GSN_Nov-Dec_FINAL_Yumpu
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
Government Security News<br />
NOVEMBER/DECEMBER 2016 DIGITAL EDITION<br />
Mr Wu, CEO of Hangzhou Hikvision Digital Technology, tells journalists from U.S.<br />
that success is 30% technology and 70% good management. Partnerships with<br />
customers, employees, shareholders – and the U.S election – were also<br />
discussed in this dispatch by Adrian Courtenay. Page 30<br />
Also in this issue:<br />
HID Global announces secure citizen ID Card that extends benefits of Optical Secure Media<br />
(OSM) card – Page 5<br />
Researchers say coastal community stakeholders need to be more involved to make their<br />
towns more resilient – Page 34
<strong>GSN</strong> <strong>Nov</strong>ember/<strong>Dec</strong>ember 2016<br />
NEWS<br />
5<br />
6<br />
8<br />
9<br />
12<br />
16<br />
17<br />
18<br />
20<br />
30<br />
34<br />
HID Global announces one of the world’s most secure<br />
Citizen ID Cards<br />
Capture every detail with<br />
Toshiba PTZ Cameras featuring 20x Optical Zoom<br />
Cyberbit launches Channel Program to create a profitable opportunity to<br />
solve customers’ most critical cyberthreats<br />
Intelsat General announces new contract to provide satellite services to Rite-<br />
Net for Army Warfighter Network<br />
Canon U.S.A. introduces one of the smallest and lightest 4K resolution (4096<br />
x 2400) laser projectors with high image quality, advanced features, low cost<br />
Latest data on Positive Train Control Implementation show uneven progress<br />
across railroads<br />
Multipurpose Safety Wand Megaphone from AmpliVox<br />
Enhances Crowd Control<br />
NATO to use Senstar perimeter security solution<br />
at its rapidly deployed military camps<br />
Campbell on Crypto – Crypto Management 101:<br />
Four Steps to Better Protection<br />
Mr. Hu, Founder and CEO of Hangzhou Hikvision<br />
Digital Technology Co Ltd, shares his thoughts with<br />
U.S. journalists<br />
Researchers say coastal community stakeholders<br />
need to be involved to make their towns more<br />
resilient from storms<br />
2
Digital Edition Table of Contents<br />
36<br />
38<br />
39<br />
40<br />
42<br />
43<br />
44<br />
46<br />
48<br />
49<br />
Robin Systems wins two new TMC awards for IT excellence and Info Tech<br />
spotlight on big data as a service<br />
Saab Seaeye Leoport ROV system delivered to Japan’s<br />
Kaiyo Engineering<br />
CA Technologies strengthens security portfolio with new<br />
advanced analytics and Identity-as-a-Service offerings<br />
U.S. and Canada bring Homeland Security solutions to Milipol Qatar<br />
Salient CRGT Appoints Joseph Zimmerman as Vice President, Enterprise<br />
Solutions Group<br />
Energetiq Introduces EQ-77, its 5th Generation,<br />
Ultra-Bright, Laser-Driven Light Source (LDLS )<br />
Selfies: A new weapon against public assistance fraud<br />
ITL Group and Applied DNA Sciences partner to develop anti-counterfeit<br />
‘SigNature ® DNA’ printed fabric label solution<br />
3M Passport Reader Makes Waves in New Market<br />
A “Know your rights” refresher for Immigrants<br />
FEATURE<br />
SPECIAL REPORT ON MASS NOTIFICATION / DISASTER RESPONSE<br />
22<br />
24<br />
26<br />
28<br />
Emergency24’s Two-way, Multi-Media Mass-Communications System<br />
NICE helps Metro Nashville Department of Emergency<br />
Communications get ready for Next Generation 9-1-1<br />
What the FCC revamping of the Federal Alert System<br />
means to you<br />
Washington tech firm claims predictive analytics can improve emergency<br />
response operations<br />
3
HID Global announces one of the<br />
world’s most secure Citizen ID Cards<br />
AUSTIN, TX, <strong>Nov</strong>ember 9, 2016 –<br />
HID Global®, a worldwide leader<br />
in trusted identity solutions, today<br />
announced one of the world’s most<br />
secure citizen ID cards, featuring<br />
technologies that have been proven<br />
in its customers’ award-winning<br />
national passport and other government<br />
ID programs, such as the<br />
Irish Passport Card. Extending the<br />
benefits of its widely issued Optical<br />
Secure Media (OSM) card, the company<br />
has created an OSM Multitech<br />
card that is one of the most secure<br />
citizen ID cards on the market.<br />
“Our OSM cards have set the standard<br />
for combining visual, digital<br />
and physical security while delivering<br />
the highest levels of card durability,”<br />
said Rob Haslam, VP and<br />
Managing Director, Government ID<br />
Solutions with HID Global. “There<br />
has been no known instance of a<br />
successful attempt to compromise<br />
OSM technology’s digital security,<br />
and now we’re helping to fuel the<br />
future of even more secure citizen<br />
identification by including a contactless<br />
RFID microcontroller chip<br />
into these proven OSM cards.”<br />
To maximize the security of HID<br />
Global’s OSM Multitech card, issuers<br />
can laser-engrave information<br />
on its front side, engrave and<br />
encode identity information in the<br />
OSM stripe on the card’s back side,<br />
and encode identity information<br />
on the microcontroller chip inside<br />
the card. Integrating the RFID chip<br />
into a standard-sized OSM card is a<br />
major milestone that was made possible<br />
with HID Global’s ultra-thin<br />
5<br />
PC ePre-laminate product, which<br />
minimizes the footprint of the RFID<br />
chip and antenna using the company’s<br />
DBond technology. Unique<br />
anti-crack technology also extends<br />
the durability of the card, which<br />
is initially available with an NXP<br />
P60D080 RFID chip. The company<br />
plans to offer additional RFID chip<br />
options in the future.<br />
HID Global’s OSM Multitech<br />
cards can be used for applications<br />
ranging from national and resident<br />
alien IDs to health benefit, public<br />
welfare and Social Security cards, as<br />
well as driver’s licenses, gun permits<br />
and a wide range of other identification<br />
cards. The cards are the cornerstone<br />
of a complete, end-to-end<br />
government ID solution offered by<br />
HID Global, including its highly<br />
secure laser personalization equipment,<br />
software solutions, security<br />
printing plus software and professional<br />
services and training.<br />
The new Multitech card’s OSM,<br />
DBond and other technologies have<br />
been proven in numerous high-profile<br />
national ID programs, including<br />
the award-winning Irish Passport<br />
Card, as well as programs in Saudi<br />
Arabia, Angola and the U.S. The<br />
More on page 50
Capture every detail up close with Toshiba<br />
PTZ Cameras featuring 20x Optical Zoom<br />
IRVINE, CA, <strong>Nov</strong>ember 17, 2016<br />
– Toshiba Surveillance & IP Video<br />
Products, a business unit of Toshiba<br />
America Information Systems, Inc.,<br />
is giving security integrators, dealers<br />
and end-users more options by introducing<br />
two new Pan-Tilt-Zoom<br />
(PTZ) 3MP IP dome cameras, both<br />
featuring 20x optical zoom and delivering<br />
razor-sharp streaming video<br />
at 2048x1536 resolution for applications<br />
requiring highly detailed<br />
surveillance, indoors and outdoors<br />
in any lighting environment.<br />
Indoor/Outdoor Cameras<br />
Toshiba’s new IKS-WP8203R PTZ<br />
camera is designed to operate in the<br />
harsh outdoors with its IP66 enclosure<br />
protection, integrated heater<br />
and auto defogging, while the new<br />
IKS-WP8103 PTZ provides an attractive<br />
indoor solution for covering<br />
large spaces such as shopping<br />
malls, casinos or schools.<br />
True Day/Night imaging with<br />
Digital Wide Dynamic Range empower<br />
both cameras to capture images<br />
in high contrast and changing<br />
light conditions down to 0.01 lux. In<br />
addition to 24V, both cameras are<br />
powered with PoE+ which eliminates<br />
the need for power cables and<br />
reduces installation cost. Also, both<br />
are backed by ONVIF Profile S to<br />
ensure seamless interoperability<br />
with third-party ONVIFconforming<br />
equipment<br />
and software.<br />
20X Optical Zoom<br />
A core benefit of<br />
the new PTZ cameras<br />
is powerful,<br />
built-in optical<br />
zoom capability. It<br />
enables up to 20x<br />
optical magnification<br />
(f=4.7 ~ 94 mm, F1.6 to<br />
F3.5) and achieves quick<br />
subject tracking through<br />
a high-speed auto focusing<br />
system so operators can react<br />
instantly to suspicious situations.<br />
The cameras’ ability to precisely<br />
identify small details, such as car licenses<br />
or facial features, means they<br />
are suitable for users that demand<br />
enhanced detail when zooming in,<br />
plus makes them ideal to handle<br />
installations where detailed coverage<br />
of longer distances is essential<br />
including airports, borders, roads,<br />
cities and campuses.<br />
Superior image quality is matched<br />
by the cameras’ versatile, high-speed<br />
6<br />
Toshiba IKS-WP8103<br />
360° continuous pan that achieves<br />
surveillance of large areas without<br />
blind spots, and its precision -10°<br />
to 190° tilt drive offering al-<br />
most instant preset posi-<br />
tioning. Equipped with<br />
256 presets, pattern<br />
tour, autoscan and<br />
auto flip, nothing<br />
escapes the camer-<br />
as’ PTZ.<br />
Toshiba IKS-<br />
WP8203R and IKS-<br />
WP8103 cameras<br />
make efficient use of<br />
available bandwidth<br />
by providing H.264 and<br />
MJPEG multi-streaming to<br />
satisfy different live viewing<br />
and recording settings. Both are<br />
immediately available.<br />
About Toshiba America<br />
Information Systems, Inc.<br />
Headquartered in Irvine, Calif.,<br />
TAIS is comprised of three business<br />
units: Digital Products Division,<br />
Imaging Systems Division,<br />
and Telecommunication Systems<br />
Division. Together, these divisions<br />
provide digital products, services<br />
and solutions, including industryleading<br />
portable computers; tele-
visions, TV/DVD Combination<br />
products, Blu-ray Disc and DVD<br />
products, and portable devices;<br />
imaging products for the security,<br />
medical and manufacturing markets;<br />
storage products for computers;<br />
and IP business telephone systems<br />
with unified communications,<br />
collaboration and mobility applications.<br />
TAIS provides sales, marketing<br />
and services for its wide range<br />
of products in the United States and<br />
Latin America. TAIS is an independent<br />
operating company owned by<br />
Toshiba America, Inc., a subsidiary<br />
of Toshiba Corporation. For more<br />
information on TAIS visit toshiba.<br />
com/us<br />
About Toshiba Corporation<br />
Toshiba is a world-leading diversified<br />
manufacturer, solutions provider<br />
and marketer of advanced<br />
electronic and electrical products<br />
and systems. Toshiba Group brings<br />
innovation and imagination to<br />
a wide range of businesses: digital<br />
products, including LCD TVs,<br />
notebook PCs, retail solutions and<br />
MFPs; electronic devices, including<br />
semiconductors, storage products<br />
and materials; industrial and social<br />
infrastructure systems, including<br />
power generation systems, smart<br />
community solutions, medical systems<br />
and escalators & elevators;<br />
and home appliances. Toshiba was<br />
founded in 1875, and today operates<br />
a global network of more than<br />
590 consolidated companies, with<br />
206,000 employees worldwide and<br />
annual sales surpassing 5.8 trillion<br />
yen (US$61 billion). Visit Toshiba’s<br />
web site at www.toshiba.co.jp/index.<br />
htm.<br />
“We’re powered by new challenges.<br />
Our experience has made us experts<br />
at providing total security solutions.”<br />
PHIL BARRETT<br />
8 years • Power/Utility Business Development<br />
Our high standards help you meet yours. Providing superior<br />
perimeter security solutions is not just our mission.<br />
It’s personal. And that mission never stops.<br />
AMERISTARSECURITY.COM | 888-333-3422<br />
7
Cyberbit launches Channel Program to create a<br />
profitable opportunity to solve customers’ most<br />
critical cyberthreats<br />
Austin, Texas – <strong>Nov</strong>ember 15,<br />
2016 – Cyberbit, whose cybersecurity<br />
solutions protect the world’s<br />
most sensitive systems, today announced<br />
the launch of its Channel<br />
Program for North American<br />
Partners: MSSPs, VARs, distributors<br />
and consultants, who play a critical<br />
role in helping companies defend<br />
themselves against evolving cyberthreats.<br />
The Cyberbit Channel Program<br />
will deliver enhanced margins<br />
to partners, by providing Cyberbit’s<br />
suite of solutions, addressing today’s<br />
most complex cyber security problems<br />
for customers.<br />
Cyberbit partners will get access<br />
to the industry’s most advanced<br />
endpoint detection and response<br />
(EDR), SOC automation and orchestration,<br />
cyber range training<br />
and simulation platform, and industrial<br />
control systems security. The<br />
Cyberbit Channel Program is led<br />
by enterprise and IT security channel<br />
veteran Stephen Thomas, former<br />
Vice President of Channel Sales at<br />
Symantec, who has more than 20<br />
years of sales leadership and building<br />
channel programs for partners<br />
of all sizes. Now Vice President of<br />
Sales at Cyberbit, Thomas will position<br />
partners to address pressing<br />
challenges in cybersecurity as part<br />
of the company’s 100-percent-channel-focused<br />
strategy.<br />
Recently expanded to North<br />
America, Cyberbit has more than<br />
500-employees on three continents,<br />
supporting the most critical assets<br />
8<br />
of enterprises and public sector organizations<br />
worldwide. As a subsidiary<br />
of defense systems leader Elbit<br />
Systems Ltd. (NASDAQ and TASE:<br />
ESLT), Cyberbit not only offers the<br />
channel battle-hardened cybersecurity<br />
solutions but also the resources<br />
and strategic support to help partners<br />
move quickly into new markets.<br />
“We talk to lots of companies that<br />
either suffer from alert fatigue from<br />
all the cybersecurity tools they’ve<br />
adopted or that can’t hire enough<br />
experienced staff to leverage their<br />
technology – or both,” said Jeff<br />
Hirsh of MickTec, a Cyberbit partner.<br />
“Cyberbit helps us solve these<br />
customer pain points, with proven<br />
technology and the real-world<br />
training that customers need to defend<br />
against multi-dimensional IT<br />
security threats.”<br />
Stephen Thomas, Cyberbit Vice<br />
President of Sales said, “Companies<br />
need partners to guide them<br />
through today’s ever-evolving cyberthreat<br />
landscape, which is one<br />
reason why the channel has become<br />
the backbone of the IT secu-<br />
More on page 50
Intelsat General announces new contract to provide satellite<br />
services to RiteNet for Army Warfighter Network<br />
MCLEAN, VA, <strong>Nov</strong>ember 17, 2016<br />
– Intelsat General, a wholly owned<br />
subsidiary of Intelsat (NYSE: I), operator<br />
of the world’s first Globalized<br />
Network, powered by its leading satellite<br />
backbone, today announced a<br />
new contract to provide satellite<br />
connectivity to RiteNet Corp. to<br />
support testing by the U.S. Army at<br />
Ft. Bliss in El, Paso, TX, and at the<br />
nearby White Sands Missile Range<br />
in New Mexico.<br />
The Army conducts a range of<br />
testing using the Warfighter Information<br />
Network (WIN-T) at these<br />
two facilities, including two Network<br />
Integration Evaluation (NIE)<br />
events each year to evaluate new<br />
technologies. Using Ku-band capacity<br />
on an Intelsat satellite, RiteNet<br />
will provide both ongoing and surge<br />
capacity for the network. RiteNet,<br />
based in Rockville, MD, provides<br />
information technology and telecommunications<br />
services to a number<br />
of government and commercial<br />
customers.<br />
“The Warfighter Information Network<br />
is the U.S. Army’s backbone in<br />
terms of communications with its<br />
troops in the field,” said Skot Butler,<br />
President of Intelsat General Corporation.<br />
“Our services will support<br />
the Army as it tests new equipment<br />
and technologies that will one day<br />
More on page 50<br />
“We aim to protect property, and provide<br />
peace of mind by providing remarkable<br />
perimeter security products and<br />
unrivaled service.”<br />
EMILY SULLIVAN<br />
11 years • Mission Critical Business Development<br />
We know people make the difference for your business and ours.<br />
Our experienced team thrives on providing the products and<br />
service that lead to total perimeter security solutions.<br />
AMERISTARSECURITY.COM | 888-333-3422<br />
9
Canon U.S.A. introduces one of the smallest and<br />
lightest 4K resolution (4096 x 2400) laser projectors<br />
with high image quality, advanced features, low cost<br />
MELVILLE, NY, <strong>Nov</strong>ember 22,<br />
2016 – Canon U.S.A., Inc., a leader<br />
in digital imaging solutions, today<br />
unveiled the latest of its innovative<br />
