GSN_Magazine April Digital Edition

acourtenay

Government Security News

APRIL 2017 DIGITAL EDITION

RVSS deployed for protection across the southern U.S. border, with PureActiv as its central

monitoring and video intelligence platform, receives Full Operating Capability from DHS’

Customs and Border Protection (CBP) – Page 8

Also in this issue:

For proactive security, Major General (res.) Aharon Zeevi Farkash, Founder and President of FST Biometrics,

recommends building an aquarium– Page 6

UTER Professor, Immigration Council question need for additional ICE and Border Patrol Agents,

by Steve Bittenbender– Page 13


GSN April 2017 Digital Edition Table of Contents

NEWS

FEATURES

4

5

6

8

11

12

13

14

16

American-based Securiport’s intelligent immigration

control aids in capture of two high-level ISIS terrorists

at Senegal Airport

G4S Security Integration achieves

OHSAS 18001:2007 Certification

For proactive security, says Israeli Major General (res.) Aharon Zeevi Farkash,

Founder and President of FST biometrics, suggests building an aquarium

RVSS achieves “Full Operating Capability”

designation on Southern U.S. Border;

CBP deployment features PureActive Geospatial C2

and Video Analytics

Pelco showcases latest technology innovations

and strategic application solutions to Securika/MIPS 2017

OnSSI integration with Jemez Technology improves

perimeter protection surveillance effectiveness

UTEP professor, Immigrant Council, question need for

additional ICE and Border Security Patrol Agents,

by Steve Bittenbender

IRIS enters into global collaboration with TruTag

in alliance that will create global market for the

digitization of mission-critical smartcards and

secure labels

How to improve refugee vetting now –

a 9/11 Commission border council perspective

SPECIAL REPORT ON LAW ENFORCEMENT/PUBLIC SAFETY

18

20

21

22

24

26

28

29

31

32

34

36

37

38

40

San Francisco Department of Emergency Management

selects NICE for 9-1-1 center grade

Chicago considers ordinance requiring Panic Buttons

for hotels

Pro-Vision releases 1080p HD Video systems for law enforcement vehicles

Taming the rising tide of digital evidence,

by Linda Haelsen, NICE

Kansas becomes first statewide deployment site

of AT&T NextGen 911 Soltuion

Rapid SOS secures $14M in investments to develop lifesaving 911 technology

Cubic executive to discuss benefits of cloud hosting at transportation summit

JW Fishers describes equipment now used to locate

weapons and explosives

Raytheon wins $375M contrast to modernize

Air Force air and space operation centers

Hikvision camera system to provide increased security for

Miami Beach Holocaust Memorial

SPECIAL REPORT ON CYBER THREATS & SOLUTIONS

2 3

Beyond Trust survey links breaches to aging federal infrastructure

(ISC) 2 delivers cybersecurity workforce recommendations

to White House Chief of Staff

Imperva executive urges U.S. companies to evaluate pending

EU cyber regulation

Report: Municipal governments lack funding to reach high level of cybersecurity

Cybersecurity executives ‘Wannacrypt’ ransomware attack a wake-up call

for industry, government leaders


American-based Securiport’s intelligent

immigration control aids in the capture of two

high-level ISIS terrorists at Senegal airport

April 18, 2017—According to several

media reports, Securiport, a

global leader in intelligent immigration

controls and civil aviation

security solutions, helped Senegalese

authorities apprehend two

high-ranking Daesh—most commonly

referred to as ISIS—jihadists

in the Senegal Airport.

The suspects—of Moroccan descent—were

traveling from Istanbul

when they were flagged by Securiport’s

global security system and

arrested immediately. The names of

the suspects have yet to be released,

but they are the 36th terrorists to be

captured by Senegalese authorities

this year.

In this globally connected world,

ensuring strategic border security

has become a high priority for European,

Middle Eastern and African

nations alike. Terrorists don’t

respect international borders, so the

need for implementing strong immigration

control measures is imperative.

As criminals and terrorists

move across borders undetected,

utilizing intelligent immigration

control is a critical weapon in the

fight against these new threats.

And nowhere is there a greater

need for border security than at

airports. In 2016 Interpol flagged

115,000 people attempting to use

fraudulent passports and travel

documents. That’s why countries

typically ravaged by terrorists and

criminals illegally crossing their

borders are now relying on sophisticated

airport security to assist them

with their security.

With this technology, and with

the assistance of specially trained

personnel, airports now have access

to comprehensive biometric and

passport screening technology in

an integrated system, and real-time

access to Interpol and similar international

security-related databases.

Securiport provides proprietary

security solutions to governments

in need. With state-of-the-art airport

security, Securiport stems the

flow of criminals and terrorists

across borders by maximizing the

usage of the most sophisticated

predictive analytics tools, and big

data, to keep airport passengers,

and the world, safe.

About Securiport

Securiport LLC is a global leader

in the design and implementation

of civil aviation security, biometric

screening, immigration control,

and threat assessment systems.

Headquartered in Washington, DC,

USA, Securiport partners with governments

from around the world.

Securiport’s Civil Aviation and Immigration

Security Services, a comprehensive

security product that

performs secure biometric recognition

of travelers at immigration

posts, provides proprietary systems

for the identification of potential

security risks, criminal activity, and

disease prevention. Learn more at

http://www.securiport.com.

G4S Secure Integration achieves

OHSAS 18001:2007 Certification

Frank Cirone, G4S Secure

Integration President

Omaha, NE, May 1, 2017 – G4S Secure

Integration’s corporate office in

Omaha, NE has recently achieved

registration to the Occupational

Health and Safety Assessment Series

(OHSAS) 18001:2007 specification.

OHSAS is an internationally recognized

standard for safety management

systems; focusing

on the management of

risk, legal compliance

and continuous improvement.

G4S Secure Integration,

part of G4S, is a

leading systems integrator

that brings innovative,

flexible, and

cost-efficient thinking

to the design, construction,

and maintenance of standalone

or integrated communication

networks and electronic security

systems. Headquartered in Omaha,

NE with sales and support nationwide,

G4S Secure Integration provides

customers with industry leading

security solutions.

Frank Cirone, G4S Secure Integration

President, states, “by receiving

this certification, it not only

validates our commitment to a positive

safety culture to employees, but

to customers and business partners

as well.”

G4S Secure Integration partnered

with Lloyd’s Register Quality

Assurance (LRAQ) USA for the

auditing and registration to the

OHSAS 18001 standard. Lloyd’s

Register Quality Assurance

(LRQA) is the

world’s leading provider

of independent

assessment services

including certification,

validation, verification

and training

across a broad spectrum

of standards and

schemes, with recognition

from over 50

accreditation bodies around the

world.

About G4S

4 5

G4S is the leading global, integrated

security company, specializing in

the provision of security services

and solutions to customers. Our

mission is to create material, sustainable

value for our customers

and shareholders by being the supply

partner of choice in all our markets.

G4S is quoted on the London

Stock Exchange and has a secondary

stock exchange listing in Copenhagen.

G4S is active in around

100 countries and has 600,000 employees.

For more information on

G4S, visit www.g4s.us.

FREE SUBSCRIPTION

SIGN-UP

Monthly Digital Edition

Airport/Seaport Newsletter

Daily Insider Newsletter

Cybersecurity Newsletter

CLICK HERE


For proactive security, build an aquarium

Major General (res.)

Aharon Zeevi Farkash,

Founder and President

of FST Biometrics

This year there has been

a significant increase in

global terror. From Nice

to Baghdad, Istanbul to

Belgium and Tel Aviv,

security agencies around the world

are fully engaged in trying to prevent

the next attack. In my extensive

career in the Israel Defense Forces,

and in particular within the intelligence

community, I was constantly

trying to create a “formula”, to look

for that magic source of information

that could help us prevent future attacks.

And in that process, I learned two

important truths:

1. Such a solution does not exist.

There is no one source of information

that can help security forces

prevent the next terror event.

2. The next best thing is to build

yourself an aquarium.

Yes, that’s right. An aquarium. But,

this aquarium isn’t filled with fish

and a sunken plastic pirate ship.

This is an aquarium of

information, an ecosystem

of sensors that combine

to provide a clearer

picture of the situations

that security agencies

must assess to prevent

attacks from happening.

This “intelligence

aquarium” was filled

with an array of sensors: signal intelligence,

cyber intelligence, visual

intelligence - not only from satellites-

surveillance balloons, drones,

special forces, human intelligence,

interrogations and others. Any of

these sources alone would do us

no good; combined, they provided

a clear picture of the security landscape.

We fused all of this information,

almost in real-time, into actionable

intelligence for end-users (special

forces, air force, any actor who

could utilize the intelligence). This

led me to understand the power of

fusion. This real-time data fusion allows

agencies to approach security

with a preventative philosophy. We

don’t want to look back at events after

they happen, or learn lessons after

another tragedy; we want to stop

it before it happens.

The power of fusion is the key to

6

effective preventative security.

How Global Mega Trends Lead to

the Demand for Convenient Security

There are two mega trends in the

world right now: 1) Urbanization

and the rise of the megacities, which

inevitably leads to rising crime rates,

and 2) the need to prevent terrorism,

which has become greater in

the past year. With these two trends,

increased security has become a necessity.

But, security must also fit

the pace of life. We do not want to

live in a police state.

Biometric technology provides an

answer to this. If we can quickly and

securely identify individuals before

they enter a building – or prevent

them from doing so – many security

situations can be prevented before

they take place. However, the lessons

I learned from my intelligence

experience apply to biometrics as

well. Any sensor on its own – facial

recognition, fingerprints, iris recognition,

voice recognition – cannot

provide the accuracy, speed, or the

aesthetics needed for strong security

that is also convenient for the

public.

Developing an effective biometric

technology for secure access

More on page 31

ABOVE.

BEYOND.

Identify high risk individuals and activity

with smarter passenger profiling.

SITA’s iBorders® RiskManagement

takes all available information

and transforms it into actionable

intelligence, both in real time

and as part of building a case

for investigation.

Download our white paper to discover

how SITA iBorders can help build

intelligence into border operations.

DISCOVER MORE


RVSS achieves “Full Operating Capability”

designation on southern U.S. Border

CBP deployment features PureActiv Geospatial C2 and Video Analytics.

PHOENIX, AZ – The recent designation

by the U.S Department of

Homeland Security’s Customs and

Border Protection (CBP) granted

“Full Operating Capability” of

General Dynamics’ Remote Video

Surveillance Systems (RVSS) deployed

for protection across the

southern border of the United

States. An important component

of the RVSS system is PureTech

Systems’ Geospatial Video Management

System for Command

and Control and the PureActiv®

patented video analytics used for

real-time automated long range

detection, classification, and tracking

in support of CBP’s mission

along the U.S southern border.

“Achieving this approval is a

great accomplishment and we’re

honored to be an instrumental part

of the solution that is helping the

great men and women of Customs

and Border Protection protect

our nation’s borders,” commented

Larry Bowe, president and CEO of

PureTech Systems. “Reaching this

milestone was truly a team effort

with all those involved.”

General Dynamics, was awarded

the contract to upgrade the RVSS

capability along the southern U.S.

border in July of 2013 with field

deployments, including the Pure-

Activ system, beginning in 2015.

The RVSS system consists of a series

of elevated towers and structures

equipped with advanced

electro-optical and infrared sensors

enabled with video intelligence

and advanced sensor control

developed by PureTech Systems to

provide persistent ground surveillance

to border patrol agents.

In their release, General Dynamics

Information Technology’s IT

Services and Solutions sector vice

president and general manager,

Dan Busby, quoted that, “Reaching

a full operating capability designation

is a testament to both the

effectiveness of the RVSS solution

and our continued partnership

with CBP. The RVSS upgrade will

continue to provide CBP and U.S.

law enforcement personnel with

the advanced technology necessary

to secure our nation’s borders

and increase agent safety through

enhanced situational awareness.”

Also quoted in the release was

Ronald D. Vitiello, Chief of CBP’s

U.S. Border Patrol, who said “The

deployment of the Remote Video

Surveillance System is important

to the safety of our agents and to

our mission. Successful partnerships

like the one we have with the

General Dynamics team, are necessary

to efficiently and effectively

secure the border.”

