09.11.2015 Views

October/November 2015 Digital Edition

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Government Security News<br />

<strong>October</strong>/<strong>November</strong> <strong>2015</strong> <strong>Digital</strong> <strong>Edition</strong><br />

OnSSI and Galaxy Control deliver seamlessly integrated VMS and access control solution<br />

More on Page 30<br />

Also in this issue:<br />

Mutualink Awarded SAFETY Act Designation and Certification from DHS Page 6<br />

Ireland rolls out new, state of the art passport card Page 4<br />

ThreatConnect & Defense Group (DGI) uncover South Chinese espionage campaign Page 8<br />

United Nations Report highlights worsening crisis in Northern Triangle Americas Page 14<br />

Oslo Airport selects Qognify, formerly Nice Security, for major airport expansion Page 17<br />

New GSN Column: Campbell on Crypto, An intro into why cryptography is important Page 24


gSN <strong>October</strong>/<strong>November</strong> <strong>Digital</strong> edition<br />

table of contents<br />

GSN TECHNOLOGY SPOTLIGHT<br />

Under the leadership of CEO Mark Hatten, privately held Mutualink, Inc.<br />

has been awarded the SAFETY Act Designation and Certification from<br />

DHS and is now designated as a Qualified Anti-Terrorism Technology<br />

(QUATT). The company’s interoperable communications platform enables<br />

community-wide sharing of push to talk radio, voice, text, video,<br />

data files and telecommunications in a secure environment. Mutualink<br />

is the only multi-media interoperable communications product certified<br />

under the SAFETY Act. Its products are deployed by hundreds of public<br />

and private entities worldwide, including homeland security and defense<br />

installations. A hands-on demonstration will take place on <strong>November</strong> 3-4<br />

