Government Security News August Digital Edition
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
<strong>Government</strong> <strong>Security</strong> <strong>News</strong><br />
AUGUST 2016 DIGITAL EDITION<br />
Smart-mapping leader Esri releases robust collection of Web maps that forecast<br />
data into vivid stream-flow throughout the continental U.S. – Page 4<br />
Also in this issue:<br />
GSN Airport, Seaport, Border <strong>Security</strong> Awards Program: Telos Corp wins “Best Biometric Identification/<br />
Authentication” – Page 12<br />
HID Global releases mid-year update in secure identity trends – Page 24<br />
Forescout describes security challenges in handling both Republican and Democratic National<br />
Conventions – Page 28<br />
3M’s Peter Smallridge discusses EU/US border security practices and need for improvement in border<br />
security management – Page 39
GSN <strong>August</strong> 2016 <strong>Digital</strong><br />
NEWS<br />
4<br />
5<br />
7<br />
10<br />
12<br />
14<br />
15<br />
18<br />
20<br />
22<br />
24<br />
28<br />
Smart-mapping leader Esri releases robust<br />
collection of Web maps that forecast data into<br />
vivid stream-flow throughout the continental U.S.<br />
IntraLogic Solutions to announce first ever<br />
National Common Operating Picture (COP) platform for first<br />
responders allowing immediate 9-1-1 notification<br />
Senators Grassley/Leahy, press federal investigators on breach of<br />
Democratic National Committee<br />
Cypherpath, Quali partnership provides portable containerized<br />
infrastructures that support virtual sand boxes and cyber ranges<br />
GSN Airport, Seaport, Border <strong>Security</strong> Awards Program: Telos Corp<br />
wins “Best Biometric Identification/Authentication”<br />
Cellebrite introduces UFED Touch2 platform for<br />
standalone mobile Forensic solutions<br />
Controp’s airborne EO/IR Surveillance<br />
Camera payload protects Olympic games<br />
ECN acquires MIR3, extends SaaS-based unified critical<br />
communications platform to enterprise clients<br />
Climate Change – This is what it’s going to look<br />
like! A dispatch from Baton Rouge from<br />
George Lane, GSN Columnist<br />
Convy on Net-Centric <strong>Security</strong> – Securing the Internet of Things<br />
HID Global releases mid-year update on top trends for secure identity<br />
Forescout describes security challenges of handling both Republication<br />
and Democratic National Conventions<br />
2
<strong>Edition</strong> Table of Contents<br />
FEATURES<br />
SPECIAL REPORT: Border <strong>Security</strong>/Immigration<br />
30<br />
31<br />
32<br />
Why the Department of Homeland <strong>Security</strong> should<br />
also end private prison contracts<br />
Donald Trump’s shortsighted immigration plans<br />
won’t secure the homeland<br />
<strong>Government</strong> sued for withholding records on<br />
immigration raids<br />
33<br />
35<br />
36<br />
37<br />
Court order release of graphic photos of Arizona<br />
Border Patrol detection facilities<br />
3M’s new ALPR software extends reach,<br />
delivers real-time actionable intelligence<br />
DevMynd obtains strategic investment<br />
from Motorola Solutions<br />
Albuquerque police fight violence with<br />
intelligence-led policing<br />
SPECIAL REPORT: Access Control/Biometric ID<br />
39<br />
3M’s Peter Smallridge discusses EU/US border<br />
security practices and need for improvement in<br />
border security management<br />
41<br />
LBsecure promotes best-of-class granular<br />
and layered security solutions for its clients<br />
within SAP<br />
3
New Esri Maps NOAA’s National Model forecast<br />
data into vivid pictures of U.S. river flows<br />
REDLANDS, CA—<strong>August</strong> 25, 2016<br />
—Smart-mapping leader Esri today<br />
released a beautiful, robust new<br />
collection of Web maps that forecast<br />
NOAA stream-flow data throughout<br />
the continental U.S.<br />
Esri’s multiscale visualization<br />
of the National Water<br />
Model enables forecast water<br />
flows in real time at high<br />
resolution. The maps weave<br />
together NOAA’s recently released<br />
water model data and<br />
Esri ArcGIS functionality to<br />
provide interactive views of current<br />
and future water-system behaviors.<br />
Esri maps the flow of water along<br />
2.7 million stream segments in the<br />
U.S. river network. These data-rich<br />
maps improve NOAA’s ability to<br />
meet the needs of emergency responders,<br />
reservoir operators, ecosystem<br />
professionals, and floodplain<br />
managers by providing detailed information<br />
that can anticipate flood<br />
and drought conditions. National<br />
Weather Service data populates the<br />
interactive maps with hourly updates<br />
and forecasts up to 10 days.<br />
“In collaboration with our academic<br />
partners, the Esri team supported<br />
the development process<br />
leading up to the launch of the National<br />
Water Model,” said Edward<br />
Clark, director of geointelligence at<br />
NOAA. “We share a common vision<br />
for the value that high-resolution<br />
water prediction brings to the nation.”<br />
Esri’s new maps enable users to<br />
access large amounts of complex<br />
data quickly and easily. Although<br />
10-day, mid-range forecasts contain<br />
more than 200 million records and<br />
short-term forecasts require hourly<br />
data refresh, Esri maps automatically<br />
integrate and synthesize NOAA<br />
data so that users have the real-time<br />
information they need at the click of<br />
a button.<br />
“These attractive, accessible maps<br />
are part of our commitment to improve<br />
water awareness—a commitment<br />
we made at the White House<br />
Water Summit earlier this year,” said<br />
Esri President Jack Dangermond.<br />
“ArcGIS provides a visually engaging<br />
way to communicate complex<br />
scientific information simply so that<br />
4<br />
anyone can understand it.”<br />
Esri plans to continue its investment<br />
in water prediction and analysis<br />
by releasing an open-source<br />
toolkit later this year that will enable<br />
ArcGIS users to analyze<br />
data and create custom maps<br />
from water model records.<br />
About Esri<br />
Since 1969, Esri has been<br />
giving customers around the<br />
world the power to think<br />
and plan geographically. The<br />
market leader in GIS technology,<br />
Esri software is used in more than<br />
300,000 organizations worldwide<br />
including each of the 200 largest<br />
cities in the United States, most<br />
national governments, more than<br />
two-thirds of Fortune 500 companies,<br />
and more than 7,000 colleges<br />
and universities. Esri applications,<br />
running on more than one million<br />
desktops and thousands of Web<br />
and enterprise servers, provide the<br />
backbone for the world’s mapping<br />
and spatial analysis. Esri is the only<br />
vendor that provides complete<br />
technical solutions for desktop, mobile,<br />
server, and Internet platforms.<br />
Visit us at esri.com/news.
IntraLogic Solutions to announce first ever National<br />
Common Operating Picture (COP) platform for first<br />
responders allowing immediate 9-1-1 notification<br />
As recently reported by <strong>Government</strong><br />
<strong>Security</strong> <strong>News</strong>, Intralogic Solutions,<br />
Inc. a leading global school security,<br />
and government developer and integrator,<br />
and Rave Mobile Safety, a<br />
respected creator of innovative public<br />
safety and communication software<br />
have announced a partnership<br />
to develop an integrated service offering<br />
that will benefit both schools<br />
and first responders during crisis<br />
situations, including ones involving<br />
active shooters.<br />
According to the partners, the new<br />
solution combines Rave’s Panic Button<br />
application and 9-1-1 data delivery<br />
capabilities with robust video<br />
surveillance, interactive rich digital<br />
floor plans, One Button Lockdown<br />
and access control technology. The<br />
combined solution will allow<br />
first responders full access<br />
to critical information<br />
about a situation from any<br />
location, including while<br />
en route via a secure, mobile<br />
broadband connection.<br />
In an <strong>August</strong> 10 interview<br />
with Intralogic CEO Lee<br />
Mandel, GSN learned that the integrated<br />
technologies offer a unique<br />
Lee Mandel,<br />
Intralogic CEO<br />
technological breakthrough experience<br />
that no other company is presently<br />
offering. Rather than the traditional<br />
9-1-1 process to call police,<br />
the new, integrated technology<br />
can send critical information<br />
within milliseconds<br />
to a 9-1-1 call center.<br />
“When someone hits the<br />
panic button in a school,<br />
the 9-1-1 center is immediately<br />
activated giving<br />
operators full command<br />
and control to help find the shooter<br />
while the first responders are still in<br />
5<br />
View the video<br />
transit. They can then remotely open<br />
the doors and guide the responders<br />
to exactly where the shooter is,” said<br />
Mandel. “No one else on a national<br />
level is offering this comprehensive<br />
solution. Additionally the panic button<br />
can initiate a lockdown which<br />
will, locks all the doors automatically,<br />
flash strobe lights, send text<br />
messages to parents, teachers, and<br />
students, and take over all computer<br />
screens while playing a pre-recorded<br />
message over the P.A. system.”<br />
Mandel indicated that the technology<br />
is a first of its kind agnos-
tic platform that allows integration<br />
from any manufacturer. IntraLogic<br />
considers this an advanced PSIM<br />
solutions.<br />
Mandel and his company have<br />
been getting a lot of attention from<br />
major companies in the field who<br />
understand that clients have never<br />
been able to customize in this manner,<br />
“with one common operating<br />
picture.”<br />
Founded by Mandel in 2004, IntraLogic<br />
focused mainly on software<br />
development in its early years,<br />
working for a lot of businesses on<br />
Long Island, NY and other nearby<br />
states. The turning point, said Mandel,<br />
was when the company got on<br />
its first government contract which<br />
enables any government agency to<br />
purchase products from pre-bid,<br />
published lists. Currently, the company<br />
serves over 160 School Districts<br />
nationally including 49 of<br />
the 57 districts in Nassau County,<br />
30 in Suffolk County and over 80<br />
throughout Upstate New York, New<br />
Jersey, Connecticut, Florida, and<br />
across the United States.<br />
IntraLogic’s overall list of clients<br />
include schools, townships, municipalities,<br />
as well as a contract with the<br />
MTA Long Island Railroad, which<br />
buys its Cameras, Fire Alarms, Burglar<br />
Alarms and Command Centers.<br />
On the private side, the company<br />
works with some very well<br />
known National Retail chains with<br />
hundreds of locations throughout<br />
the U.S. and overseas.<br />
As impressive as these entrepreneurial<br />
accomplishments may<br />
seem, Mandel made it clear to GSN<br />
that another major breakthrough is<br />
going to be announced in early September,<br />
although he is not at liberty<br />
to announce who this major client is<br />
– except to assure us that the pending<br />
client is a very significant organization.<br />
“We’ve been working with our clients<br />
as an integrator, manufacturer,<br />
and software developer. Our goal is<br />
to offer a one stop shop for our clients<br />
and partners.”<br />
“With our new Common Operating<br />
Picture we can now take all<br />
school districts, malls, schools, hospitals,<br />
municipalities, villages and<br />
other critical assets and tie them to<br />
a centralized platform. We can go<br />
to any government agency around<br />
the world and create this without<br />
replacing their existing technology.<br />
It’s the first of its kind agnostic<br />
platform that allows us to integrate<br />
technology from any manufacturer.”<br />
Along with many readers, GSN is<br />
eager to learn more about this exciting<br />
new platform, and how it will<br />
enhance technology and security<br />
around the globe!<br />
6
Senators Grassley, Leahy press federal investigators on<br />
breach of Democratic National Committee<br />
VIA ELECTRONIC TRANSMISSION<br />
The Honorable Loretta Lynch<br />
Attorney General<br />
U.S. Department of Justice<br />
950 Pennsylvania Avenue, NW<br />
Washington, DC 20530<br />
The Honorable James B. Comey, Jr.<br />
Director<br />
Federal Bureau of Investigation<br />
935 Pennsylvania Avenue, NW<br />
Washington, DC 20535<br />
Dear Attorney General Lynch and<br />
Director Comey:<br />
We are writing in regard to the recent<br />
cyberattacks on American political<br />
organizations. Yesterday the<br />
FBI confirmed that it is investigating<br />
the recent hack of the Democratic<br />
National Committee (DNC). We are<br />
writing to request more specific information<br />
about the efforts that the<br />
National Cyber Investigative Joint<br />
Task Force (NCIJTF) and other elements<br />
of the FBI and Justice Department<br />
are undertaking in order<br />
to counter these types of attacks and<br />
bring the perpetrators to justice.<br />
On June 14, 2016, the Washington<br />
Post reported that Russian government<br />
hackers had successfully penetrated<br />
the computer network of the<br />
Democratic National Committee,<br />
gaining access to DNC databases<br />
and email. [1] According to the article,<br />
DNC officials noticed unusual<br />
network activity and hired Crowd-<br />
Strike, a cybersecurity firm, to investigate.<br />
The firm identified two<br />
separate groups of hackers who had<br />
penetrated the DNC network, both<br />
of which it determined were working<br />
for the Russian government. Immediately<br />
after the Washington Post<br />
report, a purported hacker calling<br />
himself “Guccifer 2.0” claimed responsibility<br />
for the hack, and further<br />
claimed to be a lone Romanian<br />
hacker. [2] The Russian government<br />
also denied its involvement. [3] However,<br />
evidence appears to undermine<br />
the Romanian hacker’s claim of responsibility<br />
and instead suggests<br />
the Russian government’s involvement.<br />
[4] The hackers subsequently<br />
publicly released what appears to be<br />
the DNC’s opposition research on<br />
Donald Trump in June. [5] Last week,<br />
WikiLeaks released roughly 20,000<br />
of the hacked DNC emails that the<br />
hackers had provided to it. [6]<br />
It is not unusual for a nation’s intelligence<br />
services to obtain sensitive<br />
information from other nations’<br />
political entities. Not only<br />
has James Clapper, the Director of<br />
7<br />
Senator Grassley<br />
Senator Leahy<br />
National Intelligence, stated that the<br />
government has indications of cyberattacks<br />
on the 2016 presidential<br />
campaigns, the government has also<br />
reported that foreign hackers targeted<br />
the networks of the Romney<br />
and Obama campaigns in 2012, and<br />
that Chinese hackers compromised<br />
the networks of the Obama and Mc-<br />
Cain campaigns in 2008. [7]<br />
However, when a foreign intelligence<br />
service not only spies on<br />
American political organizations,<br />
which is bad enough, but then selectively<br />
publishes the obtained<br />
information in what appear to be<br />
attempts to affect our democratic<br />
process, it is substantially more troubling.<br />
The integrity of the democratic<br />
process is essential to the social<br />
contract on which our republic is<br />
formed. If foreign intelligence agencies<br />
are attempting to undermine
that process, the U.S. government<br />
should treat such efforts even more<br />
seriously than standard espionage.<br />
These types of cyberattacks are significant<br />
and pernicious crimes. Our<br />
government must do all that it can<br />
to stop such attacks and to seek justice<br />
for the attacks that have already<br />
occurred.<br />
We were pleased to see that the<br />
FBI has stated that it is investigating<br />
this situation. We are writing to<br />
request more information on this<br />
cyberattack in particular and more<br />
information in general on how the<br />
Justice Department, FBI, and NCI-<br />
JTF attempt to prevent and punish<br />
these types of cyberattacks. Accordingly,<br />
please respond to the following<br />
by <strong>August</strong> 9, 2016:<br />
1. When did the Department of Justice,<br />
FBI, and NCIJTF first learn<br />
of the DNC hack? Was the government<br />
aware of the intrusion<br />
prior to the media reporting it?<br />
2. Has the FBI deployed its Cyber<br />
Action Team to determine who<br />
hacked the DNC?<br />
3. Has the FBI determined whether<br />
the Russian government, or any<br />
other foreign government, was<br />
involved in the hack?<br />
4. In general, what actions, if any, do<br />
the Justice Department, FBI, and<br />
NCIJTF take to prevent cyberattacks<br />
on non-governmental political<br />
organizations in the U.S.,<br />
such as campaigns and political<br />
parties? Does the government<br />
consult or otherwise communicate<br />
with the organizations to<br />
inform them of potential threats,<br />
relay best practices, or inform<br />
them of detected cyber intrusions?<br />
5. Does the Justice Department believe<br />
that existing statutes provide<br />
an adequate basis for addressing<br />
hacking crimes of this nature, in<br />
which foreign governments hack<br />
seemingly in order to affect our<br />
electoral processes?<br />
In addition to the questions listed<br />
above, we also request that the Justice<br />
Department, FBI, and/or NCI-<br />
JTF arrange a briefing on these issues<br />
for Committee staff by <strong>August</strong><br />
16, 2016. If possible, we also request<br />
that the briefing include a staff tour<br />
of NCIJTF’s facilities. Thank you<br />
for your attention to this important<br />
matter. If you have any questions,<br />
please contact Patrick Davis of the<br />
Committee Staff at (202) 224-5225<br />
or [redacted].<br />
Sincerely,<br />
Charles E. Grassley<br />
Chairman<br />
Senate Committee on the Judiciary<br />
Patrick Leahy<br />
Ranking Member<br />
Senate Committee on the Judiciary<br />
8<br />
cc: The Honorable Donald Freese<br />
Director National Cyber<br />
Investigative Joint Task Force<br />
cc: The Honorable John P. Carlin<br />
Assistant Attorney General<br />
National <strong>Security</strong> Division<br />
Department of Justice<br />
cc: The Honorable James C. Trainor, Jr.<br />
Assistant Director<br />
Cyber Division<br />
Federal Bureau of Investigation<br />
[1] Ellen Nakashima, Russian <strong>Government</strong> Hackers<br />
Penetrated DNC, Stole Opposition Research On<br />
Trump,The Washington Post, June 14, 2016.<br />
[2] Lorenzo Franceschi-Bicchierai, ‘Guccifer 2.0’ Is<br />
Likely A Russian <strong>Government</strong> Attempt To Cover Up<br />
Their Own Hack, Motherboard, June 16, 2016.<br />
[3] Andrew Roth, Russia Denies DNC Hack And Says<br />
Maybe Someone ‘Forgot The Password,’ The Washington<br />
Post, June 15, 2016.<br />
[4] E.g., Dmitri Alperovitch, Bears In The Midst:<br />
Intrusion Into The Democratic National Committee,<br />
CrowdStrike, June 15, 2016; Lorenzo Franceshi-<br />
Bicchierai, We Spoke to DNC Hacker ‘Guccifer 2.0,’<br />
Motherboard, June 21, 2016; Eli Lake, Cybersecurity<br />
Experts Say Russia Hacked The Democrats, Bloomberg,<br />
July 25, 2016; Thomas Rid, All Signs Point To<br />
Russia Being Behind The DNC Hack, Motherboard,<br />
July 25, 2016; Evan Perez, Russians Suspected Of<br />
Hacking Democratic National Committee Emails,<br />
CNN, July 25, 2016.<br />
[5] Caitlin Yilek, Stolen DNC Files On Trump Leaked,<br />
The Hill, June 15, 2016.<br />
[6] Andrea Peterson, Wikileaks Post Nearly 20,000<br />
Hacked DNC Emails Online, The Washington Post,<br />
July 22, 2016.<br />
[7] Ellen Nakashima, National Intelligence Director:<br />
Hackers Have Targeted 2016 Presidential Campaigns,<br />
The Washington Post, May 18, 2016.