technology with the debut of<br />
the REALiS 4K600STZ Pro AV Laser<br />
LCOS Projector. At only 57.3<br />
pounds, the REALiS 4K600STZ<br />
is among the world’s smallest and<br />
lightest native 4K laser projectors,<br />
making it ideal for a wide<br />
range of markets and applications<br />
including simulation, museums,<br />
art galleries, planetariums, higher<br />
education, medical education and<br />
training.<br />
The REALiS 4K600STZ projector<br />
reproduces exceptionally detailed<br />
images with outstanding<br />
color accuracy thanks to a combination<br />
of core technologies and features<br />
including:<br />
• Native 4K Resolution of 4096<br />
x 2400 which is larger than both<br />
QFHD and DCI-resolution, the 4K<br />
standards for TV and digital cinema<br />
respectively. The expanded vertical<br />
resolution (2400) is particularly important<br />
for those applications, like<br />
simulation and training and design/<br />
engineering, which may require<br />
larger vertical display areas.<br />
• Laser Phosphor Light Source<br />
which offers an extended operation<br />
time up to 20,000 hours or<br />
more 1 , quick start-up 2 , omnidirectional<br />
projector placement, and a<br />
wide range of colors – all helping to<br />
greatly enhance the user experience,<br />
installation process and reduce the<br />
total cost of ownership (TCO).<br />
Toshiba IKS-WP8103<br />
• 6000 lumens with up to<br />
10,000:1 Dynamic Contrast Ratio 3<br />
helps ensure content appears bright<br />
with deep black and brilliant white<br />
levels, as well as excellent gradation.<br />
• Canon’s renowned LCOS Technology<br />
with AISYS-enhancement<br />
and advanced Color Management<br />
System for producing content with<br />
exceptional detail and color accuracy<br />
– ideal for those industries/<br />
applications like museums and galleries<br />
with the highest image quality<br />
12<br />
requirements.<br />
• Genuine Canon 4K Lens for<br />
consistent clarity and color throughout<br />
entire projected area; the lens<br />
also includes a special Marginal<br />
Focus function which can be used<br />
to help ensure content projected on<br />
the peripheral portions of domed<br />
surfaces remains in focus – a benefit<br />
especially important to those<br />
in the simulation, training and<br />
educational fields. The 4K600STZ<br />
projector is also able to deliver a<br />
virtually consistent level of brightness<br />
throughout its zoom range,<br />
thus helping to provide even greater<br />
placement flexibility.<br />
• Powerful Dual Image Processing<br />
Engines for uncompressed 4K<br />
60p playback, and optimal upscaling<br />
of 2K video and other non-native<br />
4K resolution content.<br />
“The impressive benefits of 4K<br />
laser projection, combined with<br />
Canon’s optical and image processing<br />
technologies and compact engineering<br />
define the many advantages<br />
of the REALiS 4K600STZ Pro AV<br />
Laser LCOS Projector,” said Yuichi<br />
Ishizuka, president and chief operating<br />
officer, Canon U.S.A., Inc. “We<br />
More on page 14
SECURE CARD READERS<br />
FOR ANY NEED<br />
THE CHERRY LINE OF SECURE KEYBOARDS<br />
AND CARD READERS OFFERS A BROAD<br />
SELECTION TO SUIT YOUR EXACT NEEDS!<br />
LOOKING FOR<br />
VAR / INTEGRATOR<br />
PARTNERS!<br />
Add the Popular CHERRY Line to<br />
Your Portfolio and Increase Your<br />
Business! Download the Details at:<br />
www.cherryamericas.com/partner<br />
SMART CARD READERS<br />
Contact (FIPS 201), contactless<br />
and combination options<br />
BASIC USE<br />
USB SMART CARD READERS<br />
FIPS 201 certified; standalone unit<br />
with weighted base.<br />
HEAVY USE<br />
SMART CARD KEYBOARDS<br />
FIPS 210 certified, PC/SC smart<br />
card reader and secure PIN entry.<br />
MAXIMUM USE<br />
FREE<br />
WHITE<br />
PAPER<br />
THE TRENDS AND<br />
BENEFITS OF SMART CARD<br />
AND BIOMETRIC DE V ICES.<br />
1-800-844-0797<br />
www.cherryamericas.com<br />
http://bit.ly/1C1pnlY<br />
© 2016, Cherry Americas, LLC
Canon U.S.A. introduces one of the<br />
smallest and lightest 4K resolution<br />
(4096 x 2400) laser projectors<br />
Continued from page 12<br />
are confident this projector’s many<br />
advanced technologies and features<br />
will not only meet, but exceed the<br />
growing needs of AV professionals<br />
who demand exceptional, high-resolution<br />
and high-value projectors.”<br />
High Dynamic Range (HDR)<br />
The REALiS 4K600STZ is one of<br />
Canon’s only HDR compatible projectors<br />
which helps provide the critical<br />
ability to replicate content with<br />
exceptionally high contrast, making<br />
possible gradation expression close<br />
to that of human vision. Additionally,<br />
the projector supports the input<br />
of video content simulating the<br />
4K/8K broadcast-standard ITU-R<br />
BT.2020 color gamut.<br />
DICOM ® Simulation Mode 4<br />
The Canon REALiS 4K600STZ Projector’s<br />
DICOM® Simulation Mode4<br />
can be ideal for those in the medical<br />
education and training field who<br />
require displaying monochrome<br />
digital X-rays, CAT scans, and<br />
MRIs with superb grayscale gradation.<br />
This mode, which offers both<br />
clear and blue base color temperature<br />
presets, simulates the results of<br />
devices compliant with the Digital<br />
Imaging and Communications in<br />
Medicine (DICOM) Part 14 standard<br />
4 .<br />
Versatile Connectivity<br />
and Network Management<br />
The Canon REALiS 4K600STZ offers<br />
many industry-standard interfaces<br />
to enhance usability including<br />
two HDMI (version 2.0a), and four<br />
DVI inputs supporting single, stripe<br />
and cross configurations for 4K, 2K<br />
or HD video playback. Network<br />
management, including compatibility<br />
with PJLink, Crestron Room<br />
View and AMX Device Discovery,<br />
also helps provide outstanding flexibility<br />
for monitoring and control.<br />
Price and Availability<br />
The Canon REALiS 4K600STZ Pro<br />
AV LCOS Projector has a suggested<br />
list price of $77,990, is scheduled<br />
to be available through authorized<br />
Canon dealers by April 2017, and<br />
is backed by the Company’s awardwinning<br />
Professional Service &<br />
Support.<br />
For more information please visit<br />
projectors.usa.canon.com<br />
About Canon U.S.A., Inc.<br />
Canon U.S.A., Inc., is a leading provider<br />
of consumer, business-to-business,<br />
and industrial digital imaging<br />
solutions to the United States and to<br />
Latin America and the Caribbean<br />
(excluding Mexico) markets. With<br />
approximately $31 billion in global<br />
revenue, its parent company, Canon<br />
Inc. (NYSE:CAJ), ranks third overall<br />
in U.S. patents granted in 2015† and<br />
is one of Fortune Magazine’s World’s<br />
14<br />
Most Admired Companies in 2016.<br />
Canon U.S.A. is committed to the<br />
highest level of customer satisfaction<br />
and loyalty, providing 100 percent<br />
U.S.-based consumer service<br />
and support for all of the products it<br />
distributes. Canon U.S.A. is dedicated<br />
to its Kyosei philosophy of social<br />
and environmental responsibility.<br />
In 2014, the Canon Americas Headquarters<br />
secured LEED® Gold certification,<br />
a recognition for the design,<br />
construction, operations and<br />
maintenance of high-performance<br />
green buildings. To keep apprised of<br />
the latest news from Canon U.S.A.,<br />
sign up for the Company’s RSS news<br />
feed by visiting www.usa.canon.<br />
com/rss and follow us on Twitter<br />
@CanonUSA. For media inquiries,<br />
please contact pr@cusa.canon.com.<br />
† Based on weekly patent counts issued by<br />
United States Patent and Trademark Office.<br />
Availability, prices and specifications are subject<br />
to change without notice. Actual prices are<br />
set by individual dealers and may vary.<br />
1. Approximate time until brightness has<br />
declined to half the original level. Actual hours<br />
may vary depending on usage and environment.<br />
This is not a guarantee of the life span of individual<br />
laser diodes.<br />
2. When “Fast Boot” function is enabled.<br />
Startup time will change when startup from AC<br />
off.<br />
3. Native contrast of REALiS 4K600STZ Projector<br />
is 4,000:1 (Iris set to Close 3).<br />
4. The REALiS 4K600STZ is not cleared or<br />
approved for medical diagnosis and should not<br />
be used for these purposes.
Latest data on Positive Train Control Implementation<br />
show uneven progress across railroads<br />
WASHINGTON – The Federal Railroad<br />
Administration today released<br />
third quarter 2016 data submitted<br />
by railroads on their progress in implementing<br />
Positive Train Control<br />
(PTC). The data show uneven progress<br />
across the country and across<br />
railroads toward activating the lifesaving<br />
technology.<br />
Freight railroads now have PTC<br />
active on 12 percent of their tracks,<br />
up from 9 percent last quarter. Passenger<br />
railroads increased their percentage<br />
to 23 percent this quarter<br />
compared to 22 percent last quarter.<br />
The measurable progress made<br />
by passenger railroads has been<br />
predominately on the West Coast,<br />
while East Coast railroads, other<br />
than SEPTA and Amtrak, have remained<br />
relatively stagnant.<br />
“Passenger and freight railroads<br />
must continue their progress implementing<br />
Positive Train Control and<br />
work to beat the deadlines Congress<br />
set – because PTC saves lives,” said<br />
U.S. Transportation Secretary Anthony<br />
Foxx.<br />
The Q3 2016 status update includes<br />
railroad-by-railroad quarterly<br />
data as of Sept. 30, 2016, and includes<br />
data such as track segments<br />
completed, locomotives equipped,<br />
employees trained, radio towers installed,<br />
route miles in PTC operation<br />
and other key implementation<br />
data. Some of this information is<br />
displayed in infographics below.<br />
“In order to achieve full PTC implementation,<br />
everyone has to do<br />
their part – railroads must make implementation<br />
a priority, and Congress<br />
must make funding for commuter<br />
railroads a priority,” said FRA<br />
Administrator Sarah E. Feinberg.<br />
Since 2008, FRA has provided significant<br />
assistance to support railroads’<br />
PTC implementation. Those<br />
efforts include:<br />
• FRA has provided more than<br />
$716 million to passenger railroads,<br />
including nearly $400 million in Recovery<br />
Act funding.<br />
• Issued a nearly $1 billion loan<br />
Interactive graphics: PTC implementation by freight and passenger<br />
railroads (above) ; individual railroad’s PTC implementation (right)<br />
16
to the Metropolitan Transportation<br />
Authority to implement PTC on the<br />
Long Island Rail Road and Metro-<br />
North.<br />
• Awarded $25 million in grant<br />
funding to railroads, suppliers and<br />
state and local governments. Many<br />
awards will help railroads achieve<br />
interoperability among the different<br />
PTC systems that railroads are<br />
deploying.<br />
• Made $199 million in grants<br />
available to commuter railroads in<br />
fiscal year 2017 to implement PTC.<br />
• Building a PTC testbed at the<br />
Transportation Technology Center<br />
(TTC) in Pueblo, Colorado.<br />
• Working directly with the Federal<br />
Communications Commission<br />
(FCC) and the Advisory Council on<br />
Historic Preservation to improve<br />
the approval process for PTC communication<br />
towers.<br />
• Dedicating staff to work on PTC<br />
implementation, including establishing<br />
a PTC task force.<br />
To view the interactive graphic of<br />
PTC implementation by freight and<br />
passenger railroads, or individual<br />
railroad’s PTC implementation, click<br />
on the graphics at left.<br />
To view each railroad’s full quarterly<br />
PTC Progress Report, please visit:<br />
https://www.fra.dot.gov/Page/P0628<br />
Multipurpose Safety Wand<br />
Megaphone from AmpliVox<br />
Enhances Crowd Control<br />
NORTHBROOK, IL – When directing<br />
large groups of people in<br />
motion, effective communication is<br />
essential to ensure safety. AmpliVox<br />
Sound Systems’ S606 Safety Wand<br />
Megaphone gives police officers,<br />
fire departments, emergency medical<br />
technicians, and other first responders<br />
the tools to communicate<br />
quickly and<br />
clearly. This allin-one<br />
crowd<br />
control baton<br />
with a built-in<br />
megaphone is<br />
also an excellent<br />
choice for<br />
parking attendants<br />
and security<br />
officers at<br />
sporting events, concerts, and other<br />
large venues.<br />
The AmpliVox S606 Safety Wand<br />
Megaphone combines the features<br />
of an LED safety wand with a loudspeaker<br />
megaphone, increasing the<br />
user’s visibility and voice range in<br />
a single lightweight, durable, and<br />
water-resistant unit. The wand includes<br />
five ultra-bright red LEDs for<br />
a continuous or flashing flare and a<br />
17<br />
The AmpliVox S606 Safety Wand Megaphone<br />
combines the features of an LED crowd and traffic<br />
management wand with a loudspeaker megaphone.<br />
white LED strobe light at the tip of<br />
the wand, providing visibility from<br />
3,000 yards. A detachable 20-watt<br />
Piezo microphone connects to the<br />
wand’s handle via a 5’ coil cord. A<br />
rotary volume control on the side of<br />
the handle adjusts the megaphone’s<br />
volume level with a whistle function<br />
as loud as 105 decibels. The<br />
baton’s handle<br />
includes easyto-use<br />
control<br />
buttons to activate<br />
different<br />
functions.<br />
The unit is<br />
powered by an<br />
integrated rechargeable<br />
battery<br />
pack that<br />
can be plugged into AC outlets or<br />
vehicle chargers, with a run time of<br />
up to 100 hours per charge.<br />
“AmpliVox’s Safety Wand Megaphone<br />
makes crowd management<br />
more powerful in all kinds of settings,”<br />
notes Don Roth, AmpliVox<br />
CEO. “It combines clear vocal amplification<br />
with enhanced visibility.<br />
Better communication delivers im-<br />
More on page 51
NATO to use Senstar perimeter security<br />
solution at its rapidly deployed military camps<br />
YEHUD, Israel, <strong>Nov</strong>. 28, 2016 –<br />
Magal Security Systems Ltd. (NAS-<br />
DAQ: MAGS) announced today<br />
that Senstar its North American<br />
subsidiary, successfully delivered<br />
to the North Atlantic Treaty Organization<br />
(NATO) , a perimeter electronic<br />
security systems (ESS) for its<br />
rapidly deployable military<br />
camps used throughout<br />
the world. The systems<br />
were shipped over the past<br />
few months and training<br />
on the systems will<br />
be completed in the first<br />
quarter of 2017.<br />
NATO has complete<br />
military camps that can be<br />
rapidly deployed when and where<br />
they are needed. These camps serve<br />
as operations headquarters and<br />
house anywhere from a handful to<br />
hundreds of troops and support<br />
staff. The goal of the ESS is<br />
to augment existing security at<br />
the camps and provide greater<br />
protection for camp operations,<br />
equipment and personnel.<br />
Commented Saar Koursh,<br />
CEO of Magal, “We are very<br />
pleased with our successful delivery<br />
of these important systems<br />
to NATO and we look forward to<br />
Saar Koursh<br />
working closely with NATO personnel<br />
in the coming weeks as we train<br />
them on our systems. While we are<br />
primarily known for our world class<br />
perimeter intrusion detection products,<br />
we are also a leading provider<br />
of deployable security solution<br />
packages. The original NATO tender<br />
specifically looked for<br />
robust and high quality<br />
equipment, capable of being<br />
mounted, connected<br />
and dismounted rapidly<br />
and modular and flexible<br />
to meet multiple camp<br />
layouts and personnel<br />
numbers. NATO’s choice<br />
of us is a resounding endorsement<br />
for our best-in-class<br />
products and technology, expertise,<br />
manufacturing capability and processes.”<br />
18<br />
Concluded Mr. Koursh, “Particularly<br />
in North America, we see<br />
further future demand for our full<br />
security solutions for deployable<br />
military camps and we look forward<br />
to further growth in this business in<br />
the coming years.”<br />
About Magal<br />
Magal is a leading international provider<br />
of solutions and products for<br />
physical and cyber security, as well<br />
as safety and site management. Over<br />
the past 45 years, Magal has delivered<br />
tailor-made security solutions<br />
and turnkey projects to hundreds of<br />
satisfied customers in over 80 countries<br />
- under some of the most challenging<br />
conditions.<br />
Magal offers comprehensive integrated<br />
solutions for critical sites,<br />
managed by Fortis4G - our 4th<br />
generation, cutting-edge PSIM<br />
(Physical Security Information<br />
Management system). The<br />
solutions leverage our broad<br />
portfolio of homegrown PIDS<br />
(Perimeter Intrusion Detection<br />
Systems), advanced VMS with<br />
native IVA and Cyber Security<br />
solutions.
