Government Security News


Mr Wu, CEO of Hangzhou Hikvision Digital Technology, tells journalists from U.S.

that success is 30% technology and 70% good management. Partnerships with

customers, employees, shareholders – and the U.S election – were also

discussed in this dispatch by Adrian Courtenay. Page 30

Also in this issue:

HID Global announces secure citizen ID Card that extends benefits of Optical Secure Media

(OSM) card – Page 5

Researchers say coastal community stakeholders need to be more involved to make their

towns more resilient – Page 34

GSN November/December 2016













HID Global announces one of the world’s most secure

Citizen ID Cards

Capture every detail with

Toshiba PTZ Cameras featuring 20x Optical Zoom

Cyberbit launches Channel Program to create a profitable opportunity to

solve customers’ most critical cyberthreats

Intelsat General announces new contract to provide satellite services to Rite-

Net for Army Warfighter Network

Canon U.S.A. introduces one of the smallest and lightest 4K resolution (4096

x 2400) laser projectors with high image quality, advanced features, low cost

Latest data on Positive Train Control Implementation show uneven progress

across railroads

Multipurpose Safety Wand Megaphone from AmpliVox

Enhances Crowd Control

NATO to use Senstar perimeter security solution

at its rapidly deployed military camps

Campbell on Crypto – Crypto Management 101:

Four Steps to Better Protection

Mr. Hu, Founder and CEO of Hangzhou Hikvision

Digital Technology Co Ltd, shares his thoughts with

U.S. journalists

Researchers say coastal community stakeholders

need to be involved to make their towns more

resilient from storms


Digital Edition Table of Contents











Robin Systems wins two new TMC awards for IT excellence and Info Tech

spotlight on big data as a service

Saab Seaeye Leoport ROV system delivered to Japan’s

Kaiyo Engineering

CA Technologies strengthens security portfolio with new

advanced analytics and Identity-as-a-Service offerings

U.S. and Canada bring Homeland Security solutions to Milipol Qatar

Salient CRGT Appoints Joseph Zimmerman as Vice President, Enterprise

Solutions Group

Energetiq Introduces EQ-77, its 5th Generation,

Ultra-Bright, Laser-Driven Light Source (LDLS )

Selfies: A new weapon against public assistance fraud

ITL Group and Applied DNA Sciences partner to develop anti-counterfeit

‘SigNature ® DNA’ printed fabric label solution

3M Passport Reader Makes Waves in New Market

A “Know your rights” refresher for Immigrants







Emergency24’s Two-way, Multi-Media Mass-Communications System

NICE helps Metro Nashville Department of Emergency

Communications get ready for Next Generation 9-1-1

What the FCC revamping of the Federal Alert System

means to you

Washington tech firm claims predictive analytics can improve emergency

response operations


HID Global announces one of the

world’s most secure Citizen ID Cards

AUSTIN, TX, November 9, 2016 –

HID Global®, a worldwide leader

in trusted identity solutions, today

announced one of the world’s most

secure citizen ID cards, featuring

technologies that have been proven

in its customers’ award-winning

national passport and other government

ID programs, such as the

Irish Passport Card. Extending the

benefits of its widely issued Optical

Secure Media (OSM) card, the company

has created an OSM Multitech

card that is one of the most secure

citizen ID cards on the market.

“Our OSM cards have set the standard

for combining visual, digital

and physical security while delivering

the highest levels of card durability,”

said Rob Haslam, VP and

Managing Director, Government ID

Solutions with HID Global. “There

has been no known instance of a

successful attempt to compromise

OSM technology’s digital security,

and now we’re helping to fuel the

future of even more secure citizen

identification by including a contactless

RFID microcontroller chip

into these proven OSM cards.”

To maximize the security of HID

Global’s OSM Multitech card, issuers

can laser-engrave information

on its front side, engrave and

encode identity information in the

OSM stripe on the card’s back side,

and encode identity information

on the microcontroller chip inside

the card. Integrating the RFID chip

into a standard-sized OSM card is a

major milestone that was made possible

with HID Global’s ultra-thin


PC ePre-laminate product, which

minimizes the footprint of the RFID

chip and antenna using the company’s

DBond technology. Unique

anti-crack technology also extends

the durability of the card, which

is initially available with an NXP

P60D080 RFID chip. The company

plans to offer additional RFID chip

options in the future.

HID Global’s OSM Multitech

cards can be used for applications

ranging from national and resident

alien IDs to health benefit, public

welfare and Social Security cards, as

well as driver’s licenses, gun permits

and a wide range of other identification

cards. The cards are the cornerstone

of a complete, end-to-end

government ID solution offered by

HID Global, including its highly

secure laser personalization equipment,

software solutions, security

printing plus software and professional

services and training.

The new Multitech card’s OSM,

DBond and other technologies have

been proven in numerous high-profile

national ID programs, including

the award-winning Irish Passport

Card, as well as programs in Saudi

Arabia, Angola and the U.S. The

More on page 50

Capture every detail up close with Toshiba

PTZ Cameras featuring 20x Optical Zoom

IRVINE, CA, November 17, 2016

– Toshiba Surveillance & IP Video

Products, a business unit of Toshiba

America Information Systems, Inc.,

is giving security integrators, dealers

and end-users more options by introducing

two new Pan-Tilt-Zoom

(PTZ) 3MP IP dome cameras, both

featuring 20x optical zoom and delivering

razor-sharp streaming video

at 2048x1536 resolution for applications

requiring highly detailed

surveillance, indoors and outdoors

in any lighting environment.

Indoor/Outdoor Cameras

Toshiba’s new IKS-WP8203R PTZ

camera is designed to operate in the

harsh outdoors with its IP66 enclosure

protection, integrated heater

and auto defogging, while the new

IKS-WP8103 PTZ provides an attractive

indoor solution for covering

large spaces such as shopping

malls, casinos or schools.

True Day/Night imaging with

Digital Wide Dynamic Range empower

both cameras to capture images

in high contrast and changing

light conditions down to 0.01 lux. In

addition to 24V, both cameras are

powered with PoE+ which eliminates

the need for power cables and

reduces installation cost. Also, both

are backed by ONVIF Profile S to

ensure seamless interoperability

with third-party ONVIFconforming


and software.

20X Optical Zoom

A core benefit of

the new PTZ cameras

is powerful,

built-in optical

zoom capability. It

enables up to 20x

optical magnification

(f=4.7 ~ 94 mm, F1.6 to

F3.5) and achieves quick

subject tracking through

a high-speed auto focusing

system so operators can react

instantly to suspicious situations.

The cameras’ ability to precisely

identify small details, such as car licenses

or facial features, means they

are suitable for users that demand

enhanced detail when zooming in,

plus makes them ideal to handle

installations where detailed coverage

of longer distances is essential

including airports, borders, roads,

cities and campuses.

Superior image quality is matched

by the cameras’ versatile, high-speed


Toshiba IKS-WP8103

360° continuous pan that achieves

surveillance of large areas without

blind spots, and its precision -10°

to 190° tilt drive offering al-

most instant preset posi-

tioning. Equipped with

256 presets, pattern

tour, autoscan and

auto flip, nothing

escapes the camer-

as’ PTZ.

Toshiba IKS-

WP8203R and IKS-

WP8103 cameras

make efficient use of

available bandwidth

by providing H.264 and

MJPEG multi-streaming to

satisfy different live viewing

and recording settings. Both are

immediately available.

About Toshiba America

Information Systems, Inc.

Headquartered in Irvine, Calif.,

TAIS is comprised of three business

units: Digital Products Division,

Imaging Systems Division,

and Telecommunication Systems

Division. Together, these divisions

provide digital products, services

and solutions, including industryleading

portable computers; tele-

visions, TV/DVD Combination

products, Blu-ray Disc and DVD

products, and portable devices;

imaging products for the security,

medical and manufacturing markets;

storage products for computers;

and IP business telephone systems

with unified communications,

collaboration and mobility applications.

TAIS provides sales, marketing

and services for its wide range

of products in the United States and

Latin America. TAIS is an independent

operating company owned by

Toshiba America, Inc., a subsidiary

of Toshiba Corporation. For more

information on TAIS visit toshiba.


About Toshiba Corporation

Toshiba is a world-leading diversified

manufacturer, solutions provider

and marketer of advanced

electronic and electrical products

and systems. Toshiba Group brings

innovation and imagination to

a wide range of businesses: digital

products, including LCD TVs,

notebook PCs, retail solutions and

MFPs; electronic devices, including

semiconductors, storage products

and materials; industrial and social

infrastructure systems, including

power generation systems, smart

community solutions, medical systems

and escalators & elevators;

and home appliances. Toshiba was

founded in 1875, and today operates

a global network of more than

590 consolidated companies, with

206,000 employees worldwide and

annual sales surpassing 5.8 trillion

yen (US$61 billion). Visit Toshiba’s

web site at


“We’re powered by new challenges.

Our experience has made us experts

at providing total security solutions.”


8 years • Power/Utility Business Development

Our high standards help you meet yours. Providing superior

perimeter security solutions is not just our mission.

It’s personal. And that mission never stops.



Cyberbit launches Channel Program to create a

profitable opportunity to solve customers’ most

critical cyberthreats

Austin, Texas – November 15,

2016 – Cyberbit, whose cybersecurity

solutions protect the world’s

most sensitive systems, today announced

the launch of its Channel

Program for North American

Partners: MSSPs, VARs, distributors

and consultants, who play a critical

role in helping companies defend

themselves against evolving cyberthreats.

The Cyberbit Channel Program

will deliver enhanced margins

to partners, by providing Cyberbit’s

suite of solutions, addressing today’s

most complex cyber security problems

for customers.

Cyberbit partners will get access

to the industry’s most advanced

endpoint detection and response

(EDR), SOC automation and orchestration,

cyber range training

and simulation platform, and industrial

control systems security. The

Cyberbit Channel Program is led

by enterprise and IT security channel

veteran Stephen Thomas, former

Vice President of Channel Sales at

Symantec, who has more than 20

years of sales leadership and building

channel programs for partners

of all sizes. Now Vice President of

Sales at Cyberbit, Thomas will position

partners to address pressing

challenges in cybersecurity as part

of the company’s 100-percent-channel-focused


Recently expanded to North

America, Cyberbit has more than

500-employees on three continents,

supporting the most critical assets


of enterprises and public sector organizations

worldwide. As a subsidiary

of defense systems leader Elbit

Systems Ltd. (NASDAQ and TASE:

ESLT), Cyberbit not only offers the

channel battle-hardened cybersecurity

solutions but also the resources

and strategic support to help partners

move quickly into new markets.

“We talk to lots of companies that

either suffer from alert fatigue from

all the cybersecurity tools they’ve

adopted or that can’t hire enough

experienced staff to leverage their

technology – or both,” said Jeff

Hirsh of MickTec, a Cyberbit partner.

“Cyberbit helps us solve these

customer pain points, with proven

technology and the real-world

training that customers need to defend

against multi-dimensional IT

security threats.”

Stephen Thomas, Cyberbit Vice

President of Sales said, “Companies

need partners to guide them

through today’s ever-evolving cyberthreat

landscape, which is one

reason why the channel has become

the backbone of the IT secu-

More on page 50

Intelsat General announces new contract to provide satellite

services to RiteNet for Army Warfighter Network

MCLEAN, VA, November 17, 2016

– Intelsat General, a wholly owned

subsidiary of Intelsat (NYSE: I), operator

of the world’s first Globalized

Network, powered by its leading satellite

backbone, today announced a

new contract to provide satellite

connectivity to RiteNet Corp. to

support testing by the U.S. Army at

Ft. Bliss in El, Paso, TX, and at the

nearby White Sands Missile Range

in New Mexico.

The Army conducts a range of

testing using the Warfighter Information

Network (WIN-T) at these

two facilities, including two Network

Integration Evaluation (NIE)

events each year to evaluate new

technologies. Using Ku-band capacity

on an Intelsat satellite, RiteNet

will provide both ongoing and surge

capacity for the network. RiteNet,

based in Rockville, MD, provides

information technology and telecommunications

services to a number

of government and commercial


“The Warfighter Information Network

is the U.S. Army’s backbone in

terms of communications with its

troops in the field,” said Skot Butler,

President of Intelsat General Corporation.

“Our services will support

the Army as it tests new equipment

and technologies that will one day

More on page 50

“We aim to protect property, and provide

peace of mind by providing remarkable

perimeter security products and

unrivaled service.”


11 years • Mission Critical Business Development

We know people make the difference for your business and ours.

Our experienced team thrives on providing the products and

service that lead to total perimeter security solutions.



Canon U.S.A. introduces one of the smallest and

lightest 4K resolution (4096 x 2400) laser projectors

with high image quality, advanced features, low cost

MELVILLE, NY, November 22,

2016 – Canon U.S.A., Inc., a leader

in digital imaging solutions, today

unveiled the latest of its innovative

technology with the debut of

the REALiS 4K600STZ Pro AV Laser

LCOS Projector. At only 57.3

pounds, the REALiS 4K600STZ

is among the world’s smallest and

lightest native 4K laser projectors,

making it ideal for a wide

range of markets and applications

including simulation, museums,

art galleries, planetariums, higher

education, medical education and


The REALiS 4K600STZ projector

reproduces exceptionally detailed

images with outstanding

color accuracy thanks to a combination

of core technologies and features


• Native 4K Resolution of 4096

x 2400 which is larger than both

QFHD and DCI-resolution, the 4K

standards for TV and digital cinema

respectively. The expanded vertical

resolution (2400) is particularly important

for those applications, like

simulation and training and design/

engineering, which may require

larger vertical display areas.

• Laser Phosphor Light Source

which offers an extended operation

time up to 20,000 hours or

more 1 , quick start-up 2 , omnidirectional

projector placement, and a

wide range of colors – all helping to

greatly enhance the user experience,

installation process and reduce the

total cost of ownership (TCO).

