26.05.2017 Views

GSN_Magazine April Digital Edition

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Government Security News<br />

APRIL 2017 DIGITAL EDITION<br />

RVSS deployed for protection across the southern U.S. border, with PureActiv as its central<br />

monitoring and video intelligence platform, receives Full Operating Capability from DHS’<br />

Customs and Border Protection (CBP) – Page 8<br />

Also in this issue:<br />

For proactive security, Major General (res.) Aharon Zeevi Farkash, Founder and President of FST Biometrics,<br />

recommends building an aquarium– Page 6<br />

UTER Professor, Immigration Council question need for additional ICE and Border Patrol Agents,<br />

by Steve Bittenbender– Page 13


<strong>GSN</strong> <strong>April</strong> 2017 <strong>Digital</strong> <strong>Edition</strong> Table of Contents<br />

NEWS<br />

FEATURES<br />

4<br />

5<br />

6<br />

8<br />

11<br />

12<br />

13<br />

14<br />

16<br />

American-based Securiport’s intelligent immigration<br />

control aids in capture of two high-level ISIS terrorists<br />

at Senegal Airport<br />

G4S Security Integration achieves<br />

OHSAS 18001:2007 Certification<br />

For proactive security, says Israeli Major General (res.) Aharon Zeevi Farkash,<br />

Founder and President of FST biometrics, suggests building an aquarium<br />

RVSS achieves “Full Operating Capability”<br />

designation on Southern U.S. Border;<br />

CBP deployment features PureActive Geospatial C2<br />

and Video Analytics<br />

Pelco showcases latest technology innovations<br />

and strategic application solutions to Securika/MIPS 2017<br />

OnSSI integration with Jemez Technology improves<br />

perimeter protection surveillance effectiveness<br />

UTEP professor, Immigrant Council, question need for<br />

additional ICE and Border Security Patrol Agents,<br />

by Steve Bittenbender<br />

IRIS enters into global collaboration with TruTag<br />

in alliance that will create global market for the<br />

digitization of mission-critical smartcards and<br />

secure labels<br />

How to improve refugee vetting now –<br />

a 9/11 Commission border council perspective<br />

SPECIAL REPORT ON LAW ENFORCEMENT/PUBLIC SAFETY<br />

18<br />

20<br />

21<br />

22<br />

24<br />

26<br />

28<br />

29<br />

31<br />

32<br />

34<br />

36<br />

37<br />

38<br />

40<br />

San Francisco Department of Emergency Management<br />

selects NICE for 9-1-1 center grade<br />

Chicago considers ordinance requiring Panic Buttons<br />

for hotels<br />

Pro-Vision releases 1080p HD Video systems for law enforcement vehicles<br />

Taming the rising tide of digital evidence,<br />

by Linda Haelsen, NICE<br />

Kansas becomes first statewide deployment site<br />

of AT&T NextGen 911 Soltuion<br />

Rapid SOS secures $14M in investments to develop lifesaving 911 technology<br />

Cubic executive to discuss benefits of cloud hosting at transportation summit<br />

JW Fishers describes equipment now used to locate<br />

weapons and explosives<br />

Raytheon wins $375M contrast to modernize<br />

Air Force air and space operation centers<br />

Hikvision camera system to provide increased security for<br />

Miami Beach Holocaust Memorial<br />

SPECIAL REPORT ON CYBER THREATS & SOLUTIONS<br />

2 3<br />

Beyond Trust survey links breaches to aging federal infrastructure<br />

(ISC) 2 delivers cybersecurity workforce recommendations<br />

to White House Chief of Staff<br />

Imperva executive urges U.S. companies to evaluate pending<br />

EU cyber regulation<br />

Report: Municipal governments lack funding to reach high level of cybersecurity<br />

Cybersecurity executives ‘Wannacrypt’ ransomware attack a wake-up call<br />

for industry, government leaders


American-based Securiport’s intelligent<br />

immigration control aids in the capture of two<br />

high-level ISIS terrorists at Senegal airport<br />

<strong>April</strong> 18, 2017—According to several<br />

media reports, Securiport, a<br />

global leader in intelligent immigration<br />

controls and civil aviation<br />

security solutions, helped Senegalese<br />

authorities apprehend two<br />

high-ranking Daesh—most commonly<br />

referred to as ISIS—jihadists<br />

in the Senegal Airport.<br />

The suspects—of Moroccan descent—were<br />

traveling from Istanbul<br />

when they were flagged by Securiport’s<br />

global security system and<br />

arrested immediately. The names of<br />

the suspects have yet to be released,<br />

but they are the 36th terrorists to be<br />

captured by Senegalese authorities<br />

this year.<br />

In this globally connected world,<br />

ensuring strategic border security<br />

has become a high priority for European,<br />

Middle Eastern and African<br />

nations alike. Terrorists don’t<br />

respect international borders, so the<br />

need for implementing strong immigration<br />

control measures is imperative.<br />

As criminals and terrorists<br />

move across borders undetected,<br />

utilizing intelligent immigration<br />

control is a critical weapon in the<br />

fight against these new threats.<br />

And nowhere is there a greater<br />

need for border security than at<br />

airports. In 2016 Interpol flagged<br />

115,000 people attempting to use<br />

fraudulent passports and travel<br />

documents. That’s why countries<br />

typically ravaged by terrorists and<br />

criminals illegally crossing their<br />

borders are now relying on sophisticated<br />

airport security to assist them<br />

with their security.<br />

With this technology, and with<br />

the assistance of specially trained<br />

personnel, airports now have access<br />

to comprehensive biometric and<br />

passport screening technology in<br />

an integrated system, and real-time<br />

access to Interpol and similar international<br />

security-related databases.<br />

Securiport provides proprietary<br />

security solutions to governments<br />

in need. With state-of-the-art airport<br />

security, Securiport stems the<br />

flow of criminals and terrorists<br />

across borders by maximizing the<br />

usage of the most sophisticated<br />

predictive analytics tools, and big<br />

data, to keep airport passengers,<br />

and the world, safe.<br />

About Securiport<br />

Securiport LLC is a global leader<br />

in the design and implementation<br />

of civil aviation security, biometric<br />

screening, immigration control,<br />

and threat assessment systems.<br />

Headquartered in Washington, DC,<br />

USA, Securiport partners with governments<br />

from around the world.<br />

Securiport’s Civil Aviation and Immigration<br />

Security Services, a comprehensive<br />

security product that<br />

performs secure biometric recognition<br />

of travelers at immigration<br />

posts, provides proprietary systems<br />

for the identification of potential<br />

security risks, criminal activity, and<br />

disease prevention. Learn more at<br />

http://www.securiport.com.<br />

G4S Secure Integration achieves<br />

OHSAS 18001:2007 Certification<br />

Frank Cirone, G4S Secure<br />

Integration President<br />

Omaha, NE, May 1, 2017 – G4S Secure<br />

Integration’s corporate office in<br />

Omaha, NE has recently achieved<br />

registration to the Occupational<br />

Health and Safety Assessment Series<br />

(OHSAS) 18001:2007 specification.<br />

OHSAS is an internationally recognized<br />

standard for safety management<br />

systems; focusing<br />

on the management of<br />

risk, legal compliance<br />

and continuous improvement.<br />

G4S Secure Integration,<br />

part of G4S, is a<br />

leading systems integrator<br />

that brings innovative,<br />

flexible, and<br />

cost-efficient thinking<br />

to the design, construction,<br />

and maintenance of standalone<br />

or integrated communication<br />

networks and electronic security<br />

systems. Headquartered in Omaha,<br />

NE with sales and support nationwide,<br />

G4S Secure Integration provides<br />

customers with industry leading<br />

security solutions.<br />

Frank Cirone, G4S Secure Integration<br />

President, states, “by receiving<br />

this certification, it not only<br />

validates our commitment to a positive<br />

safety culture to employees, but<br />

to customers and business partners<br />

as well.”<br />

G4S Secure Integration partnered<br />

with Lloyd’s Register Quality<br />

Assurance (LRAQ) USA for the<br />

auditing and registration to the<br />

OHSAS 18001 standard. Lloyd’s<br />

Register Quality Assurance<br />

(LRQA) is the<br />

world’s leading provider<br />

of independent<br />

assessment services<br />

including certification,<br />

validation, verification<br />

and training<br />

across a broad spectrum<br />

of standards and<br />

schemes, with recognition<br />

from over 50<br />

accreditation bodies around the<br />

world.<br />

About G4S<br />

4 5<br />

G4S is the leading global, integrated<br />

security company, specializing in<br />

the provision of security services<br />

and solutions to customers. Our<br />

mission is to create material, sustainable<br />

value for our customers<br />

and shareholders by being the supply<br />

partner of choice in all our markets.<br />

G4S is quoted on the London<br />

Stock Exchange and has a secondary<br />

stock exchange listing in Copenhagen.<br />

G4S is active in around<br />

100 countries and has 600,000 employees.<br />

For more information on<br />

G4S, visit www.g4s.us.<br />

FREE SUBSCRIPTION<br />

SIGN-UP<br />

Monthly <strong>Digital</strong> <strong>Edition</strong><br />

Airport/Seaport Newsletter<br />

Daily Insider Newsletter<br />

Cybersecurity Newsletter<br />

CLICK HERE


For proactive security, build an aquarium<br />

Major General (res.)<br />

Aharon Zeevi Farkash,<br />

Founder and President<br />

of FST Biometrics<br />

This year there has been<br />

a significant increase in<br />

global terror. From Nice<br />

to Baghdad, Istanbul to<br />

Belgium and Tel Aviv,<br />

security agencies around the world<br />

are fully engaged in trying to prevent<br />

the next attack. In my extensive<br />

career in the Israel Defense Forces,<br />

and in particular within the intelligence<br />

community, I was constantly<br />

trying to create a “formula”, to look<br />

for that magic source of information<br />

that could help us prevent future attacks.<br />

And in that process, I learned two<br />

important truths:<br />

1. Such a solution does not exist.<br />

There is no one source of information<br />

that can help security forces<br />

prevent the next terror event.<br />

2. The next best thing is to build<br />

yourself an aquarium.<br />

Yes, that’s right. An aquarium. But,<br />

this aquarium isn’t filled with fish<br />

and a sunken plastic pirate ship.<br />

This is an aquarium of<br />

information, an ecosystem<br />

of sensors that combine<br />

to provide a clearer<br />

picture of the situations<br />

that security agencies<br />

must assess to prevent<br />

attacks from happening.<br />

This “intelligence<br />

aquarium” was filled<br />

with an array of sensors: signal intelligence,<br />

cyber intelligence, visual<br />

intelligence - not only from satellites-<br />

surveillance balloons, drones,<br />

special forces, human intelligence,<br />

interrogations and others. Any of<br />

these sources alone would do us<br />

no good; combined, they provided<br />

a clear picture of the security landscape.<br />

We fused all of this information,<br />

almost in real-time, into actionable<br />

intelligence for end-users (special<br />

forces, air force, any actor who<br />

could utilize the intelligence). This<br />

led me to understand the power of<br />

fusion. This real-time data fusion allows<br />

agencies to approach security<br />

with a preventative philosophy. We<br />

don’t want to look back at events after<br />

they happen, or learn lessons after<br />

another tragedy; we want to stop<br />

it before it happens.<br />

The power of fusion is the key to<br />

6<br />

effective preventative security.<br />

How Global Mega Trends Lead to<br />

the Demand for Convenient Security<br />

There are two mega trends in the<br />

world right now: 1) Urbanization<br />

and the rise of the megacities, which<br />

inevitably leads to rising crime rates,<br />

and 2) the need to prevent terrorism,<br />

which has become greater in<br />

the past year. With these two trends,<br />

increased security has become a necessity.<br />

But, security must also fit<br />

the pace of life. We do not want to<br />

live in a police state.<br />

Biometric technology provides an<br />

answer to this. If we can quickly and<br />

securely identify individuals before<br />

they enter a building – or prevent<br />

them from doing so – many security<br />

situations can be prevented before<br />

they take place. However, the lessons<br />

I learned from my intelligence<br />

experience apply to biometrics as<br />

well. Any sensor on its own – facial<br />

recognition, fingerprints, iris recognition,<br />

voice recognition – cannot<br />

provide the accuracy, speed, or the<br />

aesthetics needed for strong security<br />

that is also convenient for the<br />

public.<br />

Developing an effective biometric<br />

technology for secure access<br />

More on page 31<br />

ABOVE.<br />

BEYOND.<br />

Identify high risk individuals and activity<br />

with smarter passenger profiling.<br />

SITA’s iBorders® RiskManagement<br />

takes all available information<br />

and transforms it into actionable<br />

intelligence, both in real time<br />

and as part of building a case<br />

for investigation.<br />

Download our white paper to discover<br />

how SITA iBorders can help build<br />

intelligence into border operations.<br />

DISCOVER MORE


RVSS achieves “Full Operating Capability”<br />

designation on southern U.S. Border<br />

CBP deployment features PureActiv Geospatial C2 and Video Analytics.<br />

PHOENIX, AZ – The recent designation<br />

by the U.S Department of<br />

Homeland Security’s Customs and<br />

Border Protection (CBP) granted<br />

“Full Operating Capability” of<br />

General Dynamics’ Remote Video<br />

Surveillance Systems (RVSS) deployed<br />

for protection across the<br />

southern border of the United<br />

States. An important component<br />

of the RVSS system is PureTech<br />

Systems’ Geospatial Video Management<br />

System for Command<br />

and Control and the PureActiv®<br />

patented video analytics used for<br />

real-time automated long range<br />

detection, classification, and tracking<br />

in support of CBP’s mission<br />

along the U.S southern border.<br />

“Achieving this approval is a<br />

great accomplishment and we’re<br />

honored to be an instrumental part<br />

of the solution that is helping the<br />

great men and women of Customs<br />

and Border Protection protect<br />

our nation’s borders,” commented<br />

Larry Bowe, president and CEO of<br />

PureTech Systems. “Reaching this<br />

milestone was truly a team effort<br />

with all those involved.”<br />

General Dynamics, was awarded<br />

the contract to upgrade the RVSS<br />

capability along the southern U.S.<br />

border in July of 2013 with field<br />

deployments, including the Pure-<br />

Activ system, beginning in 2015.<br />

The RVSS system consists of a series<br />

of elevated towers and structures<br />

equipped with advanced<br />

electro-optical and infrared sensors<br />

enabled with video intelligence<br />

and advanced sensor control<br />

developed by PureTech Systems to<br />

provide persistent ground surveillance<br />

to border patrol agents.<br />

In their release, General Dynamics<br />

Information Technology’s IT<br />

Services and Solutions sector vice<br />

president and general manager,<br />

Dan Busby, quoted that, “Reaching<br />

a full operating capability designation<br />

is a testament to both the<br />

effectiveness of the RVSS solution<br />

and our continued partnership<br />

with CBP. The RVSS upgrade will<br />

continue to provide CBP and U.S.<br />

law enforcement personnel with<br />

the advanced technology necessary<br />

to secure our nation’s borders<br />

and increase agent safety through<br />

enhanced situational awareness.”<br />

Also quoted in the release was<br />

Ronald D. Vitiello, Chief of CBP’s<br />

U.S. Border Patrol, who said “The<br />

deployment of the Remote Video<br />

Surveillance System is important<br />

to the safety of our agents and to<br />

our mission. Successful partnerships<br />

like the one we have with the<br />

General Dynamics team, are necessary<br />

to efficiently and effectively<br />

secure the border.”<br />

The recent “Full Operating Capability”<br />

milestone was the culmination<br />

of two years of deployment<br />

and field testing at key locations<br />

across the southwest, including the<br />

Arizona sites of Nogales, Douglas,<br />

Naco and Ajo, as well as, the McAl-<br />

8 9<br />

len and Laredo locations in Texas.<br />

The RVSS Upgrade program has<br />

a potential 10-year performance<br />

period, during which the General<br />

Dynamics OneSource team, will<br />

manage the operation and maintenance<br />

at all sites.<br />

About PureTech Systems Inc.<br />

PureTech Systems Inc. is a manufacturer<br />

of wide-area perimeter<br />

surveillance software solutions including<br />

internally developed outdoor<br />

video analytics, multi-sensor<br />

integration and a map-based (real<br />

object size) command and control.<br />

PureTech Systems serves fortune<br />

1000 firms, petro-chemical, water<br />

and electric utilities, seaports, airports<br />

and federal, state and local<br />

governments. PureTech Systems,<br />

headquartered in Phoenix, Arizona,<br />

delivers and supports installations<br />

throughout the world. To<br />

find out more about PureTech Systems<br />

Inc. visit our website at www.<br />

puretechsystems.com, follow us at<br />

@PureTechSystems or contact Eric<br />

Olson at 602-424-9842 or Eric.Olson@PureTechSystems.com.


