Government Security News January 2017 Digital Edition

acourtenay

Government Security News January 2017 Digital Edition. Available on the GSN Magazine Website at www.gsnmagazine.com

Government Security News

JANUARY 2017 DIGITAL EDITION

Louisiana parish protects children in schools with real-time chemical detection

technology, by George Lane – Page 6

Also in this issue:

Amico Security expects to play major role in Trump’s border security initiative – Page 10

DHS Science and Technology Explosive Division (EXD) releases new incident management tool for first

responders – Page 46


NEWS

GSN January 2017 Digital

4

6

10

12

13

16

18

26

28

37

38

42

More than 170 members of House of Representatives Join Effort to Create

Independent Commission to investigate foreign interference in U.S. Elections

Louisiana parish protects children in schools with

real-time chemical detection technology,

by George Lane

AMICO Security expects to play major role

in Trump’s border security initiative

USCIC updates how processing times are posted:

specific dates rather than weeks or months

States and localities respond to Donald Trump’s immigration plans

Robots, not immigrants, are replacing

U.S. manufacturing workers

Rule will streamline approval of new technologies

DOJ issues final rule about unfair

immigration-related employment practices

GSN announces Winners and Finalists

in the 2016 Homeland Security Awards Program

Will Congress fund President Trump’s executive

order on border enforcement?

Resentment and hatred from the Middle East:

Why they hate us

Cloudera and Docker, Inc. partner to

vastly improve the security of data

2


Edition Table of Contents

44

45

46

47

48

50

LGBT Military Community calls on General Mattis to make clear his support for

ALL service members & their families during confirmation hearing

General Mattis says no to roll back open LGBT Military Service

as Secretary of Defense

DHS Science and Technology Directive Explosive Division

(EXD) releases new incident management planning tool

for first responders

GTT solutions awarded supplier status for Crown Commercial Service TMT2

framework agreement

Upgrades to allow for more frequent, reliable and faster rail service along the

Northeast Corridor recommended

The Chemistry behind the Flint Water Crisis:

Corrosion of Pipes, Erosion of Trust, by George Lane

FEATURES

SPECIAL REPORT ON ACCESS CONTROL & IDENTIFICATION

20

22

24

HID Global predicts top trends for 2017 in the Identity

Technology industry

Heightening security verification with self-service kiosks

Card personalization now making Government ID cards

more secure with better visual security

SPECIAL REPORT ON VIDEO SURVEILLANCE, SOFTWARE, MANAGEMENT

32

34

Hikvision supports school security and success

for students with disabilities

New Thermal Chassis Surveillance Camera

Offers Continuous Zoom

3


More than 170 members of House of Representatives join

effort to create independent commission to investigate

foreign interference in U.S. elections

WASHINGTON, DC – Jan 6, 2017,

Rep. Eric Swalwell (CA-15), the

Ranking Member of the CIA Subcommittee

of the House Permanent

Select Committee on Intelligence,

and Rep. Elijah Cummings (MD-

07), the Ranking Member of the

House Committee on Oversight

and Government Reform, are reintroducing

their Protecting Our

Democracy Act to establish an independent,

bipartisan commission

to investigate foreign interference in

the 2016 election.

They originally introduced their

legislation on December 7, 2016,

at the end of the 114th Congress.

Since then, they have obtained the

support of more than 170 Members

of the House of Representatives, including

Democratic Leader Nancy

Pelosi, Democratic Whip Steny

Hoyer, and all members of House

Democratic leadership; the Ranking

Members of all House Committees;

and all Democratic members of the

House Permanent Select Committee

on Intelligence and the House

Committee on Oversight and Government

Reform.

Their bill would create a 12-member,

bipartisan, independent commission

empowered to interview

witnesses, obtain documents, issue

subpoenas, and receive public testimony

to examine attempts

by the Russian

government or others to

use electronic means to

influence, interfere with,

or undermine trust in last

year’s U.S. elections. The

commission would examine

any similar efforts

by any other foreign governments

or entities and

would issue a final report

with recommendations to Congress

and the President within 18 months

of enactment.

“There’s overwhelming agreement

across America that our democracy

was attacked this past presidential

election. Now everyone’s asking

what our nation’s leaders will do

about it. Our legislation answers

that question by identifying who

was responsible and telling Americans

what we will do to secure our

next election,” said Ranking Member

Swalwell. “We continue to seek

Republican cosponsors because this

Elijah E. Cummings,

Ranking Member of

House Committee on

Government Oversite

must be about country, not party.

If we do nothing, we are telling the

world our elections are open for influence

by the most aggressive meddler.

With 17 intelligence

agencies agreeing that

Russia interfered in our

election, we most move

quickly to have an independent,

bipartisan, depoliticized

commission

to fully examine the circumstances,

inform the

public of its findings, and

develop a plan to prevent

this from ever happening

again.”

“The most senior leaders of our

Intelligence Community testified

yesterday that Russia interfered in

our elections, which Republicans

and Democrats alike have compared

to an act of war,” said Ranking

Member Cummings. “This grave

threat calls for a truly bipartisan

and independent commission that

can put politics aside and conduct

a complete review of this interference

in our democratic process, and

make concrete recommendations to

protect our nation from being un-

4


dermined by any foreign

power. We cannot allow

this to become the new

normal for what we will

accept as Americans.”

The 12 members of the

independent commission

would be appointed

within 90 days of enactment

of the Swalwell-

Cummings bill by the Speaker of

the House (3), Senate Majority

Leader (3), House Minority Leader

(3), and Senate Minority Leader

(3). The commission would choose

a chair and vice chair of different

Steny Hoyer,

Democratic Whip

parties. No federal officers

or employees would

be eligible to serve on the

commission. Appointees

would be prominent U.S.

citizens with national

recognition and significant

depth of experience

in governmental service,

law enforcement, armed

services, law, public administration,

intelligence gathering, foreign

affairs, cybersecurity, and federal

elections.

This week, a bipartisan group of

former senior intelligence and defense

officials – including former

Secretary of State Madeleine Albright,

former Secretary of Defense

Leon Panetta, former Acting Director

of Central Intelligence Michael

Morrell, and former Member

of Congress and 9/11 Commission

Vice Chair Lee Hamilton – sent a

letter urging Congress to create an

“independent, bipartisan commission”

to “understand fully and publicly

what happened, how we were

so vulnerable, and what we can do

to protect our democracy in future

elections.”

The bill’s original cosponsors include:

1.Eric Swalwell

2.Elijah Cummings

3.Sheila Jackson Lee

4.Alma Adams

5.Pete Aguilar

6.Nanette Barragan

7.Karen Bass

8.Joyce Beatty

9.Sanford Bishop

10.Earl Blumenauer

11.Lisa Blunt-Rochester

12.Suzanne Bonamici

13.Madeleine Bordallo

14.Brendan Boyle

15.Robert Brady

16.Anthony Brown

17.Julia Brownley

18.Cheri Bustos

19.G.K. Butterfield

20.Michael Capuano

21.Salud Carbajal

22.Tony Cardenas

23.Matt Cartwright

24.Andre Carson

25.Kathy Castor

26.Joaquin Castro

27.Judy Chu

28.David Cicilline

29.Katherine Clark

30.Yvette Clarke

31.William Lacy Clay

32.Emanuel Cleaver

33.James Clyburn

34.Steve Cohen

35.Gerald E Connolly

36.John Conyers, Jr.

37.Jim Cooper

38.J. Luis Correa

39.Jim Costa

40.Joe Courtney

41.Joseph Crowley

42.Henry Cuellar

43.Danny K. Davis

44.Susan Davis

45.Peter DeFazio

46.Diana DeGette

47.John Delaney

48.Rosa DeLauro

49.Mark DeSaulnier

50.Theodore Deutch

51.Debbie Dingell

52.Lloyd Doggett

53.Michael Doyle

54.Keith Ellison

55.Eliot Engel

56.Anna Eshoo

57.Adriano Espaillat

58.Elizabeth Esty

59.Dwight Evans

60.Bill Foster

61.Lois Frankel

62.Marcia Fudge

63.Ruben Gallego

64.John Garamendi

65.Vicente Gonzalez

66.Tulsi Gabbard

67.Al Green

68.Gene Green

69.Raul Grijalva

70.Luis Gutiérrez

71.Alcee Hastings

72.Denny Heck

73.Jim Himes

74.Steny Hoyer

75.Jared Huffman

76.Pramila Jayapal

77.Hakeem Jeffries

78.Eddie Bernice Johnson

79.Hank Johnson

80.Marcy Kaptur

81.William Keating

82.Robin Kelly

83.Joseph P. Kennedy III

84.Ro Khanna

85.Ruben Kihuen

86.Daniel Kildee

87.Derek Kilmer

88.Ron Kind

89.Raja Krishnamoorthi

90.Ann McLane Kuster

91.James Langevin

More on page 27

5


Louisiana parish protects

children in schools with real-time

chemical detection technology

By George Lane

The RFLM (Regional Fence

Line Monitor) chemical security

network, funded by

the State of Louisiana and

the Pointe Coupe Parish

Police Jury, was demonstrated

December 2 at the

Pointe Coupee Parish Sheriff ’s Office

Emergency Operations Center

in Louisiana near Baton Rouge. The

standoff sensor in RFLM detects and

identifies chemicals in real-time from

up to 3 miles away from any direction

while identifying the source of the release

with video surveillance, providing

integrated situational awareness

and CONOPS.

The RFLM chemical security network

consists of a fixed standoff

chemical detector operating with

a video camera, multiple portable

chemical detectors, a fixed video

camera, and chemical sensor data

integrated with local meteorological

data at the Pointe Coupe Parish “911”

Center.

The fixed standoff chemical detector

uses an FTIR (Fourier Transform

Infrared) sensor with a video camera.

The RAPID (Remote Air Pollution

Infrared Detector) chemical detector

George Lane

in RFLM is produced by

Bruker Detection and detects

and identifies chemical

threats and risks from 3

miles away.

Ground level video provides

surveillance of RAP-

ID as well as security and a

PZT-enabled video camera

operating on the 300-foot microwave

communication tower provides wide

area surveillance.

Primary critical infrastructure and

public health in Pointe Coupee Parish

protected by the RFLM chemical

security network include Valverda

Elementary School, Livonia High

School, and residents of the Town of

Livonia and surrounding rural areas

in Valverda, living adjacent to the

Union Pacific Rail Yard, Union Pacific’s

second largest rail yard in North

America.

RFLM uses local wind speed, direction,

and concentration to provide

location and time of impact of chemical

releases. RFLM contacts local citizens

and students, faculty, and staff in

schools at risk to chemical releases,

determining whether to evacuate or

“shelter-in-place”. Group text messaging

and social media enable real-time

response to chemical releases.

6

Current Pointe Coupee Parish

School “shelter-in-place” emergency

response procedures call for duct tape

to be used to completely seal windows

and doors to stop chemical releases.

However, if students remain in sealed

rooms, Carbon dioxide buildup in

rooms can become a major threat to

health. To mitigate these effects, activated

Carbon is added to air conditioner

filters operating in “shelter in

place” locations to provide protection

during extended chemical threats and

risks.

The RFLM chemical security network

was developed by Emergency

Response Technology (ERT) and

selected “Best Rail Yard Hazmat

Monitoring and Detection” and “Best

Integration of Cameras, Sensors,

Communications for Rail Safety” by

Government Security News (GSN)

in 2016; (http://gsnmagazine.com/

node/46657?c=airport_aviation_security).

ERT’s chemical security network

designed for the Port of Greater Baton

Rouge was selected as “Best Integrated

Harbor Security Program” by GSN

in 2015 (pages 58-59); www.yumpu.

com/en/document/view/55008535/

the-gsn-2015-digital-yearbook-ofawards.


Operating beneath the I-10 Bridge

in Baton Rouge, RAPID’s 3-mile

standoff detection and identification

range will provide chemical security

for the Port of

Greater Baton Rouge,

the Port Allen lock of

the Gulf Intracoastal

Waterway, downtown

Baton Rouge,

the city of Port Allen,

the Placid Refinery

in Port Allen, the

ExxonMobil refinery

in Baton Rouge,

and transportation

of commerce on the

Lower Mississippi River (LMR).

ERT’s chemical security network

designed for the Port of New Orleans

was selected as “Best Integrated

3-mile

3-mile

radius

radius

of

of

3-mile radius of RAPID

RAPID

RAPID

operating

operating

under

under

I-10

I-10

Bridge

Bridge

Harbor Security Program” by GSN in

2014. DHS has approved funds for

a chemical security network using

RAPIDs at the Port of New Orleans

that will be operated by the New Orleans

Office of Homeland Security &

Emergency Preparedness.

Operating beneath the Crescent

City Connection Bridge over the LMR

in New Orleans, the 3-mile range of

RAPID standoff detection and identification

will protect the Port of New

Orleans, cruise ships and terminals

at the port, trucks transporting commerce

at the port, the New Orleans

Public Belt rail line at the port, the

Gulf Intracoastal Waterway at the

“We’re powered by new challenges.

Our experience has made us experts

at providing total security solutions.”

PHIL BARRETT

8 years • Power/Utility Business Development

Our high standards help you meet yours. Providing superior

perimeter security solutions is not just our mission.

It’s personal. And that mission never stops.

AMERISTARSECURITY.COM | 888-333-3422

7


LMR, the Mercedes Benz

Superdome, residents living

and working in Uptown and

the Central Business District

(CBD), visitors in the French

Quarter, and transportation

on the LMR.

In 2008 a tanker collided

with a barge near the Port of

New Orleans, releasing over

419,000 gallons of diesel, and

interrupting transportation

of commerce on the LWR for

11 days. In 2010 the Aspen

Institute, and the Ford Foundation,

conducted a vulnerability assessment

at Tulane University to calculate the

economic consequences of the interruption

of transportation of commerce

on the LWR.

Because the LMR provides transportation

for over 45% of all U.S.

energy products and over 60% of all

U.S. commerce, the study concluded

that interrupting the transportation

of commerce on the LWR costs the

domestic economy over $275 million

per day, and international commerce

over $500 million each day. The release

of common diesel in 2008 cost

the domestic economy over $3 billion

and international commerce over $6

billion.

But without the capability to detect

and identify secondary chemical releases

and their sources, the collision

at the Port of New Orleans could have

been much worse. The tanker had just

uploaded approximately 3 million

Bruker RAPID (Remote Air

Pollution Infrared Detector)

The fixed standoff

chemical detector uses an

FTIR (Fourier Transform

Infrared) sensor and a

video camera.

RAPID monitors chemical

threats and risks from an

elevated platform.

December 2, 2016

RFLM Field Demonstration

gallons of Styrene monomer, which

can violently react with itself, known

in chemistry as “autopolymerization”.

If the Styrene monomer had “autopolymerized”,

the tanker would have

exploded, causing extensive collateral

damage, and closed the LMR even

longer. RAPID would have detected

both diesel and Styrene monomer

simultaneously, and directed emergency

responders to the primary

chemical threat, Styrene monomer,

8

Video camera

FTIR

sensor

Fig. 1: Bruker RAPID

1

providing the source of both releases

for quick response.

If RAPID determines the

source of a hazardous chemical

release is on land, from rail,

trucks, or chemical facilities on

the river, the Captain of the Port

may elect not to close the LMR,

saving the domestic economy

over $275 million per day and

international commerce over

$500 million per day.

Below is an interactive screenshot

of the video (click to view)

of the December 2 field demonstration

in which Sulfur hexafluoride

(SF6), an inert gas, was released at the

Emergency Operations Center approximately

300 yards away from the

Bruker RAPID.

The RAPID FTIR standoff chemical

sensor uses proprietary software to

colorize chemical releases, allowing

emergency responders and managers

to visually determine the source as

well the dispersion of chemicals from

Click to view video of the December 2 field demonstration


up to 3 miles away in any direction.

In the RAPID video a yellow dot in

a surveillance box highlighted in blue

progresses from right to left and then

down, representing surveillance by

RAPID as it scans the selected area.

The small box on the lower right represents

what the video camera is seeing

as it moves from left to right with

the FTIR chemical sensor.

RAPID detects and identifies the

location of the release of SF6, dispersing

to the southwest (left in the video).

SF6 appears in yellow at the top of the

screen, and is highlighted in yellow

at the bottom of the screen as one

of a list of toxic industrial chemicals

(TICs) in the RAPID library. Within

6 seconds, the color of SF6 changes

to red, indicating an increased confidence

in detection and identification.

SF6 appears in a red circle in the

alarm box and also changes color to

red in the chemical library at the bottom

of the screen.

blob:https%3A//

mail.google.com/bebcf019-

f8dd-4b56-8c7c-5daf421140a9

Another demonstration was conducted

using an industrial grade of

Freon used to clean computer keyboards.

Three additional chemicals in

the Freon-based cleaner were autonomously

detected and identified by

RAPID and were visible as they dispersed.

RAPID can be programmed

to follow dispersion into selected areas.

As soon as chemicals are detected

and their sources identified, a single

portable chemicals sensor is deployed

to the source of the release to both

confirm chemical-specific identification

and provide measurement in sub

parts per million. The ERT chemical

security network is being deployed at

fixed locations and portable on maritime

emergency response vessels on

water and in SUV vehicles on land.

“We aim to protect property, and provide

peace of mind by providing remarkable

perimeter security products and

unrivaled service.”

EMILY SULLIVAN

11 years • Mission Critical Business Development

We know people make the difference for your business and ours.

Our experienced team thrives on providing the products and

service that lead to total perimeter security solutions.

AMERISTARSECURITY.COM | 888-333-3422

9


AMICO Security expects to play major

role in Trump’s border security initiative

BIRMINGHAM, AL — January

11, 2017 — AMICO Security announced

today that its AMIGUARD

system, considered one of the most

secure and cost effective border solutions

available on the market, is

expected to play a large role in President-elect

Donald Trump’s plan

to build a border wall between the

United States and Mexico.

AMICO Security brings to the

market extensive experience in

building border walls and fences.

The company’s high security fence

system currently secures a 36-mile

stretch along the United States and

Mexico Border near Yuma Ariz., at

the San Luis Crossing and an 18-

mile area at the Otay Mesa Crossing

in California.

