Government Security News August Digital Edition


Government Security News


Smart-mapping leader Esri releases robust collection of Web maps that forecast

data into vivid stream-flow throughout the continental U.S. – Page 4

Also in this issue:

GSN Airport, Seaport, Border Security Awards Program: Telos Corp wins “Best Biometric Identification/

Authentication” – Page 12

HID Global releases mid-year update in secure identity trends – Page 24

Forescout describes security challenges in handling both Republican and Democratic National

Conventions – Page 28

3M’s Peter Smallridge discusses EU/US border security practices and need for improvement in border

security management – Page 39

GSN August 2016 Digital














Smart-mapping leader Esri releases robust

collection of Web maps that forecast data into

vivid stream-flow throughout the continental U.S.

IntraLogic Solutions to announce first ever

National Common Operating Picture (COP) platform for first

responders allowing immediate 9-1-1 notification

Senators Grassley/Leahy, press federal investigators on breach of

Democratic National Committee

Cypherpath, Quali partnership provides portable containerized

infrastructures that support virtual sand boxes and cyber ranges

GSN Airport, Seaport, Border Security Awards Program: Telos Corp

wins “Best Biometric Identification/Authentication”

Cellebrite introduces UFED Touch2 platform for

standalone mobile Forensic solutions

Controp’s airborne EO/IR Surveillance

Camera payload protects Olympic games

ECN acquires MIR3, extends SaaS-based unified critical

communications platform to enterprise clients

Climate Change – This is what it’s going to look

like! A dispatch from Baton Rouge from

George Lane, GSN Columnist

Convy on Net-Centric Security – Securing the Internet of Things

HID Global releases mid-year update on top trends for secure identity

Forescout describes security challenges of handling both Republication

and Democratic National Conventions


Edition Table of Contents


SPECIAL REPORT: Border Security/Immigration




Why the Department of Homeland Security should

also end private prison contracts

Donald Trump’s shortsighted immigration plans

won’t secure the homeland

Government sued for withholding records on

immigration raids





Court order release of graphic photos of Arizona

Border Patrol detection facilities

3M’s new ALPR software extends reach,

delivers real-time actionable intelligence

DevMynd obtains strategic investment

from Motorola Solutions

Albuquerque police fight violence with

intelligence-led policing

SPECIAL REPORT: Access Control/Biometric ID


3M’s Peter Smallridge discusses EU/US border

security practices and need for improvement in

border security management


LBsecure promotes best-of-class granular

and layered security solutions for its clients

within SAP


New Esri Maps NOAA’s National Model forecast

data into vivid pictures of U.S. river flows

REDLANDS, CA—August 25, 2016

—Smart-mapping leader Esri today

released a beautiful, robust new

collection of Web maps that forecast

NOAA stream-flow data throughout

the continental U.S.

Esri’s multiscale visualization

of the National Water

Model enables forecast water

flows in real time at high

resolution. The maps weave

together NOAA’s recently released

water model data and

Esri ArcGIS functionality to

provide interactive views of current

and future water-system behaviors.

Esri maps the flow of water along

2.7 million stream segments in the

U.S. river network. These data-rich

maps improve NOAA’s ability to

meet the needs of emergency responders,

reservoir operators, ecosystem

professionals, and floodplain

managers by providing detailed information

that can anticipate flood

and drought conditions. National

Weather Service data populates the

interactive maps with hourly updates

and forecasts up to 10 days.

“In collaboration with our academic

partners, the Esri team supported

the development process

leading up to the launch of the National

Water Model,” said Edward

Clark, director of geointelligence at

NOAA. “We share a common vision

for the value that high-resolution

water prediction brings to the nation.”

Esri’s new maps enable users to

access large amounts of complex

data quickly and easily. Although

10-day, mid-range forecasts contain

more than 200 million records and

short-term forecasts require hourly

data refresh, Esri maps automatically

integrate and synthesize NOAA

data so that users have the real-time

information they need at the click of

a button.

“These attractive, accessible maps

are part of our commitment to improve

water awareness—a commitment

we made at the White House

Water Summit earlier this year,” said

Esri President Jack Dangermond.

“ArcGIS provides a visually engaging

way to communicate complex

scientific information simply so that


anyone can understand it.”

Esri plans to continue its investment

in water prediction and analysis

by releasing an open-source

toolkit later this year that will enable

ArcGIS users to analyze

data and create custom maps

from water model records.

About Esri

Since 1969, Esri has been

giving customers around the

world the power to think

and plan geographically. The

market leader in GIS technology,

Esri software is used in more than

300,000 organizations worldwide

including each of the 200 largest

cities in the United States, most

national governments, more than

two-thirds of Fortune 500 companies,

and more than 7,000 colleges

and universities. Esri applications,

running on more than one million

desktops and thousands of Web

and enterprise servers, provide the

backbone for the world’s mapping

and spatial analysis. Esri is the only

vendor that provides complete

technical solutions for desktop, mobile,

server, and Internet platforms.

Visit us at

IntraLogic Solutions to announce first ever National

Common Operating Picture (COP) platform for first

responders allowing immediate 9-1-1 notification

As recently reported by Government

Security News, Intralogic Solutions,

Inc. a leading global school security,

and government developer and integrator,

and Rave Mobile Safety, a

respected creator of innovative public

safety and communication software

have announced a partnership

to develop an integrated service offering

that will benefit both schools

and first responders during crisis

situations, including ones involving

active shooters.

According to the partners, the new

solution combines Rave’s Panic Button

application and 9-1-1 data delivery

capabilities with robust video

surveillance, interactive rich digital

floor plans, One Button Lockdown

and access control technology. The

combined solution will allow

first responders full access

to critical information

about a situation from any

location, including while

en route via a secure, mobile

broadband connection.

In an August 10 interview

with Intralogic CEO Lee

Mandel, GSN learned that the integrated

technologies offer a unique

Lee Mandel,

Intralogic CEO

technological breakthrough experience

that no other company is presently

offering. Rather than the traditional

9-1-1 process to call police,

the new, integrated technology

can send critical information

within milliseconds

to a 9-1-1 call center.

“When someone hits the

panic button in a school,

the 9-1-1 center is immediately

activated giving

operators full command

and control to help find the shooter

while the first responders are still in


View the video

transit. They can then remotely open

the doors and guide the responders

to exactly where the shooter is,” said

Mandel. “No one else on a national

level is offering this comprehensive

solution. Additionally the panic button

can initiate a lockdown which

will, locks all the doors automatically,

flash strobe lights, send text

messages to parents, teachers, and

students, and take over all computer

screens while playing a pre-recorded

message over the P.A. system.”

Mandel indicated that the technology

is a first of its kind agnos-

tic platform that allows integration

from any manufacturer. IntraLogic

considers this an advanced PSIM


Mandel and his company have

been getting a lot of attention from

major companies in the field who

understand that clients have never

been able to customize in this manner,

“with one common operating


Founded by Mandel in 2004, IntraLogic

focused mainly on software

development in its early years,

working for a lot of businesses on

Long Island, NY and other nearby

states. The turning point, said Mandel,

was when the company got on

its first government contract which

enables any government agency to

purchase products from pre-bid,

published lists. Currently, the company

serves over 160 School Districts

nationally including 49 of

the 57 districts in Nassau County,

30 in Suffolk County and over 80

throughout Upstate New York, New

Jersey, Connecticut, Florida, and

across the United States.

IntraLogic’s overall list of clients

include schools, townships, municipalities,

as well as a contract with the

MTA Long Island Railroad, which

buys its Cameras, Fire Alarms, Burglar

Alarms and Command Centers.

On the private side, the company

works with some very well

known National Retail chains with

hundreds of locations throughout

the U.S. and overseas.

As impressive as these entrepreneurial

accomplishments may

seem, Mandel made it clear to GSN

that another major breakthrough is

going to be announced in early September,

although he is not at liberty

to announce who this major client is

– except to assure us that the pending

client is a very significant organization.

“We’ve been working with our clients

as an integrator, manufacturer,

and software developer. Our goal is

to offer a one stop shop for our clients

and partners.”

“With our new Common Operating

Picture we can now take all

school districts, malls, schools, hospitals,

municipalities, villages and

other critical assets and tie them to

a centralized platform. We can go

to any government agency around

the world and create this without

replacing their existing technology.

It’s the first of its kind agnostic

platform that allows us to integrate

technology from any manufacturer.”

Along with many readers, GSN is

eager to learn more about this exciting

new platform, and how it will

enhance technology and security

around the globe!


Senators Grassley, Leahy press federal investigators on

breach of Democratic National Committee


The Honorable Loretta Lynch

Attorney General

U.S. Department of Justice

950 Pennsylvania Avenue, NW

Washington, DC 20530

The Honorable James B. Comey, Jr.


Federal Bureau of Investigation

935 Pennsylvania Avenue, NW

Washington, DC 20535

Dear Attorney General Lynch and

Director Comey:

We are writing in regard to the recent

cyberattacks on American political

organizations. Yesterday the

FBI confirmed that it is investigating

the recent hack of the Democratic

National Committee (DNC). We are

writing to request more specific information

about the efforts that the

National Cyber Investigative Joint

Task Force (NCIJTF) and other elements

of the FBI and Justice Department

are undertaking in order

to counter these types of attacks and

bring the perpetrators to justice.

On June 14, 2016, the Washington

Post reported that Russian government

hackers had successfully penetrated

the computer network of the

Democratic National Committee,

gaining access to DNC databases

and email. [1] According to the article,

DNC officials noticed unusual

network activity and hired Crowd-

Strike, a cybersecurity firm, to investigate.

The firm identified two

separate groups of hackers who had

penetrated the DNC network, both

of which it determined were working

for the Russian government. Immediately

after the Washington Post

report, a purported hacker calling

himself “Guccifer 2.0” claimed responsibility

for the hack, and further

claimed to be a lone Romanian

hacker. [2] The Russian government

also denied its involvement. [3] However,

evidence appears to undermine

the Romanian hacker’s claim of responsibility

and instead suggests

the Russian government’s involvement.

[4] The hackers subsequently

publicly released what appears to be

the DNC’s opposition research on

Donald Trump in June. [5] Last week,

WikiLeaks released roughly 20,000

of the hacked DNC emails that the

hackers had provided to it. [6]

It is not unusual for a nation’s intelligence

services to obtain sensitive

information from other nations’

political entities. Not only

has James Clapper, the Director of


Senator Grassley

Senator Leahy

National Intelligence, stated that the

government has indications of cyberattacks

on the 2016 presidential

campaigns, the government has also

reported that foreign hackers targeted

the networks of the Romney

and Obama campaigns in 2012, and

that Chinese hackers compromised

the networks of the Obama and Mc-

Cain campaigns in 2008. [7]

However, when a foreign intelligence

service not only spies on

American political organizations,

which is bad enough, but then selectively

publishes the obtained

information in what appear to be

attempts to affect our democratic

process, it is substantially more troubling.

The integrity of the democratic

process is essential to the social

contract on which our republic is

formed. If foreign intelligence agencies

are attempting to undermine

that process, the U.S. government

should treat such efforts even more

seriously than standard espionage.

These types of cyberattacks are significant

and pernicious crimes. Our

government must do all that it can

to stop such attacks and to seek justice

for the attacks that have already


We were pleased to see that the

FBI has stated that it is investigating

this situation. We are writing to

request more information on this

cyberattack in particular and more

information in general on how the

Justice Department, FBI, and NCI-

JTF attempt to prevent and punish

these types of cyberattacks. Accordingly,

please respond to the following

by August 9, 2016:

1. When did the Department of Justice,

FBI, and NCIJTF first learn

of the DNC hack? Was the government

aware of the intrusion

prior to the media reporting it?

2. Has the FBI deployed its Cyber

Action Team to determine who

hacked the DNC?

3. Has the FBI determined whether

the Russian government, or any

other foreign government, was

involved in the hack?