Pelco showcases latest technology innovations and<br />

strategic application solutions to Securika/MIPS 2017<br />

FROM OUT Of THE BOX<br />

to STATE OF THE ART.<br />

ID CARD PRINTING INNOVATION.<br />

HID Global is leading the industry with the most robust portfolio of secure ID issuance<br />

solutions in the world. Our FARGO® line of printers and encoders provide governments,<br />

financial institutions and businesses of all sizes fast, efficient and reliable solutions that<br />

are as secure as they are affordable.<br />

You’ll call it innovation on demand. We call it, “your security connected.”<br />

YOUR SECURITY. CONNECTED | Visit us at hidglobal.com/printers<br />

© 2016 HID Global Corporation/ASSA ABLOY AB. All rights reserved. HID, HID Global, the HID Blue Brick logo, and the Chain Design are trademarks<br />

or registered trademarks of HID Global or its licensor(s)/supplier(s) in the US and other countries and may not be used without permission.<br />

MOSCOW, RUSSIA (March 7,<br />

2017) – Pelco by Schneider Electric,<br />

a global leader in surveillance and<br />

security products and technologies,<br />

will feature several of the company’s<br />

advanced security solutions at<br />

Securika/MIPS 2017, taking place<br />

at the Expocenter Fairgrounds in<br />

Moscow on March 21-14, 2017.<br />

Highlighted innovations on display<br />

include the powerful open<br />

platform VideoXpert Video Management<br />

Software (VMS) designed<br />

to control with confidence, a sneak<br />

peek of ExSite Enhanced Explosion<br />

Proof IP Cameras engineered<br />

to survive in the most challenging<br />

environments, and Sarix Enhanced<br />

IP Cameras that deliver the highest<br />

levels of low light performance<br />

when nothing but the best will do.<br />

“Security operations and procedures<br />

have become a core priority<br />

for businesses and organizations<br />

across every vertical market around<br />

the world as security professionals<br />

seek the most efficient and effective<br />

means to protect people, property<br />

and assets. This is especially pertinent<br />

for high-traffic public venues<br />

such as casinos and arenas,” said<br />

Diane Feliciano, VP, Global Marketing,<br />

Pelco by Schneider Electric. “At<br />

MIPS, attendees will<br />

witness firsthand how<br />

Pelco video surveillance<br />

and security solutions<br />

deliver higher levels of<br />

situational awareness, protection<br />

and even prevention<br />

when and where customers<br />

need it most.”<br />

In addition to highlighting<br />

system solutions with specific<br />

benefits for the casino and stadium<br />

markets, Pelco’s Securika/MIPS<br />

2017 display features strategic solutions<br />

for the oil and gas, city surveillance<br />

and hospitality vertical<br />

markets, and includes the following<br />

highlighted products:<br />

11<br />

ExSite Enhanced<br />

VideoXpert Video Management<br />

Software (VMS) dramatically improves<br />

the control of integrated surveillance<br />

and security solutions on<br />

a single platform, providing users<br />

with greater situational awareness<br />

so they can make more timely decisions<br />

and execute decisive action.<br />

VideoXpert’s open architecture enables<br />

third-party applications to<br />

be cost-effectively integrated for<br />

highly specialized applications in<br />

the hospitality, gaming and municipal<br />

surveillance markets. Recent<br />

enhancements<br />

to VideoXpert include:<br />

an enhanced<br />

user interface for<br />

improved centralized<br />

system management;<br />

incident management to<br />

easily and quickly correlate<br />

related video files; improved<br />

event management<br />

to customize event alerts with realtime<br />

visual notification; immersive<br />

viewing of 180°, 270° and 360° panoramic<br />

images from Pelco Optera<br />

Multi-Sensor Panoramic Cameras;<br />

and much more.<br />

Sarix Enhanced IP Cameras utilize<br />

Pelco’s exclusive SureVision 3.0<br />

low-light technology making Sarix<br />

imaging solutions ideal for hospitality<br />

and city surveillance, delivering<br />

quality images in as little as 0.05 lux<br />

with an incredible Wide Dynamic<br />

Range (WDR) of 130dB. Sarix Enhanced<br />

cameras are ONVIF Q compliant<br />

and are available in a wide<br />

selection of form factors for ease of<br />

integration into the hospitality and<br />

municipal surveillance markets, as<br />

well as many other mainstream applications.<br />

More on page 17


OnSSI integration with Jemez Technology improves<br />

perimeter surveillance effectiveness<br />

PEARL RIVER, NY (<strong>April</strong> 12,<br />

2017) – OnSSI’s partnering initiative<br />

with Jemez Technology makes<br />

perimeter video surveillance solutions<br />

employing AXIS cameras even<br />

more effective in protecting critical<br />

assets and infrastructure. The Ocularis<br />

5 VMS platform’s open architecture<br />

enables integration with the<br />

Jemez Eagle-i Edge® solution and<br />

AXIS cameras to<br />

deliver a complete<br />

end-to-end<br />

solution.<br />

“The integration<br />

of Ocularis with Jemez software<br />

is a best-in-class fit for security management<br />

tasked with securing widearea,<br />

long-range environments,”<br />

said Mulli Diamant, VP of International<br />

Business Development,<br />

OnSSI. “OnSSI’s ability to embrace<br />

technology innovations from other<br />

leading manufacturers is an important<br />

factor in our continued ability<br />

to deliver cutting-edge VMS solutions<br />

for professional security applications<br />

and beyond.”<br />

Jemez Technology, established<br />

by former engineers and scientists<br />

from the Los Alamos National Laboratory<br />

(LANL), provides advanced<br />

area and perimeter surveillance solutions<br />

for corporate and homeland<br />

security, with emphasis on critical<br />

asset and infrastructure protection.<br />

The company’s Eagle-i Edge<br />

on-camera analytics platform, specifically<br />

designed and optimized forAXIS<br />

camera networks, integrates<br />

with OnSSI solutions to significantly<br />

improve threat detection capability<br />

and lower operational costs.<br />

“The integration<br />

of our Eaglei<br />

Edge platform<br />

with Ocularis<br />

optimizes<br />

system efficiency<br />

and performance,”<br />

said Ted Turner, Director<br />

of Global Sales, Jemez Technology.<br />

“Now, end users have improved<br />

management of high risk surveillance<br />

data with capabilities that enhance<br />

agility and control.”<br />

Ocularis 5 offers a unique combination<br />

of enhanced features, recording<br />

versatility, robust data security,<br />

and overall stability that transcend<br />

conventional VMS solutions. Recent<br />

additions to the Ocularis 5<br />

platform include: an auto-updating<br />

feature like those available on most<br />

smartphones and tablets; Smart<br />

Camera Driver technology that<br />

provides out-of-the-box support<br />

for newly introduced cameras from<br />

industry-leading camera manufacturers;<br />

camera mapping via GPS<br />

on Ocularis Maps; and a new Mobile<br />

app that enables the streaming<br />

of live video from Android smartphones<br />

and devices to and from the<br />

Ocularis 5 VMS.<br />

Ocularis is offered in three models:<br />

Professional, designed for organizations<br />

operating multiple locations<br />

with small to<br />

mid-sized camera<br />

counts; Enterprise, built<br />

for a wide range of mid<br />

to large IT-centric organizations;<br />

and Ultimate, created for<br />

large organizations with extended<br />

command and control needs and<br />

recording server failover.<br />

For more information on OnSSI,<br />

call 845-732-7900, e-mail info@onssi.com<br />

or visit www.onssi.com.<br />

About OnSSI<br />

On-Net Surveillance Systems, Inc.<br />

(OnSSI) was founded in 2002 with<br />

the goal of developing comprehensive<br />

and intelligent IP video surveil-<br />

More on page 42<br />

UTEP professor, Immigration Council question<br />

need for additional ICE and Border Patrol agents<br />

By Steve Bittenbender<br />

Editor, Government Security News<br />

On the same day a federal judge in<br />

California put a temporary halt on<br />

President Trump’s plan to withhold<br />

federal funds from sanctuary cities,<br />

a panel of immigration experts took<br />

aim at another aspect of Trump’s immigration<br />

and border control plan.<br />

The American Immigration<br />

Council held a teleconference Tuesday<br />

afternoon to discuss the Trump<br />

Administration’s plans to bolster<br />

the ranks of both Immigrations and<br />

Customs Enforcement and Border<br />

Patrol. The call came on the heels<br />

of a paper released by the Council<br />

from a University of Texas-El Paso<br />

professor who questioned the need<br />

for those additional agents.<br />

The most noted aspects of Trump’s<br />

immigration plan have been the<br />

proposed border wall between the<br />

United States and Mexico, the focus<br />

on limiting immigration from<br />

predominately Muslim nations and<br />

the emphasis on deporting undocumented<br />

aliens. However, the panel<br />

said Trump’s plan for more agents<br />

deserves greater scrutiny, especially<br />

since the number of undocumented<br />

aliens have dropped.<br />

A Pew Research Center report<br />

– also released on Tuesday – indicated<br />

there were about 11.3 million<br />

such individuals living in the United<br />

States last year. That’s nearly a million<br />

fewer than were here 10 years<br />

ago.<br />

In his paper and in the teleconference,<br />

Josiah McC. Heyman also<br />

expressed concerns about the risk<br />

of corruption within CBP<br />

and ICE as it expands<br />

its ranks. According to a<br />

New York Times report,<br />

CBP officers and Customs<br />

agents have taken more<br />

than $11 million in bribes<br />

from drug cartels and other<br />

criminals.<br />

“These two branches of<br />

the Department of Homeland Security<br />

(DHS) are poorly prepared<br />

to recruit, train, and supervise new<br />

personnel,” said Heyman, a professor<br />

of anthropology at UTEP and<br />

the director of the Center for Interamerican<br />

and Border Studies. “While<br />

the Border Patrol experienced some<br />

improvements in the aftermath of<br />

its last expansion, most recommendations<br />

for reform remain unimplemented.”<br />

In a memo to DHS officials two<br />

12 13<br />

Josiah McC. Heyman<br />

months ago, Homeland Security<br />

Secretary John Kelly said CBP did<br />

not have enough officers “to effectively<br />

detect, track, and apprehend<br />

all aliens illegally entering the United<br />

States.” While he called for the<br />

hiring to begin immediately, Kelly<br />

called on CBP to maintain consistency<br />

in training and standards<br />

when bringing the new agents on<br />

board.<br />

In fiscal year 2016, CBP<br />

had 19,828 agents and<br />

ICE had more than 20,000<br />

employees. Trump’s order<br />

calls for an additional<br />

5,000 CBP agents and<br />

10,000 more ICE staffers.<br />

Joshua Breisblatt, an<br />

analyst for the AIC, noted<br />

CBP, before Trump’s order, already<br />

authorized to have more than<br />

21,300 agents on staff. He added that<br />

Congress is currently considering<br />

Trump’s request for $300 million in<br />

funding to hire CBP and ICE agents<br />

this fiscal year, with more money requested<br />

for 2018.<br />

“These requests have come despite<br />

lower apprehension numbers at the<br />

border over the past few months,”<br />

Breisblatt said.<br />

More on page 42


IRIS enters into global collaboration with TruTag in<br />

alliance that will create global market for the digitization<br />

of mission-critical smartcards and secure labels<br />

KUALA LUMPUR, 2 May 2017 –<br />

IRIS Corporation Bhd (IRIS), a<br />

world leader in Trusted Identification<br />

(ID) will be partnering<br />

with leading U.S. authentication<br />

and digital security company,<br />

TruTag Technologies,<br />

Inc. to look into the potential<br />

for smartcard and secure label applications<br />

globally.<br />

TruTag has developed the world’s<br />

most advanced Optical Memory<br />

(iOM) device: a digital “cookie”<br />

that enables the digitization of the<br />

analogue world. TruTag’s iOM devices<br />

are dust-sized particles that<br />

can be embedded into the very fabric<br />

of a product without the need<br />

for packaging or labels. They are<br />

edible and covert, and can digitize a<br />

plethora of items for product intelligence,<br />

for effectively counteracting<br />

the US$1 trillion global problem of<br />

counterfeit and diverted products.<br />

IRIS Acting CEO Mr. Choong<br />

Choo Hock said the two parties<br />

would look at possible ways to work<br />

together to co-develop and offer a<br />

portfolio of smartcard and secure<br />

label products to customers in both<br />

the government and private sectors<br />

tant element of the corporate restructuring<br />

currently in process in<br />

IRIS, as it puts IRIS a few generations<br />

ahead of its peers in the secure<br />

and trusted ID business,” said Tan<br />

Sri Sharir.<br />

“The combined strengths and<br />

product portfolio of both companies<br />

will enable us to target practically<br />

every aspect of product authentication,<br />

including enhancing the safety<br />

and traceability of food an medicine,<br />

which is an<br />

issue of global<br />

importance.”<br />

said Dr. Hank<br />

Wuh, Founder<br />

and Chairman of<br />

TruTag Technologies.<br />

This collaboration<br />

with TruTag comes just 10 days<br />

after IRIS announced a partnership<br />

with Norway’s Zwipe, a company<br />

that offers biometric contactless<br />

payment cards and fingerprint authentication<br />

technology.<br />

tems integrator for eID, ePassport,<br />

border control, multiple credential<br />

identity management ecosystems,<br />

and payment systems for financial<br />

and transportation industries where<br />

authenticity, improved security,<br />

speed, accuracy and effectiveness<br />

are of paramount importance. IRIS’<br />

innovative solutions, applications<br />

and devices have been deployed in<br />

over 30 countries across the globe,<br />

reaching far into Asia, the Middle<br />

East and Africa.<br />

Learn more at<br />

www.iris.com.my.<br />

around the world.<br />

“As the pioneer of ePassport and<br />

multi-application eID technology,<br />

IRIS has been in trusted ID for<br />

over 20 years, with clients in over<br />

30 countries, including the U.S.,<br />

Canada, Italy, Norway and India.<br />

TruTag, on the other hand, is a leading<br />

U.S. authentication company,<br />

and the only company in the world<br />

with covert and ingestible (edible)<br />

optical memory microtags that can<br />

be applied to both consumables<br />

(pharmaceuticals, food and beverage)<br />

and secure documents. We are<br />

looking to provide multiple layers of<br />

security to secure labels and documents,<br />

including, but not limited to<br />

biometric smartcards and missioncritical<br />

labels such as airline baggage<br />

labels,” said Mr. Choong.<br />

“We are delighted to team up<br />

with IRIS Corporation as a pioneer<br />

and world leader in trusted<br />

Identification. The collaborative<br />

venture will look to<br />

providing secure documents<br />

and labels for various applications<br />

across different countries<br />

and industries, and we look forward<br />

About TruTag<br />

to working together with IRIS to<br />

Technologies,<br />

provide leading-edge authentication<br />

Inc.<br />

and data intelligence solutions<br />

TruTag Tech-<br />

to our customers with high levels<br />

nologies, Inc. is<br />

of security needs,” said Dr. Michael<br />

a leader in product authentication,<br />

Bartholomeusz, CEO of TruTag<br />

brand security and data intelligence<br />

Technologies.<br />

solutions. The TruTag® platform<br />

Federal Land Development Authority<br />

addresses the US$1 trillion global<br />

(“FELDA”), which holds a<br />

challenge of counterfeit, diverted<br />

21.33% stake in IRIS through Felda<br />

and adulterated products that impact<br />

the pharmaceutical, life scienc-<br />

Investment Corp. Sdn. Bhd. (“FIC”),<br />

is positive on the partnership between<br />

About IRIS Corporation Berhad<br />

es, food, electronics, industrial, and<br />

the two companies. Felda Founded in 1994, IRIS Corpora-<br />

consumer goods industries. TruTag<br />

chariman Tan Sri Sharir Samad said tion Berhad (ACE Market: IRIS) is iOMTM devices are edible, inert,<br />

