27.03.2016 Views

GSN March 2016 Digital Edition

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Government Security News<br />

MARCH <strong>2016</strong> DIGITAL EDITION<br />

NYPD Commissioner Bratton, NY Mayor DeBlasio, Homeland Security Secretary<br />

Johnson attend active shooter response drill in NYC MTA station, as Guardian<br />

Gateway successfully detects all gunshots – More on Page 26<br />

Also in this issue:<br />

Ensuring that stolen identities and other biometric data is useless to identity thieves – Page 4<br />

Sony to market cloud-based Eagle Eye Camera VMS throughout Japan – Page 6<br />

Electronic Pulse (EMP) is technology’s worst nightmare, says new <strong>GSN</strong> Columnist George Lane – Page 30<br />

Xenophobic immigration policy would wreck U.S. economy: American Immigration Council – Page 47


<strong>GSN</strong> <strong>March</strong> <strong>2016</strong> <strong>Digital</strong> <strong>Edition</strong><br />

Table of Contents<br />

<strong>GSN</strong> TECHNOLOGY SPOTLIGHT<br />

Whitewood Encryption Systems announces awarding of third patent arising<br />

from Los Alamos National Laboratory technology transfer<br />

“It is clear that the unique attributes of quantum mechanics can have a direct benefit<br />

on security systems that use cryptography. In particular, quantum mechanics<br />

enable behavior that is perfectly random and provides a definitive measure of<br />

tampering – both critical aspects of any crypto system,” said Richard Moulds, Vice<br />

President of Strategy at Whitewood. “As the security industry considers the threat<br />

of quantum computers and their impact on today’s encryption capabilities, we must<br />

raise the security bar. In the medium to long term, this means adopting quantumresistant<br />

algorithms and key management systems. But we can also take action<br />

in the short term. Quantum processes can be used today as a true and trusted<br />

source of random numbers and are rapidly being seen as a standard of due care<br />

when generating cryptographic keys that are fundamentally unpredictable.”<br />

Read more on Page 8.<br />

New <strong>GSN</strong> Columnist George Lane describe’s “Technology’s Worst Nightmare”<br />

An electric magnetic pulse (EMP) is a super-energetic radio wave, an intense burst<br />

of electronic energy that caused by abrupt and rapid acceleration of charged particles<br />

that can destroy or damage electronic systems by overloading their circuits.<br />

EMP’s are harmless to people, but catastrophic to critical infrastructure, such as<br />

electric power, telecommunications, transportation. Because of U.S. unpreparedness<br />

for an EMP event, it is estimated that within twelve months of an event, from<br />

two-thirds to ninety present of the U.S. population could perish.<br />

Read more on Page 30.<br />

2


NEWS AND FEATURES<br />

Ensuring biometric data is useless to identity<br />

thieves Page 4<br />

Sony Business to market cloud-based Eagle Eye<br />

Security Camera Video Management System (VMS)<br />

throughout Japan Page 6<br />

Whitewood Encryption System announces awarding<br />

off third patent arising from Los Alamos National Laboratory<br />

technology transfer Page 8<br />

Marrying mobility and location data for effective<br />

disaster response Page 10<br />

Salient CRGT awarded a $9M contract to provide<br />

data analytics services to the DOT Pipeline and Hazardous<br />

Materials Safety Administration Page 12<br />

Intelsat General and L-3 Communications Systems-West<br />

demonstrate automatic beam switching for<br />

unmanned aerial system on Itelsat EpicNG Page 14<br />

Terma and Atlas Telecom sign partnering<br />

agreement Page 16<br />

Alaskan community standardizes on Genetec “Omnicast”<br />

Video Surveillance to secure public facilities,<br />

keep citizens safe and spread benefits to surrounding<br />

villages Page 18<br />

We’re All in This Together: Strategies for an engaged<br />

public workforce / Part 1 Page 20<br />

Intelleges’ innovative approach helps government<br />

contractors assess their cybersecurity strengths<br />

Page 24<br />

Shooter Detection Systems Chief Cris Connors<br />

discusses growing market for active shooter detection<br />

Page 26<br />

New Hazmat Science Column – Electronic Pulse<br />

(EMP): Technology’s Worst Nightmare Page 30<br />

WWF-Canada and RSA team up to advance<br />

employee action on sustainability Page 40<br />

Extreme conditions are no match for latest<br />

Motorola Solutions Radio Page 49<br />

CBRNE Detection<br />

____________________________________<br />

American Science and Engineering debuts advanced<br />

security screening systems at ABU DHABI event<br />

Page 32<br />

Rapiscan MP 100 Backpack radiation detection<br />

system allows detection of radioactive materials<br />

Page 35<br />

Rapiscan launches DETECTRA HX hand-held<br />

explosive trace detection system Page 37<br />

Convy on Netcentric Security<br />

Mustering up better incident response Page 38<br />

Border Security/Immigration<br />

____________________________________<br />

Statement by Secretary Jeh C. Johnson on Southwest<br />

Border Security apprehensions Page 42<br />

What’s next in the Supreme Court Case on<br />

expanded DACA and DAPA Page 44<br />

Nativists line up in support of Trump’s Presidential<br />

Campaign Page 45<br />

New TSA canine training center opens in San Antonio<br />

Page 46<br />

Xenophobic immigration policy would wreck the<br />

U.S. economy Page 47<br />

Coming Attractions Page 56<br />

Masthead Page 57<br />

3


Ensuring biometric data is useless to<br />

identity thieves<br />

Major news sources reported in<br />

mid-2015 that 21.5 million people<br />

were affected by a breach of U.S.<br />

government systems. Identity data<br />

gathered over the last 15 years was<br />

compromised, including personal<br />

information about citizens who were<br />

part of government employee background<br />

checks. Unfortunately, even<br />

the best risk-based, multi-layered<br />

breach defense is imperfect, and incidents<br />

like this are inevitable. For<br />

this reason, there must be greater<br />

focus on controlling what happens<br />

after the breach, including ensuring<br />

that stolen identities are unusable by<br />

anyone but their legitimate owners.<br />

Rendering Stolen Fingerprints<br />

Useless<br />

Biometrics is the only authentication<br />

method that binds a myriad of<br />

digital and physical credentials to a<br />

person. As such, biometrics is playing<br />

an important role in eliminating<br />

digital identity theft in today’s increasingly<br />

complex and vulnerable<br />

digital environment.<br />

Fingerprint images were among<br />

the sensitive information that was<br />

stolen in the 2015 U.S. Office of Personnel<br />

Management (OPM) breach.<br />

Conceivably, this biometric data<br />

4<br />

could be used by the perpetrators<br />

to hijack a user’s identity and gain<br />

fraudulent access to security systems.<br />

It is important to understand that<br />

biometric characteristics are not secrets.<br />

For example, our facial characteristics<br />

are quite public — not<br />

only observable, but also generally<br />

associated with our names and other<br />

personal information. In the OPM<br />

example, now that fingerprints have<br />

been stolen from government databases<br />

and can never be taken back,<br />

the key question becomes what can<br />

or should be done to render this information<br />

useless to any would-be<br />

impostor? Given the premise that<br />

databases are inherently vulnerable<br />

to attack, the challenge is one<br />

of minimizing negative impacts of a<br />

breach on individuals and organizations.<br />

As always, the answer depends on<br />

the use case, and each category of<br />

applications must be examined individually<br />

and its associated threats<br />

assessed. In this complex and interconnected<br />

digital world, systems<br />

must be thoughtfully designed and<br />

deployed in order to protect user<br />

identities and ensure appropriate<br />

levels of security within the context<br />

of the application.<br />

In the case of biometric data that<br />

is already “in the wild” (such as that<br />

stolen from the OPM), numerous<br />

tactics and best practices should<br />

White Paper: Multispectrum Fingerprint Image Acquisition


e considered in order to render<br />

identities useless to anyone but the<br />

legitimate owner. Of critical importance<br />

is the ability to detect fraudulent<br />

attempts to use biometric data.<br />

Liveness detection — the real-time<br />

determination that the biometric<br />

characteristics presented are genuine<br />

and not fake — is one highlyeffective<br />

design feature in solutions<br />

where users physically interact with<br />

authentication systems.<br />

Augmenting biometric liveness<br />

detection with other security layers<br />

for multi-factor authentication will<br />

greatly enhance our digital security<br />

as well as render the theft of any one<br />

personal data element inconsequential.<br />

There are also a number of concepts<br />

that combine biometric data<br />

and other data elements to create an<br />

even more robust digital credential<br />

that will ensure that stolen biometric<br />

data is insufficient and therefore<br />

useless in enabling the fraudulent<br />

use of legitimate identities.<br />

Following are the key elements<br />

in a strategy that extends beyond<br />

breach defense to include tactics for<br />

neutralizing the effects of an identity<br />

breach after it has happened.<br />

Improving Liveness Detection with<br />

Multispectral Imaging Technology<br />

nates the possibility of counterfeit<br />

fingerprints being used for authentication.<br />

The technology is used<br />

to compare the complex optical<br />

characteristics of the material being<br />

presented against known characteristics<br />

of living skin. This unique capability,<br />

in addition to the collection<br />

of unique fingerprint characteristics<br />

from both the surface and subsurface<br />

of the finger, results in superior<br />

and reliable matching performance<br />

paired with the exceptional ability<br />

Comparison Chart:<br />

Lumisigm Multispectral Technology<br />

to detect whether the finger is alive<br />

or not. Key features include:<br />

• Uses multiple sources and types<br />

of light along with advanced polarization<br />

techniques to capture information<br />

from the surface and subsurface<br />

of the finger — all the way<br />

down to capillary beds and other<br />

sub-dermal structures.<br />

• Built from advanced machine<br />

learning algorithms that can be updated<br />

in the field as new threats and<br />

spoofs are identified, enabling multispectral<br />

imaging sensors to very<br />

quickly respond and adapt to new<br />

5<br />

The most effective liveness detection<br />

approach for fingerprint biometrics<br />

uses multispectral imaging<br />

technology, which virtually elimivulnerabilities.<br />

Multi-Factor and Multi-Modal<br />

Authentication<br />

For strong and reliable user authentication,<br />

organizations should consider,<br />

where practical, multi-factor<br />

and even multi-modal authentication.<br />

Today’s authentication technologies<br />

enable solutions that can<br />

enhance security while replacing<br />

passwords and improving convenience<br />

in a seamless way that is<br />

non-intrusive to the legitimate user.<br />

For example, personal devices<br />

like smart phones, wearables, RFID<br />

cards and other intelligent personal<br />

devices can all generally be used as<br />

factors of authentication. Regardless<br />

of which additional authentication<br />

factor is presented by the user, when<br />

it is intelligently combined with<br />

the biometric data associated with<br />

the identity claim, it is possible to<br />

quickly determine a definitive “yes”<br />

or “no”. Strong authentication by<br />

means of two or more factors (with<br />

one being a biometric) is fundamentally<br />

more secure than outdated<br />

username/password alternatives.<br />

When identity is firmly established,<br />

the use of mobile devices in<br />

authentication solutions offers the<br />

opportunity for greater personalization<br />

and a seamless experience for legitimate<br />

users. Information systems<br />

can be tailored to each user’s need,<br />

More on page 50


Sony Business to market cloud-based Eagle Eye<br />

Security Camera Video Management System (VMS)<br />

throughout Japan<br />

Pan-Tilt-Zoom Camera Control<br />

AUSTIN, Texas. <strong>March</strong> 16, <strong>2016</strong> –<br />

Eagle Eye Networks, Inc., today<br />

announced that Tokyo-based Sony<br />

Business Solutions Corporation<br />

will sell and support the cloudbased<br />

Eagle Eye Security Camera<br />

Video Management System (VMS)<br />

throughout Japan.<br />

Sony Business Solutions Corporation<br />

(“Sony Business Solutions”), a<br />

wholly-owned subsidiary of Sony,<br />

provides technology and business<br />

support service to specialized industries,<br />

such as broadcasting, medical,<br />

large facilities and educational,<br />

financial, government and business<br />

offices.<br />

Sony Business Solutions will offer<br />

the Eagle Eye<br />

Security Camera<br />

VMS for its customers<br />

to store and<br />

stream encrypted<br />

video from the cloud,<br />

provide secure remote<br />

access via smartphones,<br />

and deliver motion and system<br />

alerts. Live and recorded video from<br />

multiple premises can be securely<br />

accessed, expanding the system<br />

scalability.<br />

“We are pleased to work with Eagle<br />

Eye Networks to bring their cloud<br />

video surveillance solution to our<br />

customers,” said Kazuo Miyajima,<br />

President, Sony Business Solutions<br />

No open ports,<br />

Eagle Eye Complete Privacy Encryption.<br />

Corporation. “Eagle Eye Networks<br />

has developed the industry’s most<br />

secure and reliable cloud security<br />

camera system. Further, their open<br />

API allows us to customize superior<br />

solutions for our clients.”<br />

Sony Business Solutions will use<br />

Eagle Eye Networks Complete Privacy<br />

Encryption to satisfy customer<br />

desires for privacy. The cloud<br />

video recording will be stored in a<br />

cloud data center located in Tokyo,<br />

with round-the-clock security monitoring,<br />

along with storage redun-<br />

6


dancy to eliminate risk of video loss.<br />

“We are honored to have Sony<br />

Business Solutions adopt our solution<br />

for their customers, especially<br />

given their state-of-the-art video<br />

and audio technology,” said Dean<br />

Drako, President and CEO, Eagle<br />

Eye Networks. “Sony Business Solutions<br />

is adding further value to<br />

their technology by delivering to its<br />

customers the advanced cloud Eagle<br />

Eye Security Camera VMS, with the<br />

same ease of use and innovation<br />

that fits their strong reputation.”<br />

About Eagle Eye Networks<br />

Eagle Eye Networks delivers the first<br />

on-demand cloud based security<br />

and operations video management<br />

system (VMS) providing both cloud<br />

and on-premise recording. Eagle<br />

Eye also provides a cloud video API<br />

for integrations and application development.<br />

The Eagle Eye Platform<br />

offers secure, encrypted recording,<br />

camera management, mobile viewing<br />

and alerts – all 100% cloud managed.<br />

The Eagle Eye Cloud Security<br />

Camera Video Management System<br />

supports a broad array of IP and<br />

analog cameras while using Intelligent<br />

Bandwidth Management,<br />

making it easy to deploy at single<br />

and multiple sites. The API platform<br />

uses the Eagle Eye Big Data Video<br />

Framework, with time based data<br />

structures used for indexing, search,<br />

retrieval and analysis of the live and<br />

archived video. Eagle Eye Networks<br />

sells through authorized reseller and<br />

installation partners. The headquarters<br />

is at 4611 Bee Caves Rd, suite<br />

200, Austin, Texas, 78746.<br />

For more information please visit<br />

www.eagleeyenetworks.com or call<br />

+1-512-473-0500.<br />

DATA THAT MATTERS<br />

SECURITY THAT DELIVERS<br />

AMERISTARSECURITY.COM | 888-333-3422


Whitewood Encryption Systems announces<br />

awarding of third patent arising from Los Alamos<br />

National Laboratory technology transfer<br />

• The new patent addresses the critical need to share cryptographic keys<br />

over untrusted optical networks and embodies inventions that increase<br />

operating distance and simplify deployment.<br />

• This is the company’s third patent that focuses on the long-range requirement<br />

of establishing security systems that can remain secure even<br />

with the arrival of ultra-high performance quantum computers.<br />

• Whitewood’s IP portfolio and related commercialization efforts illustrate<br />

