Government Security News February 2017 Digital Edition

acourtenay

Government Security News

FEBRUARY 2017 DIGITAL EDITION

Photo: Peg Hunter

Outpouring of American and foreign citizens mobilize against President’s

“Executive Order” to ban refugees from U.S. for four weeks and Muslim

nationals for 90 days – Page 8

Also in this issue:

Law suits challenge “Muslim Ban” executive order, citing Constitutional guarantee of equal protection – Page 10

More than 75% of crypto ransomware in 2016 came from Russian-speaking Cybercriminal underground – Page 6


NEWS

GSN February 2017 Digital

4

6

10

11

17

18

26

26

27

28

36

Cyberbit’s ERD platform to help Infor detect malware

that bypasses anti-virus

More than 75% of crypto ransomware in 2016 came

from Russian-speaking cybercriminal underground

Law suits challenge “Muslim Ban” executive order,

citing Constitutional guarantee of equal protection

Chuck Brooks named winner of “Cybersecurity

Marketer of the Year” Excellence Awards

Amico Security launches next generation ANC

composite fence system, receives M5.0 security rating

Written testimony of DHS Secretary John F. Kelly for a

House Committee on Homeland Security titled “End the Crisis:

America’s Borders and Path to Security

Salient CRBT announces definitive agreement to acquire

Information Innovators, Inc

Federal experts agree that “Internet of Things”

demands simple baked-in security

Farpoint warns access control channel to suggest

customers add anti-hacking measures, as Federal

Trade Commission is now insisting on Cybersecurity protection

Varex Imaging completes separation from

Varian Medical Systems, lists on Nasdaq Stock Market

Expansion of DMARC is critical to reducing

spread of malicious emails, says Global Security

Alliance, calling on Cyber companies to improve protections

2


Edition Table of Contents

37

38

39

Milestone release, enabling record-breaking performance for Xproduct users,

delivers highest performing VMS ever, complete with new Cybersecurity focus

Facial biometric boarding solution by Vision Box being tried at Schipol Airport

Statement from Secretary Kelly on recent ICE enforcement actions

FEATURES

SPECIAL REPORT ON AIRPORT/AVIATION SECURITY

13

First 777-300ER in United’s fleet christened the “New Spirit

of United”

14

15

16

Passenger advocacy group lists concerns before

airline CEO’s meet with President Trump

Southwest and NetJets Pilots urge President Trump to reverse NAI Foreign

Carrier Permit

British air traffic control provider tags Rohde and Schwarz

for second voice system

HOT TOPIC: OPINIONS ON IMMIGRATION

30

New Memos reveal harsh and unforgiving immigration road map, taking

national backwords in guaranteeing due process and providing safe havens

31

32

33

Supreme Court hears case on shooting of 15-year old Sergio Hernandez by

U.S. Border Patrol agent

Abandoning priorities will make immigration enforcement

work much harder

“Expedited Removal” on noncitizens called for

in President’s January 25 executive order

3


Cyberbit’s EDR platform to help Infor detect

malware that bypasses antivirus

AUSTIN, TX – February 9th, 2017

– Cyberbit, whose cybersecurity

solutions protect the world’s most

sensitive systems, today announced

it was awarded a contract from Infor

for the supply of Cyberbit’s security

platform for its own internal usage.

Infor selected Cyberbit for its significant

experience, technical acumen,

and outstanding customer

references, and is pleased to have

Cyberbit complement its detection

capability in this increasingly complex

environment of Cyber threats.

Cyberbit’s EDR platform uses a

signature-less approach, proven to

detect unknown threats that bypass

antivirus and next-generation endpoint

security platforms, while minimizing

false positives. The EDR

platform continuously records millions

of low-level endpoint events

across the network and rapidly correlates

traces of malicious activity

to verify an attack within seconds.

Once an attack is detected, the entire

storyline is displayed, enabling

the platform to respond or provide

the analyst with the necessary information

to investigate the attack.

Cyberbit’s unique approach serves

as an “analyst in a box” that expedites

the process of identifying and

hunting down threats. Analysts often

work with fragments of the story

based upon their knowledge and

experience to seek traces of attacks

buried in the data.

Cyberbit’s EDR platform

assists analysts

by automating much

of the hunting process

leveraging behavioral

analytics and machine

learning, which often

saves weeks of investigative

effort.

“We are excited to be working with

Infor to complement their forwardthinking

IT security strategy,” said

Stephen Thomas, VP Sales at Cyberbit.

“Innovative IT organizations

such as Infor’s are adapting this proactive

detection-based strategy and

I look forward to supporting their

organization.”

4

Additional resources

• Request a demo of the Cyberbit

Endpoint Detection and Response

solution.

• Learn about proactive hunting and

endpoint control in this webinar.

• Subscribe to Cyberbit’s blog.

• Follow Cyberbit on Facebook,

LinkedIn and Twitter

(@CYBERBITHQ).

About Cyberbit

Created to protect the most highrisk

organizations in the world, Cyberbit

secures enterprises and critical

infrastructure against advanced

cyberthreats. The company’s battlehardened

cybersecurity solutions

detect, analyze and respond to the

most advanced, complex and targeted

threats. Cyberbit employs a

formidable and diverse team from

both the public and private sector,

including Ph.D.s, hackers, former

CISOs and SOC managers, as well as

seasoned veterans of the intelligence

and military communities. With offices

worldwide, Cyberbit is a subsidiary

of Elbit Systems Ltd. (NAS-

DAQ: ESLT) and has more than 500

personnel in the United States, Europe

and Asia. To learn more about

More on page 40


GSN’s 2017 Airport/Seaport/Border Security Awards

Opening for Entries on March 15 with Many New Categories

All Winners in this program are entitled to

a Full-Page Advertisement (8.5” x 9.0”) in

your choice of GSN’s Digital Magazine or

Leaderboard in any edition of the Airport,

Seaport, Rail, Border Security Weekly

Newsletter.

NEW IN 2017:

CLICK HERE TO

SUBMIT A NOMINATION

All Finalists are entitled to a Half-Page

Advertisement (8.5” x 4.5”) in your choice

of GSN’s Digital Magazine or Leaderboard

in any edition of the Airport, Seaport, Rail,

Border Security Weekly Newsletter.

Adrian Courtenay

Managing Partner, CEO

Government Security News

917-696-5782

acourtenay@gsnmagazine.com

Steve Bittenbender

Managing Editor

Government Security News

502-552-1450

sbittenbender@gsnmagazine.com

Gerry O’Hara

Designer

OHDesign3

203-249-0626

gerry@ohd3.com


More than 75% of crypto ransomware in 2016

came from the Russian-speaking cybercriminal

underground

SAN FRANCISCO, CA and Woburn,

MA – February 13, 2017

Out of 62 new crypto ransomware

families discovered by Kaspersky

Lab researchers in 2016, at least 47

were developed by Russian-speaking

cybercriminals. This findings

and others are included in an overview

of the Russian-speaking ransomware

underground, conducted

by Kaspersky Lab researchers. The

review also highlights that small

groups with limited capabilities are

transforming into large criminal enterprises

that have the resources and

intent to attack private and corporate

targets worldwide.

Crypto ransomware – a type of

malware which encrypts its victim’s

files and demands a ransom in exchange

for decryption – is one of

the most dangerous types of malware

today. According to Kaspersky

Lab telemetry, in 2016 more than

1,445,000 users (including businesses)

around the globe were attacked

by this type of malware. In the

overview, one of the major conclusions

is that the increase in crypto

ransomware attacks observed in recent

years is the result of a very flexible

and user-friendly underground

ecosystem, allowing criminals to

launch crypto ransomware attack

campaigns with almost any level

of computer skills and financial resources.

Kaspersky Lab researchers identified

three levels of criminal involvement

in the ransomware business:

• The creation and update of

new ransomware families

• The development and support

of affiliate programs

distributing ransomware

• The participation in affiliate

programs as a partner

The first type of involvement requires

a participant to have advanced

code-writing skills. The

cybercriminals who create new ransomware

strains are the most privileged

members of the ransomware

underground world, as they are the

ones who create the key element of

the whole ecosystem.

On the second level of the hierarchy,

there are the developers of

the affiliate programs. These are the

criminal communities which – with

6

the help of different additional tools,

like exploit kits and malicious spam

– deliver the ransomware issued by

the malware creators.

The partners of affiliate programs

are on the lowest level of the whole

system. Utilizing different techniques,

they help the owners of affiliate

programs to distribute the

malware in exchange for a share of

the ransom received by owners of

the program. Only intent, a readiness

to conduct illegal actions, and

a couple of bitcoins are required for

participants of affiliate programs to

enter this business.

According to Kaspersky Lab estimations,

the overall daily revenue

of an affiliate program may reach

tens or even hundreds of thousand

dollars, of which around 60 percent

stays in the criminals’ pockets as net

profit.

Moreover, during their research

into the underground ecosystem

and multiple incident response operations,

Kaspersky Lab researchers

were able to identify several large

groups of Russian-speaking criminals

specializing in crypto ransomware

development and distribution.


These groups may unite tens of different

partners, each with their own

affiliate program, and the list of

their targets includes not only ordinary

internet users, but also small

and medium-sized companies and

even enterprises. Initially targeting

Russian and CIS users and entities,

these groups are now shifting their

attention to companies located in

other parts of the world.

“It is hard to say why so many

ransomware families have a Russian-speaking

origin. What is more

important is that we’re now observing

their development from small

groups with limited capabilities

to large criminal enterprises that

have resources and the intent to

attack more than just Russian targets,”

said Anton Ivanov, security

researcher at Kaspersky Lab, and

the author of the overview. “We’ve

seen something similar with financial

malware groups, like Lurk. They

also started with massive attacks

on online banking users, and then

evolved into sophisticated

groups capable

of robbing large

organizations,

like banks. Sun

Tzu said: ‘If you

know the enemy

and know

yourself, you

need not fear

the result of a

hundred battles.’

That’s why

we’ve created

this overview:

ransomware

gangs are turning

into very powerful enemies,

and for the public and the security

community, it is really important we

learn as much about them as possible.”

Read more about how Russianspeaking

underground ransomware

ecosystem works on Securelist.com

About Kaspersky Lab

7

Kaspersky Lab is a global cybersecurity

company founded in 1997.

Kaspersky Lab’s deep threat intelligence

and security expertise is

constantly transforming into security

solutions and services to protect

businesses, critical infrastructure,

governments and consumers

around the globe. The company’s

comprehensive security portfolio

includes leading endpoint protection

and a number of specialized security

solutions and services to fight

sophisticated and evolving digital

threats. Over 400 million users are

protected by Kaspersky Lab technologies

and we help 270,000 corporate

clients protect what matters

most to them. Learn more at www.

kaspersky.com.

FREE SUBSCRIPTION

SIGN-UP

Monthly Digital Edition

Airport/Seaport Newsletter

Daily Insider Newsletter

Cybersecurity Newsletter

CLICK HERE


Outpouring of American and foreign citizens mobilize

against President’s “Executive Orders” to ban refugees

from U.S. for four weeks and Muslim nationals for 90 days

By Michele Waslin

In his first week as president, President

Donald Trump unleashed a

series of executive orders, thereby

launching his first strikes against

current and future immigrants and

refugees. In response, thousands

of Americans mobilized over the

weekend, demonstrating against the

President’s actions. Strong opposition

continues to come from foreign

leaders, Congressional leaders,

government bureaucrats, business

leaders, university presidents, and

others.

The far-reaching and highly problematic

executive orders on “Border

Security and Immigration Enforcement

Improvement” and “Enhancing

Public Safety in the Interior of

the United States” seek to radically

change immigration enforcement

along the U.S.-Mexico border and

throughout the entire country.

Friday’s “Protecting the National

from Terrorist Attacks by Foreign

Nationals” is intended to halt all

refugee admissions for at least four

months and bans nationals from

seven Muslim-majority countries

from entering the U.S. for at least 90

days. Additional executive orders

are expected in the coming days and

weeks.

Given the immediate impact of

the ban, Friday’s executive order

resulted in a great deal of confusion,

frustration, and anger across

the country and around the world.

When the executive order was made

public, large protests erupted at the

White House and at airports around

the country, including large numbers

of attorneys offering free legal

assistance and Members of Congress

leveraging pressure on immigration

officials.

On Friday night and Saturday, the

first travelers from the seven banned

countries arrived at U.S. airports

and were detained by Customs and

Border Patrol (CBP) agents. CBP

had not been issued clear guidance

as to how the executive order was

to be implemented, and as a result,

treatment of foreign nationals differed

by airport.

