19.12.2016 Views

GSN_Nov-Dec_FINAL_Yumpu

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Government Security News<br />

NOVEMBER/DECEMBER 2016 DIGITAL EDITION<br />

Mr Wu, CEO of Hangzhou Hikvision Digital Technology, tells journalists from U.S.<br />

that success is 30% technology and 70% good management. Partnerships with<br />

customers, employees, shareholders – and the U.S election – were also<br />

discussed in this dispatch by Adrian Courtenay. Page 30<br />

Also in this issue:<br />

HID Global announces secure citizen ID Card that extends benefits of Optical Secure Media<br />

(OSM) card – Page 5<br />

Researchers say coastal community stakeholders need to be more involved to make their<br />

towns more resilient – Page 34


<strong>GSN</strong> <strong>Nov</strong>ember/<strong>Dec</strong>ember 2016<br />

NEWS<br />

5<br />

6<br />

8<br />

9<br />

12<br />

16<br />

17<br />

18<br />

20<br />

30<br />

34<br />

HID Global announces one of the world’s most secure<br />

Citizen ID Cards<br />

Capture every detail with<br />

Toshiba PTZ Cameras featuring 20x Optical Zoom<br />

Cyberbit launches Channel Program to create a profitable opportunity to<br />

solve customers’ most critical cyberthreats<br />

Intelsat General announces new contract to provide satellite services to Rite-<br />

Net for Army Warfighter Network<br />

Canon U.S.A. introduces one of the smallest and lightest 4K resolution (4096<br />

x 2400) laser projectors with high image quality, advanced features, low cost<br />