<strong>GSN</strong>: What are your general thoughts on the<br />
2015 awards?<br />
8<br />
<strong>GSN</strong>: You spent many years on Capitol Hill and<br />
also at the Department of Homeland Security.<br />
As we head into 2016, what do you envision as<br />
homeland security spending priorities? Awards Category:<br />
––––––––––––––––––––––––––––––––––––––––<br />
<strong>GSN</strong> 2015<br />
<strong>GSN</strong>:<br />
DIGITAL<br />
What area/issue<br />
YEARBOOK<br />
pending<br />
OF AIRPORT/SEAPORT/BORDER<br />
trends do you<br />
SECURITY AWARDS RECIPIENTS<br />
see as priorities for the homeland security<br />
community?<br />
Name of Nominated Product, Service,<br />
or Program:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Reason this entry deserves to win:<br />
––––––––––––––––––––––––––––––––––––––––<br />
54<br />
9<br />
<strong>GSN</strong>: What future areas of homeland security<br />
interest would you advise companies to explore?<br />
Continued on next page<br />
Awards Category:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Name of Nominated Product, Service,<br />
or Program: Link to Web Page of Nominated Organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
www.networkharbor.com<br />
Reason this Link entry to additional deserves to information win: on product,<br />
––––––––––––––––––––––––––––––––––––––––<br />
service or program, with brief description:<br />
––––––––––––––––––––––––––––––––––––––––<br />
https://youtu.be/-ucfAR5psac<br />
Name and organization of nominating<br />
contact for this entry, including name, title,<br />
organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
55<br />
<strong>GSN</strong> 2015 DIGITAL YEARBOOK OF AIRPORT/SEAPORT/BORDER SECURITY AWARDS RECIPIENTS<br />
Nominating contact’s office telephone and cell<br />
phone:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Nominating contact’s email address:<br />
––––––––––––––––––––––––––––––––––––––––<br />
john@convyassociates.com<br />
30<br />
Address of nominating contact’s organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
31<br />
http://www.rapiscansystems.com<br />
Link to additional information on product,<br />
service or program, with brief description:<br />
––––––––––––––––––––––––––––––––––––––––<br />
http://www.rapiscansystems.com/en/products/<br />
radiation_detection<br />
Name and organization of nominating<br />
contact for this entry, including name, title,<br />
Nominating contact’s office telephone and cell<br />
jedgerly@speakerboxpr.com<br />
The Winners and Finalists have<br />
been selected. Now our national<br />
and international readers want<br />
to know what the strategies,<br />
technologies and innovations<br />
were that gave you the<br />
advantage. Let them know with<br />
a 2-page spread in the<br />
2016 Digital Yearbook of<br />
Award Winners.<br />
The <strong>GSN</strong><br />
2016 Digital Yearbook<br />
OF<br />
Homeland Security<br />
Awards<br />
CLICK HERE TO VIEW<br />
LAST YEAR’S YEARBOOK<br />
The <strong>GSN</strong><br />
2015 Digital Yearbook<br />
OF<br />
Airport/Seaport/<br />
Border Security Awards<br />
AND<br />
Homeland Security Awards<br />
National Programs and Protection Directorate.<br />
ed world. New legislation pending in Congress formalizes<br />
the increased DHS role in public/private partnering.<br />
<strong>GSN</strong> 2015 DIGITAL YEARBOOK OF HOMELAND SECURITY<br />
and<br />
Global spending also parallels the DHS spending raise.<br />
AIRPORT, SEAPORT, BORDER SECURITY AWARDS PROGRAMS<br />
A new market research report, “Global Homeland Security<br />
and Emergency Management Market, 2013–2018”, Information Security Management Act (FISMA) and de-<br />
New legislation also would update the 12-year-old Federal<br />
published by MarketsandMarkets is expected to reach lineate DHS’s role in guarding government networks and<br />
$544.02 Billion by 2018. Unfortunately, those numbers websites.<br />
could go even higher if there are more incidents similar to<br />
A priority for 2016 will be to accelerate rollout of<br />
<strong>GSN</strong> INTERVIEW<br />
what happened in Paris, Mali, and San Bernardino, CA. Einstein III Accelerated (E3A), the latest phase of DHS’s<br />
Best Detection Solutions<br />
automated network-security correcting systems. DHS has<br />
established memoranda of agreement with 55 federal<br />
Chuck Brooks, Distinguished Judge<br />
agencies to implement Einstein to provide horizon scanning<br />
and automated monitoring, detection, and remedia-<br />
<strong>GSN</strong> 2015 Homeland Security and<br />
Best Integrated Security Programs<br />
Rapiscan Systems<br />
CB: Counterterrorism and the counter CBRNE (chemical<br />
Airport, Seaport, Border Security Awards programs<br />
tion of government networks. DHS is also planning for<br />
2015 Winner<br />
, biological, Radiological, Nuclear, and Explosive) mission<br />
new cyber technologies that provide advanced defense of<br />
Network will always Harbor, be fundamental Inc. to homeland planning and<br />
network framework layers, including authentication, better<br />
encryption, biometrics, and data analytical tools”.<br />
spending. Those are the most catastrophic threats. In<br />
2015 Winner<br />
addition to CBRNE DHS has assumed more and more of a<br />
leadership role in cybersecurity derived from both Presidential<br />
mandates and congressional legislation.<br />
CB: For me it was a real pleasure judging this year’s<br />
Best Nuclear/Radiation Detection<br />
Cybersecurity is indeed a top priority as government agen-<br />
IPM (integrated process management) provides an<br />
annual Homeland Security and Airport, Seaport, Border<br />
CB:<br />
CB: Macro spending will increase across the board on<br />
cies and mega corporations experience more data breaches<br />
with each passing year. I recently published an article<br />
The key word really is “future” and it is already<br />
additional element of extensibility and power for policy<br />
Security Awards programs. The submissions this year<br />
Best Physical Security Information Management<br />
around the corner with the Internet of Things (IoT).<br />
management and workflow processing that is virtually<br />
Rapiscan Systems<br />
homeland security products and services In accordance<br />
were frankly quite amazing. The capabilities and technical<br />
System - PSIM<br />
in The Federal Times on Key homeland security priorities<br />
Recently both the FBI and DHS issued warnings about unlimited IoT<br />
in its capabilities. The end result is an intui-<br />
to the new threats we are especially facing from ISIS and<br />
merits of the IT and Physical security products/solutions<br />
tive, comprehensive automated security management<br />
from other terrorist actors, and global instabilities. This<br />
to watch in 2016 (http://www.federaltimes.com/story/<br />
and pending threats. The reality is that we have become<br />
platform that operates identically, anywhere within the<br />
of all the vendors made it especially difficult to judge. In<br />
was reflected in the recent passage of the 2016 omnibus<br />
government/dhs/blog/2015/12/15/key-homeland-securitypriorities-watch-2016/77368604/)<br />
My thoughts in regards<br />
immersed in a new digital era comprised of more organization. than 50<br />
There’s no need to retrain staff when Rapiscan they Systems, a leading provider of security screening<br />
solutions, is well known for the high quality, reliment<br />
or integrated with Rapiscan’s X-ray and metal-<br />
ing technological contributors to the current and future<br />
The bill provides DHS with $40.96 billion, which is an<br />
to cybersecurity verbatim:<br />
detection products can be used in a standalone deploy-<br />
my opinion they were all winners because they are lead-<br />
LightHouse<br />
spending Bill recently passed by Congress by Congress.<br />
billion interfaced devices. Anything connected is move vulner-<br />
from one facility to another, or when new compoable.<br />
Expect significant investments in smart cities, nents smart<br />
are connected to the platform, which in turn ability saves and affordability of its solutions. With products based threat detection solutions. The newest addition to<br />
security of our nation. It is good to know that very tal-<br />
increase of $1.33 billion over the fiscal year 2015 enacted<br />
“The 2015 DHS budget directed more than $1.25 billion<br />
to cybersecurity and that trend will continue in 2016.<br />
homes, smart businesses, and smart governments customers in the<br />
significant amounts of time and money. sold into four market segments, including Baggage and Rapiscan’s radiation detection product line is the Rapiscan<br />
MP100 Backpack Radiation Detection system. A high<br />
ented people in industry and government are continually<br />
Network Harbor’s LightHouse platform delivers dent management, too. levels. It included increased funding levels for Customs<br />
Parcel Inspection, Cargo and Vehicle Inspection, Hold<br />
next Its decade. click-and-go For the ability security to adopt community this conveys<br />
Baggage Screening and People Screening, the company performance, easy to use radiation monitor combining<br />
designing and upgrading security solutions to fill gaps as<br />
unified security management for enterprise organizations,<br />
extending the capabilities of physical security its own capabilities means that there’s no “dumbing<br />
adversaries are becoming more hostile and sophisticated.<br />
ment and for DHS Cybersecurity programs in the incident DHS management DHS’s (PSIM) inception to include as we geographical have become a more down” interconnect-<br />
of features or for functions threat detection, – just a seamless, surveillance, con-predictive data analytics,<br />
tion situations Convy its customers Associatescould face. An important a lightweight, compact commercial backpack, making<br />
the full functionality of any security system’s API within<br />
and Border Protection, Immigration and Customs Enforce-<br />
Cybersecurity and IT have moved to the forefront since<br />
opportunities in developing and integrating new sensors<br />
has a solution John for Convy, the most Principal demanding threat detec-<br />
gamma and optional neutron detection is housed in<br />
part of Rapiscan’s product portfolio is its radiation the system perfect for covert inspection situations. The<br />
information system (GIS) and non-physical products in sistent user interface, anywhere across the enterprise.<br />
detection product line, which addresses the need for MP100 is ideal for supporting security operations and<br />
a truly comprehensive safety and security management It installs easily, and is quickly mastered by administrators<br />
and end users alike. LightHouse supports almost<br />
global governments and organizations to monitor and performing radiation surveys in a variety of markets –<br />
environment. LightHouse is unique in that it integrates<br />
locate radioactive threat materials that can be used in including critical infrastructure, customs and border<br />
every security system, physical or non-physical, into a all major security product manufacturers including<br />
office: 202-421-3777<br />
atomic weapons and dirty bombs. The product line is control, event security, defense and law enforcement<br />
single, seamless oversight system. Its intuitive interface access control, video, audio, mass notification, IDS,<br />
comprised of software and hardware based solutions applications. All of the features required for radiation<br />
drives faster recognition of potential threats, as well RTLS and more. LightHouse has been designed to add<br />
for inspecting vehicles, packages and people. Radiation detection are integrated in the MP100 so it can be used<br />
as gives first responders the information they need to additional system integration’s to the platform without<br />
make better informed, more appropriate decisions. disruption or encumbrance of any existing integration<br />
LightHouse is designed to support the IT side of inci- in an expedient, stable and secure process. LightHouse<br />
8380 Greensboro Drive Suite 514<br />
McLean, VA 22102<br />
as a standalone device and connected wirelessly to a Link to Web Page of Nominated Organization:<br />
Rapiscan oversight system for remote data collection<br />
––––––––––––––––––––––––––––––––––––––––<br />
and display. Using the MP100 is as easy as slipping<br />
the backpack on and walking around. Weighing just<br />
18 pounds, the MP100 is lightweight and easy to use.<br />
Additionally, the onboard battery enables 16 hours of<br />
continuous operation in a wide range of environments.<br />
The Rapiscan RadviewerTM Android app displays the<br />
operator’s current position and direction toward the<br />
radiation source. The design of the MP100’s radiation<br />
detectors provides increased directional sensitivity of<br />
the radiation detection. A radiation alarm is signaled audibly<br />
via a headphone jack on the backpack or visually ––––––––––––––––––––––––––––––––––––––––<br />
organization:<br />
via RadviewerTM. In this way, the MP100 enables users Jennifer Edgerly, Senior Account Director,<br />
to effectively detect and locate radioactive threats. The SpeakerBox Communications<br />
MP100 is manufactured by Rapiscan’s Radiation Detection<br />
Products division, which has supplied thousands of<br />
radiation monitors that are deployed at border crossings,<br />
seaports, airports and facilities around the world. office: 703-287-7809<br />
phone:<br />
––––––––––––––––––––––––––––––––––––––––<br />
The MP100 uses Rapiscan’s proven radiation detection cell: 202-486-0518<br />
technology adapted for a backpack deployment. The<br />
radiation detection performance meets the requirements<br />
of ANSI N42.53. The MP100 offers customers ––––––––––––––––––––––––––––––––––––––––<br />
Nominating contact’s email address:<br />
efficient, easy to use and reliable man-portable radiation<br />
detection with high performance at an affordable cost of<br />
acquisition and operation.<br />
Address of nominating contact’s organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
7900 Westpark Drive, Suite T410, McLean, VA<br />
Contact Adrian Courtenay at 917-696-5782 to get more information<br />
and reserve your 2-page spread.
Campbell on Crypto<br />
Crypto Management 101: Four Steps<br />
to Better Protection<br />
By Shawn Campbell<br />
Previous installments of this column<br />
have discussed the critical<br />
importance of encryption for data<br />
protection. In addition to strong<br />
encryption, however, cryptographic<br />
keys used during the encryption<br />
process must be treated with the<br />
same level of care.<br />
The encryption process generates<br />
cryptographic keys that are used to<br />
encrypt (“lock”), and decrypt (“unlock”)<br />
data. The more you encrypt,<br />
the more encryption keys you have<br />
to store and manage. If these keys are<br />
stolen or copied, they can be used to<br />
decrypt sensitive data, negating the<br />
entire encryption process.<br />
Consequently, many organizations<br />
are starting to realize they need a<br />
centralized strategy to manage the<br />
keys they need for their encryption<br />
needs. A solid cryptographic key<br />
management strategy has four elements:<br />
• High Assurance Cryptographic<br />
Key Protection<br />
• Cryptographic processing and<br />
acceleration<br />
• Key lifecycle management<br />
• Cryptographic Resource Management<br />
Let’s look at each step.<br />
High Assurance<br />
Cryptographic Key Protection<br />
Depending on the value of data being<br />
protected, and the variety of keys<br />
needing to be stored, organizations<br />
can store their keys either in hardware<br />
or in software. For keys that<br />
protect highly sensitive data and applications,<br />
a centralized, hardwarebased<br />
approach is best.<br />
In this approach, a hardware security<br />
module is used. Nothing ever<br />
enters or leaves this tamper-resistant<br />
vault, and keys are more isolated<br />
from traditional network attacks. If<br />
the module becomes compromised,<br />
the keys will zero out and become<br />
useless.<br />
The best applications of centralized<br />
key storage are cases like code<br />
signing, certificate validation, transaction<br />
processing and Public Key<br />
Infrastructure. These involve limited<br />
key distribution, with keys used for<br />
very specific reasons. Some applications<br />
may require a more distributed<br />
model, where cryptographic keys<br />
must exist in close proximity to the<br />
data and applications they secure.<br />
20<br />
Cryptographic Processing<br />
and Acceleration Protection<br />
Organizations must review their<br />
current workflows and applications.<br />
Where will encryption and decryption<br />
be happening? Depending on<br />
where and how quickly the encryption<br />
must run, high-speed cryptographic<br />
processors may be needed.<br />
This can help organizations avoid<br />
processing bottlenecks and increase<br />
system capacity.<br />
The key is to find a solution that<br />
can be easily implemented and supports<br />
industry standard APIs out of<br />
the box, which can greatly simplify<br />
integration.<br />
Key Lifecycle Management<br />
Successful key management takes<br />
an integrated approach to generating,<br />
storing, distributing, rotating,<br />
revoking, suspending and terminating<br />
keys for devices and applications.<br />
Here are things to consider through<br />
the lifecycle of a crypto key:<br />
Key generation and certification.<br />
Make sure the key strength matches<br />
the sensitivity of the data. The longer<br />
the key, the stronger the encryption,
and the less susceptible it is to brute<br />
force attacks.<br />
Key distribution. Each key must<br />
be associated with a particular user,<br />
system, application or policy. This<br />
helps the organization understand<br />
how to secure the key, especially in<br />
transit. Have separate access for the<br />
administrator creating the key and<br />
the person using it. That way, it is assured<br />
that unauthorized<br />
users can’t get access to<br />
confidential information.<br />
Key storage. Centralized,<br />
hardware-based<br />
key storage is recommended<br />
for keys that<br />
protect highly sensitive<br />
data and applications. Distributed<br />
storage is used when cryptographic<br />
keys must exist nearby secured data<br />
and applications.<br />
Key rotation. Each key should be<br />
designated an effective crypto period,<br />
with the ability to change key<br />
on demand. It’s important to limit<br />
the amount of data encrypted with<br />
a single key because using the same<br />
key over a long duration of time increases<br />
the chances that the key will<br />
be compromised. Rotating keys regularly<br />
ensures stolen keys are only<br />
useful for a specific time period.<br />
Key backup and recovery. If the<br />
key storage mechanism fails or is<br />
compromised, there must be a way<br />
to restore the keys. Backup copies of<br />
cryptographic keys should be kept in<br />
a storage mechanism that is at least as<br />
secure as the original store. Concrete<br />
procedures must be documented to<br />
handle a key compromise as well.<br />
Key revocation, suspension, and<br />
termination. Every organization<br />
must be able to delete keys associated<br />
with compromised systems or<br />
data, to ensure unauthorized users<br />
can never decrypt sensitive assets.<br />
The more you encrypt, the more encryption<br />
keys you have to store and manage. If these<br />
keys are stolen or copied, they can be used<br />
to decrypt sensitive data, negating the entire<br />
encryption process.<br />
Sometimes there may be the need to<br />
take a key out of the lineup but not<br />
terminate it. For instance, data that<br />
may be used for legal proceedings<br />
may need to be recalled; those keys<br />
should only be suspended.<br />
Cryptographic Resource<br />
Management<br />
For policy enforcement, transparency,<br />
and system health, every organization<br />
should have one, easy-to-use<br />
interface that administers, monitors<br />
and provisions cryptographic<br />
resources. System capabilities must<br />
include:<br />
Resource deployment. Provision<br />
cryptographic resources and create<br />
security access for multiple administrators<br />
at multiple access levels.<br />
21<br />
System Administrators and Security<br />
Officers should be able to perform<br />
their duties without compromising<br />
the Application Owner ability to access<br />
and control the keys.<br />
Policy Configuration. Determine<br />
how many keys can be generated,<br />
and where they are stored. Establish<br />
policies for key usage and custodial<br />
duties, with appropriate training requirements.<br />
Monitoring and reporting.<br />
Secure, automated<br />
and unified<br />
logging and reporting<br />
are vital to risk and<br />
compliance posture.<br />
Key ownership and any<br />
modifications to that<br />
ownership must be recorded and securely<br />
stored to maintain an authentic<br />
audit trail.<br />
With a solid cryptographic key<br />
management infrastructure an organization<br />
can appropriately protect<br />
their “keys to the kingdom” and meet<br />
their encryption needs such as diversity<br />
and availability of keys, encryption<br />
performance, management and<br />
storage of keys, and address compliance<br />
and risk management requirements.<br />
Shawn Campbell is VP of Product<br />
Management, SafeNet Assured Technologies.<br />
He can be reached at Shawn.<br />
Campbell@safenetat.com
Mass Notification/Disaster Response<br />
Emergency24’s two-way, multi-media<br />
mass-communications system<br />
Traditional notification of an emergency<br />
in a building usually is accomplished<br />
with visual (strobe)<br />
and audio (horn/speaker) indicators<br />
while a central station operator<br />
notifies the 911-dispatch center via<br />
telephone contact and then makes<br />
party calls.<br />
That’s the end of the information<br />
exchange.<br />
A conversation, in comparison,<br />
is two-way dialogue. That’s exactly<br />
what’s needed to minimize the impact<br />
of a severe emergency whether<br />
it is in a school, office, hospital or<br />
other facility that attracts generally<br />
the same population each day.<br />
By using your central station’s<br />
advanced notification technologies,<br />
you can open real-time communications<br />
between offsite school<br />
officials or building owners, onsite<br />
teachers, students, building occupants<br />
or tenants and security staff.<br />
Real-time emergency information<br />
and requests for help can come in<br />
from the building while instructions<br />
to building occupants can go<br />
out.<br />
For example, a teacher responding<br />
to an emergency notification could<br />
respond by text that there are injuries<br />
in a certain location in<br />
the facility. The paramedics<br />
then know to go to that location<br />
immediately instead of<br />
sweeping through the building<br />
to find people who need<br />
medical assistance.<br />
The same two-way communication<br />
capabilities are<br />
also available for community-wide<br />
situations, such as a<br />
HAZMAT event, boil-water<br />
order or major road closure,<br />
but instead of an alarm-system<br />
trigger to initiate the<br />
mass notification and emergency<br />
communications (MNEC)<br />
system, an administrator would<br />
manually generate the event message<br />
via an online portal. That message<br />
would then be sent to citizens<br />
who opted-in to receive E-mail,<br />
voice or text alerts.<br />
Consider Appropriate<br />
Groups & Methods to Address<br />
The increased occurrence of mass<br />
shootings and other terror-type<br />
events has led to new ways of thinking<br />
when it comes to emergency<br />
response. This level of response is<br />
not intended for minor incidents<br />
22<br />
like a fistfight in a school hallway.<br />
Response of this magnitude is for<br />
situations like an active shooter or<br />
when there are mass casualties, such<br />
as during a tornado or other natural<br />
disaster.<br />
To establish protocols, alarm contractors,<br />
local emergency-response<br />
agencies and the school/office administrators<br />
must collectively determine<br />
who should receive what type<br />
of information and when.<br />
Having accurately segmented<br />
contact groups is essential so that<br />
the intended audiences receive information<br />
that law enforcement
deems most helpful to protect lives.<br />
Examples of contact groups include<br />
school administrators, security staff,<br />
teachers/managers, students/staff,<br />
elected officials, parents and the<br />
media.<br />
List segmentation determines who<br />
receives complete access to operate<br />
the incident command portal and<br />
other groups who receive immediate<br />
text/E-mail/voice notice of the<br />
incident and access to emergency<br />
procedure documents, but no portal<br />
control. Other contact groups — especially<br />
younger students — would<br />
receive less information about the<br />
incident, if any at all. How much information<br />
is shared with each group<br />
depends on the wishes of the subscriber<br />
and police.<br />
Recipients Can Help Supply<br />
Situational Intelligence<br />
When an alarm is activated by a<br />
system or generated by the incident<br />
command portal, security personnel<br />
and building occupants with the<br />
highest administrative levels (management,<br />
principals, security, maintenance,<br />
etc.) are immediately notified<br />
of the incident via the various<br />
messaging methods.<br />
The notification will identify the<br />
type of emergency that happened<br />
and provide a link to a floor plan<br />
showing where the incident occurred<br />
in the facility. That message<br />
also contains links to get driving<br />
directions to the facility (for police<br />
response) and access to the secure<br />
Internet portal from which two-way<br />
mass communication is facilitated.<br />
From the secure, online incident<br />
command portal, instructions for<br />
building occupants can be sent and<br />
recipients can reply to the messages<br />
by E-mail or text to provide onsite<br />
intelligence. Security personnel can<br />
also be given access to onsite video<br />
feeds to track perpetrators and visually<br />
assess the situation in real-time.<br />
Because building occupants are<br />
able to reply to the messages they<br />
receive, they can have a “digital conversation”<br />
with the incident commanders.<br />
Those responses could<br />
indicate where there are injuries or<br />
even contain photographs to help<br />
identify the perpetrators or let police<br />
know how many perpetrators<br />
they are dealing with when they arrive.<br />
Ongoing two-way communication<br />
between the contact groups can<br />
be maintained throughout the incident<br />
until the “all clear” message is<br />
delivered.<br />
Alarm contractors can market this<br />
service to existing subscribers or to<br />
facilities in which you don’t have the<br />
account because it can be a standalone<br />
system that is not tied to any<br />
specific hardware. That means alarm<br />
contractors can use the equipment<br />
23<br />
they are most comfortable with and<br />
all that’s needed to initiate this system<br />
is receipt of a signal at the central<br />
station to start the initial notification<br />
process.<br />
By integrating a building’s alarm<br />
system with advanced notification<br />
technologies, alarm contractors<br />
have a new and significant revenuegenerating<br />
service to offer schools,<br />
offices and hospitals.<br />
About Emergency24<br />
Emergency 24, Inc. is an Underwriters<br />
Laboratories listed central station<br />
that operates a network of five<br />
monitoring facilities strategically<br />
placed throughout the U.S. to ensure<br />
ongoing operations even during<br />
a time of regional disaster. Our<br />
robust facilities and infrastructure<br />
provide us with the industry’s widest<br />
range of alarm monitoring and<br />
communications capabilities to protect<br />
dealers and subscribers against<br />
failure. Fundamental to our success<br />
and longevity is the fact that our inhouse<br />
team of software engineers<br />
develops services that are consistently<br />
ahead of the industry’s technology<br />
curve to help dealers fulfill<br />
the needs of their subscribers.<br />
For more information, contact<br />
Kevin Lehan, Director of Communications,<br />
1.800.800.3624, ext. 6917<br />
k.lehan@emergency24.com.
