20.03.2017 Views

Government Security News February 2017 Digital Edition

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

<strong>Government</strong> <strong>Security</strong> <strong>News</strong><br />

FEBRUARY <strong>2017</strong> DIGITAL EDITION<br />

Photo: Peg Hunter<br />

Outpouring of American and foreign citizens mobilize against President’s<br />

“Executive Order” to ban refugees from U.S. for four weeks and Muslim<br />

nationals for 90 days – Page 8<br />

Also in this issue:<br />

Law suits challenge “Muslim Ban” executive order, citing Constitutional guarantee of equal protection – Page 10<br />

More than 75% of crypto ransomware in 2016 came from Russian-speaking Cybercriminal underground – Page 6


NEWS<br />

GSN <strong>February</strong> <strong>2017</strong> <strong>Digital</strong><br />

4<br />

6<br />

10<br />

11<br />

17<br />

18<br />

26<br />

26<br />

27<br />

28<br />

36<br />

Cyberbit’s ERD platform to help Infor detect malware<br />

that bypasses anti-virus<br />

More than 75% of crypto ransomware in 2016 came<br />

from Russian-speaking cybercriminal underground<br />

Law suits challenge “Muslim Ban” executive order,<br />

citing Constitutional guarantee of equal protection<br />

Chuck Brooks named winner of “Cybersecurity<br />

Marketer of the Year” Excellence Awards<br />

Amico <strong>Security</strong> launches next generation ANC<br />

composite fence system, receives M5.0 security rating<br />

Written testimony of DHS Secretary John F. Kelly for a<br />

House Committee on Homeland <strong>Security</strong> titled “End the Crisis:<br />

America’s Borders and Path to <strong>Security</strong>”<br />

Salient CRBT announces definitive agreement to acquire<br />

Information Innovators, Inc<br />

Federal experts agree that “Internet of Things”<br />

demands simple baked-in security<br />

Farpoint warns access control channel to suggest<br />

customers add anti-hacking measures, as Federal<br />

Trade Commission is now insisting on Cybersecurity protection<br />

Varex Imaging completes separation from<br />

Varian Medical Systems, lists on Nasdaq Stock Market<br />

Expansion of DMARC is critical to reducing<br />

spread of malicious emails, says Global <strong>Security</strong><br />

Alliance, calling on Cyber companies to improve protections<br />

2


<strong>Edition</strong> Table of Contents<br />

37<br />

38<br />

39<br />

Milestone release, enabling record-breaking performance for Xproduct users,<br />

delivers highest performing VMS ever, complete with new Cybersecurity focus<br />

Facial biometric boarding solution by Vision Box being tried at Schipol Airport<br />

Statement from Secretary Kelly on recent ICE enforcement actions<br />

FEATURES<br />

SPECIAL REPORT ON AIRPORT/AVIATION SECURITY<br />

13<br />

First 777-300ER in United’s fleet christened the “New Spirit<br />

of United”<br />

14<br />

15<br />

16<br />

Passenger advocacy group lists concerns before<br />

airline CEO’s meet with President Trump<br />

Southwest and NetJets Pilots urge President Trump to reverse NAI Foreign<br />

Carrier Permit<br />

British air traffic control provider tags Rohde and Schwarz<br />

for second voice system<br />

HOT TOPIC: OPINIONS ON IMMIGRATION<br />

30<br />

New Memos reveal harsh and unforgiving immigration road map, taking<br />

national backwords in guaranteeing due process and providing safe havens<br />

31<br />

32<br />

33<br />

Supreme Court hears case on shooting of 15-year old Sergio Hernandez by<br />

U.S. Border Patrol agent<br />

Abandoning priorities will make immigration enforcement<br />

work much harder<br />

“Expedited Removal” on noncitizens called for<br />

in President’s January 25 executive order<br />

3


Cyberbit’s EDR platform to help Infor detect<br />

malware that bypasses antivirus<br />

AUSTIN, TX – <strong>February</strong> 9th, <strong>2017</strong><br />

– Cyberbit, whose cybersecurity<br />

solutions protect the world’s most<br />

sensitive systems, today announced<br />

it was awarded a contract from Infor<br />

for the supply of Cyberbit’s security<br />

platform for its own internal usage.<br />

Infor selected Cyberbit for its significant<br />

experience, technical acumen,<br />

and outstanding customer<br />

references, and is pleased to have<br />

Cyberbit complement its detection<br />

capability in this increasingly complex<br />

environment of Cyber threats.<br />

Cyberbit’s EDR platform uses a<br />

signature-less approach, proven to<br />

detect unknown threats that bypass<br />

antivirus and next-generation endpoint<br />

security platforms, while minimizing<br />

false positives. The EDR<br />

platform continuously records millions<br />

of low-level endpoint events<br />

across the network and rapidly correlates<br />

traces of malicious activity<br />

to verify an attack within seconds.<br />

Once an attack is detected, the entire<br />

storyline is displayed, enabling<br />

the platform to respond or provide<br />

the analyst with the necessary information<br />

to investigate the attack.<br />

Cyberbit’s unique approach serves<br />

as an “analyst in a box” that expedites<br />

the process of identifying and<br />

hunting down threats. Analysts often<br />

work with fragments of the story<br />

based upon their knowledge and<br />

experience to seek traces of attacks<br />

buried in the data.<br />

Cyberbit’s EDR platform<br />

assists analysts<br />

by automating much<br />

of the hunting process<br />

leveraging behavioral<br />

analytics and machine<br />

learning, which often<br />

saves weeks of investigative<br />

effort.<br />

“We are excited to be working with<br />

Infor to complement their forwardthinking<br />

IT security strategy,” said<br />

Stephen Thomas, VP Sales at Cyberbit.<br />

“Innovative IT organizations<br />

such as Infor’s are adapting this proactive<br />

detection-based strategy and<br />

I look forward to supporting their<br />

organization.”<br />

4<br />

Additional resources<br />

• Request a demo of the Cyberbit<br />

Endpoint Detection and Response<br />

solution.<br />

• Learn about proactive hunting and<br />

endpoint control in this webinar.<br />

• Subscribe to Cyberbit’s blog.<br />

• Follow Cyberbit on Facebook,<br />

LinkedIn and Twitter<br />

(@CYBERBITHQ).<br />

About Cyberbit<br />

Created to protect the most highrisk<br />

organizations in the world, Cyberbit<br />

secures enterprises and critical<br />

infrastructure against advanced<br />

cyberthreats. The company’s battlehardened<br />

cybersecurity solutions<br />

detect, analyze and respond to the<br />

most advanced, complex and targeted<br />

threats. Cyberbit employs a<br />

formidable and diverse team from<br />

both the public and private sector,<br />

including Ph.D.s, hackers, former<br />

CISOs and SOC managers, as well as<br />

seasoned veterans of the intelligence<br />

and military communities. With offices<br />

worldwide, Cyberbit is a subsidiary<br />

of Elbit Systems Ltd. (NAS-<br />

DAQ: ESLT) and has more than 500<br />

personnel in the United States, Europe<br />

and Asia. To learn more about<br />

More on page 40


GSN’s <strong>2017</strong> Airport/Seaport/Border <strong>Security</strong> Awards<br />

Opening for Entries on March 15 with Many New Categories<br />

All Winners in this program are entitled to<br />

a Full-Page Advertisement (8.5” x 9.0”) in<br />

your choice of GSN’s <strong>Digital</strong> Magazine or<br />

Leaderboard in any edition of the Airport,<br />

Seaport, Rail, Border <strong>Security</strong> Weekly<br />

<strong>News</strong>letter.<br />

NEW IN <strong>2017</strong>:<br />

CLICK HERE TO<br />

SUBMIT A NOMINATION<br />

All Finalists are entitled to a Half-Page<br />

Advertisement (8.5” x 4.5”) in your choice<br />

of GSN’s <strong>Digital</strong> Magazine or Leaderboard<br />

in any edition of the Airport, Seaport, Rail,<br />

Border <strong>Security</strong> Weekly <strong>News</strong>letter.<br />

Adrian Courtenay<br />

Managing Partner, CEO<br />

<strong>Government</strong> <strong>Security</strong> <strong>News</strong><br />

917-696-5782<br />

acourtenay@gsnmagazine.com<br />

Steve Bittenbender<br />

Managing Editor<br />

<strong>Government</strong> <strong>Security</strong> <strong>News</strong><br />

502-552-1450<br />

sbittenbender@gsnmagazine.com<br />

Gerry O’Hara<br />

Designer<br />

OHDesign3<br />

203-249-0626<br />

gerry@ohd3.com


More than 75% of crypto ransomware in 2016<br />

came from the Russian-speaking cybercriminal<br />

underground<br />

SAN FRANCISCO, CA and Woburn,<br />

MA – <strong>February</strong> 13, <strong>2017</strong> –<br />

Out of 62 new crypto ransomware<br />

families discovered by Kaspersky<br />

Lab researchers in 2016, at least 47<br />

were developed by Russian-speaking<br />

cybercriminals. This findings<br />

and others are included in an overview<br />

of the Russian-speaking ransomware<br />

underground, conducted<br />

by Kaspersky Lab researchers. The<br />

review also highlights that small<br />

groups with limited capabilities are<br />

transforming into large criminal enterprises<br />

that have the resources and<br />

intent to attack private and corporate<br />

targets worldwide.<br />

Crypto ransomware – a type of<br />

malware which encrypts its victim’s<br />

files and demands a ransom in exchange<br />

for decryption – is one of<br />

the most dangerous types of malware<br />

today. According to Kaspersky<br />

Lab telemetry, in 2016 more than<br />

1,445,000 users (including businesses)<br />

around the globe were attacked<br />

by this type of malware. In the<br />

overview, one of the major conclusions<br />

is that the increase in crypto<br />

ransomware attacks observed in recent<br />

years is the result of a very flexible<br />

and user-friendly underground<br />

ecosystem, allowing criminals to<br />

launch crypto ransomware attack<br />

campaigns with almost any level<br />

of computer skills and financial resources.<br />

Kaspersky Lab researchers identified<br />

three levels of criminal involvement<br />

in the ransomware business:<br />

• The creation and update of<br />

new ransomware families<br />

• The development and support<br />

of affiliate programs<br />

distributing ransomware<br />

• The participation in affiliate<br />

programs as a partner<br />

The first type of involvement requires<br />

a participant to have advanced<br />

code-writing skills. The<br />

cybercriminals who create new ransomware<br />

strains are the most privileged<br />

members of the ransomware<br />

underground world, as they are the<br />

ones who create the key element of<br />

the whole ecosystem.<br />

On the second level of the hierarchy,<br />

there are the developers of<br />

the affiliate programs. These are the<br />

criminal communities which – with<br />

6<br />

the help of different additional tools,<br />

like exploit kits and malicious spam<br />

– deliver the ransomware issued by<br />

the malware creators.<br />

The partners of affiliate programs<br />

are on the lowest level of the whole<br />

system. Utilizing different techniques,<br />

they help the owners of affiliate<br />

programs to distribute the<br />

malware in exchange for a share of<br />

the ransom received by owners of<br />

the program. Only intent, a readiness<br />

to conduct illegal actions, and<br />

a couple of bitcoins are required for<br />

participants of affiliate programs to<br />

enter this business.<br />

According to Kaspersky Lab estimations,<br />

the overall daily revenue<br />

of an affiliate program may reach<br />

tens or even hundreds of thousand<br />

dollars, of which around 60 percent<br />

stays in the criminals’ pockets as net<br />

profit.<br />

Moreover, during their research<br />

into the underground ecosystem<br />

and multiple incident response operations,<br />

Kaspersky Lab researchers<br />

were able to identify several large<br />

groups of Russian-speaking criminals<br />

specializing in crypto ransomware<br />

development and distribution.