With President-elect Trump’s call

to expand the border wall between

the United States and Mexico,

AMICO Security has already seen a

sharp increase in interest from several

government agencies.

“AMICO Security is one of the

only truly U.S.-owned manufacturers

of high-security border fencing,”

said Gary Baltz, an AMICO

Security spokesperson. “In many

speeches on President-elect Donald

Trump’s ‘Thank You Tour,’ he stated

that the policy of his administration

will be to buy American and to create

American jobs.”

AMICO Security buys U.S.-made

steel and produces its security fence

panels in its U.S. factories with

American workers, while many other

competitors are foreign-owned

and purchase raw materials from

producers in Mexico and China.

“We hope that our government

will be vetting out those that are not

in compliance with the buy America

10

policy,” added Baltz.

AMICO is considered the largest

manufacturer of Security Mesh in

the world and has the capacity to

meet a large demand. Security Mesh

is an extremely cost effective way

to build a barrier and allows border

guards to see through the fence

structure and wind to pass through

thereby reducing wind resistance.

These high security meshes can be

produced to meet anti-climb and

cut requirements making it very difficult

to breach.

AMIGUARD’s patent pending

design allows for the simple integration

of technology such as radar

systems, which can classify targets

and track movement along the border,

in addition to anti-tunneling

More on page 33


GSN: What are your general thoughts on the

2015 awards?

8

GSN: You spent many years on Capitol Hill and

also at the Department of Homeland Security.

As we head into 2016, what do you envision as

homeland security spending priorities? Awards Category:

––––––––––––––––––––––––––––––––––––––––

GSN 2015

GSN:

DIGITAL

What area/issue

YEARBOOK

pending

OF AIRPORT/SEAPORT/BORDER

trends do you

SECURITY AWARDS RECIPIENTS

see as priorities for the homeland security

community?

Name of Nominated Product, Service,

or Program:

––––––––––––––––––––––––––––––––––––––––

Reason this entry deserves to win:

––––––––––––––––––––––––––––––––––––––––

54

9

GSN: What future areas of homeland security

interest would you advise companies to explore?

Continued on next page

Awards Category:

––––––––––––––––––––––––––––––––––––––––

Name of Nominated Product, Service,

or Program: Link to Web Page of Nominated Organization:

––––––––––––––––––––––––––––––––––––––––

www.networkharbor.com

Reason this Link entry to additional deserves to information win: on product,

––––––––––––––––––––––––––––––––––––––––

service or program, with brief description:

––––––––––––––––––––––––––––––––––––––––

https://youtu.be/-ucfAR5psac

Name and organization of nominating

contact for this entry, including name, title,

organization:

––––––––––––––––––––––––––––––––––––––––

55

GSN 2015 DIGITAL YEARBOOK OF AIRPORT/SEAPORT/BORDER SECURITY AWARDS RECIPIENTS

Nominating contact’s office telephone and cell

phone:

––––––––––––––––––––––––––––––––––––––––

Nominating contact’s email address:

––––––––––––––––––––––––––––––––––––––––

john@convyassociates.com

30

31

http://www.rapiscansystems.com

Link to additional information on product,

service or program, with brief description:

––––––––––––––––––––––––––––––––––––––––

http://www.rapiscansystems.com/en/products/

radiation_detection

Name and organization of nominating

contact for this entry, including name, title,

Nominating contact’s office telephone and cell

jedgerly@speakerboxpr.com

The Winners and Finalists have

been selected. Now our national

and international readers want

to know what the strategies,

technologies and innovations

were that gave you the

advantage. Let them know with

a 2-page spread in the

2016 Digital Yearbook of

Award Winners.

The GSN

2016 Digital Yearbook

OF

Homeland Security

Awards

CLICK HERE TO VIEW

LAST YEAR’S YEARBOOK

The GSN

2015 Digital Yearbook

OF

Airport/Seaport/

Border Security Awards

AND

Homeland Security Awards

National Programs and Protection Directorate.

ed world. New legislation pending in Congress formalizes

the increased DHS role in public/private partnering.

GSN 2015 DIGITAL YEARBOOK OF HOMELAND SECURITY

and

Global spending also parallels the DHS spending raise.

AIRPORT, SEAPORT, BORDER SECURITY AWARDS PROGRAMS

A new market research report, “Global Homeland Security

and Emergency Management Market, 2013–2018”, Information Security Management Act (FISMA) and de-

New legislation also would update the 12-year-old Federal

published by MarketsandMarkets is expected to reach lineate DHS’s role in guarding government networks and

$544.02 Billion by 2018. Unfortunately, those numbers websites.

could go even higher if there are more incidents similar to A priority for 2016 will be to accelerate rollout of

GSN INTERVIEW

what happened in Paris, Mali, and San Bernardino, CA. Einstein III Accelerated (E3A), the latest phase of DHS’s

Best Detection Solutions

automated network-security correcting systems. DHS has

established memoranda of agreement with 55 federal

Chuck Brooks, Distinguished Judge

agencies to implement Einstein to provide horizon scanning

and automated monitoring, detection, and remedia-

GSN 2015 Homeland Security and

Best Integrated Security Programs

Rapiscan Systems

CB: Counterterrorism and the counter CBRNE (chemical

Airport, Seaport, Border Security Awards programs

tion of government networks. DHS is also planning for

2015 Winner

, biological, Radiological, Nuclear, and Explosive) mission

new cyber technologies that provide advanced defense of

Network will always Harbor, be fundamental Inc. to homeland planning and

network framework layers, including authentication, better

encryption, biometrics, and data analytical tools”.

spending. Those are the most catastrophic threats. In

2015 Winner

addition to CBRNE DHS has assumed more and more of a

leadership role in cybersecurity derived from both Presidential

mandates and congressional legislation.

Best Nuclear/Radiation Detection

CB: For me it was a real pleasure judging this year’s

Cybersecurity is indeed a top priority as government agencies

and mega corporations experience more data breach-

IPM (integrated process management) provides an

annual Homeland Security and Airport, Seaport, Border

CB:

CB: Macro spending will increase across the board on

The key word really is “future” and it is already additional element of extensibility and power for policy

Security Awards programs. The submissions this year

Best Physical Security Information Management

homeland security products and services In accordance

es with each passing year. I recently published an article

around the corner with the Internet of Things (IoT). management and workflow processing that is virtually

Rapiscan Systems

were frankly quite amazing. The capabilities and technical

System - PSIM

to the new threats we are especially facing from ISIS and

in The Federal Times on Key homeland security priorities

Recently both the FBI and DHS issued warnings about unlimited IoT in its capabilities. The end result is an intuitive,

comprehensive automated security management

merits of the IT and Physical security products/solutions

from other terrorist actors, and global instabilities. This

to watch in 2016 (http://www.federaltimes.com/story/

and pending threats. The reality is that we have become

platform that operates identically, anywhere within the

of all the vendors made it especially difficult to judge. In

was reflected in the recent passage of the 2016 omnibus

government/dhs/blog/2015/12/15/key-homeland-securitypriorities-watch-2016/77368604/)

My thoughts in regards

immersed in a new digital era comprised of more organization. than 50 There’s no need to retrain staff when Rapiscan they Systems, a leading provider of security screening

solutions, is well known for the high quality, reliment

or integrated with Rapiscan’s X-ray and metal-

detection products can be used in a standalone deploy-

my opinion they were all winners because they are leading

technological contributors to the current and future

LightHouse

spending Bill recently passed by Congress by Congress.

billion interfaced devices. Anything connected is move vulnerable.

Expect significant investments in smart cities, nents smart are connected to the platform, which in turn ability saves and affordability of its solutions. With products based threat detection solutions. The newest addition to

from one facility to another, or when new compo-

The bill provides DHS with $40.96 billion, which is an

to cybersecurity verbatim:

security of our nation. It is good to know that very talented

people in industry and government are continually

Network Harbor’s LightHouse platform delivers dent management, too.

increase of $1.33 billion over the fiscal year 2015 enacted

“The 2015 DHS budget directed more than $1.25 billion

to cybersecurity and that trend will continue in 2016.

homes, smart businesses, and smart governments customers in the significant amounts of time and money. sold into four market segments, including Baggage and Rapiscan’s radiation detection product line is the Rapiscan

MP100 Backpack Radiation Detection system. A high

Parcel Inspection, Cargo and Vehicle Inspection, Hold

levels. It included increased funding levels for Customs

next Its decade. click-and-go For the ability security to adopt community this conveys

Baggage Screening and People Screening, the company performance, easy to use radiation monitor combining

designing and upgrading security solutions to fill gaps as

unified security management for enterprise organizations,

extending the capabilities of physical security its own capabilities means that there’s no “dumbing

the full functionality of any security system’s API within

and Border Protection, Immigration and Customs Enforcement

and for DHS Cybersecurity programs in the incident DHS management DHS’s (PSIM) inception to include as we geographical have become a more down” interconnect-

of features or for functions threat detection, – just a seamless, surveillance, con-predictive data analytics,

tion situations Convy its customers Associatescould face. An important a lightweight, compact commercial backpack, making

Cybersecurity and IT have moved to the forefront since

opportunities in developing and integrating new sensors

has a solution John for Convy, the most Principal demanding threat detec-

gamma and optional neutron detection is housed in

adversaries are becoming more hostile and sophisticated.

part of Rapiscan’s product portfolio is its radiation the system perfect for covert inspection situations. The

information system (GIS) and non-physical products in sistent user interface, anywhere across the enterprise.

detection product line, which addresses the need for MP100 is ideal for supporting security operations and

a truly comprehensive safety and security management It installs easily, and is quickly mastered by administrators

and end users alike. LightHouse supports almost

global governments and organizations to monitor and performing radiation surveys in a variety of markets –

environment. LightHouse is unique in that it integrates

locate radioactive threat materials that can be used in including critical infrastructure, customs and border

every security system, physical or non-physical, into a all major security product manufacturers including

office: 202-421-3777

atomic weapons and dirty bombs. The product line is control, event security, defense and law enforcement

single, seamless oversight system. Its intuitive interface access control, video, audio, mass notification, IDS,

comprised of software and hardware based solutions applications. All of the features required for radiation

drives faster recognition of potential threats, as well RTLS and more. LightHouse has been designed to add

for inspecting vehicles, packages and people. Radiation detection are integrated in the MP100 so it can be used

as gives first responders the information they need to additional system integration’s to the platform without

make better informed, more appropriate decisions. disruption or encumbrance of any existing integration

LightHouse is designed to support the IT side of inci- in an expedient, stable and secure process. LightHouse

Address of nominating contact’s organization:

––––––––––––––––––––––––––––––––––––––––

8380 Greensboro Drive Suite 514

McLean, VA 22102

as a standalone device and connected wirelessly to a Link to Web Page of Nominated Organization:

Rapiscan oversight system for remote data collection

––––––––––––––––––––––––––––––––––––––––

and display. Using the MP100 is as easy as slipping

the backpack on and walking around. Weighing just

18 pounds, the MP100 is lightweight and easy to use.

Additionally, the onboard battery enables 16 hours of

continuous operation in a wide range of environments.

The Rapiscan RadviewerTM Android app displays the

operator’s current position and direction toward the

radiation source. The design of the MP100’s radiation

detectors provides increased directional sensitivity of

the radiation detection. A radiation alarm is signaled audibly

via a headphone jack on the backpack or visually ––––––––––––––––––––––––––––––––––––––––

organization:

via RadviewerTM. In this way, the MP100 enables users Jennifer Edgerly, Senior Account Director,

to effectively detect and locate radioactive threats. The SpeakerBox Communications

MP100 is manufactured by Rapiscan’s Radiation Detection

Products division, which has supplied thousands of

radiation monitors that are deployed at border crossings,

seaports, airports and facilities around the world. office: 703-287-7809

phone:

––––––––––––––––––––––––––––––––––––––––

The MP100 uses Rapiscan’s proven radiation detection cell: 202-486-0518

technology adapted for a backpack deployment. The

radiation detection performance meets the requirements

of ANSI N42.53. The MP100 offers customers ––––––––––––––––––––––––––––––––––––––––

Nominating contact’s email address:

efficient, easy to use and reliable man-portable radiation

detection with high performance at an affordable cost of

acquisition and operation.

Address of nominating contact’s organization:

––––––––––––––––––––––––––––––––––––––––

7900 Westpark Drive, Suite T410, McLean, VA

Contact Adrian Courtenay at 917-696-5782 to get more information

and reserve your 2-page spread.


USCIC updates how processing times are posted:

specific dates rather than weeks or months

By Michele Waslin

United States Citizenship and Immigration

Services (USCIS) announced

that beginning on January 4, 2017,

it has changed how it posts processing

times. Rather that listing weeks

or months, it now provides specific

dates. This is a small initial step toward

providing better customer service

and giving individuals and employers

the information they need

about their immigration cases. However,

the dates listed are still not based

on real-time information and are outdated

when they are published.

USCIS provides its customers with

estimates of how long the waiting

time is because individuals who submit

petitions or applications for immigration

benefits to USCIS often

have to wait lengthy periods for the

transaction to be completed. These

processing times are posted on the

USCIS website. Processing times are

available by location (e.g. National

Benefits Center, service center, or

field office) and by filing type. The

American Immigration Council’s fact

sheet on processing times explains

how these processing times are calculated.

In the past, processing times were

listed in one of two ways:

1. Processing times related to publicly-announced

production goals.

USCIS established production

goals for certain filing types. For

example, USCIS set a five month

processing time goal for N-400s

(naturalization applications). If the

office was meeting or exceeding the

goal, meaning applications were

being processed in five months or

less, the processing time was listed

as five months. In other words, the

customer doesn’t have specific information

about how long applications

are actually taking, just that

they are being processed within five

months.

2. If the office was not meeting its

production goal, the chart listed the

date of the last application the office

worked on at the time the data was

sent to the Office of Performance

and Quality (OPQ), which is the

office that regularly calculates processing

times. This does not mean

12

that all applications received as of

that date had been adjudicated.

According to the USCIS announcement,

the agency will now be using

the second method for publishing

processing times. The tables available

on the USCIS processing times webpage

now list a “Processing Cases As

of Date.” Presumably, the date listed

is the date of the last application that

particular office worked on at the moment

the processing data was sent to

OPQ. This new format also means

that USCIS no longer informs the

public of its processing goals.

While having a date is helpful in

that it is less confusing, it does not resolve

all problems.

For example, USCIS does not post

processing times for all applications,

and processing times do not reflect

any delays related to Requests for Evidence.

Furthermore, processing times

are generally out of date by the time

they are published. This is because

OPQ takes time to receive and aggregate

data from the various offices, calculate

processing times, and publish

them. Months can pass between the

first day of the performance month

and publication. Currently, the processing

times were last updated De-

More on page 49


States and localities respond to

Donald Trump’s immigration plans

By Michele Waslin

With all the focus on what to expect at

the national level on immigration under

President-elect Donald Trump’s

administration, it’s easy to overlook

the states and localities, which are

reacting to the presidential elections

and previewing their intentions on

immigration.

Elections for governor were held

in 12 states, with Democrats and Republicans

each winning six. Republicans

increased the number of states

in which they control both legislative

chambers from 30 to 32 states. Republicans

have control of the governor’s

office and both legislative houses

in 24 states. Democrats control both

Houses in 13 states, and have full control

in six.

Given the harsh anti-immigrant

tone Trump took, some states and

localities are doubling down on protecting

their immigrant communities,

push back on federal attempts to

increase deportations, and make their

communities more welcoming for all

residents. For example:

• In Chicago, a $1 million legal defense

fund for immigrants was recently

created. Mayor Rahm Emanuel also

promised to keep Chicago a “sanctuary

city” and restrict its collaboration

with federal enforcement authorities,

even if the city loses federal funding

as a result.

• In New York City, Mayor Bill De-

Blasio has voiced strong support for

immigrants and the city’s protective

policies. Most recently, he vowed that

the federal government would not be

able to use information from municipal

ID cards to target immigrants for

deportation. Approximately 900,000

New York CIty residents have these

ID cards and had submitted documents

proving identity and city residency

in order to receive them.

13

• In California, lawmakers are considering

a series of bills to protect unauthorized

immigrants from deportation.

One bill would create a fund to

pay for legal counsel for immigrants

facing deportation. Another would

train criminal defense attorneys in

immigration law so they could better

protect their clients. The California

Values Act (SB 54) would ban state

and local police from performing the

functions of a federal immigration officer

and would create “safe zones” at

public schools, hospitals, and courthouses.

- Also in California, the Dignity Not

Detention Act was re-introduced. It


would prohibit local cities and counties

from entering into new contracts

with private, for-profit detention facilities

and would require detention

facilities to comply with standards of

humane treatment.

• In Detroit, the city council approved

municipal ID cards, which will allow

all city residents to have identification

documents regardless of immigration

status. According to City Council

Member Raquel Castaneda Lopez,

“We do not stand down to our commitment

to being a sanctuary city. We

don’t stand down to our commitment

to being a welcoming city. We do not

stand down to our commitment to

welcoming refugees.”

• Churches and universities around

the nation have also vowed to push

back against any federal policies that

endanger immigrants.

At the same time, some states and

localities will likely feel emboldened

by Trump’s victory to push for greater

restrictions on immigrants and immigration.

In the past, we have seen state policies

aimed at making life more difficult

for immigrants living in the community,

encouraging them to leave.

Bolstered by likely expansions of collaboration

between federal immigration

enforcement agencies and states,

we are likely to see legislation affirming

such cooperation. We may also

see new attempts to cut refugee resettlement,

and there may also be attempts

to roll back previously passed

immigrant integration policies. For

example:

• In Florida, State Senator Greg Steube

filed a bill (SB 82) to repeal in-state

tuition for undocumented students

who graduated from Florida high

schools. The current law providing

for in-state tuition went into effect in

July 2014. According to Sen. Steube,

who was just named chairman of the

Senate Judiciary Committee, “I don’t

think it’s appropriate that illegal immigrants

should get tax-subsidized

tuition.”

• Some states will be trying to prohibit

so-called “sanctuary cities” that

limit cooperation with the federal

immigration authorities.

