25.06.2015 Views

Government Security News

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

<strong>Government</strong> <strong>Security</strong> <strong>News</strong><br />

JUNE/JULY 2015 Digital Edition<br />

“The Texas floods are so big they ended the state’s draught. The devastation is heart-wrenching.<br />

After the rain, I-45, one of the biggest freeways for the 4th largest city in the country, looked<br />

like the Mississippi River, with only boats used to transport people.” – Note to GSN from<br />

Dr. George Lane, CEO, Emergency Response Technology. More on Page 14<br />

Also in this issue:<br />

Positions of five Presidential candidates described on topic of immigration – Page 26<br />

OPM to provide employees with credit monitoring and ID theft insurance – Page 4<br />

DHS Science & Technology Awards go to 32 inventors at S&T, TSA, USCG – Page 33


GSN TECHNOLOGY SPOTLIGHT<br />

gSN June/July Digital Edition<br />

table of Contents<br />

Rodney Caudle, Director of Information <strong>Security</strong> at NIC Inc, describes<br />

a new phenomenon in denial of service, Distributed Denial<br />

of Service (DDOS), which constitute more serious attacks because<br />

they originate from multiple sources executing synchronized attacks<br />

against a single target. Caudle explains how to prepare for these attacks.<br />

See Page 24<br />

Robert Laughlin, President of Galaxy Control Systems, confirms<br />

that advancements and innovations in software, integration and network<br />

infrastructure are extending access control far beyond simply<br />

managing entry and egress. Municipalities in particular are employing<br />

the advance access control solutions across wide area networks. See<br />

Page 40 for half a dozen potential applications.<br />

NEWS AND FEATURES<br />

OPM to provide affected employees with<br />

credit monitoring and ID theft insurance Page 4<br />

(ISC)2 announces <strong>Government</strong> Information<br />

<strong>Security</strong> Leadership winners Page 6<br />

GTL’s Phone IQ combats inmate fraud and<br />

criminal activity by phone type Page 10<br />

exactEarth, Harris Corp provide real-time<br />

global maritime tracking Page 12<br />

Texas disaster illustrates climate change<br />

as security threat – by George Lane Page 14<br />

Secure Identity Biometrics Assn names<br />

Troy Potter of L-3 as chairman Page 18<br />

Denise Krepp Op-Ed: Speaker Hastert<br />

a study in failed leadership Page 20<br />

Senator Ron Johnson, fiscal conservative<br />

from Wisconsin fi elds annoying question Page 23<br />

NIC expert Rodney Caudle explains new,<br />

insidious DDOC attacks on government Page 24<br />

Border <strong>Security</strong> Expo celebrates 10th<br />

year with move to San Antonio Page 32<br />

CBRNE/Detection<br />

____________________________________<br />

DHS Science & Technology Patent awards<br />

salute 32 inventors at S&T, TSA, USCG Page 33<br />

Implant Sciences Q-B200 European footprint<br />

deepens with sale to 17 French airports Page 36<br />

Romanowich on Surveillance: Protecting<br />

key areas of critical assets Page 38<br />

State/County/Municipal <strong>Security</strong><br />

____________________________________<br />

Advanced access control opens new doors<br />

for municipalities, by Robert Laughlin Page 40<br />

Ohio Commission provides $17-million to<br />

bolster school security Page 42<br />

“Learning Through Crisis” program provides<br />

disaster response skills to local offi cials Page 44<br />

DoD awards grants to study how radiation<br />

Affects computer memory Page 45<br />

2 3


B.I.G. A-95_GovSec<strong>News</strong> May 2015.qxp 4/20/15 12:09 PM Page 1<br />

OPM to provide employees impacted by data<br />

breach with credit monitoring and Identity<br />

theft insurance<br />

By Steve Bittenbender<br />

The personal identifiable information<br />

on up to 4 million current<br />

and former public sector workers<br />

may have been compromised in<br />

an attack on federal it systems,<br />

according to the agency responsible<br />

for human resources services<br />

to U.S. government agencies.<br />

The U.S. office of Personnel<br />

Management acknowledged<br />

the intrusion late Thursday by<br />

issuing a statement on its Web<br />

site (www.opm.gov). The agency<br />

said it discovered the breach a<br />

couple of months ago as a part of<br />

its efforts to upgrade its cybersecurity<br />

protocols. Upon realizing<br />

the breach, oPM contacted<br />

the Department of Homeland<br />

<strong>Security</strong>’s Computer Emergency<br />

Readiness team and the<br />

Federal Bureau of investigations<br />

to begin an investigation.<br />

“The FBi is working with<br />

our interagency partners to investigate<br />

this matter,” the FBi<br />

said in a statement. “We take all<br />

potential threats to public and<br />

private sector systems seriously<br />

and will continue to investigate<br />

and hold accountable those who<br />

pose a threat in cyberspace.”<br />

Both Bloomberg and the<br />

Washington Post reported that<br />

iSight Partners, a private security<br />

firm, linked the attack to the<br />

same group responsible for the<br />

anthem health insurance attack<br />

4<br />

earlier this year. The records of<br />

up to 80 million members were<br />

compromised in that attack.<br />

investigators believe the<br />

anthem attack was carried out by<br />

hackers sponsored by the Chinese<br />

government. However, a Chinese<br />

official said it is difficult to<br />

trace international cyberattacks.<br />

“Jumping to conclusions<br />

and making hypothetical<br />

accusation(s) is not responsible<br />

and counterproductive,” said<br />

Zhu Haiquan, a spokesman for<br />

China’s Washington embassy.<br />

Federal officials vowed to<br />

take steps to improve the country’s<br />

it infrastructure. in a series<br />

of tweets from his account,<br />

California Rep. adam Schiff, the<br />

ranking Democrat on the House<br />

intelligence Committee, called<br />

the breach shocking because people<br />

expect government systems<br />

to be protected from such threats.<br />

“it’s clear a substantial improvement<br />

in our cyber databases<br />

& defenses is perilously<br />

overdue,” said Schiff, who noted<br />

the House passed a bill allowing<br />

for that last year and encouraged<br />

the Senate to follow suit.<br />

The oPM hack is the latest<br />

in a series of high profile attacks<br />

on public-sector and corporate<br />

systems. Besides anthem, hackers,<br />

believed to be connected<br />

with North Korea, accessed<br />

Sony Entertainment systems in<br />

December, publishing employee<br />

information and unreleased<br />

More on page 11<br />

To Secure a Perimeter...<br />

choose the right Guard Houses<br />

We Didn’t Want Standard Shelters, We Wanted B.I.G.<br />

Custom shelters and booths built for challenging locations…“When<br />

I visited the B.I.G. facility, I saw that it was a very well run and lean<br />

ship. Quality workmanship was obvious from the moment I walked<br />

in. Everybody worked as a team to secure this nuclear power facility.<br />

We’re very pleased with B.I.G.’s performance—they made a<br />

big difference.”<br />

— Mission Critical <strong>Security</strong> Specialist<br />

If you don’t protect your guards,<br />

they can’t protect your operations.<br />

A B.I.G. guardhouse is different from all<br />

others because we have invested<br />

over 40 years in studying and<br />

understanding what goes on<br />

inside—and outside—of a<br />

superior guard station. This expertise<br />

comes to you in the form of a full line of<br />

B.I.G. Enterprises guardhouses—the<br />

cornerstones of your “hardened”<br />

perimeter. With B.I.G. your guardhouse<br />

doesn’t have to appear hard and<br />

unattractive—it can be your steel fist<br />

inside of a velvet glove.<br />

When extreme threats are a real issue, call in the security heavyweights<br />

—because a perimeter without B.I.G. is like a holster without a gun.


(ISC)² announces U.S. <strong>Government</strong> Information <strong>Security</strong><br />

