<br />
to visit the GSN 2015 Awards website at www.asbsecurityawards.com, review the<br />
37 updated entry categories, and if you find one or more of them that fits your company<br />
or agency, go for the gold!<br />
And we mean that literally, because all winners will<br />
receive a handsome, gold-trimmed plaque that you<br />
can post in your office or other prominent position,<br />
and all Winners and Finalists will be invited to post<br />
their winning entries and additional information in our 2015 Yearbook of Airport,<br />
Seaport, Border <strong>Security</strong> Awards Recipients.<br />
It’s great publicity and exposure in <strong>Government</strong> <strong>Security</strong> <strong>News</strong>, which is sure to be further<br />
enhanced by Google and the other Search engines and Social Media. Check out<br />
the many new categories in the 2015 entry categories and be sure to see the kind of<br />
distinguished company you’ll be in as a Winner or Finalist by looking through our 2014<br />
Yearbook of Airport, Seaport, Border <strong>Security</strong> Awards at:<br />
http://www.gsnmagazine.com/2014ASB<strong>Security</strong>Yearbook.<br />
11
PortVision CE0 blog discusses benefits and limitations<br />
of Automatic Identification Systems (AIS)<br />
By Dean Rosenberg,<br />
CEO, Portvision<br />
As many of the readers of this<br />
blog already know, Automatic<br />
Identification System (AIS) is<br />
a VHF protocol that has been<br />
mandated on large vessels by<br />
IMO for collision avoidance<br />
and to enhance navigation since<br />
2005. Every vessel over 300 gross<br />
tons (or over 65 feet in the USA)<br />
carries an AIS transponder that<br />
receives broadcasts from nearby<br />
vessels, and also transmits identifying<br />
information about the<br />
vessel carrying the transponder.<br />
Information including a ship’s location,<br />
speed, and identifying information<br />
is transmitted multiple<br />
times per minute when a vessel is<br />
underway, and every few minutes<br />
when docked. You can view all<br />
details associated with the AIS<br />
specification at the USCG Navigation<br />
Center website.<br />
Once AIS became a global<br />
standard, the industry realized<br />
that in addition to leveraging<br />
the safety benefits of AIS in the<br />
wheelhouse, organizations could<br />
also drive significant value in<br />
their shore-side operations by<br />
using AIS to increase visibility<br />
and transparency to vessel movements<br />
around the world. Port-<br />
Vision launched its web-based<br />
service in 2007, and has since expanded<br />
to provide global coverage<br />
with a network of AIS receivers<br />
around the world.<br />
The challenge with a shorebased<br />
AIS service is that an individual<br />
AIS receiver is limited<br />
Photo: Institute of Aeronautical Technology<br />
to about a 50 mile radius. Ship<br />
tracking through shore-based<br />
(also known as “terrestrial”) AIS<br />
requires that each vessel be within<br />
50 miles of an AIS receiver in<br />
order to be tracked in the system.<br />
Terrestrial AIS provide significant<br />
value to users, including<br />
providing near-real-time vessel<br />
tracking when vessels are near<br />
shore. However, once a ship is<br />
in open water, terrestrial AIS<br />
becomes less effective. Initially,<br />
PortVision took steps to increase<br />
14
coverage of AIS network by adding<br />
receivers on offshore assets<br />
such as offshore platforms and<br />
workboats in high-density areas<br />
such as the Gulf of Mexico. However,<br />
while expanding visibility in<br />
those areas, the offshore receivers<br />
still did not address the challenge<br />
of tracking ships at sea.<br />
In 2008, the first commercial<br />
AIS receivers were launched<br />
into orbit as a satellite payload.<br />
The initial satellite launches<br />
were largely experimental, and<br />
demonstrated that it indeed was<br />
possible to detect AIS signals of<br />
vessels in open water from an<br />
orbiting satellite. This kicked off<br />
the era of satellite AIS, as several<br />
commercial operators began offering<br />
satellite AIS services to<br />
both government and commercial<br />
clients.<br />
From a wheelhouse perspective,<br />
satellite AIS provides<br />
minimal value. However, from<br />
a shore-based business perspective,<br />
satellite AIS provides many<br />
benefits, including:<br />
• Ability to track any AIStransmitting<br />
vessel globally<br />
• Ability to support searchand-rescue<br />
and anti-piracy measures<br />
by increasing the visibility<br />
of ships at sea by first responders<br />
and security personnel<br />
• Ability to provide market<br />
intelligence through aggregating<br />
data across many vessels and<br />
regions to answer business questions<br />
• Ability to support compliance<br />
and law enforcement activities<br />
The above benefits are compelling.<br />
However, it is also important<br />
to recognize the limitations<br />
of satellite AIS<br />
Much lower reporting frequency.<br />
While terrestrial AIS can<br />
report vessel positions in nearreal-time<br />
(with multiple updates<br />
each minute), satellite AIS has<br />
significantly higher latency and<br />
lower frequency of reporting.<br />
Current satellite AIS service providers<br />
typically provide position<br />
updates on specific vessels only<br />
a few times each day. While this<br />
lower frequency of reporting still<br />
provides compelling value to<br />
track the progress of ships at sea,<br />
it does not allow for many of the<br />
advanced alerting and reporting<br />
features that are available with<br />
terrestrial AIS.<br />
Limited detection of vessels.<br />
The ability to detect AIS signals<br />
from space is currently an imperfect<br />
“art”. Electromagnetic interference<br />
(particularly in dense<br />
areas) often limits the ability to<br />
detect vessels in congested areas,<br />
even when vessels are transmitting<br />
their AIS signal.<br />
Cost. It is expensive to<br />
launch a satellite, and the commercial<br />
satellite operators need<br />
to recoup that investment. As<br />
such, satellite AIS typically carries<br />
significantly higher licensing<br />
fees than terrestrial-only AIS<br />
providers.<br />
PortVision has been providing<br />
satellite AIS to customers<br />
since the first satellites were<br />
launched over 5 years ago. We<br />
continue to maintain a leadership<br />
position in aggregating terrestrial,<br />
offshore, and satellite<br />
AIS to provide the highest-value<br />
offering to our users. Combined,<br />
we process over 50 million ship<br />
location reports per day from all<br />
AIS sources in our network. And<br />
satellite AIS data plays an important<br />
role for many of our users,<br />
particularly those users who require<br />
in-transit visibility to ships<br />
around the world.<br />
15
Why small may be the new big for government<br />
access control providers<br />
by Robert Laughlin,<br />
President, Galaxy Control Systems<br />
Access control conglomerates<br />
have undergone a lot of changes,<br />
with some being<br />
formed by combining<br />
smaller companies,<br />
and others being dissolved<br />
with individual<br />
companies re-emerging.<br />
This has been interesting<br />
to watch,<br />
particularly for independent<br />
access control<br />
companies in the market. With<br />
this in mind, end users must<br />
take a hard look at the potential<br />
ramifications of dealing with<br />
large companies versus small/<br />
medium-sized providers. Access<br />
control systems require ongoing<br />
service and support to ensure<br />
continuous and reliable operation,<br />
and small/medium providers<br />
are well-positioned to excel in<br />
these areas because of their focus<br />
on both technology and customer<br />
relations.<br />
With government customers,<br />
all access control companies<br />
must be knowledgeable about<br />
and mindful of GSA schedules<br />
and the regulations and requirements<br />
that apply to particular entities.<br />
That’s why providers in this<br />
space must have security-cleared<br />
personnel<br />
on staff to help navigate<br />
these waters. Beyond<br />
that, there are a<br />
number of areas where<br />
small/medium companies<br />
are uniquely positioned<br />
to outperform<br />
larger companies.<br />
Innovation<br />
Every government facility and installation<br />
is unique, even facilities<br />
built using the same construction<br />
and design models. Unfortunately,<br />
off-the-shelf access control solutions<br />
rarely provide the versatility<br />
individualized installations<br />
require. Customization poses<br />
challenges for larger companies,<br />
who typically leave that task to<br />
installing dealers or end users’<br />
in-house technicians. Given the<br />
high stakes of government security,<br />
it’s difficult to argue that this<br />
16<br />
seat-of-the-pants customization<br />
is ideal.<br />
Small/medium providers,<br />
however, thrive on customization<br />
and focus on catering to customers’<br />
specific needs. To compete<br />
against large companies’ marketing<br />
budgets and sophisticated<br />
sales pitches, smaller providers<br />
must innovate with new solutions<br />
and remain conscious of<br />
customers’ investments in legacy<br />
technologies. New solutions that<br />
address longstanding problems<br />
and integrate with legacy and future<br />
deployments are innovative;<br />
rip-and-replacement solutions<br />
are not.<br />
Personal connections<br />
All customers want to feel that<br />
their provider understands their<br />
needs and can connect with<br />
them, particularly government<br />
clients, who have very specific<br />
procurement and purchasing requirements.<br />
All providers working<br />
with government entities<br />
retain employees who understand<br />
these nuances, but only<br />
smaller companies can provide
deeper, more personal relationships<br />
with someone who “speaks<br />
the language.” Interestingly, large<br />
companies often invest heavily<br />
in emulating these relationships<br />
that come naturally to smaller<br />
companies.<br />
Communication<br />
Today, personal connections<br />
seem to be scarcer than ever. The<br />
barrage of 24/7/365 communications<br />
certainly contributes,<br />
creating greater demands on<br />
people’s time. This is a challenge<br />
for larger companies, where the<br />
volume of internal interactions<br />
further hinders timely response<br />
to important issues. Delays are<br />
unacceptable for government<br />
agencies, especially those tasked<br />
with highly sensitive or missioncritical<br />
operations that cannot be<br />
interrupted while waiting for a<br />
callback.<br />
Smaller companies have<br />
clearer and more direct lines of<br />
communication that enable faster<br />
response. Generally, whoever<br />
sold the system supports their<br />
customers and can spend more<br />
time communicating with them.<br />
Delays compromise security, so<br />
customers deserve a go-to person<br />
they can rely on when they<br />
need them most – typically when<br />
something goes wrong and requires<br />
immediate attention.<br />
Timely decision-making<br />
Decision-making tends to move<br />
slowly for large organizations,<br />
which comprise numerous levels<br />
of hierarchy and specialized<br />
roles that require authorized personnel<br />
to collect and review data<br />
before taking action. Again, delays<br />
are not a viable option in the<br />
government space. For smaller<br />
companies, reporting paths to<br />
decision-makers are shorter, enabling<br />
faster resolution of critical<br />
issues.<br />
Executive involvement<br />
Large companies’ top-level executives<br />
make decisions that affect<br />
customers, often without<br />
direct involvement with those<br />
customers or everyday management<br />
issues. The opposite is true<br />
of small/medium companies,<br />
where upper-level management<br />
normally has personal interaction<br />
with customers and is aware<br />
of trends and issues that impact<br />
technology.<br />
Access to ownership<br />
17<br />
There are big differences between<br />
working directly with the owners<br />
of a small/medium company and<br />
dealing with employees at larger<br />
companies. Owners want a customer<br />
for life – not just a single<br />
sale or project – and will work<br />
hard to ensure satisfaction. This<br />
often creates a top-down corporate<br />
culture of providing superior<br />
service, support and satisfaction,<br />
which big business strives to emulate.<br />
Large access control providers<br />
play a major role in the continued<br />
development and evolution<br />
of advanced access control<br />
technologies. But technology<br />
is just one part of the equation.<br />
A combined focus on technology<br />
and customer service allow<br />
smaller companies to provide the<br />
high level of ongoing service and<br />
support crucial to ensuring reliability<br />
and performance of access<br />
control systems long after the<br />
sale. The key is to remember that<br />
big is not always better and that<br />
success and growth don’t mean a<br />
company has to become or even<br />
act big. A personal touch and access<br />
to management and ownership<br />
allow small/medium companies<br />
to treat every customer<br />
like they’re the biggest customer.<br />
As a result, the fast response and<br />
quick resolution provide government<br />
and other end users with<br />
the level of service and reliability<br />
they should expect from an access<br />
control partner.