Latest data on Positive Train Control Implementation show uneven progress<br />

across railroads<br />

Multipurpose Safety Wand Megaphone from AmpliVox<br />

Enhances Crowd Control<br />

NATO to use Senstar perimeter security solution<br />

at its rapidly deployed military camps<br />

Campbell on Crypto – Crypto Management 101:<br />

Four Steps to Better Protection<br />

Mr. Hu, Founder and CEO of Hangzhou Hikvision<br />

Digital Technology Co Ltd, shares his thoughts with<br />

U.S. journalists<br />

Researchers say coastal community stakeholders<br />

need to be involved to make their towns more<br />

resilient from storms<br />

2


Digital Edition Table of Contents<br />

36<br />

38<br />

39<br />

40<br />

42<br />

43<br />

44<br />

46<br />

48<br />

49<br />

Robin Systems wins two new TMC awards for IT excellence and Info Tech<br />

spotlight on big data as a service<br />

Saab Seaeye Leoport ROV system delivered to Japan’s<br />

Kaiyo Engineering<br />

CA Technologies strengthens security portfolio with new<br />

advanced analytics and Identity-as-a-Service offerings<br />

U.S. and Canada bring Homeland Security solutions to Milipol Qatar<br />

Salient CRGT Appoints Joseph Zimmerman as Vice President, Enterprise<br />

Solutions Group<br />

Energetiq Introduces EQ-77, its 5th Generation,<br />

Ultra-Bright, Laser-Driven Light Source (LDLS )<br />

Selfies: A new weapon against public assistance fraud<br />

ITL Group and Applied DNA Sciences partner to develop anti-counterfeit<br />

‘SigNature ® DNA’ printed fabric label solution<br />

3M Passport Reader Makes Waves in New Market<br />

A “Know your rights” refresher for Immigrants<br />

FEATURE<br />

SPECIAL REPORT ON MASS NOTIFICATION / DISASTER RESPONSE<br />

22<br />

24<br />

26<br />

28<br />

Emergency24’s Two-way, Multi-Media Mass-Communications System<br />

NICE helps Metro Nashville Department of Emergency<br />

Communications get ready for Next Generation 9-1-1<br />

What the FCC revamping of the Federal Alert System<br />

means to you<br />

Washington tech firm claims predictive analytics can improve emergency<br />

response operations<br />

3


HID Global announces one of the<br />

world’s most secure Citizen ID Cards<br />

AUSTIN, TX, <strong>Nov</strong>ember 9, 2016 –<br />

HID Global®, a worldwide leader<br />

in trusted identity solutions, today<br />

announced one of the world’s most<br />

secure citizen ID cards, featuring<br />

technologies that have been proven<br />

in its customers’ award-winning<br />

national passport and other government<br />

ID programs, such as the<br />

Irish Passport Card. Extending the<br />

benefits of its widely issued Optical<br />

Secure Media (OSM) card, the company<br />

has created an OSM Multitech<br />

card that is one of the most secure<br />

citizen ID cards on the market.<br />

“Our OSM cards have set the standard<br />

for combining visual, digital<br />

and physical security while delivering<br />

the highest levels of card durability,”<br />

said Rob Haslam, VP and<br />

Managing Director, Government ID<br />

Solutions with HID Global. “There<br />

has been no known instance of a<br />

successful attempt to compromise<br />

OSM technology’s digital security,<br />

and now we’re helping to fuel the<br />

future of even more secure citizen<br />

identification by including a contactless<br />

RFID microcontroller chip<br />

into these proven OSM cards.”<br />

To maximize the security of HID<br />

Global’s OSM Multitech card, issuers<br />

can laser-engrave information<br />

on its front side, engrave and<br />

encode identity information in the<br />

OSM stripe on the card’s back side,<br />

and encode identity information<br />

on the microcontroller chip inside<br />

the card. Integrating the RFID chip<br />

into a standard-sized OSM card is a<br />

major milestone that was made possible<br />

with HID Global’s ultra-thin<br />

5<br />

PC ePre-laminate product, which<br />

minimizes the footprint of the RFID<br />

chip and antenna using the company’s<br />

DBond technology. Unique<br />

anti-crack technology also extends<br />

the durability of the card, which<br />

is initially available with an NXP<br />

P60D080 RFID chip. The company<br />

plans to offer additional RFID chip<br />

options in the future.<br />

HID Global’s OSM Multitech<br />

cards can be used for applications<br />

ranging from national and resident<br />

alien IDs to health benefit, public<br />

welfare and Social Security cards, as<br />

well as driver’s licenses, gun permits<br />

and a wide range of other identification<br />

cards. The cards are the cornerstone<br />

of a complete, end-to-end<br />

government ID solution offered by<br />

HID Global, including its highly<br />

secure laser personalization equipment,<br />

software solutions, security<br />

printing plus software and professional<br />

services and training.<br />

The new Multitech card’s OSM,<br />

DBond and other technologies have<br />

been proven in numerous high-profile<br />

national ID programs, including<br />

the award-winning Irish Passport<br />

Card, as well as programs in Saudi<br />

Arabia, Angola and the U.S. The<br />

More on page 50


Capture every detail up close with Toshiba<br />

PTZ Cameras featuring 20x Optical Zoom<br />

IRVINE, CA, <strong>Nov</strong>ember 17, 2016<br />

– Toshiba Surveillance & IP Video<br />

Products, a business unit of Toshiba<br />

America Information Systems, Inc.,<br />

is giving security integrators, dealers<br />

and end-users more options by introducing<br />

two new Pan-Tilt-Zoom<br />

(PTZ) 3MP IP dome cameras, both<br />

featuring 20x optical zoom and delivering<br />

razor-sharp streaming video<br />

at 2048x1536 resolution for applications<br />

requiring highly detailed<br />

surveillance, indoors and outdoors<br />

in any lighting environment.<br />

Indoor/Outdoor Cameras<br />

Toshiba’s new IKS-WP8203R PTZ<br />

camera is designed to operate in the<br />

harsh outdoors with its IP66 enclosure<br />

protection, integrated heater<br />

and auto defogging, while the new<br />

IKS-WP8103 PTZ provides an attractive<br />

indoor solution for covering<br />

large spaces such as shopping<br />

malls, casinos or schools.<br />

True Day/Night imaging with<br />

Digital Wide Dynamic Range empower<br />

both cameras to capture images<br />

in high contrast and changing<br />

light conditions down to 0.01 lux. In<br />

addition to 24V, both cameras are<br />

powered with PoE+ which eliminates<br />

the need for power cables and<br />

reduces installation cost. Also, both<br />

are backed by ONVIF Profile S to<br />

ensure seamless interoperability<br />

with third-party ONVIFconforming<br />

equipment<br />

and software.<br />

20X Optical Zoom<br />

A core benefit of<br />

the new PTZ cameras<br />

is powerful,<br />

built-in optical<br />

zoom capability. It<br />

enables up to 20x<br />

optical magnification<br />

(f=4.7 ~ 94 mm, F1.6 to<br />

F3.5) and achieves quick<br />

subject tracking through<br />

a high-speed auto focusing<br />

system so operators can react<br />

instantly to suspicious situations.<br />

The cameras’ ability to precisely<br />

identify small details, such as car licenses<br />

or facial features, means they<br />

are suitable for users that demand<br />

enhanced detail when zooming in,<br />

plus makes them ideal to handle<br />

installations where detailed coverage<br />

of longer distances is essential<br />

including airports, borders, roads,<br />

cities and campuses.<br />

Superior image quality is matched<br />

by the cameras’ versatile, high-speed<br />

6<br />

Toshiba IKS-WP8103<br />

360° continuous pan that achieves<br />

surveillance of large areas without<br />

blind spots, and its precision -10°<br />

to 190° tilt drive offering al-<br />

most instant preset posi-<br />

tioning. Equipped with<br />

256 presets, pattern<br />

tour, autoscan and<br />

auto flip, nothing<br />

escapes the camer-<br />

as’ PTZ.<br />

Toshiba IKS-<br />

WP8203R and IKS-<br />

WP8103 cameras<br />

make efficient use of<br />

available bandwidth<br />

by providing H.264 and<br />

MJPEG multi-streaming to<br />

satisfy different live viewing<br />

and recording settings. Both are<br />

immediately available.<br />

About Toshiba America<br />

Information Systems, Inc.<br />

Headquartered in Irvine, Calif.,<br />

TAIS is comprised of three business<br />

units: Digital Products Division,<br />

Imaging Systems Division,<br />

and Telecommunication Systems<br />

Division. Together, these divisions<br />

provide digital products, services<br />

and solutions, including industryleading<br />

portable computers; tele-


visions, TV/DVD Combination<br />

products, Blu-ray Disc and DVD<br />

products, and portable devices;<br />

imaging products for the security,<br />

medical and manufacturing markets;<br />

storage products for computers;<br />

and IP business telephone systems<br />

with unified communications,<br />

collaboration and mobility applications.<br />

TAIS provides sales, marketing<br />

and services for its wide range<br />

of products in the United States and<br />

Latin America. TAIS is an independent<br />

operating company owned by<br />

Toshiba America, Inc., a subsidiary<br />

of Toshiba Corporation. For more<br />

information on TAIS visit toshiba.<br />

com/us<br />

About Toshiba Corporation<br />

Toshiba is a world-leading diversified<br />

manufacturer, solutions provider<br />

and marketer of advanced<br />

electronic and electrical products<br />

and systems. Toshiba Group brings<br />

innovation and imagination to<br />

a wide range of businesses: digital<br />

products, including LCD TVs,<br />

notebook PCs, retail solutions and<br />

MFPs; electronic devices, including<br />

semiconductors, storage products<br />

and materials; industrial and social<br />

infrastructure systems, including<br />

power generation systems, smart<br />

community solutions, medical systems<br />

and escalators & elevators;<br />

and home appliances. Toshiba was<br />

founded in 1875, and today operates<br />

a global network of more than<br />

590 consolidated companies, with<br />

206,000 employees worldwide and<br />

annual sales surpassing 5.8 trillion<br />

yen (US$61 billion). Visit Toshiba’s<br />

web site at www.toshiba.co.jp/index.<br />

htm.<br />

“We’re powered by new challenges.<br />

Our experience has made us experts<br />

at providing total security solutions.”<br />

PHIL BARRETT<br />

8 years • Power/Utility Business Development<br />

Our high standards help you meet yours. Providing superior<br />

perimeter security solutions is not just our mission.<br />

It’s personal. And that mission never stops.<br />

AMERISTARSECURITY.COM | 888-333-3422<br />

7


Cyberbit launches Channel Program to create a<br />

profitable opportunity to solve customers’ most<br />

critical cyberthreats<br />

Austin, Texas – <strong>Nov</strong>ember 15,<br />

2016 – Cyberbit, whose cybersecurity<br />

solutions protect the world’s<br />

most sensitive systems, today announced<br />

the launch of its Channel<br />

Program for North American<br />

Partners: MSSPs, VARs, distributors<br />

and consultants, who play a critical<br />

role in helping companies defend<br />

themselves against evolving cyberthreats.<br />

The Cyberbit Channel Program<br />

will deliver enhanced margins<br />

to partners, by providing Cyberbit’s<br />

suite of solutions, addressing today’s<br />

most complex cyber security problems<br />

for customers.<br />

Cyberbit partners will get access<br />

to the industry’s most advanced<br />

endpoint detection and response<br />

(EDR), SOC automation and orchestration,<br />

cyber range training<br />

and simulation platform, and industrial<br />

control systems security. The<br />

Cyberbit Channel Program is led<br />

by enterprise and IT security channel<br />

veteran Stephen Thomas, former<br />

Vice President of Channel Sales at<br />

Symantec, who has more than 20<br />

years of sales leadership and building<br />

channel programs for partners<br />

of all sizes. Now Vice President of<br />

Sales at Cyberbit, Thomas will position<br />

partners to address pressing<br />

challenges in cybersecurity as part<br />

of the company’s 100-percent-channel-focused<br />

strategy.<br />

Recently expanded to North<br />

America, Cyberbit has more than<br />

500-employees on three continents,<br />

supporting the most critical assets<br />

8<br />

of enterprises and public sector organizations<br />

worldwide. As a subsidiary<br />

of defense systems leader Elbit<br />

Systems Ltd. (NASDAQ and TASE:<br />

ESLT), Cyberbit not only offers the<br />

channel battle-hardened cybersecurity<br />

solutions but also the resources<br />

and strategic support to help partners<br />

move quickly into new markets.<br />

“We talk to lots of companies that<br />

either suffer from alert fatigue from<br />

all the cybersecurity tools they’ve<br />

adopted or that can’t hire enough<br />

experienced staff to leverage their<br />

technology – or both,” said Jeff<br />

Hirsh of MickTec, a Cyberbit partner.<br />

“Cyberbit helps us solve these<br />

customer pain points, with proven<br />

technology and the real-world<br />

training that customers need to defend<br />

against multi-dimensional IT<br />

security threats.”<br />

Stephen Thomas, Cyberbit Vice<br />

President of Sales said, “Companies<br />

need partners to guide them<br />

through today’s ever-evolving cyberthreat<br />

landscape, which is one<br />

reason why the channel has become<br />

the backbone of the IT secu-<br />

More on page 50


Intelsat General announces new contract to provide satellite<br />

services to RiteNet for Army Warfighter Network<br />

MCLEAN, VA, <strong>Nov</strong>ember 17, 2016<br />

– Intelsat General, a wholly owned<br />

subsidiary of Intelsat (NYSE: I), operator<br />

of the world’s first Globalized<br />

Network, powered by its leading satellite<br />

backbone, today announced a<br />

new contract to provide satellite<br />

connectivity to RiteNet Corp. to<br />

support testing by the U.S. Army at<br />

Ft. Bliss in El, Paso, TX, and at the<br />

nearby White Sands Missile Range<br />

in New Mexico.<br />

The Army conducts a range of<br />

testing using the Warfighter Information<br />

Network (WIN-T) at these<br />

two facilities, including two Network<br />

Integration Evaluation (NIE)<br />

events each year to evaluate new<br />

technologies. Using Ku-band capacity<br />

on an Intelsat satellite, RiteNet<br />

will provide both ongoing and surge<br />

capacity for the network. RiteNet,<br />

based in Rockville, MD, provides<br />

information technology and telecommunications<br />

services to a number<br />

of government and commercial<br />

customers.<br />

“The Warfighter Information Network<br />

is the U.S. Army’s backbone in<br />

terms of communications with its<br />

troops in the field,” said Skot Butler,<br />

President of Intelsat General Corporation.<br />

“Our services will support<br />

the Army as it tests new equipment<br />

and technologies that will one day<br />

More on page 50<br />

“We aim to protect property, and provide<br />

peace of mind by providing remarkable<br />

perimeter security products and<br />

unrivaled service.”<br />

EMILY SULLIVAN<br />

11 years • Mission Critical Business Development<br />

We know people make the difference for your business and ours.<br />

Our experienced team thrives on providing the products and<br />

service that lead to total perimeter security solutions.<br />

AMERISTARSECURITY.COM | 888-333-3422<br />

9


Canon U.S.A. introduces one of the smallest and<br />

lightest 4K resolution (4096 x 2400) laser projectors<br />

with high image quality, advanced features, low cost<br />

MELVILLE, NY, <strong>Nov</strong>ember 22,<br />

2016 – Canon U.S.A., Inc., a leader<br />

in digital imaging solutions, today<br />

unveiled the latest of its innovative<br />

technology with the debut of<br />

the REALiS 4K600STZ Pro AV Laser<br />

LCOS Projector. At only 57.3<br />

pounds, the REALiS 4K600STZ<br />

is among the world’s smallest and<br />

lightest native 4K laser projectors,<br />

making it ideal for a wide<br />

range of markets and applications<br />

including simulation, museums,<br />

art galleries, planetariums, higher<br />

education, medical education and<br />

training.<br />

The REALiS 4K600STZ projector<br />

reproduces exceptionally detailed<br />

images with outstanding<br />

color accuracy thanks to a combination<br />

of core technologies and features<br />

including:<br />

• Native 4K Resolution of 4096<br />

x 2400 which is larger than both<br />

QFHD and DCI-resolution, the 4K<br />

standards for TV and digital cinema<br />

respectively. The expanded vertical<br />

resolution (2400) is particularly important<br />

for those applications, like<br />

simulation and training and design/<br />

engineering, which may require<br />

larger vertical display areas.<br />

• Laser Phosphor Light Source<br />

which offers an extended operation<br />

time up to 20,000 hours or<br />

more 1 , quick start-up 2 , omnidirectional<br />

projector placement, and a<br />

wide range of colors – all helping to<br />

greatly enhance the user experience,<br />

installation process and reduce the<br />

total cost of ownership (TCO).<br />

Toshiba IKS-WP8103<br />

• 6000 lumens with up to<br />

10,000:1 Dynamic Contrast Ratio 3<br />

helps ensure content appears bright<br />

with deep black and brilliant white<br />

levels, as well as excellent gradation.<br />

• Canon’s renowned LCOS Technology<br />

with AISYS-enhancement<br />

and advanced Color Management<br />

System for producing content with<br />

exceptional detail and color accuracy<br />

– ideal for those industries/<br />

applications like museums and galleries<br />

with the highest image quality<br />

12<br />

requirements.<br />

• Genuine Canon 4K Lens for<br />

consistent clarity and color throughout<br />

entire projected area; the lens<br />

also includes a special Marginal<br />

Focus function which can be used<br />

to help ensure content projected on<br />

the peripheral portions of domed<br />

surfaces remains in focus – a benefit<br />

especially important to those<br />

in the simulation, training and<br />

educational fields. The 4K600STZ<br />

projector is also able to deliver a<br />

virtually consistent level of brightness<br />

throughout its zoom range,<br />

thus helping to provide even greater<br />

placement flexibility.<br />

• Powerful Dual Image Processing<br />

Engines for uncompressed 4K<br />

60p playback, and optimal upscaling<br />

of 2K video and other non-native<br />

4K resolution content.<br />

“The impressive benefits of 4K<br />

laser projection, combined with<br />

Canon’s optical and image processing<br />

technologies and compact engineering<br />

define the many advantages<br />

of the REALiS 4K600STZ Pro AV<br />

Laser LCOS Projector,” said Yuichi<br />

Ishizuka, president and chief operating<br />

officer, Canon U.S.A., Inc. “We<br />

More on page 14


SECURE CARD READERS<br />

FOR ANY NEED<br />

THE CHERRY LINE OF SECURE KEYBOARDS<br />

AND CARD READERS OFFERS A BROAD<br />

SELECTION TO SUIT YOUR EXACT NEEDS!<br />

LOOKING FOR<br />

VAR / INTEGRATOR<br />

PARTNERS!<br />

Add the Popular CHERRY Line to<br />

Your Portfolio and Increase Your<br />

Business! Download the Details at:<br />

www.cherryamericas.com/partner<br />

SMART CARD READERS<br />

Contact (FIPS 201), contactless<br />

and combination options<br />

BASIC USE<br />

USB SMART CARD READERS<br />

FIPS 201 certified; standalone unit<br />

with weighted base.<br />

HEAVY USE<br />

SMART CARD KEYBOARDS<br />

FIPS 210 certified, PC/SC smart<br />

card reader and secure PIN entry.<br />

MAXIMUM USE<br />

FREE<br />

WHITE<br />

PAPER<br />

THE TRENDS AND<br />

BENEFITS OF SMART CARD<br />

AND BIOMETRIC DE V ICES.<br />

1-800-844-0797<br />

www.cherryamericas.com<br />

http://bit.ly/1C1pnlY<br />

© 2016, Cherry Americas, LLC


Canon U.S.A. introduces one of the<br />

smallest and lightest 4K resolution<br />

(4096 x 2400) laser projectors<br />

Continued from page 12<br />

are confident this projector’s many<br />

advanced technologies and features<br />

will not only meet, but exceed the<br />

growing needs of AV professionals<br />

who demand exceptional, high-resolution<br />

and high-value projectors.”<br />

High Dynamic Range (HDR)<br />

The REALiS 4K600STZ is one of<br />

Canon’s only HDR compatible projectors<br />

which helps provide the critical<br />

ability to replicate content with<br />

exceptionally high contrast, making<br />

possible gradation expression close<br />

to that of human vision. Additionally,<br />

the projector supports the input<br />

of video content simulating the<br />

4K/8K broadcast-standard ITU-R<br />

BT.2020 color gamut.<br />

DICOM ® Simulation Mode 4<br />

The Canon REALiS 4K600STZ Projector’s<br />

DICOM® Simulation Mode4<br />

can be ideal for those in the medical<br />

education and training field who<br />

require displaying monochrome<br />

digital X-rays, CAT scans, and<br />

MRIs with superb grayscale gradation.<br />

This mode, which offers both<br />

clear and blue base color temperature<br />

presets, simulates the results of<br />

devices compliant with the Digital<br />

Imaging and Communications in<br />

Medicine (DICOM) Part 14 standard<br />

4 .<br />

Versatile Connectivity<br />

and Network Management<br />

The Canon REALiS 4K600STZ offers<br />

many industry-standard interfaces<br />

to enhance usability including<br />

two HDMI (version 2.0a), and four<br />

DVI inputs supporting single, stripe<br />

and cross configurations for 4K, 2K<br />

or HD video playback. Network<br />

management, including compatibility<br />

with PJLink, Crestron Room<br />

View and AMX Device Discovery,<br />

also helps provide outstanding flexibility<br />

for monitoring and control.<br />

Price and Availability<br />

The Canon REALiS 4K600STZ Pro<br />

AV LCOS Projector has a suggested<br />

list price of $77,990, is scheduled<br />

to be available through authorized<br />

Canon dealers by April 2017, and<br />

is backed by the Company’s awardwinning<br />

Professional Service &<br />

Support.<br />

For more information please visit<br />

projectors.usa.canon.com<br />

About Canon U.S.A., Inc.<br />

Canon U.S.A., Inc., is a leading provider<br />

of consumer, business-to-business,<br />

and industrial digital imaging<br />

solutions to the United States and to<br />

Latin America and the Caribbean<br />

(excluding Mexico) markets. With<br />

approximately $31 billion in global<br />

revenue, its parent company, Canon<br />

Inc. (NYSE:CAJ), ranks third overall<br />

in U.S. patents granted in 2015† and<br />

is one of Fortune Magazine’s World’s<br />

14<br />

Most Admired Companies in 2016.<br />

Canon U.S.A. is committed to the<br />

highest level of customer satisfaction<br />

and loyalty, providing 100 percent<br />

U.S.-based consumer service<br />

and support for all of the products it<br />

distributes. Canon U.S.A. is dedicated<br />

to its Kyosei philosophy of social<br />

and environmental responsibility.<br />

In 2014, the Canon Americas Headquarters<br />

secured LEED® Gold certification,<br />

a recognition for the design,<br />

construction, operations and<br />

maintenance of high-performance<br />

green buildings. To keep apprised of<br />

the latest news from Canon U.S.A.,<br />

sign up for the Company’s RSS news<br />

feed by visiting www.usa.canon.<br />

com/rss and follow us on Twitter<br />

@CanonUSA. For media inquiries,<br />

please contact pr@cusa.canon.com.<br />

† Based on weekly patent counts issued by<br />

United States Patent and Trademark Office.<br />

Availability, prices and specifications are subject<br />

to change without notice. Actual prices are<br />

set by individual dealers and may vary.<br />

1. Approximate time until brightness has<br />

declined to half the original level. Actual hours<br />

may vary depending on usage and environment.<br />

This is not a guarantee of the life span of individual<br />

laser diodes.<br />

2. When “Fast Boot” function is enabled.<br />

Startup time will change when startup from AC<br />

off.<br />

3. Native contrast of REALiS 4K600STZ Projector<br />

is 4,000:1 (Iris set to Close 3).<br />

4. The REALiS 4K600STZ is not cleared or<br />

approved for medical diagnosis and should not<br />

be used for these purposes.


Latest data on Positive Train Control Implementation<br />

show uneven progress across railroads<br />

WASHINGTON – The Federal Railroad<br />

Administration today released<br />

third quarter 2016 data submitted<br />

by railroads on their progress in implementing<br />

Positive Train Control<br />

(PTC). The data show uneven progress<br />

across the country and across<br />

railroads toward activating the lifesaving<br />

technology.<br />

Freight railroads now have PTC<br />

active on 12 percent of their tracks,<br />

up from 9 percent last quarter. Passenger<br />

railroads increased their percentage<br />

to 23 percent this quarter<br />

compared to 22 percent last quarter.<br />

The measurable progress made<br />

by passenger railroads has been<br />

predominately on the West Coast,<br />

while East Coast railroads, other<br />

than SEPTA and Amtrak, have remained<br />

relatively stagnant.<br />

“Passenger and freight railroads<br />

must continue their progress implementing<br />

Positive Train Control and<br />

work to beat the deadlines Congress<br />

set – because PTC saves lives,” said<br />

U.S. Transportation Secretary Anthony<br />

Foxx.<br />

The Q3 2016 status update includes<br />

railroad-by-railroad quarterly<br />

data as of Sept. 30, 2016, and includes<br />

data such as track segments<br />

completed, locomotives equipped,<br />

employees trained, radio towers installed,<br />

route miles in PTC operation<br />

and other key implementation<br />

data. Some of this information is<br />

displayed in infographics below.<br />

“In order to achieve full PTC implementation,<br />

everyone has to do<br />

their part – railroads must make implementation<br />

a priority, and Congress<br />

must make funding for commuter<br />

railroads a priority,” said FRA<br />

Administrator Sarah E. Feinberg.<br />

Since 2008, FRA has provided significant<br />

assistance to support railroads’<br />

PTC implementation. Those<br />

efforts include:<br />

• FRA has provided more than<br />

$716 million to passenger railroads,<br />

including nearly $400 million in Recovery<br />

Act funding.<br />

• Issued a nearly $1 billion loan<br />

Interactive graphics: PTC implementation by freight and passenger<br />

railroads (above) ; individual railroad’s PTC implementation (right)<br />

16


to the Metropolitan Transportation<br />

Authority to implement PTC on the<br />

Long Island Rail Road and Metro-<br />

North.<br />

• Awarded $25 million in grant<br />

funding to railroads, suppliers and<br />

state and local governments. Many<br />

awards will help railroads achieve<br />

interoperability among the different<br />

PTC systems that railroads are<br />

deploying.<br />

• Made $199 million in grants<br />

available to commuter railroads in<br />

fiscal year 2017 to implement PTC.<br />

• Building a PTC testbed at the<br />

Transportation Technology Center<br />

(TTC) in Pueblo, Colorado.<br />

• Working directly with the Federal<br />

Communications Commission<br />

(FCC) and the Advisory Council on<br />

Historic Preservation to improve<br />

the approval process for PTC communication<br />

towers.<br />

• Dedicating staff to work on PTC<br />

implementation, including establishing<br />

a PTC task force.<br />

To view the interactive graphic of<br />

PTC implementation by freight and<br />

passenger railroads, or individual<br />

railroad’s PTC implementation, click<br />

on the graphics at left.<br />

To view each railroad’s full quarterly<br />

PTC Progress Report, please visit:<br />

https://www.fra.dot.gov/Page/P0628<br />

Multipurpose Safety Wand<br />

Megaphone from AmpliVox<br />

Enhances Crowd Control<br />

NORTHBROOK, IL – When directing<br />

large groups of people in<br />

motion, effective communication is<br />

essential to ensure safety. AmpliVox<br />

Sound Systems’ S606 Safety Wand<br />

Megaphone gives police officers,<br />

fire departments, emergency medical<br />

technicians, and other first responders<br />

the tools to communicate<br />

quickly and<br />

clearly. This allin-one<br />

crowd<br />

control baton<br />

with a built-in<br />

megaphone is<br />

also an excellent<br />

choice for<br />

parking attendants<br />

and security<br />

officers at<br />

sporting events, concerts, and other<br />

large venues.<br />

The AmpliVox S606 Safety Wand<br />

Megaphone combines the features<br />

of an LED safety wand with a loudspeaker<br />

megaphone, increasing the<br />

user’s visibility and voice range in<br />

a single lightweight, durable, and<br />

water-resistant unit. The wand includes<br />

five ultra-bright red LEDs for<br />

a continuous or flashing flare and a<br />

17<br />

The AmpliVox S606 Safety Wand Megaphone<br />

combines the features of an LED crowd and traffic<br />

management wand with a loudspeaker megaphone.<br />

white LED strobe light at the tip of<br />

the wand, providing visibility from<br />

3,000 yards. A detachable 20-watt<br />

Piezo microphone connects to the<br />

wand’s handle via a 5’ coil cord. A<br />

rotary volume control on the side of<br />

the handle adjusts the megaphone’s<br />

volume level with a whistle function<br />

as loud as 105 decibels. The<br />

baton’s handle<br />

includes easyto-use<br />

control<br />

buttons to activate<br />

different<br />

functions.<br />

The unit is<br />

powered by an<br />

integrated rechargeable<br />

battery<br />

pack that<br />

can be plugged into AC outlets or<br />

vehicle chargers, with a run time of<br />

up to 100 hours per charge.<br />

“AmpliVox’s Safety Wand Megaphone<br />

makes crowd management<br />

more powerful in all kinds of settings,”<br />

notes Don Roth, AmpliVox<br />

CEO. “It combines clear vocal amplification<br />

with enhanced visibility.<br />

Better communication delivers im-<br />

More on page 51


NATO to use Senstar perimeter security<br />

solution at its rapidly deployed military camps<br />

YEHUD, Israel, <strong>Nov</strong>. 28, 2016 –<br />

Magal Security Systems Ltd. (NAS-<br />

DAQ: MAGS) announced today<br />

that Senstar its North American<br />

subsidiary, successfully delivered<br />

to the North Atlantic Treaty Organization<br />

(NATO) , a perimeter electronic<br />

security systems (ESS) for its<br />

rapidly deployable military<br />

camps used throughout<br />

the world. The systems<br />

were shipped over the past<br />

few months and training<br />

on the systems will<br />

be completed in the first<br />

quarter of 2017.<br />

NATO has complete<br />

military camps that can be<br />

rapidly deployed when and where<br />

they are needed. These camps serve<br />

as operations headquarters and<br />

house anywhere from a handful to<br />

hundreds of troops and support<br />

staff. The goal of the ESS is<br />

to augment existing security at<br />

the camps and provide greater<br />

protection for camp operations,<br />

equipment and personnel.<br />

Commented Saar Koursh,<br />

CEO of Magal, “We are very<br />

pleased with our successful delivery<br />

of these important systems<br />

to NATO and we look forward to<br />

Saar Koursh<br />

working closely with NATO personnel<br />

in the coming weeks as we train<br />

them on our systems. While we are<br />

primarily known for our world class<br />

perimeter intrusion detection products,<br />

we are also a leading provider<br />

of deployable security solution<br />

packages. The original NATO tender<br />

specifically looked for<br />

robust and high quality<br />

equipment, capable of being<br />

mounted, connected<br />

and dismounted rapidly<br />

and modular and flexible<br />

to meet multiple camp<br />

layouts and personnel<br />

numbers. NATO’s choice<br />

of us is a resounding endorsement<br />

for our best-in-class<br />

products and technology, expertise,<br />

manufacturing capability and processes.”<br />

18<br />

Concluded Mr. Koursh, “Particularly<br />

in North America, we see<br />

further future demand for our full<br />

security solutions for deployable<br />

military camps and we look forward<br />

to further growth in this business in<br />

the coming years.”<br />

About Magal<br />

Magal is a leading international provider<br />

of solutions and products for<br />

physical and cyber security, as well<br />

as safety and site management. Over<br />

the past 45 years, Magal has delivered<br />

tailor-made security solutions<br />

and turnkey projects to hundreds of<br />

satisfied customers in over 80 countries<br />

- under some of the most challenging<br />

conditions.<br />

Magal offers comprehensive integrated<br />

solutions for critical sites,<br />

managed by Fortis4G - our 4th<br />

generation, cutting-edge PSIM<br />

(Physical Security Information<br />

Management system). The<br />

solutions leverage our broad<br />

portfolio of homegrown PIDS<br />

(Perimeter Intrusion Detection<br />

Systems), advanced VMS with<br />

native IVA and Cyber Security<br />

solutions.