The recent “Full Operating Capability”

milestone was the culmination

of two years of deployment

and field testing at key locations

across the southwest, including the

Arizona sites of Nogales, Douglas,

Naco and Ajo, as well as, the McAl-

8 9

len and Laredo locations in Texas.

The RVSS Upgrade program has

a potential 10-year performance

period, during which the General

Dynamics OneSource team, will

manage the operation and maintenance

at all sites.

About PureTech Systems Inc.

PureTech Systems Inc. is a manufacturer

of wide-area perimeter

surveillance software solutions including

internally developed outdoor

video analytics, multi-sensor

integration and a map-based (real

object size) command and control.

PureTech Systems serves fortune

1000 firms, petro-chemical, water

and electric utilities, seaports, airports

and federal, state and local

governments. PureTech Systems,

headquartered in Phoenix, Arizona,

delivers and supports installations

throughout the world. To

find out more about PureTech Systems

Inc. visit our website at www.

puretechsystems.com, follow us at

@PureTechSystems or contact Eric

Olson at 602-424-9842 or Eric.Olson@PureTechSystems.com.


Pelco showcases latest technology innovations and

strategic application solutions to Securika/MIPS 2017

FROM OUT Of THE BOX

to STATE OF THE ART.

ID CARD PRINTING INNOVATION.

HID Global is leading the industry with the most robust portfolio of secure ID issuance

solutions in the world. Our FARGO® line of printers and encoders provide governments,

financial institutions and businesses of all sizes fast, efficient and reliable solutions that

are as secure as they are affordable.

You’ll call it innovation on demand. We call it, “your security connected.”

YOUR SECURITY. CONNECTED | Visit us at hidglobal.com/printers

© 2016 HID Global Corporation/ASSA ABLOY AB. All rights reserved. HID, HID Global, the HID Blue Brick logo, and the Chain Design are trademarks

or registered trademarks of HID Global or its licensor(s)/supplier(s) in the US and other countries and may not be used without permission.

MOSCOW, RUSSIA (March 7,

2017) – Pelco by Schneider Electric,

a global leader in surveillance and

security products and technologies,

will feature several of the company’s

advanced security solutions at

Securika/MIPS 2017, taking place

at the Expocenter Fairgrounds in

Moscow on March 21-14, 2017.

Highlighted innovations on display

include the powerful open

platform VideoXpert Video Management

Software (VMS) designed

to control with confidence, a sneak

peek of ExSite Enhanced Explosion

Proof IP Cameras engineered

to survive in the most challenging

environments, and Sarix Enhanced

IP Cameras that deliver the highest

levels of low light performance

when nothing but the best will do.

“Security operations and procedures

have become a core priority

for businesses and organizations

across every vertical market around

the world as security professionals

seek the most efficient and effective

means to protect people, property

and assets. This is especially pertinent

for high-traffic public venues

such as casinos and arenas,” said

Diane Feliciano, VP, Global Marketing,

Pelco by Schneider Electric. “At

MIPS, attendees will

witness firsthand how

Pelco video surveillance

and security solutions

deliver higher levels of

situational awareness, protection

and even prevention

when and where customers

need it most.”

In addition to highlighting

system solutions with specific

benefits for the casino and stadium

markets, Pelco’s Securika/MIPS

2017 display features strategic solutions

for the oil and gas, city surveillance

and hospitality vertical

markets, and includes the following

highlighted products:

11

ExSite Enhanced

VideoXpert Video Management

Software (VMS) dramatically improves

the control of integrated surveillance

and security solutions on

a single platform, providing users

with greater situational awareness

so they can make more timely decisions

and execute decisive action.

VideoXpert’s open architecture enables

third-party applications to

be cost-effectively integrated for

highly specialized applications in

the hospitality, gaming and municipal

surveillance markets. Recent

enhancements

to VideoXpert include:

an enhanced

user interface for

improved centralized

system management;

incident management to

easily and quickly correlate

related video files; improved

event management

to customize event alerts with realtime

visual notification; immersive

viewing of 180°, 270° and 360° panoramic

images from Pelco Optera

Multi-Sensor Panoramic Cameras;

and much more.

Sarix Enhanced IP Cameras utilize

Pelco’s exclusive SureVision 3.0

low-light technology making Sarix

imaging solutions ideal for hospitality

and city surveillance, delivering

quality images in as little as 0.05 lux

with an incredible Wide Dynamic

Range (WDR) of 130dB. Sarix Enhanced

cameras are ONVIF Q compliant

and are available in a wide

selection of form factors for ease of

integration into the hospitality and

municipal surveillance markets, as

well as many other mainstream applications.

More on page 17


OnSSI integration with Jemez Technology improves

perimeter surveillance effectiveness

PEARL RIVER, NY (April 12,

2017) – OnSSI’s partnering initiative

with Jemez Technology makes

perimeter video surveillance solutions

employing AXIS cameras even

more effective in protecting critical

assets and infrastructure. The Ocularis

5 VMS platform’s open architecture

enables integration with the

Jemez Eagle-i Edge® solution and

AXIS cameras to

deliver a complete

end-to-end

solution.

“The integration

of Ocularis with Jemez software

is a best-in-class fit for security management

tasked with securing widearea,

long-range environments,”

said Mulli Diamant, VP of International

Business Development,

OnSSI. “OnSSI’s ability to embrace

technology innovations from other

leading manufacturers is an important

factor in our continued ability

to deliver cutting-edge VMS solutions

for professional security applications

and beyond.”

Jemez Technology, established

by former engineers and scientists

from the Los Alamos National Laboratory

(LANL), provides advanced

area and perimeter surveillance solutions

for corporate and homeland

security, with emphasis on critical

asset and infrastructure protection.

The company’s Eagle-i Edge

on-camera analytics platform, specifically

designed and optimized forAXIS

camera networks, integrates

with OnSSI solutions to significantly

improve threat detection capability

and lower operational costs.

“The integration

of our Eaglei

Edge platform

with Ocularis

optimizes

system efficiency

and performance,”

said Ted Turner, Director

of Global Sales, Jemez Technology.

“Now, end users have improved

management of high risk surveillance

data with capabilities that enhance

agility and control.”

Ocularis 5 offers a unique combination

of enhanced features, recording

versatility, robust data security,

and overall stability that transcend

conventional VMS solutions. Recent

additions to the Ocularis 5

platform include: an auto-updating

feature like those available on most

smartphones and tablets; Smart

Camera Driver technology that

provides out-of-the-box support

for newly introduced cameras from

industry-leading camera manufacturers;

camera mapping via GPS

on Ocularis Maps; and a new Mobile

app that enables the streaming

of live video from Android smartphones

and devices to and from the

Ocularis 5 VMS.

Ocularis is offered in three models:

Professional, designed for organizations

operating multiple locations

with small to

mid-sized camera

counts; Enterprise, built

for a wide range of mid

to large IT-centric organizations;

and Ultimate, created for

large organizations with extended

command and control needs and

recording server failover.

For more information on OnSSI,

call 845-732-7900, e-mail info@onssi.com

or visit www.onssi.com.

About OnSSI

On-Net Surveillance Systems, Inc.

(OnSSI) was founded in 2002 with

the goal of developing comprehensive

and intelligent IP video surveil-

More on page 42

UTEP professor, Immigration Council question

need for additional ICE and Border Patrol agents

By Steve Bittenbender

Editor, Government Security News

On the same day a federal judge in

California put a temporary halt on

President Trump’s plan to withhold

federal funds from sanctuary cities,

a panel of immigration experts took

aim at another aspect of Trump’s immigration

and border control plan.

The American Immigration

Council held a teleconference Tuesday

afternoon to discuss the Trump

Administration’s plans to bolster

the ranks of both Immigrations and

Customs Enforcement and Border

Patrol. The call came on the heels

of a paper released by the Council

from a University of Texas-El Paso

professor who questioned the need

for those additional agents.

The most noted aspects of Trump’s

immigration plan have been the

proposed border wall between the

United States and Mexico, the focus

on limiting immigration from

predominately Muslim nations and

the emphasis on deporting undocumented

aliens. However, the panel

said Trump’s plan for more agents

deserves greater scrutiny, especially

since the number of undocumented

aliens have dropped.

A Pew Research Center report

– also released on Tuesday – indicated

there were about 11.3 million

such individuals living in the United

States last year. That’s nearly a million

fewer than were here 10 years

ago.

In his paper and in the teleconference,

Josiah McC. Heyman also

expressed concerns about the risk

of corruption within CBP

and ICE as it expands

its ranks. According to a

New York Times report,

CBP officers and Customs

agents have taken more

than $11 million in bribes

from drug cartels and other

criminals.

“These two branches of

the Department of Homeland Security

(DHS) are poorly prepared

to recruit, train, and supervise new

personnel,” said Heyman, a professor

of anthropology at UTEP and

the director of the Center for Interamerican

and Border Studies. “While

the Border Patrol experienced some

improvements in the aftermath of

its last expansion, most recommendations

for reform remain unimplemented.”

In a memo to DHS officials two

12 13

Josiah McC. Heyman

months ago, Homeland Security

Secretary John Kelly said CBP did

not have enough officers “to effectively

detect, track, and apprehend

all aliens illegally entering the United

States.” While he called for the

hiring to begin immediately, Kelly

called on CBP to maintain consistency

in training and standards

when bringing the new agents on

board.

In fiscal year 2016, CBP

had 19,828 agents and

ICE had more than 20,000

employees. Trump’s order

calls for an additional

5,000 CBP agents and

10,000 more ICE staffers.

Joshua Breisblatt, an

analyst for the AIC, noted

CBP, before Trump’s order, already

authorized to have more than

21,300 agents on staff. He added that

Congress is currently considering

Trump’s request for $300 million in

funding to hire CBP and ICE agents

this fiscal year, with more money requested

for 2018.

“These requests have come despite

lower apprehension numbers at the

border over the past few months,”

Breisblatt said.

More on page 42


IRIS enters into global collaboration with TruTag in

alliance that will create global market for the digitization

of mission-critical smartcards and secure labels

KUALA LUMPUR, 2 May 2017 –

IRIS Corporation Bhd (IRIS), a

world leader in Trusted Identification

(ID) will be partnering

with leading U.S. authentication

and digital security company,

TruTag Technologies,

Inc. to look into the potential

for smartcard and secure label applications

globally.

TruTag has developed the world’s

most advanced Optical Memory

(iOM) device: a digital “cookie”

that enables the digitization of the

analogue world. TruTag’s iOM devices

are dust-sized particles that

can be embedded into the very fabric

of a product without the need

for packaging or labels. They are

edible and covert, and can digitize a

plethora of items for product intelligence,

for effectively counteracting

the US$1 trillion global problem of

counterfeit and diverted products.

IRIS Acting CEO Mr. Choong

Choo Hock said the two parties

would look at possible ways to work

together to co-develop and offer a

portfolio of smartcard and secure

label products to customers in both

the government and private sectors

tant element of the corporate restructuring

currently in process in

IRIS, as it puts IRIS a few generations

ahead of its peers in the secure

and trusted ID business,” said Tan

Sri Sharir.

“The combined strengths and

product portfolio of both companies

will enable us to target practically

every aspect of product authentication,

including enhancing the safety

and traceability of food an medicine,

which is an

issue of global

importance.”

said Dr. Hank

Wuh, Founder

and Chairman of

TruTag Technologies.

This collaboration

with TruTag comes just 10 days

after IRIS announced a partnership

with Norway’s Zwipe, a company

that offers biometric contactless

payment cards and fingerprint authentication

technology.

tems integrator for eID, ePassport,

border control, multiple credential

identity management ecosystems,

and payment systems for financial

and transportation industries where

authenticity, improved security,

speed, accuracy and effectiveness

are of paramount importance. IRIS’

innovative solutions, applications

and devices have been deployed in

over 30 countries across the globe,

reaching far into Asia, the Middle

East and Africa.

Learn more at

www.iris.com.my.

around the world.

“As the pioneer of ePassport and

multi-application eID technology,

IRIS has been in trusted ID for

over 20 years, with clients in over

30 countries, including the U.S.,

Canada, Italy, Norway and India.