the proposal will be discussed by a MSC-status technology innovator covert and can seamlessly integrate<br />

the boards of both FELDA and FIC and leading provider of solutions information into the very fabric of a<br />

to map out the potential markets and advancements for trusted identification<br />

product, independent of packaging<br />

and sectors to target.<br />

and payment. Since pio-<br />

and labels. TruTag can extend the In-<br />

“The expansion of IRIS’ product neering the world’s first electronic ternet of Things (IoT) to a plethora<br />

portfolio to include new, industrydefining<br />

passport in 1998, IRIS has set itself of new, non-web-connected objects<br />

technologies is an impor- apart as a dedicated end-to-end sys-<br />

and products, and are read using<br />

14 15<br />

handheld imagers programmed to<br />

authenticate a product’s provenance<br />

information. TruTag Technologies,<br />

Inc. has been recognized by the Edison<br />

Awards, Fast Company, R&D<br />

100, and was selected a Technology<br />

Pioneer by the World Economic Forum<br />

as one of the most influential<br />

technology companies in the world.<br />

Learn more at www.TruTags.com.<br />

©2016 All rights reserved. TRUTAG and TRUTAGS are registered<br />

trademarks and iOM is a trademark of TruTag Technologies,<br />

Inc.<br />

FREE SUBSCRIPTION<br />

SIGN-UP<br />

Monthly <strong>Digital</strong> <strong>Edition</strong><br />

Airport/Seaport Newsletter<br />

Daily Insider Newsletter<br />

Cybersecurity Newsletter<br />

CLICK HERE


How to improve refugee vetting now – a 9/11<br />

Commission border counsel perspective<br />

Janice Kephart, former<br />

9/11 Commission<br />

border counsel<br />

and partner, IdSP<br />

WASHINGTON, <strong>April</strong> 24, 2017 /<br />

PRNewswire-USNewswire/ -- Janice<br />

Kephart, former 9/11 Commission<br />

border counsel and partner<br />

with Identity Strategy Partners, LLP<br />

(IdSP), today issues the following<br />

statement:<br />

“With or without President<br />

Trump’s March 6, 2017 Executive<br />

Order: Protecting the Nation from<br />

Foreign Terrorist Entry, refugee vetting<br />

can be instilled with greater<br />

confidence, enabling the reactivation<br />

of legitimate refugee resettlement.<br />

(Right now, all refugee applications<br />

are suspended by until at<br />

least July 2017). Improvements in<br />

current refugee vetting will require<br />

a language change to current law,<br />

identity enrollment taking place<br />

earlier in the process, and the implementation<br />

of a long-ignored 9/11<br />

Commission recommendation. But<br />

improvement is doable, and now.<br />

So why does the refugee population<br />

present a threat to national<br />

security? The reason is twofold: (1)<br />

intelligence for years has revealed<br />

a terrorist travel tactic of infiltrating<br />

refugee populations for eventual<br />

resettlement into Europe or the<br />

United States, and (2) by legal definition<br />

refugees are displaced persons<br />

with unknown identity. Even<br />

for those with an ID, establishing<br />

its authenticity or trusting its origin<br />

is difficult since by policy, no information<br />

is shared with the home<br />

country, so there is no country of<br />

origin against which to run checks<br />

as in a regular visa referral. Since<br />

the refugee demographic tends to<br />

be anonymous, it is more difficult to<br />

ensure a person is who they say they<br />

are, and then affiliate that identity<br />

with intelligence and other potentially<br />

significant financial or other<br />

data. In short, limited identity and<br />

intelligence information<br />

diminish confidence in<br />

recommendations about<br />

which refugees to accept<br />

for U.S. resettlement.<br />

The program responsible<br />

for vetting refugees<br />

seeking U.S. resettlement<br />

is the United States Refugee<br />

Admissions Program<br />

(USRAP). It is run jointly<br />

by the State Department,<br />

who receives referrals<br />

from the United Nations<br />

and conducts initial processing including<br />

a biographic name check,<br />

and the U.S. Citizenship and Immigration<br />

Service (USCIS), who conducts<br />

more in-depth interviews and<br />

collects biometrics from applicants.<br />

The program has been fine-tuned<br />

over many years. Yet the program<br />

requires vital improvements, and<br />

the recommendations below should<br />

be considered minimum baseline<br />

requirements.<br />

Congress must change law to<br />

enable U.S. access to refugee<br />

biometric data collected by the<br />

United Nations.<br />

Since 2013, the United Nations has<br />

a sophisticated biometric identity<br />

management system<br />

that collects 10 fingerprints,<br />

two irises, and<br />

face of every refugee,<br />

sometimes two to four<br />

years before a U.S. referral<br />

for initial biographic<br />

screening. Right now,<br />

due to an archaic law<br />

that prevents sharing of<br />

biometric information<br />

collected by a non-U.S.<br />

citizen, the U.S. has no<br />

access to this key identity<br />

information. The law needs to<br />

change to permit that biometric<br />

data be available for vetting against<br />

federal databases from designated<br />

international partners such as the<br />

United Nations.<br />

Refugees must be biometrically<br />

enrolled the first time they enter the<br />

U.S. system.<br />

State does not collect any biometrics<br />

from refugees, and thus only<br />

has the word of the refugee as to<br />

who they are, making the required<br />

biographic checks a potential goose<br />

chase. While USCIS does collect<br />

rolled prints and a face photo at the<br />

time of the interview, current vetting<br />

against some U.S. biometric<br />

holdings do not return results for<br />

up to 24 hours, after the interview<br />

is already over. If State collected<br />

the biometrics as part of their prescreening<br />

interviews conducted<br />

by their Resettlement Service staff,<br />

USCIS interviews would be better<br />

informed, and so would the final assessment.<br />

Implement the 9/11 Commission<br />

recommendation for a<br />

person-centric immigration system.<br />

State and USCIS use different case<br />

filing assignments for refugees.<br />

Policy does not require that State<br />

initiate a file number that USCIS<br />

recognizes or uses in the processing<br />

of the ultimate immigration benefit<br />

the refugee seeks. Thus, each applicant<br />

has two different file numbers,<br />

creating disconnect and potential<br />

for confusion and duplication. Yet<br />

Pelco showcases latest<br />

technology innovations and<br />

strategic application solutions<br />

Continued from page 11<br />

ExSite Enhanced HD Cameras<br />

are explosion proof and virtually<br />

indestructible with performance<br />

features that include: a robotically<br />

welded housing for use in extreme<br />

conditions; a unique patent-pending<br />

pan-tilt drive system devoid of<br />

belts, gears or pulleys; operation in<br />

the problem could be eliminated<br />

entirely if case numbers were eradicated<br />

and the 9/11 Commission<br />

recommendation for a biometricbased<br />

identity number for the entire<br />

immigration system were put in its<br />

place. When biometrics become the<br />

baseline for any immigration encounter,<br />

identity is protected and<br />

the automatic creation of a timeline<br />

of immigration encounters reduces<br />

fraud and increases efficiencies for<br />

legal immigration. Implementation<br />

of this long ignored 9/11 Commission<br />

recommendation could drastically<br />

improve the U.S. immigration<br />

system, and with it, refugee vetting<br />

as it stands today.”<br />

Contact: Janice Kephar , (202) 750-<br />

4858, SOURCE Identity Strategy<br />

Partners (IdSP)<br />

16 17<br />

extreme temperatures; 30X optical<br />

zoom with image stabilization; IR<br />

illumination; 130dB WDR; 0.03 lux<br />

ultra-low light performance; integrated<br />

Ethernet, fiber, Ethernet over<br />

Coax (EoC) and Unshielded Twisted<br />

Pair (UTP) transmission, and<br />

more. ExSite is an exceptional imaging<br />

solution for oil and gas facilities,<br />

chemical plants, manufacturing and<br />

marine facilities, and for numerous<br />

other demanding environments.<br />

For more information or to schedule<br />

a demo, contact evgeni.tochev@<br />

schneider-electric.com or visit www.<br />

pelco.com.<br />

About Pelco by Schneider Electric<br />

Pelco by Schneider Electric is a<br />

global leader in professional video<br />

surveillance and security system<br />

products and technologies with<br />

a local presence in 136 countries<br />

and over 4000 integration partners<br />

worldwide. Our personal engagement<br />

with customers, resellers and<br />

technology partners drives the development<br />

and deployment of surveillance<br />

and security solutions<br />

with meaningful innovation. It’s the<br />

foundation that Pelco has built its<br />

brand upon for over 25 years.


Law Enforcement/Public Safety<br />

San Francisco Department of Emergency Management<br />

selects NICE for 9-1-1 center upgrade<br />

HOBOKEN, NJ – <strong>April</strong> 18, 2017 –<br />

NICE (Nasdaq:NICE) announced<br />

today that the San Francisco Department<br />

of Emergency Management<br />

(SFDEM), a NICE customer<br />

since 2006, has once again selected<br />

NICE solutions for its 9-1-1 center<br />

upgrade. The SFDEM 9-1-1 center<br />

will be taking advantage<br />

of the full range of<br />

NICE Inform’s futureready<br />

applications and<br />

integrations to improve<br />

productivity and effectiveness<br />

across its entire<br />

operation, and ensure the<br />

highest levels of service<br />

for residents of the City<br />

and County of San Francisco,<br />

and large numbers<br />

of tourists who visit the<br />

area as well.<br />

“We’ve been working with NICE<br />

for about 10 years now and it has<br />

been a really good relationship,”<br />

said Mitch Sutton, CIO, San Francisco<br />

Department of Emergency<br />

Management. “We feel that NICE<br />

really ‘gets’ public safety and our requirements.<br />

In addition to meeting<br />

our needs today, the NICE Inform<br />

suite of solutions is well suited to<br />

our future requirements.”<br />

The SFDEM’s 9-1-1 call takers and<br />

dispatchers are a critical lifeline between<br />

the public and first responders.<br />

A staggering 3,474 calls come<br />

into the 9-1-1 center each day and<br />

that number is steadily growing.<br />

The SFDEM is aggressively recruiting<br />

telecommunicators to keep pace<br />

with the workload, while also looking<br />

for other ways to bolster telcommunicator<br />

efficiency and effectiveness.<br />

The SFDEM’s 9-1-1 call takers and<br />

dispatchers are a critical lifeline between<br />

the public and first responders.<br />

With 3,474 calls to the 9-1-1<br />

center daily, the SFDEM 9-1-1 center<br />

will use the full range of NICE<br />

Inform’s future-ready applications<br />

and integrations to improve productivity<br />

and effectiveness across<br />

its entire operation and ensure the<br />

highest levels of service (photo<br />

credit ©Michael Mustacchi)<br />

Boosting Efficiency<br />

and Quality Assurance<br />

“Our telecommunicators<br />

perform difficult<br />

and life-saving work<br />

every day,” said Sutton.<br />

“Here at the SF-<br />

DEM there has been<br />

a big push to process<br />

calls more efficiently<br />

to get first responders<br />

on scene faster. We’re<br />

also placing a heightened emphasis<br />

on quality assurance to ensure our<br />

telecommunicators are handling<br />

calls efficiently and according to<br />

protocols. NICE Inform is going to<br />

help us streamline our quality assurance<br />

process and meet our goals.”<br />

With NICE Inform Evaluator, the<br />

SFDEM will be able to expand its<br />

quality assurance program to sys-<br />

tematically review all call types and<br />

identify areas where call processing<br />

can be improved. NICE Inform<br />

Evaluator combines automated,<br />

rules-based QA call selection with<br />

a form builder for creating customized<br />

evaluation forms for call review<br />

and scoring. Results of evaluations<br />

are automatically tabulated and can<br />

be used to pinpoint coaching and<br />

training gaps, while also improving<br />

feedback and employee retention.<br />

With the addition of NICE screen<br />

recording, supervisors will be able<br />

to hear what was said and at the<br />

same time see what was happening<br />

on the telecommunicator’s screen as<br />

calls were processed.<br />

The SFDEM also expects to achieve<br />

efficiency gains in its records custodians<br />

unit. This unit processes close<br />

to 25,000 requests for 9-1-1 records<br />

annually for District Attorneys and<br />

other requestors. NICE Inform will<br />

streamline the fulfillment of these<br />

requests by making it easier to find,<br />

retrieve and share audio recordings.<br />

Introducing Next Generation<br />

Technologies<br />

Like most 9-1-1 centers, the SF-<br />

DEM is moving to next generation<br />

technologies. NICE’s direct, certified<br />

integration with West Corporation’s<br />

VIPER® Voice over IP solution<br />

means that the SFDEM can record<br />

its IP emergency communications<br />

with confidence. NICE Inform is<br />

also future-ready, so when the SF-<br />

DEM is ready to start accepting SMS<br />

9-1-1 texts, it will be able to leverage<br />

its investment in NICE Inform to<br />

record and manage voice, SMS 9-1-<br />

1 texts, and additional future multimedia<br />

in a unified system.<br />

“NICE values our long-standing<br />

relationship with the San Francisco<br />

Department of Emergency Management,<br />

and we’re honored that<br />

they continue to entrust NICE with<br />

their public safety needs,” said Chris<br />

Wooten, Executive Vice President,<br />

NICE. “NICE is committed to helping<br />

the SFDEM improve its efficiency<br />

and effectiveness to provide<br />

excellent emergency response to the<br />

citizens it serves, while also helping<br />

the SFDEM prepare for the future.”<br />

About the San Francisco Department<br />

of Emergency Management<br />

The San Francisco Department of<br />

Emergency Management (DEM)<br />

leads the City in planning, preparedness,<br />

communication, response,<br />

and recovery for daily emergencies,<br />

large scale citywide events, and major<br />

disasters. DEM is the vital link<br />

in emergency communication between<br />

the public and first responders,<br />

and provides key coordination<br />

and leadership to City departments,<br />

18 19<br />

stakeholders, residents, and visitors.<br />

The San Francisco Division of<br />

Emergency Communications’ 9-1-<br />

1 center serves a city and county of<br />

860,000 people and fields calls for<br />

police, fire and medical emergencies,<br />

as well as calls for nonemergency<br />

services. The center receives<br />

more than 1.2 million emergency<br />

and non-emergency calls per year.<br />

www.sfdem.org.<br />

About NICE<br />

NICE (Nasdaq:NICE) is the worldwide<br />

leading provider of both<br />

cloud and on-premises enterprise<br />

software solutions that empower<br />

organizations to make smarter decisions<br />

based on advanced analytics<br />

of structured and unstructured<br />

data. NICE helps organizations of<br />

all sizes deliver better customer service,<br />

ensure compliance, combat<br />

fraud and safeguard citizens. Over<br />

25,000 organizations in more than<br />

150 countries, including over 85 of<br />

the Fortune 100 companies, are using<br />

NICE solutions. www.nice.com.


