GSN Dec 2015/Jan 2016 Digital Edition
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
Government Security News<br />
DECEMBER <strong>2015</strong>/JANUARY <strong>2016</strong> DIGITAL EDITION<br />
Trump’s Muslim immigration policy is unconstitutional and unworthy of America,<br />
say prominent law professors – More on Page 14<br />
Also in this issue:<br />
FAA Administrator Huerta discusses U.S.-Israeli collaboration in aviation law & technologies – Page 6<br />
National Science Foundation announces award in design, operation of critical infrastructure systems – Page 8<br />
Congress funds government and extends immigration for ten months – Page 10<br />
Sonavation announces SonicTouch ultrasound biometric authentication solution – Page 24
<strong>GSN</strong> <strong>Dec</strong>ember <strong>2015</strong>/<strong>Jan</strong>uary <strong>2016</strong> <strong>Digital</strong> <strong>Edition</strong><br />
Table of Contents<br />
<strong>GSN</strong> TECHNOLOGY SPOTLIGHT<br />
Battelle plans demonstration of active shooter alarm system.<br />
Former Central Intelligence Agency analyst Ed Jopek discusses<br />
Battelle’s recently tested SiteGuard Active Shooter Response system,<br />
which will be demonstrated to police at a school near Columbus, Ohio<br />
later this month. “In ten or eleven years building systems like SiteGuard<br />
ASR will be as common as smoke detection and fire systems are<br />
today,” Jopek predicts.<br />
Read more on Page 4.<br />
Insider Threats: <strong>GSN</strong> Columnist Shawn Campbell explains why<br />
passwords are not enough.<br />
<strong>GSN</strong>’s new Columnist Shawn Campbell, nationally recognized cryptology<br />
expert and Safenet Assured Technologies VP, discusses insider<br />
threats and explains why passwords aren’t enough. “Unauthorized<br />
access to local networks by employees Is now part of almost every<br />
discussion on cybersecurity,” he points out. “A multifactor approach is<br />
the only way to minimize the danger of insider threats.”<br />
Read more on Page 22.<br />
2
NEWS AND FEATURES<br />
Battelle plans demonstration of active shooter<br />
alarm system Page 4<br />
FAA Administrator speaks at Israeli Aerospace<br />
Dinner Page 6<br />
National Science Foundation announces<br />
interdisciplinary awards program on critical infrastructure<br />
studies Page 8<br />
Congress funds government and extends<br />
immigration for ten months Page 10<br />
CenturyLink VP commends House of<br />
Representatives’ passage of Internet Tax Freedom<br />
Page 12<br />
Investigation by Texas Observer finds systemic<br />
corruption at Customs & Border Protection Page 15<br />
Coalition’s legal brief urges Supreme Court to<br />
reverse Texas v. U.S. immigration decision Page 16<br />
Airport police support legislative efforts to tighten<br />
internal airport security Page 18<br />
Access Control, ID, Insider Threats<br />
____________________________________<br />
Campbell on Crypto – Insider Threats:<br />
Why passwords aren’t enough Page 22<br />
Sonavation announces SonicTouch ultrasound<br />
biometric authentication solution Page 24<br />
Smart Card strong authentication protects<br />
workstations, mobile devices and networks Page 25<br />
New Entrust cloud capabilities simplify SSL<br />
certificate management Page 26<br />
Viscount unveils Freedom Channel Partner<br />
Program with enhanced technical support Page 27<br />
United Arab Emirates goes eBorder<br />
with Morpho Page 28<br />
SecuGen to showcase new unity biometric<br />
development platform Page 29<br />
Coming Attractions/<strong>GSN</strong> Mast Head Page 38<br />
U.S. Congress of Mayors President applauds<br />
unprecedented agreement at COP21 Page 19<br />
FAA announces user-friendly aircraft registration<br />
for small unmanned aircraft Page 20<br />
FAA updates airspace obstructions standards<br />
to make airspace safe and navigable Page 21<br />
3
Battelle plans demonstration of active<br />
shooter alarm system<br />
By Steve Bittenbender<br />
The future of building safety has<br />
been installed at an Ohio high<br />
school.<br />
Battelle, the largest independent<br />
research and development organization<br />
in the world, recently tested its<br />
SiteGuard Active Shooter Response<br />
system at a school near Columbus,<br />
in central Ohio. Officials will showcase<br />
the system to police, security<br />
and other officials later this month.<br />
SiteGuard brings together gunshot<br />
detectors with existing security<br />
systems, with those sensors giving<br />
essential information about the location<br />
of gunfire to first responders<br />
and people inside the building. The<br />
system works similar to smoke detectors<br />
and other fire safety devices<br />
in that SiteGuard can expedite automated<br />
calls to 9-1-1 dispatchers and<br />
mass notification subscribers.<br />
“While we may not be able to prevent<br />
these tragic shootings, we can<br />
give law enforcement technology<br />
that helps them respond more safely<br />
and effectively,” said Ed Jopeck, a senior<br />
program manager for Battelle.<br />
“In 10 or 15 years building systems<br />
like SiteGuard ASR will be as common<br />
as smoke detection and fire<br />
safety systems are today. They can<br />
help authorities to locate, detect and<br />
respond to gunfire more effectively,<br />
which can help save lives.”<br />
Jopeck is a former analyst with<br />
the Central Intelligence<br />
Agency. After leaving<br />
the CIA, he worked as a<br />
consultant and for such<br />
companies as General<br />
Dynamics, SRA International<br />
and ShotSpotter<br />
before joining Battelle<br />
in 2012.<br />
Once gunfire has been<br />
detected, SiteGuard will<br />
pinpoint the location of<br />
each shooter and follow their movements<br />
throughout a facility. This<br />
information will be relayed to police<br />
and building officials, allowing<br />
them to know precisely the number<br />
of intruders as well as the types of<br />
weapons they’re using. When used<br />
in coordination with a building’s<br />
video surveillance system, SiteGuard<br />
will help officials advise occupants<br />
whether they can evacuate<br />
or whether they need to seek shelter<br />
immediately.<br />
Battelle’s already working on fu-<br />
Ed Jopeck<br />
ture enhancements. For example,<br />
SiteGuard is working on a two-way<br />
communications system that would<br />
enable law enforcement officials<br />
to communicate with occupants<br />
or even the shooters. This feature<br />
would allow first responders<br />
the ability to<br />
triage any injured occupants<br />
and give greater<br />
details to law enforcement<br />
site commanders<br />
for their site assessments.<br />
Other developments<br />
in the works include the<br />
ability to automatically<br />
lock doors once a shot<br />
has been detected, reducing the<br />
chances shooters can harm other<br />
occupants.<br />
Battelle joins a number of other<br />
providers of shooter detection sensors<br />
to showcase their products to<br />
government officials. In Reynoldsburg,<br />
a suburban community just<br />
east of Columbus, police officers see<br />
the technology as helping them reduce<br />
delays and chances for human<br />
error.<br />
“If you have a pretty good idea<br />
More on page 12<br />
4
Security<br />
Career Option<br />
#47:<br />
Critical<br />
Infrastructure<br />
Protection<br />
A degree in security can open up a wide, wide world<br />
of career possibilities for you.<br />
In today’s world, security is more important than ever. Which means there is<br />
an immense range of opportunities in the security profession. With a degree in<br />
Security Management from University of Phoenix, you can reach new heights<br />
in this growing field. We offer a Bachelor of Science in Security Management,<br />
an Associate of Arts in Security Management and certificate programs that are<br />
aligned to the Security Competency Model, written by University of Phoenix and<br />
recently validated and published by the U.S. Department of Labor.<br />
To learn more, visit phoenix.edu/security.<br />
For more information about each of these programs, including on-time completion rates, the median debt incurred by students who completed the program and other important information,<br />
please visit phoenix.edu/programs/gainful-employment.<br />
While widely available, not all programs are available in all locations or in both online and on-campus formats.Please check with a University Enrollment Representative. The University’s Central<br />
Administration is located at 1625 W. Fountainhead Pkwy., Tempe, AZ 85282. Online Campus: 3157 E. Elwood St., Phoenix, AZ 85034. © <strong>2015</strong> University of Phoenix, Inc. All rights reserved. | CJS-4156
“Working Together to Foster Safety” Speech<br />
by FAA Administrator Michael Huerta<br />
Editor’s Note: This Speech was delivered<br />
by FAA Administrator Michael<br />
Huerta at the Israel Aerospace Dinner<br />
in Jaffa, Israel on <strong>Dec</strong>ember 16, <strong>2015</strong><br />
I am honored to be here<br />
with you tonight, and I<br />
appreciate the hospitality<br />
and spirit of partnership<br />
you have extended<br />
to me during my visit to<br />
your beautiful country.<br />
I am especially in awe of<br />
this wonderful—and appropriate—venue<br />
for tonight’s<br />
gathering.<br />
I want to thank Civil Aviation<br />
Authority of Israel (CAAI) Director<br />
General Joel Feldschuh and his<br />
team for hosting us here tonight<br />
and for being such great partners,<br />
which I plan to speak more about.<br />
The Peres Center for Peace is truly<br />
inspiring. And I could look out at<br />
this view of the Mediterranean Sea<br />
for hours.<br />
For those of us in this room, aviation<br />
is not just a profession; it is a<br />
passion. We are fortunate to live in<br />
a time when we can do what mankind<br />
has imagined since the days<br />
when this part of the world was<br />
FAA Administrator<br />
Michael Huerta<br />
young. We don’t have to wonder;<br />
we know what it is like to mount up<br />
on wings as eagles.<br />
For us, the world is a much wider<br />
place. Yet, at the same time, it has<br />
never been smaller.<br />
We think nothing of<br />
boarding a modern airliner<br />
and safely disembarking<br />
a few hours later,<br />
an ocean or more away.<br />
Aviation has become the<br />
international language of<br />
commerce, and runways<br />
have enabled inland cities<br />
to become vibrant ports.<br />
It has helped foster an intellectual<br />
and economic prosperity that’s unparalleled<br />
in human history.<br />
As stewards of this industry, we<br />
share an enormous responsibility<br />
to protect this mode of travel and<br />
to nurture its future. Every day, we<br />
ask ourselves, how can we make flying<br />
safer? How can we be more efficient?<br />
What else lies over the horizon?<br />
Since the beginning of manned<br />
flight, aviation has been the catalyst<br />
for international relationships.<br />
I can’t think of anywhere this has<br />
been truer than the deep, unbreakable<br />
bonds that have grown between<br />
Israel and the United States.<br />
In <strong>Jan</strong>uary of this year, Nancy<br />
Spielberg and Roberta Grossman<br />
released a documentary, “Above and<br />
Beyond.” It tells the story of a group<br />
of American fighter pilots who volunteered<br />
to fly in combat for the<br />
State of Israel during the War of Independence<br />
in 1948. It’s a historical<br />
account that isn’t so well known in<br />
my country, even though many of<br />
these men were heroes here in Israel.<br />
They were acting on their own<br />
at the time, but these intrepid Jewish<br />
aviators heralded the beginning<br />
of what today is one of the United<br />
States’ strongest common bonds<br />
with Israel.<br />
We are tied together culturally.<br />
We are tied together economically.<br />
We are tied together by aviation.<br />
More on page 32<br />
6
Is proud to introduce two<br />
exciting new products!<br />
SENTRY<br />
Mobile Workstation<br />
Our heavy duty, steel workstation is excellent<br />
for use as a portable Sentry Mobile Workstation<br />
where a checkpoint is needed at a moment's<br />
notice. Can also be used in:<br />
Classrooms • Conference rooms • Training rooms<br />
Manufacturing /warehouse environments<br />
36-41"<br />
Adjustable<br />
Height<br />
PROMARINE<br />
Megaphone<br />
WATERPROOF PROTECTION - MADE IN THE USA<br />
Rugged And Waterproof, This Military-tough<br />
Megaphone Is An Excellent Option For:<br />
Industrial use • Fire and rescue • Law enforcement • Public safety<br />
Military • Boating & water sports • Outdoor athletics & recreation<br />
www.ampli.com | info@ampli.com | (800) 267-5486<br />
5
National Science Foundation announces<br />
“CRISP”awards program to enhance interdisciplinary<br />
understanding, design and operation of interdependent<br />
critical infrastructure systems<br />
The National Science Foundation<br />
has released the details of a “Critical<br />
Resilient Interdependent Infrastructure<br />
Systems and Processes<br />
(CRISP)” awards program, which<br />
has been designed to foster collaboration<br />
among interdependent stakeholders<br />
and to enhance the understanding,<br />
design and operation of<br />
interdependent critical infrastructure<br />
systems and processes that provide<br />
essential goods and services<br />
despite disruptions and failures<br />
from any cause, natural, technological<br />
or malicious, and to provide<br />
opportunities to innovate in ICIs to<br />
enrich society with new goods and<br />
services. There are currently 18 critical<br />
infrastructures defined by the<br />
U.S.<br />
According to the NSA announcement,<br />
proposals may only be submitted<br />
by two-year and four-year<br />
colleges, including community<br />
colleges that are accredited in, and<br />