the effectiveness of a public-private partnership in technology transfer<br />

that can stimulate innovation to the benefit of the broader U.S. economy.<br />

8<br />

BOSTON (February 17, <strong>2016</strong>) –<br />

Whitewood Encryption Systems,<br />

Inc., a provider of crypto-security<br />

solutions, is pleased to announce<br />

that the U.S. Patent and Trademark<br />

Office (USPTO) issued a Notice of<br />

Allowance for a patent application<br />

that addresses important practical<br />

issues that arise when employing<br />

quantum communications techniques<br />

to share cryptographic key<br />

material over fiber optic networks.<br />

The patent application, which is<br />

entitled, “Great Circle Solution to<br />

Polarization-based Quantum Communication<br />

(QC) in Optical Fiber,”<br />

describes an advanced method for<br />

correcting the unwanted polarization<br />

effects that are encountered<br />

in today’s optical fiber networks.<br />

This enables the parties wishing to<br />

perform secure key exchanges to<br />

operate over longer distances and<br />

to be less susceptible to signal degradation.<br />

The use of the quantum<br />

mechanical properties of photons<br />

to share secret keys in a way that is<br />

fundamentally resistant to eavesdropping<br />

or man-in–the-middle attacks<br />

has been widely demonstrated<br />

in the lab, but practical limitations<br />

such as optical distortion have severely<br />

limited the number of commercial<br />

deployments. Future products<br />

that embody this patent would<br />

help to address some of those limitations.<br />

The inventors named on the patent<br />

include Jane Nordholt and Richard<br />

Hughes, who co-founded and<br />

co-led the Quantum Communications<br />

team at Los Alamos National<br />

Laboratory in New Mexico for nearly<br />

two decades before retiring, and<br />

who are now consulting physicists<br />

for Whitewood. Their co-inventors<br />

are Raymond Newell and Charles<br />

Glen Peterson, who are still active<br />

researchers at Los Alamos and continue<br />

to support Whitewood product<br />

development activities.<br />

This patent forms part of a portfolio<br />

of intellectual property exclusively<br />

licensed by Whitewood<br />

to commercialize quantum-based<br />

technologies to address the current<br />

and future needs for secure cryptography.<br />

Last year, the same group<br />

of scientists was awarded a patent<br />

that allowed for the miniaturization<br />

of quantum-based key distribution<br />

technology for use on existing optical<br />

fiber networks and from satellite<br />

to ground. Prior to that, they also<br />

received a patent for a technology<br />

that dramatically increased the scalability<br />

of multi-node networks that<br />

employ quantum-based key management<br />

techniques.<br />

“It is clear that the unique attributes<br />

of quantum mechanics can<br />

have a direct benefit on security


Richard Moulds, Vice<br />

President of Strategy<br />

at Whitewood<br />

systems that use cryptography.<br />

In particular, quantum<br />

mechanics enable<br />

behavior that is perfectly<br />

random and provides<br />

a definitive measure of<br />

tampering – both critical<br />

aspects of any crypto system,”<br />

said Richard Moulds,<br />

Vice President of Strategy<br />

at Whitewood. “As the security<br />

industry considers<br />

the threat of quantum computers<br />

and their impact on today’s encryption<br />

capabilities, we must raise the<br />

security bar. In the medium to long<br />

term, this means adopting quantum-resistant<br />

algorithms<br />

and key management<br />

systems. But we can also<br />

take action in the short<br />

term. Quantum processes<br />

can be used today as a<br />

true and trusted source<br />

of random numbers and<br />

are rapidly being seen as<br />

a standard of due care<br />

when generating cryptographic<br />

keys that are fundamentally<br />

unpredictable.”<br />

Last year, Whitewood launched its<br />

first product that incorporated Los<br />

Alamos technology: a quantumpowered<br />

random number generator<br />

(QRNG) called the Entropy EngineTM.<br />

The product solves the problem<br />

of entropy generation, the critical<br />

base to all cryptographic systems<br />

in use today, from encryption, digital<br />

signing and PKI to crypto-currency<br />

and digital payments.<br />

Entropy is what makes random<br />

numbers random — and cryptographic<br />

keys that are derived from<br />

these random numbers rely on this<br />

unpredictability for their security. In<br />

the absence of a true random number<br />

generator, developers are forced<br />

to rely on deterministic software<br />

systems to simulate random num-<br />

More on page 52<br />

POWER TO PROTECT<br />

SECURING WHAT MATTERS MOST<br />

AMERISTARSECURITY.COM | 888-333-3422


Marrying mobility and location data for<br />

effective disaster response<br />

By Scott Lee<br />

TerraGo Technologies<br />

There was a time when disaster<br />

response was planned<br />

in a room among experts<br />

and authorities that would<br />

focus on improving coordination<br />

with one another<br />

when the next hurricane or earthquake<br />

struck.<br />

Understandably, their plans<br />

relied upon the traditional networks,<br />

telecommunications<br />

and computer systems. But<br />

Hurricanes Katrina and Sandy,<br />

disasters in Haiti and Japan,<br />

wildfires in the Northwest,<br />

winter floods along the Mississippi<br />

and terrorist attacks<br />

in Paris and San Bernardino<br />

have given us numerous examples<br />

of how mobile technology<br />

can improve our<br />

ability to respond and recover<br />

from these types of<br />

events.<br />

Those events also have raised<br />

government and public awareness<br />

of mobile devices as crowdsourcing<br />

tools that have spawned masses<br />

of eyewitnesses eager to share<br />

their observations. In this case,<br />

the smartphone in the<br />

hands of the public provided<br />

faster and better<br />

situational awareness<br />

than traditional systems.<br />

The mobile revolution,<br />

which accelerated<br />

in 2008 when geospatial<br />

chips turned cell phones<br />

into smart phones, has produced<br />

a worldwide cadre of trained data<br />

collectors ready to help at the speed<br />

of thumbs on<br />

phone screens.<br />

But in all too many cases, state and<br />

local relief agencies are unable to<br />

take full advantage of this resource,<br />

or unwilling to rely on public net-<br />

10<br />

works.<br />

The Department of Homeland Security<br />

ranks inability to act without<br />

network connectivity as the chief<br />

issue hindering disaster response,<br />

just ahead of the lack of capability<br />

– or unwillingness – to share data<br />

horizontally and vertically over local<br />

and state stove-piped legacy<br />

systems. The priority remains, even<br />

though the geospatial industry began<br />

working offline in 2005, three<br />

years before the mobile phone added<br />

geospatial capability. Today’s<br />

mobile users cache maps<br />

and forms that enable<br />

them continue collecting<br />

location-based data without<br />

network access, and to<br />

sync seamlessly into a common<br />

operating picture when<br />

connectivity is restored.<br />

Mobile users are constantly<br />

producing geo-tagged location<br />

reports, with supporting<br />

images and video to enhance<br />

the operating picture. These<br />

observations contain real-time<br />

geographic reference points<br />

that allow responders to mobile<br />

resources faster, saving time and<br />

lives.<br />

Enlightened officials are includ-


ing critical infrastructure in those<br />

reference points, in effect enhancing<br />

security with necessary detail about<br />

places where security is most vital.<br />

Even the issue of legacy systems<br />

that plague so many governments<br />

and first responders has been solved<br />

with open standards technology<br />

that cuts across networks, leaving<br />

knocked-down stovepipes in its<br />

wake and allowing a real-time common<br />

operating picture to police<br />

and fire, ambulances and hospitals,<br />

Homeland Security, National Guard<br />

and Red Cross, and to government<br />

officials whose decisions have to be<br />

fluid to cope with the moving target<br />

of disaster.<br />

Lessons learned drive evolving<br />

plans and technology solutions, but<br />

often on parallel paths and usually<br />

not at the same pace. Technology always<br />

moves faster than public adoption.<br />

Today it’s because industry’s<br />

agile development processes move<br />

at the speed of innovation, faster<br />

than first responders can adjust and<br />

adapt to – and pay for – changing<br />

emergency requirements.<br />

Often answers are available before<br />

officials know the questions.<br />

But there is a way to find both<br />

questions and answers.<br />

By conducting an inventory of requirements<br />

necessary to cope with<br />

potentially anticipated emergencies,<br />

such as weather, earthquakes,<br />

chemical spills, industrial fires and<br />

the like; and unanticipated events,<br />

such as issues in schools and public<br />

More on page 54<br />

Gartner Security &<br />

Risk Management<br />

Summit <strong>2016</strong><br />

June 13 – 16 | National Harbor, MD<br />

gartner.com/us/securityrisk<br />

Learn how to address the new threats<br />

and challenges of digital business<br />

Government IT topics to be covered:<br />

• Cybersecurity threats<br />

• Cloud security and the role of FedRAMP<br />

• Secure mobile operations<br />

• The role of analytics in cybersecurity<br />

© <strong>2016</strong> Gartner, Inc. and/or its affiliates. All rights reserved. Gartner is a registered trademark of Gartner, Inc. or its affiliates.<br />

For more information, email info@gartner.com or visit gartner.com.<br />

Save $200 on the standard registration<br />

rate with priority code GART<strong>GSN</strong>


Salient CRGT has been awarded a $9M contract to<br />

provide data analytics services to the DOT Pipeline<br />

and Hazardous Materials Safety Administration<br />

FAIRFAX, VA – <strong>March</strong> 10, <strong>2016</strong> –<br />

Salient CRGT, Inc., a leading provider<br />

of full lifecycle information<br />

technology and data analytics services,<br />

today announced a prime contract<br />

award from the Department<br />

of Transportation (DOT) Pipeline<br />

and Hazardous Materials Safety<br />

Administration (PHMSA). Salient<br />

CRGT will continue to provide data<br />

warehousing support, dashboards,<br />

reports, and applications that integrate<br />

more than 4 million multiagency<br />

records originating from 70<br />

data sources in to a single operating<br />

picture. This five-year effort is valued<br />

at approximately $9 million.<br />

For the past seven years, Salient<br />

CRGT has developed, maintained,<br />

and operated the Multimodal<br />

HazMat Intelligence Portal (HIP)<br />

and Pipeline Data Mart (PDM). An<br />

eGovernment initiative, HIP is an<br />

essential system for the secure sharing<br />

of critical hazardous material<br />

information.<br />

The PHMSA mission is to protect<br />

people and the environment from<br />

the risks of hazardous materials<br />

transportation. To do this, the agency<br />

establishes national policy, sets<br />

and enforces standards, educates,<br />

12<br />

and conducts research to prevent<br />

incidents. The agency also prepares<br />

the public and first responders to<br />

reduce consequences if an incident<br />

does occur.<br />

“Our team is very proud to continue<br />

our relationship with the<br />

PHMSA. The agency’s mission of<br />

protecting our public safety is an<br />

incredible responsibility,” says Brad<br />

Antle, CEO of Salient CRGT. “The<br />

agency is dedicated to continuous<br />

improvement of our citizens’ safety<br />

through collaboration and visibility<br />

of the multiple modes of transportation.<br />

We are committed to supporting<br />

the agency’s efforts through our<br />

data integration, analytics, and visualization.”<br />

This award was through its wholly<br />

owned subsidiary, Guident Inc.<br />

This work was funded in part, under<br />

the Department of Transportation,<br />

Pipeline and Hazardous Materials<br />

Safety Administration. The<br />

views and conclusions contained in<br />

this document are those of the authors<br />

and should not be interpreted<br />

as representing the official policies,<br />

either expressed or implied, of the<br />

Pipeline and Hazardous Materials


Safety Administration, the Department<br />

of Transportation, or the U.S.<br />

Government.<br />

About Salient CRGT<br />

Salient CRGT provides federal civilian,<br />

defense, homeland, and intelligence<br />

agencies with expert depth<br />

in Agile software development,<br />

data analytics, mobility, cyber security<br />

and infrastructure. We support<br />

these core capabilities with full lifecycle<br />

IT services and training—to<br />

help our customers meet critical<br />

goals for pivotal missions. The most<br />

innovative talent delivery model in<br />

the industry, scientifically providing<br />

exactly the right people for the<br />

customers’ most pressing requirements,<br />

fuels these critical capabilities.<br />

Salient CRGT has earned a record<br />

of success with integration and<br />

operations of large‐scale, high‐volume<br />

solutions. On September 15,<br />

2015, Salient and CRGT announced<br />

closing of the merger transactions –<br />

visit newsroom.<br />

For additional information, visit<br />

www.salientcrgt.com<br />

13


Intelsat General and L-3 Communication<br />

Systems-West demonstrate automatic beam<br />

switching for unmanned aerial system on<br />

Intelsat EpicNG<br />

MCLEAN, VA, <strong>March</strong> 7, <strong>2016</strong> –<br />

Intelsat General Corporation, a<br />

wholly owned subsidiary of Intelsat<br />

S.A. (NYSE: I), operator of the<br />

world’s first Globalized Network<br />

powered by its leading satellite<br />

backbone, and L-3 Communication<br />

Systems-West (L-3 CS-West) announced<br />

today the successful<br />

demonstration<br />

of new automatic beam<br />

switching technology<br />

that enables Unmanned<br />

Airborne Systems (UAS)<br />

fitted with L-3 CS-West<br />

satellite communications<br />

packages to operate on<br />

Intelsat’s high-throughput<br />

satellite (HTS) platform,<br />

Intelsat EpicNG.<br />

This software upgrade<br />

was funded and developed through<br />

a partnership between Intelsat General<br />

and L-3 CS-West to ensure that<br />

the existing unmanned aircraft systems<br />

(UAS) platforms can take advantage<br />

of the 3x–4x throughput<br />

improvement that Intelsat EpicNG<br />

enables. This demonstration was<br />

part of Intelsat’s ongoing ecosystem<br />

work validating the compatibility<br />

of existing hardware with Intelsat’s<br />

EpicNG high-throughput satellites.<br />

This over-the-satellite demonstration<br />

was conducted on Intelsat’s<br />

Horizons-1 satellite using three<br />

separate bandwidth segments and a<br />

navigation simulator representing a<br />

UAS flying through three separate<br />

high-throughput spot beams on a<br />

single Intelsat EpicNG-class satellite.<br />

Using an L-3 CS-West hub and terminal<br />

modems for the end-to-end<br />

test, engineers measured the performance<br />

of full-motion video and IP<br />

data between the UAS and the hub<br />

14<br />

controller as the system automatically<br />

switched both frequency and<br />

polarization while the aircraft flew<br />

through the three separate beams.<br />

The new Intelsat EpicNG satellites<br />

are designed to increase UAS<br />

data rate performance by 200 to 300<br />

percent via their high-throughput<br />

spot beams and enable<br />

broadband performance<br />

to antennas with apertures<br />

smaller than 30 cm.<br />

This demonstration validated<br />

that the UAS could<br />

automatically switch<br />

between these beams<br />

without user intervention,<br />

thereby simplifying<br />

operations while fully<br />

leveraging this increased<br />

throughput.<br />

“Through our collaboration with<br />

Intelsat, both airborne and ground<br />

users will be able to upgrade the<br />

software on existing L-3 wideband<br />

modems to provide automatic beam<br />

switching capabilities for service<br />

on high-throughput satellites like<br />

Intelsat’s EpicNG,” said Andy Iv-<br />

More on page 52


FENCE LINE FIRST LINE OUR LINE <br />

Find us at ISC West <strong>2016</strong>!<br />

Booth #20130<br />

✓ Increase Camera Image Quality. Contract #GS-07F-183CA<br />

✓ Simple, Durable, and Inexpensive.<br />

✓ Attaches to existing fence or wall.<br />

✓ Safe Low-Voltage System.<br />

✓ Glare-Free Patented LED Technology.<br />

✓ Visible Light and Infrared (IR) Solutions.<br />

CPWP1<br />

For more information, CALL<br />

973•423•2303 or perimeter@cast-lighting.com<br />

www.cast-lighting.com<br />

CPL1<br />

CPL12X<br />

© <strong>2016</strong>, CAST Lighting LLC., 1120-A Goffle Rd., Hawthorne, NJ 07506 • US Patent 8, 845,124; Intl Patents; Patents Pending.