Mass Notification/Disaster Response<br />
NICE helps Metro Nashville Department of Emergency<br />
Communications get ready for Next Generation 9-1-1<br />
HOBOKEN, NJ, <strong>Nov</strong>ember 30,<br />
2016 – With plans to deploy a statewide<br />
emergency services network<br />
(ESInet), Tennessee has set the stage<br />
for Next Generation 9-1-1 (NG9-<br />
1-1). The Metro Nashville (TN)<br />
Department of Emergency Communications<br />
(MNDEC), the state’s<br />
largest 9-1-1 center, recently upgraded<br />
to the latest NICE Inform<br />
solution to prepare for this change,<br />
NICE (Nasdaq:NICE) announced<br />
today. NICE Inform will support<br />
the MNDEC’s current communication<br />
recording needs, while also enabling<br />
future logging of SMS texts<br />
and other multimedia, as the center<br />
prepares to accept texts-to-911<br />
starting next year.<br />
All calls that come in to the MN-<br />
DEC – over a million a year – are<br />
processed through the MNDEC’s<br />
VIPER Power 911® platform, a<br />
Voice over IP (VoIP) call processing<br />
solution from West Corporation<br />
that can also receive NG9-1-1 services,<br />
including SMS texts and other<br />
i3 compliant data. NICE Inform is<br />
integrated with and certified to support<br />
leading NG9-1-1 call handling<br />
and text-to-911 applications, including<br />
VIPER.<br />
NENA i3-compliant and futureready<br />
NICE Inform enables a seamless<br />
migration to next generation<br />
emergency communications. NICE<br />
Inform captures, manages, and<br />
synchronizes multi-channel interactions<br />
between citizens, PSAPs<br />
and first responders, to provide a<br />
complete, true record of incidents.<br />
It assembles telephony and radio<br />
communications into an authentic<br />
incident timeline along with<br />
24<br />
SMS 911 texts, GIS, screen recordings,<br />
video and other multimedia,<br />
for comprehensive insight into the<br />
‘who, what, when, where and why’<br />
of incidents.<br />
“Text-to-911 and NG9-1-1 are<br />
coming; it’s only matter of when, and<br />
we need to be<br />
ready,” said<br />
Tim Nielsen,<br />
NICE Administrator<br />
for the Metro<br />
Nashville Department<br />
of<br />
Emergency<br />
Communications.<br />
“Our<br />
recent NICE<br />
upgrades<br />
align with our transition to all IP,<br />
text-to-911 and ultimately NG9-1-<br />
1. For us, it was a necessary move,<br />
and a move in the right direction.”<br />
According to customer surveys,<br />
the Metro Nashville DEC also routinely<br />
receives high marks from<br />
citizens, thanks in large part to its<br />
proactive approach to Quality Assurance<br />
and Quality Improvement<br />
(QA/QI). The MNDEC reviews
over 7,000 calls annually to ensure<br />
quality standards are being met and<br />
protocols are being consistently followed.<br />
With the addition of NICE<br />
Inform Evaluator and Reporter, the<br />
MNDEC will be able to automate<br />
manual QA processes to save time,<br />
while also turning QA data into actionable<br />
information.<br />
“The Metro Nashville DEC exemplifies<br />
what it means to be a pacesetter,<br />
not just within the state of<br />
Tennessee,<br />
but within the<br />
nation,” said<br />
Christopher<br />
Wooten, Executive<br />
Vice<br />
President,<br />
Vertical Markets,<br />
NICE.<br />
“In addition<br />
to spearheading<br />
the modernization<br />
effort<br />
for the MNDEC, Tim Nielsen<br />
has also taken on a critical dual<br />
role as the first Public Safety Chair<br />
of the NICE User Group (NUG)<br />
and leader of the new Public Safety<br />
NICE User Group (PUBNUG). Tim<br />
brings a wealth of technology and<br />
operational experience to this position<br />
which will ultimately be beneficial<br />
to other 9-1-1 centers as they<br />
navigate the challenges of managing<br />
everyday operations while making<br />
steady progress toward NG9-1-1.”<br />
About the Metro Nashville<br />
Department of Emergency<br />
Communications<br />
The Metro Nashville Department<br />
of Emergency Communications<br />
Operations Division is the core of<br />
the public safety system for Davidson<br />
County and the Nashville area.<br />
The Metro Nashville DEC strives<br />
to provide prompt, courteous and<br />
efficient service to the citizens in<br />
Nashville/ Davidson County by answering<br />
9-1-1 and non-emergency<br />
calls, as well as dispatching Police,<br />
Fire, and EMS services. In 2015,<br />
the Metro Nashville DEC handled<br />
over one million calls, with 477,599<br />
of those calls being 9-1-1 in nature.<br />
The Metro Nashville DEC<br />
has achieved and maintained three<br />
accreditations: CALEA (Commission<br />
for the Accreditation of Law<br />
Enforcement Agencies) Communications<br />
Accreditation, and ACE<br />
(Accredited Center of Excellence)<br />
Accreditations through the International<br />
Academy of Emergency<br />
Dispatch for both Medical and Fire<br />
Protocols. It is also a recipient of<br />
the CALEA TRI-ARC Award which<br />
is given to the governing body(s)<br />
and agencies that have concurrent<br />
CALEA accreditation for their law<br />
25<br />
enforcement, public safety communications<br />
and public safety training<br />
agencies. Nashville is one of fifteen<br />
cities that have received this prestigious<br />
award. www.nashville.gov/<br />
Emergency-Communications-Center/Operations-Center.aspx<br />
About NICE<br />
NICE (Nasdaq:NICE) is the worldwide<br />
leading provider of both<br />
cloud and on-premises enterprise<br />
software solutions that empower<br />
organizations to make smarter decisions<br />
based on advanced analytics<br />
of structured and unstructured<br />
data. NICE helps organizations of<br />
all sizes deliver better customer service,<br />
ensure compliance, combat<br />
fraud and safeguard citizens. Over<br />
22,000 organizations in more than<br />
150 countries, including over 80 of<br />
the Fortune 100 companies, are using<br />
NICE solutions. www.nice.com.
Mass Notification/Disaster Response<br />
What the FCC revamping of the<br />
Federal Alert System means to you<br />
By Nelson Daza<br />
In the wake of the New York City<br />
and New Jersey bombings that took<br />
place recently, big changes<br />
are on the way for the<br />
FCC’s Wireless Emergency<br />
Alert (WEA) system. Sen.<br />
Chuck Schumer expressed<br />
dissatisfaction and frustration<br />
with the current<br />
system after the WEA was<br />
used to send a brief 90-character<br />
message to cellphone users in NYC<br />
alerting them to look out for a suspect<br />
by the name of Ahmad Khan<br />
Rahami. The message had no links,<br />
photos or embedded media which<br />
caused many citizens to panic.<br />
While clearly not the intention of<br />
the FCC, their mass communications<br />
technology caused more panic<br />
than it alleviated and the organization<br />
is looking to make upgrades to<br />
ensure this type of situation doesn’t<br />
happen again.<br />
Since the EAS system is vital to<br />
our national security and public<br />
safety, it should undoubtedly be a<br />
state-of-the-art system. There are<br />
some EAS devices and protocols<br />
26<br />
that seem to be out of place in our<br />
modern era. For example, broadcasters<br />
have to purchase and maintain<br />
on-premise hardware that has<br />
very limited functionality<br />
and is very complex to<br />
use. Television broadcasters<br />
can still only broadcast<br />
text information in<br />
the form of a ticker tape<br />
across the top or bottom<br />
of a television set. However,<br />
more and more incident information<br />
contains richer content,<br />
such as images or video, that are not<br />
handled by the devices that are currently<br />
used. The federal government<br />
– and subsequently, all broadcasters<br />
– need to start taking steps that will<br />
allow them to stop depending on<br />
these outdated devices and start using<br />
the Internet to deliver emergency<br />
messages to television and radio.<br />
Not to mention, there are fewer and<br />
fewer people left who know how to<br />
configure, maintain or use these antiquated<br />
appliances.<br />
The ripples of the EAS upgrade<br />
will soon be felt at a municipality<br />
near you. There’s no denying that we<br />
live in a dangerous world today. Active<br />
shooter situations and extreme<br />
weather conditions seem to be happening<br />
with increasing frequency,<br />
so mass communications have never<br />
been more important. During a<br />
crisis, the ability to quickly direct<br />
large groups of people can be the<br />
difference between life and death.<br />
To do that effectively, however, there<br />
are key capabilities government officials<br />
must have in place prior to a<br />
major event. While the FCC hasn’t<br />
provided any specifics around what<br />
standards it will use for its upgrade,<br />
here are three key capabilities that<br />
should make the cut.<br />
Multi-Modal Outreach is Critical<br />
The first step in any mass communications<br />
strategy is to recruit the local<br />
population to join the program.<br />
After all, it doesn’t do anyone any<br />
good to have a cutting-edge, ultramodern<br />
communications system<br />
that can’t reach anybody. Today’s<br />
citizens have come to rely upon a<br />
wide range of Internet-connected<br />
devices, which makes it particularly<br />
difficult to lock in on one specific<br />
method of outreach.<br />
The most successful government
agencies and municipalities have<br />
asked their citizens for two key<br />
pieces of contact information: their<br />
cell phone number and their social<br />
media information. The cell phone<br />
is nearly ubiquitous among people<br />
today and it’s the only device that<br />
people carry and actively engage<br />
with throughout the day. However,<br />
it’s important to realize that no contact<br />
path, including a cellular device,<br />
is 100% reliable, 100% of the time<br />
(which is critical in an emergency<br />
situation when the message must<br />
reach as many people as possible).<br />
This is an important tenet that the<br />
FCC should consider as part of the<br />
EAS overhaul.<br />
A robust, multi-modal mass communications<br />
program enables government<br />
officials to more accurately<br />
and effectively fuel the spread of<br />
information during an emergency.<br />
Once the communication channels<br />
have been decided upon, consider<br />
supporting the program through<br />
advertising, public relations, social<br />
media and even traditional physical<br />
media to get the word out about<br />
how people can sign up for the program.<br />
The FCC should even follow<br />
the lead of local communities,<br />
such as Lewisville, Texas, where a<br />
local emergency management department<br />
conducted an extensive<br />
awareness program, which included<br />
development of marketing materials<br />
and a Public Service Announcement<br />
(PSA). The awareness program was<br />
well received and encouraged residents<br />
to enroll their other devices<br />
and contact paths. The community<br />
saw a 262% increase in resident optins<br />
in less than a year.<br />
The Power of Rich,<br />
Multimedia Messages<br />
Pictures, graphics and sound clips<br />
have permeated our everyday communications<br />
alongside plain text,<br />
and are a valuable tool in crisis communications.<br />
Just think for a moment<br />
back to the New Jersey bombing<br />
incident. If the FCC were able to<br />
issue a picture of the suspect during<br />
their communication, local citizens<br />
would be empowered to become<br />
helpful informants to locating the<br />
suspect. People in crisis situations<br />
tend to be hyper-focused on any and<br />
all stimulus so asking them to take<br />
27<br />
the extra step to locate an image of<br />
the suspect via a Google search is a<br />
bridge too far for many to cross. The<br />
ability to provide people with a succinct<br />
synopsis – complete with the<br />
who’s, where’s, why’s and how’s – is<br />
critical to stomping out uncertainty<br />
and panic from the get-go. A picture<br />
is worth a thousand words and can<br />
serve as a critical piece of information<br />
in criminal investigations for<br />
police officers.<br />
Real-Time Guidance During a Crisis<br />
Crisis situations are fluid and dynamic.<br />
To properly manage an emergency<br />
event, specific people need to<br />
take decisive actions throughout a<br />
prolonged period of time. This requires<br />
an immense amount of realtime<br />
coordination that is impossible<br />
unless an agency or municipality is<br />
able to communicate with targeted<br />
groups during an incident. EAS<br />
should incorporate the fundamentals<br />
of two-way communication,<br />
and targeted notification capabilities,<br />
where possible.<br />
As an example, let’s imagine an<br />
active shooter situation within a<br />
government building. Government<br />
officials could quickly communicate<br />
with security personnel to<br />
confront the gunman while directing<br />
other workers, including those<br />
More on page 51
Mass Notification/Disaster Response<br />
Washington tech firm claims predictive analytics<br />
can improve emergency response operations<br />
WASHINGTON, <strong>Nov</strong>. 28, 2016 – As<br />
Katrina made landfall in the hurricane<br />
season of 2005 - emergency<br />
managers evacuating New Orleans,<br />
faced their biggest challenge - determining<br />
where, when, and who would<br />
be harmed the most.<br />
For over a decade, NeST Group, a<br />
metro DC based techno-conglomerate,<br />
has systematically invested in<br />
building decision support platforms<br />
- that go beyond mere forensic analysis<br />
and provide predictive intelligence<br />
- that commanders can use<br />
in real-time to improve tactical<br />
emergency response<br />
operations.<br />
“The WWW is rich with<br />
data feeds - social media,<br />
internet of things (iOT),<br />
surveillance, primary surveys,<br />
biometrics, spatial<br />
imagery - however, we consume<br />
a very tiny fraction of this massive<br />
information mine to determine<br />
outcomes,” states Dr. Javad K Hassan,<br />
the founding Chairman of the NeST<br />
group. “Aggregating data hives to visualize<br />
future intuitively, eludes all,<br />
but a handful of sophisticated cyber<br />
intelligence (CYBINT) outfits,” he explains.<br />
Across the past decade, business<br />
Dr. Javad K Hassan<br />
decisions using public domain data<br />
steadfastly increased - in crafting entry<br />
and expansion plans, patterning<br />
consumer behavior, and developing<br />
distribution strategies. Yet in tactical<br />
fields - like combat, search & rescue,<br />
or counter-terrorism - its potential<br />
still lies largely untapped.<br />
Anoop Madhavan, the Senior Vice<br />
President of the NeST Group explains,<br />
“The Boston Marathon bombing<br />
triggered the steepest adoption of<br />
the National Incident Management<br />
System (NIMS) across<br />
military and emergency<br />
response organizations in<br />
the US.” NIMS is the presidentially<br />
directed federal<br />
platform to unify and coordinate<br />
responses between<br />
various agencies.<br />
An incident commander<br />
and a tactical operations<br />
chief certified by the Homeland Security<br />
Emergency Management Agency<br />
on disaster operations, Mr. Madhavan<br />
firmly believes “deterministic models<br />
and information is key to the success<br />
of a field commander; it enables him/<br />
her to establish effective, efficient, and<br />
safe priorities to all operatives contributing<br />
to the mission’s success.”<br />
NeST Group companies, rally on<br />
28<br />
technology frontiers - ranging from<br />
fiber optics, embedded systems, signature<br />
intel applications, and geographic<br />
information systems. Two<br />
group companies are rated at CMMi<br />
level 5 - the highest award accorded<br />
by the Carnegie Mellon University’s<br />
Software Engineering Institute.<br />
“Right from its capture at a sensor,”<br />
clarifies Matt Onojafe (Director<br />
of Government Contracting of<br />
Opterna AM, the group’s fiber optics<br />
arm), “we guide data through its lifecycle<br />
as it transforms into actionable<br />
intelligence.” Matt has successfully<br />
led Opterna’s recent contract awards<br />
from the US Department of State,<br />
Army, Navy and the Defense Logistic<br />
Agency (DLA).<br />
Conventional analytic systems stop<br />
with best ingress routes, effective apparatus,<br />
and optimal HR configurations<br />
to respond to a mission. NeST’s<br />
high maturity predictive systems take<br />
deterministic ability, many levels further.<br />
It profiles - with high levels of<br />
statistical confidence - the evacuation<br />
route a community in a disaster aftermath<br />
will instinctually traverse; the<br />
defensive or offensive tactic an adversary<br />
will adopt in combat; and even<br />
the exact location where the target of<br />
a search will be discovered.