have a campus in the U.S, acting on<br />
behalf of their faculty members. Solicitation<br />
in the program are being<br />
sought in the following disciplines,<br />
with a deadline of March 09, <strong>2016</strong>:<br />
Directorate for Engineering<br />
Division of Civil, Mechanical and<br />
Manufacturing Innovation<br />
Division of Electrical, Communications<br />
and Cyber Systems<br />
Division of Chemical, Bioengineering,<br />
Environmental, and Transport<br />
Systems<br />
Emerging Frontiers and Multidisciplinary<br />
Activities<br />
Directorate for Social, Behavioral<br />
& Economic Sciences<br />
Division of Behavioral and Cognitive<br />
Sciences<br />
Division of Social and Economic<br />
Sciences<br />
Directorate for Computer & Information<br />
Science & Engineering<br />
Division of Computer and Network<br />
Systems<br />
Division of Advanced Cyberinfrastructure<br />
Who May Serve as PI:<br />
Because this program is meant to<br />
support interdisciplinary research,<br />
8<br />
a minimum of three investigators is<br />
required per project, including the<br />
Principal Investigator (PI) and two<br />
or more co-Investigators from the<br />
lead or participating institutions.<br />
Persons named as PI or co-PI must<br />
be eligible to serve as such on NSF<br />
proposals submitted through their<br />
respective institutions. In order<br />
to ensure an interdisciplinary approach<br />
to studying ICIs, proposals<br />
should include and clearly identify<br />
at least one PI or co-PI who is an<br />
engineer, at least one who is a computer,<br />
information or computational<br />
scientist, and at least one who is a<br />
social, economic or behavioral scientist.<br />
Additional co-PIs or senior<br />
personnel may be added to cover
other interdisciplinary needs of the<br />
project. The appropriateness of the<br />
research team’s disciplinary composition<br />
and expertise should be justified<br />
and will be a factor in the merit<br />
review of the proposal.<br />
There are currently 18 critical infrastructures<br />
defined by the U.S. Department<br />
of Homeland Security and<br />
some of these are highly aggregated<br />
classifications, for example energy,<br />
of different essential infrastructures,<br />
such as power generation and distribution,<br />
and natural gas production<br />
and pipeline distribution. The National<br />
Science Foundation describes<br />
the program as follows:<br />
Synopsis of Program:<br />
“Critical infrastructures are the<br />
mainstay of our nation’s economy,<br />
security and health. These infrastructures<br />
are interdependent. They<br />
are linked to individual preferences<br />
and community needs. For example,<br />
the electrical power system<br />
depends on the delivery of fuels to<br />
power generating stations through<br />
transportation services, the production<br />
of those fuels depends in turn<br />
on the use of electrical power, and<br />
those fuels are needed by the trans-<br />
More on page 35<br />
DATA CENTER<br />
SECURITY SOLUTIONS<br />
AMERISTARSECURITY.COM | 866-467-2773<br />
9
Congress funds government<br />
and extends immigration for<br />
ten months<br />
By Joshua Breisblatt<br />
This week, the House and Senate<br />
overwhelmingly passed a $1.15<br />
trillion omnibus spending bill that<br />
funds the federal government for the<br />
rest of the Fiscal Year (FY), through<br />
September 30, <strong>2016</strong>, as well as a package<br />
of tax breaks worth around $620<br />
billion. The spending bill, which was<br />
seen as the first significant test for<br />
the new Speaker of the House Paul<br />
Ryan (R-WI), not only funded the<br />
federal government but contained a<br />
variety of major provisions, some of<br />
which effect immigration policy.<br />
The Department of Homeland<br />
Security funding featured many of<br />
the same provisions from previous<br />
years including the following requirements:<br />
that Immigration and<br />
Customs Enforcement (ICE) maintain<br />
34,000 detention beds, that Border<br />
Patrol maintain 21,370 border<br />
agents, and that U.S. Citizenship<br />
and Immigration Services (USCIS)<br />
fund the Citizenship and Integration<br />
Grant Program with $10 million<br />
from its fee account.<br />
The omnibus also funded the nation’s<br />
immigration courts, giving the<br />
chronically-underfunded Executive<br />
Office of Immigration Review<br />
(EOIR) enough funding for 55 new<br />
immigration judges teams, which<br />
will allow EOIR to hire new judges<br />
and necessary support staff. There is<br />
some hope that these new judges will<br />
help to reduce the record backlogs in<br />
the immigration court system.<br />
One of the major policy provisions<br />
included in the omnibus is the<br />
Visa Waiver Improvement and Terrorist<br />
Travel Prevention Act of <strong>2015</strong><br />
which previously passed the House<br />
of Representatives by 407-19. The<br />
bill terminates Visa Waiver Program<br />
(VWP) travel privileges for all citizens<br />
of VWP countries who are also<br />
nationals of Iraq, Syria, Iran, or Sudan,<br />
singling out and discriminating<br />
based on nationality. It also excludes<br />
all individuals who have traveled<br />
since March 1, 2011 to certain countries–<br />
including Syria, Iraq, and other<br />
designated countries. Many organizations<br />
expressed serious concern<br />
over the language, saying it is overbroad<br />
and will have unintended consequences,<br />
with one example being<br />
making it potentially more difficult<br />
for journalists and humanitarian aid<br />
workers to travel.<br />
10<br />
Photo: William Beem<br />
The omnibus also contains controversial<br />
changes to the H-2B program.<br />
The H-2B program allows U.S.<br />
employers to recruit foreign workers<br />
to fill job vacancies for temporary<br />
and seasonal positions. There is an<br />
annual cap of 66,000 H-2B workers<br />
per year. The omnibus contains a<br />
provision, commonly called the “returning<br />
work” exemption, which allows<br />
an H-2B worker that has been<br />
counted against the 66,000 cap in one<br />
of the three previous years to return<br />
to work in the H-2B program in the<br />
current year without being counted<br />
against the cap. Some Republican<br />
and Democratic members strongly<br />
objected to the provision.<br />
The omnibus reauthorized three<br />
visa programs and the E-Verify Program<br />
for the rest of the fiscal year,<br />
without making any changes to the<br />
programs. These programs are:<br />
• The EB-5 program: The immigrant<br />
investor program, known as<br />
EB-5, was created in 1990 to stimulate<br />
job growth and capital investment.<br />
It is the only visa program for<br />
investors that leads to permanent<br />
residence, and it requires that applicants<br />
invest $1 million (or $500,000<br />
if the investment is in a rural or<br />
high-unemployment area) and create<br />
at least 10 jobs. There are 10,000<br />
visas allocated per fiscal year for the<br />
program.<br />
• Conrad 30 Program: This program,<br />
created in 1994, allows certain<br />
physicians who trained in the<br />
United States on J-1 visas to obtain<br />
a waiver of the two-year home residence<br />
requirement. In exchange for<br />
the waiver, the physician must work<br />
for at least three years treating medi-
cally underserved populations in the<br />
United States.<br />
• Special Immigrant Non-Minister<br />
Religious Worker Program: This<br />
program, created in 1990, allows<br />
non-ministers or other lay religious<br />
workers to come to the United States<br />
as lawful permanent residents.<br />
Lastly, in the tax break portion<br />
of the bill, expansions of the Child<br />
Care Tax Credit (CTC) and Earned<br />
Income Tax Credit (EITC) that were<br />
passed in 2009 were made permanent.<br />
According to National Council<br />
of La Raza (NCLR), who applauded<br />
Congress for making these provisions<br />
permanent, the EITC expansion<br />
amounts to as much as $6,143<br />
per family, while the CTC can add up<br />
to $1,000 per child. However NCLR<br />
and others noted that Congress also<br />
erected additional barriers for immigrants<br />
who wish to file taxes using an<br />
individual tax identification number<br />
(or “ITIN”), as well as barring newly<br />
legalized domestic violence survivors,<br />
DACA recipients, and others<br />
from accessing these vital tax credits,<br />
creating a two-tiered tax system<br />
based on immigration status.<br />
Like all massive pieces of legislation,<br />
there is something for everyone<br />
to love and hate. With Congress now<br />
adjourned for the year, hopefully<br />
<strong>2016</strong> brings a renewed effort towards<br />
regular order, transparency, and accountability<br />
in lawmaking.<br />
POWER UTILITY<br />
SECURITY SOLUTIONS<br />
AMERISTARSECURITY.COM | 866-467-2773<br />
11
CenturyLink VP commends<br />
House of Representatives<br />
for passage of Internet Tax<br />
Freedom Act<br />
Editor’s Note: John Jones, Senior VP<br />
for Public Policy and Government<br />
Relations of Century Link, a global<br />
communications, hosting, cloud company<br />
that offers network and data<br />
systems management, has released<br />
the following statement regarding the<br />
legislation recently passed by the U.S.<br />
House of Representatives permanently<br />
banning federal, state and local<br />
governments from taxing consumers<br />
and small businesses on their Internet<br />
access.<br />
“CenturyLink commends the leaders<br />
of the U.S. House of Representatives<br />
for passing legislation that<br />
permanently bans federal, state and<br />
local governments from taxing consumers<br />
and small businesses on their<br />
Internet access. Making the Internet<br />
tax moratorium permanent is sound<br />
economic policy that brings certainty<br />
to the market and encourages<br />
broadband adoption and network<br />
investment.”<br />
Legislation that permanently extends<br />
ITFA was introduced by U.S.<br />
Reps. Bob Goodlatte (R-Va.) and<br />
Anna Eshoo (D-Calif.) and U.S.<br />
Sens. John Thune (R-S.D.) and Ron<br />
Wyden (D-Ore.) earlier this year. A<br />
temporary extension of the Internet<br />
tax moratorium has been enacted<br />
many times since it was first signed<br />
into law in 1998.<br />
About CenturyLink<br />
CenturyLink (NYSE: CTL) is a global<br />
communications, hosting, cloud and<br />
IT services company enabling millions<br />
of customers to transform their<br />
businesses and their lives through<br />
innovative technology solutions.<br />
CenturyLink offers network and data<br />
systems management, big data analytics<br />
and IT consulting, and operates<br />
more than 55 data centers in North<br />
America, Europe and Asia. The company<br />
provides broadband, voice, video,<br />
data and managed services over a<br />
robust 250,000-route-mile U.S. fiber<br />
network and a 300,000-route-mile<br />
international transport network.<br />
Battelle plans demonstration of<br />
active shooter alarm system<br />
Continued from page 4<br />
where the active shooter is located,<br />
you can concentrate the resources<br />
and get them inside as fast as possible,”<br />
he said, adding the extra<br />
knowledge of the shooter’s location<br />
and actions also would make responding<br />
safer for the police. “Every<br />
little bit helps to provide the quickest<br />
and most efficient response.”<br />
With its headquarters in the Ohio<br />
capital, Battelle conducts critical<br />
research and development work in<br />
technology centers and laboratories<br />
worldwide. Since its creation nearly<br />
87 years ago, the company, which<br />
is a 501(c)3 charitable trust, has<br />
worked in national security, human<br />
health, energy and environmental<br />
industries.<br />
Visit CenturyLink for more information.<br />
12
Trump’s Muslim immigration policy is<br />
unconstitutional and unworthy of America,<br />
say prominent law professors<br />
By Wendy Feliz<br />
The latest outrageous proposal out<br />
of the Trump for President campaign<br />
came via a “Statement on<br />
Preventing Muslim Immigration”<br />
where the candidate calls “for a total<br />
and complete shutdown of Muslims<br />
entering the United States until<br />
our country’s representatives can<br />
figure out what is going on.”<br />
According to Vox, “His campaign<br />
has clarified that this would<br />
apply to ‘everybody,’ mentioning<br />
in particular Muslims entering the<br />
U.S. as immigrants or tourists… It<br />
also, as his campaign later clarified,<br />
means that Muslim-American<br />
citizens who are currently<br />
traveling abroad would be prevented<br />
from reentering the US.”<br />
This proposal was immediately<br />
met with criticism from fellow presidential<br />
candidates, political and<br />
religious leaders, and legal experts.<br />
Yet, how realistic is such a policy?<br />
Has the U.S. ever done something<br />
comparable and would this kind of<br />
immigration policy stand up to legal<br />
and public scrutiny?<br />
According to a Washington Post<br />
report, the last time the U.S. barred<br />
an entire group from entering the<br />
U.S. was the Chinese Exclusion Act<br />
of 1882, “which “effectively halted<br />
Chinese immigration for ten years.”<br />
The Act was “induced by blind racism<br />
and eagerness to deflect blame<br />
onto other groups,” noted one analysis<br />
of the Act.<br />
However, Trump’s proposal would<br />
go further than the Chinese Exclusion<br />
Act by banning an entire religion—a<br />
religion observed by the<br />
populations of multiple nations and<br />
individuals of various races and ethnicities.<br />
Such a ban would likely violate<br />
a range of international agreements<br />
to which the U.S. has entered.<br />
And similar to the Chinese Exclusion<br />
Act, which “severely damaged<br />