Law Enforcement/Public Safety<br />

Chicago considers ordinance requiring<br />

panic buttons for hotel staff<br />

BROOKFIELD, WI <strong>April</strong> 28, 2017<br />

RF Technologies (RFT) HELP<br />

ALERT® Panic Alert System for<br />

Hospitality was recently featured in<br />

a news story (WLS-TV, Chicago)<br />

highlighting the need to protect<br />

hospitality workers from violence<br />

and assault in the workplace. The<br />

story outlined an ordinance introduced<br />

on <strong>April</strong> 19, now under<br />

consideration by the Chicago City<br />

Council, which would require that<br />

certain staff in Chicago hotels be<br />

equipped with panic alert devices to<br />

protect them while they work. RFT’s<br />

Marina Willis, president, Pinpoint<br />

Technologies, was interviewed for<br />

the story.<br />

According to a Chicago Tribune<br />

report, the bill, sponsored by Alderman<br />

Michele Harris, 8th Ward, and<br />

backed by labor unions including<br />

Unite Here Local 1, would require<br />

that employees working alone in<br />

Chicago hotels be issued panic buttons<br />

(such as RFT’s HELP ALERT<br />

wireless pendant) that would enable<br />

them to warn security quickly<br />

if they encounter potentially dangerous<br />

situations in guests’ rooms.<br />

The ordinance would also require<br />

that hotels post sexual harassment<br />

and assault policies and promise no<br />

retaliation against workers who report<br />

encountering such treatment.<br />

Hotels that do not provide the panic<br />

alert buttons and adhere to other<br />

parts of the measure could be fined<br />

up to $500 per incident.<br />

“Has this prevented things from<br />

escalating? Absolutely,” says Willis,<br />

of RF Technologies. “We’ve had<br />

situations where we have<br />

had housekeepers go into<br />

a room, start cleaning, and<br />

someone comes out of the<br />

bathroom not wearing any<br />

clothes and blocks them<br />

from leaving the room.” Hotel<br />

workers are already wearing<br />

these devices in New<br />

York and Washington, D.C. Similar<br />

mandates and/or ordinances will<br />

soon be adopted in cities including<br />

Seattle, San Francisco, and areas<br />

in Southern California, where they<br />

are being requested with increased<br />

frequency by staff members and local<br />

unions representing hospitality<br />

workers.<br />

RFT is pleased to be a part of such<br />

an important initiative focused on<br />

keeping hospitality workers safe. We<br />

are ready to put to work our 30 years<br />

of experience keeping people safe<br />

in hospitals, schools, colleges and<br />

universities, senior living facilities,<br />

and hotels, with our HELP ALERT<br />

Panic Alert System.<br />

For additional information on this<br />

important issue, follow these news<br />

links:<br />

•http://www.mychinews.com/<br />

news/chicago-hotel-workersmay-soon-have-a-pani...<br />

•http://www.chicagotribune.<br />

com/news/local/politics/ctrahm-emanuel-chicag...<br />

•http://chicago.suntimes.<br />

com/news/hotels-urged-tocombat-sexual-harassmen...<br />

Also, a July 2016 report issued by<br />

Unite Here Local 1:<br />

•http://abc7chicago.com/<br />

news/panic-button-ordinanceproposed-to-protect-h...<br />

•https://www.handsoffpantson.org/wp-content/uploads/<br />

HandsOffReportWeb.pdf<br />

About RF Technologies<br />

RF Technologies provides safety solutions<br />

at over 10,000 senior living,<br />

healthcare, education and hospitality<br />

facilities nationwide. Life safety<br />

solutions such as CODE ALERT®<br />

Wander Management, QUICK RE-<br />

SPONSE® Wireless Nurse Call, SAFE<br />

PLACE® Infant Security, and HELP<br />

ALERT® reduce risk for residents,<br />

staff, and the facility; innovations<br />

such as RFT CARES® smartphone<br />

application improve caregiver coordination<br />

and efficiency. Backed<br />

by 30 years of experience in senior<br />

living, RF Technologies’ solutions<br />

are UL-certified to meet today’s life<br />

safety standards. For information<br />

visit: http://www.rft.com<br />

PRO-VISION releases 1080p HD video<br />

system for law enforcement vehicles<br />

BYRON CENTER, MI <strong>April</strong> 26,<br />

2017 PRO-VISION® Video Systems,<br />

the leader in mobile video technology<br />

and software for law enforcement,<br />

announced today the release<br />

of its new 1080p High-Definition<br />

In-Car Video System for police vehicles.<br />

The PRO-VISION®<br />

HD In-Car Video<br />

System is the only<br />

1080p True HD system<br />

capable of providing<br />

360 degree<br />

vehicle coverage, capturing highfidelity<br />

audio and video that’s more<br />

than twice the quality of 720p HD<br />

cameras on up to eight cameras.<br />

An interior camera provides 180<br />

degree door-to-door HD coverage<br />

of the rear seat area in any lighting<br />

condition, while a compact forwardfacing<br />

camera records the front of<br />

the vehicle without obstructing the<br />

view of the road like bulky cameras<br />

featured in other systems.<br />

Combining industry-leading features<br />

with a rugged Solid-State design,<br />

a 5-Year Warranty and a price<br />

over 50 percent less than other<br />

brands, the PRO-VISION® HD In-<br />

Car Video System is the most Reli-<br />

20 21<br />

able, Simple and Affordable in-car<br />

video system available.<br />

About PRO-VISION ®<br />

Since 2003, PRO-VISION® has been<br />

engineering, manufacturing and<br />

installing Reliable, Simple, Affordable<br />

mobile video<br />

recording systems<br />

and software solutions<br />

for the school<br />

bus, transit, law enforcement<br />

and commercial<br />

markets.<br />

Specializing in back-up, dash-cam,<br />

in-car and body-worn video; PRO-<br />

VISION® products increase safety<br />

and reduce liability for thousands of<br />

organizations in nearly 50 countries<br />

around the globe. Recently recognized<br />

as a Deloitte Technology Fast<br />

500 company and by Inc. magazine<br />

as one of the fastest growing private<br />

companies in America for the sixth<br />

consecutive year, PRO-VISION®<br />

takes pride in offering the highest<br />

quality products backed by the absolute<br />

best customer and technical<br />

support. For more information, visit<br />

http://www.provisionusa.com.