Leadership Award winners<br />

(ISC)2 has recognized leaders in advancing<br />

the government’s cyber security<br />

mission with its annual U.S.<br />

<strong>Government</strong> Information <strong>Security</strong><br />

Leadership Awards (GISLA).<br />

At the May 14 event, the<br />

nonprofit organization of certified<br />

information and software security<br />

professionals announced individual<br />

and team winners in seven<br />

categories during a gathering of<br />

government information security<br />

executives at the GISLA Gala in<br />

Washington, D.C.<br />

These top leaders are<br />

working to mature the government’s<br />

cyber world, encourage<br />

others in professionalism and<br />

training, streamline operations<br />

and share ways to fight emerging<br />

threats. The honorees represent<br />

the best in the industry,<br />

across all levels within the U.S.<br />

government community, according<br />

to Dan Waddell, CISSP,<br />

CAP, PMP, (ISC)² director of<br />

U.S. <strong>Government</strong> Affairs.<br />

“Competition is tough every<br />

year, but this year seemed<br />

especially challenging,” Waddell<br />

said. “The finalists’ scores were<br />

often separated by a very thin<br />

margin, which really speaks to<br />

their commitment to excellence and<br />

dedication to advancing the security<br />

posture of government.”<br />

The (ISC)²’s 2015 Global Information<br />

<strong>Security</strong> Workforce<br />

Study shows the gap between the<br />

need of qualified information security<br />

professionals and the supply is<br />

negatively impacting government<br />

security readiness and existing<br />

workers’ morale. “This year’s GISLA<br />

recipients are those who have persisted—and<br />

prevailed—in the midst<br />

of significant obstacles in the areas<br />

On Right: Award Presented by: Peter Gouldmann, CISSP,<br />

Director of Information Risk Programs, Office of Information<br />

Assurance, U.S. Department of State, Co-Chair,<br />

(ISC)² U.S. <strong>Government</strong> Advisory Council<br />

Winner in Middle: John Simms, CISSP, ITIL 3.0, MCSE,<br />

PMP, requirements and acquisition support branch chief<br />

and Continuous Diagnostics and Mitigation (CDM)<br />

program manager, Department of Homeland <strong>Security</strong><br />

(DHS), Office of Cybersecurity and Communications<br />

On Left: David Shearer, CISSP, PMP, (ISC)² Executive<br />

Director<br />

6<br />

istration and others. “It really took<br />

a monumental effort to plan, coordinate,<br />

and orchestrate activities<br />

necessary to get to where we are today<br />

and to see that we, indeed, are<br />

achieving financial cost savings,”<br />

said Simms, who has worked in information<br />

technology for 25 years<br />

and in information security for 15<br />

years.<br />

His innovative approach to<br />

rapidly deploy nearly $60M of CDM<br />

tools to 21 agencies was a productonly<br />

delivery order focused on agencies<br />

that could immediately benefit<br />

from additional tools. While saving<br />

taxpayer dollars and protecting<br />

federal networks, he also ensured<br />

that the agencies acquired critical<br />

capabilities to meet emerging, government-wide<br />

cyber threats. “We’ve<br />

received substantial savings, most in<br />

the form of savings on product delivery<br />

orders.”<br />

Going forward, Simms anticipated<br />

the tools now in place will be<br />

used for continuous monitoring and<br />

will be leveraged as the preferred<br />

approach for federal civilian government.<br />

Within each group, tasks<br />

and processes required to solicit solutions<br />

have been streamlined for<br />

each agency. The impact, he said, is<br />

expected to continue, with followup<br />

orders also including a high percentage<br />

of product discounts based<br />

of funding, policy and rapidly growing<br />

threats,” Waddell said.<br />

For instance, in the category<br />

of Technology Improvement, winner<br />

John Simms, CISSP, ITIL 3.0,<br />

MCSE, PMP, of the Department of<br />

Homeland <strong>Security</strong>, was honored<br />

for rapidly deploying tools to 21<br />

agencies, saving about $26 million<br />

through cost discounts on a $60<br />

million purchase.<br />

“Obviously, I was very humbled<br />

by the award,” said Simms.<br />

“Being award the GISLA individual<br />

award for technology improvement<br />

under the (ISC)² program<br />

is a huge honor.”<br />

Deep experience in the<br />

field and the collaboration of<br />

more than 60 agency and departmental<br />

partners allowed<br />

Simms, the requirements and<br />

acquisition support branch<br />

chief and Continuous Diagnostics<br />

and Mitigation (CDM)<br />

program manager in the Department<br />

of Homeland <strong>Security</strong>’s<br />

Office of Cybersecurity and<br />

Communications, to save money<br />

by avoiding significant costs.<br />

To do so involved a threeyear<br />

collaboration with the<br />

upon IT schedule 70 list prices.<br />

security and course development is<br />

odology enhancements to any gov-<br />

<strong>Government</strong> Services Admin- More on page 8<br />

Other 2015 GISLA recipients are:<br />

Community Awareness: 81<br />

Cyber Protection Team (CPT)<br />

As the U.S. Marine’s first National<br />

Cyber Protection Team, 81<br />

Cyber Protection Team quickly<br />

became the most sophisticated incident<br />

response element in the Department<br />

of Defense (DoD). 81<br />

CPT created innovative approaches<br />

to building an advanced defensive<br />

cyberspace capability in training,<br />

technology employment, methodologies<br />

and mission planning.<br />

Using both proprietary and commercial<br />

technology, the team built<br />

one of the most modern and effective<br />

defensive cyber programs for<br />

the DoD, including a CPT toolkit<br />

that has become the standard for all<br />

CPTs in the department<br />

81 CPT produced experts<br />

capable of conducting incident response,<br />

vulnerability analysis and<br />

mitigation, and procedure/meth-<br />

ernment organization. As a result,<br />

7<br />

81 CPT has shaped the way that the<br />

U.S. Cyber Command implements<br />

CPTs and has set the standard for<br />

other DoD teams.<br />

Workforce Improvement: Michael<br />

C. Redman, CISSP, CISM, CCNA,<br />

CompTIA Network+, CompTIA<br />

<strong>Security</strong>+, CompTIA A+, Comp-<br />

TIA Linux+, MCP, MCSA, senior<br />

information assurance manager<br />

and chief, Policy and Accreditation<br />

Branch<br />

Redman identified a training<br />

gap for DoD cybersecurity professionals<br />

and delivered in-house<br />

training courses to more than 300<br />

personnel using training materials<br />

that he created. With the knowledge<br />

transfer to students at their level of<br />

learning, 93 percent achieved a pass<br />

rate on certifications such as CISSP,<br />

CISM, <strong>Security</strong>+ and Linux+. His<br />

holistic approach to information


Information <strong>Security</strong> Leadership<br />

Award winners<br />

Continued from page 7<br />

bridging the gap between standard<br />

course material and the daily reality<br />

of civil servants and DoD personnel.<br />

On Right: Award Presented by: Charles<br />

“Chuck” McGann, CISSP, CISM, IAM, Chief<br />

Cyber Strategist, CRGT, Manager of Corporate<br />

Information <strong>Security</strong>, U.S. Postal Service,<br />

Retired, (ISC)² U.S. <strong>Government</strong> Advisory<br />

Council Member<br />

Winner in Middle: Benjamin Bergersen, cloud<br />

cybersecurity program manager, MAX.gov<br />

Shared Services, U.S. Department of Education<br />

On Left: David Shearer, CISSP, PMP, (ISC)²<br />

Executive Director<br />

Process/Policy: Benjamin Bergersen,<br />

cloud cybersecurity program<br />

manager, MAX.gov Shared Services,<br />

U.S. Department of Education<br />

Bergersen utilized his expertise<br />

in the areas of governmentwide<br />

collaboration, building high<br />

performance teams, business process<br />

transformation, IT governance,<br />

strategy, enterprise architecture,<br />

information security and portfolio<br />

management to lead security transformation<br />

of cybersecurity business<br />

processes for MAX.gov Shared Services.<br />

His ability to coordinate dozens<br />

of staff, multiple major applications,<br />

hundreds of servers and over<br />

120,000 users employing the Federal<br />

Risk Authorization Management<br />

Program (FedRAMP) model<br />

resulted in MAX.gov becoming the<br />

first federal agency application and<br />

software-as-a-service agency to become<br />

FedRAMP authorized.<br />

Most Valuable Industry Partner:<br />

The CERT Coordinating Center,<br />

Vulnerability Research and Coordination<br />

team, Carnegie Mellon<br />

University Software Engineering<br />

Institute<br />

The team pioneered efforts in<br />

vulnerability research automation<br />

for existing and emerging computing<br />

domains that have significantly<br />

strengthened the larger US-CERT<br />

mission of improving information<br />

security and providing value to industry<br />

partners. The team deployed<br />

On Left: David Shearer, CISSP, PMP, (ISC)²<br />

Executive Director<br />

Winner on Right representing Team: The<br />

CERT Coordinating Center (CERT/CC)<br />

Vulnerability Research and Coordination<br />

team, Carnegie Mellon University Software<br />

Engineering Institute<br />

the Tapioca automated vulnerability<br />

discovery tool and applied it to the<br />

11,000 applications available on the<br />

Google Play Store. Within a period<br />

of several days, over 20,000 vulnerabilities—or<br />

15 percent of the total<br />

vulnerabilities identified in 2014—<br />

were discovered. These results are<br />

enabling this new community of<br />

developers and vendors of the platforms<br />

they use to adopt better security<br />

practices and increase the utility<br />

to the expanding universe of mobile<br />

devices.<br />

Up-and-Coming Information <strong>Security</strong><br />

Professional: Samuel A.<br />

Maroon, IT operations instructor,<br />

U.S. State Department<br />

Winner On Left: Samuel A. Maroon, IT operations<br />

instructor, U.S. State Department<br />

On Right: David Shearer, CISSP, PMP, (ISC)²<br />

Executive Director<br />

Maroon spends his spare time<br />

teaching and managing the Wounded<br />

Warrior Cyber Combat Academy,<br />

a program administered by<br />

the Federal IT <strong>Security</strong> Institute on<br />

behalf of the FITSI Foundation. Maroon<br />

has worked with more than 30<br />

injured veterans, volunteering 15-<br />

20 hours per week, to train veterans<br />

to help protect their country against<br />

cyber attacks. By engaging these<br />

male and female wounded warriors,<br />

he is tapping into a very talented<br />

and motivated resource pool to assist<br />

addressing the current shortage<br />

of skilled cybersecurity workers<br />

while helping to protect our national<br />

infrastructure.<br />

F. Lynn McNulty Tribute: W. Hord<br />

Tipton, CISSP, former executive<br />

director, (ISC)²<br />

Tipton was the first government<br />

CIO to obtain a Certified Information<br />

Systems <strong>Security</strong> Professional,<br />

helping to bring high-profile<br />

attention to the need for a more<br />

professionalized information security<br />

workforce. Throughout his<br />

career, Tipton drove support and<br />

advocated for federal government<br />

workforce initiatives such as the<br />

NICE Framework, DoD Directive<br />

8570 and reform of OPM’s 2210<br />

In Middle: Award presented by Corey Schou,<br />

Chairperson, Ph.D., CSSLP, Fellow of (ISC)²<br />

On Right: W. Hord Tipton, CISSP, former<br />

executive director, (ISC)2<br />

On Left: David Shearer, CISSP, PMP, (ISC)²<br />

Executive Director<br />

Job Series. He spearheaded<br />

major initiatives such as<br />

(ISC)²’s Global Academic<br />

Program and U.S.A Cyber<br />

Warrior Scholarships that<br />

are currently assisting the<br />

government in filling its cybersecurity<br />

workforce gap.<br />

Tipton has been instrumental<br />

in fostering the security<br />

education and certification<br />

of hundreds of thousands of<br />

individuals worldwide. He<br />

has dedicated his life to the<br />

advancement of the information<br />

security profession<br />

in the U.S. government and beyond,<br />

and is considered one of the most<br />

influential people in security.<br />

The U.S.A. Cyber Warrior<br />

Scholarship recipient was also announced<br />

during the GISLA ceremony.<br />

This scholarship program was<br />

developed by the (ISC)² Foundation<br />

in collaboration with Booz Allen<br />

Hamilton to help close the government’s<br />

cyber workforce gap by providing<br />

cyber security career training<br />

to qualified veterans who served<br />

in the U.S. military.<br />

Scholarship recipient Wajahat<br />

Qureshi ended his active duty in the<br />

Navy in 2007.He has served with<br />

Navy Reserve Command, and in<br />

2013 was named Sailor of the Year.<br />

His career goals include attaining<br />

his CISSP and earning a commission<br />

into the U.S. Navy Reserve as<br />

the information warfare designated<br />

officer.<br />

8 9<br />

On Left: David Shearer, CISSP, PMP, (ISC)² Executive<br />

Director<br />

On Right: Scholarship RECIPIENT: Wajahat Qureshi<br />

The winners were selected by<br />

a judging committee of senior information<br />

security experts from<br />

(ISC)2’s U.S. <strong>Government</strong> Advisory<br />

Council.<br />

For more information on the<br />

GISLA program, including selection<br />

criteria and eligibility requirements,<br />

visit www.isc2.org/gisla. For more<br />

information about the U.S.A. Cyber<br />

Warrior Scholarship, visit https://<br />

www.isc2cares.org.


GTL’s Phone IQ combats inmate fraud and<br />

criminal activity by determining phone type<br />

REStoN, Virginia – global<br />

tel*Link (gtL), the leading provider<br />

of correctional technology<br />

solutions, announces the release<br />

of Phone iQÔ, a new intelligence<br />

application available for its<br />

inmate telephone platforms that<br />

combats fraud and other criminal<br />

activity by detecting a called<br />

party’s phone line type.<br />

Phone iQ detects whether<br />

calls from a correctional facility<br />

are being placed to a traditional<br />

landline, a cellular phone, a<br />

disposable burner cell phone,<br />

or voice over internet protocol<br />

(VoiP) line. The gtL inmate<br />

telephone system user interface<br />

provides a visual indicator<br />

to alert users as to what is the<br />

called party’s phone type. Users<br />

are able to filter call detail reporting<br />

by the phone type detected<br />

and view the phone type<br />

indicator when monitoring calls<br />

in progress.<br />

Determining what type of<br />

phone an inmate is calling can<br />

be invaluable information to an<br />

investigator searching for fraudulent<br />

or other criminal activity,<br />

especially in facilities that limit<br />

the types of phones that inmates<br />

are allowed to call. investigators<br />

can quickly spot frequent changes<br />

of phone numbers, specifically<br />

prepaid burner phones, called<br />

by watched inmates or groups of<br />

inmates. isolating calls to burner<br />

phones can aide in researching<br />

calls with valuable content. it<br />

also increases the facility’s control<br />

in deciding if specific calls<br />

should be flagged and an alert<br />

sent.<br />

Phone iQ is one of many<br />

tools in the iQ family of intelligence<br />

products. together, these<br />

products form the most holistic<br />

approach to intelligence gathering<br />

in the correctional industry,<br />

offering investigators a broad<br />

range of options for gathering<br />

pertinent, actionable intelligence.<br />

For more information<br />

about this new fraud and criminal<br />

activity detection feature,<br />

contact a gtL representative<br />

today for a demonstration or<br />

visit www.gtl.net/phoneiqpr.<br />

About Global Tel*Link<br />

GTL is the leading provider of<br />

integrated correctional technology<br />

solutions, delivering financial<br />

value, security, and ease of operation<br />

to our customers through<br />

visionary products and solutions<br />

at the forefront of corrections<br />

innovation. As a trusted correctional<br />

industry leader, GTL<br />

provides service to approximately<br />

fifty percent of inmates nationwide,<br />

including service to 32 state<br />

departments of corrections, the<br />

District of Columbia, Puerto Rico,<br />

and 32 of the largest city/county<br />

facilities. GTL is headquartered<br />

in Reston, Virginia, with more<br />

than 10 regional offices across the<br />

country. To find out more about<br />

GTL, please visit our website<br />

www.gtl.net.<br />

OPM to provide employees<br />

impacted by data breach with<br />

credit monitoring and identity<br />

theft insurance<br />

Continued from page 4<br />

films. two months prior, the<br />

U.S. Postal Service announced<br />

employee addresses and Social<br />

<strong>Security</strong> numbers were exposed.<br />

around the same time, the State<br />

Department needed to suspend<br />

its unclassified email system af-<br />

THE NEW ENTRY<br />

for ACCESS CONTROL POINTS<br />

AMERISTARBOOTHS.COM | 855.526.6847<br />

ter breaches were discovered in<br />

State and White House systems.<br />

oPM was a target in an attack<br />

launched last year against<br />

a contractor, KeyPoint government<br />

Solutions, that is responsible<br />

for conducting background<br />

checks on employees and applicants<br />

applying for security<br />

clearances. But that breach exposed<br />

less than 50,000 people.<br />

oPM said it will notify<br />

current and former employees<br />

CITADEL ® Gatehouse<br />

10 11<br />

a<br />

whose information was compromised<br />

beginning on Monday.<br />

it will also offer those impacted<br />

with up to 18 months of credit<br />

monitoring and identity theft<br />

insurance. The agency also encouraged<br />

people to closely monitor<br />

their bank accounts for any<br />

suspicious activity and request a<br />

free copy of their credit report.<br />

GUARANTEED DELIVERY DATES<br />

Established production methods allows us to<br />

provide short and accurate lead-time and delivery,<br />

keeping your project on schedule.<br />

FULLY GALVANIZED FRAMEWORK<br />

Corrosion resistance in trapped areas where heating<br />

and cooling cycles create moisture producing rust<br />

on conventional unprotected framework.<br />

SINGLE SOURCE FOR PHYSICAL SECURITY<br />

Ameristar manufactures an array of perimeter security<br />

products. These products range from active vehicle<br />

barriers, gate systems (gates, operators and access<br />

controls), security fence and now guard booths.


exactEarth, Harris Corporation form strategic<br />

alliance to provide real-rime global maritime tracking<br />

and information solutions<br />

CaMBRiDgE, oN – June 8,<br />

2015– exactEarth Ltd., the leading<br />

provider of Satellite automatic<br />

identification System<br />

(aiS) data services and Harris<br />

Corporation (NYSE:HRS), a<br />

world leader in space, geospatial<br />

and remote sensing solutions,<br />

have formed an alliance to<br />

provide a new level of aiS data<br />

service that will deliver real-time<br />

global coverage for maritime<br />

vessel tracking. The new service<br />

will leverage the persistent global<br />

coverage and real-time connectivity<br />

of the iridium NEXt<br />

constellation through the implementation<br />

of 58 hosted payloads<br />

covering the Maritime VHF<br />

frequency band.<br />

Compatibility testing of the<br />

hosted payload with the iridium<br />

satellites has been completed and<br />

the first launch is scheduled for<br />

early 2016 with the completed<br />

constellation expected in 2017.<br />

The new service will provide<br />

customers with the fastest, most<br />

accurate vessel information<br />

available. With revisit times and<br />

latency under one minute, the<br />

service expansion represents a<br />

monumental leap forward in the<br />

ability for both Harris and exactEarth<br />

to offer truly unsurpassed<br />

global ship tracking and maritime<br />

information solutions.<br />

The alliance leverages exactEarth’s<br />

proven and patented signal<br />

de-collision detection technology<br />

and Harris’ expertise in satellite<br />

hosted payloads, advanced<br />

radio frequency technology<br />

and antenna solutions. Harris<br />

becomes the exclusive provider<br />

to the US government of aiS<br />

products and services produced<br />

under the alliance, including<br />

exactEarth’s exactaiS product<br />

portfolio, while exactEarth continues<br />

to serve all other global<br />

markets.<br />

“This alliance will expand our<br />

intelliEarth family of innovative<br />

solutions, which leverage<br />

Harris’ world-class remote<br />

sensing capabilities to help customers<br />

around the globe make<br />

smarter operational and business<br />

decisions,” said Bill gattle, Vice<br />

President and general Manager,<br />

National Programs, Harris<br />

government Communications<br />

Systems. “Harris is committed<br />

to exploring new technologies<br />

and partnering with worldleading<br />

organizations to provide<br />

our customers with the greatest<br />

value.”<br />

“as the recognized Satellite aiS<br />

industry leader, this announcement<br />

further strengthens our<br />

commitment to provide bestin-class<br />

maritime intelligence<br />

solutions to our customers<br />

worldwide,” said Peter Mabson,<br />

President of exactEarth. “We<br />

are thrilled to be able to offer the<br />

shortest revisit times and lowest<br />

latency for developing true<br />

maritime domain awareness.<br />

This partnership with Harris will<br />

allow us to significantly expand<br />

the range of advanced valueadded<br />

services and information<br />

solutions that we can bring to<br />

the global maritime market.”<br />

about exactEarth Ltd.<br />

exactEarth, based in Cambridge,<br />

ontario, is a data services company<br />

providing the most advanced<br />

information on global<br />

maritime traffic available today.<br />

our premium service, exactaiS®,<br />

delivers an unrivalled view of the<br />

recognized maritime picture at<br />

a global scale. offering fully secure<br />

data in a variety of industry<br />

standard formats and delivery<br />

methods, exactEarth provides<br />

advanced information services<br />

for a wide range of operational<br />

maritime applications delivering<br />

operational efficiencies, enhancing<br />

security, safeguarding the<br />

environment, and assisting in<br />

saving lives. For more information,<br />

visit our website at exactearth.com.<br />

About Harris Corporation<br />

Harris provides advanced,<br />

technology-based solutions that<br />

solve government and commercial<br />

customers’ mission critical<br />

challenges. The company has<br />

approximately $8 billion in annual<br />

revenue and about 23,000<br />

employees – including 9,000<br />

engineers and scientists – supporting<br />

customers in more than<br />

125 countries. Learn more at<br />

harris.com<br />

PHYSICAL SECURITY<br />

with COMPLETE PERIMETER CONTROL<br />

ANTI-CLIMB FENCE RETRACTABLE WEDGES ANTI-RAM FENCE SECURITY BOLLARDS<br />

Call our perimeter security specialist at 866-467-2773 and visit us online at ameristarsecurity.com<br />