Cypherpath, Quali partnership provides portable<br />
containerized infrastructures that support virtual<br />
sandboxes and cyber ranges<br />
SANTA CLARA, CA, Aug. 23, 2016<br />
– Quali, the leading Cloud Sandbox<br />
software platform for DevOps<br />
automation, and Cypherpath, the<br />
leader in on-demand containerized<br />
infrastructure solutions, today<br />
announced the integration of<br />
the Cypherpath Virtual Container<br />
Platform (VCP) with the Quali<br />
CloudShell solution. Through this<br />
partnership, joint customers are<br />
using on-demand containerized<br />
infrastructures to create and manage<br />
cyber ranges and private cloud<br />
sandboxes. Through full infrastructure<br />
and IT environment virtualization,<br />
customers are saving millions<br />
of dollars in costs associated with<br />
creating, delivering and managing<br />
the full stack of physical compute,<br />
network and storage resources in<br />
highly secure containers.<br />
A cyber range, or cloud sandbox,<br />
gives enterprises the ability to rapidly<br />
reconfigure IT environments<br />
for use by individuals and teams<br />
to conduct offensive and defensive<br />
cyber-mission rehearsal training,<br />
tool-specific training, software<br />
evaluation, and configuration testing.<br />
Most organizations lack the<br />
budget and manpower resources<br />
required to deploy large scale, nonproduction<br />
cyber environments<br />
using existing enterprise tools and<br />
many solutions available to them<br />
do not include the ability to rapidly<br />
change, add, modify and control the<br />
environments.<br />
By leveraging the partnership,<br />
value added reseller (VAR) TSI was<br />
able to provide ManTech International<br />
Corporation the technology<br />
needed to give DISA a fully virtualized<br />
lab infrastructure, complete<br />
with integrated virtual sandboxing<br />
and cyber range capabilities. With<br />
this full stack, DISA is able to use<br />
the lab to develop, test and run infrastructure<br />
in private clouds or<br />
bare-metal servers without requiring<br />
the agency to adopt proprietary<br />
tools, saving both time and money.<br />
10<br />
“DISA is responsible for supporting<br />
a critical element of our national<br />
defense strategy, which is the sharing<br />
of information between joint<br />
warfighters, national leaders, and<br />
other mission and coalition partners,”<br />
said Ernest McCaleb, Man-<br />
Tech technical director and DISA<br />
Cyber <strong>Security</strong> Range chief architect.<br />
“This fast, simple and cost effective<br />
solution provides us with the<br />
ability to fulfill our mission without<br />
sacrificing performance or security,<br />
and deliver the Multiprotocol Label<br />
Switching stack at a fraction of the<br />
cost.”<br />
Through this partnership, joint<br />
customers can:<br />
• Use on-demand infrastructure<br />
to support private cloud sandboxes<br />
in mission ready cyber ranges<br />
• Define, deploy and manage fully<br />
containerized IT infrastructure ondemand<br />
while providing the agility<br />
to share and collaborate between<br />
nodes, networks, bare-metal servers<br />
and private clouds<br />
• Significantly reduce investment<br />
in new physical data center resources<br />
and technologies by virtualizing<br />
More on page 42
New generation.<br />
New possibilities.<br />
Secure your site with the new F3 Series Fence<br />
Controllers, the latest in perimeter protection.<br />
Find out more at security.gallagher.com/latest-releases<br />
security.gallagher.com<br />
security.gallagher.com
Winners’ Portraits: GSN 2016 Airport, Seaport, Border <strong>Security</strong> Awa<br />
Telos Corporation:<br />
2016 Winner, Best Biometric<br />
Identification/Authentication Solution<br />
By Chuck Brooks, 2016 Lead Judge<br />
It was an honor to judge the recent<br />
GSN 2016 Airport, Seaport, Border<br />
<strong>Security</strong> Awards Program and<br />
review a wide array of exceptional<br />
security technology submissions.<br />
I’m very pleased to be discussing<br />
the Telos winning entry with Renate<br />
Neely, Marketing Director of Telos<br />
Corporation, and Dawn E. Lucini,<br />
Director of Aviation <strong>Security</strong>, Telos<br />
Identity Management Solutions.<br />
I have been aware of the important<br />
work of Telos Corporation dating<br />
back to the years when I covered<br />
national security issues working<br />
for the late Senator Arlen Specter<br />
on The Hill. As the digital world<br />
has involved operationally over the<br />
past decade, so has the vulnerability<br />
of maintaining security for people,<br />
systems and information.<br />
Brooks: In the defense, homeland,<br />
and intel communities Telos is<br />
highly regarded for the generic category<br />
of “secure communications”<br />
and we know that your solution is<br />
advanced, efficient and certainly<br />
has the confidence of some of the<br />
most important government agencies<br />
in the security arena. Can you<br />
elaborate on your background in<br />
government and some of the communications<br />
areas, including mobility,<br />
where Telos has contributed<br />
solutions?<br />
Renate Neely: Thank you, Chuck,<br />
for your kind words about Telos<br />
Corporation. We do indeed have a<br />
long history of supporting federal<br />
government clients with solutions<br />
for secure communications, as well<br />
as cyber security, secure mobility,<br />
and identity management. But if I<br />
may, I’d like to focus our remarks<br />
today not on Telos Corporation,<br />
but on Telos Identity Management<br />
Solutions LLC (Telos ID). It is this<br />
subsidiary rather than the parent<br />
Telos Corporation that is the star<br />
of the GSN 2016 Airport, Seaport,<br />
Border <strong>Security</strong> award for the Best<br />
Biometric Identification or Authentication<br />
Solution.<br />
Telos ID’s original claim to fame<br />
12<br />
Renate Neely,<br />
Marketing Director<br />
Dawn E. Lucini,<br />
Director of<br />
Aviation <strong>Security</strong><br />
is its long history of supporting the<br />
Defense Manpower Data Center’s<br />
(DMDC) Common Access Card<br />
(CAC) program to provide DoD<br />
personnel with identity-based access<br />
to secure resources, including<br />
communications systems, as well as<br />
physical access to secure areas. This<br />
has been the springboard for innovative<br />
developments in the areas<br />
of identity vetting and continuous<br />
threat assessment.<br />
Brooks: We are living in an era of<br />
large and widespread information<br />
security breaches. Everyone is vulnerable<br />
and networks, including<br />
those of government agencies (i.e.<br />
OPM) are immune to cyber-attacks.<br />
Risk management has become an<br />
operational requirement for executive<br />
management. What does Telos<br />
do in the area of risk assessments
ds Program<br />
for networks both in the federal and<br />
commercial spaces?<br />
Renate Neely: Telos Corporation<br />
protects government and commercial<br />
enterprises with solutions and<br />
services for the full cyber security<br />
lifecycle. Our offerings include independent<br />
counsel for information<br />
security requirements, cyber security<br />
consulting services, and enterprise<br />
solutions for IT risk management<br />
and continuous compliance.<br />
But again, let’s focus on Telos ID,<br />
which addresses the operational<br />
requirements of risk management<br />
as well, focusing primarily on the<br />
insider threat. An example is the<br />
company’s IDVetting service, which<br />
provides governments, schools,<br />
medical professionals, and commercial<br />
organizations with a complete<br />
fingerprint background checking<br />
solution. These customers use<br />
IDVetting services to submit biographic<br />
and biometric information<br />
from employees, candidates, and<br />
contractors to the FBI for criminal<br />
history records checks, helping to<br />
secure their business environment,<br />
reduce risk and cost, and comply<br />
with federal, state, and local laws regarding<br />
required checks for specific<br />
industries and roles.<br />
Brooks: The recent terrorist attacks<br />
against airport targets demonstrate<br />
the need for enhanced security measures,<br />
including screening of airport<br />
staff, and background checks and<br />
badging operations. The trend is for<br />
better authentication and biometric<br />
layering to mitigate threats. Can you<br />
take this opportunity to highlight<br />
the current application and futures<br />
uses of Telos ID for transportation<br />
security?<br />
Can you provide more detail about<br />
your award winning Telos ID Designated<br />
Aviation Channeling service<br />
(DAC)? What are the engineering<br />
and performance differentiators for<br />
the aviation industry? Can you also<br />
list Telos ID current applications<br />
and some of your key customers as<br />
well as future offerings?<br />
Dawn Lucini: Airports, airlines, and<br />
related services are required to vet<br />
the security backgrounds of job applicants<br />
and employees who have<br />
access to secure areas. Telos ID is<br />
one of only three organizations authorized<br />
by the TSA to be a designated<br />
aviation channeler (DAC),<br />
meaning it is certified to collect and<br />
send fingerprints and enrollment information<br />
to TSA for security threat<br />
assessments and criminal history<br />
record checks. Telos ID’s DAC service<br />
was the first of these third party<br />
channeling services to be approved<br />
13<br />
for operation by the TSA, and has<br />
continued to win the vast majority<br />
of DAC business since its inception.<br />
Telos ID DAC is a modular, Webbased<br />
offering that lets airports and<br />
air carriers select which services<br />
they need. The solution can be customized<br />
to specific business processes<br />
and provide custom reporting<br />
and information exports. The<br />
Telos ID DAC platform can integrate<br />
with other workforce systems<br />
to meet additional badging, physical<br />
security and personnel administrative<br />
needs. Telos ID tailors the secure<br />
Web portal, allowing security<br />
and badging offices to perform multiple<br />
functions on one platform.<br />
Telos ID DAC is deployed at more<br />
than 50 airports and airlines across<br />
the U.S. – including BWI Thurgood<br />
Marshall and DFW Dallas/Fort<br />
Worth. Here is the full list of current<br />
clients: https://www.telos.com/<br />
identity-management/aviationchanneling/customers/<br />
Vetting the backgrounds of airport<br />
and related personnel is essential to<br />
understanding and mitigating the<br />
risk of bad actors gaining access to<br />
secure areas. But doing this vetting<br />
on a periodic basis may allow something<br />
to slip through the cracks, a<br />
piece of information that just might<br />
help avoid disaster. To that end, the<br />
More on page 42
Cellebrite introduces UFED Touch2 platform<br />
for standalone mobile forensic solutions<br />
PETAH TIKVA, ISRAEL, July 19,<br />
2016 – Cellebrite, a leader in digital<br />
forensic extraction, decoding and<br />
analysis solutions, today unveiled<br />
UFED Touch2, the latest addition<br />
to the company’s industry-leading<br />
UFED Series family of mobile forensic<br />
solutions. With enhanced speed,<br />
usability, and portability, UFED<br />
Touch2 is a comprehensive mobile<br />
forensic solution that allows law enforcement,<br />
military, and intelligence<br />
agencies to extract evidentiary data<br />
in a forensically sound manner. The<br />
Touch2 can extract mobile device<br />
content up to three times faster than<br />
the UFED Touch, enabling investigators<br />
and examiners to accelerate<br />
investigations.<br />
“Many of our customers prefer a<br />
purpose-built device for extracting<br />
and viewing digital evidence regardless<br />
of location,” said Yossi Carmil,<br />
Global Co-CEO, Cellebrite. “The<br />
UFED Touch2 delivers the performance,<br />
reliability and usability required<br />
to allow customers to meet<br />
their mission in the lab or field,<br />
while simplifying the procurement<br />
process by eliminating the need to<br />
buy separate hardware.”<br />
With its intuitive GUI and easyto-use<br />
touch screen, UFED Touch2<br />
enables physical, file system and<br />
logical extractions of data and passwords,<br />
including deleted data, from<br />
the widest range of mobile devices.<br />