These groups may unite tens of different<br />

partners, each with their own<br />

affiliate program, and the list of<br />

their targets includes not only ordinary<br />

internet users, but also small<br />

and medium-sized companies and<br />

even enterprises. Initially targeting<br />

Russian and CIS users and entities,<br />

these groups are now shifting their<br />

attention to companies located in<br />

other parts of the world.<br />

“It is hard to say why so many<br />

ransomware families have a Russian-speaking<br />

origin. What is more<br />

important is that we’re now observing<br />

their development from small<br />

groups with limited capabilities<br />

to large criminal enterprises that<br />

have resources and the intent to<br />

attack more than just Russian targets,”<br />

said Anton Ivanov, security<br />

researcher at Kaspersky Lab, and<br />

the author of the overview. “We’ve<br />

seen something similar with financial<br />

malware groups, like Lurk. They<br />

also started with massive attacks<br />

on online banking users, and then<br />

evolved into sophisticated<br />

groups capable<br />

of robbing large<br />

organizations,<br />

like banks. Sun<br />

Tzu said: ‘If you<br />

know the enemy<br />

and know<br />

yourself, you<br />

need not fear<br />

the result of a<br />

hundred battles.’<br />

That’s why<br />

we’ve created<br />

this overview:<br />

ransomware<br />

gangs are turning<br />

into very powerful enemies,<br />

and for the public and the security<br />

community, it is really important we<br />

learn as much about them as possible.”<br />

Read more about how Russianspeaking<br />

underground ransomware<br />

ecosystem works on Securelist.com<br />

About Kaspersky Lab<br />

7<br />

Kaspersky Lab is a global cybersecurity<br />

company founded in 1997.<br />

Kaspersky Lab’s deep threat intelligence<br />

and security expertise is<br />

constantly transforming into security<br />

solutions and services to protect<br />

businesses, critical infrastructure,<br />

governments and consumers<br />

around the globe. The company’s<br />

comprehensive security portfolio<br />

includes leading endpoint protection<br />

and a number of specialized security<br />

solutions and services to fight<br />

sophisticated and evolving digital<br />

threats. Over 400 million users are<br />

protected by Kaspersky Lab technologies<br />

and we help 270,000 corporate<br />

clients protect what matters<br />

most to them. Learn more at www.<br />

kaspersky.com.<br />

FREE SUBSCRIPTION<br />

SIGN-UP<br />

Monthly <strong>Digital</strong> <strong>Edition</strong><br />

Airport/Seaport <strong>News</strong>letter<br />

Daily Insider <strong>News</strong>letter<br />

Cybersecurity <strong>News</strong>letter<br />

CLICK HERE


Outpouring of American and foreign citizens mobilize<br />

against President’s “Executive Orders” to ban refugees<br />

from U.S. for four weeks and Muslim nationals for 90 days<br />

By Michele Waslin<br />

In his first week as president, President<br />

Donald Trump unleashed a<br />

series of executive orders, thereby<br />

launching his first strikes against<br />

current and future immigrants and<br />

refugees. In response, thousands<br />

of Americans mobilized over the<br />

weekend, demonstrating against the<br />

President’s actions. Strong opposition<br />

continues to come from foreign<br />

leaders, Congressional leaders,<br />

government bureaucrats, business<br />

leaders, university presidents, and<br />

others.<br />

The far-reaching and highly problematic<br />

executive orders on “Border<br />

<strong>Security</strong> and Immigration Enforcement<br />

Improvement” and “Enhancing<br />

Public Safety in the Interior of<br />

the United States” seek to radically<br />

change immigration enforcement<br />

along the U.S.-Mexico border and<br />

throughout the entire country.<br />

Friday’s “Protecting the National<br />

from Terrorist Attacks by Foreign<br />

Nationals” is intended to halt all<br />

refugee admissions for at least four<br />

months and bans nationals from<br />

seven Muslim-majority countries<br />

from entering the U.S. for at least 90<br />

days. Additional executive orders<br />

are expected in the coming days and<br />

weeks.<br />

Given the immediate impact of<br />

the ban, Friday’s executive order<br />

resulted in a great deal of confusion,<br />

frustration, and anger across<br />

the country and around the world.<br />

When the executive order was made<br />

public, large protests erupted at the<br />

White House and at airports around<br />

the country, including large numbers<br />

of attorneys offering free legal<br />

assistance and Members of Congress<br />

leveraging pressure on immigration<br />

officials.<br />

On Friday night and Saturday, the<br />

first travelers from the seven banned<br />

countries arrived at U.S. airports<br />

and were detained by Customs and<br />

Border Patrol (CBP) agents. CBP<br />

had not been issued clear guidance<br />

as to how the executive order was<br />

to be implemented, and as a result,<br />

treatment of foreign nationals differed<br />

by airport.<br />

Among those detained and scheduled<br />

to be returned to their home<br />

8<br />

countries were returning green card<br />

holders who already live and work<br />

in the U.S., as well as first-time green<br />

card holders whose vetting was recently<br />

completed, and temporary<br />

visitors to the U.S. One detainee was<br />

Hameed Khalid Darweesh, who<br />

had worked with the U.S. military<br />

as an interpreter in Iraq. As confusion<br />

and frustration rose and family<br />

members worried about their<br />

detained loved ones, immigration<br />

lawyers went to the airports to represent<br />

those in detention.<br />

The ACLU, National Immigrant<br />

Law Center, and other legal organizations<br />

immediately challenged<br />

the executive order on behalf of<br />

Darweesh and others, and Saturday<br />

night a federal judge in the Eastern<br />

District of New York issued a nationwide<br />

stay of removal, preventing<br />

the Trump administration from<br />

deporting refugees and others who<br />

had lawful authority to enter the<br />

U.S. Similar lawsuits were filed in<br />

other cities: in Boston, the federal<br />

court prohibited the detention and<br />

removal of all those subject to the<br />

executive order but the order was


limited to Logan Airport; in Virginia,<br />

the federal court ordered the<br />

government to give attorneys access<br />

to all green card holders being detained<br />

and prohibit their removal,<br />

and; in Seattle, the court prevented<br />

the removal of plaintiffs subject to<br />

the seven-Muslim-majority country<br />

ban. However, there were reports in<br />

multiple cities that CBP was slow<br />

to comply with the nationwide<br />

and local court<br />

orders, even after the<br />

federal judge’s order was<br />

issued.<br />

Not until Sunday did<br />

the White House clarify<br />

that the order did<br />

not extend to returning<br />

green card holders.<br />

Despite other rumors<br />

about changes to the application<br />

of the policy,<br />

no further official guidance<br />

has been publicly<br />

released.<br />

Democratic and Republican<br />

Members of Congress have also denounced<br />

the Muslim ban. Senate<br />

Minority Leader Chuck Schumer<br />

called the executive order “meanspirited<br />

and un-American,” and said<br />

he would “claw, scrap, and fight with<br />

every fiber of my being until these<br />

orders are overturned.” Republican<br />

Senators McCain and Graham issued<br />

a joint statement saying “We<br />

fear this executive order will become<br />

a self-inflicted wound in the<br />

fight against terrorism.” Some also<br />

criticized the administration for<br />

failing to follow the regular protocols<br />

and consulting with the right<br />

people before issuing an executive<br />

order. “You have an extreme vetting<br />

proposal that didn’t get the vetting<br />

it should have had,” said Ohio Sen.<br />

Rob Portman.<br />

Opposition has appeared from<br />

within the government bureaucracy<br />

as well. Foreign Service officers<br />

from the department of State drafted<br />

a dissent memo in opposition to<br />

the refugee ban, claiming the policy<br />

“runs counter to core American values<br />

of nondiscrimination, fair play,<br />

and extending a warm welcome to<br />

foreign visitors and immigrants.<br />

Alternative solutions are available<br />

to address the risk of terror attacks<br />

9<br />

which are both more effective and<br />

in line with Department of State and<br />

American values.”<br />

Business leaders also condemned<br />

the Administration’s actions, explaining<br />

that the executive orders<br />

could make it more difficult for<br />

America’s companies to compete.<br />

Google ordered its employees traveling<br />

overseas to return to the U.S.<br />

immediately. Google<br />

says at least 187 foreign-born<br />

employees<br />

could be prevented<br />

from entering the<br />

Photo: John Taylor<br />

country. Twitter’s<br />

chief executive tweeted<br />

that the economic<br />

impact of the Muslim<br />

ban is “real and upsetting.”<br />

Netflix chief<br />

executive said that<br />

“Trump’s actions are<br />

hurting Netflix employees<br />

around the<br />

world, and are so un-<br />

American it pains us all…Worse,<br />

these actions will make America<br />

less safe (through hatred and loss of<br />

allies) rather than more safe.”<br />

Thus far, the opposition to Trump’s<br />

immigration agenda has been fast<br />

and furious and will likely continue<br />

as he continues to roll out additional<br />

immigration orders.


Law suits challenge “Muslim Ban” executive order<br />

citing Constitutional guarantee of equal protection<br />

and statutory prohibitions against discrimination<br />

By Mary Kenney<br />

The fallout continues from last<br />

week’s immigration executive order,<br />

which has been coined the “Muslim<br />

Ban.” Several lawsuits have been<br />

filed to challenge the executive order,<br />

including Ali v. Trump, on the<br />

grounds that it violates the Constitution’s<br />

guarantee of equal protection<br />

under the law and a statutory<br />

prohibition against discrimination.<br />

The American Immigration<br />

Council, Northwest Immigrant<br />

Rights Project, and the National<br />

Immigration Project of the National<br />

Lawyers Guild filed this nationwide,<br />

class action lawsuit in the District<br />

Court for the Western District of<br />

Washington on Monday, January 30.<br />

At issue in this lawsuit is Section<br />

3 of the executive order, through<br />

which President Donald Trump<br />

abruptly suspended immigrant visa<br />

processing for nationals of seven<br />

predominantly Muslim countries,<br />

and prohibited their entry into the<br />

United States. Section 3 violates<br />

Congress’ clear intent in Section<br />

202(a)(1) of the Immigration and<br />

Nationality Act to prevent<br />

discrimination in<br />

the issuance of immigrant<br />

visas “because of<br />

the person’s race, sex,<br />

nationality, place of<br />

birth, or place of residence.”<br />

It also violates Plaintiffs’<br />

constitutionally<br />

protected rights to<br />

family, marriage, and<br />

equal protection under<br />

the law. The lawsuit<br />

was filed on behalf of United States<br />

citizens and lawful permanent residents<br />

who have filed visa petitions<br />

for their close family members who<br />

are nationals of the seven countries.<br />

Reema Dahman, a lawful permanent<br />

resident of the United States,<br />

filed a petition to bring her 16-yearold<br />

son stranded in war-torn Syria to<br />

the United States. The two have not<br />

seen each other since 2012. They are<br />

now at the last stage of processing,<br />

waiting only for an immigrant visa<br />

interview to be scheduled. But the<br />

President’s executive order has suspended<br />

immigrant visa interviews,<br />

10<br />

Photo: Geoff Livingston<br />

putting safety and security further<br />

out of the boy’s reach and further<br />

delaying the boy’s reunification with<br />

his mother.<br />

Ms. Dahman described the moment<br />

she realized her separation<br />

from her son would continue by<br />

saying:<br />

“I’m heartbroken. Every day I am<br />

filled with anguish at what might<br />

become of my son, and this order<br />

just crushed my hopes that I could<br />

get him out of harm’s way anytime<br />

soon.”<br />

Juweiya Ali is also a plaintiff. Her<br />

More on page 40


Chuck Brooks named winner of “Cybersecurity<br />

Marketer of The Year” at the <strong>2017</strong> Cybersecurity<br />

Excellence Awards<br />

WASHINGTON, DC – Chuck<br />

Brooks, Vice President at<br />

Sutherland <strong>Government</strong> Solutions,<br />

and Chairman of The<br />

New Emerging Technologies<br />

Committee for CompTIA, was<br />

named winner of Cybersecurity<br />

Marketer of The Year at the<br />

<strong>2017</strong> Cybersecurity Excellence<br />

Awards.<br />

The <strong>2017</strong> Cybersecurity Excellence<br />

Awards recognize companies,<br />

products and individuals<br />

that demonstrate excellence,<br />

innovation and leadership in<br />

information security. The finalists<br />

and winners were selected<br />

based on the strength of their<br />

nomination and the popular<br />

vote by members of the Information<br />

<strong>Security</strong> Community<br />

(both ratings and comments).<br />

“Congratulations to Chuck<br />

Brooks for winning the Cybersecurity<br />

Marketer of the Year category<br />

in the <strong>2017</strong> Cybersecurity Excellence<br />

Awards,” said Holger Schulze,<br />

founder of the 350,000 member<br />

Information <strong>Security</strong> Community<br />

on LinkedIn which organizes the<br />

awards program. “With over 450<br />

entries, the <strong>2017</strong> awards are highly<br />

competitive. All winners and finalists<br />

reflect the very best in leadership,<br />

excellence and innovation in<br />

today’s cybersecurity industry.”<br />

Chuck’s thought leadership writings<br />

on cybersecurity have helped<br />

shape the public policy debate as he<br />

11<br />

is respected in industry, in the<br />

Federal <strong>Government</strong>, academia,<br />

and on Capitol Hill. He has been<br />

a force in discussing, advocating,<br />

promoting cybersecurity<br />

issues across digital media, at<br />

events, in professional forums,<br />

and with a variety of public policy<br />

organizations.<br />

He has been a leading evangelist<br />

for cybersecurity, homeland<br />

security, and emerging<br />

technologies in both the public<br />

and private sectors. He was selected<br />

by LinkedIn as “One of<br />

the Top 5 Tech People to Follow<br />

On LinkedIn” by LinkedIn. He<br />

has been a featured speaker at<br />

numerous events and conferences.<br />

He recently presented at<br />

a workshop sponsored by The<br />

National Academies of Sciences,<br />

Engineering, and Medicine and the<br />

Federal Bureau of Investigation on<br />

Securing Life Sciences Data. He recently<br />

spoke at George Washington<br />

University event about the Cyber<br />

Threat Spectrum, will be participating<br />

soon at USTRANSCOM Senior<br />

Leader Cyber <strong>Security</strong> Roundtable.


Chuck has authored numerous<br />

articles focusing on cybersecurity,<br />

homeland security and technology<br />

innovation for many publications<br />

including Forbes, Huffington Post,<br />

The Hill, Federal Times, IT <strong>Security</strong><br />

Planet, Bizcatalyst 360, Next Gov,<br />

Alien Vault, Gov<br />

Tech, MIT Sloan<br />

Blog, <strong>Government</strong><br />

<strong>Security</strong> <strong>News</strong>, and<br />

Brink. Chuck is a<br />

pioneer in social<br />

media with over<br />

32,000 followers<br />

on LinkedIn and a<br />

global following and<br />

has brought significant<br />

attention to cyber<br />

issues from his<br />

frequent posts and<br />

commentaries. He<br />

has been involved as a judge for the<br />

past four years as a Judge for <strong>Government</strong><br />

<strong>Security</strong> <strong>News</strong>’ Annual<br />

Homeland <strong>Security</strong> Awards.<br />

As a senior executive in government<br />

relations, marketing, and management,<br />

Chuck brings a unique experience<br />

from service in the public<br />

sector, academia, and industry. He<br />

serves on a variety of boards, many<br />

of them philanthropic. He brings a<br />

substantive knowledge on a broad<br />

range of cyber issues and a special<br />

subject matter expertise of cybersecurity<br />

and homeland security in<br />

government that have benefited<br />

both the not-for-profit, public, and<br />

commercial sectors.<br />

Chuck is one of the original<br />

“plank holders” at the Department<br />

of Homeland <strong>Security</strong> (DHS). Admiral<br />

Jay Cohen, former Under Secretary<br />

for Science & Technology at<br />

DHS stated “Chuck<br />

Brooks. as Director<br />

of Legislative Affairs<br />

at DHS, was<br />

INVALUABLE to<br />

me, the DHS S&T<br />

Directorate, DHS,<br />

the Nation AND<br />

Congress in making<br />

the “reformation”<br />

of DHS S&T<br />

a complete success.<br />

His Hill/DC acumen,<br />

insight, reliability,<br />

ability to<br />

develop highly effective congressional<br />

interaction/communications is<br />

WITHOUT PEER in my nearly 16<br />

years dealing with senior executive<br />

branch officials, industry, academia<br />

and the Congress.”<br />

Dexter Ingram, Senior Advisor to<br />

Interpol, said the following about<br />

Chuck “he is a consummate professional<br />

who has a deep understanding<br />

of the issues, process, and people<br />

involved in the world of homeland<br />

security and Law enforcement. His<br />

breadth of experience derived from<br />

working on The Hill, in government,<br />

in academia, in industry, and with<br />

12<br />

the media make him truly unique.”<br />

Chuck worked for many years<br />

on Capitol Hill for the late Senator<br />

Arlen Specter and covered national<br />

security, foreign affairs, and technology<br />

issues. He also was a member<br />

of the Adjunct Faculty at John<br />

Hopkins University where taught<br />

homeland security for two years.<br />

He has advised a multitude of organizations<br />

including the Bill & Melinda<br />

Gates Foundation, The Cyber<br />

Resilience Institute, and the Center<br />

for Advancing Innovation. He also<br />

serves as Chairman of CompTIA’s<br />

New and Emerging Technologies<br />

Committee, and is a member of the<br />

AFCEA Cybersecurity Committee.<br />

He is on the Board of Advisors<br />

for CyberTech, and on the Board<br />

of Directors at Bravatek, and the<br />

Cyber Resilience Institute. He is<br />

an advisor to R & D cybersecurity<br />

company Inzero Systems. He is a<br />

subject Matter Expert to The Homeland<br />

Defense and <strong>Security</strong> Information<br />

Analysis Center (HDIAC),<br />

a Department of Defense (DoD)<br />

sponsored organization through<br />

the Defense Technical Information<br />

Center (DTIC. Chuck also serves as<br />

a Christian Science Monitor “Passcode<br />

Influencers Panel member” on<br />

Information <strong>Security</strong>. He has a BA<br />

from DePauw University and an<br />

MA from the University of Chicago.


Airport/Aviation <strong>Security</strong><br />

First 777-300ER in United’s fleet christened<br />

the “New Spirit of United,” marking a new<br />

era of passion, service and innovation<br />

CHICAGO, IL – Jan. 17, <strong>2017</strong> /<br />

PR<strong>News</strong>wire/ – Next month, a<br />

brand-new United Airlines plane<br />

will push back from the gate with a<br />

new name: “New Spirit of United.”<br />

This special aircraft is also the company’s<br />

first Boeing 777-300ER featuring<br />

the United Polaris all-aisle<br />

access, lie-flat seat. It represents a<br />

commitment to the future and the<br />

commencement of an exciting new<br />

chapter for the company as it builds<br />

the best airline in the world.<br />

“This aircraft symbolizes the new<br />

spirit, the energy and enthusiasm<br />

that I have seen in our employees<br />

who take great pride in the work<br />

they are doing to take care of our<br />

customers and one another,” said<br />

Oscar Munoz, chief executive officer<br />

of United Airlines. “The new<br />

777-300ER fleet will play a crucial<br />

role in connecting our customers<br />

to far-away destinations and to the<br />

moments that matter most.”<br />

The “New Spirit of United” is exemplified<br />

by the significant progress<br />

the company made in operational<br />

reliability last year – achieving its<br />

best full-year on-time performance<br />

in company history, the<br />

elevated customer experience<br />

and the completion<br />

of new agreements<br />

with every domestic<br />

unionized work group<br />

in 2016. As United Airlines<br />

continues to build<br />

on this momentum, this<br />

new aircraft serves as a<br />

symbol of the hard work,<br />

professionalism and<br />

dedication of the entire United team<br />

to our customers.<br />

The aircraft will start regularly<br />

scheduled service in <strong>February</strong> <strong>2017</strong>.<br />

This is the first of 14 777-300ER aircraft<br />

United expects to place into<br />

service in <strong>2017</strong>.<br />

About United<br />

United Airlines and United Express<br />

operate more than 4,500 flights a<br />

day to 339 airports across five continents.<br />

In 2016, United and United<br />

Express operated more than 1.6 million<br />

flights carrying more than 143<br />

million customers. United is proud<br />

to have the world’s most comprehensive<br />

route network, including U.S.<br />

13<br />

mainland hubs in Chicago, Denver,<br />

Houston, Los Angeles, New York/<br />

Newark, San Francisco and Washington,<br />

D.C. The airline is a founding<br />

member of Star Alliance, which<br />

provides service to 192 countries<br />

via 28 member airlines. For more<br />

information, visit united.com, follow<br />

@United on Twitter or connect<br />

on Facebook. The common stock of<br />

United’s parent, United Continental<br />

Holdings, Inc., is traded on the<br />

NYSE under the symbol UAL.