Among those detained and scheduled

to be returned to their home

8

countries were returning green card

holders who already live and work

in the U.S., as well as first-time green

card holders whose vetting was recently

completed, and temporary

visitors to the U.S. One detainee was

Hameed Khalid Darweesh, who

had worked with the U.S. military

as an interpreter in Iraq. As confusion

and frustration rose and family

members worried about their

detained loved ones, immigration

lawyers went to the airports to represent

those in detention.

The ACLU, National Immigrant

Law Center, and other legal organizations

immediately challenged

the executive order on behalf of

Darweesh and others, and Saturday

night a federal judge in the Eastern

District of New York issued a nationwide

stay of removal, preventing

the Trump administration from

deporting refugees and others who

had lawful authority to enter the

U.S. Similar lawsuits were filed in

other cities: in Boston, the federal

court prohibited the detention and

removal of all those subject to the

executive order but the order was


limited to Logan Airport; in Virginia,

the federal court ordered the

government to give attorneys access

to all green card holders being detained

and prohibit their removal,

and; in Seattle, the court prevented

the removal of plaintiffs subject to

the seven-Muslim-majority country

ban. However, there were reports in

multiple cities that CBP was slow

to comply with the nationwide

and local court

orders, even after the

federal judge’s order was

issued.

Not until Sunday did

the White House clarify

that the order did

not extend to returning

green card holders.

Despite other rumors

about changes to the application

of the policy,

no further official guidance

has been publicly

released.

Democratic and Republican

Members of Congress have also denounced

the Muslim ban. Senate

Minority Leader Chuck Schumer

called the executive order “meanspirited

and un-American,” and said

he would “claw, scrap, and fight with

every fiber of my being until these

orders are overturned.” Republican

Senators McCain and Graham issued

a joint statement saying “We

fear this executive order will become

a self-inflicted wound in the

fight against terrorism.” Some also

criticized the administration for

failing to follow the regular protocols

and consulting with the right

people before issuing an executive

order. “You have an extreme vetting

proposal that didn’t get the vetting

it should have had,” said Ohio Sen.

Rob Portman.

Opposition has appeared from

within the government bureaucracy

as well. Foreign Service officers

from the department of State drafted

a dissent memo in opposition to

the refugee ban, claiming the policy

“runs counter to core American values

of nondiscrimination, fair play,

and extending a warm welcome to

foreign visitors and immigrants.

Alternative solutions are available

to address the risk of terror attacks

9

which are both more effective and

in line with Department of State and

American values.”

Business leaders also condemned

the Administration’s actions, explaining

that the executive orders

could make it more difficult for

America’s companies to compete.

Google ordered its employees traveling

overseas to return to the U.S.

immediately. Google

says at least 187 foreign-born

employees

could be prevented

from entering the

Photo: John Taylor

country. Twitter’s

chief executive tweeted

that the economic

impact of the Muslim

ban is “real and upsetting.”

Netflix chief

executive said that

“Trump’s actions are

hurting Netflix employees

around the

world, and are so un-

American it pains us all…Worse,

these actions will make America

less safe (through hatred and loss of

allies) rather than more safe.”

Thus far, the opposition to Trump’s

immigration agenda has been fast

and furious and will likely continue

as he continues to roll out additional

immigration orders.


Law suits challenge “Muslim Ban” executive order

citing Constitutional guarantee of equal protection

and statutory prohibitions against discrimination

By Mary Kenney

The fallout continues from last

week’s immigration executive order,

which has been coined the “Muslim

Ban.” Several lawsuits have been

filed to challenge the executive order,

including Ali v. Trump, on the

grounds that it violates the Constitution’s

guarantee of equal protection

under the law and a statutory

prohibition against discrimination.

The American Immigration

Council, Northwest Immigrant

Rights Project, and the National

Immigration Project of the National

Lawyers Guild filed this nationwide,

class action lawsuit in the District

Court for the Western District of

Washington on Monday, January 30.

At issue in this lawsuit is Section

3 of the executive order, through

which President Donald Trump

abruptly suspended immigrant visa

processing for nationals of seven

predominantly Muslim countries,

and prohibited their entry into the

United States. Section 3 violates

Congress’ clear intent in Section

202(a)(1) of the Immigration and

Nationality Act to prevent

discrimination in

the issuance of immigrant

visas “because of

the person’s race, sex,

nationality, place of

birth, or place of residence.”

It also violates Plaintiffs’

constitutionally

protected rights to

family, marriage, and

equal protection under

the law. The lawsuit

was filed on behalf of United States

citizens and lawful permanent residents

who have filed visa petitions

for their close family members who

are nationals of the seven countries.

Reema Dahman, a lawful permanent

resident of the United States,

filed a petition to bring her 16-yearold

son stranded in war-torn Syria to

the United States. The two have not

seen each other since 2012. They are

now at the last stage of processing,

waiting only for an immigrant visa

interview to be scheduled. But the

President’s executive order has suspended

immigrant visa interviews,

10

Photo: Geoff Livingston

putting safety and security further

out of the boy’s reach and further

delaying the boy’s reunification with

his mother.

Ms. Dahman described the moment

she realized her separation

from her son would continue by

saying:

“I’m heartbroken. Every day I am

filled with anguish at what might

become of my son, and this order

just crushed my hopes that I could

get him out of harm’s way anytime

soon.”

Juweiya Ali is also a plaintiff. Her

More on page 40


Chuck Brooks named winner of “Cybersecurity

Marketer of The Year” at the 2017 Cybersecurity

Excellence Awards

WASHINGTON, DC – Chuck

Brooks, Vice President at

Sutherland Government Solutions,

and Chairman of The

New Emerging Technologies

Committee for CompTIA, was

named winner of Cybersecurity

Marketer of The Year at the

2017 Cybersecurity Excellence

Awards.

The 2017 Cybersecurity Excellence

Awards recognize companies,

products and individuals

that demonstrate excellence,

innovation and leadership in

information security. The finalists

and winners were selected

based on the strength of their

nomination and the popular

vote by members of the Information

Security Community

(both ratings and comments).

“Congratulations to Chuck

Brooks for winning the Cybersecurity

Marketer of the Year category

in the 2017 Cybersecurity Excellence

Awards,” said Holger Schulze,

founder of the 350,000 member

Information Security Community

on LinkedIn which organizes the

awards program. “With over 450

entries, the 2017 awards are highly

competitive. All winners and finalists

reflect the very best in leadership,

excellence and innovation in

today’s cybersecurity industry.”

Chuck’s thought leadership writings

on cybersecurity have helped

shape the public policy debate as he

11

is respected in industry, in the

Federal Government, academia,

and on Capitol Hill. He has been

a force in discussing, advocating,

promoting cybersecurity

issues across digital media, at

events, in professional forums,

and with a variety of public policy

organizations.

He has been a leading evangelist

for cybersecurity, homeland

security, and emerging

technologies in both the public

and private sectors. He was selected

by LinkedIn as “One of

the Top 5 Tech People to Follow

On LinkedIn” by LinkedIn. He

has been a featured speaker at

numerous events and conferences.

He recently presented at

a workshop sponsored by The

National Academies of Sciences,

Engineering, and Medicine and the

Federal Bureau of Investigation on

Securing Life Sciences Data. He recently

spoke at George Washington

University event about the Cyber

Threat Spectrum, will be participating

soon at USTRANSCOM Senior

Leader Cyber Security Roundtable.


Chuck has authored numerous

articles focusing on cybersecurity,

homeland security and technology

innovation for many publications

including Forbes, Huffington Post,

The Hill, Federal Times, IT Security

Planet, Bizcatalyst 360, Next Gov,

Alien Vault, Gov

Tech, MIT Sloan

Blog, Government

Security News, and

Brink. Chuck is a

pioneer in social

media with over

32,000 followers

on LinkedIn and a

global following and

has brought significant

attention to cyber

issues from his

frequent posts and

commentaries. He

has been involved as a judge for the

past four years as a Judge for Government

Security News’ Annual

Homeland Security Awards.

As a senior executive in government

relations, marketing, and management,

Chuck brings a unique experience

from service in the public

sector, academia, and industry. He

serves on a variety of boards, many

of them philanthropic. He brings a

substantive knowledge on a broad

range of cyber issues and a special

subject matter expertise of cybersecurity

and homeland security in

government that have benefited

both the not-for-profit, public, and

commercial sectors.

Chuck is one of the original

“plank holders” at the Department

of Homeland Security (DHS). Admiral

Jay Cohen, former Under Secretary

for Science & Technology at

DHS stated “Chuck

Brooks. as Director

of Legislative Affairs

at DHS, was

INVALUABLE to

me, the DHS S&T

Directorate, DHS,

the Nation AND

Congress in making

the “reformation”

of DHS S&T

a complete success.

His Hill/DC acumen,

insight, reliability,

ability to

develop highly effective congressional

interaction/communications is

WITHOUT PEER in my nearly 16

years dealing with senior executive

branch officials, industry, academia

and the Congress.”

Dexter Ingram, Senior Advisor to

Interpol, said the following about

Chuck “he is a consummate professional

who has a deep understanding

of the issues, process, and people

involved in the world of homeland

security and Law enforcement. His

breadth of experience derived from

working on The Hill, in government,

in academia, in industry, and with

12

the media make him truly unique.”

Chuck worked for many years

on Capitol Hill for the late Senator

Arlen Specter and covered national

security, foreign affairs, and technology

issues. He also was a member

of the Adjunct Faculty at John

Hopkins University where taught

homeland security for two years.

He has advised a multitude of organizations

including the Bill & Melinda

Gates Foundation, The Cyber

Resilience Institute, and the Center

for Advancing Innovation. He also

serves as Chairman of CompTIA’s

New and Emerging Technologies

Committee, and is a member of the

AFCEA Cybersecurity Committee.

He is on the Board of Advisors

for CyberTech, and on the Board

of Directors at Bravatek, and the

Cyber Resilience Institute. He is

an advisor to R & D cybersecurity

company Inzero Systems. He is a

subject Matter Expert to The Homeland

Defense and Security Information

Analysis Center (HDIAC),

a Department of Defense (DoD)

sponsored organization through

the Defense Technical Information

Center (DTIC. Chuck also serves as

a Christian Science Monitor “Passcode

Influencers Panel member” on

Information Security. He has a BA

from DePauw University and an

MA from the University of Chicago.


Airport/Aviation Security

First 777-300ER in United’s fleet christened

the “New Spirit of United,” marking a new

era of passion, service and innovation

CHICAGO, IL – Jan. 17, 2017 /

PRNewswire/ – Next month, a

brand-new United Airlines plane

will push back from the gate with a

new name: “New Spirit of United.”

This special aircraft is also the company’s

first Boeing 777-300ER featuring

the United Polaris all-aisle

access, lie-flat seat. It represents a

commitment to the future and the

commencement of an exciting new

chapter for the company as it builds

the best airline in the world.

“This aircraft symbolizes the new

spirit, the energy and enthusiasm

that I have seen in our employees

who take great pride in the work

they are doing to take care of our

customers and one another,” said

Oscar Munoz, chief executive officer

of United Airlines. “The new

777-300ER fleet will play a crucial

role in connecting our customers

to far-away destinations and to the

moments that matter most.”

The “New Spirit of United” is exemplified

by the significant progress

the company made in operational

reliability last year – achieving its

best full-year on-time performance

in company history, the

elevated customer experience

and the completion

of new agreements

with every domestic

unionized work group

in 2016. As United Airlines

continues to build

on this momentum, this

new aircraft serves as a

symbol of the hard work,

professionalism and

dedication of the entire United team

to our customers.

The aircraft will start regularly

scheduled service in February 2017.

This is the first of 14 777-300ER aircraft

United expects to place into

service in 2017.

About United

United Airlines and United Express

operate more than 4,500 flights a

day to 339 airports across five continents.

In 2016, United and United

Express operated more than 1.6 million

flights carrying more than 143

million customers. United is proud

to have the world’s most comprehensive

route network, including U.S.

13

mainland hubs in Chicago, Denver,

Houston, Los Angeles, New York/

Newark, San Francisco and Washington,

D.C. The airline is a founding

member of Star Alliance, which

provides service to 192 countries

via 28 member airlines. For more

information, visit united.com, follow

@United on Twitter or connect

on Facebook. The common stock of

United’s parent, United Continental

Holdings, Inc., is traded on the

NYSE under the symbol UAL.


Airport/Aviation Security

Passenger advocacy group lists

concerns before airline CEOs meet with

President Trump

WASHINGTON, DC – Feb. 6, 2017

CEOs from the major U.S. Airlines

will meet with President

Trump on Thursday and

will likely discuss air

traffic control privatization

and further limitations

on foreign air competition.

As profits soar

to record levels, passengers

face a reduction in

flights, shrinking seats,

and less reliable air travel

especially from small

and medium size cities,

noted FlyersRights.org.