Law Enforcement/Public Safety<br />

Taming the rising tide of digital evidence<br />

By Linda Haelsen, NICE<br />

Crime solving in the 21st century<br />

hinges on digital evidence. Paper silos<br />

have been replaced by digital silos<br />

and these silos are growing faster<br />

than ever, creating a rising tide of<br />

digital evidence that’s increasingly<br />

challenging to collect, analyze and<br />

share.<br />

For police departments, this is<br />

creating a big problem. There’s so<br />

much data, coming from so many<br />

silos that it’s becoming increasingly<br />

difficult for investigators to ingest it,<br />

correlate it, and absorb the relevant<br />

facts of a case.<br />

Put another way, the growing variety<br />

and volume of digital evidence<br />

has outpaced the tools investigators<br />

have to collect, analyze and share it.<br />

While CCTV video has certainly<br />

taken off, the spectrum of digital<br />

evidence is far wider. Think of all<br />

of the abundantly available sources<br />

of digital evidence that address<br />

many of the questions investigators<br />

once labored to answer. There’s<br />

in-car video, interview recordings,<br />

crowd-sourced information (like<br />

citizen tips, photos, and videos),<br />

911 recordings, and information<br />

from other systems, like Automatic<br />

License Plate Recognition<br />

(ALPR), Computer Aided<br />

Dispatch (CAD), and Records<br />

Management Systems<br />

(RMS). There are also<br />

body-worn cameras, which<br />

are being adopted by police<br />

departments in growing<br />

numbers.<br />

With digital evidence<br />

growing exponentially and<br />

coming from more places,<br />

it’s clear that police departments<br />

need better tools so they can<br />

leverage all of the available digital<br />

evidence to improve case solvability<br />

and reduce crime rates.<br />

Collecting evidence:<br />

the conundrum<br />

Consider how investigators gather<br />

evidence and build cases today.<br />

They often have to log on to a dozen<br />

or more systems to collect evidence<br />

and then manually search for connections<br />

in cases, which wastes time<br />

and increases the likelihood that<br />

crucial evidence will be missed.<br />

Even though CCTV is now commonplace<br />

in investigations, collecting<br />

it is still incredibly time<br />

consuming. It’s not uncommon for<br />

a detective to physically drive to<br />

a crime scene to canvas for video<br />

cameras. The cameras can be hard to<br />

spot, especially in high rises where<br />

they’re not always visible. When<br />

video is located, the investigator<br />

then needs to download a copy and<br />

bring it back to the station.<br />

Despite the fact that citizens are<br />

readily willing to share it, departments<br />

also lack scalable solutions<br />

for crowdsourcing evidence. According<br />

to a recent Nielsen survey<br />

recently conducted by NICE, 95<br />

percent of Americans polled said<br />

they’d be willing to share pictures,<br />

videos, tips, or other evidence if<br />

they witnessed a crime or serious<br />

incident, providing they were given<br />

an easy means to do so.<br />

Still, too many police departments<br />

don’t provide an easy way for citizens<br />

to submit photos, video or tips.<br />

They don’t have the systems or the<br />

infrastructure to readily accept this<br />

evidence for everyday investigations,<br />

and especially for large-scale<br />

events.<br />

Investigators also waste incredible<br />

amounts of time emailing, phoning,<br />

filling out paperwork, even driving<br />

from place to place to manually<br />

collect digital evidence. All of<br />

this evidence is then painstakingly<br />

copied and saved on CDs, DVDs or<br />

USB drives, and added to paper case<br />

folders.<br />

How new digital investigation<br />

and evidence management<br />

technology can help<br />

New digital investigation and evidence<br />

management technology is<br />

now helping to break down these<br />

barriers by enabling police departments<br />

to seamlessly connect all of<br />

their digital silos through one application.<br />

The technology provides<br />

a one-stop shop for gathering evidence<br />

so investigators don’t have to<br />

waste time logging on to all of the<br />

individual systems to manually collect<br />

evidence to build their cases.<br />

In addition to simplifying access,<br />

the technology is able to search<br />

across all connected systems and<br />

recommend evidence that is potentially<br />

relevant to the case.<br />

Advanced content analytics make<br />

both structured and unstructured<br />

data sources searchable. This includes<br />

audio recordings, databases,<br />

narratives from CAD comments,<br />

incident reports, FI cards, reports,<br />

documents, and more. This means<br />

that investigators can uncover connections<br />

and generate new leads,<br />

which ultimately helps them solve<br />

cases faster.<br />

An investigator also has the ability<br />

to add key words to a search.<br />

Let’s say, for example, a witness in<br />

a homicide investigation said they<br />

saw a panel van with ‘Joe’s Plumbing’<br />

marked on the side, fleeing the<br />

scene. By adding ‘Joe’s Plumbing’<br />

to a key word search, all connected<br />

sources – from incident reports in<br />

the CAD system to tagged crime<br />

scene photos and witness statements<br />

– would be searched for those<br />

two key words.<br />

In addition to searching docu-<br />

22 23<br />

ments and databases, the technology<br />

can convert audio to text to<br />

make it searchable, so for example,<br />

911 calls and interview room recordings<br />

could be searched for the<br />

words ‘Joe’s Plumbing’ as well. All<br />

the investigator would need to do is<br />

review the suggested evidence, and<br />

select it to add it to a virtual case<br />

folder.<br />

Investigators can also initiate and<br />

track evidence requests using built<br />

in workflows, and receive automatic<br />

notifications when those requests<br />

are fulfilled. This makes it easier for<br />

an investigator to stay on top of active<br />

cases, while not losing track of<br />

evidence or leads.<br />

Furthermore, citizens can submit<br />

video, photos and tips through a secure<br />

public portal. Private businesses<br />

can also use the portal to register<br />

their CCTV cameras and provide<br />

contact details, making it easier for<br />

law enforcement agencies to crowdsource<br />

evidence. By geo-locating<br />

both city-owned and private CCTV<br />

cameras, the technology enables investigators<br />

to look at the area where<br />

a crime occurred and know where<br />

cameras are located, minimizing<br />

time spent canvassing for video.<br />

The technology is also cloudbased<br />

so it can scale to growing evidence<br />

storage requirements if there’s<br />

More on page 42


Law Enforcement/Public Safety<br />

Kansas becomes first statewide deployment<br />

site of AT&T NextGen 911 solution<br />

TOPEKA, KS, <strong>April</strong> 27, 2017 AT&T<br />

and the Kansas 9-1-1 Coordinating<br />

Council continue to improve the<br />

9-1-1 experience in the state. Kansas<br />

will be the first statewide deployment<br />

of AT&T ESInet.<br />

AT&T ESInet is a new NextGen<br />

9-1-1 solution that provides IPbased<br />

call routing services to emergency<br />

response centers. It will help<br />

Kansas boost 9-1-1 reliability, speed<br />

emergency responsiveness and improve<br />

disaster recovery. For Kansans,<br />

this means a faster, more reliable<br />

9-1-1 experience.<br />

This builds on Kansas’ previous<br />

investment to modernize its outdated<br />

public safety technology with a<br />

NextGen 9-1-1 hosted call handling<br />

solution from AT&T.<br />

“Updating our 9-1-1 infrastructure<br />

is key to keeping our<br />

people safe, and selecting AT&T<br />

was an obvious choice,” said Dick<br />

Heitschmidt, chairman of the Kansas<br />

9-1-1 Coordinating Council and<br />

Hutchinson chief of police. “AT&T<br />

provides our public safety community<br />

with a comprehensive NextGen<br />

9-1-1 solution, delivering the value,<br />

expertise and teamwork needed to<br />

create the current and future experiences<br />

our residents expect. It’s our<br />

goal to stay on the cutting edge of<br />

public safety, and AT&T ESInet will<br />

help to make that a reality.”<br />

With AT&T ESInet, Kansas will<br />

have more sophisticated capabilities<br />

to route calls based on the caller’s<br />

geographic location. Public Safety<br />

Answering Points (PSAPs) will also<br />

be able to manage and route advanced<br />

communications like text<br />

messaging to 9-1-1. In the future,<br />

Kansas PSAPs will be able to support<br />

pictures and videos sent via<br />

text message. This is crucial in today’s<br />

mobile environment where<br />

more than 70% of the calls made to<br />

9-1-1 come from a mobile device.<br />

“AT&T ESInet will help propel<br />

Kansas into the next generation of<br />

public safety. It’ll give Kansas emergency<br />

services an advanced network<br />

to better meet the needs of residents,<br />

first responders and 9-1-1 call takers<br />

today and tomorrow,” said Jon<br />

Wellinger, assistant vice president,<br />

AT&T Global Public Sector.<br />

Since AT&T ESInet is a highly<br />

secure and resilient nationwide<br />

service, it will give Kansas access<br />

to geographically diverse and redundant<br />

call processing locations<br />

throughout the country.<br />

This will let the state work with<br />

other ESInet-enabled 9-1-1 agencies<br />

nationwide to:<br />

• Maintain service during a natural<br />

or man-made disaster.<br />

• Help save precious time by routing<br />

calls and texts correctly.<br />

• Automatically route calls to<br />

neighboring PSAPs when call volumes<br />

spike.<br />

Other benefits include access to:<br />

• A defense-in-depth, private network<br />

with multiple layers of security<br />

– like firewalls and intrusion<br />

detection/prevention. This will<br />

help protect Kansas 9-1-1 infrastructure<br />

from cyber threats.<br />

• Industry standard components<br />

that will give the state backward<br />

compatibility with legacy 9-1-1<br />

systems and services.<br />

The capabilities that NextGen 9-1-1<br />

technologies will give to PSAPs and<br />

the public will become a necessity.<br />

Working with AT&T, Kansas is on<br />

track to move 75% of its PSAPs to<br />

NextGen 9-1-1 hosted call handling<br />

by the end of this year.<br />

“We’ve long supported Kansas<br />

public safety needs, and we are<br />

proud to continue our great relationship,<br />

helping Kansas on its mission<br />

to future-proof its 9-1-1 infrastructure,”<br />

said Wellinger.<br />

By making it easier to manage<br />

9-1-1 calls, AT&T ESInet will help<br />

Kansas public safety resources go<br />

further, so they can focus on what<br />

matters most: protecting people and<br />

saving lives.<br />

AT&T is a leader in first responder<br />

connectivity. We’ve been enabling<br />

and innovating public safety communications<br />

for nearly 140 years.<br />

We will continue this commitment<br />

as we build America’s first-ever nationwide<br />

broadband network dedicated<br />

to first responders.<br />

To learn more about AT&T ESInet,<br />

check out corp.att.com/publicsafety.<br />

For more information on how<br />

Kansas has been updating its 9-1-1<br />

infrastructure, visit kansas911.org.<br />

About AT&T<br />

AT&T Inc. (NYSE: T) helps millions<br />

around the globe connect with leading<br />

entertainment, business, mobile<br />

and high speed internet services.<br />

We offer the nation’s best data network*<br />

and the best global coverage<br />

of any U.S. wireless provider.**<br />

We’re one of the world’s largest<br />

24 25<br />

providers of pay TV. We have TV<br />

customers in the U.S. and 11 Latin<br />

American countries. Nearly 3.5 million<br />

companies, from small to large<br />

businesses around the globe, turn to<br />

AT&T for our highly secure smart<br />

solutions.<br />

Additional information about<br />

AT&T products and services is available<br />

at about.att.com. Follow our<br />

news on Twitter at @ATT, on Facebook<br />

at facebook.com/att and You-<br />

Tube at youtube.com/att.<br />

FREE SUBSCRIPTION<br />

SIGN-UP<br />

Monthly <strong>Digital</strong> <strong>Edition</strong><br />

Airport/Seaport Newsletter<br />

Daily Insider Newsletter<br />

Cybersecurity Newsletter<br />

CLICK HERE


Law Enforcement/Public Safety<br />

RapidSOS secures $14M in investments to develop<br />

life-saving 911 technology<br />

NEW YORK, <strong>April</strong> 25, 2017 RapidSOS,<br />

an emergency technology<br />

start-up, today announced the closing<br />

of a $14 million Series A funding<br />

round led by Highland Capital<br />

Partners with participation from A3<br />

Ventures (the innovation subsidiary<br />

of AAA Northern California, Nevada<br />

& Utah), The Westly Group,<br />

Two Sigma Ventures, Motorola Solutions<br />

Venture Capital, Responder<br />

Ventures, and several notable individuals<br />

including three former FCC<br />

Chairmen (Tom Wheeler, Julius<br />

Genachowski, Dennis Patrick).<br />

Technology has dramatically<br />

changed our lives over the last 50<br />

years, except for when we need it<br />

most. Over 240 million 911 calls<br />

are made each year, all reliant on a<br />

voice connection with less data than<br />

was originally transmitted through<br />

the first trans-Atlantic cable in 1858.<br />

The FCC estimates that improved<br />

information flow to 911 and first<br />

responders could save over 10,000<br />

lives annually.<br />

“For the last 50 years – we’ve relied<br />

on a voice-only connection when<br />

our lives were on the line – whether<br />

from us or through a home security,<br />

medical alert, or roadside assistance<br />

call center,” said Dan Nova, Partner<br />

at Highland Capital Partners and<br />

RapidSOS Board Member. “Rapid-<br />

SOS’ technology eliminates the need<br />

for clunky third-party call centers –<br />

providing a transformative platform<br />

for safety, security, and wellness.”<br />

RapidSOS spent four years working<br />

closely with thousands of public<br />

safety officials across the United<br />

States to develop a universal data<br />

link into 911 and first responder<br />

networks. The result is a transformation<br />

from a voice-only system into a<br />

rich data link connecting millions<br />

of smartphones, wearables, connected<br />

cars, and home IoT products<br />

directly to 911 and first responders.<br />

Wearables powered by RapidSOS<br />

automatically detect health emergencies<br />

– transmitting rich data to<br />

responding ambulances.<br />

Connected cars provide key<br />

telematics data to 911 and responders.<br />

Connected homes linked through<br />

RapidSOS inform firefighters with<br />

real-time data including smoke<br />

density, temperature, and location<br />

of trapped occupants.<br />

“Over the past four years I’ve<br />

witnessed the incredible heroism<br />

of public safety officials who manage<br />

millions of emergencies with<br />

little more than a distraught caller’s<br />

voice,” said Michael Martin, CEO of<br />

RapidSOS. “I’m excited to be partnering<br />

with thought leaders across<br />

public safety, telecom, and technology<br />

to link any device with rich data<br />

directly to 911 and first responders.”<br />

“Working with RapidSOS brings<br />

a new dimension to our portfolio<br />

of integrated software solutions for<br />

the public safety command center,”<br />

said Eduardo Conrado, Executive<br />

Vice President, Strategy & Innovation<br />

Office, Motorola Solutions.<br />

“Our work together creates end-to-<br />

Michael Martin<br />

RapidSOS Founder<br />

Nick Horelik, PhD<br />

RapidSOS Founder<br />

end emergency data connectivity,<br />

enabling third-party data to flow<br />

through Motorola Solutions’ emergency<br />

response systems to personnel<br />

in the field. It provides critical<br />

information that can accelerate<br />

response times and improve outcomes.”<br />

“Having served as State Controller<br />

and CFO of California, I know<br />

firsthand that 911 centers face significant<br />

funding and technological<br />

challenges impacting lives,” said<br />

Steve Westly, Founder and Managing<br />

Partner at The Westly Group.<br />

“We are thrilled to work with the<br />

top engineers at RapidSOS to solve<br />

this global challenge.”<br />

RapidSOS’ technology platform,<br />

originally developed by Martin,<br />

Nick Horelik and a team of engineers<br />

out of MIT and Harvard University,<br />

provides a rich data link<br />

into any 911 dispatch system and a<br />

platform for advanced emergency<br />

analytics. “We’ve already seen how<br />

emergencies are often predictable<br />

and preventable,” said Horelik, RapidSOS<br />

CTO. “In the future, our users<br />

will get advanced warning about<br />

car accidents and potential medical<br />

emergencies before they occur.”<br />

“AAA is constantly looking for innovative<br />

ways to serve its 56 million<br />

members across the United States<br />

and Canada,” said Dillon McDonald,<br />

Managing Partner at A3 Ventures,<br />

the innovation subsidiary of<br />

AAA Northern California, Nevada<br />

& Utah. “We couldn’t have asked for<br />

a better company to be the first investment<br />

from the newly formed A3<br />

Ventures. It is only fitting that we are<br />

working with RapidSOS not only as<br />

an investor, but also as a partner to<br />

bring unprecedented safety, security,<br />

and wellness to millions of our<br />

members.”<br />

“I spent much of my career as<br />

Chairman of the FCC working to<br />

strengthen public safety and make<br />

improvements to our nation’s 911<br />

system,” said Tom Wheeler, Former<br />

Chairman of the FCC. “I am thrilled<br />

to have the opportunity to work directly<br />

with RapidSOS as they deploy<br />

their emergency platform to enhance<br />

the data available to 911 and<br />

first responder systems nationwide.”<br />

“We are humbled to be collaborating<br />

with such thought leaders across<br />

public safety and technology,” said<br />

26 27<br />

Martin. “Every day 650,000 emergency<br />

calls are placed across the<br />

United States, in partnership with<br />

the public safety community we are<br />

transforming the outcomes of millions<br />

of these emergencies.”<br />

About RapidSOS<br />

RapidSOS is an advanced emergency<br />

technology company. RapidSOS<br />

is developing technology to predict<br />

and preempt emergencies before<br />

they occur, dynamically warn<br />

people in harm’s way, and link data<br />

from any connected device directly<br />

to first responders in an emergency.<br />

The result is faster, more effective<br />

emergency response leading to a<br />

projected 2-10% reduction in mortality,<br />

6.9% reduction in healthcare<br />

treatment costs, and 20% reduction<br />

in property damage4. Formed<br />

in 2013 and backed by some of the<br />

world’s top technologists, RapidSOS<br />

was named “2016 Start-Up of the<br />

Year” by the Consumer Technology<br />

Association, a Top Innovation<br />

of 2015 by MIT News, and Top 3<br />

Innovative World Technologies by<br />

SXSW. Learn more at www.Rapid-<br />

SOS.com.