Airport/Aviation <strong>Security</strong><br />

Passenger advocacy group lists<br />

concerns before airline CEOs meet with<br />

President Trump<br />

WASHINGTON, DC – Feb. 6, <strong>2017</strong><br />

CEOs from the major U.S. Airlines<br />

will meet with President<br />

Trump on Thursday and<br />

will likely discuss air<br />

traffic control privatization<br />

and further limitations<br />

on foreign air competition.<br />

As profits soar<br />

to record levels, passengers<br />

face a reduction in<br />

flights, shrinking seats,<br />

and less reliable air travel<br />

especially from small<br />

and medium size cities,<br />

noted FlyersRights.org.<br />

Being exempt from state consumer<br />

protection laws is not enough for<br />

the airlines. They seek to block foreign<br />

competition from airlines such<br />

as Norwegian Air, WOW Airlines,<br />

and Emirates. Blocking foreign<br />

competition will result in higher<br />

Paul Hudson<br />

Flyer’s Rights Pres<br />

prices and fewer choices for consumers.<br />

Paul Hudson, president<br />

of FlyersRights.org and<br />

member of the FAA Aviation<br />

Rulemaking Advisory<br />

Committee, noted the<br />

similarities between the<br />

airline industry now and<br />

the railroad industry in<br />

the 19th century, “Then,<br />

railroads controlled long<br />

distance transportation,<br />

as well as the courts and<br />

government regulators.<br />

A new word was coined to describe<br />

their abusive treatment of the public:<br />

being railroaded. Today, Americans<br />

are being ‘airlined’.”<br />

Additionally, the airlines are<br />

pushing for privatization of the Air<br />

Traffic Control system. The plan<br />

for privatization leaves little room<br />

for government oversight over an<br />

inherently governmental function,<br />

would transfer all government air<br />

traffic control to a AMTRAK like<br />

entity controlled by the airlines, and<br />

grant a long list of demands sought<br />

by air controller union including<br />

the right to strike. Such legislation<br />

was passed by the House in the last<br />

Congress but not acted on by the<br />

Senate.<br />

FlyersRights.org is the United<br />

States’ largest airline passenger advocacy<br />

group. The organization is<br />

most famous for spearheading the<br />

Passenger Bill of Rights and the<br />

rule against tarmac confinements.<br />

Among the many services it provides<br />

for airline passengers, it operates<br />

a toll-free hotline and publishes<br />

a weekly newsletter. FlyersRights.<br />

org is currently appealing the FAA’s<br />

refusal to enact a rulemaking to<br />

address the problems of shrinking<br />

seat sizes to the D.C. Circuit Court<br />

of Appeals. (Case 16-1101, FlyersRights<br />

Education Fund v. FAA).<br />

14


Southwest and NetJets Pilots Urge President-elect<br />

Trump to Reverse NAI Foreign Carrier Permit<br />

DALLAS, TX – The Southwest Airlines<br />

Pilots’ Association (SWAPA)<br />

is partnering with the NetJets Association<br />

of Shared Aircraft Pilots<br />

(NJASAP) to urge President-elect<br />

Trump to reverse the decision to<br />

grant Norwegian Air International<br />

a foreign carrier permit. The two<br />

groups will meet in the nation’s capital<br />

for a Rally for U.S. Aviation Jobs<br />

on January 24.<br />

In the final days of his administration,<br />

President Obama granted<br />

Norwegian Air International (NAI)<br />

a foreign carrier permit, placing<br />

tens of thousands of U.S. jobs at risk.<br />

“This decision is just another failed<br />

trade deal by the Obama administration,<br />

giving foreign companies an<br />

unfair advantage over U.S.<br />

companies,” said Captain<br />

Jon Weaks, SWAPA<br />

President. “Only President-elect<br />

Trump has the<br />

power to reverse the lame<br />

duck Obama Administration’s<br />

reckless approval of<br />

Captain Jon Weaks<br />

SWAPA President<br />

NAI before it takes effect<br />

on January 29.”<br />

The late-December decision<br />

to grant NAI a foreign carrier<br />

permit paves the way for NAI<br />

to execute on its flag of convenience<br />

(FOC) scheme. This permit allows<br />

for Norwegian to establish an Irish<br />

subsidiary in order to take advantage<br />

of Ireland’s impotent labor, tax,<br />

and social laws. This is exactly the<br />

type of scheme that decimated the<br />

U.S. shipping industry and will be<br />

the catalyst for a race to the bottom<br />

in the U.S. airline industry.<br />

<strong>Government</strong> affairs representatives<br />

from SWAPA and NJASAP<br />

continue to work every possible avenue<br />

to garner the attention of the<br />

president-elect and right this wrong.<br />

With the January 29 deadline looming,<br />

the groups believe that time<br />

is of the essence, and the<br />

time for action is now.<br />

“The Obama administration<br />

has tilted the field<br />

of play in favor of a foreign<br />

competitor and put<br />

thousands of good-paying,<br />

middle-class, U.S. aviation<br />

jobs at risk. It will be up to<br />

the Trump administration<br />

to save them,” said SWAPA<br />

15<br />

<strong>Government</strong>al Affairs Committee<br />

Chair Chip Hancock. Added<br />

Weaks, “President-elect Trump was<br />

elected on a pro-American worker<br />

platform and has already delivered<br />

wins for several American companies.<br />

It is our sincere desire that the<br />

president-elect will right this wrong<br />

by repealing this detrimental ruling.”<br />

About SWAPA<br />

Located in Dallas, Texas, the Southwest<br />

Airlines Pilots’ Association<br />

(SWAPA) is a non-profit employee<br />

organization representing the more<br />

than 8,500 pilots of Southwest Airlines.<br />

SWAPA works to provide a<br />

secure and rewarding career for<br />

Southwest pilots and their families<br />

through negotiating contracts,<br />

defending contractual rights and<br />

actively promoting professionalism<br />

and safety. For more information<br />

on the Southwest Airlines Pilots’<br />

Association, visit www.swapa.<br />

org. Rally Hashtags: #DenyNAI<br />

#MakeItRight #ReverseObama


Airport/Aviation <strong>Security</strong><br />

British air traffic control provider tabs<br />

Rohde & Schwarz for second voice system<br />

MUNICH – Feb. 7, <strong>2017</strong> NATS has<br />

selected the R&S VCS-4G IP-based<br />

voice communications system from<br />

Rohde & Schwarz as its second<br />

voice system for its air traffic control<br />

(ATC) communications in UK<br />

airspace. The voice over IP (VoIP)<br />

COTS solution from the Munichbased<br />

electronics firm was chosen<br />

based on its reliability, innovation<br />

and flexibility to create a single<br />

platform across NATS’ Swanwick<br />

and Prestwick control centers. In<br />

addition, the company has agreed<br />

to an accelerated delivery schedule<br />

to support NATS in their “Deploying<br />

SESAR” transformation programme.<br />

Rohde & Schwarz will provide the<br />

British air traffic service provider<br />

NATS with the IP-based voice communications<br />

system R&S VCS-4G.<br />

Within the framework of the Single<br />

European Sky (SES) initiative, NATS<br />

will modernize its entire air traffic<br />

management (ATM) infrastructure<br />

over the next few years. Tim Bullock,<br />

Director Supply Chain Management<br />

at NATS, explains: “NATS<br />

controls more than 2.4 million<br />

flights every year. Our systems must<br />

16<br />

be both flexible and<br />

able to handle heavy<br />

workloads in order<br />

to ensure efficient operations<br />

for airlines<br />

and passengers alike.<br />

We have found in Rohde<br />

& Schwarz an innovative<br />

and reliable<br />

partner. We welcome<br />

them to the collaborative<br />

team of suppliers joining us on<br />

our ATM transformation journey<br />

towards SESAR deployment.”<br />

Rohde & Schwarz will begin the<br />

implementation of the second voice<br />

system in <strong>2017</strong>. It will provide enhanced<br />

resilience for voice based<br />

radio communications in UK airspace.<br />

The air traffic control centers<br />

in Swanwick and Prestwick as well<br />

as the NATS corporate and technical<br />

centre in Whiteley will all be<br />

equipped in a phased deployment<br />

that will be completed by 2020. The<br />

order includes the delivery, implementation<br />

and through-life support<br />

of more than 450 R&S VCS-4G controller<br />

working positions (CWP).<br />

Up to 1700 radios and various<br />

ground-ground lines will be connected<br />

to the system.<br />

According to Bosco Novak, Executive<br />

Vice President Secure Communications<br />

Division at Rohde &<br />

Schwarz: “NATS is a forerunner in<br />

the deployment of SESAR and introducing<br />

new technologies. It will<br />

be the first air traffic control provider<br />

in Europe to completely migrate<br />

all of its ATC communications to<br />

IP. Deploying our technology as the<br />

second voice system will increase<br />

service resilience and add operational<br />

flexibility to NATS business<br />

operation.”<br />

As airspace becomes more crowded,<br />

there is an increased demand for<br />

flexible, load-based reallocation of<br />

resources while ensuring efficient<br />

More on page 40


AMICO <strong>Security</strong> launches next generation<br />

ANC composite fence system, receives M5.0<br />

security rating<br />

BIRMINGHAM, AL — December<br />

30, 2016 — AMICO <strong>Security</strong> announced<br />

today that its ANC fence<br />

system has received an M5.0 security<br />

rating in compliance with the<br />

ASTM F2781-10 standard, which is<br />

used to test the forced entry resistance<br />

of security fence systems, an<br />

important designation for the military,<br />

the U.S. Department of Homeland<br />

<strong>Security</strong>, industrial businesses<br />

and utilities.<br />

The next generation ANC fence<br />

system is a uniquely designed,<br />

non-metallic fencing system that is<br />

non-conductive and radar friendly,<br />

making it ideal for the protection of<br />

The non-conductive, radar friendly ANC fence system is ideal for<br />

17<br />

utility substations, airports and military<br />

applications. The ANC fence<br />

system is made up of a proprietary<br />

composite blend of non-conductive<br />

materials configured to increase the<br />

strength to weight ratio and greatly<br />

improve the level of security.<br />

The ANC fence system uses a<br />

unique self-draining diamond<br />

design and is a medium<br />

security alternative<br />

to traditional chain link<br />

fence products, which offers<br />

minimal security and<br />

can easily be compromised<br />

with simple hand tools.<br />

Because the system is non metallic,<br />

the ANC fence system<br />

is non-conductive<br />

and does not require<br />

grounding like a traditional<br />

chain link fence,<br />

significantly reducing<br />

the time and cost of engineering<br />

and fence installation.<br />

The system<br />

is ideal for use around<br />

power plants and sub<br />

stations, where the<br />

metal fencing can conduct<br />

electricity and become dangerous<br />

to the touch, and is widely used<br />

around (static synchronous compensators)<br />

STATCOMs, (switched<br />

virtual circuits) SVCs and reactors<br />

due to their high magnetic fields.<br />

The ANC fence system does not interfere<br />

with radar signals due to its<br />

non-metallic composition.<br />

“The unique design and<br />

high strength of the ANC<br />

fence system provides a<br />

safe, secure, aesthetic option<br />

to utilities, military<br />

bases and airports,” said<br />

Gary Baltz, Director of<br />

Marketing for AMICO <strong>Security</strong>.<br />

“Our product provides safety to the<br />

public and utility workers against<br />

step and touch potential, while at<br />

the same time greatly enhancing<br />

the security of our power grid and<br />

infrastructure. The system is easy to<br />

install in both new construction or<br />

retrofit situations.”<br />

The ANC fence system can be assembled<br />

up to 20 feet high and integrates<br />

with vehicular and pedestrian<br />

sliding automatic gate systems. The<br />

use in multiple perimeter security applications More on page 41


Written testimony of DHS Secretary John F. Kelly for a House<br />

Committee on Homeland <strong>Security</strong> hearing titled “Ending the<br />

Crisis: America’s Borders and the Path to <strong>Security</strong>”<br />

Release Date:<br />

<strong>February</strong> 7, <strong>2017</strong><br />

210 House Capitol Visitor Center,<br />

U.S. Capitol<br />

Mr. Chairman, Ranking Member<br />

Thompson, and distinguished<br />

Members of the Committee:<br />

It is a great honor and privilege to<br />

appear before you today to discuss<br />

the crucial mission of the Department<br />

of Homeland <strong>Security</strong> (DHS)<br />

to protect the homeland and secure<br />

our nation’s borders.<br />

Over the past 45 years, I have<br />

been privileged to serve my nation<br />

as both an enlisted Marine and an<br />

officer. I have worked with our allies<br />

across agencies, the private sector,<br />

and with independent experts to<br />

identify innovative, comprehensive<br />

solutions to current and emerging<br />

threats. These assignments—while<br />

varied—shared the common characteristics<br />

of working within and<br />

leading large, complex, and diverse<br />

mission-focused organizations<br />

while under great pressure to produce<br />

results.<br />

I am humbled to once again be<br />

called to serve, this time<br />

with the men and women<br />

of DHS. As a Department,<br />

we face diverse<br />

challenges and adversaries<br />

that do not respect<br />

our rule of law or our<br />

borders. As Secretary,<br />

you have my commitment<br />

to tirelessly protect<br />

our country from<br />

threats, secure the border, and enforce<br />

the law while expediting lawful<br />

trade and travel. In pursuit of those<br />

missions, please know that I take<br />

seriously our legal responsibilities<br />

to balance the security of our homeland<br />

with the protection of privacy,<br />

civil rights, and civil liberties.<br />

The President’s Executive Orders<br />

During his first two weeks in office,<br />

President Trump issued executive<br />

orders to secure our borders, enforce<br />

our immigration laws, and protect<br />

the nation from foreign terrorist entry<br />

into the United States. The President<br />

has gotten right to work, fighting<br />

on behalf of American families<br />

and workers—and these moves will<br />

18<br />

DHS Secretary<br />

John F. Kelly<br />

strengthen our national<br />

security.<br />

The purpose of the<br />

order on border security<br />

is to direct executive<br />

departments and agencies<br />

to deploy all lawful<br />

means to secure the nation’s<br />

southern border,<br />

prevent further illegal<br />

immigration into the<br />

United States, and to repatriate illegal<br />

aliens swiftly, consistently, and<br />

humanely.<br />

This executive order establishes<br />

the foundation for securing our<br />

southern border by providing the<br />

tools, resources, and policy direction<br />

for DHS’s dedicated men and<br />

women who are responsible for securing<br />

the border—to prevent illegal<br />

immigration, drug and human<br />

trafficking, and acts of terrorism.<br />

In accordance with existing law,<br />

DHS is immediately taking all appropriate<br />

steps to plan, design, and<br />

construct a physical wall along the<br />

southern border, using the materials<br />

and technology that will most<br />

effectively achieve operational con-


trol of the southern border. In addition,<br />

DHS is immediately taking<br />

all appropriate action to ensure that<br />

the parole and asylum provisions of<br />

federal immigration law are applied<br />

consistent with the requirements of<br />

the law, and not exploited to prevent<br />

the removal of otherwise removable<br />

aliens.<br />

The executive order on interior<br />

immigration enforcement provides<br />

DHS with the tools it needs<br />

to enforce federal immigration laws<br />

within the United States. It will remove<br />

many of the obstacles that<br />

have been making it more difficult<br />

for the dedicated men and women<br />

of U.S. Immigration and Customs<br />

Enforcement (ICE) to carry out<br />

their mission, which includes arresting,<br />

detaining, and removing illegal<br />

aliens from the United States.<br />

Essentially, it will restore the highly<br />

successful Secure Communities<br />

Program, which allows ICE to more<br />

easily target criminal aliens for removal.<br />

A third executive order, signed<br />

by the President on January 27, will<br />

protect all Americans from certain<br />

foreign nationals who intend<br />

to commit terrorist attacks in the<br />

United States by preventing such<br />

individuals from exploiting our immigration<br />

laws. The order suspends<br />

entry into the United States from<br />

Iran, Iraq, Somalia, Sudan Syria,<br />

Libya and Yemen until a comprehensive<br />

review has been completed;<br />

directs Federal agencies to implement<br />

uniform screening standards<br />

across all immigration programs;<br />

suspends the Refugee Admissions<br />

Program for 120 days to assess the<br />

vulnerabilities in the program and<br />

establish additional procedures to<br />

ensure refugees admitted do not<br />

pose a threat to national security or<br />

public safety; orders completion of<br />

the biometric entry-exit system; and<br />

ensures that applicants for visas are<br />

personally interviewed before their<br />

visas are approved in compliance<br />

with INA 222.<br />

As the President has stated,<br />

“Homeland <strong>Security</strong> is in the business<br />

of saving lives, and that mandate<br />

will guide our actions.” These<br />

executive orders further that goal<br />

by enhancing border security, promoting<br />

public safety, and minimizing<br />

the threat of terrorist attacks by<br />

foreign nationals in the homeland.<br />

More important, however, these executive<br />

orders emphasize the rule<br />

of law as a bedrock principle of our<br />

immigration system and provide<br />

clearly defined consequences for<br />

those who would violate our laws.<br />

Border <strong>Security</strong><br />

and Immigration Enforcement<br />

As a nation, control of our borders<br />

is paramount. Without that control,<br />

every other form of threat—illicit<br />

drugs, unauthorized immigrants,<br />

19<br />

transnational organized crime, certain<br />

dangerous communicable diseases,<br />

terrorists—could enter at will.<br />

DHS was created to prevent terrorist<br />

attacks against the United States.<br />

The principal means of prevention<br />

within the United States is effective<br />

border control, denying admission<br />

to aliens who seek to harm Americans<br />

or violate our laws, and countering<br />

efforts to recruit individuals<br />

to undertake terrorist acts.<br />

Achieving this priority begins<br />

with physical obstacles like a border<br />

barrier and supporting infrastructure<br />

and surveillance capabilities.<br />

In this effort, I am committed to<br />

executing President Trump’s plan to<br />

secure our southern border with effective<br />

physical barriers, advanced<br />

technology, and strategic deployment<br />

of law enforcement personnel.<br />

While the presence of physical<br />

barriers and additional technology<br />

is essential, it must be bolstered by<br />

persistent patrol and the vigilance<br />

of the dedicated men and women of<br />

DHS.<br />

We must augment our expanded<br />

border security initiatives with<br />

vigorous interior enforcement and<br />

administration of our immigration<br />

laws in a manner that serves the<br />

national interest. This effort will include<br />

greater cooperation and coordination<br />

between DHS’s operational<br />

components, which are responsible<br />

for administering immigration ben-


DHS Secretary Kelly: “Ending the Crisis: America’s Borders and the Path to <strong>Security</strong>”<br />