Being exempt from state consumer

protection laws is not enough for

the airlines. They seek to block foreign

competition from airlines such

as Norwegian Air, WOW Airlines,

and Emirates. Blocking foreign

competition will result in higher

Paul Hudson

Flyer’s Rights Pres

prices and fewer choices for consumers.

Paul Hudson, president

of FlyersRights.org and

member of the FAA Aviation

Rulemaking Advisory

Committee, noted the

similarities between the

airline industry now and

the railroad industry in

the 19th century, “Then,

railroads controlled long

distance transportation,

as well as the courts and

government regulators.

A new word was coined to describe

their abusive treatment of the public:

being railroaded. Today, Americans

are being ‘airlined’.”

Additionally, the airlines are

pushing for privatization of the Air

Traffic Control system. The plan

for privatization leaves little room

for government oversight over an

inherently governmental function,

would transfer all government air

traffic control to a AMTRAK like

entity controlled by the airlines, and

grant a long list of demands sought

by air controller union including

the right to strike. Such legislation

was passed by the House in the last

Congress but not acted on by the

Senate.

FlyersRights.org is the United

States’ largest airline passenger advocacy

group. The organization is

most famous for spearheading the

Passenger Bill of Rights and the

rule against tarmac confinements.

Among the many services it provides

for airline passengers, it operates

a toll-free hotline and publishes

a weekly newsletter. FlyersRights.

org is currently appealing the FAA’s

refusal to enact a rulemaking to

address the problems of shrinking

seat sizes to the D.C. Circuit Court

of Appeals. (Case 16-1101, FlyersRights

Education Fund v. FAA).

14


Southwest and NetJets Pilots Urge President-elect

Trump to Reverse NAI Foreign Carrier Permit

DALLAS, TX – The Southwest Airlines

Pilots’ Association (SWAPA)

is partnering with the NetJets Association

of Shared Aircraft Pilots

(NJASAP) to urge President-elect

Trump to reverse the decision to

grant Norwegian Air International

a foreign carrier permit. The two

groups will meet in the nation’s capital

for a Rally for U.S. Aviation Jobs

on January 24.

In the final days of his administration,

President Obama granted

Norwegian Air International (NAI)

a foreign carrier permit, placing

tens of thousands of U.S. jobs at risk.

“This decision is just another failed

trade deal by the Obama administration,

giving foreign companies an

unfair advantage over U.S.

companies,” said Captain

Jon Weaks, SWAPA

President. “Only President-elect

Trump has the

power to reverse the lame

duck Obama Administration’s

reckless approval of

Captain Jon Weaks

SWAPA President

NAI before it takes effect

on January 29.”

The late-December decision

to grant NAI a foreign carrier

permit paves the way for NAI

to execute on its flag of convenience

(FOC) scheme. This permit allows

for Norwegian to establish an Irish

subsidiary in order to take advantage

of Ireland’s impotent labor, tax,

and social laws. This is exactly the

type of scheme that decimated the

U.S. shipping industry and will be

the catalyst for a race to the bottom

in the U.S. airline industry.

Government affairs representatives

from SWAPA and NJASAP

continue to work every possible avenue

to garner the attention of the

president-elect and right this wrong.

With the January 29 deadline looming,

the groups believe that time

is of the essence, and the

time for action is now.

“The Obama administration

has tilted the field

of play in favor of a foreign

competitor and put

thousands of good-paying,

middle-class, U.S. aviation

jobs at risk. It will be up to

the Trump administration

to save them,” said SWAPA

15

Governmental Affairs Committee

Chair Chip Hancock. Added

Weaks, “President-elect Trump was

elected on a pro-American worker

platform and has already delivered

wins for several American companies.

It is our sincere desire that the

president-elect will right this wrong

by repealing this detrimental ruling.”

About SWAPA

Located in Dallas, Texas, the Southwest

Airlines Pilots’ Association

(SWAPA) is a non-profit employee

organization representing the more

than 8,500 pilots of Southwest Airlines.

SWAPA works to provide a

secure and rewarding career for

Southwest pilots and their families

through negotiating contracts,

defending contractual rights and

actively promoting professionalism

and safety. For more information

on the Southwest Airlines Pilots’

Association, visit www.swapa.

org. Rally Hashtags: #DenyNAI

#MakeItRight #ReverseObama


Airport/Aviation Security

British air traffic control provider tabs

Rohde & Schwarz for second voice system

MUNICH – Feb. 7, 2017 NATS has

selected the R&S VCS-4G IP-based

voice communications system from

Rohde & Schwarz as its second

voice system for its air traffic control

(ATC) communications in UK

airspace. The voice over IP (VoIP)

COTS solution from the Munichbased

electronics firm was chosen

based on its reliability, innovation

and flexibility to create a single

platform across NATS’ Swanwick

and Prestwick control centers. In

addition, the company has agreed

to an accelerated delivery schedule

to support NATS in their “Deploying

SESAR” transformation programme.

Rohde & Schwarz will provide the

British air traffic service provider

NATS with the IP-based voice communications

system R&S VCS-4G.

Within the framework of the Single

European Sky (SES) initiative, NATS

will modernize its entire air traffic

management (ATM) infrastructure

over the next few years. Tim Bullock,

Director Supply Chain Management

at NATS, explains: “NATS

controls more than 2.4 million

flights every year. Our systems must

16

be both flexible and

able to handle heavy

workloads in order

to ensure efficient operations

for airlines

and passengers alike.

We have found in Rohde

& Schwarz an innovative

and reliable

partner. We welcome

them to the collaborative

team of suppliers joining us on

our ATM transformation journey

towards SESAR deployment.”

Rohde & Schwarz will begin the

implementation of the second voice

system in 2017. It will provide enhanced

resilience for voice based

radio communications in UK airspace.

The air traffic control centers

in Swanwick and Prestwick as well

as the NATS corporate and technical

centre in Whiteley will all be

equipped in a phased deployment

that will be completed by 2020. The

order includes the delivery, implementation

and through-life support

of more than 450 R&S VCS-4G controller

working positions (CWP).

Up to 1700 radios and various

ground-ground lines will be connected

to the system.

According to Bosco Novak, Executive

Vice President Secure Communications

Division at Rohde &

Schwarz: “NATS is a forerunner in

the deployment of SESAR and introducing

new technologies. It will

be the first air traffic control provider

in Europe to completely migrate

all of its ATC communications to

IP. Deploying our technology as the

second voice system will increase

service resilience and add operational

flexibility to NATS business

operation.”

As airspace becomes more crowded,

there is an increased demand for

flexible, load-based reallocation of

resources while ensuring efficient

More on page 40


AMICO Security launches next generation

ANC composite fence system, receives M5.0

security rating

BIRMINGHAM, AL — December

30, 2016 — AMICO Security announced

today that its ANC fence

system has received an M5.0 security

rating in compliance with the

ASTM F2781-10 standard, which is

used to test the forced entry resistance

of security fence systems, an

important designation for the military,

the U.S. Department of Homeland

Security, industrial businesses

and utilities.

The next generation ANC fence

system is a uniquely designed,

non-metallic fencing system that is

non-conductive and radar friendly,

making it ideal for the protection of

The non-conductive, radar friendly ANC fence system is ideal for

17

utility substations, airports and military

applications. The ANC fence

system is made up of a proprietary

composite blend of non-conductive

materials configured to increase the

strength to weight ratio and greatly

improve the level of security.

The ANC fence system uses a

unique self-draining diamond

design and is a medium

security alternative

to traditional chain link

fence products, which offers

minimal security and

can easily be compromised

with simple hand tools.

Because the system is non metallic,

the ANC fence system

is non-conductive

and does not require

grounding like a traditional

chain link fence,

significantly reducing

the time and cost of engineering

and fence installation.

The system

is ideal for use around

power plants and sub

stations, where the

metal fencing can conduct

electricity and become dangerous

to the touch, and is widely used

around (static synchronous compensators)

STATCOMs, (switched

virtual circuits) SVCs and reactors

due to their high magnetic fields.

The ANC fence system does not interfere

with radar signals due to its

non-metallic composition.

“The unique design and

high strength of the ANC

fence system provides a

safe, secure, aesthetic option

to utilities, military

bases and airports,” said

Gary Baltz, Director of

Marketing for AMICO Security.

“Our product provides safety to the

public and utility workers against

step and touch potential, while at

the same time greatly enhancing

the security of our power grid and

infrastructure. The system is easy to

install in both new construction or

retrofit situations.”

The ANC fence system can be assembled

up to 20 feet high and integrates

with vehicular and pedestrian

sliding automatic gate systems. The

use in multiple perimeter security applications More on page 41


Written testimony of DHS Secretary John F. Kelly for a House

Committee on Homeland Security hearing titled “Ending the

Crisis: America’s Borders and the Path to Security

Release Date:

February 7, 2017

210 House Capitol Visitor Center,

U.S. Capitol

Mr. Chairman, Ranking Member

Thompson, and distinguished

Members of the Committee:

It is a great honor and privilege to

appear before you today to discuss

the crucial mission of the Department

of Homeland Security (DHS)

to protect the homeland and secure

our nation’s borders.

Over the past 45 years, I have

been privileged to serve my nation

as both an enlisted Marine and an

officer. I have worked with our allies

across agencies, the private sector,

and with independent experts to

identify innovative, comprehensive

solutions to current and emerging

threats. These assignments—while

varied—shared the common characteristics

of working within and

leading large, complex, and diverse

mission-focused organizations

while under great pressure to produce

results.

I am humbled to once again be

called to serve, this time

with the men and women

of DHS. As a Department,

we face diverse

challenges and adversaries

that do not respect

our rule of law or our

borders. As Secretary,

you have my commitment

to tirelessly protect

our country from

threats, secure the border, and enforce

the law while expediting lawful

trade and travel. In pursuit of those

missions, please know that I take

seriously our legal responsibilities

to balance the security of our homeland

with the protection of privacy,

civil rights, and civil liberties.

The President’s Executive Orders

During his first two weeks in office,

President Trump issued executive

orders to secure our borders, enforce

our immigration laws, and protect

the nation from foreign terrorist entry

into the United States. The President

has gotten right to work, fighting

on behalf of American families

and workers—and these moves will

18

DHS Secretary

John F. Kelly

strengthen our national

security.

The purpose of the

order on border security

is to direct executive

departments and agencies

to deploy all lawful

means to secure the nation’s

southern border,

prevent further illegal

immigration into the

United States, and to repatriate illegal

aliens swiftly, consistently, and

humanely.

This executive order establishes

the foundation for securing our

southern border by providing the

tools, resources, and policy direction

for DHS’s dedicated men and

women who are responsible for securing

the border—to prevent illegal

immigration, drug and human

trafficking, and acts of terrorism.

In accordance with existing law,

DHS is immediately taking all appropriate

steps to plan, design, and

construct a physical wall along the

southern border, using the materials

and technology that will most

effectively achieve operational con-


trol of the southern border. In addition,

DHS is immediately taking

all appropriate action to ensure that

the parole and asylum provisions of

federal immigration law are applied

consistent with the requirements of

the law, and not exploited to prevent

the removal of otherwise removable

aliens.

The executive order on interior

immigration enforcement provides

DHS with the tools it needs

to enforce federal immigration laws

within the United States. It will remove

many of the obstacles that

have been making it more difficult

for the dedicated men and women

of U.S. Immigration and Customs

Enforcement (ICE) to carry out

their mission, which includes arresting,

detaining, and removing illegal

aliens from the United States.

Essentially, it will restore the highly

successful Secure Communities

Program, which allows ICE to more

easily target criminal aliens for removal.

A third executive order, signed

by the President on January 27, will

protect all Americans from certain

foreign nationals who intend

to commit terrorist attacks in the

United States by preventing such

individuals from exploiting our immigration

laws. The order suspends

entry into the United States from

Iran, Iraq, Somalia, Sudan Syria,

Libya and Yemen until a comprehensive

review has been completed;

directs Federal agencies to implement

uniform screening standards

across all immigration programs;

suspends the Refugee Admissions

Program for 120 days to assess the

vulnerabilities in the program and

establish additional procedures to

ensure refugees admitted do not

pose a threat to national security or

public safety; orders completion of

the biometric entry-exit system; and

ensures that applicants for visas are

personally interviewed before their

visas are approved in compliance

with INA 222.

As the President has stated,

“Homeland Security is in the business

of saving lives, and that mandate

will guide our actions.” These

executive orders further that goal

by enhancing border security, promoting

public safety, and minimizing

the threat of terrorist attacks by

foreign nationals in the homeland.

More important, however, these executive

orders emphasize the rule

of law as a bedrock principle of our

immigration system and provide

clearly defined consequences for

those who would violate our laws.