As the group prepares to transition<br />
to the new administration’s intelligence,<br />
homeland security, and defense<br />
policies, its IT investments are<br />
honed to equip America’s warfighters,<br />
intel analysts, and first responders,<br />
with better aggregated and visualized<br />
information.<br />
About NeST<br />
NeST Group is a $400 million international<br />
conglomerate with more<br />
than 4000 scientists, engineers, and<br />
employees - headquartered in metro<br />
Washington DC. It has offices in the<br />
Americas, Europe, the Middle East,<br />
South Asia, Japan and the Far East.<br />
NeST’s strategic leadership stems<br />
from its founder and group chairman,<br />
Dr. Javad K Hassan, who was a<br />
senior VP at IBM.<br />
NeST Group has health care (ultrasound<br />
systems, MRI equipment,<br />
PAC systems), green energy (fuel<br />
cells, wind turbine control systems),<br />
embedded systems, wireless, IT, and<br />
fiber optics products. GE, Toshiba,<br />
Hitachi, ABB, Verizon, Honeywell,<br />
France telecom, and Etisalat are all<br />
prominent customers of the group.<br />
Sign-up for Free<br />
<strong>GSN</strong> Digital Editions<br />
and Email Newsletters<br />
Free subscription to your selection of <strong>GSN</strong> digital editions<br />
and daily/weekly email newsletters. Add new selections or<br />
opt-out of any selections at any time.<br />
<strong>GSN</strong> Monthly Digital Edition<br />
<strong>GSN</strong> Airport, Seaport, Rail, Border Security Weekly<br />
<strong>GSN</strong> Daily Insider Newsletter (5 Days Weekly)<br />
<strong>GSN</strong> Cybersecurity Newsletter<br />
<strong>GSN</strong> Media Kit<br />
CLICK HERE<br />
The News Leader in Physical, IT and Homeland Security<br />
www.gsnmagazine.com<br />
29
Mr. Hu, Founder and CEO of Hangzhou<br />
Hikvision Digital Technology Co Ltd, shares<br />
his thoughts with U.S. journalists<br />
By Adrian Courtenay,<br />
Government Security News<br />
On October 21, a group of five<br />
American journalists embarked on<br />
a nine day journey to China, courtesy<br />
of Hikvision USA and parent<br />
company Hangzhou Hikvision Digital<br />
Technology Co Ltd. The trip was<br />
designed to include<br />
visits to Shanghai,<br />
the financial capital<br />
of China; Hangzhou,<br />
where the headquarters<br />
of Hikvision are<br />
located; and Beijing,<br />
the capital of the People’s<br />
Republic of China<br />
and the nation’s political, cultural<br />
and educational center.<br />
The Beijing visit in particular was<br />
of special interest to Government<br />
Security News because Beijing is a<br />
major hub for the country’s very sophisticated<br />
transportation systems<br />
of national highways, expressways,<br />
railways and high-speed rail networks.<br />
The Beijing Capital Airport<br />
is not only the second busiest in the<br />
world in passenger traffic, but also<br />
an architectural masterpiece. And as<br />
we learned when visiting the Hikvision<br />
headquarters, transportation is<br />
a core market for Hikvision, which<br />
also deals with Safe Cities, Education,<br />
Healthcare, Energy and Power<br />
Grids, Cybersecurity, Law Enforcement<br />
and Public Safety, Sports, and<br />
“I’m a big fan of Adam Smith. I’ve read<br />
his books and respect his theories a lot. I<br />
think more about users than competitors.<br />
Hikvision respects competitors.”<br />
of course Video Surveillance.<br />
Founded in 2001 with 49% foreign<br />
capital, Hikvision had a market<br />
capitalization of more than $20<br />
billion USD by September 16, 2016,<br />
more than 18,000 employees and<br />
40 wholly-owned subsidiaries and<br />
shareholding companies worldwide.<br />
According to yearly independent<br />
data from the IHS Market, Hikvision<br />
accounted for 19.5% of market<br />
30<br />
share in the global video surveillance<br />
industry in 2015, up from<br />
4.6% in 2010, and has been ranked<br />
the number one market share leaders<br />
for video surveillance equipment<br />
for five consecutive years. In 2015,<br />
Hikvision was ranked first in the<br />
Emen market with 12.2% market<br />
share, and was ranked second in the<br />
Americas market with<br />
7.3% market share.<br />
In addition to their<br />
meetings with Hikvision,<br />
the American<br />
journalists were also<br />
treated to visits to<br />
some of the great accomplishments<br />
of<br />
ancient China, including the Great<br />
Wall of China, the Forbidden City,<br />
and Ancient gardens dating back<br />
to the 1500’s, along with visits to<br />
the country’s awesome present day<br />
building accomplishments, such as<br />
the gorgeous towers in Shanghai<br />
that dwarf the Empire State Building<br />
and the magnificent Intercontinental<br />
Hotel and Conference Center,<br />
where U.S. President Barack
Obama recently met with Chinese<br />
President Xi Jinping. Not surprising<br />
to anyone, all the cameras in the<br />
Conference Center were installed<br />
by Hikvision, many of them with<br />
3D system patrollers that open remotely<br />
at hotel checkpoints.<br />
But despite the tours and the best<br />
of Chinese cuisine, it seemed obvious<br />
to this observer that some of the<br />
most interesting moments of the trip<br />
in the eyes of the visiting American<br />
journalists took place in the meeting<br />
with Mr. Hu, Founder and CEO<br />
of Hangzou Hikvision Digital Technology<br />
Co. Ltd, who admitted to<br />
having read over a hundred books<br />
on U.S. business and culture, and<br />
who revealed the deep knowledge<br />
and insight of a consummate entrepreneur.<br />
Here are some samples<br />
of the back and forth between the<br />
American journalists and Mr. Hu:<br />
When Ralph Jensen, Editor of<br />
Security Products Magazine, asked<br />
the question, “Have you run into<br />
any “push-back” from companies in<br />
Europe, U.S. etc. Mr. Hu responded:<br />
“I’m a big fan of Adam Smith.<br />
I’ve read his books and respect his<br />
theories a lot. I think more about<br />
users than competitors. Hikvision<br />
respects competitors. We do not use<br />
aggressive tactics with competitors.<br />
It’s a public company. Everything<br />
is public. We have a price system,<br />
but we do not cut rates. We provide<br />
more services to customers. When<br />
31<br />
you compete in a market, you learn<br />
different sentiments. Some competitors<br />
will come and some will go.<br />
China is the most free market in the<br />
world. Investors have benefits. They<br />
do have privilege.<br />
In a surprising answer to a question<br />
from Mark Tarallo of Security<br />
Management Magazine regarding<br />
his personal style and philosophy,<br />
Mr Hu responded, “When we started,<br />
we were not prepared, but we<br />
had passion and learned a lot from<br />
the U.S. A lot of thoughts, passion<br />
and interpretation in a lot of areas.”<br />
He then expanded on his theme<br />
in answer to a question from Clare<br />
Meyer of Security Magazine, who<br />
had asked how citizenship fits in<br />
with Hikvision’s goals:<br />
“Hikvision is a commercial company,”<br />
said Mr. Hu, “and we focus on<br />
business success with four criteria,<br />
in this order:
“The First Partnership is with the<br />
customers, and how do we create<br />
competitive products for them;<br />
“The Second Partnership is the<br />
employees’ performance in fulfilling<br />
the mission of creating value for<br />
competitive products;<br />
“The Third Partnership is that the<br />
company gives respect to the employees<br />
and develops everyone into<br />
an international company. There are<br />
different laws and cultures that are<br />
different from country to country,”<br />
Mr. Hu pointed out. “But we have to<br />
make sure, he adds, that all employees<br />
are offered the same rewards<br />
and respect, while still following the<br />
laws and cultures of their countries.<br />
“The Shareholders are the Fourth<br />
Partner, and Hikvision has been<br />
paying dividends for shareholders<br />
for years, often as high as 48%<br />
of profits,” according to Mr Hu. But<br />
he still feels that the most important<br />
requisite to healthy dividends is<br />
when the employees and customers<br />
are happy. Corporate growth is the<br />
health of the company.<br />
Paul Ragusa, Editor of Security<br />
Systems News, asked Mr. Hu “What<br />
excites you about the company and<br />
its future,” to which Mr Hu responded,<br />
“We’re excited about the next ten<br />
years. We’re full of hope about this<br />
industry. Video – but not just in security<br />
– in many other areas, Robots<br />
for example. We’re developing automation,<br />
so there are lots of things to<br />
do. 50% of our brain is about new.”<br />
In a follow-up question from Ragusa<br />
about new products in the<br />
works, Mr Hu answered, “The traditional<br />
way was to compress. Now<br />
we upgrade. We recognize different<br />
algorithms. We use data. We have a<br />
new product ‘Black Light’ and we’re<br />
also demonstrating new developments<br />
in video. We’re learning artificial<br />
intelligence and its applications,<br />
using retail and learning a lot<br />
of about who is who.<br />
Since our publication Government<br />
Security News has a strong focus<br />
on transportation, as well as an<br />
annual Awards Program on Airport,<br />
Seaport, Border Security and Immigration,<br />
all of which are also core<br />
markets for Hikvision, our question<br />
to Mr. Hu was simply, “What new<br />
32<br />
products and technologies is Hikvision<br />
expecting to deliver in 2017<br />
in the Airport/Aviation, Maritime/<br />
Seaport, Railroad, Border Security<br />
and Immigration markets and as<br />
well as national Energy, Water, Gas<br />
and Oil Grids, and how are you<br />
dealing with Cybersecurity, which<br />
pertains to all of the technologies in<br />
which Hikvision is involved.”<br />
As expected, the response from<br />
Mr. Hu was very interesting and<br />
informative, starting off with Cybersecurity,<br />
which he agrees is a big<br />
challenge, not only for manufacturers,<br />
but also for integrators. “In 2014<br />
we established network security and<br />
cybersecurity to minimize impact<br />
of relation with companies working<br />
with integrators, not only in design,<br />
but also in firewalls if needed. We<br />
try to think from a user perspective.<br />
We need to understand the customer.<br />
We believe that success is 30%<br />
produced by technology and 70%<br />
by good management.”<br />
Mr Hu continued: “We’ve created<br />
improvements in airports, seaports<br />
and borders by adding facial recognition<br />
in airports and seaports and<br />
thermal products in borders, and<br />
our power grids are getting more<br />
secure because we’re now moving<br />
power lines underground. Hikvision<br />
is also using drones and providing<br />
training to integrators in dealing<br />
with forest fires and high towers set<br />
up long range, as strong drones may
e needed to deal high voltage grids<br />
and natural disasters.”<br />
“When we deal with customers,<br />
we need to think if we can do it. All<br />
requirements go to the R&D department,<br />
which collects and sorts out.<br />
We also have a customization department<br />
to build a technology base<br />
and then get feedback. Some products<br />
need changes in technology.<br />
Some changes are not in the present.<br />
We respond very quickly with<br />
our R&D.”<br />
“How about the engineers,” asked<br />
Ralph Jensen. “Are they smarter today?”<br />
“They are more energetic and<br />
more imaginative today. That’s an<br />
influence from American culture,”<br />
said Mr. Hu. “With all our own<br />
ideas and opinions, international<br />
economics brings common conclusions.<br />
We keep some traditions. But<br />
a lot of things will stay. Globalization<br />
is still here.”<br />
And then Ralph asked, “What do<br />
you think about the American Election?”<br />
Several of us later agreed that<br />
Mr. Hu’s answers to this question<br />
were a good example of his extraordinary<br />
ability to make his point very<br />
politely, sometimes so politely that<br />
you might not even understand the<br />
underlying meeting of what he had<br />
said. “Thoughts about the American<br />
election,” said Mr. Hu, “This election<br />
was different from what we<br />
thought it would be. The most developed<br />
county is showing a lack of<br />
confidence. The U.S. should be the<br />
one leading globalization. The U.S.<br />
has the best technology. The U.S.<br />
33<br />
should be more confident.<br />
“How is security developing in<br />
China?” he asked himself. “In earlier<br />
days people were inclined to<br />
obey. Now it’s different. Now people<br />
pursue what they want. They are<br />
more constructive.”<br />
There was some more talk about<br />
the potential of Big Data, Deep<br />
Learning Cameras, Analytics, Deep<br />
Intelligence and “The new era of<br />
Secure Data Technology”, and then<br />
the discussion was over. I can’t guarantee<br />
it, but I believe the rest of our<br />
team came to the pretty much the<br />
same conclusion that I did – that<br />
it was a very informative meeting,<br />
even if we may not have fully understood<br />
every subtlety that was<br />
embedded in Mr. Hu’s statements.<br />
Sign-up for Free <strong>GSN</strong><br />
Print/Digital Editions<br />
& Email Newsletters<br />
CLICK HERE
Researchers say coastal community<br />
stakeholders need to be involved to make<br />
their towns more resilient from storms<br />
MCLEAN, VA <strong>Nov</strong>. 29, 2016 –<br />
Coastal storms can cause surges,<br />
sea-level rise, and cyclone winds<br />
that devastate communities. But<br />
emergency management experts in<br />
a new study detail a method for involving<br />
local stakeholders in planning<br />
for such extreme events and<br />
thereby helping such vulnerable areas<br />
in becoming more resilient.<br />
Coastal communities’ ability to<br />
plan for, absorb, recover and adapt<br />
from destructive hurricanes is becoming<br />
more urgent. As of 2010,<br />
approximately 52 percent of the<br />
United States’ population lived in<br />
vulnerable coastal watershed counties,<br />
and that number is expected<br />
to grow. Globally, almost half of the<br />
world’s population lives along or<br />
near coastal areas.<br />
“In general, risk management has<br />
not been sufficiently focused on<br />
coastal resilience, with community<br />
stakeholders involved in the process<br />
of making their coastline, as<br />
a system, more resilient to coastal<br />
storms,” according to the study,<br />
“Enabling Stakeholder Involvement<br />
in Coastal Disaster Resilience Planning,”<br />
by George Washington University<br />
researchers Thomas Bostick,<br />
Thomas Holzer, and Shahryar Sarkani.<br />
Their study was published in<br />
the online version of Risk Analysis,<br />
a publication of the Society for Risk<br />
Analysis.<br />
“This research demonstrates<br />
a methodology for<br />
involving stakeholders<br />
in discussions that make<br />
their coastlines more resilient,”<br />
says Bostick. After<br />
disasters strike, local<br />
stakeholders are often surprised<br />
and frustrated with<br />
the damages inflicted on<br />
their communities and seek greater<br />
involvement in reducing risk. That<br />
frustration can be addressed by investing<br />
more in physical infrastructures<br />
to protect against flooding. But<br />
the needed infrastructure can be expensive,<br />
such as the $14.5 billion the<br />
U.S. Army Corps of Engineers was<br />
given to reinforce New Orleans after<br />
the 2005 destruction caused by<br />
Hurricane Katrina, an amount of<br />
federal support that most high risk<br />
areas are unlikely to receive.<br />
Recognizing that a methodology<br />
was missing for integrating<br />
34<br />
Thomas Bostick<br />
coastal stakeholders into the process<br />
of identifying and selecting of<br />
resilience-enhancing projects, the<br />
authors conducted a case study with<br />
data from a stakeholder meeting in<br />
Mobile Bay, Alabama, to demonstrate<br />
a method for engaging<br />
stakeholders over a<br />
longer period to identify<br />
what the group considered<br />
the community’s most significant<br />
critical functions<br />
and project initiatives to<br />
preserve those functions<br />
under different scenarios.<br />
Mobile Bay, Alabama’s<br />
only port for ocean-going ships and<br />
an entry point for smaller recreational<br />
and commercial vessels, has<br />
seen population growth and accompanying<br />
demand for housing, infrastructure<br />
development, and other<br />
changes that have impacted natural<br />
ecological systems. During tropical<br />
storms and hurricane events, Mobile<br />
Bay’s Eastern Shore is vulnerable<br />
to coastal erosion and sediment<br />
transfer into the bay.<br />
A workshop involving approximately<br />
30 participants was held in<br />
2015 at the National Oceanic and
Atmospheric Administration’s Disaster<br />
Response Center in Mobile,<br />
Alabama, to test methods to calculate<br />
resilience for the Mobile Bay<br />
region. Participating stakeholders<br />
worked with subject matter experts<br />
in systems engineering, coastal engineering,<br />
risk and decision analysis,<br />
and other fields to develop a set<br />
of proposed projects to address key<br />
resilience stages and domains.<br />
Resilience domains include the<br />
physical (built infrastructure as well<br />
as wetlands, dunes, and other natural<br />
features), information (policies,<br />
building codes, evacuation routes,<br />
and other materials), cognitive<br />
(human processes for sharing and<br />
acting upon knowledge to make,<br />
communicate, and implement decisions),<br />
and social (“interactions,<br />
organizations, people, and policies<br />
that influence how decisions are<br />
made,” such as government flood<br />
insurance, religions, cultures, and<br />
languages). “Coastal communities<br />
can improve resilience not only in<br />
the physical domain, but also in the<br />
information, cognitive and social<br />
domains,” says Bostick. The methodology<br />
described in the study is<br />
intended to support such improvements.<br />
Through the workshop, stakeholders<br />
generated 11 project initiatives,<br />
including, for example, reducing<br />
saltwater intrusion, environmental<br />
and coastal storm education, utility<br />
pole replacement, removing scrap<br />
metal, and reducing impervious<br />
surfaces. The subject matter experts<br />
aligned the initiatives with the four<br />
critical stages associated with resilience:<br />
preparing, absorbing, recovering,<br />
and adapting. Participants<br />
also identified a set of critical functions,<br />
such as telecommunication,<br />
electricity, housing, clean water, the<br />
tourism industry, and others.<br />
In reviewing the workshop results,<br />
the authors note that their study<br />
does not seek to measure whether<br />
a community or a coastline is resilient<br />
or not because there “is clearly<br />
no agreement on how this would<br />
be accomplished.” However, the<br />
methodology offers stakeholders<br />
an opportunity to understand the<br />