Toshiba IKS-WP8103

• 6000 lumens with up to

10,000:1 Dynamic Contrast Ratio 3

helps ensure content appears bright

with deep black and brilliant white

levels, as well as excellent gradation.

• Canon’s renowned LCOS Technology

with AISYS-enhancement

and advanced Color Management

System for producing content with

exceptional detail and color accuracy

– ideal for those industries/

applications like museums and galleries

with the highest image quality



• Genuine Canon 4K Lens for

consistent clarity and color throughout

entire projected area; the lens

also includes a special Marginal

Focus function which can be used

to help ensure content projected on

the peripheral portions of domed

surfaces remains in focus – a benefit

especially important to those

in the simulation, training and

educational fields. The 4K600STZ

projector is also able to deliver a

virtually consistent level of brightness

throughout its zoom range,

thus helping to provide even greater

placement flexibility.

• Powerful Dual Image Processing

Engines for uncompressed 4K

60p playback, and optimal upscaling

of 2K video and other non-native

4K resolution content.

“The impressive benefits of 4K

laser projection, combined with

Canon’s optical and image processing

technologies and compact engineering

define the many advantages

of the REALiS 4K600STZ Pro AV

Laser LCOS Projector,” said Yuichi

Ishizuka, president and chief operating

officer, Canon U.S.A., Inc. “We

More on page 14









Add the Popular CHERRY Line to

Your Portfolio and Increase Your

Business! Download the Details at:


Contact (FIPS 201), contactless

and combination options



FIPS 201 certified; standalone unit

with weighted base.



FIPS 210 certified, PC/SC smart

card reader and secure PIN entry.









© 2016, Cherry Americas, LLC

Canon U.S.A. introduces one of the

smallest and lightest 4K resolution

(4096 x 2400) laser projectors

Continued from page 12

are confident this projector’s many

advanced technologies and features

will not only meet, but exceed the

growing needs of AV professionals

who demand exceptional, high-resolution

and high-value projectors.”

High Dynamic Range (HDR)

The REALiS 4K600STZ is one of

Canon’s only HDR compatible projectors

which helps provide the critical

ability to replicate content with

exceptionally high contrast, making

possible gradation expression close

to that of human vision. Additionally,

the projector supports the input

of video content simulating the

4K/8K broadcast-standard ITU-R

BT.2020 color gamut.

DICOM ® Simulation Mode 4

The Canon REALiS 4K600STZ Projector’s

DICOM® Simulation Mode4

can be ideal for those in the medical

education and training field who

require displaying monochrome

digital X-rays, CAT scans, and

MRIs with superb grayscale gradation.

This mode, which offers both

clear and blue base color temperature

presets, simulates the results of

devices compliant with the Digital

Imaging and Communications in

Medicine (DICOM) Part 14 standard

4 .

Versatile Connectivity

and Network Management

The Canon REALiS 4K600STZ offers

many industry-standard interfaces

to enhance usability including

two HDMI (version 2.0a), and four

DVI inputs supporting single, stripe

and cross configurations for 4K, 2K

or HD video playback. Network

management, including compatibility

with PJLink, Crestron Room

View and AMX Device Discovery,

also helps provide outstanding flexibility

for monitoring and control.

Price and Availability

The Canon REALiS 4K600STZ Pro

AV LCOS Projector has a suggested

list price of $77,990, is scheduled

to be available through authorized

Canon dealers by April 2017, and

is backed by the Company’s awardwinning

Professional Service &


For more information please visit

About Canon U.S.A., Inc.

Canon U.S.A., Inc., is a leading provider

of consumer, business-to-business,

and industrial digital imaging

solutions to the United States and to

Latin America and the Caribbean

(excluding Mexico) markets. With

approximately $31 billion in global

revenue, its parent company, Canon

Inc. (NYSE:CAJ), ranks third overall

in U.S. patents granted in 2015† and

is one of Fortune Magazine’s World’s


Most Admired Companies in 2016.

Canon U.S.A. is committed to the

highest level of customer satisfaction

and loyalty, providing 100 percent

U.S.-based consumer service

and support for all of the products it

distributes. Canon U.S.A. is dedicated

to its Kyosei philosophy of social

and environmental responsibility.

In 2014, the Canon Americas Headquarters

secured LEED® Gold certification,

a recognition for the design,

construction, operations and

maintenance of high-performance

green buildings. To keep apprised of

the latest news from Canon U.S.A.,

sign up for the Company’s RSS news

feed by visiting

com/rss and follow us on Twitter

@CanonUSA. For media inquiries,

please contact

† Based on weekly patent counts issued by

United States Patent and Trademark Office.

Availability, prices and specifications are subject

to change without notice. Actual prices are

set by individual dealers and may vary.

1. Approximate time until brightness has

declined to half the original level. Actual hours

may vary depending on usage and environment.

This is not a guarantee of the life span of individual

laser diodes.

2. When “Fast Boot” function is enabled.

Startup time will change when startup from AC


3. Native contrast of REALiS 4K600STZ Projector

is 4,000:1 (Iris set to Close 3).

4. The REALiS 4K600STZ is not cleared or

approved for medical diagnosis and should not

be used for these purposes.

Latest data on Positive Train Control Implementation

show uneven progress across railroads

WASHINGTON – The Federal Railroad

Administration today released

third quarter 2016 data submitted

by railroads on their progress in implementing

Positive Train Control

(PTC). The data show uneven progress

across the country and across

railroads toward activating the lifesaving


Freight railroads now have PTC

active on 12 percent of their tracks,

up from 9 percent last quarter. Passenger

railroads increased their percentage

to 23 percent this quarter

compared to 22 percent last quarter.

The measurable progress made

by passenger railroads has been

predominately on the West Coast,

while East Coast railroads, other

than SEPTA and Amtrak, have remained

relatively stagnant.

“Passenger and freight railroads

must continue their progress implementing

Positive Train Control and

work to beat the deadlines Congress

set – because PTC saves lives,” said

U.S. Transportation Secretary Anthony


The Q3 2016 status update includes

railroad-by-railroad quarterly

data as of Sept. 30, 2016, and includes

data such as track segments

completed, locomotives equipped,

employees trained, radio towers installed,

route miles in PTC operation

and other key implementation

data. Some of this information is

displayed in infographics below.

“In order to achieve full PTC implementation,

everyone has to do

their part – railroads must make implementation

a priority, and Congress

must make funding for commuter

railroads a priority,” said FRA

Administrator Sarah E. Feinberg.

Since 2008, FRA has provided significant

assistance to support railroads’

PTC implementation. Those

efforts include:

• FRA has provided more than

$716 million to passenger railroads,

including nearly $400 million in Recovery

Act funding.

• Issued a nearly $1 billion loan

Interactive graphics: PTC implementation by freight and passenger

railroads (above) ; individual railroad’s PTC implementation (right)


to the Metropolitan Transportation

Authority to implement PTC on the

Long Island Rail Road and Metro-


• Awarded $25 million in grant

funding to railroads, suppliers and

state and local governments. Many

awards will help railroads achieve

interoperability among the different

PTC systems that railroads are


• Made $199 million in grants

available to commuter railroads in

fiscal year 2017 to implement PTC.

• Building a PTC testbed at the

Transportation Technology Center

(TTC) in Pueblo, Colorado.

• Working directly with the Federal

Communications Commission

(FCC) and the Advisory Council on

Historic Preservation to improve

the approval process for PTC communication


• Dedicating staff to work on PTC

implementation, including establishing

a PTC task force.

To view the interactive graphic of

PTC implementation by freight and

passenger railroads, or individual

railroad’s PTC implementation, click

on the graphics at left.

To view each railroad’s full quarterly

PTC Progress Report, please visit:

Multipurpose Safety Wand

Megaphone from AmpliVox

Enhances Crowd Control

NORTHBROOK, IL – When directing

large groups of people in

motion, effective communication is

essential to ensure safety. AmpliVox

Sound Systems’ S606 Safety Wand

Megaphone gives police officers,

fire departments, emergency medical

technicians, and other first responders

the tools to communicate

quickly and

clearly. This allin-one


control baton

with a built-in

megaphone is

also an excellent

choice for

parking attendants

and security

officers at

sporting events, concerts, and other

large venues.

The AmpliVox S606 Safety Wand

Megaphone combines the features

of an LED safety wand with a loudspeaker

megaphone, increasing the

user’s visibility and voice range in

a single lightweight, durable, and

water-resistant unit. The wand includes

five ultra-bright red LEDs for

a continuous or flashing flare and a


The AmpliVox S606 Safety Wand Megaphone

combines the features of an LED crowd and traffic

management wand with a loudspeaker megaphone.

white LED strobe light at the tip of

the wand, providing visibility from

3,000 yards. A detachable 20-watt

Piezo microphone connects to the

wand’s handle via a 5’ coil cord. A

rotary volume control on the side of

the handle adjusts the megaphone’s

volume level with a whistle function

as loud as 105 decibels. The

baton’s handle

includes easyto-use


buttons to activate



The unit is

powered by an

integrated rechargeable


pack that

can be plugged into AC outlets or

vehicle chargers, with a run time of

up to 100 hours per charge.

“AmpliVox’s Safety Wand Megaphone

makes crowd management

more powerful in all kinds of settings,”

notes Don Roth, AmpliVox

CEO. “It combines clear vocal amplification

with enhanced visibility.

Better communication delivers im-

More on page 51

NATO to use Senstar perimeter security

solution at its rapidly deployed military camps

YEHUD, Israel, Nov. 28, 2016 –

Magal Security Systems Ltd. (NAS-

DAQ: MAGS) announced today

that Senstar its North American

subsidiary, successfully delivered

to the North Atlantic Treaty Organization

(NATO) , a perimeter electronic

security systems (ESS) for its

rapidly deployable military

camps used throughout

the world. The systems

were shipped over the past

few months and training

on the systems will

be completed in the first

quarter of 2017.

NATO has complete

military camps that can be

rapidly deployed when and where

they are needed. These camps serve

as operations headquarters and

house anywhere from a handful to

hundreds of troops and support

staff. The goal of the ESS is

to augment existing security at

the camps and provide greater

protection for camp operations,

equipment and personnel.

Commented Saar Koursh,

CEO of Magal, “We are very

pleased with our successful delivery

of these important systems

to NATO and we look forward to

Saar Koursh

working closely with NATO personnel

in the coming weeks as we train

them on our systems. While we are

primarily known for our world class

perimeter intrusion detection products,

we are also a leading provider

of deployable security solution

packages. The original NATO tender

specifically looked for

robust and high quality

equipment, capable of being

mounted, connected

and dismounted rapidly

and modular and flexible

to meet multiple camp

layouts and personnel

numbers. NATO’s choice

of us is a resounding endorsement

for our best-in-class

products and technology, expertise,

manufacturing capability and processes.”


Concluded Mr. Koursh, “Particularly

in North America, we see

further future demand for our full

security solutions for deployable

military camps and we look forward

to further growth in this business in

the coming years.”

About Magal

Magal is a leading international provider

of solutions and products for

physical and cyber security, as well

as safety and site management. Over

the past 45 years, Magal has delivered

tailor-made security solutions

and turnkey projects to hundreds of

satisfied customers in over 80 countries

- under some of the most challenging


Magal offers comprehensive integrated

solutions for critical sites,

managed by Fortis4G - our 4th

generation, cutting-edge PSIM

(Physical Security Information

Management system). The

solutions leverage our broad

portfolio of homegrown PIDS

(Perimeter Intrusion Detection

Systems), advanced VMS with

native IVA and Cyber Security


GSN: What are your general thoughts on the

2015 awards?


GSN: You spent many years on Capitol Hill and

also at the Department of Homeland Security.

As we head into 2016, what do you envision as

homeland security spending priorities? Awards Category:


GSN 2015



What area/issue




trends do you


see as priorities for the homeland security


Name of Nominated Product, Service,

or Program:


Reason this entry deserves to win:




GSN: What future areas of homeland security

interest would you advise companies to explore?

Continued on next page

Awards Category:


Name of Nominated Product, Service,

or Program: Link to Web Page of Nominated Organization:


Reason this Link entry to additional deserves to information win: on product,


service or program, with brief description:


Name and organization of nominating

contact for this entry, including name, title,





Nominating contact’s office telephone and cell



Nominating contact’s email address:



Address of nominating contact’s organization:



Link to additional information on product,

service or program, with brief description:



Name and organization of nominating

contact for this entry, including name, title,

Nominating contact’s office telephone and cell

The Winners and Finalists have

been selected. Now our national

and international readers want

to know what the strategies,

technologies and innovations

were that gave you the

advantage. Let them know with

a 2-page spread in the

2016 Digital Yearbook of

Award Winners.


2016 Digital Yearbook


Homeland Security





2015 Digital Yearbook



Border Security Awards


Homeland Security Awards

National Programs and Protection Directorate.

ed world. New legislation pending in Congress formalizes

the increased DHS role in public/private partnering.



Global spending also parallels the DHS spending raise.


A new market research report, “Global Homeland Security

and Emergency Management Market, 2013–2018”, Information Security Management Act (FISMA) and de-

New legislation also would update the 12-year-old Federal

published by MarketsandMarkets is expected to reach lineate DHS’s role in guarding government networks and

$544.02 Billion by 2018. Unfortunately, those numbers websites.

could go even higher if there are more incidents similar to

A priority for 2016 will be to accelerate rollout of


what happened in Paris, Mali, and San Bernardino, CA. Einstein III Accelerated (E3A), the latest phase of DHS’s

Best Detection Solutions

automated network-security correcting systems. DHS has

established memoranda of agreement with 55 federal

Chuck Brooks, Distinguished Judge

agencies to implement Einstein to provide horizon scanning

and automated monitoring, detection, and remedia-

GSN 2015 Homeland Security and

Best Integrated Security Programs

Rapiscan Systems

CB: Counterterrorism and the counter CBRNE (chemical

Airport, Seaport, Border Security Awards programs

tion of government networks. DHS is also planning for

2015 Winner

, biological, Radiological, Nuclear, and Explosive) mission

new cyber technologies that provide advanced defense of

Network will always Harbor, be fundamental Inc. to homeland planning and

network framework layers, including authentication, better

encryption, biometrics, and data analytical tools”.

spending. Those are the most catastrophic threats. In

2015 Winner

addition to CBRNE DHS has assumed more and more of a

leadership role in cybersecurity derived from both Presidential

mandates and congressional legislation.