TruTag, on the other hand, is a leading

U.S. authentication company,

and the only company in the world

with covert and ingestible (edible)

optical memory microtags that can

be applied to both consumables

(pharmaceuticals, food and beverage)

and secure documents. We are

looking to provide multiple layers of

security to secure labels and documents,

including, but not limited to

biometric smartcards and missioncritical

labels such as airline baggage

labels,” said Mr. Choong.

“We are delighted to team up

with IRIS Corporation as a pioneer

and world leader in trusted

Identification. The collaborative

venture will look to

providing secure documents

and labels for various applications

across different countries

and industries, and we look forward

About TruTag

to working together with IRIS to

Technologies,

provide leading-edge authentication

Inc.

and data intelligence solutions

TruTag Tech-

to our customers with high levels

nologies, Inc. is

of security needs,” said Dr. Michael

a leader in product authentication,

Bartholomeusz, CEO of TruTag

brand security and data intelligence

Technologies.

solutions. The TruTag® platform

Federal Land Development Authority

addresses the US$1 trillion global

(“FELDA”), which holds a

challenge of counterfeit, diverted

21.33% stake in IRIS through Felda

and adulterated products that impact

the pharmaceutical, life scienc-

Investment Corp. Sdn. Bhd. (“FIC”),

is positive on the partnership between

About IRIS Corporation Berhad

es, food, electronics, industrial, and

the two companies. Felda Founded in 1994, IRIS Corpora-

consumer goods industries. TruTag

chariman Tan Sri Sharir Samad said tion Berhad (ACE Market: IRIS) is iOMTM devices are edible, inert,

the proposal will be discussed by a MSC-status technology innovator covert and can seamlessly integrate

the boards of both FELDA and FIC and leading provider of solutions information into the very fabric of a

to map out the potential markets and advancements for trusted identification

product, independent of packaging

and sectors to target.

and payment. Since pio-

and labels. TruTag can extend the In-

“The expansion of IRIS’ product neering the world’s first electronic ternet of Things (IoT) to a plethora

portfolio to include new, industrydefining

passport in 1998, IRIS has set itself of new, non-web-connected objects

technologies is an impor- apart as a dedicated end-to-end sys-

and products, and are read using

14 15

handheld imagers programmed to

authenticate a product’s provenance

information. TruTag Technologies,

Inc. has been recognized by the Edison

Awards, Fast Company, R&D

100, and was selected a Technology

Pioneer by the World Economic Forum

as one of the most influential

technology companies in the world.

Learn more at www.TruTags.com.

©2016 All rights reserved. TRUTAG and TRUTAGS are registered

trademarks and iOM is a trademark of TruTag Technologies,

Inc.

FREE SUBSCRIPTION

SIGN-UP

Monthly Digital Edition

Airport/Seaport Newsletter

Daily Insider Newsletter

Cybersecurity Newsletter

CLICK HERE


How to improve refugee vetting now – a 9/11

Commission border counsel perspective

Janice Kephart, former

9/11 Commission

border counsel

and partner, IdSP

WASHINGTON, April 24, 2017 /

PRNewswire-USNewswire/ -- Janice

Kephart, former 9/11 Commission

border counsel and partner

with Identity Strategy Partners, LLP

(IdSP), today issues the following

statement:

“With or without President

Trump’s March 6, 2017 Executive

Order: Protecting the Nation from

Foreign Terrorist Entry, refugee vetting

can be instilled with greater

confidence, enabling the reactivation

of legitimate refugee resettlement.

(Right now, all refugee applications

are suspended by until at

least July 2017). Improvements in

current refugee vetting will require

a language change to current law,

identity enrollment taking place

earlier in the process, and the implementation

of a long-ignored 9/11

Commission recommendation. But

improvement is doable, and now.

So why does the refugee population

present a threat to national

security? The reason is twofold: (1)

intelligence for years has revealed

a terrorist travel tactic of infiltrating

refugee populations for eventual

resettlement into Europe or the

United States, and (2) by legal definition

refugees are displaced persons

with unknown identity. Even

for those with an ID, establishing

its authenticity or trusting its origin

is difficult since by policy, no information

is shared with the home

country, so there is no country of

origin against which to run checks

as in a regular visa referral. Since

the refugee demographic tends to

be anonymous, it is more difficult to

ensure a person is who they say they

are, and then affiliate that identity

with intelligence and other potentially

significant financial or other

data. In short, limited identity and

intelligence information

diminish confidence in

recommendations about

which refugees to accept

for U.S. resettlement.

The program responsible

for vetting refugees

seeking U.S. resettlement

is the United States Refugee

Admissions Program

(USRAP). It is run jointly

by the State Department,

who receives referrals

from the United Nations

and conducts initial processing including

a biographic name check,

and the U.S. Citizenship and Immigration

Service (USCIS), who conducts

more in-depth interviews and

collects biometrics from applicants.

The program has been fine-tuned

over many years. Yet the program

requires vital improvements, and

the recommendations below should

be considered minimum baseline

requirements.

Congress must change law to

enable U.S. access to refugee

biometric data collected by the

United Nations.

Since 2013, the United Nations has

a sophisticated biometric identity

management system

that collects 10 fingerprints,

two irises, and

face of every refugee,

sometimes two to four

years before a U.S. referral

for initial biographic

screening. Right now,

due to an archaic law

that prevents sharing of

biometric information

collected by a non-U.S.

citizen, the U.S. has no

access to this key identity

information. The law needs to

change to permit that biometric

data be available for vetting against

federal databases from designated

international partners such as the

United Nations.

Refugees must be biometrically

enrolled the first time they enter the

U.S. system.

State does not collect any biometrics

from refugees, and thus only

has the word of the refugee as to

who they are, making the required

biographic checks a potential goose

chase. While USCIS does collect

rolled prints and a face photo at the

time of the interview, current vetting

against some U.S. biometric

holdings do not return results for

up to 24 hours, after the interview

is already over. If State collected

the biometrics as part of their prescreening

interviews conducted

by their Resettlement Service staff,

USCIS interviews would be better

informed, and so would the final assessment.

Implement the 9/11 Commission

recommendation for a

person-centric immigration system.

State and USCIS use different case

filing assignments for refugees.

Policy does not require that State

initiate a file number that USCIS

recognizes or uses in the processing

of the ultimate immigration benefit

the refugee seeks. Thus, each applicant

has two different file numbers,

creating disconnect and potential

for confusion and duplication. Yet

Pelco showcases latest

technology innovations and

strategic application solutions

Continued from page 11

ExSite Enhanced HD Cameras

are explosion proof and virtually

indestructible with performance

features that include: a robotically

welded housing for use in extreme

conditions; a unique patent-pending

pan-tilt drive system devoid of

belts, gears or pulleys; operation in

the problem could be eliminated

entirely if case numbers were eradicated

and the 9/11 Commission

recommendation for a biometricbased

identity number for the entire

immigration system were put in its

place. When biometrics become the

baseline for any immigration encounter,

identity is protected and

the automatic creation of a timeline

of immigration encounters reduces

fraud and increases efficiencies for

legal immigration. Implementation

of this long ignored 9/11 Commission

recommendation could drastically

improve the U.S. immigration

system, and with it, refugee vetting

as it stands today.”

Contact: Janice Kephar , (202) 750-

4858, SOURCE Identity Strategy

Partners (IdSP)

16 17

extreme temperatures; 30X optical

zoom with image stabilization; IR

illumination; 130dB WDR; 0.03 lux

ultra-low light performance; integrated

Ethernet, fiber, Ethernet over

Coax (EoC) and Unshielded Twisted

Pair (UTP) transmission, and

more. ExSite is an exceptional imaging

solution for oil and gas facilities,

chemical plants, manufacturing and

marine facilities, and for numerous

other demanding environments.

For more information or to schedule

a demo, contact evgeni.tochev@

schneider-electric.com or visit www.

pelco.com.

About Pelco by Schneider Electric

Pelco by Schneider Electric is a

global leader in professional video

surveillance and security system

products and technologies with

a local presence in 136 countries

and over 4000 integration partners

worldwide. Our personal engagement

with customers, resellers and

technology partners drives the development

and deployment of surveillance

and security solutions

with meaningful innovation. It’s the

foundation that Pelco has built its

brand upon for over 25 years.


Law Enforcement/Public Safety

San Francisco Department of Emergency Management

selects NICE for 9-1-1 center upgrade

HOBOKEN, NJ – April 18, 2017 –

NICE (Nasdaq:NICE) announced

today that the San Francisco Department

of Emergency Management

(SFDEM), a NICE customer

since 2006, has once again selected

NICE solutions for its 9-1-1 center

upgrade. The SFDEM 9-1-1 center

will be taking advantage

of the full range of

NICE Inform’s futureready

applications and

integrations to improve

productivity and effectiveness

across its entire

operation, and ensure the

highest levels of service

for residents of the City

and County of San Francisco,

and large numbers

of tourists who visit the

area as well.

“We’ve been working with NICE

for about 10 years now and it has

been a really good relationship,”

said Mitch Sutton, CIO, San Francisco

Department of Emergency

Management. “We feel that NICE

really ‘gets’ public safety and our requirements.

In addition to meeting

our needs today, the NICE Inform

suite of solutions is well suited to

our future requirements.”

The SFDEM’s 9-1-1 call takers and

dispatchers are a critical lifeline between

the public and first responders.

A staggering 3,474 calls come

into the 9-1-1 center each day and

that number is steadily growing.

The SFDEM is aggressively recruiting

telecommunicators to keep pace

with the workload, while also looking

for other ways to bolster telcommunicator

efficiency and effectiveness.

The SFDEM’s 9-1-1 call takers and

dispatchers are a critical lifeline between

the public and first responders.

With 3,474 calls to the 9-1-1

center daily, the SFDEM 9-1-1 center

will use the full range of NICE

Inform’s future-ready applications

and integrations to improve productivity

and effectiveness across

its entire operation and ensure the

highest levels of service (photo

credit ©Michael Mustacchi)

Boosting Efficiency

and Quality Assurance

“Our telecommunicators

perform difficult

and life-saving work

every day,” said Sutton.

“Here at the SF-

DEM there has been

a big push to process

calls more efficiently

to get first responders

on scene faster. We’re

also placing a heightened emphasis

on quality assurance to ensure our

telecommunicators are handling

calls efficiently and according to

protocols. NICE Inform is going to

help us streamline our quality assurance

process and meet our goals.”

With NICE Inform Evaluator, the

SFDEM will be able to expand its

quality assurance program to sys-

tematically review all call types and

identify areas where call processing

can be improved. NICE Inform

Evaluator combines automated,

rules-based QA call selection with

a form builder for creating customized

evaluation forms for call review

and scoring. Results of evaluations

are automatically tabulated and can

be used to pinpoint coaching and

training gaps, while also improving

feedback and employee retention.

With the addition of NICE screen

recording, supervisors will be able

to hear what was said and at the

same time see what was happening

on the telecommunicator’s screen as

calls were processed.

The SFDEM also expects to achieve

efficiency gains in its records custodians

unit. This unit processes close

to 25,000 requests for 9-1-1 records

annually for District Attorneys and

other requestors. NICE Inform will

streamline the fulfillment of these

requests by making it easier to find,

retrieve and share audio recordings.

Introducing Next Generation

Technologies

Like most 9-1-1 centers, the SF-

DEM is moving to next generation

technologies. NICE’s direct, certified

integration with West Corporation’s

VIPER® Voice over IP solution

means that the SFDEM can record

its IP emergency communications

with confidence. NICE Inform is

also future-ready, so when the SF-

DEM is ready to start accepting SMS

9-1-1 texts, it will be able to leverage

its investment in NICE Inform to

record and manage voice, SMS 9-1-

1 texts, and additional future multimedia

in a unified system.

“NICE values our long-standing

relationship with the San Francisco

Department of Emergency Management,

and we’re honored that

they continue to entrust NICE with

their public safety needs,” said Chris

Wooten, Executive Vice President,

NICE. “NICE is committed to helping

the SFDEM improve its efficiency

and effectiveness to provide

excellent emergency response to the

citizens it serves, while also helping

the SFDEM prepare for the future.”