transnational relations,” there is little<br />
doubt such a policy would have<br />
14<br />
Photo: Michael Vadon<br />
far-reaching, damaging impacts on<br />
U.S. interests abroad.<br />
Experts also weighed in on whether<br />
the anti-Muslim proposal would<br />
hold up to legal scrutiny and international<br />
standards.<br />
An exasperated Jonathan Turley,<br />
a constitutional law expert, told the<br />
Washington Post:<br />
“Oh, for the love of God,” said<br />
the George Washington University<br />
professor of law.“ This would<br />
not only violate international law,<br />
but do so by embracing open discrimination<br />
against one religion.<br />
It would make the United States a<br />
virtual pariah among nations.’’<br />
And Stephen Yale-Loehr, an immigration<br />
law expert and professor<br />
of law at Cornell, told the New<br />
York Times that the Supreme Court<br />
would likely strike down this type of<br />
overly-restrictive immigration policy<br />
under the equal protection clause<br />
of the 14th Amendment:<br />
“Putting the policy into practice<br />
would require an unlikely act of<br />
Congress…It would certainly be<br />
challenged as unconstitutional…<br />
And I predict the Supreme Court<br />
would strike it down.”<br />
More on page 36
Investigation by Texas Observer finds systemic<br />
corruption, insufficient oversight at CBP<br />
By Walter Ewing<br />
In 2002, in the wake of 9/11, Congress<br />
and the White House embarked<br />
upon an unprecedented<br />
bureaucratic experiment: grafting<br />
together 22 federal agencies into a<br />
single entity that was supposed to<br />
protect the nation from terrorist attack<br />
or any other potential threat.<br />
The result was a multi-headed monstrosity<br />
known as<br />
the Department of<br />
Homeland Security<br />
(DHS). Nearly<br />
a decade and a half<br />
after its creation,<br />
DHS remains<br />
deeply fragmented—its<br />
various<br />
components rarely,<br />
if ever, functioning<br />
in unison.<br />
One symptom of<br />
this dysfunction is<br />
corruption. And a<br />
prime example of<br />
this corruption is<br />
U.S. Customs and<br />
Border Protection<br />
(CBP)—the agency<br />
tasked with securing<br />
the nation’s<br />
Photo: Courtesy of Maryland National Guard<br />
15<br />
borders.<br />
As an investigation by the Texas<br />
Observer makes clear, the corruption<br />
within CBP (which includes<br />
the U.S. Border Patrol) is systemic.<br />
Congress keeps adding to the ranks<br />
of Border Patrol agents under the<br />
border-security mantra of “more<br />
boots on the ground,” but “pays little<br />
attention to the men and women<br />
tasked with keeping border agents<br />
accountable. As a result, say the Observer:<br />
“…accounts of corruption have<br />
multiplied: In<br />
Arizona, a Border<br />
Patrol agent<br />
was caught on<br />
police video<br />
loading a bale<br />
of marijuana<br />
into his patrol<br />
vehicle; another<br />
agent in Texas<br />
was caught<br />
waving loads of<br />
drugs through<br />
the international<br />
port of entry<br />
for a cartel; and<br />
in California, a<br />
Border Patrol<br />
agent smuggled<br />
immigrants<br />
across the bor-<br />
More on page 36
Coalition’s Legal Brief urges Supreme Court<br />
to reverse Texas v. U.S. decision blocking<br />
President’s executive actions on immigration<br />
WASHINGTON, D.C. — A coalition<br />
of 224 immigration, civil rights,<br />
labor, and social service groups<br />
has filed an amicus (“friend of the<br />
court”) brief, urging the Supreme<br />
Court to review the case, Texas v.<br />
U.S., that has blocked some of President<br />
Obama’s executive actions on<br />
immigration. The filing comes less<br />
than a month after the U.S. Court<br />
of Appeals for the Fifth Circuit upheld<br />
a preliminary injunction put<br />
in place by a Texas federal district<br />
court that blocked implementation<br />
of protections for millions of immigrants<br />
across the country.<br />
The filing from the American Immigration<br />
Council, National Immigration<br />
Law Center, Service Employees<br />
International Union, American<br />
Federation of Labor and Congress<br />
of Industrial Organizations, Advancement<br />
Project, LatinoJustice<br />
PRLDEF, and the Leadership Conference<br />
on Civil and Human Rights,<br />
among others, comes only ten days<br />
after the formal request, known as a<br />
petition for writ of certiorari, from<br />
the Department of Justice to the<br />
Supreme Court to review the case.<br />
Amicus briefs in support of a cert<br />
petition are usually due 30 days after<br />
the petition is filed. The amici<br />
coalition acted swiftly given that the<br />
Department of Justice has requested<br />
a briefing schedule that would allow<br />
the Supreme Court ample time<br />
to hear the case during the current<br />
term and issue a decision by June<br />
<strong>2016</strong>.<br />
“The breadth and depth of support<br />
for the President’s executive<br />
actions is clear,”<br />
said Marielena<br />
Hincapié, Executive<br />
Director of<br />
the National Immigration<br />
Law<br />
Center. “It’s now<br />
up to the Supreme<br />
Court to take the<br />
case up this term<br />
16<br />
and put the legal questions to rest so<br />
that the over 5 million U.S. citizen<br />
children whose parents are eligible<br />
for DAPA, can finally have stability<br />
and be free from the fear that they<br />
will one day be separated from their<br />
parents.<br />
“With more than 200 organizations<br />
joining this amicus, including<br />
labor groups that represent millions<br />
of immigrant workers, there’s<br />
no question that the president’s immigration<br />
initiatives are necessary<br />
and backed by the majority of the<br />
American public,” said Rocio Saenz,<br />
executive vice president of SEIU<br />
International. “The Supreme Court<br />
has a responsibility to take this case,<br />
just as we have a duty to mobilize<br />
our communities to continue to<br />
defend the immigration action and<br />
push lasting immigration reform to<br />
the forefront of the agenda with our<br />
vote.”<br />
The brief provides personal stories<br />
and testimonials about potential<br />
beneficiaries of expanded DACA<br />
and DAPA and explains how these<br />
deferred action initiatives would<br />
positively impact millions of U.S.<br />
More on page 34
New generation.<br />
New possibilities.<br />
Secure your site with the new F3 Series Fence<br />
Controllers, the latest in perimeter protection.<br />
Find out more at security.gallagher.com/latest-releases<br />
security.gallagher.com<br />
security.gallagher.com
Airport police support legislative efforts<br />
to tighten internal security, with complete<br />
employee screening<br />
LOS ANGELES, CA, <strong>Dec</strong>ember 9<br />
- The American Alliance of Airport<br />
Police Officers (AAAPO) supports<br />
legislation introduced by Senator<br />
Bill Nelson (D- FL), Ranking Member<br />
of the Senate Commerce, Science,<br />
& Transportation Committee,<br />
to strengthen internal security at our<br />
nation’s airports.<br />
The Senator’s Airport Security Enhancement<br />
and Oversight Act calls<br />
for increased screening of aviation<br />
employees and increased oversight<br />
of employees’ secure access badges.<br />
While these proposals are important<br />
to enhancing airport safety, the most<br />
comprehensive solution to fortifying<br />
security at major airports is to immediately<br />
begin performing 100%<br />
screening of all airport employees,<br />
including TSA, and their belongings.<br />
As the AAAPO noted in its 2012 letter<br />
to then TSA Administrator John<br />
Pistole, the most effective way to keep<br />
the public safe is by conducting total<br />
screening of every employee and their<br />
backpacks, purses, bags, etc. Given<br />
that passengers are already subject to<br />
these screening procedures, it is within<br />
reason to expect the same security<br />
standards for airport employees and<br />
TSA.<br />
The Russian Metrojet bombing incident,<br />
which is suspected<br />
to have been<br />
carried out by an<br />
airport employee,<br />
exemplifies the dangers<br />
of the “insider”<br />
threat. Here at<br />
home, in <strong>Dec</strong>ember<br />
of last year, a gun<br />
smuggling scheme<br />
at Hartsfield-Jackson Atlanta International<br />
Airport allowed an airline employee<br />
to bring guns into secure parts<br />
of the airport, while a former airline<br />
employee transported the guns on<br />
flights made between Atlanta and<br />
New York, again highlighting the ongoing<br />
internal security vulnerabilities<br />
at our nation’s airports.<br />
Incidents like the Atlanta gun<br />
smuggling ring are possible because<br />
at many major airports employees are<br />
permitted to enter the airport property<br />
via a rudimentary metal turnstile<br />
that is located immediately off<br />
the aeronautical side of the airport<br />
with easy access to waiting airplanes.<br />
For example, at JFK, the turnstile entrance<br />
point only requires the employee<br />
to swipe their badge and enter<br />
a code-no biometrics are used and<br />
there is no physical screening of the<br />
employee or the bags, purses, etc., the<br />
18<br />
employee brings into<br />
the airport. Without<br />
a nationwide standard<br />
regarding the<br />
screening of airport<br />
employees at major<br />
airports, such security<br />
gaps will continue<br />
to pose dangers to<br />
the traveling public.<br />
In this regard, the AAAPO supports<br />
Senator Nelson’s efforts to improve<br />
security at our country’s airports and<br />
calls on Congress to immediately<br />
implement public policy that requires<br />
the screening of all airport employees,<br />
including TSA.<br />
The Los Angeles Airport Peace Officers<br />
Association (LAAPOA) represents<br />
the sworn police officers and<br />
firefighters of the Los Angeles Airport<br />
Police Department assigned to<br />
protect and serve Los Angeles International<br />
Airport (LAX), LA/Ontario<br />
International Airport (ONT) and<br />
Van Nuys Airport (VNY). For more<br />
information on LAAPOA, please visit<br />
laapoa.com.<br />
The American Alliance of Airport<br />
Police Officers (AAAPO) is comprised<br />
of rank-and-file airport police
officers (including many dual police/<br />
aircraft rescue firefighters) who stand<br />
as the first line of defense against terrorist<br />
attacks, hijackings and other<br />
criminal activity at our nation’s airports.<br />
We seek to promote security<br />
and safety for the traveling public, visitors<br />
and airport employees by highlighting<br />
best practices and identifying<br />
areas for improvement and proposed<br />
solutions for our nation’s airport security<br />
deployment. AAAPO focuses<br />
on regulatory issues that promote our<br />
efforts to provide the most advanced<br />
and cutting-edge service innovations<br />
and security processes in our nation<br />
and the world. Our organization represents<br />
thousands of sworn law enforcement<br />
officers across the United<br />
States beholden only to this mission.<br />
We are unencumbered by neither political<br />
nor managerial constraints that<br />
would prevent us from promoting<br />
sound public safety policy.<br />
The founding members of the American<br />
Alliance of Airport Police Officers<br />
are comprised of numerous rank-andfile<br />
airport police officers from John F.<br />
Kennedy International Airport; La-<br />
Guardia Airport; Los Angeles International<br />
Airport; Dallas/Fort Worth<br />
International Airport; LA/Ontario<br />
International Airport; Newark Liberty<br />
International Airport; Van Nuys Airport;<br />
Stewart International Airport;<br />
and Teterboro Airport.<br />
U.S. Conference of Mayors President,<br />
Baltimore Mayor Stephanie Rawlings-Blake,<br />
applauds unprecedented agreement at COP21<br />
WASHINGTON, <strong>Dec</strong>. 14, <strong>2015</strong> /<br />
PRNewswire-USNewswire/ -- The<br />
United States Conference of Mayors<br />
President Baltimore Mayor<br />
Stephanie Rawlings-Blake issued<br />
the following statement regarding<br />
the agreement reached at COP 21 in<br />
Paris:<br />
“I applaud our national<br />
governments for<br />
reaching consensus<br />
on climate<br />
change at COP<br />
21. Finally, our<br />
leaders have<br />
come together<br />
to acknowledge<br />
the threat<br />
that climate<br />
change presents<br />
to our safety<br />
and security, regardless<br />
of where we live. 195<br />
nations, large and small, rich and<br />
poor, have now committed to take<br />
substantive action that will lower<br />
greenhouse emissions.<br />
“America’s mayors have called on<br />
the nations of the world to act on<br />
climate change for over a decade.<br />
Earlier this month, I led a Conference<br />
of Mayors mission to COP 21,<br />
where we joined with 1,000 mayors<br />
19<br />
to urge international agreement. I<br />
am proud of what we accomplished<br />
in Paris and am honored to have<br />
taken part in this watershed moment<br />
for our planet.<br />
“As national governments move<br />
toward implementation of this historic<br />
accord, America’s mayors<br />
stand ready to do our<br />
part. In 2005, we<br />
began committing,<br />
city by city,<br />
to the Mayors<br />
Climate Protection<br />
Agreement.<br />
In Paris,<br />
we celebrated<br />
the 10th anniversary<br />
of that<br />
agreement, and<br />
over 1,000 U.S. cities<br />
have joined our efforts.”<br />
The U.S. Conference of Mayors<br />
is the official nonpartisan organization<br />
of cities with populations of<br />
30,000 or more. There are nearly<br />
1,400 such cities in the country today,<br />
and each city is represented in<br />
the Conference by its chief elected<br />
official, the mayor.