in Alexandria, VA. Read more on Page 6.<br />

Al Bovic, Engineering Chair at the University of Texas, has received an<br />

EMMY for inventing a tool that allows broadcasters and streaming video<br />

sites to compress and distribute video with minimum distortion. Two of<br />

Bovic’s former students, Zhou Wang and Hamed Sheikh and collaborator<br />

NYU University Professor Eero Simonelli were also honored. Their<br />

“SSIM Index” has become a de facto standard in television broadcasting<br />

and has been widely commercialized, and is part of the global ITU standard<br />

H.264 video coding reference software. Read more on Page 27.<br />

2


NEWS AND FEATURES<br />

Ireland rolls out new, state-of-the-art<br />

Passport Card Page 4<br />

Mutualink awarded SAFETY Act<br />

Designation/Certification from Department of<br />

Homeland Security Page 6<br />

ThreatConnect, Inc & Defense Group uncover<br />

extensive South Chinese espionage campaign<br />

targeting South China Sea interests Page 8<br />

FAA Administrator Huerta announces<br />

UAS Registration Task Force Members Page 10<br />

Cloud security trending as preferred<br />

approach for states and other government<br />

agencies Page 12<br />

UN Report Highlights Worsening Refugee<br />

Crisis in the Americas Page 14<br />

NICE Systems now Qognify as Battery Ventures<br />

completes acquisition of physical security unit<br />

Page 16<br />

Oslo Airport selects Qognify,<br />

formerly NICE security, for major airport expansion<br />

project Page 17<br />

Police officers receive life-saving training from<br />

the University of Louisville to help accident and crime<br />

victims Page 20<br />

NTSB confirms wreckage discovered to be<br />

El Faro Page 21<br />

America’s Flagship, The SS United States,<br />

may only have weeks left afloat Page 22<br />

Campbell on Crypto – What comes after perimeter<br />

protection? An intro to why cryptography is important<br />

Page 24<br />

Intelligent Video Surveillance<br />

____________________________________<br />

NSF-supported engineer and vision scientist<br />

Al Bovic awarded Emmy for tool that predicts<br />

perceived video quality Page 27<br />

OnSSI and Galaxy Control deliver seamlessly<br />

integrated VMS and access control solution Provides<br />

Heightened Situational Awareness and Streamlined<br />

Investigations Page 30<br />

PureTech Systems supports upgrade of<br />

Remote Video Surveillance System for Customs and<br />

Border Protection Page 32<br />

Milestone goes wide with new device pack<br />

Page 34<br />

Using video intelligence to protect critical<br />

public infrastructure Page 36<br />

Louroe CEO discusses emerging surveillance<br />

technologies: Audio Analytics Page 38<br />

3


Ireland rolls out new, state-of-the-art<br />

Passport Card<br />

mONtreal, <strong>October</strong> 12, <strong>2015</strong><br />

– international civil aviation Organization<br />

(icaO) eleventh Symposium<br />

and exhibition – DlrS<br />

limited, the leading security printing<br />

company in ireland, today announced<br />

the successful roll-out of<br />

the irish Passport card.<br />

DlrS limited joined forces with<br />

HiD global® ireland teoranta, a<br />

worldwide leader in secure identity<br />

solutions, together with absolute<br />

graphics and Purple Pod, to implement<br />

the irish Passport card project.<br />

Working together, the companies<br />

are providing an end-to-end<br />

solution including enrolment via<br />

mobile app, highly secure icaOcompliant<br />

smart cards, card personalization<br />

and production management.<br />

“The introduction of the passport<br />

card is a significant innovation that<br />

will enhance the travel experience<br />

for irish people as they go on holidays<br />

or business trips to 30 countries<br />

throughout europe,” said minister<br />

for Foreign affairs and trade,<br />

mr. charlie Flanagan t.D, speaking<br />

at the card’s launch in Dublinon<br />

monday 5/10/15.”<br />

DlrS, a leader in security printing,<br />

is the prime<br />

contractor for the<br />

project. additionally,<br />

DlrS provided the<br />

security design, app<br />

development and<br />

security numbering<br />

alongside its partners<br />

HiD global, absolute<br />

graphics and<br />

Purple Pod.<br />

“We have delivered<br />

a state-of the-art Passport card solution,<br />

which leads the way in secure<br />

mrtD deployment and further<br />

demonstrates that ireland is<br />

at the cutting edge of innovation in<br />

the technological arena,” said David<br />

O’connor, Sales Director, DlrS.<br />

The Passport card enrolment process<br />

relies on cutting-edge technology<br />

that adheres to the highest levels<br />

of security. This process allows<br />

users to submit a passport-compliant<br />

photo taken on mobile phones<br />

or upload a suitable photo to the<br />

website, where advanced biometric<br />

algorithms test each one to ensure<br />

icaO standards are reached. Once<br />

all verification checks have been<br />

achieved, the user can pay their fees<br />

through the secure elavon payment<br />

4<br />

gateway (powered by realex Payments).<br />

The new irish Passport card is a<br />

highly sophisticated secure polycarbonate<br />

card with embedded<br />

hologram, crack prevention and<br />

Dbondtm technology, supplied by<br />

HiD global in galway, ireland.<br />

“We are proud to extend our partnership<br />

with DlrS to deliver this<br />

ground-breaking solution to the<br />

Department of Foreign affairs and<br />

the citizens of ireland.” said rob<br />

Haslam, vice president of government<br />

iD Solutions for HiD global.<br />

“The irish Passport card heralds a<br />

new standard in security and durability<br />

for smart cards. This bespoke<br />

implementation of our OSm multitech<br />

technology, combined with the


unique design and mobile applications,<br />

make this a truly exceptional<br />

credential program.”<br />

About HID Global<br />

HiD global is the trusted source<br />

for innovative products, services,<br />

solutions, and know-how related to<br />

the creation, management, and use<br />

of secure identities for millions of<br />

customers around the world. The<br />

company’s served markets include<br />

physical and logical access control,<br />

including strong authentication<br />

and credential management;<br />

card printing and personalization;<br />

visitor management systems; highly<br />

secure government and citizen iD;<br />

and identification rFiD technologies<br />

used in animal iD and industry<br />

and logistics applications. The<br />

company’s primary brands include<br />

activiD®, easylobby®, FargO®,<br />

identrust®, lasercard®, lumidigm®,<br />

Quantum Secure, and HiD®. Headquartered<br />

in austin, texas, HiD<br />

global has over 2,200 employees<br />

worldwide and operates international<br />

offices that support more<br />

than 100 countries. HiD global® is<br />

an aSSa ablOY group brand.<br />

For more information, visit http://<br />

www.hidglobal.com.<br />

About Absolute Graphics<br />

and Purple Pod<br />

absolute graphics is an internationally<br />

recognised design company<br />

specializing in the Passport and<br />

secure documents sector. Having<br />

won regional iD Document of the<br />

Year at the High Security Printing<br />

conference 2014 in milan for the<br />

irish Passport production, absolute<br />

graphics is a well-established player<br />

in the secure document design arena.<br />

Purple Pod is an irish technology<br />

company with considerable experience<br />

in the development of highly<br />

secure mobile applications. They<br />

also specialise in standards based<br />

and bespoke biometric facial recognition<br />

enrolment solutions and have<br />

expertise in every facet of development<br />

technologies from low level<br />

firmware coding to bespoke mobile<br />

app development.<br />

These two companies joined forces<br />

to provide the design and frontend<br />

solutions for the irish Passport<br />

card project.<br />

About DLRS Group<br />

5<br />

DLRS Group Security concepts<br />

is ireland’s largest security printer.<br />

established since 1976, the company<br />

has a production facility in the<br />

republic of ireland servicing the<br />

needs of major financial and government<br />

bodies. DLRS Group Security<br />

concepts is the market leader<br />

in security printed products, with<br />

over 25 years’ experience in passport<br />

manufacture and design. The<br />

company’s reputation for quality<br />

and service is matched only by its<br />

reputation for unrivalled integrity,<br />

developed through working closely<br />

with governments for over 30 years.<br />

DLRS Group Security concepts<br />

is accredited to iSO9001:2008 the<br />

quality standard, iSO14001:2004:<br />

environmental management and<br />

iSO27001:2013: the iS security standard<br />

and cWa 14641:2009 the intergraf<br />

Security Printing Standard.<br />

DLRS Group is a member of the<br />

Smurfit Kappa group, world-leader<br />

in paper based packaging. Operating<br />

in 22 countries in europe,<br />

Smurfit Kappa group is the european<br />

leader in containerboard, solid<br />

board, corrugated and solid board<br />

packaging and has a key position in<br />

several other paper packaging market<br />

segments. The group also operates<br />

in 9 countries in latin america<br />

where it is the only pan-european<br />

operator. More information can be<br />

found at: www.dlrsgroup.com; www.<br />

smurfitkappa.com.<br />

For more information, please contact<br />

salesdlrsgroup@smurfitkappa.ie


Mutualink awarded SAFETY Act<br />

Designation/Certification from<br />

Department of Homeland Security<br />

WalliNgFOrD, conn., <strong>November</strong><br />

2, <strong>2015</strong> – mutualink today announced<br />

that the company’s secure<br />

communications platform for realtime<br />

collaboration has received<br />

Designation and certification from<br />

the U.S. Department of Homeland<br />

Security (DHS) under the SaFetY<br />

act (Support anti-terrorism by<br />

Fostering effective technology).<br />

mutualink is the only multimedia<br />

interoperable communications<br />

product certified under the SaFetY<br />

act and included on the “approved<br />

Products list for Homeland<br />

Security.” mutualink’s DHS Designation<br />

and certification are effective<br />

through <strong>October</strong> 31, 2020.<br />

The SaFetY act, which was authorized<br />

as part of the Homeland<br />

Security act of 2002, provides legal<br />

liability protections to providers<br />

of anti-terrorism technologies that<br />

could save lives in the event of a terrorist<br />

attack. mutualink’s certification<br />

is the highest level of certification<br />

available under the SaFetY<br />

act and requires an extensive and<br />

rigorous product review process involving<br />

product quality assurance,<br />

operational effectiveness and product<br />

capability and reliability verifi-<br />

6<br />

Mark Hatten<br />

cation, among other criteria. Having<br />

achieved this, customers using<br />

mutualink’s certified technology<br />

now have protection under<br />

the SaFetY act from<br />

lawsuits or claims arising<br />

from acts of terrorism.<br />

mutualink – now designated<br />

as a Qualified antiterrorism<br />

technology<br />

(QUatt) – is an iP-based<br />

interoperable multimedia<br />

sharing platform that<br />

securely connects disparate communications<br />

systems for real-time<br />

voice collaboration and real-time<br />

video and information sharing. it<br />

provides agencies, departments<br />

and commercial entities with the<br />

ability to link incompatible land<br />

mobile radio systems together to<br />

share voice, as well as video, data<br />

and geolocation in emergency situations<br />

and daily operations.<br />

“We worked very hard to achieve<br />

SaFetY act certification from<br />

DHS, and we are extremely proud<br />

to be the only multimedia interoperable<br />

communications solution of<br />

its kind to receive this certification,”<br />

said mark Hatten, mutualink’s<br />

ceO. “This will give our customers<br />

continued confidence and assurance<br />

that our technology is not<br />

only effective but can be deployed<br />

without risks of incurring<br />

costly litigation or liability<br />

in the aftermath of a<br />

terror event.”<br />

mutualink’s DHS certification<br />

follows a similar<br />

award from the U.S.<br />

Department of Defense<br />

(DoD) last year. The<br />

company’s multimedia<br />

communications interoperability<br />

solution was granted Joint interoperability<br />

test command (Jitc)<br />

certification for both information<br />

assurance (ia) and interoperability<br />

(iO). mutualink’s multimedia gateway<br />

solution is listed in the DoD’s<br />

approved Products list (aPl) and<br />

is authorized for use by all Services<br />

and agencies of the DoD. mutualink<br />

is also the interoperability communications<br />

platform of choice of


NATO Special Operations Forces<br />

and its command, NSHQ.<br />

Mutualink will offer hands-on<br />

demonstration opportunities at the<br />

National Fusion Center Association<br />

Annual Training Event <strong>November</strong> 3<br />

– 5, <strong>2015</strong>, in Alexandria, VA.<br />

About Mutualink<br />

Mutualink, Inc. has developed an<br />

interoperable communications platform<br />

that enables community-wide<br />

multimedia sharing of push to talk<br />

radio, voice, text, video, data files<br />

and telephone communications in<br />

a secure environment. Mutualink’s<br />

system is currently deployed by<br />

hundreds of public and private entities<br />

worldwide, including homeland<br />

security and defense installations,<br />

NATO Special Operations Forces,<br />

police and fire departments, transit<br />

authorities, hospitals, schools, universities,<br />

shopping malls, casinos,<br />

and more. Mutualink is a privately-held<br />

company headquartered in<br />

Wallingford, Conn., with R&D facilities<br />

in Westford, Mass. and Mayagüez,<br />

Puerto Rico, and Defense<br />

Services office near Washington,<br />

DC. For more information please<br />

visit www.mutualink.net.<br />

DATA CENTER<br />

SECURITY SOLUTIONS<br />

AMERISTARSECURITY.COM | 866-467-2773<br />

7


ThreatConnect, Inc & Defense Group (DGI) uncover<br />

extensive South Chinese espionage campaign targeting<br />

South China Sea interests<br />

Arlington, VA – September<br />

24, <strong>2015</strong> – ThreatConnect, Inc.,<br />

creator of the most widely adopted<br />

Threat Intelligence Platform (TIP),<br />

and open source cyber intelligence<br />

company Defense Group Inc.<br />

(DGI) today unveiled a report attributing<br />

a sophisticated cyber espionage<br />

campaign,<br />

orchestrated by an<br />

Advanced Persistent<br />

Threat (APT)<br />

group known as<br />

“Naikon,” with interests<br />

in the South<br />

China Sea to a<br />

Chinese People’s<br />

Liberation Army<br />

(PLA) unit. Revealing<br />

the scope<br />

of how extensive<br />

cyber campaigns<br />

are readily applied<br />

to ongoing regional<br />

disputes and conflicts, Threat-<br />

Connect and DGI’s joint report,<br />

“Project CAMERASHY: Closing the<br />

Aperture on China’s Unit 78020”<br />

documents Chinese efforts to gain<br />

the upper hand in a geopolitical<br />

stand-off by capturing information<br />

on regional rivals’ negotiating postures,<br />

economies and military capabilities.<br />

The security community has been<br />

aware of Naikon for some time, but<br />

ThreatConnect researchers decided<br />

to take a closer look at this activity<br />

following recent breaches in the<br />

Fiery Cross Reef buildup; Images by <strong>Digital</strong>Globe, via the New York Times, CSIS Asia<br />

Maritime Transparency Initiative, and CNES, via Airbus DS and IHS Jane’s.<br />

U.S. with key similarities. As businesses<br />

are being affected globally by<br />

this malicious activity, ThreatConnect<br />

and DGI felt a responsibility<br />

to inform their global user base and<br />

bring the findings to light for public<br />

consideration. In today’s security<br />

8<br />

landscape, and in a time where the<br />

adversary is often ahead of target,<br />

it is critical to share threat intelligence<br />

that organizations can use to<br />

defend their assets and sensitive information<br />

from malicious attacks.<br />

“At ThreatConnect we are committed<br />

to analyzing intelligence<br />

within our platform<br />

that is associated<br />

with malicious<br />

activity in<br />

order to help arm<br />

others with the<br />

critical knowledge<br />

they need<br />

to protect themselves,”<br />

said Adam<br />

Vincent, CEO of<br />

ThreatConnect.<br />

“Along with DGI,<br />

we followed widely<br />

available and<br />

public evidence<br />

for several months not knowing<br />

where it would lead us. This research<br />

is a perfect example of how true<br />

threat intelligence is highly informative<br />

and offers organizations a powerful<br />

glimpse into just how sophisticated<br />

cyber campaigns operate.”