<strong>GSN</strong>: What are your general thoughts on the<br />

2015 awards?<br />

8<br />

<strong>GSN</strong>: You spent many years on Capitol Hill and<br />

also at the Department of Homeland Security.<br />

As we head into 2016, what do you envision as<br />

homeland security spending priorities? Awards Category:<br />

––––––––––––––––––––––––––––––––––––––––<br />

<strong>GSN</strong> 2015<br />

<strong>GSN</strong>:<br />

DIGITAL<br />

What area/issue<br />

YEARBOOK<br />

pending<br />

OF AIRPORT/SEAPORT/BORDER<br />

trends do you<br />

SECURITY AWARDS RECIPIENTS<br />

see as priorities for the homeland security<br />

community?<br />

Name of Nominated Product, Service,<br />

or Program:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Reason this entry deserves to win:<br />

––––––––––––––––––––––––––––––––––––––––<br />

54<br />

9<br />

<strong>GSN</strong>: What future areas of homeland security<br />

interest would you advise companies to explore?<br />

Continued on next page<br />

Awards Category:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Name of Nominated Product, Service,<br />

or Program: Link to Web Page of Nominated Organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

www.networkharbor.com<br />

Reason this Link entry to additional deserves to information win: on product,<br />

––––––––––––––––––––––––––––––––––––––––<br />

service or program, with brief description:<br />

––––––––––––––––––––––––––––––––––––––––<br />

https://youtu.be/-ucfAR5psac<br />

Name and organization of nominating<br />

contact for this entry, including name, title,<br />

organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

55<br />

<strong>GSN</strong> 2015 DIGITAL YEARBOOK OF AIRPORT/SEAPORT/BORDER SECURITY AWARDS RECIPIENTS<br />

Nominating contact’s office telephone and cell<br />

phone:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Nominating contact’s email address:<br />

––––––––––––––––––––––––––––––––––––––––<br />

john@convyassociates.com<br />

30<br />

Address of nominating contact’s organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

31<br />

http://www.rapiscansystems.com<br />

Link to additional information on product,<br />

service or program, with brief description:<br />

––––––––––––––––––––––––––––––––––––––––<br />

http://www.rapiscansystems.com/en/products/<br />

radiation_detection<br />

Name and organization of nominating<br />

contact for this entry, including name, title,<br />

Nominating contact’s office telephone and cell<br />

jedgerly@speakerboxpr.com<br />

The Winners and Finalists have<br />

been selected. Now our national<br />

and international readers want<br />

to know what the strategies,<br />

technologies and innovations<br />

were that gave you the<br />

advantage. Let them know with<br />

a 2-page spread in the<br />

2016 Digital Yearbook of<br />

Award Winners.<br />

The <strong>GSN</strong><br />

2016 Digital Yearbook<br />

OF<br />

Homeland Security<br />

Awards<br />

CLICK HERE TO VIEW<br />

LAST YEAR’S YEARBOOK<br />

The <strong>GSN</strong><br />

2015 Digital Yearbook<br />

OF<br />

Airport/Seaport/<br />

Border Security Awards<br />

AND<br />

Homeland Security Awards<br />

National Programs and Protection Directorate.<br />

ed world. New legislation pending in Congress formalizes<br />

the increased DHS role in public/private partnering.<br />

<strong>GSN</strong> 2015 DIGITAL YEARBOOK OF HOMELAND SECURITY<br />

and<br />

Global spending also parallels the DHS spending raise.<br />

AIRPORT, SEAPORT, BORDER SECURITY AWARDS PROGRAMS<br />

A new market research report, “Global Homeland Security<br />

and Emergency Management Market, 2013–2018”, Information Security Management Act (FISMA) and de-<br />

New legislation also would update the 12-year-old Federal<br />

published by MarketsandMarkets is expected to reach lineate DHS’s role in guarding government networks and<br />

$544.02 Billion by 2018. Unfortunately, those numbers websites.<br />

could go even higher if there are more incidents similar to<br />

A priority for 2016 will be to accelerate rollout of<br />

<strong>GSN</strong> INTERVIEW<br />

what happened in Paris, Mali, and San Bernardino, CA. Einstein III Accelerated (E3A), the latest phase of DHS’s<br />

Best Detection Solutions<br />

automated network-security correcting systems. DHS has<br />

established memoranda of agreement with 55 federal<br />

Chuck Brooks, Distinguished Judge<br />

agencies to implement Einstein to provide horizon scanning<br />

and automated monitoring, detection, and remedia-<br />

<strong>GSN</strong> 2015 Homeland Security and<br />

Best Integrated Security Programs<br />

Rapiscan Systems<br />

CB: Counterterrorism and the counter CBRNE (chemical<br />

Airport, Seaport, Border Security Awards programs<br />

tion of government networks. DHS is also planning for<br />

2015 Winner<br />

, biological, Radiological, Nuclear, and Explosive) mission<br />

new cyber technologies that provide advanced defense of<br />

Network will always Harbor, be fundamental Inc. to homeland planning and<br />

network framework layers, including authentication, better<br />

encryption, biometrics, and data analytical tools”.<br />

spending. Those are the most catastrophic threats. In<br />

2015 Winner<br />

addition to CBRNE DHS has assumed more and more of a<br />

leadership role in cybersecurity derived from both Presidential<br />

mandates and congressional legislation.<br />

CB: For me it was a real pleasure judging this year’s<br />

Best Nuclear/Radiation Detection<br />

Cybersecurity is indeed a top priority as government agen-<br />

IPM (integrated process management) provides an<br />

annual Homeland Security and Airport, Seaport, Border<br />

CB:<br />

CB: Macro spending will increase across the board on<br />

cies and mega corporations experience more data breaches<br />

with each passing year. I recently published an article<br />

The key word really is “future” and it is already<br />

additional element of extensibility and power for policy<br />

Security Awards programs. The submissions this year<br />

Best Physical Security Information Management<br />

around the corner with the Internet of Things (IoT).<br />

management and workflow processing that is virtually<br />

Rapiscan Systems<br />

homeland security products and services In accordance<br />

were frankly quite amazing. The capabilities and technical<br />

System - PSIM<br />

in The Federal Times on Key homeland security priorities<br />

Recently both the FBI and DHS issued warnings about unlimited IoT<br />

in its capabilities. The end result is an intui-<br />

to the new threats we are especially facing from ISIS and<br />

merits of the IT and Physical security products/solutions<br />

tive, comprehensive automated security management<br />

from other terrorist actors, and global instabilities. This<br />

to watch in 2016 (http://www.federaltimes.com/story/<br />

and pending threats. The reality is that we have become<br />

platform that operates identically, anywhere within the<br />

of all the vendors made it especially difficult to judge. In<br />

was reflected in the recent passage of the 2016 omnibus<br />

government/dhs/blog/2015/12/15/key-homeland-securitypriorities-watch-2016/77368604/)<br />

My thoughts in regards<br />

immersed in a new digital era comprised of more organization. than 50<br />

There’s no need to retrain staff when Rapiscan they Systems, a leading provider of security screening<br />

solutions, is well known for the high quality, reliment<br />

or integrated with Rapiscan’s X-ray and metal-<br />

ing technological contributors to the current and future<br />

The bill provides DHS with $40.96 billion, which is an<br />

to cybersecurity verbatim:<br />

detection products can be used in a standalone deploy-<br />

my opinion they were all winners because they are lead-<br />

LightHouse<br />

spending Bill recently passed by Congress by Congress.<br />

billion interfaced devices. Anything connected is move vulner-<br />

from one facility to another, or when new compoable.<br />

Expect significant investments in smart cities, nents smart<br />

are connected to the platform, which in turn ability saves and affordability of its solutions. With products based threat detection solutions. The newest addition to<br />

security of our nation. It is good to know that very tal-<br />

increase of $1.33 billion over the fiscal year 2015 enacted<br />

“The 2015 DHS budget directed more than $1.25 billion<br />

to cybersecurity and that trend will continue in 2016.<br />

homes, smart businesses, and smart governments customers in the<br />

significant amounts of time and money. sold into four market segments, including Baggage and Rapiscan’s radiation detection product line is the Rapiscan<br />

MP100 Backpack Radiation Detection system. A high<br />

ented people in industry and government are continually<br />

Network Harbor’s LightHouse platform delivers dent management, too. levels. It included increased funding levels for Customs<br />

Parcel Inspection, Cargo and Vehicle Inspection, Hold<br />

next Its decade. click-and-go For the ability security to adopt community this conveys<br />

Baggage Screening and People Screening, the company performance, easy to use radiation monitor combining<br />

designing and upgrading security solutions to fill gaps as<br />

unified security management for enterprise organizations,<br />

extending the capabilities of physical security its own capabilities means that there’s no “dumbing<br />

adversaries are becoming more hostile and sophisticated.<br />

ment and for DHS Cybersecurity programs in the incident DHS management DHS’s (PSIM) inception to include as we geographical have become a more down” interconnect-<br />

of features or for functions threat detection, – just a seamless, surveillance, con-predictive data analytics,<br />

tion situations Convy its customers Associatescould face. An important a lightweight, compact commercial backpack, making<br />

the full functionality of any security system’s API within<br />

and Border Protection, Immigration and Customs Enforce-<br />

Cybersecurity and IT have moved to the forefront since<br />

opportunities in developing and integrating new sensors<br />

has a solution John for Convy, the most Principal demanding threat detec-<br />

gamma and optional neutron detection is housed in<br />

part of Rapiscan’s product portfolio is its radiation the system perfect for covert inspection situations. The<br />

information system (GIS) and non-physical products in sistent user interface, anywhere across the enterprise.<br />

detection product line, which addresses the need for MP100 is ideal for supporting security operations and<br />

a truly comprehensive safety and security management It installs easily, and is quickly mastered by administrators<br />

and end users alike. LightHouse supports almost<br />

global governments and organizations to monitor and performing radiation surveys in a variety of markets –<br />

environment. LightHouse is unique in that it integrates<br />

locate radioactive threat materials that can be used in including critical infrastructure, customs and border<br />

every security system, physical or non-physical, into a all major security product manufacturers including<br />

office: 202-421-3777<br />

atomic weapons and dirty bombs. The product line is control, event security, defense and law enforcement<br />

single, seamless oversight system. Its intuitive interface access control, video, audio, mass notification, IDS,<br />

comprised of software and hardware based solutions applications. All of the features required for radiation<br />

drives faster recognition of potential threats, as well RTLS and more. LightHouse has been designed to add<br />

for inspecting vehicles, packages and people. Radiation detection are integrated in the MP100 so it can be used<br />

as gives first responders the information they need to additional system integration’s to the platform without<br />

make better informed, more appropriate decisions. disruption or encumbrance of any existing integration<br />

LightHouse is designed to support the IT side of inci- in an expedient, stable and secure process. LightHouse<br />

8380 Greensboro Drive Suite 514<br />

McLean, VA 22102<br />

as a standalone device and connected wirelessly to a Link to Web Page of Nominated Organization:<br />

Rapiscan oversight system for remote data collection<br />

––––––––––––––––––––––––––––––––––––––––<br />

and display. Using the MP100 is as easy as slipping<br />

the backpack on and walking around. Weighing just<br />

18 pounds, the MP100 is lightweight and easy to use.<br />

Additionally, the onboard battery enables 16 hours of<br />

continuous operation in a wide range of environments.<br />

The Rapiscan RadviewerTM Android app displays the<br />

operator’s current position and direction toward the<br />

radiation source. The design of the MP100’s radiation<br />

detectors provides increased directional sensitivity of<br />

the radiation detection. A radiation alarm is signaled audibly<br />

via a headphone jack on the backpack or visually ––––––––––––––––––––––––––––––––––––––––<br />

organization:<br />

via RadviewerTM. In this way, the MP100 enables users Jennifer Edgerly, Senior Account Director,<br />

to effectively detect and locate radioactive threats. The SpeakerBox Communications<br />

MP100 is manufactured by Rapiscan’s Radiation Detection<br />

Products division, which has supplied thousands of<br />

radiation monitors that are deployed at border crossings,<br />

seaports, airports and facilities around the world. office: 703-287-7809<br />

phone:<br />

––––––––––––––––––––––––––––––––––––––––<br />

The MP100 uses Rapiscan’s proven radiation detection cell: 202-486-0518<br />

technology adapted for a backpack deployment. The<br />

radiation detection performance meets the requirements<br />

of ANSI N42.53. The MP100 offers customers ––––––––––––––––––––––––––––––––––––––––<br />

Nominating contact’s email address:<br />

efficient, easy to use and reliable man-portable radiation<br />

detection with high performance at an affordable cost of<br />

acquisition and operation.<br />

Address of nominating contact’s organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

7900 Westpark Drive, Suite T410, McLean, VA<br />

Contact Adrian Courtenay at 917-696-5782 to get more information<br />

and reserve your 2-page spread.