CB: For me it was a real pleasure judging this year’s

Best Nuclear/Radiation Detection

Cybersecurity is indeed a top priority as government agen-

IPM (integrated process management) provides an

annual Homeland Security and Airport, Seaport, Border


CB: Macro spending will increase across the board on

cies and mega corporations experience more data breaches

with each passing year. I recently published an article

The key word really is “future” and it is already

additional element of extensibility and power for policy

Security Awards programs. The submissions this year

Best Physical Security Information Management

around the corner with the Internet of Things (IoT).

management and workflow processing that is virtually

Rapiscan Systems

homeland security products and services In accordance

were frankly quite amazing. The capabilities and technical

System - PSIM

in The Federal Times on Key homeland security priorities

Recently both the FBI and DHS issued warnings about unlimited IoT

in its capabilities. The end result is an intui-

to the new threats we are especially facing from ISIS and

merits of the IT and Physical security products/solutions

tive, comprehensive automated security management

from other terrorist actors, and global instabilities. This

to watch in 2016 (

and pending threats. The reality is that we have become

platform that operates identically, anywhere within the

of all the vendors made it especially difficult to judge. In

was reflected in the recent passage of the 2016 omnibus


My thoughts in regards

immersed in a new digital era comprised of more organization. than 50

There’s no need to retrain staff when Rapiscan they Systems, a leading provider of security screening

solutions, is well known for the high quality, reliment

or integrated with Rapiscan’s X-ray and metal-

ing technological contributors to the current and future

The bill provides DHS with $40.96 billion, which is an

to cybersecurity verbatim:

detection products can be used in a standalone deploy-

my opinion they were all winners because they are lead-


spending Bill recently passed by Congress by Congress.

billion interfaced devices. Anything connected is move vulner-

from one facility to another, or when new compoable.

Expect significant investments in smart cities, nents smart

are connected to the platform, which in turn ability saves and affordability of its solutions. With products based threat detection solutions. The newest addition to

security of our nation. It is good to know that very tal-

increase of $1.33 billion over the fiscal year 2015 enacted

“The 2015 DHS budget directed more than $1.25 billion

to cybersecurity and that trend will continue in 2016.

homes, smart businesses, and smart governments customers in the

significant amounts of time and money. sold into four market segments, including Baggage and Rapiscan’s radiation detection product line is the Rapiscan

MP100 Backpack Radiation Detection system. A high

ented people in industry and government are continually

Network Harbor’s LightHouse platform delivers dent management, too. levels. It included increased funding levels for Customs

Parcel Inspection, Cargo and Vehicle Inspection, Hold

next Its decade. click-and-go For the ability security to adopt community this conveys

Baggage Screening and People Screening, the company performance, easy to use radiation monitor combining

designing and upgrading security solutions to fill gaps as

unified security management for enterprise organizations,

extending the capabilities of physical security its own capabilities means that there’s no “dumbing

adversaries are becoming more hostile and sophisticated.

ment and for DHS Cybersecurity programs in the incident DHS management DHS’s (PSIM) inception to include as we geographical have become a more down” interconnect-

of features or for functions threat detection, – just a seamless, surveillance, con-predictive data analytics,

tion situations Convy its customers Associatescould face. An important a lightweight, compact commercial backpack, making

the full functionality of any security system’s API within

and Border Protection, Immigration and Customs Enforce-

Cybersecurity and IT have moved to the forefront since

opportunities in developing and integrating new sensors

has a solution John for Convy, the most Principal demanding threat detec-

gamma and optional neutron detection is housed in

part of Rapiscan’s product portfolio is its radiation the system perfect for covert inspection situations. The

information system (GIS) and non-physical products in sistent user interface, anywhere across the enterprise.

detection product line, which addresses the need for MP100 is ideal for supporting security operations and

a truly comprehensive safety and security management It installs easily, and is quickly mastered by administrators

and end users alike. LightHouse supports almost

global governments and organizations to monitor and performing radiation surveys in a variety of markets –

environment. LightHouse is unique in that it integrates

locate radioactive threat materials that can be used in including critical infrastructure, customs and border

every security system, physical or non-physical, into a all major security product manufacturers including

office: 202-421-3777

atomic weapons and dirty bombs. The product line is control, event security, defense and law enforcement

single, seamless oversight system. Its intuitive interface access control, video, audio, mass notification, IDS,

comprised of software and hardware based solutions applications. All of the features required for radiation

drives faster recognition of potential threats, as well RTLS and more. LightHouse has been designed to add

for inspecting vehicles, packages and people. Radiation detection are integrated in the MP100 so it can be used

as gives first responders the information they need to additional system integration’s to the platform without

make better informed, more appropriate decisions. disruption or encumbrance of any existing integration

LightHouse is designed to support the IT side of inci- in an expedient, stable and secure process. LightHouse

8380 Greensboro Drive Suite 514

McLean, VA 22102

as a standalone device and connected wirelessly to a Link to Web Page of Nominated Organization:

Rapiscan oversight system for remote data collection


and display. Using the MP100 is as easy as slipping

the backpack on and walking around. Weighing just

18 pounds, the MP100 is lightweight and easy to use.

Additionally, the onboard battery enables 16 hours of

continuous operation in a wide range of environments.

The Rapiscan RadviewerTM Android app displays the

operator’s current position and direction toward the

radiation source. The design of the MP100’s radiation

detectors provides increased directional sensitivity of

the radiation detection. A radiation alarm is signaled audibly

via a headphone jack on the backpack or visually ––––––––––––––––––––––––––––––––––––––––


via RadviewerTM. In this way, the MP100 enables users Jennifer Edgerly, Senior Account Director,

to effectively detect and locate radioactive threats. The SpeakerBox Communications

MP100 is manufactured by Rapiscan’s Radiation Detection

Products division, which has supplied thousands of

radiation monitors that are deployed at border crossings,

seaports, airports and facilities around the world. office: 703-287-7809



The MP100 uses Rapiscan’s proven radiation detection cell: 202-486-0518

technology adapted for a backpack deployment. The

radiation detection performance meets the requirements

of ANSI N42.53. The MP100 offers customers ––––––––––––––––––––––––––––––––––––––––

Nominating contact’s email address:

efficient, easy to use and reliable man-portable radiation

detection with high performance at an affordable cost of

acquisition and operation.

Address of nominating contact’s organization:


7900 Westpark Drive, Suite T410, McLean, VA

Contact Adrian Courtenay at 917-696-5782 to get more information

and reserve your 2-page spread.

Campbell on Crypto

Crypto Management 101: Four Steps

to Better Protection

By Shawn Campbell

Previous installments of this column

have discussed the critical

importance of encryption for data

protection. In addition to strong

encryption, however, cryptographic

keys used during the encryption

process must be treated with the

same level of care.

The encryption process generates

cryptographic keys that are used to

encrypt (“lock”), and decrypt (“unlock”)

data. The more you encrypt,

the more encryption keys you have

to store and manage. If these keys are

stolen or copied, they can be used to

decrypt sensitive data, negating the

entire encryption process.

Consequently, many organizations

are starting to realize they need a

centralized strategy to manage the

keys they need for their encryption

needs. A solid cryptographic key

management strategy has four elements:

• High Assurance Cryptographic

Key Protection

• Cryptographic processing and


• Key lifecycle management

• Cryptographic Resource Management

Let’s look at each step.

High Assurance

Cryptographic Key Protection

Depending on the value of data being

protected, and the variety of keys

needing to be stored, organizations

can store their keys either in hardware

or in software. For keys that

protect highly sensitive data and applications,

a centralized, hardwarebased

approach is best.

In this approach, a hardware security

module is used. Nothing ever

enters or leaves this tamper-resistant

vault, and keys are more isolated

from traditional network attacks. If

the module becomes compromised,

the keys will zero out and become


The best applications of centralized

key storage are cases like code

signing, certificate validation, transaction

processing and Public Key

Infrastructure. These involve limited

key distribution, with keys used for

very specific reasons. Some applications

may require a more distributed

model, where cryptographic keys

must exist in close proximity to the

data and applications they secure.


Cryptographic Processing

and Acceleration Protection

Organizations must review their

current workflows and applications.

Where will encryption and decryption

be happening? Depending on

where and how quickly the encryption

must run, high-speed cryptographic

processors may be needed.

This can help organizations avoid

processing bottlenecks and increase

system capacity.

The key is to find a solution that

can be easily implemented and supports

industry standard APIs out of

the box, which can greatly simplify


Key Lifecycle Management

Successful key management takes

an integrated approach to generating,

storing, distributing, rotating,

revoking, suspending and terminating

keys for devices and applications.

Here are things to consider through

the lifecycle of a crypto key:

Key generation and certification.

Make sure the key strength matches

the sensitivity of the data. The longer

the key, the stronger the encryption,

and the less susceptible it is to brute

force attacks.

Key distribution. Each key must

be associated with a particular user,

system, application or policy. This

helps the organization understand

how to secure the key, especially in

transit. Have separate access for the

administrator creating the key and

the person using it. That way, it is assured

that unauthorized

users can’t get access to

confidential information.

Key storage. Centralized,


key storage is recommended

for keys that

protect highly sensitive

data and applications. Distributed

storage is used when cryptographic

keys must exist nearby secured data

and applications.

Key rotation. Each key should be

designated an effective crypto period,

with the ability to change key

on demand. It’s important to limit

the amount of data encrypted with

a single key because using the same

key over a long duration of time increases

the chances that the key will

be compromised. Rotating keys regularly

ensures stolen keys are only

useful for a specific time period.

Key backup and recovery. If the

key storage mechanism fails or is

compromised, there must be a way

to restore the keys. Backup copies of

cryptographic keys should be kept in

a storage mechanism that is at least as

secure as the original store. Concrete

procedures must be documented to

handle a key compromise as well.

Key revocation, suspension, and

termination. Every organization

must be able to delete keys associated

with compromised systems or

data, to ensure unauthorized users

can never decrypt sensitive assets.

The more you encrypt, the more encryption

keys you have to store and manage. If these

keys are stolen or copied, they can be used

to decrypt sensitive data, negating the entire

encryption process.

Sometimes there may be the need to

take a key out of the lineup but not

terminate it. For instance, data that

may be used for legal proceedings

may need to be recalled; those keys

should only be suspended.

Cryptographic Resource


For policy enforcement, transparency,

and system health, every organization

should have one, easy-to-use

interface that administers, monitors

and provisions cryptographic

resources. System capabilities must


Resource deployment. Provision

cryptographic resources and create

security access for multiple administrators

at multiple access levels.


System Administrators and Security

Officers should be able to perform

their duties without compromising

the Application Owner ability to access

and control the keys.

Policy Configuration. Determine

how many keys can be generated,

and where they are stored. Establish

policies for key usage and custodial

duties, with appropriate training requirements.

Monitoring and reporting.

Secure, automated

and unified

logging and reporting

are vital to risk and

compliance posture.

Key ownership and any

modifications to that

ownership must be recorded and securely

stored to maintain an authentic

audit trail.

With a solid cryptographic key

management infrastructure an organization

can appropriately protect

their “keys to the kingdom” and meet

their encryption needs such as diversity

and availability of keys, encryption

performance, management and

storage of keys, and address compliance

and risk management requirements.

Shawn Campbell is VP of Product

Management, SafeNet Assured Technologies.

He can be reached at Shawn.

Mass Notification/Disaster Response

Emergency24’s two-way, multi-media

mass-communications system

Traditional notification of an emergency

in a building usually is accomplished

with visual (strobe)

and audio (horn/speaker) indicators

while a central station operator

notifies the 911-dispatch center via

telephone contact and then makes

party calls.

That’s the end of the information


A conversation, in comparison,

is two-way dialogue. That’s exactly

what’s needed to minimize the impact

of a severe emergency whether

it is in a school, office, hospital or

other facility that attracts generally

the same population each day.

By using your central station’s

advanced notification technologies,

you can open real-time communications

between offsite school

officials or building owners, onsite

teachers, students, building occupants

or tenants and security staff.

Real-time emergency information

and requests for help can come in

from the building while instructions

to building occupants can go


For example, a teacher responding

to an emergency notification could

respond by text that there are injuries

in a certain location in

the facility. The paramedics

then know to go to that location

immediately instead of

sweeping through the building

to find people who need

medical assistance.

The same two-way communication

capabilities are

also available for community-wide

situations, such as a

HAZMAT event, boil-water

order or major road closure,

but instead of an alarm-system

trigger to initiate the

mass notification and emergency

communications (MNEC)

system, an administrator would

manually generate the event message

via an online portal. That message

would then be sent to citizens

who opted-in to receive E-mail,

voice or text alerts.

Consider Appropriate

Groups & Methods to Address

The increased occurrence of mass

shootings and other terror-type

events has led to new ways of thinking

when it comes to emergency

response. This level of response is

not intended for minor incidents


like a fistfight in a school hallway.

Response of this magnitude is for

situations like an active shooter or

when there are mass casualties, such

as during a tornado or other natural


To establish protocols, alarm contractors,

local emergency-response

agencies and the school/office administrators

must collectively determine

who should receive what type

of information and when.

Having accurately segmented

contact groups is essential so that

the intended audiences receive information

that law enforcement

deems most helpful to protect lives.

Examples of contact groups include

school administrators, security staff,

teachers/managers, students/staff,

elected officials, parents and the


List segmentation determines who

receives complete access to operate

the incident command portal and

other groups who receive immediate

text/E-mail/voice notice of the

incident and access to emergency

procedure documents, but no portal

control. Other contact groups — especially

younger students — would

receive less information about the

incident, if any at all. How much information

is shared with each group

depends on the wishes of the subscriber

and police.