4. In general, what actions, if any, do

the Justice Department, FBI, and

NCIJTF take to prevent cyberattacks

on non-governmental political

organizations in the U.S.,

such as campaigns and political

parties? Does the government

consult or otherwise communicate

with the organizations to

inform them of potential threats,

relay best practices, or inform

them of detected cyber intrusions?

5. Does the Justice Department believe

that existing statutes provide

an adequate basis for addressing

hacking crimes of this nature, in

which foreign governments hack

seemingly in order to affect our

electoral processes?

In addition to the questions listed

above, we also request that the Justice

Department, FBI, and/or NCI-

JTF arrange a briefing on these issues

for Committee staff by August

16, 2016. If possible, we also request

that the briefing include a staff tour

of NCIJTF’s facilities. Thank you

for your attention to this important

matter. If you have any questions,

please contact Patrick Davis of the

Committee Staff at (202) 224-5225

or [redacted].


Charles E. Grassley


Senate Committee on the Judiciary

Patrick Leahy

Ranking Member

Senate Committee on the Judiciary


cc: The Honorable Donald Freese

Director National Cyber

Investigative Joint Task Force

cc: The Honorable John P. Carlin

Assistant Attorney General

National Security Division

Department of Justice

cc: The Honorable James C. Trainor, Jr.

Assistant Director

Cyber Division

Federal Bureau of Investigation

[1] Ellen Nakashima, Russian Government Hackers

Penetrated DNC, Stole Opposition Research On

Trump,The Washington Post, June 14, 2016.

[2] Lorenzo Franceschi-Bicchierai, ‘Guccifer 2.0’ Is

Likely A Russian Government Attempt To Cover Up

Their Own Hack, Motherboard, June 16, 2016.

[3] Andrew Roth, Russia Denies DNC Hack And Says

Maybe Someone ‘Forgot The Password,’ The Washington

Post, June 15, 2016.

[4] E.g., Dmitri Alperovitch, Bears In The Midst:

Intrusion Into The Democratic National Committee,

CrowdStrike, June 15, 2016; Lorenzo Franceshi-

Bicchierai, We Spoke to DNC Hacker ‘Guccifer 2.0,’

Motherboard, June 21, 2016; Eli Lake, Cybersecurity

Experts Say Russia Hacked The Democrats, Bloomberg,

July 25, 2016; Thomas Rid, All Signs Point To

Russia Being Behind The DNC Hack, Motherboard,

July 25, 2016; Evan Perez, Russians Suspected Of

Hacking Democratic National Committee Emails,

CNN, July 25, 2016.

[5] Caitlin Yilek, Stolen DNC Files On Trump Leaked,

The Hill, June 15, 2016.

[6] Andrea Peterson, Wikileaks Post Nearly 20,000

Hacked DNC Emails Online, The Washington Post,

July 22, 2016.

[7] Ellen Nakashima, National Intelligence Director:

Hackers Have Targeted 2016 Presidential Campaigns,

The Washington Post, May 18, 2016.

Cypherpath, Quali partnership provides portable

containerized infrastructures that support virtual

sandboxes and cyber ranges

SANTA CLARA, CA, Aug. 23, 2016

– Quali, the leading Cloud Sandbox

software platform for DevOps

automation, and Cypherpath, the

leader in on-demand containerized

infrastructure solutions, today

announced the integration of

the Cypherpath Virtual Container

Platform (VCP) with the Quali

CloudShell solution. Through this

partnership, joint customers are

using on-demand containerized

infrastructures to create and manage

cyber ranges and private cloud

sandboxes. Through full infrastructure

and IT environment virtualization,

customers are saving millions

of dollars in costs associated with

creating, delivering and managing

the full stack of physical compute,

network and storage resources in

highly secure containers.

A cyber range, or cloud sandbox,

gives enterprises the ability to rapidly

reconfigure IT environments

for use by individuals and teams

to conduct offensive and defensive

cyber-mission rehearsal training,

tool-specific training, software

evaluation, and configuration testing.

Most organizations lack the

budget and manpower resources

required to deploy large scale, nonproduction

cyber environments

using existing enterprise tools and

many solutions available to them

do not include the ability to rapidly

change, add, modify and control the


By leveraging the partnership,

value added reseller (VAR) TSI was

able to provide ManTech International

Corporation the technology

needed to give DISA a fully virtualized

lab infrastructure, complete

with integrated virtual sandboxing

and cyber range capabilities. With

this full stack, DISA is able to use

the lab to develop, test and run infrastructure

in private clouds or

bare-metal servers without requiring

the agency to adopt proprietary

tools, saving both time and money.


“DISA is responsible for supporting

a critical element of our national

defense strategy, which is the sharing

of information between joint

warfighters, national leaders, and

other mission and coalition partners,”

said Ernest McCaleb, Man-

Tech technical director and DISA

Cyber Security Range chief architect.

“This fast, simple and cost effective

solution provides us with the

ability to fulfill our mission without

sacrificing performance or security,

and deliver the Multiprotocol Label

Switching stack at a fraction of the


Through this partnership, joint

customers can:

• Use on-demand infrastructure

to support private cloud sandboxes

in mission ready cyber ranges

• Define, deploy and manage fully

containerized IT infrastructure ondemand

while providing the agility

to share and collaborate between

nodes, networks, bare-metal servers

and private clouds

• Significantly reduce investment

in new physical data center resources

and technologies by virtualizing

More on page 42

New generation.

New possibilities.

Secure your site with the new F3 Series Fence

Controllers, the latest in perimeter protection.

Find out more at

Winners’ Portraits: GSN 2016 Airport, Seaport, Border Security Awa

Telos Corporation:

2016 Winner, Best Biometric

Identification/Authentication Solution

By Chuck Brooks, 2016 Lead Judge

It was an honor to judge the recent

GSN 2016 Airport, Seaport, Border

Security Awards Program and

review a wide array of exceptional

security technology submissions.

I’m very pleased to be discussing

the Telos winning entry with Renate

Neely, Marketing Director of Telos

Corporation, and Dawn E. Lucini,

Director of Aviation Security, Telos

Identity Management Solutions.

I have been aware of the important

work of Telos Corporation dating

back to the years when I covered

national security issues working

for the late Senator Arlen Specter

on The Hill. As the digital world

has involved operationally over the

past decade, so has the vulnerability

of maintaining security for people,

systems and information.

Brooks: In the defense, homeland,

and intel communities Telos is

highly regarded for the generic category

of “secure communications”

and we know that your solution is

advanced, efficient and certainly

has the confidence of some of the

most important government agencies

in the security arena. Can you

elaborate on your background in

government and some of the communications

areas, including mobility,

where Telos has contributed


Renate Neely: Thank you, Chuck,

for your kind words about Telos

Corporation. We do indeed have a

long history of supporting federal

government clients with solutions

for secure communications, as well

as cyber security, secure mobility,

and identity management. But if I

may, I’d like to focus our remarks

today not on Telos Corporation,

but on Telos Identity Management

Solutions LLC (Telos ID). It is this

subsidiary rather than the parent

Telos Corporation that is the star

of the GSN 2016 Airport, Seaport,

Border Security award for the Best

Biometric Identification or Authentication


Telos ID’s original claim to fame


Renate Neely,

Marketing Director

Dawn E. Lucini,

Director of

Aviation Security

is its long history of supporting the

Defense Manpower Data Center’s

(DMDC) Common Access Card

(CAC) program to provide DoD

personnel with identity-based access

to secure resources, including

communications systems, as well as

physical access to secure areas. This

has been the springboard for innovative

developments in the areas

of identity vetting and continuous

threat assessment.

Brooks: We are living in an era of

large and widespread information

security breaches. Everyone is vulnerable

and networks, including

those of government agencies (i.e.

OPM) are immune to cyber-attacks.

Risk management has become an

operational requirement for executive

management. What does Telos

do in the area of risk assessments

ds Program

for networks both in the federal and

commercial spaces?

Renate Neely: Telos Corporation

protects government and commercial

enterprises with solutions and

services for the full cyber security

lifecycle. Our offerings include independent

counsel for information

security requirements, cyber security

consulting services, and enterprise

solutions for IT risk management

and continuous compliance.

But again, let’s focus on Telos ID,

which addresses the operational

requirements of risk management

as well, focusing primarily on the

insider threat. An example is the

company’s IDVetting service, which

provides governments, schools,

medical professionals, and commercial

organizations with a complete

fingerprint background checking

solution. These customers use

IDVetting services to submit biographic

and biometric information

from employees, candidates, and

contractors to the FBI for criminal

history records checks, helping to

secure their business environment,

reduce risk and cost, and comply

with federal, state, and local laws regarding

required checks for specific

industries and roles.

Brooks: The recent terrorist attacks

against airport targets demonstrate

the need for enhanced security measures,

including screening of airport

staff, and background checks and

badging operations. The trend is for

better authentication and biometric

layering to mitigate threats. Can you

take this opportunity to highlight

the current application and futures

uses of Telos ID for transportation


Can you provide more detail about

your award winning Telos ID Designated

Aviation Channeling service

(DAC)? What are the engineering

and performance differentiators for

the aviation industry? Can you also

list Telos ID current applications

and some of your key customers as

well as future offerings?

Dawn Lucini: Airports, airlines, and

related services are required to vet

the security backgrounds of job applicants

and employees who have

access to secure areas. Telos ID is

one of only three organizations authorized

by the TSA to be a designated

aviation channeler (DAC),

meaning it is certified to collect and

send fingerprints and enrollment information

to TSA for security threat

assessments and criminal history

record checks. Telos ID’s DAC service

was the first of these third party

channeling services to be approved


for operation by the TSA, and has

continued to win the vast majority

of DAC business since its inception.

Telos ID DAC is a modular, Webbased

offering that lets airports and

air carriers select which services

they need. The solution can be customized

to specific business processes

and provide custom reporting

and information exports. The

Telos ID DAC platform can integrate

with other workforce systems

to meet additional badging, physical

security and personnel administrative

needs. Telos ID tailors the secure

Web portal, allowing security

and badging offices to perform multiple

functions on one platform.

Telos ID DAC is deployed at more

than 50 airports and airlines across

the U.S. – including BWI Thurgood

Marshall and DFW Dallas/Fort

Worth. Here is the full list of current



Vetting the backgrounds of airport

and related personnel is essential to

understanding and mitigating the

risk of bad actors gaining access to

secure areas. But doing this vetting

on a periodic basis may allow something

to slip through the cracks, a

piece of information that just might

help avoid disaster. To that end, the

More on page 42

Cellebrite introduces UFED Touch2 platform

for standalone mobile forensic solutions


2016 – Cellebrite, a leader in digital

forensic extraction, decoding and

analysis solutions, today unveiled

UFED Touch2, the latest addition

to the company’s industry-leading

UFED Series family of mobile forensic

solutions. With enhanced speed,

usability, and portability, UFED

Touch2 is a comprehensive mobile

forensic solution that allows law enforcement,

military, and intelligence

agencies to extract evidentiary data

in a forensically sound manner. The

Touch2 can extract mobile device

content up to three times faster than

the UFED Touch, enabling investigators

and examiners to accelerate


“Many of our customers prefer a

purpose-built device for extracting

and viewing digital evidence regardless

of location,” said Yossi Carmil,

Global Co-CEO, Cellebrite. “The

UFED Touch2 delivers the performance,

reliability and usability required

to allow customers to meet

their mission in the lab or field,

while simplifying the procurement

process by eliminating the need to

buy separate hardware.”

With its intuitive GUI and easyto-use

touch screen, UFED Touch2

enables physical, file system and

logical extractions of data and passwords,

including deleted data, from

the widest range of mobile devices.

UFED Touch2 is available in both

standard and ruggedized editions,

running Logical or Ultimate (logical,

file system and physical extraction)

configurations and comes with

a suite of supporting software applications,

peripherals and accessories.