GSN Interviews Louis R. Hughes,<br />
CEO of cybersecurity start-up InZero Systems<br />
GSN: Lou, you’ve had an illustrious<br />
career as an international<br />
executive, public company Board<br />
member and government leader.<br />
What led you to take on the challenge<br />
of cyber security technology<br />
with InZero ?<br />
LH: It was an opportunity offered<br />
me several years ago, when<br />
it had become apparent that software<br />
security is a never-ending<br />
battle between solution providers<br />
and cyber criminals. It’s just<br />
a matter of time before malware<br />
is created to overcome a given<br />
solution. InZero instead devoted<br />
itself to hardware-based security,<br />
and our experience with prior<br />
technologies in this genre gave us<br />
the expertise to develop Work-<br />
Play Technology.<br />
GSN: What is “WorkPlay Technology”?<br />
LH: It’s a way to create multiple<br />
operating systems (OS) running<br />
inside a computer using a single<br />
ARM processor, as virtually all<br />
popular devices have. But unlike<br />
other methods for data separation<br />
like dual persona or containerization,<br />
we provide hardwareseparated<br />
OS’s.<br />
GSN: What do you mean by<br />
“hardware-separated”?<br />
LH: Each OS has its own kernel,<br />
memory and storage, so in effect<br />
these OS’s are completely separated<br />
at the hardware level. Other<br />
18<br />
data separation or dual persona<br />
methods share resources that allow<br />
malware to spread and compromise<br />
security.<br />
GSN: What’s the benefit of your<br />
hardware-separated OS’s?<br />
LH: This literally solves half the<br />
problem of using a computer for<br />
both enterprise and personal activity.<br />
GSN: Can you explain how<br />
WorkPlay Technology solves<br />
“half the problem”?<br />
LH: It solves the personal use<br />
half. When you use a computer<br />
for both work and personal activity,<br />
you’ve added significant risk<br />
that your personal activity introduces<br />
malware that can access<br />
your business data and networks.<br />
WorkPlay Technology eliminates<br />
this risk, because one OS can’t<br />
access another. So if you use one<br />
OS for business and one for personal<br />
use, your personal activity<br />
can’t access the business OS, and<br />
therefore can’t compromise busi-
ness data including, critically,<br />
accessing the business intranet.<br />
Your IT administrator no longer<br />
has to worry about what you<br />
do personally. Hence, half of the<br />
problem is solved. And for an<br />
added benefit, the user’s privacy<br />
in using the personal OS can also<br />
be assured.<br />
GSN: How is it used – how would<br />
I go back and forth between business<br />
and personal computing?<br />
LH: It’s easy. You just click the<br />
switch icon to move to the other<br />
OS. Takes about 3 seconds. This<br />
allows the open OS to hibernate<br />
and activates the second OS. We<br />
also provide optional password<br />
authentication. It’s just like opening<br />
an app, and entering a password.<br />
GSN: Do you think WorkPlay<br />
Technology is a game-changer, a<br />
real difference-maker?<br />
LH: Well, you can buy two mobile<br />
devices or laptops if you<br />
want, use one for business and<br />
one personally. Of course even<br />
then you’d have to keep both<br />
open or constantly boot up.<br />
But using just one device instead<br />
of two? Yes it changes the game<br />
in several ways: So long as you<br />
use the same resources, like one<br />
kernel, a software method like<br />
containers or hypervisors is susceptible<br />
to malware that gains the<br />
elevated privileges to access the<br />
entire device. Is this a real threat?<br />
Ponemon just issued a new report<br />
and 38% of the respondents<br />
found container and other security<br />
like complex firewalls still<br />
vulnerable. In point of fact, over<br />
the last year, we have been reading<br />
about the vulnerabilities of<br />
these methods constantly. Moreover,<br />
our own technical people<br />
discovered multiple vulnerabilities<br />
in existing mainstream products<br />
when we were evaluating<br />
their compatibility with Work-<br />
Play Technology. So I’ll say it as<br />
a rhetorical question - - why not<br />
take half the risk away?<br />
GSN: Why wouldn’t WorkPlay<br />
Technology replace existing dual<br />
persona solutions?<br />
LH: Because you still would often<br />
want those solutions inside<br />
at least the business OS. Think<br />
of WorkPlay Technology as a<br />
unique, secure and cost-effective<br />
method to provide truly two devices<br />
in one. Everything else is<br />
the same. The apps, the security,<br />
all the same. You may still want<br />
19<br />
other solutions to protect data inside<br />
an OS. And these days, it is<br />
more important than ever to protect<br />
the end user device as much<br />
as you can.<br />
GSN: Why is that now increasingly<br />
important?<br />
LH: It’s evidently become the<br />
path of least resistance, often<br />
through phishing and spearphishing.<br />
While SONY received<br />
extensive publicity for its data<br />
breach, but meanwhile, we’ve<br />
lost untold amounts of government<br />
data through cybercrime<br />
like Operations Pawn Storm and<br />
Cleaver. Unwittingly, government<br />
and military personnel introduced<br />
malware by simply clicking<br />
“Like” on Facebook, exposing<br />
government data. Moreover,<br />
cybercrime like Pawn Storm has<br />
been going on for seven years, say<br />
the reports. Social media are also<br />
being targeted more and more:<br />
Facebook and YouTube were the<br />
sources of several large breaches<br />
last year. In the case of the most<br />
publicized enterprise breaches,<br />
like Target and Home Depot,<br />
over a hundred million records<br />
were exposed through a phishing<br />
attack. I’m not saying they all<br />
More on page 41
Curtiss-Wright and Airbus<br />
collaboration delivers pre-validated<br />
digital map solution<br />
ASHBURN, Va. - March 17, 2015<br />
– Curtiss-Wright Corporation<br />
(NYSE: CW) today announced<br />
that its Defense Solutions division,<br />
in collaboration with Airbus<br />
Defence and Space, has introduced<br />
the SferiAdvise System<br />
Ready Application (SRA), a new<br />
pre-validated, pre-tested digital<br />
map, flight plan, and helicopter<br />
terrain awareness and warning<br />
system (HTAWS) solution. It<br />
provides system designers with<br />
a verified software and commercial-off-the-shelf<br />
(COTS) module<br />
solution, yet adds no additional<br />
cost. The SferiAdvise SRA, which<br />
supports both 3U VPX and 6U<br />
VME form factor modules, eases<br />
and speeds the integration of<br />
digital map and mission management<br />
applications in defense and<br />
aerospace rotary-wing platforms.<br />
“We are very pleased to collaborate<br />
with Airbus Defence<br />
and Space to offer system integrators<br />
pre-tested and pre-validated<br />
cost-effective solutions for digital<br />
mapping and mission management,”<br />
said Lynn Bamford,<br />
Senior Vice President and<br />
General Manager, Defense<br />
Solutions division. “Our<br />
System Ready Application<br />
approach reduces design risk and<br />
cuts costs and time to market,<br />
helping to ensure the success of<br />
our customers’ system designs.”<br />
SferiAdvise SRA Performance<br />
Features:<br />
• Digital Map: Capable of displaying<br />
raster maps in all relevant<br />
formats and scales in accordance<br />
with the requirements defined by<br />
DO-257.<br />
• Flight Plan: In accordance<br />
with DO-257, the SferiAdvise<br />
SRA uses the GAMA protocol<br />
interface to receive and display<br />
flight plan information from<br />
a Flight Management System<br />
(FMS). When not interfaced to<br />
the FMS, it can process and display<br />
pre-loaded flight plans in<br />
accordance with real-time navigation<br />
data.<br />
• HTAWS: The SferiAdvise<br />
SRA provides predictive (as opposed<br />
to reactive) aural and visual<br />
warnings of terrain and ob-<br />
20<br />
stacle threats in accordance with,<br />
and surpassing, the requirements<br />
of DO-309 for rotary wing platforms.<br />
The SferiAdvise SRA combines<br />
the Airbus Defence and<br />
Space’s popular SferiAdvise<br />
Digital Map and Mission Management<br />
Solution and Curtiss-<br />
Wright rugged VPX-based commercial-off-the-shelf<br />
(COTS)<br />
board-sets. Two different configurations<br />
of the SferiAdvise<br />
SRA are currently available, one<br />
for use in VPX-based systems<br />
and the other for use with VME<br />
architectures.<br />
The pre-validated VPX<br />
board-set consists of Curtiss-<br />
Wright’s recently announced<br />
VPX3-150 3U VPX Single Board<br />
Computer (SBC) and VPX3-718<br />
Graphics Controller Module.<br />
Both of these compact, small<br />
form factor boards support DO-<br />
254 DAL C and DO-178C DAL
C certifiability to speed development<br />
while reducing the cost and<br />
risk of safety-certifiable aviation<br />
systems. The associated DO-178B<br />
DAL C certification artifacts are<br />
also available for SferiAdvise.<br />
The VME board-set combines<br />
SferiAdvise and Curtiss-<br />
Wright’s VME-186 SBC and<br />
XMC-715 Graphics Controller<br />
mezzanine card. This board-set,<br />
designed for applications that require<br />
higher performance, supports<br />
certifiability to DO-178C<br />
DAL C.<br />
About Curtiss-Wright SRAs<br />
Curtiss-Wright’s pre-verified<br />
SRA solutions reduce design risk<br />
from the process of integrating<br />
new application functionality<br />
into embedded systems without<br />
adding cost. Because the test and<br />
verification for the software and<br />
Curtiss-Wright modules has already<br />
been performed, SRAs ease<br />
the development of demanding<br />
deployed applications, including<br />
digital moving maps, situational<br />
awareness, and cockpit<br />
and vehicle displays. Using these<br />
pre-qualified and validated SRAs<br />
to add capabilities such as HMI,<br />
Digital Maps and Cross Domain<br />
Solutions, significantly speeds<br />
their integration into embedded<br />
systems.<br />
SRA Advantages:<br />
• Complete hardware and<br />
software solution from Curtiss-<br />
Wright providing a single point<br />
of contact for the customer<br />
• Pre-tested and validated as<br />
an integrated solution<br />
• Minimizes design risk<br />
• Reduces cost and schedule<br />
Complete System Solutions<br />
The SferiAdvise SRA is the latest<br />
pre-tested, pre-validated<br />
hardware/software solution to<br />
be offered by Curtiss-Wright.<br />
SRA solutions are offered across<br />