Border Security

and Immigration Enforcement

As a nation, control of our borders

is paramount. Without that control,

every other form of threat—illicit

drugs, unauthorized immigrants,

19

transnational organized crime, certain

dangerous communicable diseases,

terrorists—could enter at will.

DHS was created to prevent terrorist

attacks against the United States.

The principal means of prevention

within the United States is effective

border control, denying admission

to aliens who seek to harm Americans

or violate our laws, and countering

efforts to recruit individuals

to undertake terrorist acts.

Achieving this priority begins

with physical obstacles like a border

barrier and supporting infrastructure

and surveillance capabilities.

In this effort, I am committed to

executing President Trump’s plan to

secure our southern border with effective

physical barriers, advanced

technology, and strategic deployment

of law enforcement personnel.

While the presence of physical

barriers and additional technology

is essential, it must be bolstered by

persistent patrol and the vigilance

of the dedicated men and women of

DHS.

We must augment our expanded

border security initiatives with

vigorous interior enforcement and

administration of our immigration

laws in a manner that serves the

national interest. This effort will include

greater cooperation and coordination

between DHS’s operational

components, which are responsible

for administering immigration ben-


DHS Secretary Kelly: “Ending the Crisis: America’s Borders and the Path to Security

efits and enforcing our nation’s existing

immigration laws.

Within DHS and our Federal,

State, local, and international partners,

we must expand our vetting

of those seeking to enter our country—particularly

of those individuals

from high-risk countries—including

refugees. We

currently lack a comprehensive

strategy

with uniform screening

standards to prevent

terrorists from

entering the country.

Unfortunately, our

country has recently

admitted some foreign nationals

without an adequate understanding

of their allegiances and intentions.

Additionally, because they are apprehended

by DHS law enforcement

agents, we know there continue to

be any number of so-called “special

interest aliens” that make their way

into our country illegally each year.

Last year, over 415,816 migrants,

mostly from Central America and

Mexico—including over 137,614

unaccompanied children and individuals

travelling in family units—

were apprehended on our southern

border. Many of those arriving at

our southern border have fled violence,

poverty, criminal networks,

and gangs in their native countries.

Border security requires a layered approach

that extends far beyond our shores, throughout

the hemisphere, in partnership with our

neighbors to the south and north.

20

While the vast majority are fleeing

violence or seeking economic opportunity,

a small number of individuals

could potentially be seeking

to do us harm or commit crimes.

Regardless of purpose or circumstance,

the ease with which human

smugglers have moved tens of thousands

of people to our nation’s doorstep

also serves as another warning

sign: these smuggling routes are a

potential vulnerability of our homeland.

Our vigorous response to these

threats must include increased border

security infrastructure, personnel,

and technology. However, we

cannot just play defense in securing

our borders. Border security

requires a layered approach that

extends far beyond our shores,

throughout the hemisphere, in partnership

with our neighbors to the

south and north.

Along nearly 7,000 miles of land

border, approximately 95,000 miles

of shoreline, and at 328 ports of entry

and numerous locations abroad,

U.S. Customs and Border Protection

(CBP) has a critical role in preventing

the illegal entry of people and

goods into the United States.

Across the wide expanses of our

nation’s land, air, and maritime environments,

CBP has worked to

address the changing

demographics

of attempted border

crossers and to

maintain border security

through significant

investments

in enforcement resources,

technology,

infrastructure, and enhanced

operational tactics and strategy.

Through advances in detection capabilities,

such as fixed, mobile,

and agent-portable surveillance

systems, tethered and tactical aerostats,

unmanned aircraft systems,

and ground sensors, which work

in conjunction with tactical border

infrastructure and agent deployment,

CBP is enhancing its ability

to quickly detect, identify, and respond

to illegal border crossings.

At our nation’s air, land, and sea

ports of entry, more travelers and

cargo are arriving than ever before.

To maintain the security of growing

volumes of international travelers,

CBP performs a full range of inspec-


tion activities and continues to enhance

its pre-departure traveler vetting

systems and integrate biometric

technologies. CBP has also made

significant developments in its intelligence

and targeting capabilities

to segment and target shipments

and individuals by potential level of

risk to identify and stop potentially

dangerous travelers or cargo before

boarding an aircraft or conveyance

bound for the United States.

Beyond managing the influx of

people and cargo arriving in the

United States, CBP is working with

other DHS agencies to strengthen

its capabilities to identify foreign

nationals who have violated our immigration

laws, as well as to track

suspect persons and cargo exiting

the country. CBP is also leveraging

its newly-established Counter Network

Program, which focuses on

detecting, disrupting, and dismantling

transnational criminal organizations,

by expanding information

sharing, increasing partnerships

and collaboration that enhance

border security, conducting joint

exploitation of intelligence, and comanaging

of operations with interagency

and international partners.

These efforts are building toward a

safer and more secure border environment,

one that supports the

safety and success of each agent and

21

officer in the field.

In the maritime environment,

the U.S. Coast

Guard (USCG) utilizes

a multi-faceted layered approach

to interdict threats far from

the borders of our nation to combat

the efforts of transnational criminal

organizations. Targeting the primary

flow of illicit drug traffic has a direct

and damaging impact on these

networks.

Successful Coast Guard interdictions

in the maritime transit zones

feed a cycle of success—subsequent

prosecutions lead to actionable intelligence

on future events, which

produces follow-on seizures and additional

intelligence. Suspects from

these cases divulge information

during prosecution and sentencing

that is critical to indicting, extraditing,

and convicting drug kingpins

and dismantling these sophisticated

networks.

USCG secures the maritime domain

by conducting patrols and

coordinating with other federal

agencies and foreign countries to

interdict aliens at sea, denying them

illegal entry via maritime routes to

the United States, its territories and

possessions. Thousands of aliens attempt

to enter this country illegally

every year using maritime routes,

many via smuggling operations. Interdicting

these aliens at

sea reduces the safety risks

involved in such transits.

Interdicted aliens can

be quickly returned to their

countries of origin, avoiding the

costlier processes required if they

successfully enter the United States.

Interagency and International

Cooperation

As Secretary, I will advocate for expanding

cooperation inside the interagency

and with partner nations,

particularly Canada and Mexico.

Interagency relationships and bilateral

cooperation are critical to identifying,

monitoring, and countering

threats to U.S. national security and

regional stability. While DHS possesses

unique authorities and capabilities,

we must enhance and leverage

our coordination with federal,

state, local, and tribal partners. The

magnitude, scope, and complexity

of the challenges we face—illegal

immigration, transnational crime,

human smuggling and trafficking,

and terrorism—demand an integrated

counter-network approach.

Regionally, we must continue to

build partner capacity. Illegal immigration

and transnational organized

crime threaten not only our

own security, but also the stability

and prosperity of our Latin Ameri-


DHS Secretary Kelly: “Ending the Crisis: America’s Borders and the Path to Security

can neighbors. In Colombia, for

example, we learned that key principles

to defeating large cartels and

insurgents are the same as defeating

criminal networks: a strong, accountable

government that protects

its citizens, upholds the rule of law,

and expands economic opportunity

for all. It taught us that countering

illicit trafficking and preventing terrorism

often go hand-in- hand, and

that U.S. interagency cooperation,

coupled with a committed international

partner, can help bring a

country back from the brink. I believe

these lessons can be applied

across our many international partnerships,

and in furtherance of our

government’s many missions beyond

our borders.

Presently, we have a great opportunity

in Central America to

capitalize on the region’s growing

political will to combat criminal

networks and control hemispheric

migration. Leaders in many of our

partner nations recognize the magnitude

of the tasks ahead and are

prepared to address them, but they

need our support. As we learned in

Colombia, sustained engagement

by the United States can make a real

and lasting difference.

Conclusion

The security challenges facing DHS

and our nation are considerable,

particularly along the southern border.

We have the laws in place to secure

our borders. We also have outstanding

men and women working

at DHS, and in other federal, state,

local, and tribal law enforcement

agencies, who are committed to the

border security mission. Finally, we

now have a clear mission objective

and the will to complete that mission

successfully. We must accelerate

our collective efforts to enforce

the laws on the books and support

those sworn to uphold the law. You

have my commitment to work tirelessly

to ensure that the men and

women of DHS are empowered do

their jobs.

I believe in America and the principles

upon which our country and

way of life are guaranteed, and I

believe in respect, tolerance, and

diversity of opinions. I have a profound

respect for the rule of law and

will always strive to preserve it. As

I mentioned in my confirmation

hearing, I have never had a problem

speaking truth to power, and I

firmly believe that those in power

deserve full candor and my honest

assessment and recommendations.

As Secretary, I recognize the

many challenges facing DHS and I

will do everything within my ability

to meet and overcome those chal-

22

lenges, while preserving our liberty,

upholding our laws, and protecting

our citizens.

Thank you again for the opportunity

to appear before you today and

for your continued support of DHS.

I am confident that we will continue

to build upon the momentum generated

as a result of our previous operational

achievements around the

world. I remain committed to working

with this Committee to forge a

strong and productive relationship

going forward to secure our borders

and help prevent and combat

threats to our nation.

I would be pleased to answer any

questions.


GSN’s 2017 Airport/Seaport/Border Security Awards

Opening for Entries on March 15 with Many New Categories

All Winners in this program are entitled to

a Full-Page Advertisement (8.5” x 9.0”) in

your choice of GSN’s Digital Magazine or

Leaderboard in any edition of the Airport,

Seaport, Rail, Border Security Weekly

Newsletter.

NEW IN 2017:

CLICK HERE TO

SUBMIT A NOMINATION

All Finalists are entitled to a Half-Page

Advertisement (8.5” x 4.5”) in your choice

of GSN’s Digital Magazine or Leaderboard

in any edition of the Airport, Seaport, Rail,

Border Security Weekly Newsletter.

Adrian Courtenay

Managing Partner, CEO

Government Security News

917-696-5782

acourtenay@gsnmagazine.com

Steve Bittenbender

Managing Editor

Government Security News

502-552-1450

sbittenbender@gsnmagazine.com

Gerry O’Hara

Designer

OHDesign3

203-249-0626

gerry@ohd3.com


Salient CRGT Announces Definitive Agreement

to Acquire Information Innovators, Inc.

FAIRFAX, VA – February 6, 2017

– Salient CRGT, Inc. (“Salient

CRGT”), a leading provider of agile

software development, data analytics,

mobility, cyber security, and

infrastructure solutions, today announced

that it has signed a definitive

agreement for the acquisition

of Springfield, VA-based Information

Innovators, Inc. (“Triple-i”), a

technology and missionfocused

company serving

the federal government,

with particular strength

in the healthcare information

technology (“IT”) arena. The

agreement is expected to close within

the first quarter of 2017. Salient

CRGT is backed by two private equity

firms, Bridge Growth Partners,

LLC and Frontenac Co, and Triple-i

is backed by DFW Capital Partners.

The transaction combines two

highly complementary businesses.

Triple-i has spent the past 16 years

building and delivering a full suite of

next generation solutions, including

healthcare IT services, enterprise IT

solutions, cloud services and agile

development capabilities focused

on the needs of customers within

federal healthcare, civilian, national

security, and defense markets. With

the acquisition, Salient CRGT will

increase its revenues to more than

$500 million, solidifying the company’s

position in the mid-tier federal

IT services market and allowing

it to effectively compete with largescale

professional services providers

while maintaining its agile, innovative,

quality-driven, and customercentric

approach.

24

“Salient

CRGT’s acquisition

of Triple-i directly supports

the company’s long-term growth objectives

to create a premier mid-tier

agile software development, data

analytics, cyber security and mobility

solution and services company.

By combining the ingenuity, creativity,

and commitment of Salient

CRGT and Triple-i employees, we

will be able to deliver expanded services

to our existing customers and

offer compelling solutions to new

customers,” said Brad Antle, Chief

Executive Officer, Salient CRGT.

“Now positioned firmly in this midtier

market segment, Salient CRGT

will compete more successfully and

profitably in the federal IT market

space with notable new capabilities

in healthcare IT and consulting, IT

infrastructure, network engineering

and operations management, and

cloud-based technologies.”

“This exciting transaction is a strategic

step forward for Salient CRGT

that is consistent with the goals we

set together with our private equity

partners Bridge Growth

and Frontenac, when

we decided to merge Salient

and CRGT in 2015.

Triple-i has supported 11

out of the 15 cabinet-level federal

departments to design, implement,

sustain and manage their IT and

healthcare services requirements,”

said Tom Ferrando, President of

Salient CRGT. “By combining their

experience and our network, this

acquisition expands Salient CRGT’s

portfolio of high-profile agencies,

including Health and Human Services,

Department of Veterans Affairs,

Defense Health Agency, and

Department of Homeland Security

while adding important contracts to

our portfolio, including VA T4NG,


CMS SPARC, GSA PSS, and US-

AMRAA TEAMS, among others.”