FAA announces user-friendly aircraft registration<br />
for process for small unmanned aircraft owners<br />
WASHINGTON, DC, <strong>Dec</strong>ember<br />
14 – The U.S. Department of Transportation’s<br />
Federal Aviation Administration<br />
(FAA) today announced a<br />
streamlined and user-friendly webbased<br />
aircraft registration process<br />
for owners of small unmanned aircraft<br />
(UAS) weighing more than<br />
0.55 pounds (250 grams) and less<br />
than 55 pounds (approx. 25 kilograms)<br />
including payloads such as<br />
on-board cameras.<br />
The Registration Task Force delivered<br />
recommendations to FAA<br />
Administrator Michael Huerta and<br />
Transportation Secretary Anthony<br />
Foxx on November 21. The rule incorporates<br />
many of the task force<br />
recommendations.<br />
“Make no mistake: unmanned<br />
aircraft enthusiast are aviators, and<br />
with that title comes a great deal of<br />
responsibility,” said U.S. Transportation<br />
Secretary Anthony Foxx. “Registration<br />
gives us an opportunity to<br />
work with these users to operate<br />
their unmanned aircraft safely. I’m<br />
excited to welcome these new aviators<br />
into the culture of safety and responsibility<br />
that defines American<br />
innovation.”<br />
Registration is a statutory requirement<br />
that applies to all aircraft. Under<br />
this rule, any owner of a small<br />
UAS who has previously operated<br />
an unmanned aircraft exclusively<br />
as a model aircraft prior to <strong>Dec</strong>ember<br />
21, <strong>2015</strong>, must register no later<br />
than February 19, <strong>2016</strong>. Owners of<br />
any other UAS purchased for use as<br />
a model aircraft after <strong>Dec</strong>ember 21,<br />
<strong>2015</strong> must register before the first<br />
flight outdoors. Owners may use either<br />
the paper-based process or the<br />
new streamlined, web-based system.<br />
Owners using the new streamlined<br />
web-based system must be at<br />
least 13 years old to register.<br />
Owners may register through a<br />
web-based system at: www.faa.gov/<br />
uas/registration<br />
Registrants will need to provide<br />
their name, home address and e-<br />
mail address. Upon completion of<br />
the registration process, the web<br />
application will generate a Certificate<br />
of Aircraft Registration/Proof<br />
of Ownership that will include a<br />
unique identification number for<br />
the UAS owner, which must be<br />
marked on the aircraft.<br />
Owners using the model aircraft<br />
for hobby or recreation will only<br />
have to register once and may use<br />
the same identification number for<br />
all of their model UAS. The registration<br />
is valid for three years.<br />
The normal registration fee is<br />
20<br />
$5, but in an effort to encourage as<br />
many people as possible to register<br />
quickly, the FAA is waiving this fee<br />
for the first 30 days (from <strong>Dec</strong>. 21,<br />
<strong>2015</strong> to <strong>Jan</strong> 20, <strong>2016</strong>).<br />
“We expect hundreds of thousands<br />
of model unmanned aircraft will<br />
be purchased this holiday<br />
season,” said FAA Administrator<br />
Huerta.<br />
“Registration gives<br />
us the opportunity<br />
to educate these<br />
new airspace users<br />
before they fly<br />
so they know the<br />
airspace rules and<br />
understand they<br />
are accountable to<br />
the public for flying<br />
responsibly.”<br />
The online registration<br />
system does not yet support registration<br />
of small UAS used for any<br />
purpose other than hobby or recreation<br />
– for example, using an unmanned<br />
aircraft in connection with<br />
a business. The FAA is developing<br />
enhancements that will allow such<br />
online registrations by spring of<br />
<strong>2016</strong>.<br />
The full rule can be viewed here:<br />
www.faa.gov/news/updates/media/<strong>2015</strong>1213_IFR.pdf
FAA updates airspace obstructions standards to<br />
make sure that airspace is safe and navigable<br />
Among the Federal Aviation Administration’s<br />
(FAA) main priorities<br />
is to keep all users of our national<br />
airspace safe. To maintain the safest<br />
aerospace system in the world, the<br />
FAA must make sure the national<br />
airspace is navigable and free of<br />
obstructions.<br />
When anyone proposes<br />
new construction<br />
or proposes<br />
to alter<br />
existing structures<br />
near airports<br />
or navigational<br />
aids,<br />
the FAA determines<br />
how the<br />
proposal would<br />
affect the airspace.<br />
These FAA determinations<br />
about the appropriate<br />
height of buildings, wind<br />
turbines and meteorological towers<br />
near airports, and how they are<br />
lighted and marked, contribute to<br />
the safe navigation of our skies.<br />
The agency has updated its guidelines<br />
for the proper way to light and<br />
mark obstructions affecting navigable<br />
airspace. Advisory Circular<br />
70/7460-1L for Obstruction Lighting<br />
and Marking is effective immediately.<br />
It cancels Advisory Circular<br />
70/7460-1K, dated February 1,<br />
2007.<br />
The main changes to the updated<br />
advisory circular are as follows:<br />
• Federal law requires that the<br />
FAA determine whether a structure<br />
that is proposed to be built or<br />
altered, 200 feet above ground level<br />
(AGL) or higher, or near an airport,<br />
does not pose a hazard to the airspace.<br />
To remain consistent with<br />
changes to the Code of Federal Regulation<br />
(CFR) Part 77, the height of<br />
a structure identified as an obstruction<br />
has been lowered from 500 feet<br />
(AGL) to 499 feet (AGL). All structures<br />
above 499 feet are considered<br />
obstructions and the FAA will continue<br />
to conduct an aeronautical<br />
study on these types of structures to<br />
determine their effect on the navigable<br />
airspace and ensure they do<br />
not create a hazard.<br />
• New lighting is specified for<br />
wind turbines at various heights.<br />
These recommendations will provide<br />
needed guidance for the rapidly<br />
developing wind industry that<br />
takes into account the unique characteristics<br />
of wind turbine farms.<br />
• The FAA implemented standards<br />
for voluntary marking of meteorological<br />
evaluation towers lower than<br />
200 feet. This is an effort to make<br />
21<br />
meteorological evaluation towers<br />
more noticeable and to add an extra<br />
layer of protection for low-level<br />
agricultural flight operations. These<br />
standards include those for lighting<br />
and marking of the tower and associated<br />
guy wires.<br />
• New lighting and marking standards<br />
are provided to reduce the impact<br />
on migratory bird populations.<br />
This change will reduce the confusion<br />
and disruption to migratory<br />
bird patterns that has been attributed<br />
to certain obstruction marking<br />
schemes.<br />
• A chapter on Aircraft Detection<br />
Lighting Systems (Chapter 14) was<br />
added to provide performance standards<br />
for these types of systems. This<br />
change is in response to community<br />
groups, industry, and the aviation<br />
community. New standards will enable<br />
lighting systems that operate<br />
based on aircraft proximity, increasing<br />
safety while reducing other impacts<br />
of the lighting schemes.<br />
For more information on this Advisory<br />
Circular and others go to: http://<br />
www.faa.gov/regulations_policies/<br />
advisory_circulars/
Campbell on Crypto<br />
Insider Threats:<br />
Why passwords aren’t enough<br />
By Shawn Campbell<br />
The rise in hacking from hostile<br />
agents or rogue nations is of growing<br />
concern to IT professionals. But<br />
the threat is not just from the outside.<br />
Unauthorized access to local<br />
corporate networks by employees or<br />
contractors has created the notion<br />
of “insider threat” – which is now<br />
part of almost every discussion on<br />
cyber security.<br />
The definition of<br />
“insider threat” is<br />
broad. It can refer to<br />
everything from malicious,<br />
covert actions<br />
of individuals within<br />
or connected to an organization,<br />
to the accidental<br />
compromising<br />
of data when an<br />
end-user device is lost.<br />
How pervasive is the damage<br />
caused by unauthorized access? The<br />
Gemalto Breach Level Index reports<br />
that nearly 44,000,000 records have<br />
been breached by a malicious insider<br />
as of November <strong>2015</strong>, with the<br />
majority the result of identity theft.<br />
Targets have included organizations<br />
in US, South Korea, Mexico and the<br />
UK, to name a few.<br />
Although general end-users can<br />
pose a threat to an organization, the<br />
most significant data breaches often<br />
can be traced back to users with administrative<br />
privileges.<br />
When it comes to controlling insider<br />
threats, it is not effective to<br />
rely on simple passwords to access<br />
data. A multi-factor approach to authentication<br />
and access is the only<br />
The Gemalto Breach Level Index reports that<br />
nearly 44,000,000 records have been breached<br />
by a malicious insider as of November <strong>2015</strong>,<br />
with the majority the result of identity theft.<br />
real way to minimize the danger of<br />
insider threats.<br />
The ineffective password<br />
22<br />
Many administrative users in an organization<br />
have elevated privileges,<br />
because they need access to a wide<br />
range of applications, networks and<br />
systems. To keep it simple to access<br />
the infrastructure, administrators<br />
often fall back on a one-factor authentication<br />
method, such as a password.<br />
Unfortunately, passwords are not<br />
enough to protect your organization<br />
from insider hack and malware.<br />
They will not adequately protect<br />
employee computers and privileged<br />
workstations.<br />
Because each system and application<br />
requires its own password,<br />
administrators have<br />
to track and manage<br />
numerous passwords<br />
just to do<br />
their job on a daily<br />
basis. That’s a significant<br />
administrative<br />
burden, and often<br />
passwords are stored<br />
in unsecure locations<br />
where they easily can be lost,<br />
stolen or compromised.<br />
Furthermore, it is challenging to<br />
match a password to a user’s identity.<br />
Anyone with access to a password<br />
can pose as the password’s<br />
owner/user – and access any system<br />
for which the user has privileges.<br />
So, one-factor authentication is<br />
ineffective at securing access to an<br />
organization’s networks. To improve
Access Control, ID, Insider Threats<br />
security dramatically, organizations<br />
should utilize two or even three<br />
forms of authentication.<br />
Beyond the password:<br />
Multi-factor authentication<br />
Multi-factor authentication is vital<br />
to both securing access to networks<br />
and protecting users’ identities.<br />
After all, the more factors used to<br />
determine a person’s identity, the<br />
greater the trust of authenticity.<br />
With multi-factor authentication,<br />
an organization can be sure that users<br />
are who they claim to be.<br />
Because multi-factor authentication<br />
security requires multiple<br />
means of identification at login, it<br />
is widely recognized as the most secure<br />
method for authenticating access<br />
to data and applications.<br />
The best way to achieve multifactor<br />
authentication is by using a<br />
combination of the following factors:<br />
• Something You Know – password<br />
or PIN<br />
• Something You Have – token or<br />
smart card (two-factor authentication)<br />
• Something You Are – biometrics,<br />
such as a fingerprint (threefactor<br />
authentication)<br />
A strong authentication solution<br />
that validates the identities of users<br />
and computing devices that access<br />
the non-public areas of an organization’s<br />
network is the first step in<br />
building a secure and robust information<br />
protection system.<br />
How to put strong<br />
authentication to work<br />
Practically speaking, there are two<br />
aspects to follow when putting<br />
strong authentication to work:<br />
• Consider all access points<br />
• Ensure the solution reduces IT<br />
administrative and management<br />
overhead<br />
Consider all access points. Organizations<br />
need to be sure that they<br />
authenticate access to all sensitive<br />
information, whether that information<br />
is on premise or in the cloud.<br />
When it comes to the cloud, the<br />
same security mechanisms should<br />
be in place as in remote network access.<br />
Additionally, organizations should<br />
deploy security mechanisms to make<br />
sure that users are securely authenticated<br />
when accessing network resources<br />
from their mobile consumer<br />
devices (such as tablets and smart<br />
phones).<br />
Ensure the solution reduces<br />
IT administrative and<br />
management overhead.<br />
Authentication environments have<br />
to offer convenience and transparency<br />
for end users and administrators<br />
alike.<br />
23<br />
Administrators need to be able<br />
to manage all users across all devices<br />
and resources. That requires<br />
automation, central management,<br />
and visibility into user access across<br />
multiple resources. To ensure users<br />
have an optimal experience, administrators<br />
need to be equipped with<br />
granular controls and comprehensive<br />
reporting capabilities.<br />
On the end-user side of things,<br />
organizations should be able to offer<br />
users the type of authentication<br />
device that most suits their role and<br />
security profile. Organizations can<br />
offer users several authentication<br />
methods, ranging from contextbased<br />
authentication, through SMS,<br />
phone tokens or hardware tokens.<br />
This improves user acceptance and<br />
compliance with security requirements.<br />
Multi-factor authentication is not<br />
particularly complicated, but it surpasses<br />
passwords by a considerable<br />
margin when protecting your infrastructure<br />
and information from being<br />
compromised – especially from<br />
insider threats.<br />
Shawn Campbell, a nationally recognized<br />
cryptology expert, is VP of Product<br />
Management, SafeNet Assured<br />
Technologies. He can be reached at<br />
Shawn.Campbell@safenetat.com
Access Control, ID, Insider Threats<br />
Sonavation announces SonicTouch <br />
Ultrasound Biometric Authentication Solution<br />
PALM BEACH GARDENS, FL –<br />
Sonavation, a pioneer in ultrasound<br />
biometric technology and first to<br />
develop and successfully bond an<br />
ultrasound biometric sensor to device<br />
protective glass, has announced<br />
another major industry innovation<br />
with SonicTouch, the most advanced<br />
authentication solution for<br />
digital and device security. It is a<br />
FIDO-ready ultrasound biometric<br />
authenticator system-in-package<br />
module that is uniquely designed to<br />
deliver the next generation of identity<br />
security and ease of integration<br />
into mobile and IoT devices.<br />
Sonavation is currently finalizing<br />
design-in specifications and launch<br />
schedules with three global tier one<br />
mobile device manufacturers.<br />
By 2020, biometric technology is<br />
expected to secure $5.6T in mobile<br />
payment transactions and it is estimated<br />
that there will be more than<br />
25B internet connected devices.<br />
Consumers and companies demand<br />
the highest level of assurance<br />
in protecting their identity, personal<br />
data and digital transactions.<br />
SonicTouch was engineered for an<br />
unrivaled experience that empowers<br />
trust and delivers peace of mind<br />
with one touch.<br />
With its Match-In-Sensor architecturally<br />
flexible design, Sonic-<br />
Touch is a dramatic advancement<br />
in trustworthy authentication. Incorporating<br />
the Sonavation 3D ultrasound<br />
sensor, Sonic-<br />
Touch is the industry’s first<br />
full-stack solution with the<br />
highest level end-to-end<br />
encryption architecture<br />
that provides a fully encapsulated<br />
locked-down<br />
module. Combined with<br />
upgradable anti-spoofing<br />
Karl F. Weintz, CEO<br />
and Level 3+ matching<br />
systems, secure transaction platforms<br />
can be deployed by mobile<br />
and IoT device manufacturers, mobile<br />
network operators and application<br />
developers.<br />
With SonicTouch, a user’s singularly<br />
unique acoustic fingerprint<br />
signature is captured, encrypted and<br />
never leaves the device. SonicTouch<br />
demonstrates the highest accuracy<br />
extract and match and allows authentication<br />
despite moisture, dirt<br />
or lotion that might be present on a<br />
user’s finger. Because device protective<br />
glass integrity is of utmost importance,<br />
SonicTouch was purpose-<br />
24<br />
fully designed to eliminate the need<br />
to etch out or cut into the protective<br />
display glass, thus keeping the<br />
full strength of the glass intact. For<br />
device manufacturers, this is a critical<br />
element to reducing device costs<br />
while providing a positive<br />
end-user experience.<br />
According to Karl<br />
Weintz, Sonavation chief<br />
executive offier, “The digital<br />
and connected world is<br />
at our doorstep and is already<br />
beginning to touch<br />
every aspect of life. This<br />
makes biometric security a<br />
critical component and evolving authority<br />
that demands our attention.<br />
The ultra-thin SonicTouch is the<br />
comprehensive advancement that<br />
will enable the most secure authentication<br />
solution for manufacturers.<br />
Those looking to deliver secure solutions<br />
with a protected touch sensor<br />
or touch-under-cover sensor<br />
can now guarantee biometrics are<br />
easily integrated and convenient to<br />
provide a great user experience with<br />
cutting-edge authentication options.”<br />
Dr Rainer Schmitt, Sonavation’s<br />
chief technology officer, added that
Smart Card strong authentication protects<br />
workstations, mobile devices and networks<br />
HID Global’s ActivClient® software<br />
allows organizations to move beyond<br />
simple passwords and deploy<br />
the best strong authentication solution<br />
for their environment.<br />
This strong authentication<br />
solution is available for all major<br />
mobile platforms, enabling<br />
organizations to protect their<br />
resources whether accessed<br />
from a desktop, laptop, tablet or<br />
smartphone.<br />
ActivClient software has been deployed<br />
in over four million desktop<br />
installations and is interoperable<br />
with leading smart cards, readers,<br />
operating systems, certificate authorities,<br />
network environments<br />
and enterprise applications.<br />
With ActivClient, organizations<br />
can confidently:<br />
• Increase security: ActivClient<br />
is proven technology that is widely<br />
adopted, and offers a user-friendly<br />
strong authentication experience.<br />
• Improve compliance: Complies<br />
with all major government and industry<br />
regulations.<br />
• Optimize productivity: Single,<br />
navation aims to broaden the proliferation<br />
of biometric technology,<br />
ultimately increasing the security<br />
on mobile and IoT devices.<br />
About Sonavation<br />
The Sonavation product line is<br />
designed to provide secure authentication<br />
and protection for digital<br />
and physical environments for consumers<br />
and businesses. Solutions<br />
include both embedded and standalone<br />
device offerings designed to<br />
protect access to online systems<br />
including: e-Commerce, financial<br />
services, health data and other sen-<br />
25<br />
versatile strong authentication tool<br />
for both Windows Login and Remote<br />
Access.<br />
• Reduce costs: Integrates easily<br />
into existing infrastructure.<br />
Enable users to easily perform<br />
their daily work without compromising<br />
network security. HID<br />
Global has a wide range of strong<br />
authentication options to secure<br />
access and easily manage<br />
corporate authentication policies.<br />
Download our white paper<br />
“Establishing Trust in User<br />
Identities with Strong Authentication<br />
Technologies” to learn how to<br />
achieve the level of identity assurance<br />
you need, in a way that’s both<br />
convenient and affordable.<br />
“The high frequency ultrasound<br />
technology deployed in SonicTouch<br />
provides high resolution imaging<br />
utilizing acoustic impediography.<br />
The difference of acoustic properties<br />
in the fingerprint structure of ridges<br />
and valleys is at least two orders of<br />
magnitude higher than those of optical<br />
and capacitive fingerprint imaging<br />
methods. This makes acoustic<br />
impediography simple and robust,<br />
while providing the means for<br />
through glass fingerprinting.”<br />
By empowering OEMs with this<br />
easily deployable technology, So-<br />
sitive applications.<br />
Sonavation designs and manufactures<br />
the industry’s leading biometric<br />
fingerprint sensors, utilizing<br />
ultrasound. Its 3D surface scan and<br />
sub-surface technology is protected<br />
by 42 awarded patents and an additional<br />
47 patents filed, making it<br />
the world’s smallest low-power ultrasound<br />
sensor. Headquartered in<br />
Palm Beach Gardens, Fla., Sonavation<br />
is committed to “Empowering<br />
Trust, Delivering Peace of Mind.”