Recipients Can Help Supply

Situational Intelligence

When an alarm is activated by a

system or generated by the incident

command portal, security personnel

and building occupants with the

highest administrative levels (management,

principals, security, maintenance,

etc.) are immediately notified

of the incident via the various

messaging methods.

The notification will identify the

type of emergency that happened

and provide a link to a floor plan

showing where the incident occurred

in the facility. That message

also contains links to get driving

directions to the facility (for police

response) and access to the secure

Internet portal from which two-way

mass communication is facilitated.

From the secure, online incident

command portal, instructions for

building occupants can be sent and

recipients can reply to the messages

by E-mail or text to provide onsite

intelligence. Security personnel can

also be given access to onsite video

feeds to track perpetrators and visually

assess the situation in real-time.

Because building occupants are

able to reply to the messages they

receive, they can have a “digital conversation”

with the incident commanders.

Those responses could

indicate where there are injuries or

even contain photographs to help

identify the perpetrators or let police

know how many perpetrators

they are dealing with when they arrive.

Ongoing two-way communication

between the contact groups can

be maintained throughout the incident

until the “all clear” message is


Alarm contractors can market this

service to existing subscribers or to

facilities in which you don’t have the

account because it can be a standalone

system that is not tied to any

specific hardware. That means alarm

contractors can use the equipment


they are most comfortable with and

all that’s needed to initiate this system

is receipt of a signal at the central

station to start the initial notification


By integrating a building’s alarm

system with advanced notification

technologies, alarm contractors

have a new and significant revenuegenerating

service to offer schools,

offices and hospitals.

About Emergency24

Emergency 24, Inc. is an Underwriters

Laboratories listed central station

that operates a network of five

monitoring facilities strategically

placed throughout the U.S. to ensure

ongoing operations even during

a time of regional disaster. Our

robust facilities and infrastructure

provide us with the industry’s widest

range of alarm monitoring and

communications capabilities to protect

dealers and subscribers against

failure. Fundamental to our success

and longevity is the fact that our inhouse

team of software engineers

develops services that are consistently

ahead of the industry’s technology

curve to help dealers fulfill

the needs of their subscribers.

For more information, contact

Kevin Lehan, Director of Communications,

1.800.800.3624, ext. 6917

Mass Notification/Disaster Response

NICE helps Metro Nashville Department of Emergency

Communications get ready for Next Generation 9-1-1

HOBOKEN, NJ, November 30,

2016 – With plans to deploy a statewide

emergency services network

(ESInet), Tennessee has set the stage

for Next Generation 9-1-1 (NG9-

1-1). The Metro Nashville (TN)

Department of Emergency Communications

(MNDEC), the state’s

largest 9-1-1 center, recently upgraded

to the latest NICE Inform

solution to prepare for this change,

NICE (Nasdaq:NICE) announced

today. NICE Inform will support

the MNDEC’s current communication

recording needs, while also enabling

future logging of SMS texts

and other multimedia, as the center

prepares to accept texts-to-911

starting next year.

All calls that come in to the MN-

DEC – over a million a year – are

processed through the MNDEC’s

VIPER Power 911® platform, a

Voice over IP (VoIP) call processing

solution from West Corporation

that can also receive NG9-1-1 services,

including SMS texts and other

i3 compliant data. NICE Inform is

integrated with and certified to support

leading NG9-1-1 call handling

and text-to-911 applications, including


NENA i3-compliant and futureready

NICE Inform enables a seamless

migration to next generation

emergency communications. NICE

Inform captures, manages, and

synchronizes multi-channel interactions

between citizens, PSAPs

and first responders, to provide a

complete, true record of incidents.

It assembles telephony and radio

communications into an authentic

incident timeline along with


SMS 911 texts, GIS, screen recordings,

video and other multimedia,

for comprehensive insight into the

‘who, what, when, where and why’

of incidents.

“Text-to-911 and NG9-1-1 are

coming; it’s only matter of when, and

we need to be

ready,” said

Tim Nielsen,

NICE Administrator

for the Metro

Nashville Department





recent NICE


align with our transition to all IP,

text-to-911 and ultimately NG9-1-

1. For us, it was a necessary move,

and a move in the right direction.”

According to customer surveys,

the Metro Nashville DEC also routinely

receives high marks from

citizens, thanks in large part to its

proactive approach to Quality Assurance

and Quality Improvement

(QA/QI). The MNDEC reviews

over 7,000 calls annually to ensure

quality standards are being met and

protocols are being consistently followed.

With the addition of NICE

Inform Evaluator and Reporter, the

MNDEC will be able to automate

manual QA processes to save time,

while also turning QA data into actionable


“The Metro Nashville DEC exemplifies

what it means to be a pacesetter,

not just within the state of


but within the

nation,” said


Wooten, Executive



Vertical Markets,


“In addition

to spearheading

the modernization


for the MNDEC, Tim Nielsen

has also taken on a critical dual

role as the first Public Safety Chair

of the NICE User Group (NUG)

and leader of the new Public Safety

NICE User Group (PUBNUG). Tim

brings a wealth of technology and

operational experience to this position

which will ultimately be beneficial

to other 9-1-1 centers as they

navigate the challenges of managing

everyday operations while making

steady progress toward NG9-1-1.”

About the Metro Nashville

Department of Emergency


The Metro Nashville Department

of Emergency Communications

Operations Division is the core of

the public safety system for Davidson

County and the Nashville area.

The Metro Nashville DEC strives

to provide prompt, courteous and

efficient service to the citizens in

Nashville/ Davidson County by answering

9-1-1 and non-emergency

calls, as well as dispatching Police,

Fire, and EMS services. In 2015,

the Metro Nashville DEC handled

over one million calls, with 477,599

of those calls being 9-1-1 in nature.

The Metro Nashville DEC

has achieved and maintained three

accreditations: CALEA (Commission

for the Accreditation of Law

Enforcement Agencies) Communications

Accreditation, and ACE

(Accredited Center of Excellence)

Accreditations through the International

Academy of Emergency

Dispatch for both Medical and Fire

Protocols. It is also a recipient of

the CALEA TRI-ARC Award which

is given to the governing body(s)

and agencies that have concurrent

CALEA accreditation for their law


enforcement, public safety communications

and public safety training

agencies. Nashville is one of fifteen

cities that have received this prestigious



About NICE

NICE (Nasdaq:NICE) is the worldwide

leading provider of both

cloud and on-premises enterprise

software solutions that empower

organizations to make smarter decisions

based on advanced analytics

of structured and unstructured

data. NICE helps organizations of

all sizes deliver better customer service,

ensure compliance, combat

fraud and safeguard citizens. Over

22,000 organizations in more than

150 countries, including over 80 of

the Fortune 100 companies, are using

NICE solutions.

Mass Notification/Disaster Response

What the FCC revamping of the

Federal Alert System means to you

By Nelson Daza

In the wake of the New York City

and New Jersey bombings that took

place recently, big changes

are on the way for the

FCC’s Wireless Emergency

Alert (WEA) system. Sen.

Chuck Schumer expressed

dissatisfaction and frustration

with the current

system after the WEA was

used to send a brief 90-character

message to cellphone users in NYC

alerting them to look out for a suspect

by the name of Ahmad Khan

Rahami. The message had no links,

photos or embedded media which

caused many citizens to panic.

While clearly not the intention of

the FCC, their mass communications

technology caused more panic

than it alleviated and the organization

is looking to make upgrades to

ensure this type of situation doesn’t

happen again.

Since the EAS system is vital to

our national security and public

safety, it should undoubtedly be a

state-of-the-art system. There are

some EAS devices and protocols


that seem to be out of place in our

modern era. For example, broadcasters

have to purchase and maintain

on-premise hardware that has

very limited functionality

and is very complex to

use. Television broadcasters

can still only broadcast

text information in

the form of a ticker tape

across the top or bottom

of a television set. However,

more and more incident information

contains richer content,

such as images or video, that are not

handled by the devices that are currently

used. The federal government

– and subsequently, all broadcasters

– need to start taking steps that will

allow them to stop depending on

these outdated devices and start using

the Internet to deliver emergency

messages to television and radio.

Not to mention, there are fewer and

fewer people left who know how to

configure, maintain or use these antiquated


The ripples of the EAS upgrade

will soon be felt at a municipality

near you. There’s no denying that we

live in a dangerous world today. Active

shooter situations and extreme

weather conditions seem to be happening

with increasing frequency,

so mass communications have never

been more important. During a

crisis, the ability to quickly direct

large groups of people can be the

difference between life and death.

To do that effectively, however, there

are key capabilities government officials

must have in place prior to a

major event. While the FCC hasn’t

provided any specifics around what

standards it will use for its upgrade,

here are three key capabilities that

should make the cut.

Multi-Modal Outreach is Critical

The first step in any mass communications

strategy is to recruit the local

population to join the program.

After all, it doesn’t do anyone any

good to have a cutting-edge, ultramodern

communications system

that can’t reach anybody. Today’s

citizens have come to rely upon a

wide range of Internet-connected

devices, which makes it particularly

difficult to lock in on one specific

method of outreach.

The most successful government

agencies and municipalities have

asked their citizens for two key

pieces of contact information: their

cell phone number and their social

media information. The cell phone

is nearly ubiquitous among people

today and it’s the only device that

people carry and actively engage

with throughout the day. However,

it’s important to realize that no contact

path, including a cellular device,

is 100% reliable, 100% of the time

(which is critical in an emergency

situation when the message must

reach as many people as possible).

This is an important tenet that the

FCC should consider as part of the

EAS overhaul.

A robust, multi-modal mass communications

program enables government

officials to more accurately

and effectively fuel the spread of

information during an emergency.

Once the communication channels

have been decided upon, consider

supporting the program through

advertising, public relations, social

media and even traditional physical

media to get the word out about

how people can sign up for the program.

The FCC should even follow

the lead of local communities,

such as Lewisville, Texas, where a

local emergency management department

conducted an extensive

awareness program, which included

development of marketing materials

and a Public Service Announcement

(PSA). The awareness program was

well received and encouraged residents

to enroll their other devices

and contact paths. The community

saw a 262% increase in resident optins

in less than a year.

The Power of Rich,

Multimedia Messages

Pictures, graphics and sound clips

have permeated our everyday communications

alongside plain text,

and are a valuable tool in crisis communications.

Just think for a moment

back to the New Jersey bombing

incident. If the FCC were able to

issue a picture of the suspect during

their communication, local citizens

would be empowered to become

helpful informants to locating the

suspect. People in crisis situations

tend to be hyper-focused on any and

all stimulus so asking them to take


the extra step to locate an image of

the suspect via a Google search is a

bridge too far for many to cross. The

ability to provide people with a succinct

synopsis – complete with the

who’s, where’s, why’s and how’s – is

critical to stomping out uncertainty

and panic from the get-go. A picture

is worth a thousand words and can

serve as a critical piece of information

in criminal investigations for

police officers.

Real-Time Guidance During a Crisis

Crisis situations are fluid and dynamic.

To properly manage an emergency

event, specific people need to

take decisive actions throughout a

prolonged period of time. This requires

an immense amount of realtime

coordination that is impossible

unless an agency or municipality is

able to communicate with targeted

groups during an incident. EAS

should incorporate the fundamentals

of two-way communication,

and targeted notification capabilities,

where possible.

As an example, let’s imagine an

active shooter situation within a

government building. Government

officials could quickly communicate

with security personnel to

confront the gunman while directing

other workers, including those

More on page 51

Mass Notification/Disaster Response

Washington tech firm claims predictive analytics

can improve emergency response operations

WASHINGTON, Nov. 28, 2016 – As

Katrina made landfall in the hurricane

season of 2005 - emergency

managers evacuating New Orleans,

faced their biggest challenge - determining

where, when, and who would

be harmed the most.

For over a decade, NeST Group, a

metro DC based techno-conglomerate,

has systematically invested in

building decision support platforms

- that go beyond mere forensic analysis

and provide predictive intelligence

- that commanders can use

in real-time to improve tactical

emergency response


“The WWW is rich with

data feeds - social media,

internet of things (iOT),

surveillance, primary surveys,

biometrics, spatial

imagery - however, we consume

a very tiny fraction of this massive

information mine to determine

outcomes,” states Dr. Javad K Hassan,

the founding Chairman of the NeST

group. “Aggregating data hives to visualize

future intuitively, eludes all,

but a handful of sophisticated cyber

intelligence (CYBINT) outfits,” he explains.

Across the past decade, business

Dr. Javad K Hassan

decisions using public domain data

steadfastly increased - in crafting entry

and expansion plans, patterning

consumer behavior, and developing

distribution strategies. Yet in tactical

fields - like combat, search & rescue,

or counter-terrorism - its potential

still lies largely untapped.

Anoop Madhavan, the Senior Vice

President of the NeST Group explains,

“The Boston Marathon bombing

triggered the steepest adoption of

the National Incident Management

System (NIMS) across

military and emergency

response organizations in

the US.” NIMS is the presidentially

directed federal

platform to unify and coordinate

responses between

various agencies.

An incident commander

and a tactical operations

chief certified by the Homeland Security

Emergency Management Agency

on disaster operations, Mr. Madhavan

firmly believes “deterministic models

and information is key to the success

of a field commander; it enables him/

her to establish effective, efficient, and

safe priorities to all operatives contributing

to the mission’s success.”

NeST Group companies, rally on


technology frontiers - ranging from

fiber optics, embedded systems, signature

intel applications, and geographic

information systems. Two

group companies are rated at CMMi

level 5 - the highest award accorded

by the Carnegie Mellon University’s

Software Engineering Institute.

“Right from its capture at a sensor,”

clarifies Matt Onojafe (Director

of Government Contracting of

Opterna AM, the group’s fiber optics

arm), “we guide data through its lifecycle

as it transforms into actionable

intelligence.” Matt has successfully

led Opterna’s recent contract awards

from the US Department of State,

Army, Navy and the Defense Logistic

Agency (DLA).