Campbell on Crypto<br />

Crypto Management 101: Four Steps<br />

to Better Protection<br />

By Shawn Campbell<br />

Previous installments of this column<br />

have discussed the critical<br />

importance of encryption for data<br />

protection. In addition to strong<br />

encryption, however, cryptographic<br />

keys used during the encryption<br />

process must be treated with the<br />

same level of care.<br />

The encryption process generates<br />

cryptographic keys that are used to<br />

encrypt (“lock”), and decrypt (“unlock”)<br />

data. The more you encrypt,<br />

the more encryption keys you have<br />

to store and manage. If these keys are<br />

stolen or copied, they can be used to<br />

decrypt sensitive data, negating the<br />

entire encryption process.<br />

Consequently, many organizations<br />

are starting to realize they need a<br />

centralized strategy to manage the<br />

keys they need for their encryption<br />

needs. A solid cryptographic key<br />

management strategy has four elements:<br />

• High Assurance Cryptographic<br />

Key Protection<br />

• Cryptographic processing and<br />

acceleration<br />

• Key lifecycle management<br />

• Cryptographic Resource Management<br />

Let’s look at each step.<br />

High Assurance<br />

Cryptographic Key Protection<br />

Depending on the value of data being<br />

protected, and the variety of keys<br />

needing to be stored, organizations<br />

can store their keys either in hardware<br />

or in software. For keys that<br />

protect highly sensitive data and applications,<br />

a centralized, hardwarebased<br />

approach is best.<br />

In this approach, a hardware security<br />

module is used. Nothing ever<br />

enters or leaves this tamper-resistant<br />

vault, and keys are more isolated<br />

from traditional network attacks. If<br />

the module becomes compromised,<br />

the keys will zero out and become<br />

useless.<br />

The best applications of centralized<br />

key storage are cases like code<br />

signing, certificate validation, transaction<br />

processing and Public Key<br />

Infrastructure. These involve limited<br />

key distribution, with keys used for<br />

very specific reasons. Some applications<br />

may require a more distributed<br />

model, where cryptographic keys<br />

must exist in close proximity to the<br />

data and applications they secure.<br />

20<br />

Cryptographic Processing<br />

and Acceleration Protection<br />

Organizations must review their<br />

current workflows and applications.<br />

Where will encryption and decryption<br />

be happening? Depending on<br />

where and how quickly the encryption<br />

must run, high-speed cryptographic<br />

processors may be needed.<br />

This can help organizations avoid<br />

processing bottlenecks and increase<br />

system capacity.<br />

The key is to find a solution that<br />

can be easily implemented and supports<br />

industry standard APIs out of<br />

the box, which can greatly simplify<br />

integration.<br />

Key Lifecycle Management<br />

Successful key management takes<br />

an integrated approach to generating,<br />

storing, distributing, rotating,<br />

revoking, suspending and terminating<br />

keys for devices and applications.<br />

Here are things to consider through<br />

the lifecycle of a crypto key:<br />

Key generation and certification.<br />

Make sure the key strength matches<br />

the sensitivity of the data. The longer<br />

the key, the stronger the encryption,


and the less susceptible it is to brute<br />

force attacks.<br />

Key distribution. Each key must<br />

be associated with a particular user,<br />

system, application or policy. This<br />

helps the organization understand<br />

how to secure the key, especially in<br />

transit. Have separate access for the<br />

administrator creating the key and<br />

the person using it. That way, it is assured<br />

that unauthorized<br />

users can’t get access to<br />

confidential information.<br />

Key storage. Centralized,<br />

hardware-based<br />

key storage is recommended<br />

for keys that<br />

protect highly sensitive<br />

data and applications. Distributed<br />

storage is used when cryptographic<br />

keys must exist nearby secured data<br />

and applications.<br />

Key rotation. Each key should be<br />

designated an effective crypto period,<br />

with the ability to change key<br />

on demand. It’s important to limit<br />

the amount of data encrypted with<br />

a single key because using the same<br />

key over a long duration of time increases<br />

the chances that the key will<br />

be compromised. Rotating keys regularly<br />

ensures stolen keys are only<br />

useful for a specific time period.<br />

Key backup and recovery. If the<br />

key storage mechanism fails or is<br />

compromised, there must be a way<br />

to restore the keys. Backup copies of<br />

cryptographic keys should be kept in<br />

a storage mechanism that is at least as<br />

secure as the original store. Concrete<br />

procedures must be documented to<br />

handle a key compromise as well.<br />

Key revocation, suspension, and<br />

termination. Every organization<br />

must be able to delete keys associated<br />

with compromised systems or<br />

data, to ensure unauthorized users<br />

can never decrypt sensitive assets.<br />

The more you encrypt, the more encryption<br />

keys you have to store and manage. If these<br />

keys are stolen or copied, they can be used<br />

to decrypt sensitive data, negating the entire<br />

encryption process.<br />

Sometimes there may be the need to<br />

take a key out of the lineup but not<br />

terminate it. For instance, data that<br />

may be used for legal proceedings<br />

may need to be recalled; those keys<br />

should only be suspended.<br />

Cryptographic Resource<br />

Management<br />

For policy enforcement, transparency,<br />

and system health, every organization<br />

should have one, easy-to-use<br />

interface that administers, monitors<br />

and provisions cryptographic<br />

resources. System capabilities must<br />

include:<br />

Resource deployment. Provision<br />

cryptographic resources and create<br />

security access for multiple administrators<br />

at multiple access levels.<br />

21<br />

System Administrators and Security<br />

Officers should be able to perform<br />

their duties without compromising<br />

the Application Owner ability to access<br />

and control the keys.<br />

Policy Configuration. Determine<br />

how many keys can be generated,<br />

and where they are stored. Establish<br />

policies for key usage and custodial<br />

duties, with appropriate training requirements.<br />

Monitoring and reporting.<br />

Secure, automated<br />

and unified<br />

logging and reporting<br />

are vital to risk and<br />

compliance posture.<br />

Key ownership and any<br />

modifications to that<br />

ownership must be recorded and securely<br />

stored to maintain an authentic<br />

audit trail.<br />

With a solid cryptographic key<br />

management infrastructure an organization<br />

can appropriately protect<br />

their “keys to the kingdom” and meet<br />

their encryption needs such as diversity<br />

and availability of keys, encryption<br />

performance, management and<br />

storage of keys, and address compliance<br />

and risk management requirements.<br />

Shawn Campbell is VP of Product<br />

Management, SafeNet Assured Technologies.<br />

He can be reached at Shawn.<br />

Campbell@safenetat.com


Mass Notification/Disaster Response<br />

Emergency24’s two-way, multi-media<br />

mass-communications system<br />

Traditional notification of an emergency<br />

in a building usually is accomplished<br />

with visual (strobe)<br />

and audio (horn/speaker) indicators<br />

while a central station operator<br />

notifies the 911-dispatch center via<br />

telephone contact and then makes<br />

party calls.<br />

That’s the end of the information<br />

exchange.<br />

A conversation, in comparison,<br />

is two-way dialogue. That’s exactly<br />

what’s needed to minimize the impact<br />

of a severe emergency whether<br />

it is in a school, office, hospital or<br />

other facility that attracts generally<br />

the same population each day.<br />

By using your central station’s<br />

advanced notification technologies,<br />

you can open real-time communications<br />

between offsite school<br />

officials or building owners, onsite<br />

teachers, students, building occupants<br />

or tenants and security staff.<br />

Real-time emergency information<br />

and requests for help can come in<br />

from the building while instructions<br />

to building occupants can go<br />

out.<br />

For example, a teacher responding<br />

to an emergency notification could<br />

respond by text that there are injuries<br />

in a certain location in<br />

the facility. The paramedics<br />

then know to go to that location<br />

immediately instead of<br />

sweeping through the building<br />

to find people who need<br />

medical assistance.<br />

The same two-way communication<br />

capabilities are<br />

also available for community-wide<br />

situations, such as a<br />

HAZMAT event, boil-water<br />

order or major road closure,<br />

but instead of an alarm-system<br />

trigger to initiate the<br />

mass notification and emergency<br />

communications (MNEC)<br />

system, an administrator would<br />

manually generate the event message<br />

via an online portal. That message<br />

would then be sent to citizens<br />

who opted-in to receive E-mail,<br />

voice or text alerts.<br />

Consider Appropriate<br />

Groups & Methods to Address<br />

The increased occurrence of mass<br />

shootings and other terror-type<br />

events has led to new ways of thinking<br />

when it comes to emergency<br />

response. This level of response is<br />

not intended for minor incidents<br />

22<br />

like a fistfight in a school hallway.<br />

Response of this magnitude is for<br />

situations like an active shooter or<br />

when there are mass casualties, such<br />

as during a tornado or other natural<br />

disaster.<br />

To establish protocols, alarm contractors,<br />

local emergency-response<br />

agencies and the school/office administrators<br />

must collectively determine<br />

who should receive what type<br />

of information and when.<br />

Having accurately segmented<br />

contact groups is essential so that<br />

the intended audiences receive information<br />

that law enforcement


deems most helpful to protect lives.<br />

Examples of contact groups include<br />

school administrators, security staff,<br />

teachers/managers, students/staff,<br />

elected officials, parents and the<br />

media.<br />

List segmentation determines who<br />

receives complete access to operate<br />

the incident command portal and<br />

other groups who receive immediate<br />

text/E-mail/voice notice of the<br />

incident and access to emergency<br />

procedure documents, but no portal<br />

control. Other contact groups — especially<br />

younger students — would<br />

receive less information about the<br />

incident, if any at all. How much information<br />

is shared with each group<br />

depends on the wishes of the subscriber<br />

and police.<br />

Recipients Can Help Supply<br />

Situational Intelligence<br />

When an alarm is activated by a<br />

system or generated by the incident<br />

command portal, security personnel<br />

and building occupants with the<br />

highest administrative levels (management,<br />

principals, security, maintenance,<br />

etc.) are immediately notified<br />

of the incident via the various<br />

messaging methods.<br />

The notification will identify the<br />

type of emergency that happened<br />

and provide a link to a floor plan<br />

showing where the incident occurred<br />

in the facility. That message<br />

also contains links to get driving<br />

directions to the facility (for police<br />

response) and access to the secure<br />

Internet portal from which two-way<br />

mass communication is facilitated.<br />

From the secure, online incident<br />

command portal, instructions for<br />

building occupants can be sent and<br />

recipients can reply to the messages<br />

by E-mail or text to provide onsite<br />

intelligence. Security personnel can<br />

also be given access to onsite video<br />

feeds to track perpetrators and visually<br />

assess the situation in real-time.<br />

Because building occupants are<br />

able to reply to the messages they<br />

receive, they can have a “digital conversation”<br />

with the incident commanders.<br />

Those responses could<br />

indicate where there are injuries or<br />

even contain photographs to help<br />

identify the perpetrators or let police<br />

know how many perpetrators<br />

they are dealing with when they arrive.<br />

Ongoing two-way communication<br />

between the contact groups can<br />

be maintained throughout the incident<br />

until the “all clear” message is<br />

delivered.<br />

Alarm contractors can market this<br />

service to existing subscribers or to<br />

facilities in which you don’t have the<br />

account because it can be a standalone<br />

system that is not tied to any<br />

specific hardware. That means alarm<br />

contractors can use the equipment<br />

23<br />

they are most comfortable with and<br />

all that’s needed to initiate this system<br />

is receipt of a signal at the central<br />

station to start the initial notification<br />

process.<br />

By integrating a building’s alarm<br />

system with advanced notification<br />

technologies, alarm contractors<br />

have a new and significant revenuegenerating<br />

service to offer schools,<br />

offices and hospitals.<br />

About Emergency24<br />

Emergency 24, Inc. is an Underwriters<br />

Laboratories listed central station<br />

that operates a network of five<br />

monitoring facilities strategically<br />

placed throughout the U.S. to ensure<br />

ongoing operations even during<br />

a time of regional disaster. Our<br />

robust facilities and infrastructure<br />

provide us with the industry’s widest<br />

range of alarm monitoring and<br />

communications capabilities to protect<br />

dealers and subscribers against<br />

failure. Fundamental to our success<br />

and longevity is the fact that our inhouse<br />

team of software engineers<br />

develops services that are consistently<br />

ahead of the industry’s technology<br />

curve to help dealers fulfill<br />

the needs of their subscribers.<br />

For more information, contact<br />

Kevin Lehan, Director of Communications,<br />

1.800.800.3624, ext. 6917<br />

k.lehan@emergency24.com.


Mass Notification/Disaster Response<br />

NICE helps Metro Nashville Department of Emergency<br />

Communications get ready for Next Generation 9-1-1<br />

HOBOKEN, NJ, <strong>Nov</strong>ember 30,<br />

2016 – With plans to deploy a statewide<br />

emergency services network<br />

(ESInet), Tennessee has set the stage<br />

for Next Generation 9-1-1 (NG9-<br />

1-1). The Metro Nashville (TN)<br />

Department of Emergency Communications<br />

(MNDEC), the state’s<br />

largest 9-1-1 center, recently upgraded<br />

to the latest NICE Inform<br />

solution to prepare for this change,<br />

NICE (Nasdaq:NICE) announced<br />

today. NICE Inform will support<br />

the MNDEC’s current communication<br />

recording needs, while also enabling<br />

future logging of SMS texts<br />

and other multimedia, as the center<br />

prepares to accept texts-to-911<br />

starting next year.<br />

All calls that come in to the MN-<br />

DEC – over a million a year – are<br />

processed through the MNDEC’s<br />

VIPER Power 911® platform, a<br />

Voice over IP (VoIP) call processing<br />

solution from West Corporation<br />

that can also receive NG9-1-1 services,<br />

including SMS texts and other<br />

i3 compliant data. NICE Inform is<br />

integrated with and certified to support<br />

leading NG9-1-1 call handling<br />

and text-to-911 applications, including<br />

VIPER.<br />

NENA i3-compliant and futureready<br />

NICE Inform enables a seamless<br />

migration to next generation<br />

emergency communications. NICE<br />

Inform captures, manages, and<br />

synchronizes multi-channel interactions<br />

between citizens, PSAPs<br />

and first responders, to provide a<br />

complete, true record of incidents.<br />

It assembles telephony and radio<br />

communications into an authentic<br />

incident timeline along with<br />

24<br />

SMS 911 texts, GIS, screen recordings,<br />

video and other multimedia,<br />

for comprehensive insight into the<br />

‘who, what, when, where and why’<br />

of incidents.<br />

“Text-to-911 and NG9-1-1 are<br />

coming; it’s only matter of when, and<br />

we need to be<br />

ready,” said<br />

Tim Nielsen,<br />

NICE Administrator<br />

for the Metro<br />

Nashville Department<br />

of<br />

Emergency<br />

Communications.<br />

“Our<br />

recent NICE<br />

upgrades<br />

align with our transition to all IP,<br />

text-to-911 and ultimately NG9-1-<br />

1. For us, it was a necessary move,<br />

and a move in the right direction.”<br />

According to customer surveys,<br />

the Metro Nashville DEC also routinely<br />

receives high marks from<br />

citizens, thanks in large part to its<br />

proactive approach to Quality Assurance<br />

and Quality Improvement<br />

(QA/QI). The MNDEC reviews


over 7,000 calls annually to ensure<br />

quality standards are being met and<br />

protocols are being consistently followed.<br />

With the addition of NICE<br />

Inform Evaluator and Reporter, the<br />

MNDEC will be able to automate<br />

manual QA processes to save time,<br />

while also turning QA data into actionable<br />

information.<br />

“The Metro Nashville DEC exemplifies<br />

what it means to be a pacesetter,<br />

not just within the state of<br />

Tennessee,<br />

but within the<br />

nation,” said<br />

Christopher<br />

Wooten, Executive<br />

Vice<br />

President,<br />

Vertical Markets,<br />

NICE.<br />

“In addition<br />

to spearheading<br />

the modernization<br />

effort<br />

for the MNDEC, Tim Nielsen<br />

has also taken on a critical dual<br />

role as the first Public Safety Chair<br />

of the NICE User Group (NUG)<br />

and leader of the new Public Safety<br />

NICE User Group (PUBNUG). Tim<br />

brings a wealth of technology and<br />

operational experience to this position<br />

which will ultimately be beneficial<br />

to other 9-1-1 centers as they<br />

navigate the challenges of managing<br />

everyday operations while making<br />

steady progress toward NG9-1-1.”<br />

About the Metro Nashville<br />

Department of Emergency<br />

Communications<br />

The Metro Nashville Department<br />

of Emergency Communications<br />

Operations Division is the core of<br />

the public safety system for Davidson<br />

County and the Nashville area.<br />

The Metro Nashville DEC strives<br />

to provide prompt, courteous and<br />

efficient service to the citizens in<br />

Nashville/ Davidson County by answering<br />

9-1-1 and non-emergency<br />

calls, as well as dispatching Police,<br />

Fire, and EMS services. In 2015,<br />

the Metro Nashville DEC handled<br />

over one million calls, with 477,599<br />

of those calls being 9-1-1 in nature.<br />

The Metro Nashville DEC<br />

has achieved and maintained three<br />

accreditations: CALEA (Commission<br />

for the Accreditation of Law<br />

Enforcement Agencies) Communications<br />

Accreditation, and ACE<br />

(Accredited Center of Excellence)<br />

Accreditations through the International<br />

Academy of Emergency<br />

Dispatch for both Medical and Fire<br />

Protocols. It is also a recipient of<br />

the CALEA TRI-ARC Award which<br />

is given to the governing body(s)<br />

and agencies that have concurrent<br />

CALEA accreditation for their law<br />

25<br />

enforcement, public safety communications<br />

and public safety training<br />

agencies. Nashville is one of fifteen<br />

cities that have received this prestigious<br />

award. www.nashville.gov/<br />

Emergency-Communications-Center/Operations-Center.aspx<br />

About NICE<br />

NICE (Nasdaq:NICE) is the worldwide<br />

leading provider of both<br />

cloud and on-premises enterprise<br />

software solutions that empower<br />

organizations to make smarter decisions<br />

based on advanced analytics<br />

of structured and unstructured<br />

data. NICE helps organizations of<br />

all sizes deliver better customer service,<br />

ensure compliance, combat<br />

fraud and safeguard citizens. Over<br />

22,000 organizations in more than<br />

150 countries, including over 80 of<br />

the Fortune 100 companies, are using<br />

NICE solutions. www.nice.com.


Mass Notification/Disaster Response<br />

What the FCC revamping of the<br />

Federal Alert System means to you<br />

By Nelson Daza<br />

In the wake of the New York City<br />

and New Jersey bombings that took<br />

place recently, big changes<br />

are on the way for the<br />

FCC’s Wireless Emergency<br />

Alert (WEA) system. Sen.<br />

Chuck Schumer expressed<br />

dissatisfaction and frustration<br />

with the current<br />

system after the WEA was<br />

used to send a brief 90-character<br />

message to cellphone users in NYC<br />

alerting them to look out for a suspect<br />

by the name of Ahmad Khan<br />

Rahami. The message had no links,<br />

photos or embedded media which<br />

caused many citizens to panic.<br />

While clearly not the intention of<br />

the FCC, their mass communications<br />

technology caused more panic<br />

than it alleviated and the organization<br />

is looking to make upgrades to<br />

ensure this type of situation doesn’t<br />

happen again.<br />

Since the EAS system is vital to<br />

our national security and public<br />

safety, it should undoubtedly be a<br />

state-of-the-art system. There are<br />

some EAS devices and protocols<br />

26<br />

that seem to be out of place in our<br />

modern era. For example, broadcasters<br />

have to purchase and maintain<br />

on-premise hardware that has<br />

very limited functionality<br />

and is very complex to<br />

use. Television broadcasters<br />

can still only broadcast<br />

text information in<br />

the form of a ticker tape<br />

across the top or bottom<br />

of a television set. However,<br />

more and more incident information<br />

contains richer content,<br />

such as images or video, that are not<br />

handled by the devices that are currently<br />

used. The federal government<br />

– and subsequently, all broadcasters<br />

– need to start taking steps that will<br />

allow them to stop depending on<br />

these outdated devices and start using<br />

the Internet to deliver emergency<br />

messages to television and radio.<br />

Not to mention, there are fewer and<br />

fewer people left who know how to<br />

configure, maintain or use these antiquated<br />

appliances.<br />

The ripples of the EAS upgrade<br />

will soon be felt at a municipality<br />

near you. There’s no denying that we<br />

live in a dangerous world today. Active<br />

shooter situations and extreme<br />

weather conditions seem to be happening<br />

with increasing frequency,<br />

so mass communications have never<br />

been more important. During a<br />

crisis, the ability to quickly direct<br />

large groups of people can be the<br />

difference between life and death.<br />

To do that effectively, however, there<br />

are key capabilities government officials<br />

must have in place prior to a<br />

major event. While the FCC hasn’t<br />

provided any specifics around what<br />

standards it will use for its upgrade,<br />

here are three key capabilities that<br />

should make the cut.<br />

Multi-Modal Outreach is Critical<br />

The first step in any mass communications<br />

strategy is to recruit the local<br />

population to join the program.<br />

After all, it doesn’t do anyone any<br />

good to have a cutting-edge, ultramodern<br />

communications system<br />

that can’t reach anybody. Today’s<br />

citizens have come to rely upon a<br />

wide range of Internet-connected<br />

devices, which makes it particularly<br />

difficult to lock in on one specific<br />

method of outreach.<br />

The most successful government


agencies and municipalities have<br />

asked their citizens for two key<br />

pieces of contact information: their<br />

cell phone number and their social<br />

media information. The cell phone<br />

is nearly ubiquitous among people<br />

today and it’s the only device that<br />

people carry and actively engage<br />

with throughout the day. However,<br />

it’s important to realize that no contact<br />

path, including a cellular device,<br />

is 100% reliable, 100% of the time<br />

(which is critical in an emergency<br />

situation when the message must<br />

reach as many people as possible).<br />

This is an important tenet that the<br />

FCC should consider as part of the<br />

EAS overhaul.<br />

A robust, multi-modal mass communications<br />

program enables government<br />

officials to more accurately<br />

and effectively fuel the spread of<br />

information during an emergency.<br />

Once the communication channels<br />

have been decided upon, consider<br />

supporting the program through<br />

advertising, public relations, social<br />

media and even traditional physical<br />

media to get the word out about<br />

how people can sign up for the program.<br />

The FCC should even follow<br />

the lead of local communities,<br />

such as Lewisville, Texas, where a<br />

local emergency management department<br />

conducted an extensive<br />

awareness program, which included<br />

development of marketing materials<br />

and a Public Service Announcement<br />

(PSA). The awareness program was<br />

well received and encouraged residents<br />

to enroll their other devices<br />

and contact paths. The community<br />

saw a 262% increase in resident optins<br />

in less than a year.<br />

The Power of Rich,<br />

Multimedia Messages<br />

Pictures, graphics and sound clips<br />

have permeated our everyday communications<br />

alongside plain text,<br />

and are a valuable tool in crisis communications.<br />

Just think for a moment<br />

back to the New Jersey bombing<br />

incident. If the FCC were able to<br />

issue a picture of the suspect during<br />

their communication, local citizens<br />

would be empowered to become<br />

helpful informants to locating the<br />

suspect. People in crisis situations<br />

tend to be hyper-focused on any and<br />

all stimulus so asking them to take<br />

27<br />

the extra step to locate an image of<br />

the suspect via a Google search is a<br />

bridge too far for many to cross. The<br />

ability to provide people with a succinct<br />

synopsis – complete with the<br />

who’s, where’s, why’s and how’s – is<br />

critical to stomping out uncertainty<br />

and panic from the get-go. A picture<br />

is worth a thousand words and can<br />

serve as a critical piece of information<br />

in criminal investigations for<br />

police officers.<br />

Real-Time Guidance During a Crisis<br />

Crisis situations are fluid and dynamic.<br />

To properly manage an emergency<br />

event, specific people need to<br />

take decisive actions throughout a<br />

prolonged period of time. This requires<br />

an immense amount of realtime<br />

coordination that is impossible<br />

unless an agency or municipality is<br />

able to communicate with targeted<br />

groups during an incident. EAS<br />

should incorporate the fundamentals<br />

of two-way communication,<br />

and targeted notification capabilities,<br />

where possible.<br />

As an example, let’s imagine an<br />

active shooter situation within a<br />

government building. Government<br />

officials could quickly communicate<br />

with security personnel to<br />

confront the gunman while directing<br />

other workers, including those<br />

More on page 51


Mass Notification/Disaster Response<br />

Washington tech firm claims predictive analytics<br />

can improve emergency response operations<br />

WASHINGTON, <strong>Nov</strong>. 28, 2016 – As<br />

Katrina made landfall in the hurricane<br />

season of 2005 - emergency<br />

managers evacuating New Orleans,<br />

faced their biggest challenge - determining<br />

where, when, and who would<br />

be harmed the most.<br />

For over a decade, NeST Group, a<br />

metro DC based techno-conglomerate,<br />

has systematically invested in<br />

building decision support platforms<br />

- that go beyond mere forensic analysis<br />

and provide predictive intelligence<br />

- that commanders can use<br />

in real-time to improve tactical<br />

emergency response<br />

operations.<br />

“The WWW is rich with<br />

data feeds - social media,<br />

internet of things (iOT),<br />

surveillance, primary surveys,<br />

biometrics, spatial<br />

imagery - however, we consume<br />

a very tiny fraction of this massive<br />

information mine to determine<br />

outcomes,” states Dr. Javad K Hassan,<br />

the founding Chairman of the NeST<br />

group. “Aggregating data hives to visualize<br />

future intuitively, eludes all,<br />

but a handful of sophisticated cyber<br />

intelligence (CYBINT) outfits,” he explains.<br />

Across the past decade, business<br />

Dr. Javad K Hassan<br />

decisions using public domain data<br />

steadfastly increased - in crafting entry<br />

and expansion plans, patterning<br />

consumer behavior, and developing<br />

distribution strategies. Yet in tactical<br />

fields - like combat, search & rescue,<br />

or counter-terrorism - its potential<br />

still lies largely untapped.<br />

Anoop Madhavan, the Senior Vice<br />

President of the NeST Group explains,<br />

“The Boston Marathon bombing<br />

triggered the steepest adoption of<br />

the National Incident Management<br />

System (NIMS) across<br />

military and emergency<br />

response organizations in<br />

the US.” NIMS is the presidentially<br />

directed federal<br />

platform to unify and coordinate<br />

responses between<br />

various agencies.<br />

An incident commander<br />

and a tactical operations<br />

chief certified by the Homeland Security<br />

Emergency Management Agency<br />

on disaster operations, Mr. Madhavan<br />

firmly believes “deterministic models<br />

and information is key to the success<br />

of a field commander; it enables him/<br />

her to establish effective, efficient, and<br />

safe priorities to all operatives contributing<br />

to the mission’s success.”<br />

NeST Group companies, rally on<br />

28<br />

technology frontiers - ranging from<br />

fiber optics, embedded systems, signature<br />

intel applications, and geographic<br />

information systems. Two<br />

group companies are rated at CMMi<br />

level 5 - the highest award accorded<br />

by the Carnegie Mellon University’s<br />

Software Engineering Institute.<br />

“Right from its capture at a sensor,”<br />

clarifies Matt Onojafe (Director<br />

of Government Contracting of<br />

Opterna AM, the group’s fiber optics<br />

arm), “we guide data through its lifecycle<br />

as it transforms into actionable<br />

intelligence.” Matt has successfully<br />

led Opterna’s recent contract awards<br />

from the US Department of State,<br />

Army, Navy and the Defense Logistic<br />

Agency (DLA).<br />

Conventional analytic systems stop<br />

with best ingress routes, effective apparatus,<br />

and optimal HR configurations<br />

to respond to a mission. NeST’s<br />

high maturity predictive systems take<br />

deterministic ability, many levels further.<br />

It profiles - with high levels of<br />

statistical confidence - the evacuation<br />

route a community in a disaster aftermath<br />

will instinctually traverse; the<br />

defensive or offensive tactic an adversary<br />

will adopt in combat; and even<br />

the exact location where the target of<br />

a search will be discovered.