Access Control, ID, Insider Threats<br />
New Entrust cloud capabilities simplify SSL<br />
certificate management, prevent costly mishaps<br />
MINNEAPOLIS—(DEC. 1, <strong>2015</strong>)—<br />
Entrust Datacard today announced<br />
that it has introduced several key<br />
enhancements to its cloud-based<br />
SSL certificate management platform,<br />
Entrust Cloud. The new capabilities<br />
will bring increased simplicity<br />
and control to every step of<br />
the digital certificate management<br />
process, from acquisition, configuration<br />
and installation of certificates<br />
to server analysis, compliance monitoring<br />
and security scans.<br />
The features, which make it easy<br />
for customers to purchase, configure,<br />
install, track and renew SSL<br />
certificates, make Entrust Cloud the<br />
most streamlined platform in industry.<br />
“We greatly expanded the capabilities<br />
of Entrust Cloud to make<br />
life easier for our customers and<br />
to protect them from the financial<br />
impact of expired, rogue or improperly<br />
installed certificates,” said<br />
Russell St. John, senior vice president<br />
of global marketing for Entrust<br />
Datacard. “Certificate-related problems<br />
can cost businesses hundreds<br />
of thousands of dollars a year due to<br />
breaches and other types of fraud,<br />
as well as lost revenue from potential<br />
customers simply abandoning<br />
sites they felt were not secure.”<br />
Highlights of the<br />
new capabilities include:<br />
Entrust® Turbo Auto-Install Client.<br />
A simplified method for installing<br />
SSL certificates and configuring<br />
servers on Microsoft Windows<br />
platforms. Automatically installing<br />
certificates directly to servers<br />
speeds deployment and greatly<br />
minimizes opportunities for configuration<br />
errors.<br />
Automated SSL Server Test. Periodic<br />
testing of servers for configu-<br />
26<br />
ration compliance protects against<br />
Heartbleed, Poodle and other similar<br />
threats. A new automated testing<br />
feature provides deep analysis<br />
of web servers, identifies potential<br />
vulnerabilities and checks compliance<br />
levels. Email notifications and<br />
screen prompts provide automatic<br />
notification of potential problems.<br />
Reporting Engine. Consolidated<br />
data for both Entrust-issued and<br />
discovered certificates is delivered<br />
via standard or customized reports<br />
— or displayed on a management<br />
dashboard. New widgets allow users<br />
to configure the dashboard for customized<br />
views and drill-downs.<br />
Automated Alerts. Customers can<br />
choose to receive email alerts or<br />
dashboard prompts when the management<br />
platform automatically<br />
detects potential problems with certificate<br />
policy, best practices, compliance<br />
or other key considerations.<br />
Site Analysis and Reporting. Customers<br />
can continually scan all of<br />
the websites associated with their<br />
SSL certificates and determine security<br />
levels for each one. This new<br />
feature also provides reports on
certificate locations, certificate and<br />
server configurations, number and<br />
types of certificates for each site,<br />
malware configurations and more.<br />
Certificate Pickup Wizard. An<br />
intuitive new process speeds certificate<br />
installation by delivering<br />
server-specific instructions and file<br />
bundles. Certificate information,<br />
tracking numbers, server types and<br />
associated certificate chains are all<br />
displayed.<br />
“Our customers realize true network<br />
security requires more than<br />
just the simple installation of SSL<br />
certificates,” St. John said. “They<br />
have asked for new capabilities that<br />
allow them to better configure, scan,<br />
track and renew SSL certificates.<br />
These new Entrust Cloud features<br />
offer all of those capabilities and<br />
more.”<br />
To learn more about Entrust Cloud,<br />
visit: https://www.entrust.com/products/cloud/.<br />
About Entrust Datacard<br />
Consumers, citizens and employees<br />
increasingly expect anywhereanytime<br />
experiences — whether<br />
they are making purchases, crossing<br />
borders, accessing e-gov services or<br />
logging onto corporate networks.<br />
Entrust Datacard offers the trusted<br />
identity and secure transaction<br />
technologies that make those experiences<br />
reliable and secure. Solutions<br />
range from the physical world<br />
Viscount unveils Freedom Channel Partner<br />
Program with enhanced technical support<br />
of financial cards, passports and<br />
ID cards to the digital realm of authentication,<br />
certificates and secure<br />
communications. With more than<br />
2,000 Entrust Datacard colleagues<br />
around the world, and a network of<br />
strong global partners, the company<br />
serves customers in 150 countries<br />
worldwide. For more information,<br />
visit www.entrustdatacard.com.<br />
27<br />
VANCOUVER, British Columbia,<br />
<strong>Dec</strong>ember 16, <strong>2015</strong> – Viscount Systems,<br />
Inc. (OTCQB:VSYS) (“Viscount”),<br />
a software company specializing<br />
in physical and logical security<br />
solutions, today announced its Viscount<br />
Systems Certified Channel<br />
Partner Program. The initiative is<br />
designed to help system integrators<br />
expand business opportunities and<br />
revenue growth through the delivery<br />
of Viscount access control and<br />
security management solutions.<br />
Viscount’s Freedom access control<br />
application enables partners to capitalize<br />
on unique differentiators that<br />
drive today’s convergence of physical<br />
and logical access control solutions.<br />
There are measurable benefits<br />
to adopting a unified physical and<br />
logical security program, and customers<br />
in a host of vertical markets<br />
are looking for trusted partners to<br />
help implement technologies to<br />
support this approach.<br />
Partnering with Viscount enables<br />
integrators to deliver unique and<br />
innovative access control, and integrated<br />
security management solutions<br />
to a new generation of security<br />
managers who take a more<br />
holistic approach to securing their<br />
company’s assets. Partnering with<br />
Viscount empowers systems integrators<br />
through the delivery of technologically<br />
advanced solutions that<br />
cost less to install while delivering<br />
an unparalleled level of security at a<br />
lower cost of ownership.<br />
Freedom Certified Channel Partners<br />
gain access to sales and marketing<br />
resources, enhanced technical<br />
support and training, and the<br />
opportunity to maximize margins<br />
and tap into new business opportunities.<br />
The Certified Channel Partner<br />
Program is an exclusive network<br />
of preferred partners that meet high<br />
standards of technical and IT security<br />
expertise and maintain a reputa-<br />
More on page 30
Access Control, ID, Insider Threats<br />
United Arab Emirates goes<br />
eBorder with Morpho<br />
<strong>2015</strong>, UNITED ARAB EMIRATES:<br />
Morpho, in partnership with eI-<br />
MASS, is implementing the prestigious<br />
eBorder management system<br />
in five major airports in the UAE.<br />
The project is setting the standards<br />
for the future of border control in<br />
the world, combining<br />
the very latest in<br />
biometric technologies,<br />
automation<br />
and system integration.<br />
Expanding<br />
upon the eBorder<br />
pilot implemented<br />
in 2012 in Abu Dhabi,<br />
the success story<br />
goes on.<br />
Full Entry and<br />
Exit passenger processing using 96<br />
e-Gates, 94 e-Counters, contactless<br />
and at-a-distance biometric<br />
capture, seamless integration into<br />
existing infrastructure in all project<br />
locations, those are some of the<br />
key features of eBorder in <strong>2015</strong>. No<br />
magic here, but a thorough understanding<br />
of the UAE’s context and a<br />
close partnership with the Ministry<br />
of Interior to design the most fitted<br />
system, leading to golden opportunities<br />
for multiple stakeholders.<br />
The border control challenge<br />
in the UAE<br />
Being centrally located in the Gulf<br />
region, the UAE are at the crossroads<br />
between Europe, Africa and<br />
Asia. UAE airports are among the<br />
busiest in the world, with more than<br />
100 million passengers handled in<br />
2014. The United Arab Emirates are<br />
also a highly attractive country, for<br />
both business people and tourists.<br />
85% of the UAE population are foreigners.<br />
This unique UAE context exacerbates<br />
the challenge of improving<br />
both security and passenger facilitation<br />
that is becoming familiar to<br />
border management authorities<br />
around the world.<br />
Multi-biometrics as the key<br />
to eBorder system<br />
Only the use of biometrics can actually<br />
meet this challenge. Indeed,<br />
biometrics is today’s most secure<br />
way to irrevocably identify an individual.<br />
And Morpho’s latest biometric<br />
technology is now fast, nonintrusive,<br />
even fun, dramatically<br />
improving user experience and particularly<br />
adapted to fit in an airport<br />
environment.<br />
In 2011, Abu Dhabi Police decided<br />
to test the multi-biometric border<br />
management concept and selected<br />
Morpho and eIMASS to implement<br />
a pilot system, connected to<br />
the UAE IRIS system, which is the<br />
key biometric of eBorder system.<br />
The IRIS system is also provided by<br />
Morpho and eIMASS.<br />
The current expansion of the pilot<br />
across the UAE features Morpho’s<br />
Finger On-the-Fly technology,<br />
which is a very rapid, touchless way<br />
of capturing fingerprint, and Iris<br />
At-a-Distance, the world’s fastest<br />
operational capture time (less than<br />
1 second for simultaneous capture<br />
of iris and face).<br />
Sharing the benefits of the system<br />
eBorder system is shaped for everybody’s<br />
benefit, which makes it so<br />
valuable:<br />
• The travelling public benefit<br />
28
SecuGen to showcase new unity<br />
biometric development platform<br />
at CES <strong>2016</strong><br />
from both the efficiency and the visual<br />
appeal of eCounters and eGates,<br />
with the assurance to make their<br />
journey safely and comfortably;<br />
• Those who run the systems enjoy<br />
a more productive, more satisfying<br />
working environment. To airports,<br />
passengers’ satisfaction goes<br />
together with airlines’ satisfaction,<br />
to increase airport’s profitability.<br />
• The Authorities that depend on<br />
the performance and reliability of<br />
the systems value the security guaranteed<br />
by this fully integrated, nationwide<br />
approach to border control.<br />
See more at: http://www.morpho.<br />
com/en/aviation-border-security/<br />
helping-airports-make-passengertravel-safer-and-hassle-free#sthash.<br />
qaBesOmD.dpuf<br />
29<br />