efits and enforcing our nation’s existing<br />

immigration laws.<br />

Within DHS and our Federal,<br />

State, local, and international partners,<br />

we must expand our vetting<br />

of those seeking to enter our country—particularly<br />

of those individuals<br />

from high-risk countries—including<br />

refugees. We<br />

currently lack a comprehensive<br />

strategy<br />

with uniform screening<br />

standards to prevent<br />

terrorists from<br />

entering the country.<br />

Unfortunately, our<br />

country has recently<br />

admitted some foreign nationals<br />

without an adequate understanding<br />

of their allegiances and intentions.<br />

Additionally, because they are apprehended<br />

by DHS law enforcement<br />

agents, we know there continue to<br />

be any number of so-called “special<br />

interest aliens” that make their way<br />

into our country illegally each year.<br />

Last year, over 415,816 migrants,<br />

mostly from Central America and<br />

Mexico—including over 137,614<br />

unaccompanied children and individuals<br />

travelling in family units—<br />

were apprehended on our southern<br />

border. Many of those arriving at<br />

our southern border have fled violence,<br />

poverty, criminal networks,<br />

and gangs in their native countries.<br />

Border security requires a layered approach<br />

that extends far beyond our shores, throughout<br />

the hemisphere, in partnership with our<br />

neighbors to the south and north.<br />

20<br />

While the vast majority are fleeing<br />

violence or seeking economic opportunity,<br />

a small number of individuals<br />

could potentially be seeking<br />

to do us harm or commit crimes.<br />

Regardless of purpose or circumstance,<br />

the ease with which human<br />

smugglers have moved tens of thousands<br />

of people to our nation’s doorstep<br />

also serves as another warning<br />

sign: these smuggling routes are a<br />

potential vulnerability of our homeland.<br />

Our vigorous response to these<br />

threats must include increased border<br />

security infrastructure, personnel,<br />

and technology. However, we<br />

cannot just play defense in securing<br />

our borders. Border security<br />

requires a layered approach that<br />

extends far beyond our shores,<br />

throughout the hemisphere, in partnership<br />

with our neighbors to the<br />

south and north.<br />

Along nearly 7,000 miles of land<br />

border, approximately 95,000 miles<br />

of shoreline, and at 328 ports of entry<br />

and numerous locations abroad,<br />

U.S. Customs and Border Protection<br />

(CBP) has a critical role in preventing<br />

the illegal entry of people and<br />

goods into the United States.<br />

Across the wide expanses of our<br />

nation’s land, air, and maritime environments,<br />

CBP has worked to<br />

address the changing<br />

demographics<br />

of attempted border<br />

crossers and to<br />

maintain border security<br />

through significant<br />

investments<br />

in enforcement resources,<br />

technology,<br />

infrastructure, and enhanced<br />

operational tactics and strategy.<br />

Through advances in detection capabilities,<br />

such as fixed, mobile,<br />

and agent-portable surveillance<br />

systems, tethered and tactical aerostats,<br />

unmanned aircraft systems,<br />

and ground sensors, which work<br />

in conjunction with tactical border<br />

infrastructure and agent deployment,<br />

CBP is enhancing its ability<br />

to quickly detect, identify, and respond<br />

to illegal border crossings.<br />

At our nation’s air, land, and sea<br />

ports of entry, more travelers and<br />

cargo are arriving than ever before.<br />

To maintain the security of growing<br />

volumes of international travelers,<br />

CBP performs a full range of inspec-


tion activities and continues to enhance<br />

its pre-departure traveler vetting<br />

systems and integrate biometric<br />

technologies. CBP has also made<br />

significant developments in its intelligence<br />

and targeting capabilities<br />

to segment and target shipments<br />

and individuals by potential level of<br />

risk to identify and stop potentially<br />

dangerous travelers or cargo before<br />

boarding an aircraft or conveyance<br />

bound for the United States.<br />

Beyond managing the influx of<br />

people and cargo arriving in the<br />

United States, CBP is working with<br />

other DHS agencies to strengthen<br />

its capabilities to identify foreign<br />

nationals who have violated our immigration<br />

laws, as well as to track<br />

suspect persons and cargo exiting<br />

the country. CBP is also leveraging<br />

its newly-established Counter Network<br />

Program, which focuses on<br />

detecting, disrupting, and dismantling<br />

transnational criminal organizations,<br />

by expanding information<br />

sharing, increasing partnerships<br />

and collaboration that enhance<br />

border security, conducting joint<br />

exploitation of intelligence, and comanaging<br />

of operations with interagency<br />

and international partners.<br />

These efforts are building toward a<br />

safer and more secure border environment,<br />

one that supports the<br />

safety and success of each agent and<br />

21<br />

officer in the field.<br />

In the maritime environment,<br />

the U.S. Coast<br />

Guard (USCG) utilizes<br />

a multi-faceted layered approach<br />

to interdict threats far from<br />

the borders of our nation to combat<br />

the efforts of transnational criminal<br />

organizations. Targeting the primary<br />

flow of illicit drug traffic has a direct<br />

and damaging impact on these<br />

networks.<br />

Successful Coast Guard interdictions<br />

in the maritime transit zones<br />

feed a cycle of success—subsequent<br />

prosecutions lead to actionable intelligence<br />

on future events, which<br />

produces follow-on seizures and additional<br />

intelligence. Suspects from<br />

these cases divulge information<br />

during prosecution and sentencing<br />

that is critical to indicting, extraditing,<br />

and convicting drug kingpins<br />

and dismantling these sophisticated<br />

networks.<br />

USCG secures the maritime domain<br />

by conducting patrols and<br />

coordinating with other federal<br />

agencies and foreign countries to<br />

interdict aliens at sea, denying them<br />

illegal entry via maritime routes to<br />

the United States, its territories and<br />

possessions. Thousands of aliens attempt<br />

to enter this country illegally<br />

every year using maritime routes,<br />

many via smuggling operations. Interdicting<br />

these aliens at<br />

sea reduces the safety risks<br />

involved in such transits.<br />

Interdicted aliens can<br />

be quickly returned to their<br />

countries of origin, avoiding the<br />

costlier processes required if they<br />

successfully enter the United States.<br />

Interagency and International<br />

Cooperation<br />

As Secretary, I will advocate for expanding<br />

cooperation inside the interagency<br />

and with partner nations,<br />

particularly Canada and Mexico.<br />

Interagency relationships and bilateral<br />

cooperation are critical to identifying,<br />

monitoring, and countering<br />

threats to U.S. national security and<br />

regional stability. While DHS possesses<br />

unique authorities and capabilities,<br />

we must enhance and leverage<br />

our coordination with federal,<br />

state, local, and tribal partners. The<br />

magnitude, scope, and complexity<br />

of the challenges we face—illegal<br />

immigration, transnational crime,<br />

human smuggling and trafficking,<br />

and terrorism—demand an integrated<br />

counter-network approach.<br />

Regionally, we must continue to<br />

build partner capacity. Illegal immigration<br />

and transnational organized<br />

crime threaten not only our<br />

own security, but also the stability<br />

and prosperity of our Latin Ameri-


DHS Secretary Kelly: “Ending the Crisis: America’s Borders and the Path to <strong>Security</strong>”<br />

can neighbors. In Colombia, for<br />

example, we learned that key principles<br />

to defeating large cartels and<br />

insurgents are the same as defeating<br />

criminal networks: a strong, accountable<br />

government that protects<br />

its citizens, upholds the rule of law,<br />

and expands economic opportunity<br />

for all. It taught us that countering<br />

illicit trafficking and preventing terrorism<br />

often go hand-in- hand, and<br />

that U.S. interagency cooperation,<br />

coupled with a committed international<br />

partner, can help bring a<br />

country back from the brink. I believe<br />

these lessons can be applied<br />

across our many international partnerships,<br />

and in furtherance of our<br />

government’s many missions beyond<br />

our borders.<br />

Presently, we have a great opportunity<br />

in Central America to<br />

capitalize on the region’s growing<br />

political will to combat criminal<br />

networks and control hemispheric<br />

migration. Leaders in many of our<br />

partner nations recognize the magnitude<br />

of the tasks ahead and are<br />

prepared to address them, but they<br />

need our support. As we learned in<br />

Colombia, sustained engagement<br />

by the United States can make a real<br />

and lasting difference.<br />

Conclusion<br />

The security challenges facing DHS<br />

and our nation are considerable,<br />

particularly along the southern border.<br />

We have the laws in place to secure<br />

our borders. We also have outstanding<br />

men and women working<br />

at DHS, and in other federal, state,<br />

local, and tribal law enforcement<br />

agencies, who are committed to the<br />

border security mission. Finally, we<br />

now have a clear mission objective<br />

and the will to complete that mission<br />

successfully. We must accelerate<br />

our collective efforts to enforce<br />

the laws on the books and support<br />

those sworn to uphold the law. You<br />

have my commitment to work tirelessly<br />

to ensure that the men and<br />

women of DHS are empowered do<br />

their jobs.<br />

I believe in America and the principles<br />

upon which our country and<br />

way of life are guaranteed, and I<br />

believe in respect, tolerance, and<br />

diversity of opinions. I have a profound<br />

respect for the rule of law and<br />

will always strive to preserve it. As<br />

I mentioned in my confirmation<br />

hearing, I have never had a problem<br />

speaking truth to power, and I<br />

firmly believe that those in power<br />

deserve full candor and my honest<br />

assessment and recommendations.<br />

As Secretary, I recognize the<br />

many challenges facing DHS and I<br />

will do everything within my ability<br />

to meet and overcome those chal-<br />

22<br />

lenges, while preserving our liberty,<br />

upholding our laws, and protecting<br />

our citizens.<br />

Thank you again for the opportunity<br />

to appear before you today and<br />

for your continued support of DHS.<br />

I am confident that we will continue<br />

to build upon the momentum generated<br />

as a result of our previous operational<br />

achievements around the<br />

world. I remain committed to working<br />

with this Committee to forge a<br />

strong and productive relationship<br />

going forward to secure our borders<br />

and help prevent and combat<br />

threats to our nation.<br />

I would be pleased to answer any<br />

questions.


GSN’s <strong>2017</strong> Airport/Seaport/Border <strong>Security</strong> Awards<br />

Opening for Entries on March 15 with Many New Categories<br />

All Winners in this program are entitled to<br />

a Full-Page Advertisement (8.5” x 9.0”) in<br />

your choice of GSN’s <strong>Digital</strong> Magazine or<br />

Leaderboard in any edition of the Airport,<br />

Seaport, Rail, Border <strong>Security</strong> Weekly<br />

<strong>News</strong>letter.<br />

NEW IN <strong>2017</strong>:<br />

CLICK HERE TO<br />

SUBMIT A NOMINATION<br />

All Finalists are entitled to a Half-Page<br />

Advertisement (8.5” x 4.5”) in your choice<br />

of GSN’s <strong>Digital</strong> Magazine or Leaderboard<br />

in any edition of the Airport, Seaport, Rail,<br />

Border <strong>Security</strong> Weekly <strong>News</strong>letter.<br />

Adrian Courtenay<br />

Managing Partner, CEO<br />

<strong>Government</strong> <strong>Security</strong> <strong>News</strong><br />

917-696-5782<br />

acourtenay@gsnmagazine.com<br />

Steve Bittenbender<br />

Managing Editor<br />

<strong>Government</strong> <strong>Security</strong> <strong>News</strong><br />