Terma and Atlas Telecom sign<br />

partnering agreement<br />

ABU DHABI – Danish Aerospace,<br />

Defense, and Security<br />

Group Terma and Atlas Telecom<br />

signed a long term partnering<br />

agreement covering<br />

T.react CIP solutions for wide<br />

area protection of critical infrastructure.<br />

The agreement was signed<br />

by Terma President and CEO<br />

Jens Maaløe and Atlas Telecom<br />

Chairman Ahmed Seddiq<br />

Al Mutawaa at a ceremony<br />

in Abu Dhabi.<br />

As part of the agreement, a<br />

comprehensive demo system<br />

will be set up in the Emirate<br />

of Abu Dhabi where customers can<br />

experience the frontier of wide area<br />

protection technology available in<br />

the world today.<br />

“I am happy and proud to enter<br />

this agreement with Atlas Telecom”,<br />

said Terma President Jens Maaløe.<br />

“Atlas Telecom is a well-known and<br />

highly estimated integrated solutions<br />

supplier. The company has<br />

a long history of delivering high<br />

quality systems and services to the<br />

market. In such a challenging environment,<br />

this really is something<br />

of an achievement. The fact that we<br />

share so many core customer values<br />

makes this a perfect match for both<br />

companies”.<br />

Atlas Telecom Chairman Ahmed<br />

Seddiq Al Mutawaa said: “<br />

“As Atlas Telecom is<br />

a trusted partner<br />

for different entities<br />

in the UAE<br />

and the region, we<br />

are very selective with<br />

our partners. We handpick them in<br />

accordance with the quality expected<br />

from us to serve our Clients in<br />

the UAE, and our partnership with<br />

Terma fits this criteria.<br />

This partnership will add to Atlas<br />

16<br />

Telecom’s portfolio in providing the<br />

latest and most advanced wide area<br />

perimeter protection solution at the<br />

market today. Having seen lengthy<br />

live demonstrations of the T.react<br />

CIP perimeter system, we are<br />

in no doubt that Terma has<br />

developed a best-in-class system<br />

for the global markets.”<br />

About Atlas Telecommunication<br />

Establishment<br />

Atlas Telecom is a comprehensive<br />

regional company that<br />

delivers technology and applications<br />

in turnkey solutions to<br />

businesses and governments.<br />

All of the systems that we design<br />

and build are developed<br />

to provide world-class communications<br />

and security solutions<br />

that are highly secure,<br />

reliable, and robust. We work<br />

with a number of critical and often<br />

highly sensitive national security<br />

and safety organizations that depend<br />

on the very latest technologies.<br />

Atlas Telecom’s<br />

suite of services<br />

include: Critical<br />

Communications,<br />

Mobility,<br />

Surveillance and Physical<br />

Security, Satellite, Tracking,<br />

Data Centers and Fibre Optics, and<br />

Command and Control.<br />

Visit www.atlastelecom.ae


Alaskan community standardizes on Genetec Omnicast <br />

Video Surveillance to secure public facilities, keep citizens<br />

safe and spread benefits to surrounding villages<br />

Located above the Arctic Circle, the<br />

Community of Barrow is the northernmost<br />

city in the United States.<br />

About 1,300 miles (2,100 km) south<br />

of the North Pole on the Chukchi<br />

Sea Coast, the city is home to just<br />

over 4000 people. Barrow is<br />

also the hub for the North<br />

Slope Borough’s seven<br />

arctic coastal villages,<br />

where another 5000<br />

people reside.<br />

Even as a small city,<br />

the community is still<br />

susceptible to random<br />

acts of violence and crime.<br />

In an effort to better secure<br />

its public facilities, the Community<br />

of Barrow decided to upgrade its citywide<br />

surveillance, and standardize on<br />

a more robust IP-based video surveillance<br />

system.<br />

After considering many solutions,<br />

the North Slope Borough selected<br />

Genetec Omnicast IP video surveillance<br />

and eventually enlisted the<br />

expertise of Arctic Fire & Security, a<br />

highly-knowledgeable and certified<br />

Alaskan-based integrator for installation<br />

and maintenance. Omnicast<br />

is part of the Genetec unified security<br />

platform, Security Center, which<br />

offers advanced functionality like an<br />

intuitive mobile client, a map-based<br />

interface and more capabilities.<br />

Police Department Improves<br />

Remote Village Operations<br />

Currently, Omnicast is managing<br />

just over 110 cameras<br />

throughout numerous<br />

public facilities in Barrow,<br />

including the fire<br />

and police departments,<br />

the Children’s<br />

Youth Services (CYS)<br />

facility, Arctic Women<br />

in Crisis (AWIC) facility<br />

and senior citizen<br />

facility. Each organization<br />

monitors and manages its own<br />

Omnicast system, reviewing and<br />

exporting video archives when necessary.<br />

With all the systems up and running,<br />

the North Slope Borough Police<br />

Department (NSBPD) has expanded<br />

its surveillance to nearby village precincts,<br />

improving its remote operations.<br />

The NSBPD installed the Genetec<br />

SV-PRO, a network security<br />

appliance which comes pre-loaded<br />

with Omnicast, at its police precincts<br />

in the villages of Point Hope,<br />

Nuiqsut and Kaktovik, adding 10 to<br />

12 cameras to each facility.<br />

18<br />

While monitoring and video playback<br />

is available at each precinct from<br />

the SV-PRO, the video is also linked<br />

to the main police precinct in the<br />

Community of Barrow, about 300<br />

miles away through the Federation<br />

feature. This enables all police systems<br />

to be monitored as one virtual<br />

system, making it easier for police officers<br />

in Barrow to assist local village<br />

officers who work alone.<br />

Fire Department Watches Over Equipment<br />

and Narcotics<br />

The North Slope Borough Fire Department<br />

(NSBFD) has been able<br />

to leverage the video surveillance<br />

system to safeguard its high-value<br />

equipment and adhere to federallymandated<br />

laws concerning controlled<br />

substances.<br />

According to Shannon Esparza,<br />

Deputy Director, NSBFD, “We<br />

house controlled substances in<br />

our fire station and they have<br />

to be refrigerated, so we<br />

have two cameras set up to<br />

monitor the fridge. Each<br />

paramedic swipes an access<br />

control badge, inputs<br />

their code, and takes an allotted<br />

amount of narcotics for<br />

their mission. They do a count


efore leaving and upon returning, all<br />

in front of the cameras.”<br />

The surveillance system has helped<br />

to deter delinquent behaviour, significantly<br />

reducing property vandalism<br />

and theft. Esparza has used the video<br />

surveillance system to monitor the<br />

response efficiency of her team when<br />

called out to handle a fire. One time,<br />

she noticed a hose dragging on the<br />

back of a truck. “I was able to radio<br />

into them and let them know, avoiding<br />

any damage or loss of equipment,”<br />

she explained.<br />

Omnicast Keeps Barrow Students<br />

Safe Even from Afar<br />

When the community of Barrow<br />

began standardizing on Genetec<br />

Omnicast for all of its public facilities,<br />

the North Slope Borough School<br />

District (NSBSD) soon followed the<br />

Borough’s lead by installing the IP<br />

video surveillance system at its<br />

high school.<br />

According to Sherry<br />

McKenzie, Barrow High<br />

School Principal, NSBSD,<br />

“I don’t always have time<br />

to get to the other side of<br />

property when someone<br />

calls to report an incident.<br />

Omnicast has been a huge<br />

time-saver, because I can just log into<br />

the system and see what happened.”<br />

McKenzie monitors the system<br />

when time allows, but mainly relies<br />

on it for reference when students or<br />

staff report events. Already, the system<br />

has been helpful in identifying a<br />

prankster who tampered with hallway<br />

lighting, and video has also been exported<br />

as evidence in a more serious<br />

assault charge. The Security Center<br />

mobile app has also been very helpful<br />

to Mckenzie, who can log into the<br />

system from anywhere in the school,<br />

or even when travelling, by using her<br />

mobile phone or laptop.<br />

Evolving the Borough-Wide<br />

Platform One Facility and Village<br />

at a Time<br />

The next phase of deployment includes<br />

bringing all police precincts in<br />

the five remaining villages online, and<br />

eventually expanding the system to<br />

encompass more schools and all other<br />

public facilities. Each organization<br />

is also adding more cameras, covering<br />

blind spots that may have been<br />

missed in the initial implementation.<br />

“Our community and villages are<br />

safer and more<br />

vibrant than<br />

ever before,<br />

19<br />

and we have realized numerous costsaving<br />

efficiencies across our public<br />

organizations with the help of Arctic<br />

Fire & Security and Genetec Omnicast.<br />

We look forward to growing<br />

our borough-wide surveillance<br />

system and uncovering even greater<br />

community benefits,” Mayor Charlotte<br />

E. Brower at the North Slope<br />

Borough.<br />

Infrastructure at a Glance<br />

Omnicast is managing over 110<br />

cameras installed in various public facilities<br />

in the Community of Barrow,<br />

where each facility chose its preferred<br />

brand of cameras from vendors Axis<br />

Communications, Bosch and Sony.<br />

All video is stored locally in each facility<br />

with servers ranging from 4TB<br />

to 32TB of storage. More specifically<br />

at the NSBPD headquarters, there<br />

are two servers with 16TB of storage,<br />

which provides 30-day minimum retention.<br />

Two SV-PRO network security<br />

appliances have been installed at<br />

three remote locations and video is<br />

federated back to the central police<br />

headquarters in Barrow.


We’re All in This Together: Strategies for<br />

an engaged public workforce / Part One<br />

By Assistant Fire Chief<br />

John Linstrom (Retired)<br />

It is an unfortunate reality<br />

that we must discuss workplace<br />

security. In an age<br />

where the threat of domestic<br />

and foreign terrorism is<br />

real, and “active shooters”<br />

have become far too commonplace,<br />

the world cannot ignore this facet of<br />

emergency management and business<br />

continuity.<br />

When it comes to workplace security,<br />

a vigilant workforce begins with<br />

senior leadership. They must be the<br />

ones to recognize the need to invest<br />

in security, both with finances and<br />

with time allocated to training. By<br />

implementing security-minded policies<br />

and procedures, and investing<br />

in some essential tools, management<br />

can create a culture of safety and security,<br />

produce a sufficient hardening<br />

of the worksite, and foster a confident<br />

and engaged workforce.<br />

The fact remains that<br />

the higher the security<br />

profile of a company, the<br />

less likely an attacker will<br />

be to consider that site as<br />

a target. When employees<br />

understand that we are all<br />

in this together, security<br />

becomes a mindset, and workplace<br />

safety is amplified. Here are some<br />

simple strategies to move your workplace<br />

toward a culture of security.<br />

Implement Processes<br />

20<br />

Prevention should be the first priority.<br />

Tagged entry or swipe cards for<br />

entry make it difficult for an attacker<br />

to roam freely about a business or<br />

campus. Expanding this to visitors,<br />

by requiring everyone to have escorts<br />

or badges, is another best practice.<br />

Certainly, there have been instances<br />

where authorized individuals have<br />

used their issued badges and credentials<br />

to gain access to engage in a<br />

violent act, but the implementation<br />

of these practices have undoubtedly<br />

deterred non-employees and contractors<br />

from perpetrating a shooting at<br />

more hardened locations.<br />

It is important to have response<br />

processes in place from the mundane<br />

to the serious. If employees can be<br />

confident in the process, they can engage<br />

in it more efficiently.<br />

Encourage Vigilance and Reporting<br />

Organizations that have a collective<br />

awareness of hazards, threats, and<br />

suspicious activities are better able<br />

to identify the elements of concern<br />

quickly. This information is processed<br />

and collated to develop intelligence<br />

that may assist authorities in preventing<br />

an attack. Using technology<br />

to enable shared situational awareness<br />

allows every team member to be<br />

a sensor and all can contribute to a<br />

clear picture of how secure the work<br />

environment is at any given time.<br />

Employees should be advised to<br />

report individuals who have been<br />

spotted taking pictures of security<br />

gates, rear doors, and service areas,<br />

as this may lead to disrupting a “dry<br />

run” or rehearsal by a group planning<br />

violence. Bad actors trying to “piggyback”<br />

on an authorized person using<br />

their swipe card to enter a secure door,<br />

or drive-through gate, may be pursuing<br />

an array of criminal intents. All<br />

members of the organization should<br />

be trained not only to observe, but<br />

also to challenge anyone unescorted,<br />

who is attempting to gain unauthorized<br />

access with no visible visitors<br />

badge. Vigilance is the keyword.<br />

All team members have a shared<br />

responsibility to patrol and observe


NORTH AMERICA’S<br />

MOST TRUSTED LICENSE<br />

PLATE IMAGING, OPTIMIZED<br />

FOR INVESTIGATIVE AND<br />

INTELLIGENCE INITIATIVES.<br />

Perceptics delivers the most accurate and high<br />

performance imaging systems in the industry. Our<br />

technologies produce highly accurate intelligence to<br />

help our customers make optimal decisions. For more<br />

than 35 years we have been the LPR technology of choice<br />

to secure North America’s borders, leveraging that<br />

experience for Highway and City Security initiatives.<br />

Visit Us At Our Next Event<br />

Border Security Expo, Sept. 28-Oct. 1,<br />

Anaheim California: BOOTH 4245<br />

Learn more about Perceptics<br />

online at perceptics.com


the workplace for any suspicious or<br />

unusual attitude among people in the<br />

workplace. Indications of disgruntled<br />

employees, unfamiliar people asking<br />

questions about security, access, workflow,<br />

or occupancy of gathering areas<br />

on the campus should be reported<br />

through a “tip line” or another process<br />

to support a “see something, say something”<br />

program.<br />

Provide Training<br />

Responding to an active shooter in<br />

the workplace is a supremely terrifying<br />

experience. This level of fear and<br />

anxiety can be reduced through multiple<br />

training sessions and “no-notice”<br />

exercises that reinforce the expected<br />

behavior of the team. People are more<br />

likely to reach a high level of trust and<br />

confidence with realistic training and<br />

an on-going reward system.<br />

The first level of training is creating<br />

awareness and providing didactic information<br />

to the attendees. Training<br />

should be factual, and based on reality.<br />

It needs to be more than just a plan or<br />

series of exercises – it needs to foster<br />

and support a strong survival mindset.<br />

The second level of training is to<br />

develop some “muscle memory” by<br />

actually walking through the process<br />

of running, hiding, and fighting. Try<br />

these three scenarios in multiple areas<br />

of the workplace so that these options<br />

are viable in your mind.<br />

The likelihood of being involved in<br />

a workplace shooting is infinitesimally<br />

small. These are low probability, high<br />

consequence incidents. Successfully<br />

interdicting and surviving one of these<br />

improbable events takes training,<br />

practice, and preparedness exercises<br />

conducted with real-world conditions.<br />

Senior leaders, security officers, emergency<br />

managers, and trainers should<br />

be vocal advocates and champions in<br />

making the workplace more resilient.<br />

Active Shooter Protocols<br />

For business leaders, staying informed<br />

of industry best practices for workplace<br />

security is paramount for maintaining<br />

an atmosphere of vigilance as<br />

well as a safe and secure environment<br />

for your employees.<br />

While it is true that your chances of<br />

being killed in an automobile-related<br />

incident are far higher than being<br />

killed at work or in a public place by<br />

a deranged shooter, being prepared is<br />

still the best option. In a world where<br />

these tragedies do sometimes happen,<br />

having a plan and procedure for how<br />

your organization will respond in a<br />

threat scenario is an important contributor<br />

to employee morale and productivity<br />

on a daily basis.<br />

With this in mind, here is a simple<br />

plan for training your workforce to respond<br />

to an active shooter threat.<br />

Alerts and Warning<br />

22<br />

Constructing the alert messages to<br />

go out to everyone on site should be<br />

viewed as an essential part of the preparedness<br />

effort. These messages must<br />

attract immediate attention, and move<br />

people to comply with the directive<br />

being transmitted. The specific verbiage<br />

relating to the source of the alert<br />

and the action words that describe the<br />

immediate options available should be<br />

clearly communicated.<br />

The mode and medium of communications<br />

should be chosen carefully<br />

to include text messages, email, voice<br />

announcements, desktop alerts, and<br />

other push notification apps. It must<br />

be decided if it would be advantageous<br />

to activate strobe lights, fire alarm<br />

enunciators, and speakerphones, or<br />

consider whether silent alerts would<br />

be a better option to allow people to be<br />

quiet and less noticeable when hiding<br />

from to perpetrators.<br />

It might make sense in one building<br />

to make loud noises to distract a<br />

potential attacker while in another<br />

building keep all messages silent after<br />

the initial alert. This has to be evaluated<br />

and worked out for each discrete<br />

environment.<br />

The planning and development of<br />

a series of alerts, warning messages,<br />

and status updates should be done by<br />

architects who possess training and<br />

experience in designing and communicating<br />

critical messages. The choice<br />

of words and subtle nuances must be<br />

carefully crafted to elicit the desired<br />

response from both employees and<br />

visitors, including those who may not<br />

More on page 27


Exciting News from the<br />

News Leader in Physical, IT and Homeland Security<br />

Government Security News announces<br />

two major initiatives<br />

New, Mobile-Friendly Website<br />

<strong>GSN</strong>’s website has shown the highest homeland security<br />

visitor traffic for 2 years, according to Alexa.com. And it<br />

will only grow when visitors discover the fabulous new<br />

introductory rates being offered below for advertisers:<br />

Buy a monthly Wide Skyscraper, Large Rectangle or<br />

Leaderboard and get a same-size additional insertion<br />

at no cost. Offer is valid for all advertisers in the first<br />

six months of <strong>2016</strong>!<br />

Expanded Schedule of <strong>Digital</strong> <strong>Edition</strong>s<br />

As the <strong>Digital</strong> revolution attracts ever more readers and<br />

advertisers, <strong>GSN</strong> is welcoming the new year with an<br />

expanded schedule of <strong>Digital</strong> editions – monthly <strong>Digital</strong><br />

issues each month, supplemented by Print editions at all<br />

major conferences and expos.<br />

Advertisers get lower rates, readers enjoy links to websites,<br />

case studies, white papers, plus video integration,<br />

click to purchase and content delivery around the world!<br />

Gartner Security &<br />

Risk Management<br />

Summit <strong>2016</strong><br />

June 13 – 16 | National Harbor, MD<br />

gartner.com/us/securityrisk<br />

Learn how to address the new threats<br />

and challenges of digital business<br />

Government IT topics to be covered:<br />

• Cybersecurity threats<br />

• Cloud security and the role of FedRAMP<br />

• Secure mobile operations<br />

• The role of analytics in cybersecurity<br />

© <strong>2016</strong> Gartner, Inc. and/or its affiliates. All rights reserved. Gartner is a registered trademark of Gartner, Inc. or its affiliates.<br />