As the group prepares to transition<br />

to the new administration’s intelligence,<br />

homeland security, and defense<br />

policies, its IT investments are<br />

honed to equip America’s warfighters,<br />

intel analysts, and first responders,<br />

with better aggregated and visualized<br />

information.<br />

About NeST<br />

NeST Group is a $400 million international<br />

conglomerate with more<br />

than 4000 scientists, engineers, and<br />

employees - headquartered in metro<br />

Washington DC. It has offices in the<br />

Americas, Europe, the Middle East,<br />

South Asia, Japan and the Far East.<br />

NeST’s strategic leadership stems<br />

from its founder and group chairman,<br />

Dr. Javad K Hassan, who was a<br />

senior VP at IBM.<br />

NeST Group has health care (ultrasound<br />

systems, MRI equipment,<br />

PAC systems), green energy (fuel<br />

cells, wind turbine control systems),<br />

embedded systems, wireless, IT, and<br />

fiber optics products. GE, Toshiba,<br />

Hitachi, ABB, Verizon, Honeywell,<br />

France telecom, and Etisalat are all<br />

prominent customers of the group.<br />

Sign-up for Free<br />

<strong>GSN</strong> Digital Editions<br />

and Email Newsletters<br />

Free subscription to your selection of <strong>GSN</strong> digital editions<br />

and daily/weekly email newsletters. Add new selections or<br />

opt-out of any selections at any time.<br />

<strong>GSN</strong> Monthly Digital Edition<br />

<strong>GSN</strong> Airport, Seaport, Rail, Border Security Weekly<br />

<strong>GSN</strong> Daily Insider Newsletter (5 Days Weekly)<br />

<strong>GSN</strong> Cybersecurity Newsletter<br />

<strong>GSN</strong> Media Kit<br />

CLICK HERE<br />

The News Leader in Physical, IT and Homeland Security<br />

www.gsnmagazine.com<br />

29


Mr. Hu, Founder and CEO of Hangzhou<br />

Hikvision Digital Technology Co Ltd, shares<br />

his thoughts with U.S. journalists<br />

By Adrian Courtenay,<br />

Government Security News<br />

On October 21, a group of five<br />

American journalists embarked on<br />

a nine day journey to China, courtesy<br />

of Hikvision USA and parent<br />

company Hangzhou Hikvision Digital<br />

Technology Co Ltd. The trip was<br />

designed to include<br />

visits to Shanghai,<br />

the financial capital<br />

of China; Hangzhou,<br />

where the headquarters<br />

of Hikvision are<br />

located; and Beijing,<br />

the capital of the People’s<br />

Republic of China<br />

and the nation’s political, cultural<br />

and educational center.<br />

The Beijing visit in particular was<br />

of special interest to Government<br />

Security News because Beijing is a<br />

major hub for the country’s very sophisticated<br />

transportation systems<br />

of national highways, expressways,<br />

railways and high-speed rail networks.<br />

The Beijing Capital Airport<br />

is not only the second busiest in the<br />

world in passenger traffic, but also<br />

an architectural masterpiece. And as<br />

we learned when visiting the Hikvision<br />

headquarters, transportation is<br />

a core market for Hikvision, which<br />

also deals with Safe Cities, Education,<br />

Healthcare, Energy and Power<br />

Grids, Cybersecurity, Law Enforcement<br />

and Public Safety, Sports, and<br />

“I’m a big fan of Adam Smith. I’ve read<br />

his books and respect his theories a lot. I<br />

think more about users than competitors.<br />

Hikvision respects competitors.”<br />

of course Video Surveillance.<br />

Founded in 2001 with 49% foreign<br />

capital, Hikvision had a market<br />

capitalization of more than $20<br />

billion USD by September 16, 2016,<br />

more than 18,000 employees and<br />

40 wholly-owned subsidiaries and<br />

shareholding companies worldwide.<br />

According to yearly independent<br />

data from the IHS Market, Hikvision<br />

accounted for 19.5% of market<br />

30<br />

share in the global video surveillance<br />

industry in 2015, up from<br />

4.6% in 2010, and has been ranked<br />

the number one market share leaders<br />

for video surveillance equipment<br />

for five consecutive years. In 2015,<br />

Hikvision was ranked first in the<br />

Emen market with 12.2% market<br />

share, and was ranked second in the<br />

Americas market with<br />

7.3% market share.<br />

In addition to their<br />

meetings with Hikvision,<br />

the American<br />

journalists were also<br />

treated to visits to<br />

some of the great accomplishments<br />

of<br />

ancient China, including the Great<br />

Wall of China, the Forbidden City,<br />

and Ancient gardens dating back<br />

to the 1500’s, along with visits to<br />

the country’s awesome present day<br />

building accomplishments, such as<br />

the gorgeous towers in Shanghai<br />

that dwarf the Empire State Building<br />

and the magnificent Intercontinental<br />

Hotel and Conference Center,<br />

where U.S. President Barack


Obama recently met with Chinese<br />

President Xi Jinping. Not surprising<br />

to anyone, all the cameras in the<br />

Conference Center were installed<br />

by Hikvision, many of them with<br />

3D system patrollers that open remotely<br />

at hotel checkpoints.<br />

But despite the tours and the best<br />

of Chinese cuisine, it seemed obvious<br />

to this observer that some of the<br />

most interesting moments of the trip<br />

in the eyes of the visiting American<br />

journalists took place in the meeting<br />

with Mr. Hu, Founder and CEO<br />

of Hangzou Hikvision Digital Technology<br />

Co. Ltd, who admitted to<br />

having read over a hundred books<br />

on U.S. business and culture, and<br />

who revealed the deep knowledge<br />

and insight of a consummate entrepreneur.<br />

Here are some samples<br />

of the back and forth between the<br />

American journalists and Mr. Hu:<br />

When Ralph Jensen, Editor of<br />

Security Products Magazine, asked<br />

the question, “Have you run into<br />

any “push-back” from companies in<br />

Europe, U.S. etc. Mr. Hu responded:<br />

“I’m a big fan of Adam Smith.<br />

I’ve read his books and respect his<br />

theories a lot. I think more about<br />

users than competitors. Hikvision<br />

respects competitors. We do not use<br />

aggressive tactics with competitors.<br />

It’s a public company. Everything<br />

is public. We have a price system,<br />

but we do not cut rates. We provide<br />

more services to customers. When<br />

31<br />

you compete in a market, you learn<br />

different sentiments. Some competitors<br />

will come and some will go.<br />

China is the most free market in the<br />

world. Investors have benefits. They<br />

do have privilege.<br />

In a surprising answer to a question<br />

from Mark Tarallo of Security<br />

Management Magazine regarding<br />

his personal style and philosophy,<br />

Mr Hu responded, “When we started,<br />

we were not prepared, but we<br />

had passion and learned a lot from<br />

the U.S. A lot of thoughts, passion<br />

and interpretation in a lot of areas.”<br />

He then expanded on his theme<br />

in answer to a question from Clare<br />

Meyer of Security Magazine, who<br />

had asked how citizenship fits in<br />

with Hikvision’s goals:<br />

“Hikvision is a commercial company,”<br />

said Mr. Hu, “and we focus on<br />

business success with four criteria,<br />

in this order:


“The First Partnership is with the<br />

customers, and how do we create<br />

competitive products for them;<br />

“The Second Partnership is the<br />

employees’ performance in fulfilling<br />

the mission of creating value for<br />

competitive products;<br />

“The Third Partnership is that the<br />

company gives respect to the employees<br />

and develops everyone into<br />

an international company. There are<br />

different laws and cultures that are<br />

different from country to country,”<br />

Mr. Hu pointed out. “But we have to<br />

make sure, he adds, that all employees<br />

are offered the same rewards<br />

and respect, while still following the<br />

laws and cultures of their countries.<br />

“The Shareholders are the Fourth<br />

Partner, and Hikvision has been<br />

paying dividends for shareholders<br />

for years, often as high as 48%<br />

of profits,” according to Mr Hu. But<br />

he still feels that the most important<br />

requisite to healthy dividends is<br />

when the employees and customers<br />

are happy. Corporate growth is the<br />

health of the company.<br />

Paul Ragusa, Editor of Security<br />

Systems News, asked Mr. Hu “What<br />

excites you about the company and<br />

its future,” to which Mr Hu responded,<br />

“We’re excited about the next ten<br />

years. We’re full of hope about this<br />

industry. Video – but not just in security<br />

– in many other areas, Robots<br />

for example. We’re developing automation,<br />

so there are lots of things to<br />

do. 50% of our brain is about new.”<br />

In a follow-up question from Ragusa<br />

about new products in the<br />

works, Mr Hu answered, “The traditional<br />

way was to compress. Now<br />

we upgrade. We recognize different<br />

algorithms. We use data. We have a<br />

new product ‘Black Light’ and we’re<br />

also demonstrating new developments<br />

in video. We’re learning artificial<br />

intelligence and its applications,<br />

using retail and learning a lot<br />

of about who is who.<br />

Since our publication Government<br />

Security News has a strong focus<br />

on transportation, as well as an<br />

annual Awards Program on Airport,<br />

Seaport, Border Security and Immigration,<br />

all of which are also core<br />

markets for Hikvision, our question<br />

to Mr. Hu was simply, “What new<br />

32<br />

products and technologies is Hikvision<br />

expecting to deliver in 2017<br />

in the Airport/Aviation, Maritime/<br />

Seaport, Railroad, Border Security<br />

and Immigration markets and as<br />

well as national Energy, Water, Gas<br />

and Oil Grids, and how are you<br />

dealing with Cybersecurity, which<br />

pertains to all of the technologies in<br />

which Hikvision is involved.”<br />

As expected, the response from<br />

Mr. Hu was very interesting and<br />

informative, starting off with Cybersecurity,<br />

which he agrees is a big<br />

challenge, not only for manufacturers,<br />

but also for integrators. “In 2014<br />

we established network security and<br />

cybersecurity to minimize impact<br />

of relation with companies working<br />

with integrators, not only in design,<br />

but also in firewalls if needed. We<br />

try to think from a user perspective.<br />

We need to understand the customer.<br />

We believe that success is 30%<br />

produced by technology and 70%<br />

by good management.”<br />

Mr Hu continued: “We’ve created<br />

improvements in airports, seaports<br />

and borders by adding facial recognition<br />

in airports and seaports and<br />

thermal products in borders, and<br />

our power grids are getting more<br />

secure because we’re now moving<br />

power lines underground. Hikvision<br />

is also using drones and providing<br />

training to integrators in dealing<br />

with forest fires and high towers set<br />

up long range, as strong drones may


e needed to deal high voltage grids<br />

and natural disasters.”<br />

“When we deal with customers,<br />

we need to think if we can do it. All<br />

requirements go to the R&D department,<br />

which collects and sorts out.<br />

We also have a customization department<br />

to build a technology base<br />

and then get feedback. Some products<br />

need changes in technology.<br />

Some changes are not in the present.<br />

We respond very quickly with<br />

our R&D.”<br />

“How about the engineers,” asked<br />

Ralph Jensen. “Are they smarter today?”<br />

“They are more energetic and<br />

more imaginative today. That’s an<br />

influence from American culture,”<br />

said Mr. Hu. “With all our own<br />

ideas and opinions, international<br />

economics brings common conclusions.<br />

We keep some traditions. But<br />

a lot of things will stay. Globalization<br />

is still here.”<br />

And then Ralph asked, “What do<br />

you think about the American Election?”<br />

Several of us later agreed that<br />

Mr. Hu’s answers to this question<br />

were a good example of his extraordinary<br />

ability to make his point very<br />

politely, sometimes so politely that<br />

you might not even understand the<br />

underlying meeting of what he had<br />

said. “Thoughts about the American<br />

election,” said Mr. Hu, “This election<br />

was different from what we<br />

thought it would be. The most developed<br />

county is showing a lack of<br />

confidence. The U.S. should be the<br />

one leading globalization. The U.S.<br />

has the best technology. The U.S.<br />

33<br />

should be more confident.<br />

“How is security developing in<br />

China?” he asked himself. “In earlier<br />

days people were inclined to<br />

obey. Now it’s different. Now people<br />

pursue what they want. They are<br />

more constructive.”<br />

There was some more talk about<br />

the potential of Big Data, Deep<br />

Learning Cameras, Analytics, Deep<br />

Intelligence and “The new era of<br />

Secure Data Technology”, and then<br />

the discussion was over. I can’t guarantee<br />

it, but I believe the rest of our<br />

team came to the pretty much the<br />

same conclusion that I did – that<br />

it was a very informative meeting,<br />

even if we may not have fully understood<br />

every subtlety that was<br />

embedded in Mr. Hu’s statements.<br />

Sign-up for Free <strong>GSN</strong><br />

Print/Digital Editions<br />

& Email Newsletters<br />

CLICK HERE


Researchers say coastal community<br />

stakeholders need to be involved to make<br />

their towns more resilient from storms<br />

MCLEAN, VA <strong>Nov</strong>. 29, 2016 –<br />

Coastal storms can cause surges,<br />

sea-level rise, and cyclone winds<br />

that devastate communities. But<br />

emergency management experts in<br />

a new study detail a method for involving<br />

local stakeholders in planning<br />

for such extreme events and<br />

thereby helping such vulnerable areas<br />

in becoming more resilient.<br />

Coastal communities’ ability to<br />

plan for, absorb, recover and adapt<br />

from destructive hurricanes is becoming<br />

more urgent. As of 2010,<br />

approximately 52 percent of the<br />

United States’ population lived in<br />

vulnerable coastal watershed counties,<br />

and that number is expected<br />

to grow. Globally, almost half of the<br />

world’s population lives along or<br />

near coastal areas.<br />

“In general, risk management has<br />

not been sufficiently focused on<br />

coastal resilience, with community<br />

stakeholders involved in the process<br />

of making their coastline, as<br />

a system, more resilient to coastal<br />

storms,” according to the study,<br />

“Enabling Stakeholder Involvement<br />

in Coastal Disaster Resilience Planning,”<br />

by George Washington University<br />

researchers Thomas Bostick,<br />

Thomas Holzer, and Shahryar Sarkani.<br />

Their study was published in<br />

the online version of Risk Analysis,<br />

a publication of the Society for Risk<br />

Analysis.<br />

“This research demonstrates<br />

a methodology for<br />

involving stakeholders<br />

in discussions that make<br />

their coastlines more resilient,”<br />

says Bostick. After<br />

disasters strike, local<br />

stakeholders are often surprised<br />

and frustrated with<br />

the damages inflicted on<br />

their communities and seek greater<br />

involvement in reducing risk. That<br />

frustration can be addressed by investing<br />

more in physical infrastructures<br />

to protect against flooding. But<br />

the needed infrastructure can be expensive,<br />

such as the $14.5 billion the<br />

U.S. Army Corps of Engineers was<br />

given to reinforce New Orleans after<br />

the 2005 destruction caused by<br />

Hurricane Katrina, an amount of<br />

federal support that most high risk<br />

areas are unlikely to receive.<br />

Recognizing that a methodology<br />

was missing for integrating<br />

34<br />

Thomas Bostick<br />

coastal stakeholders into the process<br />

of identifying and selecting of<br />

resilience-enhancing projects, the<br />

authors conducted a case study with<br />

data from a stakeholder meeting in<br />

Mobile Bay, Alabama, to demonstrate<br />

a method for engaging<br />

stakeholders over a<br />

longer period to identify<br />

what the group considered<br />

the community’s most significant<br />

critical functions<br />

and project initiatives to<br />

preserve those functions<br />

under different scenarios.<br />

Mobile Bay, Alabama’s<br />

only port for ocean-going ships and<br />

an entry point for smaller recreational<br />

and commercial vessels, has<br />

seen population growth and accompanying<br />

demand for housing, infrastructure<br />

development, and other<br />

changes that have impacted natural<br />

ecological systems. During tropical<br />

storms and hurricane events, Mobile<br />

Bay’s Eastern Shore is vulnerable<br />

to coastal erosion and sediment<br />

transfer into the bay.<br />

A workshop involving approximately<br />

30 participants was held in<br />

2015 at the National Oceanic and


Atmospheric Administration’s Disaster<br />

Response Center in Mobile,<br />

Alabama, to test methods to calculate<br />

resilience for the Mobile Bay<br />

region. Participating stakeholders<br />

worked with subject matter experts<br />

in systems engineering, coastal engineering,<br />

risk and decision analysis,<br />

and other fields to develop a set<br />

of proposed projects to address key<br />

resilience stages and domains.<br />

Resilience domains include the<br />

physical (built infrastructure as well<br />

as wetlands, dunes, and other natural<br />

features), information (policies,<br />

building codes, evacuation routes,<br />

and other materials), cognitive<br />

(human processes for sharing and<br />

acting upon knowledge to make,<br />

communicate, and implement decisions),<br />

and social (“interactions,<br />

organizations, people, and policies<br />

that influence how decisions are<br />

made,” such as government flood<br />

insurance, religions, cultures, and<br />

languages). “Coastal communities<br />

can improve resilience not only in<br />

the physical domain, but also in the<br />

information, cognitive and social<br />

domains,” says Bostick. The methodology<br />

described in the study is<br />

intended to support such improvements.<br />

Through the workshop, stakeholders<br />

generated 11 project initiatives,<br />

including, for example, reducing<br />

saltwater intrusion, environmental<br />

and coastal storm education, utility<br />

pole replacement, removing scrap<br />

metal, and reducing impervious<br />

surfaces. The subject matter experts<br />

aligned the initiatives with the four<br />

critical stages associated with resilience:<br />

preparing, absorbing, recovering,<br />

and adapting. Participants<br />

also identified a set of critical functions,<br />

such as telecommunication,<br />

electricity, housing, clean water, the<br />

tourism industry, and others.<br />

In reviewing the workshop results,<br />

the authors note that their study<br />

does not seek to measure whether<br />

a community or a coastline is resilient<br />

or not because there “is clearly<br />

no agreement on how this would<br />

be accomplished.” However, the<br />

methodology offers stakeholders<br />

an opportunity to understand the<br />

concept of resilience and scenarios<br />

and, based on this understanding,<br />

to make informed choices on how<br />

to improve the coastal resilience in<br />

their community. “This is a capability<br />

that does not currently exist,” the<br />

authors write.<br />

Risk Analysis: An International<br />

Journal is published by the nonprofit<br />

Society for Risk Analysis (SRA), an<br />

interdisciplinary, scholarly, international<br />

society that provides an open<br />

forum for all who are interested in<br />

risk analysis, a critical function in<br />

complex modern societies. Risk<br />

analysis includes risk assessment,<br />

risk characterization, risk communication,<br />

risk management, and risk<br />

policy affecting individuals, publicand<br />

private-sector organizations,<br />

and societies at a local, regional, national,<br />

or global level. www.sra.org<br />

35


Robin Systems continues to win laurels with two new<br />

TMC awards for IT excellence and Info Tech spotlight on<br />

big data as a service, making application-defined data<br />

center as a reality<br />

SAN JOSE, CA, <strong>Nov</strong>. 17, 2016<br />

(GLOBE NEWSWIRE) – Robin<br />

SystemsTM, the first Application-<br />

Defined Data Center software<br />

company, today announced that its<br />

Robin Containerization Platform<br />

has been recognized by Technology<br />

Marketing Corporation (TMC) via<br />

two of its prestigious awards, winning<br />

the Internet Telephony Magazine’s<br />

IT Excellence Award and the<br />

2016 InfoTech Spotlight Magazine’s<br />

Big Data as a Service Award.<br />

Each of these awards recognized<br />

nine companies and their products<br />

for excellence. Both awards recognized<br />

Robin for its applicationaware<br />

and Big Data-optimized<br />

converged infrastructure software<br />

among products from other industry-leading<br />

companies such as SAP.<br />

These two industry-leading<br />

awards programs add to the recognition<br />

Robin has already earned in<br />

2016, including its most recent honor<br />

of being named a finalist for Red<br />

36<br />

Herring’s 2016 Top Global Award.<br />

Robin has also earned the Golden<br />

Bridge Awards’ Gold Award, Red<br />

Herring Top 100, The Stevie Awards’<br />

New Software Product of the Year<br />

and Network Product Guide’s Startup<br />

of the Year.<br />

The IT Excellence Award recognizes<br />

the creators of technologies<br />

and solutions that demonstrate<br />

leadership and innovation in the<br />

industry while the 2016 Big Data as<br />

a Service Excellence Award, in particular,<br />

recognizes BDaaS solutions<br />

that help companies store and analyze<br />

data, enabling intelligent business<br />

decisions.<br />

”We congratulate Robin for its<br />

achievement in helping organizations<br />

create a world-class IT infrastructure,”<br />

said Rich Tehrani, chief<br />

executive officer of TMC. “Robin’s<br />

technology delivers the level of excellence<br />

in performance, flexibility<br />

and agility that businesses of all sizes<br />

are coming to find indispensible.<br />

I look forward to witnessing Robin’s<br />

continued success.”<br />

“We’re honored that TMC has recognized<br />

our Robin Containeriza-


tion Platform through these awards,<br />

underscoring our ability to help<br />

today’s enterprise fully transition<br />

to an infrastructure that is application<br />

defined and ready for digital<br />

business,” said CEO Premal Buch of<br />

Robin. “Robin aims to help enterprises<br />

set their data free by breaking<br />

down walls and complexities that<br />

often become an insurmountable<br />

impediment for many enterprises<br />

in fully harnessing data – their most<br />

critical asset. Our goal is to give<br />

them a quicker, simpler and more<br />

cost-effective route to ensure predictability,<br />

quality of service, greater<br />

performance, and access.”<br />

Tweet this @RobinSystems wins<br />

two 2016 awards from @TMCNet,<br />

IT Excellence and Infotech Spotlight<br />

Big Data as a Service http://bit.<br />

ly/2fe1XbG http://bit.ly/2fBG9oi<br />

The Robin Containerization<br />

Platform: Application-Centric IT<br />

infrastructure for Digital Enterprise<br />

Robin’s Containerization Platform<br />

unveils the era of Application-Defined<br />

Data Center, enabling IT professionals<br />

to dramatically simplify<br />

application deployment and lifecycle<br />

management while guaranteeing<br />

predicted Quality of Service for databases<br />

and Big Data applications. This<br />

also enables enterprises to achieve<br />

significant CAPEX and OPEX savings<br />

via application consolidation<br />

on shared hardware. Running on a<br />

customer’s own commodity hardware,<br />

the Robin Containerization<br />

Platform software pools the computing<br />

and storage resources across<br />

servers to create a containerized<br />

agile compute layer, where applications<br />

are deployed within containers.<br />

The container-aware scale-out<br />

block storage enables modern agile<br />

application lifecycle management,<br />

including snapshot and cloning of<br />

the entire application. Robin’s application-aware<br />

infrastructure fabric<br />

controller automates and marshals<br />

the compute and storage layers,<br />

thereby making the infrastructure<br />

completely transparent to the application<br />

owners and developers.<br />

Robin Containerization Platform<br />

helps users:<br />

• Virtualize databases (Oracle,<br />

NoSQL) and Big Data applications<br />

(Hadoop, Spark, Elastic Search, Kafka)<br />

with bare-metal performance.<br />

• Increase hardware utilization by<br />

a factor of 2x-3x by consolidating<br />

performance-sensitive applications<br />

with guaranteed performance and<br />

noisy-neighbor-induced performance<br />

hiccups.<br />

• Reduce database licensing cost<br />

by 50 percent or more through database<br />

consolidation.<br />

• Boost productivity by a factor of<br />

10x-100x for developers and DBAs,<br />

with capabilities such as 1-click cluster<br />

deployment, scale-up and scaleout,<br />

application snapshot, clone and<br />

time travel.<br />

For more details on the Robin<br />

37<br />

platform please visit robinsystems.<br />

com.<br />

About TMC<br />

Global buyers rely on TMC’s content-driven<br />

marketplaces to make<br />

purchase decisions and navigate<br />

markets. This presents branding,<br />

thought leadership and lead generation<br />

opportunities for vendors/sellers.<br />

TMC’s Marketplaces:<br />

• Unique, turnkey online communities<br />

boost search results, establish<br />

market validation and elevate<br />

brands and thought leadership,<br />

while minimizing ad-blocking.<br />

• Custom lead programs uncover<br />

sales opportunities and build databases.<br />

• In-person and online events<br />

boost brands, enhance thought<br />

leadership and generate leads.<br />

• Publications, display advertising<br />

and newsletters bolster brand reputations.<br />

• Custom content provides expertly<br />

ghost-crafted blogs, press releases,<br />

articles and marketing collateral<br />

to help with SEO, branding and<br />

overall marketing efforts.<br />

• Comprehensive event and road<br />

show management services help<br />

companies meet potential clients<br />

and generate leads face-to-face.<br />

For more information about TMC<br />

and to learn how we can help you<br />

More on page 51


Saab Seaeye Leoport ROV system delivered<br />

to Japan’s Kaiyo Engineering<br />

In a bid to master mountainous<br />

seas the Saab Seaeye Leopard ROV<br />

system recently delivered to Japan’s<br />

Kaiyo Engineering has added an active<br />

heave compensator (AHC) to<br />

its launch and recovery system.<br />

Kaiyo Engineering, a specialist<br />

marine science company, is undertaking<br />

seabed research for Tokyo<br />

University and is using the Leopard<br />

to explore the feasibility of seabed<br />

mining.<br />

Adding AHC means Kaiyo can<br />

work offshore more easily in high<br />

sea states, as the AHC system will<br />

accurately maintain the exact relative<br />

depth of the tether management<br />

system from which the Leopard is<br />

deployed by compensating for wave<br />

movement and effectively creating a<br />

motionless state between them. This<br />

significantly increases the ease of<br />

Log file of winch response during tests in Japan. The green curve shows the vessel heave at the<br />

LARS and the orange curve the actual response of the winch. The harmonious relationship between<br />

both curves illustrates how the AHC’s millisecond response to displacement achieves accurate compensation.<br />