all Curtiss-Wright system architectures<br />
by combining our<br />
wide range of Intel® and Power®<br />
Architecture-based SBCs, with<br />
our industry-leading graphics<br />
controllers and all the software<br />
components required. Curtiss-<br />
Wright’s wide range of hardware<br />
options, industry leading software<br />
support and wide range of<br />
chassis and integrated systems<br />
enables us to offer SRAs for<br />
integration into existing systems<br />
or packaged in a turnkey rugged<br />
deployable system.<br />
About Curtiss-Wright<br />
Corporation<br />
Curtiss-Wright<br />
21<br />
Corporation<br />
(NYSE:CW) is a global innovative<br />
company that delivers highly<br />
engineered, critical function<br />
products and services to the commercial,<br />
industrial, defense and<br />
energy markets. Building on the<br />
heritage of Glenn Curtiss and the<br />
Wright brothers, Curtiss-Wright<br />
has a long tradition of providing<br />
reliable solutions through<br />
trusted customer relationships.<br />
The company employs approximately<br />
9,000 people worldwide.<br />
For more information, visit www.<br />
curtisswright.com.<br />
About Airbus Defence and<br />
Space<br />
Airbus Defence and Space is a<br />
division of Airbus Group formed<br />
by combining the business activities<br />
of Cassidian, Astrium and<br />
Airbus Military. The new division<br />
is Europe’s number one defence<br />
and space enterprise, the second<br />
largest space business worldwide<br />
and among the top ten global<br />
defence enterprises. It employs<br />
some 40,000 employees generating<br />
revenues of approximately<br />
€14 billion per year.
Largest vessel ever calls on Savannah<br />
Indianapolis, IN, March 6 -- Less<br />
Savannah, Ga. - March 18, 2015 -<br />
The Georgia Ports Authority welcomed<br />
the largest ship ever to call<br />
on the Port of Savannah today<br />
when the ZIM Tianjin docked at<br />
Garden City Terminal.<br />
“This 10,000-TEU vessel<br />
represents the future of U.S.-Asia<br />
shipping,” said Georgia Ports Authority<br />
Executive Director Curtis<br />
J. Foltz. “The Tianjin is another<br />
example of a growing trend in<br />
the ocean carrier business toward<br />
larger, more efficient vessels.”<br />
The ship measures 1,145<br />
feet long by 150 feet wide. Stood<br />
on end, it would stand nearly as<br />
tall as the Empire State Building<br />
(1,454 feet, including its antenna).<br />
The vessel’s route originated<br />
in Qingdao, China, arriving on<br />
the U.S. East Coast via the Suez<br />
Canal. “The port call by the ZIM<br />
22<br />
Tianjin is another example of the<br />
strong and long standing professional<br />
relationship between GPA<br />
and ZIM,” said ZIM Vice President<br />
Brian Black. “We are very<br />
excited to have the largest vessel<br />
call Savannah!”<br />
GPA crews will make more<br />
than 2,000 container moves on<br />
and off the vessel during its time<br />
at dock.<br />
Foltz said ships in the Tian-
jin’s class provide lower cost per<br />
container slot for cargo owners -<br />
reducing the expense of delivering<br />
goods to customers at home<br />
and abroad. “The economy of<br />
scale achieved by Super Post-<br />
Panamax vessels is the reason<br />
we’re seeing more of them in<br />
Savannah, a trend that will only<br />
continue after an expanded Panama<br />
Canal opens in 2016.”<br />
In order to better accommodate<br />
Super Post-Panamax<br />
vessels, the Savannah Harbor<br />
Expansion Project will deepen<br />
the main river channel to 47 feet<br />
at low tide (averaging 54 feet at<br />
high tide). This month, the U.S.<br />
Army Corps of Engineers issued<br />
a $134.5 million contract that<br />
will mark the start of dredging.<br />
The contract covers deepening<br />
the outer harbor, extending 18.5<br />
miles into the Atlantic Ocean.<br />
Dredging the outer harbor<br />
constitutes about half of the project<br />
to deepen the 40-mile shipping<br />
channel and harbor from<br />
deep ocean to Garden City.<br />
Georgia has approved $266<br />
million in bonds to cover the<br />
state’s projected share of construction<br />
costs. As the $706 million<br />
expansion moves forward,<br />
construction funding will shift to<br />
federal dollars. Better accommodating<br />
larger, more efficient vessels<br />
such as the Tianjin will save<br />
U.S. companies moving goods<br />
through Savannah 20 to 40 percent<br />
on transportation.<br />
The Tianjin’s next stop is<br />
Kingston, Jamaica.<br />
Georgia’s deepwater ports<br />
and inland barge terminals support<br />
more than 352,000 jobs<br />
throughout the state annually<br />
and contribute $18.5 billion in<br />
23<br />
income, $66.9 billion in revenue<br />
and $2.5 billion in state and local<br />
taxes to Georgia’s economy.<br />
The Port of Savannah handled 8<br />
percent of the U.S. containerized<br />
cargo volume and 10.9 percent of<br />
all U.S. containerized exports in<br />
FY2013.
Transporting oil by<br />
rail: Is this a risk to<br />
national security?<br />
By K Denise Rucker Krepp<br />
24<br />
When a train<br />
carrying oil<br />
has an accident,<br />
the local<br />
community<br />
is the one<br />
that suffers.<br />
Residents are<br />
forced to leave<br />
their homes, sleep on gym floors,<br />
and pray that their lives return<br />
to normal. This suffering is increasing<br />
significantly as more<br />
and more trains derail around<br />
the country. One way to stop<br />
this suffering is to designate the<br />
oil transported by rail as security<br />
sensitive material. This designation<br />
automatically imposes<br />
greater safety and security measures<br />
and increased government<br />
oversight.<br />
Designating oil transported<br />
by rail as security sensitive material<br />
doesn’t require Congressional<br />
action. In 2007, Congress passed<br />
the Implementing the Recommendations<br />
of the 9/11 Commission<br />
Act. Section 1551 requires<br />
railroad carriers “to, no later than<br />
90 days after the end of each calendar<br />
year, compile security-sensitive<br />
materials commodity data.<br />
Such data must be collected by<br />
route, line segment, or series of<br />
line segments, as aggregated by<br />
the railroad carrier. Within the<br />
railroad carrier selected route,<br />
the commodity data must identify<br />
the geographic location of<br />
the route and the total number of<br />
shipments by the United Nations<br />
identification number for the security-sensitive<br />
materials.”<br />
Section 1551 also requires<br />
the railroad carriers to “provide a<br />
written analysis of the safety and<br />
security risks for the transportation<br />
routes identified in the security-sensitive<br />
materials commodity<br />
data collected.” Additionally,<br />
Section 1551 requires railroad<br />
carriers to “identify practicable<br />
alternative routes” and to examine<br />
the “risk of a catastrophic release<br />
from a shipment traveling<br />
along the alternate route compared<br />
to the primary route.”<br />
Unfortunately, the Obama<br />
Administration has not fully defined<br />
security sensitive material.<br />
Section 1501 of the 9/11 Act defines<br />
it as “a material, or a group<br />
or class of material, in a particular<br />
amount and form that the<br />
Secretary, in consultation with<br />
the Secretary of Transportation,<br />
determines, through a rulemaking<br />
with opportunity for public<br />
comment, poses a significant risk<br />
to national security while being<br />
transported in commerce due to<br />
the potential use of the material<br />
in an act of terrorism.”<br />
It’s been 8 years and the U.S.<br />
Department of Homeland Secu-
25<br />
rity has still not drafted the rule<br />
making. The Department indicated<br />
that it might do so soon in<br />
its Fall 2014 Regulatory Agenda.<br />
But hey, it’s been eight years so<br />
what’s the rush?<br />
The impetus to finally identifying<br />
security sensitive material<br />
and imposing greater rail safety<br />
and security precautions is Galena,<br />
Gogama, Timmis, and Mount<br />
Carbon. In each of these locations,<br />
trains derailed and local<br />
communities were upended. No<br />
longer could people sleep in their<br />
beds, drink their water, or safely<br />
breath the air. The environment<br />
was contaminated and remained<br />
so for weeks.<br />
More importantly from the<br />
homeland security perspective,<br />
these derailments demonstrated<br />
to potential terrorists the vulnerabilities<br />
to our nation’s rail<br />
system. If a train could derail<br />
by accident, imagine what type<br />
of damage a terrorist could do.<br />
Death and destruction on an unimaginable<br />
scale.<br />
So the first step in resolving<br />
the problem is for DHS to<br />
determine that oil by rail shipments<br />
pose a threat to national<br />
security. This shouldn’t be a significant<br />
hurdle. Multiple government<br />
agencies have involved in<br />
the response and recovery phases<br />
of these spills. They can testify to<br />
the monumental financial costs<br />
involved in cleaning up the accidents.<br />
The second step is to release<br />
the security sensitive rule making<br />
and hold public meetings. These<br />
meetings will allow residents<br />
from Galena, Gogama, Timmis,<br />
and Mount Carbon to explain in<br />
detail the suffering they endured<br />
when trains derailed in their<br />
communities.<br />
The government needs to<br />
understand the emotional toll a<br />
train accident it takes on a person.<br />
The toll of closely watching<br />
your children to make sure they<br />
don’t drink contaminated water.<br />
The toll it takes to grab your<br />
clothes and run out of the house,<br />
not sure if you will be able to return.<br />
It may not give you gray<br />
hair in two weeks, but you’ll definitely<br />
get an ulcer.<br />
Taken together, the suffering<br />
in Galena, Gogama, Timmis,<br />
and Mount Carbon, plus the 47<br />
people who died in Lac Megantic<br />
provide the justification for DHS<br />
to finally define security sensitive<br />
material and to include oil transported<br />
on trains within this definition.<br />
These communities have<br />
seen first hand the catastrophic<br />
nature of the accidents and its<br />
time for government to act.<br />
K. Denise Rucker Krepp is a homeland<br />
security and transportation<br />
security consultant. While serving<br />
as the Senior Counsel on the<br />
House of Representatives Homeland<br />
<strong>Security</strong> Committee, Ms.<br />
Krepp wrote the rail security provisions<br />
in the Implementing Recommendations<br />
of the 9/11 Commission<br />
Act.