Cubic executive to discuss benefits of cloud<br />

hosting at transportation summit<br />

JW Fishers describes equipment now<br />

used to locate weapons and explosives<br />

SAN DIEGO <strong>April</strong> 27, 2017 Cubic<br />

Transportation Systems (CTS),<br />

a business unit of Cubic Corporation<br />

(NYSE:CUB), today announced<br />

Chris Bax, vice president of global<br />

ITS strategy, will participate<br />

in a panel discussion<br />

on the benefits of cloudbased<br />

technologies for traffic<br />

management systems<br />

at the ITS Heartland 2017<br />

Annual Meeting in Wichita,<br />

Kansas from May 1 – 3.<br />

Population growth is<br />

increasing the demands<br />

placed on roads and associated infrastructure<br />

around the world. Inevitably,<br />

pressure to expand and support<br />

transportation infrastructure growth<br />

is placed on the transit authorities<br />

that manage them. During the panel,<br />

Bax will cover “smart city” technology<br />

and how cloud hosting can be<br />

used to meet the needs of advanced<br />

traffic management solutions. He<br />

will highlight the benefits of cloudbased<br />

platforms, from integration<br />

capabilities to cost-effectiveness, resiliency<br />

and reliability. Additionally,<br />

Bax will address how cloud hosting<br />

is being applied, the long-term<br />

advantage and its ability to support<br />

Chris Bax<br />

smart cities.<br />

“Transportation infrastructure will<br />

constantly evolve in order to meet<br />

population growth,” said Bax. “It’s<br />

imperative for traffic management to<br />

be efficient now and in the<br />

future, as the only way we<br />

can maximize the lifetime<br />

performance of transport<br />

solutions is to rely on new<br />

technologies.”<br />

Bax will take part in the<br />

following panel session:<br />

Session 3A: Beyond the<br />

Signal – What’s New in Traffic Management<br />

and Operations<br />

Wednesday, May 3, 8:30 – 10:00 a.m.<br />

(local time); Riverview Ballroom,<br />

Hyatt Regency, Wichita, Kansas<br />

Moderator: Ron Hall, ITS Heartland,<br />

State Director, Kansas Department<br />

of Transportation (DOT); Panelists:<br />

Zach Hansen, SRF Consulting<br />

Group; Tom Hein, Kansas DOT;<br />

Brian Sovik, Data Transfer Solutions<br />

Follow Cubic Transportation Systems<br />

at @CubicTS or use the<br />

hashtags #THISisITS and #realITS<br />

to join the conversation. For updates<br />

or participation in the ITS Heartland<br />

conversation during the event, use<br />

the hashtag #ITSHeartland.<br />

About Cubic Corporation<br />

Cubic Corporation designs, integrates<br />

and operates systems, products<br />

and services focused in the<br />

transportation, defense training and<br />

secure communications markets.<br />

Cubic Transportation Systems is a<br />

leading integrator of payment and<br />

information technology and services<br />

to create intelligent travel solutions<br />

for transportation authorities and<br />

operators. Cubic Global Defense is<br />

a leading provider of live, virtual,<br />

constructive and game-based training<br />

solutions, special operations and<br />

intelligence for the U.S. and allied<br />

forces. Cubic Mission Solutions provides<br />

networked Command, Control,<br />

Communications, Computers,<br />

Intelligence, Surveillance and Reconnaissance<br />

(C4ISR) capabilities<br />

for defense, intelligence, security<br />

and commercial missions. For more<br />

information about Cubic, please visit<br />

the company’s website at www.cubic.<br />

com or on Twitter @CubicCorp.<br />

Before 1970 the widely accepted solution<br />

for disposal of old munitions,<br />

typically called unexploded ordnance<br />

(UXO), was to dump them<br />

into rivers, lakes and oceans. Today<br />

we know this creates a multitude of<br />

problems, the worst of which are<br />

pollution and the risk of an explosion.<br />

Many people have already<br />

lost their lives to these underwater<br />

booby traps. The uncertainties<br />

surrounding their precise location<br />

and degree of decomposition,<br />

makes attempting to recover these<br />

dangerous devices an even more<br />

difficult task.<br />

Several international organizations<br />

have been formed to address<br />

the problem of UXO on land<br />

and underwater, and a variety of<br />

tools and techniques are being<br />

employed to locate and remove<br />

them. One of the groups working<br />

the problem is the Japan Mine Action<br />

Service (JMAS), a non-profit<br />

engaged in humanitarian activities<br />

to create better and safer living<br />

conditions. Since its inception in<br />

2001, JMAS has implemented UXO<br />

clearance projects in a host of countries<br />

from Japan to Afghanistan. JW<br />

Fishers Pulse 12 boat-towed metal<br />

detector is assisting in these operations.<br />

The detector will locate both<br />

ferrous and nonferrous metals, an<br />

important feature as munitions<br />

can be made of a variety of metals<br />

including brass and steel. It’s large<br />

rectangular search coil can find<br />

metal buried up to 16 feet, and the<br />

Pulse 12 works equally well on land<br />

and in the water. With three detection<br />

heads attached to the master<br />

control console, an area up to 72<br />

feet wide can be swept in one pass;<br />

28 29<br />

saving time, fuel, and manpower. To<br />

inspect sites on land, the coil can be<br />

mounted on the front of an ATV or<br />

other vehicle allowing large areas to<br />

be swept quickly. This powerful machine<br />

is now helping a JMAS team<br />

uncover lethal UXO in Palau reports<br />

representative Terada Yasuo.<br />

Another organization using<br />

Fishers equipment in a similar operation<br />

is the Regional Centre for<br />

Underwater De-mining (RCUD)<br />

in Montenegro, which was part of<br />

the former Yugoslavia. A bloody<br />

civil war in the 1990’s left the<br />

country littered with unexploded<br />

ordnance and waterways unsafe to<br />

travel because of many scattered<br />

mines. After numerous fishermen<br />

and boaters were killed from these<br />

deadly devices, RCUD acquired a<br />

Fisher side scan to help locate the<br />

mines. The operation was a success.<br />

With the help of the sonar<br />

and trained divers, many explosives<br />

were found and removed<br />

from the country’s lakes and rivers.<br />

Today the sonar is being used for<br />

more peaceful purposes. RCUD is<br />

working in cooperation with RPM<br />

Nautical Foundation and the Center<br />

for Conservation and Archaeology


to locate historic shipwrecks and<br />

map other underwater sites of significance.<br />

Evgeniy Pozharsky is a Polish<br />

patriot. He has taken it upon himself<br />

to try and locate and remove<br />

as many UXO as possible from his<br />

native land. Using his Fisher Pulse<br />

10 metal detector with a detection<br />

range of over 2 meters, Evgeniy has<br />

searched lakes, rivers and fields all<br />

over the country. Through hard<br />

work and dogged determination he<br />

has been able to locate a and recover<br />

a significant number of WWII munitions<br />

from sites on land and underwater.<br />

Evgeniy has put his life on<br />

the line to ensure no one else will be<br />

killed or injured<br />

by these perilous<br />

weapons.<br />

Law enforcement<br />

agencies<br />

around the<br />

world are acquiring<br />

underwater<br />

metal detectors<br />

(UMD)<br />

to ensure their<br />

dive teams have the right equipment<br />

to effectively do their job. An<br />

essential tool for locating evidence<br />

disposed of in a waterway, metal detectors<br />

routinely assist public safety<br />

divers in finding weapons, shell casings,<br />

stolen objects, and explosive<br />

devices. UMD are so effective, and<br />

their use has become so widespread,<br />

that agencies<br />

training public<br />

safety divers<br />

are developing<br />

courses<br />

on how to best<br />

utilize these<br />

devices. Dive<br />

Rescue International<br />

in Colorado<br />

and Lifeguard<br />

Systems<br />

in New York<br />

offer courses<br />

in aquatic preparedness to ensure<br />

public safety dive teams respond<br />

effectively to water incident scenes.<br />

Their instructors combine knowledge<br />

with experience<br />

in the use<br />

of state of the<br />

equipment. The<br />

detectors both<br />

companies are<br />

using in their<br />

evidence recovery<br />

training<br />

are JW Fishers<br />

Pulse 8X.<br />

Goodhue County Sheriff ’s Office<br />

in Minnesota is employing this<br />

technology in their underwater<br />

search operations. Dive Team Leader<br />

Steve Sutton-Brown reports using<br />

Fishers new SAR-1 detector in a recent<br />

training exercise. “We’re regularly<br />

called on to search for evidence<br />

such as guns, knives, bullet casings,<br />

etc. We generally dive in visibility<br />

that is zero to one foot, which is one<br />

of the reasons we choose this machine.<br />

In this exercise we planted a<br />

pistol on the lake bottom. The diver<br />

was given only an approximate area<br />

of where the weapon might be, just<br />

as would happen in a real call out.<br />

Although visibility was almost zero,<br />

each diver was able to quickly located<br />

the weapon. The high intensity<br />

LED light bar was fairly easy to see<br />

and the vibration feature was appreciated<br />

by all. We really like that<br />

there are no exposed wires since we<br />

already have enough entanglement<br />

issues to deal with. The consensus<br />

is; the SAR-1 works awesome!”<br />

For more information on JW Fishers<br />

complete line of underwater<br />

search equipment go to www.jwfishers.com.<br />

Raytheon wins $375M contract to<br />

modernize Air Force air and space<br />

operations centers<br />

Dave Wajsgras<br />

HAMPTON, VA <strong>April</strong> 26, 2017 The<br />

U.S. Air Force Materiel Command<br />

has awarded Raytheon Company<br />

(NYSE: RTN) a contract with an initial<br />

value of up to $375 million over<br />

six years to sustain and modernize<br />

the Air and Space Operations<br />

Center Weapon System,<br />

or AOC WS. Under<br />

the contract, Raytheon will<br />

update the existing AOC WS<br />

baseline software and develop<br />

and deploy new software<br />

upgrades to improve air and<br />

space command and control<br />

operations.<br />

Air and Space Operations Centers<br />

provide a strategic capability for the<br />

U.S. Air Force with operators at 22<br />

global locations using the AOC WS<br />

to command and control aircraft<br />

through all of the Air Force’s critical<br />

missions.<br />

“Raytheon will use our unmatched<br />

cyber, automation and analytics expertise<br />

to modernize the Air Force’s<br />

weapons system, providing an advantage<br />

in everything from security to<br />

actionable insight in the digital battlespace,”<br />

said Dave Wajsgras, president<br />

of Raytheon Intelligence, Information<br />

and Services.<br />

“Raytheon’s innovative modernization<br />

through sustainment approach<br />

incrementally improves systems without<br />

interruption to critical missions,”<br />

said Todd Probert, vice president of<br />

Mission Support and Modernization<br />

at Raytheon IIS. “In addition, the use<br />

of software development best<br />

practices, such as Agile and<br />

DevOps, speeds up the delivery<br />

of these systems to the<br />

warfighter.”<br />

Raytheon is hiring for the<br />

new team based in Hampton,<br />

Virginia. Open positions include<br />

system architects, software<br />

developers, cyber engineers, IT<br />

help desk and more.<br />

About Raytheon<br />

Raytheon Company, with 2016 sales<br />

of $24 billion and 63,000 employees,<br />

is a technology and innovation leader<br />

specializing in defense, civil government<br />

and cybersecurity solutions.<br />

With a history of innovation spanning<br />

95 years, Raytheon provides state-ofthe-art<br />

electronics, mission systems<br />

integration, C5ITM products and<br />

services, sensing, effects, and mission<br />

support for customers in more than<br />

80 countries. Raytheon is headquartered<br />

in Waltham, Massachusetts.<br />

30 31<br />

For proactive security,<br />

build an aquarium<br />

Continued from page 6<br />

requires us to build an aquarium<br />

again – a fusion of technologies that<br />

provide speed and accuracy, and are<br />

simple for the end-user.<br />

The most secure and convenient<br />

biometric technology identity verification<br />

must use ‘the power of fusion.’<br />

By fusing face recognition,<br />

body behavior analytics – including<br />

height, gait and body type – and<br />

even voice recognition, we create a<br />

fusion that is highly accurate, and<br />

does not require a user to stop for<br />

identification. This fusion of sensors<br />

allows us to understand a person’s<br />

identity in real-time, with high accuracy<br />

and speed.<br />

Building this aquarium and utilizing<br />

a fusion of technologies for<br />

multimodal biometrics, we can<br />

make identification and secure access<br />

simple and secure. And most<br />

importantly, we can apply the power<br />

of fusion to prevent incidents before<br />

they happen.


Hikvision camera system to provide increased security<br />

for Miami Beach Holocaust Memorial<br />

CITY OF INDUSTRY, CA May 2,<br />

2017 A security system provided<br />

by Hikvision, the North American<br />

leader in innovative, award-winning<br />

video surveillance products and solutions,<br />

will help increase security at<br />

the iconic Holocaust Memorial in<br />

Miami Beach, Fla.<br />

Founded 27 years ago by a group<br />

of community leaders, Holocaust<br />

survivors and the children of survivors,<br />

the Memorial is sited on two<br />

acres and features a series of openair<br />

rooms. Volunteers, including<br />

Holocaust survivors, lead tours of<br />

the Memorial’s exhibits and participate<br />

in other educational programs<br />

open to the public.<br />

The Memorial hosts more than<br />

130,000 visitors every year, including<br />

thousands of schoolchildren<br />

and people from around the world.<br />

Professionals and volunteers work<br />

to educate visitors about the time<br />

before and during the Holocaust.<br />

The Memorial also provides a place<br />

for people to reflect and explore<br />

how they feel about what they are<br />

seeing, to think about their role as<br />

citizens and their relationship with<br />

other people, and to discuss anti-<br />

Semitism and intolerance.<br />

Security is challenging in any<br />

open-air venue, and the Memorial’s<br />

previous analog security system was<br />

”extremely outdated,” according to<br />

Brenda Moxley, director of community<br />

security for the Greater Miami<br />

Jewish Federation.<br />

Moxley is the retired FBI Assistant<br />

Special Agent in Charge, Miami Division,<br />

whose background includes<br />

counter-terrorism. Hired by Federation<br />

to provide security consultation<br />

to 120 Jewish organizations<br />

in the Miami-Dade area, Moxley is<br />

working to improve critical security<br />

infrastructure, crisis management<br />

and education.<br />

The Hikvision security camera<br />

system will provide much needed<br />

security improvements at the memorial<br />

and enable Moxley to implement<br />

a coordinated and integrated<br />

security plan.<br />

Jeffrey He, president of Hikvision<br />

USA Inc., and Hikvision Canada<br />

Inc., said Hikvision is pleased to<br />

work with Moxley and the Greater<br />

Miami Jewish Federation. He noted<br />

that China has an important historic<br />

connection with the Jewish<br />

people. “Shanghai, a city one hour<br />

away from Hikvision headquarters<br />

in Hangzhou, China provided a safe<br />

haven for Jewish refugees during<br />

32<br />

the Holocaust,” He said. More than<br />

25,000 Jews came to Shanghai between<br />

the years 1937 and 1941.<br />

“Safeguarding people and protecting<br />

property is why Hikvision is in<br />

the security business,” He added.<br />

About Hikvision<br />

Hikvision is the world’s leading supplier<br />

of video surveillance solutions.<br />

Featuring the industry’s strongest<br />

R&D workforce, Hikvision designs,<br />

develops, and manufactures standard-<br />

and high-definition cameras,<br />

including a variety of IP cameras,<br />

analog cameras, and cameras featuring<br />

the latest in high-definition<br />

analog technology. Hikvision’s<br />

product suite also includes digital<br />

video servers, hybrid and standalone<br />

DVRs, NVRs, and other elements<br />

of sophisticated security systems<br />

for both indoor and outdoor<br />

use.<br />

<strong>GSN</strong>’s 2017 Airport/Seaport/Border Security Awards<br />

Now Including Cybersecurity Solutions for Airport, Seaport, Border Security Markets<br />

All Winners in this program are entitled to<br />

a Full-Page Advertisement (8.5” x 9.0”) in<br />

your choice of <strong>GSN</strong>’s <strong>Digital</strong> <strong>Magazine</strong> or<br />

Leaderboard in any edition of the Airport,<br />

Seaport, Rail, Border Security Weekly<br />

Newsletter.<br />

Adrian Courtenay<br />

Managing Partner, CEO<br />

Government Security News<br />

917-696-5782<br />

acourtenay@gsnmagazine.com<br />

NEW IN 2017:<br />

CLICK HERE TO SUBMIT ENTRIES<br />

All Finalists are entitled to a Half-Page<br />

Advertisement (8.5” x 4.5”) in your choice<br />

of <strong>GSN</strong>’s <strong>Digital</strong> <strong>Magazine</strong> or Leaderboard<br />