About the San Francisco Department

of Emergency Management

The San Francisco Department of

Emergency Management (DEM)

leads the City in planning, preparedness,

communication, response,

and recovery for daily emergencies,

large scale citywide events, and major

disasters. DEM is the vital link

in emergency communication between

the public and first responders,

and provides key coordination

and leadership to City departments,

18 19

stakeholders, residents, and visitors.

The San Francisco Division of

Emergency Communications’ 9-1-

1 center serves a city and county of

860,000 people and fields calls for

police, fire and medical emergencies,

as well as calls for nonemergency

services. The center receives

more than 1.2 million emergency

and non-emergency calls per year.

www.sfdem.org.

About NICE

NICE (Nasdaq:NICE) is the worldwide

leading provider of both

cloud and on-premises enterprise

software solutions that empower

organizations to make smarter decisions

based on advanced analytics

of structured and unstructured

data. NICE helps organizations of

all sizes deliver better customer service,

ensure compliance, combat

fraud and safeguard citizens. Over

25,000 organizations in more than

150 countries, including over 85 of

the Fortune 100 companies, are using

NICE solutions. www.nice.com.


Law Enforcement/Public Safety

Chicago considers ordinance requiring

panic buttons for hotel staff

BROOKFIELD, WI April 28, 2017

RF Technologies (RFT) HELP

ALERT® Panic Alert System for

Hospitality was recently featured in

a news story (WLS-TV, Chicago)

highlighting the need to protect

hospitality workers from violence

and assault in the workplace. The

story outlined an ordinance introduced

on April 19, now under

consideration by the Chicago City

Council, which would require that

certain staff in Chicago hotels be

equipped with panic alert devices to

protect them while they work. RFT’s

Marina Willis, president, Pinpoint

Technologies, was interviewed for

the story.

According to a Chicago Tribune

report, the bill, sponsored by Alderman

Michele Harris, 8th Ward, and

backed by labor unions including

Unite Here Local 1, would require

that employees working alone in

Chicago hotels be issued panic buttons

(such as RFT’s HELP ALERT

wireless pendant) that would enable

them to warn security quickly

if they encounter potentially dangerous

situations in guests’ rooms.

The ordinance would also require

that hotels post sexual harassment

and assault policies and promise no

retaliation against workers who report

encountering such treatment.

Hotels that do not provide the panic

alert buttons and adhere to other

parts of the measure could be fined

up to $500 per incident.

“Has this prevented things from

escalating? Absolutely,” says Willis,

of RF Technologies. “We’ve had

situations where we have

had housekeepers go into

a room, start cleaning, and

someone comes out of the

bathroom not wearing any

clothes and blocks them

from leaving the room.” Hotel

workers are already wearing

these devices in New

York and Washington, D.C. Similar

mandates and/or ordinances will

soon be adopted in cities including

Seattle, San Francisco, and areas

in Southern California, where they

are being requested with increased

frequency by staff members and local

unions representing hospitality

workers.

RFT is pleased to be a part of such

an important initiative focused on

keeping hospitality workers safe. We

are ready to put to work our 30 years

of experience keeping people safe

in hospitals, schools, colleges and

universities, senior living facilities,

and hotels, with our HELP ALERT

Panic Alert System.

For additional information on this

important issue, follow these news

links:

•http://www.mychinews.com/

news/chicago-hotel-workersmay-soon-have-a-pani...

•http://www.chicagotribune.

com/news/local/politics/ctrahm-emanuel-chicag...

•http://chicago.suntimes.

com/news/hotels-urged-tocombat-sexual-harassmen...

Also, a July 2016 report issued by

Unite Here Local 1:

•http://abc7chicago.com/

news/panic-button-ordinanceproposed-to-protect-h...

•https://www.handsoffpantson.org/wp-content/uploads/

HandsOffReportWeb.pdf

About RF Technologies

RF Technologies provides safety solutions

at over 10,000 senior living,

healthcare, education and hospitality

facilities nationwide. Life safety

solutions such as CODE ALERT®

Wander Management, QUICK RE-

SPONSE® Wireless Nurse Call, SAFE

PLACE® Infant Security, and HELP

ALERT® reduce risk for residents,

staff, and the facility; innovations

such as RFT CARES® smartphone

application improve caregiver coordination

and efficiency. Backed

by 30 years of experience in senior

living, RF Technologies’ solutions

are UL-certified to meet today’s life

safety standards. For information

visit: http://www.rft.com

PRO-VISION releases 1080p HD video

system for law enforcement vehicles

BYRON CENTER, MI April 26,

2017 PRO-VISION® Video Systems,

the leader in mobile video technology

and software for law enforcement,

announced today the release

of its new 1080p High-Definition

In-Car Video System for police vehicles.

The PRO-VISION®

HD In-Car Video

System is the only

1080p True HD system

capable of providing

360 degree

vehicle coverage, capturing highfidelity

audio and video that’s more

than twice the quality of 720p HD

cameras on up to eight cameras.

An interior camera provides 180

degree door-to-door HD coverage

of the rear seat area in any lighting

condition, while a compact forwardfacing

camera records the front of

the vehicle without obstructing the

view of the road like bulky cameras

featured in other systems.

Combining industry-leading features

with a rugged Solid-State design,

a 5-Year Warranty and a price

over 50 percent less than other

brands, the PRO-VISION® HD In-

Car Video System is the most Reli-

20 21

able, Simple and Affordable in-car

video system available.

About PRO-VISION ®

Since 2003, PRO-VISION® has been

engineering, manufacturing and

installing Reliable, Simple, Affordable

mobile video

recording systems

and software solutions

for the school

bus, transit, law enforcement

and commercial

markets.

Specializing in back-up, dash-cam,

in-car and body-worn video; PRO-

VISION® products increase safety

and reduce liability for thousands of

organizations in nearly 50 countries

around the globe. Recently recognized

as a Deloitte Technology Fast

500 company and by Inc. magazine

as one of the fastest growing private

companies in America for the sixth

consecutive year, PRO-VISION®

takes pride in offering the highest

quality products backed by the absolute

best customer and technical

support. For more information, visit

http://www.provisionusa.com.


Law Enforcement/Public Safety

Taming the rising tide of digital evidence

By Linda Haelsen, NICE

Crime solving in the 21st century

hinges on digital evidence. Paper silos

have been replaced by digital silos

and these silos are growing faster

than ever, creating a rising tide of

digital evidence that’s increasingly

challenging to collect, analyze and

share.

For police departments, this is

creating a big problem. There’s so

much data, coming from so many

silos that it’s becoming increasingly

difficult for investigators to ingest it,

correlate it, and absorb the relevant

facts of a case.

Put another way, the growing variety

and volume of digital evidence

has outpaced the tools investigators

have to collect, analyze and share it.

While CCTV video has certainly

taken off, the spectrum of digital

evidence is far wider. Think of all

of the abundantly available sources

of digital evidence that address

many of the questions investigators

once labored to answer. There’s

in-car video, interview recordings,

crowd-sourced information (like

citizen tips, photos, and videos),

911 recordings, and information

from other systems, like Automatic

License Plate Recognition

(ALPR), Computer Aided

Dispatch (CAD), and Records

Management Systems

(RMS). There are also

body-worn cameras, which

are being adopted by police

departments in growing

numbers.

With digital evidence

growing exponentially and

coming from more places,

it’s clear that police departments

need better tools so they can

leverage all of the available digital

evidence to improve case solvability

and reduce crime rates.

Collecting evidence:

the conundrum

Consider how investigators gather

evidence and build cases today.

They often have to log on to a dozen

or more systems to collect evidence

and then manually search for connections

in cases, which wastes time

and increases the likelihood that

crucial evidence will be missed.

Even though CCTV is now commonplace

in investigations, collecting

it is still incredibly time

consuming. It’s not uncommon for

a detective to physically drive to

a crime scene to canvas for video

cameras. The cameras can be hard to

spot, especially in high rises where

they’re not always visible. When

video is located, the investigator

then needs to download a copy and

bring it back to the station.

Despite the fact that citizens are

readily willing to share it, departments

also lack scalable solutions

for crowdsourcing evidence. According

to a recent Nielsen survey

recently conducted by NICE, 95

percent of Americans polled said

they’d be willing to share pictures,

videos, tips, or other evidence if

they witnessed a crime or serious

incident, providing they were given

an easy means to do so.

Still, too many police departments

don’t provide an easy way for citizens

to submit photos, video or tips.

They don’t have the systems or the

infrastructure to readily accept this

evidence for everyday investigations,

and especially for large-scale

events.

Investigators also waste incredible

amounts of time emailing, phoning,

filling out paperwork, even driving

from place to place to manually

collect digital evidence. All of

this evidence is then painstakingly

copied and saved on CDs, DVDs or

USB drives, and added to paper case

folders.

How new digital investigation

and evidence management

technology can help

New digital investigation and evidence

management technology is

now helping to break down these

barriers by enabling police departments

to seamlessly connect all of

their digital silos through one application.

The technology provides

a one-stop shop for gathering evidence

so investigators don’t have to

waste time logging on to all of the

individual systems to manually collect

evidence to build their cases.

In addition to simplifying access,

the technology is able to search

across all connected systems and

recommend evidence that is potentially

relevant to the case.

Advanced content analytics make

both structured and unstructured

data sources searchable. This includes

audio recordings, databases,

narratives from CAD comments,

incident reports, FI cards, reports,

documents, and more. This means

that investigators can uncover connections

and generate new leads,

which ultimately helps them solve

cases faster.

An investigator also has the ability

to add key words to a search.

Let’s say, for example, a witness in

a homicide investigation said they

saw a panel van with ‘Joe’s Plumbing’

marked on the side, fleeing the

scene. By adding ‘Joe’s Plumbing’

to a key word search, all connected

sources – from incident reports in

the CAD system to tagged crime

scene photos and witness statements

– would be searched for those

two key words.

In addition to searching docu-

22 23

ments and databases, the technology

can convert audio to text to

make it searchable, so for example,

911 calls and interview room recordings

could be searched for the

words ‘Joe’s Plumbing’ as well. All

the investigator would need to do is

review the suggested evidence, and

select it to add it to a virtual case

folder.

Investigators can also initiate and

track evidence requests using built

in workflows, and receive automatic

notifications when those requests

are fulfilled. This makes it easier for

an investigator to stay on top of active

cases, while not losing track of

evidence or leads.

Furthermore, citizens can submit

video, photos and tips through a secure

public portal. Private businesses

can also use the portal to register

their CCTV cameras and provide

contact details, making it easier for

law enforcement agencies to crowdsource

evidence. By geo-locating

both city-owned and private CCTV

cameras, the technology enables investigators

to look at the area where

a crime occurred and know where

cameras are located, minimizing

time spent canvassing for video.

The technology is also cloudbased

so it can scale to growing evidence

storage requirements if there’s

More on page 42


Law Enforcement/Public Safety

Kansas becomes first statewide deployment

site of AT&T NextGen 911 solution

TOPEKA, KS, April 27, 2017 AT&T

and the Kansas 9-1-1 Coordinating

Council continue to improve the

9-1-1 experience in the state. Kansas

will be the first statewide deployment

of AT&T ESInet.

AT&T ESInet is a new NextGen

9-1-1 solution that provides IPbased

call routing services to emergency

response centers. It will help

Kansas boost 9-1-1 reliability, speed

emergency responsiveness and improve

disaster recovery. For Kansans,

this means a faster, more reliable

9-1-1 experience.

This builds on Kansas’ previous

investment to modernize its outdated

public safety technology with a

NextGen 9-1-1 hosted call handling

solution from AT&T.

“Updating our 9-1-1 infrastructure

is key to keeping our

people safe, and selecting AT&T

was an obvious choice,” said Dick

Heitschmidt, chairman of the Kansas

9-1-1 Coordinating Council and

Hutchinson chief of police. “AT&T

provides our public safety community

with a comprehensive NextGen

9-1-1 solution, delivering the value,

expertise and teamwork needed to

create the current and future experiences

our residents expect. It’s our

goal to stay on the cutting edge of

public safety, and AT&T ESInet will

help to make that a reality.”