For example, Arkansas

SB14 would prohibit

sanctuary policies and

deny state funds to

municipalities that do

not comply. The bill defines

a sanctuary policy as

one that limits reporting of immigration

status to federal authorities,

restricts custody transfers to ICE, requires

ICE to obtain a warrant before

making a custody transfer, prevents

law enforcement officers from asking

about immigration status, or grants

unauthorized immigrants “the right

to lawful presence or status within

the municipality in violation of federal

law.” Senator Gary Stubblefield,

the bill’s sponsor, said he is unaware

14

of any actual sanctuary cities in the

state and claimed his bill is “preemptive.”

Anti-sanctuary legislation has

been pre-filed in Texas as well.

• In 2016, dozens of bills were introduced

in state legislatures aimed at

preventing refugees from being resettled

in the state. In Michigan, House

Concurrent Resolution 28 is a nonbinding

anti-refugee resolution that

urges the U.S. government to stop

refugee resettlement in Michigan until

the federal government increases

screening and security checks. It

passed the House Local Government

Committee.

• In Texas, where the legislature

meets every other year, we can expect

debate on a number of immigration-related

issues in

2017 including making

any crime committed

by an unauthorized

immigrant a felony and

a bill to amend the state’s

constitution to deny bail to

anyone in the country unlawfully.

As the federal government presses

for more collaboration between states

and localities in order to pursue a deportation

agenda in the future, it will

be more critical than ever to monitor

state and local laws and policies.


Robots, not immigrants, are replacing U.S.

manufacturing workers

By Michele Waslin

There is significant evidence that

immigrants boost the economy,

create jobs, and bolster innovation.

However, President-elect Donald

Trump has repeatedly stated he

wants to “put American workers

first” by restricting immigration.

Some Americans who are justifiably

concerned about the economy,

unemployment, and offshoring mistakenly

believe that immigrants are

responsible for the country’s economic

woes. But the manufacturing

industry shows that the story is

much more complicated. In fact, a

recent article in Fusion makes the

case “that machines–not Mexicans–

are perhaps the main culprit for U.S.

job-loss in the manufacturing sector.”

The manufacturing industry–

which includes companies that

make non-durable (quickly consumed)

and durable goods (those

that last a long time)–in the U.S. has

been particularly hard hit in recent

years. Manufacturing used to be

the nation’s biggest employer, but

today it is the fourth largest industry

by employment. Ten percent of

all workers in the U.S.

work in the manufacturing

industry.

According to a 2016

Georgetown University

study, manufacturing

was the hardest-hit industry

in the Great Recession. 2.7 million

jobs were lost between December

2007 and January 2010 and workers

with a high school diploma or less

suffered the most, accounting for

1.6 million lost jobs. Manufacturing

has since recovered and added

1.7 million new jobs, still falling one

million jobs short of pre-recession

levels.

Scholars have found that more

than 80 percent of the job losses in

manufacturing between 2000 and

2010 can be attributed to increased

per-worker production. Because

of automation and technological

change, workers in the manufacturing

sector are much more productive

than they were a decade ago.

The industry can produce more

with fewer workers. According to a

2015 study by Ball State University’s

Center for Business and Economic

16

Photo by Engineering at Cambridge

Research, if 2000 levels of productivity

were applied to 2010 levels of

production, 20.9 million manufacturing

workers would have been required.

However, only 12.1 million

were employed.

In other words, the manufacturing

industry has continued to grow and

remains very important to the U.S.

economy. However, employment in

manufacturing has not increased,

primarily due to growth in productivity.

As technology continues

to advance, other sectors may also

see job losses. According to Wilson

Center scholar Chris Wilson,

“We can make more stuff with fewer

people. The real enemy is robots…”

The bottom line is manufacturing

jobs are not disappearing because

of immigration. In fact, immigrants

are key to the expansion and growth

of the American economy.


SECURE CARD READERS

FOR ANY NEED

THE CHERRY LINE OF SECURE KEYBOARDS

AND CARD READERS OFFERS A BROAD

SELECTION TO SUIT YOUR EXACT NEEDS!

LOOKING FOR

VAR / INTEGRATOR

PARTNERS!

Add the Popular CHERRY Line to

Your Portfolio and Increase Your

Business! Download the Details at:

www.cherryamericas.com/partner

SMART CARD READERS

Contact (FIPS 201), contactless

and combination options

BASIC USE

USB SMART CARD READERS

FIPS 201 certified; standalone unit

with weighted base.

HEAVY USE

SMART CARD KEYBOARDS

FIPS 210 certified, PC/SC smart

card reader and secure PIN entry.

MAXIMUM USE

FREE

WHITE

PAPER

THE TRENDS AND

BENEFITS OF SMART CARD

AND BIOMETRIC DE V ICES.

1-800-844-0797

www.cherryamericas.com

http://bit.ly/1C1pnlY

© 2016, Cherry Americas, LLC


Rule will streamline approval of

new technologies

WASHINGTON, DC – The U.S. Department

of Transportation’s Federal

Aviation Administration (FAA)

today issued a final rule that overhauls

the airworthiness standards

for small general aviation airplanes.

This innovative rule will reduce the

time it takes to move safety enhancing

technologies for small airplanes

into the marketplace and will also

reduce costs for the aviation industry.

“Aviation manufacturing is our

nation’s top export and general aviation

alone contributes approximately

$80 billion and 400,000 jobs to

our economy,” said U.S. Transportation

Secretary Anthony Foxx. “The

FAA’s rule replaces prescriptive

design requirements with performance-based

standards, which will

reduce costs and leverage innovation

without sacrificing safety.”

FAA’s new Part 23 rule establishes

performance-based standards for

airplanes that weigh less than 19,000

pounds with 19 or fewer seats and

recognizes consensus-based compliance

methods for specific designs

and technologies. It also adds new

certification standards to address

general aviation loss of control accidents

and in-flight icing conditions.

“The rule is a model of what we

can accomplish for American competitiveness

when government and

industry work together and demonstrates

that we can simultaneously

enhance safety and reduce burdens

on industry,” said FAA Administrator

Michael Huerta.

18

The rule responds to the FAA

Modernization and Reform Act of

2012 and the Small Airplane Revitalization

Act of 2013, which directed

the FAA to streamline the

approval of safety advancements

for small general aviation aircraft.

It also addresses recommendations

from the FAA’s 2013 Part 23 Reorganization

Aviation Rulemaking

Committee, which recommended a

more streamlined approval process

for safety equipment on small general

aviation aircraft.

The new rule also promotes regulatory

harmonization among the

FAA’s foreign partners, including

the European Aviation Safety Agency

(EASA), Transport Canada Civil

Aviation (TCCA), and Brazil’s Civil

Aviation Authority (ANAC). This

harmonization may help minimize

costs for airplane and engine manufacturers

and operators of affected

equipment who seek certification to

sell products globally.

The rule affects airplane manufacturers,

engine manufacturers, and

operators of affected equipment.

Click here to learn more from the

FAA and industry about the benefits

of streamlined certification.

This regulatory change is a leading

example of how the FAA is

transforming its Aircraft Certification

Service into an agile organization

that can support aviation

industry innovation in the coming

years. The Service is focused on using

risk-based oversight to refresh

the certification strategy, investing

in management systems to improve

performance, and improving the

overall organization.

The rule will be effective eight

months from publication in the

Federal Register.


Countering Transnational Organized Crime:

An Important Component of Counter-Terrorism Strategy

APRIL 11-13, 2017 | SAN ANTONIO, TX

■ The largest gathering of border security leaders and field commanders

■ Largest exhibition of border technology products, systems and solutions anywhere

■ Daily keynotes, luncheons and awards ceremonies

■ Demo Day at an outdoor venue on April 13 for testing equipment in the field

■ Host to the Salute to Fallen Heroes Memorial Ceremony

■ Networking events throughout

Visit www.BorderSecurityExpo.com

For Information on Attending, Sponsorships & Exhibiting


Access Control & Identification

HID Global predicts top trends for 2017 in the

Identity Technology industry

AUSTIN, TX, January 11, 2017

HID Global®, a worldwide leader in

trusted identity solutions, forecasts

a shift in the use of identity technology

that will lead to increased adoption

of mobile devices and the latest

smart card technology, a greater

emphasis and reliance on the cloud,

and a radical new way of thinking of

trust in smart environments and Internet

of Things (IoT).

Ultimately, HID Global predicts the

2017 trends will transform the way

trusted identities are used with smart

cards, mobile devices, wearables,

embedded chips and other “smart”

objects, particularly in industries focused

on regulatory compliance, such

as government, finance and healthcare

markets. This shift will precipitate

the move from legacy systems

to NFC, Bluetooth Low Energy and

advanced smart card technology to

meet the evolving needs of enterprises

and governments worldwide.

The forecast for 2017 is also based

on a breakthrough in adoption of mobile

identity technology in 2016. Exemplifying

industry-wide trending,

HID Global experienced tremendous

uptick in customer deployments of

its broad mobility solutions and has

a strong pipeline of future customer

installations in the works to make

verification of identities optimized

for mobile applications.

“HID Global has forecasted top

trends based on our broad view of the

market in close collaboration with

customers and partners who are assessing

and deploying innovative solutions

across markets worldwide,”

said Stefan Widing, President and

CEO of HID Global. “We have been

at the forefront of major technology

shifts over the years and HID Global

believes 2017 will mark an important

phase in the industry, as organizations

seek to use the broadest range of

smart devices ever. This will directly

impact how customers view and use

trusted identities on both mobile devices

and smart cards for more activities

in more connected environments

in the years ahead.”

HID Global focuses on four significant

trends in 2017 that will influence

20

how organizations create, manage

and use trusted identities in a broad

range of existing and new use cases.

Stronger adoption of

mobile devices and advanced smart

cards underscores the need

for trusted identities

• Similar to the adoption of consumer

trends to IT in past years, 2017 will

also see further consumerization of

security, with heightened demand

from users seeking to open doors,

and login to cloud-based resources,

as well as have personalized on-demand

printing of documents, and to

deploy printed credentials remotely

or conduct other transactions and

daily activities using trusted IDs on

their phone, wearable or smart card.

• Trusted IDs that integrate security,

privacy and convenience will provide

a new level of assurance to these applications

and transactions, while being

uniquely positioned to make secure

access more personalized to the

individual.

• The industry will look towards complete

identity relationship management

that considers the need to grant

access based on the context or circumstances

for risk-appropriate au-


thentication across trusted identities

assigned to people, devices, data and

things in smart offices, buildings and

other environments that are becoming

more connected every day.

Greater emphasis on the cloud

through “hybrid” solutions that

combine on-premises and the cloud

to create common management

platforms for digital IDs

• Organizations are recognizing the

interdependencies of technologies

and platforms needed for business

agility, cost management and providing

a better user experience within a

mobile workforce, or for digital commerce

and relationship management

that continues to require more reach,

flexibility, security.

• In banking, government, healthcare

and other regulated markets, multifactor

authentication for physical and

IT access control will have more opportunities

to merge into integrated

systems that will also provide a more

convenient experience for users and

increase security.

• This model will make it easier for

administrators to deploy and maintain

an integrated system throughout

the complete identity lifecycle -- from

onboarding to offboarding;

• It will make it possible to monitor

and manage employees’ access rights

as their role changes within an organization,

ensuring employees only

have access to what they need in a

current role.

• Credential issuance for physical ID

cards will also experience a digital

transformation, as the use of cloud

technologies will enable managed

service models for badge printing and

encoding.

Emerging IoT uses cases to

connect, more people, places and

things, increasing the need to ensure

the Internet of Trusted Things (IoTT)

• Trusted identities will increasingly

be employed to help secure, customize

and enhance the user experience

across a growing range of industry

segments that are embracing the

power of the IoT.

• Organizations will look towards

streamlining processes and operations

using real-time location systems,

presence- and proximity-based

location functionality, condition

monitoring solutions, beacons and

cloud-based models for

emerging IoT applications

using Bluetooth

Low Energy. These applications

will include

a growing number of

energy efficient, productivity

and safetyoriented

use cases that

will need to know the

identity of occupants

in a physical space to

manage environmental

conditions, book meet-

21

ing rooms and auto-configure audio

visual equipment and alarms.

• Bluetooth Low Energy-based solutions

will also advance existing secure

proof of presence capabilities to

include the predictive analytics and

functionality based on location-based

technologies.

Embedding trusted identities more

deeply in everyday activities for

businesses and consumers

• Trusted identities will become an

embedded feature of more use cases

rather than simply an add-on capability.

This trend of “security by design”

will lead to many more convenient

approaches to using digital identities

across a growing variety of activities,

services and industries.

• Along with popular secure access

use cases, new applications will

emerge, such as employee mustering

capabilities to address emergencies as

well as the need to more

accurately determine

who is in a building in

real-time.

• New capabilities for

managing and using

trusted IDs will be driven

by the increase of

temporary offices, mobile

knowledge workers

and the evolution of the

workplace, where adapting

to the preferences of

More on page 54


Access Control & Identification

Heightening security verification with

self-service kiosks

The issuance and verification of

identity credentials are currently

managed by different agencies in

different ways. Given the variations

in resources, technology and

security requirements, this is not

surprising. Emerging technologies

are now creating opportunities to

achieve greater consistency across

platforms and agencies which may

enable greater efficiencies and better

accuracy throughout the spectrum

of security needs.

One promising modality is the

standalone, self-service ID kiosk.

Its simplest form is similar to the

electronic check-in kiosks at airports,

where passengers insert their

credit cards or scan their passports

to verify identity. Those kiosks serve

as an initial security point, but they

do not support biometric data recognition

(such as fingerprints, iris

scan or facial recognition). They reduce

the need for clerks to perform

the check-in at the airline counter,

without replacing TSA check-points

where passengers show picture IDs

along with boarding passes.

Still, the check-in machine allows

reasonable labor savings for airlines.

22

It also provides a conceptual backdrop

for the type of self-service kiosks

that could enable greater levels

of efficiency, savings and accuracy

in security credentials issuance and

authentication. This could be useful

in government embassies and facilities,

as well as in airports and other

locations where security needs are

high.

The enrollment process for issuing

ID credentials must still begin

with a face-to-face encounter with

an officer or agent of the issuing

body. For example a passport, driver’s

license or global entry pass requires

the completion and transfer

of data such as birth certificates, fingerprints,

signature, etc. Biometric

data capture can be performed automatically

with the use of a machine,

such as the Speed Identity kiosk, or

by a trained security agent. A combination

of the two can also be used

to speed up the process. The security

officer is usually vested with the

skills to recognize human factors,

such as nervousness, that provide

subjective cues about an applicant’s

authenticity, for example. While fingerprints

and photographs are collected

automatically, the officer’s attention

can be focused on observing

behaviors that a machine can’t see

or understand.

The real benefit of a self-service


ID kiosk is after the credentials have

been issued – when they are checked

at the point of entry to an airport

terminal, area or building. Here,

biometric data can be matched

against a central database. Fingerprints

can be quickly scanned and

matched. A signature can be validated.

Or a photo can be used for a

facial recognition (FR) comparison.

Many of the security functions enabled

by the technology can take

place seamlessly without the user’s

explicit step-by-step direction because

they occur in the background.

Once an individual’s background

and identity are vetted through the

appropriate authoritative agencies,

it won’t have to be done repeatedly.

All of the work is done up front and

subsequent screenings are virtually

instantaneous.

Gaining entry to a secure area –

for example, a particular work area

in a mission critical facility or location

– can be done at an unattended

gate, simply by requiring a quick

fingerprint, iris scan, or FR comparison.

The potential for unauthorized

access, fraud and human error is reduced.

Re-entering the US after a trip

abroad can also be made faster

and easier with self-service kiosks.

Instead of manually completing a

US customs form and handing it,

with a passport, to a customs agent

for checking, questions can be answered

on an electronic screen and

the passport can be authenticated at

the same time. The machine does

more than visual inspection of an

ID credential – it can also scan for

invisible security features. The time

and labor savings can be invaluable.

This technology is already being

used at international points of entry.

A common credential for government

facilities and agencies could

also be accommodated. This would

allow authentication between agencies

with a high degree of confidence.

The migration to self-service kiosks

will require planning. Traffic

volume must be carefully considered

when deciding how many machines

to install and in what locations.

They must be easy to find, and

it’s important to install enough of

them to prevent long lines. Bottlenecks

would defeat their purpose of

convenience, and discourage use.

The interface and workflow are

critical points for user adoption. The

kiosk should be inviting and easy to

use and understand. It’s possible for

the interface to adjust workflow in

accordance with the user’s demographic

(age, for example). The user

won’t realize it, but the speed of the

question/answer workflow will be

23

adjusted to meet the user’s anticipated

needs.

Anti-fraud measures can be

built in as well. Biometrics can be

proofed with background adjudication.

The interactive technology will

detect inconsistencies and adjust

the workflow to allow correction or

to automatically abort an attempt.

Conclusion

The use of self-service kiosks for

identity authentication will become

commonplace in areas, like airports

and government facilities, where a

high degree of security is required.

These new technologies will enable

faster and more accurate checking

of credentials, saving time and

money and providing a new level of

convenience to the users.


Access Control & Identification

Card personalization now making Government ID

cards more secure with better visual security

by Josh Nippoldt

Director, Product Marketing,

Consumables

24

It is estimated that more than

90 percent of photo ID card inspections

are undertaken visually

and in the field. In fact, visual

inspections are often the first and

primary form of document investigation

and validation. Any decisions

to use a secondary inspection

criteria are often based on the outcome

of the visual inspection. For

this reason, good badge design and

the selection of the right custom ID

card printing solution is so important.

These components are crucial

in creating visually secure credentials

that incorporate elements that

can be scrutinized and validated

during the initial inspection.

The speed, cost-effectiveness,

convenience and simplicity of visual

inspections have made them

particularly popular in government

applications including national

ID cards, permit and enforcement

documents, and federal ID credentials.

These cards, documents and

credentials must be clearly authentic

and genuine, so the

importance of having

a well-designed visual

security solution cannot

be overstated.

Typical visual security

features include

holographic overlaminates and card

pre-printing. Holographic overlaminates

may include numerous overt,

covert and forensic features, while

pre-printing options range from

holograms and various types of security

printing to special inks, relief

structures, laser images, optical

variable ink (OVI), hidden features,

and randomized UV markings.