UFED Touch2 delivers a range

of enhanced capabilities designed

to increase performance, usability,

and portability. Key performance

enhancements designed to reduce


extraction time include:

• 5x faster CPU than the UFED


• DDR3 memory

• Large and fast hard drive

(SSD 128GB)

• USB 3.1 phase 1 axillaries

(Up to 5Mbps)

In addition, the UFED Touch2 includes

a number of features that

simplify usage and increase flexibility:

• High-resolution (1024),

capacitive multi-touch display

with intuitive GUI

• Built-in multi-SIM Reader

• Mini Display Port

• Customized Windows 10

Finally, the Touch2 delivers new capabilities

to allow for improved portability:

• WiFi b\g\n\ac (up to 350 Mbps)

• All-inclusive field-ready

operational kit – smaller, lighter

connector tips, and external

hard drive

• Long-lasting battery

Cellebrite will continue to support

its customers using UFED Touch.

Any future announcement regarding

the end of support for the Touch

platform will be made 18 months in

advance to allow users to effectively

plan for the transition. Customers

that purchased a UFED Touch in

2016 will receive attractive offers to

trade in their device for a Touch2.

Customers that purchased a UFED

Touch after June 15, 2016 will be

able to trade in their device for a

UFED Touch2 at no cost.

About Cellebrite

Every day around the world digital

data is impacting investigations.

Making it intelligent and actionable

is what Cellebrite does best. A pioneer

of mobile data forensics since

1999 with a passion for technology

innovation, Cellebrite is uniquely

positioned to address the rapidly

evolving needs of its diverse customer

base to access, unify and defend

digital evidence of all kinds.

Together, our powerful UFED solutions

deliver the only complete, endto-end

Digital Forensics Platform

on the market. Our track record

remains unchallenged. Our results?

Proven and well documented. With

more than 40,000 UFED licenses

deployed globally in 100 countries,

we allow law enforcement, intelligence

services, border patrols, special

forces, military and the private

sector to achieve their missions

quickly and effectively.

Cellebrite is a wholly-owned subsidiary

of the Sun Corporation, a

listed Japanese company (6736/JQ)

Controp’s airborne EO/IR

Surveillance Camera payload

protects Rio Olympic games



August 2016 – CONTROP Precision

Technologies Ltd. – a company

specializing in the field of electrooptics

(EO) and

infrared (IR)

cameras for defense

and homeland

security solutions

– is proud

to announce the

use of CON-



EO/IR surveillance

payload for

the protection

of 2016 Summer

Olympics in Rio

de Janeiro, Brazil.


is installed on

board the ADB-

150 Aerostat that supports the Brazilian

Air Force security mission

and is deployed above the Olympics


The ADB-150 aerostat carrying

CONTROP’s SHAPO EO/IR surveillance

payload was launched August

9th, 2016, by Airship do Brasil,

a company of Bertolini’s Holdings,

in cooperation with the Brazilian

Air Force, in order to provide 24/7


monitoring and

public security

of the Olympics


Prior to the

start of the Rio

Olympics 2016,

the system was

deployed as part

of a surveillance

operation with

Air Force University


security systems

at Afonsos Air

Force Base in Rio

de Janeiro for the

protection of the

training center for athletes competing

in the current Olympics events.

The CONTROP SHAPO is a gyrostabilized

3-gimbal camera payload,

which was designed for surveillance

and observation on a variety of airborne

platforms including aerostats,

helicopters, fixed wing aircraft and

unmanned air vehicles. The compact

SHAPO camera payload includes

a high sensitivity color Day

Camera and a Thermal Imaging

Camera with a Continuous Optical

Zoom Lens.


can also include

an optional


Range Finder


Laser Pointer

as well as

an optional






M a r i t i m e

and Land versions

of the SHA-

PO, for installation

on patrol boats, vessels

and observation vehicles, are available

as well.

The SHAPO is used worldwide

for a variety of long-range surveillance

and observation applications

including Law Enforcement, Search

& Rescue, Homeland Security and

Defense. CONTROP’s airborne

payloads are installed on a variety

of airships and aerostats worldwide,

in order to provide public security

and safety.


Precision Technologies Ltd.

CONTROP specializes in the development

and production of Electro-Optical

and Precision Motion

Control Systems.

The company’s

specialists have

over 35 years of

experience in

EO / IR products

for Surveillance,

Defense and

Homeland Security.


main product

lines include: Automatic


Intruder Detection

Systems for

airport perimeter

surveillance, coastal

surveillance, port and

harbor security, border

surveillance, the security of sensitive

sites and ground troop security;

High performance Stabilized

Observation Payloads used for day

and night surveillance on board

UAVs, small UAVs and aerostats/

balloons, helicopters, light aircraft,

maritime patrol boats and ground

vehicles; Thermal Imaging Cameras

with high performance continuous

Zoom Lens and state-of-the-art

image enhancement features, and

more. CONTROP’s products are in


daily operational use in many of the

most critical surveillance, homeland

security and defense programs


For more information on CONTROP,

please visit the company’s website:



Monthly Digital Edition

Airport/Seaport Newsletter

Daily Insider Newsletter

GSN Media Kit


GSN’s 2016 Homeland Security Awards Program

Now Accepting Entries at:

The 2016 Government Security News Awards Program, featuring

many new categories in Cybersecurity, Physical Security, Government

Agency Innovations and Mobile Technologies will open for entries on

August 24 and will close for entries on November 15.

In good news for Winners and Finalists, GSN will be reinstating its

annual Homeland Security Awards Dinner in Washington, DC in

the first week of December, in a venue to be announced. Longtime

participants in the GSN awards programs will recall that previous

GSN Awards Dinners have featured top government, military leaders

and respected television commentators such as 4-Star General

Barry McCaffrey (Ret); Fran Townsend, Homeland Security Advisor to

George W. Bush, James Kallstrom, Assistant Director of the FBI and

Admiral Thad Allen (Ret), Commandant of the U.S. Coast Guard

who came out of retirement twice to serve his county, first in

Hurricane Katrina and later in the BP Oil Spill.

The cost of an entry for vendors is $300 per entry, but there is no

charge for government agencies or departments. All Winners

and Finalists receive Awards Emblems, and all Winners receive a

handsome, gold-trimmed plaque describing their winning entries.

All Winners and Finalists will also be invited to participate in the 2016

Digital Yearbook of Awards Winners.

To see photo gallery of previous Awards Dinners:

For information on the Awards Dinner or Sponsorships,

Contact Adrian Courtenay, Managing Partner, at, (Mobile) 917-696-5782

ECN acquires MIR3, extends SaaS-based

unified critical communications platform to

enterprise clients


2016 /PRNewswire/ – Emergency

Communications Network (ECN)

has acquired MIR3, a global Software

as a Service (SaaS) provider of

intelligent communications to business

and government clients. The

combination of ECN’s critical communications

platform and MIR3’s

growing enterprise platform brings

together two highly complementary

companies, creating an organization

uniquely qualified to meet the

fast growing demand for software

communications solutions. Financial

terms of the transaction were

not disclosed.

MIR3 provides its clients with

advanced, reliable, and flexible

software solutions that facilitate

multi-channel communication and

collaboration at scale, with use cases

designed to address the growing

complexity of the messaging landscape

and ever increasing challenges

faced by enterprises today. Clients

depend on MIR3’s software for daily

business operations, including crisis

management, IT service management,

corporate communications,

customer relations, supply chain

management, and event management.

MIR3’s clients include leading

organizations in the government, financial

services, technology, healthcare,

energy, and consumer product


“The acquisition of MIR3 accelerates

ECN’s vision to be a leader

in the unified critical communications

space serving a broad range of

clients and applications.

This transaction creates

an opportunity for ECN

to greatly scale our footprint

in the adjacent enterprise

market, as well

as introduce ECN’s Cloud

Platform as a Service

(CPaaS) offering, which

can enable enterprises to

enrich software applications

with multi-channel and realtime

communication functions. We

are excited to welcome MIR3’s clients

and partners to the ECN family,

and we look forward to continuing

to enhance the MIR3 products,”

said David DiGiacomo, President

and CEO of ECN.


David DiGiacomo,

President and CEO

As a result of this transaction,

Amir Moussavian is stepping down

from his positions as CEO and

Chairman in order to pursue new

opportunities. “I am thrilled to have

played a role in the success of MIR3,

and could not be more proud of my

colleagues, as their hard work has

allowed us to maintain the position

as a leader in the industry. With the

additional resources of ECN, MIR3

will continue to provide

the exceptional level of

service its Intelligent Notification

and TelAlert

clients have grown to expect,”

said Mr. Moussavian.

Ann Pickren, President

of MIR3 said, “Joining

forces with ECN establishes

an industry leader

in the unified critical communications

market, paving the way for

continued innovation and development

to address critical business

needs. We are excited for this opportunity

and will continue to provide

our clients with unparalleled


ECN is a portfolio company of

Veritas Capital, a private equity

firm active in the communications

space. Veritas Capital is committed

to supporting ECN in building a fast

growing, global leader in intelligent

communications and CPaaS markets.

About ECN

ECN is a leading national provider

in the SaaS-based unified critical

communications market. ECN

has pioneered high-speed notification

services capable of reaching

millions of people in minutes

through its CodeRED solution

for government clients and has applied

its mission critical capabilities

to commercial, healthcare and

other end markets. The company’s

cloud-based software communications

platform provides seamless

and easy-to-deploy solutions for

the exchange of critical information

among organizations, their people,

devices and external entities with

use cases designed to save lives, enhance

revenue and reduce costs. In

addition, ECN will empower clients

to embed solutions directly into existing

software applications to offer

a richer suite of communications.

ECN is based in Ormond Beach, FL

with additional offices in Minneapolis,

MN. More information can

be found on the company’s website at

About MIR3

MIR3 provides intelligent notification

and response software for business

operations. It offers Intelligent

Notification, a critical notification

solution for business continuity

and disaster recovery, as well as for

various business operations, such

as information technology alerting,

business continuity, or emergency

notification. In addition, it offers

TelAlert, a two-way notification

system that helps users to simplify

the administration of their network

management, help desk, and financial

processing systems by automatically

launching alerts to personnel.

The company deploys its solution in

SaaS, on-premise, and hybrid formats.

MIR3 is based in San Diego,

CA with additional offices in London,

UK, and Dubai, UAE. More information

can be found on the company’s

website at

About Veritas Capital

Veritas Capital is a leading private

equity firm that invests in companies

that provide critical products

and services, primarily technology

or technology-enabled solutions,

to government and commercial

clients worldwide including those

operating in aerospace & defense,

healthcare, technology, national security,

communications, energy and

education. Veritas Capital seeks to

create value by strategically transforming

the companies in which it

invests through organic and inorganic

means. For more information

on Veritas Capital and its current

and past investments, visit


SOURCE Emergency Communications Network


Climate Change – This is what it’s going to look like!

A dispatch from Baton Rouge from George Lane,

GSN Columnist

Thu, 2016-08-18 03:00 AM

My son was evacuated Saturday

night by boat in Lafayette, Louisiana.

The National Weather Service

(NWS) said this was a one in 500

years flood; however, there have

been 8 one in 500 year floods in this

year alone, including one in Louisiana

in March. This is what climate

change will look in Louisiana. Here

is why the disastrous flooding occurred;

1.) “Inland Tropical Depression”:

Flooding in Louisiana was fueled

by a system somewhat similar to an

inland tropical depression. Parts of

Louisiana saw more rain than some

U.S. cities have seen in the last few

years combined. Deep, tropical

moisture in combination with low

pressure near the earth’s surface and

aloft were the main ingredients that

fueled the serious flooding in Louisiana.

Simultaneously the Jet stream

dipped into North Louisiana, providing

a blocking force that kept the

tropical storm over South Louisiana.

On Friday morning, NOAA’s

Weather Prediction Center said:

“The best description of this system

is that of an inland sheared tropical



The rainfall it

produced was

very similar

to what one

would expect

from a

George Lane

slow-moving tropical depression or

storm since rainfall potential is related

to the forward speed of those

types of systems. A weather forecast

discussion from the National

Weather Service in New Orleans

Friday morning said that the moisture

content in the atmosphere was

higher than what has been observed

there during some tropical cyclones.

It was an all-time record for the area.