UFED Touch2 is available in both<br />
standard and ruggedized editions,<br />
running Logical or Ultimate (logical,<br />
file system and physical extraction)<br />
configurations and comes with<br />
a suite of supporting software applications,<br />
peripherals and accessories.<br />
UFED Touch2 delivers a range<br />
of enhanced capabilities designed<br />
to increase performance, usability,<br />
and portability. Key performance<br />
enhancements designed to reduce<br />
14<br />
extraction time include:<br />
• 5x faster CPU than the UFED<br />
Touch<br />
• DDR3 memory<br />
• Large and fast hard drive<br />
(SSD 128GB)<br />
• USB 3.1 phase 1 axillaries<br />
(Up to 5Mbps)<br />
In addition, the UFED Touch2 includes<br />
a number of features that<br />
simplify usage and increase flexibility:<br />
• High-resolution (1024),<br />
capacitive multi-touch display<br />
with intuitive GUI<br />
• Built-in multi-SIM Reader<br />
• Mini Display Port<br />
• Customized Windows 10<br />
Finally, the Touch2 delivers new capabilities<br />
to allow for improved portability:<br />
• WiFi b\g\n\ac (up to 350 Mbps)<br />
• All-inclusive field-ready<br />
operational kit – smaller, lighter<br />
connector tips, and external<br />
hard drive<br />
• Long-lasting battery<br />
Cellebrite will continue to support<br />
its customers using UFED Touch.<br />
Any future announcement regarding<br />
the end of support for the Touch<br />
platform will be made 18 months in
advance to allow users to effectively<br />
plan for the transition. Customers<br />
that purchased a UFED Touch in<br />
2016 will receive attractive offers to<br />
trade in their device for a Touch2.<br />
Customers that purchased a UFED<br />
Touch after June 15, 2016 will be<br />
able to trade in their device for a<br />
UFED Touch2 at no cost.<br />
About Cellebrite<br />
Every day around the world digital<br />
data is impacting investigations.<br />
Making it intelligent and actionable<br />
is what Cellebrite does best. A pioneer<br />
of mobile data forensics since<br />
1999 with a passion for technology<br />
innovation, Cellebrite is uniquely<br />
positioned to address the rapidly<br />
evolving needs of its diverse customer<br />
base to access, unify and defend<br />
digital evidence of all kinds.<br />
Together, our powerful UFED solutions<br />
deliver the only complete, endto-end<br />
<strong>Digital</strong> Forensics Platform<br />
on the market. Our track record<br />
remains unchallenged. Our results?<br />
Proven and well documented. With<br />
more than 40,000 UFED licenses<br />
deployed globally in 100 countries,<br />
we allow law enforcement, intelligence<br />
services, border patrols, special<br />
forces, military and the private<br />
sector to achieve their missions<br />
quickly and effectively.<br />
Cellebrite is a wholly-owned subsidiary<br />
of the Sun Corporation, a<br />
listed Japanese company (6736/JQ)<br />
Controp’s airborne EO/IR<br />
Surveillance Camera payload<br />
protects Rio Olympic games<br />
15<br />
HOD HASHARON, ISRAEL, 17<br />
<strong>August</strong> 2016 – CONTROP Precision<br />
Technologies Ltd. – a company<br />
specializing in the field of electrooptics<br />
(EO) and<br />
infrared (IR)<br />
cameras for defense<br />
and homeland<br />
security solutions<br />
– is proud<br />
to announce the<br />
use of CON-<br />
TROP’s SHAPO<br />
Airborne<br />
EO/IR surveillance<br />
payload for<br />
the protection<br />
of 2016 Summer<br />
Olympics in Rio<br />
de Janeiro, Brazil.<br />
The SHAPO<br />
is installed on<br />
board the ADB-<br />
150 Aerostat that supports the Brazilian<br />
Air Force security mission<br />
and is deployed above the Olympics<br />
area.<br />
The ADB-150 aerostat carrying<br />
CONTROP’s SHAPO EO/IR surveillance<br />
payload was launched <strong>August</strong><br />
9th, 2016, by Airship do Brasil,<br />
a company of Bertolini’s Holdings,<br />
in cooperation with the Brazilian<br />
Air Force, in order to provide 24/7<br />
surveillance,<br />
monitoring and<br />
public security<br />
of the Olympics<br />
area.<br />
Prior to the<br />
start of the Rio<br />
Olympics 2016,<br />
the system was<br />
deployed as part<br />
of a surveillance<br />
operation with<br />
Air Force University<br />
(UNIFA)<br />
security systems<br />
at Afonsos Air<br />
Force Base in Rio<br />
de Janeiro for the<br />
protection of the<br />
training center for athletes competing<br />
in the current Olympics events.<br />
The CONTROP SHAPO is a gyrostabilized<br />
3-gimbal camera payload,<br />
which was designed for surveillance<br />
and observation on a variety of airborne<br />
platforms including aerostats,
helicopters, fixed wing aircraft and<br />
unmanned air vehicles. The compact<br />
SHAPO camera payload includes<br />
a high sensitivity color Day<br />
Camera and a Thermal Imaging<br />
Camera with a Continuous Optical<br />
Zoom Lens.<br />
The SHAPO<br />
can also include<br />
an optional<br />
Laser<br />
Range Finder<br />
and/or<br />
Laser Pointer<br />
as well as<br />
an optional<br />
Mission<br />
Management<br />
Moving<br />
Map<br />
System.<br />
M a r i t i m e<br />
and Land versions<br />
of the SHA-<br />
PO, for installation<br />
on patrol boats, vessels<br />
and observation vehicles, are available<br />
as well.<br />
The SHAPO is used worldwide<br />
for a variety of long-range surveillance<br />
and observation applications<br />
including Law Enforcement, Search<br />
& Rescue, Homeland <strong>Security</strong> and<br />
Defense. CONTROP’s airborne<br />
payloads are installed on a variety<br />
of airships and aerostats worldwide,<br />
in order to provide public security<br />
and safety.<br />
About CONTROP<br />
Precision Technologies Ltd.<br />
CONTROP specializes in the development<br />
and production of Electro-Optical<br />
and Precision Motion<br />
Control Systems.<br />
The company’s<br />
specialists have<br />
over 35 years of<br />
experience in<br />
EO / IR products<br />
for Surveillance,<br />
Defense and<br />
Homeland <strong>Security</strong>.<br />
CONTROP’s<br />
main product<br />
lines include: Automatic<br />
passive<br />
Intruder Detection<br />
Systems for<br />
airport perimeter<br />
surveillance, coastal<br />
surveillance, port and<br />
harbor security, border<br />
surveillance, the security of sensitive<br />
sites and ground troop security;<br />
High performance Stabilized<br />
Observation Payloads used for day<br />
and night surveillance on board<br />
UAVs, small UAVs and aerostats/<br />
balloons, helicopters, light aircraft,<br />
maritime patrol boats and ground<br />
vehicles; Thermal Imaging Cameras<br />
with high performance continuous<br />
Zoom Lens and state-of-the-art<br />
image enhancement features, and<br />
more. CONTROP’s products are in<br />
16<br />
daily operational use in many of the<br />
most critical surveillance, homeland<br />
security and defense programs<br />
worldwide.<br />
For more information on CONTROP,<br />
please visit the company’s website:<br />
www.controp.com<br />
FREE SUBSCRIPTION<br />
SIGN-UP<br />
Monthly <strong>Digital</strong> <strong>Edition</strong><br />
Airport/Seaport <strong>News</strong>letter<br />
Daily Insider <strong>News</strong>letter<br />
GSN Media Kit<br />
CLICK HERE
GSN’s 2016 Homeland <strong>Security</strong> Awards Program<br />
Now Accepting Entries at:<br />
www.gsnmagazine.com/hsa2016/welcome<br />
The 2016 <strong>Government</strong> <strong>Security</strong> <strong>News</strong> Awards Program, featuring<br />
many new categories in Cybersecurity, Physical <strong>Security</strong>, <strong>Government</strong><br />
Agency Innovations and Mobile Technologies will open for entries on<br />
<strong>August</strong> 24 and will close for entries on November 15.<br />
In good news for Winners and Finalists, GSN will be reinstating its<br />
annual Homeland <strong>Security</strong> Awards Dinner in Washington, DC in<br />
the first week of December, in a venue to be announced. Longtime<br />
participants in the GSN awards programs will recall that previous<br />
GSN Awards Dinners have featured top government, military leaders<br />
and respected television commentators such as 4-Star General<br />
Barry McCaffrey (Ret); Fran Townsend, Homeland <strong>Security</strong> Advisor to<br />
George W. Bush, James Kallstrom, Assistant Director of the FBI and<br />
Admiral Thad Allen (Ret), Commandant of the U.S. Coast Guard<br />
who came out of retirement twice to serve his county, first in<br />
Hurricane Katrina and later in the BP Oil Spill.<br />
The cost of an entry for vendors is $300 per entry, but there is no<br />
charge for government agencies or departments. All Winners<br />
and Finalists receive Awards Emblems, and all Winners receive a<br />
handsome, gold-trimmed plaque describing their winning entries.<br />
All Winners and Finalists will also be invited to participate in the 2016<br />
<strong>Digital</strong> Yearbook of Awards Winners.<br />
To see photo gallery of previous Awards Dinners:<br />
https://www.flickr.com/photos/44536438@N06/<br />
For information on the Awards Dinner or Sponsorships,<br />
Contact Adrian Courtenay, Managing Partner, at<br />
acourtenay@gsnmagazine.com, (Mobile) 917-696-5782
ECN acquires MIR3, extends SaaS-based<br />
unified critical communications platform to<br />
enterprise clients<br />
ORMOND BEACH, FL, Aug. 1,<br />
2016 /PR<strong>News</strong>wire/ – Emergency<br />
Communications Network (ECN)<br />
has acquired MIR3, a global Software<br />
as a Service (SaaS) provider of<br />
intelligent communications to business<br />
and government clients. The<br />
combination of ECN’s critical communications<br />
platform and MIR3’s<br />
growing enterprise platform brings<br />
together two highly complementary<br />
companies, creating an organization<br />
uniquely qualified to meet the<br />
fast growing demand for software<br />
communications solutions. Financial<br />
terms of the transaction were<br />
not disclosed.<br />
MIR3 provides its clients with<br />
advanced, reliable, and flexible<br />
software solutions that facilitate<br />
multi-channel communication and<br />
collaboration at scale, with use cases<br />
designed to address the growing<br />
complexity of the messaging landscape<br />
and ever increasing challenges<br />
faced by enterprises today. Clients<br />
depend on MIR3’s software for daily<br />
business operations, including crisis<br />
management, IT service management,<br />
corporate communications,<br />
customer relations, supply chain<br />
management, and event management.<br />
MIR3’s clients include leading<br />
organizations in the government, financial<br />
services, technology, healthcare,<br />
energy, and consumer product<br />
segments.<br />
“The acquisition of MIR3 accelerates<br />
ECN’s vision to be a leader<br />
in the unified critical communications<br />
space serving a broad range of<br />
clients and applications.<br />
This transaction creates<br />
an opportunity for ECN<br />
to greatly scale our footprint<br />
in the adjacent enterprise<br />
market, as well<br />
as introduce ECN’s Cloud<br />
Platform as a Service<br />
(CPaaS) offering, which<br />
can enable enterprises to<br />
enrich software applications<br />
with multi-channel and realtime<br />
communication functions. We<br />
are excited to welcome MIR3’s clients<br />
and partners to the ECN family,<br />
and we look forward to continuing<br />
to enhance the MIR3 products,”<br />
said David DiGiacomo, President<br />
and CEO of ECN.<br />
18<br />
David DiGiacomo,<br />
President and CEO<br />
As a result of this transaction,<br />
Amir Moussavian is stepping down<br />
from his positions as CEO and<br />
Chairman in order to pursue new<br />
opportunities. “I am thrilled to have<br />
played a role in the success of MIR3,<br />
and could not be more proud of my<br />
colleagues, as their hard work has<br />
allowed us to maintain the position<br />
as a leader in the industry. With the<br />
additional resources of ECN, MIR3<br />
will continue to provide<br />
the exceptional level of<br />
service its Intelligent Notification<br />
and TelAlert<br />
clients have grown to expect,”<br />
said Mr. Moussavian.<br />
Ann Pickren, President<br />
of MIR3 said, “Joining<br />
forces with ECN establishes<br />
an industry leader<br />
in the unified critical communications<br />
market, paving the way for<br />
continued innovation and development<br />
to address critical business<br />
needs. We are excited for this opportunity<br />
and will continue to provide<br />
our clients with unparalleled<br />
service.”