There are dozens of visual security

combinations that can be considered,

and HID Global and its partners

are available to help customers

make the right choices for their requirements.

It’s important to note that most of

the visual security solutions that are

offered today are one-size-fits-all,

meaning they are exactly the same

on every single document. While

this is still a very effective solution,

an additional level of defense can

be applied by utilizing card printing

features including personalizing

IDs with on-card visual security options.

The ID designs can now play

a role in the first line defense against

counterfeiting by taking visual security

features and customizing them

to each unique card holder or user.

HID Global delivers this capability

to its customers with its One-2-

One custom card printing offerings,

which make visual security

solutions unique to each individual

and their credential. These One-2-

One solutions can be created on the

company’s vanGO® cards which are

stamped with a unique and specialized

foil developed by HID Global.

In addition, numerous One-2-One

visual security elements can be

placed onto the cards’ foil including

a picture of the card holder, a

unique identification number, or

even a combination of items, such

as a unique ID plus the organization’s

logo, for example. The alternative

One-2-One option of laser

engraving offers the advantage of

being able to place images either at

the surface or beneath the surface of

the ID card, and supports more detailed

images as well as the ability to


create microtext lettering. The personalization

of these One-2-One solutions

are done by using available

modules that can be attached to the

HID FARGO® HDP8500 industrial

ID card printer and encoder. The

HDP8500LW laser writing module

is used for creating the unique personalization

of the foil on vanGO

cards while the HDP8500LE laser

engraver module can be used to

apply numerous types of laser engraving

options onto cards made of

polycarbonate or laserable PVC materials.

As with other forms of security,

visual security solutions take time

to develop and implement, so plan

ahead. Remember that visual security

is the first line of defense against

threats to people, property, assets,

information and infrastructure. Be

sure to implement visual security as

part of a well-developed and managed,

multi-level security solution.

And consider One-2-One card personalization

solutions that are easy

to validate and deliver increased

counterfeit resistance.

Sign-up for Free

GSN Digital Editions

and Email Newsletters

Free subscription to your selection of GSN digital editions

and daily/weekly email newsletters. Add new selections or

opt-out of any selections at any time.

GSN Monthly Digital Edition

GSN Airport, Seaport, Rail, Border Security Weekly

GSN Daily Insider Newsletter (5 Days Weekly)

GSN Cybersecurity Newsletter

GSN Media Kit

CLICK HERE

The News Leader in Physical, IT and Homeland Security

www.gsnmagazine.com

25


DOJ issues final rule about unfair

immigration-related employment practices

By Leslie Dellon

The U.S. Department of Justice’s

(DOJ) Civil Rights Division recently

issued a final rule, effective January

18, to update regulations that the

agency uses to enforce employmentrelated

anti-discrimination provisions

that Congress included in the

“unfair immigration-related employment

practices” section of the Immigration

and Nationality Act (INA).

The agency maintains that the update

clarifies the procedures for investigations

and charges of discrimination.

With the Immigration Reform and

Control Act of 1986, Congress added

a section to the Immigration and

Nationality Act that made it illegal

for employers to hire unauthorized

workers. In the same legislation, Congress

also added a section prohibiting

immigration-related discrimination

in the employment context. Congress

also created a Special Counsel for

Immigration-Related Unfair Employment

Practices within DOJ to enforce

the anti-discrimination provisions.

This was out of concern that overlycautious

employers would refuse to

hire, or take other discriminatory employment-related

actions against, U.S.

citizens or certain immigrants who

had work authorization but looked or

sounded “foreign.”

The law protects against discrimination

based on “national origin,”

which refers to being from a particular

country or region of the world, or

having an accent or appearing to be

of a particular ethnicity. The law also

protects against “citizenship status”

discrimination for U.S. citizens, nationals,

permanent residents (“green

card” holders), refugees, asylees, and

certain temporary residents. However,

those who are not U.S. citizens

or nationals will lose this additional

protection if they do not take steps to

become U.S. citizens within a specified

time period. The law does not

protect people not authorized to work

in the U.S. and excludes employers

with three or fewer employees, jobs

with a lawful citizenship requirement

or when a national origin discrimination

claim would be covered by a different

law.

In 1990, Congress added a protection

against a new form of immigration-related

discrimination. When

workers present documentation

proving they are authorized to work

26

Photo by John Taylor

in the U.S., an employer cannot require

that they provide more or different

documents, such as rejecting

any documents other than a “green

card” from permanent residents.

In 1996, Congress amended this

documentation provision to specify

that an employer who requires “more

or different documents,” or refuses to

accept a document that “reasonably”

appears to be genuine would be acting

unlawfully only if the employer

acted “for the purpose or with the intent

of discriminating.”

In December, DOJ finally issued

regulations implementing this

amendment and making certain other

changes. Key elements of the new

regulations include:

• The name of the Special Counsel’s

office is changed to the Immigrant

and Employee Rights Section (which

remains part of DOJ’s Civil Rights Division)

because having more than one

Special Counsel’s office has caused

confusion. The Special Counsel’s title,

which is specified by the law, remains

unchanged.

• The new regulations include a definition

of “discriminate,” which the

agency maintains has clarified that

an employer’s intent to discriminate

must be based on national origin or

citizenship status. Some employers

remain concerned because the definition

of intent does not consider what


eason an employer may have had.

For example, an employer may try to

be helpful by letting a person who has

identified herself as a permanent resident

know that she could provide her

green card for documentation. The

employer’s intent is to be helpful, not

to discriminate. This is different than

requiring all foreign-born employees

to present a green card, which is

clearly discriminatory. However, the

final rule does not ultimately resolve

this issue because DOJ also explains

that if the employer is intentionally

treating the permanent resident differently,

i.e., because of her citizenship

status, then the employer has

discriminated.

• Individuals who submit a discrimination

claim within the 180-day time

period provided by law now have an

additional 45 days to submit information

if the Special Counsel decides

that they did not provide enough information

to meet the requirements

for a “charge.”

• The DOJ Special Counsel may accept

charges filed after the 180-day

time limit under certain circumstances.

• The Special Counsel may file a

complaint based on an investigation

the office initiated, up to five years after

the date of alleged discrimination.

While the final rule still does not provide

answers to all of the questions

raised by employers, the agency has

clarified its position as to enforcement

of the law.

House members join effort to

create independent commission

Continued from page 5

92.Rick Larsen

93.John Larson

94.Brenda Lawrence

95.Barbara Lee

96.Sander Levin

97.John Lewis

98.Ted Lieu

99.David Loebsack

100.Zoe Lofgren

101.Alan Lowenthal

102.Nita Lowey

103.Ben Ray Lujan

104.Michelle Lujan Grisham

105.Stephen Lynch

106.Carolyn Maloney

107.Doris Matsui

108.Betty McCollum

109.A. Donald McEachin

110.James P. McGovern

111.Jerry McNerney

112.Gregory Meeks

113.Grace Meng

114.Seth Moulton

115.Gwen Moore

116.Stephanie Murphy

117.Jerrold Nadler

118.Grace Napolitano

119.Richard Neal

120.Donald Norcross

121.Eleanor Holmes Norton

122.Beto O’Rourke

123.Frank Pallone

124.Jimmy Panetta

125.Bill Pascrell

126.Nancy Pelosi

127.Ed Perlmutter

128.Scott Peters

129.Collin Peterson

130.Stacey Plaskett

131.Mark Pocan

132.Jared Polis

27

133.David Price

134.Mike Quigley

135.Jamie Raskin

136.Kathleen Rice

137.Cedric Richmond

138.Jacky Rosen

139.Lucille Roybal-Allard

140.Raul Ruiz

141.C.A. Dutch Ruppersberger

142.Bobby Rush

143.Tim Ryan

144.Gregorio Sablan

145.Linda Sanchez

146.John Sarbanes

147.Janice Schakowsky

148.Adam Schiff

149.Bradley Schneider

150.Bobby Scott

151.Jose Serrano

152.Terri Sewell

153.Carol Shea-Porter

154.Brad Sherman

155.Kyrsten Sinema

156.Albio Sires

157.Louise Slaughter

158.Adam Smith

159.Darren Soto

160.Jackie Speier

161.Thomas Suozzi

162.Mark Takano

163.Bennie Thompson

164.Mike Thompson

165.Dina Titus

166.Paul Tonko

167.Norma Torres

168.Niki Tsongas

169.Juan Vargas

170.Marc Veasey

171.Filemon Vela

172.Nydia Velazquez

173.Debbie Wasserman Schultz

174.Maxine Waters

175.Bonnie Watson Coleman

176.Peter Welch

177.John Yarmuth


GSN announces

Winners and Finalists in the

2016 Homeland Security Awards Program

By Adrian Courtenay

Government Security News is

pleased to announce the Winners

and Finalists in its 8th annual

Homeland Security Awards Program,

and to thank the indefatigable

Chuck Brooks and his team for

serving as expert judges with great

distinction. Not surprisingly, Chuck

Brooks is once again the odds-on favorite

to become the “Cybersecurity

Marketer of the Year”.

It is similarly no surprise, in light

of what took place in the recent

Presidential election, that the subject

of Cybersecurity attracted more

entries in the 2016 Awards Program

than any other topic.

On a very important note on

the subject of Cybersecurity, GSN

would like to take this opportunity

to salute Brigadier General (retired)

Gregory Touhill, who has been

named as the First Federal Chief

Information Officer of the United

States. He was previously the Deputy

Assistant Secretary, Office of Cybersecurity

and Communications,

National Programs and Protection

Directorate, Department of Homeland

Security. Additionally, he was

Chief Information Officer and Director

of Command, Control,

Communications and

Cyber Systems at the U.S.

Transportation Command.

In 2014, General Touhill

authored a book titled “Cybersecurity

for Executives.”

Before moving on to the

announcement of Winners

and Finalists, I would like to

share with everyone the comments

that Chuck Brooks made about the

quality of the entries in the Awards

Program, which I believe described

this year’s Awards perfectly. His

comments also explain why you will

see a number of categories which

have more than one Winner. In Mr

Brooks’ words:

“These are my general perceptions

of the Awards: Each year the quality

and scope of the submissions makes

it more difficult to judge. They are

all deserving. There are no inferior

security products or services that I

evaluated – they are all stellar. The

approaches and methods sometimes

differ among the entries and that is

largely because they are highly fo-

28

Chuck Brooks

cused on their specific client needs.

As to the government entries, these

submissions exemplify the

best in public/private cooperation.

Government

is moving rapidly into the

digital era and integrating

technologies, processes

and accordingly new mandates

of their government

agencies and programs.”

With that introduction from Mr.

Brooks, here are the 2016 Winners

and Finalists:

Category #1: Vendors of

IT Security Products and Solutions

Judging in this category is based on

a combination of:

• Increase in client organization’s

security

• Technological innovation or

improvement

• Filling a recognized government

IT security need

• Flexibility of solution to meet

current and future organizational

needs


The GSN 2016 Homeland Security Awards

Best User & Entity Behavior

Analytics (UEBA) Solution

Amplivox - Finalist

Identive - Finalist

Inmarsat - Winner

FLIR - Finalist

Rave Mobile Security – Finalist

Gurucul - Winner

Best Industrial

Cybersecurity Solution

Aperio - Winner

Claroty - Finalist

Darktrace - Winner

Indegy - Winner

Best Application Security Solution

Waratec - Winner

Best Multifactor

Authentication Solution

No entries

Best Anti-Malware Solution

Blue Ridge - Winner

Bromium - Winner

Passages - Finalist

Best Identity Management Platform

Centrify - Winner

Forum Systems - Finalist

HID Global - Winner

Best Enterprise File Solution

No entries

Best Compliance/Vulnerability

Assessment Solution

Netwrix Corporation - Finalist

Risk Vision - Finalist

Solar Winds - Winner

Wombat - Finalist

Best Cyber Operational Risk

Intelligence

Red Seal - Winner

Best Data Security/Loss

Management Solution

Spiron - Winner

Best Email Security

and Integrity Solution

Wombat Security Technologies -

Winner

Best Endpoint Detection

and Response Solution

Bromium - Winner

Illusive Networks - Winner

Tychon - Finalists

Best Forensic Software

No Entries

Best Big Data Analytics Solution

Securiport - Winner

Best Threat Intelligence Solution

Securiport - Winner

ViaSat - Finalist

29

Best Network

Security/Enterprise Firewall

Forcepoint - Winner

Best Physical Logical Privileged

Access Management Solution

Beyond Trust - Winner

Centrify Corporation - Finalist

EKUSA - Finalist

Forum Systems - Finalist

Identive - Winner

Best Continuous Monitoring

and Mitigation Solution

Cyber Ark – Winner

Darktrace - Winner

Netwrix - Finalist

Passages - Finalist

Securiport - Finalist

Solar Winds Worldwide - Finalist

Best Security Incident & Event

Management (SIEM) Solution

Cyber Ark - Finalist

Netwrix - Winner

Solar Winds Worldwide - Winner

Best Security Infrastructure

Orchestration

Phantom - Winner

Best Server Security Solution

BlueRidge - Winner


Category #2: Vendors of Physical

Security Products and Solutions

Judging in this category is based on

a combination of:

• Increase in client organization

Technological innovation or

improvement

• Filling a recognized government

IT security need

• Flexibility of solution to meet

current and future organizational

needs

PHYSICAL SECURITY, ACCESS

CONTROL, IDENTIFICATION,

COMMUNICATIONS

Best Biometric Identification

System

No Entry

Best Access Control Hardware

Identive - Winner

Best Asset Tracking

With Pairing Technology

Offsite Vision Holdings - Winner

Best Mass Notification System

Amplifox Sound Systems - Winner

LRAD 2 - Finalist

Rave Mobile Security - Finalist

Best Acoustic Hailing Service

Amplivox Sound System - Finalist

LRAD - Winner

Best Lock-Down and

9-1-1 Notification

in Active Shooter Situations

Rave Mobile Safety - Winner

Best Active Shooter

Gunshot Detection Solution

Shooter Detection System - Winner

DETECTION PRODUCTS

Best Chemical Detection Product

or Solution

FLIR - Winner

Best Explosives Detection Product

or Solution

FLIR - Winner

Best Nuclear/Radiation Detection

Solution

FLIR - Winner

Best Automated License Plate

Recognition (ALPAR)

Perceptics LLC - Winner

Best Spherical Situational

Awareness Imaging Technology

IC Realtime - Winner

OTHER PRODUCTS

Best Perimeter Protection,

Intrusion Detection System

Ross Technology Corporation -

Winner

30

Best Crash Barriers

(Gates, Fences, Barriers, Bollards)

Best Guard Booths

B.I.G Enterprises – Winner

SERVICES/EDUCATION

Best Disaster Preparedness,

Recovery, Clean-up

High Rise Escape Systems Inc -

Winner

Category #3: GSN 2016

Government Excellence Award

Judging in this category will be

based on one or more of the following

criteria:

• Development of successful

strategy and increase in public

safety

• Providing a notable solution to a

recognized problem

• Reduction in cost and/or major

increase in efficiency and

effectiveness

• Decisive, successful action to

respond to threat or emergency

Special note on this year’s Government

Awards: Rather than relying on

predetermined categories, the judges

decided instead to select five entries

that would best represented the term

Government Excellence.


The GSN 2016 Homeland Security Awards

Readers who would like to learn

more about the selected entries may

go to the GSN 2016 Digital Yearbook

of Homeland Security Awards, where

descriptions of the Government Excellence

Winner’s entries will be posted

shortly.

2016 Government Excellence Entry

selected by judges:

Agency: USDA Agricultural Research

Service (USDA-ARS)

Category: Most Notable Federal

Government Program, Project or

Initiative

Product: BeyondTrust Powerbroker

2016 Government Excellence Entry

selected by judges:

Agency: Federal Emergency Management

Agency (FEMA)

Category: Most Notable Cybersecurity

Program or Technology

Product, Service or Program: Personal

Identity Verification (PIV)

and Single Sign On (SSO) enablement

2016 Government Excellence Entry

selected by judges:

Agency: Department of Homeland

Security, Office of Cybersecurity

and Communications

Category: Most Notable Cybersecurity

Program or Technology

Product: National Cybersecurity

Assessments and Technical Services

(NCATS)

2016 Government Excellence Entry

selected by judges:

Agency: State of Montana

Category: Most Notable State

Government Program, Project

or Initiative

Program: State Information Technology

Services Division (SITSD),

State of Montana

2016 Government Excellence Entry

selected by judges:

Agency: DOJ, OPM

Category: Most Notable Government

Security Program, Project of

Initiative

Product, Service or Program: Interagency

Security Committee Risk

Management Process (ISCRMP)

Training Program

2016 Government Excellence Entry

selected by judges:

Agency: Wombat Security Technologies

Category: Most Notable Cybersecurity

Program or Technology

Product, Service or Program: Wombat

Security Education Platform

31

Nomination process

Vendors of IT security or physical

security products or solutions

may nominate themselves

or be nominated by a federal,

state or local government official.

Government agencies or departments

may nominate their

own agency or department, or

another government agency or

department, or may be nominated

by a vendor of IT Security

or Physical Security products

and solutions.

Entrants in any category may

enter for multiple awards.

Entry procedure

Each entrant, or representative

of entrant’s company or government

agency, must fill out a separate

entry form for each award

being sought.

A written narrative of company

or agency’s achievements

and credentials for the award

being sought should not exceed

500 words. Entrants are

welcome to provide supporting

documentation such as Web

links, supporting letters or favorable

press coverage of their

company or agency.


Video Surveillance, Software, Management

Hikvision supports school security and success for

students with disabilities

CITY OF INDUSTRY, CA —January

16, 2017— Hikvision USA Inc.,

the North American leader in innovative,

award-winning video surveillance

products, delivered a new

security system that will be used for

classroom instruction as well as security

at Kids World, a non-profit

school for students with disabilities,

located in Taylorsville, Utah.

The system was installed over

the holidays. Since its founding in

2005, Kids World has helped

students (pre-school

to 7th grade) with

a variety of challenging

disabilities,

said Kids

Worldfounder

Brandon Francis.

“We help students get

their behavior, social skills, and

academics to the point where they

can be successful in school and in

their community,” Francis said.