Conventional analytic systems stop

with best ingress routes, effective apparatus,

and optimal HR configurations

to respond to a mission. NeST’s

high maturity predictive systems take

deterministic ability, many levels further.

It profiles - with high levels of

statistical confidence - the evacuation

route a community in a disaster aftermath

will instinctually traverse; the

defensive or offensive tactic an adversary

will adopt in combat; and even

the exact location where the target of

a search will be discovered.

As the group prepares to transition

to the new administration’s intelligence,

homeland security, and defense

policies, its IT investments are

honed to equip America’s warfighters,

intel analysts, and first responders,

with better aggregated and visualized


About NeST

NeST Group is a $400 million international

conglomerate with more

than 4000 scientists, engineers, and

employees - headquartered in metro

Washington DC. It has offices in the

Americas, Europe, the Middle East,

South Asia, Japan and the Far East.

NeST’s strategic leadership stems

from its founder and group chairman,

Dr. Javad K Hassan, who was a

senior VP at IBM.

NeST Group has health care (ultrasound

systems, MRI equipment,

PAC systems), green energy (fuel

cells, wind turbine control systems),

embedded systems, wireless, IT, and

fiber optics products. GE, Toshiba,

Hitachi, ABB, Verizon, Honeywell,

France telecom, and Etisalat are all

prominent customers of the group.

Sign-up for Free

GSN Digital Editions

and Email Newsletters

Free subscription to your selection of GSN digital editions

and daily/weekly email newsletters. Add new selections or

opt-out of any selections at any time.

GSN Monthly Digital Edition

GSN Airport, Seaport, Rail, Border Security Weekly

GSN Daily Insider Newsletter (5 Days Weekly)

GSN Cybersecurity Newsletter

GSN Media Kit


The News Leader in Physical, IT and Homeland Security


Mr. Hu, Founder and CEO of Hangzhou

Hikvision Digital Technology Co Ltd, shares

his thoughts with U.S. journalists

By Adrian Courtenay,

Government Security News

On October 21, a group of five

American journalists embarked on

a nine day journey to China, courtesy

of Hikvision USA and parent

company Hangzhou Hikvision Digital

Technology Co Ltd. The trip was

designed to include

visits to Shanghai,

the financial capital

of China; Hangzhou,

where the headquarters

of Hikvision are

located; and Beijing,

the capital of the People’s

Republic of China

and the nation’s political, cultural

and educational center.

The Beijing visit in particular was

of special interest to Government

Security News because Beijing is a

major hub for the country’s very sophisticated

transportation systems

of national highways, expressways,

railways and high-speed rail networks.

The Beijing Capital Airport

is not only the second busiest in the

world in passenger traffic, but also

an architectural masterpiece. And as

we learned when visiting the Hikvision

headquarters, transportation is

a core market for Hikvision, which

also deals with Safe Cities, Education,

Healthcare, Energy and Power

Grids, Cybersecurity, Law Enforcement

and Public Safety, Sports, and

“I’m a big fan of Adam Smith. I’ve read

his books and respect his theories a lot. I

think more about users than competitors.

Hikvision respects competitors.”

of course Video Surveillance.

Founded in 2001 with 49% foreign

capital, Hikvision had a market

capitalization of more than $20

billion USD by September 16, 2016,

more than 18,000 employees and

40 wholly-owned subsidiaries and

shareholding companies worldwide.

According to yearly independent

data from the IHS Market, Hikvision

accounted for 19.5% of market


share in the global video surveillance

industry in 2015, up from

4.6% in 2010, and has been ranked

the number one market share leaders

for video surveillance equipment

for five consecutive years. In 2015,

Hikvision was ranked first in the

Emen market with 12.2% market

share, and was ranked second in the

Americas market with

7.3% market share.

In addition to their

meetings with Hikvision,

the American

journalists were also

treated to visits to

some of the great accomplishments


ancient China, including the Great

Wall of China, the Forbidden City,

and Ancient gardens dating back

to the 1500’s, along with visits to

the country’s awesome present day

building accomplishments, such as

the gorgeous towers in Shanghai

that dwarf the Empire State Building

and the magnificent Intercontinental

Hotel and Conference Center,

where U.S. President Barack

Obama recently met with Chinese

President Xi Jinping. Not surprising

to anyone, all the cameras in the

Conference Center were installed

by Hikvision, many of them with

3D system patrollers that open remotely

at hotel checkpoints.

But despite the tours and the best

of Chinese cuisine, it seemed obvious

to this observer that some of the

most interesting moments of the trip

in the eyes of the visiting American

journalists took place in the meeting

with Mr. Hu, Founder and CEO

of Hangzou Hikvision Digital Technology

Co. Ltd, who admitted to

having read over a hundred books

on U.S. business and culture, and

who revealed the deep knowledge

and insight of a consummate entrepreneur.

Here are some samples

of the back and forth between the

American journalists and Mr. Hu:

When Ralph Jensen, Editor of

Security Products Magazine, asked

the question, “Have you run into

any “push-back” from companies in

Europe, U.S. etc. Mr. Hu responded:

“I’m a big fan of Adam Smith.

I’ve read his books and respect his

theories a lot. I think more about

users than competitors. Hikvision

respects competitors. We do not use

aggressive tactics with competitors.

It’s a public company. Everything

is public. We have a price system,

but we do not cut rates. We provide

more services to customers. When


you compete in a market, you learn

different sentiments. Some competitors

will come and some will go.

China is the most free market in the

world. Investors have benefits. They

do have privilege.

In a surprising answer to a question

from Mark Tarallo of Security

Management Magazine regarding

his personal style and philosophy,

Mr Hu responded, “When we started,

we were not prepared, but we

had passion and learned a lot from

the U.S. A lot of thoughts, passion

and interpretation in a lot of areas.”

He then expanded on his theme

in answer to a question from Clare

Meyer of Security Magazine, who

had asked how citizenship fits in

with Hikvision’s goals:

“Hikvision is a commercial company,”

said Mr. Hu, “and we focus on

business success with four criteria,

in this order:

“The First Partnership is with the

customers, and how do we create

competitive products for them;

“The Second Partnership is the

employees’ performance in fulfilling

the mission of creating value for

competitive products;

“The Third Partnership is that the

company gives respect to the employees

and develops everyone into

an international company. There are

different laws and cultures that are

different from country to country,”

Mr. Hu pointed out. “But we have to

make sure, he adds, that all employees

are offered the same rewards

and respect, while still following the

laws and cultures of their countries.

“The Shareholders are the Fourth

Partner, and Hikvision has been

paying dividends for shareholders

for years, often as high as 48%

of profits,” according to Mr Hu. But

he still feels that the most important

requisite to healthy dividends is

when the employees and customers

are happy. Corporate growth is the

health of the company.

Paul Ragusa, Editor of Security

Systems News, asked Mr. Hu “What

excites you about the company and

its future,” to which Mr Hu responded,

“We’re excited about the next ten

years. We’re full of hope about this

industry. Video – but not just in security

– in many other areas, Robots

for example. We’re developing automation,

so there are lots of things to

do. 50% of our brain is about new.”

In a follow-up question from Ragusa

about new products in the

works, Mr Hu answered, “The traditional

way was to compress. Now

we upgrade. We recognize different

algorithms. We use data. We have a

new product ‘Black Light’ and we’re

also demonstrating new developments

in video. We’re learning artificial

intelligence and its applications,

using retail and learning a lot

of about who is who.

Since our publication Government

Security News has a strong focus

on transportation, as well as an

annual Awards Program on Airport,

Seaport, Border Security and Immigration,

all of which are also core

markets for Hikvision, our question

to Mr. Hu was simply, “What new


products and technologies is Hikvision

expecting to deliver in 2017

in the Airport/Aviation, Maritime/

Seaport, Railroad, Border Security

and Immigration markets and as

well as national Energy, Water, Gas

and Oil Grids, and how are you

dealing with Cybersecurity, which

pertains to all of the technologies in

which Hikvision is involved.”

As expected, the response from

Mr. Hu was very interesting and

informative, starting off with Cybersecurity,

which he agrees is a big

challenge, not only for manufacturers,

but also for integrators. “In 2014

we established network security and

cybersecurity to minimize impact

of relation with companies working

with integrators, not only in design,

but also in firewalls if needed. We

try to think from a user perspective.

We need to understand the customer.

We believe that success is 30%

produced by technology and 70%

by good management.”

Mr Hu continued: “We’ve created

improvements in airports, seaports

and borders by adding facial recognition

in airports and seaports and

thermal products in borders, and

our power grids are getting more

secure because we’re now moving

power lines underground. Hikvision

is also using drones and providing

training to integrators in dealing

with forest fires and high towers set

up long range, as strong drones may

e needed to deal high voltage grids

and natural disasters.”

“When we deal with customers,

we need to think if we can do it. All

requirements go to the R&D department,

which collects and sorts out.

We also have a customization department

to build a technology base

and then get feedback. Some products

need changes in technology.

Some changes are not in the present.

We respond very quickly with

our R&D.”

“How about the engineers,” asked

Ralph Jensen. “Are they smarter today?”

“They are more energetic and

more imaginative today. That’s an

influence from American culture,”

said Mr. Hu. “With all our own

ideas and opinions, international

economics brings common conclusions.

We keep some traditions. But

a lot of things will stay. Globalization

is still here.”

And then Ralph asked, “What do

you think about the American Election?”

Several of us later agreed that

Mr. Hu’s answers to this question

were a good example of his extraordinary

ability to make his point very

politely, sometimes so politely that

you might not even understand the

underlying meeting of what he had

said. “Thoughts about the American

election,” said Mr. Hu, “This election

was different from what we

thought it would be. The most developed

county is showing a lack of

confidence. The U.S. should be the

one leading globalization. The U.S.

has the best technology. The U.S.


should be more confident.

“How is security developing in

China?” he asked himself. “In earlier

days people were inclined to

obey. Now it’s different. Now people

pursue what they want. They are

more constructive.”

There was some more talk about

the potential of Big Data, Deep

Learning Cameras, Analytics, Deep

Intelligence and “The new era of

Secure Data Technology”, and then

the discussion was over. I can’t guarantee

it, but I believe the rest of our

team came to the pretty much the

same conclusion that I did – that

it was a very informative meeting,

even if we may not have fully understood

every subtlety that was

embedded in Mr. Hu’s statements.

Sign-up for Free GSN

Print/Digital Editions

& Email Newsletters


Researchers say coastal community

stakeholders need to be involved to make

their towns more resilient from storms

MCLEAN, VA Nov. 29, 2016 –

Coastal storms can cause surges,

sea-level rise, and cyclone winds

that devastate communities. But

emergency management experts in

a new study detail a method for involving

local stakeholders in planning

for such extreme events and

thereby helping such vulnerable areas

in becoming more resilient.

Coastal communities’ ability to

plan for, absorb, recover and adapt

from destructive hurricanes is becoming

more urgent. As of 2010,

approximately 52 percent of the

United States’ population lived in

vulnerable coastal watershed counties,

and that number is expected

to grow. Globally, almost half of the

world’s population lives along or

near coastal areas.

“In general, risk management has

not been sufficiently focused on

coastal resilience, with community

stakeholders involved in the process

of making their coastline, as

a system, more resilient to coastal

storms,” according to the study,

“Enabling Stakeholder Involvement

in Coastal Disaster Resilience Planning,”

by George Washington University

researchers Thomas Bostick,

Thomas Holzer, and Shahryar Sarkani.

Their study was published in

the online version of Risk Analysis,

a publication of the Society for Risk


“This research demonstrates

a methodology for

involving stakeholders

in discussions that make

their coastlines more resilient,”

says Bostick. After

disasters strike, local

stakeholders are often surprised

and frustrated with

the damages inflicted on

their communities and seek greater

involvement in reducing risk. That

frustration can be addressed by investing

more in physical infrastructures

to protect against flooding. But

the needed infrastructure can be expensive,

such as the $14.5 billion the

U.S. Army Corps of Engineers was

given to reinforce New Orleans after

the 2005 destruction caused by

Hurricane Katrina, an amount of

federal support that most high risk

areas are unlikely to receive.

Recognizing that a methodology

was missing for integrating


Thomas Bostick

coastal stakeholders into the process

of identifying and selecting of

resilience-enhancing projects, the

authors conducted a case study with

data from a stakeholder meeting in

Mobile Bay, Alabama, to demonstrate

a method for engaging

stakeholders over a

longer period to identify

what the group considered

the community’s most significant

critical functions

and project initiatives to

preserve those functions

under different scenarios.

Mobile Bay, Alabama’s

only port for ocean-going ships and

an entry point for smaller recreational

and commercial vessels, has

seen population growth and accompanying

demand for housing, infrastructure

development, and other

changes that have impacted natural

ecological systems. During tropical

storms and hurricane events, Mobile

Bay’s Eastern Shore is vulnerable

to coastal erosion and sediment

transfer into the bay.

A workshop involving approximately

30 participants was held in

2015 at the National Oceanic and

Atmospheric Administration’s Disaster

Response Center in Mobile,

Alabama, to test methods to calculate

resilience for the Mobile Bay

region. Participating stakeholders

worked with subject matter experts

in systems engineering, coastal engineering,

risk and decision analysis,

and other fields to develop a set

of proposed projects to address key

resilience stages and domains.

Resilience domains include the

physical (built infrastructure as well

as wetlands, dunes, and other natural

features), information (policies,

building codes, evacuation routes,

and other materials), cognitive

(human processes for sharing and

acting upon knowledge to make,

communicate, and implement decisions),

and social (“interactions,

organizations, people, and policies

that influence how decisions are

made,” such as government flood

insurance, religions, cultures, and

languages). “Coastal communities

can improve resilience not only in

the physical domain, but also in the

information, cognitive and social

domains,” says Bostick. The methodology

described in the study is

intended to support such improvements.