Key takeaways from the<br />

research report include:<br />

For nearly five years PLA Unit 78020<br />

used an array of global midpoint infrastructure<br />

to proxy the command<br />

and control of customized malware<br />

variants embedded within malicious<br />

attachments or document exploits.<br />

Targets include government entities<br />

in Cambodia, Indonesia, Laos,<br />

Malaysia, Nepal, Philippines, Singapore,<br />

Thailand and Vietnam as<br />

well as international bodies such<br />

as United Nations Development<br />

Programme (UNDP) and the Association<br />

of Southeast Asian Nations<br />

(ASEAN).<br />

Strategic implications for the<br />

United States include cyber threats<br />

against not only military alliances<br />

and security partnerships in the region,<br />

but risks to interests in a major<br />

artery of international commerce<br />

through which trillions of dollars in<br />

global trade traverse annually.<br />

This report stands out from previous<br />

APT reports given the collaborative<br />

nature of the research,<br />

aggregation and analysis of multiple<br />

data sources, application of statisti-<br />

More on page 33<br />

POWER UTILITY<br />

SECURITY SOLUTIONS<br />

AMERISTARSECURITY.COM | 866-467-2773<br />

9


FAA Administrator Huerta announces<br />

UAS Registration Task Force Members<br />

Federal Aviation Administration (FAA) Administrator<br />

Michael Huerta today announced the membership<br />

of the Unmanned Aircraft Systems (UAS)<br />

Registration Task Force. Earl Lawrence, Director of<br />

the FAA’s UAS Integration Office, and Dave Vos of<br />

Google X will co-chair the group.<br />

Department of Transportation (DOT) Secretary<br />

Anthony Foxx and Administrator Huerta announced<br />

the formation of the Task Force last week. The Task<br />

Force membership represents a range of stakeholder<br />

viewpoints, interests and knowledge of the objectives<br />

and scope. Task Force membership was by invitation<br />

only and participation is voluntary.<br />

Interested parties who are not members of the Task<br />

SECURE CARD READERS<br />

FOR ANY NEED<br />

The CHERRY line of secure keyboards and card readers<br />

offer a broad selection to suit your exact needs!<br />

SMART CARD READERS<br />

Contact, contactless and<br />

combination options.<br />

USB SMART CARD READERS<br />

FIPS 201 certified; standalone unit<br />

with weighted base.<br />

SMART CARD KEYBOARDS<br />

FIPS 210 certified, PC/SC smart card<br />

reader and secure PIN entry.<br />

BASIC USE<br />

HEAVY USE<br />

MAXIMUM USE<br />

FREE<br />

WHITE<br />

PAPER<br />

THE TRENDS AND<br />

BENEFITS OF SMART CARD<br />

AND BIOMETRIC DEVICES.<br />

http://bit.ly/1C1pnlY<br />

1-800-844-0797<br />

www.cherrycorp.com/cid<br />

© <strong>2015</strong> ZF ELECTRONIC SYSTEMS PLEASANT PRAIRIE, LLC<br />

10


FAA Administrator<br />

Michael Huerta<br />

Force may submit comments to<br />

the public docket. The Federal<br />

register notice is available for<br />

viewing here.<br />

Sec. Foxx set a deadline of<br />

Nov. 20 for the task Force to<br />

complete its recommendations<br />

and work is already underway.<br />

The group will meet formally<br />

from Nov. 3-5 before developing<br />

recommendations on a<br />

streamlined registration process and minimum requirements<br />

on which unmanned aircraft should be<br />

registered. given the urgency of this issue, the DOt<br />

and Faa will move expeditiously to consider the<br />

task Force’s recommendations.<br />

TASK FORCE MEMBERS INCLUDE:<br />

Nancy Egan – 3D robotics<br />

Richard Hanson – academy of model aeronautics<br />

George Novak – aerospace industries association<br />

Chuck Hogeman and Randy Kenagy – air line Pilots<br />

association<br />

Jim Coon – aircraft Owners and Pilots association<br />

Sean Cassidy – amazon Prime air<br />

Ben Gielow – amazon retail<br />

Justin Towles – american association of airport<br />

executives<br />

Brian Wynne – association of Unmanned vehicle<br />

Systems international<br />

Parker Brugge – best buy<br />

Douglas Johnson – consumer electronics association<br />

Brendan Schulman – DJi<br />

Paul Feldman – general aviation manufacturers<br />

association<br />

Dave Vos – googleX (co-chair)<br />

Tony Bates – goPro<br />

Matt Zuccaro – Helicopter association international<br />

Mike Fergus – international association of<br />

chiefs of Police<br />

John Perry – management association for Private<br />

Photogrammetric Surveyors<br />

Brandon Declet – measure<br />

Randall Burdett – National association of State<br />

aviation Officials<br />

Sarah Wolf – National business aviation association<br />

Baptiste Tripard – Parrot<br />

Tyler Collins – PrecisionHawk<br />

Gregory McNeal – Small Uav coalition<br />

Thomas Head – Walmart<br />

along with the Faa and DOt, the following federal<br />

agencies will provide expert support to the task Force:<br />

Department of Commerce<br />

Department of Defense<br />

Department of Homeland Security<br />

Department of the Interior<br />

Office of Management and Budget<br />

National Aeronautics and Space Administration<br />

Department of State<br />

11


Cloud security trending as preferred approach<br />

for states and other government agencies<br />

By Jayne Freidland Holland<br />

NIC Inc<br />

Cloud computing appears to<br />

be trending as a preferred approach<br />

to enterprise IT, even<br />

for government. State agencies<br />

increasingly are moving to the<br />

cloud – or at least considering it as a<br />

viable option.<br />

It has been reported that some<br />

states, including Kentucky, Ohio,<br />

Utah and Alabama, have embraced<br />

cloud computing as a way to reduce<br />

IT costs and deliver services and applications<br />

to the marketplace more<br />

quickly. Other states, however, remain<br />

skeptical about whether perceived<br />

security risks outweigh the<br />

cost and customer service advantages.<br />

The Cloud’s Benefits and Risks<br />

As cloud computing has gained<br />

credibility, government agencies<br />

have recognized benefits of moving<br />

to the cloud, as well as drawbacks.<br />

Moving data to the cloud can lower<br />

costs because you are paying only for<br />

the capacity and services used. This<br />

reduces the need for onsite personnel<br />

and support and eliminates the<br />

maintenance of hardware,<br />

software and<br />

IT infrastructure associated<br />

with relocating<br />

data. In addition,<br />

cloud resources can be<br />

added relatively inexpensively<br />

in real time,<br />

and data can be shared on demand<br />

anywhere, anytime via the Internet.<br />

On the other hand, the cloud may<br />

offer less control over infrastructure<br />

management and data. It also can<br />

increase the susceptibility to a single<br />

point of failure. And, it can create<br />

risks related to multi-tenancy. For<br />

example, if data is not properly segregated,<br />

an attack on one company’s<br />

data may affect others on the same<br />

server.<br />

When weighing the benefits and<br />

risks of moving to the cloud, one of<br />

the first steps is to carefully analyze<br />

the proposed cloud services agreement.<br />

Service-level agreements vary<br />

widely, differ by provider and often<br />

are non-negotiable. A thorough review<br />

of the agreement will be necessary<br />

to make sure your agency’s<br />

needs and concerns are covered.<br />

Here are some of the key things<br />

to consider when reviewing a cloud<br />

12<br />

services agreement:<br />

• Where will the data reside and<br />

who can access it? It is important<br />

to understand where your data will<br />

be located and who has access to<br />

it. Some providers store data outside<br />

the United States, which, as an<br />

agency, you may be prohibited from<br />

doing by statute. In addition, cloud<br />

providers may allow their subcontractors<br />

to access a customer’s data.<br />

Make sure to ask the prospective<br />

cloud provider who is permitted<br />

to access your data, what kinds of<br />

background checks the service provider<br />

has completed on any personnel<br />

who may access data, and how<br />

access to the data is monitored, as<br />

well as what types of logs are maintained.<br />

• Requisite standards. It is important<br />

to understand whether the<br />

cloud service provider can meet or<br />

satisfy relevant data protection legislation<br />

or industry standards that<br />

may be applicable for your agency,<br />

such as the Payment Card Industry’s<br />

Data Security Standards or the<br />

Health Insurance Portability & Accountability<br />

Act criteria. An agency<br />

should request evidence that the


cloud provider has the appropriate<br />

security measures in place to satisfy<br />

those requirements.<br />

• Liability and damages. also,<br />

be on the lookout for broad exclusions<br />

of liability in cloud provider<br />

agreements. Understand who assumes<br />

liability if data loss occurs<br />

and whether that liability extends<br />

to costs the agency may incur in the<br />

event of an outage.<br />

• Indemnification. in the contract<br />

negotiating process, consider<br />

seeking indemnification for iP infringement,<br />

applicable law, data<br />

protection legislation, regulatory<br />

breaches and losses suffered as a result<br />

of data being removed. While it<br />

may be unlikely to secure this level<br />

of protection, it is recommended<br />

that you request it.<br />

• Warranties. cloud provider<br />

agreements should include performance<br />

warranties for service, reliability<br />

and accuracy. it’s easy to<br />

assume that these warranties are implied,<br />

but if they are not included in<br />

the agreement, it may mean the provider<br />

doesn’t intend to honor them.<br />

request that the contract specify the<br />

relevant warranties.<br />

• Updates and patches. typically,<br />

the cloud provider is contractually<br />

responsible for regularly updating<br />

More on page 26<br />

13


UN Report Highlights Worsening Refugee<br />

Crisis in the Americas<br />

by Walter ewing<br />

The Northern triangle of central<br />

america—comprising el Salvador,<br />

guatemala, and Honduras—is now<br />

one of the most dangerous places<br />

on the planet. The United Nations<br />

estimates that Honduras has the<br />

highest homicide rate in the world,<br />

while el Salvador comes in fifth and<br />

guatemala sixth. it is for this reason<br />

that so many central american<br />

families have made the very difficult<br />

decision to send their children<br />

out of their home countries, bound<br />

primarily to the United States, in<br />

the care of often violent and abusive<br />

smugglers. However, the refugee<br />

crisis currently gripping the<br />

Northern triangle encompasses not<br />

only unaccompanied children, but<br />

mothers with children, as well as entire<br />

families. and it shows no signs<br />

of ending anytime soon.<br />

Related Content: Unaccompanied<br />

Children: A Resource Page<br />

The scope of this crisis, as well as<br />

its level of brutality, are vividly described<br />

in a report from the United<br />

Nations High commissioner for<br />

refugees (UNHcr), titled Women<br />

on the Run. as the report explains,<br />

the women and children who are<br />

arriving at the U.S.-mexico border,<br />

as well as the borders of other<br />

countries in the region, are leaving<br />

places in which government institutions<br />

have effectively lost control<br />

of territory that has come under the<br />

control of armed gangs which kill<br />

with impunity, extort money from<br />

anyone they want, and rape women<br />

as they please.<br />

Consider the story of Norma<br />

in El Salvador:<br />

in late 2014, four gang members abducted<br />

her and took her to a nearby<br />

cemetery. Three of the four proceeded<br />

to rape her; she believes they targeted<br />

her because she was married<br />

14<br />

to a police officer. “They took their<br />

turns…they tied me by the hands.<br />

They stuffed my mouth so i would<br />

not scream.” When it was over, she<br />

said, “They threw me in the trash.”<br />

She contracted a sexually transmitted<br />

disease as a result of the rape.<br />

Not surprisingly, the report found<br />

that, among the thousands of women<br />

and girls from the Northern triangle<br />

who journeyed to the U.S. and<br />

“expressed a fear of being returned<br />

to their home country and were<br />

subject to the credible fear screening<br />

process, U.S. authorities have<br />

found that a large percentage have<br />

a significant possibility of establishing<br />

eligibility for asylum or protec-


tion under the convention against<br />

torture.” However, it is important to<br />

keep in mind that women and children<br />

are not only seeking asylum<br />

in the U.S.—they are also going to<br />

mexico, belize, costa rica, Nicaragua,<br />

and Panama.<br />

mexico’s place in the refugee crisis<br />

is complicated. On the one hand,<br />

there are central american refugees<br />

who are seeking asylum within<br />

mexico. but, on the other hand,<br />

mexico is witnessing its own flow of<br />

refugees from parts of the country<br />

in which conditions have deteriorated<br />

nearly as much as in Honduras or<br />

el Salvador. So, at the same time as<br />

mexican authorities consider offering<br />

safe haven to refugees from the<br />

Northern triangle, they must also<br />

regain control of those stretches of<br />

territory that are now being ruled<br />

and terrorized by gangs and thereby<br />

producing refugee flows.<br />

The report also described the results<br />

of interviews with 160 women<br />

from the Northern triangle and<br />

mexico. Those interviews paint a<br />

grim picture of life in the communities<br />

from which the women fled:<br />

• 85% described living in neighborhoods<br />

controlled by gangs.<br />

• 100% of women who reported<br />

attacks or threats to the police received<br />

no protection or ineffective<br />

protection.<br />

• 64% described direct threats and<br />

attacks by gangs as reasons for fleeing.<br />

• 10% described persecution by<br />

the police.<br />

• 58% of women from Northern<br />

triangle countries described sexual<br />

assault and abuse.<br />

UNHcr recommends that the governments<br />

of the nations to which<br />

these refugees are fleeing respect<br />

the right to asylum, abide by refugee<br />

law, not detain asylum seekers as a<br />

deterrent against the arrival of more<br />

asylum seekers, and seek to address<br />

the root economic, political, and<br />

social causes of the violence that is<br />

forcing so many people from their<br />

homes. and UNHcr emphasizes<br />

that dealing with the refugee crisis<br />

effectively “requires a comprehensive<br />

regional response.” conditions<br />

in the Northern triangle countries<br />

and parts of mexico have spun out<br />

of control. it will require the concerted<br />

effort of more than one nation<br />

to regain control over a very<br />

volatile situation.<br />

Photo Courtesy of UNHCR. See<br />

more at: http://immigrationimpact.<br />

com/<strong>2015</strong>/10/29/un-report-highlights-worsening-refugee-crisis-inthe-americas/#sthash.YYYfCR5M.<br />