With AT&T ESInet, Kansas will

have more sophisticated capabilities

to route calls based on the caller’s

geographic location. Public Safety

Answering Points (PSAPs) will also

be able to manage and route advanced

communications like text

messaging to 9-1-1. In the future,

Kansas PSAPs will be able to support

pictures and videos sent via

text message. This is crucial in today’s

mobile environment where

more than 70% of the calls made to

9-1-1 come from a mobile device.

“AT&T ESInet will help propel

Kansas into the next generation of

public safety. It’ll give Kansas emergency

services an advanced network

to better meet the needs of residents,

first responders and 9-1-1 call takers

today and tomorrow,” said Jon

Wellinger, assistant vice president,

AT&T Global Public Sector.

Since AT&T ESInet is a highly

secure and resilient nationwide

service, it will give Kansas access

to geographically diverse and redundant

call processing locations

throughout the country.

This will let the state work with

other ESInet-enabled 9-1-1 agencies

nationwide to:

• Maintain service during a natural

or man-made disaster.

• Help save precious time by routing

calls and texts correctly.

• Automatically route calls to

neighboring PSAPs when call volumes

spike.

Other benefits include access to:

• A defense-in-depth, private network

with multiple layers of security

– like firewalls and intrusion

detection/prevention. This will

help protect Kansas 9-1-1 infrastructure

from cyber threats.

• Industry standard components

that will give the state backward

compatibility with legacy 9-1-1

systems and services.

The capabilities that NextGen 9-1-1

technologies will give to PSAPs and

the public will become a necessity.

Working with AT&T, Kansas is on

track to move 75% of its PSAPs to

NextGen 9-1-1 hosted call handling

by the end of this year.

“We’ve long supported Kansas

public safety needs, and we are

proud to continue our great relationship,

helping Kansas on its mission

to future-proof its 9-1-1 infrastructure,”

said Wellinger.

By making it easier to manage

9-1-1 calls, AT&T ESInet will help

Kansas public safety resources go

further, so they can focus on what

matters most: protecting people and

saving lives.

AT&T is a leader in first responder

connectivity. We’ve been enabling

and innovating public safety communications

for nearly 140 years.

We will continue this commitment

as we build America’s first-ever nationwide

broadband network dedicated

to first responders.

To learn more about AT&T ESInet,

check out corp.att.com/publicsafety.

For more information on how

Kansas has been updating its 9-1-1

infrastructure, visit kansas911.org.

About AT&T

AT&T Inc. (NYSE: T) helps millions

around the globe connect with leading

entertainment, business, mobile

and high speed internet services.

We offer the nation’s best data network*

and the best global coverage

of any U.S. wireless provider.**

We’re one of the world’s largest

24 25

providers of pay TV. We have TV

customers in the U.S. and 11 Latin

American countries. Nearly 3.5 million

companies, from small to large

businesses around the globe, turn to

AT&T for our highly secure smart

solutions.

Additional information about

AT&T products and services is available

at about.att.com. Follow our

news on Twitter at @ATT, on Facebook

at facebook.com/att and You-

Tube at youtube.com/att.

FREE SUBSCRIPTION

SIGN-UP

Monthly Digital Edition

Airport/Seaport Newsletter

Daily Insider Newsletter

Cybersecurity Newsletter

CLICK HERE


Law Enforcement/Public Safety

RapidSOS secures $14M in investments to develop

life-saving 911 technology

NEW YORK, April 25, 2017 RapidSOS,

an emergency technology

start-up, today announced the closing

of a $14 million Series A funding

round led by Highland Capital

Partners with participation from A3

Ventures (the innovation subsidiary

of AAA Northern California, Nevada

& Utah), The Westly Group,

Two Sigma Ventures, Motorola Solutions

Venture Capital, Responder

Ventures, and several notable individuals

including three former FCC

Chairmen (Tom Wheeler, Julius

Genachowski, Dennis Patrick).

Technology has dramatically

changed our lives over the last 50

years, except for when we need it

most. Over 240 million 911 calls

are made each year, all reliant on a

voice connection with less data than

was originally transmitted through

the first trans-Atlantic cable in 1858.

The FCC estimates that improved

information flow to 911 and first

responders could save over 10,000

lives annually.

“For the last 50 years – we’ve relied

on a voice-only connection when

our lives were on the line – whether

from us or through a home security,

medical alert, or roadside assistance

call center,” said Dan Nova, Partner

at Highland Capital Partners and

RapidSOS Board Member. “Rapid-

SOS’ technology eliminates the need

for clunky third-party call centers –

providing a transformative platform

for safety, security, and wellness.”

RapidSOS spent four years working

closely with thousands of public

safety officials across the United

States to develop a universal data

link into 911 and first responder

networks. The result is a transformation

from a voice-only system into a

rich data link connecting millions

of smartphones, wearables, connected

cars, and home IoT products

directly to 911 and first responders.

Wearables powered by RapidSOS

automatically detect health emergencies

– transmitting rich data to

responding ambulances.

Connected cars provide key

telematics data to 911 and responders.

Connected homes linked through

RapidSOS inform firefighters with

real-time data including smoke

density, temperature, and location

of trapped occupants.

“Over the past four years I’ve

witnessed the incredible heroism

of public safety officials who manage

millions of emergencies with

little more than a distraught caller’s

voice,” said Michael Martin, CEO of

RapidSOS. “I’m excited to be partnering

with thought leaders across

public safety, telecom, and technology

to link any device with rich data

directly to 911 and first responders.”

“Working with RapidSOS brings

a new dimension to our portfolio

of integrated software solutions for

the public safety command center,”

said Eduardo Conrado, Executive

Vice President, Strategy & Innovation

Office, Motorola Solutions.

“Our work together creates end-to-

Michael Martin

RapidSOS Founder

Nick Horelik, PhD

RapidSOS Founder

end emergency data connectivity,

enabling third-party data to flow

through Motorola Solutions’ emergency

response systems to personnel

in the field. It provides critical

information that can accelerate

response times and improve outcomes.”

“Having served as State Controller

and CFO of California, I know

firsthand that 911 centers face significant

funding and technological

challenges impacting lives,” said

Steve Westly, Founder and Managing

Partner at The Westly Group.

“We are thrilled to work with the

top engineers at RapidSOS to solve

this global challenge.”

RapidSOS’ technology platform,

originally developed by Martin,

Nick Horelik and a team of engineers

out of MIT and Harvard University,

provides a rich data link

into any 911 dispatch system and a

platform for advanced emergency

analytics. “We’ve already seen how

emergencies are often predictable

and preventable,” said Horelik, RapidSOS

CTO. “In the future, our users

will get advanced warning about

car accidents and potential medical

emergencies before they occur.”

“AAA is constantly looking for innovative

ways to serve its 56 million

members across the United States

and Canada,” said Dillon McDonald,

Managing Partner at A3 Ventures,

the innovation subsidiary of

AAA Northern California, Nevada

& Utah. “We couldn’t have asked for

a better company to be the first investment

from the newly formed A3

Ventures. It is only fitting that we are

working with RapidSOS not only as

an investor, but also as a partner to

bring unprecedented safety, security,

and wellness to millions of our

members.”

“I spent much of my career as

Chairman of the FCC working to

strengthen public safety and make

improvements to our nation’s 911

system,” said Tom Wheeler, Former

Chairman of the FCC. “I am thrilled

to have the opportunity to work directly

with RapidSOS as they deploy

their emergency platform to enhance

the data available to 911 and

first responder systems nationwide.”

“We are humbled to be collaborating

with such thought leaders across

public safety and technology,” said

26 27

Martin. “Every day 650,000 emergency

calls are placed across the

United States, in partnership with

the public safety community we are

transforming the outcomes of millions

of these emergencies.”

About RapidSOS

RapidSOS is an advanced emergency

technology company. RapidSOS

is developing technology to predict

and preempt emergencies before

they occur, dynamically warn

people in harm’s way, and link data

from any connected device directly

to first responders in an emergency.

The result is faster, more effective

emergency response leading to a

projected 2-10% reduction in mortality,

6.9% reduction in healthcare

treatment costs, and 20% reduction

in property damage4. Formed

in 2013 and backed by some of the

world’s top technologists, RapidSOS

was named “2016 Start-Up of the

Year” by the Consumer Technology

Association, a Top Innovation

of 2015 by MIT News, and Top 3

Innovative World Technologies by

SXSW. Learn more at www.Rapid-

SOS.com.


Cubic executive to discuss benefits of cloud

hosting at transportation summit

JW Fishers describes equipment now

used to locate weapons and explosives

SAN DIEGO April 27, 2017 Cubic

Transportation Systems (CTS),

a business unit of Cubic Corporation

(NYSE:CUB), today announced

Chris Bax, vice president of global

ITS strategy, will participate

in a panel discussion

on the benefits of cloudbased

technologies for traffic

management systems

at the ITS Heartland 2017

Annual Meeting in Wichita,

Kansas from May 1 – 3.

Population growth is

increasing the demands

placed on roads and associated infrastructure

around the world. Inevitably,

pressure to expand and support

transportation infrastructure growth

is placed on the transit authorities

that manage them. During the panel,

Bax will cover “smart city” technology

and how cloud hosting can be

used to meet the needs of advanced

traffic management solutions. He

will highlight the benefits of cloudbased

platforms, from integration

capabilities to cost-effectiveness, resiliency

and reliability. Additionally,

Bax will address how cloud hosting

is being applied, the long-term

advantage and its ability to support

Chris Bax

smart cities.

“Transportation infrastructure will

constantly evolve in order to meet

population growth,” said Bax. “It’s

imperative for traffic management to

be efficient now and in the

future, as the only way we

can maximize the lifetime

performance of transport

solutions is to rely on new

technologies.”

Bax will take part in the

following panel session:

Session 3A: Beyond the

Signal – What’s New in Traffic Management

and Operations

Wednesday, May 3, 8:30 – 10:00 a.m.

(local time); Riverview Ballroom,

Hyatt Regency, Wichita, Kansas

Moderator: Ron Hall, ITS Heartland,

State Director, Kansas Department

of Transportation (DOT); Panelists:

Zach Hansen, SRF Consulting

Group; Tom Hein, Kansas DOT;

Brian Sovik, Data Transfer Solutions

Follow Cubic Transportation Systems

at @CubicTS or use the

hashtags #THISisITS and #realITS

to join the conversation. For updates

or participation in the ITS Heartland

conversation during the event, use

the hashtag #ITSHeartland.

About Cubic Corporation

Cubic Corporation designs, integrates

and operates systems, products

and services focused in the

transportation, defense training and

secure communications markets.

Cubic Transportation Systems is a

leading integrator of payment and

information technology and services

to create intelligent travel solutions

for transportation authorities and

operators. Cubic Global Defense is

a leading provider of live, virtual,

constructive and game-based training

solutions, special operations and

intelligence for the U.S. and allied

forces. Cubic Mission Solutions provides

networked Command, Control,

Communications, Computers,

Intelligence, Surveillance and Reconnaissance

(C4ISR) capabilities

for defense, intelligence, security

and commercial missions. For more

information about Cubic, please visit

the company’s website at www.cubic.

com or on Twitter @CubicCorp.

Before 1970 the widely accepted solution

for disposal of old munitions,

typically called unexploded ordnance

(UXO), was to dump them

into rivers, lakes and oceans. Today

we know this creates a multitude of

problems, the worst of which are

pollution and the risk of an explosion.

Many people have already

lost their lives to these underwater

booby traps. The uncertainties

surrounding their precise location

and degree of decomposition,

makes attempting to recover these

dangerous devices an even more

difficult task.

Several international organizations

have been formed to address

the problem of UXO on land

and underwater, and a variety of

tools and techniques are being

employed to locate and remove

them. One of the groups working

the problem is the Japan Mine Action

Service (JMAS), a non-profit

engaged in humanitarian activities

to create better and safer living

conditions. Since its inception in

2001, JMAS has implemented UXO

clearance projects in a host of countries

from Japan to Afghanistan. JW

Fishers Pulse 12 boat-towed metal

detector is assisting in these operations.

The detector will locate both

ferrous and nonferrous metals, an

important feature as munitions

can be made of a variety of metals

including brass and steel. It’s large

rectangular search coil can find

metal buried up to 16 feet, and the

Pulse 12 works equally well on land

and in the water. With three detection

heads attached to the master

control console, an area up to 72

feet wide can be swept in one pass;

28 29

saving time, fuel, and manpower. To

inspect sites on land, the coil can be

mounted on the front of an ATV or

other vehicle allowing large areas to

be swept quickly. This powerful machine

is now helping a JMAS team

uncover lethal UXO in Palau reports

representative Terada Yasuo.