International training essential to<br />
global stability and security<br />
Continued from page 9<br />
NATO forces have been training<br />
together from its establishment<br />
in 1949. Collectively NATO has<br />
experienced success in Afghanistan,<br />
Libya, the Balkans and<br />
Kosovo, and the coast of Africa<br />
just in the past 10 years. NATO’s<br />
success epitomizes the Aristotle<br />
saying “The whole is greater than<br />
the sum of its parts.”<br />
We are also firsthand wit-<br />
nesses to less than effective results.<br />
Part of ISIS’s success has<br />
come due to the lack of capability<br />
for indigenous forces to contain<br />
them. While foreign forces have<br />
been willing to participate for the<br />
most part, lack of capability has<br />
stifled the efforts. As the coalition<br />
of capable and interoperable<br />
forces increases, the success rate<br />
will go up.<br />
I’m certainly not an advocate<br />
of giving away all of our<br />
military secrets nor our best<br />
26<br />
equipment to foreign militaries.<br />
However, there is substantial<br />
benefit to providing our coalition<br />
and partner forces with comparable<br />
U.S. military capability. Writing<br />
the check for the equipment<br />
is actually the easy part though –<br />
the difficulty comes in effectively<br />
integrating and employing military<br />
equipment and capability.<br />
This is where security assistance<br />
via international training plays<br />
an important role – the ability to<br />
effectively operate autonomously<br />
and as interoperable partners<br />
in a coalition is as essential<br />
as having the capability in<br />
the first place. The resultant<br />
benefit is immeasurable and<br />
mitigates many of the risks<br />
we incur with a diminished<br />
U.S. military fighting force.<br />
Again, the whole is greater<br />
than the sum of its parts.<br />
Capable foreign military<br />
partners offer the U.S.<br />
many tangible benefits in<br />
terms of stability and security.<br />
First and foremost,<br />
strong foreign militaries act<br />
as a deterrent to aggression.<br />
Both internal and regional<br />
bad actors are less likely to<br />
take hostile action knowing<br />
a capable military is within<br />
More on page 42
Special Section: Access Control/ID and Biometrics<br />
Entrust Datacard announces<br />
new software suite for secure<br />
identification card issuance<br />
Entrust Datacard has announced the new Datacard®<br />
TruCredentialTM Suite Software which is<br />
designed to help organizations of all sizes deploy a<br />
secure ID program that meets a wide range of application<br />
requirements—from basic photo IDs to<br />
high-assurance credentials.<br />
The new software suite can be used to issue<br />
a variety of credentials such as student, faculty or<br />
visitor IDs; employee or contract badges; patient<br />
and staff healthcare IDs; credentials for local government<br />
programs; membership and customer<br />
loyalty cards; and transit passes.<br />
Available in four editions that allow organizations<br />
to easily scale from a single workstation<br />
to a multi-station, enterprise-wide application<br />
without increasing complexity – the TruCredential<br />
Suite offers a combination of functionalities.<br />
These include pre-configured card design templates<br />
that can be easily customized to develop<br />
unique designs; enrollment and data capture capabilities<br />
with support for QR code, photo and signature<br />
devices for capturing physical and logical<br />
cardholder data; workflow tools for reduced setup<br />
time; enterprise integration including physical<br />
access control system (PACS) interfaces; and<br />
smart card encoding support to drive operational<br />
efficiencies.<br />
“For most public and private organizations,<br />
the ability to positively identify employees, students<br />
and visitors serves as the foundation for effective<br />
security – and this requires a flexible, web<br />
based secure ID solution,” said Ryan Zlockie, vice<br />
president of software product marketing for Entrust<br />
Datacard. “We are pleased to offer a complete<br />
software suite that can support a wide range<br />
of issuance technologies that gives organizations<br />
the ability to determine precisely who should and<br />
who should not access their facilities.”<br />
For more information, please visit www.datacard.com/issuance-software/trucredential-software.<br />
About Entrust Datacard<br />
Consumers, citizens and employees increasingly<br />
expect anywhere-anytime experiences — whether<br />
they are making purchases, crossing borders, accessing<br />
e-gov services or logging onto corporate<br />
networks. Entrust Datacard offers the trusted<br />
identity and secure transaction technologies that<br />
make those experiences reliable and secure. Solutions<br />
range from the physical world of financial<br />
cards, passports and ID cards to the digital realm<br />
of authentication, certificates and secure communications.<br />
With more than 2,000 Entrust Datacard<br />
colleagues around the world, and a network of<br />
strong global partners, the company serves customers<br />
in 150 countries worldwide. For more information,<br />
visit www.entrustdatacard.com.<br />
27
Special Section: Access Control/ID and Biometrics<br />
Identiv announces U.S. <strong>Government</strong> FICAM Certification<br />
of uTrust TS <strong>Government</strong> Readers for premises access<br />
Identiv, Inc. (NASDAQ: INVE), a global security<br />
technology company that provides trusted identity<br />
solutions for premises, information, and everyday<br />
items, has announced that Identiv’s uTrust<br />
TS <strong>Government</strong> Readers for premises access are<br />
now included on the U.S. government’s FICAM<br />
Approved Products List (APL). The General Services<br />
Administration (GSA) lab, which is part of<br />
the Federal Identity, Credential, and Access Management<br />
(FICAM) Testing Program, has evaluated<br />
and approved Identiv’s uTrust TS <strong>Government</strong><br />
Readers.<br />
Identiv’s uTrust TS <strong>Government</strong><br />
Reader is specifically<br />
designed for U.S. government<br />
customers to support<br />
any existing building access<br />
system (such as Identiv, Lenel,<br />
AMAG, Honeywell, or<br />
Software House) and provide<br />
a forward path to FICAM<br />
compliance. Featuring high<br />
security with an inbuilt secure<br />
processor certified to the<br />
highest standards (EAL 6+), uTrust TS Readers<br />
support all major commercial and government<br />
access credentials, including U.S. government<br />
PIV, PIV-I, and CAC. Multiple form factors are<br />
available, including mullion and wall mount, with<br />
an upcoming keypad model.<br />
28<br />
Offering a seamless transition to standardsbased<br />
network cabling, uTrust TS Readers support<br />
simultaneous Wiegand, RS485, and Ethernet<br />
communication. Four independent processors<br />
combine to deliver the fastest building entry transaction<br />
times, speeding access and reducing user<br />
frustration. One reader can be used at all building<br />
access points, delivering secure, future-proof access,<br />
while simplifying purchasing and reducing<br />
deployment and management costs.<br />
“The uTrust TS <strong>Government</strong> Reader delivers a single<br />
cost-effective reader that<br />
supports all existing access<br />
systems and all major credential<br />
types, providing a clear<br />
path to a standards-based FI-<br />
CAM solution and migration<br />
to network cabling,” said Jason<br />
Hart, Identiv CEO. “Identiv<br />
Channel Alliance Network<br />
partners are able to deliver a<br />
product from an American<br />
company to 100% of the U.S.<br />
government marketplace, giving<br />
customers a cost-effective solution for over<br />
150,000 access points across all U.S. government<br />
buildings, recently mandated to adopt FICAM<br />
standards. uTrust TS <strong>Government</strong> Readers are<br />
available now and have already shipped to U.S.<br />
government customers.”