SANTA CLARA, Calif. (<strong>Dec</strong>ember<br />
14, <strong>2015</strong>) – SecuGen, a world leading<br />
optical fingerprint device and<br />
technology vendor, will be showcasing<br />
at CES <strong>2016</strong> its new product,<br />
Unity BDP, a platform for the development<br />
of a wide array of fingerprint<br />
enabled biometric products.<br />
Developers are invited to come by<br />
SecuGen’s booth, number 21733 in<br />
South Hall 1 of the Las Vegas Convention<br />
Center to see a demonstration<br />
of this revolutionary new OEM<br />
fingerprint sensor.<br />
More than ever before, hardware<br />
device manufacturers must consider<br />
whether biometric security<br />
is appropriate for their products.<br />
SecuGen has now made it very easy<br />
to embed sophisticated fingerprint<br />
technology into a wide variety of<br />
hardware products with its new<br />
Unity Biometric Development Platform.<br />
The Unity BDP offers device manufacturers<br />
a flexible, expandable,<br />
and easy to use environment that<br />
provides a simplified way to embed<br />
fingerprint capability into a very<br />
wide range of products such as access<br />
control devices, time & attendance<br />
machines, civil ID handheld<br />
devices, ATMs, industrial equipment,<br />
point of sale equipment, and<br />
much, much more.<br />
With an integrated Linux development<br />
environment and embedded<br />
biometric fingerprint registration<br />
and matching functions, Unity BDP<br />
delivers efficiency of development<br />
in one small but powerful package.<br />
The Unity BDP includes a FAP<br />
20 certified optical fingerprint sensor,<br />
an open Linux system running<br />
on a 1 GHz CPU, and a modular<br />
design that easily accommodates a<br />
wide array of expansion boards. Future<br />
expansion boards may include<br />
Ethernet, Bluetooth capability, and<br />
battery logic for mobile devices. The<br />
boards may also provide a wide array<br />
of interfaces such as LED displays,<br />
keypads, RS-232, and USB. In<br />
More on page 30
Access Control, ID, Insider Threats<br />
SecuGen to showcase new unity<br />
biometric development platform<br />
Continued from page 29<br />
addition, Unity BDP includes an API<br />
that gives developers access to Secu-<br />
Gen’s NIST certified template extraction<br />
and matching algorithms.<br />
Using Unity BDP, many developers<br />
will find that there is no longer a<br />
need for a separate controller board<br />
since Unity BDP comes with a fast<br />
processor, open Linux, and the ability<br />
to add various interfaces and logic<br />
via expansion boards. This makes<br />
Unity BDP an ultra-compact, enormously<br />
capable, and affordable biometric<br />
platform that features Secu-<br />
Gen’s renowned high quality optical<br />
fingerprint sensor.<br />
“Unity BDP is the world’s first biometric<br />
development platform as far<br />
as we can tell,” stated Jeff Brown, VP<br />
of Sales and Marketing for SecuGen.<br />
“Our team has been able to go far beyond<br />
delivering a simple fingerprint<br />
sensor. Unity BDP includes a comprehensive<br />
set of tools that allow developers<br />
to create fingerprint enabled<br />
products quickly and efficiently. This<br />
product is revolutionary.”<br />
VP of Engineering Dan Riley added,<br />
“The SecuGen engineering team<br />
has come up with a new approach to<br />
delivering world class OEM sensors.<br />
Unity BDP is not just a sensor, it is<br />
an entire development platform that<br />
is both software and hardware expandable.<br />
The uses for this product<br />
are nearly limitless, and it represents<br />
a quantum leap in OEM fingerprint<br />
technology.”<br />
Won Lee, CEO of SecuGen, said,<br />
“For many years we have focused exclusively<br />
on delivering to our OEM<br />
partners the tools they need to compete<br />
successfully in this highly competitive<br />
industry. Unity BDP is the<br />
culmination of a decade of effort. We<br />
are very proud to be able to deliver<br />
the first product of its kind, a complete<br />
biometric development platform<br />
that is compact and amazingly<br />
affordable.”<br />
About SecuGen<br />
SecuGen Corporation (www.secugen.com)<br />
is the world’s leading provider<br />
of advanced, optical fingerprint<br />
recognition technology, products,<br />
tools and platforms for physical and<br />
information security. SecuGen designs<br />
and develops FBI-certified fingerprint<br />
readers and OEM components,<br />
developer kits and software,<br />
including NIST/MINEX-compliant<br />
algorithms. Known for high quality,<br />
ruggedness, and performance in<br />
a wide variety of applications and<br />
environmental conditions, SecuGen<br />
products are used by world-leading<br />
financial, medical, government, educational<br />
and corporate institutions<br />
and are sold through an extensive<br />
partner network of reseller partners<br />
including original equipment manufacturers,<br />
independent software vendors<br />
and system integrators around<br />
the world.<br />
SecuGen is a registered trademark<br />
of SecuGen Corp. in the United<br />
States and other countries.<br />
30<br />
Viscount unveils Freedom<br />
Channel Partner Program<br />
Continued from page 27<br />
tion for superior customer service.<br />
“The Viscount Certified Channel<br />
Partner Program is a strategic initiative<br />
that more closely connects our<br />
business with a select network of systems<br />
integrators,” said Scott Sieracki,<br />
CEO of Viscount. “We are committed<br />
to providing our channel partners<br />
with unsurpassed opportunity<br />
and support as they are a critical part<br />
of our growth strategy. Viscount’s<br />
investment in technical support resources<br />
and infrastructure combined<br />
with the delivery of technologically<br />
advanced, secure access control solutions<br />
enable integrators to tap into<br />
new revenue streams, lower support<br />
costs, and improve their profit margins..”<br />
About Viscount<br />
Viscount is the leading provider of<br />
next-generation, IT-centric access<br />
control and identity management<br />
applications. Viscount’s Freedom application<br />
platform allows seamless<br />
unification of the physical and digital<br />
security worlds by replacing discrete,<br />
self-contained systems with an<br />
integrated security system that is sophisticated<br />
enough to protect today’s<br />
critical business assets, and flexible<br />
enough to keep up with the evolving<br />
IT infrastructures of government<br />
and private organizations.<br />
For more information please visit:<br />
www.viscount.com
Los Angeles chosen to welcome largest<br />
container ship ever to call in North America<br />
SAN PEDRO, Calif. — <strong>Dec</strong>. 14, <strong>2015</strong><br />
— The largest container ship ever<br />
to call at a North American port is<br />
scheduled to arrive at the Port of Los<br />
Angeles on <strong>Dec</strong>.26th. French shipping<br />
line CMA-CGM launched the<br />
CMA CGM Benjamin Franklin on<br />
<strong>Dec</strong>. 10. The vessel is scheduled to<br />
make her maiden call at APM Terminals-Pier<br />
400 at the Port of Los<br />
Angeles. The ship has a capacity of<br />
nearly 18,000 Twenty Foot Equivalent<br />
Units (TEUs), which is about<br />
a third larger than the biggest container<br />
ships that currently call at<br />
the San Pedro Bay port complex.<br />
“It’s fitting that the largest container<br />
ship to ever traverse North American<br />
waters would make its first call<br />
right here at the Port of Los Angeles,”<br />
said Mayor Eric Garcetti, who recently<br />
met with Founder and Chairman<br />
Jacques Saadé and other top<br />
CMA CGM executives. “The arrival<br />
of the CMA CGM Benjamin Franklin<br />
sends a powerful message that our<br />
port stands among the world’s greatest,<br />
and that we are prepared to continue<br />
growing and adapting to the<br />
demands of our global economy.”<br />
“As we were reminded nearly a<br />
year ago when activity at the ports<br />
along the West Coast came to a near<br />
standstill, our ports are a critical economic<br />
engine at the local, regional<br />
and national levels,” said Secretary of<br />
Labor Thomas E. Perez. “Their effective,<br />
efficient operation is necessary<br />
for 21st century global commerce,<br />
and today’s news demonstrates that<br />
the Port of LA is prepared for the<br />
next phase of modern trade. Working<br />
together, the shipping companies<br />
and port workers have enabled the<br />
port to bounce back from last year’s<br />
slowdown and show the world its capabilities.”<br />
“Together with the Board of Harbor<br />
Commissioners, we appreciate<br />
the confidence CMA-CGM has instilled<br />
in the Port of Los Angeles and<br />
the opportunities this vessel call will<br />
provide to APM Terminals, longshore<br />
labor and supply chain partners,”<br />
said Port of Los Angeles Executive<br />
Director Gene Seroka. “Earlier<br />
this year APM Terminals, longshore,<br />
and land-side logistics partners efficiently<br />
processed three 13,000 TEUs<br />
ships concurrently producing more<br />
than 38,000 container moves over<br />
an 8-day period. The arrival of the<br />
CMA-CGM Benjamin Franklin signals<br />
a new chapter in Pacific Rim<br />
trade flow and supply chain optimization.”<br />
With its world class infrastructure,<br />
skilled longshore labor, and superior<br />
conveyance network all set to<br />
efficiently handle the largest-class<br />
ships on a routine basis, the Port of<br />
31<br />
Los Angeles is uniquely capable to<br />
accommodate ULCV-class ships. It<br />
is anticipated that the CMA CGM<br />
Benjamin Franklin will return to San<br />
Pedro Bay in the first quarter of <strong>2016</strong><br />
for a call at the Port of Long Beach.<br />
CMA CGM, founded and led by<br />
Jacques R. Saadé is the world’s third<br />
largest and France’s top container<br />
shipping company. Its 470 vessels<br />
call more than 400 ports in<br />
the world, on all 5 continents.<br />
In 2014, over 12.2 million TEUs<br />
(twenty-foot equivalent units)<br />
were carried.<br />
CMA CGM has grown continuously,<br />
and has been constantly innovating<br />
to offer its clients new sea,<br />
land and logistics solutions. Present<br />
in 160 countries, with a network of<br />
655 agencies, the Group employs<br />
20,000 people worldwide, including<br />
2,400 in its headquarters in Marseilles.<br />
As North America’s leading seaport<br />
by container volume and cargo<br />
value, the Port of Los Angeles facilitated<br />
$290 billion in trade during<br />
2014. Port operations and commerce<br />
facilitate more than 148,000<br />
jobs (about one in 12) in the City<br />
of Los Angeles and 531,000 jobs (or<br />
one in 16) in the five-county Southern<br />
California region. The San Pedro<br />
Bay Ports support more than 1 million<br />
California jobs and 3.1 million<br />
nationwide.