12 13


Texas disaster illustrates climate change as a security threat,<br />

says Dr. George Lane, CEO, Emergency Response Technology<br />

Climate change is not only a matter<br />

of health, environmental concern<br />

and international obligation, President<br />

obama told the graduating<br />

class of the U.S. Coast guard academy.<br />

it is one of national security.<br />

The latest devastating weather<br />

in texas and surrounding states<br />

serves as an unfortunate example of<br />

this security threat, according to Dr.<br />

george Lane, CEo of Emergency<br />

Response technology, a two-time<br />

Winner in gSN’s airport, Seaport,<br />

Border <strong>Security</strong> awards.<br />

“The driving factor in all this<br />

(extreme weather) is the global<br />

warming and climate change. it’s<br />

basically weather driven by heat being<br />

absorbed into the ocean,” said<br />

Lane, explaining that the ocean acts<br />

as an engine. “That engine’s increasing<br />

energy, so whatever weather<br />

takes place, it is going to have more<br />

energy.”<br />

This ramped-up engine brings<br />

weather, such as the extreme weather<br />

that made the water level rise<br />

30 feet—roughly three stories—in<br />

10 minutes in a small town outside<br />

Houston. “You can’t respond<br />

to that,” Lane said. “Nor could they<br />

(first responders). No way. Nothing<br />

could have been done in that particular<br />

case.”<br />

<strong>News</strong> reports described fatal<br />

walls of water that knocked houses<br />

off their foundations and submerged<br />

vehicles, then hampered<br />

rescue workers in attempts to save<br />

people and to locate remains.<br />

“They’ve (first responders) got<br />

to get a lot more boats; there’s going<br />

to be a lot more water rescue, there’s<br />

no doubt about that,” Lane said, “We<br />

need to have a better response for<br />

evacuations. They’re going to get a<br />

lot more flooding.”<br />

going forward, Lane prescribed<br />

changes both in construction<br />

methods and public perception.<br />

Weather-resistant houses will<br />

need to be on legs, with garages on<br />

the first floor and living areas on the<br />

second floor. “That’s the only construction<br />

way to prepare,” he said.<br />

The nation also needs to<br />

make more use of—and take better<br />

heed of—technologically advanced<br />

weather forecasts that can do more<br />

than remind people to carry umbrellas.<br />

“The meteorologists have<br />

supercomputers, and people don’t<br />

really believe them. They can pull up<br />

three days in advance when a rainstorm<br />

would be within 20 miles,”<br />

Lane said. “Data collected is being<br />

massively underutilized.”<br />

But Lane also pointed out<br />

that the meteorologists’ knowledge<br />

comes with a certain responsibility—not<br />

only to safeguard people<br />

and property but to protect the<br />

weather industry’s reputation. Forecasters<br />

must be critically aware of<br />

the damage to credibility in reporting<br />

a false positive—or negative—<br />

event, he said. “We’ve got to be very<br />

conservative. if you’re not right,<br />

then no one will take you seriously.”<br />

in the aftermath of the flooding,<br />

southern texas will find itself<br />

in much the same dilemma as<br />

Boston did this spring. Fighting<br />

back against a record snowfall that<br />

topped 108 inches, Boston had to<br />

invent new ways to pile its snow<br />

while digging out; photos of at least<br />

one persistent snow pile made news<br />

in May. Parts of texas will have a<br />

similar issue with flood water, Lane<br />

predicted. “There’s so much of it, it<br />

will probably be the end of July till<br />

they get back to normal,” he said.<br />

This standing water will become<br />

stagnant water mixed with<br />

raw sewage runoff in a wider-thanexpected<br />

area across the warm<br />

South—compounding the situation.<br />

“That’s called a breeding ground for<br />

mosquitos,” Lane said. “There might<br />

be epidemics of various diseases carried<br />

by mosquitos because there are<br />

going to be millions of them all over<br />

the South. …Emergency responders<br />

know this; the entire state now<br />

has to be sprayed. There’s just not<br />

enough material available to use—<br />

which might be like running out of<br />

salt for deicing the Northeast.”<br />

Weather extremes could make<br />

these kinds of scenarios—and their<br />

problematic recovery—more prevalent<br />

nationwide. Lest those living<br />

outside the southern shoreline or<br />

the storm-studded Midwest consider<br />

themselves immune from the ravages<br />

of climate change,<br />

Lane shared tales of lake<br />

effect snow hitting him<br />

from three different directions<br />

on the upper<br />

Michigan peninsula.<br />

“Don’t think ‘They’ve got<br />

it made because they’re<br />

inland.’”<br />

Lane recalled how,<br />

only two years ago, Hurricane<br />

Sandy battered<br />

the East Coast, and again emphasized<br />

the power of a vast, overheated<br />

ocean. “The takeaway is this is<br />

what we’re seeing when you get heat<br />

caused by global warming absorbed.<br />

… The temperature in the oceans is<br />

the driving factor in weather, period,<br />

the driving factor in a hurricane.<br />

The more energy you have, the more<br />

extreme the swings in weather.”<br />

Looking ahead, Lane provided<br />

several scenarios illustrating<br />

how weather extremes could impact<br />

personal safety, safety of cities and<br />

ports, even the economy—echoing<br />

the warning obama shared with<br />

the graduating guardsmen. The<br />

president predicted impacts on the<br />

economy, as rising oceans threaten<br />

thousands of miles of highways, railways,<br />

energy facilities and military<br />

installations; greater risks of natural<br />

disaster that increase refugee migrations<br />

and heighten conflicts over<br />

food and water; aggravation of poverty<br />

and political instability that can<br />

lead to terrorists and other violent<br />

actions.<br />

Leaders around the<br />

world agree that climate<br />

change is a security concern.<br />

Secretary of State<br />

John Kerry reported<br />

that climate change and<br />

security was a prime<br />

discussion among leaders<br />

on his recent trip to<br />

George Lane asia. France’s influential<br />

Environment Minister<br />

Segolene Royal, in advance of<br />

a meeting about reducing global<br />

emissions, told the associated Press,<br />

“The climate question is also at the<br />

heart of the security question.”<br />

14 15


DarkFighter Network Camera<br />

Conventional Camera<br />

LightFighter Network Camera<br />

Conventional Camera<br />

DarkFighter and LightFighter cameras provide<br />

superior quality images and high performance.<br />

Both cameras offer full 1080p HD to capture<br />

even the most minute details.<br />

Smart Features:<br />

• 3D digital Noise Reduction (DNR)<br />

• Defogging Technology<br />

• Electronic Image Stabilization (EIS)<br />

Introducing<br />

DarkFighter&LightFighter<br />

Network Cameras<br />

Hikvision USA Inc. • Tel: +1-909-895-0400 • Email: sales.usa@hikvision.com • www.hikvision.com


Secure Identity & Biometrics Association (SIBA) names<br />

Troy Potter of L-3 National <strong>Security</strong> Solutions as chairman<br />

WaSHiNgtoN, June 8, 2015 /<br />

PR<strong>News</strong>wire/ -- The Secure identity<br />

& Biometrics association<br />

(SiBa), announced today their<br />

selection of troy Potter of L-3<br />

National <strong>Security</strong> Solutions (NSS)<br />

as Chairman, effective immediately.<br />

SiBa is a non-profit association<br />

that was established in February<br />

2014 to steadfastly promote responsible<br />

policy, education and implementation<br />

of solutions that protect<br />

and secure identity across private<br />

and public platforms.<br />

Potter was chosen because of<br />

his vast experience in both the government<br />

and industry. He served as<br />

the identity Services Branch (iSB)<br />

Deputy assistant Director at the<br />

U.S. Visitor and immigrant Status<br />

indicator technology (US-ViSit)<br />

program and was US-ViSit’s Biometrics<br />

Systems Program Manager<br />

for a number of years, responsible<br />

for the management and oversight<br />

of one of the largest biometrics<br />

systems in the world. today Potter<br />

is the vice president of L-3 NSS’<br />

global Solutions Sector and leads<br />

all L-3 NSS Border <strong>Security</strong> and<br />

Biometrics programs.<br />

“i am very pleased to chair<br />

SiBa, which has rapidly established<br />

itself as the leading resource to proactively<br />

create awareness<br />

and promote<br />

the value of identity<br />

technologies and biometric<br />

solutions to<br />

enhance the security<br />

of individuals as well<br />

as organizations and<br />

the government,”<br />

said Potter. “i look<br />

forward to working<br />

with SiBa CEo Janice<br />

Kephart and the board<br />

to continue the significant progress<br />

the association has made,” he<br />

added.<br />

Potter takes over as Chairman<br />

from former animetrics<br />

CEo Paul Schuepp who served<br />

with outstanding leadership in the<br />

formative stages of SiBa. Schuepp<br />

said, “i believe strongly in the SiBa<br />

mission, and am very proud of how<br />

far SiBa has come in a short while.<br />

With persistence, strategic vision<br />

and credibility, SiBa is already<br />

well-respected by government, the<br />

private sector, and the media. i am<br />

so pleased with how serious our<br />

work is valued.”<br />

Recently CEo Kephart was<br />

asked to testify before the Senate<br />

Homeland <strong>Security</strong> Committee<br />

on a key biometric border issue.<br />

in addition, SiBa is galvanizing<br />

industry-leading<br />

companies and<br />

trade associations<br />

to come together to<br />

address core federal<br />

government biometric<br />

challenges.<br />

The SiBa<br />

board continues<br />

to attract proven<br />

expertise in identity<br />

management and biometric<br />

solutions, high<br />

technology government relations<br />

and commercialization, and the<br />

defense, intelligence and homeland<br />

security communities both domestically<br />

and overseas.<br />

“When we began on this<br />

journey to create an organization<br />

that was as cutting-edge and gamechanging<br />

as the identity solutions<br />

SiBa sought to represent, we never<br />

imagined the exceptional growth<br />

and quality of membership we<br />

would have,” said Kephart. “i look<br />

forward to working with Mr. Potter,<br />

our Board and our growing membership<br />

to expand our presence in<br />

the identity market,” she added.<br />

in addition to Chairman troy<br />

Potter, SiBa board members are:<br />

• Jim Annulis, President and CEO,<br />

ProQual-i.t., inc.<br />

• Ernest Baynard, President, Merid-<br />

Troy Potter<br />

ian Hill Strategies inc.<br />

• Michael Dougherty, Director of<br />

Law Enforcement Solutions, Raytheon<br />

• Michael Petrov, Managing Director<br />

North america, Vision-Box<br />

• Lester Quintana, Senior Vice<br />

President, Cellucci associates<br />

• Catherine Renner-Amachree, DC<br />

Head of operations and Business<br />

Development, abanacle Corp.<br />

• Paul Schuepp, former President<br />

and CEo, animetrics<br />

“With the increasing threats of<br />

transnational organized crime and<br />

CPL12X<br />

global terrorism, effective public<br />

– private sector collaboration is<br />

essential to strengthen our border<br />

security and public safety,” said Celeste<br />

Thomasson, CEo and President<br />

of Morphotrak. Morphotrak<br />

is one of the newest members of<br />

SiBa. “We look forward to engaging<br />

in this collaboration with SiBa<br />

via its air Entry and Exit Working<br />

group and other activities. We<br />

continuously strive to strengthen<br />

our biometric and identity management<br />

solutions to address the everevolving<br />

challenges of homeland<br />

security,” Thomasson added.<br />

CPL1<br />

CPWP1<br />

© 2015, CAST Lighting LLC., 1120-A Goffle Rd., Hawthorne, NJ 07506 • Patents Pending<br />