When that much moisture is

available in the atmosphere, thunderstorms

can produce excessive

rainfall of several inches in a single

hour, leading to astronomical totals

over time. While no one likely forecast

24+ inches of rain in southeast

Louisiana, this is the type of thing

that can happen on a very localized

scale in situations like this one.

2.) River Records Shattered by 4 to

6+ Feet: At least 8 river gauges have

set new record highs in southeast

Louisiana, exceeding the previous

record by several feet in some cases.

The most extreme of those was

in Magnolia, Louisiana, where the

Amite River crested at 58.56 feet.

This topped the old record at that

location by more than six feet set on

April 23, 1977. The Amite River in

Denham Springs hit 4.7 feet above

its previous record set in 1983 on

Sunday morning. Records there

date back to at least 1921, making

this an impressive feat. These areas

were already saturated with rain,

and could not absorb water, allowing

water to accumulate.

3.) More Rain Fell Than Los Angeles

Has Seen in More Than 3 Years:

Since the start of 2012, Los Angeles

has seen a total of 29.18 inches

of rain. In just a few days, Watson,

Louisiana, picked up two inches

more than that amount with 31.39

inches of rain during the event.

4.) Second 24+ Inch Rain Event

in Louisiana This Year: This is the

second time in a matter of months

that Louisiana has seen more than

24 inches of rain from a single event.

Almost 27 inches of rain fell southsoutheast

of Monroe, Louisiana, on

March 8-11, 2016. The official airport

reporting station in Monroe

picked up 20.66 inches of rain. Record

flooding was observed on five

river gauges in parts of the state,

also topping the previous records by

several feet.

The potential for heavy rain and

flooding will continue the next few

days as the tropical moisture expands

northward from the Gulf

Coast and interacts with a stalled

frontal boundary. Additional locally

heavy rain will impact parts

of the Gulf Coast, including southeast

Texas and Louisiana, though

amounts will not be nearly as heavy

as seen the last few days. FYI.

George Lane, a resident of Baton

Rouge, Louisiana, has 25 years of

experience in the development of

chemical security systems, conducting

research as a NASA Fellow at the

Stennis Space Center and as a NASA

Fellow. Lane was air quality SME for

the University of California at Berkeley

Center for Catastrophe Risk Management

during the BP Oil Spill. He

is currently Chemical Security SME

for the Naval Post Graduate School

Maritime Interdiction in the Center

for Network Innovation and Experimentation.


Sign-up for

Free GSN

Digital Editions


Email Newsletters

Free subscription to your selection of

GSN digital editions and daily/weekly

email newsletters. Add new selections

or opt-out of any selections at any


Monthly Digital Edition

Airport/Seaport Newsletter

Daily Insider Newsletter

GSN Media Kit


The News Leader in

Physical, IT and

Homeland Security

Convy on Net-Centric Security

Securing the Internet of Things

By John Convy, Convy Associates, Washington, DC

Most people in technology know

that the Internet of Things (IoT) is

the vast network of physical objects

and devices, vehicles, and buildings

that have been embedded with

electronics, software sensors, and

network connectivity. This enables

them to collect, exchange, and share

data with each other and with big,

analytic tools. It’s the

digital offspring of

the Internet, and it is

growing up quickly.

Connectivity is a

fundamental part of

our world, making

our stuff “smarter.”

In fact, its growth has been exponential.

According to Markets and

Marketing, Investments made in

the Internet of Things are expected

to increase from $6.89 billion per

year in 2015 to $28 billion in 2020.

Things we use every day – lighting,

cars, healthcare, parking meters,

and even our home appliances have

become smarter and more connected.

At a recent Security Industry Association

Conference, I asked three

prominent thought leaders to address

the emerging questions concerning

the Internet of Things and

its vulnerability to attack.

Chris Cressy, who leads Federal

IoT Solutions at Cisco, emphasized

the expanding value of the IoT. “IoT

is transforming businesses and business

processes, in the public sector.

Integration and interoperability

are fundamental needs that IoT

“Customers should seek out vendors that

are designing network security into their

products, and are based on well-recognized

standards, such as the NIST certification.”


can address. Integration increases

operational efficiency. Traditional

approaches to system security are

called air gap – keeping systems isolated

– but that does not work with

IoT. You have to connect systems to

get value. When you connect them,

you do introduce vulnerability, but

you can do continuous real-time

monitoring of those systems.

Cressy also outlined some key

components for IoT system architecture

for security. “At the bottom

layer is basic IT security, essentially

network segmentation with firewalls,


and VLANs.

The second

element is encryption, and lastly, we

implement more advanced capabilities,

such as real-time monitoring

and real-time threat detection. Just

as IoT is a phased implementation,

so is IoT security.”

Jeff Hill, an Enterprise


Specialist at Spectra

Logic, provided insight

on another consequence

of so much

connectivity – the

need for secure data

storage. “The IoT is driving massive

video growth because of automation

and monitoring, and that video

requires secured storage. Storage is

becoming a much larger piece of

the overall infrastructure because of

the tools that we are able to leverage

with storage, such as analytics.

We are expecting that by 2019, 3.4

Zeta Bytes of data will be transmitted

over networks in an entire year,

and security is one area where we

are seeing tremendous growth,” he


Hill believes that the best way to

store data is with hybrid clouds,

which offer more flexibility in security

and ownership in a concept he

calls, “genetic diversity.” The other

types of clouds are private clouds in

which you own the hardware and

control the security with a high-security

protocol – and public clouds,

which are extremely efficient for accessing

information, but provide no

benefits of ownership.

“When considering best practices

for IoT data, it’s important to

plan infrastructure with a growth

mindset. Genetic diversity represents

scalable technology and tiered

storage. A great example would be

Facebook, because of the volume of

their data – millions of videos and

photos. They’ve found that it’s important

not just to have it on local

storage that can be accessed quickly,

but they’ve diversified the tiers of

storage and the kinds of storage they

have, to ensure against all types of


Hill also explained that enterpriseclass

storage solutions are becoming

increasingly more affordable, which

makes securing data in the government

sector much more cost-effective

than not.

Matt Bretoi, VP of Security Sales

at Flir Systems, weighed in on how

the convergence of cyber security,

network security, and physical security

are creating new challenges.

Security manufacturers have a dichotomous

responsibility to protect

the network from the security system

and anything that migrates into

it, and to protect the security system

from the network,” he suggested.

So what can manufacturers do to

help customers protect their assets?

“Customers should seek out vendors

that are designing network security

into their products, and are

based on well-recognized standards,

such as the NIST certification. This

is a cyber security framework that

ensures that any sensitive information

such as user data is encrypted,

and that users are able to identify

third-party components. This reduces

known vulnerabilities. All

communications between the edge

devices, such as cameras or access

control card readers, should include

proper encryption, such as Transport

Layered Security. Minimally,

SSL encryption should be used,”

Bretoi said.

Bretoi also explained that combining

this strategy with robust

authentication, such as two-factor

authentication, creates a very powerful

one-two punch. It is notable

that NIST certification covers security

audits for the equipment and

penetration testing. He believes this

is critical, and that collaboration

and communication are essential

when integrating physical and cyber



“Implementing these tools should

be part of a system’s coding DNA,

as a manufacturer’s first line of defense.

The second front is deployment.

It’s imperative that integration

technicians – those people actually

installing the system – understand

cybersecurity, and employ best

practices in implementation and

maintenance,” Bretoi added. “End

users should avail themselves of all

training tools provided to them, so

that vulnerabilities can be quickly

identified and mitigated.”

The opinions of these three experts

were eye opening, and validated

that the Internet of Things is fostering

significant changes. It is not

only transforming the way we live

and work, but it is transforming the

way we think about and implement

strong security measures.

John Convy and Convy Associates

provide strategic alliance, A&E consultant,

technology ecosystem, and

lead generation programs to monetize

relationships and accelerate demand

for leading security industry

manufacturers. John is the Founder

and Managing Director of the Open

Standards Security Alliance and the

IP Security Academy, and a speaker

at many global industry events.


HID Global provides mid-year update on top

trends for secure identity

News Highlights:

• Mobility and a better user experience

continue to be the market’s

top focus areas for the year.

• Adding wearables to the device

ecosystem has elevated awareness

around the use of trusted digital

identities across increasingly connected


• The need for privacy protection,

improved mobile security, and

trust in all transactions has intensified

with growing interaction

between the identities of things

and people.

AUSTIN, TX, July 14, 2016 – HID

Global®, a worldwide leader in secure

identity solutions, today released a

mid-year update to its top 2016 security

trends, based on customer insights

into key market developments

across enterprise, healthcare, banking

and government markets. In the

first six months of the year, the company

noted continued forward movement

in market adoption of mobile

solutions and interest in the Internet

of Things, as customers place more

value on seamless environments that

require trusted digital identities with

heightened security and privacy protection.

“Customers are increasingly investing

in solutions that give them the

flexibility to incorporate new and

better capabilities that deliver a more

satisfying connected experience for

their users,” said Stefan Widing, HID

Global President and CEO. “As we

move through the middle of the year,

we are experiencing a dramatic increase

in customer demand for mobility,

a better user experience, and

connected environments. We have

also forged new partnerships with

major industry players who have the

same vision to create an extraordinary

user experience and we look forward

to unveiling more about these

partnerships as deployments progress

throughout the year.”

Following are HID Global’s midyear

updates to the trends that the

company forecasted in January:

Trend #1: “Mobilizing” security will

make it more pervasive and personalized:

a new, more secure identity

lifestyle will be built around the convenience

of ever-present mobile devices.

Computer and network logon,

driver licenses and other applications

will more seamlessly join physical

security functions on phones, tablets


and laptops. Wearables will be the

next step, and phones will also work

with RFID tags to add security and

trust to the IoT for proof-of-presence


Mid-year update: Demand for mobile

solutions continues to grow, along with

an increasing focus on security issues.

Multiple studies revealed fears about

mobile security, countered by growing

demand in for the benefits of online

and mobile functionality. The definition

of mobility is also expanding to

encompass the broader idea of “on-thego”

convenience and efficiency, where

smartphones can be used as both a credential

and a general-purpose reader

for new use cases. In a recent deployment

at the CityPoint building in London,

security guards are able use their

smartphones as NFC readers; with a

tap of their phone to RFID tags, guards

can check keys in and out and prove

presence at shift checkpoints.

Trend #2: Security will move to a

much greater focus on the user experience:

This will help close the gap

between planning and compliance,

while ensuring that security adapts

to rather than defines end-user habits

and lifestyles. Old ways of authenti-

More on page 26

cating will be replaced by more satisfying


Mid-year update: Customers continue

to want an easier, more trustworthy

way to use digital identities to access

on-the-go services and applications.

Studies repeatedly highlighted the importance

of the user experience -- the

Frost & Sullivan Asia Pacific study

ranked it among the top two most important

drivers for deploying mobile

access control over the next three years.

Biometrics continued to emerge as an

effective solution for bringing

together security and convenience

together -- this approach

is now used at four of

Brazil’s top five financial institutions

to simplify an estimated

two billion trusted ATM

transactions annually.

Trend #3: Secure, connected

identities will fuel safety and innovation

in how we work, shop and play:

The industry will enter its next new

chapter of connected identities, employing

multi-layered security strategies

that also include biometrics in

order to bind these identities to their

legitimate owners.

Mid-year update: An explosion

of trusted digital identities began ushering

in new innovation opportunities

during the first half of the year. This

trend is being fueled by a growing interest

in wearables and use of sensors

for IoT-based solutions aimed at new

use cases for employee productivity, asset

tracking, energy management and

employee safety. These developments

serve as critical points of unification

for trusted identities that make digital

interactions more personal, contextual

and valuable, and will pave the way

for innovations like building occupant

apps for the smart facility that enhance

the user experience. During 2016, financial

institutions made some of

the most visible advances on the trust

front, adopting a multi-layered approach

to addressing potential mobile

banking challenges at both the front

end (consumer devices) and the back

end (banking systems that recognize

and facilitate legitimate user requests

through mobile devices).