For more information, email info@gartner.com or visit gartner.com.<br />

Save $200 on the standard registration<br />

rate with priority code GART<strong>GSN</strong>


Intelleges’ innovative approach helps government<br />

contractors assess their cybersecurity strengths<br />

By Steve Bittenbender<br />

As the federal government now requires<br />

defense contractors to assess<br />

the security of their information<br />

technology systems, a New York<br />

company has come up with an innovative<br />

way to help those companies<br />

evaluate their systems and identify<br />

opportunities for improvements<br />

and enhancements.<br />

Intelleges is a New York-based<br />

company that provides proprietary<br />

software to corporate leaders and<br />

government agencies that need to<br />

collect data and documentation for<br />

a variety of reasons. through a proprietary<br />

solution that allows its clients<br />

to develop customizable questionnaires<br />

and store the results and<br />

documents gathered in a FedRAMP<br />

certified cloud-based system.<br />

Last fall, the Department of Defense’s<br />

Federal Acquisition Regulation<br />

(FAR) supplement issued new<br />

guidelines requiring contractors<br />

and their subcontractors to safeguard<br />

sensitive defense data that it<br />

stores or handles. As defense contractors<br />

began to evaluate how they<br />

were protecting that critical information,<br />

some began reaching out<br />

to Intelleges to help them. That led<br />

to the development of the compa-<br />

24<br />

John Betancourt<br />

Founder, Intelleges<br />

ny’s Stacked Information<br />

Technology Cybersecurity<br />

Assessment Maturity<br />

Model (SIT-CAMM).<br />

John Betancourt, the<br />

company’s founder, said<br />

the company has been doing<br />

this work for its existing<br />

clients for more than<br />

15 years, but now with the<br />

government’s new regulation<br />

regarding cybersecurity,<br />

it’s essential that all government<br />

contractors – as well as other<br />

organizations that handle sensitive<br />

personal data such as an individual’s<br />

credit cards or personal health records<br />

– get an assessment as quickly<br />

as possible.<br />

As part of the Intelleges’ assessment<br />

system, the company created<br />

a matrix to determine a company’s<br />

strengths when it comes to IT security.<br />

The system, which is based<br />

on the Capability Maturity Model<br />

Integration scale, evaluates companies<br />

across 15 areas related to information<br />

technology. SIT-CAMM<br />

uses NIST and ISO 2700 standards<br />

in developing the questions for the<br />

assessment. Those questions are tailored<br />

specifically for each company.<br />

Among the items SIT-CAMM assesses<br />

includes: a company’s IT usage,<br />

its business process<br />

management, its regulatory<br />

compliance and its<br />

training program.<br />

“Using our proprietary<br />

software, we can create<br />

and distribute a series of<br />

electronic questionnaires<br />

designed to determine<br />

software, hardware and<br />

network usage, compliance,<br />

mission alignment,<br />

satisfaction levels, usability, and<br />

cybersecurity compliance,” Betancourt<br />

said. “These questionnaires<br />

will provide insight into possible<br />

strengths, weaknesses, opportunities<br />

and threats (SWOT) that the IT<br />

department will need to address.”<br />

Companies then receive a rating<br />

based on where their assessed areas<br />

stand. Companies that are just beginning<br />

to identify their needs may<br />

be assessed at a Level 1, while those<br />

who have fully optimized their departments<br />

may receive a Level 5 rating.<br />

As part of its assessment, Intelleges<br />

will work with companies and identify<br />

ways to improve their scores in<br />

certain areas. That includes developing<br />

recommendations based on<br />

industry best practices. Those recommendations<br />

will help companies


establish their own procedures, and<br />

then they can set realistic benchmarks<br />

to evaluate their performance<br />

against those standards.<br />

Intelleges delivers the recommendations<br />

to the organization’s CIO<br />

in a report similar to an audit. The<br />

recommendations are prioritized to<br />

highlight the most critical findings<br />

that put the company in serious risk.<br />

In addition, Intelleges can bring in a<br />

partner company that provides intrusion<br />

detection consulting to give<br />

IT leaders and other decision makers<br />

greater peace of mind regarding<br />

their systems.<br />

“These reports are specifically intended<br />

for managers responsible for<br />

the day-to-day decision making and<br />

long-term strategic planning,” Betancourt<br />

said. “It also designed to<br />

be used by corporate leaders as they<br />

seek to improve their knowledge<br />

and understanding of their internal<br />

IT departments.”<br />

Betancourt offers more than 20<br />

years of high-level professional IT<br />

and software development experience.<br />

He started by developing an<br />

interest rate forecasting tool for the<br />

U.S Bureau of Labor Statistics. He’s<br />

also worked as the chief software<br />

architect for the Federal Reserve’s<br />

New York office. He worked there<br />

until he started Intelleges 16 years<br />

ago.<br />

It’s not just companies working<br />

with the federal government that<br />

need to consider requesting a SIT-<br />

CAMM for their organization. Betancourt<br />

said any company that<br />

handles sensitive data needs to find<br />

a way to safeguard themselves from<br />

potential attacks and the lawsuits<br />

and hefty civil fines that can come<br />

about because of them.<br />

For more information on how Intelleges<br />

can help your company better<br />

understand its IT security needs, go<br />

to Intelleges.com.<br />

25


Chris Connors: Awareness of gunshot detections<br />

systems rising as Shooter Detection Systems<br />

continues to grow<br />

By Steve Bittenbender<br />

Guardian Gateway uses color coded alerts to track shooter movement.<br />

Shooter Detection Systems was created<br />

with one goal in mind – to produce<br />

the world’s most accurate system<br />

to detect gunshots inside buildings.<br />

The Massachusetts-based company<br />

sells its Guardian Indoor Active<br />

Shooter Detection System, which<br />

uses both sound and infrared sensor<br />

data to confirm an active shooting<br />

event has occurred. Across the<br />

country, school districts, shopping<br />

malls and other public facilities have<br />

signed on to use the innovative system,<br />

which also can send alerts to<br />

building occupants, facility management,<br />

law enforcement and/or other<br />

key stakeholders who need to know<br />

what’s happening.<br />

“Sensor-based gunshot detection<br />

can play an important role as part of<br />

an active shooter preparedness program<br />

alongside more traditional security<br />

technology like access control,<br />

video surveillance and mass notification<br />

systems,” said Matthew Frowert,<br />

the director of marketing, financial<br />

services and government for Tyco<br />

Federal Systems, an SDS partner. “Integrating<br />

these technologies into a<br />

single system can provide security operators<br />

a powerful, centralized command<br />

center view to strengthen situational<br />

awareness.”<br />

Recently, Chris Connors, chief executive<br />

officer for SDS, spoke with<br />

<strong>GSN</strong> to discuss the latest happenings<br />

in the industry and with his company.<br />

Here are excerpts from that conversation.<br />

Q: <strong>GSN</strong> ran an interview last year<br />

about SDS’s capabilities, what has<br />

changed in the marketplace over the<br />

last 12 months?<br />

Chris Connors: I think the awareness<br />

that our capabilities exist and how we<br />

stand out against others attempting<br />

to compete in the marketplace has<br />

improved. This awareness isn’t everywhere,<br />

but it’s growing quite a bit with<br />

media and the events that have been<br />

26<br />

happening with active shooters. We’ve<br />

been very successful in winning jobs<br />

with federal and state governments.<br />

We’ve also been successful in the<br />

commercial space, including major<br />

corporations and public venues such<br />

as convention centers, airports and<br />

court systems. So, I think that people<br />

are, now that they know it exists, are<br />

getting more comfortable with what it<br />

can do in an active shooter event.<br />

Q: Has the system been used by a<br />

State or Federal Government customer?<br />

CC: We are not permitted to give specifics<br />

on them yet, but we have several<br />

contracts in place with state and<br />

government customers. It’s a market


that we’re looking to grow, especially<br />

in the court systems.<br />

Q: How has the system been received<br />

by law enforcement and local police?<br />

CC: In the beginning, they were a<br />

little hesitant because they were worried<br />

about false alerts and about how<br />

some other companies approached<br />

this capability. Seven major city police<br />

commissioners in the last few<br />

months have asked me to explain the<br />

capabilities to them. They know better<br />

than anyone else that an active<br />

shooter event requires immediate<br />

information, such as a shooter’s location.<br />

False alerts are unacceptable to<br />

our customers and law enforcement<br />

is starting to understand that our system<br />

does not false alert. They’ve been<br />

extremely receptive once they understand<br />

what we can provide.<br />

Q: Does the system require SDS personnel<br />

to monitor the sensor?<br />

CC: No. Once we do an installation,<br />

the system is fully integrated and automated,<br />

and the customer controls<br />

where the information goes and how<br />

it’s distributed. That’s one of the features<br />

that I think has been well received.<br />

They can manage it on their<br />

own and without any IT or network<br />

security issues because everything is<br />

behind their firewall.<br />

Q: In all of your installations, has<br />

the system ever reported on an active<br />

shooter?<br />

CC: Fortunately, there has not been an<br />

active shooter event, yet, in locations<br />

where the system is deployed. We’ve<br />

done around 30,000 rounds of testing<br />

at customer locations, ranges, schools<br />

and courthouses. It has picked up every<br />

shot. It’s somewhat of an unusual<br />

business to spend a lot of time and<br />

money on a product you hope never<br />

gets used, but government and private<br />

industry customers look at the<br />

active shooter as a “when”, not “if ”<br />

possibility.<br />

Q: Has the system false alerted at any<br />

customer locations?<br />

CC: Our systems have had approximately<br />

12 million hours of operational<br />

time and never once has the system<br />

falsely alerted. I think that builds a<br />

lot of credibility with our customers<br />

when we can refer them to other customers<br />

who can testify to that.<br />

Q: What’s the future hold in store for<br />

the technology overall and for the<br />

company?<br />

CC: It appears there is wider acceptance<br />

of gunshot detection capabilities<br />

in today’s world. We have designed<br />

and shipped detection systems<br />

for over a decade. We have about a<br />

$60 million investment into all the<br />

research and development and about<br />

$500 million worth of systems that<br />

have been fielded. So, our job is to<br />

stay technically ahead and always<br />

look for ways to improve not just the<br />

sensor itself but the cost to own and<br />

install the system. We’re coming out<br />

with some new products in the next<br />

year that will address that.<br />

27<br />

We’re All in This Together:<br />

Strategies for an engaged public<br />

workforce / Part One<br />

Continued from page 22<br />

have adequate training.<br />

In the upcoming part two of this<br />

article, we will discuss how to build<br />

a foundation for more effective preparedness<br />

and practice drills, active<br />

shooter defensive strategies, law enforcement<br />

response, psychological<br />

first aid, stress management, and a<br />

brief list of best practices for navigating<br />

the aftermath of tragic incidents.<br />

Retired Assistant Fire Chief John Linstrom<br />

resides in San Bernardino County,<br />

CA, and serves as Business Development<br />

Manager at the AtHoc Division of<br />

BlackBerry, for Public Safety and Aviation.<br />

He has thirty years’ experience in<br />

municipal, special district, state, military,<br />

and federal government agencies<br />

as an emergency manager, fire chief,<br />

and mass fatality team commander.<br />

John wrote the Part 139/107 Emergency<br />

Plan for Southern California Logistics<br />

Airport, and served on the Mayor’s<br />

Blue Ribbon Panel for Homeland Security<br />

and Emergency Management in<br />

Los Angeles. He has also contributed to<br />

the Federal Interoperable Mass Fatality<br />

Concept of Operations Plan, and the<br />

National Transportation Safety Board<br />

(NTSB) Interagency Agreement (IAA)<br />

and Memorandum of Understanding<br />

(MOU) with the U.S. Department of<br />

Health and Human Services.


ACTIVE SHOOTER DETECTION AND REPORTING SYSTEM:<br />

ENHANCE YOUR ACTIVE SHOOTER RESPONSE PROTOCOLS<br />

www.shooterdetectionsystems.com<br />

1-844-SHOT911<br />

www.shooterdetection<br />

Featured on the TODAY Show<br />

The Guardian Indoor Active Shooter<br />

Detection System<br />

The Guardian is the worlds most trusted and<br />

installed Active Shooter Detection and<br />

Reporting System on the market. Fortune<br />

500 corporations, court systems, convention centers, universities, government<br />

buildings, banks and K-12 public, private, and vocational schools have all chosen<br />

to protect their staff, visitors and students with Shooter Detection Systems’<br />

revolutionary sensors.<br />

Visit us at ISC West Booth 2059<br />

Whitepaper: The Use of Technology to Improve Active Shooter Response


THIS IS<br />

NOT JUST<br />

A BOX!<br />

systems.com<br />

This “box” is part of a solution— an X-ray imaging solution. Designed for mobility, the portable Varian<br />

Linatron® Xp brings practical, high-energy imaging capability to security and NDT field applications.<br />

This “box” has the ability to image the finest detail. The mobile system includes an X-ray head<br />

(33”x20”x16”), a modulator (32”x20”x16”) and an optional control pendant. The Xp can also be used<br />

as an alternative to gamma.<br />

To learn more, visit our website at varian.com/sip<br />

© <strong>2016</strong> Varian Medical Systems, Inc. Varian, Varian Medical Systems and Linatron are registered trademarks. All rights reserved.


Hazmat Science and Public Policy with George Lane<br />

Electromagnetic Pulse (EMP):<br />

Technology’s Worst Nightmare<br />

By George Lane<br />

“The supreme art of war is to subdue<br />

your enemy without fighting”<br />

(Sun Tzu 544 - 496 BC)<br />

An electromagnetic pulse (EMP) is<br />

a super-energetic radio wave, an intense<br />

burst of electromagnetic energy<br />

caused by an abrupt and rapid acceleration<br />

of charged particles that can destroy<br />

or damage electronic systems by<br />

overloading their circuits. EMPs are<br />

harmless to people, but catastrophic<br />

to critical infrastructure, such as<br />

electric power, telecommunications,<br />

transportation, and<br />

banking, that sustain<br />

modern civilization.<br />

Nature generates<br />

EMPs as solar flares<br />

from the Sun, causing<br />

great geomagnetic<br />

storms on Earth with catastrophic<br />

consequences. These natural events<br />

occur every 150 years, with the last<br />

recorded major storm 155 years ago.<br />

A single nuclear weapon detonated<br />

at high-altitude generates an EMP<br />

that could cause catastrophic damage<br />

across the entire contiguous U.S. Because<br />

of U.S. unpreparedness for an<br />

EMP event, it is estimated that within<br />

12 months of a major EMP event,<br />

from two-thirds to ninety percent of<br />

the U.S. population could perish.<br />

The national security threat<br />

The nuclear EMP threat is not merely<br />

theoretical. As Tom Clancy wrote, “it<br />

is real, a clear and present danger”.<br />

An EMP attack is the perfect asymmetric<br />

weapon for state actors who<br />

wish to level the battlefield by neutralizing<br />

the technological advantage<br />

of U.S. military forces. EMPs provide<br />

rogue states or terrorists with a<br />

nuclear weapon to cripple the U.S.<br />

Russia, China, North Korea, and Iran<br />

have already incorporated EMP attacks<br />

into their military arsenals...<br />

with a single blow. Russia, China,<br />

North Korea, and Iran have already<br />

incorporated EMP attacks into their<br />

military arsenals, and openly describe<br />

making EMP attacks against the U.S.<br />

Rogue states and terrorists could use<br />

short-range missiles that can deliver<br />

a nuclear warhead to exact a catastrophic<br />

EMP attack on the U.S. Iran<br />

has practiced ship-launched EMP<br />

attacks using Scud missiles, used by<br />

30<br />

scores of nations and even some terrorist<br />

groups.<br />

For the past decade, the “Commission<br />

to Assess the Threat to the United<br />

States from Electromagnetic Pulse<br />

Attack”, chaired by Dr. William Graham,<br />

has investigated the EMP threat<br />

to the U.S. and how it can be reduced.<br />

The Graham commission’s bottom<br />

line is that an EMP attack can end<br />

the functioning of the U.S. electrical<br />

infrastructure and much of the hardware<br />

that supports everyday life (William<br />

R. Graham et al., “Report of the<br />

Commission to Assess<br />

the Threat to the United<br />

States from Electromagnetic<br />

Pulse (EMP) Attack:<br />

Critical National<br />

Infrastructures,” April<br />

2008; www.empcommission.org/docs/A2473-EMP_Commission-7MB.pdf<br />

).<br />

North Korea could obtain<br />

EMP weapons from Russia<br />

South Korea’s National Intelligence<br />

Service (NIS) reports that North Korea<br />

is developing an EMP weapon.<br />

A modest North Korean EMP could<br />

damage electronic equipment south<br />

of the Korean DMZ. At higher yield,


an EMP device could disable electronic<br />

devices for hundreds of miles.<br />

The EMP weapon would be part of<br />

North Korea’s larger cyber-warfare<br />

efforts, which have so far been mainly<br />

focused on gathering intelligence by<br />

hacking South Korean computer networks<br />

and devices.<br />

According to NIS, North Korea<br />

has purchased EMP technology from<br />

Russia and is now developing its own<br />

version. EMPs are the ultimate weapon<br />

against anything electronic, from<br />

telephone wires to the power grid to<br />

the computer chips that control cars,<br />

planes, and smartphones.<br />

Nuclear bombs like those dropped<br />

on Hiroshima and Nagasaki create<br />

a huge amount of gamma radiation<br />

when they explosively fission atoms.<br />

This gamma radiation ionizes and<br />

strips electrons away from atoms in<br />

the atmosphere, creating a huge mass<br />

of free electrons. These electrons are<br />

then deflected by the Earth’s magnetic<br />

field, creating a huge EMP. In<br />

1962, the U.S. tested a 1.44-megaton<br />

nuclear weapon, “Starfish Prime”,<br />

above the Pacific Ocean, creating an<br />

EMP that caused electrical damage<br />

900 miles away in Hawaii. Kilotonyield<br />

nukes would still be very effective<br />

as well (David Portree, “Starfish<br />

and Apollo“, Science, <strong>March</strong> 21, 2012;<br />

www.wired.com/2012/03/starfishandapollo-1962/).<br />

To maximize the size<br />

of the EMP it’s actually better for the<br />

nuclear weapon to be fission, rather<br />

than thermonuclear fusion devices. If<br />

a big EMP was detonated above the<br />

U.S., the burst would probably disable<br />

most of the electronics within 1,000<br />

miles.<br />

The Soviet Union also performed<br />

some successful EMP tests in the<br />

early 1960s, disabling hundreds of<br />

miles of telephone wire and burning<br />

down a power plant. In 1962, the<br />

Soviet Union performed three EMPproducing<br />

nuclear tests in space over<br />

Kazakhstan (Jerry Emanuelson, “Soviet<br />

Test 184”, Futurescience; www.<br />

futurescience.com/emp/test184.<br />

html). Although these weapons were<br />

much smaller (300 kiloton) than the<br />

“Starfish Prime” test, they were over<br />

a populated, large land mass and at a<br />

location where the Earth’s magnetic<br />

field was greater. The damage caused<br />

by the resulting EMP was reportedly<br />

much greater than in “Starfish Prime”.<br />

After the collapse of the Soviet Union,<br />

the level of this damage was communicated<br />

informally to U.S. scientists.<br />

Effects of Hurricane Katrina<br />

on New Orleans are an example of<br />

the effects of an EMP<br />

On August 29, 2005, Hurricane Katrina<br />

struck the city of New Orleans,<br />

providing the best model for studying<br />

the effects of an EMP attack, since the<br />

hurricane and subsequent flooding<br />

disabled the city’s power and transportation<br />

infrastructure. Similar to<br />

an EMP attack, a large proportion of<br />

the population was not able to leave<br />

the disaster zone where power and<br />

transportation critical infrastructures<br />

had been disabled. When New<br />

31<br />

Orleans’s levees failed, the area lost<br />

power and chaos broke out. Federal<br />

as well as local disaster response did<br />

not anticipate the near-immediate<br />

and complete breakdown of the social<br />

order. Fuel could not be delivered,<br />

shutting down emergency generators<br />

for cell phone towers, shutting down<br />

communications. Electrical failure<br />

resulted in widespread looting and<br />

the spoilage of food supplies throughout<br />

the city. Disabling of both power<br />

and transportation created a catastrophe<br />

of unprecedented proportion and<br />

threatened to destroy one of America’s<br />

major cities. Federal, state, and local<br />

governments failed to adequately<br />

respond to Katrina during the first<br />

week of disaster. With a major EMP<br />

attack, the entire country’s disasterresponse<br />

capacity may collapse.<br />

George Lane has 25 years of experience<br />

in the development of chemical<br />

security systems, conducting research<br />

as a NASA Fellow at the Stennis Space<br />

Center and as a NSF Fellow. Lane was<br />

air quality SME for the University of<br />

California at Berkeley Center for Catastrophic<br />

Risk Management during the<br />

BP Oil Spill. Lane is currently chemical<br />

security SME for the Naval Postgraduate<br />

School Maritime Interdiction<br />

Operations in the Center for Network<br />

Innovation and Experimentation.