About SIBA<br />

SiBa is a group of vendors and<br />

other stakeholders with a common<br />

interest in proactive thought<br />

leadership, communications and<br />

government relations regarding the<br />

value of solutions that effectively<br />

protect and secure individuals from<br />

identity threats as well as protect<br />

and secure facilities, organizations<br />

and governments.<br />

http://www.sibassoc.org<br />

• Safe 24-Volt System<br />

• Quality Cree® LED’s<br />

• 60,500 Hr. Life (L70)<br />

• Dust & Moisture Resistant<br />

• Surge & Spike Protected<br />

• 4 Available Intensity Settings<br />

For more information, CALL<br />

973•423•2303 or info@cast-lighting.com<br />

www.cast-lighting.com<br />

18 19


Speaker Hastert:<br />

A study of failed leadership<br />

By K Denise Rucker Krepp<br />

When news about the Department<br />

of Justice’s indictment<br />

of former House of<br />

Representatives Speaker Dennis<br />

Hastert was released on Thursday,<br />

i immediately thought<br />

about the scandal that engulfed<br />

the former speaker nine years<br />

earlier. on that September day,<br />

Representative Mark Foley resigned<br />

after being accused of<br />

sending inappropriate email<br />

messages to former male pages.<br />

Speaker Hastert knew about<br />

the messages but failed to take<br />

corrective action until the story<br />

blew up in the press.<br />

on the evening of September<br />

29, 2006, i was sitting in the<br />

chamber of the House of Representatives.<br />

at that time, i was an<br />

attorney working for the Homeland<br />

<strong>Security</strong> Committee. i had<br />

spent the past several<br />

months working<br />

with my Senate<br />

counterparts on a<br />

major piece of maritime<br />

security legislation.<br />

We finally<br />

reached agreement<br />

on the bill earlier<br />

that week and the entire House<br />

of Representatives was slated to<br />

vote on the compromise legislation<br />

that night.<br />

When we arrived in the<br />

chamber, everyone was talking<br />

about the emails Representative<br />

Foley’s emails. What was in<br />

them? Why did he send them<br />

to the young, underage men?<br />

These questions swirled around<br />

the chamber as staff tried to get<br />

Congress members focused on<br />

legislating.<br />

Suddenly, then Minority<br />

Leader Nancy Pelosi strode<br />

down the chamber. “Mr. Speaker,”<br />

she hollered. Heads swiveled<br />

in the tiny lady’s direction.<br />

“i send to the desk a privileged<br />

resolution.” The resolution<br />

called for an investigation into<br />

Representative Foley’s conduct.<br />

it also highlighted the fact<br />

that senior Republican members<br />

knew about the emails for<br />

months but failed to act.<br />

The Republican leaders<br />

who knew about the emails included<br />

then Majority Leader<br />

John Boehner. Representative<br />

Boehner told the Washington<br />

Post that he spoke with then<br />

Speaker Hastert in the spring<br />

of 2006 and was told that the issue<br />

was ‘”being taken care of ’”.<br />

it wasn’t. Representative Foley<br />

was still a member of Congress<br />

in September.<br />

When the Representative<br />

Foley story exploded on that hot<br />

September day, then Speaker<br />

Hastert didn’t accept responsibility<br />

for failing to act. instead,<br />

he deflected it and blamed his<br />

staff for not properly investigating<br />

the emails. He wasn’t the<br />

only one using these knife-inthe-back<br />

talking points. Shockingly,<br />

former Representative Ray<br />

LaHood told CBS’ Bob Schieffer<br />

that then Speaker Hastert’s staff<br />

had done him a “disservice” for<br />

how they handled them.<br />

Fast forward nine years<br />

and the La times is reporting that former Speaker Hastert<br />

paid over $1.7 million to conceal sexual abuse. The<br />

alleged abuse this time is against a former male student.<br />

Then Speaker Hastert allegedly paid this individual to remain<br />

quiet and then lied to the Federal Bureau of investigations<br />

about the money he was withdrawing to make the<br />

cash payments.<br />

i’m extremely disheartened by this sordid story. Then<br />

Speaker Hastert was the leader of the House of Representatives.<br />

in this role, he was responsible for disciplining<br />

members who misbehaved. But how could do this when<br />

he himself had allegedly sexually assaulted a former male<br />

student?<br />

Disheartenment turns to disgust when realizing how<br />

close then Speaker Hastert was to being President of the<br />

United States. if something had happened to President<br />

Bush or Vice President Cheney, then Speaker Hastert<br />

would have become president. a man who was indicted<br />

last week by DoJ for lying to the FBi about making cash<br />

payment to an alleged sexual abuse victim would have<br />

ruled our country.<br />

K. Denise Rucker Krepp, former Senior Counsel on the<br />

House of Representatives Homeland <strong>Security</strong> Committee<br />

PERIMETER<br />

S ECURITY<br />

TOTAL SOLUTIONS<br />

Due to the threat of terrorism, sabotage, destruction by<br />

physical damage, theft, or ballistic attack, the<br />

importance of a fully compliant Total Solutions Package<br />

(TSP) is critical. System elements of an effective TSP<br />

should include fencing, vehicle barriers/retractable<br />

bollards, access control, CCTV, and intrusion detection.<br />

Betafence USA can assess your security risks and design<br />

a fully integrated Total Solutions Package (TSP) to assure<br />

a seamless solution. Our offerings include access control,<br />

high security perimeter fencing, SecureUSA ® vehicular<br />

barriers/bollards and a complete Perimeter Intrusion<br />

Detection System (PIDS) to meet your needs.<br />

Total Solutions Package (TSP)<br />

FutureWEDGE SecureUSA ® : ureW<br />

®<br />

Betafence: Guardian 7000<br />

Unique Solutions & Expertise<br />

Services:<br />

• Risk & Needs Analysis<br />

• <strong>Security</strong> Audit<br />

• Design & Engineering<br />

• Integration<br />

• Project Management<br />

• Installation<br />

• Testing<br />

• Training<br />

• Performance Management<br />

• Maintenance<br />

Products:<br />

• High <strong>Security</strong> Fence Systems<br />

• Rapid Deployment Barriers<br />

• Crash Rated Barriers<br />

• Access Control<br />

• Vehicle Barriers & Turnstiles<br />

• Intrusion and Proximity Detection<br />

• Lighting, Surveillance, Alarms<br />

• Integration and<br />

Monitoring Software<br />

• Bollards<br />

CIP-014 Compliant<br />

GS07F6097P<br />

20 21<br />

844.354.4785 • www.SecureUSA.net • info@SecureUSA.net


Law enforcement cameras show promise,<br />

but details need due diligence, says SIA panel<br />

By John Wagley<br />

Washington, Sia government<br />

Summit, June 9 – one panel at the<br />

recent Securities industry association<br />

summit in Washington focused<br />

on police and body-worn cameras.<br />

The idea of body-worn cameras has<br />

been gaining<br />

traction in the<br />

past year or<br />

so, particularly<br />

as the Department<br />

of<br />

Justice (DoJ)<br />

recently said<br />

it is offering<br />

$20 million to provide departments<br />

with the technology.<br />

There is a long way to go<br />

though before many police departments<br />

are comfortable in outfitting<br />

their officers with the technology,<br />

according to the panel. Questions<br />

included: When should the cameras<br />

be turned off and on?; how should<br />

the video be stored and reviewed?;<br />

and how do departments use cameras<br />

while protecting citizens’ privacy?<br />

Participants agreed that before<br />

cameras are placed on officers,<br />

a strong policy on how and when<br />

cameras are used needs to be in<br />

place.<br />

More than 30 states have introduced<br />

legislation on body-worn<br />

cameras, said Shene Commodore,<br />

government Contracts and Business<br />

Manager at intertek, who moderated<br />

the panel. Legislation focuses<br />

on issues including privacy, video<br />

storage, and the cameras’ practicality,<br />

she said. in a 2014 study, the<br />

Police Executive<br />

Research Forum<br />

found about one<br />

in three police<br />

agencies do not<br />

have a written<br />

policy regarding<br />

the cameras.<br />

Even with<br />

the DoJ’s $20 million grant, one<br />

third of which is meant to help<br />

small law enforcement agencies,<br />

some panelists said many questions<br />

still exist about the technology’s viability<br />

and affordability.<br />

one major concern is whether<br />

officers will be able to turn the cameras<br />

on or off in a stressful situation,<br />

said Carl Maupin, Captain, Leesburg<br />

Police Department (Va). “They may<br />

not think to do it.” Further, taking<br />

the time to turn it on could place<br />

them in “greater jeopardy.”<br />

Police departments do have<br />

experience storing video data, he<br />

said, such as with police car dash<br />

cams. The bigger concern is about<br />

analyzing the video. Most agencies<br />

don’t have the money to get analysts<br />

to view the video, so it could burden<br />

officers.<br />

one reason many departments<br />

are hesitant to use body cameras<br />

concerns privacy, said Mike<br />

Fergus, technology Center Program<br />

Manager, international association<br />

of Chiefs of Police. Perhaps in goes<br />

into a home to interview a witness,<br />

he or she could allay concerns by using<br />

“a very obvious lens cap.”<br />

Due to such concerns, many<br />

agencies are waiting for legislation<br />

and guidance to be worked out before<br />

committing to cameras, said<br />

Fergus. The international association<br />

of Chiefs of Police has a model<br />

policy located at http://www.theiacp.<br />

org/ViewResult?SearchiD=2401.<br />

The DoJ also has a website designed<br />

to help departments get started:<br />

https://www.bja.gov/bwc/.<br />

“i think it’s important agencies<br />

do their due diligence,” said Mark<br />

greene, Director of Policy, Standards<br />

and grants Management Division,<br />

office of Science and technology,<br />

National institute of Justice.<br />

“Jumping into something really<br />

quickly is not the way to go.”<br />

Keynote address by US Senator Johnson<br />

R-Wis covers border security, drugs, TSA,<br />

infrastructure protection and federal debt<br />

at SIA <strong>Government</strong> Summit<br />

By adrian Courtenay<br />

June 16, 2015 - in a lively, occasionally<br />

controversial keynote presentation,<br />

U.S. Senator Ron Johnson,<br />

Chairman of the Senate Homeland<br />

<strong>Security</strong> and government affairs<br />

Committee, covered a broad range<br />

of prickly topics in his keynote presentation<br />

at last week’s Sia government<br />

Summit in Washington, DC.<br />

although the Senator is clearly a<br />

fiscal conservative, he was very<br />

forceful in stating his belief that the<br />

country is in dire need of dealing<br />

with its crumbling critical infrastructure.<br />

“There’s a $10-$15 billion<br />

shortfall in the Highway trust<br />

Fund,” he pointed out. “We need<br />

to spend money on infrastructure<br />

protection.”<br />

He also exhibited a great sensitivity<br />

to the situation of the many immigrants<br />

that have fled poverty, gang<br />

warfare and murder in their home<br />

countries and risked everything<br />

by migrating to the U.S. in recent<br />

years, presenting many challenges<br />

to the federal, state and local government.<br />

“The number one incentive to<br />

border crossings is a better life,<br />

the same as all of our ancestors.<br />

a functioning guest worker is the<br />

solution that most immigrants are<br />

working under. We need achievable<br />

goals and we need to understand<br />

and admit reality and deal with the<br />

problem on a step by step basis.”<br />

“one of the great strengths of<br />

america,” he said, is “equality for<br />

all.”<br />

But the Senator showed no tolerance<br />

for the drug situation. “our<br />

biggest problem is the demand for<br />

drugs. general McCaffrey [former<br />

U.S. Drug Czar] said they were<br />

intercepting only 5-10% of the<br />

narcotics coming in to the country.<br />

The cartels were allowed to be<br />

formed. First it was drugs, now its<br />

drugs, guns and human slavery.”<br />

The Senator’s fiscal security bona<br />

fides became more evident when he<br />

described witnessing “the growing<br />

deficits produced by obama-care”<br />

and “the huge transfer of wealth<br />

from old to young”, not to mention<br />

unfunded liabilities and “the<br />

dysfunction nature of Washington,”<br />

where, he observed, “people talk<br />

about tactics rather than strategy.”<br />

“The Social <strong>Security</strong> trust fund<br />

is a fiction and has no value,” he<br />

22 23<br />

Senator Ron Johnson R-Wis<br />

asserted. “Medicare has no value<br />

either, since it’s one dollar going in<br />

and three going out. in 30 years,<br />

the country will have a $127 trillion<br />

debt. in fact, he said, “it will<br />

take $71 trillion just to address<br />

the Social <strong>Security</strong> and Medicare<br />

problem.”<br />

Noting that most of the Senator’s<br />

remarks relating to fiscal issues<br />

were focused mainly on government<br />

spending as opposed to revenues,<br />

a gSN representative could<br />

not resist submitting a question<br />

to Senator Johnson relating to the<br />

revenue side of the ledger:<br />

“Senator Johnson, in light of your<br />

obvious concern about the growing<br />

national debt and the gap between<br />

revenues and spending, can you tell<br />

us how you feel about the fact that a<br />

number of large companies, such as<br />

More on page 46


NIC expert offers solutions for new, insidious DDOS<br />

attacks on government<br />

By Rodney Caudle<br />

Director of Information <strong>Security</strong><br />

NIC Inc.<br />

“Traditional” denialof-service<br />

(DoS) attacks,<br />

which originate<br />

from a single source<br />

to target a website or<br />

network, have been<br />

around since networks<br />

first began connecting<br />

to one another. Distributed<br />

denial-of-service<br />

(DDoS) attacks are a<br />

relatively newer phenomenon –<br />

and more insidious, because they<br />

originate from multiple sources<br />

executing synchronized attacks<br />

against a single target.<br />

Attackers also are changing<br />

the ways they utilize these techniques,<br />

and government agencies<br />

may be less familiar with, and<br />

therefore less knowledgeable about<br />

how to mitigate, these new methods.<br />

The changing face<br />

of DDoS attacks<br />

The first well-publicized DDoS attack<br />

occurred in early 2000, when<br />

an attacker took over a university<br />

computer lab and repurposed<br />

its computers to flood traffic on<br />

Yahoo, shutting the Internet portal<br />

down for three hours. While the<br />

first DDoS attacks focused on universities<br />

and other collections<br />

of computers,<br />

the increasing availability<br />

of high-speed<br />

Internet access for the<br />

average home also has<br />

resulted in a growing<br />

pool of sources for<br />

DDoS attacks. More<br />

recently, three other<br />

kinds of DDoS attacks<br />

have appeared:<br />

• Resource consumption. As<br />

if starting the “three-way handshake”<br />

that establishes a connection<br />

between two computers on the<br />

Internet, attackers begin to initiate<br />

multiple bogus requests for a<br />

connection as fast as they can. The<br />

server recognizes and responds to<br />

the requests. However, the attacker<br />

doesn’t send the final pieces of<br />

information required to complete<br />

any of the connections, forcing<br />

the server to wait for the expected<br />

response. If the attacker can tie up<br />

all of the server’s available connections,<br />

it becomes impossible for the<br />

target to communicate with legitimate<br />

users. In another flavor of this<br />

DDoS attack type, an attacker can<br />

use legitimate traffic to force the<br />

target’s server into creating a large<br />

number of log files, possibly consuming<br />

all the server’s disk space.<br />

• Slowloris. Attackers establish<br />

legitimate connections by<br />

completing numerous three-way<br />

handshakes, but then each connection<br />

unavailable due to the surge created<br />

by the attacker. This type of attack<br />

has significant impact because the<br />

DDoS includes the target server<br />

and any servers on the same immediate<br />

network.<br />

DDoS attacks also are changing<br />

in volume. DDoS attacks in the<br />

early 2000s were in the neighborhood<br />

of 4 GB per second. They<br />

now average between 10 GB and<br />

60 GB per second, and one DDoS<br />

launched in February peaked at just<br />

under 400 Gbps. The average DDoS<br />

incident lasts 17 hours.<br />

shot a local teenager.<br />

Hackers typically want to<br />

cause an agency financial harm,<br />

as would be the case if, say, a state<br />

department of revenue were shut<br />

down during tax season to delay or<br />

make it impossible for constituents<br />

to file their taxes on time. Citizens<br />

expect that government officials<br />

should be able to keep an online<br />

service running, so if attackers can<br />

take a service down, they also can<br />

damage an agency’s reputation.<br />

By their nature, government<br />

agencies and the services they of-<br />

agency a less appealing target. The<br />

first step is to distribute your services<br />

in various locations so that a<br />

single DDoS attack cannot take the<br />

entire suite of services offered by<br />

an agency offline. The other disadvantage<br />

of hosting your services in<br />

only one data center is that, if you<br />

come under a DDoS attack, your<br />

Internet services provider will be<br />

the only one who can remedy your<br />

problem, and it will be incredibly<br />

expensive to fix. You’ll be captive<br />

to the ISP’s solution, with very little<br />

power to negotiate its cost.<br />

begins to instruct the target,<br />

fer always will be targets. Taking<br />

You can choose, instead, to<br />

“I got busy. I’ll get back to you in a<br />

Attacks on government<br />

hackers’ motivations and the ease use a content delivery network as a<br />

little while.” The target server waits<br />

are increasing<br />

with which DDoS attacks can be “front door” to your services. CDNs<br />

on the requests, assuming that the<br />

users are on slow or unreliable<br />

networks and that the rest of the<br />

information will arrive in time. The<br />

attackers can send a fragment of<br />

data every few minutes to keep the<br />

Compared to other industries,<br />

the public sector experienced the<br />

greatest escalation in DDoS attacks<br />

in Q4 2014. More frightening still<br />

is that DDoS attacks are easy for<br />

almost anyone to initiate. Attacker<br />

launched into consideration, the<br />

question is no longer if an agency<br />

will be hit. The questions are when<br />

will the attack come, how big will<br />

it be and – most importantly – will<br />

the agency be ready?<br />

can mask your network connections<br />

from attackers so they’re less<br />

likely to target your agency. These<br />

services, while beneficial, also can<br />

be pricey, so consider costs as you<br />

evaluate their benefits.<br />

connections open for extended periods.<br />

The targeted server becomes<br />

for-hire” subscription services that<br />

collectives have announced “DDoS-<br />

Most networks collect samples<br />

every five minutes, and it may<br />

Prepare for an attack<br />

unavailable for legitimate traffic<br />

because it is busy keeping track of<br />

all of the attackers’ connections.<br />

• Bandwidth consumption.<br />

Attackers send bogus network traffic<br />

as quickly as possible toward<br />

the targeted server, consuming all<br />

available bandwidth on the networks<br />

leading to the server. The<br />

network traffic does not have to<br />

be legitimate or even related to the<br />

traffic normally seen as legitimate<br />

by the server. The targeted server<br />

and surrounding networks become<br />

can be purchased for as little as<br />

$5.99 per month. The purchased<br />

service removes the need to be<br />

technologically savvy and purports<br />

to minimize the risk of getting<br />

caught.<br />

Unlike attacks where the goal<br />

is to steal personal data, DDoS attacks<br />

on government typically are<br />

motivated by opposition to legislation<br />

or by political activism – as<br />

demonstrated in the attacks on<br />

Ferguson, Missouri’s, police department<br />

website after one of its officers<br />

Because DDoS attacks provide no<br />

forewarning, you cannot prevent<br />

one from occurring. Further, an<br />

attack can ramp up from beginning<br />

to fully engaged at 10 to 60<br />

Gbps in as little as 60 seconds, so<br />

it is almost impossible to stop an<br />

attack from reaching peak effectiveness<br />

once it begins. Some ISPs offer<br />

automatic responses, but these can<br />

cause outages and shut down legitimate<br />

traffic along with the attack<br />

traffic.<br />

You can, however, make your<br />

require 15 to 20 minutes for your<br />

ISP to identify that an incident is<br />

underway. Consider establishing<br />

a relationship with an e<strong>Government</strong><br />

services partner that will<br />

host on your behalf and monitor<br />

your system more frequently. Such<br />

a provider might notice an attack<br />

within three minutes and can<br />

work with your ISP to put filters in<br />

place within a couple of minutes to<br />

siphon off the junk traffic so valid<br />

traffic can get through, minimizing<br />

More on page 46<br />

24 25


Editor’s Note: The following articles describing the records of five presidential candidates regarding immigration<br />

have been used with permission of the non-profit, non-partisan American Immigration Council.<br />