Trend #4: There will be more attention

on privacy in an increasingly connected

and mobile-first world: Identity

will expand beyond people and

their personal identity to the identity

of objects and their authenticity, accentuating

the need to protect personal

information across increasingly


interconnected devices, services and


Mid-year update: Gartner forecasts

that 5.5 million new “things” are getting

connected every day in 2016, increasing

the need for embedded security

and privacy technology across the

payments, transportation, industrial,

consumer and healthcare markets.

In the earlier CityPoint example, this

Security of Things” goal is achieved

by adding trust to RFID tags and to

their interactions with mobile devices.

Biometrics also continues to

play a pivotal role in privacy

protection for an increasingly

connected world, and solutions

became available in early 2016

that include intelligent encryption-enabled

and tamper-resistant

fingerprint devices to more

effectively address these challenges.

Trend #5: Security policies and best

practices will become as important

as technology advances: The industry

will sharpen its focus on not only

what to deploy, but how – from the

first U.S. mobile driver licenses to

unified credential management systems

that enable organizations to

more holistically address both facility

and information security. Rather

than focus exclusively on preventing

breaches, the industry will also adopt

best practices for controlling what

More on page 43




HID Global is leading the industry with the most robust portfolio of secure ID issuance

solutions in the world. Our FARGO® line of printers and encoders provide governments,

financial institutions and businesses of all sizes fast, efficient and reliable solutions that

are as secure as they are affordable.

You’ll call it innovation on demand. We call it, “your security connected.”


© 2016 HID Global Corporation/ASSA ABLOY AB. All rights reserved. HID, HID Global, the HID Blue Brick logo, and the Chain Design are trademarks

or registered trademarks of HID Global or its licensor(s)/supplier(s) in the US and other countries and may not be used without permission.

Forescout describes security challenges

of handling both Republican and Democratic

National Conventions

By Katherine Gronberg,

VP Government Affairs

Inside RNC/DNC Convention

Networks - Cybersecurity Challenges

ForeScout had the honor of providing

information security support

for the Republican National Convention

(RNC) and the Democratic

National Convention (DNC). These

were challenging environments

as the networks were created and

configured in a short time-span,

they were more “IP-enabled” than

any conventions in history and, of

course, they were extremely high

profile. But the lessons learned in

Cleveland and Philadelphia are relevant

to almost any complex network,

including large commercial

and government networks. It helped

us to think about the conventions’

networks in terms of buckets.

Segmentation, Segmentation,


Probably the biggest challenge in securing

events like the conventions is

that there are SO MANY ad hoc networks

being created all the time. It’s

an unavoidable requirement for the

event to be successful. This happens

in the commercial and government

worlds too, although to a lesser extent.

You have to divide your network

up in to three high-level buckets.

We called them The Wild West,

Mission Control, and The Vault. If

at all possible, these networks need

to be completely isolated from each

other. The key to success in the convention

environments was to focus

on controlling access to the most

sensitive networks, while still ensuring

that the less sensitive networks

remained operational.

The Wild West

These days, people attending events

like the conventions expect access to

reliable free WiFi. Public access to

WiFi enhances their experience and

makes for a more successful and

impactful event. However, “Secure

free WiFi” is an oxymoron. When

people connect to a public WiFi

network, their traffic is often visible

to other people on the network and

they run a greater risk of having their

device infected with malware. There

are steps that can be taken to make

users more secure, such as requiring

WPA2 encryption and attempting

to isolate users from each other, but


these efforts

are only partially


at best. In an


like this, user

education is


instructing Katherine Gronberg

users as to

which network is the “Official” free

WiFi network, and also advising users

to not conduct sensitive business

on public WiFi without establishing

a VPN tunnel first. Above all else,

the public free WiFi should NEVER

have a connection back to Mission

Control or The Vault. We developed

specific policies that looked for

cross-bucket communication and

remediated any discovered anomalies.

Mission Control

Mission Control is the network for

“official” business. These networks

often include things like staff systems,

kiosks, point-of-sale devices,

VOIP phones, cameras, and many

other mission-critical functions. In

such a dynamic and transient network

environment characterized by

so many wired and wireless

network access points,

unauthorized network access

should be expected

and planned for. Controlling

access as much as possible

by using passwords

and other authentication

protocols is critical. But

the real key is continuous

monitoring of the networks to

look for unwanted behaviors (devices

scanning your network, transmitting

large amounts of data, or

changing their profiles unexpectedly).

Establishing a baseline of

a known good state BEFORE the

event begins is critical to identifying

something that’s not supposed to be

there. For all of the devices found,

policies must be written that stipulate

how a device must be handled

depending on how it behaves. We

started this process early on for the

conventions and continually refined

our baseline throughout the events.

In addition to establishing a baseline,

penetration testing, or “pentesting,”

is highly encouraged. This

will allow you to anticipate the

methods that attackers may use to

gain access to your network. Reconfiguring

the network can mitigate

some attacks. Others can be

caught through Continuous Monitoring

policies, but you first need to

know what to look for. This is where

a skilled pen tester comes in very

handy. ForeScout did not pen test

the conventions ourselves, however,

we worked extensively with trusted

White Hat resources to develop policies

to catch malicious behavior that

can indicate network intrusions.

The Vault


The best advice for securing the

most sensitive assets in an organization

is: “Don’t connect it to the Internet!”

If, for some reason, Internet

connectivity is required, give these

systems their own dedicated and

highly monitored internet connection.

Something as important as a

teleprompter should be completely

disconnected. A broadcast system

is another example of something

that deserves an isolated internet

connection. If the only thing that is

ever present on that connection is a

broadcast system, network anomalies

should be easy to detect. Leading

up to the conventions, there was

a lot of speculation around the potential

hacking of teleprompters or

broadcast systems, but in actuality,

they were never connected to the

convention networks. Physical security

is also used to protect

these assets – in this case,

physical security was provided

by Secret Service agents

manning doors backstage. At

a corporate datacenter, physical

security is provided by

things like guards and retinal

scanners. At the end of the

day, for your most critical assets,

disconnect them from the network

and rely on robust physical


Katherine Gronberg is Vice President

for Government Affairs at ForeScout

Technologies. Prior to joining ForeScout,

she was a professor at Georgetown

University, teaching classes in

cybersecurity and business-government

relations. Katherine also founded

and ran her own consulting firm,

Gronberg Consulting, L.L.C., which

represented top U.S. technology firms

on their government relations strategies.

Prior to this, Katherine worked

for Morhard & Associates, L.L.C.

Katherine began her Washington career

in 2000 as a staff member on the

Senate Appropriations Committee

handling annual appropriations for

a range of federal agencies. Katherine

holds a Bachelor’s degree from Yale

University, an MBA from the University

of Virginia’s Darden School of

Business, and is a former Fulbright


Border Security/Immigration

Why the Department of Homeland Security

should also end private prison contracts

By Walter Ewing,

American Immigration Coucil

For two years, women and children

from Honduras, El Salvador,

and Guatemala have been fleeing to

the United States to escape the extreme

violence of gangs which control

large swaths of territory within

their home countries. And for two

years the Obama Administration

has responded to this humanitarian

crisis by locking up the women

and children seeking protection

and then deporting them back to

the countries where their lives may

be in danger. In defiance of its obligations

under international law,

the Administration is

Photo: Neil Conway

trying to deter future Central

American asylum

seekers by coming down

hard on current Central

American asylum seekers.

During that first “surge”

of refugees two years ago, the

Administration knew exactly what

it needed to get a handle on the crisis:

a bigger and better prison for

women and children. And so, according

to the Washington Post, the

Administration handed a $1 billion,

four-year contract to Corrections

Corporation of America (CCA) to

build a “massive detention facility

for women and children seeking

asylum.” In the sweetest of sweetheart

deals, CCA “gets the money

regardless of how many people are

detained at the facility.”

The facility in question

is the South Texas Family

Residential Center in Dilley,

Texas. According to the


“In 2015, the first full year

in which the South Texas

Family Residential Center

was operating, CCA—which

operates 74 facilities—made


14 percent of its revenue

from that one center

while recording record

profit. CCA declined to

specify the costs of operating

the center.”

The Administration’s heavyhanded

approach to the social turmoil

currently engulfing Honduras,

El Salvador, and Guatemala may

mean big money for private contractors,

but it’s not going to be an

effective deterrent to women who

are running for their lives or the

lives of their children. If you or your

child face murder, rape, or forced

induction into a gang if you stay, as

opposed to a slim chance of asylum

if you head to the United States,

then common sense dictates you

head to the United States.

Moreover, even looked at from a

purely financial standpoint, CCA

isn’t running a very cost-effective

prison. The Post writes that:

“When 2,400 people are detained,

the government spends

what amounts to $285 per day, per

person, according to a Post calculation.

When the facility is half-full,

More on page 43

Donald Trump’s shortsighted immigration plans

won’t secure the homeland

By Walter Ewing

As any serious national security expert

will tell you, trying to find a potential

terrorist by treating all immigrants

or Muslims as security risks

is far too vague to be effective. Accurate

intelligence and effective information-sharing

across agencies

is the key to national security—not

profiling. Yet in a bombastic August

15 speech, Republican presidential

nominee Donald Trump offered up

blatantly bigoted and utterly pointless

proposals on national security

including ideas like instituting an

“ideological screening test” and “extreme

vetting” to determine which

would-be immigrants to the United

States (especially Muslims) harbor

“any hostile attitude towards our

country or its principles.”

Leaving aside Trump’s nativist

histrionics, it would be a serious

mistake to embrace policies that

conflate immigration enforcement

and counter-terrorism efforts, implying

that immigration enforcement

is a way to catch terrorists. In

reality, immigration enforcement is

not designed to catch terrorists; it is

meant to catch people who violate

immigration laws. Immigration-enforcement

mechanisms might snare

a terrorist if supplied with specific

intelligence gleaned from counterterrorist

operations, but immigration

enforcement by itself is very

unlikely to stumble upon and actually

identify a terrorist. Without the

right information in the right hands,

even the most efficiently constructed

immigration-enforcement and

border-control mechanisms are not

going to catch a terrorist.

This is precisely why the 9/11

Commission did not recommend

that we adopt ethnic or religious

profiling to help prevent another

terrorist attack in the United States.

Identifying threats actually depends

on the development of “actionable

intelligence” which identifies

a specific threat, and then sharing

that information with immigration

and border-enforcement personnel.


Photo: Gage Skidmore

This approach is a little more subtle

than profiling millions of people,

which actually undermines intelligence

gathering by alienating ethnic

and religious communities and the

countries from which they come. A

group of people who feel themselves

to be under government attack is

not likely to share information with

(and report tips to) the same government

which is attacking them.

Nor are the governments of their

home countries as likely to partner

with the United States in counterterrorism


In evaluating the typically outlandish

ideas thrown around by

Trump, we should never forget that,

shortly after 9/11, the federal government

created the National Security

Entry-Exit Registration System

(NSEERS). Under NSEERS, 83,000

men from Muslim and Arab coun-

More on page 44

Border Security/Immigration

Government sued for withholding records

on immigration raids

By Tory Johnson

The Department of

Homeland Security

(DHS) is continuing

to defend the controversial


Border Guardian”

program that

took more than 100 Central American

women and children from their

homes in two days of immigration

raids last January. According to a lawsuit

filed this week by the Southern

Poverty Law Center (SPLC) and the

law firm Alston & Bird, the government

has failed to release records related

to the program under the Freedom

of Information Act (FOIA).

The complaint argues that DHS

and its component agency Immigration

and Customs Enforcement (ICE)

violated public records law by failing

to substantively respond to a January

7 FOIA request seeking information

related to the raids DHS conducted

January 2 and January 3 in North

Carolina, Georgia, and Texas. They

are seeking records and information

about how and why ICE went after

the 121 individuals swept up in the


The widely-publicized round-ups

raised concerns about constitutional

and due process violations.

146 members

of Congress

and more than 150

organizations condemned

the government’s


and local governments

voiced their

concerns about the damage to trust

between communities and law enforcement.