concept of resilience and scenarios<br />
and, based on this understanding,<br />
to make informed choices on how<br />
to improve the coastal resilience in<br />
their community. “This is a capability<br />
that does not currently exist,” the<br />
authors write.<br />
Risk Analysis: An International<br />
Journal is published by the nonprofit<br />
Society for Risk Analysis (SRA), an<br />
interdisciplinary, scholarly, international<br />
society that provides an open<br />
forum for all who are interested in<br />
risk analysis, a critical function in<br />
complex modern societies. Risk<br />
analysis includes risk assessment,<br />
risk characterization, risk communication,<br />
risk management, and risk<br />
policy affecting individuals, publicand<br />
private-sector organizations,<br />
and societies at a local, regional, national,<br />
or global level. www.sra.org<br />
35
Robin Systems continues to win laurels with two new<br />
TMC awards for IT excellence and Info Tech spotlight on<br />
big data as a service, making application-defined data<br />
center as a reality<br />
SAN JOSE, CA, <strong>Nov</strong>. 17, 2016<br />
(GLOBE NEWSWIRE) – Robin<br />
SystemsTM, the first Application-<br />
Defined Data Center software<br />
company, today announced that its<br />
Robin Containerization Platform<br />
has been recognized by Technology<br />
Marketing Corporation (TMC) via<br />
two of its prestigious awards, winning<br />
the Internet Telephony Magazine’s<br />
IT Excellence Award and the<br />
2016 InfoTech Spotlight Magazine’s<br />
Big Data as a Service Award.<br />
Each of these awards recognized<br />
nine companies and their products<br />
for excellence. Both awards recognized<br />
Robin for its applicationaware<br />
and Big Data-optimized<br />
converged infrastructure software<br />
among products from other industry-leading<br />
companies such as SAP.<br />
These two industry-leading<br />
awards programs add to the recognition<br />
Robin has already earned in<br />
2016, including its most recent honor<br />
of being named a finalist for Red<br />
36<br />
Herring’s 2016 Top Global Award.<br />
Robin has also earned the Golden<br />
Bridge Awards’ Gold Award, Red<br />
Herring Top 100, The Stevie Awards’<br />
New Software Product of the Year<br />
and Network Product Guide’s Startup<br />
of the Year.<br />
The IT Excellence Award recognizes<br />
the creators of technologies<br />
and solutions that demonstrate<br />
leadership and innovation in the<br />
industry while the 2016 Big Data as<br />
a Service Excellence Award, in particular,<br />
recognizes BDaaS solutions<br />
that help companies store and analyze<br />
data, enabling intelligent business<br />
decisions.<br />
”We congratulate Robin for its<br />
achievement in helping organizations<br />
create a world-class IT infrastructure,”<br />
said Rich Tehrani, chief<br />
executive officer of TMC. “Robin’s<br />
technology delivers the level of excellence<br />
in performance, flexibility<br />
and agility that businesses of all sizes<br />
are coming to find indispensible.<br />
I look forward to witnessing Robin’s<br />
continued success.”<br />
“We’re honored that TMC has recognized<br />
our Robin Containeriza-
tion Platform through these awards,<br />
underscoring our ability to help<br />
today’s enterprise fully transition<br />
to an infrastructure that is application<br />
defined and ready for digital<br />
business,” said CEO Premal Buch of<br />
Robin. “Robin aims to help enterprises<br />
set their data free by breaking<br />
down walls and complexities that<br />
often become an insurmountable<br />
impediment for many enterprises<br />
in fully harnessing data – their most<br />
critical asset. Our goal is to give<br />
them a quicker, simpler and more<br />
cost-effective route to ensure predictability,<br />
quality of service, greater<br />
performance, and access.”<br />
Tweet this @RobinSystems wins<br />
two 2016 awards from @TMCNet,<br />
IT Excellence and Infotech Spotlight<br />
Big Data as a Service http://bit.<br />
ly/2fe1XbG http://bit.ly/2fBG9oi<br />
The Robin Containerization<br />
Platform: Application-Centric IT<br />
infrastructure for Digital Enterprise<br />
Robin’s Containerization Platform<br />
unveils the era of Application-Defined<br />
Data Center, enabling IT professionals<br />
to dramatically simplify<br />
application deployment and lifecycle<br />
management while guaranteeing<br />
predicted Quality of Service for databases<br />
and Big Data applications. This<br />
also enables enterprises to achieve<br />
significant CAPEX and OPEX savings<br />
via application consolidation<br />
on shared hardware. Running on a<br />
customer’s own commodity hardware,<br />
the Robin Containerization<br />
Platform software pools the computing<br />
and storage resources across<br />
servers to create a containerized<br />
agile compute layer, where applications<br />
are deployed within containers.<br />
The container-aware scale-out<br />
block storage enables modern agile<br />
application lifecycle management,<br />
including snapshot and cloning of<br />
the entire application. Robin’s application-aware<br />
infrastructure fabric<br />
controller automates and marshals<br />
the compute and storage layers,<br />
thereby making the infrastructure<br />
completely transparent to the application<br />
owners and developers.<br />
Robin Containerization Platform<br />
helps users:<br />
• Virtualize databases (Oracle,<br />
NoSQL) and Big Data applications<br />
(Hadoop, Spark, Elastic Search, Kafka)<br />
with bare-metal performance.<br />
• Increase hardware utilization by<br />
a factor of 2x-3x by consolidating<br />
performance-sensitive applications<br />
with guaranteed performance and<br />
noisy-neighbor-induced performance<br />
hiccups.<br />
• Reduce database licensing cost<br />
by 50 percent or more through database<br />
consolidation.<br />
• Boost productivity by a factor of<br />
10x-100x for developers and DBAs,<br />
with capabilities such as 1-click cluster<br />
deployment, scale-up and scaleout,<br />
application snapshot, clone and<br />
time travel.<br />
For more details on the Robin<br />
37<br />
platform please visit robinsystems.<br />
com.<br />
About TMC<br />
Global buyers rely on TMC’s content-driven<br />
marketplaces to make<br />
purchase decisions and navigate<br />
markets. This presents branding,<br />
thought leadership and lead generation<br />
opportunities for vendors/sellers.<br />
TMC’s Marketplaces:<br />
• Unique, turnkey online communities<br />
boost search results, establish<br />
market validation and elevate<br />
brands and thought leadership,<br />
while minimizing ad-blocking.<br />
• Custom lead programs uncover<br />
sales opportunities and build databases.<br />
• In-person and online events<br />
boost brands, enhance thought<br />
leadership and generate leads.<br />
• Publications, display advertising<br />
and newsletters bolster brand reputations.<br />
• Custom content provides expertly<br />
ghost-crafted blogs, press releases,<br />
articles and marketing collateral<br />
to help with SEO, branding and<br />
overall marketing efforts.<br />
• Comprehensive event and road<br />
show management services help<br />
companies meet potential clients<br />
and generate leads face-to-face.<br />
For more information about TMC<br />
and to learn how we can help you<br />
More on page 51
Saab Seaeye Leoport ROV system delivered<br />
to Japan’s Kaiyo Engineering<br />
In a bid to master mountainous<br />
seas the Saab Seaeye Leopard ROV<br />
system recently delivered to Japan’s<br />
Kaiyo Engineering has added an active<br />
heave compensator (AHC) to<br />
its launch and recovery system.<br />
Kaiyo Engineering, a specialist<br />
marine science company, is undertaking<br />
seabed research for Tokyo<br />
University and is using the Leopard<br />
to explore the feasibility of seabed<br />
mining.<br />
Adding AHC means Kaiyo can<br />
work offshore more easily in high<br />
sea states, as the AHC system will<br />
accurately maintain the exact relative<br />
depth of the tether management<br />
system from which the Leopard is<br />
deployed by compensating for wave<br />
movement and effectively creating a<br />
motionless state between them. This<br />
significantly increases the ease of<br />
Log file of winch response during tests in Japan. The green curve shows the vessel heave at the<br />
LARS and the orange curve the actual response of the winch. The harmonious relationship between<br />
both curves illustrates how the AHC’s millisecond response to displacement achieves accurate compensation.<br />
ROV operations in high sea states.<br />
The highly advanced AHC system<br />
from Scantrol is designed to maintain<br />
accurate position control at the<br />
winch in real time by calculating<br />
and compensating for any displacement<br />
of the vessel caused by wave<br />
movement. Increased operational<br />
time, safety, ease of use and efficient<br />
commissioning is the main focus of<br />
Scantrol AHC.<br />
With the knowledge from simulations<br />
and tests performed prior<br />
to the commissioning, the LARS<br />
system was upgraded on board the<br />
vessel by Hydramec and Scantrol in<br />
only three days.<br />
In Japan the system was tested to<br />
38<br />
record winch response and winch<br />
speed, by simulating 3m vessel displacement<br />
down to the Leopard’s<br />
3000 metre rated depth.<br />
The 3000m rated Leopard is the<br />
most powerful electric underwater<br />
robotic work system in the world,<br />
making it ideal for complex and demanding<br />
tasks.<br />
Saab Seaeye is the world’s leading<br />
underwater e-robotics company<br />
with the most advanced range of<br />
tethered, autonomous and hybrid<br />
robotic systems engineered to address<br />
the diverse range of tasks<br />
found across commercial, defence<br />
More on page 52
CA Technologies strengthens security portfolio with new<br />
advanced analytics and Identity-as-a-Service offerings to<br />
protect and enable the agile enterprise<br />
Mordecai Rosen<br />
LAS VEGAS, <strong>Nov</strong>. 16, 2016 – CA<br />
WORLD ’16 – CA Technologies<br />
today announced a new behavior<br />
analytics solution that integrates<br />
with CA Privileged Access Manager<br />
(PAM). Called CA Threat Analytics<br />
for PAM, the product features machine-learning<br />
capabilities for better<br />
threat detection and breach prevention<br />
associated with privileged<br />
users. CA also announced CA Identity<br />
Service, a new, turn-key identity-as-a-service<br />
solution, to address<br />
identity and access management<br />
(IAM) needs for both on-premises<br />
and cloud-based applications.<br />
“By applying CA’s unmatched<br />
self-learning behavior analytics to<br />
privileged user activity, CA can help<br />
CISOs with their biggest challenge:<br />
staying one step ahead of the bad<br />
actors,” said Mordecai Rosen, senior<br />
vice president and general<br />
manager, CA Security<br />
business. “Going beyond<br />
protection, CA is extending<br />
secure business operations<br />
with CA Identity<br />
Service to support deeply<br />
embedded on-premises<br />
systems while taking advantage<br />
of the agility of cloud applications<br />
and services.”<br />
Setting New Standards in Threat<br />
Detection, Breach Prevention and<br />
IDaaS for Hybrid IT Environments<br />
Available today, CA Threat Analytics<br />
for PAM models privileged user<br />
behavior and evaluates risk based<br />
on factors such as a user location,<br />
time and duration of activity, the<br />
data being accessed and the user’s<br />
track record for security and past<br />
behavior. When a breach or threat is<br />
detected, the system automatically<br />
triggers controls to mitigate risks,<br />
such as starting session recording,<br />
initiating a stronger authentication<br />
procedure or alerting security system<br />
and operations.<br />
In a recent global survey conducted<br />
by Coleman Parkes for CA,<br />
82 percent of respondents<br />
said identity-centric security<br />
is critical to the business.*<br />
CA Identity Service<br />
addresses the need for<br />
a modern, hybrid IAM solution<br />
– giving businesses<br />
the agility to quickly and<br />
securely adopt cloud ap-<br />
39<br />
plications and services alongside<br />
their on-premises applications<br />
controlled by CA Single Sign-On,<br />
managing everything from a single<br />
launch pad. CA Identity Service balances<br />
the demand for security, agility<br />
and a positive user experience.<br />
“We see our customers’ businesses<br />
moving increasingly to a hybrid IT<br />
environment. It’s clear we need to<br />
help them with an identity and access<br />
management solution that supports<br />
both their cloud-based and<br />
on-premises applications,” said Ed<br />
Pascua, senior vice president at Simeio<br />
Solutions. “CA Identity<br />
Service offers the flexibility and<br />
management we need to meet the<br />
demands of our customers’ hybrid<br />
enterprise. CA’s Identity Service is<br />
an excellent tool that helps Simeio<br />
More on page 52
U.S. and Canada bring Homeland Security<br />
solutions to Milipol Qatar<br />
DOHA, QATAR and WALDWICK,<br />
NJ — In the Middle East, as populations<br />
and infrastructure grow,<br />
public and private stakeholders are<br />
looking for new ways to protect<br />
people and property. With solutions<br />
ranging from large-scale homeland<br />
security strategies to risk-specific<br />
equipment, products and services,<br />
leading suppliers from the United<br />
States and Canada competed for defense<br />
and security business at Milipol<br />
Qatar earlier this year in Doha,<br />
Qatar.<br />
The centerpiece of the effort was<br />
the North American Pavilion, organized<br />
by Kallman Worldwide, Inc.,<br />
the show’s official representative to<br />
the continent, in coordination with<br />
numerous government agencies,<br />
including the U.S. departments of<br />
Commerce, Defense and State and<br />
their Canadian counterparts. The<br />
Pavilion was a primary destination<br />
for buyers looking to meet industry<br />
leaders, an on-site business hub for<br />
North American exhibitors looking<br />
to maximize their exposure and impact<br />
at the event, and a forum for all<br />
to share industry information and<br />
insights.<br />
Ranging from publicly-traded<br />
stalwarts such as General Dynamics<br />
(NYSE: GD) Land Systems Canada<br />
and Raytheon (NYSE: RTN) to privately<br />
held small-and-mediumsized<br />
enterprises (SMEs) with fewer<br />
than 250 employees, Pavilion exhibitors<br />
looked to initiate or strengthen<br />
international partnerships that will<br />
generate new business and create<br />
more jobs back home.<br />
According to the Ministry of the<br />
Interior of Qatar, 11 contracts worth<br />
a total of 260.050 Million and fifty<br />
thousand Qatari Riyal were signed<br />
at the event.<br />
“When North American companies<br />
commit to exhibit at Milipol<br />
Qatar, we’re saying we believe in the<br />
power of this event to attract real<br />
business prospects and customers,”<br />
said Kallman Worldwide President<br />
and CEO, Tom Kallman. “As the dynamics<br />
of life in the Middle East inspire<br />
new strategies for defense and<br />
security, we’re proud to work with<br />
the Milipol organizers to help our<br />
exhibitors succeed in Qatar, whether<br />
as prime contractors or subcontractors<br />
in support of regional<br />
manufacturers, service partners and<br />
their end-user customers.”<br />
Kallman pointed to two companies<br />
that exemplify the wide range<br />
of solutions presented at the Pavil-<br />
40<br />
ion:<br />
• Passport Systems (Booth K-030)<br />
develops advanced active and passive<br />
solutions to rapidly and automatically<br />
detect, localize and<br />
identify concealed threats and contraband<br />
for a broad range of applications,<br />
including pedestrian-,<br />
vehicle-, and fixed-facility-based<br />
approaches. The company was recently<br />
presented with the Massachusetts<br />
Port Authority (Massport)<br />
Security Innovation Award from<br />
U.S. Senator Edward Markey, who<br />
thanked company CEO, Dr. Robert<br />
Ledoux and his team for creating, “a<br />
truly remarkable cargo inspection<br />
system capable of detecting potentially<br />
dangerous material and other<br />
contraband.<br />
• Canadian manufacturer Newcon<br />
Optik (Booth L-029) had its<br />
sights set on new business — literally<br />
— with a number of innovative<br />
gunsights and accessories including:<br />
n The SEEKER Series of mountable<br />
laser rangefinders are versatile,<br />
lightweight and MIL-SPEC<br />
modules capable of being boresighted<br />
to practically any optical<br />
system, including spotting<br />
scopes, binoculars, and thermal
imagers, as well as mounted onto<br />
rifles and integrated into complex<br />
fire control systems.<br />
n NVS 27M is an exceptionally<br />
lightweight and versatile Gen 3<br />
night vision clip-on is rugged,<br />
compact and durable.<br />
n LRM 3500M, a MIL-SPEC,<br />
pocket-sized laser rangefinder<br />
monocular that’s designed to<br />
outperform other devices of its<br />
class.<br />
“In an increasingly dangerous<br />
world, security is a growth market,<br />
and competition lurks around every<br />
corner,” said Kallman. “From surveillance<br />
and weapons to equipment<br />
and training, our North American<br />
exhibitors are bringing exceptional<br />
innovation, ideas and experience to<br />
Milipol Qatar.”<br />
About Kallman Worldwide, Inc.<br />
Export with purpose. Exhibit with<br />
confidence. Kallman Worldwide is<br />
an export marketing advocate focused<br />
on helping the United States<br />
of America and its leading businesses<br />
capitalize on international<br />
trade shows and events to grow<br />
their share of global markets. Our<br />
flagship International Pavilion programs<br />
cover all the details of creating<br />
and presenting a professional<br />
business environment to buyers, enabling<br />
exhibitors, clients and partners<br />
to make the most of their event<br />
opportunities, cultivate meaningful<br />
global business relationships and<br />
account for a measurable return on<br />
their export marketing investment.<br />
Since 1963, Kallman has helped<br />
more than 10,000 companies, as-<br />
41<br />
sociations and government agencies<br />
stand out at nearly 1,000 industry<br />
and professional events in 46 countries.<br />
The company is a strategic<br />
partner of the U.S. Department of<br />
Commerce, and a proud recipient of<br />
the President’s “E” Award. In 2016,<br />
Kallman Worldwide was honored<br />
to receive the AmCham Abu Dhabi<br />
“Falcon” Award for its organizationwide<br />
commitment to building sustainable<br />
business relationships between<br />
the U.S. and the U.A.E. The<br />
company recently joined the Bilateral<br />
US-Arab Chamber of Commerce<br />
in support of the Chamber’s<br />
mission to foster economic growth,<br />
educational advancement and mutual<br />
respect between the U.S. and<br />
the MENA region. For more information<br />
visit www.kallman.com
Salient CRGT appoints Joseph Zimmerman as<br />
Vice President, Enterprise Solutions Group<br />