“We become a family to our students

and I always hate to see them

graduate our program,but it’s great

to see them confident and ready to

flourish in their next educational

setting.”

Several Kids World graduates

have moved on to public school settings.

One child, who was nonverbal

initially, started speaking after

participating in an auditory therapy

program at Kids World.

The Hikvision solution replaced

an outdated system. Cameras are

used for security when the school is

vacant, during recess on the school’s

playground, in the classrooms, and

in the pickup/drop-off area. Inside

the classrooms, teachers use

video for monitoring

and visual feedback.

Kids World’s

new Hikvision

system is designed

for very easy installation,

versatility

and is ideally suited

to a small education-vertical

environment. The system includes

three Hikvision DS-2CD2432F-IW

3MP Indoor IR Wifi Cube cameras;

one DS-2CD2542FWD-IWS 4MP

WDR Mini Dome Network camera;

four DS-2CD2132F-IWS MP Vandal-proof

Network Dome cameras;

and aDS-7716NI-I4/16P Embedded

Plug & Play 4K NVR, with a built-in

32

POE switch.

All of the cameras feature higher

definition, affording better security

and better coverage for the safety

of the children. The outdoor cameras

provide a wide coverage area

for effective perimeter protection.

The indoor cameras are low profile,

which makes them unobtrusive in

theclassroom.

The 4MP indoor dome camera

features very wide, 106-degree coverage

for the classroom, and all indoor

cameras have audio recording

capability, which Kids World teachers

will use for instructional purposes.

All of the cameras are also

Wifi capable for a dynamic range of

deployment opportunities.

Kids World has two classrooms


and 16- to 20 students. In addition

to regular school hours, Kids World

offers one-on-one therapy, tutoring

and after-school programs. Hikvision

has solutions that are tailored

specifically to the education market,

with systems that are appropriate

for a wide variety of K-12 and higher

education applications.

“We’re particularly pleased to provide

technical expertise and video

surveillance equipment to help support

KidsWorld teachers and students,”

said Alex Asnovich, director

of marketing for Hikvision USA.

“This is one example of the many

ways that Hikvision invests in the

communities where we do business,”

he added.

A few years ago, Kids World

moved from its original location in

a commercial park to a residential

neighborhood. “I did an extensive

study and found that a home-like

environment is the most beneficial

for students with and without disabilities.

This type of environment

helps students feel safe, secure, and

at home. As a result, students have

a higher self-esteem, are more ready

to learn, have higher outcomes, and

feel less anxiety then in a commercial

building,” Francis said. “The

Hikvision cameras will really make

a difference for our students and

their families, providing security

and a helping hand in the classroom

too,” Francis added.

About Hikvision

Hikvision is the world’s leading supplier

of video surveillance solutions.

Featuring the industry’s strongest

R&D workforce, Hikvision designs,

develops, and manufactures standard-

and high-definition cameras,

including a variety of IP cameras,

analogcameras, and cameras featuring

the latest in high-definition

analog technology. Hikvision’s

product suite also includes digital

video servers, hybrid and standalone

DVRs, NVRs, and other elements

of sophisticated security systems

for both indoor and outdoor

use.

33

AMICO Security to play major

role in Trump’s border security

initiative

Continued from page 10

technology, detection devices, and

video surveillance, all of which are

currently used on the Israel border.

“We are a 76-year-old Alabamabased

steel fabrication company,

which has been hit hard by foreign

imports, dumping and an un-level

playing field,” said Baltz. “We are extremely

excited to have the opportunity

to increase production and put

American workers back to work.”

About AMICO Security

AMICO Security is an industry

leader in manufacturing medium

to high security perimeter systems.

AMICO has been in business for

over 76 years and our patented

proprietary systems protect infrastructure

and boarders throughout

the world. The new AMIGUARD

perimeter system is the gold standard

for perimeter protection and

is rapidly becoming the number

one choice for infrastructure protection

worldwide.

http://www.amicosecurity.com


Video Surveillance, Software, Management

New Thermal Chassis Surveillance Camera

Offers Continuous Zoom

Sierra-Olympic Technologies, a supplier

of infrared (IR) and thermal

imaging components, cameras, and

systems solutions for innovative

imaging applications, has developed

a new thermal chassis camera

with a continuous zoom that is

built for integrators and thermal

video end-users, the Vinden 150 EX

640 x 480 (see Fig. 1). The affordable

camera provides

highly-sensitive thermal

imaging using

advanced, uncooled

VOx microbolometer

technology and

an extremely efficient

continuous zoom optic.

The highly parfocal

optic keeps objects

in perfect focus

throughout the zoom range.

The new Vinden 150 EX features

a total 12X zoom factor and a remarkable

1.5 degree HFOV in full

optical plus digital zoom. The 640 x

480 camera is available in 30 Hz and

9Hz models, depending on export

requirements. Specially designed

for critical pan-tilt-zoom (PTZ) security

and surveillance applications,

the camera offers advanced thermal

image processing for integrators or

other users who require exceptional

Figure 1 - Sierra-Olympic’s Vinden

150 EX 640 x 480 thermal imaging

camera for video surveillance and

security.

zoom imaging capabilities (see Fig. 2

- Side-by-side Visible vs. Vinden 150

EX thermal camera views).

The Vinden 150 EX uncooled

camera offers IP-video output with

H.264 and MJPG streams and Ethernet

control, for maximum flexibility

and integration into new or existing

security and surveillance systems.

Simultaneous analog video (NTSC

or PAL) and 14-bit

Camera Link digital

outputs are also available.

Optional control

via a serial communication

port (serial

com) is offered; other

options include individual

harness microconnectors

or 30-pin

FFC connectors.

An ideal imaging tool for systems

integrators, Sierra-Olympic’s Vinden

150 EX is used for infrastructure security,

thermal PTZ systems, port

and harbor security,

and a variety of defense

applications.

To learn more about

the new Vinden 150

EX 640 x 480 thermal

camera, please go to:

www.sierraolympic.

com/products/lwir-

34

optics/vinden-cz/vinden-150-ex-

640x480.

About Sierra-Olympic

Technologies, Inc.

Sierra-Olympic Technologies, Inc.

(www.sierraolympic.com Hood

River, Oregon), experts in thermal

imaging technology, provides cameras,

components, and systems solutions

for infrared camera users and

integrators. Sierra-Olympic partners

with industry-leading manufacturers

to offer complete solutions for

SWIR, MWIR, and LWIR imaging

applications. The company offers numerous

products for online purchase

and immediate shipment. Products

include LWIR OEM imaging cores,

cooled cameras for science and industry,

cooled cameras for OEM

customers, SWIR cameras, and thermography

systems for temperaturemeasurement

applications.

Figure 2 - Side-by-side Visible vs. Thermal camera viewsviews from a

visible camera and a thermal camera of smoky hills and power lines).


Elephant proof.

Our cameras are much tougher than they look. That’s because we don’t just

give them a few strikes during testing, as you might expect. Instead, we subject

them to about 30 heavy strikes – directly on their weakest spots. Don’t worry

though, we keep them away from elephants.

It’s just one of the tough tests Axis cameras face, so you can be sure you’ll

always get the best image quality and high performance – no matter what’s

thrown at them.

Learn more about Axis’ quality assurance work at axis.com/quality

For more information about our governement solutions, visit www.axis.com/usgov


Will Congress fund President Trump’s executive

order on border enforcement?

By Joshua Breisblatt

President Donald Trump’s Border

Security and Immigration Enforcement

Improvements executive order

is an attempt to fulfill his campaign

pledge to build a wall at the

southern border, to provide additional

resources to Border Patrol

agents, to curtail due process

at the border, and to increase detention

along the southern border,

including for those who are

seeking protection. Much of this

order will require more funding

from Congress, and that is by no

means guaranteed.

The executive order directs the

Department of Homeland Security

(DHS) to take immediate steps

to allocate available funds to start

constructing a wall, as well as creating

a long-term funding plan for

it. As a practical matter, with estimated

costs of $15 to $25 billion

to build the remaining border wall

segments, Congress would have to

appropriate significant additional

funding for construction and annual

maintenance.

Apart from the wasteful expense,

construction of additional border

fencing is unnecessary; as of early

2017, approximately 650 miles of

border fence already exists. Even

the head of the National Border Patrol

Council, a union representing

16,000 Border Patrol agents which

endorsed Trump during his campaign,

said, “We do not need a wall

along the entire 2,000 miles of border.”

The order also directs DHS to immediately

construct detention facilities

at or near the southern border

and to hire an additional 5,000 Border

Patrol agents. The federal government

is operating under a Continuing

Resolution until April 28,

2017, and it is doubtful that significant

funds exist to implement these

plans. Construction and maintenance

costs for new detention facilities

are exorbitant; spending on

ICE’s 34,000 detention beds costs

taxpayers over $2 billion each year.

37

Hiring additional border patrol

agents is going to be a tall order as

well. Currently, Border Patrol is required

to have 21,370 agents but as of

October 2016, they only had 19,828,

nearly 1,500 below the required levels.

Border Patrol has significant

issues with its hiring process, low

morale and high attrition rates,

making it hard to increase staff

quickly even it were to get additional

funds from Congress. Not

to mention, the fact that Border

Patrol staffing doubled in the early

2000s, which has led to it being

Photo by John Taylor

considered “America’s most outof-control

law enforcement agency.”

DHS is also directed to expand

“expedited removal” to the full extent

the law permits. This type of

summary removal procedure was

previously restricted to wide border

regions (within 100 miles of

any US border) and recent unlawful

entrants (within 14 days). The

order would expand application of

expedited removal throughout the

country, to individuals who unlawfully

entered the U.S. and cannot

prove to DHS that they have been

continuously present for the previous

two years.

More on page 56


Resentment and hatred from the Middle East: Why they hate us –

is by Michael Conti, Cal State, Fullerton, photos contributed by GSN.

Resentment and hatred from the Middle East:

Why they hate us

By Michael Conti

12/14/16 – The Middle East in recent

times has been seen as a place of chaos

and civil unrest. To us, they seem

backwards and outright barbaric as we

see beheadings in news feeds, headlines

of suicide bombings, and terrorist

attacks throughout the world.

To the common citizen of the United

States, this aggression is unwarranted

and it seems as though they simply

hate us for existing. While that would

put us in a good light and provide

the moral high ground, this is simply

not the case. As we look through the

past seven decades, we see that the

United States government has had a

paramount role in what we see today.

Modernized countries in Europe look

as the US and see a trusted and amiable

ally. However, those of less developed

countries in the Third World see

us as a tyrannical force that has forced

upon them the will of imperialism. To

put it simply, the US has been a police

force for the world and has done well

through humanitarian efforts, but

they have also committed egregious

acts including meddling in the affairs

of sovereign countries, overthrowing

rulers, and undermining governments

by backing rebel forces in the

Middle East under the pretense of defending

democracy and its values. It

is because of these acts that they hate

us and have caused us harm.

In order to fully understand the

mindset of the US government in the

20th century, we must look at its beginnings

when they achieved sovereignty

as a result of the Revolutionary

War. While this was a victory in itself,

the fleeting US government was weak

and needed to expand its borders in

order to survive and thrive. It was

thought to be their Manifest Destiny,

a term used to describe and justify the

taking of the rest of the modern day

United States from Native Americans

and Spain. While much of the territory

came from the French in the form

of the Louisiana Purchase, the rest of

it was taken through federal acts and

military force. To best explain this,

Odd Arne Westad, a historian who

specializes in the Third World and

author of, The Global Cold War, gives

a simple explanation for how the US

operates when he states, “From its

inception the United States was an

interventionist power that based its

foreign policy on territorial expansion.

Its revolutionary message- free

38

men and free enterprise…” (Westad,

9-10). As we see from this quote, it

not only goes along with the theme

of having to expand to survive, but it

also shows us how this idea evolved

to be a mantra for future events under

the guise of promoting freedom with

a global economy. It is this idea that

later justified intruding in the affairs

of the Middle East. While it seems irrelevant

to study the past, this piece

of information is important as we can

now look into future events with an

understanding of the US’s motives.

Now that we know the US has been

an imperialist power from its inception,

we can take a relatively clear

look at past events and understand

why the US acted the way they did in

the Middle East. An example to look

at comes in the form of a book written

by Douglass Little titled, American

Orientalism, The United States

And The Middle East Since 1945. He

delves into the era of the 1940s-1950s

when the United States emerged as

an economic super power following

World War Two while the rest of

Europe was in ruin. Under the Truman

administration, financial aid was

given to the allied powers to rebuild.

However the source of this aid is re-


vealed when Little states,

“To fuel the European

Recovery Program that

Secretary of State George

Marshall unveiled in June

1947, the Truman administration

intended to rely

not on the oil fields of east

Texas or Venezuela but,

rather, on the 300,000

barrels of Saudi crude…”

(Little, 53). Indeed, rather

than looking to their own

secured resources in order

to help the recovery effort, the US

government decided to impose itself

by taking oil from Saudi Arabia in addition

to other Middle Eastern countries

such as Kuwait and Lebanon.

The book goes on to say that they did

this in order to maintain their status

as auto-manufacturing giants. It’s

not surprising given the context that

under the ideas of Manifest Destiny,

the Saudis are uncivilized barbarians

and that it is justifiable to take from

them as a result. While it may seem

relatively harmless to take resources,

oil is the livelihood of Middle Eastern

countries as it is their single most

profitable export. To take this from

them would be to threaten their way

of sustainability. It’s no wonder as to

why they would resent such a thing.

However, the taking of their resources

is relatively tame when we look

further and see that the US, along

the other Allied Powers, stirred civil

unrest in the Middle East after establishing

the Jewish nation of Israel by

taking the holy city of Jerusalem from

Palestine in the post-World War Two

era.

The establishment of Israel in 1948

was backed by the Allied Powers and

came as a grave insult to Palestine.

The holy and ancestral lands of Jerusalem

were taken from them and given

to their sworn enemies, the Jews.

This almost immediately caused a

massive conflict known as the Israeli

War in which Israel emerged victorious

and had taken yet more land. The

textbook Major Problems in American

Foreign Relations, Volume II:

Since 1914, a series of documents

and essays on US foreign relations

gives us a glimpse into the predicament

that the Arab nations such as

Palestine were in before Israel came

to be when it states, “The Arabs, no

less than the Jews, are victims of history.

Four centuries of Turkish rule

hurt them at least as badly as a decade

39

of Naziism hurt the Jews.

Now, in their morning of

independence, the Arabs

have suffered defeats

at the hands of a small,

despised people” (Major

Problems, 319). As this

quote eloquently shows

us, the Palestinians and

other Arabs were also

victims of oppression

just as the Jews were. The

seizing of their lands was

kicking them back down

as they were getting back up. With

such blatant encroachment and arrogance,

further resentment from the

Middle East toward the US and the

West undoubtedly developed. One of

the final series of acts that solidified

this hatred is seen after we look into

the overthrowing of rulers in order

to create pro-American regimes that

would allow for further meddling.

Not only has the United States government

meddled by leeching resources

and usurping ancestral lands,

they made matters worse by overthrowing

governments in order to insert

pro-American regimes that would

be willing to resist the Soviet Union

during the Cold War. With the backing

of the US government, countries

such as Iran, Pakistan, Indonesia, and

Egypt underwent political coups that

overturned the ruling government.

All of this went relatively unknown to

neighboring nations until the Iranian

Revolution that overthrew the pro-


American Shah and subsequent takeover

of the embassy revealed it. This

is conveyed by Mahmood Mamdani

in his book, Good Muslim, Bad Muslim,

America, the Cold War, and the

Roots of Terror. He shows us that US

actions were revealed when he states,

“Secret American aid to opponents of

the pro-Soviet regime in Kabul had

begun before the Soviet army invaded

Afghanistan. CIA and State Department

documents seized during the

embassy takeover in Tehran reveal

the United States had begun quietly

meeting Afghan-rebel representatives

in Pakistan in April 1979, eight

months before Soviet military intervention”

(Mamdani, 123). Essentially,

the Iranian Revolution that ended in

the overthrowing of the pro-American

Shah concretely revealed with

evidence to the Arab nations, the fact

that the United States was meddling

in their affairs. Moreover, it shows us

that they provoked the conflict that

would occur in Afghanistan when

they met with rebel groups such as

the mujahedeen (a group that would

later create splinter groups such as

the Taliban and Al-Qaeda) in order to

overthrow the regime, and that this is

why the Soviets invaded. When added

to the other aforementioned factors,

it becomes more apparent as to why

this hatred eventually boiled over

into counter-aggression. However,

U.S. intelligence experts were certain

that retaliation would occur in some

form of economic or political

means. They couldn’t

even fathom the idea of an

outright attack on home soil

because they thought they

were dealing with other government

leaders. What they

didn’t realize was that the

very people they armed to

fight the Soviets were to be

the people that would attack

due to the fact that the mujahedeen,

a radical nationalist

group, saw both Soviet and

American interventionism

as incursions that would not

go unpunished.

The term for these unintended

consequences is

blowback as Chalmers John-

40

son explains in his book titled, The

Costs and Consequences of American

Empire. The book gives a detailed

account of how the term came to be

and how it is used to described consequences

that are known or unknown

based on the actions taken by the U.S.

government. It goes further to say

that this kind of information is largely

kept from the American people and

that this is the reason behind their ignorance

of why these people hate us.

The more significant part of this book

however, is the direct correlation that

it draws between the arming of the

rebels in Afghanistan to the 9/11 attacks.

Johnson brings up a classified

CIA document post-action report

and reveals its contents when he

states, “The attacks of September 11

descend in a direct line from events in

1979, the year in which the CIA, with

full presidential authority, began carrying

out its largest ever clandestine

operation—the secret arming of Afghan

freedom fighters (mujahedeen)

to wage a proxy war against the Soviet

Union…” (Johnson, 12). It would

seem that the arrogant and careless

actions in Afghanistan came back to

haunt the US. While there is no condoning

the terrorist attacks of 9/11,

these events were not unprovoked

as Americans were led to believe by

presidents such as George W. Bush.

In conclusion, the Middle East is

a place of chaos and hatred for the

West. However, after looking into the

not-so-well-known history of the US,


we have a better understanding as to

why they are this way. It is due to the

outright arrogance of an outdated

ideology that these people were put

through political and civil instability.