Immigration and Border Control: What Graham’s<br />

candidacy brings to the GOP presidential field<br />

By Wendy Feliz<br />

June 5, 2015 – Earlier this week,<br />

Lindsey graham became the ninth<br />

candidate to announce his candidacy<br />

for the Republican presidential<br />

nomination. attempting to distinguish<br />

himself from the other candidates,<br />

graham is highlighting his<br />

foreign policy and national security<br />

experience. Yet, the area where he<br />

undoubtedly leads the pack is his<br />

leadership on immigration reform.<br />

With longtime ally Senator John<br />

McCain usually at his side, graham<br />

has been involved in more than one<br />

effort to pass an immigration bill<br />

through the Senate. NBC <strong>News</strong> reports:<br />

“…he has been a consistent<br />

goP vote for immigration reform<br />

legislation. His history of work on<br />

immigration bills included collaboration<br />

with the late Sen. ted Kennedy,<br />

costing him conservative support<br />

in his 2008 primary. Despite<br />

that, he easily won re-election…<br />

graham also was one of the negotiators<br />

on the 2013 “gang of Eight”<br />

immigration reform bill passed by<br />

the Senate. “<br />

Senator Lindsey Graham<br />

Moreover, graham has continued<br />

to proselytize the need for<br />

immigration reform and has warned<br />

his party that they ignore the immigration<br />

issue at their own peril. He<br />

said in 2014:<br />

“if we become the party of self<br />

deportation, if that again is our position<br />

in 2016, we’re going to drive a<br />

deep wedge between us and Hispanics.”<br />

and “if you solve the immigration<br />

problem in a good, american,<br />

responsible way, our party’s back in<br />

the game and we can dominate the<br />

21st century.”<br />

He’s also using his experience<br />

working on immigration as a selling<br />

point for his presidential nomination.<br />

Bloomberg <strong>News</strong> reports:<br />

“graham argued that he<br />

would have the most credibility of<br />

26<br />

any presidential candidate to push<br />

through a permanent legislative<br />

solution on immigration. ‘i think<br />

i could sit down with Democrats,<br />

who’ve known i’ve taken a beating<br />

to try to get a fair compromise,’ he<br />

said, referring to his co-authorship<br />

of a sweeping immigration reform<br />

bill that passed the Senate with bipartisan<br />

support in 2013 and died in<br />

the House. ‘and i think i could convince<br />

my party that now’s the time<br />

to get this behind us.’”<br />

Senator graham’s entry into<br />

the 2016 goP presidential mix will<br />

hopefully provoke a conversation on<br />

immigration policy. Where do the<br />

candidates in his party stand on immigration<br />

reform? Will they bring<br />

solutions to the issue or politicize<br />

it as in primaries past? graham has<br />

the opportunity to challenge some<br />

of those who refuse to tackle the<br />

issue pragmatically and fairly. Let’s<br />

hope he continues to champion the<br />

issue for both the sake of his party<br />

and the country.<br />

Photo Courtesy of the Chairman of the Joint<br />

Chiefs of Staff.<br />

Immigration and Border Control: Presidential<br />

candidate O’Malley’s immigration record<br />

By Eric gibble<br />

Former Governor Martin O’Malley<br />

27<br />

June 1, 2015 – Former Maryland<br />

governor Martin o’Malley recently<br />

became the third Democratic<br />

candidate to enter the 2016 presidential<br />

race. in his announcement,<br />

o’Malley said that “for the sake<br />

of our country’s security, and our<br />

country’s well-being, and our country’s<br />

economic growth” comprehensive<br />

immigration reform must<br />

include a path to citizenship. However,<br />

o’Malley has not only been<br />

a vocal supporter of immigration<br />

reform on the federal level, he also<br />

took practical measures to welcome<br />

immigrants in Maryland during his<br />

two terms as governor.<br />

o’Malley signed the Maryland<br />

DREaM act, which allows<br />

DREaMers who graduate from<br />

Maryland high schools to pay the<br />

same in-state college tuition rates as<br />

other Marylanders. The bill was put<br />

in limbo after Maryland’s Republican<br />

lawmakers successfully petitioned<br />

for a statewide referendum<br />

on the issue. However, o’Malley<br />

continued to strongly defend the law<br />

by raising funds for the group Educating<br />

Maryland Kids who worked<br />

to defeat the referendum. Maryland<br />

voters went on to defeat it and approve<br />

the law in 2012.<br />

also, under o’Malley, the<br />

Baltimore City Detention Center<br />

stopped automatically honoring detainer<br />

requests from immigration<br />

and Customs Enforcement (iCE)<br />

to hold immigrants for deportation<br />

and only honored these detainer<br />

requests when an immigrant was<br />

charged with or convicted of a felony,<br />

three or more misdemeanors,<br />

or a “serious” misdemeanor—or<br />

the crimes that Secure Communities<br />

was originally meant to target.<br />

o’Malley said instead, resources<br />

should be focused on “complying<br />

with iCE detainers when there is an<br />

actual threat to the public’s safety…<br />

no family should be ripped apart<br />

because the Republican Congress<br />

can’t come to the table and reach a<br />

reasonable compromise on comprehensive<br />

immigration reform.” However,<br />

he did face some criticism that<br />

the measure was too narrow and did<br />

not go far enough.<br />

in 2013, o’Malley also signed<br />

into law a measure that allowed undocumented<br />

immigrants to obtain<br />

drivers licenses. as transportation<br />

expert Sarah Hendricks notes, this<br />

allows Maryland to maximize on<br />

the economic and social contributions<br />

of undocumented immigrants<br />

and improves public safety in the<br />

state.<br />

Then in 2014, when a surge<br />

of Central american mothers and<br />

their children came to the U.S. border<br />

seeking refuge from violence<br />

in their home countries o’Malley<br />

took a distinctively different tone<br />

from rival 2016 candidate Hillary<br />

Clinton. While Clinton said that<br />

those arriving should be sent back<br />

to their home countries because<br />

“we have to send a clear message<br />

just because your child gets across<br />

the border doesn’t mean your child<br />

gets to stay,” o’Malley told reporters<br />

at the National governors association<br />

that “we are not a country that<br />

should send children away and send<br />

them back to certain death.” He also<br />

encouraged members of the Hispanic<br />

National Bar association to<br />

More on page 31


Immigration and Border Control: Where Pataki<br />

stands on immigration policy<br />

By Elijah Levine<br />

Former Governor George Pataki<br />

Former Republican New York governor<br />

george Pataki recently entered<br />

the 2016 presidential race,<br />

highlighting what his national security<br />

and government reform agenda<br />

would be, but failing to mention<br />

what his policies on immigration<br />

would be as Commander-in-Chief.<br />

However, a quick look into his past<br />

record and public statements on<br />

immigration provide insight into<br />

a policy-maker who took practical<br />

measures to welcome immigrants in<br />

New York and who agreed in principle<br />

with the goal but not the approach<br />

President obama took when<br />

announcing his executive actions<br />

on immigration.<br />

in 2002, when Pataki was<br />

governor, he signed a bill granting<br />

in-state tuition for undocumented<br />

youth at New York public colleges.<br />

This move was a commonsense approach<br />

as New York is home to over<br />

80,000 undocumented children<br />

brought to this country as children,<br />

the fourth highest concentration in<br />

the nation.<br />

in addition he has been a vocal<br />

supporter on the need to reform<br />

our outdated immigration system.<br />

according to Politico:<br />

“Pataki said that it is not realistic<br />

to say the United States will<br />

“send 11 million people back in<br />

railroad cars and buses and trains,”<br />

voicing support for a “pathway to<br />

citizenship at the back of the line”<br />

unless they are members of the military.”<br />

His pragmatic approach goes<br />

back many years. in fact, according<br />

to the New York times, Pataki publicly<br />

opposed California’s controversial<br />

Proposition 187, which was<br />

a restrictive state measure which<br />

would have denied public services<br />

to undocumented immigrants.<br />

While seemingly agreeing<br />

with the idea in principle of finding<br />

solutions to the dilemma of millions<br />

people living in our nation without<br />

proper documentation, Pataki publicly<br />

criticized the President’s executive<br />

action on immigration, which<br />

would defer deportations for up to 4<br />

million immigrants and implement<br />

many critically needed reforms including<br />

initiatives around integration<br />

and visa reform:<br />

“it’s not a question of what you<br />

want to do. it’s what you can do…<br />

i think we do have to have an approach<br />

that provides the ability for<br />

those here illegally to legalize their<br />

status when they’ve obeyed the law,<br />

contributed to america…. But i<br />

don’t think the way the president<br />

did it was right.”<br />

Pataki should continue to<br />

highlight what makes him stand<br />

out from the crowded field of goP<br />

candidates. His record of pursuing<br />

inclusive immigration policies, like<br />

the ones he implemented as governor,<br />

is a great place to start.<br />

Photo by Gage Skidmore<br />

Immigration and Border Control: What you need<br />

to know about Chafee’s immigration record<br />

Lincoln Chafee, a former Republican<br />

Senator (turned Democrat)<br />

and governor from Rhode island<br />

announced presidential bid for the<br />

Democratic nomination for President<br />

of the United States last week.<br />

He joins Hilary Clinton, Martin<br />

o’Malley, and Bernie Sanders in the<br />

race. although Chafee’s initial announcement<br />

focuses in on his opposition<br />

to the war in iraq and how<br />

that differs from the other candidates,<br />

a look back at his record and<br />

public statements on immigration<br />

policy provide some clues into how<br />

he might handle the immigration issue<br />

as commander-in-chief.<br />

as a Senator, Chafee cosponsored<br />

an immigration reform bill in<br />

2005 which included a pathway to<br />

citizenship, as well as border security<br />

measures. in a 2006 gubernatorial<br />

debate, Chafee recalled:<br />

“i co-sponsored the McCain<br />

bill. He came up with a bill, path to<br />

legality but also strong border security.<br />

There was a good compromise.<br />

Bush supports it and others<br />

and that’s the best way to handle<br />

these 11 million illegal immigrants<br />

that are here working illegally in<br />

this country. First, border security.<br />

Second, a path to legality. Pay back<br />

fines. Learn English. get in the back<br />

of the line of the immigration line.<br />

Former Governor Lincoln Chafee<br />

and it’s a big problem. it’s going to<br />

take bipartisan work.”<br />

in 2011, governor, Chafee rescinded<br />

the previous governor’s executive<br />

order which called for local<br />

policy to enforce federal immigration<br />

laws and for employers to participate<br />

in E-Verify.<br />

“My view is that Rhode island<br />

can grow economically by being a<br />

tolerant place to do business… The<br />

immigrant-rich areas, i want to see<br />

them prosper, and they need it.”<br />

Chafee also supported in-state<br />

tuition for young undocumented<br />

immigrants in Rhode island. While<br />

state legislators failed pass the legislation,<br />

the Board of governors for<br />

Higher Education lowered tuition<br />

rates for Rhode island’s immigrant<br />

youth in 2011.<br />

a compassionate and fair approach<br />

to immigration policy seems<br />

to run in the Chafee family. Chafee’s<br />

28 29<br />

father, Senator John Chafee (R-Ri),<br />

was the leading Congressional supporter<br />

of President Ronald Reagan<br />

and george H.W. Bush’s “Family<br />

Fairness” executive actions, the closest<br />

parallel to President obama’s recent<br />

executive actions. Senator John<br />

Chafee sponsored several legislative<br />

provisions to protect the spouses<br />

and children of those able to legalize<br />

under the 1986 immigration reform.<br />

and when President Bush in<br />

1990 took action to protect up to 1.5<br />

million people from deportation,<br />

after Senator Chafee’s proposal had<br />

passed the Senate, the applauded it,<br />

saying “i am delighted, after four<br />

years of hard work, to see this principle<br />

triumph.”<br />

While Chafee does not list immigration<br />

reform as a priority on<br />

his official campaign website, he has<br />

an interesting record and has stood<br />

on the side of problem-solving and<br />

fairness when it comes to reforming<br />

immigration policy.<br />

See more at: http://immigrationimpact.com/2015/06/09/lincolnchafee-immigration/#sthash.KUcOHpbA.dpuf<br />

Photo Courtesy of City Year.


Immigration and Border Control: Perry advocates<br />

for enforcement-first immigration strategy in<br />

presidential launch<br />

By Elijah Levine<br />

Former texas governor Rick Perry<br />

announced his bid for the Republican<br />

presidential candidacy last<br />

week. His immigration rhetoric in<br />

the past several years has been one<br />

that focuses more on border enforcement<br />

than providing legal status<br />

to the currently undocumented<br />

population in the U.S.—a solution<br />

an overwhelming majority of americans<br />

now support. However, Perry<br />

also signed the first state law in the<br />

country to provide in-state tuition<br />

to undocumented immigrants in<br />

2001 and has recently said the U.S.<br />

can’t deport 11 million people.<br />

in a recent interview on Fox,<br />

Perry vowed, if elected, to secure the<br />

border as one of his first presidential<br />

actions before a debate on immigration<br />

reform can begin. He went on<br />

to enumerate the specifics of such a<br />

strategy:<br />

“Put the personnel on the border,<br />

the strategic fencing in place,<br />

the aviation assets—so that, that<br />

1800 mile border, from tijuana to<br />

El Paso, from El Paso to Brownsville,<br />

is secure and the american<br />

people will know that it is secure.”<br />

only after these actions, Perry<br />

continued, can americans “have a<br />

Former Governor Rick Perry<br />

conversation about how immigration<br />

reform needs to be conducted<br />

and what have you.”<br />

Perry hasn’t been shy to deploy<br />

troops to the border during<br />

his terms as governor. Last summer,<br />

when thousands of Central american<br />

children and families fleeing<br />

violence arrived at the U.S. border<br />

many states and cities welcomed<br />

them into their communities, providing<br />

basic humanitarian support.<br />

But Perry chose a military response<br />

to this humanitarian challenge by<br />

sending approximately 1,000 National<br />

guard troops to the border,<br />

noting “our citizens are under assault.”<br />

initial reports estimated that<br />

this move cost texas over $12 million<br />

per month.<br />

trying to enforce our way out<br />

of our immigration problems is no<br />

solution. Since 1986, the federal<br />

government has spent an estimated<br />

$186.8 billion on immigration enforcement.<br />

Yet during that time, the<br />

unauthorized population has tripled<br />

in size to 11 million. This is not due<br />

to a lack of enforcement, but rather<br />

a testament to the powerful demand<br />

the U.S. economy has for workers, as<br />

well as the similarly powerful desire<br />

for families to unite across borders.<br />

Perry’s strict border policies,<br />

historically, have been proven not<br />

to reap their intended benefits and<br />

actually encourage lawlessness as<br />

undocumented immigrants entrust<br />

their lives to criminal cartels who<br />

traffic people into the United States.<br />

“Coyotes” prey on vulnerable immigrants<br />

and present a humanitarian<br />

crisis that militarization of the border<br />

is exacerbating.<br />

also, ahead of the announcement<br />

of the President’s executive<br />

action on immigration, Perry anticipated<br />

texas’ plans to sue to the<br />

administration in order to stop it.<br />

While Perry has been a hawk<br />

on immigration in many ways, his<br />

comments at times indicate a different<br />

view. Perry recently said in New<br />

Hampshire that the removal of 11<br />

million undocumented immigrants<br />

from the United States in unrealistic,<br />

“i don’t think anyone with a<br />

sense of reality thinks that we’re go-<br />

ing to ship 11 or 12 million people<br />

back to where they’re from.”<br />

also, in 2001, Perry signed the<br />

texas DREaM act into law –which<br />

was the first measure enacted in<br />

a state to provide undocumented<br />

immigrants with in-state tuition at<br />

state colleges. That same year, however,<br />

Perry vetoed a bill that would<br />

have authorized undocumented immigrants<br />

to obtain drivers’ licenses,<br />

citing his concern that the bill didn’t<br />

provide resources to sufficiently vet<br />

potential candidates and verify birth<br />

foreign birth certificates.<br />

Perry has shown himself hard<br />

to pin down on what his philosophy<br />

is around immigration policy. Perhaps<br />

over the next several months<br />

as the campaign continues, he can<br />

devise a more solid platform and<br />

clearly explain what a Perry administration<br />

would do on immigration<br />

policy.<br />

See more at: http://immigrationimpact.com/2015/06/08/rickperry-immigration/#sthash.zeBtcoFX.dpuf<br />