ECN is a portfolio company of<br />
Veritas Capital, a private equity<br />
firm active in the communications<br />
space. Veritas Capital is committed<br />
to supporting ECN in building a fast<br />
growing, global leader in intelligent<br />
communications and CPaaS markets.<br />
About ECN<br />
ECN is a leading national provider<br />
in the SaaS-based unified critical<br />
communications market. ECN<br />
has pioneered high-speed notification<br />
services capable of reaching<br />
millions of people in minutes<br />
through its CodeRED solution<br />
for government clients and has applied<br />
its mission critical capabilities<br />
to commercial, healthcare and<br />
other end markets. The company’s<br />
cloud-based software communications<br />
platform provides seamless<br />
and easy-to-deploy solutions for<br />
the exchange of critical information<br />
among organizations, their people,<br />
devices and external entities with<br />
use cases designed to save lives, enhance<br />
revenue and reduce costs. In<br />
addition, ECN will empower clients<br />
to embed solutions directly into existing<br />
software applications to offer<br />
a richer suite of communications.<br />
ECN is based in Ormond Beach, FL<br />
with additional offices in Minneapolis,<br />
MN. More information can<br />
be found on the company’s website at<br />
www.ecnetwork.com.<br />
About MIR3<br />
MIR3 provides intelligent notification<br />
and response software for business<br />
operations. It offers Intelligent<br />
Notification, a critical notification<br />
solution for business continuity<br />
and disaster recovery, as well as for<br />
various business operations, such<br />
as information technology alerting,<br />
business continuity, or emergency<br />
notification. In addition, it offers<br />
TelAlert, a two-way notification<br />
system that helps users to simplify<br />
the administration of their network<br />
management, help desk, and financial<br />
processing systems by automatically<br />
launching alerts to personnel.<br />
The company deploys its solution in<br />
SaaS, on-premise, and hybrid formats.<br />
MIR3 is based in San Diego,<br />
CA with additional offices in London,<br />
UK, and Dubai, UAE. More information<br />
can be found on the company’s<br />
website at www.mir3.com.<br />
About Veritas Capital<br />
Veritas Capital is a leading private<br />
equity firm that invests in companies<br />
that provide critical products<br />
and services, primarily technology<br />
or technology-enabled solutions,<br />
to government and commercial<br />
clients worldwide including those<br />
operating in aerospace & defense,<br />
healthcare, technology, national security,<br />
communications, energy and<br />
education. Veritas Capital seeks to<br />
create value by strategically transforming<br />
the companies in which it<br />
invests through organic and inorganic<br />
means. For more information<br />
on Veritas Capital and its current<br />
and past investments, visit www.veritascapital.com.<br />
19<br />
SOURCE Emergency Communications Network<br />
(ECN)
Climate Change – This is what it’s going to look like!<br />
A dispatch from Baton Rouge from George Lane,<br />
GSN Columnist<br />
Thu, 2016-08-18 03:00 AM<br />
My son was evacuated Saturday<br />
night by boat in Lafayette, Louisiana.<br />
The National Weather Service<br />
(NWS) said this was a one in 500<br />
years flood; however, there have<br />
been 8 one in 500 year floods in this<br />
year alone, including one in Louisiana<br />
in March. This is what climate<br />
change will look in Louisiana. Here<br />
is why the disastrous flooding occurred;<br />
1.) “Inland Tropical Depression”:<br />
Flooding in Louisiana was fueled<br />
by a system somewhat similar to an<br />
inland tropical depression. Parts of<br />
Louisiana saw more rain than some<br />
U.S. cities have seen in the last few<br />
years combined. Deep, tropical<br />
moisture in combination with low<br />
pressure near the earth’s surface and<br />
aloft were the main ingredients that<br />
fueled the serious flooding in Louisiana.<br />
Simultaneously the Jet stream<br />
dipped into North Louisiana, providing<br />
a blocking force that kept the<br />
tropical storm over South Louisiana.<br />
On Friday morning, NOAA’s<br />
Weather Prediction Center said:<br />
“The best description of this system<br />
is that of an inland sheared tropical<br />
20<br />
depression.”<br />
The rainfall it<br />
produced was<br />
very similar<br />
to what one<br />
would expect<br />
from a<br />
George Lane<br />
slow-moving tropical depression or<br />
storm since rainfall potential is related<br />
to the forward speed of those<br />
types of systems. A weather forecast<br />
discussion from the National<br />
Weather Service in New Orleans<br />
Friday morning said that the moisture<br />
content in the atmosphere was<br />
higher than what has been observed<br />
there during some tropical cyclones.<br />
It was an all-time record for the area.<br />
When that much moisture is<br />
available in the atmosphere, thunderstorms<br />
can produce excessive<br />
rainfall of several inches in a single<br />
hour, leading to astronomical totals<br />
over time. While no one likely forecast<br />
24+ inches of rain in southeast<br />
Louisiana, this is the type of thing<br />
that can happen on a very localized<br />
scale in situations like this one.<br />
2.) River Records Shattered by 4 to<br />
6+ Feet: At least 8 river gauges have<br />
set new record highs in southeast
Louisiana, exceeding the previous<br />
record by several feet in some cases.<br />
The most extreme of those was<br />
in Magnolia, Louisiana, where the<br />
Amite River crested at 58.56 feet.<br />
This topped the old record at that<br />
location by more than six feet set on<br />
April 23, 1977. The Amite River in<br />
Denham Springs hit 4.7 feet above<br />
its previous record set in 1983 on<br />
Sunday morning. Records there<br />
date back to at least 1921, making<br />
this an impressive feat. These areas<br />
were already saturated with rain,<br />
and could not absorb water, allowing<br />
water to accumulate.<br />
3.) More Rain Fell Than Los Angeles<br />
Has Seen in More Than 3 Years:<br />
Since the start of 2012, Los Angeles<br />
has seen a total of 29.18 inches<br />
of rain. In just a few days, Watson,<br />
Louisiana, picked up two inches<br />
more than that amount with 31.39<br />
inches of rain during the event.<br />
4.) Second 24+ Inch Rain Event<br />
in Louisiana This Year: This is the<br />
second time in a matter of months<br />
that Louisiana has seen more than<br />
24 inches of rain from a single event.<br />
Almost 27 inches of rain fell southsoutheast<br />
of Monroe, Louisiana, on<br />
March 8-11, 2016. The official airport<br />
reporting station in Monroe<br />
picked up 20.66 inches of rain. Record<br />
flooding was observed on five<br />
river gauges in parts of the state,<br />
also topping the previous records by<br />
several feet.<br />
The potential for heavy rain and<br />
flooding will continue the next few<br />
days as the tropical moisture expands<br />
northward from the Gulf<br />
Coast and interacts with a stalled<br />
frontal boundary. Additional locally<br />
heavy rain will impact parts<br />
of the Gulf Coast, including southeast<br />
Texas and Louisiana, though<br />
amounts will not be nearly as heavy<br />
as seen the last few days. FYI.<br />
George Lane, a resident of Baton<br />
Rouge, Louisiana, has 25 years of<br />
experience in the development of<br />
chemical security systems, conducting<br />
research as a NASA Fellow at the<br />
Stennis Space Center and as a NASA<br />
Fellow. Lane was air quality SME for<br />
the University of California at Berkeley<br />
Center for Catastrophe Risk Management<br />
during the BP Oil Spill. He<br />
is currently Chemical <strong>Security</strong> SME<br />
for the Naval Post Graduate School<br />
Maritime Interdiction in the Center<br />
for Network Innovation and Experimentation.<br />
21<br />
Sign-up for<br />
Free GSN<br />
<strong>Digital</strong> <strong>Edition</strong>s<br />
and<br />
Email <strong>News</strong>letters<br />
Free subscription to your selection of<br />
GSN digital editions and daily/weekly<br />
email newsletters. Add new selections<br />
or opt-out of any selections at any<br />
time.<br />
Monthly <strong>Digital</strong> <strong>Edition</strong><br />
Airport/Seaport <strong>News</strong>letter<br />
Daily Insider <strong>News</strong>letter<br />
GSN Media Kit<br />
CLICK HERE<br />
The <strong>News</strong> Leader in<br />
Physical, IT and<br />
Homeland <strong>Security</strong><br />
www.gsnmagazine.com
Convy on Net-Centric <strong>Security</strong><br />
Securing the Internet of Things<br />
By John Convy, Convy Associates, Washington, DC<br />
Most people in technology know<br />
that the Internet of Things (IoT) is<br />
the vast network of physical objects<br />
and devices, vehicles, and buildings<br />
that have been embedded with<br />
electronics, software sensors, and<br />
network connectivity. This enables<br />
them to collect, exchange, and share<br />
data with each other and with big,<br />
analytic tools. It’s the<br />
digital offspring of<br />
the Internet, and it is<br />
growing up quickly.<br />
Connectivity is a<br />
fundamental part of<br />
our world, making<br />
our stuff “smarter.”<br />
In fact, its growth has been exponential.<br />
According to Markets and<br />
Marketing, Investments made in<br />
the Internet of Things are expected<br />
to increase from $6.89 billion per<br />
year in 2015 to $28 billion in 2020.<br />
Things we use every day – lighting,<br />
cars, healthcare, parking meters,<br />
and even our home appliances have<br />
become smarter and more connected.<br />
At a recent <strong>Security</strong> Industry Association<br />
Conference, I asked three<br />
prominent thought leaders to address<br />
the emerging questions concerning<br />
the Internet of Things and<br />
its vulnerability to attack.<br />
Chris Cressy, who leads Federal<br />
IoT Solutions at Cisco, emphasized<br />
the expanding value of the IoT. “IoT<br />
is transforming businesses and business<br />
processes, in the public sector.<br />
Integration and interoperability<br />
are fundamental needs that IoT<br />
“Customers should seek out vendors that<br />
are designing network security into their<br />
products, and are based on well-recognized<br />
standards, such as the NIST certification.”<br />
22<br />
can address. Integration increases<br />
operational efficiency. Traditional<br />
approaches to system security are<br />
called air gap – keeping systems isolated<br />
– but that does not work with<br />
IoT. You have to connect systems to<br />
get value. When you connect them,<br />
you do introduce vulnerability, but<br />
you can do continuous real-time<br />
monitoring of those systems.<br />
Cressy also outlined some key<br />
components for IoT system architecture<br />
for security. “At the bottom<br />
layer is basic IT security, essentially<br />
network segmentation with firewalls,<br />
VPNs,<br />
and VLANs.<br />
The second<br />
element is encryption, and lastly, we<br />
implement more advanced capabilities,<br />
such as real-time monitoring<br />
and real-time threat detection. Just<br />
as IoT is a phased implementation,<br />
so is IoT security.”<br />
Jeff Hill, an Enterprise<br />
Solutions<br />
Specialist at Spectra<br />
Logic, provided insight<br />
on another consequence<br />
of so much<br />
connectivity – the<br />
need for secure data<br />
storage. “The IoT is driving massive<br />
video growth because of automation<br />
and monitoring, and that video<br />
requires secured storage. Storage is<br />
becoming a much larger piece of<br />
the overall infrastructure because of<br />
the tools that we are able to leverage<br />
with storage, such as analytics.<br />
We are expecting that by 2019, 3.4<br />
Zeta Bytes of data will be transmitted<br />
over networks in an entire year,<br />
and security is one area where we<br />
are seeing tremendous growth,” he<br />
said.<br />
Hill believes that the best way to
store data is with hybrid clouds,<br />
which offer more flexibility in security<br />
and ownership in a concept he<br />
calls, “genetic diversity.” The other<br />
types of clouds are private clouds in<br />
which you own the hardware and<br />
control the security with a high-security<br />
protocol – and public clouds,<br />
which are extremely efficient for accessing<br />
information, but provide no<br />
benefits of ownership.<br />
“When considering best practices<br />
for IoT data, it’s important to<br />
plan infrastructure with a growth<br />
mindset. Genetic diversity represents<br />
scalable technology and tiered<br />
storage. A great example would be<br />
Facebook, because of the volume of<br />
their data – millions of videos and<br />
photos. They’ve found that it’s important<br />
not just to have it on local<br />
storage that can be accessed quickly,<br />
but they’ve diversified the tiers of<br />
storage and the kinds of storage they<br />
have, to ensure against all types of<br />
threats.”<br />
Hill also explained that enterpriseclass<br />
storage solutions are becoming<br />
increasingly more affordable, which<br />
makes securing data in the government<br />
sector much more cost-effective<br />
than not.<br />
Matt Bretoi, VP of <strong>Security</strong> Sales<br />
at Flir Systems, weighed in on how<br />
the convergence of cyber security,<br />
network security, and physical security<br />
are creating new challenges.<br />
“<strong>Security</strong> manufacturers have a dichotomous<br />
responsibility to protect<br />
the network from the security system<br />
and anything that migrates into<br />
it, and to protect the security system<br />
from the network,” he suggested.<br />
So what can manufacturers do to<br />
help customers protect their assets?<br />
“Customers should seek out vendors<br />
that are designing network security<br />
into their products, and are<br />
based on well-recognized standards,<br />
such as the NIST certification. This<br />
is a cyber security framework that<br />
ensures that any sensitive information<br />
such as user data is encrypted,<br />
and that users are able to identify<br />
third-party components. This reduces<br />
known vulnerabilities. All<br />
communications between the edge<br />
devices, such as cameras or access<br />
control card readers, should include<br />
proper encryption, such as Transport<br />
Layered <strong>Security</strong>. Minimally,<br />
SSL encryption should be used,”<br />
Bretoi said.<br />
Bretoi also explained that combining<br />
this strategy with robust<br />
authentication, such as two-factor<br />
authentication, creates a very powerful<br />
one-two punch. It is notable<br />
that NIST certification covers security<br />
audits for the equipment and<br />
penetration testing. He believes this<br />
is critical, and that collaboration<br />
and communication are essential<br />
when integrating physical and cyber<br />
23<br />
security.<br />
“Implementing these tools should<br />
be part of a system’s coding DNA,<br />
as a manufacturer’s first line of defense.<br />
The second front is deployment.<br />
It’s imperative that integration<br />
technicians – those people actually<br />
installing the system – understand<br />
cybersecurity, and employ best<br />
practices in implementation and<br />
maintenance,” Bretoi added. “End<br />
users should avail themselves of all<br />
training tools provided to them, so<br />
that vulnerabilities can be quickly<br />
identified and mitigated.”<br />
The opinions of these three experts<br />
were eye opening, and validated<br />
that the Internet of Things is fostering<br />
significant changes. It is not<br />
only transforming the way we live<br />
and work, but it is transforming the<br />
way we think about and implement<br />
strong security measures.<br />
John Convy and Convy Associates<br />
provide strategic alliance, A&E consultant,<br />
technology ecosystem, and<br />
lead generation programs to monetize<br />
relationships and accelerate demand<br />
for leading security industry<br />
manufacturers. John is the Founder<br />
and Managing Director of the Open<br />
Standards <strong>Security</strong> Alliance and the<br />
IP <strong>Security</strong> Academy, and a speaker<br />
at many global industry events.<br />
Email: John@ConvyAssociates.com
HID Global provides mid-year update on top<br />
trends for secure identity<br />
<strong>News</strong> Highlights:<br />
• Mobility and a better user experience<br />
continue to be the market’s<br />
top focus areas for the year.<br />
• Adding wearables to the device<br />
ecosystem has elevated awareness<br />
around the use of trusted digital<br />
identities across increasingly connected<br />
environments.<br />
• The need for privacy protection,<br />
improved mobile security, and<br />
trust in all transactions has intensified<br />
with growing interaction<br />
between the identities of things<br />
and people.<br />
AUSTIN, TX, July 14, 2016 – HID<br />
Global®, a worldwide leader in secure<br />
identity solutions, today released a<br />
mid-year update to its top 2016 security<br />
trends, based on customer insights<br />
into key market developments<br />
across enterprise, healthcare, banking<br />
and government markets. In the<br />
first six months of the year, the company<br />
noted continued forward movement<br />
in market adoption of mobile<br />
solutions and interest in the Internet<br />
of Things, as customers place more<br />
value on seamless environments that<br />
require trusted digital identities with<br />
heightened security and privacy protection.<br />
“Customers are increasingly investing<br />
in solutions that give them the<br />
flexibility to incorporate new and<br />
better capabilities that deliver a more<br />
satisfying connected experience for<br />
their users,” said Stefan Widing, HID<br />
Global President and CEO. “As we<br />
move through the middle of the year,<br />
we are experiencing a dramatic increase<br />
in customer demand for mobility,<br />
a better user experience, and<br />
connected environments. We have<br />
also forged new partnerships with<br />
major industry players who have the<br />
same vision to create an extraordinary<br />
user experience and we look forward<br />
to unveiling more about these<br />
partnerships as deployments progress<br />
throughout the year.”<br />
Following are HID Global’s midyear<br />
updates to the trends that the<br />
company forecasted in January:<br />
Trend #1: “Mobilizing” security will<br />
make it more pervasive and personalized:<br />
a new, more secure identity<br />
lifestyle will be built around the convenience<br />
of ever-present mobile devices.<br />
Computer and network logon,<br />
driver licenses and other applications<br />
will more seamlessly join physical<br />
security functions on phones, tablets<br />
24<br />
and laptops. Wearables will be the<br />
next step, and phones will also work<br />
with RFID tags to add security and<br />
trust to the IoT for proof-of-presence<br />
applications.<br />
Mid-year update: Demand for mobile<br />
solutions continues to grow, along with<br />
an increasing focus on security issues.<br />
Multiple studies revealed fears about<br />
mobile security, countered by growing<br />
demand in for the benefits of online<br />
and mobile functionality. The definition<br />
of mobility is also expanding to<br />
encompass the broader idea of “on-thego”<br />
convenience and efficiency, where<br />
smartphones can be used as both a credential<br />
and a general-purpose reader<br />
for new use cases. In a recent deployment<br />
at the CityPoint building in London,<br />
security guards are able use their<br />
smartphones as NFC readers; with a<br />
tap of their phone to RFID tags, guards<br />
can check keys in and out and prove<br />
presence at shift checkpoints.<br />
Trend #2: <strong>Security</strong> will move to a<br />
much greater focus on the user experience:<br />
This will help close the gap<br />
between planning and compliance,<br />
while ensuring that security adapts<br />
to rather than defines end-user habits<br />
and lifestyles. Old ways of authenti-<br />
More on page 26
cating will be replaced by more satisfying<br />
alternatives.<br />
Mid-year update: Customers continue<br />
to want an easier, more trustworthy<br />
way to use digital identities to access<br />
on-the-go services and applications.<br />
Studies repeatedly highlighted the importance<br />
of the user experience -- the<br />
Frost & Sullivan Asia Pacific study<br />
ranked it among the top two most important<br />
drivers for deploying mobile<br />
access control over the next three years.<br />
Biometrics continued to emerge as an<br />
effective solution for bringing<br />
together security and convenience<br />
together -- this approach<br />
is now used at four of<br />
Brazil’s top five financial institutions<br />
to simplify an estimated<br />
two billion trusted ATM<br />
transactions annually.<br />
Trend #3: Secure, connected<br />
identities will fuel safety and innovation<br />
in how we work, shop and play:<br />
The industry will enter its next new<br />
chapter of connected identities, employing<br />
multi-layered security strategies<br />
that also include biometrics in<br />
order to bind these identities to their<br />
legitimate owners.<br />
Mid-year update: An explosion<br />
of trusted digital identities began ushering<br />
in new innovation opportunities<br />
during the first half of the year. This<br />
trend is being fueled by a growing interest<br />
in wearables and use of sensors<br />
for IoT-based solutions aimed at new<br />
use cases for employee productivity, asset<br />
tracking, energy management and<br />
employee safety. These developments<br />
serve as critical points of unification<br />
for trusted identities that make digital<br />
interactions more personal, contextual<br />
and valuable, and will pave the way<br />
for innovations like building occupant<br />
apps for the smart facility that enhance<br />
the user experience. During 2016, financial<br />
institutions made some of<br />
the most visible advances on the trust<br />
front, adopting a multi-layered approach<br />
to addressing potential mobile<br />
banking challenges at both the front<br />
end (consumer devices) and the back<br />
end (banking systems that recognize<br />
and facilitate legitimate user requests<br />
through mobile devices).<br />
Trend #4: There will be more attention<br />
on privacy in an increasingly connected<br />
and mobile-first world: Identity<br />
will expand beyond people and<br />
their personal identity to the identity<br />
of objects and their authenticity, accentuating<br />
the need to protect personal<br />
information across increasingly<br />
26<br />
interconnected devices, services and<br />
applications.<br />
Mid-year update: Gartner forecasts<br />
that 5.5 million new “things” are getting<br />
connected every day in 2016, increasing<br />
the need for embedded security<br />
and privacy technology across the<br />
payments, transportation, industrial,<br />
consumer and healthcare markets.<br />
In the earlier CityPoint example, this<br />
“<strong>Security</strong> of Things” goal is achieved<br />
by adding trust to RFID tags and to<br />
their interactions with mobile devices.<br />
Biometrics also continues to<br />
play a pivotal role in privacy<br />
protection for an increasingly<br />
connected world, and solutions<br />
became available in early 2016<br />
that include intelligent encryption-enabled<br />
and tamper-resistant<br />
fingerprint devices to more<br />
effectively address these challenges.<br />
Trend #5: <strong>Security</strong> policies and best<br />
practices will become as important<br />
as technology advances: The industry<br />
will sharpen its focus on not only<br />
what to deploy, but how – from the<br />
first U.S. mobile driver licenses to<br />
unified credential management systems<br />
that enable organizations to<br />
more holistically address both facility<br />
and information security. Rather<br />
than focus exclusively on preventing<br />
breaches, the industry will also adopt<br />
best practices for controlling what<br />
More on page 43
FROM OUT Of THE BOX<br />
to STATE OF THE ART.<br />
ID CARD PRINTING INNOVATION.<br />
HID Global is leading the industry with the most robust portfolio of secure ID issuance<br />
solutions in the world. Our FARGO® line of printers and encoders provide governments,<br />
financial institutions and businesses of all sizes fast, efficient and reliable solutions that<br />
are as secure as they are affordable.<br />
You’ll call it innovation on demand. We call it, “your security connected.”<br />
YOUR SECURITY. CONNECTED | Visit us at hidglobal.com/printers<br />
© 2016 HID Global Corporation/ASSA ABLOY AB. All rights reserved. HID, HID Global, the HID Blue Brick logo, and the Chain Design are trademarks<br />
or registered trademarks of HID Global or its licensor(s)/supplier(s) in the US and other countries and may not be used without permission.