Commenting on the strategic

nature of the acquisition, Steve

Ikirt, President and Chief Executive

Officer of Triple-i said, “Over

the years, there have been several

companies interested in having

Triple-i become part of their

team. We determined that Salient

CRGT had the strength of management,

clear strategic direction,

proven financial performance,

and the right mix of capabilities

and customers to be an ideal fit

for Triple-i. With Salient CRGT,

we will be even better positioned

to serve our customers’ needs with

a broader and more diverse set of

services.”

Terms of the transaction were not

disclosed. RBC Capital Markets and

Sagent Advisors served as Salient

CRGT’s financial advisors, and KippsDeSanto

& Co. served as Triplei’s

financial advisor. Willkie Farr &

Gallagher LLP and Garvey Schubert

Barer served as legal advisor for

Salient CRGT. Holland & Knight

served as legal advisor for Triple-i.

About Salient CRGT

Salient CRGT provides agile software

development, data analytics,

mobility, cyber security and infrastructure

solutions. We support

these core capabilities with full lifecycle

IT services and training—to

Enterprise IT

Ensuring technology platforms are secure,

efficient, and reliable.

help our customers meet critical

goals for pivotal missions. We are

purpose built for IT transformation

supporting federal civilian, defense,

homeland, and intelligence agencies,

as well as Fortune 1000 companies.

We use the most innovative

talent delivery model in the industry,

scientifically providing exactly

the right people for the customers’

most pressing requirements. Salient

CRGT has earned a record of success

with integration and operations

of large‐scale, high‐volume solutions.

For additional information

on Salient CRGT, visit www.salientcrgt.com.

About Information Innovators, Inc.

Information Innovators Inc. (Triple-i)

delivers solutions and services

to IT and health-focused clients

across the federal government. The

25

Company defines, develops, and

implements innovations that help

solve its customers’ hardest problems

while saving them money,

modernizing their systems, and

achieving their mission objectives.

Triple-i serves federal departments

including Health and Human

Services, Veterans Affairs,

Homeland Security, Defense,

Commerce, Transportation, Education,

Housing and Urban Development,

and the Intelligence

Community through its core capabilities—enterprise

IT services,

cloud and hosting solutions, cyber

security, software development and

implementation, data and analytics,

and health services. For more information,

visit www.iiinfo.com.

About Bridge Growth Partners

Bridge Growth Partners, LLC brings

together significant investment,

financial, operating and strategic

business building expertise and talent

for the purpose of investing in

carefully selected, growing and important

segments of the technology

and technology-enabled financial

services sectors. For more information,

visit www.bridgegrowthpartners.com.

About Frontenac

Frontenac is a leading private equity

More on page 42


Federal experts agree that ‘Internet of Things’

demands simple baked-in security

By Tom O’Keefe

As the federal government

begins to

incorporate mobile

devices and the Internet

of Things

(IoT), security must

be “baked in,” not “sprinkled on” as

an afterthought to avoid hacking.

That’s the verdict from experts

in government and the contractor

community, who recently met for

a panel discussion on “Uniting Cybersecurity,

Mobility and the Internet

of Things” at immixGroup’s annual

government summit on federal

budgeting.

The risk of cyber attack through

IoT-enabled devices made headlines

late last year when a highprofile

internet-monitoring and

traffic-routing company was hacked

in a distributed denial of service

(DDOS) attack. A simple malware

called Mirai infected consumer

DVRs, flooding the company with

millions of bogus information requests.

The company’s servers were

overwhelmed, temporarily knocking

out some of the nation’s most

visited websites.

Old security precautions

don’t fit IoT

Among federal agencies, current

security requirements don’t necessarily

fit in the new IoT environment.

According to Jose Padin,

sales engineering director,

Federal Civilian & SI for Citrix, the

fed’s approach to security “doesn’t

always translate into consumerbased

electronics.”

The answer is for government organizations

to develop or purchase

new mobile and IoT solutions with

security built in, said Michael Theis,

with the CERT Insider Threat Center

Software Engineering Institute.

“I don’t think anyone’s really widely

codified how you go about making

sure that things are secure from the

beginning,” said Theis.

Padin noted that hardware, firmware

and software for IoT-enabled

products is “the wild west.” He said

government must add security controls

into procurement processes

for these devices. He also acknowledged

that industry must make investments

in applying these requirements

to all devices, rather than

creating government versions.

26

Bad actors, Padin said, “realize

that the weakest link is the consumer.”

By building security provisions

to products from the start, consumers

will no longer be a vulnerability

when they buy IoT-enabled appliances.

At a more technical level, the challenge

for government is to have the

appropriate identity management

requirements for mobility and IoT,

according to Donna Dodson, director

of the IT laboratory and chief

cybersecurity advisor for NIST. A

personal identity verification card,

for example, “works nicely in a laptop

or desktop but in a mobile device,

not so much.”

“The end users really matter here,”

Dodson said. “We need to give them

answers that are easy for them to

do the right thing, hard to do the

wrong thing and easy to back up if

the wrong thing is done.” It’s important

to think about identity management

in the IoT space, she added.

In many cases that may start “at

the silicon level,” said Ashish Parikh,

vice president of software and solutions

at Arrow’s systems integration

business. Silicon vendors are

More on page 41


Farpointe warns access control channel to suggest customers

add anti-hacking measures, as Federal Trade Commission is

now insisting on cyber security protection

SUNNYVALE, CA – February

14, 2017 – Farpointe Data, the access

control industry’s trusted

global partner for RFID solutions,

is notifying its access control manufacturers,

distributors, integrators

and dealers that hacking of access

control systems has become a threat

far bigger than most think. Protecting

their end-users from hackers is

imperative for channel partners.

“The U.S. federal government

suffered a staggering 61,000 cybersecurity

breaches, that it knows of,

last year alone,” reports Farpointe

Data President Scott Lindley. “Several

recent events highlight the importance

of why the access control

channel must work with their customers

to deal with accelerating

hacking attacks.”

According to Lindley, the most

important is that the U.S. Federal

Trade Commission (FTC) has decided

that it will hold the business

community responsible for failing

to implement good cyber security

practices and is now filing lawsuits

against those that don’t. An appeals

court has backed its lawsuit against

the hotel chain operator Wyndham

Worldwide for not protecting

consumers’ information and, just

recently, the FTC filed a lawsuit

against D-Link and its U.S. subsidiary,

alleging that it used inadequate

safeguards on its wireless routers

and IP cameras that left them vulnerable

to hackers.

“Prospective penalties go beyond

FTC threats, though,” Lindley

warns. “A luxury hotel in Austria,

the Romantik Seehotel Jaegerwirt,

recently had to pay hackers a ransom

after they managed to access

its electronic key system and lock all

the hotel guests in their rooms. Approximately

180 people were staying

at the hotel on that day. Many

were locked in their rooms, while

others were locked out of theirs. The

hackers demanded €1,500, about

$1,600. The hotel decided to pay, explaining

that they felt that they had

no other choice, especially because

neither police nor insurance could

help them.”

Adding to the problem, states

Lindley, is that Wiegand, the industry

standard over-the-air protocol

commonly used to communicate

credential data from a card to an

27

electronic

access

reader, is

no longer

inherently

s e c u r e

due to its

original

obscure

and non-standard nature.

For this reason, Farpointe has introduced

features such as potting all

readers and options that can be added

to the readers. The first is MAX-

Secure, which provides a higher-security

handshake, or code, between

the proximity or smart card, tag and

reader to help ensure that readers

will only accept information from

specially coded credentials. The second

is Valid ID, a new anti-tamper

feature available with contactless

smartcard readers, cards and tags.

It can add an additional layer of

authentication assurance to NXP’s

MIFARE DESFire EV1 smartcard

platform, operating independently,

in addition to, and above the significant

standard level of security that

DESFire EV1 delivers. Valid ID lets

More on page 40


Varex Imaging completes separation from Varian

Medical Systems, Lists on Nasdaq Stock Market

SALT LAKE CITY, UT – January 30,

2017 – Varex Imaging Corporation

(Nasdaq: VREX) today announced

that its spin-off from Varian Medical

Systems (NYSE: VAR) has been

successfully completed. The common

stock of Varex Imaging, a new

independent public company, will

begin trading “regular way” today

on the Nasdaq Global Select Market

under the ticker symbol “VREX”.

Under the terms of the previously

announced separation, Varian

stockholders received 0.4 of a share

of Varex stock for every one share of

Varian stock they held as of the record

date of January 20, 2017. Varex

shares were distributed at 12:01 am

Pacific Time on January 28, 2017 in

a distribution that is intended to be

tax-free for U.S. federal income tax

purposes. Varex has approximately

38 million shares outstanding.

In connection with the separation,

Varex made a $200 million cash payment

to Varian. Varex funded this

payment and related expenses from

its $300 million revolving credit facility.

The balance of undrawn funds

remain available to fund working

capital needs and other general corporate

purposes.

Varex Imaging Corporation is the world’s largest independent supplier of medical X-ray tubes

and image processing solutions.

28

“The past few months have been

very busy as we prepared for the

spin-off of Varex Imaging and also

announced the planned acquisition

of the Medical Imaging business of

PerkinElmer,” said Sunny Sanyal,

President and Chief Executive Officer

of Varex Imaging. “Much of our

time recently has been filled with

meetings, calls and roadshow presentations

with the investor and analyst

community. Overall, the past

year has been an exciting time for us

and I want to thank all the people

at Varian and Varex who devoted so

much time and effort to make the

separation a success,” Sanyal added.

Varex Management

The new President and Chief Executive

Officer of Varex Imaging is

Sunny Sanyal (previously President

of the Varian Imaging Components

business). The new Chief Financial

Officer is Clarence Verhoef (previously

Varian Corporate Controller).

The new General Counsel and

Corporate Secretary is Kim Honeysett

(previously Vice President and

Assistant General Counsel and Assistant

Corporate Secretary for Varian).


Varex Board Members

• Dr. Ruediger Naumann-Etienne

is Chairman of the Board of Varex

Imaging Corporation. He has

been the Owner and Managing

Director of Intertec Group, an in

vestment company specializing in

the medical device field, since

1989.

• Sunny Sanyal is Varex’s President

and Chief Executive Officer.

• Christine A. Tsingos has been

the Chief Financial Officer of

Bio-Rad Laboratories, Inc. a

global provider of life science

research and clinical diagnostic

products, since 2002.

• Dow R. Wilson is President and

Chief Executive Officer of Varian

Medical Systems.

• Dr. Erich R. Reinhardt is

currently the Chairman of the

Board of Medical Valley

Europaische Metropol Region in

Nürnberg in Germany. Previously,

he was President and Chief

Executive Officer of Siemens

Healthcare (formerly

Siemens Medical Solutions).

• Jay K. Kunkel is Senior Vice

President and President, Asia-

Pacific Operations of Leer

Corporation. He has extensive

experience in Asia that includes

his current role and previous

senior management positions

with Continental A.G. and SRP

International Group Ltd.

Additional information about Varex’s

management, board of directors

and corporate governance can be accessed

via the Investors section of the

company’s website at www.vareximaging.com.

As previously disclosed, Varex expects

revenues for fiscal year 2017

to grow by 3-4 percent over the approximately

$620 million recorded

for fiscal year 2016 as set forth in the

company’s Form 10 filing with the

SEC. Assuming approximately 38

million shares outstanding and a 35

percent tax rate, Varex anticipates

that GAAP net earnings per diluted

share for the second through the

fourth quarters of fiscal year 2017

will be in the range of $1.20 to $1.30.

Going forward Varex will provide

annual guidance.

Varex intends to file a 10-Q for

the first quarter of fiscal year 2017

approximately at the end of February

2017. Prior to the filing of Varex’s

10-Q, Varian is expected to file

financial information related to the

discontinued operations of its Imaging

Components business that is

not anticipated to be comparable to

the financial information included

in Varex’s Form 10.

J.P. Morgan Securities LLC and

Wachtell, Lipton, Rosen & Katz acted

as the respective financial and legal

advisors in connection with the

separation.

29

About Varex Imaging

Varex Imaging Corporation is a

leading innovator, designer and

manufacturer of X-ray imaging

components, which include tubes,

digital flat panel detectors and other

image processing solutions, which

are key components of X-ray imaging

systems. Varex’s components are

used in medical imaging as well as

in industrial and security imaging

applications. With a 65+ year history

of successful innovation, global

OEM manufacturers of X-ray imaging

system use the company’s X-ray

sources, digital detectors, connecting

devices and imaging software

as components in their systems to

detect, diagnose and protect. Varex

employs approximately 1,400 people

located at manufacturing and

service center sites in North America,

Europe, and Asia. For more information

about Varex, visit www.

vareximaging.com.