Another organization using

Fishers equipment in a similar operation

is the Regional Centre for

Underwater De-mining (RCUD)

in Montenegro, which was part of

the former Yugoslavia. A bloody

civil war in the 1990’s left the

country littered with unexploded

ordnance and waterways unsafe to

travel because of many scattered

mines. After numerous fishermen

and boaters were killed from these

deadly devices, RCUD acquired a

Fisher side scan to help locate the

mines. The operation was a success.

With the help of the sonar

and trained divers, many explosives

were found and removed

from the country’s lakes and rivers.

Today the sonar is being used for

more peaceful purposes. RCUD is

working in cooperation with RPM

Nautical Foundation and the Center

for Conservation and Archaeology


to locate historic shipwrecks and

map other underwater sites of significance.

Evgeniy Pozharsky is a Polish

patriot. He has taken it upon himself

to try and locate and remove

as many UXO as possible from his

native land. Using his Fisher Pulse

10 metal detector with a detection

range of over 2 meters, Evgeniy has

searched lakes, rivers and fields all

over the country. Through hard

work and dogged determination he

has been able to locate a and recover

a significant number of WWII munitions

from sites on land and underwater.

Evgeniy has put his life on

the line to ensure no one else will be

killed or injured

by these perilous

weapons.

Law enforcement

agencies

around the

world are acquiring

underwater

metal detectors

(UMD)

to ensure their

dive teams have the right equipment

to effectively do their job. An

essential tool for locating evidence

disposed of in a waterway, metal detectors

routinely assist public safety

divers in finding weapons, shell casings,

stolen objects, and explosive

devices. UMD are so effective, and

their use has become so widespread,

that agencies

training public

safety divers

are developing

courses

on how to best

utilize these

devices. Dive

Rescue International

in Colorado

and Lifeguard

Systems

in New York

offer courses

in aquatic preparedness to ensure

public safety dive teams respond

effectively to water incident scenes.

Their instructors combine knowledge

with experience

in the use

of state of the

equipment. The

detectors both

companies are

using in their

evidence recovery

training

are JW Fishers

Pulse 8X.

Goodhue County Sheriff ’s Office

in Minnesota is employing this

technology in their underwater

search operations. Dive Team Leader

Steve Sutton-Brown reports using

Fishers new SAR-1 detector in a recent

training exercise. “We’re regularly

called on to search for evidence

such as guns, knives, bullet casings,

etc. We generally dive in visibility

that is zero to one foot, which is one

of the reasons we choose this machine.

In this exercise we planted a

pistol on the lake bottom. The diver

was given only an approximate area

of where the weapon might be, just

as would happen in a real call out.

Although visibility was almost zero,

each diver was able to quickly located

the weapon. The high intensity

LED light bar was fairly easy to see

and the vibration feature was appreciated

by all. We really like that

there are no exposed wires since we

already have enough entanglement

issues to deal with. The consensus

is; the SAR-1 works awesome!”

For more information on JW Fishers

complete line of underwater

search equipment go to www.jwfishers.com.

Raytheon wins $375M contract to

modernize Air Force air and space

operations centers

Dave Wajsgras

HAMPTON, VA April 26, 2017 The

U.S. Air Force Materiel Command

has awarded Raytheon Company

(NYSE: RTN) a contract with an initial

value of up to $375 million over

six years to sustain and modernize

the Air and Space Operations

Center Weapon System,

or AOC WS. Under

the contract, Raytheon will

update the existing AOC WS

baseline software and develop

and deploy new software

upgrades to improve air and

space command and control

operations.

Air and Space Operations Centers

provide a strategic capability for the

U.S. Air Force with operators at 22

global locations using the AOC WS

to command and control aircraft

through all of the Air Force’s critical

missions.

“Raytheon will use our unmatched

cyber, automation and analytics expertise

to modernize the Air Force’s

weapons system, providing an advantage

in everything from security to

actionable insight in the digital battlespace,”

said Dave Wajsgras, president

of Raytheon Intelligence, Information

and Services.

“Raytheon’s innovative modernization

through sustainment approach

incrementally improves systems without

interruption to critical missions,”

said Todd Probert, vice president of

Mission Support and Modernization

at Raytheon IIS. “In addition, the use

of software development best

practices, such as Agile and

DevOps, speeds up the delivery

of these systems to the

warfighter.”

Raytheon is hiring for the

new team based in Hampton,

Virginia. Open positions include

system architects, software

developers, cyber engineers, IT

help desk and more.

About Raytheon

Raytheon Company, with 2016 sales

of $24 billion and 63,000 employees,

is a technology and innovation leader

specializing in defense, civil government

and cybersecurity solutions.

With a history of innovation spanning

95 years, Raytheon provides state-ofthe-art

electronics, mission systems

integration, C5ITM products and

services, sensing, effects, and mission

support for customers in more than

80 countries. Raytheon is headquartered

in Waltham, Massachusetts.

30 31

For proactive security,

build an aquarium

Continued from page 6

requires us to build an aquarium

again – a fusion of technologies that

provide speed and accuracy, and are

simple for the end-user.

The most secure and convenient

biometric technology identity verification

must use ‘the power of fusion.’

By fusing face recognition,

body behavior analytics – including

height, gait and body type – and

even voice recognition, we create a

fusion that is highly accurate, and

does not require a user to stop for

identification. This fusion of sensors

allows us to understand a person’s

identity in real-time, with high accuracy

and speed.

Building this aquarium and utilizing

a fusion of technologies for

multimodal biometrics, we can

make identification and secure access

simple and secure. And most

importantly, we can apply the power

of fusion to prevent incidents before

they happen.


Hikvision camera system to provide increased security

for Miami Beach Holocaust Memorial

CITY OF INDUSTRY, CA May 2,

2017 A security system provided

by Hikvision, the North American

leader in innovative, award-winning

video surveillance products and solutions,

will help increase security at

the iconic Holocaust Memorial in

Miami Beach, Fla.

Founded 27 years ago by a group

of community leaders, Holocaust

survivors and the children of survivors,

the Memorial is sited on two

acres and features a series of openair

rooms. Volunteers, including

Holocaust survivors, lead tours of

the Memorial’s exhibits and participate

in other educational programs

open to the public.

The Memorial hosts more than

130,000 visitors every year, including

thousands of schoolchildren

and people from around the world.

Professionals and volunteers work

to educate visitors about the time

before and during the Holocaust.

The Memorial also provides a place

for people to reflect and explore

how they feel about what they are

seeing, to think about their role as

citizens and their relationship with

other people, and to discuss anti-

Semitism and intolerance.

Security is challenging in any

open-air venue, and the Memorial’s

previous analog security system was

”extremely outdated,” according to

Brenda Moxley, director of community

security for the Greater Miami

Jewish Federation.

Moxley is the retired FBI Assistant

Special Agent in Charge, Miami Division,

whose background includes

counter-terrorism. Hired by Federation

to provide security consultation

to 120 Jewish organizations

in the Miami-Dade area, Moxley is

working to improve critical security

infrastructure, crisis management

and education.

The Hikvision security camera

system will provide much needed

security improvements at the memorial

and enable Moxley to implement

a coordinated and integrated

security plan.

Jeffrey He, president of Hikvision

USA Inc., and Hikvision Canada

Inc., said Hikvision is pleased to

work with Moxley and the Greater

Miami Jewish Federation. He noted

that China has an important historic

connection with the Jewish

people. “Shanghai, a city one hour

away from Hikvision headquarters

in Hangzhou, China provided a safe

haven for Jewish refugees during

32

the Holocaust,” He said. More than

25,000 Jews came to Shanghai between

the years 1937 and 1941.

“Safeguarding people and protecting

property is why Hikvision is in

the security business,” He added.

About Hikvision

Hikvision is the world’s leading supplier

of video surveillance solutions.

Featuring the industry’s strongest

R&D workforce, Hikvision designs,

develops, and manufactures standard-

and high-definition cameras,

including a variety of IP cameras,

analog cameras, and cameras featuring

the latest in high-definition

analog technology. Hikvision’s

product suite also includes digital

video servers, hybrid and standalone

DVRs, NVRs, and other elements

of sophisticated security systems

for both indoor and outdoor

use.

GSN’s 2017 Airport/Seaport/Border Security Awards

Now Including Cybersecurity Solutions for Airport, Seaport, Border Security Markets

All Winners in this program are entitled to

a Full-Page Advertisement (8.5” x 9.0”) in

your choice of GSN’s Digital Magazine or

Leaderboard in any edition of the Airport,

Seaport, Rail, Border Security Weekly

Newsletter.

Adrian Courtenay

Managing Partner, CEO

Government Security News

917-696-5782

acourtenay@gsnmagazine.com

NEW IN 2017:

CLICK HERE TO SUBMIT ENTRIES

All Finalists are entitled to a Half-Page

Advertisement (8.5” x 4.5”) in your choice

of GSN’s Digital Magazine or Leaderboard

in any edition of the Airport, Seaport, Rail,

Border Security Weekly Newsletter.

Steve Bittenbender

Managing Editor

Government Security News

502-552-1450

sbittenbender@gsnmagazine.com

Gerry O’Hara

Designer

OHDesign3

203-249-0626

gerry@ohd3.com


Cyber Threats & Solutions

BeyondTrust survey links breaches to

aging federal infrastructure

Federal Government loses $637 Million to Breaches annually

PHOENIX, AZ – May 3, 2017 – BeyondTrust,

the leading cyber-security

company dedicated to preventing

privilege misuse and stopping unauthorized

access, today unveiled the

results of its Federal Cyber-Security

Threat Survey Report 2017. Based

on a comprehensive survey of senior

Federal IT professionals, the study

exposes an aging Federal computing

infrastructure which has led to an environment

with an alarmingly high

risk of breaches.

105 senior IT professionals working

for federal agencies were asked about

their computing infrastructure, security,

breaches and IT modernization.

A summary of the findings is included

below.

Federal IT managers concerned

about antiquated infrastructure.

An overwhelming majority of Federal

IT managers (81 percent) say aging

IT infrastructures have a somewhat

to extremely large impact on their

cyber-security risk. Further, three of

five (61 percent) say aging infrastructure

is a roadblock to achieving federal

cyber-security mandate compliance.

We found ample examples of aging

infrastructure in our survey. For

example, a surprising 47 percent of

Federal agencies still use Windows

XP, driving a third of respondents (35

percent) to report that this kind of aging

infrastructure had a somewhat to

large impact on their ability to affect

vulnerability patching.

The impacts of aging federal infrastructure

don’t stop there …

• Three of four say aging infrastructure

is a somewhat to extremely large

risk to their ability to achieve their

mission.

• The biggest impacts include inefficiency,

increased cyber risk and problems

with compliance.

• Specific to cyber-security, the top

impacts of an aging infrastructure are

difficulty with patching, password

management and privileged account

management (PAM).

• Respondents cite aging infrastructure

as the top roadblock in the way

of achieving federal cyber-security

mandates

Aging Infrastructure Leads to

Breaches

Aging infrastructure is not just a

problem in theory; aging infrastructure

makes federal systems more vulnerable

to attack, which has led to an

environment that could be rife for

breaches.

• 42 percent have experienced a

data breach within the past 6 months.

• A staggering one in eight has experienced

a data breach within the

past 30 days.

• Put another way, the typical federal

IT system experiences one breach

every 347 days.

• Respondents report that the

typical data breach costs more than

$91,000.

• The total cost due for data breaches

is $637 million every year.

• The most frequently reported

costs include loss of productivity,

loss of reputation and pure monetary

damages.

Privileged Account Management:

Gap Between Theory and Practice

We asked respondents what tools

were most important to them in

terms of securing their information

environment. Here they ranked privileged

access management and vulnerability

patching as most important.

This is significant as these technolo-

gies restrict user privileges and close

off security weaknesses in systems.