Identiv’s uTrust TS family of connected premises<br />
readers utilizes open, secure standards and a flexible,<br />
updatable platform design to support a broad<br />
range of access card technologies from proximity<br />
to public key infrastructure (PKI) at the door.<br />
Identiv’s uTrust TS Readers enable agencies to<br />
support existing access systems and migrate to a<br />
secure U.S. government FICAM solution at a fraction<br />
of the cost of other competitive solutions.<br />
uTrust TS Readers are available immediately<br />
through the Identiv Channel Alliance Network<br />
(ICAN) Global Partner Program and to original<br />
equipment manufacturer (OEM) partners<br />
through the uTrust Technology Partnership Program.<br />
Identiv’s approved products on the FICAM<br />
PACS APL can be downloaded here. For more information<br />
on the FICAM Testing Program, please<br />
click here.<br />
About Identiv<br />
Identiv is a global security technology company<br />
that establishes trust in the connected world, including<br />
premises, information, and everyday<br />
items. CIOs, CSOs, and product departments<br />
rely upon Identiv’s trust solutions to reduce risk,<br />
achieve compliance, and protect brand identity.<br />
Identiv’s trust solutions are implemented using<br />
standards-driven products and technology, such<br />
as digital certificates, trusted authentication, mobility,<br />
and cloud services. For more information,<br />
visit identiv.com.<br />
Iris ID to enhance<br />
Canada Border Service<br />
NEXUS program using<br />
Iris Recognition<br />
CRANBURY, N.J., and OTTAWA, ON—25 February<br />
2015 Iris ID in collaboration with IBM<br />
(NYSE:IBM) announced today that they are providing<br />
iris recognition technology to the Canada<br />
Border Services Agency’s NEXUS program. Enrolled<br />
travelers can now clear customs by simply<br />
looking into a camera that uses the eye’s iris as<br />
proof of identity.<br />
The biometric technology will improve security<br />
and expedite border clearance processes<br />
between Canada and the U.S. More than one million<br />
pre-approved members of the program will<br />
be able to use the authentication process at eight<br />
international airports in Canada, 19 land ports of<br />
entry, and approximately 430 marine locations.<br />
Members also benefit from expedited security<br />
screening lines in preclearance areas at dedicated<br />
immigration lanes at more than 100 participating<br />
U.S. airports.<br />
Charles Koo, CEO and President of Iris ID<br />
More on page 40<br />
29
Special Section: Access Control/ID and Biometrics<br />
Sonavation launches IDKEY featuring 3D biometric<br />
ultrasound surface scan technology<br />
Palm Beach Gardens-based Sonavation, a pioneer<br />
in biometric ultrasound technology for digital<br />
security, has announced the launch of its IDKEY<br />
biometric security key product line. IDKEY is the<br />
most complete FIDO Ready U2F/UAF solution<br />
for multi-factor authentication that securely protects<br />
logical and physical access to online systems,<br />
documents, files and facilities.<br />
IDKEY is powered by Sonavation’s patented<br />
3D biometric ultrasound surface scan technology,<br />
which provides the most in-depth scan of a user’s<br />
biometric fingerprint, creating a unique identifier<br />
for each user that is virtually unspoofable. IDKEY<br />
secures a users’ access across all digital touchpoints<br />
and is convenient, smart and simple, delivering<br />
peace of mind. With just a swipe of the finger,<br />
a user’s identity and online life are protected.<br />
“The current state of passwords is broken,”<br />
said Bob Stewart, COO, Sonavation. “Today, a<br />
hacker’s biggest opportunity is through the digital<br />
front door, which is often left open due to poor<br />
password security. We’ve seen multiple instances<br />
of this in the past few months alone – from the<br />
iCloud disaster to the recent Sony hack. The best<br />
approach to locking this door is with biometric<br />
technology. As our fingerprint scanning technology<br />
is the most well-developed and sound biometric<br />
approach, with IDKEY, we’re committed to<br />
giving consumers and businesses the most secure<br />
environment possible.”<br />
Eliminating unauthorized access to online<br />
accounts and files by providing all users with<br />
unique identifiers, IDKEY is fully compliant with<br />
FIDO universal 2nd factor (U2F/UAF) standards.<br />
With IDKEY, a user’s biometric information is<br />
stored on the device and off the grid. Additional<br />
features of the IDKEY product line include:<br />
• 16GB of encrypted storage to securely store<br />
passwords and files and quickly access on-the-go<br />
• Voice search – As the device can store thousands<br />
of passwords, use voice search to pull up<br />
specific passwords in seconds<br />
• Bluetooth & Wi-Fi enabled – Seamlessly<br />
connect wirelessly, with auto-fill in of passwords<br />
to websites, online bank accounts and files<br />
• Uses NFC and Secure Element technology<br />
allowing it to be HID SEOS ready<br />
• USB – Plug directly into any computer for<br />
immediate access to your passwords and file folders<br />
• OLED screen display – Enter and view your<br />
30
passwords with the simple swipe of a fingerprint<br />
and click of a button<br />
• Rechargeable battery<br />
• Water resistant – Device is protected and fully<br />
functional in all environments<br />
• Apps for iOS and Android – Ensure ultimate<br />
identity security on all devices due to mobile compatibility<br />
and functionality<br />
• Software Upgradeable<br />
“As a founding member of the FIDO Alliance,<br />
we know that that secure authentication is<br />
a critical step to solving the pain point of password<br />
insecurity,” said Stewart. “FIDO standards<br />
of multi-factor authentication are the future of<br />
digital security and access. With IDKEY, users can<br />
own the most advanced FIDO-compliant technology<br />
designed to keep their online identities in<br />
their own hands.”<br />
For more information, please visit www.ID-<br />
KEY.com.<br />
Zwipe introduces HID Technology <br />
biometric cards for iCLASS ® and<br />
ProxCard ® Readers<br />
About Sonavation<br />
The Sonavation product line is designed to provide<br />
secure authentication and protection for digital<br />
and physical environments for consumers and<br />
businesses. Solutions include both embedded and<br />
stand-alone device offerings designed to protect<br />
physical access as well as online systems, including:<br />
eCommerce, financial services, health data<br />
and other sensitive applications.<br />
Sonavation designs and manufactures the<br />
industry’s leading biometric fingerprint sensors,<br />
utilizing ultrasound. Its 3D surface scan and subsurface<br />
technology is protected by 38 awarded<br />
patents plus over 70 additional patents filed, making<br />
it the world’s smallest low-power ultrasound<br />
sensor. Headquartered in Palm Beach Gardens,<br />
Fla., Sonavation is committed to “Empowering<br />
Trust, Delivering Peace of Mind.”<br />
For more information, please visit http://www.<br />
sonavation.com/.<br />
Oslo, Norway based Zwipe, a global leader in biometric<br />
authentication technology, has announced<br />
that HID Global’s iCLASS® and 125kHz ProxCard®<br />
users can now easily integrate the Zwipe Access<br />
biometric card, eliminating the need to add biometric<br />
readers to an existing HID Global®iClass®<br />
or Prox-based system.<br />
“As the largest smart and proximity card provider<br />
in the world, HID Global has thousands of<br />
users who would like to upgrade to biometric authorization,<br />
but may not have the budget or the resources<br />
to invest in biometric readers,” added Robert<br />
Fee, director of sales, Americas, Zwipe. “The<br />
Zwipe biometric card provides an easy, affordable<br />
option for security professionals to extend the use<br />
of their present card systems by adding biometrics<br />
for multi-factor, card-based authentication.”<br />
By providing authorized users with Zwipe<br />
Access biometric cards that interoperate with<br />
their existing iCLASS and 125 kHz ProxCard<br />
More on page 39<br />
31
Special Section: Protecting the Grid<br />
New CIP standards provide a catalyst to unite se<br />
By Mark A. Tinker, PhD<br />
32<br />
In late 2014, the Federal Energy<br />
Regulatory Commission<br />
(FERC) outlined new rules,<br />
which take effect in 2016, requiring<br />
electrical utility companies<br />
to determine the key<br />
electric transmission stations<br />
and substations that could<br />
have large scale impact on the US electrical grid.<br />
Heading into 2015, those tasked with securing<br />
the national electrical grid must proactively<br />
enhance their security posture to address these<br />
critical infrastructure protection guidelines. However,<br />
large power corporations are starting to realize<br />
it is possible to capitalize upon compliance<br />
by leveraging security investments across other<br />
departments. Enhancing security not only has<br />
the desired effect, but when done from an holistic<br />
perspective, it can actually improve operations,<br />
increase asset resilience, and improve rate payer<br />
value. In other words, security is no longer a line<br />
item in a budget, but a critical element of corporate<br />
performance.<br />
According to an article in the Wall Street<br />
Journal in November 2014, large power companies<br />
such as PG&E and Dominion Resources plan<br />
to invest hundreds of millions of dollars to alleviate<br />
current weaknesses that incidents like Metcalf<br />
exploited. Among the vulnerabilities common to<br />
electrical transmission substations were remoteness<br />
of assets, security operators lack of confidence<br />
in alerts, and the image quality from cameras,<br />
especially in darkness or difficult weather<br />
conditions.<br />
Addressing these vulnerabilities means<br />
proactively turning operator intuition into intelligence.<br />
Intelligence stems from validated alerts<br />
that lead to action, whether by operator initiative<br />
or automatically by the security system. This leads<br />
to proactive deterrence.<br />
Shift from Reaction to Deterrence<br />
Since 9/11, reaction became the dominant element<br />
of the new security paradigm. Today, while reaction<br />
is still a common and necessary requirement,<br />
a new theme is appearing, which is deterrence. It<br />
is now possible to model how modern perimeter<br />
intrusion systems can significantly increase the<br />
probability of deterrence. As utility companies<br />
strengthen their security posture, they seek to deter<br />
or delay threats before they can act. A driver<br />
for deterrence capability is having space and time<br />
available for intercession.<br />
The technologies that enable deterrence also<br />
add value to business operations and resilience.<br />
Operators can now confirm with security if they<br />
are witnessing an anomaly and if so, begin to take<br />
necessary actions.<br />
Integrated <strong>Security</strong> Enabling Defense in<br />
Depth<br />
What is most intriguing are emerging new technologies<br />
that can single-handedly do much more<br />
than ever before, yet when integrated with other
curity with operations in electrical utilities<br />
technologies or existing systems provide superior<br />
intelligence that can be integrated into operations<br />
or other non-security functions. For example, new,<br />
concealed seismic sensors are able to detect and<br />
classify complete threat profiles such as vehicle activity,<br />
pedestrian activity, gunfire, even lightning,<br />
in non-line-of-sight conditions. Validating the results<br />
with other sensors allows the security operator<br />
to confidently and quickly act, or the system<br />
automatically employ reactive measures, such as<br />
audible or visual warnings directed at the possible<br />
intruder. Even more impressive is how integrated<br />
architectures can even ascertain intent within a<br />
broad awareness zone outside the fence, all from<br />
sensors at or inside the fence line. For example, is<br />
the gunfire a legal hunter or actual threat?<br />
The North American Electric Reliability<br />
Corporation (NERC) sets out best practices for<br />
delivering early warning and opportunities for<br />