“Working Together to Foster<br />
Safety” Speech by FAA<br />
Administrator Michael Huerta<br />
Continued from page 6<br />
FAA Administrator<br />
Michael Huerta<br />
32<br />
Up to this<br />
point, we have<br />
focused mainly<br />
on coordinating<br />
From the earliest days of flight, aviation<br />
has presented us with an everchanging<br />
slate of opportunities and<br />
challenges.<br />
For example, we are able to fly longer<br />
distances in greater safety and<br />
comfort than ever before, making<br />
almost any two points on the planet<br />
reachable in a single flight.<br />
At the same time, the worldwide<br />
security environment and ongoing<br />
regional conflicts have added new<br />
concerns that extend far beyond<br />
questions about aerodynamics and<br />
fuel calculations.<br />
As you all know, we experienced<br />
this first-hand on July 22, 2014,<br />
when a rocket from Gaza landed approximately<br />
a mile from Ben-Gurion<br />
Airport, prompting FAA to issue a<br />
Notice to Airmen that prohibited<br />
U.S. carriers from using BGA for a<br />
period of time. We viewed the suspension<br />
of flights as a temporary but<br />
necessary pause while we assured<br />
ourselves of the safety postures of<br />
both the United States and the Government<br />
of Israel.<br />
As a result of this incident, the FAA<br />
and the Civil Aviation Authority of<br />
Israel (CAAI) began an in-depth<br />
exchange that allowed the FAA and<br />
CAAI to establish new mechanisms<br />
to improve coordination. These are<br />
greatly assisting our communication<br />
and interaction on a number<br />
of fronts, and are helping us remain<br />
prepared for a range of contingencies.<br />
internal processes<br />
between<br />
the FAA and the<br />
CAAI. I hope<br />
in the future we<br />
can expand this<br />
cooperation to<br />
entail working together with U.S.<br />
and Israeli companies to find new,<br />
innovative technologies for the aviation<br />
sector.<br />
The FAA’s primary concern is the<br />
safety of civil aviation anywhere<br />
American passengers travel around<br />
the world. We constantly monitor<br />
world events and work with our international<br />
partners to take the appropriate<br />
actions with the best interests<br />
of travelers foremost in our<br />
minds. This is another common<br />
bond we share with you.<br />
When you think about it, as a sovereign<br />
nation, Israel has been around<br />
for only about 60 percent of the history<br />
of manned flight. Yet, during<br />
that time, this country has emerged<br />
on many fronts as a leader on the<br />
world aviation stage.<br />
Just in October, your flag carrier,<br />
El Al Israel Airlines, announced the<br />
largest fleet-renewal program in the<br />
airline’s history.<br />
El Al placed orders for nine new<br />
Boeing 737s and 787 Dreamliners.<br />
The airline also said it planned to<br />
lease an additional six Dreamliners<br />
and was taking options for the purchase<br />
of another 13. All told, the<br />
deal is valued at roughly $3.4 billion.<br />
Today, almost five years to the day<br />
since the U.S.–Israel Open Skies<br />
Agreement went into force, El Al is<br />
unquestionably a top-notch competitor<br />
in a region that continues to set<br />
new standards for passenger comfort<br />
and aircraft amenities.<br />
International carriers such as United<br />
Airlines have benefited from the<br />
growing demand from the tech industry.<br />
United is scheduled to begin<br />
direct service from Tel Aviv to San<br />
Francisco this coming March and<br />
Delta will also expand its direct service<br />
to New York in <strong>2016</strong>.<br />
The recent discovery of vast fields<br />
of natural gas under the Mediterranean<br />
promises even more future demand<br />
for air travel in this region.<br />
In the manufacturing arena, Israel<br />
has become an important supplier<br />
to many of the world’s leading aerospace<br />
companies. Components made<br />
in your factories are incorporated<br />
into the newest generation of modern<br />
jetliners and fighter jets. Indeed,<br />
one of the premier business jets in its<br />
class, the Gulfstream G280, was certified<br />
by the FAA in 2012 and is built<br />
by Israel Aerospace Industries, not<br />
far from where we are tonight.<br />
The Civil Aviation Authority is a<br />
valuable partner to the FAA, and we<br />
were pleased to work with the Government<br />
of Israel during its efforts in<br />
2011 to update its aviation law. Today,<br />
Israel enjoys a Category 1 safety<br />
rating – the highest possible under<br />
the FAA’s rating system. We continue<br />
to work with the CAA, both directly<br />
and through international safety<br />
committees, to address the pressing<br />
issues that face this industry.<br />
This afternoon, I visited Israel<br />
Aerospace Industries, where we engaged<br />
in constructive conversations<br />
about the strides the company has
also made in the growing field of unmanned<br />
aircraft.<br />
As you have probably seen, the<br />
subject of small, unmanned aircraft<br />
has consumed a great deal of the<br />
FAA’s time in recent months. We are<br />
working to implement regulations<br />
that will enable us to safely integrate<br />
this promising segment of aviation<br />
into the world’s busiest and most<br />
complicated airspace system.<br />
Meanwhile, the industry itself is<br />
growing at a pace unlike anything<br />
we’ve seen since the dawn of the Jet<br />
Age.<br />
We learn every day about new<br />
and creative uses for these aircraft,<br />
whether it’s to deliver packages or<br />
enable companies to accomplish<br />
tasks such as remotely monitoring<br />
miles of railroad or pipeline.<br />
At the same time, these small aircraft—we<br />
call them Unmanned<br />
Aircraft Systems, you call them Remotely<br />
Piloted Aircraft Systems, but<br />
the rest of the world knows them<br />
as drones – are becoming the latest<br />
craze among tech-savvy consumers.<br />
Retailers estimate that as many as<br />
400,000 small unmanned aircraft<br />
will be sold during the holiday season<br />
in the U.S. Most will be piloted<br />
by operators who have little or no experience<br />
in aviation.<br />
We have already had several hundred<br />
instances in the U.S. in which<br />
pilots have reported these small aircraft<br />
have come into close proximity<br />
to manned flights. Many of them<br />
have been in airspace near airports,<br />
while a number have been at altitudes<br />
ranging from 1,500 feet to as<br />
high as 10,000 feet.<br />
As you might imagine, we are<br />
working to eliminate the likelihood<br />
of an unfortunate incident or accident.<br />
We are using every method<br />
at our disposal to engage these new<br />
aviators – and they are aviators. As<br />
we do so, we value the advice and<br />
experience of our international partners<br />
here in Israel and elsewhere.<br />
We recognize that we are all embarking<br />
together into yet another new age<br />
in the constantly changing world of<br />
aviation.<br />
As regulators, airline operators and<br />
business leaders and aviators, we are<br />
constantly called upon to make flying<br />
even safer. We have achieved an<br />
amazing track record together.<br />
One of the most important factors<br />
in the worldwide aviation safety record<br />
is the free exchange of information.<br />
We realized in the late 1980s<br />
and early 1990s that the industry<br />
would need to focus on intense data<br />
analysis to detect risk and prevent<br />
accidents or incidents from occurring.<br />
The industry adopted a wide array<br />
of programs that encouraged<br />
aviation professionals–be they pilots,<br />
flight attendants, mechanics or air<br />
traffic controllers–to voluntarily report<br />
safety events without jeopardizing<br />
their careers.<br />
Airlines and government safety<br />
authorities around the world used<br />
that information to jointly develop<br />
new safety protocols. We improved<br />
not only training, but the technologies<br />
we rely on to keep us safe as we<br />
jet from place to place at almost the<br />
speed of sound.<br />
As a result, we have all but eliminated<br />
the most common causes of commercial<br />
accidents – controlled flight<br />
into terrain, weather, wind shear and<br />
failure to complete checklists. All<br />
33<br />
told, our Commercial<br />
Aviation Safety<br />
Team reduced the<br />
risk of fatalities in<br />
U.S. commercial<br />
aviation by 83 percent<br />
over 10 years.<br />
We continue to work through the<br />
world’s international safety organizations<br />
to make flying safer, no matter<br />
where the wheels touch down. The<br />
path to success depends upon the<br />
free exchange of safety information<br />
and the willingness to always look<br />
for the next improvement. We are<br />
pleased to join you on this journey.<br />
Many people outside our industry<br />
probably aren’t aware of it, but some<br />
of the most valuable lessons about<br />
flying were learned in this part of<br />
the world. Antoine de St. Exupery,<br />
known to many as the author of the<br />
children’s book, “The Little Prince,”<br />
was actually a pioneering aviator<br />
who spent much of his time flying<br />
the airmail throughout the Middle<br />
East.<br />
He wrote an award-winning book,<br />
“Wind, Sand and Stars” in 1939, inspired<br />
by a plane crash that almost<br />
claimed the lives of St. Exupery and<br />
his navigator.<br />
St. Exupery offered several observations<br />
about flying under trying<br />
conditions. Back then, he was in<br />
open-cockpit biplanes. Most often,<br />
those flights occurred at night. Navigation<br />
was best accomplished by following<br />
the stars. As anyone who has<br />
spent any time in the desert knows,<br />
a sand dune in a sea of sand dunes<br />
makes a poor reference point.<br />
He writes about the loneliness of<br />
the desert and the importance of<br />
More on page 34
“Working Together to Foster Safety”<br />
Continued from page 33<br />
friendship and of gaining new perspectives.<br />
One of the more inspirational<br />
passages of the book includes<br />
this line: “The airplane has unveiled<br />
for us the true face of the earth.”<br />
I think that’s something on which<br />
we can all agree. These machines in<br />
which we fly from place to place to<br />
make money, to visit relatives or to<br />
see the wonders of the world, truly<br />
do force us to look beyond ourselves<br />
and our immediate surroundings.<br />
As we have seen in recent weeks,<br />
no place in the world is immune<br />
from acts of terrorism. Whether it’s<br />
Paris, Baghdad, Nigeria, Colorado<br />
Springs, San Bernardino, Jerusalem<br />
or Tel Aviv, hardly a day goes by<br />
without some sort of senseless violence.<br />
It is up to the people in this room –<br />
and across the international aviation<br />
industry –to take steps to guarantee<br />
our air transportation system is robust<br />
and reliable, no matter what lies<br />
over the horizon.<br />
As I close, it occurs to me that<br />
the mission statement of the Peres<br />
Center for Peace—to “promote lasting<br />
peace and advancement in the<br />
Middle East by fostering tolerance,<br />
economic and technological development,<br />
innovation, cooperation<br />
and well-being”—is one that could<br />
apply across all borders and cultures.<br />
I mentioned earlier that the U.S.<br />
and Israel are tied together by aviation.<br />
The world is tied together by<br />
aviation. Because of this, we are all<br />
neighbors, separated only by time<br />
and distance.<br />
Coalition urges Supreme Court to<br />
reverse Texas v. U.S.<br />
Continued from page 16<br />
citizen and lawful permanent resident<br />
children, family members,<br />
employers, employees and other<br />
community members. The groups<br />
explain that the sweeping injunction<br />
upheld in the lower court directly<br />
harms individuals who have<br />
either been in the U.S. since they<br />
were children or are the parents of<br />
U.S. citizens or lawful permanent<br />
residents.<br />
“The individuals profiled in the<br />
brief illustrate the havoc this case<br />
has wreaked on the lives of millions<br />
of immigrants who remain in legal<br />
limbo,” added Benjamin Johnson,<br />
Executive Director of the American<br />
Immigration Council. “We urge the<br />
U.S. Supreme Court to take up this<br />
case and give hard working immigrant<br />
families the chance to live and<br />
work without fear of deportation.”<br />
The immigration programs, which<br />
were announced by the President last<br />
November, would expand eligibility<br />
for the existing Deferred Action for<br />
Childhood Arrivals (DACA) program<br />
and expand protections for<br />
parents of U.S. citizens and lawful<br />
permanent residents through a program<br />
known as Deferred Action for<br />
Parents of Americans (DAPA). Together,<br />
the programs would allow<br />
34<br />
millions of undocumented individuals<br />
to remain in the United States<br />
without fear of deportation and apply<br />
for work authorization permits<br />
for a period of three years, with the<br />
possibility of renewal.<br />
“The DAPA and expanded DACA<br />
policies will help ensure that families<br />
are not needlessly separated and<br />
that immigrant workers can speak<br />
up for basic safety and fairness on<br />
the job without facing retaliation,”<br />
said Tefere Gebre, Executive Vice<br />
President of the AFL-CIO. “We<br />
urge the Supreme Court to take up<br />
this case right away.”<br />
• Click here to see the full legal<br />
brief.<br />
• Click here for more background<br />
on the legal challenges to executive<br />
action on immigration.<br />
• Click here to see an interactive<br />
timeline outlining the process for<br />
review of the case by the Supreme<br />
Court.
National Science Foundation announces<br />
“CRISP” awards program<br />
Continued from page 9<br />
portation services. Social networks,<br />
interactions, and policies can enable<br />
or hinder the successful creation of<br />
resilient complex adaptive systems.<br />
The goals of the Critical Resilient<br />
Interdependent Infrastructure<br />
Systems and Processes<br />
(CRISP) solicitation<br />
are to: (1) foster<br />
an interdisciplinary<br />
research community<br />
of engineers, computer<br />
and computational<br />
scientists and social and<br />
behavioral scientists, that<br />
creates new approaches and engineering<br />
solutions for the design<br />
and operation of infrastructures as<br />
processes and services; (2) enhance<br />
the understanding and design of<br />
interdependent critical infrastructure<br />
systems (ICIs) and processes<br />
that provide essential goods and<br />
services despite disruptions and<br />
failures from any cause, natural,<br />
technological, or malicious; (3) create<br />
the knowledge for innovation<br />
in ICIs so that they safely, securely,<br />
and effectively expand the range of<br />
goods and services they enable; and<br />
(4) improve the effectiveness and<br />
efficiency with which they deliver<br />
existing goods and services. These<br />
goals lead to the following specific<br />
objectives for this solicitation:<br />
• To create new knowledge, approaches,<br />
and engineering solutions<br />
to increase resilience, performance,<br />
and readiness in ICIs.<br />
• To create theoretical frameworks<br />
and multidisciplinary models<br />
of ICIs, processes and services,<br />
capable of analytical prediction of<br />
complex behaviors, in response to<br />
system and policy changes.<br />
• To develop frameworks<br />
to understand interdependencies<br />
created<br />
by the interactions<br />
between the physical,<br />
the cyber (computing,<br />
information, computational,<br />
sensing and communication),<br />
and social,<br />
behavioral and economic elements<br />
of ICIs. These could include, but<br />
are not limited to, software frameworks<br />
for modeling and simulation<br />
using advanced cyber infrastructures,<br />
management, monitoring and<br />
real-time control of interdependent<br />
ICIs and novel software engineering<br />
methodologies.<br />
• To study socioeconomic, political,<br />
legal and psychological obstacles<br />
to improving ICIs and identifying<br />
strategies for overcoming those<br />
obstacles.<br />
The CRISP solicitation seeks to<br />
fund projects likely to produce new<br />
knowledge that can contribute to<br />
making ICI services more effective,<br />
efficient, dependable, adaptable,<br />
35<br />
resilient, safe, and secure, taking<br />
into account the human systems in<br />
which they are embedded. Successful<br />
proposals are expected to study<br />
multiple infrastructures focusing<br />
on them as interdependent systems<br />
that deliver services, enabling a new<br />
interdisciplinary paradigm in infrastructure<br />
research. To meet the<br />
interdisciplinary criterion, proposals<br />
must broadly integrate across<br />
engineering, computer, information<br />
and computational science, and the<br />
social, behavioral and economic sciences.<br />
Proposals that do not meet<br />
this criterion will be returned<br />
without review. Projects supported<br />
under this solicitation may undertake<br />
the collection of new data or<br />
use existing curated data depending<br />
on the category of award, and must<br />
recognize that a primary objective<br />
is integrative, predictive modeling<br />
that can use the data to validate the<br />
models and that can be integrated<br />
into decision making.”<br />
INFORMATION WEBCAST:<br />
The NSF will hold an informational<br />
webcast on Friday, <strong>Jan</strong>uary<br />
22, <strong>2015</strong> at 1:30pm to discuss the<br />
CRISP program and answer questions<br />
about this solicitation. More<br />
details about the webcast will be<br />
posted on the CMMI website, http://<br />
www.nsf.gov/eng/cmmi, as they become<br />
available.