Through the workshop, stakeholders

generated 11 project initiatives,

including, for example, reducing

saltwater intrusion, environmental

and coastal storm education, utility

pole replacement, removing scrap

metal, and reducing impervious

surfaces. The subject matter experts

aligned the initiatives with the four

critical stages associated with resilience:

preparing, absorbing, recovering,

and adapting. Participants

also identified a set of critical functions,

such as telecommunication,

electricity, housing, clean water, the

tourism industry, and others.

In reviewing the workshop results,

the authors note that their study

does not seek to measure whether

a community or a coastline is resilient

or not because there “is clearly

no agreement on how this would

be accomplished.” However, the

methodology offers stakeholders

an opportunity to understand the

concept of resilience and scenarios

and, based on this understanding,

to make informed choices on how

to improve the coastal resilience in

their community. “This is a capability

that does not currently exist,” the

authors write.

Risk Analysis: An International

Journal is published by the nonprofit

Society for Risk Analysis (SRA), an

interdisciplinary, scholarly, international

society that provides an open

forum for all who are interested in

risk analysis, a critical function in

complex modern societies. Risk

analysis includes risk assessment,

risk characterization, risk communication,

risk management, and risk

policy affecting individuals, publicand

private-sector organizations,

and societies at a local, regional, national,

or global level.


Robin Systems continues to win laurels with two new

TMC awards for IT excellence and Info Tech spotlight on

big data as a service, making application-defined data

center as a reality

SAN JOSE, CA, Nov. 17, 2016


SystemsTM, the first Application-

Defined Data Center software

company, today announced that its

Robin Containerization Platform

has been recognized by Technology

Marketing Corporation (TMC) via

two of its prestigious awards, winning

the Internet Telephony Magazine’s

IT Excellence Award and the

2016 InfoTech Spotlight Magazine’s

Big Data as a Service Award.

Each of these awards recognized

nine companies and their products

for excellence. Both awards recognized

Robin for its applicationaware

and Big Data-optimized

converged infrastructure software

among products from other industry-leading

companies such as SAP.

These two industry-leading

awards programs add to the recognition

Robin has already earned in

2016, including its most recent honor

of being named a finalist for Red


Herring’s 2016 Top Global Award.

Robin has also earned the Golden

Bridge Awards’ Gold Award, Red

Herring Top 100, The Stevie Awards’

New Software Product of the Year

and Network Product Guide’s Startup

of the Year.

The IT Excellence Award recognizes

the creators of technologies

and solutions that demonstrate

leadership and innovation in the

industry while the 2016 Big Data as

a Service Excellence Award, in particular,

recognizes BDaaS solutions

that help companies store and analyze

data, enabling intelligent business


”We congratulate Robin for its

achievement in helping organizations

create a world-class IT infrastructure,”

said Rich Tehrani, chief

executive officer of TMC. “Robin’s

technology delivers the level of excellence

in performance, flexibility

and agility that businesses of all sizes

are coming to find indispensible.

I look forward to witnessing Robin’s

continued success.”

“We’re honored that TMC has recognized

our Robin Containeriza-

tion Platform through these awards,

underscoring our ability to help

today’s enterprise fully transition

to an infrastructure that is application

defined and ready for digital

business,” said CEO Premal Buch of

Robin. “Robin aims to help enterprises

set their data free by breaking

down walls and complexities that

often become an insurmountable

impediment for many enterprises

in fully harnessing data – their most

critical asset. Our goal is to give

them a quicker, simpler and more

cost-effective route to ensure predictability,

quality of service, greater

performance, and access.”

Tweet this @RobinSystems wins

two 2016 awards from @TMCNet,

IT Excellence and Infotech Spotlight

Big Data as a Service http://bit.


The Robin Containerization

Platform: Application-Centric IT

infrastructure for Digital Enterprise

Robin’s Containerization Platform

unveils the era of Application-Defined

Data Center, enabling IT professionals

to dramatically simplify

application deployment and lifecycle

management while guaranteeing

predicted Quality of Service for databases

and Big Data applications. This

also enables enterprises to achieve

significant CAPEX and OPEX savings

via application consolidation

on shared hardware. Running on a

customer’s own commodity hardware,

the Robin Containerization

Platform software pools the computing

and storage resources across

servers to create a containerized

agile compute layer, where applications

are deployed within containers.

The container-aware scale-out

block storage enables modern agile

application lifecycle management,

including snapshot and cloning of

the entire application. Robin’s application-aware

infrastructure fabric

controller automates and marshals

the compute and storage layers,

thereby making the infrastructure

completely transparent to the application

owners and developers.

Robin Containerization Platform

helps users:

• Virtualize databases (Oracle,

NoSQL) and Big Data applications

(Hadoop, Spark, Elastic Search, Kafka)

with bare-metal performance.

• Increase hardware utilization by

a factor of 2x-3x by consolidating

performance-sensitive applications

with guaranteed performance and

noisy-neighbor-induced performance


• Reduce database licensing cost

by 50 percent or more through database


• Boost productivity by a factor of

10x-100x for developers and DBAs,

with capabilities such as 1-click cluster

deployment, scale-up and scaleout,

application snapshot, clone and

time travel.

For more details on the Robin


platform please visit robinsystems.


About TMC

Global buyers rely on TMC’s content-driven

marketplaces to make

purchase decisions and navigate

markets. This presents branding,

thought leadership and lead generation

opportunities for vendors/sellers.

TMC’s Marketplaces:

• Unique, turnkey online communities

boost search results, establish

market validation and elevate

brands and thought leadership,

while minimizing ad-blocking.

• Custom lead programs uncover

sales opportunities and build databases.

• In-person and online events

boost brands, enhance thought

leadership and generate leads.

• Publications, display advertising

and newsletters bolster brand reputations.

• Custom content provides expertly

ghost-crafted blogs, press releases,

articles and marketing collateral

to help with SEO, branding and

overall marketing efforts.

• Comprehensive event and road

show management services help

companies meet potential clients

and generate leads face-to-face.

For more information about TMC

and to learn how we can help you

More on page 51

Saab Seaeye Leoport ROV system delivered

to Japan’s Kaiyo Engineering

In a bid to master mountainous

seas the Saab Seaeye Leopard ROV

system recently delivered to Japan’s

Kaiyo Engineering has added an active

heave compensator (AHC) to

its launch and recovery system.

Kaiyo Engineering, a specialist

marine science company, is undertaking

seabed research for Tokyo

University and is using the Leopard

to explore the feasibility of seabed


Adding AHC means Kaiyo can

work offshore more easily in high

sea states, as the AHC system will

accurately maintain the exact relative

depth of the tether management

system from which the Leopard is

deployed by compensating for wave

movement and effectively creating a

motionless state between them. This

significantly increases the ease of

Log file of winch response during tests in Japan. The green curve shows the vessel heave at the

LARS and the orange curve the actual response of the winch. The harmonious relationship between

both curves illustrates how the AHC’s millisecond response to displacement achieves accurate compensation.

ROV operations in high sea states.

The highly advanced AHC system

from Scantrol is designed to maintain

accurate position control at the

winch in real time by calculating

and compensating for any displacement

of the vessel caused by wave

movement. Increased operational

time, safety, ease of use and efficient

commissioning is the main focus of

Scantrol AHC.

With the knowledge from simulations

and tests performed prior

to the commissioning, the LARS

system was upgraded on board the

vessel by Hydramec and Scantrol in

only three days.

In Japan the system was tested to


record winch response and winch

speed, by simulating 3m vessel displacement

down to the Leopard’s

3000 metre rated depth.

The 3000m rated Leopard is the

most powerful electric underwater

robotic work system in the world,

making it ideal for complex and demanding


Saab Seaeye is the world’s leading

underwater e-robotics company

with the most advanced range of

tethered, autonomous and hybrid

robotic systems engineered to address

the diverse range of tasks

found across commercial, defence

More on page 52

CA Technologies strengthens security portfolio with new

advanced analytics and Identity-as-a-Service offerings to

protect and enable the agile enterprise

Mordecai Rosen

LAS VEGAS, Nov. 16, 2016 – CA

WORLD ’16 – CA Technologies

today announced a new behavior

analytics solution that integrates

with CA Privileged Access Manager

(PAM). Called CA Threat Analytics

for PAM, the product features machine-learning

capabilities for better

threat detection and breach prevention

associated with privileged

users. CA also announced CA Identity

Service, a new, turn-key identity-as-a-service

solution, to address

identity and access management

(IAM) needs for both on-premises

and cloud-based applications.

“By applying CA’s unmatched

self-learning behavior analytics to

privileged user activity, CA can help

CISOs with their biggest challenge:

staying one step ahead of the bad

actors,” said Mordecai Rosen, senior

vice president and general

manager, CA Security

business. “Going beyond

protection, CA is extending

secure business operations

with CA Identity

Service to support deeply

embedded on-premises

systems while taking advantage

of the agility of cloud applications

and services.”

Setting New Standards in Threat

Detection, Breach Prevention and

IDaaS for Hybrid IT Environments

Available today, CA Threat Analytics

for PAM models privileged user

behavior and evaluates risk based

on factors such as a user location,

time and duration of activity, the

data being accessed and the user’s

track record for security and past

behavior. When a breach or threat is

detected, the system automatically

triggers controls to mitigate risks,

such as starting session recording,

initiating a stronger authentication

procedure or alerting security system

and operations.

In a recent global survey conducted

by Coleman Parkes for CA,

82 percent of respondents

said identity-centric security

is critical to the business.*

CA Identity Service

addresses the need for

a modern, hybrid IAM solution

– giving businesses

the agility to quickly and

securely adopt cloud ap-


plications and services alongside

their on-premises applications

controlled by CA Single Sign-On,

managing everything from a single

launch pad. CA Identity Service balances

the demand for security, agility

and a positive user experience.

“We see our customers’ businesses

moving increasingly to a hybrid IT

environment. It’s clear we need to

help them with an identity and access

management solution that supports

both their cloud-based and

on-premises applications,” said Ed

Pascua, senior vice president at Simeio

Solutions. “CA Identity

Service offers the flexibility and

management we need to meet the

demands of our customers’ hybrid

enterprise. CA’s Identity Service is

an excellent tool that helps Simeio

More on page 52

U.S. and Canada bring Homeland Security

solutions to Milipol Qatar


NJ — In the Middle East, as populations

and infrastructure grow,

public and private stakeholders are

looking for new ways to protect

people and property. With solutions

ranging from large-scale homeland

security strategies to risk-specific

equipment, products and services,

leading suppliers from the United

States and Canada competed for defense

and security business at Milipol

Qatar earlier this year in Doha,


The centerpiece of the effort was

the North American Pavilion, organized

by Kallman Worldwide, Inc.,

the show’s official representative to

the continent, in coordination with

numerous government agencies,

including the U.S. departments of

Commerce, Defense and State and

their Canadian counterparts. The

Pavilion was a primary destination

for buyers looking to meet industry

leaders, an on-site business hub for

North American exhibitors looking

to maximize their exposure and impact

at the event, and a forum for all

to share industry information and


Ranging from publicly-traded

stalwarts such as General Dynamics

(NYSE: GD) Land Systems Canada

and Raytheon (NYSE: RTN) to privately

held small-and-mediumsized

enterprises (SMEs) with fewer

than 250 employees, Pavilion exhibitors

looked to initiate or strengthen

international partnerships that will

generate new business and create

more jobs back home.

According to the Ministry of the

Interior of Qatar, 11 contracts worth

a total of 260.050 Million and fifty

thousand Qatari Riyal were signed

at the event.

“When North American companies

commit to exhibit at Milipol

Qatar, we’re saying we believe in the

power of this event to attract real

business prospects and customers,”

said Kallman Worldwide President

and CEO, Tom Kallman. “As the dynamics

of life in the Middle East inspire

new strategies for defense and

security, we’re proud to work with

the Milipol organizers to help our

exhibitors succeed in Qatar, whether

as prime contractors or subcontractors

in support of regional

manufacturers, service partners and

their end-user customers.”

Kallman pointed to two companies

that exemplify the wide range

of solutions presented at the Pavil-



• Passport Systems (Booth K-030)

develops advanced active and passive

solutions to rapidly and automatically

detect, localize and

identify concealed threats and contraband

for a broad range of applications,

including pedestrian-,

vehicle-, and fixed-facility-based

approaches. The company was recently

presented with the Massachusetts

Port Authority (Massport)

Security Innovation Award from

U.S. Senator Edward Markey, who

thanked company CEO, Dr. Robert

Ledoux and his team for creating, “a

truly remarkable cargo inspection

system capable of detecting potentially

dangerous material and other


• Canadian manufacturer Newcon

Optik (Booth L-029) had its

sights set on new business — literally

— with a number of innovative

gunsights and accessories including:

n The SEEKER Series of mountable

laser rangefinders are versatile,

lightweight and MIL-SPEC

modules capable of being boresighted

to practically any optical

system, including spotting

scopes, binoculars, and thermal

imagers, as well as mounted onto

rifles and integrated into complex

fire control systems.

n NVS 27M is an exceptionally

lightweight and versatile Gen 3

night vision clip-on is rugged,

compact and durable.

n LRM 3500M, a MIL-SPEC,

pocket-sized laser rangefinder

monocular that’s designed to

outperform other devices of its


“In an increasingly dangerous

world, security is a growth market,

and competition lurks around every

corner,” said Kallman. “From surveillance

and weapons to equipment

and training, our North American

exhibitors are bringing exceptional

innovation, ideas and experience to

Milipol Qatar.”

About Kallman Worldwide, Inc.

Export with purpose. Exhibit with

confidence. Kallman Worldwide is

an export marketing advocate focused

on helping the United States

of America and its leading businesses

capitalize on international

trade shows and events to grow

their share of global markets. Our

flagship International Pavilion programs

cover all the details of creating

and presenting a professional

business environment to buyers, enabling

exhibitors, clients and partners

to make the most of their event

opportunities, cultivate meaningful

global business relationships and

account for a measurable return on

their export marketing investment.