Forescout describes security challenges<br />
of handling both Republican and Democratic<br />
National Conventions<br />
By Katherine Gronberg,<br />
VP <strong>Government</strong> Affairs<br />
Inside RNC/DNC Convention<br />
Networks - Cybersecurity Challenges<br />
ForeScout had the honor of providing<br />
information security support<br />
for the Republican National Convention<br />
(RNC) and the Democratic<br />
National Convention (DNC). These<br />
were challenging environments<br />
as the networks were created and<br />
configured in a short time-span,<br />
they were more “IP-enabled” than<br />
any conventions in history and, of<br />
course, they were extremely high<br />
profile. But the lessons learned in<br />
Cleveland and Philadelphia are relevant<br />
to almost any complex network,<br />
including large commercial<br />
and government networks. It helped<br />
us to think about the conventions’<br />
networks in terms of buckets.<br />
Segmentation, Segmentation,<br />
Segmentation…<br />
Probably the biggest challenge in securing<br />
events like the conventions is<br />
that there are SO MANY ad hoc networks<br />
being created all the time. It’s<br />
an unavoidable requirement for the<br />
event to be successful. This happens<br />
in the commercial and government<br />
worlds too, although to a lesser extent.<br />
You have to divide your network<br />
up in to three high-level buckets.<br />
We called them The Wild West,<br />
Mission Control, and The Vault. If<br />
at all possible, these networks need<br />
to be completely isolated from each<br />
other. The key to success in the convention<br />
environments was to focus<br />
on controlling access to the most<br />
sensitive networks, while still ensuring<br />
that the less sensitive networks<br />
remained operational.<br />
The Wild West<br />
These days, people attending events<br />
like the conventions expect access to<br />
reliable free WiFi. Public access to<br />
WiFi enhances their experience and<br />
makes for a more successful and<br />
impactful event. However, “Secure<br />
free WiFi” is an oxymoron. When<br />
people connect to a public WiFi<br />
network, their traffic is often visible<br />
to other people on the network and<br />
they run a greater risk of having their<br />
device infected with malware. There<br />
are steps that can be taken to make<br />
users more secure, such as requiring<br />
WPA2 encryption and attempting<br />
to isolate users from each other, but<br />
28<br />
these efforts<br />
are only partially<br />
effective<br />
at best. In an<br />
environment<br />
like this, user<br />
education is<br />
necessary:<br />
instructing Katherine Gronberg<br />
users as to<br />
which network is the “Official” free<br />
WiFi network, and also advising users<br />
to not conduct sensitive business<br />
on public WiFi without establishing<br />
a VPN tunnel first. Above all else,<br />
the public free WiFi should NEVER<br />
have a connection back to Mission<br />
Control or The Vault. We developed<br />
specific policies that looked for<br />
cross-bucket communication and<br />
remediated any discovered anomalies.<br />
Mission Control<br />
Mission Control is the network for<br />
“official” business. These networks<br />
often include things like staff systems,<br />
kiosks, point-of-sale devices,<br />
VOIP phones, cameras, and many<br />
other mission-critical functions. In<br />
such a dynamic and transient network<br />
environment characterized by
so many wired and wireless<br />
network access points,<br />
unauthorized network access<br />
should be expected<br />
and planned for. Controlling<br />
access as much as possible<br />
by using passwords<br />
and other authentication<br />
protocols is critical. But<br />
the real key is continuous<br />
monitoring of the networks to<br />
look for unwanted behaviors (devices<br />
scanning your network, transmitting<br />
large amounts of data, or<br />
changing their profiles unexpectedly).<br />
Establishing a baseline of<br />
a known good state BEFORE the<br />
event begins is critical to identifying<br />
something that’s not supposed to be<br />
there. For all of the devices found,<br />
policies must be written that stipulate<br />
how a device must be handled<br />
depending on how it behaves. We<br />
started this process early on for the<br />
conventions and continually refined<br />
our baseline throughout the events.<br />
In addition to establishing a baseline,<br />
penetration testing, or “pentesting,”<br />
is highly encouraged. This<br />
will allow you to anticipate the<br />
methods that attackers may use to<br />
gain access to your network. Reconfiguring<br />
the network can mitigate<br />
some attacks. Others can be<br />
caught through Continuous Monitoring<br />
policies, but you first need to<br />
know what to look for. This is where<br />
a skilled pen tester comes in very<br />
handy. ForeScout did not pen test<br />
the conventions ourselves, however,<br />
we worked extensively with trusted<br />
White Hat resources to develop policies<br />
to catch malicious behavior that<br />
can indicate network intrusions.<br />
The Vault<br />
29<br />
The best advice for securing the<br />
most sensitive assets in an organization<br />
is: “Don’t connect it to the Internet!”<br />
If, for some reason, Internet<br />
connectivity is required, give these<br />
systems their own dedicated and<br />
highly monitored internet connection.<br />
Something as important as a<br />
teleprompter should be completely<br />
disconnected. A broadcast system<br />
is another example of something<br />
that deserves an isolated internet<br />
connection. If the only thing that is<br />
ever present on that connection is a<br />
broadcast system, network anomalies<br />
should be easy to detect. Leading<br />
up to the conventions, there was<br />
a lot of speculation around the potential<br />
hacking of teleprompters or<br />
broadcast systems, but in actuality,<br />
they were never connected to the<br />
convention networks. Physical security<br />
is also used to protect<br />
these assets – in this case,<br />
physical security was provided<br />
by Secret Service agents<br />
manning doors backstage. At<br />
a corporate datacenter, physical<br />
security is provided by<br />
things like guards and retinal<br />
scanners. At the end of the<br />
day, for your most critical assets,<br />
disconnect them from the network<br />
and rely on robust physical<br />
security.<br />
Katherine Gronberg is Vice President<br />
for <strong>Government</strong> Affairs at ForeScout<br />
Technologies. Prior to joining ForeScout,<br />
she was a professor at Georgetown<br />
University, teaching classes in<br />
cybersecurity and business-government<br />
relations. Katherine also founded<br />
and ran her own consulting firm,<br />
Gronberg Consulting, L.L.C., which<br />
represented top U.S. technology firms<br />
on their government relations strategies.<br />
Prior to this, Katherine worked<br />
for Morhard & Associates, L.L.C.<br />
Katherine began her Washington career<br />
in 2000 as a staff member on the<br />
Senate Appropriations Committee<br />
handling annual appropriations for<br />
a range of federal agencies. Katherine<br />
holds a Bachelor’s degree from Yale<br />
University, an MBA from the University<br />
of Virginia’s Darden School of<br />
Business, and is a former Fulbright<br />
Scholar.
Border <strong>Security</strong>/Immigration<br />
Why the Department of Homeland <strong>Security</strong><br />
should also end private prison contracts<br />
By Walter Ewing,<br />
American Immigration Coucil<br />
For two years, women and children<br />
from Honduras, El Salvador,<br />
and Guatemala have been fleeing to<br />
the United States to escape the extreme<br />
violence of gangs which control<br />
large swaths of territory within<br />
their home countries. And for two<br />
years the Obama Administration<br />
has responded to this humanitarian<br />
crisis by locking up the women<br />
and children seeking protection<br />
and then deporting them back to<br />
the countries where their lives may<br />
be in danger. In defiance of its obligations<br />
under international law,<br />
the Administration is<br />
Photo: Neil Conway<br />
trying to deter future Central<br />
American asylum<br />
seekers by coming down<br />
hard on current Central<br />
American asylum seekers.<br />
During that first “surge”<br />
of refugees two years ago, the<br />
Administration knew exactly what<br />
it needed to get a handle on the crisis:<br />
a bigger and better prison for<br />
women and children. And so, according<br />
to the Washington Post, the<br />
Administration handed a $1 billion,<br />
four-year contract to Corrections<br />
Corporation of America (CCA) to<br />
build a “massive detention facility<br />
for women and children seeking<br />
asylum.” In the sweetest of sweetheart<br />
deals, CCA “gets the money<br />
regardless of how many people are<br />
detained at the facility.”<br />
The facility in question<br />
is the South Texas Family<br />
Residential Center in Dilley,<br />
Texas. According to the<br />
Post:<br />
“In 2015, the first full year<br />
in which the South Texas<br />
Family Residential Center<br />
was operating, CCA—which<br />
operates 74 facilities—made<br />
30<br />
14 percent of its revenue<br />
from that one center<br />
while recording record<br />
profit. CCA declined to<br />
specify the costs of operating<br />
the center.”<br />
The Administration’s heavyhanded<br />
approach to the social turmoil<br />
currently engulfing Honduras,<br />
El Salvador, and Guatemala may<br />
mean big money for private contractors,<br />
but it’s not going to be an<br />
effective deterrent to women who<br />
are running for their lives or the<br />
lives of their children. If you or your<br />
child face murder, rape, or forced<br />
induction into a gang if you stay, as<br />
opposed to a slim chance of asylum<br />
if you head to the United States,<br />
then common sense dictates you<br />
head to the United States.<br />
Moreover, even looked at from a<br />
purely financial standpoint, CCA<br />
isn’t running a very cost-effective<br />
prison. The Post writes that:<br />
“When 2,400 people are detained,<br />
the government spends<br />
what amounts to $285 per day, per<br />
person, according to a Post calculation.<br />
When the facility is half-full,<br />
More on page 43
Donald Trump’s shortsighted immigration plans<br />
won’t secure the homeland<br />
By Walter Ewing<br />
As any serious national security expert<br />
will tell you, trying to find a potential<br />
terrorist by treating all immigrants<br />
or Muslims as security risks<br />
is far too vague to be effective. Accurate<br />
intelligence and effective information-sharing<br />
across agencies<br />
is the key to national security—not<br />
profiling. Yet in a bombastic <strong>August</strong><br />
15 speech, Republican presidential<br />
nominee Donald Trump offered up<br />
blatantly bigoted and utterly pointless<br />
proposals on national security<br />
including ideas like instituting an<br />
“ideological screening test” and “extreme<br />
vetting” to determine which<br />
would-be immigrants to the United<br />
States (especially Muslims) harbor<br />
“any hostile attitude towards our<br />
country or its principles.”<br />
Leaving aside Trump’s nativist<br />
histrionics, it would be a serious<br />
mistake to embrace policies that<br />
conflate immigration enforcement<br />
and counter-terrorism efforts, implying<br />
that immigration enforcement<br />
is a way to catch terrorists. In<br />
reality, immigration enforcement is<br />
not designed to catch terrorists; it is<br />
meant to catch people who violate<br />
immigration laws. Immigration-enforcement<br />
mechanisms might snare<br />
a terrorist if supplied with specific<br />
intelligence gleaned from counterterrorist<br />
operations, but immigration<br />
enforcement by itself is very<br />
unlikely to stumble upon and actually<br />
identify a terrorist. Without the<br />
right information in the right hands,<br />
even the most efficiently constructed<br />
immigration-enforcement and<br />
border-control mechanisms are not<br />
going to catch a terrorist.<br />
This is precisely why the 9/11<br />
Commission did not recommend<br />
that we adopt ethnic or religious<br />
profiling to help prevent another<br />
terrorist attack in the United States.<br />
Identifying threats actually depends<br />
on the development of “actionable<br />
intelligence” which identifies<br />
a specific threat, and then sharing<br />
that information with immigration<br />
and border-enforcement personnel.<br />
31<br />
Photo: Gage Skidmore<br />
This approach is a little more subtle<br />
than profiling millions of people,<br />
which actually undermines intelligence<br />
gathering by alienating ethnic<br />
and religious communities and the<br />
countries from which they come. A<br />
group of people who feel themselves<br />
to be under government attack is<br />
not likely to share information with<br />
(and report tips to) the same government<br />
which is attacking them.<br />
Nor are the governments of their<br />
home countries as likely to partner<br />
with the United States in counterterrorism<br />
operations.<br />
In evaluating the typically outlandish<br />
ideas thrown around by<br />
Trump, we should never forget that,<br />
shortly after 9/11, the federal government<br />
created the National <strong>Security</strong><br />
Entry-Exit Registration System<br />
(NSEERS). Under NSEERS, 83,000<br />
men from Muslim and Arab coun-<br />
More on page 44
Border <strong>Security</strong>/Immigration<br />
<strong>Government</strong> sued for withholding records<br />
on immigration raids<br />
By Tory Johnson<br />
The Department of<br />
Homeland <strong>Security</strong><br />
(DHS) is continuing<br />
to defend the controversial<br />
“Operation<br />
Border Guardian”<br />
program that<br />
took more than 100 Central American<br />
women and children from their<br />
homes in two days of immigration<br />
raids last January. According to a lawsuit<br />
filed this week by the Southern<br />
Poverty Law Center (SPLC) and the<br />
law firm Alston & Bird, the government<br />
has failed to release records related<br />
to the program under the Freedom<br />
of Information Act (FOIA).<br />
The complaint argues that DHS<br />
and its component agency Immigration<br />
and Customs Enforcement (ICE)<br />
violated public records law by failing<br />
to substantively respond to a January<br />
7 FOIA request seeking information<br />
related to the raids DHS conducted<br />
January 2 and January 3 in North<br />
Carolina, Georgia, and Texas. They<br />
are seeking records and information<br />
about how and why ICE went after<br />
the 121 individuals swept up in the<br />
raids.<br />
The widely-publicized round-ups<br />
raised concerns about constitutional<br />
and due process violations.<br />
146 members<br />
of Congress<br />
and more than 150<br />
organizations condemned<br />
the government’s<br />
actions,<br />
and local governments<br />
voiced their<br />
concerns about the damage to trust<br />
between communities and law enforcement.<br />
Lisa Graybill, SPLC deputy legal<br />
director, said that “there are serious<br />
questions about whether ICE agents’<br />
conduct during these raids violated<br />
the Constitution. We cannot allow<br />
ICE, the nation’s largest law enforcement<br />