rapid response. With these new technologies, the<br />
tip of the security spear has pushed the boundary<br />
of the awareness zone farther out in distance<br />
and time. Potential threats such as gunshots can<br />
be detected and classified outside the perimeter<br />
sooner and with greater accuracy. This ability to<br />
reach beyond a perimeter, such as a fence or property<br />
line, provides a significantly increased level of<br />
situational awareness, increasing time and space<br />
in which to act.<br />
burglary incidents which often go unreported,<br />
leading utilities see the financial and operational<br />
benefit of achieving fewer intrusions, suffering<br />
fewer losses that derail safety, or reducing expensive<br />
system redundancies. Collaboration between<br />
security, IT, and operations yields reduced operational<br />
expenses and affords increased uptime. In<br />
the event of an incident, be it security or otherwise,<br />
the additional data may provide forensic information<br />
for later understanding, criminal prosecution,<br />
or system efficiency improvement.<br />
With 2016’s new rules for electrical utilities<br />
as a catalyst, there is a growing understanding<br />
among energy company leaders that increased<br />
collaboration between security and operations<br />
yields reduced operational expenses and results<br />
in increased uptime. The reaction culture remains<br />
ever important, but now we can validate our intuition<br />
and intercede as necessary, all with a high<br />
level of confidence. Leveraging the security awareness<br />
zone and the intelligence it provides is just<br />
the beginning.<br />
About Mark Tinker<br />
Mark Tinker, PhD, is the CEO of Quantum Technology<br />
Sciences, a science and engineering company<br />
delivering real-time situational awareness solutions<br />
around critical infrastructure assets to expand and<br />
enhance physical security.<br />
Collaboration between <strong>Security</strong> and Operations<br />
In light of instances such as the Metcalf attack and<br />
33
Special Section: Protecting the Grid<br />
ROMANOWICH ON SURVEILLANCE<br />
Challenges and solutions for substation security –<br />
applying smart thermal technology to prevent intrusions<br />
John Romanowich<br />
CEO, SightLogix, Inc.<br />
Protecting electrical substations<br />
presents a number<br />
of unique challenges,<br />
ranging from theft, vandalism<br />
and safety concerns to complying with increasingly<br />
enforced regulations from the National<br />
Electrical Reliability Commission’s (NERC) Critical<br />
Infrastructure Protection (CIP) program.<br />
Despite the threat of terrorist activity to<br />
disrupt the nation’s power grid, theft of valuable<br />
copper and vandalism are more common. Substation<br />
owners have taken some precautions, such as<br />
painting or marking wiring, to alert scrap yards<br />
that copper has been stolen, but that has not<br />
stopped thieves from breaking in, often with serious<br />
consequences. The risk of injuries and even<br />
loss of life brings new liabilities above and beyond<br />
disrupted electrical service. Maintenance personnel<br />
have been severely injured or killed in the process<br />
of performing regular maintenance due to<br />
the destabilization of elements of the power grid<br />
caused by copper theft.<br />
In light of these and other concerns, the Federal<br />
Energy Regulatory Commission (FERC) has<br />
worked together with NERC to put additional<br />
safeguards in place for physical security around<br />
these assets and to prevent cascading consequences.<br />
This partnership has led to the strengthening<br />
of NERC’s critical infrastructure protection (CIP)<br />
standards. As CIP standards move toward mandates,<br />
utilities will be required to deploy security<br />
equipment to comply with regulations, or face<br />
fines and other measures for non-compliance.<br />
To assure the physical security of potentially<br />
vulnerable substations, CIP standards require<br />
protection on all six sides of assets; the four surrounding<br />
sides plus above and below. To meet this<br />
requirement, conventional wisdom has been to<br />
use video surveillance cameras, but there are limitations<br />
to what video surveillance can do. What is<br />
really needed is a security modality that can detect<br />
intruders as soon as they threaten a secured area.<br />
Real-time awareness when an intrusion is taking<br />
place is critical to ensuring a timely response and<br />
preventing an incident from escalating.<br />
Real-time awareness is where automated solutions<br />
excel. These smart systems never tire, cover<br />
wide areas, and see what the human eye would<br />
miss, while delivering immediate, actionable information<br />
to help security staff make fast response<br />
decisions.<br />
Reliable accuracy is the key to success with<br />
34
smart outdoor security systems. When alerts are<br />
unreliable, responders lose confidence in the system<br />
and resources are wasted on false alarms.<br />
Historically, blind sensors, such as fiber on fence<br />
lines, were used to detect activity. The drawbacks<br />
to that approach are that these sensors generate<br />
many nuisance alerts, diminishing reliability, and<br />
incurring an additional cost of either a confirming<br />
camera system or a physical confirmation by<br />
a guard.<br />
Thermal cameras with video analytics – also<br />
known as “smart” thermal cameras - provide substantial<br />
advantages. They increase the probability<br />
of intruder detection while greatly reducing the<br />
nuisance alarms that have plagued automated<br />
perimeter systems in the past. They also detect<br />
break-ins as they occur to better thwart an intruder<br />
in real time, while providing enough detail to<br />
determine the “what and where” of an alert without<br />
additional verification systems.<br />
Smart thermal cameras accurately and reliably<br />
detect intruders in conditions when visible<br />
light cameras will fail. Thermal cameras ignore<br />
headlights, reflections off water, and other lighting<br />
issues that cause false detections with visible<br />
light cameras. Because they can detect in complete<br />
darkness, bright sunlight, or poor weather,<br />
smart thermal cameras are a 24/7 outdoor detection<br />
solution. Combining manpower, automation<br />
and smart thermal systems will deliver reliable,<br />
real-time security and meet federal physical security<br />
mandates.<br />
In terms of system design, the historic focus<br />
for securing critical assets such as substations<br />
has been on perimeter security. The capabilities<br />
of smart thermal cameras can provide additional<br />
advantages and new operational modes. For example,<br />
they can be used to create virtual barriers<br />
outside a perimeter fence or along open areas that<br />
surround a building or any specific asset. These<br />
virtual barriers can alert officials to real time activity<br />
for review, and can provide alerts when someone<br />
is about to enter an area – before they had an<br />
opportunity to steal, vandalize or disrupt substation<br />
operations. Within a facility, such alerts could<br />
prevent insider theft where physical barriers don’t<br />
exist. Smart video can be used to create a security<br />
“buffer zone” around areas of special concern to<br />
control access based on time of day or other criteria,<br />
mitigating possible sabotage or theft from<br />
insiders.<br />
When it comes to protecting critical assets,<br />
real-time awareness of an intrusion is critical.<br />
Real-time awareness is the key to ensuring a<br />
timely response and preventing theft, vandalism,<br />
and other potentially dangerous events that could<br />
disrupt power grid stability – while also meeting<br />
increasingly enforced security regulations.<br />
35
Special Section: Protecting the Grid<br />
Utah-Based Washakie Renewable Energy, LLC<br />
WASHINGTON, March 19 – The U.S. Environmental<br />
Protection Agency (EPA) and the U.S. Department<br />
of Justice (DOJ) today announced a<br />
settlement with Utah-based Washakie<br />
Renewable Energy, LLC, that resolves<br />
allegations that the company<br />
generated more than<br />
7.2 million invalid renewable<br />
fuel credits worth<br />
more than $2 million.<br />
From January<br />
to October of 2010,<br />
Washakie generated<br />
more than 7.2 million<br />
Renewable Identification<br />
Numbers,<br />
or RINs, and reported<br />
to EPA that it produced<br />
biodiesel associated with<br />
those RINs at its Plymouth,<br />
Utah facility. During that time,<br />
however, Washakie did not produce<br />
any biodiesel at the Plymouth<br />
facility. The biodiesel associated with the 7.2<br />
million RINs would have accounted for a reduction<br />
of emissions equivalent to more than 30,000<br />
metric tons of carbon dioxide. Washakie has purchased<br />
and retired from the market an equivalent<br />
number of RINs, which achieved this reduction of<br />
emissions.<br />
36<br />
Renewable fuel producers and importers<br />
generate RINs for each gallon of renewable fuel in<br />
the U.S. market that meets greenhouse gas<br />
emissions reduction standards established<br />
under the Renewable<br />
Fuel Standard. Washakie<br />
will pay a $3 million penalty<br />
under the settlement,<br />
which was<br />
lodged today in the<br />
U.S. District Court<br />
for the District of<br />
Columbia.<br />
“This case is<br />
another example of<br />
EPA’s commitment<br />
to maintain the integrity<br />
of the Renewable<br />
Fuel Standard program,”<br />
said Cynthia Giles,<br />
EPA Assistant Administrator<br />
for Enforcement and Compliance<br />
Assurance. “Making sure<br />
producers are supporting their claims<br />
with production of actual renewable fuels is critical<br />
to reducing greenhouse gas emissions that are<br />
fueling climate change.”<br />
“The defendant made quite a profit by failing<br />
to adhere to the requirements of the Renewable<br />
Fuel Program regulations,” said Assistant At-
settles renewable fuel standard violations<br />
torney General Cruden. “The penalty here sends<br />
the message that renewable fuel producers will<br />
be held accountable for meeting all legal requirements.<br />
The Department of Justice remains committed<br />
to taking the profit out of illegal activity.”<br />
This is the first case under the second Renewable<br />
Fuels Standards in which, as a part of a<br />
settlement, EPA secured the replacement of invalid<br />
RINs by the producer of those RINs. Because<br />
Washakie purchased and retired an equal amount<br />
of RINs to the number identified as invalid and<br />
used for compliance purposes, EPA does not plan<br />
to request that the obligated parties who used the<br />
invalid RINs replace them. This reduces the burden<br />
on the parties that purchased and used the<br />
RINs for compliance purposes.<br />
EPA initially discovered these violations<br />
during an EPA inspection of the Washakie facility<br />
in Plymouth, Utah in 2010, and uncovered additional<br />
information concerning the violations in<br />
Washakie’s response to information requests and<br />
additional investigative work by the agency.<br />
EPA is responsible for developing and implementing<br />
regulations to ensure that transportation<br />
fuel sold in the United States contains a minimum<br />
volume of renewable fuel. The Renewable Fuel<br />
Standard program – created under the Energy<br />
Policy Act of 2005 – was developed in collaboration<br />
with refiners, renewable fuel producers, and<br />
many other stakeholders. It was expanded and<br />
37<br />
strengthened under the Energy Independence and<br />
<strong>Security</strong> Act of 2007, which was designed to encourage<br />
the blending of renewable fuels into our<br />
nation’s motor vehicle fuel supply, and reduce the<br />
nation’s dependence on foreign oil, help grow the<br />
nation’s renewable energy industry, and achieve<br />
greenhouse gas reductions.<br />
To read the settlement, or for more information<br />
about the case, visit: To read the settlement,<br />
or for more information about the case, visit:<br />
http://www2.epa.gov/enforcement/washakie-renewable-energy-llc-clean-air-act-settlement.<br />
For more information on the Renewable Fuel<br />
Standards, visit: http://www.epa.gov/oms/fuels/<br />
renewablefuels/
Special Section: Protecting the Grid<br />