CBRNE Detection<br />

American Science and Engineering debuts advanced<br />

security screening systems at ABU DHABI event<br />

ABU DHABI, U.A.E. , <strong>March</strong><br />

15, <strong>2016</strong> – American Science<br />

and Engineering, Inc. (“AS&E”)<br />

(Nasdaq:ASEI), a leading worldwide<br />

supplier of innovative X-ray<br />

detection solutions, today introduced<br />

three innovative scanning<br />

systems to the Middle East which<br />

are ideally suited for helping authorities<br />

combat terrorism and other<br />

security threats. New products<br />

include the next generation Z Portal®<br />

system that combines multiple<br />

detection technologies for up to six<br />

views of cargo and vehicles; the Car-<br />

View portal, a high-throughput,<br />

relocatable, multi-technology scan-<br />

Z Portal for Trucks and Cargo<br />

ning system for threats concealed<br />

in cars and small vehicles; and the<br />

Tx-View dual-energy transmission<br />

option for the top-selling line<br />

of ZBV® mobile cargo and vehicle<br />

screening systems.<br />

During ISNR <strong>2016</strong> (<strong>March</strong> 15—<br />

17), AS&E will feature the next generation<br />

Z Portal system, CarView<br />

portal, Tx-View option for ZBV, and<br />

MINI Z® handheld imaging system<br />

in our channel partner Al Hamra’s<br />

stand #4230.<br />

“Security agencies in the Middle<br />

East have experienced first-hand<br />

how our systems help reduce the<br />

level of vulnerability to explosive<br />

threats and contraband,”<br />

said Chuck<br />

Dougherty, President<br />

and CEO of AS&E.<br />

“We are confident<br />

they will find that our<br />

new offerings address<br />

high-priority security<br />

objectives and<br />

trengthen their ability<br />

to protect residents,<br />

visitors, and critical<br />

infrastructure against<br />

terrorist threats.”<br />

For a list of recent seizures with<br />

AS&E’s range of detection solutions,<br />

click here.<br />

The Next Generation Z Portal:<br />

Multi-view, multi-technology cargo<br />

and vehicle screening system<br />

The next generation Z Portal system<br />

is the only drive-through cargo and<br />

vehicle inspection system that uses<br />

multiple detection technologies to<br />

provide up to six views—including<br />

dual-energy transmission, Z Backscatter®,<br />

and Forwardscatter® images—of<br />

scanned passenger vehicles,<br />

trucks, buses, and cargo. The new Z<br />

Portal system incorporates AS&E’s<br />

latest source and detector innovations<br />

in a more compact design,<br />

enabling improved image quality<br />

at higher throughput in space-constrained<br />

locations such as checkpoints<br />

at high-threat facilities. View<br />

the video.<br />

CarView Portal: Cost-effective,<br />

high-throughput, superior inspection<br />

of small vehicles<br />

The CarView portal screens occupied<br />

cars and small vehicles to<br />

help secure special events, parking<br />

32


garages, and high-threat locations.<br />

The system uses innovative Wave<br />

Shifting Fibers (WSF) detector technology<br />

to simultaneously produce<br />

two top-down images: a high-quality<br />

dual-energy transmission image<br />

and a Z Backscatter image of the<br />

scanned vehicle. The dual-energy<br />

transmission image offers material<br />

discrimination technology to detect<br />

metallic and organic threats and<br />

contraband, while the photo-like Z<br />

Backscatter image offers enhanced<br />

detection of organic threats such as<br />

explosives, drugs, and stowaways.<br />

This cost-effective, versatile system<br />

is easily relocatable and its compact<br />

footprint meets the physical<br />

requirements of standard tollbooth<br />

lanes. View the video.<br />

ZBV with Tx-View:<br />

Dual-energy transmission option<br />

for the ZBV system<br />

Tx-View is a dual-energy transmission<br />

option for AS&E’s industryleading<br />

line of ZBV mobile cargo<br />

and vehicle screening systems. This<br />

ZBV with Tx-View option allows<br />

security personnel to simultaneously<br />

acquire dual-energy transmission<br />

images for detection of metallic<br />

threats such as weapons and artillery<br />

shells, and Z Backscatter images<br />

for superior detection of organic<br />

More on page 36<br />

PINPOINT THREAT<br />

with the world’s most trusted metal detectors.<br />

Performance. Protection. Dependability. Since 1964.<br />

®<br />

garrett.com<br />

Toll Free: 800.234.6151 (U.S. & Canada)<br />

garrett_march_<strong>2016</strong>.indd 1<br />

33<br />

2/19/<strong>2016</strong> 3:56:22 PM


CBRNE Detection<br />

Rapiscan MP100 Backpack radiation<br />

detection system allows detection of<br />

radioactive materials<br />

FEBRUARY 10, <strong>2016</strong>, Rapiscan<br />

Systems, a leading global supplier<br />

of security inspection systems, today<br />

announced the expansion of its<br />

radiation detection product line to<br />

include the Rapiscan MP100 Backpack<br />

radiation detection system.<br />

The MP100 is a lightweight, high<br />

performance solution<br />

that can<br />

detect radiological<br />

and nuclear<br />

materials and is<br />

housed within a<br />

compact commercial<br />

backpack,<br />

making it ideal for covert radiation<br />

inspection.<br />

President Obama has cited the<br />

danger of a terrorist acquiring nuclear<br />

weapons as “the most immediate<br />

and extreme threat to global<br />

security,” and U.S. Customs and<br />

Border Protection has indicated<br />

that “nuclear and radiological materials<br />

are of particular concern<br />

because of their potential to harm<br />

large numbers of people and disrupt<br />

the U.S. economy.” In fact, over the<br />

last two decades more than 2,500<br />

incidents of trafficking radioactive<br />

material have been reported to the<br />

International Atomic Energy Agency<br />

(IAEA) by member states.<br />

The MP100 Backpack radiation<br />

detection system is designed for<br />

ease of operation and makes radiation<br />

detection as easy as simply<br />

walking around.<br />

It includes a long<br />

battery life that<br />

supports extended<br />

deployment,<br />

as well as the following<br />

additional<br />

features:<br />

· Gamma and optional neutron<br />

radiation detection. The MP100’s<br />

PVT gamma radiation detectors<br />

detect gamma radiation emitted<br />

by medical and industrial isotopes,<br />

which can be used in a dirty bomb.<br />

They also detect Special Nuclear<br />

Materials, such as uranium and<br />

plutonium, which are needed for<br />

a nuclear weapon. The addition of<br />

optional Boron-10 neutron radiation<br />

detectors enables the MP100<br />

to detect Special Nuclear Materials<br />

that are shielded, such as in a dense<br />

35<br />

metal container.<br />

· Meets U.S. and international<br />

standards. The radiation detection<br />

performance of the MP100 meets<br />

the requirements of U.S. and international<br />

standards for backpack radiation<br />

monitors. The U.S. standard,<br />

ANSI N42.53, and its international<br />

equivalent, IEC 62694, address<br />

homeland security concerns and illicit<br />

trafficking inspection applications.<br />

· Integrates with Android mobile<br />

devices. The MP100 can be operated<br />

as a standalone radiation monitor<br />

with alarms signaled audibly in the<br />

operator’s earpiece. Alternatively,<br />

the MP100 can connect wirelessly<br />

to a mobile Android device, such as<br />

a smartphone or tablet, running the<br />

free Rapiscan RadViewer app. With<br />

its intuitive graphical user interface,<br />

Rapiscan’s RadViewer presents a<br />

wealth of information about radiation<br />

measurements and alarms and<br />

helps direct the operator to a radiation<br />

source.<br />

“Today’s terrorists don’t need<br />

special nuclear materials, such as<br />

uranium and plutonium, to create<br />

chaos. A small quantity of radioactive<br />

material that is routinely and<br />

safely employed in medical and industrial<br />

applications can cause significant<br />

radiation contamination<br />

to a wide area when part of a dirty<br />

bomb,” said Pak Chin, president


CBRNE Detection<br />

of Rapiscan Systems. “The MP100<br />

applies Rapiscan design principles<br />

and technology to a practical, high<br />

performing, portable radiation detection<br />

solution that is suitable for<br />

a variety of use cases. It’s one of the<br />

lightest and easiest to use systems<br />

available today.”<br />

The MP100 was designed for<br />

many different applications. Operators<br />

can use the solution to inspect<br />

areas where crowds have gathered<br />

for an event, such as stadiums or<br />

arenas; to detect radioactive material<br />

at mass transit stations and vehicle<br />

checkpoints; and to protect<br />

critical infrastructure and measure<br />

radiation around a facility, such as a<br />

nuclear power plant.<br />

About Rapiscan Systems<br />

Rapiscan Systems, a division of OSI<br />

Systems, Inc., is a leading global<br />

supplier of security inspection solutions<br />

utilizing advanced threat identification<br />

techniques. The company’s<br />

products are sold into the following<br />

market segments: Baggage and Parcel<br />

Inspection; Cargo and Vehicle<br />

Inspection; Hold (checked) Baggage<br />

Screening; People Screening; Explosive<br />

and Narcotics Trace Detection;<br />

and Radiation Detection. Rapiscan<br />

Systems product lines are supported<br />

by a global service network. As<br />

the world’s leading security screening<br />

provider, Rapiscan Systems<br />

AS&E debuts advanced security<br />

screening systems<br />

Continued from page 29<br />

threats and contraband. Deployed<br />

quickly and easily, the Tx-View option<br />

is completely self-contained in<br />

a trailer for storage and transport,<br />

providing customs and security officials<br />

with the lowest cost, most<br />

versatile, multi-technology, mobile<br />

cargo and vehicle screening system<br />

available today.<br />

MINI Z: Handheld Z Backscatter<br />

imaging system<br />

The MINI Z system enables law enforcement,<br />

public safety, and other<br />

security professionals to scan in<br />

places other systems can’t reach and<br />

determine “on-the-go” if drugs, explosives,<br />

or other threats are present<br />

provides state-of-the-art products,<br />

solutions and services to meet our<br />

customers’ most demanding threat<br />

detection needs. For more information,<br />

visit www.rapiscansystems.com<br />

36<br />

in difficult-to-reach locations such<br />

as car interiors and aircraft compartments.<br />

The MINI Z system was<br />

also named winner of the R&D 100<br />

Award for Top Innovation, an ASIS<br />

Accolades Award winner and Best<br />

of What’s New Award for 2014 in<br />

Popular Science Magazine. Experience<br />

the MINI Z system at http://<br />

www.meetminiz.com/.<br />

About AS&E<br />

American Science and Engineering,<br />

Inc. (AS&E) is the trusted global<br />

provider of threat and contraband<br />

detection solutions for ports, borders,<br />

military, critical infrastructure,<br />

law enforcement, and aviation.<br />

With over 50 years of experience,<br />

AS&E offers proven, advanced X-<br />

ray inspection systems to combat<br />

terrorism, drug smuggling, illegal<br />

immigration, and trade fraud. AS&E<br />

systems are designed in a variety of<br />

configurations for cargo and vehicle<br />

inspection, parcel inspection,<br />

and personnel screening. Using a<br />

combination of technologies, these<br />

systems provide superior detection<br />

capabilities, with high-energy, dualenergy,<br />

and Z Backscatter X-rays<br />

— pioneered by AS&E. Learn more<br />

about AS&E products and technologies<br />

at www.as-e.com and follow us<br />

on Twitter @ase_detects.


Rapiscan Systems Launches DETECTRA HX Hand-Held<br />

Explosive Trace Detection System<br />

signed to minimize operating costs<br />

and increase uptime, the DETECTRA<br />

HX requires only two consumables<br />

and does not require many of the<br />

maintenance steps that are typically<br />

associated with explosive trace detection<br />

systems.<br />

“The RAPISCAN DETECTRA HX<br />

was completely designed with the<br />

end-user in mind,” said Brad Buswell,<br />

President, Rapiscan Systems North<br />

America. “Not only does the solution<br />

detect threats with tremendous accuracy,<br />

it also features an intuitive user<br />

interface with just three-buttons and<br />

detects threats in seconds. Operator<br />

training can take as little as an hour,<br />

which means that the DETECTRA<br />

HX is easy to deploy.”<br />

The system uses a unique, ionization<br />

source that carries U.S. Nuclear<br />

Regulatory Commission (NRC) Exempt<br />

Distribution status. As such<br />

there are no end-user radiation licensing<br />

requirements for use within<br />

37<br />

Rapiscan Systems, Inc., a leading<br />

global supplier of security inspection<br />

systems, has announced the launching<br />

of its RAPISCAN DETECTRA<br />

HX, a lightweight and low-cost handheld,<br />

explosive trace detection solution.<br />

Featuring rapid<br />

and accurate detection<br />

capabilities, DETEC-<br />

TRA HX is designed<br />

with high throughput<br />

and high detection capabilities<br />

that are essential<br />

for law enforcement,<br />

event and border<br />

protection professionals,<br />

among others.<br />

The RAPISCAN DETECTRA HX<br />

is an easy-to-operate handheld device<br />

capable of detecting trace explosives<br />

in both particulate and vapor form<br />

on surfaces that may have directly or<br />

indirectly absorbed explosive residues.<br />

For more sensitive, accurate<br />

and rapid detection, the DETECTRA<br />

HX offers a swipe sampling system<br />

and includes a touch-free inhalation<br />

sampling method for threat scenarios<br />

that involve highly unpredictable explosives<br />

compositions.<br />

The RAPISCAN DETECTRA HX<br />

is designed to detect a broad range<br />

of common commercial and homemade<br />

explosive materials that may<br />

exist within a single sample, thereby<br />

achieving lower false alarm rates. Dethe<br />

United States.<br />

About Rapiscan Systems<br />

Rapiscan Systems, a division of OSI<br />

Systems, Inc., is a leading global supplier<br />

of security inspection solutions<br />

utilizing X-ray and<br />

gamma-ray imaging,<br />

and advanced threat<br />

identification techniques<br />

such as neutron<br />

and diffraction<br />

analysis. The company’s<br />

products are<br />

sold into four market<br />

segments: Baggage<br />

and Parcel Inspection,<br />

Cargo and Vehicle Inspection,<br />

Hold Baggage Screening and People<br />

Screening. The company has an installed<br />

base globally of more than<br />

100,000 security and inspection systems.<br />

Rapiscan Systems products are<br />

supported by a global support service<br />

network. As the world’s leading<br />

security screening provider, Rapiscan<br />

Systems provides state of the art<br />

products, solutions and services that<br />

meet our customers’ most demanding<br />

threat detection needs – while<br />

improving operational efficiency.<br />

For more information, visit http://<br />

www.rapiscansystems.com.