in any edition of the Airport, Seaport, Rail,<br />

Border Security Weekly Newsletter.<br />

Steve Bittenbender<br />

Managing Editor<br />

Government Security News<br />

502-552-1450<br />

sbittenbender@gsnmagazine.com<br />

Gerry O’Hara<br />

Designer<br />

OHDesign3<br />

203-249-0626<br />

gerry@ohd3.com


Cyber Threats & Solutions<br />

BeyondTrust survey links breaches to<br />

aging federal infrastructure<br />

Federal Government loses $637 Million to Breaches annually<br />

PHOENIX, AZ – May 3, 2017 – BeyondTrust,<br />

the leading cyber-security<br />

company dedicated to preventing<br />

privilege misuse and stopping unauthorized<br />

access, today unveiled the<br />

results of its Federal Cyber-Security<br />

Threat Survey Report 2017. Based<br />

on a comprehensive survey of senior<br />

Federal IT professionals, the study<br />

exposes an aging Federal computing<br />

infrastructure which has led to an environment<br />

with an alarmingly high<br />

risk of breaches.<br />

105 senior IT professionals working<br />

for federal agencies were asked about<br />

their computing infrastructure, security,<br />

breaches and IT modernization.<br />

A summary of the findings is included<br />

below.<br />

Federal IT managers concerned<br />

about antiquated infrastructure.<br />

An overwhelming majority of Federal<br />

IT managers (81 percent) say aging<br />

IT infrastructures have a somewhat<br />

to extremely large impact on their<br />

cyber-security risk. Further, three of<br />

five (61 percent) say aging infrastructure<br />

is a roadblock to achieving federal<br />

cyber-security mandate compliance.<br />

We found ample examples of aging<br />

infrastructure in our survey. For<br />

example, a surprising 47 percent of<br />

Federal agencies still use Windows<br />

XP, driving a third of respondents (35<br />

percent) to report that this kind of aging<br />

infrastructure had a somewhat to<br />

large impact on their ability to affect<br />

vulnerability patching.<br />

The impacts of aging federal infrastructure<br />

don’t stop there …<br />

• Three of four say aging infrastructure<br />

is a somewhat to extremely large<br />

risk to their ability to achieve their<br />

mission.<br />

• The biggest impacts include inefficiency,<br />

increased cyber risk and problems<br />

with compliance.<br />

• Specific to cyber-security, the top<br />

impacts of an aging infrastructure are<br />

difficulty with patching, password<br />

management and privileged account<br />

management (PAM).<br />

• Respondents cite aging infrastructure<br />

as the top roadblock in the way<br />

of achieving federal cyber-security<br />

mandates<br />

Aging Infrastructure Leads to<br />

Breaches<br />

Aging infrastructure is not just a<br />

problem in theory; aging infrastructure<br />

makes federal systems more vulnerable<br />

to attack, which has led to an<br />

environment that could be rife for<br />

breaches.<br />

• 42 percent have experienced a<br />

data breach within the past 6 months.<br />

• A staggering one in eight has experienced<br />

a data breach within the<br />

past 30 days.<br />

• Put another way, the typical federal<br />

IT system experiences one breach<br />

every 347 days.<br />

• Respondents report that the<br />

typical data breach costs more than<br />

$91,000.<br />

• The total cost due for data breaches<br />

is $637 million every year.<br />

• The most frequently reported<br />

costs include loss of productivity,<br />

loss of reputation and pure monetary<br />

damages.<br />

Privileged Account Management:<br />

Gap Between Theory and Practice<br />

We asked respondents what tools<br />

were most important to them in<br />

terms of securing their information<br />

environment. Here they ranked privileged<br />

access management and vulnerability<br />

patching as most important.<br />

This is significant as these technolo-<br />

gies restrict user privileges and close<br />

off security weaknesses in systems.<br />

Yet, despite understanding the importance<br />

of such measures, most<br />

(56 percent) use alternate solutions<br />

to manage privileged passwords and<br />

nearly two-thirds (63 percent) report<br />

less than fully mature vulnerability<br />

remediation programs. In fact, 6 percent<br />

have NO remediation plan, and<br />

another 14 percent do only the bare<br />

minimum required by compliance<br />

mandates.<br />

What IT Can Do Mitigate<br />

the Security Risk of<br />

Aging Federal Infrastructure<br />

The BeyondTrust 2017 US federal<br />

government study points to four best<br />

practices that any agency can implement.<br />

• Manage privileged credentials<br />

with greater discipline, eliminate<br />

administrator rights and enforce<br />

least privilege<br />

Thirty percent of respondents believe<br />

that insider threats pose a significant<br />

threat and 35 percent believe<br />

their users have more privileges than<br />

are required. To mitigate insider<br />

threats and the exploitation of privileges,<br />

adopt a least privilege model<br />

by removing admin rights from users<br />

and storing all privileged credentials<br />

in a secure safe. Known escalation attacks<br />

have been around for years and<br />

are still being used. These attacks require<br />

local administrator rights. It’s<br />

not just about insiders. Enforcing<br />

least privilege prevents lateral movement<br />

within an organization if a<br />

breach does occur.<br />

• Isolate Legacy Systems to reduce<br />

attack surfaces<br />

Modernization of federal IT infrastructure<br />

is a priority for most survey<br />

34 35<br />

respondents, but realistically this will<br />

not happen quickly. These aging systems<br />

have known risks. Reduce the<br />

attack surface by isolating legacy systems.<br />

Segment these systems to force<br />

all traffic through a proxy to reduce<br />

attack vectors. Deploy an automated<br />

password and session management<br />

solution that provides secure access<br />

control, auditing, alerting and recording<br />

for any privileged account. This<br />

will provide segmented access to critical<br />

systems, manage passwords, and<br />

monitor when tasks and operations<br />

are committed to a managed system.<br />

• Improve the maturity of vulnerability<br />

management through automated<br />

patching<br />

Even in today’s sophisticated threat<br />

landscape, the majority of attacks target<br />

known vulnerabilities that can be<br />

easily patched. Effective patch management<br />

goes a long way in reducing<br />

a network’s overall attack surface. To<br />

be truly effective, patch management<br />

requires intelligent prioritization and<br />

broad coverage for common business<br />

applications. To improve the efficiency<br />

and effectiveness of an agency<br />

patch process deploy a solution<br />

that provides integrated, automated<br />

patching. Implementing a solution<br />

that delivers analytics and trending<br />

across the threat lifecycle for multidimensional<br />

reports on assets, vulnerabilities,<br />

attacks and remediation<br />

allows prioritized patch management<br />

More on page 44


Cyber Threats & Solutions<br />

(ISC)² delivers cybersecurity workforce<br />

recommendations to White House Chief of Staff<br />

Imperva executive urges U.S. companies<br />

to evaluate pending EU cyber regulation<br />

ALEXANDRIA, VA, <strong>April</strong> 19, 2017<br />

– (ISC)2® today announced a set of<br />

recommendations for the Trump<br />

Administration to consider as it approaches<br />

its 100th day in office. The<br />

recommendations were delivered<br />

to White House Chief of Staff and<br />

others on President Trump’s team in<br />

order to urge prioritization of workforce<br />

development within the pending<br />

cybersecurity executive order<br />

and beyond.<br />

During a December 2016 gathering<br />

sponsored by the (ISC)2 U.S.<br />

Government Advisory Council<br />

(USGAC), participants, including<br />

former Federal Chief Information<br />

Security Officer (CISO) Gregory<br />

Touhill and federal agency CISOs<br />

and executives, discussed transition<br />

planning from the cybersecurity<br />

workforce perspective. The following<br />

is an abridged list of areas that<br />

(ISC)2 has since identified as critical<br />

for the new administration to<br />

address. An expanded list can be<br />

viewed in today’s (ISC)2 blog post.<br />

– Time Is of The Essence. The<br />

widespread and damaging effects of<br />

cyber threats are revealed on a daily<br />

basis. At the same time,<br />

the demand for skilled<br />

cybersecurity workers is<br />

rapidly increasing.<br />

– Consider the Progress<br />

Already Made. Cybersecurity<br />

is a bi-partisan issue. Critical<br />

work has been done over the last<br />

eight years to advance the cybersecurity<br />

workforce.<br />

– Harden the Workforce. Everyone<br />

must learn cybersecurity. We<br />

have to break the commodity focus<br />

of simply buying technology and<br />

stopping there, without focusing on<br />

training all users.<br />

– Incentivize Hiring and Retention.<br />

In today’s world, a sense of<br />

mission doesn’t always override<br />

good pay — incentives work.<br />

– Prioritize Investment in Acquisition,<br />

Legal and Human Resources<br />

(HR) Personnel. Acquisition, legal<br />

and HR professionals are essential<br />

players within the federal cybersecurity<br />

ecosystem.<br />

– Prevent Getting Lost in Translation.<br />

The government needs effective<br />

communicators who can<br />

translate technical risk to business<br />

leaders.<br />

– Civil Service Reform. The civil<br />

service system is broken and does<br />

not meet the government’s needs.<br />

– Compliance Does Not Equal Security.<br />

Embrace Risk Management.<br />

In the government’s quest for cyber<br />

resiliency, a risk management perspective<br />

will be essential.<br />

– A Standard Cyber Workforce<br />

Lexicon. Once finalized, the NICE<br />

Cybersecurity Workforce Framework<br />

should provide an excellent resource<br />

for workforce development.<br />

“In a recent congressional hearing,<br />

(ISC)2 had the opportunity to<br />

present these recommendations in<br />

an effort to advocate for our members<br />

and the broader cybersecurity<br />

profession during the presidential<br />

transition and beyond,” said Dan<br />

Waddell, (ISC)² managing director,<br />

North America Region. “Significant<br />

progress has been made over the<br />

past decade to advance the federal<br />

More on page 44<br />

REDWOOD SHORES, CA <strong>April</strong><br />

27, 2017 Imperva, Inc. (NASDAQ:<br />

IMPV), committed to protecting<br />

business-critical data and applications<br />

in the cloud and on-premises,<br />

today announced the results of a<br />

survey on the current state of company<br />

preparedness for the European<br />

General Data Protection Regulation<br />

(GDPR). The survey of 170 security<br />

professionals was taken at RSA<br />

2017, the world’s largest security<br />

conference.<br />

GDPR protects the privacy of European<br />

citizens and applies to all<br />

businesses that hold and process<br />

personal data collected in the European<br />

Union, regardless of their industry<br />

or location. It becomes effective<br />

on May 25, 2018. Organizations<br />

are focusing on GDPR compliance<br />

because fines for certain violations<br />

may be up to the greater of €20 million<br />

or four percent of total worldwide<br />

annual turnover. Companies<br />

with significant revenue could face<br />

billions of dollars in fines.<br />

According to the survey, 51 percent<br />

of respondents said GDPR<br />

would impact their companies,<br />

nearly a third of the respondents<br />

didn’t see the GDPR regulations<br />

impacting them, while 11 percent<br />

were unsure if GDPR would impact<br />

their companies and 5 percent<br />

were not familiar with<br />

GDPR.<br />

The survey also showed<br />

an overall lack of urgency<br />

among the IT professionals<br />

surveyed with 43 percent<br />

of respondents indicating<br />

that they are evaluating or<br />

implementing change in preparation<br />

for GDPR, 29 percent indicating<br />

that they were not preparing,<br />

and another 28 percent signifying<br />

that they were unaware of specific<br />

preparations.<br />

“U.S. companies should be evaluating<br />

the impact GDPR will have on<br />

their data practices, given the major<br />

fines for non-compliance,” said<br />

Terry Ray, chief product strategist at<br />

Imperva.<br />

“Companies need to begin the<br />

GDPR legwork now by documenting<br />

how personal data is collected<br />

and processed in their organizations.<br />

From what we’ve seen in<br />

working with our clients on GDPR<br />

readiness, the projects are complex<br />

36 37<br />

Terry Ray<br />

and involve multiple teams, technologies<br />

and systems.”<br />

In asking survey respondents<br />

about who is driving GDPR<br />

compliance in their organization,<br />

49 percent of survey<br />

respondents cited their organization’s<br />

legal department,<br />

while 8 percent said<br />

the IT department is managing<br />

the process.<br />

Imperva provides data<br />

discovery and classification tools,<br />

user access controls, data masking,<br />

data breach detection, data transfer<br />

controls and other data compliance<br />

solutions that can assist organizations<br />

in their GDPR compliance efforts.<br />

To learn how Imperva helps<br />

organizations prepare for GDPR,<br />

visit http://bit.ly/2ouojYO.<br />

Survey Methodology<br />

Conducted Feb. 13-17, at RSA<br />

Conference 2017, the trade show<br />

with the largest concentration of security<br />

professionals, the in-person<br />

survey is based on responses from<br />

170 attendees including IT professionals,<br />

managers and executives<br />

from the U.S. (77 percent), EMEA<br />

More on page 43


Page 1 of 12<br />

Cyber Threats & Solutions<br />

Report: Municipal governments lack funding to<br />

reach high level of cybersecurity<br />

WASHINGTON May 2, 2017 The<br />

inability to pay competitive salaries,<br />

insufficient cybersecurity staff, and<br />

a general lack of funds present serious<br />

barriers to local governments<br />

achieving the highest levels of cybersecurity,<br />

according to a survey of<br />

local government chief information<br />

officers conducted by ICMA, the International<br />

City/County<br />

Management Association,<br />

in partnership with<br />

the University of Maryland<br />

Baltimore County.<br />

The goal of the Cybersecurity<br />

2016 Survey was<br />

to better understand current<br />

local government<br />

cybersecurity practices and their related<br />

issues, including what capacities<br />

cities and counties possess, what<br />

kind of barriers they face, and what<br />

type of support they have to implement<br />

cybersecurity programs.<br />

Despite nearly a third (32 percent)<br />

of respondents reporting an increase<br />

in cyber attacks to their local<br />

government information during the<br />

past 12 months, 58 percent indicated<br />

that the inability to pay competitive<br />

salaries prohibited them from<br />

achieving high levels of cybersecurity.<br />

Fifty-three percent cited an insufficient<br />

number of cybersecurity<br />

staff as the primary obstacle, and 52<br />

percent said it was a general lack of<br />

funds.<br />

The public sector pays considerably<br />

less than the private sector<br />

“Because the costs to restore compromised<br />

data are staggering, local governments must<br />

understand what resources they need to<br />

achieve their cybersecurity objectives and<br />

ensure the safety of their data.”<br />

for cybersecurity expertise, which<br />

places further pressure on U.S. local<br />

governments to find ways to<br />

fund compensation in this explosive<br />

industry. Currently, this booming<br />

field has zero unemployment and<br />

one million unfilled jobs, and experts<br />

estimate that the shortfall will<br />

reach 1.5 million by 2019.<br />

When asked to rank the top three<br />

things most needed to ensure the<br />

highest level of cybersecurity for<br />

their local government, respondents<br />

cited greater funding as number<br />

one, better cybersecurity policies as<br />

number two, and greater cybersecurity<br />

awareness among local government<br />

employees as number three in<br />

importance.<br />

“As local governments become<br />

increasingly reliant on technology<br />

and the Internet, they must<br />

also become increasingly<br />

diligent about the security<br />

they provide for the data<br />

and information they collect<br />

and manage,” said ICMA<br />

Executive Director Marc<br />

Ott. “Because the costs to restore<br />

compromised data are<br />

staggering, local governments must<br />

understand what resources they<br />

need to achieve their cybersecurity<br />

objectives and ensure the safety of<br />

their data. The results of the ICMA-<br />

UMBC Cybersecurity 2016 Survey<br />

can help local leaders identify and<br />

evaluate critical resource shortages.”<br />

Other highlights of the ICMA/<br />

UMBC cybersecurity survey results<br />

include:<br />

Only 1 percent of responding lo-<br />

cal governments<br />

have a stand-alone<br />

cybersecurity department<br />

or unit.<br />

Primary responsibility<br />

for cybersecurity is most<br />

often located within the IT department.<br />

Roughly 62 percent of responding<br />

jurisdictions have developed a<br />

formal policy governing the use of<br />

personally-owned devices by governmental<br />

officials and employees.<br />

Nearly 70 percent of responding<br />

local governments have not developed<br />

a formal, written cybersecurity<br />

risk management plan, but nearly<br />

41 percent conduct an annual risk<br />

assessment and an additional 16<br />

percent take stock of their risk at<br />

least every two years.<br />

The Cybersecurity 2016 Survey<br />

was mailed (with an online option)<br />

to the chief information officers of<br />

3,423 U.S. municipalities and counties<br />

with populations of 25,000 or<br />

greater. Responses were received<br />

from 411 local governments for a<br />

response rate of 12 percent.<br />

Review the complete results of<br />

the survey at: http://icma.org/cybersecurity2016surveyresults.<br />

About ICMA<br />

ICMA, the International City/<br />

County Management Association,<br />

advances professional local government<br />

worldwide through leadership,<br />

management, innovation, and ethics.<br />

ICMA is second only to the federal<br />

government in the collection,<br />

analysis, and dissemination of data<br />

focused on issues related to local<br />

government management. Through<br />

expansive partnerships with local<br />

governments, federal agencies, nonprofits,<br />

and philanthropic funders,<br />

the organization gathers information<br />

on topics such as sustainability,<br />

health care, aging communities,<br />

38 39<br />

Introduction<br />

In 2016, the International City/County Management Association (ICMA), in partnership with the University of Maryland,<br />

Baltimore County (UMBC), conducted a survey to be ter understand local government cybersecurity practices. The<br />

results of this survey provide insights into the cybersecurity issues faced by U.S. local governments, including wha their<br />

capacities are, what kind of ba riers they face, and wha type of suppor they have to implement cybersecurity programs.<br />

Methodology<br />

The survey was sent on paper via postal mail to the chief information o ficers of 3,423 U.S. local governments with<br />

populations of 25,000 or greater. An online submission option was also made available to survey recipients.<br />

Responses were received from 411 of the governments surveyed, yielding a response rate of 12%. Cities were<br />

ove represented among respondents while counties were underrepresented. Similarly, higher percentage of responses<br />

received from larger communities compared to sma ler communities. Further, jurisdictions in the Mountain region of the<br />

U.S. were ove represented, while jurisdictions in the Mid-Atlantic and East South-Central regions were<br />

unde represented. The following report reflects trends among the unweighted survey responses, and should only be<br />

considered to be representative of the responding governments. Weighting should be applied to achieve representation<br />

of the broader survey population.<br />

Cybersecurity 2016 Survey<br />

Summary Report of Survey Results<br />

Cybersecurity 2016 Survey<br />

Number Surveyed Number Responding Response Rate<br />

Total 3423 411 12.0%<br />

Population Size<br />

Over 1,000,000 42 11 26.2%<br />

500,000 - 1,000,000 98 20 20.4%<br />

250,000 - 499,999 168 26 15.5%<br />

100,000 - 249,999 532 63 11.8%<br />

50,000 - 99,999 939 108 11.5%<br />

25,000 - 49,999 1644 183 11.1%<br />

Geographic Division<br />

New England 183 23 12.6%<br />

Mid-Atlantic 391 23 5.9%<br />

East North-Central 782 94 12.0%<br />

West North-Central 266 26 9.8%<br />

South Atlantic 541 79 14.6%<br />

East South-Central 253 20 7.9%<br />

West South-Central 354 41 11.6%<br />

Mountain 220 48 21.8%<br />

Pacific Coast 433 57 13.2%<br />

Type of Government<br />

Municipalities 1893 267 14.1%<br />

Counties 1530 144 9.4%<br />

economic development, homeland<br />

security, alternative service delivery,<br />

as well as performance measurement<br />

and management data on a<br />

variety of local government services—all<br />

of which support related<br />

training, education, and technical<br />

assistance.<br />

About the University of Maryland<br />

Baltimore County<br />

UMBC is a dynamic public research<br />

university integrating teaching, research,<br />

and service to benefit the<br />

citizens of Maryland. As an Honors<br />

University, the campus offers academically<br />

talented students a strong<br />

undergraduate liberal arts foundation<br />

that prepares them for graduate<br />

and professional study, entry into<br />

the workforce, and community service<br />

and leadership. UMBC emphasizes<br />

science, engineering, information<br />

technology, human services<br />

and public policy at the graduate<br />

level. UMBC contributes to the economic<br />

development of the State and<br />

the region through entrepreneurial<br />

initiatives, workforce training, K-16<br />

partnerships, and technology commercialization<br />

in collaboration with<br />

public agencies and the corporate<br />

community. UMBC is dedicated to<br />

cultural and ethnic diversity, social<br />

responsibility and lifelong learning.