After learning what we have today a

clearer picture can be seen that is the

US is a police force that has done well

through humanitarian efforts such as

the Peace Corps, but has been an oppressive

force that imposed its will on

a people that would not be willing to

take it laying down.

Michael Conti is an undergraduate

student at California State University,

Fullerton, and is working on degrees in

history and political science. He plans

to be a historical analyst, specializing

in comparative politics.

Works Cited

Johnson, Chalmers. Blowback: The Costs and

Consequences of American Empire. New York:

Henry Holt, 2004. 12-13. Print.

Little, Douglas. “American Orientalism.” American

Orientalism : The United States and The

Middle East Since 1945. The University of North

Carolina Press, 2008. 53-54. Print.

Mamdani, Mahmood. Good Muslim, Bad Muslim:

America, the Cold War, and the Roots of

Terror. New York: Pantheon, 2004. 123-124.

Print.

Merrill, Dennis, and Thomas G. Paterson. Major

Problems in American Foreign Relations:

Documents and Essays. Boston, 2010. 319-320.

Print.

Westad, Odd Arne. The Global Cold War: Third

World Interventions and the Making of Our

Times. Cambridge: Cambridge University Press,

2007. 39-72. Print.

Sign-up for Free

GSN Digital Editions

and Email Newsletters

Free subscription to your selection of GSN digital editions

and daily/weekly email newsletters. Add new selections or

opt-out of any selections at any time.

GSN Monthly Digital Edition

GSN Airport, Seaport, Rail, Border Security Weekly

GSN Daily Insider Newsletter (5 Days Weekly)

GSN Cybersecurity Newsletter

GSN Media Kit

The News Leader in Physical, IT and Homeland Security

41

CLICK HERE

www.gsnmagazine.com


Cloudera and Docker, Inc. partner to vastly

improve the security of data

MCLEAN, VA — December 19,

2016 — Cloudera, the global provider

of the fastest, easiest, and most

secure data management, analytics

and machine learning platform built

on the latest open source technologies,

today announced that it has

partnered with Docker, Inc. to provide

Commercially Supported (CS)

Docker Engines with a jointly developed

solution to secure Docker

container volumes. This integrated

solution allows government agencies

to share data via cryptographically

secure containers as part of a

partnership where Cloudera provides

level one and level two technical

support backed by Docker, Inc.

Docker and Cloudera worked in

close collaboration to meet the specific

needs of government agencies.

Because these agencies often have

sensitive workloads where portability

and security are necessary, the

two companies worked together on

an integration that would protect

the code and data running in containerized

workloads. Docker and

Cloudera made sure that all data

and code are protected both in transit,

at rest, and at runtime.

The integrated solution is based

on Cloudera Navigator Encrypt

running on Docker, Inc’s CS Engine.

Cloudera Navigator Encrypt transparently

encrypts and secures data

at rest without requiring changes to

applications and ensuring there is

minimal performance lag in the encryption

or decryption process. Advanced

key management with Cloudera

Navigator Key Trustee Server

and process-based access controls

in Navigator Encrypt enable organizations

to meet compliance regulations

and help protect organizations

from unauthorized parties or

malicious actors gaining access to

encrypted data. Docker wraps software

in a complete filesystem aka

container that includes an application

and its dependencies which allows

applications to run anywhere.

In addition, Docker Content Trust

based on The Update Framework

(TUF) provides the most secure

content distribution model for verifying

the creator of a specific dockerized

application.

Cloudera Navigator Encrypt

Key Trustee Server and Client already

possess Federal Information

Processing Standard (FIPS) 140-2

compliance, the U.S. government

42

computer security standard used

to approve cryptographic modules.

The partnership with Docker, Inc.

enables the pursuit of an end-to-end

FIPS-validated product to include

the Docker platform itself, as well

as the encryption and key management

platform.

Docker provides an abstraction

layer for Cloudera’s Navigator Encrypt

and the Key Trustee Server,

allowing the exchange of dockerized

applications so they can be run,

but not seen, modified, or tampered

with. It has complete administrative

separation of duties where administrators,

platform owners and users,

whether trusted or untrusted,

cannot impact each other. Multiple

points of control, application

fingerprinting, and user roles and

network-based authentication are

included.

“Cloudera is committed to delivering

the highest levels of data security

for Docker workloads,” said

Charles Zedlewski, senior vice president,

Products at Cloudera. “We are

pleased to have the opportunity to

bring the industry leading security

controls that are already a core part

of Cloudera’s business to the realm


of dockerized applications

and supporting

the U.S. Government

with their most challenging

problems.”

“Docker is increasingly

becoming a

critical platform for

Federal agencies as

they modernize their

applications, while

making them even

more secure through

Docker’s isolation capabilities

and content

security framework,”

said Nathan McCauley,

Director of Security for Docker.

“This partnership with Cloudera

further elevates the security posture

of Dockerized applications by protecting

against data leaks through

secure encrypted data volumes.”

The joint solution is both operating

system and cloud agnostic. This

early access product is currently

available to U.S. government agencies.

About Cloudera

Cloudera delivers the modern data

management, analytics and machine

learning platform built on

the latest open source technologies.

Many of the world’s leading organizations

trust Cloudera to help solve

their most challenging business

problems with Cloudera Enterprise,

the fastest, easiest and most secure

data platform available for the modern

world. Our customers efficiently

capture, store, process and analyze

vast amounts of data, empowering

them to use advanced analytics and

machine learning to drive business

decisions quickly, flexibly and at

lower cost than has been possible

before. To ensure our customers are

successful, we offer comprehensive

support, training and professional

services. Learn more at cloudera.

com.

Connect with Cloudera

About Cloudera: cloudera.com/

content/cloudera/en/about/company-profile.html

Read our blogs: blog.cloudera.com/

and vision.cloudera.com/

43

Follow us on Twitter: twitter.com/

cloudera

Visit us on Facebook: facebook.

com/cloudera

Join the Cloudera Community:

community.cloudera.com

Cloudera, Hue, and associated marks

are trademarks or registered trademarks

of Cloudera Inc. All other company and

product names may be trademarks of

their respective owners.


LGBT military community calls on General Mattis to

make clear his support for ALL service members &

their families during confirmation hearing

WASHINGTON, January 11, 2017

– Today, the nation’s leading organizations

for lesbian, gay, bisexual,

and transgender (LGBT) service

members and their families – the

American Military Partner Association

(AMPA) and OutServe-SLDN

– issued the following joint statement

ahead of the U.S. Senate confirmation

hearing of retired USMC

General James Mattis, who

was nominated by Presidentelect

Donald Trump to serve

as Secretary of Defense. The

confirmation hearing for

General Mattis is scheduled for

Thursday morning.

“Over the last eight years, the United

States has made profound progress

for LGBT service members and

their families under the leadership of

President Obama. No longer forced

to hide something as fundamental as

who we are, LGBT service members

can serve openly and honestly. LGBT

service members and their families

take great pride in our service to the

nation and are finally able to express

that pride publicly. Our organizations

stand ready to protect and build upon

this vitally important progress.”

“We respect General Mattis’ service

and dedication to our country.

Because questions have been raised

regarding Mattis’ commitment to

the diversity of our fighting force, we

feel, as the leading advocates for our

modern military families, a responsibility

to call for clarity. During the

confirmation process, we urge General

Mattis to make clear his full and

unequivocal support for all of our

nation’s heroes and their families,

including those who are

LGBT. It is absolutely crucial

that the next Secretary

of Defense is committed to

ensuring all service members

and their families -- no matter their

sexual orientation or gender identity

-- have the support they need

and deserve. These military families

sacrifice each and every day for our

nation, and it is imperative that they

know the senior civilian leadership

has their back.”

The American Military Partner Association

(AMPA) is the nation’s largest

organization of LGBT military spouses,

their families, and allies. With more

than 50,000 members and supporters,

AMPA is committed to education, advocacy,

and support for our “modern

44

military families.” For more information,

visit www.MilitaryPartners.org

OutServe-SLDN (OS-SLDN) is the

largest non-profit, legal services, advocacy

and policy organization dedicated

to bringing about full LGBT equality

to America’s military and ending all

forms of discrimination and harassment

of military personnel on the basis

of sexual orientation and gender identity.

With more than fifty chapters and

70,000 subscribers around the world,

OS-SLDN supports a professional network

of LGBT military personnel and

strives to create an environment of

respect in the military with regard to

sexual orientation and gender identity.

OS-SLDN provides free and direct legal

assistance to service members and

veterans affected by the repealed “Don’t

Ask, Don’t Tell” law and the prior regulatory

ban on open service, as well as

those currently serving who may experience

harassment or discrimination.

For more information, visit www.outserve-sldn.org.


General Mattis says no to roll back open LGBT military

service as Secretary of Defense

WASHINGTON – Today, the nation’s

leading organizations for lesbian, gay,

bisexual, and transgender (LGBT)

service members and their families –

the American Military Partner Association

(AMPA) and OutServe-SLDN

– issued the following joint statement

following comments made by President-elect

Donald Trump’s nominee

for Secretary of Defense, retired General

James Mattis, during confirmation

hearings this morning. General

Mattis indicated he will not work to

reverse the current policies that allow

any qualified person to serve, including

LGBT people.

“We are heartened by General Mattis’

stated commitment during his testimony

not to reverse the profound

progress we have made in ensuring

LGBT service members and their

families are able to serve our nation

with pride,” said AMPA President

Ashley Broadway-Mack and Out-

Serve-SLDN Executive Director Matt

Thorn. “Because questions had been

raised about his commitment on this

front, uncertainty in the future had

given our military families great cause

for concern. His comments today give

us hope for a working relationship between

our organizations and the new

Defense Department leadership. If

confirmed, we look forward to working

with General Mattis in supporting

our nation’s brave heroes and their

families. We are committed to holding

the incoming administration accountable

and ensuring all who serve,

regardless of their sexual orientation

or gender identity, have the support

and respect they need and deserve.”

During his prepared testimony,

General Mattis said, “We open the

door to all patriots who are eligible

and meet the standards, provide them

with the training, equipment, and

leadership that’s central to their success,

and ensure all service members

are treated with dignity and respect.”

When asked by Senator Kirsten

Gillibrand (D-NY) about his support

for LGBT service members currently

serving our nation, General Mattis

said, “Senator, my belief is that we

have to stay focused on a military

that’s so lethal that on the battlefield

it will be the enemies’ longest day

45

and their worst day when they run

into that force. I believe that military

service is a touchstone for patriots of

whatever stripe. It’s simply the way

that they demonstrate their commitment.

And I believe right now that

the policies that are in effect, unless

a service chief brings something

to me where there’s a problem that’s

been proven, then I’m not going in

with the idea that I’m going to review

these and right away start rolling

something back.” He went on to say,

“Frankly, I’ve never cared much about

two consenting adults and who they

go to bed with.”

Later, Senator Mazie Hirono (D-

HI) asked him directly, “Is there

something innate in being a woman

or LGBT that would cause you to believe

that they could not be part of a

lethal force?” General Mattis replied

with a simple, “no.”

Yesterday in a joint statement,

AMPA and OutServe-SLDN called

on General Mattis to make clear his

full and unequivocal support for all of

our nation’s heroes and their families,

including those who are LGBT.

The American Military Partner Association

(AMPA) is the nation’s largest

organization of LGBT military spous-

More on page 55


DHS Science and Technology Directive Explosive

Division (EXD) releases new incident management

planning tool for first responders

A suspicious package is found in a

public park. An unattended bag is

found by a trash can at the metro

or a street corner. A person with a

weapon is reported at a school or

mall or other public location. Unfortunately,

these are not uncommon

occurrences, and

responder agencies –

from small towns to big

cities – must all know

how to respond and

work together. That requires

training, technology,

tools, and time. The

Department of Homeland

Security Science

and Technology Directorate

(S&T) Explosives

Division (EXD) has a

solution.

EXD has funded research

at the Oak Ridge National

Laboratory to continue development

of the Incident Management

Preparedness and Coordination

Toolkit (IMPACT), a geospatial

tool designed to enhance situational

awareness, communication, and

collaboration during and for security

events. This tool was originally

funded by the DHS Office of

Bombing Prevention to help bomb

squads assess impacts from improvised

explosive devices (IEDs).

Since its original release, IMPACT

has expanded its capabilities to provide

tools to assist in active shooter

planning, downwind hazards from

A built-in wizard calculates active shooter line-of-sight overlays.

the release of dangerous chemicals,

large stadium evacuation and casualty

simulations, security surveys,

and monitoring large event social

networks for emergency response

support.

“IMPACT is a free, all-hazards

planning tool for first responders,

emergency managers, and other

security professionals. It combines

46

simulation, visualization, and mapping

into an integrated user interface

similar to a smart phone or tablet,”

explained S&T Program Manager

Elizabeth Obregon. “First responders

can use it for planning, situation

awareness, and response to natural

and man-made disasters. It

uses common data formats

to easily exchange data with

other map-based tools.”

IMPACT is currently being

used and evaluated by

more than 400 agencies at

the federal, state, and local

levels including the Transportation

Security Administration,

the Federal

Emergency Management

Agency, the Centers for

Disease Control and Prevention,

and police departments

at the state and local levels.

The only Geographic Information

System tool specifically tailored

for counter-improvised explosive

devices, homemade explosives, active

shooter responses, and first

responder use, IMPACT allows responders

to conduct both live and

table top exercises for simulated

More on page 55


GTT solutions awarded supplier status for Crown

Commercial Service TMT2 framework agreement

ST. PAUL, MN – 15 December

2016 – Global Traffic Technologies

is pleased to announced that it has

been awarded supplier status for its

traffic preemption solutions on the

UK Government’s Crown Commercial

Service Traffic Management

2 (TMT2) framework agreement.

TMT2 provides public sector customers

with access to industry leading,

innovative traffic management

solutions.

The framework aims to deliver

local, regional and national traffic

management technologies through

a qualified supply chain, ensuring

reliability and resilience. TMT2 allows

direct and standardised procurement

of small components

through to large, complex systems.

It was developed to create

a competitive and

fast route to market for

the provision of traffic

management solutions,

by streamlining procurement

processes and increasing

the number and

selection of suppliers.

Richard Eltze, GTT Vice President

EMEA Markets, said being

awarded the framework supplier

Richard Eltze

status was good news for all existing

and potential public sector GTT

customers. “The fact that the UK

Government’s Crown

Commercial Service has

awarded us a place on

the TMT2 agreement is

evidence of how valuable

the Government

considers GTT’s solutions

to be,” he said. “This is very

encouraging for GTT and shows

clearly our customer focus and

commitment to providing innovative

and effective traffic preemption

solutions. Such solutions often have

many stakeholders, even if it is one

agency that is responsible for the

procurement of the technology, and

for GTT it is vital that the needs of

all stakeholders are taken

into account.

“The benefit of having

an Emergency Vehicle

Preemption system in

place in case of a major

emergency cannot be emphasised

enough, especially

when it comes to

very congested areas in large cities

and on motorways. Our experience

with cities such as New York, San

47

Francisco, Las Vegas, and Calgary

in Canada, as well as Doha in Qatar

and several Eastern European

implementations, gives

testament and proof of

concept to our EVP solutions.”

Global Traffic Technologies’

Opticom systems

work with traffic

signals to provide emergency and

public transportation vehicles with

priority green lights at intersections.

These can help get an ambulance,

fire engine or police car to the scene

of an incident quickly and safely, or

reduce delays and increase efficiencies

in bus services.

TMT2 is divided into 15 service

options, also known as ‘lots’,

of which GTT applied for and has

been awarded supplier status in five.

These are: Lot 1: Traffic Signal Junctions,

Controlled Pedestrian Crossings

and Ramp Metering; Lot 2:

Traffic Monitoring and Traffic Enforcement

Cameras; Lot 7: Urban

Traffic Management Control and

Common Database Systems; Lot 14:

Intelligent Transport Systems (ITS)

and Lot 15: Catalogue.

More on page 56


Upgrades to allow for more frequent, reliable and faster

rail service along the Northeast Corridor recommended

Anthony Foxx

WASHINGTON – After four years

of working with the Northeast

states, federal and state partner

agencies and dozens and dozens of

public meetings, the Federal Railroad

Administration (FRA) today

recommended a vision to build a

better and stronger Northeast Corridor

(NEC) over the next 30 years.

“The Department of Transportation

believes that investing in this

vision for the Northeast Corridor

must happen—because rail does

more than take us places; it provides

us with opportunities

and connects us to the

future,” said U.S. Transportation

Secretary Anthony

Foxx. “While building this

recommendation would

require significant investment,

the cost of doing

nothing is much greater.

The communities and the economies

of the Northeast cannot grow

and flourish without significant,

new investment.”

In 2012, at the urging of Congress,

all Northeast states and the Federal

Railroad Administration began

working together to develop a vision

that would help guide and coordinate

planning and investments. For

more than four years, and including

numerous agency and public meetings,

the Northeast states and FRA

have engaged stakeholders about

their ideas, hopes, recommendations

and concerns about the future

of the NEC. The extensive outreach

has included broad stakeholder engagement

from individuals, elected

leaders, civic organizations in small

townships and business leaders.

What quickly became clear, and

was universally agreed, is that the

corridor’s current capacity

is vastly inadequate. Today’s

NEC simply cannot

meet the demands of today—or

tomorrow.

48

The recommendation announced

today by the FRA

would increase reliability

and provide more options by:

• Adding new tracks to increase the

Northeast Corridor to four tracks in

most locations, which would allow

for more frequent and faster service.

Additional tracks would be added

to areas with greater demand.

• Providing intercity access to

Philadelphia Airport so that passengers

do not have to change trains

at 30th Street.

• Adding direct and frequent service

to Hartford, Conn., and Springfield,

Mass.

• Increasing, and in some cases

doubling, the number of regional

trains and providing up to five times

more intercity trains.

The recommendation would improve

travel times:

• Travel from Boston to New York

City would be 45 minutes faster (total

time of 2 hours, 45 minutes).

• Travel from New York City to

Washington, D.C., would be 35

minutes faster (total time of 2 hours,

10 minutes).