ROV operations in high sea states.<br />

The highly advanced AHC system<br />

from Scantrol is designed to maintain<br />

accurate position control at the<br />

winch in real time by calculating<br />

and compensating for any displacement<br />

of the vessel caused by wave<br />

movement. Increased operational<br />

time, safety, ease of use and efficient<br />

commissioning is the main focus of<br />

Scantrol AHC.<br />

With the knowledge from simulations<br />

and tests performed prior<br />

to the commissioning, the LARS<br />

system was upgraded on board the<br />

vessel by Hydramec and Scantrol in<br />

only three days.<br />

In Japan the system was tested to<br />

38<br />

record winch response and winch<br />

speed, by simulating 3m vessel displacement<br />

down to the Leopard’s<br />

3000 metre rated depth.<br />

The 3000m rated Leopard is the<br />

most powerful electric underwater<br />

robotic work system in the world,<br />

making it ideal for complex and demanding<br />

tasks.<br />

Saab Seaeye is the world’s leading<br />

underwater e-robotics company<br />

with the most advanced range of<br />

tethered, autonomous and hybrid<br />

robotic systems engineered to address<br />

the diverse range of tasks<br />

found across commercial, defence<br />

More on page 52


CA Technologies strengthens security portfolio with new<br />

advanced analytics and Identity-as-a-Service offerings to<br />

protect and enable the agile enterprise<br />

Mordecai Rosen<br />

LAS VEGAS, <strong>Nov</strong>. 16, 2016 – CA<br />

WORLD ’16 – CA Technologies<br />

today announced a new behavior<br />

analytics solution that integrates<br />

with CA Privileged Access Manager<br />

(PAM). Called CA Threat Analytics<br />

for PAM, the product features machine-learning<br />

capabilities for better<br />

threat detection and breach prevention<br />

associated with privileged<br />

users. CA also announced CA Identity<br />

Service, a new, turn-key identity-as-a-service<br />

solution, to address<br />

identity and access management<br />

(IAM) needs for both on-premises<br />

and cloud-based applications.<br />

“By applying CA’s unmatched<br />

self-learning behavior analytics to<br />

privileged user activity, CA can help<br />

CISOs with their biggest challenge:<br />

staying one step ahead of the bad<br />

actors,” said Mordecai Rosen, senior<br />

vice president and general<br />

manager, CA Security<br />

business. “Going beyond<br />

protection, CA is extending<br />

secure business operations<br />

with CA Identity<br />

Service to support deeply<br />

embedded on-premises<br />

systems while taking advantage<br />

of the agility of cloud applications<br />

and services.”<br />

Setting New Standards in Threat<br />

Detection, Breach Prevention and<br />

IDaaS for Hybrid IT Environments<br />

Available today, CA Threat Analytics<br />

for PAM models privileged user<br />

behavior and evaluates risk based<br />

on factors such as a user location,<br />

time and duration of activity, the<br />

data being accessed and the user’s<br />

track record for security and past<br />

behavior. When a breach or threat is<br />

detected, the system automatically<br />

triggers controls to mitigate risks,<br />

such as starting session recording,<br />

initiating a stronger authentication<br />

procedure or alerting security system<br />

and operations.<br />

In a recent global survey conducted<br />

by Coleman Parkes for CA,<br />

82 percent of respondents<br />

said identity-centric security<br />

is critical to the business.*<br />

CA Identity Service<br />

addresses the need for<br />

a modern, hybrid IAM solution<br />

– giving businesses<br />

the agility to quickly and<br />

securely adopt cloud ap-<br />

39<br />

plications and services alongside<br />

their on-premises applications<br />

controlled by CA Single Sign-On,<br />

managing everything from a single<br />

launch pad. CA Identity Service balances<br />

the demand for security, agility<br />

and a positive user experience.<br />

“We see our customers’ businesses<br />

moving increasingly to a hybrid IT<br />

environment. It’s clear we need to<br />

help them with an identity and access<br />

management solution that supports<br />

both their cloud-based and<br />

on-premises applications,” said Ed<br />

Pascua, senior vice president at Simeio<br />

Solutions. “CA Identity<br />

Service offers the flexibility and<br />

management we need to meet the<br />

demands of our customers’ hybrid<br />

enterprise. CA’s Identity Service is<br />

an excellent tool that helps Simeio<br />

More on page 52


U.S. and Canada bring Homeland Security<br />

solutions to Milipol Qatar<br />

DOHA, QATAR and WALDWICK,<br />

NJ — In the Middle East, as populations<br />

and infrastructure grow,<br />

public and private stakeholders are<br />

looking for new ways to protect<br />

people and property. With solutions<br />

ranging from large-scale homeland<br />

security strategies to risk-specific<br />

equipment, products and services,<br />

leading suppliers from the United<br />

States and Canada competed for defense<br />

and security business at Milipol<br />

Qatar earlier this year in Doha,<br />

Qatar.<br />

The centerpiece of the effort was<br />

the North American Pavilion, organized<br />

by Kallman Worldwide, Inc.,<br />

the show’s official representative to<br />

the continent, in coordination with<br />

numerous government agencies,<br />

including the U.S. departments of<br />

Commerce, Defense and State and<br />

their Canadian counterparts. The<br />

Pavilion was a primary destination<br />

for buyers looking to meet industry<br />

leaders, an on-site business hub for<br />

North American exhibitors looking<br />

to maximize their exposure and impact<br />

at the event, and a forum for all<br />

to share industry information and<br />

insights.<br />

Ranging from publicly-traded<br />

stalwarts such as General Dynamics<br />

(NYSE: GD) Land Systems Canada<br />

and Raytheon (NYSE: RTN) to privately<br />

held small-and-mediumsized<br />

enterprises (SMEs) with fewer<br />

than 250 employees, Pavilion exhibitors<br />

looked to initiate or strengthen<br />

international partnerships that will<br />

generate new business and create<br />

more jobs back home.<br />

According to the Ministry of the<br />

Interior of Qatar, 11 contracts worth<br />

a total of 260.050 Million and fifty<br />

thousand Qatari Riyal were signed<br />

at the event.<br />

“When North American companies<br />

commit to exhibit at Milipol<br />

Qatar, we’re saying we believe in the<br />

power of this event to attract real<br />

business prospects and customers,”<br />

said Kallman Worldwide President<br />

and CEO, Tom Kallman. “As the dynamics<br />

of life in the Middle East inspire<br />

new strategies for defense and<br />

security, we’re proud to work with<br />

the Milipol organizers to help our<br />

exhibitors succeed in Qatar, whether<br />

as prime contractors or subcontractors<br />

in support of regional<br />

manufacturers, service partners and<br />

their end-user customers.”<br />

Kallman pointed to two companies<br />

that exemplify the wide range<br />

of solutions presented at the Pavil-<br />

40<br />

ion:<br />

• Passport Systems (Booth K-030)<br />

develops advanced active and passive<br />

solutions to rapidly and automatically<br />

detect, localize and<br />

identify concealed threats and contraband<br />

for a broad range of applications,<br />

including pedestrian-,<br />

vehicle-, and fixed-facility-based<br />

approaches. The company was recently<br />

presented with the Massachusetts<br />

Port Authority (Massport)<br />

Security Innovation Award from<br />

U.S. Senator Edward Markey, who<br />

thanked company CEO, Dr. Robert<br />

Ledoux and his team for creating, “a<br />

truly remarkable cargo inspection<br />

system capable of detecting potentially<br />

dangerous material and other<br />

contraband.<br />

• Canadian manufacturer Newcon<br />

Optik (Booth L-029) had its<br />

sights set on new business — literally<br />

— with a number of innovative<br />

gunsights and accessories including:<br />

n The SEEKER Series of mountable<br />

laser rangefinders are versatile,<br />

lightweight and MIL-SPEC<br />

modules capable of being boresighted<br />

to practically any optical<br />

system, including spotting<br />

scopes, binoculars, and thermal


imagers, as well as mounted onto<br />

rifles and integrated into complex<br />

fire control systems.<br />

n NVS 27M is an exceptionally<br />

lightweight and versatile Gen 3<br />

night vision clip-on is rugged,<br />

compact and durable.<br />

n LRM 3500M, a MIL-SPEC,<br />

pocket-sized laser rangefinder<br />

monocular that’s designed to<br />

outperform other devices of its<br />

class.<br />

“In an increasingly dangerous<br />

world, security is a growth market,<br />

and competition lurks around every<br />

corner,” said Kallman. “From surveillance<br />

and weapons to equipment<br />

and training, our North American<br />

exhibitors are bringing exceptional<br />

innovation, ideas and experience to<br />

Milipol Qatar.”<br />

About Kallman Worldwide, Inc.<br />

Export with purpose. Exhibit with<br />

confidence. Kallman Worldwide is<br />

an export marketing advocate focused<br />

on helping the United States<br />

of America and its leading businesses<br />

capitalize on international<br />

trade shows and events to grow<br />

their share of global markets. Our<br />

flagship International Pavilion programs<br />

cover all the details of creating<br />

and presenting a professional<br />

business environment to buyers, enabling<br />

exhibitors, clients and partners<br />

to make the most of their event<br />

opportunities, cultivate meaningful<br />

global business relationships and<br />

account for a measurable return on<br />

their export marketing investment.<br />

Since 1963, Kallman has helped<br />

more than 10,000 companies, as-<br />

41<br />

sociations and government agencies<br />

stand out at nearly 1,000 industry<br />

and professional events in 46 countries.<br />

The company is a strategic<br />

partner of the U.S. Department of<br />

Commerce, and a proud recipient of<br />

the President’s “E” Award. In 2016,<br />

Kallman Worldwide was honored<br />

to receive the AmCham Abu Dhabi<br />

“Falcon” Award for its organizationwide<br />

commitment to building sustainable<br />

business relationships between<br />

the U.S. and the U.A.E. The<br />

company recently joined the Bilateral<br />

US-Arab Chamber of Commerce<br />

in support of the Chamber’s<br />

mission to foster economic growth,<br />

educational advancement and mutual<br />

respect between the U.S. and<br />

the MENA region. For more information<br />

visit www.kallman.com


Salient CRGT appoints Joseph Zimmerman as<br />

Vice President, Enterprise Solutions Group<br />

FAIRFAX, VA, <strong>Nov</strong>ember 22,<br />

2016 – Salient CRGT, Inc., a<br />

leading provider of Agile software<br />

development, data analytics,<br />

mobility, cyber security,<br />

and infrastructure solutions,<br />

today announced the addition<br />

of Joseph Zimmerman as Vice<br />

President, Enterprise Solutions<br />

Group (ESG). He will lead Salient<br />

CRGT’s delivery oversight<br />

at the U.S. Postal Service and other<br />

strategic accounts, with additional<br />

responsibilities in business development<br />

in new customer capture,<br />

including expansion into the Department<br />

of Defense, and propelling<br />

Salient CRGT’s market leading<br />

solutions in Agile and mobile development.<br />

Mr. Zimmerman is a military<br />

veteran with more than 20 years of<br />

active duty experience as an officer<br />

in the United States Marine Corps<br />

where he served as Company Commander<br />

and Operations Officer. As<br />

a proven leader, he brings 28 years<br />

of successful management experience<br />

and a track record of superior<br />

results in growing organizations<br />

both organically and through new<br />

opportunities.<br />

“With his depth and breadth of<br />

demonstrated achievement, Joe’s<br />

entrepreneurial leadership and extensive<br />

background in operations,<br />

business development and strategy<br />

will be invaluable to our business<br />

development team and our customers,”<br />

said Tom Ferrando, President<br />

of Salient CRGT. “We look forward<br />

to his immediate contribution that<br />

will further define our strategic focus<br />

in Salient CRGT’s market leading<br />

solutions in Agile and mobile<br />

delivery, as well as expansion in our<br />

service to military and other government<br />

customers.”<br />

Before joining Salient CRGT, Mr.<br />

Zimmerman was the Chief Operating<br />

Officer for Pyramid Systems,<br />

where he was responsible for overall<br />

corporate strategy and day-today<br />

management across operations,<br />

business development, contracts,<br />

human resources, security, corporate<br />

IT, and facilities. With more<br />

42<br />

than 100 employees and revenue<br />

in excess of $25 million, he established<br />

their first ever comprehensive<br />

business plan and was<br />

able to bring key leadership into<br />

operations and human resources.<br />

Prior to joining Pyramid, he<br />

held several progressive leadership<br />

positions at InfoReliance<br />

Corporation, eventually becoming<br />

their Executive Vice President<br />

of Operations. During the course<br />

of his tenure, he came to lead the<br />

company’s entire services portfolio<br />

including software engineering, cyber<br />

security, cloud computing, and<br />

enterprise IT capability areas to include<br />

customers in the defense, civilian<br />

and commercial sectors.<br />

“We are proud to bring Joe on<br />

board as we continue to meet the<br />

demanding mission critical needs of<br />

our customers,” said Manoj Gandhi,<br />

Senior Vice President ESG. “As we<br />

expand in to new military markets,<br />

his experience and strong relationships<br />

with the Marine Corps will<br />

enhance our future endeavors.”<br />

Mr. Zimmerman retired from the<br />

Marine Corps in 2007 and received<br />

five personal awards including the<br />

Meritorious Service Medal, Joint<br />

More on page 52


Energetiq introduces EQ-77, its 5th generation, ultra-bright,<br />

Laser-Driven Light Source (LDLS )<br />

WOBURN, MA, <strong>Nov</strong>ember 29,<br />

2016 – Energetiq Technology, a<br />

world leader in high brightness,<br />

broadband light sources for advanced<br />

technology applications, introduces<br />

the 5th generation, ultrabright,<br />

Laser-Driven Light Source,<br />

the EQ-77, at the MRS Fall Exhibit<br />

2016.<br />

Based on the highly successful<br />

Laser-Driven Light Source (LDLS)<br />

technology, the EQ-77 offers higher<br />

radiance and irradiance from a<br />

truly broadband white light source.<br />

The EQ-77 features a compact lamp<br />

house, with clean construction that<br />

ensures long life and ultimate stability.<br />

With a wavelength range<br />

from 170nm in the deep ultraviolet<br />

to >2µm in the near infrared,<br />

and a choice of dual-beam output<br />

or a single-beam output with retroreflector,<br />

the EQ-77 is flexible for a<br />

broad variety of applications.<br />

“The EQ-77 is the most advanced<br />

DUV-NIR light source on the market<br />

today,” said Debbie Gustafson,<br />

CEO of Energetiq. “As our 5th-generation<br />

of LDLS, it incorporates<br />

our latest technologies to deliver the<br />

ultimate in stable, long-life, broadband,<br />

ultra-bright performance for<br />

our customers in semiconductor<br />

and optical sensor metrology, advanced<br />

spectroscopy, photo emission<br />

and imaging applications.”<br />

EQ-77 LDLS Features:<br />

• Higher spectral radiance: Greater<br />

than 40mW/mm2.sr.nm<br />

• Compact, ultra-clean lamp house<br />

with integrated laser<br />

• Flexible optical interface: dual<br />

beam or enhanced output single beam<br />

• Designed for 24/7/365 operation<br />

• Low noise, 2µm (UV-Vis-NIR). Combined<br />

43<br />

with 10X the lifetime of traditional<br />

xenon and deuterium lamps, the<br />

LDLS products enable higher performance<br />

metrology, spectroscopy,<br />

and imaging applications at lower<br />

cost of ownership.<br />

The LDLS series received the prestigious<br />

R & D 100 Award in 2011 for<br />

its technological significance, and a<br />

2011 Prism Award for Photonics Innovation.<br />

About Energetiq<br />

Energetiq Technology is the world’s<br />

leading developer and manufacturer<br />

of ultra-bright broadband<br />

light sources for a wide variety of<br />

advanced applications in life and<br />

materials sciences, semiconductor<br />

manufacturing, and R&D. Energetiq’s<br />

light sources are based on<br />

a revolutionary laser-driven light<br />

source technology that generates<br />

high brightness across the spectrum,<br />

with high reliability and long<br />

operating life in a compact package.<br />

More information about Energetiq is<br />

available at www.energetiq.com.


Selfies: A new weapon against public<br />

assistance fraud<br />

By Monty Faidley<br />

One downside in moving public assistance<br />

programs into the digital<br />

world has been the loss of face-toface<br />

contact between citizens and<br />

government agencies. Previously,<br />

validating the identities of beneficiaries<br />

wasn’t an issue because government<br />

employees could see who<br />

they were talking to, but this<br />

has clearly changed.<br />

While no one is ommending a return<br />

recto<br />

old ways of doing<br />

business, identity<br />

fraud has become a<br />

serious and grow-<br />

ing threat to the integrity<br />

of Health and Human<br />

Services (HHS) programs. Last<br />

year taxpayers lost more than $100<br />

billion from public assistance programs<br />

due to fraud and improper<br />

payments. And, based on what I’ve<br />

heard from law enforcement and<br />

witnessed in my experience working<br />

with government customers,<br />

much of it stemmed from organized<br />

criminal groups – both foreign and<br />

domestic – who sell stolen identity<br />

information on the “dark web,”<br />

which is often used to commit fraud<br />

against HHS agencies.<br />

It is an alarmingly easy criminal<br />

enterprise that has increased dramatically<br />

since government services<br />

went online. Criminals often<br />

use stolen identities for robbing tax<br />

refunds, medical benefits, unemployment<br />

insurance benefits, death<br />

benefits and other public assistance<br />

programs. The people hurt<br />

the most are the disad-<br />

vantaged<br />

Americans<br />

who truly need the<br />

safety nets.<br />

HHS agencies ur-<br />

gently need to adopt<br />

new multi-layer secu-<br />

rity models of authen-<br />

ticating users to prevent<br />

fraudulent manipulation of<br />

their programs. The current norm<br />

of requiring only single-layer authentication<br />

such as passwords or<br />

PINS is woefully inadequate. Multiple<br />

layers of strong authentication<br />

are needed to withstand the<br />

constantly evolving nature of fraud<br />

schemes.<br />

The good news is that the ubiquity<br />

of smartphones combined with<br />

biometric-based security technolo-<br />

44<br />

gies like fingerprint scanning and<br />

facial recognition offer HHS agencies<br />

a powerful new authentication<br />

weapon to combat identity fraud.<br />

One promising idea is using<br />

smartphone “selfies” as part of a<br />

multi-layer approach for verifying<br />

and authenticating beneficiary<br />

identities. A new generation of<br />

smartphone apps are emerging that<br />

could help agencies validate identities<br />

with the near-reliability of faceto-face<br />

contact.<br />

We’re already seeing it deployed<br />

in the commercial world. Earlier<br />

this year, MasterCard launched its<br />

“Selfie pay” service that lets consumers<br />

use selfies to authenticate<br />

online purchases. And today, free<br />

apps such as Identity Snapshot are<br />

emerging on the iTunes Store specifically<br />

designed to authenticate<br />

identities for any number of government<br />

services.<br />

Since no single database of peoples’<br />

faces currently exist (outside of<br />

state motor vehicle departments) for<br />

running massive facial recognition<br />

queries, apps like these will initially<br />

work in conjunction with identity<br />

documents like driver licenses and<br />

state IDs to correlate the selfie with


other information.<br />

Here’s a typical example: Beneficiaries<br />

first enter their identity information<br />

on their smartphones,<br />

then photo-capture an identity<br />

document like a driver license in<br />

the same way mobile banking deposit<br />

apps capture images of checks.<br />

Next, a selfie image is captured and<br />

presented alongside the identity<br />

document for visual verification.<br />

The agency’s data records verify if<br />

the person exists and that the data<br />

they provided matches their own.<br />

The apps can also verify that the<br />

mobile device or the user’s identity<br />

is not associated with previous<br />

fraud attempts. They can be configured<br />

to determine if the IP address<br />

is outside the U.S., or if the Social<br />

Security number has been used on<br />

multiple applications. The apps can<br />

also generate a one-time identity<br />

quiz or a one-time password for access.<br />

These multiple layers can on the<br />

smartphone front-end can also be<br />

reinforced on the back-end by leveraging<br />

identity repositories to further<br />

ensure that people applying<br />

for benefits are indeed who they<br />

claim to be. And when beneficiary<br />

data is shared between states,<br />

authentication is even more<br />

powerful. States can better identify<br />

fraudsters who move their criminal<br />

activities from one state to another.<br />

Wrapping up<br />

Using selfies as part of a multi-layer<br />

identity authentication approach<br />

has one huge advantage: it’s easy<br />

and people are comfortable with it.<br />

A majority of U.S. adults now sport<br />

smartphones, and the vanity-inducing<br />

nature of social media has made<br />

posting selfies part of the cultural<br />

fabric. It offers less “friction” when<br />

it comes to widespread user adoption.<br />

As identity fraud in benefits programs<br />

increases, agencies can maintain<br />

program integrity by using<br />

selfie-driven multi-layered authen-<br />

45<br />

tication to verify beneficiary identities<br />

and keep the crooks at bay.<br />

Agencies should also consider expanding<br />

beyond traditional departmental<br />

data to leverage information<br />

from other government agencies<br />

and third-party external sources. It<br />

is perhaps our best option for bringing<br />

back the reliability of face-toface<br />

engagement with beneficiaries.<br />

Monty Faidley is Director of Health<br />

and Human Services and Special<br />

Investigative Unit with LexisNexis<br />

Risk Solutions. He may be reached at<br />

monty.faidley@lexisnexis.com.


ITL Group and Applied DNA Sciences partner to<br />

develop anti-counterfeit ‘SigNature ® DNA’ printed<br />

fabric label solution<br />

STONY BROOK, NY, <strong>Nov</strong>ember<br />

22, 2016 – The ITL Group, an international<br />

apparel label solutions<br />

company owned by SA Bias Industries,<br />

has today announced a partnership<br />

with Applied DNA Sciences<br />

(Applied DNA) (NASDAQ:APDN),<br />

a provider of DNA-based supply<br />

chain, anti-counterfeiting and anti-theft<br />

technology, product genotyping<br />

and product authentication<br />

solutions to marry Applied DNA’s<br />

revolutionary SigNature® DNA forensic<br />

marking system with ITL’s<br />

printed fabric care labels to support<br />

global apparel and footwear brands<br />

and retailers in their on-going battle<br />

against product counterfeiters.<br />

Applied DNA has demonstrated<br />

feasibility of SigNature DNA forensic<br />

authentication and Beacon optical<br />

screening technology integrated<br />

with ITL’s wet ink solution for<br />

fabric care labels, creating a multilayer<br />

anti-counterfeit solution. The<br />

technology is intended to be applied<br />

to printed fabric labels (PFL), either<br />

via the supply of a stand-alone PFL<br />

or through integration of their existing<br />

washcare labels. Further testing<br />

and development<br />

is required to validate<br />

through the product<br />

lifecycle prior to general<br />

market availability,<br />

with an interest by<br />

ITL to conduct further<br />

trials on their range of<br />

heat transfer labels. A solution is<br />

expected to launch in the near future.<br />

ITL’s European Sales and Marketing<br />

Director, Simon Phelps commented.<br />

“Counterfeiting continues<br />

to be one of the most significant<br />

problems within our industry and<br />

accounts for around 10% of global<br />

GDP. The growth of on-line popup’s<br />

selling full price fakes has only<br />

exacerbated the issue in recent years<br />

and new research has shown that<br />

now for every one consumer who<br />

knowingly buys a counterfeit product,<br />

there are another 30 or so who<br />

purchase unwittingly.”<br />

Applied DNA designs and formulates<br />

the DNA with Beacon-encrypted<br />

fluorescence in ITL ink at<br />

their US Laboratories. The botanically-derived<br />

DNA delivers 100%<br />

46<br />

individuality, forming the basis of<br />

unquestionable evidence of authenticity<br />

for any brand seeking to bring<br />

a prosecution against a found counterfeiter<br />

of labels.<br />

Whilst the SigNature DNA authenticity<br />

tests can be verified forensically<br />

in the field or on site or<br />

in the Applied DNA laboratories,<br />

the integration of Beacon technology<br />

provides the means for brands<br />

to conduct their own ‘rapid read’<br />

checks on suspected items in the<br />

field.<br />

“What excites us most about our<br />

solution is that whilst the application<br />

of Applied DNA’s SigNature<br />

DNA makes it completely secure<br />

and uniquely identifiable, the breakthrough<br />

is in the Beacon which<br />

is completely hidden until it’s unlocked<br />

by the reaction to the chemi-


cals built into the swab,” stated Simon<br />

Phelps.<br />

A proprietary chemical compound<br />

placed within the ink, which<br />

is completely invisible under normal<br />

or ultraviolet lighting conditions<br />

illuminates only when rubbed<br />

with a specific swab device that will<br />

be supplied by ITL to the brands.<br />

This reaction produces the ‘Beacon’<br />

illumination effect on the end of the<br />

swab which is then detected when<br />

shone with a UV torch. In effect,<br />

a ‘lock and key’ solution is created<br />

for field screening of the SigNature<br />

DNA mark to support forensic DNA<br />

authentication conducted remotely.<br />

“As a result, brand inspectors are<br />

able to make quick checks without<br />

receiving unwanted attention and<br />

can tell instantly if the product is<br />

marked with SigNature DNA. The<br />

beauty of the solution is that whilst<br />

the science behind it makes it the<br />

most credible anti-counterfeit application<br />

available, the cost of integrating<br />

it into a printing process is<br />

relatively low and therefore makes it<br />

immediately affordable for a brand<br />

to implement.” added Simon Phelps.<br />

Tony Benson, Applied DNA Managing<br />

Director, EMEA agrees “We<br />

have perfected the capabilities of<br />

our SigNature® DNA and Beacon<br />

technologies for a wide range of<br />

authentication applications in print<br />

and packaging and we are delighted<br />

to partner with ITL on this project<br />

as it adds yet one more tool to help<br />

protect consumer goods in a cost effective,<br />

globally available solution.<br />

ITL’s capabilities in that regard are<br />

class leading”.<br />

About ITL<br />

ITL is a global provider of Apparel<br />

Label Solutions, supporting<br />

brands, retailers and manufacturers<br />

all around the world with a comprehensive<br />

range of products and<br />

services aimed at optimising brand<br />

identity and supply chain performance.<br />

The group owns widespread printing<br />

and weaving operations across<br />

a number of key needlepoint locations<br />

including China, Bangladesh,<br />

India, Sri Lanka, Vietnam, Turkey,<br />

Mexico and South Africa.<br />

With over 30 years’ experience,<br />

the company supplies some of the<br />

best known names in the industry<br />

with a wide range of products including<br />

wash-care labels, woven labels,<br />

variable data tags and stickers,<br />

promotional hang tags and packaging,<br />

heat transfers, brand protection<br />

and RFID solutions.<br />

www.itl-group.com<br />

About Applied DNA Sciences<br />

We make life real and safe by providing<br />

botanical-DNA based securityand<br />

authentication solutions<br />

and services that can help protect<br />

products, brands, entire supply<br />

47<br />

chains, and intellectual property of<br />

companies, governments and consumers<br />

from theft, counterfeiting,<br />

fraud and diversion. Our patented<br />

DNA-based solutions can be used to<br />

identify, tag, track, and trace products,<br />

to help assure authenticity,<br />

traceability and quality of products.<br />

SigNature® DNA describes the platform<br />

ingredient that is at the heart<br />

of a family of uncopyable, security<br />

and authentication solutions such<br />

as SigNature® T and fiberTyping®,<br />

targeted toward textiles and apparel,<br />

DNAnet®, for anti-theft and<br />

loss prevention, and digitalDNA®,<br />

providing powerful track and trace.<br />

All provide a forensic chain of evidence,<br />

and can be used to prosecute<br />

perpetrators. We are also engaged<br />

in the large-scale production of specific<br />

DNA sequences using the polymerase<br />

chain reaction.<br />

Go to adnas.com for more information,<br />

events and to learn more about<br />

how Applied DNA Sciences makes<br />

life real and safe. Common stock<br />

listed on NASDAQ under the symbol<br />

APDN, and warrants are listed under<br />

the symbol APDNW.