Excerpts from Chuck Brooks 2014 radio interview<br />
on the Dick Morris Show<br />
Dick Morris: Tell us what’s going on with<br />
the Grid, Chuck<br />
Chuck Brooks: It’s a monumental issue.<br />
Nobody is paying attention to the electrical grid<br />
even though we all depend upon it. Most of the<br />
grid was built in the 1950s, It’s vulnerable not only<br />
to terrorist incidents, but also from being old.<br />
Most of the telephone lines and circuit breakers<br />
are over 30 years old. Yet energy usage has increased<br />
almost 60% since the 70’s. It’s an $860 billion<br />
industry involving 70,000 transformer power<br />
stations, with 70% of the transmission lines 25<br />
years old or more and 60% of the circuit breakers<br />
over 30 years old.<br />
On the subject of Cyber/SCADA, aka “Supervisory<br />
Control and Data Acquisition”, a new<br />
Ponemon study has revealed that 67 percent of<br />
critical infrastructure providers reporting falling<br />
victim to at least one security breach in the last<br />
twelve months, causing<br />
disruption of operation<br />
or loss of sensitive information.<br />
“Breaches in a<br />
cyber-way”, Brooks responded<br />
to another<br />
question from Morris<br />
asking “What kind of<br />
Breaches”.<br />
But terrorist activites<br />
are only one of<br />
38<br />
the threats, said Brooks.<br />
There are cyber threats<br />
involving malware that<br />
can cause Denial of<br />
Service aimed at master<br />
stations and control<br />
centers, and blackouts<br />
can be caused by human<br />
error… But the biggest<br />
threats of all are weather threats, ranging from<br />
lightning to geomagnetic storms – such as the<br />
Carrington Event of 1859 and the Railroad Storm<br />
of 1921 – and solar flares. A solar geo-storm that<br />
sends an electric wave, a “flare from the sun”, could<br />
take out 90% of our infrastructure. And there have<br />
been terrible solar geo-storms in the past. But we<br />
weren’s as connected then<br />
Morris: So what are the solutions?<br />
Brooks: It’s a combination of solutions.<br />
Incredibly, there are few facilities that even have<br />
guards, despite the fact that the grid is an $860-billion<br />
industry that generates enormous profits for<br />
90% of the facilities that are privately owned. The<br />
combination of solutions includes guards for the<br />
facilities, sharing of information between electrical<br />
power companies and hardening the “targets”<br />
for surge protection, because the biggest threat is<br />
the voltage surge threat. The targets would also<br />
protect citizens from solar flares or geo-magnetic<br />
storms.<br />
Morris: And what is the government doing
Zwipe introduces HID Technology biometric<br />
cards for iCLASS® and ProxCard® Readers<br />
Continued from page 31<br />
these organizations can now benefit from the leading<br />
edge biometric authorization technology by<br />
simply incorporating the card into their existing<br />
systems in the same way they already incorporate<br />
proximity or HID Global smart cards. The Zwipe<br />
solution enables customers to extend the life of<br />
their existing infrastructure while simultaneously<br />
increasing its security.<br />
With Zwipe’s patented on-card authentication<br />
technology, only the authorized cardholder<br />
can activate card communication with the reader.<br />
This means no more lending or borrowing of ID<br />
badges to access buildings, university labs, hospital<br />
pharmacies, data centers or networks. By upgrading<br />
the authentication from something they carry<br />
(a card) to something they are (a fingerprint), the<br />
issues associated with a lost or stolen credential<br />
are dramatically reduced.<br />
The problems associated with PINs and passwords<br />
are eliminated through the use of Zwipe’s<br />
biometric authentication technology. The on-card<br />
fingerprint scanner with 3D capacitive technology<br />
resides on the contactless smart card that utilizes<br />
an embedded HID Global 13.56MHz iCLASS or<br />
125kHz Proximity transponder. The Zwipe biometric<br />
card is also compatible with MIFARE Classic<br />
and DESFIRE EV1.<br />
By incorporating Zwipe’s biometric solution<br />
to access control, organizations can increase<br />
the security of their systems, their employees and<br />
their assets by changing the authentication from<br />
something you carry to something you are without<br />
any modification to their existing infrastructure.<br />
About Zwipe<br />
Starting in 2009, Zwipe challenged the status quo<br />
of identity verification by replacing PINs and<br />
passwords with fingerprint authentication. After<br />
developing the leanest, fastest, and most power efficient<br />
fingerprint algorithm in the world, Zwipe<br />
continued disrupting the industry through its patented<br />
energy harvesting technology. No longer<br />
dependent on batteries, Zwipe fingerprint readers<br />
harvest the energy needed from already existing<br />
access, transport, border control and financial infrastructures.<br />
With its already strong portfolio of<br />
patent applications, Zwipe continues to develop<br />
and refine its innovative technology. For more information,<br />
visit www.zwipe.com or follow them on<br />
Twitter@Zwipe.<br />
to encourage responsible actions and investments<br />
by the electric power plant operators?<br />
Brooks: With the Critical Infrastructure<br />
Protection Act of Representative Trent Franks<br />
HR3410, Congress is now establishing standards<br />
that business has to follow. The needs are for:<br />
• Collecting and sharing information<br />
39<br />
• Hardening of targets to provide grid protection<br />
by protecting against surges and voltage<br />
• Storage and automated self-healing<br />
• Mandatory security standards<br />
• Training and contingency planning<br />
It would not be too expensive to harden the facilities.<br />
It’s an $860 billion industry.
Iris ID to enhance Canada Border Service<br />
Continued from page 29<br />
said, “We are excited to work with IBM to make<br />
the enhancements to the NEXUS program. Iris<br />
ID’s iCAM 7 Series and IrisAccelerator backend<br />
matching engine are integral parts of the changes<br />
to the Nexus program. Koo added, “A similar system<br />
is also being used by Canadian Air Transport<br />
<strong>Security</strong> Authority (CATSA) across 29 major international<br />
airports in Canada for employee identity<br />
management and access control.”<br />
The iris-scanning systems enable the validation<br />
of the iris-scanning camera, reads the Nexus<br />
card, and prints a receipt and other functions.<br />
“IBM is always looking for innovative ways<br />
to improve the lives of Canadians so boosting security<br />
and reducing time spent in lines at border<br />
crossings is something we’re proud to be part of,”<br />
said John Fursey, VP and Partner Public Sector<br />
Leader Canada. “<br />
Iris recognition is a superior verification process<br />
because a picture of the human iris provides<br />
measurement unparalleled by other methods. The<br />
unique pattern in the human iris is formed by 10<br />
months of age and remains unchanged throughout<br />
one’s lifetime. The probability of two irises<br />
producing the same code is nearly impossible and<br />
the technology is easily integrated into existing<br />
security systems or can operate alone. A distinctive<br />
iris pattern is not susceptible to theft, loss or<br />
compromise and it is non-invasive. Unlike other<br />
biometric technologies, iris recognition is noncontact<br />
and quick, offering unmatched accuracy<br />
when compared to any other security alternative,<br />
from distances as far as six inches to one meter<br />
from the eye.<br />
With the enhancements pre-screened, frequent<br />
travelers can be identified quickly and allow<br />
enforcement activities to be focused on high-risk<br />
travelers. For more information about the Nexus<br />
program please visit http://www.cbsa-asfc.gc.ca/<br />
prog/nexus/menu-eng.html. For more information<br />
about IrisID visit: http://www.irisid.com/irisrecognitiontechnology<br />
About Iris ID Systems<br />
Iris ID Systems, Inc, formerly a division of LG<br />
Electronics USA known as LG Iris, has been active<br />
in iris recognition research, development and production<br />
since 1997. Today, U.S. based Iris ID Systems<br />
in a proven global leader in the Iris recognition<br />
market. IrisAccess® is the world’s most widely<br />
deployed Iris recognition platform, used in thousands<br />
of locations authenticating the identities of<br />
millions of people. More people look to IrisAccess<br />
for iris- and face-based authentication than to all<br />
other iris recognition products combined. To find<br />
out more about Iris ID visit www.irisid.com.<br />
For IrisID, Wendy Kwan, Customer Service<br />
Office: +1-609-819-IRIS (4747), wkwan@irisid.<br />
com<br />
40
GSN Interviews Louis R. Hughes<br />
Continued from page 19<br />
came through personal use, but I<br />
am saying, get rid of the risk of<br />
personal use. Why not?<br />
GSN: Is WorkPlay Technology<br />
easy to implement?<br />
LH: Yes. It’s a core technology<br />
you can adapt to any ARM<br />
device, which in the mobile<br />
world are very common. But I<br />
think the more telling answer is,<br />
our core technology is small, just<br />
several thousand lines of code.<br />
That’s not much when you look<br />
at the size of other containerization<br />
methods. This is important<br />
because the code is pretty easy<br />
to evaluate, modify and support.<br />
The underlying technology was<br />
validated for us by a NIST-certifying<br />
lab, Cygnacom. So it is not a<br />
large or long exercise to fit it into<br />
the majority of existing hardware<br />
platforms.<br />
GSN: What about cost?<br />
LH: We expect to make it<br />
quite inexpensive to the user customer<br />
- - imagine dividing your<br />
tablet into a Work tablet and a<br />
Play tablet, for just a few extra<br />
dollars.<br />
GSN: How do you plan to<br />
get it implemented?<br />
LH: We work with chip<br />
makers, OEMs and large customers<br />
who want it, like the government,<br />
or should want it. We can<br />
integrate it into existing devices<br />
in the field or new production<br />
devices. It’s just a simple way of<br />
eliminating a dilemma between<br />
using a device for business and<br />
personal use, or any other reason<br />
for separating data, like between<br />
classified and unclassified information.<br />
And when it is implemented<br />
there’s no downside to<br />
the user, there are just two real<br />
devices in one. Our view is, why<br />
not if you can?<br />
GSN: Has the marketplace<br />
had a chance to evaluate and respond?<br />
LH: We’ve both proven and<br />
demonstrated WorkPlay Technology’s<br />
validity, effectiveness<br />
and ease of use to our potential<br />
partner-customers. We have<br />
agencies, chip makers, OEMs and<br />
large cyber technology providers<br />
we are in various degrees of serious<br />
discussion with right now.<br />
Each of these has its own needs<br />
and wants, and our mission is to<br />
make it easy and satisfy them. It<br />
is important to make it as easy<br />
as possible for the end users, especially<br />
government and critical<br />
41<br />
enterprises, to seamlessly be able<br />
to benefit from WorkPlay Technology<br />
to, as I said, eliminate half<br />
the problem.<br />
GSN: Thanks, Lou. If the<br />
old saying is true that “All work<br />
and no play makes Jack a dull<br />
boy,” it looks like you may have<br />
found a solution for a lot of potential<br />
workaholics.<br />
Louis R. Hughes is the former<br />
President of Lockheed Martin and<br />
General Motors International Operations,<br />
a current member of the<br />
Board of Directors of several large<br />
multinational companies including<br />
Alcatel-Lucent and ABB, and<br />
served as State Department Chief<br />
of Staff for Afghanistan Reconstruction.<br />
Now, he also serves as<br />
Chairman of a local R&D firm,<br />
InZero Systems, specializing in<br />
embedded computer security<br />
technology. InZero has developed<br />
“WorkPlay Technology” for mobile<br />
devices and laptop/desktops.<br />
Contact: InZero Systems ,13755<br />
Sunrise Valley Drive, Suite 750,<br />
Herndon, VA 20171, Email:<br />
info@workplaytablet.com, Phone:<br />
703-636-2048, www.workplaytablet.com/.