Yet, despite understanding the importance

of such measures, most

(56 percent) use alternate solutions

to manage privileged passwords and

nearly two-thirds (63 percent) report

less than fully mature vulnerability

remediation programs. In fact, 6 percent

have NO remediation plan, and

another 14 percent do only the bare

minimum required by compliance

mandates.

What IT Can Do Mitigate

the Security Risk of

Aging Federal Infrastructure

The BeyondTrust 2017 US federal

government study points to four best

practices that any agency can implement.

• Manage privileged credentials

with greater discipline, eliminate

administrator rights and enforce

least privilege

Thirty percent of respondents believe

that insider threats pose a significant

threat and 35 percent believe

their users have more privileges than

are required. To mitigate insider

threats and the exploitation of privileges,

adopt a least privilege model

by removing admin rights from users

and storing all privileged credentials

in a secure safe. Known escalation attacks

have been around for years and

are still being used. These attacks require

local administrator rights. It’s

not just about insiders. Enforcing

least privilege prevents lateral movement

within an organization if a

breach does occur.

• Isolate Legacy Systems to reduce

attack surfaces

Modernization of federal IT infrastructure

is a priority for most survey

34 35

respondents, but realistically this will

not happen quickly. These aging systems

have known risks. Reduce the

attack surface by isolating legacy systems.

Segment these systems to force

all traffic through a proxy to reduce

attack vectors. Deploy an automated

password and session management

solution that provides secure access

control, auditing, alerting and recording

for any privileged account. This

will provide segmented access to critical

systems, manage passwords, and

monitor when tasks and operations

are committed to a managed system.

• Improve the maturity of vulnerability

management through automated

patching

Even in today’s sophisticated threat

landscape, the majority of attacks target

known vulnerabilities that can be

easily patched. Effective patch management

goes a long way in reducing

a network’s overall attack surface. To

be truly effective, patch management

requires intelligent prioritization and

broad coverage for common business

applications. To improve the efficiency

and effectiveness of an agency

patch process deploy a solution

that provides integrated, automated

patching. Implementing a solution

that delivers analytics and trending

across the threat lifecycle for multidimensional

reports on assets, vulnerabilities,

attacks and remediation

allows prioritized patch management

More on page 44


Cyber Threats & Solutions

(ISC)² delivers cybersecurity workforce

recommendations to White House Chief of Staff

Imperva executive urges U.S. companies

to evaluate pending EU cyber regulation

ALEXANDRIA, VA, April 19, 2017

– (ISC)2® today announced a set of

recommendations for the Trump

Administration to consider as it approaches

its 100th day in office. The

recommendations were delivered

to White House Chief of Staff and

others on President Trump’s team in

order to urge prioritization of workforce

development within the pending

cybersecurity executive order

and beyond.

During a December 2016 gathering

sponsored by the (ISC)2 U.S.

Government Advisory Council

(USGAC), participants, including

former Federal Chief Information

Security Officer (CISO) Gregory

Touhill and federal agency CISOs

and executives, discussed transition

planning from the cybersecurity

workforce perspective. The following

is an abridged list of areas that

(ISC)2 has since identified as critical

for the new administration to

address. An expanded list can be

viewed in today’s (ISC)2 blog post.

– Time Is of The Essence. The

widespread and damaging effects of

cyber threats are revealed on a daily

basis. At the same time,

the demand for skilled

cybersecurity workers is

rapidly increasing.

– Consider the Progress

Already Made. Cybersecurity

is a bi-partisan issue. Critical

work has been done over the last

eight years to advance the cybersecurity

workforce.

– Harden the Workforce. Everyone

must learn cybersecurity. We

have to break the commodity focus

of simply buying technology and

stopping there, without focusing on

training all users.

– Incentivize Hiring and Retention.

In today’s world, a sense of

mission doesn’t always override

good pay — incentives work.

– Prioritize Investment in Acquisition,

Legal and Human Resources

(HR) Personnel. Acquisition, legal

and HR professionals are essential

players within the federal cybersecurity

ecosystem.

– Prevent Getting Lost in Translation.

The government needs effective

communicators who can

translate technical risk to business

leaders.

– Civil Service Reform. The civil

service system is broken and does

not meet the government’s needs.

– Compliance Does Not Equal Security.

Embrace Risk Management.

In the government’s quest for cyber

resiliency, a risk management perspective

will be essential.

– A Standard Cyber Workforce

Lexicon. Once finalized, the NICE

Cybersecurity Workforce Framework

should provide an excellent resource

for workforce development.

“In a recent congressional hearing,

(ISC)2 had the opportunity to

present these recommendations in

an effort to advocate for our members

and the broader cybersecurity

profession during the presidential

transition and beyond,” said Dan

Waddell, (ISC)² managing director,

North America Region. “Significant

progress has been made over the

past decade to advance the federal

More on page 44

REDWOOD SHORES, CA April

27, 2017 Imperva, Inc. (NASDAQ:

IMPV), committed to protecting

business-critical data and applications

in the cloud and on-premises,

today announced the results of a

survey on the current state of company

preparedness for the European

General Data Protection Regulation

(GDPR). The survey of 170 security

professionals was taken at RSA

2017, the world’s largest security

conference.

GDPR protects the privacy of European

citizens and applies to all

businesses that hold and process

personal data collected in the European

Union, regardless of their industry

or location. It becomes effective

on May 25, 2018. Organizations

are focusing on GDPR compliance

because fines for certain violations

may be up to the greater of €20 million

or four percent of total worldwide

annual turnover. Companies

with significant revenue could face

billions of dollars in fines.

According to the survey, 51 percent

of respondents said GDPR

would impact their companies,

nearly a third of the respondents

didn’t see the GDPR regulations

impacting them, while 11 percent

were unsure if GDPR would impact

their companies and 5 percent

were not familiar with

GDPR.

The survey also showed

an overall lack of urgency

among the IT professionals

surveyed with 43 percent

of respondents indicating

that they are evaluating or

implementing change in preparation

for GDPR, 29 percent indicating

that they were not preparing,

and another 28 percent signifying

that they were unaware of specific

preparations.

“U.S. companies should be evaluating

the impact GDPR will have on

their data practices, given the major

fines for non-compliance,” said

Terry Ray, chief product strategist at

Imperva.

“Companies need to begin the

GDPR legwork now by documenting

how personal data is collected

and processed in their organizations.

From what we’ve seen in

working with our clients on GDPR

readiness, the projects are complex

36 37

Terry Ray

and involve multiple teams, technologies

and systems.”

In asking survey respondents

about who is driving GDPR

compliance in their organization,

49 percent of survey

respondents cited their organization’s

legal department,

while 8 percent said

the IT department is managing

the process.

Imperva provides data

discovery and classification tools,

user access controls, data masking,

data breach detection, data transfer

controls and other data compliance

solutions that can assist organizations

in their GDPR compliance efforts.

To learn how Imperva helps

organizations prepare for GDPR,

visit http://bit.ly/2ouojYO.

Survey Methodology

Conducted Feb. 13-17, at RSA

Conference 2017, the trade show

with the largest concentration of security

professionals, the in-person

survey is based on responses from

170 attendees including IT professionals,

managers and executives

from the U.S. (77 percent), EMEA

More on page 43


Page 1 of 12

Cyber Threats & Solutions

Report: Municipal governments lack funding to

reach high level of cybersecurity

WASHINGTON May 2, 2017 The

inability to pay competitive salaries,

insufficient cybersecurity staff, and

a general lack of funds present serious

barriers to local governments

achieving the highest levels of cybersecurity,

according to a survey of

local government chief information

officers conducted by ICMA, the International

City/County

Management Association,

in partnership with

the University of Maryland

Baltimore County.

The goal of the Cybersecurity

2016 Survey was

to better understand current

local government

cybersecurity practices and their related

issues, including what capacities

cities and counties possess, what

kind of barriers they face, and what

type of support they have to implement

cybersecurity programs.

Despite nearly a third (32 percent)

of respondents reporting an increase

in cyber attacks to their local

government information during the

past 12 months, 58 percent indicated

that the inability to pay competitive

salaries prohibited them from

achieving high levels of cybersecurity.

Fifty-three percent cited an insufficient

number of cybersecurity

staff as the primary obstacle, and 52

percent said it was a general lack of

funds.

The public sector pays considerably

less than the private sector

“Because the costs to restore compromised

data are staggering, local governments must

understand what resources they need to

achieve their cybersecurity objectives and

ensure the safety of their data.”

for cybersecurity expertise, which

places further pressure on U.S. local

governments to find ways to

fund compensation in this explosive

industry. Currently, this booming

field has zero unemployment and

one million unfilled jobs, and experts

estimate that the shortfall will

reach 1.5 million by 2019.

When asked to rank the top three

things most needed to ensure the

highest level of cybersecurity for

their local government, respondents

cited greater funding as number

one, better cybersecurity policies as

number two, and greater cybersecurity

awareness among local government

employees as number three in

importance.

“As local governments become

increasingly reliant on technology

and the Internet, they must

also become increasingly

diligent about the security

they provide for the data

and information they collect

and manage,” said ICMA

Executive Director Marc

Ott. “Because the costs to restore

compromised data are

staggering, local governments must

understand what resources they

need to achieve their cybersecurity

objectives and ensure the safety of

their data. The results of the ICMA-

UMBC Cybersecurity 2016 Survey

can help local leaders identify and

evaluate critical resource shortages.”

Other highlights of the ICMA/

UMBC cybersecurity survey results

include:

Only 1 percent of responding lo-

cal governments

have a stand-alone

cybersecurity department

or unit.

Primary responsibility

for cybersecurity is most

often located within the IT department.

Roughly 62 percent of responding

jurisdictions have developed a

formal policy governing the use of

personally-owned devices by governmental

officials and employees.

Nearly 70 percent of responding

local governments have not developed

a formal, written cybersecurity

risk management plan, but nearly

41 percent conduct an annual risk

assessment and an additional 16

percent take stock of their risk at

least every two years.

The Cybersecurity 2016 Survey

was mailed (with an online option)

to the chief information officers of

3,423 U.S. municipalities and counties

with populations of 25,000 or

greater. Responses were received

from 411 local governments for a

response rate of 12 percent.

Review the complete results of

the survey at: http://icma.org/cybersecurity2016surveyresults.

About ICMA

ICMA, the International City/

County Management Association,

advances professional local government

worldwide through leadership,

management, innovation, and ethics.

ICMA is second only to the federal

government in the collection,

analysis, and dissemination of data

focused on issues related to local

government management. Through

expansive partnerships with local

governments, federal agencies, nonprofits,

and philanthropic funders,

the organization gathers information

on topics such as sustainability,

health care, aging communities,

38 39

Introduction

In 2016, the International City/County Management Association (ICMA), in partnership with the University of Maryland,

Baltimore County (UMBC), conducted a survey to be ter understand local government cybersecurity practices. The

results of this survey provide insights into the cybersecurity issues faced by U.S. local governments, including wha their

capacities are, what kind of ba riers they face, and wha type of suppor they have to implement cybersecurity programs.

Methodology

The survey was sent on paper via postal mail to the chief information o ficers of 3,423 U.S. local governments with

populations of 25,000 or greater. An online submission option was also made available to survey recipients.

Responses were received from 411 of the governments surveyed, yielding a response rate of 12%. Cities were

ove represented among respondents while counties were underrepresented. Similarly, higher percentage of responses

received from larger communities compared to sma ler communities. Further, jurisdictions in the Mountain region of the

U.S. were ove represented, while jurisdictions in the Mid-Atlantic and East South-Central regions were

unde represented. The following report reflects trends among the unweighted survey responses, and should only be

considered to be representative of the responding governments. Weighting should be applied to achieve representation

of the broader survey population.

Cybersecurity 2016 Survey

Summary Report of Survey Results

Cybersecurity 2016 Survey

Number Surveyed Number Responding Response Rate

Total 3423 411 12.0%

Population Size

Over 1,000,000 42 11 26.2%

500,000 - 1,000,000 98 20 20.4%

250,000 - 499,999 168 26 15.5%

100,000 - 249,999 532 63 11.8%

50,000 - 99,999 939 108 11.5%

25,000 - 49,999 1644 183 11.1%

Geographic Division

New England 183 23 12.6%

Mid-Atlantic 391 23 5.9%

East North-Central 782 94 12.0%

West North-Central 266 26 9.8%

South Atlantic 541 79 14.6%

East South-Central 253 20 7.9%

West South-Central 354 41 11.6%

Mountain 220 48 21.8%

Pacific Coast 433 57 13.2%

Type of Government

Municipalities 1893 267 14.1%

Counties 1530 144 9.4%

economic development, homeland

security, alternative service delivery,

as well as performance measurement

and management data on a

variety of local government services—all

of which support related

training, education, and technical

assistance.