502-552-1450<br />

sbittenbender@gsnmagazine.com<br />

Gerry O’Hara<br />

Designer<br />

OHDesign3<br />

203-249-0626<br />

gerry@ohd3.com


Salient CRGT Announces Definitive Agreement<br />

to Acquire Information Innovators, Inc.<br />

FAIRFAX, VA – <strong>February</strong> 6, <strong>2017</strong><br />

– Salient CRGT, Inc. (“Salient<br />

CRGT”), a leading provider of agile<br />

software development, data analytics,<br />

mobility, cyber security, and<br />

infrastructure solutions, today announced<br />

that it has signed a definitive<br />

agreement for the acquisition<br />

of Springfield, VA-based Information<br />

Innovators, Inc. (“Triple-i”), a<br />

technology and missionfocused<br />

company serving<br />

the federal government,<br />

with particular strength<br />

in the healthcare information<br />

technology (“IT”) arena. The<br />

agreement is expected to close within<br />

the first quarter of <strong>2017</strong>. Salient<br />

CRGT is backed by two private equity<br />

firms, Bridge Growth Partners,<br />

LLC and Frontenac Co, and Triple-i<br />

is backed by DFW Capital Partners.<br />

The transaction combines two<br />

highly complementary businesses.<br />

Triple-i has spent the past 16 years<br />

building and delivering a full suite of<br />

next generation solutions, including<br />

healthcare IT services, enterprise IT<br />

solutions, cloud services and agile<br />

development capabilities focused<br />

on the needs of customers within<br />

federal healthcare, civilian, national<br />

security, and defense markets. With<br />

the acquisition, Salient CRGT will<br />

increase its revenues to more than<br />

$500 million, solidifying the company’s<br />

position in the mid-tier federal<br />

IT services market and allowing<br />

it to effectively compete with largescale<br />

professional services providers<br />

while maintaining its agile, innovative,<br />

quality-driven, and customercentric<br />

approach.<br />

24<br />

“Salient<br />

CRGT’s acquisition<br />

of Triple-i directly supports<br />

the company’s long-term growth objectives<br />

to create a premier mid-tier<br />

agile software development, data<br />

analytics, cyber security and mobility<br />

solution and services company.<br />

By combining the ingenuity, creativity,<br />

and commitment of Salient<br />

CRGT and Triple-i employees, we<br />

will be able to deliver expanded services<br />

to our existing customers and<br />

offer compelling solutions to new<br />

customers,” said Brad Antle, Chief<br />

Executive Officer, Salient CRGT.<br />

“Now positioned firmly in this midtier<br />

market segment, Salient CRGT<br />

will compete more successfully and<br />

profitably in the federal IT market<br />

space with notable new capabilities<br />

in healthcare IT and consulting, IT<br />

infrastructure, network engineering<br />

and operations management, and<br />

cloud-based technologies.”<br />

“This exciting transaction is a strategic<br />

step forward for Salient CRGT<br />

that is consistent with the goals we<br />

set together with our private equity<br />

partners Bridge Growth<br />

and Frontenac, when<br />

we decided to merge Salient<br />

and CRGT in 2015.<br />

Triple-i has supported 11<br />

out of the 15 cabinet-level federal<br />

departments to design, implement,<br />

sustain and manage their IT and<br />

healthcare services requirements,”<br />

said Tom Ferrando, President of<br />

Salient CRGT. “By combining their<br />

experience and our network, this<br />

acquisition expands Salient CRGT’s<br />

portfolio of high-profile agencies,<br />

including Health and Human Services,<br />

Department of Veterans Affairs,<br />

Defense Health Agency, and<br />

Department of Homeland <strong>Security</strong><br />

while adding important contracts to<br />

our portfolio, including VA T4NG,


CMS SPARC, GSA PSS, and US-<br />

AMRAA TEAMS, among others.”<br />

Commenting on the strategic<br />

nature of the acquisition, Steve<br />

Ikirt, President and Chief Executive<br />

Officer of Triple-i said, “Over<br />

the years, there have been several<br />

companies interested in having<br />

Triple-i become part of their<br />

team. We determined that Salient<br />

CRGT had the strength of management,<br />

clear strategic direction,<br />

proven financial performance,<br />

and the right mix of capabilities<br />

and customers to be an ideal fit<br />

for Triple-i. With Salient CRGT,<br />

we will be even better positioned<br />

to serve our customers’ needs with<br />

a broader and more diverse set of<br />

services.”<br />

Terms of the transaction were not<br />

disclosed. RBC Capital Markets and<br />

Sagent Advisors served as Salient<br />

CRGT’s financial advisors, and KippsDeSanto<br />

& Co. served as Triplei’s<br />

financial advisor. Willkie Farr &<br />

Gallagher LLP and Garvey Schubert<br />

Barer served as legal advisor for<br />

Salient CRGT. Holland & Knight<br />

served as legal advisor for Triple-i.<br />

About Salient CRGT<br />

Salient CRGT provides agile software<br />

development, data analytics,<br />

mobility, cyber security and infrastructure<br />

solutions. We support<br />

these core capabilities with full lifecycle<br />

IT services and training—to<br />

Enterprise IT<br />

Ensuring technology platforms are secure,<br />

efficient, and reliable.<br />

help our customers meet critical<br />

goals for pivotal missions. We are<br />

purpose built for IT transformation<br />

supporting federal civilian, defense,<br />

homeland, and intelligence agencies,<br />

as well as Fortune 1000 companies.<br />

We use the most innovative<br />

talent delivery model in the industry,<br />

scientifically providing exactly<br />

the right people for the customers’<br />

most pressing requirements. Salient<br />

CRGT has earned a record of success<br />

with integration and operations<br />

of large‐scale, high‐volume solutions.<br />

For additional information<br />

on Salient CRGT, visit www.salientcrgt.com.<br />

About Information Innovators, Inc.<br />

Information Innovators Inc. (Triple-i)<br />

delivers solutions and services<br />

to IT and health-focused clients<br />

across the federal government. The<br />

25<br />

Company defines, develops, and<br />

implements innovations that help<br />

solve its customers’ hardest problems<br />

while saving them money,<br />

modernizing their systems, and<br />

achieving their mission objectives.<br />

Triple-i serves federal departments<br />

including Health and Human<br />

Services, Veterans Affairs,<br />

Homeland <strong>Security</strong>, Defense,<br />

Commerce, Transportation, Education,<br />

Housing and Urban Development,<br />

and the Intelligence<br />

Community through its core capabilities—enterprise<br />

IT services,<br />

cloud and hosting solutions, cyber<br />

security, software development and<br />

implementation, data and analytics,<br />

and health services. For more information,<br />

visit www.iiinfo.com.<br />

About Bridge Growth Partners<br />

Bridge Growth Partners, LLC brings<br />

together significant investment,<br />

financial, operating and strategic<br />

business building expertise and talent<br />

for the purpose of investing in<br />

carefully selected, growing and important<br />

segments of the technology<br />

and technology-enabled financial<br />

services sectors. For more information,<br />

visit www.bridgegrowthpartners.com.<br />

About Frontenac<br />

Frontenac is a leading private equity<br />

More on page 42


Federal experts agree that ‘Internet of Things’<br />

demands simple baked-in security<br />

By Tom O’Keefe<br />

As the federal government<br />

begins to<br />

incorporate mobile<br />

devices and the Internet<br />

of Things<br />

(IoT), security must<br />

be “baked in,” not “sprinkled on” as<br />

an afterthought to avoid hacking.<br />

That’s the verdict from experts<br />

in government and the contractor<br />

community, who recently met for<br />

a panel discussion on “Uniting Cybersecurity,<br />

Mobility and the Internet<br />

of Things” at immixGroup’s annual<br />

government summit on federal<br />

budgeting.<br />

The risk of cyber attack through<br />

IoT-enabled devices made headlines<br />

late last year when a highprofile<br />

internet-monitoring and<br />

traffic-routing company was hacked<br />

in a distributed denial of service<br />

(DDOS) attack. A simple malware<br />

called Mirai infected consumer<br />

DVRs, flooding the company with<br />

millions of bogus information requests.<br />

The company’s servers were<br />

overwhelmed, temporarily knocking<br />

out some of the nation’s most<br />

visited websites.<br />

Old security precautions<br />

don’t fit IoT<br />

Among federal agencies, current<br />

security requirements don’t necessarily<br />

fit in the new IoT environment.<br />

According to Jose Padin,<br />

sales engineering director,<br />

Federal Civilian & SI for Citrix, the<br />

fed’s approach to security “doesn’t<br />

always translate into consumerbased<br />

electronics.”<br />

The answer is for government organizations<br />

to develop or purchase<br />

new mobile and IoT solutions with<br />

security built in, said Michael Theis,<br />

with the CERT Insider Threat Center<br />

Software Engineering Institute.<br />

“I don’t think anyone’s really widely<br />

codified how you go about making<br />

sure that things are secure from the<br />

beginning,” said Theis.<br />

Padin noted that hardware, firmware<br />

and software for IoT-enabled<br />

products is “the wild west.” He said<br />

government must add security controls<br />

into procurement processes<br />

for these devices. He also acknowledged<br />

that industry must make investments<br />

in applying these requirements<br />

to all devices, rather than<br />

creating government versions.<br />

26<br />

Bad actors, Padin said, “realize<br />

that the weakest link is the consumer.”<br />

By building security provisions<br />

to products from the start, consumers<br />

will no longer be a vulnerability<br />

when they buy IoT-enabled appliances.<br />

At a more technical level, the challenge<br />

for government is to have the<br />

appropriate identity management<br />

requirements for mobility and IoT,<br />

according to Donna Dodson, director<br />

of the IT laboratory and chief<br />

cybersecurity advisor for NIST. A<br />

personal identity verification card,<br />

for example, “works nicely in a laptop<br />

or desktop but in a mobile device,<br />

not so much.”<br />

“The end users really matter here,”<br />

Dodson said. “We need to give them<br />

answers that are easy for them to<br />

do the right thing, hard to do the<br />

wrong thing and easy to back up if<br />

the wrong thing is done.” It’s important<br />

to think about identity management<br />

in the IoT space, she added.<br />

In many cases that may start “at<br />

the silicon level,” said Ashish Parikh,<br />

vice president of software and solutions<br />

at Arrow’s systems integration<br />

business. Silicon vendors are<br />

More on page 41


Farpointe warns access control channel to suggest customers<br />

add anti-hacking measures, as Federal Trade Commission is<br />

now insisting on cyber security protection<br />

SUNNYVALE, CA – <strong>February</strong><br />

14, <strong>2017</strong> – Farpointe Data, the access<br />

control industry’s trusted<br />

global partner for RFID solutions,<br />

is notifying its access control manufacturers,<br />

distributors, integrators<br />

and dealers that hacking of access<br />

control systems has become a threat<br />

far bigger than most think. Protecting<br />

their end-users from hackers is<br />

imperative for channel partners.<br />

“The U.S. federal government<br />

suffered a staggering 61,000 cybersecurity<br />

breaches, that it knows of,<br />

last year alone,” reports Farpointe<br />

Data President Scott Lindley. “Several<br />

recent events highlight the importance<br />

of why the access control<br />

channel must work with their customers<br />

to deal with accelerating<br />

hacking attacks.”<br />

According to Lindley, the most<br />

important is that the U.S. Federal<br />

Trade Commission (FTC) has decided<br />

that it will hold the business<br />

community responsible for failing<br />

to implement good cyber security<br />

practices and is now filing lawsuits<br />

against those that don’t. An appeals<br />

court has backed its lawsuit against<br />

the hotel chain operator Wyndham<br />

Worldwide for not protecting<br />

consumers’ information and, just<br />

recently, the FTC filed a lawsuit<br />

against D-Link and its U.S. subsidiary,<br />

alleging that it used inadequate<br />

safeguards on its wireless routers<br />

and IP cameras that left them vulnerable<br />

to hackers.<br />

“Prospective penalties go beyond<br />

FTC threats, though,” Lindley<br />

warns. “A luxury hotel in Austria,<br />

the Romantik Seehotel Jaegerwirt,<br />

recently had to pay hackers a ransom<br />

after they managed to access<br />

its electronic key system and lock all<br />

the hotel guests in their rooms. Approximately<br />

180 people were staying<br />

at the hotel on that day. Many<br />

were locked in their rooms, while<br />

others were locked out of theirs. The<br />

hackers demanded €1,500, about<br />

$1,600. The hotel decided to pay, explaining<br />

that they felt that they had<br />

no other choice, especially because<br />

neither police nor insurance could<br />

help them.”<br />

Adding to the problem, states<br />

Lindley, is that Wiegand, the industry<br />

standard over-the-air protocol<br />

commonly used to communicate<br />

credential data from a card to an<br />

27<br />

electronic<br />

access<br />

reader, is<br />

no longer<br />

inherently<br />

s e c u r e<br />

due to its<br />

original<br />

obscure<br />

and non-standard nature.<br />

For this reason, Farpointe has introduced<br />

features such as potting all<br />

readers and options that can be added<br />

to the readers. The first is MAX-<br />

Secure, which provides a higher-security<br />

handshake, or code, between<br />

the proximity or smart card, tag and<br />

reader to help ensure that readers<br />

will only accept information from<br />

specially coded credentials. The second<br />

is Valid ID, a new anti-tamper<br />

feature available with contactless<br />

smartcard readers, cards and tags.<br />

It can add an additional layer of<br />

authentication assurance to NXP’s<br />

MIFARE DESFire EV1 smartcard<br />

platform, operating independently,<br />

in addition to, and above the significant<br />

standard level of security that<br />

DESFire EV1 delivers. Valid ID lets<br />

More on page 40


Varex Imaging completes separation from Varian<br />

Medical Systems, Lists on Nasdaq Stock Market<br />

SALT LAKE CITY, UT – January 30,<br />

<strong>2017</strong> – Varex Imaging Corporation<br />

(Nasdaq: VREX) today announced<br />

that its spin-off from Varian Medical<br />

Systems (NYSE: VAR) has been<br />

successfully completed. The common<br />

stock of Varex Imaging, a new<br />

independent public company, will<br />

begin trading “regular way” today<br />

on the Nasdaq Global Select Market<br />

under the ticker symbol “VREX”.<br />

Under the terms of the previously<br />

announced separation, Varian<br />

stockholders received 0.4 of a share<br />

of Varex stock for every one share of<br />

Varian stock they held as of the record<br />

date of January 20, <strong>2017</strong>. Varex<br />

shares were distributed at 12:01 am<br />

Pacific Time on January 28, <strong>2017</strong> in<br />

a distribution that is intended to be<br />

tax-free for U.S. federal income tax<br />

purposes. Varex has approximately<br />

38 million shares outstanding.<br />

In connection with the separation,<br />

Varex made a $200 million cash payment<br />

to Varian. Varex funded this<br />

payment and related expenses from<br />

its $300 million revolving credit facility.<br />

The balance of undrawn funds<br />

remain available to fund working<br />

capital needs and other general corporate<br />

purposes.<br />

Varex Imaging Corporation is the world’s largest independent supplier of medical X-ray tubes<br />

and image processing solutions.<br />

28<br />

“The past few months have been<br />

very busy as we prepared for the<br />

spin-off of Varex Imaging and also<br />

announced the planned acquisition<br />

of the Medical Imaging business of<br />

PerkinElmer,” said Sunny Sanyal,<br />

President and Chief Executive Officer<br />

of Varex Imaging. “Much of our<br />

time recently has been filled with<br />

meetings, calls and roadshow presentations<br />

with the investor and analyst<br />

community. Overall, the past<br />

year has been an exciting time for us<br />

and I want to thank all the people<br />

at Varian and Varex who devoted so<br />

much time and effort to make the<br />

separation a success,” Sanyal added.<br />

Varex Management<br />

The new President and Chief Executive<br />

Officer of Varex Imaging is<br />

Sunny Sanyal (previously President<br />

of the Varian Imaging Components<br />

business). The new Chief Financial<br />

Officer is Clarence Verhoef (previously<br />

Varian Corporate Controller).<br />

The new General Counsel and<br />

Corporate Secretary is Kim Honeysett<br />

(previously Vice President and<br />

Assistant General Counsel and Assistant<br />

Corporate Secretary for Varian).


Varex Board Members<br />

• Dr. Ruediger Naumann-Etienne<br />

is Chairman of the Board of Varex<br />

Imaging Corporation. He has<br />

been the Owner and Managing<br />

Director of Intertec Group, an in<br />

vestment company specializing in<br />

the medical device field, since<br />

1989.<br />

• Sunny Sanyal is Varex’s President<br />

and Chief Executive Officer.<br />

• Christine A. Tsingos has been<br />

the Chief Financial Officer of<br />

Bio-Rad Laboratories, Inc. a<br />

global provider of life science<br />

research and clinical diagnostic<br />

products, since 2002.<br />

• Dow R. Wilson is President and<br />

Chief Executive Officer of Varian<br />

Medical Systems.<br />

• Dr. Erich R. Reinhardt is<br />

currently the Chairman of the<br />

Board of Medical Valley<br />

Europaische Metropol Region in<br />

Nürnberg in Germany. Previously,<br />

he was President and Chief<br />

Executive Officer of Siemens<br />

Healthcare (formerly<br />

Siemens Medical Solutions).<br />

• Jay K. Kunkel is Senior Vice<br />

President and President, Asia-<br />

Pacific Operations of Leer<br />

Corporation. He has extensive<br />

experience in Asia that includes<br />

his current role and previous<br />

senior management positions<br />

with Continental A.G. and SRP<br />

International Group Ltd.<br />

Additional information about Varex’s<br />

management, board of directors<br />

and corporate governance can be accessed<br />

via the Investors section of the<br />

company’s website at www.vareximaging.com.<br />

As previously disclosed, Varex expects<br />

revenues for fiscal year <strong>2017</strong><br />

to grow by 3-4 percent over the approximately<br />

$620 million recorded<br />

for fiscal year 2016 as set forth in the<br />

company’s Form 10 filing with the<br />

SEC. Assuming approximately 38<br />

million shares outstanding and a 35<br />

percent tax rate, Varex anticipates<br />

that GAAP net earnings per diluted<br />

share for the second through the<br />

fourth quarters of fiscal year <strong>2017</strong><br />

will be in the range of $1.20 to $1.30.<br />

Going forward Varex will provide<br />

annual guidance.<br />

Varex intends to file a 10-Q for<br />

the first quarter of fiscal year <strong>2017</strong><br />

approximately at the end of <strong>February</strong><br />

<strong>2017</strong>. Prior to the filing of Varex’s<br />

10-Q, Varian is expected to file<br />

financial information related to the<br />

discontinued operations of its Imaging<br />

Components business that is<br />

not anticipated to be comparable to<br />

the financial information included<br />

in Varex’s Form 10.<br />

J.P. Morgan Securities LLC and<br />

Wachtell, Lipton, Rosen & Katz acted<br />

as the respective financial and legal<br />

advisors in connection with the<br />

separation.<br />

29<br />

About Varex Imaging<br />

Varex Imaging Corporation is a<br />

leading innovator, designer and<br />

manufacturer of X-ray imaging<br />

components, which include tubes,<br />

digital flat panel detectors and other<br />

image processing solutions, which<br />

are key components of X-ray imaging<br />

systems. Varex’s components are<br />

used in medical imaging as well as<br />

in industrial and security imaging<br />

applications. With a 65+ year history<br />

of successful innovation, global<br />

OEM manufacturers of X-ray imaging<br />

system use the company’s X-ray<br />

sources, digital detectors, connecting<br />

devices and imaging software<br />

as components in their systems to<br />

detect, diagnose and protect. Varex<br />

employs approximately 1,400 people<br />

located at manufacturing and<br />

service center sites in North America,<br />

Europe, and Asia. For more information<br />

about Varex, visit www.<br />

vareximaging.com.<br />

Varex Imaging Corporation is the<br />

world’s largest independent supplier<br />

of medical X-ray tubes and image<br />

processing solutions. From medical<br />

imaging, to cargo screening and<br />

border security, our components are<br />

used by X-ray imaging system manufacturers<br />

everywhere to detect, diagnose,<br />

and protect.