3M Passport Reader Makes<br />

Waves in New Market<br />

Whether sailing the seven seas or<br />

island-hopping in the Caribbean,<br />

a cruise is meant to be a relaxing<br />

getaway. Travelers look forward to<br />

spectacular ocean views, five-star<br />

restaurants and exotic ports of call –<br />

but dread the thought of long lines<br />

waiting to board the ship.<br />

Knowing that wait times can significantly<br />

affect patron experience, a<br />

major cruise line recently partnered<br />

with 3M to help cruise-goers board<br />

more quickly and efficiently – while<br />

still complying with security regulations<br />

governing the travel industry.<br />

Faster passenger processing for<br />

more hassle-free boarding<br />

When it comes to boarding thousands<br />

of passengers in just a few<br />

hours, every second counts. Typically,<br />

the boarding experience begins<br />

with validating and scanning<br />

a passenger’s passport, before then<br />

having to process the data. The<br />

3M AT9000 MK2 full page document<br />

reader captures the necessary<br />

details and cuts down the passport<br />

review time, ensuring a speedy,<br />

hassle-free boarding and disembarkation<br />

process. Organizations can<br />

now have convenience, efficiency,<br />

and security.<br />

Regulation-compliant solution<br />

meets security requirements<br />

Cruise lines with global fleets must<br />

comply with varying local regulatory<br />

and security requirements, making<br />

the need for a standardized solution<br />

imperative.<br />

Designed to meet strict regulatory<br />

requirements, 3M document readers<br />

can be found at border crossings<br />

around the world and are well<br />

regarded by commercial and government<br />

entities including airlines,<br />

customs and border patrol, and<br />

homeland security.<br />

With one of the fastest, most accurate<br />

read rates available, the 3M<br />

AT9000 MK2 full page document<br />

reader deployed by the cruise line<br />

efficiently reads ICAOcompliant<br />

passports and RFID chips in e-<br />

48<br />

passports. Best of all, it can store<br />

the information to be processed at<br />

a later date. The direct benefit is that<br />

passengers spend less time waiting<br />

in line, allowing them more time to<br />

enjoy their vacation.<br />

Customized authentication<br />

software speeds integration<br />

3M worked with document verification<br />

provider AssureTec to tailor<br />

the accompanying authentication<br />

software, which allowed the new<br />

passport scanning solution to integrate<br />

with the cruise line’s existing<br />

infrastructure. This customization<br />

sped up the installation, meeting<br />

the time-sensitive project requirements<br />

and avoiding a substantial<br />

technology upgrade on the part of<br />

the customer.<br />

With the system in place, this<br />

global cruise line reports meeting<br />

new and emerging regulatory requirements,<br />

better preparing them<br />

for future needs. This, along with a<br />

more efficient boarding process creates<br />

a winning solution for not only<br />

passenger experience, but also the<br />

cruise line.<br />

3M document readers and authentication<br />

software continue to<br />

make waves in the travel industry<br />

as secure, efficient solutions for<br />

processing passengers and meeting<br />

regulatory requirements.


A “Know your rights” refresher for Immigrants<br />

By Joshua Breisblatt<br />

President-Elect Donald Trump has<br />

proposed immigration policies that<br />

are causing anxiety among immigrants<br />

and the immigrant rights<br />

community. Much remains unknown<br />

about how and when these<br />

changes will come but our system of<br />

checks and balances as well as pushback<br />

from the immigrant rights<br />

community will ensure that there<br />

will be limits on what the President-<br />

Elect can do. Regardless, it is always<br />

important for immigrants to understand<br />

their rights.<br />

As a reminder to immigrant communities,<br />

the National Immigration<br />

Law Center released a helpful guide<br />

this week which explains what individuals<br />

should do if they encounter<br />

law enforcement or Immigration<br />

and Customs Enforcement (ICE)<br />

officials.<br />

The reminders include:<br />

• You have the right to remain silent.<br />

You may refuse to speak to immigration<br />

officers.<br />

• Do not open your door (ICE<br />

must have a warrant signed by a<br />

judge to enter).<br />

• You have the right to speak to a<br />

lawyer.<br />

• Before you sign anything, talk to<br />

a lawyer.<br />

• Always carry with you any valid<br />

immigration document you have.<br />

• If you are worried that ICE will<br />

arrest you, let the officer know if you<br />

have children.<br />

• Carry a “know-your-rights card”<br />

and show it if an immigration officer<br />

stops you.<br />

NILC’s “Know Your Rights” guide<br />

also provides tips on where to find<br />

legal help assistance including www.<br />

AILAlawyer.org. They explain how<br />

to report raids and arrests in your<br />

community and recommend everyone<br />

come up with a safety plan<br />

in case an enforcement action takes<br />

place in your workplace or community.<br />

A safety plan should include having<br />

the number of a friend memorized,<br />

telling that friend where they<br />

can find your important documents<br />

including your “A-number,” and<br />

49<br />

putting a plan in place for your children’s<br />

care in case you are detained.<br />

It’s also important to avoid “ notaries”<br />

and other unethical people<br />

who make promises about immigration<br />

relief that are fraudulent or that<br />

they cannot deliver on. Continuing<br />

to pay attention to non-profit immigrant<br />

service providers is important<br />

to ensure you receive up-to-date information<br />

on any changes in immigration<br />

policy.<br />

The next few years may be a challenging<br />

time for the immigrant<br />

community. However, it’s important<br />

to educate ourselves and our loved<br />

ones and to continue to stand together.


HID Global announces<br />

one of the world’s most secure<br />

Citizen ID Cards<br />

Continued from page 5<br />

Irish Passport Card is the first and<br />

only passport card deployed in Europe<br />

for border crossing and has been<br />

recognized for its innovative design.<br />

For more HID Global news, visit<br />

our Media Center, read our Industry<br />

Blog, and follow us on Facebook and<br />

Twitter.<br />

About HID Global<br />

HID Global is the trusted source for<br />

innovative products, services, solutions,<br />

and know-how related to the<br />

creation, management, and use of<br />

secure identities for millions of endusers<br />

around the world. The company’s<br />

served markets include physical<br />

and logical access control, including<br />

strong authentication and credential<br />

management; card printing and<br />

personalization; visitor management<br />

systems; highly secure government<br />

and citizen ID; and identification<br />

RFID technologies used<br />

in animal ID and industry and logistics<br />

applications. The company’s<br />

primary brands include ActivID®,<br />

EasyLobby®, FARGO®, IdenTrust®,<br />

LaserCard®, Lumidigm®, Quantum<br />

Secure, and HID®. Headquartered in<br />

Austin, Texas, HID Global has over<br />

2,700 employees worldwide and operates<br />

international offices that support<br />

more than 100 countries. HID<br />

Global® is an ASSA ABLOY Group<br />

brand. For more information, visit<br />

http://www.hidglobal.com.<br />

Cyberbit launches Channel<br />

Program<br />

Continued from page 8<br />

rity market. Cyberbit is already protecting<br />

companies all over the world<br />

and across a vast range of industries,<br />

which uniquely positions us to help<br />

partners expand and grow their expertise<br />

and market opportunities.”<br />

About Cyberbit<br />

Created to protect the most high-risk<br />

organizations in the world, Cyberbit<br />

secures enterprises and critical infrastructure<br />

against advanced cyberthreats.<br />

The company’s battle-hardened<br />

cybersecurity solutions detect,<br />

analyze and respond to the most advanced,<br />

complex and targeted threats.<br />

Cyberbit employs a formidable and<br />

diverse team from both the public<br />

and private sector, including Ph.D.s,<br />

hackers, former CISOs and SOC<br />

managers, as well as seasoned veterans<br />

of the intelligence and military<br />

communities. With offices in Texas<br />

and Israel, Cyberbit is a subsidiary<br />

of Elbit Systems Ltd. (NASDAQ and<br />

TASE: ESLT) and has more than 500<br />

employees in the United States, Europe<br />

and Asia. To learn more about<br />

how Cyberbit maximizes protection<br />

against today’s signature-less threats,<br />

visit www.cyberbit.net.<br />

®HID, the HID logo and DBond are trademarks or<br />

registered trademarks of HID Global or its licensors in<br />

the U.S. and/or other countries. All other trademarks,<br />

service marks, and product or service names are trademarks<br />

or registered trademarks of their respective owners.<br />

50<br />

Intelsat General announces<br />

new contract to provide satellite<br />

services to RiteNet<br />

Continued from page 9<br />

provide American warfighters around<br />

the globe with advanced capabilities.”<br />

This Comsatcom Transponded Capacity<br />

(CTC) task order is awarded by<br />

the U.S. Defense Information Systems<br />

Agency-Defense Information Technology<br />

Contracting Organization<br />

(DISA-DITCO) for one year, with options<br />

to renew it annually for an additional<br />

four years.<br />

About Intelsat General<br />

Intelsat General (IGC) is a wholly<br />

owned subsidiary of Intelsat, operator<br />

of the world’s first Globalized Network.<br />

IGC provides its government<br />

and commercial customers with<br />

high-quality, cost-effective, communications<br />

solutions via Intelsat’s leading<br />

satellite backbone and terrestrial<br />

infrastructure. Our customers rely<br />

on IGC to provide secure and seamless<br />

broadband connectivity, video<br />

communications, and mobility services<br />

for mission-critical operations<br />

anywhere on the globe through our<br />

open, inter-operable architecture.<br />

www.intelsatgeneral.com


Multipurpose Safety Wand<br />

Megaphone from AmpliVox<br />

Continued from page 17<br />

proved safety in situations ranging<br />

from concerts and sporting events to<br />

emergency evacuations.”<br />

For more information about the S606<br />

Safety Wand Megaphone, or other portable<br />

emergency sound products from<br />

AmpliVox, visit http://www.ampli.<br />

com.<br />

About AmpliVox<br />

AmpliVox® Sound Systems products<br />

are predominantly made in the USA,<br />

meet stringent CE standards, and<br />

come with a warranty up to 12 years.<br />

Our wide selection meets every<br />

speaker’s sound coverage and style<br />

needs. Whether you are in a small<br />

meeting room of 10 people or a large<br />

20,000 square foot auditorium of up<br />

to 10,000 people, AmpliVox® Sound<br />

Systems’ extensive range of superior<br />

quality, simple to operate and reliable<br />

electronics will provide maximum<br />

satisfaction and ensure a crystal clear<br />

message. Creators of the Pink Podium<br />

Promise cause marketing initiative,<br />

AmpliVox donates pink podiums<br />

and pink megaphones to breast<br />

cancer awareness organizations, helping<br />

lead the effort to “Speak Up for<br />

the Cause”.<br />

Visit http://www.ampli.com for more<br />

information.<br />

What the FCC revamping of the<br />

Federal Alert System means to you<br />

Continued from page 27<br />

who are identified via their Wi-Fienabled<br />

locations, to either evacuate<br />

the building or stay put (shelter-inplace)<br />

depending upon their position<br />

relative to the shooter. This can<br />

be done through SMS, voice, mobile<br />

apps, digital signage or desktop alerts.<br />

What’s more, two-way communications<br />

provided in this instance are<br />

helpful for law enforcement as people<br />

in the affected areas can provide vital<br />

information – i.e. how many attackers,<br />

what do they look like, how many<br />

people are still in the building – that<br />

influences their strategy to apprehend<br />

the criminal. This real-time information<br />

is a perfect way to manage multiple<br />

groups of people to the safest<br />

possible outcome.<br />

Government agencies and municipalities<br />

that proactively set an<br />

emergency communications plan set<br />

themselves and their constituents<br />

up for success when a crisis occurs.<br />

Thinking through every single detail<br />

and having sound policies and technologies<br />

in place gives people clear<br />

guidance during a moment fraught<br />

with indecision and chaos. Crises can<br />

never be predicted but these systems<br />

direct people – both responders and<br />

bystanders –so the problem can be<br />

neutralized quickly and the negative<br />

outcomes minimized.<br />

Robin Systems continues to<br />

win laurels<br />

Continued from page 37<br />

reach your marketing goals, please visit<br />

www.tmcnet.com.<br />

About Robin Systems<br />

Robin is an enterprise software company<br />

offering industry’s first Application-Defined<br />

Data Center software.<br />

With a team that includes industry<br />

veterans from leading enterprise<br />

technology companies such as NetApp,<br />

Oracle and Veritas, Robin seeks<br />

to disrupt the $20 billion-plus virtualization<br />

market with its containerbased<br />

compute and storage platform<br />

software that delivers better performance,<br />

higher consolidation and a<br />

much simpler application deployment<br />

lifecycle than traditional hypervisorbased<br />

virtualization. Founded in<br />

2013, the San Jose, California-based<br />

company has raised more than $23<br />

million in venture funding from leading<br />

investors such as Clear Ventures,<br />

DN Capital, USAA and SAP’s Hasso<br />

Plattner Ventures.<br />

51


Saab Seaeye Leoport ROV system<br />

delivered to Japan’s Kaiyo<br />

Engineering<br />

Continued from page 38<br />

and scientific markets.<br />

Scantrol is an independent supplier<br />

of monitoring and control<br />

systems to the modern marine and<br />

offshore industries. The control systems<br />

range from simple winch control<br />

systems to the most advanced<br />

controls for offshore support vessels,<br />

seismic vessels, marine research<br />

vessels, fishing vessels, semi<br />

subs and barges.<br />

Hydramec, founded in 1990,<br />

manufacture ROV launch and recovery<br />

systems and also maintain a<br />

considerable fleet of offshore vessels<br />

on behalf of their clients.<br />

CA Technologies strengthens<br />

security portfolio with new<br />

advanced analytics and<br />

Identity-as-a-Service offerings<br />

Continued from page 39<br />

Solutions deliver a high level of customer<br />

satisfaction.”<br />

CA Identity Service is available<br />

today and can be accessed for free<br />

trial.<br />

These new products are part of<br />

CA’s software portfolio that gives<br />

companies the ability to sense, react<br />

and adapt to market shifts and operational<br />

security needs, resulting<br />

in the agility advantage that a strong<br />

security posture provides. They successfully<br />

protect the business while<br />

enabling it to build the trusted<br />

digital relationships necessary to<br />

compete and win in the application<br />

economy.<br />

*The Security Imperative: Driving Business<br />

Growth in the App Economy, Coleman Parkes<br />

Survey (May-September 2016).<br />

Resources: Visit the CA World Online<br />

Press Room for additional CA World<br />

news and information and graphics<br />

Salient CRGT Appoints Joseph<br />

Zimmerman as Vice President,<br />

Enterprise Solutions Group<br />

Continued from page 42<br />

Service Commendation Medal,<br />

Navy Commendation Medal, and<br />

the Navy Achievement Medal. He<br />

also received the Southwest Asia<br />

Service Medal for his service within<br />

Operation Desert Shield.<br />

About Salient CRGT<br />

Salient CRGT provides Agile software<br />

development, data analytics,<br />

mobility, cyber security and infrastructure<br />

solutions. We support<br />

these core capabilities with full lifecycle<br />

IT services and training—to<br />

help our customers meet critical<br />

goals for pivotal missions. We are<br />

purpose built for IT transformation<br />

supporting federal civilian, defense,<br />

homeland, and intelligence agencies,<br />

as well as Fortune 1000 companies.<br />

We use the most innovative<br />

talent delivery model in the industry,<br />

scientifically providing exactly<br />

the right people for the customers’<br />

most pressing requirements. Salient<br />

CRGT has earned a record of success<br />

with integration and operations<br />

of large‐scale, high‐volume solutions.<br />

On September 15, 2015, Salient<br />

and CRGT announced closing<br />

of the merger transactions – visit<br />

newsroom. For additional information<br />

on Salient and CRGT, visit www.<br />

salientcrgt.com<br />

52


The News Leader in Physical, IT and Homeland Security<br />

CEO/Editorial Director<br />

Adrian Courtenay<br />

917-696-5782<br />

acourtenay@gsnmagazine.com<br />

Editor<br />

Steve Bittenbender<br />

502-552-1450<br />

sbittenbender@gsnmagazine.com<br />

Senior Writer<br />

Karen Ferrick-Roman<br />

412-671-1456<br />

karenferrickroman@gmail.com<br />

Columnist<br />

Shawn Campbell<br />

Campbell on Crypto<br />

shawn.campbell@safenetat.com<br />

Columnist<br />

George Lane<br />

Hazmat Science & Public Policy<br />

georgelane@hotmail.com<br />

Contributing Author<br />

Lloyd McCoy Jr<br />

Immix Group<br />

Contributing Author<br />

Walter Ewing<br />

Contributing Author<br />

Wendy Feliz<br />

Contributing Author<br />

Joshua Breisblatt<br />

Contributing Author<br />

J. Michael Barrett<br />

Contributing Author<br />

Christopher Millar<br />

Gatekeeper Security<br />

Art Director<br />

Gerry O’Hara, OHDesign3<br />

gerry@ohd3.com<br />

203-249-0626<br />

Production Manager<br />

Brenden Hitt<br />

Brenden.hitt@gsnmagazine.com<br />

Direct: 203-216-7798<br />

COMING ATTRACTIONS<br />

<strong>Dec</strong>ember<br />

Late News<br />

Tech Focus<br />

2016 Technology Roundup<br />

Special Awards Review:<br />

2016 Digital Yearbook of Awards<br />

Winners<br />

January<br />

Late News<br />

Tech Focus<br />

Access Control & Identification<br />

Market Sector<br />

Video Surveillance, Software,<br />

Management<br />

February<br />

Late News<br />

Tech Focus<br />

Airport/Aviation Security<br />

Market Sector<br />

Critical Infrastructure, Protection<br />

53

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!