Lisa Graybill, SPLC deputy legal

director, said that “there are serious

questions about whether ICE agents’

conduct during these raids violated

the Constitution. We cannot allow

ICE, the nation’s largest law enforcement

agency, to avoid accountability

and violate federal law by withholding

these records.”

The complaint alleges, for example,

that ICE agents conducting the enforcement

operations used deceptive

tactics to enter homes. In some cases,

according to the complaint:

“ICE agents… stat[ed] that they

were police officers looking for a

criminal suspect and show[ed] residents

a photo of an African-American

man. In other instances, ICE

agents allegedly stated that they were

only taking the immigrants into custody

for a short time to examine the


women’s electronic ankle shackles.”

Moreover, “when asked for copies

of warrants or orders to enter a home,

ICE agents ignored the requests,

threatened residents, or ordered them

to ‘be quiet,’” according to the complaint.

The families targeted by the raids

actually had conditional permission

to be in the United States. According

to SPLC, they “had complied with orders

of supervision provided by ICE,

which permitted them to remain in

the United States subject to certain

conditions.” Yet the women and children

were detained and most were

subsequently deported. Only 12 families

had their deportations halted,

with the help of attorneys from the

Dilley Pro Bono Project.

ICE refuses to comment on pending

litigation. The agency has 20 days

and a 10-day extension to decide and

notify SPLC whether or not it will

comply with the request.

Hopefully the government will act

within that timeframe to release these

important documents. As the complaint

states, the public has a right to

this information and the government

a responsibility to be accountable for

its actions.

Photo: Julio Cesar

Court orders release of graphic photos of

Arizona Border Patrol detention facilities

WASHINGTON D.C. August 18,

2016 - Today, groups made public

damning evidence, including expert

testimony and video stills illustrating

the deplorable and unconstitutional

conditions detained individuals

are subjected to in Border

Patrol custody in

the agency’s Tucson

Sector. The

court rejected Border

Patrol’s effort

to conceal evidence

of inhumane and

abusive detention

practices from the

public. Accepting

the position of the

Plaintiffs and the

Arizona Republic,

which intervened to

argue for the release

of the materials, the

court recognized that access to court

proceedings and to basic information

about governmental practices

are fundamental First Amendment


The video stills and expert testimony

released today reveal that Border

Patrol holds individuals—among

them traumatized asylum seekers

and mothers with infants and small

children—for days at a time in cold,

overcrowded, and dirty cells that are

designed to detain people for only

a few hours. Graphic photographs

show detainees packed head-to-foot

Tucson facility: men wrapped in Mylar sheets on concrete floors and benches near

trash & toilets

in filthy, overcrowded rooms. One

image captures a mother changing

an infant’s diaper on a trash-strewn

concrete floor.

Also among the unsealed documents

is testimony from an expert

for the Plaintiffs who wrote that,

in his 35 years of experience work-


ing in correctional facilities, he had

“never been in one that treats those

confined in a manner that the CBP

treats detainees.”

Among other conclusions about

the poor treatment of individuals

detained in Border Patrol facilities,

he said that “[t]he

absence of medical

screening upon

arrival is unthinkable,”

and that he

had never before

witnessed an attempt

to “cram” so

many people into so

little space, without

beds and bedding.

He concluded, “[t]

he CBP [is] housing

people in conditions

that are unnecessarily

harsh, dangerous

and contrary to accepted industry

practices and standards.”

“Every step the Government has

taken in response to this lawsuit has

been designed to delay this suit and

hide the conditions present at these

facilities,” said Louise Stoupe of

Morrison & Foerster. “The Govern-

Border Security/Immigration

ment should be using the resources

they are wasting in court to provide

basic human necessities to those in

its custody.”

“Migrants detained in the Tucson

sector have long suffered horrific

conditions,” said Dan Pochoda,

senior counsel for the ACLU of

Arizona. “It is unconscionable that

the federal government continues

to detain people including infants

in this manner. The Border Patrol

continues to operate in violation of

U.S. and international law as well

as its own standards without being

held accountable for these egregious


“These photos show the harm

people suffer in these facilities, from

having to sleep on the floor for days

to needing to huddle together just to

stay warm,” said Travis Silva, attorney

with the Lawyers’ Committee

for Civil Rights of the San Francisco

Bay Area. “These conditions should

not exist in a facility operated by the

United States government.”

“The images unsealed by the court

leave no room to debate the fact

that thousands of immigrants are

subjected to inhumane and unconstitutional

conditions by the Border

Patrol,” said Nora Preciado, staff attorney

with the National Immigration

Law Center. “We urgently need

meaningful and lasting reforms that

put an end to these abuses, hold the

agency accountable, and ensure that

people are treated with dignity.”

“Mothers should not be forced to

change their babies’ diapers on cold

concrete floors or warm them with

flimsy aluminum sheets. Border

Patrol’s treatment of men, women

and children in its custody is simply

inexcusable,” said Mary Kenney,

senior staff attorney for the American

Immigration Council. “We are

seeking immediate relief from the

deplorable detention conditions in

CBP holding facilities for the thousands

of individuals who are or will

be held there while this case progresses.”

In December, attorneys representing

the Plaintiff class of detained

immigrants sought a preliminary

injunction to stop Border Patrol’s

unconstitutional detention practices

while the case is being litigated. The

injunction is based on compelling

evidence of inhumane conditions

in Tucson facilities—much of which

was disclosed after the Court sanctioned

Border Patrol for destroying

video recordings from these facilities

and failing to turn over other

relevant documentation.

Jane Doe, et al. v. Johnson, et al.

was filed in the U.S. District Court

for the District of Arizona. Attorneys

on the case include Harold J.


McElhinny, Colette Reiner Mayer,

Louise C. Stoupe, Kevin M. Coles,

Pieter S. de Ganon, and Elizabeth

Balassone of Morrison & Foerster

LLP; Nora Preciado, Linton Joaquin,

and Karen C. Tumlin of the

National Immigration Law Center;

Mary Kenney, and Melissa Crow of

the American Immigration Council;

Travis Silva of the Lawyers’

Committee for Civil Rights of the

San Francisco Bay Area; and Kathy

Brody, Brenda Muñoz Furnish, and

Dan Pochoda of ACLU of Arizona.

For additional links see:

• Challenging Unconstitutions

Conditions in CBP Short Term

Detention Facilities (Litigation


• Photo Exhibits of CBP Short-

Term Detention Conditions

• Declaration by Joe Goldenson,

M.D., Medical Conditions Expert

• Declaration by Eldon Vail,

Prison Conditions Expert

• Declaration by Robert W. Powitz,

Sanitation Expert

• Detained Beyond the Limit:

Prolonged Confinement by U.S.

Customs and Border Protection

along the Southwest Border (Special

Report, August 2016)

3M’s new ALPR software extends reach, delivers

real-time actionable intelligence

ST. PAUL‚ Minn. – (August 4‚ 2016)

– In order to create and maintain

safe communities, law enforcement

agencies are increasingly relying on

technology. A new tool for officers

is now available; 3M is proud to introduce

3M Plate Alert Analytical

ALPR Software, a next-generation

ALPR software which uses data fusion

analytics and proactive alerts to

provide more answers and the confidence

to act.

Designed to be fast, powerful and

intuitive, 3M Plate Alert Software

allows officers to take action, faster.

Collaborating with Human Factors

Scientists to ensure the software

can be learned quickly and used

efficiently, Plate Alert Software features

the latest user-centered design

methods to optimize interfaces and

usability. This makes it easier to set

up, search, get alerts and find leads.

3M also partnered with law enforcement

agencies to offer the most

in-demand features. The result is an

ALPR software that is powerful and

easy to use, so officers spend less

time clicking and more time following

up on leads.

Going beyond typical ALPR

software, which notifies users

when a plate read matches a watch

list, 3M’s Plate Alert Software features

pattern management alerts.

Designed to proactively provide

relevant information and actionable

insights in near real-time, pattern

alerts ensure almost all of the work

is done before an officer even looks

at the data. Notifications are sent

when the system detects activity

matching a pre-defined pattern that

may suggest illicit activity.

“Plate Alert Software uncovers

relevant connections and provides

a clear view of how seemingly unrelated

people, places, things and

events are connected, and how they

impact each other,” said Seth Stores,

global business manager at 3M. “By

providing a more complete, informative

and accurate picture, officers


can spot patterns faster and take

action to keep their communities


3M Plate Alert Analytical ALPR

Software is the first ALPR software

powered by data fusion analytics.

Plate Alert Software can compile

ALPR data with data from various

sources, such as 911 calls, pawn

data, police reports, motor vehicle

data and more. It can then almost

instantly find connections between

data points to deliver solid, meaningful

leads. By linking and simultaneously

evaluating numerous common

characteristics across multiple

data sources, Plate Alert Software

can uncover unexpected relationships

and associations. This means

law enforcements agencies can get

new answers and leads from their

data. Using sophisticated secondorder

analysis, data fusion analytics

deliver more actionable intelligence

than conventional ALPR software,

which rely on first-order analysis.

Plate Alert Software also has increased

data privacy measures.

Mandatory controls ensure data is

only accessed for legitimate purposes

by customer chosen individu-

More on page 44

DevMynd obtains strategic investment from

Motorola Solutions

CHICAGO, IL, Aug. 18, 2016 –

DevMynd, a leading-edge digital

innovation consulting firm, announced

today that it received

Series A funding from Motorola

Solutions Venture Capital.

JC Grubbs, CEO, DevMynd,

said the investment opens new

collaborative opportunities that

include the wave of innovation occurring

in public safety and commercial


“We couldn’t be happier to be working

with a partner that has such a rich

tradition of solving problems that

have a meaningful impact on people

in critical situations,” Grubbs said.

“Those are the types of challenges

that we like to work on at DevMynd

– things that really give us purpose.

“Our experience in human-centered

user research, user experience

and service design will help Motorola

Solutions and its customers develop

products and apps that solve nextgeneration

challenges,” he added.

“And, we’re excited about opportunities

to apply software engineering

expertise to mobile, web and device

needs that will result in robust, enterprise-grade


Paul Steinberg, chief technology officer,

Motorola Solutions, said, “Both

of our organizations look forward to

working together on several fronts.

DevMynd is an excellent example of

our support of and collaboration with

the entrepreneurial community in


“The adoption of broadband technology

is driving innovation in public

safety and commercial communications,”

he added. “We know that

tailored software and services will

be required to deliver solutions and

capabilities to our customers. We’re

pursuing technological advances

such as interoperable mobile applications

for mission-critical communications

and collaboration, enhanced

situational awareness, real-time rich

messaging, data analytics, and artificial

intelligence. All of these are on

the immediate horizon and we are

looking for DevMynd to help us get

these capabilities to our customers.”

The strategic investment will allow

DevMynd to expand its team,

add new capabilities and enter new

markets. It also will support access

to strong strategy, design and custom

software development services for

Motorola Solutions and its customers.


About DevMynd

DevMynd is an innovation firm in

Chicago and San Francisco with

practice areas in digital strategy,

human-centered design, UI/UX,

and custom mobile and web application

development. The firm’s

mission is to help its clients use

technology to solve meaningful

problems that have a profound

impact on life, society and business.

They serve clients ranging from startups

to Fortune 100 firms that are investing

in design, digital transformation

and innovation. Learn more at

About Motorola Solutions

Motorola Solutions (NYSE: MSI) creates

innovative, mission-critical communication

solutions and services

that help public safety and commercial

customers build safer cities and

thriving communities. For ongoing

news, http://www.motorolasolutions.

com/newsroom or subscribe to a news


Albuquerque police fight violence with

intelligence-led policing

The state of New Mexico has long

held the dubious honor of high placement

on the FBI National Crime Data

Report. In 2014, the state was ranked

the #2 most dangerous state in the

Union. The city of Albuquerque has

suffered a particularly high rate of

violent crimes, with the number of

murders in the city almost doubling

between 2009-2013.