Cyber Threats & Solutions<br />

Cybersecurity executives ‘Wannacrypt’ ransomware<br />

attack a wake-up call for industry, government leaders<br />

By Steve Bittenbender<br />

Editor, Government Security News<br />

The ransomware attack that plagued<br />

the globe on Friday must serve as a<br />

“wake-up call” to both industry and<br />

government leaders that the time for<br />

urgent action is now. That’s how one<br />

of Microsoft’s top executives reacted<br />

to the “WannaCrypt” attack that<br />

targeted computer systems in various<br />

industries worldwide, including<br />

healthcare and government systems.<br />

“WannaCrypt,” also dubbed<br />

“WannaCry,” was a ransomware attack<br />

that paralyzed hospitals in Great<br />

Britain and even FedEx in the United<br />

States, although the attack seemed<br />

to focus mainly on Russian servers<br />

based on information provided from<br />

Kapersky Labs. A ransomware attack<br />

is where a hacker encrypts files and<br />

threatens to destroy the data if the<br />

ransom – in the case of “WannaCrypt,”<br />

it was at least $300 in Bitcoin<br />

– is not paid within a certain time.<br />

In a Sunday blog post on Microsoft’s<br />

Web site, company President<br />

and Chief Legal Officer Brad Smith<br />

said the hackers used material stolen<br />

from the National Security Agency<br />

Brad Smith<br />

to perpetrate the attack. The NSA<br />

breach had been previously reported,<br />

and, in March, Microsoft released<br />

a patch to its users to protect<br />

them from an attack. While some users<br />

updated their systems, others did<br />

not, and they were the ones scrambling<br />

on Friday.<br />

The ransomware attack<br />

“demonstrates the degree to<br />

which cybersecurity has become<br />

a shared responsibility<br />

between tech companies<br />

and customers,” Smith said.<br />

“The fact that so many computers<br />

remained vulnerable<br />

two months after the release<br />

of a patch illustrates this aspect. As<br />

cybercriminals become more sophisticated,<br />

there is simply no way<br />

for customers to protect themselves<br />

against threats unless they update<br />

their systems. Otherwise they’re literally<br />

fighting the problems of the<br />

present with tools from the past.”<br />

Dan Matthews, a sales engineer<br />

with Lastline, said network managers<br />

had another option to prevent the<br />

attack if they were not able to get the<br />

patch installed in time.<br />

He, like other experts, said the ransomware<br />

attack served as an important<br />

reminder of being proactive in<br />

managing cybersecurity risks.<br />

“In practice things are often more<br />

complicated and there are legitimate<br />

reasons for needing more time to<br />

implement a patch,” Matthews said.<br />

“Organizations who are unable to<br />

deploy Microsoft’s (or other<br />

software vendors’) critical<br />

patches in a timely manner<br />

can instead implement advanced<br />

email and network<br />

protections that are capable<br />

of detecting ransomware<br />

and preventing the delivery<br />

of these payloads to unpatched<br />

computers.”<br />

Ofer Israeli, CEO and founder of<br />

Illusive Networks, said he expects<br />

hackers will continue to use the stolen<br />

NSA material for other attacks.<br />

“In this case, we are seeing an opportunistic<br />

ransomware operation,<br />

but we can expect the exploit is already<br />

being used for surgical targeted<br />

attacks, the outcome of which will<br />

only be revealed in a few months,<br />

due to the time it takes to execute<br />

a sophisticated targeted attack,” he<br />

said.<br />

Brian Lord, OBE, managing director<br />

for British-based PGI Cyber, said<br />

the attacks were “always inevitable.”<br />

Lord also echoed Smith’s comments<br />

on this being a wake-up call.<br />

“While organizations are distracted<br />

by high profile dramatized threats,<br />

such as Russian election hacking,<br />

they are neglecting basic cyber hygiene<br />

measures which can prevent<br />

the mass effectiveness of mass ransomware<br />

attacks like this,” said Lord,<br />

the former director of deputy director<br />

for intelligence and cyber operations<br />

for Britain’s Government Communications<br />

Headquarters.<br />

Smith added that it’s time government<br />

leaders readdress their<br />

cybersecurity policies, as attacks<br />

like “WannaCrypt” are becoming<br />

an emerging problem this year. He<br />

equated the NSA losing its coding to<br />

the military having a few Tomahawk<br />

missiles taken.<br />

“This is one reason we called in<br />

February for a new ‘<strong>Digital</strong> Geneva<br />

Convention’ to govern these issues,<br />

including a new requirement for<br />

governments to report vulnerabilities<br />

to vendors, rather than stockpile,<br />

sell, or exploit them,” Smith said.<br />

“And it’s why we’ve pledged our support<br />

for defending every customer<br />

everywhere in the face of cyberattacks,<br />

regardless of their nationality.”<br />

40 41<br />

<strong>GSN</strong>’s 2017<br />

Airport/Seaport/Border Security Awards<br />

Now Including Cybersecurity Solutions for Airport, Seaport,<br />

Border Security Markets<br />

All Winners in this program are<br />

entitled to a Full-Page Advertisement<br />

(8.5” x 9.0”) in your choice of <strong>GSN</strong>’s<br />

<strong>Digital</strong> <strong>Magazine</strong> or Leaderboard in<br />

any edition of the Airport, Seaport,<br />

Rail, Border Security Weekly<br />

Newsletter.<br />

Adrian Courtenay<br />

Managing Partner, CEO<br />

Government Security News<br />

917-696-5782<br />

acourtenay@gsnmagazine.com<br />

NEW IN 2017:<br />

CLICK HERE TO SUBMIT ENTRIES<br />

All Finalists are entitled to a Half-<br />

Page Advertisement (8.5” x 4.5”) in<br />

your choice of <strong>GSN</strong>’s <strong>Digital</strong> <strong>Magazine</strong><br />

or Leaderboard in any edition of the<br />

Airport, Seaport, Rail, Border Security<br />

Weekly Newsletter.<br />

Steve Bittenbender<br />

Managing Editor<br />

Government Security News<br />

502-552-1450<br />

sbittenbender@gsnmagazine.com<br />

Gerry O’Hara<br />

Designer<br />

OHDesign3<br />

203-249-0626<br />

gerry@ohd3.com


OnSSI integration with Jemez<br />

Technology improves perimeter<br />

surveillance effectiveness<br />

Continued from page 12<br />

lance management software. OnSSI’s<br />

Ocularis IP security and surveillance<br />

VMS platform increases security,<br />

reduces operational costs, and<br />

helps organizations move closer to<br />

prevention. Ocularis delivers open<br />

architecture, flexibility, and scalability<br />

for a range of applications including<br />

education, gaming, government,<br />

healthcare, manufacturing, public<br />

safety, transportation, and utilities.<br />

OnSSI is headquartered in Pearl<br />

River, New York and has representation<br />

in over 100 countries. With its<br />

acquisition of Germany-based VMS<br />

company, SeeTec GmbH and the<br />

launch of Ocularis 5, OnSSI continues<br />

to drive global expansion and<br />

technological innovations.<br />

About Jemez Technology<br />

Jemez Technology provides stateof-the-art<br />

video analytic surveillance<br />

technology delivering dramatically<br />

enhanced perimeter and area<br />

surveillance for critical asset and<br />

infrastructure protection. Products<br />

and services from Jemez Technology<br />

leverage their patent-pending<br />

Eagle-i Edge technology and the<br />

AXIS Camera Application Platform<br />

(ACAP).<br />

UTEP professor, Immigration<br />

Council question need for<br />

additional ICE and Border Patrol<br />

agents<br />

Continued from page 13<br />

Heyman said the additional staffing<br />

would increase the DHS budget<br />

by more than $3.14 billion the<br />

administration gets its 15,000 new<br />

agents. In his report, he believes<br />

that money could be better spent<br />

elsewhere within DHS.<br />

For example, he noted that U.S.<br />

immigration courts are currently<br />

understaffed. There are 300 judges<br />

now, about 75 short of what’s currently<br />

budgeted. These judges oversee<br />

more than a half-million cases<br />

and the average time for a case to be<br />

resolved is more than 670 days. In<br />

order to alleviate the backlog within<br />

six years, Heyman said the government<br />

would need more than 500<br />

judges.<br />

Heyman also noted that CBP’s Office<br />

of Field Operations is not slated<br />

to receive any additional agents,<br />

even though the office is responsible<br />

for inspecting trade and travel at<br />

ports of entry. He noted an internal<br />

DHS study showing that one additional<br />

OFO agent would boost by<br />

the national economy by millions<br />

because the agent would help reduce<br />

the amount of time needed to<br />

inspect cargo containers.<br />

While additional OFO agents also<br />

run the same risk of corruption as<br />

Taming the rising tide of<br />

digital evidence<br />

Continued from page 23<br />

an investigation involving large<br />

amounts of crowdsourced data.<br />

Analyzing evidence:<br />

putting the pieces together<br />

Collecting digital evidence is just the<br />

beginning. Today, crime recreations<br />

can be very complex thanks in large<br />

part to all of the different sources<br />

of digital evidence, which could include<br />

hours of video footage from<br />

different CCTV cameras, audio recordings,<br />

body-worn footage, interview<br />

room recordings and so on. At<br />

some point, digital evidence has to<br />

be sorted and put into context based<br />

on time sequence and location. An<br />

investigator can spend grueling<br />

hours manually sifting through evidence<br />

and trying to make sense of it.<br />

Another problem investigators<br />

need to contend with is the large<br />

range of video and audio formats,<br />

their colleagues along the border,<br />

“attention to ports of entry represents<br />

an important policy alternative<br />

to repeating the misplaced pattern<br />

of Border Patrol and border<br />

wall expansion,” Heyman said.<br />

codecs and proprietary players. An<br />

investigator might obtain a copy of<br />

a CCTV video and bring it back to<br />

the station, only to realize it can’t be<br />

played back without a proprietary<br />

player or codec. A forensic technician<br />

could spend days trying to locate<br />

the needed codec.<br />

<strong>Digital</strong> investigation and evidence<br />

management technology solves this<br />

problem by automatically creating a<br />

working copy of the video that can<br />

be played on any standard PC, tablet<br />

or smartphone browser (while<br />

retaining the original). Investigators<br />

can easily visualize the sequence<br />

of events from multiple angles, for<br />

example by combining video from<br />

different CCTV cameras in chronological<br />

sequence, along with bodyworn<br />

camera video, in-car video,<br />

and 911 and radio recordings.<br />

Visualization tools enable the investigator<br />

to assemble and visualize<br />

these media files in meaningful<br />

ways, for example on maps or timelines.<br />

Sharing evidence: the hard way<br />

or the easy way<br />

After digital evidence is collected<br />

and analyzed, investigators then<br />

need to package it up for the prosecution.<br />

This is where the process<br />

gets even more labor intensive and<br />

time consuming. Today, all of the<br />

different pieces of digital evidence<br />

– interview recordings, audio recordings,<br />

photographs, in-car video,<br />

documents, etc. – are typically<br />

copied onto CDs, DVDs, or thumb<br />

drives and hand delivered to the DA.<br />

With new digital investigation and<br />

evidence management technology,<br />

evidence can now be securely shared<br />

electronically. This means investigators<br />

can spend less time copying and<br />

transporting evidence, and focus<br />

more of their time and attention on<br />

solving cases. A built in audit trail<br />

even tracks chain of custody to ensure<br />

the integrity and admissibility<br />

of digital evidence for court.<br />

Crime-solving in the 21st century:<br />

taming the rising tide of digital<br />

evidence<br />

Police departments everywhere are<br />

investing in digital policing initiatives<br />

to better safeguard the public,<br />

and this is having an unintended<br />

consequence. As paper silos are replaced<br />

by digital silos it’s creating a<br />

rising tide of digital evidence that<br />

needs to be collected, analyzed and<br />

shared. <strong>Digital</strong> investigation and evidence<br />

management technology can<br />

help police departments tame this<br />

rising tide of digital evidence and<br />

improve case solvability, while also<br />

saving time, money and taxpayer<br />

dollars.<br />

42 43<br />

Imperva executive urges U.S.<br />

companies to evaluate pending EU<br />

cyber regulation<br />

Continued from page 37<br />

(13 percent) and other regions (11<br />

percent). To view the full survey results,<br />

visit bit.ly/2p5kYkS.<br />

About Imperva<br />

Imperva® (NASDAQ: IMPV) is a<br />

leading provider of cyber security<br />

solutions that protect businesscritical<br />

data and applications. The<br />

company’s SecureSphere, Counter-<br />

Breach, Incapsula and Camouflage<br />

product lines enable organizations<br />

to discover assets and risks, protect<br />

information wherever it lives – in<br />

the cloud and on-premises – and<br />

comply with regulations. The Imperva<br />

Defense Center, a research<br />

team comprised of some of the<br />

world’s leading experts in data and<br />

application security, continually enhances<br />

Imperva products with upto-the-minute<br />

threat intelligence,<br />

and publishes reports that provide<br />

insight and guidance on the latest<br />

threats and how to mitigate them.<br />

Imperva is headquartered in Redwood<br />

Shores, California. Learn<br />

more: www.imperva.com, our blog<br />

or on Twitter.


BeyondTrust survey links breaches<br />

to aging federal infrastructure<br />

Continued from page 35<br />

based or risk profile.<br />

• Unite threat intelligence from<br />

multiple sources to better prioritize<br />

risks across the environment<br />

Since the asset risk-to-user privilege<br />

risk pattern is a common attack<br />

vector, deploy solutions that correlate<br />

asset-based risk with user-based activity<br />

to gain a more complete picture<br />

of risks, gaining<br />

needed prioritization<br />

of the most<br />

impactful risks. For<br />

example, advanced<br />

persistent threats<br />

(APTs) can be analyzed<br />

against privileged<br />

password,<br />

user, and account<br />

activity, along with<br />

asset characteristics<br />

such as vulnerability<br />

count, vulnerability level, attacks<br />

detected, risk score, applications, services,<br />

software and ports. Consuming<br />

multiple data feeds from in-place solutions<br />

into a single console can help<br />

mitigate additional costs and reduce<br />

complexity.<br />

“The federal government is moving<br />

to modernize its aging infrastructure,”<br />

said Kevin Hickey, President<br />

and CEO at BeyondTrust. “But that<br />

takes time, and in the meantime, federal<br />

systems face a real risk. These are<br />

simple steps IT can take today to help<br />

mitigate that risk.”<br />

Federal Cyber-Security<br />

Threat Survey Report<br />

For more information on the 2017 US<br />

Federal Government Security Survey,<br />

please visit: https://beyondtrust.com/<br />

aging-fed-it-risky.<br />

About BeyondTrust<br />

BeyondTrust is a global information<br />

security software company that<br />

helps organizations prevent cyber attacks<br />

and unauthorized data access<br />

due to privilege abuse. Our solutions<br />

give you the visibility to<br />

confidently reduce risks<br />

and the control to take<br />

proactive, informed action<br />

against data breach<br />

threats. And because<br />

threats can come from<br />

anywhere, we built a<br />

platform that unifies the<br />

most effective technologies<br />

for addressing both<br />

internal and external<br />

risk: Privileged Access Management<br />

and Vulnerability Management. Our<br />

solutions grow with your needs, making<br />

sure you maintain control no matter<br />

where your company goes. BeyondTrust’s<br />

security solutions are trusted<br />

by over 4,000 customers worldwide,<br />

including half of the Fortune 100. To<br />

learn more about BeyondTrust, please<br />

visit www.beyondtrust.com.<br />

(ISC)² delivers cybersecurity<br />

workforce recommendations to<br />

White House<br />

Continued from page 36<br />

cyber workforce; our recommendations<br />

reflect the importance of<br />

building future cybersecurity policy<br />

— including the pending executive<br />

order — on the existing foundation.”<br />

About (ISC)²<br />

(ISC)² is an international nonprofit<br />

membership association focused<br />

on inspiring a safe and secure cyber<br />

world. Best known for the acclaimed<br />

Certified Information Systems Security<br />

Professional (CISSP®) certification,<br />

(ISC)2 offers a portfolio of<br />

credentials that are part of a holistic,<br />

programmatic approach to security.<br />

Our membership, over 120,000<br />

strong, is made up of certified cyber,<br />

information, software and infrastructure<br />

security professionals who<br />

are making a difference and helping<br />

to advance the industry. Our vision<br />

is supported by our commitment to<br />

educate and reach the general public<br />

through our charitable foundation<br />

– The Center for Cyber Safety<br />

and EducationTM. For more information<br />

on (ISC)², visit www.isc2.<br />

org, follow us on Twitter or connect<br />

with us on Facebook.<br />

© 2017 (ISC)² Inc., (ISC)², CISSP, SSCP, CCSP, CAP,<br />

CSSLP, HCISPP, CCFP, ISSAP, ISSEP, ISSMP and CBK<br />

are registered marks, of (ISC)², Inc.<br />

CEO/Editorial Director<br />

Adrian Courtenay<br />

917-696-5782<br />

acourtenay@gsnmagazine.com<br />

Editor<br />

Steve Bittenbender<br />

502-552-1450<br />

sbittenbender@gsnmagazine.com<br />

Senior Writer<br />

Karen Ferrick-Roman<br />

412-671-1456<br />

karenferrickroman@gmail.com<br />

Columnist<br />

Shawn Campbell<br />

Campbell on Crypto<br />

shawn.campbell@safenetat.com<br />

Columnist<br />

George Lane<br />

Hazmat Science & Public Policy<br />

georgelane@hotmail.com<br />

Contributing Author<br />

Lloyd McCoy Jr<br />

Immix Group<br />

The News Leader in Physical, IT and Homeland Security<br />

Contributing Author<br />

Walter Ewing<br />

Contributing Author<br />

Wendy Feliz<br />

Contributing Author<br />

Joshua Breisblatt<br />

Contributing Author<br />

J. Michael Barrett<br />

Contributing Author<br />

Christopher Millar<br />

Gatekeeper Security<br />

Art Director<br />

Gerry O’Hara, OHDesign3<br />

gerry@ohd3.com<br />

203-249-0626<br />

Production Manager<br />

Brenden Hitt<br />

Brenden.hitt@gsnmagazine.com<br />

Direct: 203-216-7798<br />

COMING ATTRACTIONS<br />

May<br />

Special Reports:<br />

Technology Focus<br />

License Plate Detection,<br />

Smart Vehicle Surveillance<br />

Market Sector Focus<br />

Maritime, Coastal, Port Security<br />

FREE SUBSCRIPTION<br />

SIGN-UP<br />

Monthly <strong>Digital</strong> <strong>Edition</strong><br />

Airport/Seaport Newsletter<br />

Daily Insider Newsletter<br />

Cybersecurity Newsletter<br />

CLICK HERE<br />

44 45

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!