While the recommendation made

today would grow the role of rail

along the Northeast Corridor, it

prioritizes bringing the current corridor

back to good condition, or a

state of good repair, first.

With the corridor returned to

good condition, the recommendation

includes projects that will allow

for even faster and more reliable

service, along with more options for

commuters and travelers. The recommendation

is also projected to


USCIC updates how processing

times are posted

Continued from page 12

create 47,000 jobs each year, for 30

years.

The recommendation FRA released

today is just that – a recommendation

for what FRA believes

the Northeast Corridor could be

in the future. In fact, it will now be

up to states, cities and railroads to

take next steps and decide whether

to move forward with any specific

projects. Each individual project,

just like any other infrastructure

project in this country, will require

more review and more environmental

studies, as well as significant

funding.

“In order to keep moving forward,

we need a new vision for the Northeast

Corridor – a corridor that can

move an ever-increasing population

safer, faster and more reliably

than before,” said FRA Administrator

Sarah E. Feinberg. “We need

Click to view the video “NEC Future”

a corridor that provides more options

and more trains for commuters.

One that allows for seamless

travel between the nation’s capital

and New York, and New York and

Providence and Boston. A corridor

that provides streamlined connections

between a city’s airports and

its city center. And a corridor that

can efficiently and reliably serve a

population that is growing quickly.”

FRA believes that today’s recommendation

is a strong one and

should move forward. To do that,

it will require the business community,

railroads, states, Congress

and the millions of people who use

the NEC every day to make it clear

that this is a necessary and worthy

investment.

For more information, visit www.

necfuture.com

49

cember 29, 2016 based on data as of

October 31, 2016.

The Administrative Appeals Office

(AAO) of USCIS also announced that

it had modified how it presents its

processing time information on appeals

cases. In the past, AAO provided

information on the average completion

time for the month’s cases. Now,

AAO will provide the total number

of completions for the quarter and

the percentage completed within its

180 day goal, by form type and case

type. The 180 day goal begins after

the office that issued the unfavorable

decision forwards the case to AAO,

which is supposed to be done within

45 days. However, this initial field review

can take longer. This means the

AAO’s figures don’t reflect the total

time for completion of a case.

Processing times are important

pieces of information since employers,

individuals, family members, and

their attorneys need to know how

long an application or petition will

take to be adjudicated. Delays can

have serious implications for many

people. Now that USCIS has raised

its fees significantly, hopefully more

progress will be made towards resolving

delays and making their processes

more transparent.


The Chemistry behind the Flint Water Crisis:

Corrosion of Pipes, Erosion of Trust

By George Lane

When Flint, Michigan changed its

water supply in 2014, it initiated a

cascade of chemical reactions inside

decades-old water pipes that caused

Lead to leach into its drinking water,

triggering a major public health crisis.

When Flint used its own river as

a water supply, drinking water contained

a staggering 13,200 parts per

billion (ppb) Lead, almost 900 times

higher than the 15 ppb regulatory

limit set by the Environmental Protection

Agency (EPA). Some water

samples exceeded the EPA criteria

for Lead concentration in hazardous

waste, 5,000 ppb (1) .

Although Lead pipes have been

used for water distribution for over

two thousand years beginning with

the Romans, the use of Lead pipes carrying

water in the United States on a

major scale began in the late

1800s, particularly in larger

urban cities. By 1900, more

than 70% of cities with populations

greater than 30,000

used Lead-lined pipes for

drinking water (2) .

The use of Lead pipes to

carry drinking water was

recognized as a cause of

Lead poisoning by the late

1800s in the United States.

50

George Lane

In 1890 the Massachusetts

State Board of Health advised

the state’s cities and

towns to avoid using Lead

pipes to transport drinking

water. By the 1920s, many

cities and towns were prohibiting

or restricting their

use. To combat this trend,

the Lead industry carried out an effective

campaign to promote the use

of Lead pipes, affecting public health

and delaying the replacement of Lead

water pipes (3) .

Normally water managers add

chemicals to water, such as orthophosphates,

to prevent corrosion.

Orthophosphates bond with Lead in

pipes, creating a protective coating

between Lead and water. When that

shield is intact, corrosive chemicals

like Dissolved Oxygen (DO) can’t

interact with the Lead; however, orthophosphates

have to be

added continually or the

barrier breaks down. If the

barrier does break down,

DO combines with Lead

atoms, oxidizing them.

Oxygen takes electrons

from Lead, grabs its Hydrogen

protons, turning

into water, and allows Lead to leach

into drinking water. Once oxidized,

Lead dissolves into the water instead

of sticking to the pipe.

Flint’s water treatment plant did not

add orthophosphates, allowing the

pipes to corrode, and Lead quickly

contaminated the drinking water.

Additionally, Flint River water had

high levels of chlorides, which accelerate

corrosion. There were two other

sources of chloride: Ferric chloride

used in Chlorine disinfection of water

and road salt applied during tough

Michigan winters. Switching

from Detroit’s Lake

Huron to Flint River water

created a perfect storm for

Lead leaching into Flint

drinking water.

A complex brew of acids,

salts, Chlorine and many

other chemicals were involved

in oxidizing Flint’s

metal pipes and releasing

Lead. High levels of Lead in


Flint drinking water weren’t reported

to the public for 18 months; however,

the corrosion happened quickly,

especially in the warmer summer

months. Without effective treatment

to control corrosion, Flint’s water

leached high levels of Lead from the

city’s pipes into city drinking water.

Following the switch, E. coli bacteria

was also found in the water.

To combat E. coli, extra Chlorine

was added as a disinfectant to remove

it. Ferric chloride was also added as

a coagulant to remove organic matter

from the water, initiating a domino

effect of chemical causes and effects.

Flint’s water quality problems were

also caused by corrosion in both the

Lead and Iron pipes that distribute

water. When city residents began using

the Flint River as its water source,

the water’s ability to corrode those

pipes wasn’t adequately controlled.

This led to high Lead levels, rustcolored

tap water, and the growth of

pathogenic microbes.

When Flint changed its water supply,

the city didn’t adequately control

corrosion. Flint isn’t the only city susceptible

to these problems. The pipes

in its old distribution system had seen

the same water for decades, similar to

many other cities. Switching water

supplies changed the chemistry of the

water flowing through those pipes.

When a switch like this happens,

the chemistry in the water system

moves toward a new equilibrium. In

Flint the change was catastrophic.

Flint was getting its water from the

Detroit Water & Sewerage Department,

which would draw water from

Lake Huron and then treat it before

sending it to Flint.

To lower the city’s water costs, in

2013 Flint officials decided to take

water from another source which was

building its own pipeline from the

lake. Shortly after that, Detroit told

Flint it would terminate their original

long-term water agreement within a

year and offered to negotiate a new,

short-term agreement. Flint declined

the offer. While waiting for the new

51

Pipeline under construction will supply Flint, Michigan with water from Lake Huron.

pipeline to be finished, Flint began

taking water from the Flint River and

treating it at the city plant.

Problems with the city’s tap water

started the summer after the switch

in 2014. First, residents noticed foultasting,

reddish water coming out of

their taps. In August, the city issued

alerts about E-coli contamination and

told people to boil the water before

using it. A General Motors plant in

Flint stopped using the water because

it was corroding steel parts.

In early 2015 Lead reached Flint’s

University of Michigan campus. Researchers

sampled water from 252

Flint homes and reported the results

(www.flintwaterstudy.org). Hurley

Children’s Hospital in Flint released

data showing that since the water

change, the number of Flint children

with elevated levels of lead in their

blood had increased from 2.4% to

4.9% (4) .

Lead is neurotoxic, causing behavioral

problems and decreased intelligence.

The Blood Brain Barrier limits

the passage of ions, but because it has

not formed in children, they can absorb

from 40% to 50% of water-soluble

Lead compared with 3% to 10%

for adults (5) .

So why did the switch to Flint’s river

water cause this catastrophe? As water

travels through the miles of pipes in a

city’s distribution system, molecules

of contaminants in the water react

with the pipes themselves, acting as a

geochemical reactor. There are miles

and miles of pipes, some Iron, some


Copper, some Lead, that got corroded.

Corrosion occurs when oxidants,

such as DO or Chlorine, react with

elemental metals in the pipes.

Cities no longer install lead pipes.

But older cities such as Flint still rely

on them, usually as water mains in

the street to a home’s water meter. Because

of Lead pipes, some states regulate

the corrosivity of water to deposit

a protective coating on the pipes.

A 1990 report from the American

Water Works Association estimated

there are over 3 million Lead-lined

pipes transporting drinking water in

the Northeastern U.S. alone (6) . According

to EPA, nationwide over 10

million American homes and buildings

receive water from Lead-lined

pipes (7) .

52

So why is Lead

used in water

pipes? The answer

can be found literally

thousands of

years ago in the

first “plumbing”

systems, named for

the word “Lead” in

Latin, “plumbum”.

Tap water in ancient

Rome had 100

times more Lead

than local spring

waters. Lead piping

was used because

of its unique ability

to resist pinhole

leaks while still

malleable enough

to be formed into shapes that deliver

water. Lead was used in many other

common products, such as Tetra Ethyl

Lead in gasoline and Lead-based

paint, until scientific advancements

in the 20th century demonstrated

its toxicity. With passage of the Safe

Drinking Water Act Amendments of

1986, installation of Lead water pipes

was finally prohibited nationwide (8) .

Today utilities treat their water to

maintain a mineral crust on the inside

surfaces of their pipes. This socalled

“passivation layer” protects the

pipes’ metal from oxidants in the water.

The coatings consist of insoluble

oxidized metal compounds produced

as the pipe slowly corrodes.

If the water chemistry isn’t optimized,

the passivation layer may dissolve

and allow mineral particles to

flake off of the pipe’s crust. This exposes

bare metal, allowing the Iron,

Lead, or Copper to oxidize and leach

into the water. Flint water chemistry

was not optimized to control corrosion.

Most importantly, the treated

Flint River water lacked one chemical

that the treated Detroit water had:

Phosphate. Cities such as Detroit add

orthophosphates to their water as

part of their corrosion control plans

because of the formation of Lead

phosphates, which are largely insoluble

and add to the passivation layer.

The entire Flint water crisis could

have been avoided if the city had added

orthophosphates, commercially

available chemicals, used in Detroit.

After just five weeks in the Flint water,

the pipes leached 16 times as much

Lead as those in the Detroit water,

demonstrating just how corrosive the

treated Flint water was. But orthophosphates

aren’t the only corrosion

solution. Some water utilities treat

water so it has a high pH, a high alkalinity.

These conditions decrease the

solubility of Lead carbonates, which

also contribute to the pipe’s protective

mineral layer.

The pH drop over time indicates

that plant operators in Flint didn’t

have a target pH as part of a corrosion

plan. Water utilities usually find a pH

that’s optimal for preventing corrosion

in their system. For example, in

Boston, another city with old Lead

pipes, average water pH held steady

around 9.6 in 2015, according to re-


ports from the Massachusetts Water

Resources Authority.

Problems with Flint’s pipes started

quickly. The rust color and bad taste

of the water coming out of residents’

taps in the summer of 2014 was a sign

that the passivation layer on was dissolving

into the water. Iron corrosion

also encourages the growth of pathogens

in the distribution system. As the

mineral layer in iron pipes falls off,

it exposes bare iron that can reduce

free Chlorine added to the water as

a pathogen-killing disinfectant. One

home with Lead levels almost 900

times higher than the EPA limit had

no detectable Chlorine levels over 18

days of monitoring.

Although Flint has switched back

to the Detroit water, it may take years

for pipes to regain their passivation

layers for corrosion to slow to normal

levels, and for Lead concentrations to

drop back into an acceptable range.

However Joel Beauvais, Deputy Assistant

Administrator of EPA’s Office

of Water, emphasizes “EPA’s position

is there is no safe level of lead exposure.”

While the drinking water crisis

has focused on Flint, almost 2,000 additional

water systems in all 50 states

have shown excessive levels of Lead

contamination over the past four

years.

The lesson from Flint is to continually

monitor water chemistry, especially

when switching water supplies.

Water utility officials were already

collecting all the data they needed,

pH, alkalinity, chloride levels, to determine

if the water was too corrosive.

The message is to consider the connections

between the stability of the

water infrastructure and the chemistry

of the water flowing through that

infrastructure. That will inevitably

control the water quality at the tap.

By not adding a corrosion inhibitor,

Flint expected to save about $140

per day. But the human costs of the

errors made in Flint will reverberate

through the community forever and

their magnitude will dwarf the original

planned savings. According to

Flint Mayor Karen Weaver, replacement

of Flint’s Lead water lines is now

estimated to cost up to $1.5 billion.

On December 20, 2016, Michigan’s

Attorney General announced felony

charges against two former Flint

emergency managers and two other

former city officials linked to the city’s

disastrous decision to switch water

sources, which resulted in widespread

and dangerous Lead contamination

of Flint drinking water. These latest

charges bring the total number of

people charged to thirteen.

On December 30, the Louisiana

Department of Health and Human

Resources (DHHR) reported unsafe

levels of Lead in the drinking water in

over 20% of the homes and businesses

of St. Joseph, a rural city in North

Louisiana. Dr. Jimmy Guidry, Louisiana

DHHR Director, warned citizens

saying “The message to the folks who

live there is not to drink the water” (9) .

53

References

1. Miguel A. Del Toral, “High Lead Levels in

Flint, Michigan - Interim Report”, USEPA Regulations

Manager, Ground Water and Drinking

Water; Branch; www.documentcloud.org/

documents/2696671-2015-06-24-Miguel-Del-

Toral-Memo.html

2. W. Troesken, “The Great Lead Water Pipe

Disaster”, Cambridge, MA: MIT Press; 2006

3. Richard Rabin, “The Lead Industry and

Lead Water Pipes”, Am J Public Health, 2008

September; 98(9): 1584–1592; www.ncbi.nlm.

nih.gov/pmc/articles/PMC2509614/

4. Siddhartha Roy, “Pediatric Lead Exposure

Presentation from Hurley Medical Center doctors

concerning Flint Michigan”, September 24, 2015;

http://flintwaterstudy.org/2015/09/pediatriclead-exposure-presentation-from-hurley-medical-center-doctors-concerning-flint-mi/

5. Mona Hanna-Attisha, MD, “Elevated Blood

Lead Levels in Children Associated with the Flint

Drinking Water Crisis: A Spatial Analysis of

Risk and Public Health Response”, Am J Public

Health, February 2016; 106(2): 283–290; http://

ajph.aphapublications.org/doi/abs/10.2105/

AJPH.2015.303003

6. “Selecting Lead Pipe Rehabilitation and Replacement

Technologies”, American Water Works

Association, July 2001, pgs. 74-87; www.Waternet.0054574.pdf

7. “Flint Water Crisis Shines Light on Lead

Pipes Across U.S.”, Wall Street Journal, January

28, 2016; www.wsj.com/articles/flint-watercrisis-shines-light-on-lead-pipes-crisscrossingthe-u-s-1453977180

8. “Prohibition on Use of Lead Pipes to Carry

Drinking Water”, Safe Drinking Water Act 1986:

Section 1417

9. Mark Ballard, “Lead found in Saint Joseph

drinking water in 20-plus percent of homes,

businesses”, Baton Rouge Advocate, December

31, 2016; www.theadvocate.com/baton_rouge/

news/politics/article_40b6dfea-ce2d-11e6-

a1f1-a73640428e2e.html


HID Global predicts top trends

for 2017

Continued from page 21

today’s talent pool is driving the need

for more open, flexible workspaces.

Consumers also will begin seeing

trusted identities used in many everyday

scenarios, such as guaranteeing

authorized use of corporate and

heavy machinery fleets, as well as creating

new ways to safeguard students

and validate drivers.

These trends will drive new user experiences

that are tailored to vertical

market requirements. Following are

three particularly compelling examples:

Banking: A digital identity transformation

will drive consistency across

multiple service channels to improve

the user experience, from faster instant

issuance that is revolutionizing

the way customers receive new or

replacement debit and credit cards,

to “out-of-band” mobile push capabilities

that increase trust and reduce

fraud for consumers, and deliver a

much easier path to compliance for

financial institutions. Digital IDs will

also push the industry to increase

trust levels by better associating a

user’s true identity (biometrics) with

their digital identities.

Government: Trusted identities will

change the way citizens interact with

government agencies and systems.

Passports, national IDs, driver licenses

and other credentials will co-exist

with new disruptive technologies to

change the way IDs are issued by government

agencies and used by citizens.

Citizen IDs are poised to move

to mobile phones this year, where

state and national governments will

begin offering mobile driver’s licenses

and other mobile identity IDs as an

option alongside the physical document.

Meanwhile, the combination of

mobile with innovative physical and

logical features will provide more options

for government agencies to stay

ahead of the counterfeiters by advancing

the security, personalization,

management and issuance of physical

documents.

Healthcare: In the increasingly connected

healthcare environment, institutions

will seek to implement better

systems to improve the patient experience

and enhance efficiencies, while

safeguarding and managing access

to equipment, facilities, patient data

and electronic prescriptions of controlled

substances (EPCS) across the

healthcare continuum. From hospital

to home, healthcare organizations

will seek to employ a combination of

strong authentication, and new IoT

applications to address these challenges.

HID Global anticipates the shift in

the use of identity technology will

drive industry trends in 2017, along

with new solutions and capabilities

that enhance the user experience for

years to come.

54

Connect with HID Global

Visit our Industry Blog, and follow us

on Facebook and Twitter.

About HID Global

HID Global is the trusted source for

innovative products, services, solutions,

and know-how related to the

creation, management, and use of

secure identities for millions of endusers

around the world. The company’s

served markets include physical

and logical access control, including

strong authentication and credential

management; card printing and personalization;

visitor management systems;

highly secure government and

citizen ID; and identification RFID

technologies used in animal ID and

industry and logistics applications.

The company’s primary brands include

ActivID®, EasyLobby®, FAR-

GO®, IdenTrust®, LaserCard®, Lumidigm®,

Quantum Secure, and HID®.

Headquartered in Austin, Texas, HID

Global has over 2,700 employees

worldwide and operates international

offices that support more than 100

countries. HID Global® is an ASSA

ABLOY Group brand. For more information,

visit http://www.hidglobal.

com.