agency, to avoid accountability<br />
and violate federal law by withholding<br />
these records.”<br />
The complaint alleges, for example,<br />
that ICE agents conducting the enforcement<br />
operations used deceptive<br />
tactics to enter homes. In some cases,<br />
according to the complaint:<br />
“ICE agents… stat[ed] that they<br />
were police officers looking for a<br />
criminal suspect and show[ed] residents<br />
a photo of an African-American<br />
man. In other instances, ICE<br />
agents allegedly stated that they were<br />
only taking the immigrants into custody<br />
for a short time to examine the<br />
32<br />
women’s electronic ankle shackles.”<br />
Moreover, “when asked for copies<br />
of warrants or orders to enter a home,<br />
ICE agents ignored the requests,<br />
threatened residents, or ordered them<br />
to ‘be quiet,’” according to the complaint.<br />
The families targeted by the raids<br />
actually had conditional permission<br />
to be in the United States. According<br />
to SPLC, they “had complied with orders<br />
of supervision provided by ICE,<br />
which permitted them to remain in<br />
the United States subject to certain<br />
conditions.” Yet the women and children<br />
were detained and most were<br />
subsequently deported. Only 12 families<br />
had their deportations halted,<br />
with the help of attorneys from the<br />
Dilley Pro Bono Project.<br />
ICE refuses to comment on pending<br />
litigation. The agency has 20 days<br />
and a 10-day extension to decide and<br />
notify SPLC whether or not it will<br />
comply with the request.<br />
Hopefully the government will act<br />
within that timeframe to release these<br />
important documents. As the complaint<br />
states, the public has a right to<br />
this information and the government<br />
a responsibility to be accountable for<br />
its actions.<br />
Photo: Julio Cesar
Court orders release of graphic photos of<br />
Arizona Border Patrol detention facilities<br />
WASHINGTON D.C. <strong>August</strong> 18,<br />
2016 - Today, groups made public<br />
damning evidence, including expert<br />
testimony and video stills illustrating<br />
the deplorable and unconstitutional<br />
conditions detained individuals<br />
are subjected to in Border<br />
Patrol custody in<br />
the agency’s Tucson<br />
Sector. The<br />
court rejected Border<br />
Patrol’s effort<br />
to conceal evidence<br />
of inhumane and<br />
abusive detention<br />
practices from the<br />
public. Accepting<br />
the position of the<br />
Plaintiffs and the<br />
Arizona Republic,<br />
which intervened to<br />
argue for the release<br />
of the materials, the<br />
court recognized that access to court<br />
proceedings and to basic information<br />
about governmental practices<br />
are fundamental First Amendment<br />
rights.<br />
The video stills and expert testimony<br />
released today reveal that Border<br />
Patrol holds individuals—among<br />
them traumatized asylum seekers<br />
and mothers with infants and small<br />
children—for days at a time in cold,<br />
overcrowded, and dirty cells that are<br />
designed to detain people for only<br />
a few hours. Graphic photographs<br />
show detainees packed head-to-foot<br />
Tucson facility: men wrapped in Mylar sheets on concrete floors and benches near<br />
trash & toilets<br />
in filthy, overcrowded rooms. One<br />
image captures a mother changing<br />
an infant’s diaper on a trash-strewn<br />
concrete floor.<br />
Also among the unsealed documents<br />
is testimony from an expert<br />
for the Plaintiffs who wrote that,<br />
in his 35 years of experience work-<br />
33<br />
ing in correctional facilities, he had<br />
“never been in one that treats those<br />
confined in a manner that the CBP<br />
treats detainees.”<br />
Among other conclusions about<br />
the poor treatment of individuals<br />
detained in Border Patrol facilities,<br />
he said that “[t]he<br />
absence of medical<br />
screening upon<br />
arrival is unthinkable,”<br />
and that he<br />
had never before<br />
witnessed an attempt<br />
to “cram” so<br />
many people into so<br />
little space, without<br />
beds and bedding.<br />
He concluded, “[t]<br />
he CBP [is] housing<br />
people in conditions<br />
that are unnecessarily<br />
harsh, dangerous<br />
and contrary to accepted industry<br />
practices and standards.”<br />
“Every step the <strong>Government</strong> has<br />
taken in response to this lawsuit has<br />
been designed to delay this suit and<br />
hide the conditions present at these<br />
facilities,” said Louise Stoupe of<br />
Morrison & Foerster. “The Govern-
Border <strong>Security</strong>/Immigration<br />
ment should be using the resources<br />
they are wasting in court to provide<br />
basic human necessities to those in<br />
its custody.”<br />
“Migrants detained in the Tucson<br />
sector have long suffered horrific<br />
conditions,” said Dan Pochoda,<br />
senior counsel for the ACLU of<br />
Arizona. “It is unconscionable that<br />
the federal government continues<br />
to detain people including infants<br />
in this manner. The Border Patrol<br />
continues to operate in violation of<br />
U.S. and international law as well<br />
as its own standards without being<br />
held accountable for these egregious<br />
abuses.”<br />
“These photos show the harm<br />
people suffer in these facilities, from<br />
having to sleep on the floor for days<br />
to needing to huddle together just to<br />
stay warm,” said Travis Silva, attorney<br />
with the Lawyers’ Committee<br />
for Civil Rights of the San Francisco<br />
Bay Area. “These conditions should<br />
not exist in a facility operated by the<br />
United States government.”<br />
“The images unsealed by the court<br />
leave no room to debate the fact<br />
that thousands of immigrants are<br />
subjected to inhumane and unconstitutional<br />
conditions by the Border<br />
Patrol,” said Nora Preciado, staff attorney<br />
with the National Immigration<br />
Law Center. “We urgently need<br />
meaningful and lasting reforms that<br />
put an end to these abuses, hold the<br />
agency accountable, and ensure that<br />
people are treated with dignity.”<br />
“Mothers should not be forced to<br />
change their babies’ diapers on cold<br />
concrete floors or warm them with<br />
flimsy aluminum sheets. Border<br />
Patrol’s treatment of men, women<br />
and children in its custody is simply<br />
inexcusable,” said Mary Kenney,<br />
senior staff attorney for the American<br />
Immigration Council. “We are<br />
seeking immediate relief from the<br />
deplorable detention conditions in<br />
CBP holding facilities for the thousands<br />
of individuals who are or will<br />
be held there while this case progresses.”<br />
In December, attorneys representing<br />
the Plaintiff class of detained<br />
immigrants sought a preliminary<br />
injunction to stop Border Patrol’s<br />
unconstitutional detention practices<br />
while the case is being litigated. The<br />
injunction is based on compelling<br />
evidence of inhumane conditions<br />
in Tucson facilities—much of which<br />
was disclosed after the Court sanctioned<br />
Border Patrol for destroying<br />
video recordings from these facilities<br />
and failing to turn over other<br />
relevant documentation.<br />
Jane Doe, et al. v. Johnson, et al.<br />
was filed in the U.S. District Court<br />
for the District of Arizona. Attorneys<br />
on the case include Harold J.<br />
34<br />
McElhinny, Colette Reiner Mayer,<br />
Louise C. Stoupe, Kevin M. Coles,<br />
Pieter S. de Ganon, and Elizabeth<br />
Balassone of Morrison & Foerster<br />
LLP; Nora Preciado, Linton Joaquin,<br />
and Karen C. Tumlin of the<br />
National Immigration Law Center;<br />
Mary Kenney, and Melissa Crow of<br />
the American Immigration Council;<br />
Travis Silva of the Lawyers’<br />
Committee for Civil Rights of the<br />
San Francisco Bay Area; and Kathy<br />
Brody, Brenda Muñoz Furnish, and<br />
Dan Pochoda of ACLU of Arizona.<br />
For additional links see:<br />
• Challenging Unconstitutions<br />
Conditions in CBP Short Term<br />
Detention Facilities (Litigation<br />
Page)<br />
• Photo Exhibits of CBP Short-<br />
Term Detention Conditions<br />
• Declaration by Joe Goldenson,<br />
M.D., Medical Conditions Expert<br />
• Declaration by Eldon Vail,<br />
Prison Conditions Expert<br />
• Declaration by Robert W. Powitz,<br />
Sanitation Expert<br />
• Detained Beyond the Limit:<br />
Prolonged Confinement by U.S.<br />
Customs and Border Protection<br />
along the Southwest Border (Special<br />
Report, <strong>August</strong> 2016)
3M’s new ALPR software extends reach, delivers<br />
real-time actionable intelligence<br />
ST. PAUL‚ Minn. – (<strong>August</strong> 4‚ 2016)<br />
– In order to create and maintain<br />
safe communities, law enforcement<br />
agencies are increasingly relying on<br />
technology. A new tool for officers<br />
is now available; 3M is proud to introduce<br />
3M Plate Alert Analytical<br />
ALPR Software, a next-generation<br />
ALPR software which uses data fusion<br />
analytics and proactive alerts to<br />
provide more answers and the confidence<br />
to act.<br />
Designed to be fast, powerful and<br />
intuitive, 3M Plate Alert Software<br />
allows officers to take action, faster.<br />
Collaborating with Human Factors<br />
Scientists to ensure the software<br />
can be learned quickly and used<br />
efficiently, Plate Alert Software features<br />
the latest user-centered design<br />
methods to optimize interfaces and<br />
usability. This makes it easier to set<br />
up, search, get alerts and find leads.<br />
3M also partnered with law enforcement<br />
agencies to offer the most<br />
in-demand features. The result is an<br />
ALPR software that is powerful and<br />
easy to use, so officers spend less<br />
time clicking and more time following<br />
up on leads.<br />
Going beyond typical ALPR<br />
software, which notifies users<br />
when a plate read matches a watch<br />
list, 3M’s Plate Alert Software features<br />
pattern management alerts.<br />
Designed to proactively provide<br />
relevant information and actionable<br />
insights in near real-time, pattern<br />
alerts ensure almost all of the work<br />
is done before an officer even looks<br />
at the data. Notifications are sent<br />
when the system detects activity<br />
matching a pre-defined pattern that<br />
may suggest illicit activity.<br />
“Plate Alert Software uncovers<br />
relevant connections and provides<br />
a clear view of how seemingly unrelated<br />
people, places, things and<br />
events are connected, and how they<br />
impact each other,” said Seth Stores,<br />
global business manager at 3M. “By<br />
providing a more complete, informative<br />
and accurate picture, officers<br />
35<br />
can spot patterns faster and take<br />
action to keep their communities<br />
safe.”<br />
3M Plate Alert Analytical ALPR<br />
Software is the first ALPR software<br />
powered by data fusion analytics.<br />
Plate Alert Software can compile<br />
ALPR data with data from various<br />
sources, such as 911 calls, pawn<br />
data, police reports, motor vehicle<br />
data and more. It can then almost<br />
instantly find connections between<br />
data points to deliver solid, meaningful<br />
leads. By linking and simultaneously<br />
evaluating numerous common<br />
characteristics across multiple<br />
data sources, Plate Alert Software<br />
can uncover unexpected relationships<br />
and associations. This means<br />
law enforcements agencies can get<br />
new answers and leads from their<br />
data. Using sophisticated secondorder<br />
analysis, data fusion analytics<br />
deliver more actionable intelligence<br />
than conventional ALPR software,<br />
which rely on first-order analysis.<br />
Plate Alert Software also has increased<br />
data privacy measures.<br />
Mandatory controls ensure data is<br />
only accessed for legitimate purposes<br />
by customer chosen individu-<br />
More on page 44
DevMynd obtains strategic investment from<br />
Motorola Solutions<br />
CHICAGO, IL, Aug. 18, 2016 –<br />
DevMynd, a leading-edge digital<br />
innovation consulting firm, announced<br />
today that it received<br />
Series A funding from Motorola<br />
Solutions Venture Capital.<br />
JC Grubbs, CEO, DevMynd,<br />
said the investment opens new<br />
collaborative opportunities that<br />
include the wave of innovation occurring<br />
in public safety and commercial<br />
communications.<br />
“We couldn’t be happier to be working<br />
with a partner that has such a rich<br />
tradition of solving problems that<br />
have a meaningful impact on people<br />
in critical situations,” Grubbs said.<br />
“Those are the types of challenges<br />
that we like to work on at DevMynd<br />
– things that really give us purpose.<br />
“Our experience in human-centered<br />
user research, user experience<br />
and service design will help Motorola<br />
Solutions and its customers develop<br />
products and apps that solve nextgeneration<br />
challenges,” he added.<br />
“And, we’re excited about opportunities<br />
to apply software engineering<br />
expertise to mobile, web and device<br />
needs that will result in robust, enterprise-grade<br />
solutions.”<br />
Paul Steinberg, chief technology officer,<br />
Motorola Solutions, said, “Both<br />
of our organizations look forward to<br />
working together on several fronts.<br />
DevMynd is an excellent example of<br />
our support of and collaboration with<br />
the entrepreneurial community in<br />
Chicago.<br />
“The adoption of broadband technology<br />
is driving innovation in public<br />
safety and commercial communications,”<br />
he added. “We know that<br />
tailored software and services will<br />
be required to deliver solutions and<br />
capabilities to our customers. We’re<br />
pursuing technological advances<br />
such as interoperable mobile applications<br />
for mission-critical communications<br />
and collaboration, enhanced<br />
situational awareness, real-time rich<br />
messaging, data analytics, and artificial<br />
intelligence. All of these are on<br />
the immediate horizon and we are<br />
looking for DevMynd to help us get<br />
these capabilities to our customers.”<br />
The strategic investment will allow<br />
DevMynd to expand its team,<br />
add new capabilities and enter new<br />
markets. It also will support access<br />
to strong strategy, design and custom<br />
software development services for<br />
Motorola Solutions and its customers.<br />
36<br />
About DevMynd<br />
DevMynd is an innovation firm in<br />
Chicago and San Francisco with<br />
practice areas in digital strategy,<br />
human-centered design, UI/UX,<br />
and custom mobile and web application<br />
development. The firm’s<br />
mission is to help its clients use<br />
technology to solve meaningful<br />
problems that have a profound<br />
impact on life, society and business.<br />
They serve clients ranging from startups<br />
to Fortune 100 firms that are investing<br />
in design, digital transformation<br />
and innovation. Learn more at<br />
https://www.devmynd.com.<br />
About Motorola Solutions<br />
Motorola Solutions (NYSE: MSI) creates<br />
innovative, mission-critical communication<br />
solutions and services<br />
that help public safety and commercial<br />
customers build safer cities and<br />
thriving communities. For ongoing<br />
news, http://www.motorolasolutions.<br />
com/newsroom or subscribe to a news<br />
feed.