Varex Imaging Corporation is the

world’s largest independent supplier

of medical X-ray tubes and image

processing solutions. From medical

imaging, to cargo screening and

border security, our components are

used by X-ray imaging system manufacturers

everywhere to detect, diagnose,

and protect.


Hot Topics: More opinions on Immigration

New memos reveal harsh and unforgiving immigration road

map, taking nation backwards in guaranteeing due process and

providing safe havens, as Department of Homeland Security

implements President Trump’s immigration Executive Orders

By Beth Werlin

The White House released the

implementation memos and other

information on Monday about

how the Department of Homeland

Security (DHS) will begin

implementing President Trump’s

immigration Executive Orders

on border security and immigration

enforcement. The memos

reveal that DHS intends to take

our nation backwards in terms of

guaranteeing due process, providing

a safe haven for those who

need it, and building productive

and safe communities where everyone

can thrive.

What is in the memos?

An end to long-standing protections

for children. DHS intends

to strip many children

arriving alone at our border of

basic protections and to penalize

their parents for seeking to

reunite with their children in

the United States. They will do

this by narrowing

the definition

of “unaccompanied

alien child”

in order to limit

those protections

and by launching

either civil or

criminal enforcement

against the

parents. This will

result not only in scaring parents

from coming forward to reunite

with their children but also lead

to more young children representing

themselves in immigration

court against a seasoned

government attorney.

A massive expansion of detention.

The memos contemplate

a massive expansion of detention,

including a requirement

that DHS officers detain nearly

everyone they apprehend at or

near the border. This detention

space expansion—a boon to the

private prison industry—means

30

Photo: Chucky Eager

that more children, families and

other vulnerable groups seeking

protection in the United States

will end up detained, at great financial

and human cost.

Prosecution priorities and discretion

are gone. The new memos

rescind earlier policies on

whom to prosecute and deport

and whom to deprioritize because

they pose no threat to our

communities. The new enforcement

priorities are extremely

broad covering nearly all undocumented

individuals in the

More on page 42


Supreme Court hears case on shooting of 15-year

old Sergio Hernandez by U.S. Border Patrol Agent

By Walter Ewing

Officers with U.S. Customs and Border

Protection (CBP)—the federal

agency which includes the Border

Patrol—are rarely held accountable

for their actions. Nowhere is this

more apparent than in the case of

Sergio Hernandez, a 15-year-old

boy shot dead in 2010 in Mexico by

a Border Patrol agent who fired on

him from the U.S. side of the border.

The agent in question has never

faced criminal charges for the

killing. The boy’s mother brought

a civil suit against the agent for

damages, and her case was argued

before the Supreme Court on February

21.

The central question before the

Court is whether a federal court

has the authority to consider a

civil suit such as this. The Court

will determine, then, whether the

agent must stand trial to account

for his deadly conduct. But this case

will have ramifications well beyond

the actions of one Border Patrol

agent because his actions represent

a systemic lack of accountability

within CBP.

Rather than fix the system, the

Trump administration is proposing

to throw gasoline on the fire; adding

thousands of new CBP officers to

the mix without doing anything to

ensure that the rights of the people

whom CBP encounters are respected.

The results could well prove fatal

to more immigrants, regardless of

which side of the border they find

themselves on.

The Hernandez case is egregious

in a number of ways. According to

the brief filed by his family, Sergio

was playing with two friends just

over the border from El Paso in

Juarez. As is common among the

children of Juarez, Sergio and his

companions were running up the

31

side of a concrete culvert and touching

that 18-foot-high border fence

before running back down. Since

they were playing and not trying to

enter the United States, they did this

in plain view of the Paso del Norte

Port of Entry.

Needless to say, they were unarmed.

Nevertheless, a Border Patrol

agent named Jesus Mesa took

exception to this behavior and

grabbed one of the boys as they ran

back down the culvert. Mesa then

drew his weapon and fired down

into the culvert, hitting Sergio in

the head. Mesa claimed that Sergio

was throwing rocks at him.

Because Sergio was standing in

Mexico when Mesa killed him, the

U.S. government is claiming that

Mesa cannot be sued for violating

Sergio’s rights.

If the Supreme Court sides with

Photo: Pete Jordan

Mesa in this case, it is tantamount

to declaring open season on anyone

standing on the wrong side of

the U.S.-Mexico borderline. Then

again, it was already a declaration

of open season when no criminal

charges were filed against Mesa. In

More on page 44


Hot Topics: More opinions on Immigration

Abandoning priorities will make immigration

enforcement work much harder

Photo: t3hWIT

By Mary Giovagnoli

The Trump administration ensured

this week that its immigration

enforcement policies will be

a chaotic affair marked by mistakes,

civil rights violations and

overzealous enforcement. They

did this by outlining measures

that they claim simply return

power to immigration agents to

do their jobs—measures such as

authorizing the hiring of thousands

more border and interior

enforcement officers, eliminating

targeted priorities for removal,

and creating an aggressive

plan to deputize local law

enforcement.

Significantly,

the administration also rescinded

virtually all guidance on the

use of prosecutorial discretion.

In the short-term, this dramatic

rescission of guidance leaves

officers with no framework for

decision-making, except the

vague idea that their mission is

to deport as many unauthorized

immigrants as possible. In the

long-term, it turns the authority

to arrest, detain, and deport individuals

into a type of unchecked

power that once unleashed is

hard to pull back and is bound to

create chaos.

One of the defining measures

of the Obama administration’s

Priority Enforcement Program

was discretion. Over the

years, officers were given

a set of enforcement priorities

that emphasized

the removal of persons

convicted of serious

crimes, or who were national

security threats,

or who had recently

crossed the border. The

memos categorized enforcement

priorities not to

32

keep officers from doing their

job, but to ensure that officers

had guidance that gave them a

framework for using their resources

and making good choices

about individual cases based

on more than just the authority

to arrest and detain someone.

The November 2014 memos

issued by former Secretary Jeh

Johnson emphasized that even

within these priority categories

there were reasons why an individual

case might merit a decision

to decline to prosecute.

These memos and others emphasized

the favorable exercise of

discretion—in other words, the

need to triage cases, starting first

with the nature of the violation

(is this person a convicted killer

or a jaywalker?) and then walking

progressively through other factors

such as whether this person

was a victim of domestic abuse,

or an asylum seeker, or had U.S.

citizen children. The goal was

to ensure that limited resources

were used to remove those who

posed a threat to safety or securi-

More on page 42


“Expedited removal” of noncitizens called for

in President’s January 25 executive order

President Trump’s January

25, 2017, executive

order directs the Department

of Homeland Security

(DHS) to dramatically

expand the use of

“expedited removal.” Created

in 1996, expedited

removal is a process by

which low-level immigration

officers can quickly

deport certain noncitizens

who are undocumented or

have committed fraud or misrepresentation.

Since 2004, immigration

officials have used expedited removal

to deport individuals who arrive

at our border, as well as individuals

who entered without authorization

if they are apprehended within

two weeks of arrival and within 100

miles of the Canadian or Mexican

border.

One of the major problems with

expedited removal is that the immigration

officer making the decision

virtually has unchecked authority.

Individuals subject to expedited

removal rarely see the inside of a

courtroom because they are not afforded

a regular immigration court

hearing before a judge. In essence,

the immigration officer serves both

as prosecutor and judge. Further,

given the speed at which the process

takes place, there is rarely an opportunity

to collect evidence or consult

with an attorney, family member, or

friend before the decision is made.

Such a truncated process means

there is a greater chance that persons

are being erroneously deported

from the United States, potentially

to imminent harm or death. Moreover,

individuals who otherwise

might qualify for deportation relief

if they could defend themselves

in immigration court are unjustly

deprived of any opportunity to do

so. Yet expedited removal has been

33

increasingly applied in

recent years; 44 percent

of all removals from the

United States were conducted

through expedited

removal in Fiscal Year

(FY) 2013, the most recent

government data available.

A dramatic expansion,

as directed by President

Trump, might result

in thousands of additional

deportations without due process.

What the Law Says

“Expedited removal” refers to the

legal authority given to even lowlevel

immigration officers to order

the deportation of some non-U.S.

citizens without any of the dueprocess

protections granted to most

other people—such as the right to

an attorney and to a hearing before

a judge. The Illegal Immigration

and Immigrant Responsibility Act

of 1996 created expedited removal,

but the federal government subsequently

expanded it significantly.

As it now stands, immigration officers

can summarily order the removal

of nearly any foreign national


Hot Topics: More opinions on Immigration

who arrives at the border without

proper documents; additionally, undocumented

immigrants who have

been in the United States 14 days or

less since entering without inspection

are subject to expedited removal

if an immigration officer encounters

them within 100 miles of the

U.S. border with either Mexico or

Canada. As a general rule, however,

DHS applies expedited removal to

only those Mexican and Canadian

nationals with histories of criminal

or immigration violations, as well as

persons from other countries who

are transiting through Mexico or

Canada. There is no right to appeal

an immigration officer’s decision to

deport someone via expedited removal.

Individuals in expedited removal

are detained until removed.

By law, expedited removal may

not be applied to certain individuals.

U.S. citizens or lawful permanent

residents (LPRs, or “green

card” holders) should not be subject

to expedited removal. Nor should

it be used against refugees, asylees,

or asylum seekers (people who fear

persecution in their home countries

or indicate an intention to apply for

asylum).

Asylum seekers are instead referred

to an asylum officer for an

interview to determine if they have

a “credible fear” of persecution. If

an individual has been previously

deported, an asylum officer determines

if the person has a “reasonable

fear” of persecution—a higher

standard than “credible fear.” If the

asylum officer fails to find that the

person has a credible or reasonable

fear of return, that person is ordered

removed. Before deportation, the

individual may challenge the asylum

officer’s adverse finding by requesting

a hearing before an immigration

judge, who must review the

case “to the maximum extent practicable

within 24 hours, but in no

case later than 7 days….” The judge’s

review is limited solely to assessing

whether the individual’s fear is credible

or reasonable.

Individuals found to have a credible

or reasonable fear of persecution

are detained pending further

review of their asylum case. In limited

circumstances, these individuals

may be paroled—that is, released

from detention—and permitted to

remain in the United States while

their asylum case is pending.

Until January 2017, an exception

to expedited removal had been

made for “an alien who is a native

or citizen of a country in the Western

Hemisphere with whose government

the United States does not

have full diplomatic relations and

who arrives by aircraft at a port of

34

entry.” Cubans arriving by aircraft

had been exempted from expedited

removal under this provision, but in

the closing days of the Obama administration,

DHS published a regulation

eliminating Cuban nationals

from the exemption.

Use of Expedited Removal

Is on the Rise

The use of expedited removal to deport

people has risen substantially

over the past two decades. In FY

2013, approximately 193,000 persons

were deported from the United

States through expedited removal.

That represents 44 percent of all

438,000 removals from the United

States in 2013

CONCERNS ABOUT

EXPEDITED REMOVAL

Erroneous Deportations

There are few checks on the authority

of immigration officers to place

non-citizens in expedited removal

proceedings. In essence, the law

permits the immigration officer to

serve both as prosecutor (charged

with enforcing the law) and judge

(rendering a final decision on the

case). Generally, the entire process

consists of an interview with the inspecting

officer, so there is little or

no opportunity to consult with an

attorney or to gather any evidence


that might prevent deportation. For

those who are traumatized from

their journey or harm they fled,

the short timelines can make it extremely

difficult to clearly explain

why they need protection in the

United States.

The abbreviated process increases

the likelihood that a person who is

not supposed to be subject to expedited

removal—such as a U.S. citizen

or LPR—will be erroneously removed.

Moreover, individuals who

otherwise would be eligible to make

a claim for “relief from removal”

(to argue they should be permitted

to stay in the United States) may be

unjustly deprived of any opportunity

to pursue relief. For example, a

witness or victim of a crime might

be eligible for status but is prohibited

from making such a claim in

expedited removal proceedings.

Inadequate Protection

of Asylum Seekers

In practice, not all persons expressing

a fear of persecution if returned

to their home countries are provided

a credible or reasonable fear screening.

Studies by the U.S. Commission

on International Religious Freedom

(USCIRF) noted that, in some cases,

immigration officers pressured

individuals expressing fear into

withdrawing their application for

admission—and thus their request

for asylum—despite DHS policies

forbidding the practice. In other

cases, government officers failed to

ask if the arriving individual feared

return. In addition, the Commission

found that the government did

not have sufficient quality assurance

mechanisms in place to ensure that

asylum seekers were not improperly

being turned back.