dpuf<br />

SAVE MONEY<br />

BY SAVING TIME<br />

Secrets Revealed<br />

7 Solutions to better surveillance<br />

www.SmartMotionVideo.com<br />

15


NICE Systems now Qognify as Battery Ventures<br />

completes acquisition of physical security unit<br />

bOStON, ma – (marketwired -<br />

Sep 21, <strong>2015</strong>) - battery ventures, a<br />

global technology investment firm,<br />

announced today that it has successfully<br />

completed the acquisition<br />

of Physical Security business Unit<br />

(PSbU), formerly part of the security<br />

division of publicly listed Nice<br />

Systems. Through the acquisition,<br />

which was originally announced in<br />

august, battery ventures has established<br />

an independently operating<br />

business named Qognify.<br />

Qognify will build on its leadership<br />

in the physical-security and<br />

mission-critical operations markets<br />

to further help clients capture,<br />

analyze and leverage big data to<br />

anticipate, manage and mitigate security<br />

and safety risks, as well as to<br />

maintain business continuity and<br />

optimize operations. The company’s<br />

customers include banks, utility<br />

companies, airports, seaports, city<br />

centers and transportation systems,<br />

as well as venues hosting<br />

sporting events and major<br />

tourist attractions.<br />

as previously announced,<br />

moti Shabtai, formerly the<br />

general manager of the<br />

PSbU at Nice Systems, has<br />

become president of Qognify.<br />

He is joined by adam<br />

markin, an experienced industry<br />

operator and former<br />

battery ventures executive in residence,<br />

who is the new chairman of<br />

Qognify.<br />

Qognify is headquartered in New<br />

Jersey with additional offices in<br />

london and Singapore, and an r&D<br />

center in israel. as Nice Systems,<br />

the company has been a frequent<br />

gSN awards winner in recent years,<br />

particularly in the airport, Seaport<br />

markets where its video analytics<br />

technologies, integrated security<br />

programs, Situator PSims are now<br />

in use at los angeles airport, Ports<br />

of corpus christi, miami and the<br />

virginia Port authority and other<br />

critical facilities.<br />

more information about Qognify<br />

is available at: www.qognify.com<br />

About Battery Ventures<br />

battery strives to invest in categorydefining<br />

businesses in markets including<br />

software and services, Web<br />

infrastructure, e-commerce, digital<br />

media and industrial technologies.<br />

Founded in 1983, the firm backs<br />

companies at stages ranging from<br />

seed to private equity and invests<br />

globally from offices in boston, the<br />

San Francisco bay area and israel.<br />

Follow the firm on Twitter @BatteryVentures,<br />

visit our website at<br />

http://www.battery.com and find a<br />

full list of Battery’s portfolio companies<br />

here.<br />

16


Oslo Airport selects Qognify,<br />

formerly NICE security, for major<br />

airport expansion project<br />

by using Nicevision, the airport<br />

will be able to respond quickly and<br />

effectively to unfolding incidents to<br />

ensure passenger safety and operational<br />

continuity<br />

ParamUS, <strong>October</strong> 15 - as part<br />

of a major expansion project at<br />

Oslo airport’s terminal 2, slated<br />

for completion in 2017, Qognify,<br />

formerly Nice Security, has been<br />

selected to help ensure operational<br />

efficiency, business continuity and<br />

passenger safety and security, Qognify<br />

announced today.<br />

Oslo airport is already one of the<br />

largest airports in the Nordic region,<br />

and expects to grow its passenger<br />

volume from 24 million to<br />

28 million in the next few years. The<br />

Qognify solution will enable the airport<br />

to effectively manage all types<br />

of incidents, including operational<br />

bottlenecks, safety hazards, and se-<br />

curity threats.<br />

Qognify is working with system<br />

integrator racom to implement a<br />

scalable iP surveillance solution at<br />

the new terminal. by using Nicevision,<br />

the airport will be well-positioned<br />

to:<br />

• Comply with airport regulations<br />

• Quickly gain awareness of unfolding<br />

incidents and their severity,<br />

as well as operational issues<br />

• Ensure consistency of security<br />

and operations across the airport<br />

Arne Grave, CEO, Racom – “Our<br />

partnership with Qognify on this<br />

project has enabled us to design a<br />

solution that fully meets the needs<br />

and expectations of Oslo airport.<br />

This includes an adaptation to modern<br />

video formats, ample storage,<br />

and a robust structure that ensures<br />

access to video in all circumstances<br />

and eventualities.”<br />

Moti Shabtai, President of Qognify<br />

– “The implementation of our<br />

security solutions at one of europe’s<br />

largest airports is a testament to our<br />

leadership in this sector. The pillars<br />

of our security portfolio, Nicevision<br />

can help major transit operations<br />

like Oslo airport streamline<br />

all aspects of incident-handling and<br />

response throughout the entire incident<br />

lifecycle.”<br />

Qognify is an independent company<br />

set off from Nice Systems<br />

Physical Security business Unit<br />

following its acquisition by battery<br />

ventures, a global technology investment<br />

firm.<br />

About Qognify<br />

Qognify solutions help organizations<br />

capture, analyze, and leverage<br />

big data to anticipate, manage, and<br />

mitigate security and safety risks,<br />

maintain business continuity, and<br />

streamline operations. The Qognify<br />

offerings provide valuable insights<br />

that enable enterprises and security-conscious<br />

organizations to take<br />

the best action at the right time by<br />

correlating structured and unstructured<br />

data from multiple sensors<br />

and channels, detecting irregular<br />

patterns, and recognizing trends.<br />

The solutions have been deployed to<br />

help secure a broad range of organizations<br />

and events, such as banks,<br />

utility companies, airports, seaports,<br />

city centers, transportation systems,<br />

major tourist attractions, sporting<br />

events, and diplomatic meetings.<br />

http://www.Qognify.com.<br />

17


Police officers receive life-saving training<br />

from the University of Louisville to help<br />

accident and crime victims<br />

by Steve bittenbender<br />

in a first-of-its-kind event, 16 members<br />

of the louisville metro Police<br />

Department received training to<br />

help them become better first responders<br />

to victims they must tend<br />

to at accidents and crime scenes.<br />

The training on handling arterial<br />

bleeds came from the University of<br />

louisville’s Willed body Program.<br />

in the fresh tissue laboratory in the<br />

school’s Department of anatomical<br />

Sciences and Neurobiology, the<br />

lmPD officers participated in a<br />

day-long session earlier this month<br />

to learn how to properly apply a<br />

tourniquet and other techniques designed<br />

to keep people from bleeding<br />

to death.<br />

The officers worked on cadavers<br />

provided by the school. lmPD officer<br />

Joe Heitzman, who helped organize<br />

the class, said it was the first<br />

time many of his fellow officers got<br />

to work with a cadaver as part of<br />

their training.<br />

“The officers who were in the class<br />

had a great learning experience and<br />

a lot of them told me that the training<br />

was the first time they actually<br />

got to see how trauma affects our<br />

bodies and how to use a tourniquet<br />

correctly to save a life,” Heitzman<br />

said in a press release. “This was an<br />

opportunity that not many officers<br />

will ever get a chance at and they<br />

were excited about the lab.”<br />

law enforcement officers often<br />

arrive on the scene of an accident or<br />

a crime before emergency medical<br />

personnel. Depending on the location<br />

and the severity of a victim’s arterial<br />

bleed, the victim could die in<br />

just a few minutes unless the loss of<br />

blood is staunched.<br />

getting this kind of training is<br />

unique for law enforcement officers,<br />

and those who provided the training<br />

hope it proves its value.<br />

“We are teaching police officers to<br />

save lives. No other form of training<br />

allows for the realism that is provided<br />

by utilizing a tissue lab,” said<br />

brandon Heming, an emergency<br />

medical technician.<br />

in the past, the university has<br />

provided cadavers to military personnel<br />

stationed at Fort Knox<br />

as part of their<br />

20<br />

training, but this was the first time<br />

Uofl had partnered with louisville<br />

police, according to spokeswoman<br />

betty coffman.<br />

Providing such training fits with<br />

the mission of the Willed body Program,<br />

said Nicole Herring, Ph. D.,<br />

the program’s director.<br />

“One of our primary goals for the<br />

Willed body Program is not only<br />

to provide a resource for education<br />

for our medical and dental students,<br />

but for health-care professionals in<br />

our community as well,” Herring<br />

said.<br />

With 1,211 officers, the louisville<br />

metro Police Department is the nation’s<br />

34th largest force, according to<br />

information provided by governing<br />

magazine. The department, which<br />

formed in 2003 after the merger<br />

of louisville and Jefferson county<br />

governments is responsible for patrolling<br />

nearly 400 square miles of<br />

the Kentucky’s largest city.<br />

While this was the first time Uofl<br />

has provided training to lmPD officers,<br />

coffman said the school hopes<br />

it can continue to do so.<br />

However, there<br />

has not been a date<br />

set up for a second session.


NTSB confirms wreckage discovered<br />

to be El Faro<br />

by Steve bittenbender<br />

The National transportation Safety<br />

board on monday confirmed that<br />

wreckage uncovered over the weekend<br />

was that of a vessel lost last<br />

month during Hurricane Joaquin.<br />

On Saturday afternoon, searchers<br />

on board a U.S. Navy vessel used<br />

sonar equipment to detect a vessel<br />

roughly at 15,000 feet below in the<br />

waters near the bahamas, where the<br />

american cargo ship el Faro was<br />

last spotted. Sonar images showed<br />

a nearly 800-foot long ship that appeared<br />

to be intact.<br />

Searchers then used an unmanned<br />

submarine to identify the vessel and<br />

survey for its condition.<br />

eric Weiss, a spokesman for the<br />

NtSb, confirmed the identity of the<br />

ship and said in a one-line statement<br />

that a survey of the ship is continuing.<br />

Now work will begin to find the<br />

voyage data recorder and find out<br />

more information about the final<br />

moments aboard the ship, which<br />

was manned by a crew of 33 americans<br />

and Poles. rescue efforts to<br />

find crew members were suspended<br />

a week after the ship was last seen<br />

afloat, on Oct. 1.<br />

as part of the recovery operation,<br />

which started after rescue mission<br />

ended, the NtSb worked with<br />

the Navy to secure the use of the<br />

U.S.N.S. apache. The tugboat has<br />

been used to assist in the recover<br />

other downed ships and airplanes.<br />

after leaving port in virginia, the<br />

ship arrived at the el Faro’s last location<br />

on Oct. 23.<br />

Searchers aboard the apache<br />

first tried using detection equipment<br />

in an attempt to pick up the<br />

pinger from the el Faro’s recorder.<br />

However, officials stopped that after<br />

three days of unsuccessful attempts<br />

and began using sonar. The wreckage<br />

was discovered during the fifth<br />

round of 13 planned searches.<br />

The wreckage was found using the<br />

Navy’s Orion sonar system, which<br />

can detect vessel in depths of up to<br />

20,000 feet. Naval officials say the<br />

sonar system has a maximum swath<br />

of 3,000 meters to detect for ships<br />

21<br />

and other large objects.<br />

NtSb officials expect the survey<br />

to take about two weeks, but they<br />

warned it could take longer if ideal<br />

conditions are not present.<br />

Owned and operated by tOte<br />

maritime, the 790-foot long el Faro,<br />

built in 1974, received its last coast<br />

guard inspection in march. The<br />

company also conducted an internal<br />

safety audit just prior to that<br />

inspection. The ship departed from<br />

Jacksonville, Fla., on Sept. 29 with<br />

San Juan, P.r., as its scheduled destination.<br />

according to the NtSb, the el<br />

Faro left about three hours after a<br />

hurricane warning has been issued<br />

by the National Hurricane center.<br />

On the day before it sank, the el Faro’s<br />

captain e-mailed a tOte safety<br />

officer to confirm he planned to<br />

take a route to the south of Joaquin’s<br />

predicted path.<br />

The el Faro was last heard from<br />

on the morning of Oct. 1 as it had<br />

taken on water due to the rough<br />

seas created by Hurricane Joaquin.<br />

at that time, Joaquin pounded the<br />

caribbean nation with winds of up<br />

to 130 miles an hour, making it a<br />

powerful category 4 hurricane.