FAIRFAX, VA, <strong>Nov</strong>ember 22,<br />
2016 – Salient CRGT, Inc., a<br />
leading provider of Agile software<br />
development, data analytics,<br />
mobility, cyber security,<br />
and infrastructure solutions,<br />
today announced the addition<br />
of Joseph Zimmerman as Vice<br />
President, Enterprise Solutions<br />
Group (ESG). He will lead Salient<br />
CRGT’s delivery oversight<br />
at the U.S. Postal Service and other<br />
strategic accounts, with additional<br />
responsibilities in business development<br />
in new customer capture,<br />
including expansion into the Department<br />
of Defense, and propelling<br />
Salient CRGT’s market leading<br />
solutions in Agile and mobile development.<br />
Mr. Zimmerman is a military<br />
veteran with more than 20 years of<br />
active duty experience as an officer<br />
in the United States Marine Corps<br />
where he served as Company Commander<br />
and Operations Officer. As<br />
a proven leader, he brings 28 years<br />
of successful management experience<br />
and a track record of superior<br />
results in growing organizations<br />
both organically and through new<br />
opportunities.<br />
“With his depth and breadth of<br />
demonstrated achievement, Joe’s<br />
entrepreneurial leadership and extensive<br />
background in operations,<br />
business development and strategy<br />
will be invaluable to our business<br />
development team and our customers,”<br />
said Tom Ferrando, President<br />
of Salient CRGT. “We look forward<br />
to his immediate contribution that<br />
will further define our strategic focus<br />
in Salient CRGT’s market leading<br />
solutions in Agile and mobile<br />
delivery, as well as expansion in our<br />
service to military and other government<br />
customers.”<br />
Before joining Salient CRGT, Mr.<br />
Zimmerman was the Chief Operating<br />
Officer for Pyramid Systems,<br />
where he was responsible for overall<br />
corporate strategy and day-today<br />
management across operations,<br />
business development, contracts,<br />
human resources, security, corporate<br />
IT, and facilities. With more<br />
42<br />
than 100 employees and revenue<br />
in excess of $25 million, he established<br />
their first ever comprehensive<br />
business plan and was<br />
able to bring key leadership into<br />
operations and human resources.<br />
Prior to joining Pyramid, he<br />
held several progressive leadership<br />
positions at InfoReliance<br />
Corporation, eventually becoming<br />
their Executive Vice President<br />
of Operations. During the course<br />
of his tenure, he came to lead the<br />
company’s entire services portfolio<br />
including software engineering, cyber<br />
security, cloud computing, and<br />
enterprise IT capability areas to include<br />
customers in the defense, civilian<br />
and commercial sectors.<br />
“We are proud to bring Joe on<br />
board as we continue to meet the<br />
demanding mission critical needs of<br />
our customers,” said Manoj Gandhi,<br />
Senior Vice President ESG. “As we<br />
expand in to new military markets,<br />
his experience and strong relationships<br />
with the Marine Corps will<br />
enhance our future endeavors.”<br />
Mr. Zimmerman retired from the<br />
Marine Corps in 2007 and received<br />
five personal awards including the<br />
Meritorious Service Medal, Joint<br />
More on page 52
Energetiq introduces EQ-77, its 5th generation, ultra-bright,<br />
Laser-Driven Light Source (LDLS )<br />
WOBURN, MA, <strong>Nov</strong>ember 29,<br />
2016 – Energetiq Technology, a<br />
world leader in high brightness,<br />
broadband light sources for advanced<br />
technology applications, introduces<br />
the 5th generation, ultrabright,<br />
Laser-Driven Light Source,<br />
the EQ-77, at the MRS Fall Exhibit<br />
2016.<br />
Based on the highly successful<br />
Laser-Driven Light Source (LDLS)<br />
technology, the EQ-77 offers higher<br />
radiance and irradiance from a<br />
truly broadband white light source.<br />
The EQ-77 features a compact lamp<br />
house, with clean construction that<br />
ensures long life and ultimate stability.<br />
With a wavelength range<br />
from 170nm in the deep ultraviolet<br />
to >2µm in the near infrared,<br />
and a choice of dual-beam output<br />
or a single-beam output with retroreflector,<br />
the EQ-77 is flexible for a<br />
broad variety of applications.<br />
“The EQ-77 is the most advanced<br />
DUV-NIR light source on the market<br />
today,” said Debbie Gustafson,<br />
CEO of Energetiq. “As our 5th-generation<br />
of LDLS, it incorporates<br />
our latest technologies to deliver the<br />
ultimate in stable, long-life, broadband,<br />
ultra-bright performance for<br />
our customers in semiconductor<br />
and optical sensor metrology, advanced<br />
spectroscopy, photo emission<br />
and imaging applications.”<br />
EQ-77 LDLS Features:<br />
• Higher spectral radiance: Greater<br />
than 40mW/mm2.sr.nm<br />
• Compact, ultra-clean lamp house<br />
with integrated laser<br />
• Flexible optical interface: dual<br />
beam or enhanced output single beam<br />
• Designed for 24/7/365 operation<br />
• Low noise, 2µm (UV-Vis-NIR). Combined<br />
43<br />
with 10X the lifetime of traditional<br />
xenon and deuterium lamps, the<br />
LDLS products enable higher performance<br />
metrology, spectroscopy,<br />
and imaging applications at lower<br />
cost of ownership.<br />
The LDLS series received the prestigious<br />
R & D 100 Award in 2011 for<br />
its technological significance, and a<br />
2011 Prism Award for Photonics Innovation.<br />
About Energetiq<br />
Energetiq Technology is the world’s<br />
leading developer and manufacturer<br />
of ultra-bright broadband<br />
light sources for a wide variety of<br />
advanced applications in life and<br />
materials sciences, semiconductor<br />
manufacturing, and R&D. Energetiq’s<br />
light sources are based on<br />
a revolutionary laser-driven light<br />
source technology that generates<br />
high brightness across the spectrum,<br />
with high reliability and long<br />
operating life in a compact package.<br />
More information about Energetiq is<br />
available at www.energetiq.com.
Selfies: A new weapon against public<br />
assistance fraud<br />
By Monty Faidley<br />
One downside in moving public assistance<br />
programs into the digital<br />
world has been the loss of face-toface<br />
contact between citizens and<br />
government agencies. Previously,<br />
validating the identities of beneficiaries<br />
wasn’t an issue because government<br />
employees could see who<br />
they were talking to, but this<br />
has clearly changed.<br />
While no one is ommending a return<br />
recto<br />
old ways of doing<br />
business, identity<br />
fraud has become a<br />
serious and grow-<br />
ing threat to the integrity<br />
of Health and Human<br />
Services (HHS) programs. Last<br />
year taxpayers lost more than $100<br />
billion from public assistance programs<br />
due to fraud and improper<br />
payments. And, based on what I’ve<br />
heard from law enforcement and<br />
witnessed in my experience working<br />
with government customers,<br />
much of it stemmed from organized<br />
criminal groups – both foreign and<br />
domestic – who sell stolen identity<br />
information on the “dark web,”<br />
which is often used to commit fraud<br />
against HHS agencies.<br />
It is an alarmingly easy criminal<br />
enterprise that has increased dramatically<br />
since government services<br />
went online. Criminals often<br />
use stolen identities for robbing tax<br />
refunds, medical benefits, unemployment<br />
insurance benefits, death<br />
benefits and other public assistance<br />
programs. The people hurt<br />
the most are the disad-<br />
vantaged<br />
Americans<br />
who truly need the<br />
safety nets.<br />
HHS agencies ur-<br />
gently need to adopt<br />
new multi-layer secu-<br />
rity models of authen-<br />
ticating users to prevent<br />
fraudulent manipulation of<br />
their programs. The current norm<br />
of requiring only single-layer authentication<br />
such as passwords or<br />
PINS is woefully inadequate. Multiple<br />
layers of strong authentication<br />
are needed to withstand the<br />
constantly evolving nature of fraud<br />
schemes.<br />
The good news is that the ubiquity<br />
of smartphones combined with<br />
biometric-based security technolo-<br />
44<br />
gies like fingerprint scanning and<br />
facial recognition offer HHS agencies<br />
a powerful new authentication<br />
weapon to combat identity fraud.<br />
One promising idea is using<br />
smartphone “selfies” as part of a<br />
multi-layer approach for verifying<br />
and authenticating beneficiary<br />
identities. A new generation of<br />
smartphone apps are emerging that<br />
could help agencies validate identities<br />
with the near-reliability of faceto-face<br />
contact.<br />
We’re already seeing it deployed<br />
in the commercial world. Earlier<br />
this year, MasterCard launched its<br />
“Selfie pay” service that lets consumers<br />
use selfies to authenticate<br />
online purchases. And today, free<br />
apps such as Identity Snapshot are<br />
emerging on the iTunes Store specifically<br />
designed to authenticate<br />
identities for any number of government<br />
services.<br />
Since no single database of peoples’<br />
faces currently exist (outside of<br />
state motor vehicle departments) for<br />
running massive facial recognition<br />
queries, apps like these will initially<br />
work in conjunction with identity<br />
documents like driver licenses and<br />
state IDs to correlate the selfie with
other information.<br />
Here’s a typical example: Beneficiaries<br />
first enter their identity information<br />
on their smartphones,<br />
then photo-capture an identity<br />
document like a driver license in<br />
the same way mobile banking deposit<br />
apps capture images of checks.<br />
Next, a selfie image is captured and<br />
presented alongside the identity<br />
document for visual verification.<br />
The agency’s data records verify if<br />
the person exists and that the data<br />
they provided matches their own.<br />
The apps can also verify that the<br />
mobile device or the user’s identity<br />
is not associated with previous<br />
fraud attempts. They can be configured<br />
to determine if the IP address<br />
is outside the U.S., or if the Social<br />
Security number has been used on<br />
multiple applications. The apps can<br />
also generate a one-time identity<br />
quiz or a one-time password for access.<br />
These multiple layers can on the<br />
smartphone front-end can also be<br />
reinforced on the back-end by leveraging<br />
identity repositories to further<br />
ensure that people applying<br />
for benefits are indeed who they<br />
claim to be. And when beneficiary<br />
data is shared between states,<br />
authentication is even more<br />
powerful. States can better identify<br />
fraudsters who move their criminal<br />
activities from one state to another.<br />
Wrapping up<br />
Using selfies as part of a multi-layer<br />
identity authentication approach<br />
has one huge advantage: it’s easy<br />
and people are comfortable with it.<br />
A majority of U.S. adults now sport<br />
smartphones, and the vanity-inducing<br />
nature of social media has made<br />
posting selfies part of the cultural<br />
fabric. It offers less “friction” when<br />
it comes to widespread user adoption.<br />
As identity fraud in benefits programs<br />
increases, agencies can maintain<br />
program integrity by using<br />
selfie-driven multi-layered authen-<br />
45<br />
tication to verify beneficiary identities<br />
and keep the crooks at bay.<br />
Agencies should also consider expanding<br />
beyond traditional departmental<br />
data to leverage information<br />
from other government agencies<br />
and third-party external sources. It<br />
is perhaps our best option for bringing<br />
back the reliability of face-toface<br />
engagement with beneficiaries.<br />
Monty Faidley is Director of Health<br />
and Human Services and Special<br />
Investigative Unit with LexisNexis<br />
Risk Solutions. He may be reached at<br />
monty.faidley@lexisnexis.com.
ITL Group and Applied DNA Sciences partner to<br />
develop anti-counterfeit ‘SigNature ® DNA’ printed<br />
fabric label solution<br />
STONY BROOK, NY, <strong>Nov</strong>ember<br />
22, 2016 – The ITL Group, an international<br />
apparel label solutions<br />
company owned by SA Bias Industries,<br />
has today announced a partnership<br />
with Applied DNA Sciences<br />
(Applied DNA) (NASDAQ:APDN),<br />
a provider of DNA-based supply<br />
chain, anti-counterfeiting and anti-theft<br />
technology, product genotyping<br />
and product authentication<br />
solutions to marry Applied DNA’s<br />
revolutionary SigNature® DNA forensic<br />
marking system with ITL’s<br />
printed fabric care labels to support<br />
global apparel and footwear brands<br />
and retailers in their on-going battle<br />
against product counterfeiters.<br />
Applied DNA has demonstrated<br />
feasibility of SigNature DNA forensic<br />
authentication and Beacon optical<br />
screening technology integrated<br />
with ITL’s wet ink solution for<br />
fabric care labels, creating a multilayer<br />
anti-counterfeit solution. The<br />
technology is intended to be applied<br />
to printed fabric labels (PFL), either<br />
via the supply of a stand-alone PFL<br />
or through integration of their existing<br />
washcare labels. Further testing<br />
and development<br />
is required to validate<br />
through the product<br />
lifecycle prior to general<br />
market availability,<br />
with an interest by<br />
ITL to conduct further<br />
trials on their range of<br />
heat transfer labels. A solution is<br />
expected to launch in the near future.<br />
ITL’s European Sales and Marketing<br />
Director, Simon Phelps commented.<br />
“Counterfeiting continues<br />
to be one of the most significant<br />
problems within our industry and<br />
accounts for around 10% of global<br />
GDP. The growth of on-line popup’s<br />
selling full price fakes has only<br />
exacerbated the issue in recent years<br />
and new research has shown that<br />
now for every one consumer who<br />
knowingly buys a counterfeit product,<br />
there are another 30 or so who<br />
purchase unwittingly.”<br />
Applied DNA designs and formulates<br />
the DNA with Beacon-encrypted<br />
fluorescence in ITL ink at<br />
their US Laboratories. The botanically-derived<br />
DNA delivers 100%<br />
46<br />
individuality, forming the basis of<br />
unquestionable evidence of authenticity<br />
for any brand seeking to bring<br />
a prosecution against a found counterfeiter<br />
of labels.<br />
Whilst the SigNature DNA authenticity<br />
tests can be verified forensically<br />
in the field or on site or<br />
in the Applied DNA laboratories,<br />
the integration of Beacon technology<br />
provides the means for brands<br />
to conduct their own ‘rapid read’<br />
checks on suspected items in the<br />
field.<br />
“What excites us most about our<br />
solution is that whilst the application<br />
of Applied DNA’s SigNature<br />
DNA makes it completely secure<br />
and uniquely identifiable, the breakthrough<br />
is in the Beacon which<br />
is completely hidden until it’s unlocked<br />
by the reaction to the chemi-
cals built into the swab,” stated Simon<br />
Phelps.<br />
A proprietary chemical compound<br />
placed within the ink, which<br />
is completely invisible under normal<br />
or ultraviolet lighting conditions<br />
illuminates only when rubbed<br />
with a specific swab device that will<br />
be supplied by ITL to the brands.<br />
This reaction produces the ‘Beacon’<br />
illumination effect on the end of the<br />
swab which is then detected when<br />
shone with a UV torch. In effect,<br />
a ‘lock and key’ solution is created<br />
for field screening of the SigNature<br />
DNA mark to support forensic DNA<br />
authentication conducted remotely.<br />
“As a result, brand inspectors are<br />
able to make quick checks without<br />
receiving unwanted attention and<br />
can tell instantly if the product is<br />
marked with SigNature DNA. The<br />
beauty of the solution is that whilst<br />
the science behind it makes it the<br />
most credible anti-counterfeit application<br />
available, the cost of integrating<br />
it into a printing process is<br />
relatively low and therefore makes it<br />
immediately affordable for a brand<br />
to implement.” added Simon Phelps.<br />
Tony Benson, Applied DNA Managing<br />
Director, EMEA agrees “We<br />
have perfected the capabilities of<br />
our SigNature® DNA and Beacon<br />
technologies for a wide range of<br />
authentication applications in print<br />
and packaging and we are delighted<br />
to partner with ITL on this project<br />
as it adds yet one more tool to help<br />
protect consumer goods in a cost effective,<br />
globally available solution.<br />
ITL’s capabilities in that regard are<br />
class leading”.<br />
About ITL<br />
ITL is a global provider of Apparel<br />
Label Solutions, supporting<br />
brands, retailers and manufacturers<br />
all around the world with a comprehensive<br />
range of products and<br />
services aimed at optimising brand<br />
identity and supply chain performance.<br />
The group owns widespread printing<br />
and weaving operations across<br />
a number of key needlepoint locations<br />
including China, Bangladesh,<br />
India, Sri Lanka, Vietnam, Turkey,<br />
Mexico and South Africa.<br />
With over 30 years’ experience,<br />
the company supplies some of the<br />
best known names in the industry<br />
with a wide range of products including<br />
wash-care labels, woven labels,<br />
variable data tags and stickers,<br />
promotional hang tags and packaging,<br />
heat transfers, brand protection<br />
and RFID solutions.<br />
www.itl-group.com<br />
About Applied DNA Sciences<br />
We make life real and safe by providing<br />
botanical-DNA based securityand<br />
authentication solutions<br />
and services that can help protect<br />
products, brands, entire supply<br />
47<br />
chains, and intellectual property of<br />
companies, governments and consumers<br />
from theft, counterfeiting,<br />
fraud and diversion. Our patented<br />
DNA-based solutions can be used to<br />
identify, tag, track, and trace products,<br />
to help assure authenticity,<br />
traceability and quality of products.<br />
SigNature® DNA describes the platform<br />
ingredient that is at the heart<br />
of a family of uncopyable, security<br />
and authentication solutions such<br />
as SigNature® T and fiberTyping®,<br />
targeted toward textiles and apparel,<br />
DNAnet®, for anti-theft and<br />
loss prevention, and digitalDNA®,<br />
providing powerful track and trace.<br />
All provide a forensic chain of evidence,<br />
and can be used to prosecute<br />
perpetrators. We are also engaged<br />
in the large-scale production of specific<br />
DNA sequences using the polymerase<br />
chain reaction.<br />
Go to adnas.com for more information,<br />
events and to learn more about<br />
how Applied DNA Sciences makes<br />
life real and safe. Common stock<br />
listed on NASDAQ under the symbol<br />
APDN, and warrants are listed under<br />
the symbol APDNW.