Hot Topics: More opinions on Immigration<br />

New memos reveal harsh and unforgiving immigration road<br />

map, taking nation backwards in guaranteeing due process and<br />

providing safe havens, as Department of Homeland <strong>Security</strong><br />

implements President Trump’s immigration Executive Orders<br />

By Beth Werlin<br />

The White House released the<br />

implementation memos and other<br />

information on Monday about<br />

how the Department of Homeland<br />

<strong>Security</strong> (DHS) will begin<br />

implementing President Trump’s<br />

immigration Executive Orders<br />

on border security and immigration<br />

enforcement. The memos<br />

reveal that DHS intends to take<br />

our nation backwards in terms of<br />

guaranteeing due process, providing<br />

a safe haven for those who<br />

need it, and building productive<br />

and safe communities where everyone<br />

can thrive.<br />

What is in the memos?<br />

An end to long-standing protections<br />

for children. DHS intends<br />

to strip many children<br />

arriving alone at our border of<br />

basic protections and to penalize<br />

their parents for seeking to<br />

reunite with their children in<br />

the United States. They will do<br />

this by narrowing<br />

the definition<br />

of “unaccompanied<br />

alien child”<br />

in order to limit<br />

those protections<br />

and by launching<br />

either civil or<br />

criminal enforcement<br />

against the<br />

parents. This will<br />

result not only in scaring parents<br />

from coming forward to reunite<br />

with their children but also lead<br />

to more young children representing<br />

themselves in immigration<br />

court against a seasoned<br />

government attorney.<br />

A massive expansion of detention.<br />

The memos contemplate<br />

a massive expansion of detention,<br />

including a requirement<br />

that DHS officers detain nearly<br />

everyone they apprehend at or<br />

near the border. This detention<br />

space expansion—a boon to the<br />

private prison industry—means<br />

30<br />

Photo: Chucky Eager<br />

that more children, families and<br />

other vulnerable groups seeking<br />

protection in the United States<br />

will end up detained, at great financial<br />

and human cost.<br />

Prosecution priorities and discretion<br />

are gone. The new memos<br />

rescind earlier policies on<br />

whom to prosecute and deport<br />

and whom to deprioritize because<br />

they pose no threat to our<br />

communities. The new enforcement<br />

priorities are extremely<br />

broad covering nearly all undocumented<br />

individuals in the<br />

More on page 42


Supreme Court hears case on shooting of 15-year<br />

old Sergio Hernandez by U.S. Border Patrol Agent<br />

By Walter Ewing<br />

Officers with U.S. Customs and Border<br />

Protection (CBP)—the federal<br />

agency which includes the Border<br />

Patrol—are rarely held accountable<br />

for their actions. Nowhere is this<br />

more apparent than in the case of<br />

Sergio Hernandez, a 15-year-old<br />

boy shot dead in 2010 in Mexico by<br />

a Border Patrol agent who fired on<br />

him from the U.S. side of the border.<br />

The agent in question has never<br />

faced criminal charges for the<br />

killing. The boy’s mother brought<br />

a civil suit against the agent for<br />

damages, and her case was argued<br />

before the Supreme Court on <strong>February</strong><br />

21.<br />

The central question before the<br />

Court is whether a federal court<br />

has the authority to consider a<br />

civil suit such as this. The Court<br />

will determine, then, whether the<br />

agent must stand trial to account<br />

for his deadly conduct. But this case<br />

will have ramifications well beyond<br />

the actions of one Border Patrol<br />

agent because his actions represent<br />

a systemic lack of accountability<br />

within CBP.<br />

Rather than fix the system, the<br />

Trump administration is proposing<br />

to throw gasoline on the fire; adding<br />

thousands of new CBP officers to<br />

the mix without doing anything to<br />

ensure that the rights of the people<br />

whom CBP encounters are respected.<br />

The results could well prove fatal<br />

to more immigrants, regardless of<br />

which side of the border they find<br />

themselves on.<br />

The Hernandez case is egregious<br />

in a number of ways. According to<br />

the brief filed by his family, Sergio<br />

was playing with two friends just<br />

over the border from El Paso in<br />

Juarez. As is common among the<br />

children of Juarez, Sergio and his<br />

companions were running up the<br />

31<br />

side of a concrete culvert and touching<br />

that 18-foot-high border fence<br />

before running back down. Since<br />

they were playing and not trying to<br />

enter the United States, they did this<br />

in plain view of the Paso del Norte<br />

Port of Entry.<br />

Needless to say, they were unarmed.<br />

Nevertheless, a Border Patrol<br />

agent named Jesus Mesa took<br />

exception to this behavior and<br />

grabbed one of the boys as they ran<br />

back down the culvert. Mesa then<br />

drew his weapon and fired down<br />

into the culvert, hitting Sergio in<br />

the head. Mesa claimed that Sergio<br />

was throwing rocks at him.<br />

Because Sergio was standing in<br />

Mexico when Mesa killed him, the<br />

U.S. government is claiming that<br />

Mesa cannot be sued for violating<br />

Sergio’s rights.<br />

If the Supreme Court sides with<br />

Photo: Pete Jordan<br />

Mesa in this case, it is tantamount<br />

to declaring open season on anyone<br />

standing on the wrong side of<br />

the U.S.-Mexico borderline. Then<br />

again, it was already a declaration<br />

of open season when no criminal<br />

charges were filed against Mesa. In<br />

More on page 44


Hot Topics: More opinions on Immigration<br />

Abandoning priorities will make immigration<br />

enforcement work much harder<br />

Photo: t3hWIT<br />

By Mary Giovagnoli<br />

The Trump administration ensured<br />

this week that its immigration<br />

enforcement policies will be<br />

a chaotic affair marked by mistakes,<br />

civil rights violations and<br />

overzealous enforcement. They<br />

did this by outlining measures<br />

that they claim simply return<br />

power to immigration agents to<br />

do their jobs—measures such as<br />

authorizing the hiring of thousands<br />

more border and interior<br />

enforcement officers, eliminating<br />

targeted priorities for removal,<br />

and creating an aggressive<br />

plan to deputize local law<br />

enforcement.<br />

Significantly,<br />

the administration also rescinded<br />

virtually all guidance on the<br />

use of prosecutorial discretion.<br />

In the short-term, this dramatic<br />

rescission of guidance leaves<br />

officers with no framework for<br />

decision-making, except the<br />

vague idea that their mission is<br />

to deport as many unauthorized<br />

immigrants as possible. In the<br />

long-term, it turns the authority<br />

to arrest, detain, and deport individuals<br />

into a type of unchecked<br />

power that once unleashed is<br />

hard to pull back and is bound to<br />

create chaos.<br />

One of the defining measures<br />

of the Obama administration’s<br />

Priority Enforcement Program<br />

was discretion. Over the<br />

years, officers were given<br />

a set of enforcement priorities<br />

that emphasized<br />

the removal of persons<br />

convicted of serious<br />

crimes, or who were national<br />

security threats,<br />

or who had recently<br />

crossed the border. The<br />

memos categorized enforcement<br />

priorities not to<br />

32<br />

keep officers from doing their<br />

job, but to ensure that officers<br />

had guidance that gave them a<br />

framework for using their resources<br />

and making good choices<br />

about individual cases based<br />

on more than just the authority<br />

to arrest and detain someone.<br />

The November 2014 memos<br />

issued by former Secretary Jeh<br />

Johnson emphasized that even<br />

within these priority categories<br />

there were reasons why an individual<br />

case might merit a decision<br />

to decline to prosecute.<br />

These memos and others emphasized<br />

the favorable exercise of<br />

discretion—in other words, the<br />

need to triage cases, starting first<br />

with the nature of the violation<br />

(is this person a convicted killer<br />

or a jaywalker?) and then walking<br />

progressively through other factors<br />

such as whether this person<br />

was a victim of domestic abuse,<br />

or an asylum seeker, or had U.S.<br />

citizen children. The goal was<br />

to ensure that limited resources<br />

were used to remove those who<br />

posed a threat to safety or securi-<br />

More on page 42


“Expedited removal” of noncitizens called for<br />

in President’s January 25 executive order<br />

President Trump’s January<br />

25, <strong>2017</strong>, executive<br />

order directs the Department<br />

of Homeland <strong>Security</strong><br />

(DHS) to dramatically<br />

expand the use of<br />

“expedited removal.” Created<br />

in 1996, expedited<br />

removal is a process by<br />

which low-level immigration<br />

officers can quickly<br />

deport certain noncitizens<br />

who are undocumented or<br />

have committed fraud or misrepresentation.<br />

Since 2004, immigration<br />

officials have used expedited removal<br />

to deport individuals who arrive<br />

at our border, as well as individuals<br />

who entered without authorization<br />

if they are apprehended within<br />

two weeks of arrival and within 100<br />

miles of the Canadian or Mexican<br />

border.<br />

One of the major problems with<br />

expedited removal is that the immigration<br />

officer making the decision<br />

virtually has unchecked authority.<br />

Individuals subject to expedited<br />

removal rarely see the inside of a<br />

courtroom because they are not afforded<br />

a regular immigration court<br />

hearing before a judge. In essence,<br />

the immigration officer serves both<br />

as prosecutor and judge. Further,<br />

given the speed at which the process<br />

takes place, there is rarely an opportunity<br />

to collect evidence or consult<br />

with an attorney, family member, or<br />

friend before the decision is made.<br />

Such a truncated process means<br />

there is a greater chance that persons<br />

are being erroneously deported<br />

from the United States, potentially<br />

to imminent harm or death. Moreover,<br />

individuals who otherwise<br />

might qualify for deportation relief<br />

if they could defend themselves<br />

in immigration court are unjustly<br />

deprived of any opportunity to do<br />

so. Yet expedited removal has been<br />

33<br />

increasingly applied in<br />

recent years; 44 percent<br />

of all removals from the<br />

United States were conducted<br />

through expedited<br />

removal in Fiscal Year<br />

(FY) 2013, the most recent<br />

government data available.<br />

A dramatic expansion,<br />

as directed by President<br />

Trump, might result<br />

in thousands of additional<br />

deportations without due process.<br />

What the Law Says<br />

“Expedited removal” refers to the<br />

legal authority given to even lowlevel<br />

immigration officers to order<br />

the deportation of some non-U.S.<br />

citizens without any of the dueprocess<br />

protections granted to most<br />

other people—such as the right to<br />

an attorney and to a hearing before<br />

a judge. The Illegal Immigration<br />

and Immigrant Responsibility Act<br />

of 1996 created expedited removal,<br />

but the federal government subsequently<br />

expanded it significantly.<br />

As it now stands, immigration officers<br />

can summarily order the removal<br />

of nearly any foreign national


Hot Topics: More opinions on Immigration<br />

who arrives at the border without<br />

proper documents; additionally, undocumented<br />

immigrants who have<br />

been in the United States 14 days or<br />

less since entering without inspection<br />

are subject to expedited removal<br />

if an immigration officer encounters<br />

them within 100 miles of the<br />

U.S. border with either Mexico or<br />

Canada. As a general rule, however,<br />

DHS applies expedited removal to<br />

only those Mexican and Canadian<br />

nationals with histories of criminal<br />

or immigration violations, as well as<br />

persons from other countries who<br />

are transiting through Mexico or<br />

Canada. There is no right to appeal<br />

an immigration officer’s decision to<br />

deport someone via expedited removal.<br />

Individuals in expedited removal<br />

are detained until removed.<br />

By law, expedited removal may<br />

not be applied to certain individuals.<br />

U.S. citizens or lawful permanent<br />

residents (LPRs, or “green<br />

card” holders) should not be subject<br />

to expedited removal. Nor should<br />

it be used against refugees, asylees,<br />

or asylum seekers (people who fear<br />

persecution in their home countries<br />

or indicate an intention to apply for<br />

asylum).<br />

Asylum seekers are instead referred<br />

to an asylum officer for an<br />

interview to determine if they have<br />

a “credible fear” of persecution. If<br />

an individual has been previously<br />

deported, an asylum officer determines<br />

if the person has a “reasonable<br />

fear” of persecution—a higher<br />

standard than “credible fear.” If the<br />

asylum officer fails to find that the<br />

person has a credible or reasonable<br />

fear of return, that person is ordered<br />

removed. Before deportation, the<br />

individual may challenge the asylum<br />

officer’s adverse finding by requesting<br />

a hearing before an immigration<br />

judge, who must review the<br />

case “to the maximum extent practicable<br />

within 24 hours, but in no<br />

case later than 7 days….” The judge’s<br />

review is limited solely to assessing<br />

whether the individual’s fear is credible<br />

or reasonable.<br />

Individuals found to have a credible<br />

or reasonable fear of persecution<br />

are detained pending further<br />

review of their asylum case. In limited<br />

circumstances, these individuals<br />

may be paroled—that is, released<br />

from detention—and permitted to<br />

remain in the United States while<br />

their asylum case is pending.<br />

Until January <strong>2017</strong>, an exception<br />

to expedited removal had been<br />

made for “an alien who is a native<br />

or citizen of a country in the Western<br />

Hemisphere with whose government<br />

the United States does not<br />

have full diplomatic relations and<br />

who arrives by aircraft at a port of<br />

34<br />

entry.” Cubans arriving by aircraft<br />

had been exempted from expedited<br />

removal under this provision, but in<br />

the closing days of the Obama administration,<br />

DHS published a regulation<br />

eliminating Cuban nationals<br />

from the exemption.<br />

Use of Expedited Removal<br />

Is on the Rise<br />

The use of expedited removal to deport<br />

people has risen substantially<br />

over the past two decades. In FY<br />

2013, approximately 193,000 persons<br />

were deported from the United<br />

States through expedited removal.<br />

That represents 44 percent of all<br />

438,000 removals from the United<br />

States in 2013<br />

CONCERNS ABOUT<br />

EXPEDITED REMOVAL<br />

Erroneous Deportations<br />

There are few checks on the authority<br />

of immigration officers to place<br />

non-citizens in expedited removal<br />

proceedings. In essence, the law<br />

permits the immigration officer to<br />

serve both as prosecutor (charged<br />

with enforcing the law) and judge<br />

(rendering a final decision on the<br />

case). Generally, the entire process<br />

consists of an interview with the inspecting<br />

officer, so there is little or<br />

no opportunity to consult with an<br />

attorney or to gather any evidence


that might prevent deportation. For<br />

those who are traumatized from<br />

their journey or harm they fled,<br />

the short timelines can make it extremely<br />

difficult to clearly explain<br />

why they need protection in the<br />

United States.<br />

The abbreviated process increases<br />

the likelihood that a person who is<br />

not supposed to be subject to expedited<br />

removal—such as a U.S. citizen<br />

or LPR—will be erroneously removed.<br />

Moreover, individuals who<br />

otherwise would be eligible to make<br />

a claim for “relief from removal”<br />

(to argue they should be permitted<br />

to stay in the United States) may be<br />

unjustly deprived of any opportunity<br />

to pursue relief. For example, a<br />

witness or victim of a crime might<br />

be eligible for status but is prohibited<br />

from making such a claim in<br />

expedited removal proceedings.<br />

Inadequate Protection<br />

of Asylum Seekers<br />

In practice, not all persons expressing<br />

a fear of persecution if returned<br />

to their home countries are provided<br />

a credible or reasonable fear screening.<br />

Studies by the U.S. Commission<br />

on International Religious Freedom<br />

(USCIRF) noted that, in some cases,<br />

immigration officers pressured<br />

individuals expressing fear into<br />

withdrawing their application for<br />

admission—and thus their request<br />

for asylum—despite DHS policies<br />

forbidding the practice. In other<br />

cases, government officers failed to<br />