America’s Flagship, The SS United States, may<br />

only have weeks left afloat<br />

NeW YOrK, NY…<strong>October</strong> 07,<br />

<strong>2015</strong>— The board of Directors of<br />

the SS United States conservancy<br />

released the following statement<br />

today announcing that despite<br />

considerable progress toward finding<br />

a permanent home and viable<br />

redevelopment plan for america’s<br />

Flagship, the organization will be<br />

forced to sell the historic vessel to<br />

a responsible metals recycler by the<br />

end of <strong>October</strong> unless new donors<br />

or investors come forward.<br />

Th e SS United States is the largest<br />

and most advanced ocean liner<br />

ever built in her namesake nation.<br />

launched in 1952, the United States<br />

was developed as part of a top Secret<br />

cold War project to build the<br />

fastest ship in the world. She still<br />

holds the transatlantic speed record.<br />

The ship is an iconic symbol<br />

of america’s post-war power, pride<br />

and innovation. The statement appears<br />

below:<br />

“after much deliberation and<br />

consultation, the SS United States<br />

conservancy’s board of Directors<br />

has decided to retain a broker to explore<br />

the potential sale of america’s<br />

Flagship, the SS United States to a<br />

responsible, U.S.-based metals recycler.<br />

“We have achieved an extraordinary<br />

amount of progress in support<br />

of the SS United States’ potential<br />

redevelopment in recent months,<br />

including detailed plans, financial<br />

models, renderings, and engineering<br />

approaches with support from a<br />

number of major firms. in so many<br />

ways, we’ve never been closer to saving<br />

america’s Flagship, but we have<br />

Photo: Courtesy of Nick Landiak<br />

also never been closer to losing this<br />

irreplaceable piece of our history.<br />

“The conservancy has been very<br />

clear in its communications to its<br />

supporters and the media that the<br />

carrying costs for the vessel total<br />

more than $60,000 per month.<br />

While our fundraising efforts have<br />

enabled us to meet those continuing<br />

obligations to date, thanks to<br />

the steadfast support of donors<br />

from across the nation and around<br />

22<br />

the world, the financial burdens imposed<br />

by the ship’s ongoing expenses<br />

have become unsustainable.<br />

“The conservancy continues to<br />

do everything within its power to<br />

advance an outcome that protects<br />

the vessel, preserves her historical<br />

legacy, and secures a viable redevelopment<br />

program. as we have announced<br />

previously, redevelopment<br />

negotiations are ongoing. We have<br />

identified two potential locations<br />

that can accommodate the ship, and<br />

we are continuing complex talks<br />

with various entities regarding these<br />

sites. These ongoing discussions<br />

remain subject to confidentiality<br />

agreements signed by both parties.<br />

“Despite this progress in our redevelopment<br />

negotiations, the tim-


ing of additional financial support<br />

from our partners may come too<br />

late, in the absence of another party<br />

willing to support the conservancy<br />

or assume responsibility for the vessel<br />

at this time.<br />

“if donors or investors step forward<br />

by the end of the month who<br />

are ready, willing, and able to help<br />

the conservancy, america’s Flagship<br />

could still be saved. However,<br />

if progress toward a new sales option<br />

or an infusion of funds does<br />

not occur by <strong>October</strong><br />

31, <strong>2015</strong>, we will<br />

have no choice but<br />

to negotiate the sale<br />

of the ship to a responsible<br />

U.S.-based<br />

recycler.<br />

“given the lead<br />

time required to<br />

broker the vessel’s<br />

potential sale, we believe<br />

it would be irresponsible<br />

to delay<br />

the start of this contingency<br />

planning.<br />

“choosing to explore these options<br />

was a gut-wrenching decision<br />

for the board, but the conservancy<br />

simply cannot exhaust all of its<br />

funds, leaving the organization in<br />

debt or with no resources to support<br />

its curatorial and education<br />

mission.<br />

“We remain deeply committed to<br />

honoring the legacy of the SS United<br />

States through our curatorial and<br />

educational programs, and we will<br />

continue to prioritize this important<br />

work.<br />

“We take our responsibility to our<br />

supporters and to the conservancy’s<br />

mission very seriously, which is<br />

why we believe that despite recent<br />

progress and potentially positive<br />

scenarios, this course of action is<br />

necessary.<br />

“The sale of the vessel to a recycler<br />

is by no means inevitable. We<br />

remain hopeful that our developers<br />

can continue to advance their efforts<br />

or that additional financial support<br />

will be found in time.<br />

“ Th eSS United States is a unique<br />

and endangered historic landmark<br />

that has captivated the imagination<br />

of millions. We are determined to<br />

do everything possible during these<br />

final weeks to try to save her.<br />

“ Th eSS United States’ supporters<br />

from across the country and around<br />

the world have become like family.<br />

We have worked together against<br />

the odds to keep the nation’s last<br />

remaining and greatest ocean liner<br />

safely afloat. The ship has faced previous<br />

dangers and has withstood<br />

them, and we hope she can beat the<br />

23<br />

Photo: Courtesy of Charles Anderson<br />

odds again. anything less would<br />

be, as Walter cronkite once said, “a<br />

crime against history.”<br />

Those interested in making a taxdeductible<br />

contribution to the SS<br />

United States conservancy can do<br />

so at www.SSUSc.org.<br />

About the SS United States<br />

Conservancy<br />

a national nonprofit organization,<br />

the SS United States conservancy<br />

leads the global effort to save and<br />

repurpose america’s Flagship, the<br />

SS United States. The conservancy<br />

raises public awareness and financial<br />

resources for the maintenance,<br />

restoration and ultimate reuse of<br />

this iconic vessel and works to ensure<br />

that the fastest ocean liner ever<br />

to cross the atlantic remains an inspiration<br />

for generations to come.<br />

For more information about the SS<br />

United States visit www.ssusc.org.<br />

MEDIA CONTACT: Tom Basile –<br />

Tbasile@EmpireStrategy.com<br />

917-579-2216


Campbell on Crypto<br />

What comes after perimeter protection?<br />

An intro to why cryptography is important<br />

By Shaun Campbell<br />

According to the <strong>2015</strong> 1H Breach<br />

Level Index Report from Gemalto,<br />

888 security breaches were reported<br />

in the first half of <strong>2015</strong>. Those<br />

breaches resulted in the unauthorized<br />

access of 245,191,393 records.<br />

Advances in technology used by<br />

hackers means that protecting the<br />

perimeter is not enough to ensure<br />

that your sensitive data is not compromised.<br />

Identity theft was the leading<br />

type of breach, the report indicates.<br />

There was also a shift<br />

in attack targets, with<br />

a dramatic rise in data<br />

records stolen from<br />

state-sponsored attacks.<br />

Healthcare and<br />

government overtook<br />

retail as the major affected<br />

sectors, and<br />

outside attacks have begun to overtake<br />

those from within.<br />

All this means that perimeter security<br />

isn’t effective for protecting<br />

your organization from breaches.<br />

For real protection of sensitve data,<br />

you have to focus on protecting<br />

your data, not your network. That’s<br />

why cryptography (or “crypto”) is<br />

becoming increasingly important.<br />

Securing the network<br />

is yesterday’s news<br />

Today’s enterprises (commercial<br />

and public sector) are not making<br />

appropriate investments in security.<br />

Most are using an outdated view of<br />

the realities of security breaches.<br />

Because data breaches have continually<br />

increased in frequency and<br />

size, breach prevention is becoming<br />

irrelevant as protection from cyber<br />

Simple breach prevention just doesn’t cut it<br />

any more. Hackers can be criminals, rogue<br />

nations, or disgruntled insiders, and they<br />

all pose a real threat to data.<br />

attacks.<br />

That kind of strategy is yesterday’s<br />

news. Gone are the days when<br />

hackers were more interested in<br />

just proving they could break in. In<br />

those days, sensitive data was centralized,<br />

and a desktop PC was the<br />

edge of the enterprise network.<br />

It was enough at the time to con-<br />

24<br />

sider network<br />

perimeter<br />

“breach-prevention”<br />

technology,<br />

such<br />

as firewalls, as<br />

the go-to security<br />

method. These days, however,<br />

data is distributed, not centralized,<br />

so simple breach prevention just<br />

doesn’t cut it any more. Hackers can<br />

be criminals, rogue nations, or disgruntled<br />

insiders, and they all pose<br />

a real threat to data.<br />

The insider threat<br />

can’t be discounted.<br />

Every organization,<br />

including government<br />

agencies, can<br />

fall victim to someone<br />

already inside<br />

the protected perimeter.<br />

Focusing on perimeter protection<br />

does nothing to protect against<br />

misuse or just plain carelessness.<br />

Let’s not overlook carelessness.<br />

Using personal email accounts to<br />

bring work home, losing devices,<br />

storing important information on<br />

thumb drives, or sharing network<br />

credentials and passwords can lead


to the accidental leaking of sensitive<br />

data.<br />

In fact, it’s best these days to just<br />

accept the fact that you can’t fully<br />

prevent breaches of network security.<br />

Instead of securing the network,<br />

you need to focus on securing the<br />

data.<br />

How to protect your data –<br />

a quick overview<br />

The world of cyber security becomes<br />

a simpler place when you accept<br />

that breaches will happen. Extending<br />

your focus from just securing<br />

the perimeter to also securing the<br />

data should be Job One.<br />

Most of the threat today is what’s<br />

in the information, not how you access<br />

an entity. It has become very<br />

easy for hackers to insert attacks<br />

into content that allow them to<br />

open channels through the boundary<br />

that no one knows about. As we<br />

mentioned earlier about carelessness,<br />

people already use open channels<br />

in firewalls to send content via<br />

email. Information is not blocked at<br />

the firewall. Malware or other malicious<br />

content may have already<br />

compromised the network. Once<br />

the affected content has gotten in<br />

past the boundary, that’s when the<br />

real problems begin.<br />

It can be a challenge to secure<br />

data. These days, the cloud, virtualization,<br />

and an increasingly mobile<br />

workforce have made the potential<br />

inroads to attack much broader. It’s<br />

understandable that some agencies<br />

might choose to use “containment”<br />

strategy to control where data can<br />

go, and to limit access to a small<br />

group of authorized users.<br />

The problem with basing your<br />

security plans on restricting data<br />

access is that it flies in the face of<br />

what most agencies are trying to<br />

do – namely, to using big data and<br />

analysis to improve efficiency and<br />

productivity, and to help fulfill mission<br />

objectives.<br />

Rather than saying “no,” agencies<br />

should be looking for more ways to<br />

say “yes” – to build security plans<br />

based on the mandate to move and<br />

share data. Here are three quick<br />

things to keep in mind:<br />

• Know your data: You need to<br />

know what you need to protect.<br />

Then you have to control access and<br />

authentication of users.<br />

• Protect your data: The best way<br />

to protect your data is to lock it. Encrypt<br />

all sensitive data at rest and<br />

in motion. Make sure that if data is<br />

taken out of your network it can’t<br />

be used for malicious purposes because<br />

of the strength of the encryption.<br />

• Manage your protection: Encryption<br />

seals your data so it can’t be<br />

used by anyone but you. Then you<br />

have to manage it, because if you<br />

lose your encryption key, you can’t<br />

use the data, either. Securely store<br />

25<br />

and manage all of your encryption<br />

keys.<br />

There is no “one size fits all” approach<br />

for securing data in case<br />

your network security is breached,<br />

and of course you still have to reprotect<br />

your network if the perimeter<br />

is violated. These three steps<br />

are just a skeleton to make sure you<br />

don’t suffer the expense and other<br />

consequences that come in the aftermath<br />

of a security incident.<br />

In future installments of this column,<br />

we will take a closer look at<br />

different aspects of cryptography<br />

and discuss how it can be utilized as<br />

the most effective form of data protection.<br />

GSN is pleased to add “Campbell on<br />

Crypto” as an ongoing new column.<br />

Shaun Campbell, a nationally-recognized<br />

cryptography expert, is VP of<br />

Product Management For SafeNet<br />

Asssured Technologies. Prior to his<br />

12-year service at SafeNet, he held<br />

high-level security positions at The<br />

Windermere Group, A.T. Kearney,<br />

Booze Allen Hamilton and CSC. He<br />

spent eight years in the U.S. Air Force<br />

developing his expertise in cryptography<br />

and cyber security.