Photo by Michael Vadon.<br />

Immigration: O’Malley<br />

Continued from page 27<br />

assist in the representation of these<br />

immigrant mothers and children to<br />

help them navigate legal process so<br />

“that their hopes and their dignity<br />

is properly represented in this, the<br />

land of the free and the home of the<br />

brave.”<br />

if o’Malley’s record as governor<br />

is any indication of where his<br />

administration will stand on immigration<br />

policy, it is likely he would<br />

take commonsense approaches that<br />

would make real progress on longstanding<br />

immigration challenges.<br />

30


Border <strong>Security</strong> Expo to celebrate 10th year in<br />

2016 with move to San Antonio, TX<br />

SaN aNtoNio, tX (June 11,<br />

2015) - on april 13-14, 2016, the<br />

10th annual Border <strong>Security</strong> Expo<br />

will open at the Henry B. gonzalez<br />

Convention Center, San antonio,<br />

texas.<br />

Border <strong>Security</strong> Expo draws<br />

attendees from around the world<br />

and has become the most highly<br />

anticipated conference and exhibition<br />

on border security. as<br />

in years past, the exhibit hall will<br />

feature more than 150 companies<br />

showcasing a wide array of cuttingedge<br />

border security products,<br />

technologies and systems aimed at<br />

increasing security while facilitating<br />

legitimate trade and travel. in<br />

addition to the expansive exhibit<br />

hall, attendees benefit from a comprehensive<br />

conference program<br />

covering the key issues addressing<br />

border security, as well as networking,<br />

special events, ceremonies, and<br />

idea-sharing throughout the twoday<br />

event.<br />

“Border <strong>Security</strong> Expo has<br />

proudly served the needs of federal,<br />

state, local and international law<br />

enforcement, as well as privateindustry<br />

focused on border security,<br />

for the past decade,” said Paul<br />

Mackler, President & CEo of Eagle<br />

Eye Expositions, producers of the<br />

annual event. “given the confluence<br />

of federal<br />

and state<br />

events over<br />

the past year<br />

on the southwest<br />

border,<br />

including<br />

the newly<br />

formed Joint<br />

task Force<br />

West, Southern Border approaches<br />

Campaign, headed up by Director<br />

Robert Harris, being headquartered<br />

in San antonio, and the sweeping<br />

$800 million border security legislation<br />

signed into law by texas gov.<br />

abbott (House Bill 11), a change of<br />

venue to texas in 2016 is in order<br />

to continue to best serve the needs<br />

of the border security community”.<br />

Border <strong>Security</strong> Expo’s advisory<br />

Board is chaired by Jayson<br />

P. ahern, Principal at The Chertoff<br />

group, and former acting<br />

Commissioner, U.S. Customs and<br />

Border Protection. The advisory<br />

Board includes a diverse and distinguished<br />

group of leading experts<br />

well-versed on all facets of border<br />

security.<br />

While the same high caliber<br />

speaker roster is expected,<br />

event management says there are<br />

new dynamics to the conference<br />

and exhibition that will make the<br />

32<br />

overall event even more productive<br />

for exhibitors and attendees with<br />

the move to San antonio. The full<br />

program will be announced in the<br />

months to come.<br />

For more information, visit<br />

www.Border<strong>Security</strong>Expo.com.<br />

Interested in exhibiting<br />

or sponsorships?<br />

Eagle Eye Expositions, LLC, (www.<br />

EagleEyeExpos.com) a leading producer<br />

of conferences, tradeshows and<br />

digital media products is the producer<br />

of the 3nd annual US/Canada<br />

Border Conference, October 27-28,<br />

2015, Cobo Center, Detroit, MI and<br />

the 10th annual Border <strong>Security</strong><br />

Expo, April 13-14, 2016, Henry B.<br />

Gonzalez Convention Center, San<br />

Antonio, TX<br />

CBRNE/Detection<br />

DHS Science & Technology Patent Awards salute<br />

32 inventors from S&T, TSA and U.S. Coast Guard<br />

WaSHiNgtoN, June 16 – today,<br />

Deputy Secretary of Homeland <strong>Security</strong><br />

alejandro Mayorkas recognized<br />

Department of Homeland <strong>Security</strong><br />

(DHS) employees and other<br />

individuals who have been awarded<br />

patents by the U.S. Patent office<br />

for their technology advancements<br />

and inventions contributing to the<br />

homeland security mission. The<br />

event, hosted by the DHS Science<br />

and technology Directorate (S&t),<br />

recognized inventors from across<br />

DHS including the transportation<br />

<strong>Security</strong> administration (tSa),<br />

U.S. Coast guard, and the office of<br />

the general Counsel.<br />

“at the heart of DHS’s innovation<br />

and success are our employees.<br />

it is my honor today to recognize<br />

these inventors for their efforts to<br />

advance the homeland security mission,”<br />

said Deputy Secretary Mayorkas.<br />

“our inventors have shown<br />

commitment and dedication to<br />

the vision of protecting america<br />

by thinking outside the box, contributing<br />

their ideas and vision,<br />

and working in our labs and with<br />

our partners to create innovative<br />

and useful technologies. They have<br />

demonstrated that creativity and innovation<br />

are alive and well in our<br />

federal workforce.”<br />

Deputy Secretary Mayorkas<br />

was joined by S&t Under Secretary<br />

Dr. Reginald Brothers, tSa Deputy<br />

administrator Mark Hatfield<br />

and other Department leadership,<br />

along with representatives from the<br />

Departments of agriculture and<br />

Energy, and the U.S. Patent and<br />

trademark office in recognizing 32<br />

inventors from across the Department.<br />

together, these individuals<br />

have invented 12 patented technologies<br />

and devices that span several<br />

33<br />

areas of the homeland security mission.<br />

From transportation-related<br />

inventions that improve screening<br />

and detection capabilities at ports<br />

and borders, to inventions that assist<br />

the U.S. Coast guard in air and<br />

sea rescue operations, to a foot-andmouth<br />

disease vaccine that received<br />

the Secretary’s Exceptional Service<br />

gold Medal in 2014, these inventions<br />

have helped to enhance the<br />

More on page 34


CBRNE/Detection<br />

DHS Science & Technology<br />

Patent Awards<br />

Continued from page 33<br />

homeland security mission while<br />

adapting to current and evolving<br />

threats.<br />

“The technologies developed<br />

by our employees that culminate in<br />

patent awards are vitally important<br />

for the Department in attracting<br />

scientific talent, and to our industry<br />

partners that commercialize these<br />

products and capabilities,” said DHS<br />

Under Secretary for Science and<br />

technology Dr. Reginald Brothers.<br />

“i am proud to have S&t serve as<br />

the Department’s hub for innovation<br />

in helping to make a difference<br />

in our ability to do our jobs smarter,<br />

faster and with greater accuracy.”<br />

The awardees recognized today<br />

are:<br />

Dry Transfer Method for the Preparation<br />

of Explosives Test Samples<br />

U.S. Patent Number: 6,470,730 – issued<br />

October 29, 2002<br />

Robert T. Chamberlain (Transportation<br />

<strong>Security</strong> Laboratory)<br />

improves the quality of test<br />

samples by duplicating the way<br />

minute quantities of substances are<br />

placed on and released from surfaces<br />

like luggage handles, packages, or<br />

clothing for testing. Thus, drug and<br />

explosives detector manufacturers<br />

have a quick and easy method that<br />

reliably indicates how machines will<br />

operate in real-world situations.<br />

Method and Apparatus for Obtaining<br />

Spatial Information and Measuring<br />

the Dielectric Constant of an<br />

Object<br />

U.S. Patent Number: 7,378,849 – issued<br />

May 27, 2008<br />

James C. Weatherall and Joseph<br />

A. Gatto (Transportation <strong>Security</strong><br />

Laboratory)<br />

Determines information<br />

about an unknown object or confirms<br />

information about an object,<br />

such as its composition, construction,<br />

or spatial characteristics. it is<br />

useful in detecting dangerous or<br />

potentially dangerous objects, such<br />

as weapons or explosives, at places<br />

where screening is a priority, such as<br />

airports and public buildings.<br />

Very Thin Dosimeter Filters and Low<br />

Profile Dosimeter Incorporating the<br />

Same<br />

U.S. Patent Number: 7,781,747 – issued<br />

August 24, 2010<br />

Gladys Klemic, Paul Bailey, and<br />

Cecilia Murtagh (National Urban<br />

<strong>Security</strong> Transportation Laboratory)<br />

a wearable “card-like” dosimeter<br />

featuring two combined equilibrium<br />

and energy compensation<br />

filters that sandwich an optically<br />

stimulated luminescent material.<br />

Useful for workers and citizens in<br />

the event of radiation exposure, the<br />

device measures and records the<br />

amount of radiation and can connect<br />

to a central database or be sent<br />

to a processing center for readout.<br />

Adenoviral Vector-based Foot-and-<br />

Mouth Disease Vaccine<br />

U.S. Patent Number: 8,323,663 – issued<br />

December 4, 2012<br />

Douglas E. Brough, Joseph T.<br />

Bruder, C. Richter King, Marvin<br />

J. Grubman, and John G. Neilan<br />

(Plum Island Animal Disease Center)<br />

Elicits a more rapid and complete<br />

immune response against<br />

foot-and-mouth disease and prevents<br />

the adenovirus from replicating<br />

by deleting whole or partial<br />

genes needed for viral replication.<br />

This vaccine can be used as a tool to<br />

stop the spread of this highly contagious<br />

disease.<br />

curity Laboratory)<br />

Uses collisional focusing to<br />

transfer ion beams of trace explosives<br />

between the mass spectrometer<br />

and the ion mobility spectrometer<br />

without distorting the beams.<br />

Explosive trace detector manufacturers<br />

can use this method and apparatus<br />

to fine-tune system performance<br />

by focusing on the precise<br />

chemical signatures unique to each<br />

kind of explosive.<br />

Inert and Non-toxic Explosive Simulants<br />

and Method of Production<br />

U.S. Patent Number: 8,563,316 – issued<br />

October 22, 2013<br />

Ronald A. Krauss, Stephen F.<br />

Duffy, and Stephen J. Goettler III<br />

(Transportation <strong>Security</strong> Laboratory)<br />

imitates characteristics of<br />

known explosives at the microscopic<br />

and macroscopic levels. Developers<br />

and manufacturers can use this<br />

method to safely verify the detection<br />

capabilities of X-ray-based explosives<br />

detection systems and to<br />

ensure proper calibration of screening<br />

systems, such as those used to<br />

screen airline passenger luggage.<br />

High-volume Sampling Front-end<br />

Collection Device<br />

U.S. Patent Number: 8,578,796 – issued<br />

November 12, 2013<br />

Inho Cho (Transportation <strong>Security</strong><br />

Laboratory)<br />

a portable, pocket-sized<br />

front-end device that can brush off<br />

particles from a surface or collect<br />

a large volume of air, as in a cargo<br />

container, capturing threat particles<br />

with a specialized system of filters.<br />

The hand-held nature of this device<br />

allows users to quickly collect<br />

samples, and the device can attach<br />

to analytical screening systems to<br />

identify threat particles.<br />

Quick Release Flare Tube Adapter<br />

U.S. Patent Number: 8,770,083 – issued<br />

July 8, 2014<br />

Charles A. Hatfield, Thomas Morrow,<br />

Alexander Brown, Trent Meyers,<br />

and Katie Spira (U.S. Coast<br />

Guard Academy)<br />

an illumination flare mounting<br />

arrangement for use in an aircraft.<br />

Flares are essential in nighttime,<br />

over-water search and rescue;<br />

reconnaissance; and law enforcement<br />

missions when visibility is<br />

vital. Police, military, and paramilitary<br />

organization aircrews can<br />

quickly install or remove this adapter<br />

on a variety of aircraft without<br />

tools or special equipment.<br />

Method and Device for Detecting<br />

Moving Radiation Sources<br />

U.S. Patent Number: 8,916,832 – issued<br />

December 23, 2014<br />

Thomas E. Albert (Domestic Nuclear<br />

Detection Office)<br />

Detects radioactive sources<br />

34 35<br />

Ion Mobility Spectrometer to Mass<br />

Spectrometer Interface<br />

U.S. Patent Number: 8,536,518 – issued<br />

September 17, 2013<br />

Joseph Kozole (Transportation Sethat<br />

are in motion and facilitates the<br />

rapid and accurate identification of<br />

the source of radioactive material.<br />

This invention is intended for use at<br />

seaports and border crossings that<br />

screen cargo containers, vehicles,<br />

or pedestrians for radiological or<br />

nuclear materials and in mobile radiation<br />

detectors deployed in search<br />

operations.<br />

Buoy Split Key Removal Device<br />

U.S. Patent Number: 8,914,962 – issued<br />

December 23, 2014<br />

Jessica Rozzi-Ochs, Bret Jacobson,<br />

Khiem Nagy, Erin Nolan, Evan<br />

Rice, and Sarah Troch (U.S. Coast<br />

Guard Academy)<br />

Utilizing a power screw that<br />

applies steady and controllable compression<br />

to the split key, the device<br />

allows USCg buoy tender crewmembers<br />

to quickly remove split<br />

keys in a safe and efficient manner.<br />

The split key is a butterflied key that<br />

holds a pin in place, connecting a<br />

chain between the buoy and a concrete<br />

block on the floor of a body of<br />

water.<br />

Nuclear Magnetic Resonance Scanning<br />

of Metal Containers Using Medium-field<br />

Technology<br />

U.S. Patent Number: 8,912,795 – issued<br />

December 16, 2014<br />

Joseph S. Broz and Stephen W.<br />

Surko (Contract Laboratory)<br />

More on page 46


CBRNE/Detection<br />

Implant Science’s QS-B220s scores<br />

again in Europe, deepens footprint at<br />

17 airports in France<br />

WiLMiNgtoN, Mass., June 11,<br />

2015 /PR<strong>News</strong>wire/ -- implant<br />

Sciences Corporation (otCQB:<br />

iMSC), a leading manufacturer<br />

of explosives trace detection<br />

(EtD) and drugs trace detection<br />

solutions for homeland security<br />

applications, today announced<br />

that it has signed a contract for<br />

up to 304 of its QS-B220 desktop<br />

explosives trace detectors<br />

across 17 regional airports in<br />

France. The first 106 units are<br />

committed to being delivered<br />

over the next several months.<br />

additional units are expected<br />

to be delivered through fiscal<br />

year 2016 and 2017. The sale was<br />

made through the Company’s<br />

in-country, full-service distributor,<br />

Hi-tech Detection Systems<br />

(HtDS).<br />

“The fact that our QS-B220<br />

had StaC certification prior to<br />

the creation ECaC standards<br />

gave us additional insight into<br />

the French aviation market. our<br />

systems are highly regarded in<br />

the region, and we believe that<br />

procurement agents look to the<br />

QS-B220’s value and performance<br />

and view the choice of<br />

selecting our unit as a ‘smart’<br />

decision,” said Dr. Darryl Jones,<br />

implant Sciences’ Vice President<br />

of global Sales and Marketing.<br />

“We are very proud of the fact<br />

By Steve Bittenbender<br />

The U.S. Department of Health and<br />

About the QS-B220 Desktop<br />

Human Services (HHS) has announced<br />

it awarded a contract to<br />

Explosives Trace Detector<br />

The QS-B220 uses ion<br />

a Pennsylvania firm to develop a<br />

Mobility Spectrometry (iMS)<br />

test kit that will help physicians and<br />

to rapidly detect and identify<br />

other medical personnel quickly<br />

trace amounts of a wide variety<br />

detect if a patient has contracted<br />

of military, commercial, and<br />

the deadly Ebola virus.<br />

homemade explosives. With<br />

The three-year agreement with<br />

significantly lower maintenance<br />

oraSure technologies, inc. includes<br />

requirements than competing<br />

nearly $2 million and options for<br />

more than $8.5 million in additional<br />

funding for possible clinical<br />

systems, the QS-B220 can be<br />

deployed for a much lower total<br />

work and regulatory requirements.<br />

cost of ownership than other<br />

The funding comes from HHS’<br />

approved products. Featuring a<br />

Biomedical advanced Research and<br />

radioactive material-free design,<br />

Development authority (BaRDa).<br />

push-button maintenance and<br />

The company currently uses its<br />

diagnostics, and a patented in-<br />

oraQuick technology to quickly<br />

Cal internal automatic calibration<br />

system, the QS-B220 brings<br />

immunodeficiency Virus is people.<br />

detect Hepatitis C and the Human<br />

new levels of performance and<br />

it was the first company to get Food<br />

convenience to desktop trace detection<br />

users with unsurpassed<br />

approval for the rapid HiV test,<br />

and Drug administration (FDa)<br />

ease of use.<br />

and it’s the only firm with FDa approval<br />

to sell an in-home HiV test.<br />

oraSure announced earlier this<br />

year that it developed an Ebola test<br />

More on page 46<br />

36 00<br />

OS-B220 Desktop<br />

Explosives & Drugs Trace Detector<br />

that this is the second major victory<br />

for us in France.”<br />

“HtDS is an excellent<br />

long-term partner in France.<br />

Their ability to provide superior<br />

in-country support, such as service<br />

and training, makes them<br />

a strong ally and value-add for<br />

implant Sciences. Their sound<br />

customer support capabilities<br />

also proved to be a deciding factor<br />

for this procurement,” stated<br />

Richard Nelson, implant Sciences’<br />

general Manager, EMEa.<br />

OraSure wins $10M<br />

HHS contract to<br />

develop system that<br />

quickly detects Ebola


ROMANOWICH ON SURVEILLANCE John Romanowich, CEO, SightLogix, Inc.<br />

Protecting key areas of critical assets with<br />

wide area solutions<br />

Securing outdoor assets is a challenging task,<br />

and nowhere is that more true than in the protection<br />

of critical infrastructure. <strong>Security</strong> managers<br />

must understand and predict a wide range of possible<br />

threats, ensure accurate detection, plan for<br />

incident confirmation and response, and given<br />

budget constraints, often try to do more with less.<br />

and many critical assets are remotely located and<br />

spread over huge areas – many miles, in some cases<br />

- making it a greater challenge to deploy technologies<br />

that deliver cost-effective and comprehensive<br />

protection. However, a new way of thinking, supported<br />

by new technology, transcends the concept<br />

of perimeter protection and offers a solution that<br />

focuses on the most important areas inside the perimeter,<br />

reducing costs while increasing security<br />

effectiveness.<br />

The Challenge of Critical Assets<br />