Albuquerque police fight violence with<br />
intelligence-led policing<br />
The state of New Mexico has long<br />
held the dubious honor of high placement<br />
on the FBI National Crime Data<br />
Report. In 2014, the state was ranked<br />
the #2 most dangerous state in the<br />
Union. The city of Albuquerque has<br />
suffered a particularly high rate of<br />
violent crimes, with the number of<br />
murders in the city almost doubling<br />
between 2009-2013.<br />
Among the problems contributing<br />
to the high crime rate in Albuquerque<br />
is a proliferation of gangs. The<br />
Stop Albuquerque Gangs Task Force<br />
maintains an online list of known<br />
violent groups in the city. At the time<br />
of this writing, more than 100 gangs<br />
were listed on the website. The Albuquerque<br />
Police Department (APD)<br />
is not one of exceptional size, and<br />
has historically struggled to provide<br />
enough officers to effectively combat<br />
the problem.<br />
The APD is not the first and will not<br />
be the last police department to face<br />
this dilemma. Criminals have become<br />
more numerous, craftier, and are<br />
quick to take advantage of new technologies.<br />
Reactive police action, the<br />
traditional model of law enforcement<br />
in which police respond to crimes as<br />
they happen, has been steadily losing<br />
ground in the war against crime.<br />
Instead, more and more police departments,<br />
the APD included, are<br />
turning to a new paradigm known as<br />
intelligence-led policing. The core of<br />
this law enforcement model is “Work<br />
smarter, not harder.” In an intelligence-led<br />
police department, officers<br />
collect and analyze data using a variety<br />
of technologies and techniques.<br />
The data is used to decide where police<br />
resources should be committed to<br />
have the greatest effect. Intelligence<br />
officers are tasked with identifying<br />
repeat offenders and high risk areas,<br />
so that a department’s limited human<br />
resources can be utilized most efficiently.<br />
Intelligence-led<br />
policing is a revelation<br />
within the law<br />
enforcement community.<br />
In a study<br />
conducted by the<br />
non-profit Police<br />
Executive Research<br />
Forum (PERF), 54%<br />
of responding agencies<br />
reported that<br />
37<br />
they planned to increase the use of<br />
the practice within the near future.<br />
According to Wikipedia, intelligenceled<br />
policing has also found widespread<br />
adoption in Canada, Mexico,<br />
the UK, and New Zealand.<br />
A subset of intelligence-led policing<br />
is the burgeoning field of predictive<br />
policing. Intelligence officers within a<br />
department use collected data to construct<br />
heat maps and other models in<br />
an effort to predict where crimes are<br />
likely to occur, days or even weeks before<br />
they do.<br />
The heat map incorporates a vast<br />
amount of data about criminal activity<br />
over an area, allowing officers to<br />
visually identify the locations where<br />
crimes most densely concentrated.<br />
This technique allows “boots on the<br />
ground” to be sent where they can<br />
have the greatest positive effect, without<br />
wasting time patrolling quiet,<br />
low-risk areas. By patrolling the most<br />
crime-dense areas of Albuquerque,<br />
the APD is able to benefit the entire<br />
city by targeting the root causes of<br />
criminal activity.<br />
In Albuquerque, predictive policing<br />
requires the high volume collection of<br />
data about gang members and other<br />
likely criminal elements. The APD<br />
has successfully leveraged technology<br />
to accomplish this task in several<br />
ways.<br />
In 2013, the APD opened the Re-
al-Time Crime Center (RTCC). The<br />
RTCC is a locus of crime prevention<br />
technology, staffed with trained operators<br />
who monitor a network of static<br />
cameras around the city that today<br />
exceeds 1,000 units. RTCC personnel<br />
also monitor pawn shops for stolen<br />
goods and distribute a daily newscast<br />
to APD officers. They are largely responsible<br />
for the creation of the heat<br />
maps APD higher-ups use to intelligently<br />
assign police. The RTCC has<br />
proven effective, and is the recipient<br />
of an award from the International<br />
Association of Law Enforcement<br />
Planners.<br />
In its efforts to further develop the<br />
effectiveness of the RTCC and the<br />
APD as a whole, in 2014 the City of Albuquerque<br />
decided to invest in more<br />
advanced technology for its network<br />
of surveillance cameras. The selection<br />
criteria for the cameras prioritized<br />
flexibility and return on investment,<br />
meaning the cameras would have to<br />
cover more ground than the comparatively<br />
basic static-mounted cameras<br />
that comprised the original network.<br />
The new cameras would also necessarily<br />
be compatible with the existing<br />
systems at the RTCC, with a minimum<br />
of equipment retooling, software<br />
redevelopment, and operator<br />
retraining. After evaluating and testing<br />
camera solutions from a number<br />
of manufacturers across the United<br />
States, the APD settled on the Mobile<br />
Surveillance Unit (MSU) from<br />
ECAMSECURE.<br />
The MSU is essentially a freestanding<br />
camera tower. Each unit is portable<br />
enough to be towed by police<br />
vehicles, and can power and support<br />
a number of cameras with varying<br />
configurations. ECAMSECURE custom-designed<br />
and constructed several<br />
MSUs that incorporated a variety<br />
of pan / tilt / zoom (PTZ) cameras<br />
and fixed-angle HD cameras with a<br />
speaker feature to alert crowds to disperse.<br />
The portable nature of the MSUs<br />
has made them a perfect fit for Albuquerque’s<br />
push towards intelligenceled<br />
policing. The APD can now assign<br />
MSUs to heavy crime areas just as it<br />
does human officers. The imposing<br />
structures, bristling with cameras,<br />
have proven an effective deterrent for<br />
crime.<br />
By moving the MSUs from location<br />
to location, the APD keep criminals<br />
guessing as to whether or not they<br />
are under surveillance. The cameras<br />
have proven a boon for law-abiding<br />
citizens. <strong>News</strong> coverage reports that<br />
residents often feel safer and more<br />
protected with the cameras present.<br />
After moving an MSU out of a neighborhood,<br />
the APD typically fields requests<br />
and petitions for the cameras<br />
to return.<br />
Since the MSUs are a custombuilt<br />
solution tailored to each client,<br />
ECAMSECURE was able to ensure<br />
that they would be seamlessly compatible<br />
with the existing equipment<br />
and software at the RTCC. By sourcing<br />
compatible hardware and modifying<br />
software where needed, the<br />
MSU deployed in Albuquerque can<br />
be accessed by RTCC operators using<br />
largely the same interface and software<br />
they have already used for years.<br />
38<br />
ECAMSECURE technicians accompanied<br />
the initial deployment of<br />
MSUs to Albuquerque to train RTCC<br />
operators in their use, and support<br />
personnel have remained on-call to<br />
the APD 24/7. The APD leadership<br />
has praised ECAMSECURE for its<br />
dedication to service and support,<br />
especially the fast response time and<br />
willingness to resolve any issue, problem,<br />
or concern.<br />
The Mobile Surveillance Units have<br />
proven to be an excellent fit for the<br />
APD, and an order for additional<br />
units is already underway. ECAMSE-<br />
CURE is making several design upgrades<br />
and improvements for the next<br />
shipment of MSUs. The new units will<br />
include license plate capture, as well<br />
as other refinements. The existing run<br />
already deployed in Albuquerque will<br />
also be upgraded to match the new<br />
units.<br />
The crime rate in Albuquerque is<br />
today still high, but dropping through<br />
the efforts of the APD, the RTCC, and<br />
ECAMSECURE. Using the MSUs, the<br />
RTCC is able to alert APD officers of<br />
crimes in progress, as well as in suspicious<br />
activity or congregations that<br />
may erupt into violence. Using the<br />
two-way audio features, RTCC operators<br />
can even resolve some situations<br />
on their own, by broadcasting to<br />
would-be criminals that the police are<br />
on their way.<br />
The partnership is expected to continue,<br />
helping the APD leverage the<br />
latest technologies to safeguard the<br />
law-abiding residents of the city.
Access Control/Biometric ID<br />
Peter Smallridge, 3M Traffic Safety and <strong>Security</strong> Manager,<br />
discusses E.U. border security management, trends, new<br />
3M products and similarity to U.S. practices<br />
By Adrian Courtenay<br />
In a wide-ranging discussion that<br />
covered successful border security<br />
initiatives, new directions and<br />
needs for improvement in border<br />
security management in the European<br />
Union, including comparisons<br />
with U.S. practices, Peter Smallridge<br />
outlined the pros and cons of<br />
passport readers, biometrics, facial<br />
recognition, passwords with<br />
chips on them, automated border<br />
control, kiosks, mobile transport<br />
and the treatment of refugees.<br />
By necessity, the discussion also<br />
focused on the many ways to enter<br />
a country, from airports and<br />
seaports to automobiles, trains and<br />
private planes – not to mention the<br />
question of what happens to people<br />
after they have arrived in a country.<br />
“Many companies around the<br />
world are talking about exit,” said<br />
Smallridge. “They come in, we don’t<br />
know if they went home. Is he or she<br />
still here? We have no information<br />
whatsoever. That’s the big concern.<br />
In an ideal world, you want reporting<br />
of people coming in through any<br />
mobile transport – and recording of<br />
the exit. This is a megatrend.”<br />
“Across the world, border agencies<br />
are trying to get smarter,” he<br />
pointed out. “We focus on airports<br />
and mainly on people arriving<br />
through the airport. But in the E.U.<br />
we’ve found in some cities that only<br />
50% of the people enter via airports.<br />
Many cross land borders to go to<br />
work each day. Some come through<br />
seaports, some through civil airports.<br />
And you can leave by different<br />
routes or border agencies.”<br />
In response to security incidents<br />
or terrorism, Smallridge pointed<br />
out, a second reality in border security,<br />
that governments can be<br />
pressed for cash. <strong>Government</strong>s<br />
think this is where they can save<br />
some money. And unfortunately<br />
39<br />
this happens at the same time they<br />
want to replicate their installations<br />
into different locations.<br />
The solution that is taking place<br />
is that there is a big move toward<br />
Automated Border Control (ABC).<br />
It could be kiosks, gates or barriers<br />
– sometimes called – gates.<br />
Sometimes these are for everybody,<br />
sometimes they’re for people who<br />
register, as in the Global Entry<br />
System. This is about processing<br />
people in a self-service way. “It’s<br />
the least we can do with resident<br />
nationals or people from friendly<br />
countries who probably are not a<br />
risk – if you can get them to use<br />
the machines. Depending on the<br />
situation, some numbers of officers<br />
may have to be deployed in some<br />
venues.”<br />
But deploying officers can also<br />
create a major challenge – a technical<br />
one, because an officer from<br />
one post who then goes to another<br />
post to operate a different type of<br />
machinery may not know how to<br />
do it. This can be problematic, for<br />
instance, if the officer has to handle<br />
a finger print reader that he is not
Access Control/Biometric ID<br />
familiar with and neither is the traveler,<br />
it can call delays.<br />
There are lots of technical issues<br />
like these that 3M is considering,<br />
said Smallridge. “For example, if<br />
there’s a chip on the passport and it<br />
takes several seconds to open, and<br />
the user is used to seeing chips in<br />
a supermarket, he or she may need<br />
help in order to be processed. Our<br />
objective here is to make the systems<br />
easier to use, more intuitive, so<br />
that we can use them without having<br />
to think.”<br />
Automated Border Control is also<br />
being considered in the E.U. for sea<br />
borders. People arriving by ship<br />
may be coming off a car and may<br />
come to a barrier system where they<br />
are processed by password and fingerprint.<br />
Or they may have to get<br />
out of the vehicle, go into a building,<br />
or you drive next to a barrier of<br />
some sort.<br />
In the case of trains, an officer<br />
may have to walk through a with<br />
some kind of mobile device processing<br />
people as they go through. But<br />
often, because the train is going to<br />
arrive soon at the next station, and<br />
people are going to get off, there are<br />
more complications.<br />
Alongside all of that, there is the<br />
subject of biometrics. Typically, finger<br />
prints have been the most accurate<br />
and reliable system. They can<br />
also benefit law enforcement agencies,<br />
when they catch criminals or<br />
when they find evidence left behind,<br />
since the law enforcement officers<br />
do not typically have Iris processing.<br />
Finger prints have been the<br />
main biometric used for authentication.<br />
But that is changing, says<br />
Smallridge. “In order to process<br />
these people properly and to avoid<br />
queues, agencies are looking to use<br />
more than one type if biometric,<br />
because it takes too long to find<br />
the fingerprint. Thus we’re going<br />
to have to more than one biometric,<br />
because it takes too long to find<br />
the fingerprint. Thus many agencies<br />
around the world are now talking<br />
about ‘face and finger.’ If I select two<br />
of them on the way in, I can use anyone<br />
of them on the way out. It might<br />
be easier to face the people without<br />
stopping them.”<br />
The need for two means of processing<br />
has also created interest in<br />
iris usage, when neither face or finger<br />
are a good idea, such as where<br />
40<br />
it’s difficult to lean across a vehicle<br />
where someone is sitting next to the<br />
window, to finger print somebody,<br />
or when it is too dark to see their<br />
faces It also may be too dark to see<br />
their faces.<br />
Summing up on the logistical<br />
challenges, if you tighten up on the<br />
system, how do you avoid lines? If<br />
you’re going to the U.S., you don’t<br />
want to wait two hours to be processed.<br />
That’s why there’s so much<br />
effort being put into effect to make<br />
things smarter, and that’s why prebooking<br />
is getting more uses. When<br />
you book American Airlines, for example,<br />
they ask you for your passport<br />
during the booking process,<br />
and the information is supplied to<br />
the country of arrival, which will<br />
either use it to interview you when<br />
you arrive or possibly tell the airport<br />
not to board you.<br />
“We’re going to see more of these<br />
types of systems,” says Smallridge.<br />
“When I come to the United States,<br />
I get an ESTA, which is a kind of<br />
visa. The U.K. is a visa waiver country,<br />
where you buy a twelve month<br />
visa that costs something like $15.<br />
The ESTA determines validity of the<br />
entry to the country. In some countries,<br />
you have to go to the airport,<br />
where you provide ten fingerprints<br />
and probably will be asked a few<br />
More on page 44
LBsecure promotes best-of-class granular<br />
and layered security solutions for its clients<br />
within SAP<br />
LBsecure is partnered with realtime,<br />
a unique “Control and Monitoring”<br />
security software for SAP,<br />
called bioLock. Designed by former<br />
SAP engineers, bioLock allows you<br />
to secure your SAP enterprise from<br />
the inside-out, with granular and<br />
layered solutions, including unique<br />
identification and natively embedded<br />
SAP security software.<br />
With successful installations<br />
around the world, bioLock’s software<br />
and biometric re-authentication<br />
protocols can easily be installed<br />
through a port natively embedded<br />
within your SAP ERP. Also providing<br />
flexibility and integration with<br />
many different biometric partners.<br />
bioLock can distinguish between<br />
legitimate users and imposters in<br />
real time and instantly alert risk<br />
management and senior administrators<br />
by secure email notification.<br />
bioLock is easy to install and does<br />
not require any outside monitoring<br />
or the expense of MSSP support.<br />
It also eliminates any need for 3rd<br />
party security monitors to have access<br />
to your privileged information.<br />
SAP normally relies<br />
on simple single<br />
sign-on procedures or<br />
“password only” protection<br />
to gain access.<br />
Unfortunately stolen or shared administrative<br />
passwords allow intruders<br />
to roam freely once inside<br />
the system. Insider fraud can be a<br />
major risk factor for this very reason.<br />
Now SAP administrators can easily<br />
make dramatic security improvements<br />
by implementing rigorous reauthentication<br />
protection at layered<br />
and granular levels. Customizing<br />
user-specific biometric checkpoints<br />
dictated by the organization and the<br />
governing body and not an outside<br />
security provider.<br />
Enhancing your present SAP<br />
security solution with bioLock’s<br />
unique identity management solution.<br />
Providing positive re-authentication<br />
and indisputable realtime<br />
audit trails. In addition to providing<br />
the best defense against fraud, bioLock<br />
ensures compliance with various<br />
government regulations, which<br />
41<br />
rely on log-in activities within SAP,<br />
i.e. ITAR, HIPAA, Sarbanes Oxley,<br />
GRC, etc.<br />
We invite you to explore and evaluate<br />
how bioLock can further protect<br />
your SAP initiative from unwanted<br />
intrusion, as it has done for<br />
many businesses around the world<br />
from finance, supply chain, pharmaceutical<br />
and many many more.<br />
Case Studies are available for Supply<br />
Chain, Banking Fraud, Procure<br />
to Pay, Payroll Fraud, Retail/POS,<br />
Employee Self-service, Workflow<br />
Approvals, Perimeter <strong>Security</strong>,<br />
HIPAA Compliance, Public Sector<br />
Fraud.