A Growing Backlog of

Asylum Applications

Individuals expressing fear of return

who are diverted from expedited

removal are referred to asylum officers

for screening. These officers

are often the same corps handling

affirmative asylum applications (i.e.,

cases filed by individuals not in removal

proceedings). Since these

asylum seekers are detained pending

completion of the credible or

reasonable fear process, their cases

are prioritized by the government.

Asylum Office resources are therefore

diverted to these interviews,

contributing to the backlog of affirmative

asylum cases.

Further expansion of expedited

removal will require significantly

more asylum officers, or the backlog

of affirmative asylum cases will

continue to grow. This workload

management crisis could be avoided

35

entirely if DHS personnel placed all

asylum seekers apprehended at the

border in regular immigration court

proceedings and paroled them

pending their hearings. Providing

the immigration court system with

enough funds to sufficiently staff

immigration judge teams would

help ensure that asylum seekers get

a prompt court hearing.

FREE SUBSCRIPTION

SIGN-UP

Monthly Digital Edition

Airport/Seaport Newsletter

Daily Insider Newsletter

Cybersecurity Newsletter

CLICK HERE


Expansion of DMARC is critical to reducing spread of

malicious emails, says Global Cyber Alliance, calling on

leading Cyber companies to improve email protections

SAN FRANCISCO, CA – February

14, 2017 – There is a fix that can prevent

a great amount of email-born

attacks on consumers and businesses.

Unfortunately, the vast majority

of public and private organizations

globally, including leading

cybersecurity companies, have not

deployed DMARC (Domain-based

Message Authentication, Reporting

& Conformance) to prevent

spammers and phishers from

using an organization’s name to

conduct cyber attacks, according

to new research from the Global

Cyber Alliance (GCA).

DMARC provides insight into

any attempts to spam, phish or

spear-phish using an organization’s

brand or name. DMARC is supported

by 85 percent of consumer

email inboxes in the United States

(including Gmail, Yahoo, Microsoft,

etc.) and more than 2.5 billion

email inboxes worldwide. However,

DMARC adoption rates among enterprises

and government remains

low.

The UK Government’s guidance

for government agencies directs

them to implement DMARC but

as of December 2016 only five percent

of UK public sector domains

had done so. A mere 16 percent of

the healthcare sector has adopted

DMARC.

The latest research from GCA, an

international cross-sector organization

dedicated to confronting systemic

cyber risk, finds that adoption

remains low in the cybersecurity industry

as well.

Only 15 percent of the 587 email

domains (that were scanned) for

companies exhibiting at the RSA

Conference -- one of the world’s

largest gatherings of cybersecurity

experts -- use DMARC. Of the

90 RSA exhibiting organizations

that do use DMARC, more than

66 percent use the DMARC policy

of “none,” which only monitors for

email domains, greatly reducing the

effectiveness of DMARC.

36

It is time for the cybersecurity industry

to lead the charge and push

for DMARC use across the globe.

GCA strongly advocates that organizations

implement DMARC and

has developed a free DMARC Setup

Guide to make DMARC implementation

easier (https://dmarc.globalcyberalliance.org/).

The value of correctly implementing

DMARC is clear as studiesiii

have shown that organizations

that use DMARC correctly receive

just 23 percent of the email

threats that those who do not

use DMARC.

“As world leaders in cybersecurity,

we can do better. DMARC protects

brands and preserves consumer

confidence. While no security effort

is cost-free, clear guidance and

tools, such as the GCA DMARC

Setup Guide, make DMARC implementation

practical, and the benefits

are considerable. DMARC is

one of the cybersecurity protocols

that can broadly reduce risk, and the

more it is implemented, the more

protection if offers for everyone,”

said Philip Reitinger, President and


CEO of GCA. “I’m placing a stake

in the ground and calling on the

cybersecurity industry to lead the

adoption of DMARC, with a goal

that 50 percent of the companies

that exhibit at the 2018 RSA Conference

implement DMARC prior

to the conference, and that 90 percent

implement prior to the 2019

RSA Conference. Working together

the cybersecurity industry can be a

role model and make a difference.”

About The Global Cyber Alliance

The Global Cyber Alliance (GCA)

is an international, cross-sector effort

dedicated to confronting cyber

risk and improving our connected

world. It is a catalyst to bring communities

of interest and affiliations

together in an environment that

sparks innovation with concrete,

measureable achievements. While

most efforts at addressing cyber risk

have been industry, sector, or geographically

specific, GCA partners

across borders and sectors. GCA’s

mantra “Do Something. Measure It.”

is a direct reflection of its mission to

eradicate systemic cyber risks.

GCA, a 501(c)3, was founded in

September 2015 by the Manhattan

District Attorney’s Office, the City

of London Police and the Center

for Internet Security. Learn more at

www.globalcyberalliance.org.

Milestone release, enabling

record-breaking performance for

XProtect users, delivers highest

performing VMS ever, complete with

new Cybersecurity focus.

COPENHAGEN – February 15,

2017 – Milestone Systems, the open

platform company in networked

video management software (VMS),

has released XProtect 2017 R1.

Milestone is committed to delivering

three VMS product releases every

year, in addition to bi-monthly

device pack releases supporting

third-party devices. This frequent

release schedule will ensure Milestone’s

rapid response to market and

Milestone community needs.

Highest VMS Performance

Thanks to the true open platform

technology in XProtect, Milestone

can rapidly respond to community

needs and enable cost-efficiency in

large installations. For XProtect,

this entails a recording server performance

of 3.1 Gigabit/S. This high

performance level enables Milestone

community partners to offer

large solutions using a reduced

number of servers, or even smaller

servers. This contributes to hardware

costs savings and a simplified

37

infrastructure. In short, it significantly

reduces the total cost of a

Milestone solution.

Pioneering Hardware Acceleration

In the latest XProtect releases, Milestone

has harvested the advantages

of the close

relationships

with Intel and

Microsoft by

implementing

hardware acceleration.

The

processor-intensive

task of

decoding (rendering)

video is

offloaded to the

Bjorn Skou Eilertsen

CTO

dedicated graphics system (GPU)

inside the processer, leaving the

main processor free to take on other

tasks. The GPU is optimized to handle

computer graphics and video,

meaning these tasks will be greatly

accelerated. Using the technology in

servers can save even more expen-

More on page 43


Facial biometric boarding solution by

Vision Box being tried at Schipol Airport

AMSTERDAM, February 10th,

2017 – Boarding quickly and easily

without showing your boarding

pass or passport is the goal of the

biometric boarding trial in operation

at Schiphol Airport. Involving

KLM, the three-month initiative

intends to test facial recognition to

expedite and speed up passenger

boarding, recognizing them by their

face.

At a specially selected gate at the

airport, a dedicated kiosk was made

available for passengers to register

for the trial, by scanning their passport

and their boarding pass, as well

as enroll their face image. This will

allow them to quickly go through a

biometric eGate simply looking at a

camera, without showing any document.

Vision-Box and Schiphol have

been working together in the scope

of the recently announced framework

agreement, developing innovations

and creating smart ways of

improving ease of travel, speed, and

airport processes. As the airport

aims to become “Leading Digital

Airport” in 2018, Vision-Box was

the partner allowing one further

step in that direction.

It is expected that after the trial,

biometric boarding will roll out to

more boarding gates at the airport.

About Vision-Box

Founded in 2001, Vision-Box is

the leading provider of electronic

identity solutions, intelligent security

management, and automated

border control systems that use

ICAO- compliant standards.

The biometric border control

portfolio aimed at airports, airlines

and immigration authorities, includes

solutions addressing a variety

of business scenarios which englobe

38

security check-points, self-boarding

gates and automated border control

gates.

Every second, millions of images

are being captured and processed

by Vision-Box systems, installed

right at the heart of the most prestigious

organizations, who trust our

biometric identity and digital video

management solutions for their

critical applications.

Covering the entire ID management

life cycle, Vision-Box also

delivers, to governments and issuing

authorities, solutions ranging

from live biometric enrollment stations,

document verification kiosks

and digital document dispensers.

Starting with the process of identity

enrollment, covering the life cycle

of a biometric identity document

and finally assuring its verification

and identification towards the user,

Vision-Box’s product portfolio is

linked together through a powerful

service platform, which orchestrates

the trusted chain of identity of the

citizen. Vision-Box’s solution portfolio

enables the implementation

of advanced border management

systems, integrated with advanced

More on page 43


Statement from Secretary Kelly on recent

ICE enforcement actions

WASHINGTON, DC – February

14 – Last week, U.S. Immigration

and Customs Enforcement (ICE)

launched a series of targeted enforcement

operations across the

country. These operations targeted

public safety threats, such as convicted

criminal aliens and gang

members, as well as individuals who

have violated our nation’s immigration

laws, including those who illegally

re-entered the country after

being removed and immigration fugitives

ordered removed by federal

immigration judges.

ICE officers in the Los Angeles,

Chicago, Atlanta, San Antonio and

New York City areas of responsibility

arrested more than 680 individuals

who pose a threat to public safety,

border security or the integrity

of our nation’s immigration system.

Of those arrested, approximately 75

percent were criminal aliens, convicted

of crimes including, but not

limited to, homicide, aggravated

sexual abuse, sexual assault of a minor,

lewd and lascivious acts with

a child, indecent liberties with a

minor, drug trafficking, battery, assault,

DUI and weapons charges.

ICE conducts these kind of targeted

enforcement operations regularly

and has for many years. The focus

of these enforcement operations is

consistent with the routine, targeted

arrests carried out by ICE’s Fugitive

Operations teams on a daily basis.

President Trump has been clear

in affirming the critical mission of

DHS in protecting the nation and

directed our Department to focus

on removing illegal aliens who have

violated our immigration laws, with

a specific focus on those who pose

a threat to public safety, have been

charged with criminal offenses,

have committed immigration violations

or have been deported and reentered

the country illegally.

I commend the heroic efforts of

the dedicated officers of ICE’s Office

of Enforcement and Removal

Operations and those who provided

assistance from ICE Homeland Security

Investigations, the U.S. Marshals

Service, as well as cooperating

state and local law enforcement

agencies. These professionals put

their lives on the line to protect our

communities and country. There is

no greater calling than to serve and

protect our nation – a mission that

the men and women of ICE perform

39

with professionalism and courage

every single day.

Fact Sheets

• 190 arrested in Georgia, the

Carolinas, during ICE operation

targeting criminal aliens, illegal

re-entrants and immigration

fugitives

• 235 arrested in six Midwestern

states during ICE operation

targeting criminal aliens, illegal

re-entrants, and immigration

fugitives

• ICE arrests 161 in Los Angelesarea

operation targeting criminal

aliens, illegal re-entrants, and

immigration fugitives

• 41 arrested in New York-area ICE

operation targeting criminal

aliens, illegal re-entrants, and

immigration fugitives

• 28 arrested in San Antonio-area

ICE operation targeting criminal

aliens, illegal re-entrants, and

immigration fugitives

ICE Fugitive Enforcement Operations


Cyberbit’s EDR Platform to help

Infor detect Malware that bypasses

antivirus

Continued from page 4

how Cyberbit maximizes protection

against today’s signature-less

threats, visit www.cyberbit.net.

About Infor

Infor builds business software for

specific industries in the cloud.

With 15,000 employees and over

90,000 customers in more than 170

countries, Infor software is designed

for progress. To learn more about Infor,

please visit www.infor.com.

Farpointe warns access control

channel to suggest customers add

Anti-Hacking measures

Continued from page 27

a smartcard reader effectively help

verify that the sensitive access control

data programmed to a card or

tag is not counterfeit.

“With the increasing incidences

of hacking throughout the world

and the fact that the FTC is now reviewing

such cyber security lapses

should make channel partners providing

access control products and

systems take notice and suggest

anti-hacking solutions to their customers,”

Lindley argues.

British air traffic control provider

tabs Rohde & Schwarz

Continued from page 16

and sustainable air traffic control

in line with the highest safety standards.

Rohde & Schwarz is a proven

provider on the market offering the

ability to create virtual control centres.

The electronics firm meets this

challenge with the R&S VCS-4G IP

based voice communications system.

The fully VoIP-based system

in line with the EUROCAE ED-137

B standard features a distributed,

redundant architecture. It will link

the control centres in Swanwick

and Prestwick and provide the geographic

flexibility to manage their

operations as one operational environment

in the future.

Rohde & Schwarz is participating

in the World ATM Congress 2017

in Madrid. From March 7 to 9, the

company will showcase its comprehensive

portfolio for state-of-the-art

air traffic management at booth 586,

hall 9. More information: https://atc.

rohde-schwarz.com.