® HID and the HID logo are trademarks or registered trademarks

of HID Global or its licensors in the U.S. and/or other

countries. All other trademarks, service marks, and product

or service names are trademarks or registered trademarks of

their respective owners.


General Mattis says no to roll back

open LGBT Military Service

Continued from page 45

es, their families, and allies. With more

than 50,000 members and supporters,

AMPA is committed to education, advocacy,

and support for our “modern

military families.” For more information,

visit www.MilitaryPartners.org

OutServe-SLDN (OS-SLDN) is the

largest non-profit, legal services, advocacy

and policy organization dedicated

to bringing about full LGBT equality

to America’s military and ending all

forms of discrimination and harassment

of military personnel on the basis

of sexual orientation and gender identity.

With more than fifty chapters and

70,000 subscribers around the world,

OS-SLDN supports a professional network

of LGBT military personnel and

strives to create an environment of

respect in the military with regard to

sexual orientation and gender identity.

OS-SLDN provides free and direct

legal assistance to service members

and veterans affected by the repealed

“Don’t Ask, Don’t Tell” law and the

prior regulatory ban on open service,

as well as those currently serving who

may experience harassment or discrimination.

For more information,

visit www.outserve-sldn.org.

DHS Science and Technology

Directive Explosive Division

releases new incident management

planning tool

Continued from page 46

active shooter and IED attacks, Obregon

explained.

Repeatedly tested in the field by

numerous law enforcement and

first responder organizations, IM-

PACT has been successfully used to

mitigate real world incidents. It was

briefed to the United States Capitol

Police immediately after a March

2016 incident in which live shots

were fired at the Capitol Visitors

Center. Since that briefing, USCP

has become a growing end user of

the tool and plans to use it for a

number of upcoming gatherings in

2017. In addition, table top exercises

generated by IMPACT were

credited with mitigating an active

shooter event at a school in Louisville,

Kentucky, in September 2014.

The tool is Section 508 compliant,

enabling it to be used across the federal

government and by its mission

partners.

S&T was interested in developing

this tool as it gives first responders

a free, easy to use capability to

conduct better organized and more

efficient exercises, provide for facility

protection, and plan for major

public and security events, Obregon

said. IMPACT can be considered a

success as many organizations that

55

have been briefed on the tool, including

the Secret Service, Capitol

Police, Washington Metropolitan

Area Transit Authority, the Transportation

Security Administration,

and others, have expressed interest

in adopting the tool and are currently

in the process of doing so.

In addition, IMPACT has provided

hundreds of agencies at the federal,

state and local level with an exercise,

protection and planning capability

that they did not have before but urgently

needed.

Responder agencies interested

in accessing and using the tool can

download it at http://geo.ornl.gov/

impact and start using it immediately.

FREE SUBSCRIPTION

SIGN-UP

Monthly Digital Edition

Airport/Seaport Newsletter

Daily Insider Newsletter

Cybersecurity Newsletter

CLICK HERE


GTT solutions awarded supplier

status for Crown Commercial Service

TMT2 framework agreement

Continued from page 47

More information on TMT2 can be

found at http://ccs-agreements.cabinetoffice.gov.uk/contracts/rm1089.

About Global Traffic

Technologies, LLC

GTT, formed in 2007 from 3M’s

pioneering Intelligent Transportation

Systems business, is the manufacturer

of Opticom priority control

systems and Canoga traffic-sensing

systems. These systems have provided

safe and reliable traffic solutions

to communities for over 45 years.

GTT proactively delivers advanced

transportation

solutions to help

emergency, transit

and traffic personnel

increase

safety, minimize

traffic congestion and reduce

greenhouse gas emissions, while

maximizing resource efficiency and

performance. Headquartered in St.

Paul, Minnesota, GTT is the market

leader in traffic management

systems, having an installed base of

over 70,000 intersections and 70,000

vehicles in over 3,100 municipalities

worldwide, including 41 of the 50

largest U.S. cities.

To find out more about GTT, visit

their website (www.gtt.com).

About the

Crown Commercial Service

The Crown Commercial Service

(CCS) has brought together Government’s

central commercial

capability into a single organisation,

amalgamating Government

Procurement Service with other

commercial teams from the Cabinet

Office and central government

departments. CCS is an executive

agency of the Cabinet Office and

operates as a trading fund under

the Government Trading Funds Act

1973. Their remit is to work with

both departments and organisations

across the whole of the public

sector to ensure maximum value is

extracted from every commercial

relationship and improve the quality

of service delivery. The CCS goal is

to become the “go-to” place for expert

commercial and procurement

services. With both service delivery

and advisory capability, services include

contract

management

and supplier

performance

management

to ensure

that the Government acts as a true,

single customer; freeing up individual

organisations to focus their

procurement expertise on what is

unique to them.

56

Will Congress fund President

Trump’s executive order on border

enforcement?

Continued from page 37

This change would eviscerate due

process for huge numbers of undocumented

individuals already in

the U.S., even those with deep roots

in our families and communities.

Expedited removal allows DHS enforcement

officers to deport individuals

without ever seeing an immigration

judge – often in as little

as 24 hours – with no guarantee of

legal counsel and little chance to obtain

an attorney while detained.

The order also directs the Attorney

General to prioritize the prosecution

of unlawful border crossers

in group hearings with little-to-no

due process. These prosecutions, often

referred to as Operation Streamline,

were intended to deter illegal

entry and reentry. Instead, they have

clogged the federal courts by taking

up 52 percent of the federal docket

and wasted precious government

resources with little evidence that

the program is achieving its goals.

This executive order is an attempt

by Trump to keep his campaign

promise of building a wall along the

Southern border and getting tough

on unauthorized immigration.

However, these proclamations will

soon run into the reality of needing

funding from Congress.


GSN: What are your general thoughts on the

2015 awards?

8

GSN: You spent many years on Capitol Hill and

also at the Department of Homeland Security.

As we head into 2016, what do you envision as

homeland security spending priorities? Awards Category:

––––––––––––––––––––––––––––––––––––––––

GSN 2015

GSN:

DIGITAL

What area/issue

YEARBOOK

pending

OF AIRPORT/SEAPORT/BORDER

trends do you

SECURITY AWARDS RECIPIENTS

see as priorities for the homeland security

community?

Name of Nominated Product, Service,

or Program:

––––––––––––––––––––––––––––––––––––––––

Reason this entry deserves to win:

––––––––––––––––––––––––––––––––––––––––

54

9

GSN: What future areas of homeland security

interest would you advise companies to explore?

Continued on next page

Awards Category:

––––––––––––––––––––––––––––––––––––––––

Name of Nominated Product, Service,

or Program: Link to Web Page of Nominated Organization:

––––––––––––––––––––––––––––––––––––––––

www.networkharbor.com

Reason this Link entry to additional deserves to information win: on product,

––––––––––––––––––––––––––––––––––––––––

service or program, with brief description:

––––––––––––––––––––––––––––––––––––––––

https://youtu.be/-ucfAR5psac

Name and organization of nominating

contact for this entry, including name, title,

organization:

––––––––––––––––––––––––––––––––––––––––

55

GSN 2015 DIGITAL YEARBOOK OF AIRPORT/SEAPORT/BORDER SECURITY AWARDS RECIPIENTS

Nominating contact’s office telephone and cell

phone:

––––––––––––––––––––––––––––––––––––––––

Nominating contact’s email address:

––––––––––––––––––––––––––––––––––––––––

john@convyassociates.com

30

31

http://www.rapiscansystems.com

Link to additional information on product,

service or program, with brief description:

––––––––––––––––––––––––––––––––––––––––

http://www.rapiscansystems.com/en/products/

radiation_detection

Name and organization of nominating

contact for this entry, including name, title,

Nominating contact’s office telephone and cell

jedgerly@speakerboxpr.com

The Winners and Finalists have

been selected. Now our national

and international readers want

to know what the strategies,

technologies and innovations

were that gave you the

advantage. Let them know with

a 2-page spread in the

2016 Digital Yearbook of

Award Winners.

The GSN

2016 Digital Yearbook

OF

Homeland Security

Awards

CLICK HERE TO VIEW

LAST YEAR’S YEARBOOK

The GSN

2015 Digital Yearbook

OF

Airport/Seaport/

Border Security Awards

AND

Homeland Security Awards

National Programs and Protection Directorate.

ed world. New legislation pending in Congress formalizes

the increased DHS role in public/private partnering.

GSN 2015 DIGITAL YEARBOOK OF HOMELAND SECURITY

and

Global spending also parallels the DHS spending raise.

AIRPORT, SEAPORT, BORDER SECURITY AWARDS PROGRAMS

A new market research report, “Global Homeland Security

and Emergency Management Market, 2013–2018”, Information Security Management Act (FISMA) and de-

New legislation also would update the 12-year-old Federal

published by MarketsandMarkets is expected to reach lineate DHS’s role in guarding government networks and

$544.02 Billion by 2018. Unfortunately, those numbers websites.

could go even higher if there are more incidents similar to A priority for 2016 will be to accelerate rollout of

GSN INTERVIEW

what happened in Paris, Mali, and San Bernardino, CA. Einstein III Accelerated (E3A), the latest phase of DHS’s

Best Detection Solutions

automated network-security correcting systems. DHS has

established memoranda of agreement with 55 federal

Chuck Brooks, Distinguished Judge

agencies to implement Einstein to provide horizon scanning

and automated monitoring, detection, and remedia-

GSN 2015 Homeland Security and

Best Integrated Security Programs

Rapiscan Systems

CB: Counterterrorism and the counter CBRNE (chemical

Airport, Seaport, Border Security Awards programs

tion of government networks. DHS is also planning for

2015 Winner

, biological, Radiological, Nuclear, and Explosive) mission

new cyber technologies that provide advanced defense of

Network will always Harbor, be fundamental Inc. to homeland planning and

network framework layers, including authentication, better

encryption, biometrics, and data analytical tools”.

spending. Those are the most catastrophic threats. In

2015 Winner

addition to CBRNE DHS has assumed more and more of a

leadership role in cybersecurity derived from both Presidential

mandates and congressional legislation.

Best Nuclear/Radiation Detection

CB: For me it was a real pleasure judging this year’s

Cybersecurity is indeed a top priority as government agencies

and mega corporations experience more data breach-

IPM (integrated process management) provides an

annual Homeland Security and Airport, Seaport, Border

CB:

CB: Macro spending will increase across the board on

The key word really is “future” and it is already additional element of extensibility and power for policy

Security Awards programs. The submissions this year

Best Physical Security Information Management

homeland security products and services In accordance

es with each passing year. I recently published an article

around the corner with the Internet of Things (IoT). management and workflow processing that is virtually

Rapiscan Systems

were frankly quite amazing. The capabilities and technical

System - PSIM

to the new threats we are especially facing from ISIS and

in The Federal Times on Key homeland security priorities

Recently both the FBI and DHS issued warnings about unlimited IoT in its capabilities. The end result is an intuitive,

comprehensive automated security management

merits of the IT and Physical security products/solutions

from other terrorist actors, and global instabilities. This

to watch in 2016 (http://www.federaltimes.com/story/

and pending threats. The reality is that we have become

platform that operates identically, anywhere within the

of all the vendors made it especially difficult to judge. In

was reflected in the recent passage of the 2016 omnibus

government/dhs/blog/2015/12/15/key-homeland-securitypriorities-watch-2016/77368604/)

My thoughts in regards

immersed in a new digital era comprised of more organization. than 50 There’s no need to retrain staff when Rapiscan they Systems, a leading provider of security screening

solutions, is well known for the high quality, reliment

or integrated with Rapiscan’s X-ray and metal-

detection products can be used in a standalone deploy-

my opinion they were all winners because they are leading

technological contributors to the current and future

LightHouse

spending Bill recently passed by Congress by Congress.

billion interfaced devices. Anything connected is move vulnerable.

Expect significant investments in smart cities, nents smart are connected to the platform, which in turn ability saves and affordability of its solutions. With products based threat detection solutions. The newest addition to

from one facility to another, or when new compo-

The bill provides DHS with $40.96 billion, which is an

to cybersecurity verbatim:

security of our nation. It is good to know that very talented

people in industry and government are continually

Network Harbor’s LightHouse platform delivers dent management, too.

increase of $1.33 billion over the fiscal year 2015 enacted

“The 2015 DHS budget directed more than $1.25 billion

to cybersecurity and that trend will continue in 2016.

homes, smart businesses, and smart governments customers in the significant amounts of time and money. sold into four market segments, including Baggage and Rapiscan’s radiation detection product line is the Rapiscan

MP100 Backpack Radiation Detection system. A high

Parcel Inspection, Cargo and Vehicle Inspection, Hold

levels. It included increased funding levels for Customs

next Its decade. click-and-go For the ability security to adopt community this conveys

Baggage Screening and People Screening, the company performance, easy to use radiation monitor combining

designing and upgrading security solutions to fill gaps as

unified security management for enterprise organizations,

extending the capabilities of physical security its own capabilities means that there’s no “dumbing

the full functionality of any security system’s API within

and Border Protection, Immigration and Customs Enforcement

and for DHS Cybersecurity programs in the incident DHS management DHS’s (PSIM) inception to include as we geographical have become a more down” interconnect-

of features or for functions threat detection, – just a seamless, surveillance, con-predictive data analytics,

tion situations Convy its customers Associatescould face. An important a lightweight, compact commercial backpack, making

Cybersecurity and IT have moved to the forefront since

opportunities in developing and integrating new sensors

has a solution John for Convy, the most Principal demanding threat detec-

gamma and optional neutron detection is housed in

adversaries are becoming more hostile and sophisticated.

part of Rapiscan’s product portfolio is its radiation the system perfect for covert inspection situations. The

information system (GIS) and non-physical products in sistent user interface, anywhere across the enterprise.

detection product line, which addresses the need for MP100 is ideal for supporting security operations and

a truly comprehensive safety and security management It installs easily, and is quickly mastered by administrators

and end users alike. LightHouse supports almost

global governments and organizations to monitor and performing radiation surveys in a variety of markets –

environment. LightHouse is unique in that it integrates

locate radioactive threat materials that can be used in including critical infrastructure, customs and border

every security system, physical or non-physical, into a all major security product manufacturers including

office: 202-421-3777

atomic weapons and dirty bombs. The product line is control, event security, defense and law enforcement

single, seamless oversight system. Its intuitive interface access control, video, audio, mass notification, IDS,

comprised of software and hardware based solutions applications. All of the features required for radiation

drives faster recognition of potential threats, as well RTLS and more. LightHouse has been designed to add

for inspecting vehicles, packages and people. Radiation detection are integrated in the MP100 so it can be used

as gives first responders the information they need to additional system integration’s to the platform without

make better informed, more appropriate decisions. disruption or encumbrance of any existing integration

LightHouse is designed to support the IT side of inci- in an expedient, stable and secure process. LightHouse

Address of nominating contact’s organization:

––––––––––––––––––––––––––––––––––––––––

8380 Greensboro Drive Suite 514

McLean, VA 22102

as a standalone device and connected wirelessly to a Link to Web Page of Nominated Organization:

Rapiscan oversight system for remote data collection

––––––––––––––––––––––––––––––––––––––––

and display. Using the MP100 is as easy as slipping

the backpack on and walking around. Weighing just

18 pounds, the MP100 is lightweight and easy to use.

Additionally, the onboard battery enables 16 hours of

continuous operation in a wide range of environments.

The Rapiscan RadviewerTM Android app displays the

operator’s current position and direction toward the

radiation source. The design of the MP100’s radiation

detectors provides increased directional sensitivity of

the radiation detection. A radiation alarm is signaled audibly

via a headphone jack on the backpack or visually ––––––––––––––––––––––––––––––––––––––––

organization:

via RadviewerTM. In this way, the MP100 enables users Jennifer Edgerly, Senior Account Director,

to effectively detect and locate radioactive threats. The SpeakerBox Communications

MP100 is manufactured by Rapiscan’s Radiation Detection

Products division, which has supplied thousands of

radiation monitors that are deployed at border crossings,

seaports, airports and facilities around the world. office: 703-287-7809

phone:

––––––––––––––––––––––––––––––––––––––––

The MP100 uses Rapiscan’s proven radiation detection cell: 202-486-0518

technology adapted for a backpack deployment. The

radiation detection performance meets the requirements

of ANSI N42.53. The MP100 offers customers ––––––––––––––––––––––––––––––––––––––––

Nominating contact’s email address:

efficient, easy to use and reliable man-portable radiation

detection with high performance at an affordable cost of

acquisition and operation.

Address of nominating contact’s organization:

––––––––––––––––––––––––––––––––––––––––

7900 Westpark Drive, Suite T410, McLean, VA

Contact Adrian Courtenay at 917-696-5782 to get more information

and reserve your 2-page spread.


The News Leader in Physical, IT and Homeland Security

CEO/Editorial Director

Adrian Courtenay

917-696-5782

acourtenay@gsnmagazine.com

Editor

Steve Bittenbender

502-552-1450

sbittenbender@gsnmagazine.com

Senior Writer

Karen Ferrick-Roman

412-671-1456

karenferrickroman@gmail.com

Columnist

Shawn Campbell

Campbell on Crypto

shawn.campbell@safenetat.com

Columnist

George Lane

Hazmat Science & Public Policy

georgelane@hotmail.com

Contributing Author

Lloyd McCoy Jr

Immix Group

Contributing Author

Walter Ewing

Contributing Author

Wendy Feliz

Contributing Author

Joshua Breisblatt

Contributing Author

J. Michael Barrett

Contributing Author

Christopher Millar

Gatekeeper Security

Art Director

Gerry O’Hara, OHDesign3

gerry@ohd3.com

203-249-0626

Production Manager

Brenden Hitt

Brenden.hitt@gsnmagazine.com

Direct: 203-216-7798

COMING ATTRACTIONS

February

Late News

Tech Focus

Airport/Aviation Security

Market Sector

Critical Infrastructure, Protection

March

Late News

Tech Focus

Perimeter Protection,

Intrusion Detection

Market Sector

Border Security & Immigration

April

Late News

Tech Focus

Law Enforcement,

Public Safety

Market Sector

Cybersecurity Threats,

Solutions

58

More magazines by this user
Similar magazines