High-profile incidents at critical sites around the<br />

country have raised the awareness that much of<br />

our infrastructure remains vulnerable to vandalism,<br />

theft, and sabotage. These critical assets include<br />

airports, utility substations and transmission<br />

lines, power plants and dams, communication<br />

relay stations, rail lines and bridges, airports, and<br />

pipelines, among others. together, these systems<br />

support the everyday operation of our communities,<br />

as well as general commerce and transportation.<br />

a common thread among these systems<br />

is that a single point of disruption can have farreaching<br />

effects. a break-in at a substation can affect<br />

an entire region. Rail incidents can cause huge<br />

amounts of lost revenue. a single intruder can<br />

put an entire airport at risk and cause a general<br />

shutdown. and beyond the inconvenience, these<br />

breaches expose serious vulnerabilities to national<br />

security.<br />

<strong>Security</strong> personnel are aware of this predicament,<br />

and can identify specific locations where<br />

the greatest security risks are located, such as gates<br />

into fenced airports or equipment at a substation.<br />

The challenge is to provide real-time intrusion<br />

detection with enough wide-area coverage to adequately<br />

protect the most important areas of the<br />

perimeter, while also providing enough spot coverage<br />

for sensitive locations within a reasonable<br />

overall budget.<br />

Thermal Cameras Match the Need<br />

For protecting critical asset facilities, it is imperative<br />

to know the nature and location of an intrusion<br />

in real time to be able to mount an effective<br />

response. traditionally, a range of approaches have<br />

been used, from fiber-based or vibration-based<br />

fence line sensors, to PtZ video cameras. today’s<br />

smart thermal cameras offer a unique set of capabilities<br />

and performance that often far exceed the<br />

capabilities of traditional systems at a lower cost,<br />

creating a compelling solution for critical infrastructure<br />

protection.<br />

Smart thermal cameras with on-board video<br />

analytics surpass traditional approaches in a<br />

number of ways. For one, they “see” heat, and are<br />

a perfect human detector in fog, rain, snow, bright<br />

sun or complete darkness. They are immune to<br />

the false alerts generated by visible cameras from<br />

headlights and reflections, while providing very<br />

accurate size filters that ignore small animals,<br />

blowing trash and other movement. Thermal<br />

cameras combine two systems in one – an accurate<br />

detection source with visual verification,<br />

reducing complexity. and they cover very large<br />

areas – a single smart thermal camera can detect<br />

an intruder with accuracy over an area as large as<br />

a football field. This can save construction costs<br />

that would otherwise be spent on poles, power<br />

and communication, costs which often exceed the<br />

price of the detection system itself.<br />

Wide-Area Coverage for Spot Protection<br />

While perimeter protection is essential to critical<br />

infrastructure security, it can be expensive to protect<br />

the entire perimeter. as a result, many sites<br />

which are unable to secure funding for reliable<br />

perimeter detection systems will often stick with<br />

whatever system they have in place, regardless of<br />

how susceptible it may be to nuisance alarms or<br />

how limited its ability to provide reliable detection.<br />

given this reality, in situations where budgetary<br />

limitations simply won’t allow for systems<br />

that protect the entire perimeter, an emerging approach<br />

focuses on securing the most vulnerable<br />

areas within the perimeter using wide-area thermal<br />

detection solutions.<br />

Such a strategy limits detection to specific,<br />

vulnerable areas. Rather than the entire perimeter,<br />

often consisting of miles of fencing, you can start<br />

with defined areas where the most critical incidents<br />

may occur. For example, airports can focus<br />

first on protecting fuel, planes and the main entry<br />

and exit points, solving their most important outdoor<br />

security problems quickly and affordably.<br />

This is where recent innovations play a big<br />

role. today, a single smart thermal camera can detect<br />

intruders with great accuracy over huge areas<br />

covering hundreds of square meters. in this way,<br />

critical sites can immediately address their security<br />

challenges with great effectiveness for the cost<br />

of a few cameras. Such systems can easily be expanded<br />

into a full-scale perimeter system at a later<br />

date as budgets permit.<br />

By using wider-area thermal systems, you<br />

can leverage existing infrastructure where power<br />

and mounting options are already available, while<br />

still securing expansive areas at very low costs.<br />

The result is a cost-effective, highly reliable system<br />

that can be quickly deployed to protect the most<br />

vulnerable assets now, while planning for the entire<br />

perimeter system in the future.<br />

John Romanowich is president/CEO and founder of<br />

SightLogix. He is also chairman of SIA’s Perimeter<br />

<strong>Security</strong> Workgroup.<br />

38 39


State/County/Municipal <strong>Security</strong><br />

Advanced access control software opens new doors<br />

for municipalities<br />

by Robert Laughlin,<br />

President, Galaxy Control Systems<br />

advancements and<br />

innovation in software,<br />

integration and<br />

network infrastructure<br />

are expanding<br />

traditional systems<br />

models for access<br />

control far beyond<br />

simply managing entry<br />

and egress. today’s solutions<br />

have become more robust, providing<br />

a higher level of access<br />

control than ever before.<br />

Municipalities in particular<br />

increasingly recognize the potential<br />

today’s advanced access<br />

control solutions offer and are<br />

employing them across wide area<br />

networks to control, monitor and<br />

manage multiple tenants across<br />

multiple facilities. to further enhance<br />

these solutions, many municipalities<br />

are also implementing<br />

mobile and remote devices<br />

for applications that range from<br />

emergency call centers to mass<br />

transit monitoring and scheduling.<br />

These large-scale security<br />

networks are intricate but robust,<br />

and are playing a critical role in<br />

the revitalization of communities<br />

and major metropolitan<br />

areas across the country.<br />

With networked<br />

platforms driving demand<br />

for higher-level<br />

systems that offer increased<br />

integration and<br />

scalability, innovation<br />

continues to come rapidly<br />

to access control systems,<br />

providing end users with greater<br />

situational awareness and more<br />

heightened security in general.<br />

For municipalities and security<br />

professionals alike, outside-ofthe-box<br />

thinking around the advanced<br />

functionalities of these<br />

systems allows them to implement<br />

truly innovative solutions<br />

in a variety of traditional and<br />

non-traditional applications at<br />

the municipal level. Below are<br />

just some of the potential applications<br />

for which advanced access<br />

control systems can be deployed.<br />

employ multiple access control<br />

systems from multiple manufacturers.<br />

These legacy systems may<br />

not able to communicate or integrate<br />

with each other, making<br />

management and maintenance<br />

tremendously – and needlessly<br />

– complicated. By deploying an<br />

advanced access control solution,<br />

municipalities can create custom<br />

systems that standardize this array<br />

of diverse solutions into a single<br />

interconnected system. Many<br />

of today’s access control solutions<br />

are designed to be backward compatible<br />

with legacy systems while<br />

also offering the ability to rapidly<br />

grow and expand as municipalities’<br />

needs evolve, ensuring that<br />

municipalities’ past and present<br />

investments will continue to offer<br />

innovation and advanced functionality<br />

in the future.<br />

Flexibility<br />

is different – even among facilities<br />

that have been built using the<br />

same design and construction<br />

models – and each location presents<br />

a unique set of challenges.<br />

Leading access control systems<br />

allow custom deployments that<br />

meet each facility’s specific needs.<br />

an example of an innovative application<br />

of this capability can be<br />

seen in custom elevator interfaces<br />

to establish specific rules for each<br />

credential holder that restrict unauthorized<br />

floor access to potentially<br />

sensitive areas for buildings<br />

that include both municipal offices<br />

and non-municipal tenants.<br />

Integration<br />

in addition to buildings that<br />

Network<br />

house municipal offices, many<br />

Municipal applications involve a<br />

other locations must also be secured;<br />

this includes maintenance<br />

ployees spread across a variety of<br />

potentially large number of em-<br />

Standardization facilities, parking garages, transit<br />

stations and more. Every site tials. another potential applica-<br />

backbone on which advanced ac-<br />

sites, which makes the network<br />

Many municipalities currently<br />

40 41<br />

tion would be to integrate access<br />

control and video surveillance<br />

systems with facial recognition<br />

technology to verify that a person<br />

using credentials to enter a<br />

maintenance facility is who they<br />

say they are.<br />

Management<br />

Networked access control systems<br />

enable a number of advanced capabilities,<br />

such as real-time identity<br />

management, individualized<br />

identity-based door access and<br />

the ability to generate specific reports<br />

for each credential holder.<br />

integrated systems also allow a<br />

wide variety of data to be fed into<br />

a central command center, where<br />

staff can perform photo and/or<br />

badging functions and overall<br />

monitoring of the various facilities<br />

within the access control network.<br />

This approach significantly<br />

streamlines the process, making<br />

operations and personnel more<br />

efficient and offering municipalities<br />

the potential to save significantly<br />

on staff costs.<br />

advanced access control solutions<br />

are capable of integrating<br />

with parking, video, time and attendance,<br />

identity management<br />

and other security and non-security<br />

systems to provide more<br />

complete information that enables<br />

better management of access<br />

control, including policies<br />

and procedures. For example,<br />

municipalities can integrate human<br />

resources and access control<br />

systems to allow personnel<br />

data to be used to populate and<br />

program identity card data fields<br />

to create access control creden-<br />

cess control systems live crucial.<br />

of the available network topologies,<br />

fiber optic offers the fastest<br />

and most reliable communication<br />

between devices at multiple<br />

locations and the access control<br />

management software. While the<br />

initial planning and installation<br />

logistics of bringing these networks<br />

to fruition can be difficult,<br />

the payoff is well worth the cost<br />

and effort. in situations where<br />

video surveillance is integrated<br />

with access control, municipalities<br />

benefit from the real-time<br />

situational awareness these combined<br />

solutions can deliver.<br />

Wireless<br />

The emergence of wireless readers<br />

and networks has brought<br />

further innovation and heightened<br />

performance by expanding<br />

the capabilities of access control<br />

solutions. For example, municipalities<br />

are capable of deploying<br />

wireless access control and other<br />

solutions at remote sites and/or<br />

in mobile locations, such as transit<br />

facilities, buses and trains. innovation<br />

in wireless technologies<br />

allows these systems to tie in with<br />

each other and with access control<br />

software to provide real-time<br />

situational awareness when and<br />

More on page 43


State/County/Municipal <strong>Security</strong><br />

Ohio commission provides $17 million<br />

funding to bolster school security<br />

The state of ohio is making $17 million available<br />

to schools in the state to reimburse them for<br />

making security upgrades.<br />

it’s the second year for the program, which<br />

is run by the ohio School Facilities Commission,<br />

said Rick Savors, a spokesman with the ohio<br />

Facilities Construction Commission. Last year,<br />

about $12 million was made available to school<br />

districts through the oFCC’s School Facilities<br />

Commission. More than 600 districts submitted<br />

more than 3,700 applications, according to the<br />

School Facilities Commission.<br />

While the latest round precludes recipients<br />

from the initial funding, state lawmakers decided<br />

to expand the program and allow private, parochial<br />

and nonpublic charter schools to receive<br />

funding. The funding originates from state capital<br />

bonds, and as such, they cannot be used to hire<br />

personnel, including resource officers.<br />

Specifically, the funding can be used for one<br />

of two grant programs. Schools can receive up<br />

to $2,000 per eligible building for an emergency<br />

communications system, or they can receive up<br />

to $5,000 per building for entrance improvements.<br />

The deadline to apply is oct. 16.<br />

The grant program comes at a time when<br />

more school districts are spending funds on<br />

increasing or enhancing security. according to<br />

the U.S. Department of Education, 75 percent of<br />

schools surveyed said they use at least one camera,<br />

up from about 60 percent five years ago.<br />

The Loveland City School District, which is<br />

located just outside of Cincinnati in the southwest<br />

corner of the state, received funds to have<br />

cameras installed outside entry doors at the<br />

middle, elementary and early childhood center.<br />

it also paid for a wide-angle camera positioned<br />

outside of the high school. That camera allows<br />

the receptionist and attendance clerk to better<br />

monitor arrivals. Both personnel have the ability<br />

to put the school on lockdown, if necessary, according<br />

to a district release.<br />

“The district strives to be as open and welcoming<br />

as possible,” said John ames, Loveland’s<br />

business manager. “all secretaries and receptionists<br />

plan to operate their entryways as they have<br />

in the past with the door being open during the<br />

school day. However, the new security measures<br />

give those professionals the ability to secure the<br />

doors on a moment’s notice should the need<br />

arise.”<br />

The Northwest Local School District, which<br />

is also near Cincinnati, announced last month<br />

that it received $10,000 to purchase a communications<br />

system for its schools and a couple nearby<br />

private schools. The system will give each school<br />

the ability to contact first responders immediately<br />

in times of crisis.<br />

in order to receive the communications<br />

grant, the system<br />

purchased for the school must<br />

be compatible to ohio’s Multiagency<br />

Radio Communications<br />

System or another local emergency<br />

system if first responders<br />

in the area are not a part of<br />

MaRCS, Savors said.<br />

Several schools have used<br />

grant funding to purchase wireless<br />

communications systems,<br />

such as the tattletale alarms<br />

marketed by argus agents. Using<br />

technology that has been<br />

proven effective at banks and<br />

hospitals, tattletale gives teachers<br />

a panic button they can use<br />

to alert first responders and<br />

school officials.<br />

Lial Catholic School, located<br />

near toledo, and Cleveland’s<br />

Ruffing Montessori used grant<br />

money to buy tattletale systems.<br />

“our schools are underfunded<br />

and grants like the oSFC<br />

are essential to improve student<br />

safety. in many applications a<br />

$2,000 grant can fully cover the<br />

cost of a tattletale Panic Button<br />

System,” argus CEo David Wahl<br />

said.<br />

For more information about<br />

the commission and its grant program,<br />

go to: http://ofcc.ohio.gov/<br />

ServicesPrograms/School<strong>Security</strong>-<br />

Grants/RoundTwo.aspx<br />

Advanced access control software<br />

Continued from page 39<br />

where it is needed.<br />

The combination of solidly<br />

built hardware and a variety of<br />

robust software-based capabilities<br />

allow access control systems<br />

to transcend their traditional<br />

roles and become the single platform<br />

that allows users to monitor<br />

facilities and share data with<br />

other systems. The potential innovative<br />

applications these advanced<br />

solutions enable have the<br />

potential to deliver heightened<br />

situational awareness and overall<br />

security, and their possible<br />

uses are seemingly limited only<br />

by the imagination. as a result,<br />

advanced access control software<br />

and solutions are ideally suited<br />

for municipalities and security<br />

professionals who can think creatively<br />

to identify non-traditional<br />

applications and implement truly<br />

innovative solutions on the metro<br />

level.<br />

42 43


State/County/Municipal <strong>Security</strong><br />

Leading Through Crisis workshop provides<br />

life-saving disaster response and recovery skills to<br />

local elected and appointed officials<br />

When disaster strikes, county<br />

executives, mayors, city managers<br />

and other elected or appointed officials<br />

can find themselves in deep<br />

and swift unknown waters, making<br />

decisions that impact the lives and<br />

safety of their friends, neighbors<br />

and other constituents.<br />

All too often in recent years,<br />

catastrophes and natural disasters<br />

have demonstrated that many local<br />

government leaders have found<br />

themselves unprepared to respond<br />

to and recover from a disaster impacting<br />

their communities – even<br />

though they may have run outstanding<br />

campaigns to get elected<br />

in the first place.<br />

It seems that, as<br />

matter of public safety<br />

and security, they would<br />

have an understanding<br />

of emergency preparedness<br />

before reaching the<br />

point of decision making.<br />

But many admittedly<br />

do not, according to<br />

Paul Goldenberg, CEO<br />

of New Jersey-based Cardinal Point<br />

Strategies, which has developed a<br />

training program called “Leading<br />

Paul Goldenberg<br />

through Crisis” that is specifically<br />

geared to elected officials in state,<br />

county and municipal government.<br />

The program provides a<br />

four-hour training course in crisis<br />