About Rohde & Schwarz

The Rohde & Schwarz electronics

group is a leading supplier of solutions

in the fields of test and measurement,

broadcasting, secure

communications, and radiomonitoring

and radiolocation. Founded

80 years ago, this independent global

company has an extensive sales

network and is present in more than

40

Law suits challenge “Muslim Ban”

executive order

Continued from page 10

6-year-old Somali son is also in limbo.

Ms. Ali, a U.S. citizen, began the

process to bring him to the United

States in August 2016. But they too

now are left to worry that the visa

process will remain suspended indefinitely.

Like thousands before them, these

plaintiffs have diligently pursued the

rigorous immigrant visa process,

which includes paying hundreds

of dollars in filing fees, undergoing

security screenings and medical examinations,

and attending an interview

before a consular officer.

The arbitrary and unfair nature

of the ban will be difficult to defend

in court. There are multiple challenges

afoot and likely many more

to come as the President seeks to

close America’s doors to the rest of

the world.

70 countries. It has around 9300 employees

and achieved a net revenue

of EUR 1.9 billion (USD 2.5 billion)

in fiscal year 2012/2013 (July 2012

through June 2013). The company is

headquartered in Munich, Germany.

R&S ® is a registered trademark

of Rohde & Schwarz GmbH & Co.

KG


AMICO Security Launches Next

Generation ANC Composite Fence

System

Continued from page 17

fence system is fire retardant and

corrosion resistant. Laboratory testing

of leakage current and flashover

voltage shows the ANC fence system

revealed no electrical conductivity

for up to 650,000 volts.

About AMICO Security

AMICO security is an industry

leader in manufacturing medium

to high security perimeter systems.

AMICO has been in business

for over 76 years and our patented

proprietary systems protect infrastructure

and boarders throughout

the world. The new AMIGUARD

perimeter system is the gold standard

for perimeter protection and

is rapidly becoming the number one

choice for infrastructure protection

worldwide.

Federal Experts Agree that

‘Internet of Things’ Demands

Simple Baked-In Security

Continued from page 26

becoming concerned with identity

and maintaining a “chain of custody

to the device, to the network, to the

solution,” to ensure appropriate access.

The cloud’s role

in IoT development

When it comes to application development

incorporating mobility and

IoT, panelists concurred that the

cloud offers a means of shortcutting

the process, with minimal risk to security.

Government versions of the

cloud are usually more secure than

enterprise offerings, which allows

people to focus on solving their

problem, rather than on building

out infrastructure, said Parikh.

“When we talk about IoT and you

say, ‘Yes, I’m going to build it from

the sensor all the way up to the

cloud and I’m going to have all that

in my agency,’ good luck. We’ll see

you in a couple of decades and you’ll

be left behind,” Parikh noted.

Padin agreed that the cloud offers

a more practical environment

for the coming wave of IoT applications.

IoT sensors, Padin said,

generate “tons of data,” and it isn’t

“realistic” to house that data in an

on-premise system.

41

What’s more, the data generated

by IoT devices ties back to mobility,

Padin said. “We have this great

pool of data, what do we do with it?

People want access to it in real-time,

but how?” Mobility can provide active

alerting to take action on data

in real-time, extended to the mobile

device. “All of this is interconnected,”

he said. “It’s a system that needs

to be thought about completely.”

Despite concerns about security,

panelists agreed that there is huge

upside potential to IoT for government

applications.

“These are really quite exciting

times,” said Dodson. “The changes

we will see in this nation in the next

10 years will really dwarf what we

saw with the IT revolution.”

BIO: Tom O’Keefe

is a consultant with

immixGroup, an

Arrow company

that helps technology

companies

do business with

the government. Tom focuses on IT

trends in civilian agencies, as well

as the Internet of Things and mobility.

He can be reached at Tomas_

Okeefe@immixgroup.com, or connect

with him on LinkedIn at www.

linkedin.com/in/tmokeefe.


Abandoning priorities will make

immigration enforcement work

much harder

Continued from page 32

ty, or in the case of recent border

crossers, whose unauthorized

presence undermined efforts to

secure the border. At each step

of the way, the emphasis was on

assessing individual equities.

Balancing equities is hard

work, and the series of memos

issued from 2010 to 2014 on

enforcement priorities and the

exercise of discretion were attempts

to ensure that people did

the hard work of individually

reviewing and thinking through

the implications of each case.

Many officers will continue to

make their decisions to arrest

and detain based on a belief that

exercising favorable discretion is

part of their job. But some, especially

those who didn’t like the

idea that they were being told

how to prioritize their work, may

not do so. In fact, some will see

it as their duty and obligation to

arrest everyone, no matter the

compelling circumstances. And

that is what can lead to chaos.

Does guidance serve as a constraint

on power? Of course, but

that isn’t a bad thing. Everyone

needs guidance to do their jobs,

especially when their jobs have

Salient CRGT Announces

Agreement to Acquire

Information Innovators, Inc.

Continued from page 25

firm based in Chicago. The firm focuses

on investing in lower middle

market buyout transactions in the

food, industrial, and services industries.

Frontenac works in partnership

with proven operating leaders,

through our executive-centric approach

called CEO1st®, to identify,

acquire, and build market leading

companies through transformational

acquisitions and operational

excellence. The firm has built a leading

franchise working with over 225

owners of mid-sized businesses, almost

always families or founders,

as they address complex transition

issues of liquidity, management enhancement,

and growth planning.

For more information, please visit

www.frontenac.com.

life and death implications for

others. By stripping away much,

if not all, of the guidance of the

last eight years, and offering

nothing in its place, DHS just

made its officers’ jobs harder,

not easier.

42

New memos reveal harsh and

unforgiving immigration road

map as DHS implements President

Trump’s Executive Orders

Continued from page 30

United States. They even include

individuals simply charged or

suspected of having committed

crimes.

Creation of a deportation force.

The memos order the hiring of

5,000 additional Customs and

Border Protection (CBP) agents

and 10,000 additional Immigration

and Customs Enforcement

(ICE) agents. They direct a massive

expansion of 287(g)—a law

that allows DHS to deputize state

and local law enforcement officers

to perform the functions

of immigration agents. And,

they reinstate Secure Communities

and terminate the Priority

Enforcement Program, which

expand the ways in which local

police collaborate with ICE. This

approach will have devastating

consequences for immigrant

communities and undermine

public safety rather than make

our nation more secure.

Plans to bypass immigration

courts and short-circuit due

process. The memos indicate

that many people in the interior

of the country – not just those at

the border – could be subject to

expedited deportation without


going before a judge, the details

of which DHS said will be forthcoming

in a notice in the Federal

Register. This expansion of “expedited

removal,” will allow the

government to bypass the backlogged

immigration courts in order

to deport people rapidly and

with little-to-no due process.

While the feasibility of many of

these policies depends on Congressional

willingness to fund

them and whether they pass

muster in the courts, undeniably,

these policies are thin on humanity

and thick on punishment.

They will separate families, cultivate

fear among immigrant

communities, and destabilize

our economy.

Facial biometric boarding solution

by Vision Box being tried at

Schipol Airport

Continued from page 38

digital video analytics solutions, intelligent

biometric and biographic

data management engines and danger

management functionalities.

Vision-Box operates over 1200

Automated Border Control solutions

in more than 70 international

airports and has over 3000 electronic

identity systems deployed across

the globe. www.vision-box.com

Milestone release delivers highest

performing VMS ever for XProtect

users

Continued from page 37

sive computer muscle.

Hardware-accelerated video motion

detection is new in XProtect

2017 R1 - another industry first for

VMS software. Customers can have

twice as many cameras on the same

server with the same CPU load, or

experience up to 90 percent reduction

in the CPU load with the same

number of cameras on the server*.

This use of hardware acceleration

lets mid- to large-scale installations

experience improved performance

at a lower hardware cost.

Hardware acceleration was already

implemented in the XProtect

2016 Smart Client. This provided an

80 percent reduction in the processor

load on computers with selected

Intel processors, firmware, drivers

and Microsoft operating systems.

This paves the way for the use of 4K

cameras and processing-intensive

video compressions like H.265.

New Cybersecurity Features

As video management systems are

becoming more and more businesscritical,

cybersecurity is a natural

focus. In 2016, Milestone launched

several initiatives aimed at strengthening

security in Milestone software.

Like the Hardening Guide that

details how an XProtect installation

43

can be better secured against cyber

threats and the Kerberos strict userverification

in XProtect.

The XProtect 2017 R1 update includes

several security enhancements

for improved cybersecurity,

including two-step verification and

greater control when granting user

permissions for the Milestone Advanced

VMS products.

Two-step verification is an industry-first

security feature for

XProtect 2017 R1. It is designed to

prevent unauthorized access to the

VMS when a password is compromised,

as a code from the user’s mobile

phone is needed to complete

login.

Keeping VMS systems isolated

from the Internet is one important

element when it comes to keeping a

high security level. XProtect Smart

Maps (introduced last year) now include

support for OpenStreetMap

offline maps: This means that customers

with offline installations can

take advantage of improved situational

awareness by using maps,

without exposing their XProtect

system to online threats.

“We take cybersecurity very seriously.

Milestone is constantly adding

security features to XProtect

software and helping the Milestone

community focus on VMS security,”

Eilertsen says.

XProtect 2017 R1 is available to

the Milestone community now.


Supreme Court hears case on

shooting of 15-year old by U.S.

Border Patrol Agent

Continued from page 31

short, this is an extreme example of

a system lacking even the most basic

mechanisms of accountability.

And now, the Trump administration’s

Executive Order and subsequent

implementation memo on

border security and immigration

enforcement would amount to a

“surge” of 5,000 new Border Patrol

agents with very few checks on

their behavior in dealing with any

non-U.S. citizen, particularly if that

non-citizen has the misfortune to be

standing in Mexico. Moreover, the

drive to grab every unauthorized

immigrant in sight without regard

for any reasonable enforcement priorities—as

reflected in the Executive

Order—is a recipe for the use of

excessive force.

Pouring more resources and personnel

into a dysfunctional system

is not going to make that system

any more functional. It’s just going

to create an even bigger dysfunctional

system. CBP—and the Border

Patrol in particular—is already

out of control. Even in cases where

CBP officers injure or kill someone,

they rarely suffer any serious

consequences. This case speaks to

a broader, systemic problem within

CBP—an organizational culture in

which anything goes.

GSN’s 2017

Airport/Seaport/Border Security Awards

Opening for Entries on March 15 with Many New Categories

All Winners in this program are

entitled to a Full-Page Advertisement

(8.5” x 9.0”) in your choice of GSN’s

Digital Magazine or Leaderboard in

any edition of the Airport, Seaport,

Rail, Border Security Weekly

Newsletter.

Adrian Courtenay

Managing Partner, CEO

Government Security News

917-696-5782

acourtenay@gsnmagazine.com

NEW IN 2017:

CLICK HERE TO

SUBMIT A NOMINATION

All Finalists are entitled to a Half-

Page Advertisement (8.5” x 4.5”) in

your choice of GSN’s Digital Magazine

or Leaderboard in any edition of the

Airport, Seaport, Rail, Border Security

Weekly Newsletter.

Steve Bittenbender

Managing Editor

Government Security News

502-552-1450

sbittenbender@gsnmagazine.com

Gerry O’Hara

Designer

OHDesign3

203-249-0626

gerry@ohd3.com

44


The News Leader in Physical, IT and Homeland Security

CEO/Editorial Director

Adrian Courtenay

917-696-5782

acourtenay@gsnmagazine.com

Editor

Steve Bittenbender

502-552-1450

sbittenbender@gsnmagazine.com

Senior Writer

Karen Ferrick-Roman

412-671-1456

karenferrickroman@gmail.com

Columnist

Shawn Campbell

Campbell on Crypto

shawn.campbell@safenetat.com

Columnist

George Lane

Hazmat Science & Public Policy

georgelane@hotmail.com

Contributing Author

Lloyd McCoy Jr

Immix Group

Contributing Author

Walter Ewing

Contributing Author

Wendy Feliz

Contributing Author

Joshua Breisblatt

Contributing Author

J. Michael Barrett

Contributing Author

Christopher Millar

Gatekeeper Security

Art Director

Gerry O’Hara, OHDesign3

gerry@ohd3.com

203-249-0626

Production Manager

Brenden Hitt

Brenden.hitt@gsnmagazine.com

Direct: 203-216-7798

COMING ATTRACTIONS

March

Late News

Tech Focus

Perimeter Protection,

Intrusion Detection

Market Sector

Border Security & Immigration

April

Late News

Tech Focus

Law Enforcement,

Public Safety

Market Sector

Cybersecurity Threats,

Solutions

45

More magazines by this user
Similar magazines