Cloud security trending as for<br />

government agencies<br />

Continued from page 13<br />

its system and completing necessary<br />

patches. This may depend upon the<br />

specific service level selected, so it<br />

is important to understand who has<br />

responsibility for this. If the provider<br />

is responsible, the agreement<br />

should confirm that updates and<br />

patches will be implemented in a<br />

timely fashion.<br />

• Breach notification procedures.<br />

The agreement also should<br />

detail notification procedures, as<br />

well as how and when data can be<br />

accessed in the event of a security<br />

breach, in addition to any log file<br />

access that would be necessary to<br />

help determine what happened. The<br />

agreement also should be specific<br />

about whether or not your agency<br />

can bring in an independent forensic<br />

team to review how the attack<br />

occurred and what remediation<br />

steps must be taken.<br />

• Disaster recovery. The cloud<br />

provider should offer, at a minimum,<br />

disaster recovery policies that<br />

meet industry standards. Review<br />

the provider’s general protections,<br />

type of backup services provided<br />

and business continuity practices.<br />

• The long-term outlook. Once<br />

you have made the move to the<br />

cloud, it can be hard to transition<br />

back out. Accordingly, the agreement<br />

should delineate very clearly<br />

how long it will take and what steps<br />

will be required to retrieve your<br />

data if you decide at some point to<br />

move out of the cloud.<br />

In addition to the points noted<br />

above, having a cloud strategy and<br />

performing due diligence is essential<br />

for an agency considering a<br />

move to the cloud. Such due diligence<br />

should include a thorough<br />

evaluation of the provider’s years of<br />

experience, how much content the<br />

provider has under contract and the<br />

company’s track record protecting<br />

data.<br />

The cloud can present several benefits,<br />

as well as a number of risks.<br />

Determining what is best for any<br />

government agency involves a careful<br />

review of the terms and conditions<br />

contained the agreement, plus<br />

a calculated, upfront risk/benefit examination,<br />

free of any assumptions,<br />

to reveal whether the time is right to<br />

make a move to the cloud.<br />

About the author: Jayne Friedland<br />

Holland is Chief Security Officer at<br />

NIC Inc. (NASDAQ: EGOV), the<br />

country’s dominant provider of egovernment<br />

services and secure payment<br />

processing. Contact her at jayne@<br />

egov.com.<br />

Post Your Video on<br />

the Busiest Website<br />

in Homeland Security!<br />

To Place Your Order or Get Further Information, Contact:<br />

Mike Madsen, Publisher, at 732-233-8119, or mmadsen@gsnmagazine.com<br />

26


Intelligent Video Surveillance<br />

NSF-supported engineer and vision scientist Al Bovic<br />

awarded Emmy for tool that predicts perceived video quality<br />

27<br />

September 30, <strong>2015</strong> – Sometimes it’s<br />

not so much what you see as what<br />

you don’t see that matters.<br />

alan bovik led a team of researchers<br />

that, in the early 2000s, invented<br />

a tool to predict how the average<br />

person will perceive the quality of<br />

an image or a video. The tool allows<br />

broadcasters and streaming video<br />

sites to compress and distribute video<br />

with minimal distortion.<br />

So, every time you don’t see jagged<br />

images, blurring, glitches or the<br />

dreaded spinning wheel of death<br />

on tv or the internet, that’s likely<br />

thanks in part to the Structural<br />

Similarity index that bovik and his<br />

research team created.<br />

For his efforts, bovik and three<br />

of his colleagues will each receive<br />

television’s highest honor, an individual<br />

Primetime emmy award for<br />

Outstanding achievement in engineering<br />

Development from the<br />

television academy (formerly the<br />

academy of television arts and Sciences).<br />

bovik--the ernest J. cockrell<br />

endowed chair in engineering at<br />

The University of texas at austin-<br />

-will receive his emmy statuette at<br />

the Primetime emmy engineering<br />

awards ceremony at loew’s Hollywood<br />

Hotel on Oct. 28,<br />

<strong>2015</strong>. two of bovik’s former<br />

PhD students, Zhou<br />

Wang (now at the University<br />

of Waterloo, canada)<br />

and Hamid Sheikh (now at<br />

Samsung, Dallas) will also<br />

receive individual emmy<br />

statuettes for this work,<br />

along with eero Simoncelli,<br />

their collaborator at NYU.<br />

“an engineering emmy award is<br />

bestowed upon an individual, company<br />

or organization for developments<br />

in engineering that are either<br />

so extensive an improvement on<br />

existing methods, or so innovative<br />

in nature, that they materially affect<br />

the transmission, recording or reception<br />

of television,” the television<br />

academy wrote.<br />

bovik was initially surprised<br />

about the emmy--in fact, he found<br />

out about the award while reading<br />

his email in the morning, on his way<br />

to brush his teeth. eventually, his<br />

surprise gave way to appreciation.<br />

“i’m very happy and grateful that<br />

people are recognizing our work,”<br />

bovik said. “i so appreciate NSF<br />

support of our research and our students,<br />

who are so much of the inspiration<br />

and perspiration behind research<br />

success. if you have<br />

good ideas, this kind of<br />

support can change your<br />

life.”<br />

Compression issues<br />

Due to limits in bandwidth<br />

and the ever-expanding<br />

Al Bovic number of streaming videos,<br />

broadcasters need to<br />

compress their video before sending<br />

it over the airwaves or the internet.<br />

This compression can cause a range<br />

of problems, from blurring to blackouts,<br />

which make watching a broadcast<br />

unpleasant or distracting.<br />

“What you would like to be able<br />

to do is have a reliable way of determine<br />

acceptable levels of perceived<br />

quality--as a human viewer would<br />

report it,” bovik said. “This is particularly<br />

important to cable and<br />

satellite video content carriers in<br />

regards to how much they compress<br />

the television signal.”<br />

“it’s not like a certain compression<br />

level will give the same quality for<br />

every video. You actually have to do<br />

something content dependent, and<br />

being able to predict the perceived<br />

quality of a compressed video while<br />

accounting for content makes a big<br />

More on page 28


Intelligent Video Surveillance<br />

NSF support: tool that predicts<br />

perceived video quality<br />

Continued from page 27<br />

difference.”<br />

The Structural SIMilarity (SSIM)<br />

index is a method for measuring the<br />

similarity between a compressed image<br />

or video and the uncompressed<br />

original, in terms of human<br />

perception. Today,<br />

SSIM is part of the technological<br />

toolkit used by<br />

most major broadcasters<br />

and cable and satellite<br />

companies around the<br />

world, including AT&T,<br />

Comcast, NBC, FOX and<br />

PBS.<br />

Technology manufacturers<br />

such as Cisco, Motorola<br />

(Arris), Intel and<br />

Texas Instruments rely<br />

on SSIM to ensure the<br />

broadcast, networking<br />

and TV equipment they produce<br />

maintains the best possible video<br />

quality.<br />

When Bovik and his team started<br />

working on the issue of predicting<br />

how people would perceive video<br />

quality, they faced some difficult<br />

challenges. At the time, state-ofthe-art<br />

prediction algorithms either<br />

did not account for how humans<br />

perceive distorted images, or were<br />

too computationally intensive to<br />

be practical. Drawing from neuroscience<br />

models of low-level vision,<br />

the SSIM model disruptively solved<br />

both problems by providing the<br />

world’s best solution to the video<br />

quality prediction problem at at a<br />

low computational cost.<br />

“The first breakthrough was a<br />

very simple model developed by an<br />

advanced graduate student, Zhou<br />

Wang and myself called Universal<br />

Quality Index. We later developed<br />

the final SSIM model with another<br />

grad student (Hamid Sheikh) and<br />

our NYU collaborator, Professor<br />

Eero Simoncelli,” Bovik said.<br />

The students’ efforts were critical,<br />

Bovik said, particularly Wang’s<br />

development of the efficient SSIM<br />

model and Sheikh’s NSF-supported<br />

large-scale human study of picture<br />

quality.<br />

“NSF support of graduate students<br />

28<br />

is a major reason for the success of<br />

many research projects,” Bovik said.<br />

Early in Bovik’s academic career-<br />

-back in the mid-1980s--he began<br />

collaborating with visual psychologists<br />

and neuroscientists to better<br />

understand perception. In the process,<br />

he became an accomplished vision<br />

scientist.<br />

With support from<br />

NSF, he applied discipline-crossing<br />

theories<br />

about how humans see<br />

and perceive objects and<br />

motion, and used them<br />

to accurately assess how<br />

naturalistic or distorted<br />

an image or video would<br />

appear to a human viewer.<br />

Among the insights<br />

from visual perception<br />

theory that the SSIM<br />

model incorporates are:<br />

Contrast masking, where the<br />

texture or “busyness” causes image<br />

distortions to become less perceptible.<br />

Luminance masking, whereby<br />

distortion is less visible in brighter<br />

regions.<br />

And structural similarity, the<br />

idea that visually important structures,<br />

such as edges and details, are<br />

modified or destroyed by compression,<br />

which can also give rise to new<br />

“false” structures that are perceived


as distortion. Humans perceive visual<br />

distortions, such as compression,<br />

blur or noise, remarkably consistently<br />

with each other.<br />

When Bovik’s team tested their<br />

SSIM index on the world’s largest<br />

databases, including as many as<br />

25,000 human judgments of quality,<br />

they found it successfully predicted<br />

human quality assessments to a<br />

larger degree than any previous algorithms.<br />

This was later confirmed<br />

on even larger datasets containing<br />

more than 250,000 human judgments<br />

of picture distortion.<br />

“When distortions such as blur,<br />

noise, compression artifacts and<br />

channel errors appear, it’s something<br />

that your brain responds to very<br />

quickly,” Bovik said. “It’s instantly<br />

annoying to some degree and that<br />

degree of annoyance is amazingly<br />

consistent among humans.”<br />

The SSIM model has proved indispensable<br />

to broadcasters and has become<br />

a de facto industry standard,<br />

widely commercialized around the<br />

globe in a variety of products.<br />

Beyond its adoption as a standard<br />

tool in broadcast and postproduction<br />

houses throughout the<br />

television industry, the SSIM index<br />

is part of the global ITU standard<br />

H.264 video coding reference software--one<br />

of the most commonly<br />

used formats for the recording,<br />

compression and distribution of<br />

video content. This allows developers<br />

everywhere to “SSIM-optimize”<br />

their encoder implementations and<br />

rate-control protocols.<br />

“This research is an excellent example<br />

of how a deep understanding<br />

of basic science can lead to technological<br />

advances that have positive<br />

benefits across the globe,” said<br />

Lynne Parker, division director for<br />

Information and Intelligent Systems<br />

at NSF. “Dr. Bovik’s research team<br />

has translated a scientific understanding<br />

of human perception into<br />

vast improvements in our global,<br />

video-based communications technologies.<br />

Breakthrough advances<br />

such as the SSIM index illustrate the<br />

broad impact that is possible as a result<br />

of investment in fundamental,<br />

interdisciplinary research.”<br />

Other applications<br />

Bovik and his students did not stop<br />

with SSIM. He has gone on to create<br />

many newer technologies for<br />

image processing and video quality<br />

assessment with NSF funding. These<br />

include MOVIE (the MOtion-based<br />

Video Integrity Evaluation) index<br />

for video quality assessment, the<br />

DIIVINE, BRISQUE, BLIINDS and<br />

NIQE no-reference image and video<br />

quality models and the LIVE Image<br />

and Video Quality Databases.<br />

Recently, again with funding from<br />

NSF, he created algorithms that can<br />

assess the quality of images without<br />

an original reference image--an<br />

29<br />

even trickier task. This research was<br />

inspired in part by work by a famous<br />

result in visual neuroscience<br />

that suggests that images of the real<br />

world, if they are of good quality,<br />

obey certain statistical laws.<br />

“These laws can be used to explain<br />

the success of the SSIM model and<br />

of other algorithms that we’ve created,<br />

and we have also used them<br />

to design the new breed of ‘blind’<br />

models that do not need a reference<br />

signal,” Bovik said. “The human visual<br />

system has evolved in response<br />

to those statistics. By observing<br />

those statistics, we can predict how<br />

neurons will respond to the early<br />

vision system and vice-versa: by<br />

examining the brain, we can get insights<br />

into natural scene statistics. If<br />

you have a photograph or video and<br />

it doesn’t obey those scene statistics,<br />

then it’s likely been distorted.”<br />

Bovik and his team are applying<br />

this idea to a range of digital image<br />

quality issues. Their solutions range<br />

from algorithms can give digital<br />

cameras the ability to determine<br />

whether photographs are objectively<br />

“good,” to systems that can significantly<br />

improve the accuracy of<br />

facial recognition, to advanced image<br />

capture methods using infrared<br />

and other wavelengths.


Intelligent Video Surveillance<br />

OnSSI and Galaxy Control deliver seamlessly integrated<br />

VMS and access control solution Provides Heightened<br />

Situational Awareness and Streamlined Investigations<br />

Pearl River, NY, <strong>October</strong> 29 - In<br />

continuing to deliver higher performance<br />

and added value to customers,<br />

OnSSI announces that the System<br />

Galaxy access control solution<br />

from Galaxy Control Systems fully<br />

integrates and supports the Company’s<br />

Ocularis 5 Video Management<br />

Software (VMS). The integration<br />

of these industry- leading VMS<br />

and access control solutions provides<br />

users with greatly enhanced<br />

real-time situational awareness and<br />

significantly streamlines the postevent<br />

investigation process.<br />

“The correlation of video and access<br />

control provides users with an<br />

effective, efficient and intelligent<br />

solution that is proven to improve<br />

overall security and heighten situational<br />

awareness,” said Ken La-<br />

Marca, VP of Sales and Marketing,<br />

OnSSI. “The integration with Galaxy<br />

Control Systems was facilitated<br />

by Ocularis’ open architecture,<br />

which enables the ability to process<br />

comprehensive intelligence across<br />

multiple platforms.”<br />

Working in concert with System<br />

Galaxy, OnSSI’s Ocularis 5 provides<br />

critical information that lets operators<br />

quickly assess situations as<br />

they unfold, and use the information<br />

gathered to determine the best<br />

course of action.<br />

“The combination of Ocularis 5<br />

30<br />

and System Galaxy creates a unique<br />

and powerful VMS-Access Control<br />

solution that capitalizes on the combined<br />

strengths of these respective<br />

platforms to improve overall safety<br />

and security,” said Robert Laughlin,<br />

President, Galaxy Control Systems.<br />

“The latest version of System Galaxy<br />

includes enhancements that further<br />

enhance the user experience and<br />

streamline installation, while providing<br />

a comprehensive access and<br />

surveillance management platform<br />

by integrating OnSSI’s Ocularis 5.”<br />

The seamless integration between<br />

Ocularis 5 and System Galaxy enables<br />

real-time access control activity<br />

and user-defined, real-time<br />

on-screen event annotation. Each<br />

door can be assigned a preset NVR/<br />

DVR and camera, with alerts triggered<br />

by valid or invalid access attempts,<br />

which are tied to pre- and<br />

post-event video. Upon receiving an<br />

alert, operators can engage the full<br />

power of both Ocularis and System<br />

Galaxy to quickly and easily retrieve<br />

live video, control cameras, lock/<br />

unlock doors and much more. In<br />

addition to delivering unprecedented<br />

real-time situational awareness<br />

the combined solution provides


faster and more accurate retrieval of<br />

correlated video and data for more<br />

effective and efficient post-event investigations.<br />

Ocularis 5 is based on a new recorder<br />

that accommodates a significantly<br />

higher density of cameras<br />

per recorder while maximizing<br />

HDD storage without the need for<br />

user configuration. It features automatic<br />

load balancing for managing<br />

recordings across system servers.<br />

Ocularis 5 also allows for multiple<br />

different recorders to be combined<br />

under the same Base (including<br />

legacy Ocularis 4.X recorders) with<br />

centralized user and event management.<br />

System Galaxy is a scalable, enterprise-class<br />

access control and<br />

management solution, seamlessly<br />

integrates security and building<br />

management functions. Additional<br />

features include active directory<br />

support to enable real-time identity<br />

management, individualized identity-based<br />

door access, and the ability<br />

to generate specific reports for each<br />

screen view or credential holder.<br />

Data can be shared with other systems<br />

such as time and attendance,<br />

visitor management, time clocks,<br />

parking garages and personal messaging.<br />

System Galaxy accommodates<br />

unlimited users and is also<br />

accessible from mobile web browsers<br />

and designed for backward compatibility<br />

with all legacy Galaxy systems.<br />

For more information on OnSSI visit<br />

www.onssi.com.<br />

About OnSSI<br />

On-Net Surveillance Systems, Inc.<br />

(OnSSI) was founded in 2002 with<br />

the goal of developing comprehensive<br />

and intelligent IP video surveillance<br />

management software. OnSSI’s<br />

Ocularis IP security and surveillance<br />

VMS platform increases security,<br />

reduces operational costs, and<br />

helps organizations move closer to<br />

prevention. Ocularis delivers open<br />

architecture, flexibility, and scalability<br />

for a range of applications including<br />

education, gaming, government,<br />

healthcare, manufacturing,<br />

public safety, transportation, and<br />

utilities. OnSSI is headquartered in<br />

Pearl River, New York and has representation<br />

in over 100 countries.<br />

With its acquisition of Germanybased<br />

VMS company, SeeTec AG<br />

and the launch of Ocularis 5, OnSSI<br />

continues to drive global expansion<br />

and technological innovations.<br />

31<br />

About Galaxy Control Systems<br />

Galaxy Control Systems, a privately<br />

held company headquartered in<br />

Walkersville, MD, is a leader in the<br />

integrated access control industry.<br />

The company’s hardware and software<br />

solutions, all manufactured<br />

in the USA, provide access control,<br />

video surveillance, alarms, photoimaging,<br />

badging, elevator control,<br />

building management and time and<br />

attendance for small applications,<br />

fully integrated security management<br />

systems and enterprise-class<br />

control systems. All Galaxy Control<br />

Systems products are scalable and<br />

backwards compatible, designed<br />

and engineered to deliver lower Total<br />

Cost of Ownership and a higher<br />

Return on Investment than competitive<br />

products. With unsurpassed<br />

technical support, Galaxy supports<br />

their reseller partners with free ongoing<br />

training while providing the<br />

highest levels of system implementation<br />

and maintenance.<br />

For more information on Galaxy<br />

Control Systems’ extensive line of<br />

products, visit www.galaxysys.com.