Convy on Netcentric Security<br />

RFID Technology: Mustering up<br />

better incident response<br />

By John Convy, Convy Associates, Washington, DC<br />

Radio-Frequency Identification<br />

(RFID) tags have become a fixture<br />

in the commercial sector, proving an<br />

invaluable tool for retailers against<br />

loss prevention and for inventory<br />

tracking. But, what if this technology,<br />

previously limited to<br />

tracking cattle, could<br />

be used to protect government<br />

assets and<br />

personnel in the event<br />

of an emergency?<br />

It turns out, this can<br />

be done!<br />

The progress in<br />

RFID technology has made it more<br />

accessible and prominent, and has<br />

reduced costs for widespread use<br />

among cost-conscious organizations<br />

and agencies that might benefit from<br />

it. Active, semi-passive, and passive<br />

RFID tags are less expensive to produce<br />

than in the past, and can now<br />

be made small enough to fit in virtually<br />

any device or product.<br />

The federal government has already<br />

implemented RFID technology<br />

in numerous ways, partly in<br />

response to the September 11 attacks.<br />

For example, the Department<br />

of State is now issuing e-passports,<br />

embedded with RFID chips that act<br />

as a biometric identifier, making the<br />

passport impossible to forge. Also,<br />

the government’s “Real ID” program<br />

has seen many states adopting<br />

In the event of an evacuation, managers<br />

can quickly account for all employees, and<br />

alert authorities to any discrepancies in<br />

their locations.<br />

driver’s license chipping to improve<br />

identification monitoring at border<br />

crossings and federal facilities.<br />

In the security sector, RFID technology<br />

is making significant strides<br />

in how organizations view and execute<br />

personnel management, particularly<br />

in the event of a crisis or<br />

incident. I recently spoke with Steve<br />

Pisciotta, founder and president of<br />

RTS (Remote Tracking Systems).<br />

His Arizona-based company’s asset<br />

tracking solutions are helping address<br />

critical security threats to highvalue<br />

facilities, such as military bases,<br />

38<br />

weapons facilities, airports, seaports,<br />

and other critical infrastructure.<br />

RTS is using integrated Active<br />

RFID, coupled with remote data<br />

servers and strategically placed badge<br />

readers or “muster points” on the exterior<br />

of buildings, and<br />

“inventory points” on<br />

the interior, that enable<br />

real-time tracking<br />

and inventory of<br />

personnel. These solutions<br />

represent an opportunity<br />

for agencies<br />

to become more efficient<br />

at protecting both infrastructure<br />

and personnel.<br />

Pisciotta explained that an RTS solution<br />

is designed by implementing<br />

an “Employee Muster System,” where<br />

nondescript reader boxes or muster<br />

points are installed around the<br />

perimeter of a building or campus,<br />

and employees are given wearable<br />

RFID badges, which communicate<br />

with the muster points to track, in<br />

real-time, the locations of personnel<br />

on campus. This information is then<br />

relayed to an off-site Remote Data<br />

Server where the software checks the


data against the personnel inventory<br />

system to inform and report on the<br />

personnel located inside the building.<br />

In the event of an evacuation,<br />

managers can quickly account for all<br />

employees, and alert authorities to<br />

any discrepancies in their locations.<br />

To illustrate the usefulness of this<br />

‘mustering’ technology, Pisciotta<br />

suggested that we walk through a<br />

scenario.<br />

“Imagine a large federal healthcare<br />

facility with around 2,000 employees,<br />

four acres of campus space,<br />

and a fairly high level of security.<br />

Employees are assigned badges<br />

equipped with active RFID technology,<br />

which identifies each individual,<br />

and a ‘panic button’ that can be activated<br />

as a silent alarm sent to the<br />

remote server. Any number of incidents<br />

could prompt a security response<br />

– white powder found in the<br />

mailroom, a toxic spill of infectious<br />

substance, a natural disaster such as<br />

a tornado or earthquake, a fire, an active<br />

shooter on campus, or the worstcase<br />

possibility – blatant terrorism.”<br />

In his fictional scenario, Pisciotta<br />

described a supervisor arriving at<br />

work and noticing a man she does<br />

not recognize, loitering by the employee<br />

entrance.<br />

“As she passes through the door,<br />

the inventory point captures her<br />

identifying data, and makes a digital<br />

record that she is in the building, just<br />

as it does for every employee on that<br />

39<br />

morning,” he described. “Moments<br />

later, she sees the unauthorized man<br />

enter the building behind another<br />

employee, and dart into the elevator.<br />

Immediately, she activates her RFID<br />

panic button while arriving her office.<br />

As she sits down, she hears shots<br />

in the hallway upstairs, signaling that<br />

an active shooter is on campus. As<br />

security protocols are implemented,<br />

she evacuates her team and meets up<br />

with other employees at a preplanned<br />

mustering location. There, she accesses<br />

the remote data server to take<br />

inventory of her team, and discovers<br />

that one of her team members is still<br />

inside. The system’s real-time tracking<br />

enables law enforcement to know<br />

that one of her employees is hiding<br />

in the men’s restroom. With law enforcement<br />

already notified earlier by<br />

her panic button activation, their response<br />

time is quick, and officers are<br />

on scene within moments of the first<br />

report of shots fired.”<br />

Because of the RFID technology,<br />

law enforcement is able to intercept<br />

the innocent employee as he exits<br />

the men’s room, and evacuate him<br />

safely – avoiding any chance of him<br />

encountering the shooter.<br />

“Throughout this scenario,” Pisciotta<br />

added, “the system reports<br />

that a small group of employees –<br />

still inside the building, as reported<br />

by their RFID badges – are huddled<br />

together in an upstairs closet. This allows<br />

officers to see that they are hiding<br />

from the shooter, directing them<br />

to search that part of the building,<br />

where they apprehend the shooter,<br />

and release the employees from their<br />

hiding spot after the area is secure.”<br />

Pisciotta believes that integrating<br />

real-time tracking solutions can be a<br />

powerful means of identifying unauthorized<br />

activity, and ultimately protecting<br />

employees and infrastructure.<br />

He is enthusiastic about the<br />

potential for federal, state, and local<br />

agencies to implement this technology,<br />

and about the positive impact<br />

it can have on government security<br />

response capabilities.<br />

Looking forward, I expect we will<br />

be seeing broader implementation<br />

of RFID technology across government,<br />

and the development of new<br />

and better RFID technologies as new<br />

RFID innovators emerge in this market.<br />

John Convy and Convy Associates<br />

provide strategic alliance, A&E consultant,<br />

technology ecosystem, and<br />

lead generation programs to monetize<br />

relationships and accelerate demand<br />

for leading security industry manufacturers.<br />

John is the Founder and<br />

Managing Director of the Open Standards<br />

Security Alliance and the IP<br />

Security Academy, and a speaker at<br />

many global industry events. Email:<br />

John@ConvyAssociates.com


WWF-Canada and RSA team up to advance<br />

employee action on sustainability<br />

TORONTO, <strong>March</strong> 15, <strong>2016</strong> /<br />

CNW/ - WWF-Canada and RSA<br />

Canada kicked off a new five-year<br />

partnership today to inspire and<br />

engage employees in workplaces<br />

across Canada to take environmental<br />

action.<br />

With this partnership, RSA becomes<br />

the new presenting sponsor<br />

of Living Planet @ Work, WWF-<br />

Canada’s environmental employee<br />

engagement program. In doing so,<br />

RSA demonstrates and promotes<br />

the benefits of integrating<br />

employee engagement and<br />

corporate responsibility<br />

initiatives.<br />

Through this partnership,<br />

WWF-Canada will<br />

support RSA, Canada’s<br />

third-largest general insurer,<br />

to develop a robust national<br />

green team program<br />

in order to engage employees<br />

coast to coast to take<br />

action on sustainability.<br />

This is part of RSA Canada’s<br />

corporate responsibility commitments<br />

to reduce the carbon<br />

emissions from their internal operations<br />

by 12 per cent per employee by<br />

2018 (2015 baseline) as well as support<br />

customers with tools and solutions<br />

to better respond to changing<br />

environmental risks and opportunities.<br />

Quote from Rowan Saunders, President<br />

and CEO of RSA Canada<br />

“Our employees are our biggest asset<br />

and engaging them on sustainability<br />

– an issue that they care<br />

deeply about – is directly linked to<br />

our success. Combined with WWF’s<br />

inspiration and guidance, we can<br />

bring together our people to create<br />

a more sustainable future.”<br />

Quote from David Miller,<br />

President and CEO of WWF-Canada<br />

40<br />

“Canadians have a growing desire to<br />

lighten the human load on our planet.<br />

They’re taking action, seeking solutions<br />

and building a future where<br />

nature and the economy thrive together.<br />

WWF-Canada’s partnership<br />

with RSA Canada harnesses that<br />

drive to help Canadians in workplaces<br />

across the country nurture a<br />

deeper connection with nature.”<br />

Why integrating a company’s employee<br />

engagement and corporate<br />

responsibility initiatives matters:<br />

• High employee engagement can<br />

lead to 19 per cent profit increase,<br />

20 per cent improved performance<br />

and 87 per cent<br />

turnover reduction (Corporate<br />

Leadership Council)<br />

• Lack of employee engagement<br />

is the top issue<br />

currently facing 87 per cent<br />

of HR and business leaders<br />

(Deloitte, 2015) and less<br />

than one-third of workers<br />

felt engaged in their jobs in<br />

2014, according to the U.S.<br />

study. The majority (51 per<br />

cent) were “not engaged”, and 17.5<br />

per cent were “actively disengaged.”<br />

• Millennials, the least engaged<br />

generation (Gallup, 2014) and the<br />

generation that will form half of the<br />

global workforce by 2020 and 75


per cent by 2025, want their work to<br />

have a purpose, to contribute something<br />

to the world and they want to<br />

be proud of their employer (PwC,<br />

2011)<br />

WWF and RSA Partnership History<br />

For more than five years, WWF and<br />

RSA have partnered on research<br />

and employee engagement initiatives<br />

that have strengthened our<br />

organizations. As a leading renewable<br />

energy and marine insurer,<br />

RSA has supported WWF’s efforts<br />

to better understand the impacts of<br />

our changing climate and environment<br />

and to help RSA employees,<br />

customers and brokers mitigate and<br />

adapt to those risks. A report commissioned<br />

by RSA to understand<br />

the insurance risks of Arctic shipping<br />

is informing industries. RSA’s<br />

recognition of the important role<br />

that employees play in creating positive<br />

change is helping to advance<br />

workplace sustainability. By working<br />

with WWF, RSA is expanding<br />

its influence and gaining valuable<br />

insights for its future.<br />

About Living Planet @ Work:<br />

Living Planet @ Work was launched<br />

in 2011 to inspire, empower and engage<br />

environmentally minded employees<br />

to lead footprint reduction<br />

initiatives, sustainability awareness<br />

campaigns at work and build support<br />

for WWF’s conservation efforts<br />

across Canada. Today, more than<br />

1,200 champions from more than<br />

900 companies use the program and<br />

are taking action for the good of<br />

business and the planet.<br />

About WWF-Canada<br />

WWF-Canada is part of WWF<br />

(World Wildlife Fund), one of the<br />

world’s largest and most respected<br />

conservation organizations. WWF-<br />

Canada has close to 50 years of<br />

experience implementing sciencebased<br />

knowledge and research into<br />

on-the-ground projects. WWF creates<br />

solutions to the most serious<br />

conservation challenges facing our<br />

planet, helping people and nature<br />

thrive. Visit wwf.ca for more information.<br />

About RSA Canada<br />

RSA Canada is one of the oldest insurance<br />

companies in the country<br />

with roots dating back to 1833. The<br />

RSA Canada group of companies<br />

includes Roins Financial Services<br />

Limited, Royal & Sun Alliance Insurance<br />

Company of Canada, Quebec<br />

Assurance Company, Johnson<br />

Inc., Unifund Assurance Company,<br />

Western Assurance Company, Ascentus<br />

Insurance Ltd., Canadian<br />

Northern Shield Insurance Company<br />

and RSA Travel Insurance Inc.<br />

(collectively, “RSA Canada”) and is<br />

part of RSA Insurance Group Plc.<br />

SOURCE WWF-Canada<br />

41<br />

For further information:<br />

Philippe Devos, director of communications<br />

and media, WWF-<br />

Canada, pdevos@wwfcanada.org,<br />

416-453-0092; Brodie Bott, media<br />

relations manager, RSA Canada,<br />

media@rsagroup.ca; Diane Bégin,<br />

account director, APEX Public Relations,<br />

dbegin@apexpr.com, 416-<br />

934-2116<br />

This information is being distributed<br />

to you by CNW Group Ltd. 88 Queens<br />

Quay West, Suite 3000 Toronto ON<br />

M5J 0B8 www.newswire.ca<br />

Sign-up for Free <strong>GSN</strong><br />

Print/<strong>Digital</strong> <strong>Edition</strong>s<br />

& Email Newsletters<br />

CLICK HERE


Border Security/Immigration<br />

Statement by Secretary Jeh C. Johnson on Southwest<br />

Border Security apprehensions<br />

MARCH 9, <strong>2016</strong> – In connection<br />

with the latest monthly release of<br />

the numbers of apprehensions on<br />

our southwest border, Secretary<br />

Johnson made the following statement:<br />

“In February <strong>2016</strong>, apprehensions<br />

by the Border Patrol on our<br />

southwest border – an indicator of<br />

total attempts to cross the border<br />

illegally – increased slightly from<br />

January, but remained substantially<br />

below the month-to-month numbers<br />

of apprehensions we saw in the<br />

latter part of 2015. The numbers of<br />

unaccompanied children and family<br />

members remained at the same<br />

levels as January, which is greatly reduced<br />

from the apprehension numbers<br />

at the end of 2015. The overall<br />

10 percent increase from January is<br />

due to an increase in apprehensions<br />

of single adults, from 17,505 in<br />

January to 19,917 in February, 71.5<br />

percent of whom are from Mexico.<br />

Notably, one year ago, in February<br />

2015, the number of apprehensions<br />

of single adults was 19,950, and in<br />

February 2014 the number was<br />

July 2015<br />

August 2015<br />

September 2015<br />

October 2015<br />

November 2015<br />

December 2015<br />

January <strong>2016</strong><br />

February <strong>2016</strong><br />

28,277.<br />

Recent enforcement actions,<br />

which focus on those apprehended<br />

at the border on or after January 1,<br />

2014, continue. On January 4, I announced<br />

enforcement actions that<br />

took place on January 2-3. Further,<br />

at my direction, beginning January<br />

23 ICE has been conducting<br />

“Operation Border Guardian,” by<br />

which ICE has taken into custody<br />

336 individuals. The focus of this<br />

operation are those who came here<br />

illegally as unaccompanied children<br />

after January 1, 2014, and are now<br />

42<br />

UACs<br />

4,182<br />

4,638<br />

4,485<br />

4,944<br />

5,610<br />

6,775<br />

3,111<br />

3,113<br />

Family<br />

Members<br />

4,503<br />

5,159<br />

5,273<br />

6,026<br />

6,471<br />

8,974<br />

3,145<br />

3,048<br />

All<br />

28,388<br />

30,239<br />

30,286<br />

32,726<br />

32,845<br />

37,014<br />

23,761<br />

26,078<br />

over 18, have been ordered removed<br />

by an immigration court, and have<br />

no pending appeal or claim of asylum<br />

or other relief. Others who are<br />

priorities for removal have been apprehended<br />

as part of this operation.<br />

When enforcing the immigration<br />

laws, our personnel will not, except<br />

in emergency circumstances, apprehend<br />

an individual at a place of worship,<br />

a school, a hospital or doctor’s<br />

office or other sensitive location.<br />

These actions are part of our<br />

broader and ongoing efforts to enforce<br />

our immigration laws, in line


with our stated priorities. Since October<br />

1, ICE has repatriated a total<br />

of 28,808 individuals to Central<br />

America, and ICE and the Border<br />

Patrol have either repatriated or<br />

returned approximately 128,000 to<br />

Mexico. Since October 1, there have<br />

been a total of 290 removal flights<br />

to Central America. We are working<br />

with the Mexican government to increase<br />

the number of removal flights<br />

there from two to three flights per<br />

week. On February 23, we entered<br />

into new agreements with the Mexican<br />

government for the more efficient<br />

repatriation of adults, and safe<br />

and timely repatriation of families<br />

and unaccompanied children.<br />

As I have said repeatedly, our borders<br />

are not open to illegal migration.<br />

If someone was apprehended<br />

at the border, has been ordered removed<br />

by an immigration court,<br />

has no pending appeal, and does<br />

not qualify for asylum or other relief<br />

from removal under our laws, he<br />

or she must be sent home. We must<br />

and we will enforce the law in accordance<br />

with our enforcement priorities.<br />

I have also been working closely<br />

with the Department of Justice to<br />

ensure that as many unaccompanied<br />

children as possible have appropriate<br />

representation during immigration<br />

proceedings. We support<br />

improving the process for all those<br />

in immigration<br />

proceedings<br />

and have<br />

requested over<br />

$17 million as<br />

part of the President’s<br />

FY17<br />

budget request DHS Secretary<br />

to support critical<br />

initiatives<br />

Jeh Johnson<br />

that provide legal assistance services<br />

to vulnerable immigrants, including<br />

$2 million for Justice AmeriCorps -<br />

a program that specifically provides<br />

legal representation to unaccompanied<br />

minors. We need every element<br />

of the court process to work<br />

effectively to accomplish the goal of<br />

both honoring humanitarian claims<br />

and processing those who do not<br />

qualify for relief.<br />

With the Department of Justice,<br />

we are also doubling down on our<br />

efforts to apprehend and prosecute<br />

smugglers. Through initiatives like<br />

Operation Coyote, we are targeting<br />

the transnational criminal organizations<br />

that profit from human smuggling.<br />

Since its launch in summer<br />

2014, Operation Coyote has to date<br />

resulted in the criminal arrest of<br />

1,124 individuals, 877 indictments,<br />

and 829 convictions.<br />

Finally, as I have said in the past,<br />

we recognize that many who seek<br />

to flee Central America may be<br />

regarded as refugees. We are ex-<br />

43<br />

panding our Refugee Admissions<br />

Program to help vulnerable men,<br />

women and children in Central<br />

America. In partnership with the<br />

UN High Commissioner for Refugees<br />

and non-governmental organizations<br />

in the region, we have taken<br />

preliminary steps to ensure we are<br />

able to implement this new program<br />

as soon as possible. This approach<br />

builds on our recently established<br />

Central American Minors program,<br />

which is now providing an in-country<br />

refugee processing option for<br />

certain children with parents in the<br />

United States, as well as the existing<br />

asylum process; to date, the State<br />

Department has received 7,606 applications<br />

for this Program.<br />

Again, our policy is clear: We will<br />

continue to enforce the immigration<br />

laws and secure our borders<br />

consistent with our priorities and<br />

values. At the same time, we will offer<br />

vulnerable populations in Central<br />

America an alternate, safe and<br />

legal path to a better life.”


Border Security/Immigration<br />

What’s next in the Supreme Court Case<br />

on expanded DACA and DAPA?<br />

By Mellissa Crow<br />

JANUARY 20, <strong>2016</strong> – This week, the<br />

Supreme Court announced it would<br />

hear arguments in United States v.<br />

Texas. The highest court will now<br />

determine whether the President’s<br />

deferred action initiatives announced<br />

in November 2014,<br />

known as expanded DACA and<br />

DAPA, constitute a lawful exercise<br />

of executive discretion. The<br />

Supreme Court’s decision could<br />

clear the way for the initiatives<br />

to go forward as early as June of<br />

<strong>2016</strong>. If that happens, expanded<br />

DACA and DAPA could provide<br />

temporary relief from deportation<br />

to as many as five million<br />

people. It’s important to note that<br />

the current, active DACA program<br />

that began in 2012, which now has<br />

more than half a million people enrolled,<br />

is not being challenged in<br />

this lawsuit.<br />

Some court watchers were surprised<br />

to see the court direct both<br />

sides to address whether the President’s<br />

actions violated the “Take<br />

Care” Clause of the Constitution,<br />

which states that the President must<br />

“take Care that the Laws be faithfully<br />

executed.” Neither the Texas district<br />

court nor the Fifth Circuit Court of<br />

Appeals addressed this legal claim;<br />

instead, the lower courts based their<br />

decisions on the government’s alleged<br />

failure to comply with certain<br />

technical requirements under<br />

the Administrative Procedure Act.<br />

The Court’s request for additional<br />

briefing on this issue suggests that it<br />

wants to resolve all the issues in the<br />

case, rather than leaving a loophole<br />

that could be the basis for a future<br />

decision by the district court, which<br />

could further delay the implementation<br />

of expanded DACA and DAPA.<br />

However, the Court may not end<br />

up reaching the merits of this case<br />

at all and may instead dismiss the<br />

44<br />

case for lack of standing, or legal capacity<br />

to bring the case. This is the<br />

best case scenario. Texas and the 25<br />

other plaintiff states are arguing that<br />

they have standing because additional<br />

costs Texas might incur to issue<br />

drivers’ licenses to beneficiaries<br />

of the deferred action programs<br />

give them enough of a stake in<br />

the case to challenge federal immigration<br />

policy. If the Court<br />

were to affirm this rationale, it<br />

would mean that states have an<br />

unprecedented role in an area<br />

that has always been an exclusively<br />

federal domain.<br />

Oral arguments in the case<br />

will likely be scheduled for April<br />

<strong>2016</strong>. The Court will issue a decision<br />

before its current term ends in<br />

June <strong>2016</strong>. For the sake of the immigrant<br />

families whose lives are riding<br />

on this decision, let’s hope that the<br />

Court makes clear that President<br />

Obama, like every President before<br />

him dating back to Eisenhower, has<br />

the authority to take executive action<br />

on immigration.<br />

Photo Courtesy of Photo Phiend.