Cypherpath, Quali partnership<br />
provides portable containerized<br />
infrastructures<br />
Continued from page 10<br />
their underlying IT infrastructure<br />
“Public and private sector organizations<br />
need agility and security<br />
to compete, which is forcing them<br />
to look for solutions that bypass all<br />
of the roadblocks caused by legacy<br />
infrastructure,” said Danial Faizullabhoy,<br />
president and CEO, Cypherpath.<br />
“Through this partnership, our<br />
joint customers have access to innovative<br />
on-demand solutions that<br />
provide IT infrastructures to support<br />
testing, training, and experimenting<br />
in sandboxes and cyber ranges at<br />
scale.”<br />
“The modern enterprise needs to<br />
be extremely vigilant and responsive<br />
to sophisticated security threats. Cyber<br />
ranges are a great tool to simulate<br />
real-world attack scenarios in a controlled<br />
environment and strengthen<br />
the security posture”, said Lior<br />
Koriat, CEO, Quali. “Quali cloud<br />
sandboxes help organizations build<br />
cyber ranges and other portable ondemand<br />
environments in a cost effective<br />
manner to model, orchestrate<br />
and test advanced threats. We’re excited<br />
to partner with Cypherpath to<br />
offer this solution to our defense and<br />
enterprise customers.”<br />
About Quali<br />
Quali is the leading provider of<br />
Cloud Sandboxes for automating<br />
the DevOps lifecycle. Quali gives innovators<br />
control over their world by<br />
enabling them to create personalized<br />
replicas of the most complex production<br />
environments. The Cloud providers,<br />
Telcos, Technology vendors<br />
and Enterprises including the Global<br />
100 depend on Quali to help them<br />
deliver their products and services to<br />
market faster and with better quality.<br />
Learn more at: http://www.quali.com<br />
About Cypherpath<br />
Enterprises rely on Cypherpath to<br />
create, deliver and manage containerized<br />
on-demand infrastructure at<br />
the lowest possible cost while providing<br />
container security and simplified<br />
control of the entire stack.<br />
Cypherpath’s industry-leading enterprise<br />
software platform encapsulates<br />
virtualized compute, network,<br />
and storage resources into software<br />
containers running on commodity<br />
hardware. Learn more at http://www.<br />
cypherpath.com<br />
About TSI<br />
TSI is a systems integrator and value<br />
added reseller focusing on providing<br />
innovative automation, orchestration,<br />
test, and virtualization solutions<br />
for network centric environments.<br />
TSI has been Quali’s Partner<br />
and Service Provider since 2010 integrating<br />
tools like those from Cypherpath.<br />
For information go to our<br />
website www.tsieda.com or email at<br />
sales@tsieda.com.<br />
42<br />
Telos Corporation: 2016 Winner,<br />
Best Biometric Identification/<br />
Authentication Solution<br />
Continued from page 13<br />
FBI and TSA have engaged Telos<br />
ID on a pilot basis to be part of the<br />
continuous-vetting/always-on FBI<br />
Rap Back Program. As continuous<br />
monitoring and assessment are to<br />
IT security, so continuous vetting<br />
is to the insider threat. To know<br />
in real time that a previously vetted<br />
employee’s criminal record has<br />
changed, for example, offers another<br />
critical tool for securing our<br />
airports.<br />
FREE SUBSCRIPTION<br />
SIGN-UP<br />
Monthly <strong>Digital</strong> <strong>Edition</strong><br />
Airport/Seaport <strong>News</strong>letter<br />
Daily Insider <strong>News</strong>letter<br />
GSN Media Kit<br />
CLICK HERE
HID Global provides mid-year<br />
update on top trends<br />
Continued from page 26<br />
happens afterwards, so stolen identities<br />
are useless to thieves.<br />
Mid-year update: Through mid-year,<br />
the world moved closer to deploying<br />
driver licenses on mobile phones, while<br />
two key policy issues emerged through<br />
mid-year: protecting privacy by using<br />
a smartphone’s Bluetooth connection<br />
so users needn’t physically relinquish<br />
their smartphones to officers and officials,<br />
and ensuring citizens can control<br />
what data is made available to others.<br />
Beyond citizen ID, general security<br />
best practices and policies remain important<br />
for virtually any organization,<br />
and demand grew for HID Global services<br />
that help customers deploy innovative<br />
solutions to meet compliance,<br />
security and risk management needs,<br />
while enabling new, value-added capabilities.<br />
HID Global’s Seos® credential technology<br />
continues to help drive these<br />
trends, enabling organizations to<br />
confidently incorporate mobile solutions<br />
and empower their users with<br />
new applications and capabilities.<br />
For more HID Global news, visit<br />
our Media Center, read our Industry<br />
Blog, subscribe to our RSS Feed,<br />
watch our videos and follow us on<br />
Facebook, LinkedIn and Twitter. To<br />
read about HID Global’s mobility initiative,<br />
click here.<br />
About HID Global<br />
HID Global is the trusted source for<br />
innovative products, services, solutions,<br />
and know-how related to the<br />
creation, management, and use of<br />
secure identities for millions of customers<br />
around the world. The company’s<br />
served markets include physical<br />
and logical access control, including<br />
strong authentication and credential<br />
management; card printing and personalization;<br />
visitor management systems;<br />
highly secure government and<br />
citizen ID; and identification RFID<br />
technologies used in animal ID and<br />
industry and logistics applications.<br />
The company’s primary brands include<br />
ActivID®, EasyLobby®, FAR-<br />
GO®, IdenTrust®, LaserCard®, Lumidigm®,<br />
Quantum Secure, and HID®.<br />
Headquartered in Austin, Texas, HID<br />
Global has over 2,700 employees<br />
worldwide and operates international<br />
offices that support more than 100<br />
countries. HID Global® is an ASSA<br />
ABLOY Group brand.<br />
For more information, visit http://<br />
www.hidglobal.com.<br />
43<br />
Why the Department of Homeland<br />
<strong>Security</strong> should also end private<br />
prison contracts<br />
Continued from page 30<br />
as it has been in recent months, the<br />
government would spend $570. On<br />
some days when the facility is nearly<br />
empty, as it was for a period in<br />
January, the government would be<br />
paying multiples more.”<br />
Why would the government give<br />
a handout like this to a private company?<br />
Perhaps it stems from the fact<br />
that CCA “has on its payroll a slew<br />
of former senior government officials,”<br />
who are—presumably—very<br />
well connected. Regardless of how<br />
CCA procured such a bargain, the<br />
real bottom line is that a civilized<br />
nation does not put asylum seekers<br />
behind bars and then try as hard as<br />
possible to deport them back to the<br />
deadly situations they are fleeing.<br />
The Department of Homeland<br />
<strong>Security</strong> (DHS), which bears the<br />
responsibility for immigration detention,<br />
would be wise to follow<br />
the lead the Department of Justice,<br />
which just announced it is no longer<br />
going to use private prisons.
Donald Trump’s shortsighted<br />
immigration plans won’t secure the<br />
homeland<br />
Continued from page 31<br />
tries stepped forward<br />
and registered with<br />
the federal government,<br />
resulting in<br />
13,000 deportations.<br />
However, no one who registered under<br />
NSEERS was ever charged with<br />
a crime related to terrorism. The<br />
“special registration” requirement<br />
ended in December 2003, while<br />
NSEERS as a whole was scrapped in<br />
April 2011. What Trump is proposing<br />
is NSEERS on a massive scale.<br />
It is important to keep in mind<br />
that “security” is about more than<br />
just keeping out those who would<br />
threaten our national security. It<br />
is also about creating and maintaining<br />
a vibrant economy and dynamic<br />
society that attract people<br />
from around the world. It is about<br />
establishing our global credibility<br />
as a society in which the rule of law<br />
and fundamental human rights are<br />
highly valued and respected. And it<br />
is about not undermining U.S. relationships<br />
with the allies needed to<br />
effectively combat international terrorists.<br />
If we move too far away from<br />
these goals, building a locked-down<br />
nation in which fear runs rampant<br />
and productivity and creativity are<br />
starved, then what exactly are we attempting<br />
to “secure”?<br />
3M’s new ALPR software extends<br />
reach, delivers real-time actionable<br />
intelligence<br />
Continued from page 35<br />
als, and audit reports provide a full<br />
view of system activity to identify<br />
any potential misuse of sensitive or<br />
private data.<br />
“From parking lots and highways<br />
to ports and borders, we are<br />
committed to protecting law enforcement<br />
officials and their communities,”<br />
said Stores. “Plate Alert<br />
Software is the newest innovation to<br />
support those who take the oath to<br />
protect and serve.”<br />
About 3M<br />
At 3M, we apply science in collaborative<br />
ways to improve lives daily.<br />
With $30 billion in sales, our 90,000<br />
employees connect with customers<br />
all around the world. Learn more<br />
about 3M’s creative solutions to the<br />
world’s problems at www.3M.com or<br />
on Twitter @3M or @3M<strong>News</strong>room.<br />
3M and 3M Science. Applied to Life. are<br />
trademarks of 3M Company. Used under<br />
license in Canada.<br />
44<br />
Peter Smallridge, 3M Traffic Safety<br />
and <strong>Security</strong> Manager, discusses<br />
E.U. border security<br />
Continued from page 40<br />
questions.<br />
Another major trend is Interoperability<br />
of Systems. In the U.S. there<br />
are different fingerprint systems<br />
which are called “AFIS” systems.<br />
These are fingerprint identify systems.<br />
Some are for border, a second<br />
group is for dealing with criminals,<br />
and the third group is use by the<br />
military. This system is not available<br />
in Europe, since a big objective<br />
in Europe is to separate systems so<br />
that citizens’ private affairs cannot<br />
be misused by politicians.<br />
Smallbridge adds that “The terrorist<br />
incidents in the last few months<br />
have proved the weakness of that<br />
concept”.<br />
He concludes the interview with a<br />
number of observations of the U.S.<br />
differences in practices from those<br />
of the European Union, and lists a<br />
number of objectives and initiatives<br />
that 3M is working with, pointing
out that 3M is one of the big three in<br />
this area – 3M, BEC and Morpho/<br />
Safron. As a company generating<br />
upwards of $30-billion in revenues,<br />
3M definitely has the wherewithal<br />
to research and produce topnotch<br />
solutions and take a long view.<br />
In the U.S., identification systems<br />
are operated by Customs and Border<br />
Protection, and with the purchase<br />
some years ago of Cogent Systems,<br />
the CBP biometric matching<br />
system contains about 200 million<br />
people in its database; the criminal<br />
database is handled by the FBI and<br />
the military databases are handled<br />
by the Department of Defense.<br />
3M is working now on Mission<br />
Critical systems, the AFIS system<br />
and is modernizing capabilities for<br />
multiple biometric matching. 3M<br />
has also been working on facial<br />
recognition, voice recognition, mobile<br />
readers for such applications<br />
as walking through trains or entire<br />
cities, and further document reader<br />
improvement to enable processing<br />
of people who don’t speak English.<br />
“Learning our customers’ problems<br />
is the best way to solve the<br />
problems,” says Smallbridge. “It’s<br />
the kind of things we worry about.<br />
Can we see it? How? Do we need to<br />
acquire? That would be our scope.<br />
We’re a big company with many divisions.<br />
We share information inhouse<br />
with other divisions. Usability<br />
is very important to us.<br />
Sign-up for Free<br />
GSN <strong>Digital</strong> <strong>Edition</strong>s<br />
and Email <strong>News</strong>letters<br />
Free subscription to your selection of GSN digital editions<br />
and daily/weekly email newsletters. Add new selections or<br />
opt-out of any selections at any time.<br />
GSN Airport, Seaport, Rail, Border <strong>Security</strong> Weekly<br />
GSN Daily Insider <strong>News</strong>letter (5 Days Weekly)<br />
GSN Monthly <strong>Digital</strong> <strong>Edition</strong><br />
GSN Media Kit<br />
CLICK HERE<br />
The <strong>News</strong> Leader in Physical, IT and Homeland <strong>Security</strong><br />
www.gsnmagazine.com<br />
45
The <strong>News</strong> Leader in Physical, IT and Homeland <strong>Security</strong><br />
CEO/Editorial Director<br />
Adrian Courtenay<br />
917-696-5782<br />
acourtenay@gsnmagazine.com<br />
Editor<br />
Steve Bittenbender<br />
502-552-1450<br />
sbittenbender@gsnmagazine.com<br />
Senior Writer<br />
Karen Ferrick-Roman<br />
412-671-1456<br />
karenferrickroman@gmail.com<br />
Columnist<br />
Shawn Campbell<br />
Campbell on Crypto<br />
shawn.campbell@safenetat.com<br />
Columnist<br />
George Lane<br />
Hazmat Science & Public Policy<br />
georgelane@hotmail.com<br />
Contributing Author<br />
Lloyd McCoy Jr<br />
Immix Group<br />
Contributing Author<br />
Walter Ewing<br />
Contributing Author<br />
Wendy Feliz<br />
Contributing Author<br />
Joshua Breisblatt<br />
Contributing Author<br />
J. Michael Barrett<br />
Contributing Author<br />
Christopher Millar<br />
Gatekeeper <strong>Security</strong><br />
Art Director<br />
Gerry O’Hara, OHDesign3<br />
gerry@ohd3.com<br />
203-249-0626<br />
Production Manager<br />
Brenden Hitt<br />
Brenden.hitt@gsnmagazine.com<br />
Direct: 203-216-7798<br />
COMING ATTRACTIONS<br />
September<br />
Tech Focus<br />
School Safety/Mobile<br />
Surveillance Solutions<br />
Market Sector Focus<br />
Maritime/Coastal/<br />
Port <strong>Security</strong><br />
October<br />
Tech Focus<br />
International Threats/<br />
Cyber Intelligence<br />
Market Sector Focus<br />
Oil/Gas/Electricity<br />
Grid <strong>Security</strong><br />
November<br />
Tech Focus<br />
Perimeter Protection/<br />
Intrusion Detection<br />
Market Sector Focus<br />
Mass Notification/<br />
Disaster Response<br />
46
GSN’s 2016 Homeland <strong>Security</strong> Awards Program<br />
Now Accepting Entries at:<br />
www.gsnmagazine.com/hsa2016/welcome<br />
The 2016 <strong>Government</strong> <strong>Security</strong> <strong>News</strong> Awards Program, featuring<br />
many new categories in Cybersecurity, Physical <strong>Security</strong>, <strong>Government</strong><br />
Agency Innovations and Mobile Technologies will open for entries on<br />
<strong>August</strong> 24 and will close for entries on November 15.<br />
In good news for Winners and Finalists, GSN will be reinstating its<br />
annual Homeland <strong>Security</strong> Awards Dinner in Washington, DC in<br />
the first week of December, in a venue to be announced. Longtime<br />
participants in the GSN awards programs will recall that previous<br />
GSN Awards Dinners have featured top government, military leaders<br />
and respected television commentators such as 4-Star General<br />
Barry McCaffrey (Ret); Fran Townsend, Homeland <strong>Security</strong> Advisor to<br />
George W. Bush, James Kallstrom, Assistant Director of the FBI and<br />
Admiral Thad Allen (Ret), Commandant of the U.S. Coast Guard<br />
who came out of retirement twice to serve his county, first in<br />
Hurricane Katrina and later in the BP Oil Spill.<br />
The cost of an entry for vendors is $300 per entry, but there is no<br />
charge for government agencies or departments. All Winners<br />
and Finalists receive Awards Emblems, and all Winners receive a<br />
handsome, gold-trimmed plaque describing their winning entries.<br />
All Winners and Finalists will also be invited to participate in the 2016<br />
<strong>Digital</strong> Yearbook of Awards Winners.<br />
To see photo gallery of previous Awards Dinners:<br />
https://www.flickr.com/photos/44536438@N06/<br />
For information on the Awards Dinner or Sponsorships,<br />
Contact Adrian Courtenay, Managing Partner, at<br />
acourtenay@gsnmagazine.com, (Mobile) 917-696-5782