Intelligent Video Surveillance<br />

PureTech Systems supports upgrade of<br />

Remote Video Surveillance System for Customs<br />

and Border Protection<br />

PHOeNiX, aZ. -- Puretech Systems<br />

inc., a leading manufacturer<br />

of geospatial video analytic software,<br />

today announced that it recently<br />

completed the initial field<br />

deployment and test of the remote<br />

video Surveillance System (rvSS)<br />

Upgrade for the U.S. customs and<br />

border Protection (cbP). This test<br />

successfully demonstrated the technical<br />

capabilities of the system and<br />

was a key program milestone in its<br />

deployment schedule, which includes<br />

installation at additional border<br />

patrol stations this year.<br />

USbP agents are now operating<br />

the rvSS in Nogales, ariz.<br />

Puretech Systems, a member of the<br />

general Dynamics OneSource team<br />

(gDOS), which was awarded the<br />

rvSS Upgrade contract, provides<br />

the software for full motion video,<br />

target detection, sensor control and<br />

the geospatial user interface.<br />

located on elevated fixed towers<br />

and building structures, the rvSS<br />

Upgrade wide-area electro-optical<br />

and infrared multi-sensor camera<br />

system provides border Patrol<br />

agents with persistent ground- surveillance<br />

and real-time video analyt-<br />

ics to effectively<br />

detect, track,<br />

identify, classify<br />

and respond to<br />

missions along<br />

U.S. borders. to<br />

date, Puretech<br />

Systems has<br />

participated<br />

in the deployment<br />

of a new<br />

command-andcontrol<br />

system<br />

and upgraded<br />

rvSS camera<br />

suites on new<br />

and existing tower sites supporting<br />

the Nogales border Patrol Station.<br />

During the test, the system assisted<br />

field agents in real- world missions.<br />

“The remote video Surveillance<br />

System is a critical element of our<br />

overall plan to secure the border,<br />

increase our mission effectiveness,<br />

and protect our agents,” said mark<br />

borkowski, assistant commissioner<br />

and chief acquisition executive<br />

from cbP’s Office of technology<br />

innovation and acquisition. “The<br />

gDOS team has done a great job<br />

honoring its commitments and we<br />

32<br />

The RVSS border protection upgrade, featuring video analytics and<br />

geospatial command and control developed by PureTech Systems,<br />

achieves system acceptance by Customs and Border Protection.<br />

are excited to have achieved an initial<br />

operating capability in our first<br />

area of responsibility. We look forward<br />

to continuing this strong relationship,<br />

and to completing the rest<br />

of our arizona deployments over<br />

the next year.”<br />

“The rvSS Upgrade program deployment<br />

is an important milestone<br />

for Puretech Systems, for our Pureactiv<br />

software suite, and for the entire<br />

general Dynamics rvSS team,”<br />

explained larry bowe, president of<br />

Puretech Systems. “Our solution is<br />

targeted at ground-based defense


and homeland security applications<br />

which require long range, accurate<br />

performance in various terrain and<br />

weather conditions. The system acceptance<br />

of PureTech’s solution<br />

for use at the U.S. border confirms<br />

that we are correctly addressing the<br />

needs of this market.”<br />

The RVSS Upgrade program has<br />

a potential 10-year performance<br />

period, during which the General<br />

Dynamics OneSource team, which<br />

includes PureTech Systems, will<br />

manage the operation and maintenance<br />

at all sites.<br />

PureTech Systems Inc. is a manufacturer<br />

of wide-area perimeter surveillance<br />

software solutions including<br />

internally developed outdoor video<br />

analytics, multi-sensor integration<br />

and a map-based (real object size)<br />

command and control. It is offered to<br />

fortune 1000 firms, petro-chemical,<br />

water and electric utilities, seaports,<br />

airports and federal, state and local<br />

governments. With headquarters in<br />

Phoenix Arizona, PureTech Systems<br />

serves national and international<br />

markets. To find out more about<br />

PureTech Systems Inc. visit our website<br />

at www.puretechsystems.com or<br />

contact Eric Olson at 602-424-9842<br />

or Eric.Olson@PureTechSystems.com.<br />

ThreatConnect & DGI uncover<br />

extensive South Chinese espionage<br />

Continued from page 9<br />

cal analysis, as well as data visualization<br />

to clearly connect the points<br />

between the adversary, their capabilities,<br />

the infrastructure they used<br />

and the victims being targeted.<br />

To create this report, ThreatConnect<br />

used a unique methodology<br />

built into their Threat Intelligence<br />

Platform called The Diamond Model<br />

of Intrusion Analysis. Using that<br />

repeatable process, any ThreatConnect<br />

user can derive a multidimensional<br />

picture of the underlying relationships<br />

between threat actors,<br />

their tools, techniques and processes.<br />

The full Project CAMERASHY<br />

report is available at http://www.<br />

threatconnect.com/camerashy.<br />

About ThreatConnect, Inc.<br />

ThreatConnect, Inc. provides industry-leading<br />

advanced threat<br />

intelligence software and services<br />

including ThreatConnect®, the<br />

most comprehensive Threat Intelligence<br />

Platform (TIP) on the market.<br />

ThreatConnect delivers a single<br />

platform in the cloud and on-premises<br />

to effectively aggregate, analyze,<br />

and act to counter sophisticated<br />

cyber-attacks. Leveraging advanced<br />

analytics capabilities, ThreatConnect<br />

offers a superior understanding<br />

of relevant cyber threats to business<br />

operations. To register for a free<br />

ThreatConnect account, or to learn<br />

more about our products and services,<br />

visit: www.threatconnect.com.<br />

33


Intelligent Video Surveillance<br />

Milestone goes wide with new device pack<br />

COPENHAGEN – <strong>October</strong> 29,<br />

<strong>2015</strong>. Milestone Systems, the open<br />

platform company in networked<br />

video management software (VMS),<br />

has released Device Pack 8.2 for<br />

partners and customers using Milestone<br />

XProtect monitoring solutions.<br />

A highlight of this release is support<br />

for perspective correction of<br />

video from 180, 270 or 360 degree<br />

panoramic cameras from Pelco by<br />

Schneider Electric. The support is<br />

achieved by a plugin to the Milestone<br />

XProtect Smart Client. Global<br />

unit shipments of 180/360 degree<br />

panoramic network camera is forecast<br />

to increase by more than 60<br />

percent year-on-year according to<br />

research analysts IHS. Panoramic<br />

cameras are predicted to gain market<br />

share in verticals such as retail,<br />

airports, and casinos, where<br />

monitoring wide indoor areas is a<br />

key requirement of the video security<br />

solution. In these scenarios, the<br />

cameras can reduce capital expenditure<br />

as fewer cameras are required<br />

to cover the same area compared to<br />

fixed or PTZ cameras.<br />

The challenge using fisheye panoramic<br />

cameras is that the picture<br />

from the camera needs perspective<br />

correction, which can be adjusted in<br />

the camera or in the software. This<br />

process called dewarping has several<br />

benefits when done in the software<br />

as it allows retrospective viewing.<br />

This gives the user the ability<br />

to go back in time to view the total<br />

scene in its original form and then<br />

pan, tilt, and/or zoom with corrected<br />

perspective within the 360-degree<br />

image.<br />

In addition to the support for Pelco<br />

panoramic cameras, nearly 200<br />

devices have been added to Milestone<br />

Device Pack 8.2. This list of<br />

new model support includes cameras<br />

from Axis Communications,<br />

Bosch and Samsung Techwin. The<br />

number of ONVIF-supported devices<br />

has increased by 64 now totaling<br />

1271 devices.<br />

ONVIF Testing Ensures Quality<br />

The XProtect Device Packs include<br />

tested drivers that are optimized<br />

to enable the capabilities of a camera<br />

or other hardware device to be<br />

managed by XProtect software.<br />

Testing the drivers ensures the highest<br />

functionality for a video surveillance<br />

solution, which is important<br />

for total system operability, efficiency<br />

and stability. Milestone works<br />

closely with the device manufacturers<br />

in the Camera Partner Program<br />

34<br />

(CaPP) to achieve the optimal interaction<br />

between their devices and<br />

the XProtect VMS.<br />

Milestone has always promoted<br />

driver standards like ONVIF and<br />

remains dedicated to supporting<br />

the broadest range of cameras and<br />

devices on the market. In the case<br />

of ONVIF supported devices, it is<br />

often assumed that a device that<br />

has passed the ONVIF test tool will<br />

work fully in a given infrastructure.<br />

This is not always the case as there<br />

are marked idiosyncrasies that need<br />

to be taken into account to insure<br />

proper interoperability and to leverage<br />

full feature use of a device with<br />

a VMS. Before ONVIF supported<br />

devices are listed on the Milestone<br />

supported hardware list on milestonesys.com,<br />

they have been tested<br />

to ensure that the functionality with<br />

XProtect is compliant with the ON-<br />

VIF specifications.<br />

In the Milestone CaPP, this ON-<br />

VIF functionality test can be done<br />

by Milestone or the vendors can do<br />

the testing in their facility after they<br />

have completed a 4-day Milestone<br />

training class. The ability to do the<br />

complete Milestone certification<br />

test can save time and costs for camera<br />

manufacturers in their go-tomarket<br />

strategy.