Nativists line up in support of Trump’s<br />

Presidential campaign<br />

By Walter Ewing<br />

If one is judged by the company<br />

one keeps, then Donald<br />

Trump needs some new<br />

friends. The now-undisputed<br />

frontrunner in the Republican<br />

presidential primary<br />

campaign has been receiving<br />

endorsements from a rogue’s<br />

gallery of nativists. Not surprisingly,<br />

Trump and his buddies fail to offer<br />

any constructive, realistic, or humane<br />

means of fixing the myriad<br />

problems that plague the U.S. immigration<br />

system. For instance, a<br />

key component of the Trump immigration<br />

doctrine is the deportation<br />

of all 11 million unauthorized men,<br />

women, and children now living in<br />

the United States—no matter how<br />

much it costs or how many lives it<br />

needlessly destroys.<br />

This kind of immigration “reform”<br />

plays well in white-supremacist<br />

circles. David Duke, the ardent<br />

white nationalist and former Ku<br />

Klux Klansman, has told his followers<br />

that “voting against Donald<br />

Trump at this point is really treason<br />

to your heritage.” During an inter-<br />

responsible for the words of<br />

his supporters, but it should be<br />

taken as a warning sign when<br />

his supporters include a flock<br />

of white nationalists. As Richard<br />

Cohen, president of the<br />

Southern Poverty Law Center,<br />

puts it: “You can’t help who<br />

Photo: Darron Birgenheier<br />

admires you, but when white<br />

supremacists start endorsing<br />

view on CNN, Trump repeatedly<br />

declined to disavow any ideological<br />

allegiance with Duke—an incident<br />

which he later blamed on a faulty<br />

earpiece worn during the interview.<br />

He subsequently disavowed Duke in<br />

a tweet, but Duke took no offense,<br />

saying: “Look, Donald Trump, do<br />

whatever you need to do to get<br />

elected to this country because we<br />

you for president, you ought<br />

to start asking why.” Similarly, one<br />

might ask why so many of Trump’s<br />

retweets are words of praise from<br />

white supremacists. One might also<br />

question the wisdom of Trump’s decision<br />

to tweet a quote from World<br />

War II fascist dictator Benito Mussolini:<br />

“It is better to live one day as<br />

a lion than 100 years as a sheep.”<br />

need a change.”<br />

White nationalist connections<br />

Trump has received similar words<br />

of praise from Jared Taylor, founder<br />

of the New Century Foundation<br />

and editor of its website, American<br />

Renaissance. Taylor says that<br />

“someone who wants to send home<br />

all illegal immigrants…is acting in<br />

the interest of whites, whether consciously<br />

or not.”<br />

Of course, Trump cannot be held<br />

aside, the Trump immigration plan<br />

has also been embraced by anti-immigration<br />

advocates who are more<br />

mainstream in their rhetoric. Senator<br />

Jeff Sessions (R-AL) states that:<br />

“Politicians have promised for<br />

30 years to fix illegal immigration.<br />

Have they done it? Donald Trump<br />

will do it. I’ve told Donald Trump<br />

More on page 54<br />

45


Border Security/Immigration<br />

New TSA canine training<br />

center opens in San Antonio<br />

SAN ANTONIO – The Transportation<br />

Security Administration today<br />

announced the dedication of a new<br />

canine training center at Joint Base<br />

San Antonio-Lackland.<br />

The new facility is designed to<br />

support the mission to provide,<br />

train and certify highly effective<br />

explosives detection canine teams.<br />

The 25,000 square-foot facility has<br />

seven new classrooms and a 100-<br />

seat auditorium and administrative<br />

space, along with a parking lot<br />

and courtyard. The new building is<br />

a partnership among TSA, JBSA-<br />

Lackland and the U.S. Army Corps<br />

of Engineers, which built the facility<br />

in a little more than a year.<br />

The new $12 million training facility<br />

is “an ideal complement to<br />

the existing training center campus,<br />

where our canines and their handlers<br />

come to learn the skills necessary<br />

to demonstrate proficiency in<br />

four key elements: the canine’s ability<br />

to recognize explosives odors, the<br />

handler’s ability to interpret the canine’s<br />

change of behavior, the handler’s<br />

ability to conduct logical and<br />

systematic searches and the team’s<br />

ability to locate the explosives odor<br />

source,” said TSA Administrator Peter<br />

Neffenger during a ribbon-cutting<br />

ceremony held earlier today to<br />

mark the completion of the facility.<br />

The program outgrew the original<br />

facility, which was located on<br />

base but not adjacent to where the<br />

dogs and handlers train at venues<br />

that replicate real-life scenarios. The<br />

new facility is now across the street<br />

from the field training center and<br />

kennels. The structure will be certified<br />

at the LEED Silver standard<br />

for sustainability set by the Leadership<br />

in Energy and Environmental<br />

Design of the U.S. Green Building<br />

Council. This energy-efficient, water-conserving<br />

building was erected<br />

using green resources and materials<br />

as part of federal leadership in sustainable<br />

construction.<br />

TSA trains and deploys both TSAled<br />

and state and local law enforcement-led<br />

canine teams in support of<br />

day-to-day activities that protect the<br />

transportation domain and provide<br />

a visible deterrent to terrorism. Annually,<br />

TSA trains about 250 canine<br />

teams at JBSA-Lackland to operate<br />

in the aviation, multimodal, mass<br />

transit, and cargo environments.<br />

Federal, state and local law enforcement<br />

officers from across the<br />

46<br />

country travel to San Antonio to<br />

take the 10 - 12 week courses. They<br />

are paired with a canine teammate<br />

and undergo strenuous training.<br />

These very effective, mobile teams<br />

can quickly locate and identify dangerous<br />

materials that may present a<br />

threat to transportation systems.<br />

The classrooms will be used to<br />

conduct sessions on canine health<br />

and wellness care, obedience, search<br />

patterns and techniques, explosives<br />

handling and safety, and myriad<br />

other mission critical topics. Thirteen<br />

indoor venues are located on<br />

the premises that mimic a variety of<br />

transportation sites, such as a cargo<br />

facility, an airport gate, a checkpoint,<br />

a baggage claim area, the interior<br />

of an aircraft, a vehicle parking<br />

lot, a light rail station, a light rail<br />

car, and an air cargo facility.


Xenophobic immigration policy<br />

would wreck the U.S. Economy<br />

Written by Walter Ewing,<br />

American Immigration Council<br />

The GOP candidates for President<br />

are falling over one another to demonstrate<br />

who would be the “toughest”<br />

on immigrants and who would<br />

finally make U.S. borders “secure.”<br />

Leading the way is Donald Trump,<br />

who issued shrill declarations during<br />

the January 14 GOP debate that<br />

“We have no borders” and “Illegal<br />

immigration is beyond belief ”—all<br />

of which is hard to reconcile with<br />

the fact that more Mexicans are now<br />

leaving the country than coming.<br />

Nevertheless, Trump promises to<br />

fix many of the nation’s problems<br />

by building a Great Wall along the<br />

U.S.-Mexico border and deporting<br />

all immigrants not legally authorized<br />

to be in the country. Not<br />

wanting to be outdone, Senator Ted<br />

Cruz of Texas has also called for<br />

the building of a wall—which has<br />

prompted Trump to accuse him of<br />

being a copycat. Moreover, while<br />

Trump would allow some of the unauthorized<br />

immigrants he deports<br />

to apply to come back to the United<br />

States if they prove themselves to be<br />

47<br />

“very good,” Cruz’s plan would allow<br />

none of them to return.<br />

Much of this tough talk may be<br />

bluff and bluster; the verbal smoke<br />

and mirrors that is so often employed<br />

by political candidates in a<br />

tough election. But at least some of<br />

it may be for real, which raises serious<br />

questions about its practicality,<br />

social repercussions, and economic<br />

impact. Let’s consider just the likely<br />

economic aspect of policies that<br />

would kick out all unauthorized<br />

immigrants and build a 2,000 milelong<br />

wall between the United States<br />

and Mexico.<br />

Various sources consulted by<br />

CNBC found that it would probably<br />

cost about $12 billion to build a<br />

Trump Wall along the border —plus<br />

$750 million per year to maintain it<br />

(not counting all of the Border Patrol<br />

agents, helicopters, airplanes,<br />

and drones needed to monitor the<br />

wall for breaches). In a 2013 Forbes<br />

story, Rep. Henry Cuellar (D-Texas)<br />

aptly described a border fence as<br />

“a 14th century solution to a 21st<br />

century problem.” It is a “solution”<br />

that fails to account for the fact that<br />

roughly 40 percent of currently unauthorized<br />

immigrants came to the<br />

United States on valid visas and<br />

stayed after those visas expired. Nor<br />

does it account for the unknown<br />

share of the unauthorized who are<br />

led by smugglers through ports of<br />

entry rather than through expanses<br />

of empty desert. In other words, a<br />

border fence would have no impact<br />

on at least half of the unauthorized<br />

immigrants entering the country,<br />

and its impact on the other half<br />

would be partial at best given the<br />

proven ability of smuggling organizations<br />

to go under, through, or<br />

over the stretches of border fence<br />

that already exist.<br />

Leaving the cost of a border wall<br />

aside, what about the Trump Mass<br />

Deportation Plan? Not surprisingly,<br />

More on page 55


<strong>GSN</strong>’s <strong>2016</strong> Airport, Seaport, Border Security<br />

Awards Program<br />

OPENING FOR ENTRIES ON MONDAY, MARCH 28 AT:<br />

www.asbsecurityawards.com<br />

Join the hundreds of national and international security<br />

vendors and government agencies that were honored<br />

in prior <strong>GSN</strong> programs for notable contributions to<br />

Airport and Aviation Security, Maritime/Port Security,<br />

Border Security and Immigration.<br />

Important Dates:<br />

<strong>March</strong> 28 – Program opens for entries<br />

May 3 – Program closes for entries<br />

May 9 – Finalists Announced<br />

May 16 – Awards Dinner, Washington DC<br />

Past Awards Dinner Speakers have included Fran Townsend,<br />

who was Advisor to President George W. Bush after 9/11,<br />

Four Star General Barry McCaffrey (RET), the highly decorated<br />

General who also served as U.S. Drug Czar, and Coast Guard<br />

Admiral Thad Allen, who came out of retirement twice to serve<br />

his country – the first time during Hurricane Katrina and the<br />

second time in the BP Oil Spill.<br />

See photos of seven years of <strong>GSN</strong> Awards Programs at:<br />

https://www.flickr.com/photos/44536438@N06/


Extreme Conditions are no match for latest<br />

Motorola Solutions Radio<br />

Motorola Solutions listens to firefighters,<br />

delivers rugged APXTM<br />

8000XE portable radio with allband<br />

and Wi-Fi access and enhanced<br />

APX XE500 remote speaker<br />

microphone provides superior<br />

sound quality<br />

• Next-generation of APX extreme<br />

radio and remote speaker microphone<br />

(RSM) built for harsh environments<br />

• APX 8000XE provides interoperability<br />

across public safety networks<br />

SCHAUMBURG, Ill. – <strong>March</strong> 10,<br />

<strong>2016</strong> – Motorola Solutions (NYSE:<br />

MSI) continues its legacy of designing<br />

best-in-class digital radio<br />

solutions for firefighters and other<br />

professionals who face extreme<br />

conditions with the introduction<br />

of the APX 8000XE two-way radio<br />

and APX XE500 RSM. The newest<br />

entries into Motorola Solutions’<br />

award-winning APX<br />

portfolio of Project 25 (P25)<br />

digital radios have been developed<br />

using the company’s<br />

well-established practice<br />

of hands-on research<br />

with firefighters<br />

and other first<br />

responders who<br />

need the most<br />

reliable missioncritical<br />

communications to do their<br />

jobs efficiently, effectively and safely<br />

every day.<br />

The APX 8000XE features allband<br />

functionality and is a rugged<br />

P25 two-way radio that can be used<br />

in either analog or digital mode<br />

across 700/800MHz, VHF and UHF<br />

bands. Time is of the essence for<br />

firefighters and they can be ready<br />

in moments by programming the<br />

radio remotely via Wi-Fi<br />

and radio management<br />

software to operate securely<br />

on different radio<br />

networks, allowing them<br />

to quickly help neighboring<br />

counties during<br />

large-scale emergencies.<br />

Motorola Solutions<br />

works closely with firefighters<br />

and other radio<br />

49<br />

users to find out exactly what they<br />

need and the APX 8000XE is the latest<br />

example of that thinking. It features<br />

the trusted ergonomics<br />

of the APX XE radio series,<br />

designed for easy operation in<br />

harsh conditions. The rightsized<br />

radio has a large top<br />

display, exaggerated controls<br />

for gloved hands<br />

and a dedicated pushto-talk<br />

button. It also<br />

provides best-in-class audio with a<br />

1-watt speaker, three built-in microphones<br />

and automatic noise suppression<br />

for clarity in the loudest of<br />

environments.<br />

“The APX 8000XE is an all-band<br />

rugged and submersible portable<br />

radio made for firefighters,” said<br />

Lieutenant David Hudik, Elgin, Illinois<br />

Fire Department. “With Wi-Fi<br />

access, we can reprogram the APX<br />

8000XE on the fly when we are providing<br />

mutual aid assistance out-ofstate.”<br />

Most firefighters use a remote<br />

speaker microphone with their radios<br />

and the APX XE500 RSM is<br />

designed specifically for demanding<br />

environments, whether combating<br />

a fire or providing medical services<br />

at the scene of an accident.<br />

• With five strategically placed mi-


crophones and automatic noise suppression,<br />

the APX XE500 provides<br />

clear communications when worn on<br />

either shoulder, center chest, or over<br />

the shoulder<br />

• It can be submersed in 2 meters of<br />

water for up to 4 hours<br />

• It withstands heat conditions of up<br />

to 500°F (260°C) for up to 5 minutes<br />

• A channel knob automatically<br />

controls the channels of the user’s<br />

portable APX radio<br />

“With the APX XE500 RSM, I can<br />

completely control my APX radio<br />

without having to hunt under my<br />

bunker coat for it,” said Lieutenant<br />

David Hudik, Elgin Fire Department.<br />

“With improved water porting, you<br />

can carry the APX XE500 upright or<br />

upside down for fast water drainage<br />

while maintaining clear voice communications.”<br />

“Customer input is essential to our<br />

design and the Elgin Fire Department<br />

was right at our side as we tested<br />

the capabilities of the APX 8000XE<br />

and APX XE500 RSM,” said Claudia<br />

Rodriguez, vice president, Devices<br />

Product Management, Motorola Solutions.<br />

“The latest XE radio means<br />

firefighters will be able to talk with<br />

other first responders at the scene and<br />

across municipalities and regions.<br />

The new rugged RSM means they can<br />

communicate clearly in the loudest<br />

fireground environments, including<br />

blaring horns and wailing sirens.”<br />

The APX 8000XE and XE500 RSM<br />

will be available in North America.<br />

Ensuring biometric data is useless<br />

to identity thieves<br />

Continued from page 5<br />

resulting in enhanced, individualized<br />

security, allowing individuals to fully<br />

control their real identity. Instead of<br />

the system blocking the legitimate<br />

user — an unintended consequence<br />

of blocking an attacker — the system<br />

is made more secure and efficient and<br />

thus returns a higher ROI for both the<br />

consumer and system administrator.<br />

More Robust Biometric Templates<br />

with Enhancements<br />

Resources<br />

• APX 8000XE and APX XE500<br />

RSM video<br />

• Learn more about the APX<br />

8000XE two-way radio and the APX<br />

XE500 RS<br />

About Motorola Solutions<br />

Motorola Solutions (NYSE: MSI) creates<br />

innovative, mission-critical communication<br />

solutions and services<br />

that help public safety and commercial<br />

customers build safer cities and<br />

thriving communities. For ongoing<br />

news, visit http://newsroom.motorolasolutions.com<br />

or subscribe to a<br />

news feed.<br />

50<br />

It may be desirable in some application-dependent<br />

situations to construct<br />

and enforce the use of enhanced<br />

biometric templates. The use<br />

of a “super template” that uniquely<br />

combines biometric data with other<br />

information — perhaps even an OTP<br />

or other out-of-band data — enables<br />

the system to recognize and reject a<br />

biometric template that was created<br />

from a stolen fingerprint image. Templates<br />

can reside on a card or chip or<br />

in a smartphone or personal wearable.<br />

In the case of a government or civil<br />

application, this approach would prevent<br />

any would-be attacker from simply<br />

using the stolen biometric data,<br />

alone, to compromise either physical<br />

or data security.<br />

In the case of commercial markets<br />

(e.g., a banking application), we<br />

might see an institution deploying a<br />

similar approach to protect user identity<br />

during online transactions. As<br />

some do today, institutions could enable<br />

multi-factor authentication and<br />

require that both the biometric and<br />

some other data be provided. Alternatively,<br />

they could enroll biometric<br />

data and then “sign and encrypt” the<br />

template with unique or closed-system<br />

data.<br />

The creation of a guaranteed unique<br />

“super template” might combine standard<br />

(interoperable) and proprietary<br />

data. This is the approach that HID<br />

Global takes with its Secure Identity<br />

Object (SIO), which is a data model<br />

for storing and transporting identity<br />

information in a single object. SIOs<br />

can be deployed in any number of


form factors including contactless and<br />

contact smart cards, smart phones<br />

and USB tokens, and ensure that any<br />

of these items and the data associated<br />

with them are, in turn, only associated<br />

with the owner’s identity. The SIO is<br />

digitally signed using proven cryptographic<br />

techniques as part of a seamless<br />

and secure process. Various data<br />

objects can be added, encrypted, and<br />

signed – i.e., biometric data, as well as<br />

data for computer log-on and other<br />

secure identity applications. Then,<br />

all content is secured with a wrapper<br />

and bound to the device with another<br />

signature.<br />

Identity Proofing<br />

Lastly, it’s important to remember<br />

that the chain of trust is only as strong<br />

as the weakest link. The biometric solution<br />

used in identity-proofing must<br />

interoperate with trusted devices at<br />

each verification point. An example<br />

of this approach is HID Global’s<br />

Seos-based solutions, which create<br />

a device-independent, trusted physical<br />

identity verification process. Additionally,<br />

the physical devices themselves<br />

must be tamper-resistant to<br />

ensure that all transaction integrity<br />

is preserved. The HID Global Lumidigm<br />

biometric authenticator is a<br />

good example of this approach:<br />

• Trusted devices must be encryption-enabled<br />

with various tamper<br />

resistance and detection capabilities<br />

that protect the integrity of the communication<br />

between the client and<br />

the sensor.<br />

• The chain of trust must be preserved<br />

end-to-end if the goal is, for<br />

example, to simplify financial transactions<br />

for users while eliminating<br />

fraud for financial institutions.<br />

• This generally implies that the<br />

device connects to the institution’s<br />

systems through a cryptographically<br />

secure channel protected by hardware<br />

tamper detection and response,<br />

which establishes trust between the<br />

device and the institution’s systems<br />

independent of intermediate systems<br />

and networks.<br />

• A trusted biometric device must<br />

be able to perform a live scan of a<br />

finger with strong liveness detection<br />

to ensure that the person making the<br />

transaction is who they claim to be<br />

(that is, the same person that enrolled<br />

their biometric fingerprint).<br />

And finally, by extension, if a card,<br />

smartphone, PIN, or other forms of<br />

authentication are used for authentication,<br />

each must also be confirmed<br />

by the biometric -- a biometric that is<br />

associated with a specific individual<br />

through a robust identity-proofing<br />

process at enrollment. This ensures<br />

that true identity verification has<br />

been performed and maintained in a<br />

trusted manner.<br />

Moving Forward<br />

Biometrics solutions offer the ideal<br />

balance of convenience and security<br />

because they are simple to use and<br />

increasingly more robust and reliable.<br />

Biometrics is also the only authentication<br />

method that “binds” a user’s<br />

51<br />

digital credentials to a person. As<br />

such, biometrics is playing an important<br />

role in eliminating digital identity<br />

theft in today’s increasingly complex<br />

and vulnerable environment.<br />

Making security more robust and<br />

reliable without adding complexity<br />

is difficult. But as our environment<br />

becomes more complex and open to<br />

attacks, we simply have to find a way<br />

to enhance both trust and user convenience.<br />

Combining the universality<br />

and sophistication of biometrics with<br />

things we have (like personal devices,<br />

phones, wearables, etc.) and things<br />

we know (like PINs or passwords) is<br />

one important step. The other is to<br />

rely on vendor technologies and solutions<br />

that can effectively guarantee a<br />

high level of trust without raising the<br />

complexity for the user.<br />

Regretfully, we need to accept the<br />

fact that biometrics or other personal<br />

data cannot be completely protected<br />

from a breach. All we can do is design<br />

systems that preserve the integrity of<br />

user’s true identities - even in situations<br />

like the OPM data breach. And<br />

perhaps the best way to discourage<br />

any future breaches is to simply render<br />

the stolen data useless to anyone<br />

except the legitimate owner.