ask if the arriving individual feared<br />

return. In addition, the Commission<br />

found that the government did<br />

not have sufficient quality assurance<br />

mechanisms in place to ensure that<br />

asylum seekers were not improperly<br />

being turned back.<br />

A Growing Backlog of<br />

Asylum Applications<br />

Individuals expressing fear of return<br />

who are diverted from expedited<br />

removal are referred to asylum officers<br />

for screening. These officers<br />

are often the same corps handling<br />

affirmative asylum applications (i.e.,<br />

cases filed by individuals not in removal<br />

proceedings). Since these<br />

asylum seekers are detained pending<br />

completion of the credible or<br />

reasonable fear process, their cases<br />

are prioritized by the government.<br />

Asylum Office resources are therefore<br />

diverted to these interviews,<br />

contributing to the backlog of affirmative<br />

asylum cases.<br />

Further expansion of expedited<br />

removal will require significantly<br />

more asylum officers, or the backlog<br />

of affirmative asylum cases will<br />

continue to grow. This workload<br />

management crisis could be avoided<br />

35<br />

entirely if DHS personnel placed all<br />

asylum seekers apprehended at the<br />

border in regular immigration court<br />

proceedings and paroled them<br />

pending their hearings. Providing<br />

the immigration court system with<br />

enough funds to sufficiently staff<br />

immigration judge teams would<br />

help ensure that asylum seekers get<br />

a prompt court hearing.<br />

FREE SUBSCRIPTION<br />

SIGN-UP<br />

Monthly <strong>Digital</strong> <strong>Edition</strong><br />

Airport/Seaport <strong>News</strong>letter<br />

Daily Insider <strong>News</strong>letter<br />

Cybersecurity <strong>News</strong>letter<br />

CLICK HERE


Expansion of DMARC is critical to reducing spread of<br />

malicious emails, says Global Cyber Alliance, calling on<br />

leading Cyber companies to improve email protections<br />

SAN FRANCISCO, CA – <strong>February</strong><br />

14, <strong>2017</strong> – There is a fix that can prevent<br />

a great amount of email-born<br />

attacks on consumers and businesses.<br />

Unfortunately, the vast majority<br />

of public and private organizations<br />

globally, including leading<br />

cybersecurity companies, have not<br />

deployed DMARC (Domain-based<br />

Message Authentication, Reporting<br />

& Conformance) to prevent<br />

spammers and phishers from<br />

using an organization’s name to<br />

conduct cyber attacks, according<br />

to new research from the Global<br />

Cyber Alliance (GCA).<br />

DMARC provides insight into<br />

any attempts to spam, phish or<br />

spear-phish using an organization’s<br />

brand or name. DMARC is supported<br />

by 85 percent of consumer<br />

email inboxes in the United States<br />

(including Gmail, Yahoo, Microsoft,<br />

etc.) and more than 2.5 billion<br />

email inboxes worldwide. However,<br />

DMARC adoption rates among enterprises<br />

and government remains<br />

low.<br />

The UK <strong>Government</strong>’s guidance<br />

for government agencies directs<br />

them to implement DMARC but<br />

as of December 2016 only five percent<br />

of UK public sector domains<br />

had done so. A mere 16 percent of<br />

the healthcare sector has adopted<br />

DMARC.<br />

The latest research from GCA, an<br />

international cross-sector organization<br />

dedicated to confronting systemic<br />

cyber risk, finds that adoption<br />

remains low in the cybersecurity industry<br />

as well.<br />

Only 15 percent of the 587 email<br />

domains (that were scanned) for<br />

companies exhibiting at the RSA<br />

Conference -- one of the world’s<br />

largest gatherings of cybersecurity<br />

experts -- use DMARC. Of the<br />

90 RSA exhibiting organizations<br />

that do use DMARC, more than<br />

66 percent use the DMARC policy<br />

of “none,” which only monitors for<br />

email domains, greatly reducing the<br />

effectiveness of DMARC.<br />

36<br />

It is time for the cybersecurity industry<br />

to lead the charge and push<br />

for DMARC use across the globe.<br />

GCA strongly advocates that organizations<br />

implement DMARC and<br />

has developed a free DMARC Setup<br />

Guide to make DMARC implementation<br />

easier (https://dmarc.globalcyberalliance.org/).<br />

The value of correctly implementing<br />

DMARC is clear as studiesiii<br />

have shown that organizations<br />

that use DMARC correctly receive<br />

just 23 percent of the email<br />

threats that those who do not<br />

use DMARC.<br />

“As world leaders in cybersecurity,<br />

we can do better. DMARC protects<br />

brands and preserves consumer<br />

confidence. While no security effort<br />

is cost-free, clear guidance and<br />

tools, such as the GCA DMARC<br />

Setup Guide, make DMARC implementation<br />

practical, and the benefits<br />

are considerable. DMARC is<br />

one of the cybersecurity protocols<br />

that can broadly reduce risk, and the<br />

more it is implemented, the more<br />

protection if offers for everyone,”<br />

said Philip Reitinger, President and


CEO of GCA. “I’m placing a stake<br />

in the ground and calling on the<br />

cybersecurity industry to lead the<br />

adoption of DMARC, with a goal<br />

that 50 percent of the companies<br />

that exhibit at the 2018 RSA Conference<br />

implement DMARC prior<br />

to the conference, and that 90 percent<br />

implement prior to the 2019<br />

RSA Conference. Working together<br />

the cybersecurity industry can be a<br />

role model and make a difference.”<br />

About The Global Cyber Alliance<br />

The Global Cyber Alliance (GCA)<br />

is an international, cross-sector effort<br />

dedicated to confronting cyber<br />

risk and improving our connected<br />

world. It is a catalyst to bring communities<br />

of interest and affiliations<br />

together in an environment that<br />

sparks innovation with concrete,<br />

measureable achievements. While<br />

most efforts at addressing cyber risk<br />

have been industry, sector, or geographically<br />

specific, GCA partners<br />

across borders and sectors. GCA’s<br />

mantra “Do Something. Measure It.”<br />

is a direct reflection of its mission to<br />

eradicate systemic cyber risks.<br />

GCA, a 501(c)3, was founded in<br />

September 2015 by the Manhattan<br />

District Attorney’s Office, the City<br />

of London Police and the Center<br />

for Internet <strong>Security</strong>. Learn more at<br />

www.globalcyberalliance.org.<br />

Milestone release, enabling<br />

record-breaking performance for<br />

XProtect users, delivers highest<br />

performing VMS ever, complete with<br />

new Cybersecurity focus.<br />

COPENHAGEN – <strong>February</strong> 15,<br />

<strong>2017</strong> – Milestone Systems, the open<br />

platform company in networked<br />

video management software (VMS),<br />

has released XProtect <strong>2017</strong> R1.<br />

Milestone is committed to delivering<br />

three VMS product releases every<br />

year, in addition to bi-monthly<br />

device pack releases supporting<br />

third-party devices. This frequent<br />

release schedule will ensure Milestone’s<br />

rapid response to market and<br />

Milestone community needs.<br />

Highest VMS Performance<br />

Thanks to the true open platform<br />

technology in XProtect, Milestone<br />

can rapidly respond to community<br />

needs and enable cost-efficiency in<br />

large installations. For XProtect,<br />

this entails a recording server performance<br />

of 3.1 Gigabit/S. This high<br />

performance level enables Milestone<br />

community partners to offer<br />

large solutions using a reduced<br />

number of servers, or even smaller<br />

servers. This contributes to hardware<br />

costs savings and a simplified<br />

37<br />

infrastructure. In short, it significantly<br />

reduces the total cost of a<br />

Milestone solution.<br />

Pioneering Hardware Acceleration<br />

In the latest XProtect releases, Milestone<br />

has harvested the advantages<br />

of the close<br />

relationships<br />

with Intel and<br />

Microsoft by<br />

implementing<br />

hardware acceleration.<br />

The<br />

processor-intensive<br />

task of<br />

decoding (rendering)<br />

video is<br />

offloaded to the<br />

Bjorn Skou Eilertsen<br />

CTO<br />

dedicated graphics system (GPU)<br />

inside the processer, leaving the<br />

main processor free to take on other<br />

tasks. The GPU is optimized to handle<br />

computer graphics and video,<br />

meaning these tasks will be greatly<br />

accelerated. Using the technology in<br />

servers can save even more expen-<br />

More on page 43


Facial biometric boarding solution by<br />

Vision Box being tried at Schipol Airport<br />

AMSTERDAM, <strong>February</strong> 10th,<br />

<strong>2017</strong> – Boarding quickly and easily<br />

without showing your boarding<br />

pass or passport is the goal of the<br />

biometric boarding trial in operation<br />

at Schiphol Airport. Involving<br />

KLM, the three-month initiative<br />

intends to test facial recognition to<br />

expedite and speed up passenger<br />

boarding, recognizing them by their<br />

face.<br />

At a specially selected gate at the<br />

airport, a dedicated kiosk was made<br />

available for passengers to register<br />

for the trial, by scanning their passport<br />

and their boarding pass, as well<br />

as enroll their face image. This will<br />

allow them to quickly go through a<br />

biometric eGate simply looking at a<br />

camera, without showing any document.<br />

Vision-Box and Schiphol have<br />

been working together in the scope<br />

of the recently announced framework<br />

agreement, developing innovations<br />

and creating smart ways of<br />

improving ease of travel, speed, and<br />

airport processes. As the airport<br />

aims to become “Leading <strong>Digital</strong><br />

Airport” in 2018, Vision-Box was<br />

the partner allowing one further<br />

step in that direction.<br />

It is expected that after the trial,<br />

biometric boarding will roll out to<br />

more boarding gates at the airport.<br />

About Vision-Box<br />

Founded in 2001, Vision-Box is<br />

the leading provider of electronic<br />

identity solutions, intelligent security<br />

management, and automated<br />

border control systems that use<br />

ICAO- compliant standards.<br />

The biometric border control<br />

portfolio aimed at airports, airlines<br />

and immigration authorities, includes<br />

solutions addressing a variety<br />

of business scenarios which englobe<br />

38<br />

security check-points, self-boarding<br />

gates and automated border control<br />

gates.<br />

Every second, millions of images<br />

are being captured and processed<br />

by Vision-Box systems, installed<br />

right at the heart of the most prestigious<br />

organizations, who trust our<br />

biometric identity and digital video<br />

management solutions for their<br />

critical applications.<br />

Covering the entire ID management<br />

life cycle, Vision-Box also<br />

delivers, to governments and issuing<br />

authorities, solutions ranging<br />

from live biometric enrollment stations,<br />

document verification kiosks<br />

and digital document dispensers.<br />

Starting with the process of identity<br />

enrollment, covering the life cycle<br />

of a biometric identity document<br />

and finally assuring its verification<br />

and identification towards the user,<br />

Vision-Box’s product portfolio is<br />

linked together through a powerful<br />

service platform, which orchestrates<br />

the trusted chain of identity of the<br />

citizen. Vision-Box’s solution portfolio<br />

enables the implementation<br />

of advanced border management<br />

systems, integrated with advanced<br />

More on page 43


Statement from Secretary Kelly on recent<br />

ICE enforcement actions<br />

WASHINGTON, DC – <strong>February</strong><br />

14 – Last week, U.S. Immigration<br />

and Customs Enforcement (ICE)<br />

launched a series of targeted enforcement<br />

operations across the<br />

country. These operations targeted<br />

public safety threats, such as convicted<br />

criminal aliens and gang<br />

members, as well as individuals who<br />

have violated our nation’s immigration<br />

laws, including those who illegally<br />

re-entered the country after<br />

being removed and immigration fugitives<br />

ordered removed by federal<br />

immigration judges.<br />

ICE officers in the Los Angeles,<br />

Chicago, Atlanta, San Antonio and<br />

New York City areas of responsibility<br />

arrested more than 680 individuals<br />

who pose a threat to public safety,<br />

border security or the integrity<br />

of our nation’s immigration system.<br />

Of those arrested, approximately 75<br />

percent were criminal aliens, convicted<br />

of crimes including, but not<br />

limited to, homicide, aggravated<br />

sexual abuse, sexual assault of a minor,<br />

lewd and lascivious acts with<br />

a child, indecent liberties with a<br />

minor, drug trafficking, battery, assault,<br />

DUI and weapons charges.<br />

ICE conducts these kind of targeted<br />

enforcement operations regularly<br />

and has for many years. The focus<br />

of these enforcement operations is<br />

consistent with the routine, targeted<br />

arrests carried out by ICE’s Fugitive<br />

Operations teams on a daily basis.<br />

President Trump has been clear<br />

in affirming the critical mission of<br />

DHS in protecting the nation and<br />

directed our Department to focus<br />

on removing illegal aliens who have<br />

violated our immigration laws, with<br />

a specific focus on those who pose<br />

a threat to public safety, have been<br />

charged with criminal offenses,<br />

have committed immigration violations<br />

or have been deported and reentered<br />

the country illegally.<br />

I commend the heroic efforts of<br />

the dedicated officers of ICE’s Office<br />

of Enforcement and Removal<br />

Operations and those who provided<br />

assistance from ICE Homeland <strong>Security</strong><br />

Investigations, the U.S. Marshals<br />

Service, as well as cooperating<br />

state and local law enforcement<br />

agencies. These professionals put<br />

their lives on the line to protect our<br />

communities and country. There is<br />

no greater calling than to serve and<br />

protect our nation – a mission that<br />

the men and women of ICE perform<br />

39<br />

with professionalism and courage<br />

every single day.<br />

Fact Sheets<br />

• 190 arrested in Georgia, the<br />

Carolinas, during ICE operation<br />

targeting criminal aliens, illegal<br />

re-entrants and immigration<br />

fugitives<br />

• 235 arrested in six Midwestern<br />

states during ICE operation<br />

targeting criminal aliens, illegal<br />

re-entrants, and immigration<br />

fugitives<br />

• ICE arrests 161 in Los Angelesarea<br />

operation targeting criminal<br />

aliens, illegal re-entrants, and<br />

immigration fugitives<br />

• 41 arrested in New York-area ICE<br />

operation targeting criminal<br />

aliens, illegal re-entrants, and<br />

immigration fugitives<br />

• 28 arrested in San Antonio-area<br />

ICE operation targeting criminal<br />

aliens, illegal re-entrants, and<br />

immigration fugitives<br />

ICE Fugitive Enforcement Operations


Cyberbit’s EDR Platform to help<br />

Infor detect Malware that bypasses<br />

antivirus<br />

Continued from page 4<br />

how Cyberbit maximizes protection<br />

against today’s signature-less<br />

threats, visit www.cyberbit.net.<br />

About Infor<br />

Infor builds business software for<br />

specific industries in the cloud.<br />

With 15,000 employees and over<br />

90,000 customers in more than 170<br />

countries, Infor software is designed<br />

for progress. To learn more about Infor,<br />

please visit www.infor.com.<br />

Farpointe warns access control<br />

channel to suggest customers add<br />

Anti-Hacking measures<br />

Continued from page 27<br />

a smartcard reader effectively help<br />

verify that the sensitive access control<br />

data programmed to a card or<br />

tag is not counterfeit.<br />

“With the increasing incidences<br />

of hacking throughout the world<br />

and the fact that the FTC is now reviewing<br />

such cyber security lapses<br />

should make channel partners providing<br />

access control products and<br />

systems take notice and suggest<br />

anti-hacking solutions to their customers,”<br />

Lindley argues.<br />

British air traffic control provider<br />

tabs Rohde & Schwarz<br />

Continued from page 16<br />

and sustainable air traffic control<br />

in line with the highest safety standards.<br />

Rohde & Schwarz is a proven<br />

provider on the market offering the<br />

ability to create virtual control centres.<br />

The electronics firm meets this<br />

challenge with the R&S VCS-4G IP<br />

based voice communications system.<br />

The fully VoIP-based system<br />

in line with the EUROCAE ED-137<br />

B standard features a distributed,<br />

redundant architecture. It will link<br />

the control centres in Swanwick<br />

and Prestwick and provide the geographic<br />

flexibility to manage their<br />

operations as one operational environment<br />

in the future.<br />

Rohde & Schwarz is participating<br />

in the World ATM Congress <strong>2017</strong><br />

in Madrid. From March 7 to 9, the<br />

company will showcase its comprehensive<br />

portfolio for state-of-the-art<br />