Since 1963, Kallman has helped

more than 10,000 companies, as-


sociations and government agencies

stand out at nearly 1,000 industry

and professional events in 46 countries.

The company is a strategic

partner of the U.S. Department of

Commerce, and a proud recipient of

the President’s “E” Award. In 2016,

Kallman Worldwide was honored

to receive the AmCham Abu Dhabi

“Falcon” Award for its organizationwide

commitment to building sustainable

business relationships between

the U.S. and the U.A.E. The

company recently joined the Bilateral

US-Arab Chamber of Commerce

in support of the Chamber’s

mission to foster economic growth,

educational advancement and mutual

respect between the U.S. and

the MENA region. For more information


Salient CRGT appoints Joseph Zimmerman as

Vice President, Enterprise Solutions Group

FAIRFAX, VA, November 22,

2016 – Salient CRGT, Inc., a

leading provider of Agile software

development, data analytics,

mobility, cyber security,

and infrastructure solutions,

today announced the addition

of Joseph Zimmerman as Vice

President, Enterprise Solutions

Group (ESG). He will lead Salient

CRGT’s delivery oversight

at the U.S. Postal Service and other

strategic accounts, with additional

responsibilities in business development

in new customer capture,

including expansion into the Department

of Defense, and propelling

Salient CRGT’s market leading

solutions in Agile and mobile development.

Mr. Zimmerman is a military

veteran with more than 20 years of

active duty experience as an officer

in the United States Marine Corps

where he served as Company Commander

and Operations Officer. As

a proven leader, he brings 28 years

of successful management experience

and a track record of superior

results in growing organizations

both organically and through new


“With his depth and breadth of

demonstrated achievement, Joe’s

entrepreneurial leadership and extensive

background in operations,

business development and strategy

will be invaluable to our business

development team and our customers,”

said Tom Ferrando, President

of Salient CRGT. “We look forward

to his immediate contribution that

will further define our strategic focus

in Salient CRGT’s market leading

solutions in Agile and mobile

delivery, as well as expansion in our

service to military and other government


Before joining Salient CRGT, Mr.

Zimmerman was the Chief Operating

Officer for Pyramid Systems,

where he was responsible for overall

corporate strategy and day-today

management across operations,

business development, contracts,

human resources, security, corporate

IT, and facilities. With more


than 100 employees and revenue

in excess of $25 million, he established

their first ever comprehensive

business plan and was

able to bring key leadership into

operations and human resources.

Prior to joining Pyramid, he

held several progressive leadership

positions at InfoReliance

Corporation, eventually becoming

their Executive Vice President

of Operations. During the course

of his tenure, he came to lead the

company’s entire services portfolio

including software engineering, cyber

security, cloud computing, and

enterprise IT capability areas to include

customers in the defense, civilian

and commercial sectors.

“We are proud to bring Joe on

board as we continue to meet the

demanding mission critical needs of

our customers,” said Manoj Gandhi,

Senior Vice President ESG. “As we

expand in to new military markets,

his experience and strong relationships

with the Marine Corps will

enhance our future endeavors.”

Mr. Zimmerman retired from the

Marine Corps in 2007 and received

five personal awards including the

Meritorious Service Medal, Joint

More on page 52

Energetiq introduces EQ-77, its 5th generation, ultra-bright,

Laser-Driven Light Source (LDLS )

WOBURN, MA, November 29,

2016 – Energetiq Technology, a

world leader in high brightness,

broadband light sources for advanced

technology applications, introduces

the 5th generation, ultrabright,

Laser-Driven Light Source,

the EQ-77, at the MRS Fall Exhibit


Based on the highly successful

Laser-Driven Light Source (LDLS)

technology, the EQ-77 offers higher

radiance and irradiance from a

truly broadband white light source.

The EQ-77 features a compact lamp

house, with clean construction that

ensures long life and ultimate stability.

With a wavelength range

from 170nm in the deep ultraviolet

to >2µm in the near infrared,

and a choice of dual-beam output

or a single-beam output with retroreflector,

the EQ-77 is flexible for a

broad variety of applications.

“The EQ-77 is the most advanced

DUV-NIR light source on the market

today,” said Debbie Gustafson,

CEO of Energetiq. “As our 5th-generation

of LDLS, it incorporates

our latest technologies to deliver the

ultimate in stable, long-life, broadband,

ultra-bright performance for

our customers in semiconductor

and optical sensor metrology, advanced

spectroscopy, photo emission

and imaging applications.”

EQ-77 LDLS Features:

• Higher spectral radiance: Greater

than 40mW/

• Compact, ultra-clean lamp house

with integrated laser

• Flexible optical interface: dual

beam or enhanced output single beam

• Designed for 24/7/365 operation

• Low noise, 2µm (UV-Vis-NIR). Combined


with 10X the lifetime of traditional

xenon and deuterium lamps, the

LDLS products enable higher performance

metrology, spectroscopy,

and imaging applications at lower

cost of ownership.

The LDLS series received the prestigious

R & D 100 Award in 2011 for

its technological significance, and a

2011 Prism Award for Photonics Innovation.

About Energetiq

Energetiq Technology is the world’s

leading developer and manufacturer

of ultra-bright broadband

light sources for a wide variety of

advanced applications in life and

materials sciences, semiconductor

manufacturing, and R&D. Energetiq’s

light sources are based on

a revolutionary laser-driven light

source technology that generates

high brightness across the spectrum,

with high reliability and long

operating life in a compact package.

More information about Energetiq is

available at

Selfies: A new weapon against public

assistance fraud

By Monty Faidley

One downside in moving public assistance

programs into the digital

world has been the loss of face-toface

contact between citizens and

government agencies. Previously,

validating the identities of beneficiaries

wasn’t an issue because government

employees could see who

they were talking to, but this

has clearly changed.

While no one is ommending a return


old ways of doing

business, identity

fraud has become a

serious and grow-

ing threat to the integrity

of Health and Human

Services (HHS) programs. Last

year taxpayers lost more than $100

billion from public assistance programs

due to fraud and improper

payments. And, based on what I’ve

heard from law enforcement and

witnessed in my experience working

with government customers,

much of it stemmed from organized

criminal groups – both foreign and

domestic – who sell stolen identity

information on the “dark web,”

which is often used to commit fraud

against HHS agencies.

It is an alarmingly easy criminal

enterprise that has increased dramatically

since government services

went online. Criminals often

use stolen identities for robbing tax

refunds, medical benefits, unemployment

insurance benefits, death

benefits and other public assistance

programs. The people hurt

the most are the disad-



who truly need the

safety nets.

HHS agencies ur-

gently need to adopt

new multi-layer secu-

rity models of authen-

ticating users to prevent

fraudulent manipulation of

their programs. The current norm

of requiring only single-layer authentication

such as passwords or

PINS is woefully inadequate. Multiple

layers of strong authentication

are needed to withstand the

constantly evolving nature of fraud


The good news is that the ubiquity

of smartphones combined with

biometric-based security technolo-


gies like fingerprint scanning and

facial recognition offer HHS agencies

a powerful new authentication

weapon to combat identity fraud.

One promising idea is using

smartphone “selfies” as part of a

multi-layer approach for verifying

and authenticating beneficiary

identities. A new generation of

smartphone apps are emerging that

could help agencies validate identities

with the near-reliability of faceto-face


We’re already seeing it deployed

in the commercial world. Earlier

this year, MasterCard launched its

“Selfie pay” service that lets consumers

use selfies to authenticate

online purchases. And today, free

apps such as Identity Snapshot are

emerging on the iTunes Store specifically

designed to authenticate

identities for any number of government


Since no single database of peoples’

faces currently exist (outside of

state motor vehicle departments) for

running massive facial recognition

queries, apps like these will initially

work in conjunction with identity

documents like driver licenses and

state IDs to correlate the selfie with

other information.

Here’s a typical example: Beneficiaries

first enter their identity information

on their smartphones,

then photo-capture an identity

document like a driver license in

the same way mobile banking deposit

apps capture images of checks.

Next, a selfie image is captured and

presented alongside the identity

document for visual verification.

The agency’s data records verify if

the person exists and that the data

they provided matches their own.

The apps can also verify that the

mobile device or the user’s identity

is not associated with previous

fraud attempts. They can be configured

to determine if the IP address

is outside the U.S., or if the Social

Security number has been used on

multiple applications. The apps can

also generate a one-time identity

quiz or a one-time password for access.

These multiple layers can on the

smartphone front-end can also be

reinforced on the back-end by leveraging

identity repositories to further

ensure that people applying

for benefits are indeed who they

claim to be. And when beneficiary

data is shared between states,

authentication is even more

powerful. States can better identify

fraudsters who move their criminal

activities from one state to another.

Wrapping up

Using selfies as part of a multi-layer

identity authentication approach

has one huge advantage: it’s easy

and people are comfortable with it.

A majority of U.S. adults now sport

smartphones, and the vanity-inducing

nature of social media has made

posting selfies part of the cultural

fabric. It offers less “friction” when

it comes to widespread user adoption.

As identity fraud in benefits programs

increases, agencies can maintain

program integrity by using

selfie-driven multi-layered authen-


tication to verify beneficiary identities

and keep the crooks at bay.

Agencies should also consider expanding

beyond traditional departmental

data to leverage information

from other government agencies

and third-party external sources. It

is perhaps our best option for bringing

back the reliability of face-toface

engagement with beneficiaries.

Monty Faidley is Director of Health

and Human Services and Special

Investigative Unit with LexisNexis

Risk Solutions. He may be reached at

ITL Group and Applied DNA Sciences partner to

develop anti-counterfeit ‘SigNature ® DNA’ printed

fabric label solution


22, 2016 – The ITL Group, an international

apparel label solutions

company owned by SA Bias Industries,

has today announced a partnership

with Applied DNA Sciences

(Applied DNA) (NASDAQ:APDN),

a provider of DNA-based supply

chain, anti-counterfeiting and anti-theft

technology, product genotyping

and product authentication

solutions to marry Applied DNA’s

revolutionary SigNature® DNA forensic

marking system with ITL’s

printed fabric care labels to support

global apparel and footwear brands

and retailers in their on-going battle

against product counterfeiters.

Applied DNA has demonstrated

feasibility of SigNature DNA forensic

authentication and Beacon optical

screening technology integrated

with ITL’s wet ink solution for

fabric care labels, creating a multilayer

anti-counterfeit solution. The

technology is intended to be applied

to printed fabric labels (PFL), either

via the supply of a stand-alone PFL

or through integration of their existing

washcare labels. Further testing

and development

is required to validate

through the product

lifecycle prior to general

market availability,

with an interest by

ITL to conduct further

trials on their range of

heat transfer labels. A solution is

expected to launch in the near future.

ITL’s European Sales and Marketing

Director, Simon Phelps commented.

“Counterfeiting continues

to be one of the most significant

problems within our industry and

accounts for around 10% of global

GDP. The growth of on-line popup’s

selling full price fakes has only

exacerbated the issue in recent years

and new research has shown that

now for every one consumer who

knowingly buys a counterfeit product,

there are another 30 or so who

purchase unwittingly.”

Applied DNA designs and formulates

the DNA with Beacon-encrypted

fluorescence in ITL ink at

their US Laboratories. The botanically-derived

DNA delivers 100%


individuality, forming the basis of

unquestionable evidence of authenticity

for any brand seeking to bring

a prosecution against a found counterfeiter

of labels.

Whilst the SigNature DNA authenticity

tests can be verified forensically

in the field or on site or

in the Applied DNA laboratories,

the integration of Beacon technology

provides the means for brands

to conduct their own ‘rapid read’

checks on suspected items in the


“What excites us most about our

solution is that whilst the application

of Applied DNA’s SigNature

DNA makes it completely secure

and uniquely identifiable, the breakthrough

is in the Beacon which

is completely hidden until it’s unlocked

by the reaction to the chemi-

cals built into the swab,” stated Simon


A proprietary chemical compound

placed within the ink, which

is completely invisible under normal

or ultraviolet lighting conditions

illuminates only when rubbed

with a specific swab device that will

be supplied by ITL to the brands.

This reaction produces the ‘Beacon’

illumination effect on the end of the

swab which is then detected when

shone with a UV torch. In effect,

a ‘lock and key’ solution is created

for field screening of the SigNature

DNA mark to support forensic DNA

authentication conducted remotely.

“As a result, brand inspectors are

able to make quick checks without

receiving unwanted attention and

can tell instantly if the product is

marked with SigNature DNA. The

beauty of the solution is that whilst

the science behind it makes it the

most credible anti-counterfeit application

available, the cost of integrating

it into a printing process is

relatively low and therefore makes it

immediately affordable for a brand

to implement.” added Simon Phelps.

Tony Benson, Applied DNA Managing

Director, EMEA agrees “We

have perfected the capabilities of

our SigNature® DNA and Beacon

technologies for a wide range of

authentication applications in print

and packaging and we are delighted

to partner with ITL on this project

as it adds yet one more tool to help

protect consumer goods in a cost effective,

globally available solution.

ITL’s capabilities in that regard are

class leading”.

About ITL

ITL is a global provider of Apparel

Label Solutions, supporting

brands, retailers and manufacturers

all around the world with a comprehensive

range of products and

services aimed at optimising brand

identity and supply chain performance.

The group owns widespread printing

and weaving operations across

a number of key needlepoint locations

including China, Bangladesh,

India, Sri Lanka, Vietnam, Turkey,

Mexico and South Africa.

With over 30 years’ experience,

the company supplies some of the

best known names in the industry

with a wide range of products including

wash-care labels, woven labels,

variable data tags and stickers,

promotional hang tags and packaging,

heat transfers, brand protection

and RFID solutions.