Whitewood Encryption Systems<br />

announces third patent from<br />

Los Alamos National Laboratory<br />

technology transfer<br />

Continued from page 9<br />

bers by capturing apparently random<br />

events from the local physical<br />

environment, such as user behavior,<br />

network activity or other sources of<br />

noise.<br />

“It’s an important part of our mission<br />

to help technology move from<br />

the lab environment to full-scale<br />

commercialization,” said Duncan<br />

McBranch, Chief Technology Officer<br />

at Los Alamos. “Patents such as<br />

these lay the foundation for a strong<br />

U.S. industry in next-generation<br />

cryptographic systems. These systems<br />

are required to protect trusted<br />

transactions across the public and<br />

private sector today, and to guard<br />

against future technology breakthroughs<br />

that may make current<br />

cryptography approaches obsolete.”<br />

Whitewood is a subsidiary company<br />

of Allied Minds (LSE: ALM).<br />

More information on Whitewood<br />

can be found at: www.whitewoodencryption.com.<br />

About Whitewood Encryption<br />

Systems, Inc.<br />

Whitewood® is addressing one of<br />

the most fundamental challenges<br />

associated with all modern cryptosystems<br />

– entropy management.<br />

Whitewood’s products exploit<br />

quantum mechanics to meet demand<br />

for high-quality entropy used<br />

for random data and key generation<br />

at scale. Building upon a base<br />

of quantum cryptography capabilities<br />

developed over the course of<br />

the past two decades at Los Alamos<br />

National Laboratory, Whitewood<br />

addresses operational vulnerabilities<br />

in any application that employs<br />

encryption, certificates and keys in<br />

clouds, devices and browsers. More<br />

information on Whitewood can be<br />

found at: www.whitewoodencryption.com.<br />

About Los Alamos National<br />

Laboratory (www.lanl.gov)<br />

Los Alamos National Laboratory, a<br />

multidisciplinary research institution<br />

engaged in strategic science<br />

on behalf of national security, is<br />

operated by Los Alamos National<br />

Security, LLC, a team composed of<br />

Bechtel National, the University of<br />

California, BWX Technologies, Inc.<br />

and URS Corporation for the Department<br />

of Energy’s National Nuclear<br />

Security Administration. Los<br />

Alamos enhances national security<br />

by ensuring the safety and reliability<br />

of the U.S. nuclear stockpile, developing<br />

technologies to reduce threats<br />

from weapons of mass destruction,<br />

and solving problems related to energy,<br />

environment, infrastructure,<br />

health and global security concerns.<br />

About Allied Minds<br />

52<br />

Intelsat General and L-3 Communication<br />

Systems-West demonstrate<br />

automatic beam switching<br />

Continued from page 14<br />

Allied Minds is an innovative U.S.<br />

science and technology developers,<br />

president of L-3 Communication<br />

Systems-West. “These results mark<br />

an important milestone in providing<br />

our customers the ability to modernize<br />

their existing assets within today’s<br />

fiscally constrained defense budget<br />

environment.”<br />

“This demonstration proves that<br />

modems using beam-switching<br />

technology will support UAS operations<br />

at very high data rates on highthroughput<br />

satellites,” said Skot Butler,<br />

vice president, Satellite Networks<br />

& Space Services at Intelsat General.<br />

“This capability is an important step<br />

in the evolution of satellite communications<br />

for these critical platforms.<br />

ment and commercialization company.<br />

Operating since 2006, Allied<br />

Minds forms, funds, manages and<br />

builds products and businesses<br />

based on innovative technologies<br />

developed at leading U.S. universities<br />

and federal research institutions.<br />

Allied Minds serves as a<br />

diversified holding company that<br />

supports its businesses and product<br />

development with capital, central<br />

management and shared services.<br />

More information about the Bostonbased<br />

company can be found at www.<br />

alliedminds.com.


Intelsat’s EpicNG also provides inherent<br />

protection from signal jamming<br />

and greater throughput for full-motion<br />

video and other bandwidth-hungry<br />

payloads.”<br />

Following this successful demonstration,<br />

Intelsat General and L-3<br />

CS-West plan to conduct further tests<br />

with user platforms employing the<br />

recently launched Intelsat EpicNG IS-<br />

29 satellite.<br />

Intelsat EpicNG is a high performance,<br />

next generation satellite<br />

platform that delivers global highthroughput<br />

technology via an innovative<br />

approach to satellite and network<br />

architecture utilizing C-, Ku- and<br />

Ka-bands, wide beams, spot beams,<br />

and frequency reuse technology to<br />

provide a host of customer-centric<br />

benefits. The Intelsat EpicNG series<br />

digital payload will be instrumental<br />

in allowing flexible and efficient use<br />

of spectrum, resulting in a dramatic<br />

increase in the amount of throughput<br />

delivered on these satellites. Intelsat<br />

EpicNG is based on open architecture<br />

and engineered for backwards compatibility,<br />

allowing broadband, media,<br />

mobility and government organizations<br />

to realize the cost-efficiency<br />

of using existing hardware. At the<br />

same time, increased control means<br />

these organizations can build on their<br />

success by offering their end-users<br />

customized, differentiated solutions<br />

— even defining such service characteristics<br />

as speed, hardware and network<br />

topology.<br />

See the demo video here.<br />

About Intelsat General Corp.<br />

Intelsat General provides satellite<br />

communications solutions to military,<br />

commercial and government<br />

customers over Intelsat’s fleet of approximately<br />

50 satellites and a global<br />

terrestrial network of teleports and<br />

fiber infrastructure. Intelsat General<br />

also offers these customers the option<br />

of placing a dedicated hosted<br />

communications payload aboard an<br />

Intelsat satellite. From remote military<br />

outposts, disaster recovery sites<br />

and U.S. embassies to health and<br />

homeland security agencies, Intelsat<br />

General’s solutions support even the<br />

most complex operations, from routine<br />

to mission-critical, anywhere on<br />

the globe. These solutions address<br />

the numerous communications challenges<br />

inherent in a wide range of applications.<br />

From Airborne ISR/UAV<br />

scenarios to Distance Learning to<br />

Logistics, Intelsat General engineers<br />

can enhance government, military<br />

and commercial communications to<br />

allow customers to achieve their mission<br />

objectives. www.intelsatgeneral.<br />

com<br />

About Intelsat<br />

Intelsat S.A. (NYSE: I) operates the<br />

world’s first Globalized Network, delivering<br />

high-quality, cost-effective<br />

video and broadband services anywhere<br />

in the world. Intelsat’s Globalized<br />

Network combines the world’s<br />

largest satellite backbone with terrestrial<br />

infrastructure, managed<br />

services and an open, interoperable<br />

53<br />

architecture to enable customers to<br />

drive revenue and reach through a<br />

new generation of network services.<br />

Thousands of organizations serving<br />

billions of people worldwide rely on<br />

Intelsat to provide ubiquitous broadband<br />

connectivity, multi-format video<br />

broadcasting, secure satellite communications<br />

and seamless mobility<br />

services. The end result is an entirely<br />

new world, one that allows us to envision<br />

the impossible, connect without<br />

boundaries and transform the ways in<br />

which we live. For more information,<br />

visit www.intelsat.com.<br />

About L-3 Communication<br />

Systems-West<br />

L-3 Communication Systems-West<br />

(L-3 CS-West) is a leader in communications<br />

systems for high-performance<br />

intelligence collection,<br />

imagery processing and satellite communications<br />

for the DoD and other<br />

government agencies. The company<br />

provides high data rate, wideband,<br />

protected, real-time communications<br />

systems for surveillance, reconnaissance<br />

and other airborne intelligence<br />

collection systems. To learn<br />

more about L-3 CS-West, please visit<br />

the company’s website at www.L-3com.<br />

com/csw.


Marrying mobility and location<br />

data for effective disaster response<br />

Continued from page 11<br />

gatherings, officials can draw from<br />

lessons learned in other locales.<br />

A second inventory, of resources,<br />

should go beyond the number of<br />

vehicles, responders and facilities to<br />

include participation by an enlightened<br />

public and an understanding<br />

that the list of agencies involved<br />

grows longer.<br />

Combining those inventories<br />

should generate programs and test<br />

scenarios to determine their validity<br />

and shortcomings. Using those<br />

programs and test scenarios, which<br />

are part every emergency response<br />

system, officials individually or in<br />

concert with others in the region<br />

should take on the responsibility of<br />

engaging with industry to find the<br />

gaps between the two inventories<br />

and build solutions to bridge those<br />

gaps.<br />

Waiting for a vendor to knock<br />

on a door isn’t enough. Emergency<br />

response planners need to be proactive<br />

in learning what is available.<br />

The answers are there. Planners just<br />

need to ask the questions.<br />

In many cases, solutions involve<br />

making sure that public involvement<br />

is encouraged through intuitive<br />

interaction. Those mobile device<br />

contributors by and large aren’t<br />

GIS trained and don’t care to be.<br />

They just want the wherewithal to<br />

help get data that decision-makers<br />

can use to solve a problem.<br />

In most cases, solutions are specific<br />

to unique problems of a city<br />

or state or geographic region. With<br />

disaster relief, there is no one-sizefits-all.<br />

People just want the right response<br />

at the right place at the right<br />

time.<br />

Disaster relief can and should<br />

work this way: adapting and responding<br />

to evolving requirements<br />

with emerging solutions that marry<br />

mobility and data sharing in a way<br />

that allows both to cope with everchanging<br />

needs generated by disasters.<br />

These are the real lessons of Katrina,<br />

of Haiti and Japan and elsewhere,<br />

and to Paris and San Bernardino.<br />

They are lessons that, once<br />

learned, can help responders to be<br />

better ready for the next emergency.<br />

Scott Lee is director of federal sales<br />

for TerraGo Technologies. For more<br />

information, visit: http://www.terragotech.com/<br />

54<br />

Nativists line up in support of<br />

Trump’s Presidential campaign<br />

Continued from page 41<br />

this isn’t a campaign, this is a movement.”<br />

Former Arizona governor Jan<br />

Brewer opines that:<br />

“A nation without borders is like<br />

a house without walls–it collapses.<br />

As Arizona’s Governor, I witnessed<br />

too much heartache, loss and suffering<br />

caused by illegal immigration.<br />

For years I pleaded with the federal<br />

government to do their job and secure<br />

our border. Today, we can elect<br />

a President who will do just that—<br />

Donald J. Trump.”<br />

And Kris Kobach, the Kansas<br />

secretary of state who crafted antiimmigrant<br />

laws in Arizona and Alabama,<br />

declares that:<br />

“Now, more than ever, America<br />

needs Mr. Trump’s aggressive approach<br />

to the problem of illegal<br />

immigration. Our porous borders<br />

constitute a huge national security<br />

threat, and our refugee system has<br />

been abused by terrorists in the past<br />

and is likely to be abused by ISIS<br />

terrorists today. Moreover, there are<br />

too many Americans who are out<br />

of work because of illegal immigration.”<br />

It should be noted that mass deportation<br />

is just one element of<br />

Trump’s immigration platform that<br />

nativists find so appealing. There is<br />

also the plan to build a wall along


the entire U.S.-Mexico border (and<br />

somehow making the Mexican government<br />

pay for it). And there is<br />

the proposed banning of all Muslim<br />

immigration to the United States.<br />

These and the other immigrationrelated<br />

proposals of the Trump<br />

campaign are as impractical as they<br />

are inhumane.<br />

Moreover, they take no account<br />

of the economic damage that policies<br />

of this kind would inflict upon<br />

the United States. Consider just the<br />

mass deportation plan. According<br />

to the conservative American Action<br />

Forum:<br />

“… it will cost $100-$300 billion<br />

to implement, and require a minimum<br />

of 17,296 chartered flights<br />

and 30,701 chartered bus trips each<br />

year. Additionally, the federal government<br />

would need to increase<br />

federal immigration apprehension<br />

personnel from 4,844 to 90,582; increase<br />

immigration courts from 58<br />

to 1,316; and increase the number<br />

of federal attorneys from 1,430 to<br />

32,445. Lastly, AAF also found that<br />

the proposal would slow U.S. economic<br />

growth by $1 trillion.”<br />

Leaving aside the sheer inhumanity<br />

of the proposal, this is an economic<br />

disaster waiting to happen.<br />

It’s not exactly the kind of policy<br />

prescription you’d expect from a<br />

businessman.<br />

Xenophobic immigration policy<br />

would wreck the U.S. Economy<br />

Continued from page 43<br />

the economic damage wrought by<br />

the expulsion of millions of people<br />

from the country would be massive<br />

and would ripple through a wide<br />

range of industries. As a January 11<br />

story in Politico describes:<br />

“If 11 million immigrants were<br />

rounded up and removed from the<br />

country, many of the jobs they do —<br />

including restaurant, hotel and lowend<br />

construction work — could<br />

go largely unfilled, economists say.<br />

That would create a large and immediate<br />

hit to gross domestic product<br />

growth and the effects would<br />

ripple out to companies that supply<br />

goods and services to all those businesses.<br />

There would also be 11 million<br />

fewer people consuming goods<br />

and services, further driving down<br />

economic activity.”<br />

According to a 2015 report from<br />

the conservative American Action<br />

Forum, the effort to actually remove<br />

that many people from the United<br />

States, and prevent any new unauthorized<br />

immigrants from coming<br />

in their place, would be enormous:<br />

“Depending on how the government<br />

conducts its apprehensions, it<br />

would need to spend $100 billion to<br />

$300 billion arresting and removing<br />

all undocumented immigrants residing<br />

in the country, a process that<br />

55<br />

we estimate would take 20 years. In<br />

addition, to prevent any new undocumented<br />

immigrants going forward,<br />

the government would at a<br />

minimum have to maintain current<br />

immigration enforcement levels.<br />

This results in an additional $315<br />

billion in continuing enforcement<br />

costs over that time period.”<br />

On top of that would be the<br />

broader economic impact of losing<br />

so many workers and consumers:<br />

“Removing all undocumented<br />

immigrants would cause the labor<br />

force to shrink by 6.4 percent, which<br />

translates to a loss of 11 million<br />

workers. As a result, 20 years from<br />

now the economy would be nearly 6<br />

percent or $1.6 trillion smaller than<br />

it would be if the government did<br />

not remove all undocumented immigrants.<br />

While this impact would<br />

be found throughout the economy,<br />

the agriculture, construction, retail<br />

and hospitality sectors would be especially<br />

strongly affected.”<br />

Building and maintaining an ineffective<br />

border wall will waste tens of<br />

billions of dollars. Mass deportation<br />

will result in a smaller labor force,<br />

declining levels of consumer spending,<br />

and a diminished GDP. This is<br />

a recipe for economic catastrophe.<br />

And this is what the Trump/Cruz<br />

approach to immigration heralds<br />

for the United States.


Coming Attractions – <strong>2016</strong><br />

April <strong>Digital</strong><br />

Technology Focus:<br />

Video Surveillance<br />

Market Focus:<br />

Maritime/Coastal<br />

Port Security<br />

Plus<br />

Guest Cyber Expert<br />

May <strong>Digital</strong><br />

Technology Focus:<br />

Satellite Communications<br />

Market Focus:<br />

Law Enforcement/<br />

Public Safety<br />

Plus Education Profile<br />

June <strong>Digital</strong><br />

Technology Focus:<br />

Disaster Preparation<br />

And Response<br />

Market Focus:<br />

City/State/County/<br />

Municipal Security<br />

Plus<br />

Guest Cyber Expert<br />

July Print<br />

Technology Focus:<br />

Perimeter Protection/<br />

Intrusion Detection<br />

Market Focus:<br />

Airport/Aviation<br />

Security<br />

Plus<br />

Facility Security Expert<br />

For <strong>GSN</strong> Media Kit or Advertising Rates,<br />

contact Publisher Mike Madsen<br />

at 732-233-8119<br />

or by email at<br />

mmadsen@gsnmagazine.com<br />

56


The News Leader in Physical, IT and Homeland Security<br />

CEO/Editorial Director:<br />

Adrian Courtenay<br />

(O) 212-344-0759, X3<br />

(C) 917-696-5782<br />

acourtenay@gsnmagazine.com<br />

Publisher:<br />

Michael Madsen<br />

(O) 212-344-0759, X1<br />

(C) 732-233-8119<br />

mmadsen@gsnmagazine.com<br />

Senior Writer:<br />

Steve Bittenbender<br />

(C) 502-552-1450<br />

sbittenbender@gsnmagazine.com<br />

Senior Writer:<br />

Karen Ferrick-Roman<br />

(C) 412-671-1456<br />

karenferrickroman@gmail.com<br />

Columnist:<br />

John Convy<br />

Convy on Netcentric Security<br />

john@convyassociates.com<br />

Columnist:<br />

Shawn Campbell<br />

shawn.campbell@safenetat.com<br />

Columnist:<br />

George Lane<br />

georgelane@hotmail.com<br />

Art Director:<br />

Gerry O’Hara<br />

OHDesign3<br />

(C) 203-249-0626<br />

gerry@ohd3.com<br />

Production Director:<br />

Tammy Waitt<br />

(O) 732-233-0245<br />

twaitt@gsnmagazine.com<br />

Mailing Address:<br />

Government Security News<br />

P.O. Box 7608<br />

Greenwich, CT 06836<br />

Government Security News (ISSN 1548-940X and UPS 022-845) is published in six print editions (Jan, Mar, May, Jul, Sep, Nov) and<br />

six digital editions (Feb, Apr, Jun, Aug, Oct, Dec) per year by World Business Media, LLC, P.O. Box 7608, Greenwich, CT 06836.<br />

Telephone (212) 344-0759. Periodicals postage paid at New York, NY and additional mailing offices. POSTMASTER: Send address<br />

changes to <strong>GSN</strong>: Government Security News, Subscription Department, P.O. Box 316, Congers, NY 10920-0316. For Government<br />

decision makers and business executives involved with security products, systems and series. Qualified U.S. subscribers received<br />

<strong>GSN</strong>: Government Security News at no charge. Non-qualified subscribers in the U.S. are charged $75.00 per year. Canadian and<br />

foreign subscribers are charged $140 International Airmail. Copyright <strong>2016</strong> by <strong>GSN</strong>: Government Security News. All rights reserved.<br />

Printed in the U.S.A. <strong>GSN</strong>: Government Security News assumes resonsibility for validity of claims in items reported.<br />

57

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!