Texas Observer: corruption,<br />
insufficient oversight at CBP<br />
Continued from page 15<br />
36<br />
Trump’s Muslim immigration<br />
policy<br />
Continued from page 14<br />
Finally, putting the history lesson<br />
and legal questions aside, is this truly<br />
the path the U.S. public would want<br />
to see the country take? A public that,<br />
by and large, prides itself on being a<br />
nation of immigrants, built on diversity,<br />
religious tolerance, and equality?<br />
Rabbi Jack Moline, executive director<br />
of Interfaith Alliance, articulated<br />
what is most likely on the minds of<br />
millions of Americans as they consider<br />
Trump’s latest proposal, “Rooting<br />
our nation’s immigration policy in<br />
religious bigotry and discrimination<br />
will not make America great again.”<br />
Trump’s latest immigration policy<br />
proposal is nothing more than political<br />
showmanship that harkens back<br />
to some of the darker days in our nation’s<br />
history and feeds the fear mongers<br />
among us. How can anyone believe<br />
this is the way to move a country<br />
forward?<br />
See more at: http://immigrationimpact.com/<strong>2015</strong>/12/08/<br />
trumps-muslim-immigration-policy-unconstitutional-and-unworthyof-america/#sthash.VuPsV3r1.dpuf<br />
der for money.”<br />
But, while such anecdotes of corruption<br />
abound, “Homeland Security<br />
officials have no way to gauge<br />
how extensive the problem is within<br />
its ranks.” In a 2014 report, a Homeland<br />
Security advisory panel of lawenforcement<br />
officials concluded that<br />
“the true levels of corruption within<br />
CBP are not known.” According to<br />
the Texas Observer, this state of affairs<br />
has existed since the creation of<br />
DHS, which “gave rise to a complex<br />
web of internal affairs bodies, with<br />
overlapping jurisdictions, conflicting<br />
interests and chronic funding shortages.”<br />
In fact, within DHS:<br />
“Each agency has its own protocols,<br />
case numbers and filing systems, its<br />
own sense of institutional pride, and<br />
its own acronyms. The FBI, DHS OIG<br />
[DHS Office of the Inspector General],<br />
ICE OPR (Immigration and Customs<br />
Enforcement Office of Public<br />
Responsibility) and CBP IA [CBP Internal<br />
Affairs] all run their own competing<br />
investigations—even though,<br />
with the exception of the FBI, they’re<br />
all part of the Department of Homeland<br />
Security.”<br />
Yet, somehow, CBP “was left without<br />
its own internal affairs investigators,”<br />
despite being the largest lawenforcement<br />
agency in the country.<br />
Rather, CBP is supposed to be policed<br />
by DHS OIG, which has around 200<br />
investigators who are supposed to<br />
monitor more than 220,000 people.<br />
In comparison, “the FBI has 250 internal<br />
affairs investigators for its<br />
13,000 agents.” With so few investigators<br />
keeping track of so many CBP<br />
personnel, it is no wonder that corruption<br />
appears to be flourishing on<br />
the border.<br />
It’s important to remember that<br />
the lack of accountability which fosters<br />
corruption also creates an atmosphere<br />
of impunity surrounding the<br />
use—and abuse—of power, including<br />
the use of deadly force. According<br />
to an October <strong>2015</strong> Los Angeles<br />
Times investigation, from 2010 to<br />
2013, Border Patrol agents fired their<br />
Tasers 70 times “at people who were<br />
running away, even though there was<br />
no struggle or clear indication that<br />
agents were in danger.” In six instances,<br />
agents used Tasers against “people<br />
who were trying to climb over the<br />
border fence back into Mexico.” Three<br />
people died after being hit by Taser<br />
fire. Two people were shocked while<br />
handcuffed.<br />
Not surprisingly given the lack of<br />
oversight and accountability, Border<br />
Patrol agents are rarely called to account<br />
for their actions. According to<br />
the American Immigration Council,<br />
among the 485 abuse complaints<br />
made against the agency between <strong>Jan</strong>uary<br />
2009 and <strong>Jan</strong>uary 2012 in which<br />
a formal decision was made, “No Action<br />
Taken” represented 97 percent<br />
of all outcomes. Whether or not this<br />
degree of lax oversight also applies<br />
to instances of corruption is not yet<br />
known.<br />
Ultimately, weeding out corruption<br />
(and abuse) from DHS as a whole and<br />
CBP in particular is a responsibility<br />
that rests with Congress. Unfortunately,<br />
jurisdiction of DHS has been<br />
divvied up among “at least 120 congressional<br />
committees, subcommittees<br />
and task forces.” With Congressional<br />
oversight as disjointed as DHS<br />
itself, it is a safe bet that reform will<br />
not come easy.<br />
See more at: http://immigrationimpact.<br />
com/<strong>2015</strong>/12/10/corruption-flourishes-within-cbp/#sthash.6sf0UcZ8.dpuf
<strong>GSN</strong> <strong>2016</strong> Editorial Calendar<br />
MONTH TECHNOLOGY FOCUS MARKET SECTOR FOCUS GUEST CONTRIBUTOR BONUS DISTRIBUTION<br />
<strong>Jan</strong>uary Print<br />
Orders <strong>Dec</strong> 17<br />
Materials <strong>Dec</strong> 21<br />
Access Control/Govt/<br />
Biometric ID<br />
Airport/Aviation<br />
Security<br />
Cybersecurity<br />
Guest Expert<br />
Fencetech<br />
February <strong>Digital</strong><br />
Orders <strong>Jan</strong> 18<br />
Materials - <strong>Jan</strong> 22<br />
Perimeter Protection/<br />
Intrusion Detection<br />
Oil/Gas/Electric Grid<br />
Monitoring<br />
Educational<br />
Opportunities<br />
RSA February<br />
March Print<br />
Orders Feb 18<br />
Materials Feb 22<br />
CBRNE/Detection<br />
Border Security/<br />
Immigration<br />
Video Surveillance<br />
Guest Expert<br />
ISC West/<br />
Border Security Expo<br />
April <strong>Digital</strong><br />
Orders Mar 18<br />
Materials Mar 21<br />
Video Surveilance/<br />
Management<br />
Maritime/Coastal/<br />
Port Security<br />
Cybersecurity<br />
Guest Expert<br />
May Print<br />
Orders Apr 19<br />
Materials Mar 21<br />
Satellite<br />
Communications<br />
Law Enforcement/<br />
Public Safety<br />
Educational<br />
Opportunities<br />
June <strong>Digital</strong><br />
Orders May 17<br />
Materials May 21<br />
Disaster Prep and<br />
Response<br />
City/State/County<br />
Municipal Security<br />
Cybersecurity<br />
Guest Expert<br />
July Print<br />
Orders Jun 17<br />
Materials June 20<br />
Perimeter Protection/<br />
Intrusion Detection<br />
Airport/Aviation<br />
Security<br />
Facility Security<br />
Guest Expert<br />
Transportation Security<br />
Expert<br />
August <strong>Digital</strong><br />
Orders Jul 18<br />
Materials Jul 22<br />
Access Control/Govt/<br />
Biometric ID<br />
Border Security/<br />
Immigration<br />
Educational<br />
Opportunities<br />
U.S. Canada Border<br />
Security Expo<br />
September Print<br />
Orders Aug 16<br />
Materials Aug 22<br />
School Safety Mobile<br />
and Surveillance<br />
Solutions<br />
Maritime/Coastal/<br />
Port Security<br />
Cybersecurity<br />
Guest Expert<br />
ASIS Conference<br />
October <strong>Digital</strong><br />
Orders Sep 16<br />
Materials Sep 19<br />
International Threat/<br />
Cyber Intelligence<br />
Oil/Gas/Electric Grid<br />
Security<br />
Expert on Govt Data<br />
Security<br />
November Print<br />
Orders Oct 17<br />
Materials Oct 21<br />
Perimeter Protection/<br />
Intrusion Detection<br />
Mass Notification/<br />
Disaster Response<br />
Educational<br />
Opportunities<br />
<strong>Dec</strong>ember <strong>Digital</strong><br />
Orders Nov 18<br />
Materials Nov 21<br />
Year End Roundup of<br />
New Technologies<br />
<strong>2016</strong> Yearbook of H.S.<br />
Awards Winners<br />
37<br />
Guest Cyber Expert<br />
The News Leader in Physical, IT and Homeland Security • www.gsnmagazine.com
Coming Attractions – <strong>2016</strong><br />
<strong>Jan</strong>uary Print<br />
Technology Focus:<br />
Access Control/Govt<br />
& Biometric ID<br />
Market Focus:<br />
Airport/Aviation<br />
Aviation Security<br />
Plus<br />
Guest Cyber Expert<br />
February <strong>Digital</strong><br />
Technology Focus:<br />
Perimeter Protection<br />
Intrusion Detection<br />
Market Focus:<br />
Oil/Gas/Utility<br />
Monitoring<br />
Plus<br />
Education Profile<br />
April <strong>Digital</strong><br />
Technology Focus:<br />
Video Surveillance<br />
Market Focus:<br />
Maritime/Coastal<br />
Port Security<br />
Plus<br />
Guest Cyber Expert<br />
May Print<br />
Technology Focus:<br />
Satellite Communications<br />
Market Focus:<br />
Law Enforcement/<br />
Public Safety<br />
Plus Education Profile<br />
June <strong>Digital</strong><br />
Technology Focus:<br />
Disaster Preparation<br />
And Response<br />
Market Focus:<br />
City/State/County/<br />
Municipal Security<br />
Plus<br />
Guest Cyber Expert<br />
July Print <strong>Edition</strong><br />
Technology Focus:<br />
Perimeter Protection/<br />
Intrusion Detection<br />
Market Focus:<br />
Airport/Aviation<br />
Security<br />
Plus<br />
Facility Security Expert<br />
March Print<br />
Technology Focus:<br />
CBRNE/Detection<br />
Market Focus:<br />
Border Security/<br />
Immigration<br />
Plus<br />
Video Surveillance<br />
Guest Expert<br />
For <strong>GSN</strong> Media Kit or Advertising Rates,<br />
contact Publisher Mike Madsen<br />
at 732-233-8119<br />
or by email at<br />
mmadsen@gsnmagazine.com<br />
38
The News Leader in Physical, IT and Homeland Security<br />
CEO/Editorial Director:<br />
Adrian Courtenay<br />
(O) 212-344-0759, X3<br />
(C) 917-696-5782<br />
acourtenay@gsnmagazine.com<br />
Publisher:<br />
Michael Madsen<br />
(O) 212-344-0759, X1<br />
(C) 732-233-8119<br />
mmadsen@gsnmagazine.com<br />
Senior Writer:<br />
Steve Bittenbender<br />
(C) 502-552-1450<br />
sbittenbender@gsnmagazine.com<br />
Senior Writer:<br />
Karen Ferrick-Roman<br />
(C) 412-671-1456<br />
karenferrickroman@gmail.com<br />
Columnist:<br />
John Convy<br />
Convy on Netcentric Security<br />
john@convyassociates.com<br />
Columnist:<br />
Shawn Campbell<br />
shawncampbell@safenetat.com<br />
Guest Expert Contributor:<br />
Denise Rucker Krepp<br />
(C) 202-546-2533<br />
kdrkrepp@hotmail.com<br />
Art Director:<br />
Gerry O’Hara<br />
OHDesign3<br />
(C) 203-249-0626<br />
gerry@ohd3.com<br />
Production Director:<br />
Tammy Waitt<br />
(O) 732-233-0245<br />
twaitt@gsnmagazine.com<br />
Mailing Address:<br />
Government Security News<br />
P.O. Box 7608<br />
Greenwich, CT 06836<br />
Government Security News (ISSN 1548-940X and UPS 022-845) is published in six print editions (<strong>Jan</strong>, Mar, May, Jul, Sep, Nov) and<br />
six digital editions (Feb, Apr, Jun, Aug, Oct, <strong>Dec</strong>) per year by World Business Media, LLC, P.O. Box 7608, Greenwich, CT 06836.<br />
Telephone (212) 344-0759. Periodicals postage paid at New York, NY and additional mailing offices. POSTMASTER: Send address<br />
changes to <strong>GSN</strong>: Government Security News, Subscription Department, P.O. Box 316, Congers, NY 10920-0316. For Government<br />
decision makers and business executives involved with security products, systems and series. Qualified U.S. subscribers received<br />
<strong>GSN</strong>: Government Security News at no charge. Non-qualified subscribers in the U.S. are charged $75.00 per year. Canadian and<br />
foreign subscribers are charged $140 International Airmail. Copyright <strong>2015</strong> by <strong>GSN</strong>: Government Security News. All rights reserved.<br />
Printed in the U.S.A. <strong>GSN</strong>: Government Security News assumes resonsibility for validity of claims in items reported.<br />
39
Secure access<br />
to cloud, data<br />
and door<br />
Go beyond simple passwords. Protect your<br />
organisation with cost-effective, risk appropriate<br />
Identity Assurance Solutions from HID Global.<br />
With the ever increasing risk from advanced IT security threats, organisations are looking to take authentication<br />
beyond passwords, while lowering cost at the same time. HID Global’s authentication solution provides you<br />
with the convenience, flexibility and comprehensive control you need to deliver secure access, without<br />
compromising on security. HID Global can empower your employee’s, partners and customers with anytime,<br />
anywhere access to enterprise cloud applications, data and the door.<br />
Experience authentication beyond passwords. hidglobal.com<br />
© <strong>2015</strong> HID Global Corporation/ASSA ABLOY AB. All rights reserved. HID, HID Global, the HID Blue Brick logo, and the Chain Design are trademarks or registered trademarks of HID Global or its<br />
licensor(s)/supplier(s) in the US and other countries and may not be used without permission.<br />
ActivID-Enterprise-<strong>GSN</strong>.indd 1<br />
1/6/15 4:32 PM