International training essential to<br />
global stability and security<br />
Continued from page 26<br />
close striking distance. And if<br />
viable threats do exist, nations<br />
with autonomous capability can<br />
contain them without U.S. assistance<br />
in most cases. Finally,<br />
in the extreme cases where a local<br />
or regional threat is not easily<br />
contained with indigenous forces,<br />
threatened partner nations<br />
can function inter-operably with<br />
U.S. and/or other friendly foreign<br />
forces to most effectively neutralize<br />
menaces to stability.<br />
We are currently seeing a<br />
shift to more U.S. defense contractors<br />
performing and/or providing<br />
support to security assistance<br />
missions utilizing an<br />
extremely capable cohort of<br />
largely former military personnel.<br />
This U.S. veteran workforce<br />
combined with highly motivated<br />
private sector individuals is ensuring<br />
critical missions continue<br />
to successfully train and better<br />
prepare foreign military partners<br />
for self-defense and/or coalition<br />
participation.<br />
The U.S. will always play an<br />
important role in international<br />
stability and the future will rely<br />
more and more on the strength<br />
and capability of our partners.<br />
Increasing the capability of our<br />
partners through security assistance<br />
training is the most effective<br />
solution to mitigate the U.S. military<br />
drawdown<br />
while preserving<br />
regional and<br />
global security.<br />
We simply can’t<br />
afford not to!<br />
Scott Seavers, former USAF Colonel<br />
and Air Force <strong>Security</strong> Assistance<br />
Training Commander, is a<br />
Vice President at Salient Federal<br />
Solutions in Fairfax, Virginia.<br />
U.S./Canada sign preclearance<br />
agreement<br />
Continued from page 5<br />
by which CBP Officers stationed<br />
abroad screen and make admissibility<br />
decisions about passengers<br />
and their accompanying goods<br />
or baggage heading to the United<br />
States before they leave a foreign<br />
port. CBP officers do, however,<br />
42<br />
retain the authority to inspect<br />
passengers and their accompanying<br />
goods or baggage after<br />
arriving in the United States.<br />
CBP officers currently conduct<br />
preclearance operations at eight<br />
Canadian airports: Calgary, Edmonton,<br />
Halifax, Montreal, Ottawa,<br />
Toronto, Vancouver and<br />
Winnipeg.<br />
This agreement achieves a<br />
key component of the Beyond<br />
the Border: A Shared Vision for<br />
Perimeter <strong>Security</strong> and Economic<br />
Competitiveness Action<br />
Plan. On February 4, 2011, President<br />
Obama and Prime Minister<br />
Harper released the Beyond the<br />
Border Declaration, articulating a<br />
shared vision in which our countries<br />
work together to address<br />
threats at the earliest point possible<br />
while facilitating the legitimate<br />
movement of people, goods<br />
and services across our shared<br />
border. The Action Plan outlines<br />
the specific steps our countries<br />
intend to take to achieve the security<br />
and economic competitiveness<br />
goals outlined in the Beyond<br />
the Border Declaration.<br />
For more information, visit<br />
www.dhs.gov.
2015 Airport/Seaport/Border <strong>Security</strong> Awards<br />
Now Accepting Entries!<br />
<strong>Government</strong> <strong>Security</strong> <strong>News</strong> would like to take this opportunity to invite all Technology<br />
Vendors, Airport, Seaport and Border <strong>Security</strong> Officers, Executives and <strong>Security</strong> Teams<br />
to visit the GSN 2015 Awards website at www.asbsecurityawards.com, review the<br />
37 updated entry categories, and if you find one or more of them that fits your company<br />
or agency, go for the gold!<br />
And we mean that literally, because all winners will<br />
receive a handsome, gold-trimmed plaque that you<br />
can post in your office or other prominent position,<br />
and all Winners and Finalists will be invited to post<br />
their winning entries and additional information in our 2015 Yearbook of Airport,<br />
Seaport, Border <strong>Security</strong> Awards Recipients.<br />
It’s great publicity and exposure in <strong>Government</strong> <strong>Security</strong> <strong>News</strong>, which is sure to be further<br />
enhanced by Google and the other Search engines and Social Media. Check out<br />
the many new categories in the 2015 entry categories and be sure to see the kind of<br />
distinguished company you’ll be in as a Winner or Finalist by looking through our 2014<br />
Yearbook of Airport, Seaport, Border <strong>Security</strong> Awards at:<br />
http://www.gsnmagazine.com/2014ASB<strong>Security</strong>Yearbook.<br />
43
Coming Attractions<br />
March – May 2015<br />
March Print Edition<br />
Technology Focus:<br />
Market Focus:<br />
Cybersecurity/Closing the Gap<br />
Maritime/Port <strong>Security</strong><br />
April Digital Edition<br />
Technology Focus:<br />
Market Focus:<br />
Video Surveillance/Analytics<br />
Video Management Software<br />
Border <strong>Security</strong>/Immigration<br />
May Print Edition<br />
Technology Focus:<br />
Market Focus:<br />
Satellite Communications<br />
Oil/Gas/Electric/Nuclear Monitoring<br />
For GSN Media Kit<br />
or Advertising Rates<br />
Contact Publisher<br />
Mike Madsen at<br />
732-233-8119<br />
or by email at<br />
mmadsen@gsnmagazine.com<br />
44
The <strong>News</strong> Leader in Physical, IT and Homeland <strong>Security</strong><br />
Publisher:<br />
Michael Madsen<br />
(O) 212-344-0759, X1<br />
(C) 732-233-8119<br />
mmadsen@gsnmagazine.com<br />
Executive Editor:<br />
John Wagley<br />
(O) 212-344-0759, X2<br />
(C) 202-425-0196<br />
wagley.jr@gmail.com<br />
Senior Writer:<br />
Lorrie Barclay<br />
(O) 212-344-0759, X5<br />
(C) 508-685-0652<br />
lorriebarclay@gmail.com<br />
Columnist:<br />
John Convy<br />
Convy on Netcentric <strong>Security</strong><br />
john@convyassociates.com<br />
Columnist:<br />
John Romanowich<br />
Romanowich on Video Surveillance<br />
jromanowich@sightloxic.com<br />
Guest Expert Contributor:<br />
Denise Rucker Krepp<br />
(C) 202-546-2533<br />
kdrkrepp@hotmail.com<br />
Art Director:<br />
Gerry O’Hara<br />
OHDesign3<br />
(C) 203-249-0626<br />
gerry@ohd3.com<br />
Production/Design Specialist:<br />
Brenden Hitt<br />
(C) 315-723-6203<br />
brenden@ihitt.com<br />
Editorial Director/CEO:<br />
Adrian Courtenay<br />
(O) 212-344-0759, X3<br />
(C) 917-696-5782<br />
acourtenay@gsnmagazine.com<br />
Mailing Address:<br />
<strong>Government</strong> <strong>Security</strong> <strong>News</strong><br />
P.O. Box 7608<br />
Greenwich, CT 06836<br />
<strong>Government</strong> <strong>Security</strong> <strong>News</strong> (ISSN 1548-940X and UPS 022-845) is published in six print editions (Jan, Mar, May, Jul, Sep, Nov) and<br />
six digital editions (Feb, Apr, Jun, Aug, Oct, Dec) per year by World Business Media, LLC, P.O. Box 7608, Greenwich, CT 06836.<br />
Telephone (212) 344-0759. Periodicals postage paid at New York, NY and additional mailing offices. POSTMASTER: Send address<br />
changes to GSN: <strong>Government</strong> <strong>Security</strong> <strong>News</strong>, Subscription Department, P.O. Box 316, Congers, NY 10920-0316. For <strong>Government</strong><br />
decision makers and business executives involved with security products, systems and series. Qualified U.S. subscribers received<br />
GSN: <strong>Government</strong> <strong>Security</strong> <strong>News</strong> at no charge. Non-qualified subscribers in the U.S. are charged $75.00 per year. Canadian and<br />
foreign subscribers are charged $140 International Airmail. Copyright 2015 by GSN: <strong>Government</strong> <strong>Security</strong> <strong>News</strong>. All rights reserved.<br />
Printed in the U.S.A. GSN: <strong>Government</strong> <strong>Security</strong> <strong>News</strong> assumes resonsibility for validity of claims in items reported.<br />
45
Secure access<br />
to cloud, data<br />
and door<br />
Go beyond simple passwords. Protect your<br />
organisation with cost-effective, risk appropriate<br />
Identity Assurance Solutions from HID Global.<br />
With the ever increasing risk from advanced IT security threats, organisations are looking to take authentication<br />
beyond passwords, while lowering cost at the same time. HID Global’s authentication solution provides you<br />
with the convenience, flexibility and comprehensive control you need to deliver secure access, without<br />
compromising on security. HID Global can empower your employee’s, partners and customers with anytime,<br />
anywhere access to enterprise cloud applications, data and the door.<br />
Experience authentication beyond passwords. hidglobal.com<br />
© 2015 HID Global Corporation/ASSA ABLOY AB. All rights reserved. HID, HID Global, the HID Blue Brick logo, and the Chain Design are trademarks or registered trademarks of HID Global or its<br />
licensor(s)/supplier(s) in the US and other countries and may not be used without permission.