planning, crisis decision making,<br />

economic risk management, crisis<br />

communications, and jurisdictional<br />

capabilities, resources and systems,<br />

says Goldenberg. Using a collection<br />

of several case studies as a defining<br />

focus, subject matter experts<br />

develop training modules along six<br />

domains:<br />

• Understanding the role of the<br />

Elected Official: A 360 Snapshot<br />

• Emergency Decision-Making<br />

• Emergency Planning<br />

• Economic Risk<br />

Management<br />

• Jurisdictional Capabilities,<br />

Resources and<br />

Systems<br />

• Emergency Communications<br />

Kevin Child, part-time<br />

emergency management coordinator<br />

for the town of Avon-by-the sea,<br />

and a full-time risk control con-<br />

sultant for 36 municipalities, was<br />

among the attendees at a Leading<br />

through Crisis program sponsored<br />

by the Monmouth County, N.J.<br />

Sheriff ’s Department on June 1, the<br />

official start of hurricane season,<br />

attracting many full- and even parttime<br />

officials, though some elected<br />

officials still delegated attendance<br />

at the training to others in their<br />

municipalities.<br />

“This is a game plan that<br />

helps you determine what are your<br />

resources? Who can you turn to, to<br />

get help?” Child says. He describes<br />

the training as a framework that allows<br />

leaders to essentially fill in the<br />

blanks about what they have readily<br />

available, what they could need in<br />

event of a crisis and where they<br />

might find it. “The planning book<br />

doesn’t give you all the answers, but<br />

steers you to find those answers.<br />

“It’s important, especially<br />

for a newly elected official, to look<br />

for this before you need it rather<br />

than when you need it,” Child says.<br />

“FEMA (Federal Emergency Management<br />

Administration) will help,<br />

but will not bail out poor decision-<br />

More on page 48<br />

DoD awards grant to study how radiation affects<br />

computer memory<br />

By Steve Bittenbender<br />

The Department of Defense has<br />

awarded the University of Louisville<br />

a $1 million grant to study the<br />

effect radiation produces devices<br />

and chips that store memory for<br />

computers and peripherals.<br />

Professors from UofL’s J.B.<br />

Speed School of Engineers are<br />

leading the three-year program to<br />

develop systems that will protect<br />

memory devices from radiation<br />

exposure. Specifically, the DoD’s<br />

Defense Threat Reduction Agency<br />

is looking for a way to protect<br />

memory and access from a dirty<br />

bomb or reactor meltdown.<br />

Louisville engineers believe<br />

implementing electrical and mechanical<br />

elements – otherwise<br />

known as micro-electro-mechanical<br />

systems or MEMS – that are<br />

thinner than a strand of human<br />

hair could harden the electronics<br />

enough to protect the memory<br />

stored on devices.<br />

While more is known about<br />

the impact an electromagnetic<br />

pulse can have on electronic equipment,<br />

according to UofL officials,<br />

studying radiation’s effects is the<br />

first of its kind.<br />

“People haven’t done a lot of<br />

work in this area, so<br />

we don’t know exactly<br />

what to expect,” said<br />

Dr. Bruce Alphenaar,<br />

who chairs the school’s<br />

electrical and computer<br />

engineering department.<br />

“But this type of<br />

study is essential before<br />

MEMS can be used<br />

in radiation-exposed<br />

environments.”<br />

If successful, the<br />

program could help develop hardware<br />

that allows first responders<br />

to gain and maintain access to the<br />

systems critical to restore essential<br />

services. Those responders could be<br />

on or near-site, like a NEST team<br />

or federal officials miles away who<br />

need to access data from systems in<br />

hot zones.<br />

“If they do function, then<br />

these mechanical memories could<br />

be a viable replacement for normal<br />

standard electronic memory and<br />

logic devices,” he added.<br />

It also could protect the<br />

encryption protocols that radiation<br />

can render useless. If the encryption<br />

becomes corrupted, then you<br />

run a serious risk of losing data<br />

stored on those systems or make<br />

it available to hackers and other<br />

44 45<br />

Dr. Bruce Alphenaar<br />

cybercriminals, said<br />

Alphenaar.<br />

University officials<br />

developed the first<br />

devices earlier this year,<br />

Alphenaar said. Those<br />

devices have been<br />

exposed to radiation<br />

at Vanderbilt University’s<br />

Institute for Space<br />

and Defense Electronics.<br />

Once Vanderbilt<br />

researchers finish their<br />

tests, the devices will go back to<br />

UofL for further research and development.<br />

While the grant is for three<br />

years, Alphenaar said there’s a<br />

five-year research plan in place if<br />

it proves to be viable. The possibility<br />

also exists, he said, for possible<br />

technology transfer opportunities<br />

down the road.<br />

As the project moves forward,<br />

Alphenaar said the University plans<br />

to hire someone with advanced<br />

manufacturing experience so they<br />

can help researchers develop future<br />

prototypes<br />

In addition to Alphenaar,<br />

Kevin Walsh, Samuel T. Fife Endowed<br />

Professor of Electrical and<br />

Computer Engineering and the<br />

More on page 48


Keynote address: Senator Johnson<br />

Continued from page 23<br />

general Electric, pay<br />

no taxes at all in the<br />

United States, pursuant<br />

to laws that they<br />

actually wrote?”<br />

Responding to this question,<br />

the Senator gave some perfectly<br />

reasonable answers in his 20-25<br />

minute response. “The solution is<br />

economic growth”, he said. “You<br />

are always going to have overseas<br />

taxes.” These proposed solutions,<br />

however, trended quickly toward<br />

more debatable ones, including:<br />

getting all business taxes from<br />

employees, making every business<br />

a pass-through entity, taxing only<br />

business owners, and increasing<br />

taxes on capital gains, capped off<br />

by one of the all-time fiscal security<br />

favorites: “get rid of the tax code.”<br />

Following that, we could presumably<br />

adopt a variation on the old<br />

Russian proverb: “The shortage will<br />

be divided among the peasants”,<br />

which could be updated to “The<br />

shortage will be covered by cuts<br />

from Social <strong>Security</strong>, Medicare and<br />

Public School education.”<br />

NIC expert offers solutions<br />

Continued from page 25<br />

the attack’s impact.<br />

DDoS attacks are solvable<br />

problems, but agencies should seek<br />

out expert partners and be proactive<br />

in determining – before an<br />

incident occurs – what the solution<br />

will be.<br />

About the author: Rodney Caudle is<br />

Director of Information <strong>Security</strong> at<br />

NIC Inc., the nation’s largest e<strong>Government</strong><br />

services provider. He has<br />

more than 20 years of experience<br />

in information security. He can be<br />

reached at rodney.caudle at egov.<br />

comt.<br />

DHS Science & Technology<br />

Patent Awards<br />

Continued from page 35<br />

Scans metal containers and discriminates<br />

benign liquids, such as<br />

lotions, drinks, and pharmaceutical<br />

liquids, from threat liquids, such as<br />

components of homemade explosives.<br />

These advances in scanning<br />

will help the civil aviation industry,<br />

as well as other mass transportation<br />

agencies, detect liquid explosive<br />

threats.<br />

Method for Identifying Materials Using<br />

Dielectric Properties through<br />

Active Millimeter Wave Illumination<br />

U.S. Patent Number: 8,946,641 – issued<br />

February 3, 2015<br />

Barry T. Smith, James C. Weatherall,<br />

and Jeffrey B. Barber (Transportation<br />

<strong>Security</strong> Laboratory)<br />

Helps detect concealed explosives,<br />

narcotics, weapons, and other<br />

contraband based on the reflected<br />

radiation returned from the body of<br />

an inspected subject. This screening<br />

method is noninvasive and does not<br />

require contact as the millimeter<br />

waves can penetrate clothing and<br />

distinguish benign materials from<br />

contraband.<br />

OraSure wins $10M HHS contract<br />

Continued from page 37<br />

using the same platform. The test<br />

can identify the virus’ presence just<br />

from using the patient’s blood or<br />

saliva on test strips much like the<br />

ones used for other ailments, like<br />

strep throat.<br />

The Ebola threat made headlines in<br />

the United States and other parts of<br />

the world last year, but only person<br />

in america died as a result. While<br />

there appears to be no evidence<br />

of the virus in the U.S. right now,<br />

health officials take the threat the<br />

virus poses very seriously, as it has<br />

led to more than 11,000 deaths in<br />

guinea, Liberia and Sierra Leone in<br />

the last 15 months.<br />

oraSure’s technology could enable<br />

medical professionals to detect<br />

Ebola’s presence in as little as 20<br />

minutes. With a virus as deadly as<br />

Ebola, the response time is critical<br />

to save lives and limit exposure to<br />

the public.<br />

“We believe that the availability<br />

of an accurate and simple rapid<br />

Ebola antigen test will be critical to<br />

containing and controlling current<br />

and future Ebola outbreaks,” said<br />

Douglas a. Michels, President and<br />

Chief Executive officer of oraSure<br />

technologies. “We are grateful<br />

to BaRDa for making this funding<br />

available as it will enable us to<br />

complete key clinical activities and<br />

obtain important regulatory approvals<br />

for this product.”<br />

according to BaRDa officials, the<br />

oraSure project is that latest in the<br />

agency’s effort to advance testing<br />

and development of products<br />

that will help prevent and detect<br />

public health emergencies. Those<br />

emergencies include chemical,<br />

biological, radiological and nuclear<br />

(CBRN) agents, flu pandemics and<br />

other serious contagious diseases.<br />

“Fast and inexpensive point-of-care<br />

diagnostics will improve our ability<br />

to control Ebola virus disease<br />

outbreaks,” said Robin Robinson,<br />

Ph.D., director of aSPR’s Biomedical<br />

advanced Research and Development<br />

authority (BaRDa), which<br />

will oversee this development<br />

program for HHS. “Faster diagnosis<br />

of Ebola virus infections allows<br />

for more immediate treatment and<br />

an earlier response to protect public<br />

health worldwide.”<br />

if successful, oraSure officials plan<br />

to market the test kit to both government<br />

agencies and non-governmental<br />

organizations. it currently<br />

sells its other products to laboratories,<br />

health care providers, colleges<br />

and other commercial entities.<br />

New from <strong>Government</strong> <strong>Security</strong> <strong>News</strong>:<br />

Post Your Video on the Busiest Website<br />

in Homeland <strong>Security</strong>!<br />

Selections from 20 Targeted Categories including Home Page<br />

Technology Sectors<br />

Access Control/Identification CBRNE/<br />

Detection Communications<br />

Cyber <strong>Security</strong><br />

Disaster Preparedness/Emergency<br />

Response<br />

Education/Training<br />

IT <strong>Security</strong><br />

Perimeter Protection<br />

Video Surveillance/Analytics<br />

CLICK HERE TO VIEW VIDEO<br />

Market Sectors<br />

Airport Aviation<br />

Border <strong>Security</strong><br />

Federal Agencies & Legislative<br />

Infrastructure Protection<br />

Law Enforcement/First Responders<br />

Maritime/Port <strong>Security</strong> Military/Force<br />

Protection<br />

State & Local <strong>Security</strong><br />

<strong>Security</strong> Services<br />

Your Video Posting includes:<br />

• Posting of your Video(s) on GSN website channel(s) for one month<br />

• Headline and 100 word description of each Video, created by your team<br />

• Notice of your videos on home page, sector channels of GSN website and in<br />

GSN’s Daily Insider newsletter, Digital and Print editions<br />

Sign up for your company’s Video Posting here and join<br />

colleagues that have received thousands of downloads!<br />

Home Page of GSN website – $500 per month; $200 each additional Channel<br />

All other Channels – $300 first channel; $200 each additional Channel<br />

Contact GSN Publisher Mike Madsen by phone or email at:<br />

Phone: 732-233-8119 • Email: mmadsen@gsnmagazine.com<br />

46


Leading Through Crisis workshop<br />

Continued from page 44<br />

making.”<br />

In the case of a resource-strapped or small town,<br />

Child says, the training shares how preparation might<br />

mean looking at businesses and residents in a new light.<br />

While the town may not have a tree expert on staff, it<br />

might have a local tree cutting business or demolition<br />

company that could help in case of a crisis. “Maybe you<br />

can’t afford all these things but there are people within<br />

every town that have certain talents and abilities.”<br />

Having these contacts and relationships in place<br />

before a crisis happens is critical, the experts say.<br />

“We don’t appreciate or value training until we’re<br />

standing in front of a judge, until we’re meeting with<br />

the family or loved ones of someone who was killed in a<br />

flood or by an active shooter, or we’re answering a lawsuit,<br />

spending tens of millions where we could have spent tens<br />

of thousands on training,” says Paul Goldenberg, Cardinal<br />

Point Strategies CEO.<br />

“I don’t think some of them realize<br />

how things can happen,” says Child.<br />

“Sometimes, they don’t think they<br />

need it until they’re hit with that situation<br />

or crisis.”<br />

For additional information please<br />

contact CPS Director of Training & Development Tom Walton<br />

at twalton@cpsinc.us.<br />

DoD awards grant to study how radiation affects<br />

computer memory<br />

Continued from page 45<br />

founding director of the Micro/Nano Technology Center,<br />

and Shamus McNamara, associate professor of electrical<br />

and computer engineering, are co-principal investigators.<br />

“This is a great example of the kind of groundbreaking<br />

research that our engineers do every day,” said John<br />

Usher, acting dean of the Speed School. “They are working<br />

– often in partnerships with other universities, agencies and<br />

companies – to make our world a better, and safer, place.”<br />

Coming Attractions<br />

July – September 2015<br />

July Print Edition:<br />

Technology Focus –<br />

Law Enforcement/Public Safety Communications<br />

Market Sector Focus –<br />

Education and Training Resources<br />

August Digital Edition:<br />

Technology Focus –<br />

Cybersecurity & Convergence<br />

Market Sector Focus –<br />

Emergency Preparedness/Disaster Response<br />

September Print Edition:<br />

Technology Focus –<br />

Mass Notification/Short Wave Infrared<br />

Market Sector Focus –<br />

Maritime/Port <strong>Security</strong><br />

For GSN Media Kit or Advertising Rates,<br />

contact Publisher Mike Madsen<br />

at 732-233-8119<br />

or by email at mmadsen@gsnmagazine.com<br />

Publisher:<br />

Michael Madsen<br />

(O) 212-344-0759, X1<br />

(C) 732-233-8119<br />

mmadsen@gsnmagazine.com<br />

Executive Editor:<br />

John Wagley<br />

(O) 212-344-0759, X2<br />

(C) 202-425-0196<br />

wagley.jr@gmail.com<br />

Senior Writer:<br />

Lorrie Barclay<br />

(O) 212-344-0759, X5<br />

(C) 508-685-0652<br />

lorriebarclay@gmail.com<br />

Senior Writer:<br />

Steve Bittenbender<br />

(C) 502-552-1450<br />

freelancehack@gmail.com<br />

The <strong>News</strong> Leader in Physical, IT and Homeland <strong>Security</strong><br />

Columnist:<br />

John Convy<br />

Convy on Netcentric <strong>Security</strong><br />

john@convyassociates.com<br />

Columnist:<br />

John Romanowich<br />

Romanowich on Video Surveillance<br />

jromanowich@sightloxic.com<br />

Guest Expert Contributor:<br />

Denise Rucker Krepp<br />

(C) 202-546-2533<br />

kdrkrepp@hotmail.com<br />

Art Director:<br />

Gerry O’Hara<br />

OHDesign3<br />

(C) 203-249-0626<br />

gerry@ohd3.com<br />

Production/Design Specialist:<br />

Brenden Hitt<br />

(C) 315-723-6203<br />

brenden@ihitt.com<br />

Editorial Director/CEO:<br />

Adrian Courtenay<br />

(O) 212-344-0759, X3<br />

(C) 917-696-5782<br />

acourtenay@gsnmagazine.com<br />

Mailing Address:<br />

<strong>Government</strong> <strong>Security</strong> <strong>News</strong><br />

P.O. Box 7608<br />

Greenwich, CT 06836<br />

<strong>Government</strong> <strong>Security</strong> <strong>News</strong> (ISSN 1548-940X and UPS 022-845) is published in six print editions (Jan, Mar, May, Jul, Sep, Nov) and<br />

six digital editions (Feb, Apr, Jun, Aug, Oct, Dec) per year by World Business Media, LLC, P.O. Box 7608, Greenwich, CT 06836.<br />

Telephone (212) 344-0759. Periodicals postage paid at New York, NY and additional mailing offices. POSTMASTER: Send address<br />

changes to GSN: <strong>Government</strong> <strong>Security</strong> <strong>News</strong>, Subscription Department, P.O. Box 316, Congers, NY 10920-0316. For <strong>Government</strong><br />

decision makers and business executives involved with security products, systems and series. Qualified U.S. subscribers received<br />

GSN: <strong>Government</strong> <strong>Security</strong> <strong>News</strong> at no charge. Non-qualified subscribers in the U.S. are charged $75.00 per year. Canadian and<br />

foreign subscribers are charged $140 International Airmail. Copyright 2015 by GSN: <strong>Government</strong> <strong>Security</strong> <strong>News</strong>. All rights reserved.<br />

Printed in the U.S.A. GSN: <strong>Government</strong> <strong>Security</strong> <strong>News</strong> assumes resonsibility for validity of claims in items reported.<br />

48 49


Secure access<br />

to cloud, data<br />

and door<br />

Go beyond simple passwords. Protect your<br />

organisation with cost-effective, risk appropriate<br />

Identity Assurance Solutions from HID Global.<br />

With the ever increasing risk from advanced IT security threats, organisations are looking to take authentication<br />

beyond passwords, while lowering cost at the same time. HID Global’s authentication solution provides you<br />

with the convenience, flexibility and comprehensive control you need to deliver secure access, without<br />

compromising on security. HID Global can empower your employee’s, partners and customers with anytime,<br />

anywhere access to enterprise cloud applications, data and the door.<br />

Experience authentication beyond passwords. hidglobal.com<br />

© 2015 HID Global Corporation/ASSA ABLOY AB. All rights reserved. HID, HID Global, the HID Blue Brick logo, and the Chain Design are trademarks or registered trademarks of HID Global or its<br />

licensor(s)/supplier(s) in the US and other countries and may not be used without permission.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!