About Applied DNA Sciences

We make life real and safe by providing

botanical-DNA based securityand

authentication solutions

and services that can help protect

products, brands, entire supply


chains, and intellectual property of

companies, governments and consumers

from theft, counterfeiting,

fraud and diversion. Our patented

DNA-based solutions can be used to

identify, tag, track, and trace products,

to help assure authenticity,

traceability and quality of products.

SigNature® DNA describes the platform

ingredient that is at the heart

of a family of uncopyable, security

and authentication solutions such

as SigNature® T and fiberTyping®,

targeted toward textiles and apparel,

DNAnet®, for anti-theft and

loss prevention, and digitalDNA®,

providing powerful track and trace.

All provide a forensic chain of evidence,

and can be used to prosecute

perpetrators. We are also engaged

in the large-scale production of specific

DNA sequences using the polymerase

chain reaction.

Go to for more information,

events and to learn more about

how Applied DNA Sciences makes

life real and safe. Common stock

listed on NASDAQ under the symbol

APDN, and warrants are listed under

the symbol APDNW.

3M Passport Reader Makes

Waves in New Market

Whether sailing the seven seas or

island-hopping in the Caribbean,

a cruise is meant to be a relaxing

getaway. Travelers look forward to

spectacular ocean views, five-star

restaurants and exotic ports of call –

but dread the thought of long lines

waiting to board the ship.

Knowing that wait times can significantly

affect patron experience, a

major cruise line recently partnered

with 3M to help cruise-goers board

more quickly and efficiently – while

still complying with security regulations

governing the travel industry.

Faster passenger processing for

more hassle-free boarding

When it comes to boarding thousands

of passengers in just a few

hours, every second counts. Typically,

the boarding experience begins

with validating and scanning

a passenger’s passport, before then

having to process the data. The

3M AT9000 MK2 full page document

reader captures the necessary

details and cuts down the passport

review time, ensuring a speedy,

hassle-free boarding and disembarkation

process. Organizations can

now have convenience, efficiency,

and security.

Regulation-compliant solution

meets security requirements

Cruise lines with global fleets must

comply with varying local regulatory

and security requirements, making

the need for a standardized solution


Designed to meet strict regulatory

requirements, 3M document readers

can be found at border crossings

around the world and are well

regarded by commercial and government

entities including airlines,

customs and border patrol, and

homeland security.

With one of the fastest, most accurate

read rates available, the 3M

AT9000 MK2 full page document

reader deployed by the cruise line

efficiently reads ICAOcompliant

passports and RFID chips in e-


passports. Best of all, it can store

the information to be processed at

a later date. The direct benefit is that

passengers spend less time waiting

in line, allowing them more time to

enjoy their vacation.

Customized authentication

software speeds integration

3M worked with document verification

provider AssureTec to tailor

the accompanying authentication

software, which allowed the new

passport scanning solution to integrate

with the cruise line’s existing

infrastructure. This customization

sped up the installation, meeting

the time-sensitive project requirements

and avoiding a substantial

technology upgrade on the part of

the customer.

With the system in place, this

global cruise line reports meeting

new and emerging regulatory requirements,

better preparing them

for future needs. This, along with a

more efficient boarding process creates

a winning solution for not only

passenger experience, but also the

cruise line.

3M document readers and authentication

software continue to

make waves in the travel industry

as secure, efficient solutions for

processing passengers and meeting

regulatory requirements.

A “Know your rights” refresher for Immigrants

By Joshua Breisblatt

President-Elect Donald Trump has

proposed immigration policies that

are causing anxiety among immigrants

and the immigrant rights

community. Much remains unknown

about how and when these

changes will come but our system of

checks and balances as well as pushback

from the immigrant rights

community will ensure that there

will be limits on what the President-

Elect can do. Regardless, it is always

important for immigrants to understand

their rights.

As a reminder to immigrant communities,

the National Immigration

Law Center released a helpful guide

this week which explains what individuals

should do if they encounter

law enforcement or Immigration

and Customs Enforcement (ICE)


The reminders include:

• You have the right to remain silent.

You may refuse to speak to immigration


• Do not open your door (ICE

must have a warrant signed by a

judge to enter).

• You have the right to speak to a


• Before you sign anything, talk to

a lawyer.

• Always carry with you any valid

immigration document you have.

• If you are worried that ICE will

arrest you, let the officer know if you

have children.

• Carry a “know-your-rights card”

and show it if an immigration officer

stops you.

NILC’s “Know Your Rights” guide

also provides tips on where to find

legal help assistance including www. They explain how

to report raids and arrests in your

community and recommend everyone

come up with a safety plan

in case an enforcement action takes

place in your workplace or community.

A safety plan should include having

the number of a friend memorized,

telling that friend where they

can find your important documents

including your “A-number,” and


putting a plan in place for your children’s

care in case you are detained.

It’s also important to avoid “ notaries”

and other unethical people

who make promises about immigration

relief that are fraudulent or that

they cannot deliver on. Continuing

to pay attention to non-profit immigrant

service providers is important

to ensure you receive up-to-date information

on any changes in immigration


The next few years may be a challenging

time for the immigrant

community. However, it’s important

to educate ourselves and our loved

ones and to continue to stand together.

HID Global announces

one of the world’s most secure

Citizen ID Cards

Continued from page 5

Irish Passport Card is the first and

only passport card deployed in Europe

for border crossing and has been

recognized for its innovative design.

For more HID Global news, visit

our Media Center, read our Industry

Blog, and follow us on Facebook and


About HID Global

HID Global is the trusted source for

innovative products, services, solutions,

and know-how related to the

creation, management, and use of

secure identities for millions of endusers

around the world. The company’s

served markets include physical

and logical access control, including

strong authentication and credential

management; card printing and

personalization; visitor management

systems; highly secure government

and citizen ID; and identification

RFID technologies used

in animal ID and industry and logistics

applications. The company’s

primary brands include ActivID®,

EasyLobby®, FARGO®, IdenTrust®,

LaserCard®, Lumidigm®, Quantum

Secure, and HID®. Headquartered in

Austin, Texas, HID Global has over

2,700 employees worldwide and operates

international offices that support

more than 100 countries. HID

Global® is an ASSA ABLOY Group

brand. For more information, visit

Cyberbit launches Channel


Continued from page 8

rity market. Cyberbit is already protecting

companies all over the world

and across a vast range of industries,

which uniquely positions us to help

partners expand and grow their expertise

and market opportunities.”

About Cyberbit

Created to protect the most high-risk

organizations in the world, Cyberbit

secures enterprises and critical infrastructure

against advanced cyberthreats.

The company’s battle-hardened

cybersecurity solutions detect,

analyze and respond to the most advanced,

complex and targeted threats.

Cyberbit employs a formidable and

diverse team from both the public

and private sector, including Ph.D.s,

hackers, former CISOs and SOC

managers, as well as seasoned veterans

of the intelligence and military

communities. With offices in Texas

and Israel, Cyberbit is a subsidiary

of Elbit Systems Ltd. (NASDAQ and

TASE: ESLT) and has more than 500

employees in the United States, Europe

and Asia. To learn more about

how Cyberbit maximizes protection

against today’s signature-less threats,


®HID, the HID logo and DBond are trademarks or

registered trademarks of HID Global or its licensors in

the U.S. and/or other countries. All other trademarks,

service marks, and product or service names are trademarks

or registered trademarks of their respective owners.


Intelsat General announces

new contract to provide satellite

services to RiteNet

Continued from page 9

provide American warfighters around

the globe with advanced capabilities.”

This Comsatcom Transponded Capacity

(CTC) task order is awarded by

the U.S. Defense Information Systems

Agency-Defense Information Technology

Contracting Organization

(DISA-DITCO) for one year, with options

to renew it annually for an additional

four years.

About Intelsat General

Intelsat General (IGC) is a wholly

owned subsidiary of Intelsat, operator

of the world’s first Globalized Network.

IGC provides its government

and commercial customers with

high-quality, cost-effective, communications

solutions via Intelsat’s leading

satellite backbone and terrestrial

infrastructure. Our customers rely

on IGC to provide secure and seamless

broadband connectivity, video

communications, and mobility services

for mission-critical operations

anywhere on the globe through our

open, inter-operable architecture.

Multipurpose Safety Wand

Megaphone from AmpliVox

Continued from page 17

proved safety in situations ranging

from concerts and sporting events to

emergency evacuations.”

For more information about the S606

Safety Wand Megaphone, or other portable

emergency sound products from

AmpliVox, visit http://www.ampli.


About AmpliVox

AmpliVox® Sound Systems products

are predominantly made in the USA,

meet stringent CE standards, and

come with a warranty up to 12 years.

Our wide selection meets every

speaker’s sound coverage and style

needs. Whether you are in a small

meeting room of 10 people or a large

20,000 square foot auditorium of up

to 10,000 people, AmpliVox® Sound

Systems’ extensive range of superior

quality, simple to operate and reliable

electronics will provide maximum

satisfaction and ensure a crystal clear

message. Creators of the Pink Podium

Promise cause marketing initiative,

AmpliVox donates pink podiums

and pink megaphones to breast

cancer awareness organizations, helping

lead the effort to “Speak Up for

the Cause”.

Visit for more


What the FCC revamping of the

Federal Alert System means to you

Continued from page 27

who are identified via their Wi-Fienabled

locations, to either evacuate

the building or stay put (shelter-inplace)

depending upon their position

relative to the shooter. This can

be done through SMS, voice, mobile

apps, digital signage or desktop alerts.

What’s more, two-way communications

provided in this instance are

helpful for law enforcement as people

in the affected areas can provide vital

information – i.e. how many attackers,

what do they look like, how many

people are still in the building – that

influences their strategy to apprehend

the criminal. This real-time information

is a perfect way to manage multiple

groups of people to the safest

possible outcome.

Government agencies and municipalities

that proactively set an

emergency communications plan set

themselves and their constituents

up for success when a crisis occurs.

Thinking through every single detail

and having sound policies and technologies

in place gives people clear

guidance during a moment fraught

with indecision and chaos. Crises can

never be predicted but these systems

direct people – both responders and

bystanders –so the problem can be

neutralized quickly and the negative

outcomes minimized.

Robin Systems continues to

win laurels

Continued from page 37

reach your marketing goals, please visit

About Robin Systems

Robin is an enterprise software company

offering industry’s first Application-Defined

Data Center software.

With a team that includes industry

veterans from leading enterprise

technology companies such as NetApp,

Oracle and Veritas, Robin seeks

to disrupt the $20 billion-plus virtualization

market with its containerbased

compute and storage platform

software that delivers better performance,

higher consolidation and a

much simpler application deployment

lifecycle than traditional hypervisorbased

virtualization. Founded in

2013, the San Jose, California-based

company has raised more than $23

million in venture funding from leading

investors such as Clear Ventures,

DN Capital, USAA and SAP’s Hasso

Plattner Ventures.


Saab Seaeye Leoport ROV system

delivered to Japan’s Kaiyo


Continued from page 38

and scientific markets.

Scantrol is an independent supplier

of monitoring and control

systems to the modern marine and

offshore industries. The control systems

range from simple winch control

systems to the most advanced

controls for offshore support vessels,

seismic vessels, marine research

vessels, fishing vessels, semi

subs and barges.

Hydramec, founded in 1990,

manufacture ROV launch and recovery

systems and also maintain a

considerable fleet of offshore vessels

on behalf of their clients.

CA Technologies strengthens

security portfolio with new

advanced analytics and

Identity-as-a-Service offerings

Continued from page 39

Solutions deliver a high level of customer


CA Identity Service is available

today and can be accessed for free


These new products are part of

CA’s software portfolio that gives

companies the ability to sense, react

and adapt to market shifts and operational

security needs, resulting

in the agility advantage that a strong

security posture provides. They successfully

protect the business while

enabling it to build the trusted

digital relationships necessary to

compete and win in the application


*The Security Imperative: Driving Business

Growth in the App Economy, Coleman Parkes

Survey (May-September 2016).

Resources: Visit the CA World Online

Press Room for additional CA World

news and information and graphics

Salient CRGT Appoints Joseph

Zimmerman as Vice President,

Enterprise Solutions Group

Continued from page 42

Service Commendation Medal,

Navy Commendation Medal, and

the Navy Achievement Medal. He

also received the Southwest Asia

Service Medal for his service within

Operation Desert Shield.

About Salient CRGT

Salient CRGT provides Agile software

development, data analytics,

mobility, cyber security and infrastructure

solutions. We support

these core capabilities with full lifecycle

IT services and training—to

help our customers meet critical

goals for pivotal missions. We are

purpose built for IT transformation

supporting federal civilian, defense,

homeland, and intelligence agencies,

as well as Fortune 1000 companies.

We use the most innovative

talent delivery model in the industry,

scientifically providing exactly

the right people for the customers’

most pressing requirements. Salient

CRGT has earned a record of success

with integration and operations

of large‐scale, high‐volume solutions.

On September 15, 2015, Salient

and CRGT announced closing

of the merger transactions – visit

newsroom. For additional information

on Salient and CRGT, visit www.


The News Leader in Physical, IT and Homeland Security

CEO/Editorial Director

Adrian Courtenay



Steve Bittenbender


Senior Writer

Karen Ferrick-Roman



Shawn Campbell

Campbell on Crypto


George Lane

Hazmat Science & Public Policy

Contributing Author

Lloyd McCoy Jr

Immix Group

Contributing Author

Walter Ewing

Contributing Author

Wendy Feliz

Contributing Author

Joshua Breisblatt

Contributing Author

J. Michael Barrett

Contributing Author

Christopher Millar

Gatekeeper Security

Art Director

Gerry O’Hara, OHDesign3


Production Manager

Brenden Hitt

Direct: 203-216-7798



Late News

Tech Focus

2016 Technology Roundup

Special Awards Review:

2016 Digital Yearbook of Awards



Late News

Tech Focus

Access Control & Identification

Market Sector

Video Surveillance, Software,



Late News

Tech Focus

Airport/Aviation Security

Market Sector

Critical Infrastructure, Protection


More magazines by this user
Similar magazines