3M Passport Reader Makes<br />
Waves in New Market<br />
Whether sailing the seven seas or<br />
island-hopping in the Caribbean,<br />
a cruise is meant to be a relaxing<br />
getaway. Travelers look forward to<br />
spectacular ocean views, five-star<br />
restaurants and exotic ports of call –<br />
but dread the thought of long lines<br />
waiting to board the ship.<br />
Knowing that wait times can significantly<br />
affect patron experience, a<br />
major cruise line recently partnered<br />
with 3M to help cruise-goers board<br />
more quickly and efficiently – while<br />
still complying with security regulations<br />
governing the travel industry.<br />
Faster passenger processing for<br />
more hassle-free boarding<br />
When it comes to boarding thousands<br />
of passengers in just a few<br />
hours, every second counts. Typically,<br />
the boarding experience begins<br />
with validating and scanning<br />
a passenger’s passport, before then<br />
having to process the data. The<br />
3M AT9000 MK2 full page document<br />
reader captures the necessary<br />
details and cuts down the passport<br />
review time, ensuring a speedy,<br />
hassle-free boarding and disembarkation<br />
process. Organizations can<br />
now have convenience, efficiency,<br />
and security.<br />
Regulation-compliant solution<br />
meets security requirements<br />
Cruise lines with global fleets must<br />
comply with varying local regulatory<br />
and security requirements, making<br />
the need for a standardized solution<br />
imperative.<br />
Designed to meet strict regulatory<br />
requirements, 3M document readers<br />
can be found at border crossings<br />
around the world and are well<br />
regarded by commercial and government<br />
entities including airlines,<br />
customs and border patrol, and<br />
homeland security.<br />
With one of the fastest, most accurate<br />
read rates available, the 3M<br />
AT9000 MK2 full page document<br />
reader deployed by the cruise line<br />
efficiently reads ICAOcompliant<br />
passports and RFID chips in e-<br />
48<br />
passports. Best of all, it can store<br />
the information to be processed at<br />
a later date. The direct benefit is that<br />
passengers spend less time waiting<br />
in line, allowing them more time to<br />
enjoy their vacation.<br />
Customized authentication<br />
software speeds integration<br />
3M worked with document verification<br />
provider AssureTec to tailor<br />
the accompanying authentication<br />
software, which allowed the new<br />
passport scanning solution to integrate<br />
with the cruise line’s existing<br />
infrastructure. This customization<br />
sped up the installation, meeting<br />
the time-sensitive project requirements<br />
and avoiding a substantial<br />
technology upgrade on the part of<br />
the customer.<br />
With the system in place, this<br />
global cruise line reports meeting<br />
new and emerging regulatory requirements,<br />
better preparing them<br />
for future needs. This, along with a<br />
more efficient boarding process creates<br />
a winning solution for not only<br />
passenger experience, but also the<br />
cruise line.<br />
3M document readers and authentication<br />
software continue to<br />
make waves in the travel industry<br />
as secure, efficient solutions for<br />
processing passengers and meeting<br />
regulatory requirements.
A “Know your rights” refresher for Immigrants<br />
By Joshua Breisblatt<br />
President-Elect Donald Trump has<br />
proposed immigration policies that<br />
are causing anxiety among immigrants<br />
and the immigrant rights<br />
community. Much remains unknown<br />
about how and when these<br />
changes will come but our system of<br />
checks and balances as well as pushback<br />
from the immigrant rights<br />
community will ensure that there<br />
will be limits on what the President-<br />
Elect can do. Regardless, it is always<br />
important for immigrants to understand<br />
their rights.<br />
As a reminder to immigrant communities,<br />
the National Immigration<br />
Law Center released a helpful guide<br />
this week which explains what individuals<br />
should do if they encounter<br />
law enforcement or Immigration<br />
and Customs Enforcement (ICE)<br />
officials.<br />
The reminders include:<br />
• You have the right to remain silent.<br />
You may refuse to speak to immigration<br />
officers.<br />
• Do not open your door (ICE<br />
must have a warrant signed by a<br />
judge to enter).<br />
• You have the right to speak to a<br />
lawyer.<br />
• Before you sign anything, talk to<br />
a lawyer.<br />
• Always carry with you any valid<br />
immigration document you have.<br />
• If you are worried that ICE will<br />
arrest you, let the officer know if you<br />
have children.<br />
• Carry a “know-your-rights card”<br />
and show it if an immigration officer<br />
stops you.<br />
NILC’s “Know Your Rights” guide<br />
also provides tips on where to find<br />
legal help assistance including www.<br />
AILAlawyer.org. They explain how<br />
to report raids and arrests in your<br />
community and recommend everyone<br />
come up with a safety plan<br />
in case an enforcement action takes<br />
place in your workplace or community.<br />
A safety plan should include having<br />
the number of a friend memorized,<br />
telling that friend where they<br />
can find your important documents<br />
including your “A-number,” and<br />
49<br />
putting a plan in place for your children’s<br />
care in case you are detained.<br />
It’s also important to avoid “ notaries”<br />
and other unethical people<br />
who make promises about immigration<br />
relief that are fraudulent or that<br />
they cannot deliver on. Continuing<br />
to pay attention to non-profit immigrant<br />
service providers is important<br />
to ensure you receive up-to-date information<br />
on any changes in immigration<br />
policy.<br />
The next few years may be a challenging<br />
time for the immigrant<br />
community. However, it’s important<br />
to educate ourselves and our loved<br />
ones and to continue to stand together.
HID Global announces<br />
one of the world’s most secure<br />
Citizen ID Cards<br />
Continued from page 5<br />
Irish Passport Card is the first and<br />
only passport card deployed in Europe<br />
for border crossing and has been<br />
recognized for its innovative design.<br />
For more HID Global news, visit<br />
our Media Center, read our Industry<br />
Blog, and follow us on Facebook and<br />
Twitter.<br />
About HID Global<br />
HID Global is the trusted source for<br />
innovative products, services, solutions,<br />
and know-how related to the<br />
creation, management, and use of<br />
secure identities for millions of endusers<br />
around the world. The company’s<br />
served markets include physical<br />
and logical access control, including<br />
strong authentication and credential<br />
management; card printing and<br />
personalization; visitor management<br />
systems; highly secure government<br />
and citizen ID; and identification<br />
RFID technologies used<br />
in animal ID and industry and logistics<br />
applications. The company’s<br />
primary brands include ActivID®,<br />
EasyLobby®, FARGO®, IdenTrust®,<br />
LaserCard®, Lumidigm®, Quantum<br />
Secure, and HID®. Headquartered in<br />
Austin, Texas, HID Global has over<br />
2,700 employees worldwide and operates<br />
international offices that support<br />
more than 100 countries. HID<br />
Global® is an ASSA ABLOY Group<br />
brand. For more information, visit<br />
http://www.hidglobal.com.<br />
Cyberbit launches Channel<br />
Program<br />
Continued from page 8<br />
rity market. Cyberbit is already protecting<br />
companies all over the world<br />
and across a vast range of industries,<br />
which uniquely positions us to help<br />
partners expand and grow their expertise<br />
and market opportunities.”<br />
About Cyberbit<br />
Created to protect the most high-risk<br />
organizations in the world, Cyberbit<br />
secures enterprises and critical infrastructure<br />
against advanced cyberthreats.<br />
The company’s battle-hardened<br />
cybersecurity solutions detect,<br />
analyze and respond to the most advanced,<br />
complex and targeted threats.<br />
Cyberbit employs a formidable and<br />
diverse team from both the public<br />
and private sector, including Ph.D.s,<br />
hackers, former CISOs and SOC<br />
managers, as well as seasoned veterans<br />
of the intelligence and military<br />
communities. With offices in Texas<br />
and Israel, Cyberbit is a subsidiary<br />
of Elbit Systems Ltd. (NASDAQ and<br />
TASE: ESLT) and has more than 500<br />
employees in the United States, Europe<br />
and Asia. To learn more about<br />
how Cyberbit maximizes protection<br />
against today’s signature-less threats,<br />
visit www.cyberbit.net.<br />
®HID, the HID logo and DBond are trademarks or<br />
registered trademarks of HID Global or its licensors in<br />
the U.S. and/or other countries. All other trademarks,<br />
service marks, and product or service names are trademarks<br />
or registered trademarks of their respective owners.<br />
50<br />
Intelsat General announces<br />
new contract to provide satellite<br />
services to RiteNet<br />
Continued from page 9<br />
provide American warfighters around<br />
the globe with advanced capabilities.”<br />
This Comsatcom Transponded Capacity<br />
(CTC) task order is awarded by<br />
the U.S. Defense Information Systems<br />
Agency-Defense Information Technology<br />
Contracting Organization<br />
(DISA-DITCO) for one year, with options<br />
to renew it annually for an additional<br />
four years.<br />
About Intelsat General<br />
Intelsat General (IGC) is a wholly<br />
owned subsidiary of Intelsat, operator<br />
of the world’s first Globalized Network.<br />
IGC provides its government<br />
and commercial customers with<br />
high-quality, cost-effective, communications<br />
solutions via Intelsat’s leading<br />
satellite backbone and terrestrial<br />
infrastructure. Our customers rely<br />
on IGC to provide secure and seamless<br />
broadband connectivity, video<br />
communications, and mobility services<br />
for mission-critical operations<br />
anywhere on the globe through our<br />
open, inter-operable architecture.<br />
www.intelsatgeneral.com
Multipurpose Safety Wand<br />
Megaphone from AmpliVox<br />
Continued from page 17<br />
proved safety in situations ranging<br />
from concerts and sporting events to<br />
emergency evacuations.”<br />
For more information about the S606<br />
Safety Wand Megaphone, or other portable<br />
emergency sound products from<br />
AmpliVox, visit http://www.ampli.<br />
com.<br />
About AmpliVox<br />
AmpliVox® Sound Systems products<br />
are predominantly made in the USA,<br />
meet stringent CE standards, and<br />
come with a warranty up to 12 years.<br />
Our wide selection meets every<br />
speaker’s sound coverage and style<br />
needs. Whether you are in a small<br />
meeting room of 10 people or a large<br />
20,000 square foot auditorium of up<br />
to 10,000 people, AmpliVox® Sound<br />
Systems’ extensive range of superior<br />
quality, simple to operate and reliable<br />
electronics will provide maximum<br />
satisfaction and ensure a crystal clear<br />
message. Creators of the Pink Podium<br />
Promise cause marketing initiative,<br />
AmpliVox donates pink podiums<br />
and pink megaphones to breast<br />
cancer awareness organizations, helping<br />
lead the effort to “Speak Up for<br />
the Cause”.<br />
Visit http://www.ampli.com for more<br />
information.<br />
What the FCC revamping of the<br />
Federal Alert System means to you<br />
Continued from page 27<br />
who are identified via their Wi-Fienabled<br />
locations, to either evacuate<br />
the building or stay put (shelter-inplace)<br />
depending upon their position<br />
relative to the shooter. This can<br />
be done through SMS, voice, mobile<br />
apps, digital signage or desktop alerts.<br />
What’s more, two-way communications<br />
provided in this instance are<br />
helpful for law enforcement as people<br />
in the affected areas can provide vital<br />
information – i.e. how many attackers,<br />
what do they look like, how many<br />
people are still in the building – that<br />
influences their strategy to apprehend<br />
the criminal. This real-time information<br />
is a perfect way to manage multiple<br />
groups of people to the safest<br />
possible outcome.<br />
Government agencies and municipalities<br />
that proactively set an<br />
emergency communications plan set<br />
themselves and their constituents<br />
up for success when a crisis occurs.<br />
Thinking through every single detail<br />
and having sound policies and technologies<br />
in place gives people clear<br />
guidance during a moment fraught<br />
with indecision and chaos. Crises can<br />
never be predicted but these systems<br />
direct people – both responders and<br />
bystanders –so the problem can be<br />
neutralized quickly and the negative<br />
outcomes minimized.<br />
Robin Systems continues to<br />
win laurels<br />
Continued from page 37<br />
reach your marketing goals, please visit<br />
www.tmcnet.com.<br />
About Robin Systems<br />
Robin is an enterprise software company<br />
offering industry’s first Application-Defined<br />
Data Center software.<br />
With a team that includes industry<br />
veterans from leading enterprise<br />
technology companies such as NetApp,<br />
Oracle and Veritas, Robin seeks<br />
to disrupt the $20 billion-plus virtualization<br />
market with its containerbased<br />
compute and storage platform<br />
software that delivers better performance,<br />
higher consolidation and a<br />
much simpler application deployment<br />
lifecycle than traditional hypervisorbased<br />
virtualization. Founded in<br />
2013, the San Jose, California-based<br />
company has raised more than $23<br />
million in venture funding from leading<br />
investors such as Clear Ventures,<br />
DN Capital, USAA and SAP’s Hasso<br />
Plattner Ventures.<br />
51
Saab Seaeye Leoport ROV system<br />
delivered to Japan’s Kaiyo<br />
Engineering<br />
Continued from page 38<br />
and scientific markets.<br />
Scantrol is an independent supplier<br />
of monitoring and control<br />
systems to the modern marine and<br />
offshore industries. The control systems<br />
range from simple winch control<br />
systems to the most advanced<br />
controls for offshore support vessels,<br />
seismic vessels, marine research<br />
vessels, fishing vessels, semi<br />
subs and barges.<br />
Hydramec, founded in 1990,<br />
manufacture ROV launch and recovery<br />
systems and also maintain a<br />
considerable fleet of offshore vessels<br />
on behalf of their clients.<br />
CA Technologies strengthens<br />
security portfolio with new<br />
advanced analytics and<br />
Identity-as-a-Service offerings<br />
Continued from page 39<br />
Solutions deliver a high level of customer<br />
satisfaction.”<br />
CA Identity Service is available<br />
today and can be accessed for free<br />
trial.<br />
These new products are part of<br />
CA’s software portfolio that gives<br />
companies the ability to sense, react<br />
and adapt to market shifts and operational<br />
security needs, resulting<br />
in the agility advantage that a strong<br />
security posture provides. They successfully<br />
protect the business while<br />
enabling it to build the trusted<br />
digital relationships necessary to<br />
compete and win in the application<br />
economy.<br />
*The Security Imperative: Driving Business<br />
Growth in the App Economy, Coleman Parkes<br />
Survey (May-September 2016).<br />
Resources: Visit the CA World Online<br />
Press Room for additional CA World<br />
news and information and graphics<br />
Salient CRGT Appoints Joseph<br />
Zimmerman as Vice President,<br />
Enterprise Solutions Group<br />
Continued from page 42<br />
Service Commendation Medal,<br />
Navy Commendation Medal, and<br />
the Navy Achievement Medal. He<br />
also received the Southwest Asia<br />
Service Medal for his service within<br />
Operation Desert Shield.<br />
About Salient CRGT<br />
Salient CRGT provides Agile software<br />
development, data analytics,<br />
mobility, cyber security and infrastructure<br />
solutions. We support<br />
these core capabilities with full lifecycle<br />
IT services and training—to<br />
help our customers meet critical<br />
goals for pivotal missions. We are<br />
purpose built for IT transformation<br />
supporting federal civilian, defense,<br />
homeland, and intelligence agencies,<br />
as well as Fortune 1000 companies.<br />
We use the most innovative<br />
talent delivery model in the industry,<br />
scientifically providing exactly<br />
the right people for the customers’<br />
most pressing requirements. Salient<br />
CRGT has earned a record of success<br />
with integration and operations<br />
of large‐scale, high‐volume solutions.<br />
On September 15, 2015, Salient<br />
and CRGT announced closing<br />
of the merger transactions – visit<br />
newsroom. For additional information<br />
on Salient and CRGT, visit www.<br />
salientcrgt.com<br />
52
The News Leader in Physical, IT and Homeland Security<br />
CEO/Editorial Director<br />
Adrian Courtenay<br />
917-696-5782<br />
acourtenay@gsnmagazine.com<br />
Editor<br />
Steve Bittenbender<br />
502-552-1450<br />
sbittenbender@gsnmagazine.com<br />
Senior Writer<br />
Karen Ferrick-Roman<br />
412-671-1456<br />
karenferrickroman@gmail.com<br />
Columnist<br />
Shawn Campbell<br />
Campbell on Crypto<br />
shawn.campbell@safenetat.com<br />
Columnist<br />
George Lane<br />
Hazmat Science & Public Policy<br />
georgelane@hotmail.com<br />
Contributing Author<br />
Lloyd McCoy Jr<br />
Immix Group<br />
Contributing Author<br />
Walter Ewing<br />
Contributing Author<br />
Wendy Feliz<br />
Contributing Author<br />
Joshua Breisblatt<br />
Contributing Author<br />
J. Michael Barrett<br />
Contributing Author<br />
Christopher Millar<br />
Gatekeeper Security<br />
Art Director<br />
Gerry O’Hara, OHDesign3<br />
gerry@ohd3.com<br />
203-249-0626<br />
Production Manager<br />
Brenden Hitt<br />
Brenden.hitt@gsnmagazine.com<br />
Direct: 203-216-7798<br />
COMING ATTRACTIONS<br />
<strong>Dec</strong>ember<br />
Late News<br />
Tech Focus<br />
2016 Technology Roundup<br />
Special Awards Review:<br />
2016 Digital Yearbook of Awards<br />
Winners<br />
January<br />
Late News<br />
Tech Focus<br />
Access Control & Identification<br />
Market Sector<br />
Video Surveillance, Software,<br />
Management<br />
February<br />
Late News<br />
Tech Focus<br />
Airport/Aviation Security<br />
Market Sector<br />
Critical Infrastructure, Protection<br />
53