Among the problems contributing

to the high crime rate in Albuquerque

is a proliferation of gangs. The

Stop Albuquerque Gangs Task Force

maintains an online list of known

violent groups in the city. At the time

of this writing, more than 100 gangs

were listed on the website. The Albuquerque

Police Department (APD)

is not one of exceptional size, and

has historically struggled to provide

enough officers to effectively combat

the problem.

The APD is not the first and will not

be the last police department to face

this dilemma. Criminals have become

more numerous, craftier, and are

quick to take advantage of new technologies.

Reactive police action, the

traditional model of law enforcement

in which police respond to crimes as

they happen, has been steadily losing

ground in the war against crime.

Instead, more and more police departments,

the APD included, are

turning to a new paradigm known as

intelligence-led policing. The core of

this law enforcement model is “Work

smarter, not harder.” In an intelligence-led

police department, officers

collect and analyze data using a variety

of technologies and techniques.

The data is used to decide where police

resources should be committed to

have the greatest effect. Intelligence

officers are tasked with identifying

repeat offenders and high risk areas,

so that a department’s limited human

resources can be utilized most efficiently.


policing is a revelation

within the law

enforcement community.

In a study

conducted by the

non-profit Police

Executive Research

Forum (PERF), 54%

of responding agencies

reported that


they planned to increase the use of

the practice within the near future.

According to Wikipedia, intelligenceled

policing has also found widespread

adoption in Canada, Mexico,

the UK, and New Zealand.

A subset of intelligence-led policing

is the burgeoning field of predictive

policing. Intelligence officers within a

department use collected data to construct

heat maps and other models in

an effort to predict where crimes are

likely to occur, days or even weeks before

they do.

The heat map incorporates a vast

amount of data about criminal activity

over an area, allowing officers to

visually identify the locations where

crimes most densely concentrated.

This technique allows “boots on the

ground” to be sent where they can

have the greatest positive effect, without

wasting time patrolling quiet,

low-risk areas. By patrolling the most

crime-dense areas of Albuquerque,

the APD is able to benefit the entire

city by targeting the root causes of

criminal activity.

In Albuquerque, predictive policing

requires the high volume collection of

data about gang members and other

likely criminal elements. The APD

has successfully leveraged technology

to accomplish this task in several


In 2013, the APD opened the Re-

al-Time Crime Center (RTCC). The

RTCC is a locus of crime prevention

technology, staffed with trained operators

who monitor a network of static

cameras around the city that today

exceeds 1,000 units. RTCC personnel

also monitor pawn shops for stolen

goods and distribute a daily newscast

to APD officers. They are largely responsible

for the creation of the heat

maps APD higher-ups use to intelligently

assign police. The RTCC has

proven effective, and is the recipient

of an award from the International

Association of Law Enforcement


In its efforts to further develop the

effectiveness of the RTCC and the

APD as a whole, in 2014 the City of Albuquerque

decided to invest in more

advanced technology for its network

of surveillance cameras. The selection

criteria for the cameras prioritized

flexibility and return on investment,

meaning the cameras would have to

cover more ground than the comparatively

basic static-mounted cameras

that comprised the original network.

The new cameras would also necessarily

be compatible with the existing

systems at the RTCC, with a minimum

of equipment retooling, software

redevelopment, and operator

retraining. After evaluating and testing

camera solutions from a number

of manufacturers across the United

States, the APD settled on the Mobile

Surveillance Unit (MSU) from


The MSU is essentially a freestanding

camera tower. Each unit is portable

enough to be towed by police

vehicles, and can power and support

a number of cameras with varying

configurations. ECAMSECURE custom-designed

and constructed several

MSUs that incorporated a variety

of pan / tilt / zoom (PTZ) cameras

and fixed-angle HD cameras with a

speaker feature to alert crowds to disperse.

The portable nature of the MSUs

has made them a perfect fit for Albuquerque’s

push towards intelligenceled

policing. The APD can now assign

MSUs to heavy crime areas just as it

does human officers. The imposing

structures, bristling with cameras,

have proven an effective deterrent for


By moving the MSUs from location

to location, the APD keep criminals

guessing as to whether or not they

are under surveillance. The cameras

have proven a boon for law-abiding

citizens. News coverage reports that

residents often feel safer and more

protected with the cameras present.

After moving an MSU out of a neighborhood,

the APD typically fields requests

and petitions for the cameras

to return.

Since the MSUs are a custombuilt

solution tailored to each client,

ECAMSECURE was able to ensure

that they would be seamlessly compatible

with the existing equipment

and software at the RTCC. By sourcing

compatible hardware and modifying

software where needed, the

MSU deployed in Albuquerque can

be accessed by RTCC operators using

largely the same interface and software

they have already used for years.


ECAMSECURE technicians accompanied

the initial deployment of

MSUs to Albuquerque to train RTCC

operators in their use, and support

personnel have remained on-call to

the APD 24/7. The APD leadership

has praised ECAMSECURE for its

dedication to service and support,

especially the fast response time and

willingness to resolve any issue, problem,

or concern.

The Mobile Surveillance Units have

proven to be an excellent fit for the

APD, and an order for additional

units is already underway. ECAMSE-

CURE is making several design upgrades

and improvements for the next

shipment of MSUs. The new units will

include license plate capture, as well

as other refinements. The existing run

already deployed in Albuquerque will

also be upgraded to match the new


The crime rate in Albuquerque is

today still high, but dropping through

the efforts of the APD, the RTCC, and

ECAMSECURE. Using the MSUs, the

RTCC is able to alert APD officers of

crimes in progress, as well as in suspicious

activity or congregations that

may erupt into violence. Using the

two-way audio features, RTCC operators

can even resolve some situations

on their own, by broadcasting to

would-be criminals that the police are

on their way.

The partnership is expected to continue,

helping the APD leverage the

latest technologies to safeguard the

law-abiding residents of the city.

Access Control/Biometric ID

Peter Smallridge, 3M Traffic Safety and Security Manager,

discusses E.U. border security management, trends, new

3M products and similarity to U.S. practices

By Adrian Courtenay

In a wide-ranging discussion that

covered successful border security

initiatives, new directions and

needs for improvement in border

security management in the European

Union, including comparisons

with U.S. practices, Peter Smallridge

outlined the pros and cons of

passport readers, biometrics, facial

recognition, passwords with

chips on them, automated border

control, kiosks, mobile transport

and the treatment of refugees.

By necessity, the discussion also

focused on the many ways to enter

a country, from airports and

seaports to automobiles, trains and

private planes – not to mention the

question of what happens to people

after they have arrived in a country.

“Many companies around the

world are talking about exit,” said

Smallridge. “They come in, we don’t

know if they went home. Is he or she

still here? We have no information

whatsoever. That’s the big concern.

In an ideal world, you want reporting

of people coming in through any

mobile transport – and recording of

the exit. This is a megatrend.”

“Across the world, border agencies

are trying to get smarter,” he

pointed out. “We focus on airports

and mainly on people arriving

through the airport. But in the E.U.

we’ve found in some cities that only

50% of the people enter via airports.

Many cross land borders to go to

work each day. Some come through

seaports, some through civil airports.

And you can leave by different

routes or border agencies.”

In response to security incidents

or terrorism, Smallridge pointed

out, a second reality in border security,

that governments can be

pressed for cash. Governments

think this is where they can save

some money. And unfortunately


this happens at the same time they

want to replicate their installations

into different locations.

The solution that is taking place

is that there is a big move toward

Automated Border Control (ABC).

It could be kiosks, gates or barriers

– sometimes called – gates.

Sometimes these are for everybody,

sometimes they’re for people who

register, as in the Global Entry

System. This is about processing

people in a self-service way. “It’s

the least we can do with resident

nationals or people from friendly

countries who probably are not a

risk – if you can get them to use

the machines. Depending on the

situation, some numbers of officers

may have to be deployed in some


But deploying officers can also

create a major challenge – a technical

one, because an officer from

one post who then goes to another

post to operate a different type of

machinery may not know how to

do it. This can be problematic, for

instance, if the officer has to handle

a finger print reader that he is not

Access Control/Biometric ID

familiar with and neither is the traveler,

it can call delays.

There are lots of technical issues

like these that 3M is considering,

said Smallridge. “For example, if

there’s a chip on the passport and it

takes several seconds to open, and

the user is used to seeing chips in

a supermarket, he or she may need

help in order to be processed. Our

objective here is to make the systems

easier to use, more intuitive, so

that we can use them without having

to think.”

Automated Border Control is also

being considered in the E.U. for sea

borders. People arriving by ship

may be coming off a car and may

come to a barrier system where they

are processed by password and fingerprint.

Or they may have to get

out of the vehicle, go into a building,

or you drive next to a barrier of

some sort.

In the case of trains, an officer

may have to walk through a with

some kind of mobile device processing

people as they go through. But

often, because the train is going to

arrive soon at the next station, and

people are going to get off, there are

more complications.

Alongside all of that, there is the

subject of biometrics. Typically, finger

prints have been the most accurate

and reliable system. They can

also benefit law enforcement agencies,

when they catch criminals or

when they find evidence left behind,

since the law enforcement officers

do not typically have Iris processing.

Finger prints have been the

main biometric used for authentication.

But that is changing, says

Smallridge. “In order to process

these people properly and to avoid

queues, agencies are looking to use

more than one type if biometric,

because it takes too long to find

the fingerprint. Thus we’re going

to have to more than one biometric,

because it takes too long to find

the fingerprint. Thus many agencies

around the world are now talking

about ‘face and finger.’ If I select two

of them on the way in, I can use anyone

of them on the way out. It might

be easier to face the people without

stopping them.”

The need for two means of processing

has also created interest in

iris usage, when neither face or finger

are a good idea, such as where


it’s difficult to lean across a vehicle

where someone is sitting next to the

window, to finger print somebody,

or when it is too dark to see their

faces It also may be too dark to see

their faces.

Summing up on the logistical

challenges, if you tighten up on the

system, how do you avoid lines? If

you’re going to the U.S., you don’t

want to wait two hours to be processed.

That’s why there’s so much

effort being put into effect to make

things smarter, and that’s why prebooking

is getting more uses. When

you book American Airlines, for example,

they ask you for your passport

during the booking process,

and the information is supplied to

the country of arrival, which will

either use it to interview you when

you arrive or possibly tell the airport

not to board you.

“We’re going to see more of these

types of systems,” says Smallridge.

“When I come to the United States,

I get an ESTA, which is a kind of

visa. The U.K. is a visa waiver country,

where you buy a twelve month

visa that costs something like $15.

The ESTA determines validity of the

entry to the country. In some countries,

you have to go to the airport,

where you provide ten fingerprints

and probably will be asked a few

More on page 44

LBsecure promotes best-of-class granular

and layered security solutions for its clients

within SAP

LBsecure is partnered with realtime,

a unique “Control and Monitoring”

security software for SAP,

called bioLock. Designed by former

SAP engineers, bioLock allows you

to secure your SAP enterprise from

the inside-out, with granular and

layered solutions, including unique

identification and natively embedded

SAP security software.

With successful installations

around the world, bioLock’s software

and biometric re-authentication

protocols can easily be installed

through a port natively embedded

within your SAP ERP. Also providing

flexibility and integration with

many different biometric partners.

bioLock can distinguish between

legitimate users and imposters in

real time and instantly alert risk

management and senior administrators

by secure email notification.

bioLock is easy to install and does

not require any outside monitoring

or the expense of MSSP support.

It also eliminates any need for 3rd

party security monitors to have access

to your privileged information.

SAP normally relies

on simple single

sign-on procedures or

“password only” protection

to gain access.

Unfortunately stolen or shared administrative

passwords allow intruders

to roam freely once inside

the system. Insider fraud can be a

major risk factor for this very reason.

Now SAP administrators can easily

make dramatic security improvements

by implementing rigorous reauthentication

protection at layered

and granular levels. Customizing

user-specific biometric checkpoints

dictated by the organization and the

governing body and not an outside

security provider.

Enhancing your present SAP

security solution with bioLock’s

unique identity management solution.