air traffic management at booth 586,<br />

hall 9. More information: https://atc.<br />

rohde-schwarz.com.<br />

About Rohde & Schwarz<br />

The Rohde & Schwarz electronics<br />

group is a leading supplier of solutions<br />

in the fields of test and measurement,<br />

broadcasting, secure<br />

communications, and radiomonitoring<br />

and radiolocation. Founded<br />

80 years ago, this independent global<br />

company has an extensive sales<br />

network and is present in more than<br />

40<br />

Law suits challenge “Muslim Ban”<br />

executive order<br />

Continued from page 10<br />

6-year-old Somali son is also in limbo.<br />

Ms. Ali, a U.S. citizen, began the<br />

process to bring him to the United<br />

States in August 2016. But they too<br />

now are left to worry that the visa<br />

process will remain suspended indefinitely.<br />

Like thousands before them, these<br />

plaintiffs have diligently pursued the<br />

rigorous immigrant visa process,<br />

which includes paying hundreds<br />

of dollars in filing fees, undergoing<br />

security screenings and medical examinations,<br />

and attending an interview<br />

before a consular officer.<br />

The arbitrary and unfair nature<br />

of the ban will be difficult to defend<br />

in court. There are multiple challenges<br />

afoot and likely many more<br />

to come as the President seeks to<br />

close America’s doors to the rest of<br />

the world.<br />

70 countries. It has around 9300 employees<br />

and achieved a net revenue<br />

of EUR 1.9 billion (USD 2.5 billion)<br />

in fiscal year 2012/2013 (July 2012<br />

through June 2013). The company is<br />

headquartered in Munich, Germany.<br />

R&S ® is a registered trademark<br />

of Rohde & Schwarz GmbH & Co.<br />

KG


AMICO <strong>Security</strong> Launches Next<br />

Generation ANC Composite Fence<br />

System<br />

Continued from page 17<br />

fence system is fire retardant and<br />

corrosion resistant. Laboratory testing<br />

of leakage current and flashover<br />

voltage shows the ANC fence system<br />

revealed no electrical conductivity<br />

for up to 650,000 volts.<br />

About AMICO <strong>Security</strong><br />

AMICO security is an industry<br />

leader in manufacturing medium<br />

to high security perimeter systems.<br />

AMICO has been in business<br />

for over 76 years and our patented<br />

proprietary systems protect infrastructure<br />

and boarders throughout<br />

the world. The new AMIGUARD<br />

perimeter system is the gold standard<br />

for perimeter protection and<br />

is rapidly becoming the number one<br />

choice for infrastructure protection<br />

worldwide.<br />

Federal Experts Agree that<br />

‘Internet of Things’ Demands<br />

Simple Baked-In <strong>Security</strong><br />

Continued from page 26<br />

becoming concerned with identity<br />

and maintaining a “chain of custody<br />

to the device, to the network, to the<br />

solution,” to ensure appropriate access.<br />

The cloud’s role<br />

in IoT development<br />

When it comes to application development<br />

incorporating mobility and<br />

IoT, panelists concurred that the<br />

cloud offers a means of shortcutting<br />

the process, with minimal risk to security.<br />

<strong>Government</strong> versions of the<br />

cloud are usually more secure than<br />

enterprise offerings, which allows<br />

people to focus on solving their<br />

problem, rather than on building<br />

out infrastructure, said Parikh.<br />

“When we talk about IoT and you<br />

say, ‘Yes, I’m going to build it from<br />

the sensor all the way up to the<br />

cloud and I’m going to have all that<br />

in my agency,’ good luck. We’ll see<br />

you in a couple of decades and you’ll<br />

be left behind,” Parikh noted.<br />

Padin agreed that the cloud offers<br />

a more practical environment<br />

for the coming wave of IoT applications.<br />

IoT sensors, Padin said,<br />

generate “tons of data,” and it isn’t<br />

“realistic” to house that data in an<br />

on-premise system.<br />

41<br />

What’s more, the data generated<br />

by IoT devices ties back to mobility,<br />

Padin said. “We have this great<br />

pool of data, what do we do with it?<br />

People want access to it in real-time,<br />

but how?” Mobility can provide active<br />

alerting to take action on data<br />

in real-time, extended to the mobile<br />

device. “All of this is interconnected,”<br />

he said. “It’s a system that needs<br />

to be thought about completely.”<br />

Despite concerns about security,<br />

panelists agreed that there is huge<br />

upside potential to IoT for government<br />

applications.<br />

“These are really quite exciting<br />

times,” said Dodson. “The changes<br />

we will see in this nation in the next<br />

10 years will really dwarf what we<br />

saw with the IT revolution.”<br />

BIO: Tom O’Keefe<br />

is a consultant with<br />

immixGroup, an<br />

Arrow company<br />

that helps technology<br />

companies<br />

do business with<br />

the government. Tom focuses on IT<br />

trends in civilian agencies, as well<br />

as the Internet of Things and mobility.<br />

He can be reached at Tomas_<br />

Okeefe@immixgroup.com, or connect<br />

with him on LinkedIn at www.<br />

linkedin.com/in/tmokeefe.


Abandoning priorities will make<br />

immigration enforcement work<br />

much harder<br />

Continued from page 32<br />

ty, or in the case of recent border<br />

crossers, whose unauthorized<br />

presence undermined efforts to<br />

secure the border. At each step<br />

of the way, the emphasis was on<br />

assessing individual equities.<br />

Balancing equities is hard<br />

work, and the series of memos<br />

issued from 2010 to 2014 on<br />

enforcement priorities and the<br />

exercise of discretion were attempts<br />

to ensure that people did<br />

the hard work of individually<br />

reviewing and thinking through<br />

the implications of each case.<br />

Many officers will continue to<br />

make their decisions to arrest<br />

and detain based on a belief that<br />

exercising favorable discretion is<br />

part of their job. But some, especially<br />

those who didn’t like the<br />

idea that they were being told<br />

how to prioritize their work, may<br />

not do so. In fact, some will see<br />

it as their duty and obligation to<br />

arrest everyone, no matter the<br />

compelling circumstances. And<br />

that is what can lead to chaos.<br />

Does guidance serve as a constraint<br />

on power? Of course, but<br />

that isn’t a bad thing. Everyone<br />

needs guidance to do their jobs,<br />

especially when their jobs have<br />

Salient CRGT Announces<br />

Agreement to Acquire<br />

Information Innovators, Inc.<br />

Continued from page 25<br />

firm based in Chicago. The firm focuses<br />

on investing in lower middle<br />

market buyout transactions in the<br />

food, industrial, and services industries.<br />

Frontenac works in partnership<br />

with proven operating leaders,<br />

through our executive-centric approach<br />

called CEO1st®, to identify,<br />

acquire, and build market leading<br />

companies through transformational<br />

acquisitions and operational<br />

excellence. The firm has built a leading<br />

franchise working with over 225<br />

owners of mid-sized businesses, almost<br />

always families or founders,<br />

as they address complex transition<br />

issues of liquidity, management enhancement,<br />

and growth planning.<br />

For more information, please visit<br />

www.frontenac.com.<br />

life and death implications for<br />

others. By stripping away much,<br />

if not all, of the guidance of the<br />

last eight years, and offering<br />

nothing in its place, DHS just<br />

made its officers’ jobs harder,<br />

not easier.<br />

42<br />

New memos reveal harsh and<br />

unforgiving immigration road<br />

map as DHS implements President<br />

Trump’s Executive Orders<br />

Continued from page 30<br />

United States. They even include<br />

individuals simply charged or<br />

suspected of having committed<br />

crimes.<br />

Creation of a deportation force.<br />

The memos order the hiring of<br />

5,000 additional Customs and<br />

Border Protection (CBP) agents<br />

and 10,000 additional Immigration<br />

and Customs Enforcement<br />

(ICE) agents. They direct a massive<br />

expansion of 287(g)—a law<br />

that allows DHS to deputize state<br />

and local law enforcement officers<br />

to perform the functions<br />

of immigration agents. And,<br />

they reinstate Secure Communities<br />

and terminate the Priority<br />

Enforcement Program, which<br />

expand the ways in which local<br />

police collaborate with ICE. This<br />

approach will have devastating<br />

consequences for immigrant<br />

communities and undermine<br />

public safety rather than make<br />

our nation more secure.<br />

Plans to bypass immigration<br />

courts and short-circuit due<br />

process. The memos indicate<br />

that many people in the interior<br />

of the country – not just those at<br />

the border – could be subject to<br />

expedited deportation without


going before a judge, the details<br />

of which DHS said will be forthcoming<br />

in a notice in the Federal<br />

Register. This expansion of “expedited<br />

removal,” will allow the<br />

government to bypass the backlogged<br />

immigration courts in order<br />

to deport people rapidly and<br />

with little-to-no due process.<br />

While the feasibility of many of<br />

these policies depends on Congressional<br />

willingness to fund<br />

them and whether they pass<br />

muster in the courts, undeniably,<br />

these policies are thin on humanity<br />

and thick on punishment.<br />

They will separate families, cultivate<br />

fear among immigrant<br />

communities, and destabilize<br />

our economy.<br />

Facial biometric boarding solution<br />

by Vision Box being tried at<br />

Schipol Airport<br />

Continued from page 38<br />

digital video analytics solutions, intelligent<br />

biometric and biographic<br />

data management engines and danger<br />

management functionalities.<br />

Vision-Box operates over 1200<br />

Automated Border Control solutions<br />

in more than 70 international<br />

airports and has over 3000 electronic<br />

identity systems deployed across<br />

the globe. www.vision-box.com<br />

Milestone release delivers highest<br />

performing VMS ever for XProtect<br />

users<br />

Continued from page 37<br />

sive computer muscle.<br />

Hardware-accelerated video motion<br />

detection is new in XProtect<br />

<strong>2017</strong> R1 - another industry first for<br />

VMS software. Customers can have<br />

twice as many cameras on the same<br />

server with the same CPU load, or<br />

experience up to 90 percent reduction<br />

in the CPU load with the same<br />

number of cameras on the server*.<br />

This use of hardware acceleration<br />

lets mid- to large-scale installations<br />

experience improved performance<br />

at a lower hardware cost.<br />

Hardware acceleration was already<br />

implemented in the XProtect<br />

2016 Smart Client. This provided an<br />

80 percent reduction in the processor<br />

load on computers with selected<br />

Intel processors, firmware, drivers<br />

and Microsoft operating systems.<br />

This paves the way for the use of 4K<br />

cameras and processing-intensive<br />

video compressions like H.265.<br />

New Cybersecurity Features<br />

As video management systems are<br />

becoming more and more businesscritical,<br />

cybersecurity is a natural<br />

focus. In 2016, Milestone launched<br />

several initiatives aimed at strengthening<br />

security in Milestone software.<br />

Like the Hardening Guide that<br />

details how an XProtect installation<br />

43<br />

can be better secured against cyber<br />

threats and the Kerberos strict userverification<br />

in XProtect.<br />

The XProtect <strong>2017</strong> R1 update includes<br />

several security enhancements<br />

for improved cybersecurity,<br />

including two-step verification and<br />

greater control when granting user<br />

permissions for the Milestone Advanced<br />

VMS products.<br />

Two-step verification is an industry-first<br />

security feature for<br />

XProtect <strong>2017</strong> R1. It is designed to<br />

prevent unauthorized access to the<br />

VMS when a password is compromised,<br />

as a code from the user’s mobile<br />

phone is needed to complete<br />

login.<br />

Keeping VMS systems isolated<br />

from the Internet is one important<br />

element when it comes to keeping a<br />

high security level. XProtect Smart<br />

Maps (introduced last year) now include<br />

support for OpenStreetMap<br />

offline maps: This means that customers<br />

with offline installations can<br />

take advantage of improved situational<br />

awareness by using maps,<br />

without exposing their XProtect<br />

system to online threats.<br />

“We take cybersecurity very seriously.<br />

Milestone is constantly adding<br />

security features to XProtect<br />

software and helping the Milestone<br />

community focus on VMS security,”<br />

Eilertsen says.<br />

XProtect <strong>2017</strong> R1 is available to<br />

the Milestone community now.


Supreme Court hears case on<br />

shooting of 15-year old by U.S.<br />

Border Patrol Agent<br />

Continued from page 31<br />

short, this is an extreme example of<br />

a system lacking even the most basic<br />

mechanisms of accountability.<br />

And now, the Trump administration’s<br />

Executive Order and subsequent<br />

implementation memo on<br />

border security and immigration<br />

enforcement would amount to a<br />

“surge” of 5,000 new Border Patrol<br />

agents with very few checks on<br />

their behavior in dealing with any<br />

non-U.S. citizen, particularly if that<br />

non-citizen has the misfortune to be<br />

standing in Mexico. Moreover, the<br />

drive to grab every unauthorized<br />

immigrant in sight without regard<br />

for any reasonable enforcement priorities—as<br />

reflected in the Executive<br />

Order—is a recipe for the use of<br />

excessive force.<br />

Pouring more resources and personnel<br />

into a dysfunctional system<br />

is not going to make that system<br />

any more functional. It’s just going<br />

to create an even bigger dysfunctional<br />

system. CBP—and the Border<br />

Patrol in particular—is already<br />

out of control. Even in cases where<br />

CBP officers injure or kill someone,<br />

they rarely suffer any serious<br />

consequences. This case speaks to<br />

a broader, systemic problem within<br />

CBP—an organizational culture in<br />

which anything goes.<br />

GSN’s <strong>2017</strong><br />

Airport/Seaport/Border <strong>Security</strong> Awards<br />

Opening for Entries on March 15 with Many New Categories<br />

All Winners in this program are<br />

entitled to a Full-Page Advertisement<br />

(8.5” x 9.0”) in your choice of GSN’s<br />

<strong>Digital</strong> Magazine or Leaderboard in<br />

any edition of the Airport, Seaport,<br />

Rail, Border <strong>Security</strong> Weekly<br />

<strong>News</strong>letter.<br />

Adrian Courtenay<br />

Managing Partner, CEO<br />

<strong>Government</strong> <strong>Security</strong> <strong>News</strong><br />

917-696-5782<br />

acourtenay@gsnmagazine.com<br />

NEW IN <strong>2017</strong>:<br />

CLICK HERE TO<br />

SUBMIT A NOMINATION<br />

All Finalists are entitled to a Half-<br />

Page Advertisement (8.5” x 4.5”) in<br />

your choice of GSN’s <strong>Digital</strong> Magazine<br />

or Leaderboard in any edition of the<br />

Airport, Seaport, Rail, Border <strong>Security</strong><br />

Weekly <strong>News</strong>letter.<br />

Steve Bittenbender<br />

Managing Editor<br />

<strong>Government</strong> <strong>Security</strong> <strong>News</strong><br />

502-552-1450<br />

sbittenbender@gsnmagazine.com<br />

Gerry O’Hara<br />

Designer<br />

OHDesign3<br />

203-249-0626<br />

gerry@ohd3.com<br />

44


The <strong>News</strong> Leader in Physical, IT and Homeland <strong>Security</strong><br />

CEO/Editorial Director<br />

Adrian Courtenay<br />

917-696-5782<br />

acourtenay@gsnmagazine.com<br />

Editor<br />

Steve Bittenbender<br />

502-552-1450<br />

sbittenbender@gsnmagazine.com<br />

Senior Writer<br />

Karen Ferrick-Roman<br />

412-671-1456<br />

karenferrickroman@gmail.com<br />

Columnist<br />

Shawn Campbell<br />

Campbell on Crypto<br />

shawn.campbell@safenetat.com<br />

Columnist<br />

George Lane<br />

Hazmat Science & Public Policy<br />

georgelane@hotmail.com<br />

Contributing Author<br />

Lloyd McCoy Jr<br />

Immix Group<br />

Contributing Author<br />

Walter Ewing<br />

Contributing Author<br />

Wendy Feliz<br />

Contributing Author<br />

Joshua Breisblatt<br />

Contributing Author<br />

J. Michael Barrett<br />

Contributing Author<br />

Christopher Millar<br />

Gatekeeper <strong>Security</strong><br />

Art Director<br />

Gerry O’Hara, OHDesign3<br />

gerry@ohd3.com<br />

203-249-0626<br />

Production Manager<br />

Brenden Hitt<br />

Brenden.hitt@gsnmagazine.com<br />

Direct: 203-216-7798<br />

COMING ATTRACTIONS<br />

March<br />

Late <strong>News</strong><br />

Tech Focus<br />

Perimeter Protection,<br />

Intrusion Detection<br />

Market Sector<br />

Border <strong>Security</strong> & Immigration<br />

April<br />

Late <strong>News</strong><br />

Tech Focus<br />

Law Enforcement,<br />

Public Safety<br />

Market Sector<br />

Cybersecurity Threats,<br />

Solutions<br />

45

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!