Coming Attractions:<br />

“We are constantly working with<br />

our camera partners to provide the<br />

highest quality solutions for the<br />

benefit of our partners and mutual<br />

customers,” says Henrik Sydbo<br />

Hansen, Head of the camera Partner<br />

Program at milestone Systems.<br />

“This ensures the highest possible<br />

quality for a video surveillance solution.”<br />

The milestone XProtect Device<br />

Pack 8.2 is available now for download<br />

from:<br />

www.milestonesys.com/support/<br />

download-software<br />

About Milestone Systems<br />

milestone Systems is a global industry<br />

leader in open platform iP<br />

video management software, founded<br />

in 1998 and now operating as a<br />

stand-alone company in the canon<br />

group. milestone technology is<br />

easy to manage, reliable and proven<br />

in thousands of customer installations,<br />

providing flexible choices in<br />

network hardware and integrations<br />

with other systems. Sold through<br />

partners in more than 100 countries,<br />

milestone solutions help organizations<br />

to manage risks, protect<br />

people and assets, optimize processes<br />

and reduce costs.<br />

Use of trademarks<br />

milestone Systems and the milestone<br />

logo are trademarks or registered<br />

trademarks of milestone<br />

Systems in the U.S. and other countries.<br />

a listing of the milestone<br />

trademarks can be found at news.<br />

milestonesys.com/trademark-information.<br />

all other trademarks and<br />

registrations are property of their<br />

respective owners.<br />

35<br />

<strong>November</strong> Print <strong>Edition</strong><br />

Technology Focus:<br />

Intrusion Detection/<br />

Perimeter Protection<br />

Market Focus:<br />

Airport/Aviation Security<br />

December <strong>Digital</strong> <strong>Edition</strong><br />

Technology Focus:<br />

Access Control/ID &<br />

Insider Threats<br />

Special Year-End<br />

Focus:<br />

DIGITAL YEARBOOK of<br />

<strong>2015</strong> Airport/Seaport/<br />

Rail/Border Security<br />

Awards Winners<br />

And<br />

<strong>2015</strong> Homeland<br />

Security IT, Physical<br />

Security, Government<br />

Awards Winners


Intelligent Video Surveillance<br />

Using video intelligence to protect<br />

critical public infrastructure<br />

By Kimbry McClure<br />

Law enforcement and other entities<br />

charged with protecting national security<br />

are spending more time than<br />

ever planning and implementing<br />

security measures that ensure national<br />

security and improve public<br />

safety. This is for good reason: from<br />

the energy grid to sporting events to<br />

airports, security personnel know<br />

these venues are enticing targets<br />

for terrorist attacks due to the large<br />

amount of people and resources<br />

clustered together in one place.<br />

In a world of heightened extremism,<br />

lone wolf attacks, and general<br />

global instability, it is not beyond<br />

imagination to foresee a scenario<br />

where a small team of terrorists<br />

seizes a U.S. airport. With the prospect<br />

of hostage taking and hijackings<br />

looming large, the response<br />

time for emergency personnel and<br />

law enforcement becomes critical.<br />

First responders must locate the terrorists<br />

and their hostages quickly<br />

to coordinate an effective response.<br />

This requires enhanced detection<br />

capabilities that can seamlessly<br />

distribute information to decision<br />

makers and emergency personnel<br />

to identify and respond to threats in<br />

real time.<br />

To stay a step ahead of attackers,<br />

security and emergency personnel<br />

need a common operational picture<br />

to communicate with civil and federal<br />

agency authorities. This picture<br />

is not only essential in coordinating<br />

a rescue, but also in securing additional<br />

areas of the airport facility<br />

that the terrorists have yet to seize<br />

as well as collect evidence for both<br />

investigative and legal purposes.<br />

With many entities tasked with<br />

restoring airport security, organizations<br />

need the right technology<br />

to assist them. An important tool<br />

emerging in security today is a video<br />

intelligence system that assists<br />

emergency responders and officials<br />

in reaching their security objectives.<br />

Not Your Old-School<br />

CC-TV Cameras<br />

Many people imagine video surveillance<br />

cameras to be a single camera<br />

mounted on a wall pointing in a<br />

particular direction and transmitting<br />

video to a single television. In<br />

this scenario, multiple cameras in<br />

different locations within the same<br />

building work in isolation and only<br />

36<br />

detect motion and images.<br />

Most people do not realize that<br />

video intelligence has evolved tremendously<br />

in recent years. Today’s<br />

video intelligence system consists<br />

of a wide range of disparate sensor<br />

data combined into a single portal.<br />

The integration of sensor data into<br />

one place is a critical development<br />

for law enforcement working in


time sensitive situations.<br />

Back in our besieged airport, authorities<br />

do not have time to monitor<br />

separate video camera, alarm<br />

systems, GPS, and other audio, visual,<br />

and social media monitoring<br />

systems separately. Officials need<br />

data from these sensors to be organized<br />

in such a way that patterns<br />

can be quickly detected to ensure<br />

rapid decision-making.<br />

As law enforcement officials analyze<br />

the data received from multiple<br />

sensors, a video intelligence system<br />

triages the data received. During<br />

the airport terrorist attack, law enforcement<br />

is able to discern that the<br />

screaming coming from an airport<br />

personnel-only hallway is more important<br />

to respond to than the traveling<br />

high school band playing their<br />

instruments in the airport concourse.<br />

First responders have the<br />

ability to triage behaviors because<br />

the video intelligence system has<br />

automated the monitoring process<br />

on a scale much larger than manpower<br />

can provide.<br />

Automating data collection, organization<br />

and storage gives law enforcement<br />

attempting to prevent or<br />

respond to a terrorist attack a more<br />

speedy, meticulous and effective<br />

overall security strategy. Authorities<br />

no longer have to allocate manpower<br />

to spending time searching<br />

and investigating each person who<br />

is in a facility. Since different people<br />

present various behaviors, some that<br />

indicate a higher security risk than<br />

others, video intelligence systems<br />

flag these behaviors for law enforcement<br />

and give them the knowledge<br />

needed to make critical decisions.<br />

Overcoming the Unknown<br />

Adding automation to data collection<br />

and analysis provides other<br />

benefits. Criminals and terrorists<br />

are constantly changing their tactics.<br />

As a result, law enforcement<br />

does not always know the behavior<br />

profile to match the changing<br />

tactics. The integration of a video<br />

intelligence system provides law enforcement<br />

flexibility to quickly and<br />

easily input into the system new behaviors<br />

for the sensors to monitor.<br />

Without unified data management,<br />

authorities would need to take more<br />

time and manpower to update the<br />

sensors on what new behaviors to<br />

track.<br />

Authorities may also face uncertainty<br />

over which agencies, groups<br />

and decision makers need access to<br />

which data points. Today’s homeland<br />

security and emergency response<br />

strategies involve multiple<br />

agencies, organizations and decision<br />

makers. These groups require<br />

that data be shared in real-time to<br />

establish a common operating picture.<br />

The video intelligence system<br />

37<br />

overcomes data sharing challenges<br />

by creating a single portal to store<br />

and view information. As a result,<br />

information can be shared with ease<br />

between various coordinating entities.<br />

How to Implement a Modern<br />

Video Intelligence System<br />

Many in government are concerned<br />

about how much value they will receive<br />

when implementing new technology<br />

systems. The good news is<br />

a modern video intelligence system<br />

is not only effective, but also simple<br />

to implement. The system’s design<br />

focuses on an interface that is integrated<br />

into an organization’s current<br />

IT systems, including legacy<br />

IT. Therefore, the video intelligence<br />

system is built based on customization<br />

and flexibility. Additionally, the<br />

video intelligence system includes<br />

sensors, compute power and onboard<br />

storage that can be installed<br />

and implemented rapidly.<br />

Deploying a video intelligence<br />

platform gives law enforcement a<br />

technological asset that keeps pace<br />

with terrorists and criminals today<br />

and in the future. By placing these<br />

tools under a single management<br />

layer, law enforcement can devote<br />

more resources to what truly matters:<br />

ensuring public safety.


Intelligent Video Surveillance<br />

Louroe CEO discusses emerging surveillance<br />

technologies: Audio Analytics<br />

by richard brent, ceO<br />

louroe electronics<br />

crime never sleeps. law enforcement<br />

officers know this<br />

all too well as they are constantly<br />

reacting to theft, vandalism<br />

and assault incidents. Over<br />

the years, surveillance technology<br />

has grown to play an increasingly<br />

important role in delivering critical<br />

details to investigators and first responders.<br />

many security personnel rely<br />

on cctv and video analytics<br />

to learn important information<br />

about a suspect and crime<br />

scene. cameras can even detect<br />

a range of bad behaviors.<br />

However, video analytics alone<br />

does not yield a high success<br />

rate of incident detection. cameras<br />

are mainly used to review interactions<br />

after the event has occurred.<br />

This is where audio analytics must<br />

come into the picture. video surveillance<br />

is primarily reactive, but<br />

audio can be used to proactively deter<br />

altercations. but what exactly is<br />

audio analytics?<br />

audio analytics is the ability to<br />

analyze and identify a<br />

sound. Similar to how<br />

the human ear processes<br />

audio, the analytic software<br />

analyzes sounds<br />

through advanced algorithms<br />

and classifies it<br />

into a predetermined category such<br />

as aggression or breaking glass.<br />

The other advantage that audio<br />

analytics provide is confidentiality.<br />

language content is not analyzed<br />

during sound detection. The software<br />

does not listen to words, but<br />

distortion and physiological changes<br />

in the voice. in other words, the<br />

technology is language agnostic and<br />

upholds privacy.<br />

recently, there have been great<br />

innovations in the audio analytics<br />

market. in <strong>2015</strong>, louroe electronics,<br />

industry leader in audio monitoring<br />

in the security industry, and Sound<br />

38<br />

intelligence, a premier audio classification<br />

software developer in the<br />

Netherlands, partnered to launch<br />

a suite of audio analytic solutions,<br />

most notably the aggression Detector<br />

and gunshot Detector. The<br />

analytic products integrate louroe’s<br />

microphones, select iP cameras and<br />

leading video management software<br />

(vmS).<br />

The aggression Detector is a valuable<br />

deterrence tool because it distinguishes<br />

the sounds commonly<br />

associated with verbal aggression,<br />

such as screaming,<br />

shouting and yelling.<br />

Sound intelligence’s detection<br />

software automatically<br />

filters out background noises–<br />

such as traffic, weather,<br />

slamming doors and ventilation<br />

systems– while objectively<br />

detecting (rising) human aggression,<br />

anger or fear. The system then<br />

warns staff immediately (by a visual<br />

alert or by triggering an alarm) so<br />

that physical aggression can be prevented.<br />

analytics make the problem<br />

of aggression measurable. it also<br />

ensures that no incident goes unnoticed,<br />

and by the same token, that all


incidents are analyzed to avoid false<br />

alarms.<br />

Reports state that 90 percent of<br />

physical aggression is preceded by<br />

verbal aggression so this software<br />

truly is a game changer. By using the<br />

technology, more incidents are deterred<br />

as well as their costly consequences.<br />

Installing audio analytics<br />

software is far less expensive than<br />

assault investigation or lawsuit fees,<br />

creating a high return on investment.<br />

The Gunshot Detector recognizes<br />

gun discharge up to 3,000 feet away<br />

in quiet environments, and accurately<br />

analyzes gunshots from a<br />

variety of weapons including handguns,<br />

shotguns, rifles and automatic<br />

rifles. The key benefit that this solution<br />

offers end users is shortened<br />

response time as the detector sends<br />

an immediate notification to police<br />

and first responders upon identifying<br />

a gunshot.<br />

Over the next several years, the<br />

security industry will likely see an<br />

increase of sound detectors in cities,<br />

education centers, commercial<br />

buildings and correctional facilities.<br />

It’s only a matter of time before<br />

audio analytics becomes as commonplace<br />

as video analytics as law<br />

enforcement continues to partner<br />

with companies and their security<br />

departments to decrease crime.<br />

39


Coming Attractions – 2016<br />

January Print<br />

Technology Focus:<br />

Access Control/Govt<br />

& Biometric ID<br />

Market Focus:<br />

Airport/Aviation<br />

Aviation Security<br />

Plus<br />

Guest Cyber Expert<br />

February <strong>Digital</strong><br />

Technology Focus:<br />

Perimeter Protection<br />

Intrusion Detection<br />

Market Focus:<br />

Oil/Gas/Utility<br />

Monitoring<br />

Plus<br />

Education Profile<br />

April <strong>Digital</strong><br />

Technology Focus:<br />

Video Surveillance<br />

Market Focus:<br />

Maritime/Coastal<br />

Port Security<br />

Plus<br />

Guest Cyber Expert<br />

May Print<br />

Technology Focus:<br />

Satellite Communications<br />

Market Focus:<br />

Law Enforcement/<br />

Public Safety<br />

Plus Education Profile<br />

June <strong>Digital</strong><br />

Technology Focus:<br />

Disaster Preparation<br />

And Response<br />

Market Focus:<br />

City/State/County/<br />

Municipal Security<br />

Plus<br />

Guest Cyber Expert<br />

July Print <strong>Edition</strong><br />

Technology Focus:<br />

Perimeter Protection/<br />

Intrusion Detection<br />

Market Focus:<br />

Airport/Aviation<br />

Security<br />

Plus<br />

Facility Security Expert<br />

March Print<br />

Technology Focus:<br />

CBRNE/Detection<br />

Market Focus:<br />

Border Security/<br />

Immigration<br />

Plus<br />

Video Surveillance<br />

Guest Expert<br />

For GSN Media Kit or Advertising Rates,<br />

contact Publisher Mike Madsen<br />

at 732-233-8119<br />

or by email at<br />

mmadsen@gsnmagazine.com<br />

40


The News Leader in Physical, IT and Homeland Security<br />

CEO/Editorial Director:<br />

Adrian Courtenay<br />

(O) 212-344-0759, X3<br />

(C) 917-696-5782<br />

acourtenay@gsnmagazine.com<br />

Publisher:<br />

Michael Madsen<br />

(O) 212-344-0759, X1<br />

(C) 732-233-8119<br />

mmadsen@gsnmagazine.com<br />

Senior Writer:<br />

Steve Bittenbender<br />

(C) 502-552-1450<br />

sbittenbender@gsnmagazine.com<br />

Senior Writer:<br />

Karen Ferrick-Roman<br />

(C) 412-671-1456<br />

karenferrickroman@gmail.com<br />

Columnist:<br />

John Convy<br />

Convy on Netcentric Security<br />

john@convyassociates.com<br />

Columnist:<br />

Shaun Campbell<br />

shauncampbell@safenetat.com<br />

Guest Expert Contributor:<br />

Denise Rucker Krepp<br />

(C) 202-546-2533<br />

kdrkrepp@hotmail.com<br />

Art Director:<br />

Gerry O’Hara<br />

OHDesign3<br />

(C) 203-249-0626<br />

gerry@ohd3.com<br />

Production Director:<br />

Tammy Waitt<br />

(O) 732-233-0245<br />

twaitt@gsnmagazine.com<br />

Mailing Address:<br />

Government Security News<br />

P.O. Box 7608<br />

Greenwich, CT 06836<br />

Government Security News (ISSN 1548-940X and UPS 022-845) is published in six print editions (Jan, Mar, May, Jul, Sep, Nov) and<br />

six digital editions (Feb, Apr, Jun, Aug, Oct, Dec) per year by World Business Media, LLC, P.O. Box 7608, Greenwich, CT 06836.<br />

Telephone (212) 344-0759. Periodicals postage paid at New York, NY and additional mailing offices. POSTMASTER: Send address<br />

changes to GSN: Government Security News, Subscription Department, P.O. Box 316, Congers, NY 10920-0316. For Government<br />

decision makers and business executives involved with security products, systems and series. Qualified U.S. subscribers received<br />

GSN: Government Security News at no charge. Non-qualified subscribers in the U.S. are charged $75.00 per year. Canadian and<br />

foreign subscribers are charged $140 International Airmail. Copyright <strong>2015</strong> by GSN: Government Security News. All rights reserved.<br />

Printed in the U.S.A. GSN: Government Security News assumes resonsibility for validity of claims in items reported.<br />

41


Secure access<br />

to cloud, data<br />

and door<br />

Go beyond simple passwords. Protect your<br />

organisation with cost-effective, risk appropriate<br />

Identity Assurance Solutions from HID Global.<br />

With the ever increasing risk from advanced IT security threats, organisations are looking to take authentication<br />

beyond passwords, while lowering cost at the same time. HID Global’s authentication solution provides you<br />

with the convenience, flexibility and comprehensive control you need to deliver secure access, without<br />

compromising on security. HID Global can empower your employee’s, partners and customers with anytime,<br />

anywhere access to enterprise cloud applications, data and the door.<br />

Experience authentication beyond passwords. hidglobal.com<br />

© <strong>2015</strong> HID Global Corporation/ASSA ABLOY AB. All rights reserved. HID, HID Global, the HID Blue Brick logo, and the Chain Design are trademarks or registered trademarks of HID Global or its<br />

licensor(s)/supplier(s) in the US and other countries and may not be used without permission.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!