Providing positive re-authentication

and indisputable realtime

audit trails. In addition to providing

the best defense against fraud, bioLock

ensures compliance with various

government regulations, which


rely on log-in activities within SAP,

i.e. ITAR, HIPAA, Sarbanes Oxley,

GRC, etc.

We invite you to explore and evaluate

how bioLock can further protect

your SAP initiative from unwanted

intrusion, as it has done for

many businesses around the world

from finance, supply chain, pharmaceutical

and many many more.

Case Studies are available for Supply

Chain, Banking Fraud, Procure

to Pay, Payroll Fraud, Retail/POS,

Employee Self-service, Workflow

Approvals, Perimeter Security,

HIPAA Compliance, Public Sector


Cypherpath, Quali partnership

provides portable containerized


Continued from page 10

their underlying IT infrastructure

“Public and private sector organizations

need agility and security

to compete, which is forcing them

to look for solutions that bypass all

of the roadblocks caused by legacy

infrastructure,” said Danial Faizullabhoy,

president and CEO, Cypherpath.

“Through this partnership, our

joint customers have access to innovative

on-demand solutions that

provide IT infrastructures to support

testing, training, and experimenting

in sandboxes and cyber ranges at


“The modern enterprise needs to

be extremely vigilant and responsive

to sophisticated security threats. Cyber

ranges are a great tool to simulate

real-world attack scenarios in a controlled

environment and strengthen

the security posture”, said Lior

Koriat, CEO, Quali. “Quali cloud

sandboxes help organizations build

cyber ranges and other portable ondemand

environments in a cost effective

manner to model, orchestrate

and test advanced threats. We’re excited

to partner with Cypherpath to

offer this solution to our defense and

enterprise customers.”

About Quali

Quali is the leading provider of

Cloud Sandboxes for automating

the DevOps lifecycle. Quali gives innovators

control over their world by

enabling them to create personalized

replicas of the most complex production

environments. The Cloud providers,

Telcos, Technology vendors

and Enterprises including the Global

100 depend on Quali to help them

deliver their products and services to

market faster and with better quality.

Learn more at:

About Cypherpath

Enterprises rely on Cypherpath to

create, deliver and manage containerized

on-demand infrastructure at

the lowest possible cost while providing

container security and simplified

control of the entire stack.

Cypherpath’s industry-leading enterprise

software platform encapsulates

virtualized compute, network,

and storage resources into software

containers running on commodity

hardware. Learn more at http://www.

About TSI

TSI is a systems integrator and value

added reseller focusing on providing

innovative automation, orchestration,

test, and virtualization solutions

for network centric environments.

TSI has been Quali’s Partner

and Service Provider since 2010 integrating

tools like those from Cypherpath.

For information go to our

website or email at


Telos Corporation: 2016 Winner,

Best Biometric Identification/

Authentication Solution

Continued from page 13

FBI and TSA have engaged Telos

ID on a pilot basis to be part of the

continuous-vetting/always-on FBI

Rap Back Program. As continuous

monitoring and assessment are to

IT security, so continuous vetting

is to the insider threat. To know

in real time that a previously vetted

employee’s criminal record has

changed, for example, offers another

critical tool for securing our




Monthly Digital Edition

Airport/Seaport Newsletter

Daily Insider Newsletter

GSN Media Kit


HID Global provides mid-year

update on top trends

Continued from page 26

happens afterwards, so stolen identities

are useless to thieves.

Mid-year update: Through mid-year,

the world moved closer to deploying

driver licenses on mobile phones, while

two key policy issues emerged through

mid-year: protecting privacy by using

a smartphone’s Bluetooth connection

so users needn’t physically relinquish

their smartphones to officers and officials,

and ensuring citizens can control

what data is made available to others.

Beyond citizen ID, general security

best practices and policies remain important

for virtually any organization,

and demand grew for HID Global services

that help customers deploy innovative

solutions to meet compliance,

security and risk management needs,

while enabling new, value-added capabilities.

HID Global’s Seos® credential technology

continues to help drive these

trends, enabling organizations to

confidently incorporate mobile solutions

and empower their users with

new applications and capabilities.

For more HID Global news, visit

our Media Center, read our Industry

Blog, subscribe to our RSS Feed,

watch our videos and follow us on

Facebook, LinkedIn and Twitter. To

read about HID Global’s mobility initiative,

click here.

About HID Global

HID Global is the trusted source for

innovative products, services, solutions,

and know-how related to the

creation, management, and use of

secure identities for millions of customers

around the world. The company’s

served markets include physical

and logical access control, including

strong authentication and credential

management; card printing and personalization;

visitor management systems;

highly secure government and

citizen ID; and identification RFID

technologies used in animal ID and

industry and logistics applications.

The company’s primary brands include

ActivID®, EasyLobby®, FAR-

GO®, IdenTrust®, LaserCard®, Lumidigm®,

Quantum Secure, and HID®.

Headquartered in Austin, Texas, HID

Global has over 2,700 employees

worldwide and operates international

offices that support more than 100

countries. HID Global® is an ASSA

ABLOY Group brand.

For more information, visit http://


Why the Department of Homeland

Security should also end private

prison contracts

Continued from page 30

as it has been in recent months, the

government would spend $570. On

some days when the facility is nearly

empty, as it was for a period in

January, the government would be

paying multiples more.”

Why would the government give

a handout like this to a private company?

Perhaps it stems from the fact

that CCA “has on its payroll a slew

of former senior government officials,”

who are—presumably—very

well connected. Regardless of how

CCA procured such a bargain, the

real bottom line is that a civilized

nation does not put asylum seekers

behind bars and then try as hard as

possible to deport them back to the

deadly situations they are fleeing.

The Department of Homeland

Security (DHS), which bears the

responsibility for immigration detention,

would be wise to follow

the lead the Department of Justice,

which just announced it is no longer

going to use private prisons.

Donald Trump’s shortsighted

immigration plans won’t secure the


Continued from page 31

tries stepped forward

and registered with

the federal government,

resulting in

13,000 deportations.

However, no one who registered under

NSEERS was ever charged with

a crime related to terrorism. The

“special registration” requirement

ended in December 2003, while

NSEERS as a whole was scrapped in

April 2011. What Trump is proposing

is NSEERS on a massive scale.

It is important to keep in mind

that “security” is about more than

just keeping out those who would

threaten our national security. It

is also about creating and maintaining

a vibrant economy and dynamic

society that attract people

from around the world. It is about

establishing our global credibility

as a society in which the rule of law

and fundamental human rights are

highly valued and respected. And it

is about not undermining U.S. relationships

with the allies needed to

effectively combat international terrorists.

If we move too far away from

these goals, building a locked-down

nation in which fear runs rampant

and productivity and creativity are

starved, then what exactly are we attempting

to “secure”?

3M’s new ALPR software extends

reach, delivers real-time actionable


Continued from page 35

als, and audit reports provide a full

view of system activity to identify

any potential misuse of sensitive or

private data.

“From parking lots and highways

to ports and borders, we are

committed to protecting law enforcement

officials and their communities,”

said Stores. “Plate Alert

Software is the newest innovation to

support those who take the oath to

protect and serve.”

About 3M

At 3M, we apply science in collaborative

ways to improve lives daily.

With $30 billion in sales, our 90,000

employees connect with customers

all around the world. Learn more

about 3M’s creative solutions to the

world’s problems at or

on Twitter @3M or @3MNewsroom.

3M and 3M Science. Applied to Life. are

trademarks of 3M Company. Used under

license in Canada.


Peter Smallridge, 3M Traffic Safety

and Security Manager, discusses

E.U. border security

Continued from page 40


Another major trend is Interoperability

of Systems. In the U.S. there

are different fingerprint systems

which are called “AFIS” systems.

These are fingerprint identify systems.

Some are for border, a second

group is for dealing with criminals,

and the third group is use by the

military. This system is not available

in Europe, since a big objective

in Europe is to separate systems so

that citizens’ private affairs cannot

be misused by politicians.

Smallbridge adds that “The terrorist

incidents in the last few months

have proved the weakness of that


He concludes the interview with a

number of observations of the U.S.

differences in practices from those

of the European Union, and lists a

number of objectives and initiatives

that 3M is working with, pointing

out that 3M is one of the big three in

this area – 3M, BEC and Morpho/

Safron. As a company generating

upwards of $30-billion in revenues,

3M definitely has the wherewithal

to research and produce topnotch

solutions and take a long view.

In the U.S., identification systems

are operated by Customs and Border

Protection, and with the purchase

some years ago of Cogent Systems,

the CBP biometric matching

system contains about 200 million

people in its database; the criminal

database is handled by the FBI and

the military databases are handled

by the Department of Defense.

3M is working now on Mission

Critical systems, the AFIS system

and is modernizing capabilities for

multiple biometric matching. 3M

has also been working on facial

recognition, voice recognition, mobile

readers for such applications

as walking through trains or entire

cities, and further document reader

improvement to enable processing

of people who don’t speak English.

“Learning our customers’ problems

is the best way to solve the

problems,” says Smallbridge. “It’s

the kind of things we worry about.

Can we see it? How? Do we need to

acquire? That would be our scope.

We’re a big company with many divisions.

We share information inhouse

with other divisions. Usability

is very important to us.

Sign-up for Free

GSN Digital Editions

and Email Newsletters

Free subscription to your selection of GSN digital editions

and daily/weekly email newsletters. Add new selections or

opt-out of any selections at any time.

GSN Airport, Seaport, Rail, Border Security Weekly

GSN Daily Insider Newsletter (5 Days Weekly)

GSN Monthly Digital Edition

GSN Media Kit


The News Leader in Physical, IT and Homeland Security


The News Leader in Physical, IT and Homeland Security

CEO/Editorial Director

Adrian Courtenay



Steve Bittenbender


Senior Writer

Karen Ferrick-Roman



Shawn Campbell

Campbell on Crypto


George Lane

Hazmat Science & Public Policy

Contributing Author

Lloyd McCoy Jr

Immix Group

Contributing Author

Walter Ewing

Contributing Author

Wendy Feliz

Contributing Author

Joshua Breisblatt

Contributing Author

J. Michael Barrett

Contributing Author

Christopher Millar

Gatekeeper Security

Art Director

Gerry O’Hara, OHDesign3


Production Manager

Brenden Hitt

Direct: 203-216-7798



Tech Focus

School Safety/Mobile

Surveillance Solutions

Market Sector Focus


Port Security


Tech Focus

International Threats/

Cyber Intelligence

Market Sector Focus


Grid Security


Tech Focus

Perimeter Protection/

Intrusion Detection

Market Sector Focus

Mass Notification/

Disaster Response


GSN’s 2016 Homeland Security Awards Program

Now Accepting Entries at:

The 2016 Government Security News Awards Program, featuring

many new categories in Cybersecurity, Physical Security, Government

Agency Innovations and Mobile Technologies will open for entries on

August 24 and will close for entries on November 15.

In good news for Winners and Finalists, GSN will be reinstating its

annual Homeland Security Awards Dinner in Washington, DC in

the first week of December, in a venue to be announced. Longtime

participants in the GSN awards programs will recall that previous

GSN Awards Dinners have featured top government, military leaders

and respected television commentators such as 4-Star General

Barry McCaffrey (Ret); Fran Townsend, Homeland Security Advisor to

George W. Bush, James Kallstrom, Assistant Director of the FBI and

Admiral Thad Allen (Ret), Commandant of the U.S. Coast Guard

who came out of retirement twice to serve his county, first in

Hurricane Katrina and later in the BP Oil Spill.

The cost of an entry for vendors is $300 per entry, but there is no

charge for government agencies or departments. All Winners

and Finalists receive Awards Emblems, and all Winners receive a

handsome, gold-trimmed plaque describing their winning entries.

All Winners and Finalists will also be invited to participate in the 2016

Digital Yearbook of Awards Winners.

To see photo gallery of previous Awards Dinners:

For information on the Awards Dinner or Sponsorships,

Contact Adrian Courtenay, Managing Partner, at, (Mobile) 917-696-5782

More magazines by this user