About the University of Maryland

Baltimore County

UMBC is a dynamic public research

university integrating teaching, research,

and service to benefit the

citizens of Maryland. As an Honors

University, the campus offers academically

talented students a strong

undergraduate liberal arts foundation

that prepares them for graduate

and professional study, entry into

the workforce, and community service

and leadership. UMBC emphasizes

science, engineering, information

technology, human services

and public policy at the graduate

level. UMBC contributes to the economic

development of the State and

the region through entrepreneurial

initiatives, workforce training, K-16

partnerships, and technology commercialization

in collaboration with

public agencies and the corporate

community. UMBC is dedicated to

cultural and ethnic diversity, social

responsibility and lifelong learning.


Cyber Threats & Solutions

Cybersecurity executives ‘Wannacrypt’ ransomware

attack a wake-up call for industry, government leaders

By Steve Bittenbender

Editor, Government Security News

The ransomware attack that plagued

the globe on Friday must serve as a

“wake-up call” to both industry and

government leaders that the time for

urgent action is now. That’s how one

of Microsoft’s top executives reacted

to the “WannaCrypt” attack that

targeted computer systems in various

industries worldwide, including

healthcare and government systems.

“WannaCrypt,” also dubbed

“WannaCry,” was a ransomware attack

that paralyzed hospitals in Great

Britain and even FedEx in the United

States, although the attack seemed

to focus mainly on Russian servers

based on information provided from

Kapersky Labs. A ransomware attack

is where a hacker encrypts files and

threatens to destroy the data if the

ransom – in the case of “WannaCrypt,”

it was at least $300 in Bitcoin

– is not paid within a certain time.

In a Sunday blog post on Microsoft’s

Web site, company President

and Chief Legal Officer Brad Smith

said the hackers used material stolen

from the National Security Agency

Brad Smith

to perpetrate the attack. The NSA

breach had been previously reported,

and, in March, Microsoft released

a patch to its users to protect

them from an attack. While some users

updated their systems, others did

not, and they were the ones scrambling

on Friday.

The ransomware attack

“demonstrates the degree to

which cybersecurity has become

a shared responsibility

between tech companies

and customers,” Smith said.

“The fact that so many computers

remained vulnerable

two months after the release

of a patch illustrates this aspect. As

cybercriminals become more sophisticated,

there is simply no way

for customers to protect themselves

against threats unless they update

their systems. Otherwise they’re literally

fighting the problems of the

present with tools from the past.”

Dan Matthews, a sales engineer

with Lastline, said network managers

had another option to prevent the

attack if they were not able to get the

patch installed in time.

He, like other experts, said the ransomware

attack served as an important

reminder of being proactive in

managing cybersecurity risks.

“In practice things are often more

complicated and there are legitimate

reasons for needing more time to

implement a patch,” Matthews said.

“Organizations who are unable to

deploy Microsoft’s (or other

software vendors’) critical

patches in a timely manner

can instead implement advanced

email and network

protections that are capable

of detecting ransomware

and preventing the delivery

of these payloads to unpatched

computers.”

Ofer Israeli, CEO and founder of

Illusive Networks, said he expects

hackers will continue to use the stolen

NSA material for other attacks.

“In this case, we are seeing an opportunistic

ransomware operation,

but we can expect the exploit is already

being used for surgical targeted

attacks, the outcome of which will

only be revealed in a few months,

due to the time it takes to execute

a sophisticated targeted attack,” he

said.

Brian Lord, OBE, managing director

for British-based PGI Cyber, said

the attacks were “always inevitable.”

Lord also echoed Smith’s comments

on this being a wake-up call.

“While organizations are distracted

by high profile dramatized threats,

such as Russian election hacking,

they are neglecting basic cyber hygiene

measures which can prevent

the mass effectiveness of mass ransomware

attacks like this,” said Lord,

the former director of deputy director

for intelligence and cyber operations

for Britain’s Government Communications

Headquarters.

Smith added that it’s time government

leaders readdress their

cybersecurity policies, as attacks

like “WannaCrypt” are becoming

an emerging problem this year. He

equated the NSA losing its coding to

the military having a few Tomahawk

missiles taken.

“This is one reason we called in

February for a new ‘Digital Geneva

Convention’ to govern these issues,

including a new requirement for

governments to report vulnerabilities

to vendors, rather than stockpile,

sell, or exploit them,” Smith said.

“And it’s why we’ve pledged our support

for defending every customer

everywhere in the face of cyberattacks,

regardless of their nationality.”

40 41

GSN’s 2017

Airport/Seaport/Border Security Awards

Now Including Cybersecurity Solutions for Airport, Seaport,

Border Security Markets

All Winners in this program are

entitled to a Full-Page Advertisement

(8.5” x 9.0”) in your choice of GSN’s

Digital Magazine or Leaderboard in

any edition of the Airport, Seaport,

Rail, Border Security Weekly

Newsletter.

Adrian Courtenay

Managing Partner, CEO

Government Security News

917-696-5782

acourtenay@gsnmagazine.com

NEW IN 2017:

CLICK HERE TO SUBMIT ENTRIES

All Finalists are entitled to a Half-

Page Advertisement (8.5” x 4.5”) in

your choice of GSN’s Digital Magazine

or Leaderboard in any edition of the

Airport, Seaport, Rail, Border Security

Weekly Newsletter.

Steve Bittenbender

Managing Editor

Government Security News

502-552-1450

sbittenbender@gsnmagazine.com

Gerry O’Hara

Designer

OHDesign3

203-249-0626

gerry@ohd3.com


OnSSI integration with Jemez

Technology improves perimeter

surveillance effectiveness

Continued from page 12

lance management software. OnSSI’s

Ocularis IP security and surveillance

VMS platform increases security,

reduces operational costs, and

helps organizations move closer to

prevention. Ocularis delivers open

architecture, flexibility, and scalability

for a range of applications including

education, gaming, government,

healthcare, manufacturing, public

safety, transportation, and utilities.

OnSSI is headquartered in Pearl

River, New York and has representation

in over 100 countries. With its

acquisition of Germany-based VMS

company, SeeTec GmbH and the

launch of Ocularis 5, OnSSI continues

to drive global expansion and

technological innovations.

About Jemez Technology

Jemez Technology provides stateof-the-art

video analytic surveillance

technology delivering dramatically

enhanced perimeter and area

surveillance for critical asset and

infrastructure protection. Products

and services from Jemez Technology

leverage their patent-pending

Eagle-i Edge technology and the

AXIS Camera Application Platform

(ACAP).

UTEP professor, Immigration

Council question need for

additional ICE and Border Patrol

agents

Continued from page 13

Heyman said the additional staffing

would increase the DHS budget

by more than $3.14 billion the

administration gets its 15,000 new

agents. In his report, he believes

that money could be better spent

elsewhere within DHS.

For example, he noted that U.S.

immigration courts are currently

understaffed. There are 300 judges

now, about 75 short of what’s currently

budgeted. These judges oversee

more than a half-million cases

and the average time for a case to be

resolved is more than 670 days. In

order to alleviate the backlog within

six years, Heyman said the government

would need more than 500

judges.

Heyman also noted that CBP’s Office

of Field Operations is not slated

to receive any additional agents,

even though the office is responsible

for inspecting trade and travel at

ports of entry. He noted an internal

DHS study showing that one additional

OFO agent would boost by

the national economy by millions

because the agent would help reduce

the amount of time needed to

inspect cargo containers.

While additional OFO agents also

run the same risk of corruption as

Taming the rising tide of

digital evidence

Continued from page 23

an investigation involving large

amounts of crowdsourced data.

Analyzing evidence:

putting the pieces together

Collecting digital evidence is just the

beginning. Today, crime recreations

can be very complex thanks in large

part to all of the different sources

of digital evidence, which could include

hours of video footage from

different CCTV cameras, audio recordings,

body-worn footage, interview

room recordings and so on. At

some point, digital evidence has to

be sorted and put into context based

on time sequence and location. An

investigator can spend grueling

hours manually sifting through evidence

and trying to make sense of it.

Another problem investigators

need to contend with is the large

range of video and audio formats,

their colleagues along the border,

“attention to ports of entry represents

an important policy alternative

to repeating the misplaced pattern

of Border Patrol and border

wall expansion,” Heyman said.

codecs and proprietary players. An

investigator might obtain a copy of

a CCTV video and bring it back to

the station, only to realize it can’t be

played back without a proprietary

player or codec. A forensic technician

could spend days trying to locate

the needed codec.

Digital investigation and evidence

management technology solves this

problem by automatically creating a

working copy of the video that can

be played on any standard PC, tablet

or smartphone browser (while

retaining the original). Investigators

can easily visualize the sequence

of events from multiple angles, for

example by combining video from

different CCTV cameras in chronological

sequence, along with bodyworn

camera video, in-car video,

and 911 and radio recordings.

Visualization tools enable the investigator

to assemble and visualize

these media files in meaningful

ways, for example on maps or timelines.

Sharing evidence: the hard way

or the easy way

After digital evidence is collected

and analyzed, investigators then

need to package it up for the prosecution.

This is where the process

gets even more labor intensive and

time consuming. Today, all of the

different pieces of digital evidence

– interview recordings, audio recordings,

photographs, in-car video,

documents, etc. – are typically

copied onto CDs, DVDs, or thumb

drives and hand delivered to the DA.

With new digital investigation and

evidence management technology,

evidence can now be securely shared

electronically. This means investigators

can spend less time copying and

transporting evidence, and focus

more of their time and attention on

solving cases. A built in audit trail

even tracks chain of custody to ensure

the integrity and admissibility

of digital evidence for court.

Crime-solving in the 21st century:

taming the rising tide of digital

evidence

Police departments everywhere are

investing in digital policing initiatives

to better safeguard the public,

and this is having an unintended

consequence. As paper silos are replaced

by digital silos it’s creating a

rising tide of digital evidence that

needs to be collected, analyzed and

shared. Digital investigation and evidence

management technology can

help police departments tame this

rising tide of digital evidence and

improve case solvability, while also

saving time, money and taxpayer

dollars.

42 43

Imperva executive urges U.S.

companies to evaluate pending EU

cyber regulation

Continued from page 37

(13 percent) and other regions (11

percent). To view the full survey results,

visit bit.ly/2p5kYkS.

About Imperva

Imperva® (NASDAQ: IMPV) is a

leading provider of cyber security

solutions that protect businesscritical

data and applications. The

company’s SecureSphere, Counter-

Breach, Incapsula and Camouflage

product lines enable organizations

to discover assets and risks, protect

information wherever it lives – in

the cloud and on-premises – and

comply with regulations. The Imperva

Defense Center, a research

team comprised of some of the

world’s leading experts in data and

application security, continually enhances

Imperva products with upto-the-minute

threat intelligence,

and publishes reports that provide

insight and guidance on the latest

threats and how to mitigate them.

Imperva is headquartered in Redwood

Shores, California. Learn

more: www.imperva.com, our blog

or on Twitter.


BeyondTrust survey links breaches

to aging federal infrastructure

Continued from page 35

based or risk profile.

• Unite threat intelligence from

multiple sources to better prioritize

risks across the environment

Since the asset risk-to-user privilege

risk pattern is a common attack

vector, deploy solutions that correlate

asset-based risk with user-based activity

to gain a more complete picture

of risks, gaining

needed prioritization

of the most

impactful risks. For

example, advanced

persistent threats

(APTs) can be analyzed

against privileged

password,

user, and account

activity, along with

asset characteristics

such as vulnerability

count, vulnerability level, attacks

detected, risk score, applications, services,

software and ports. Consuming

multiple data feeds from in-place solutions

into a single console can help

mitigate additional costs and reduce

complexity.

“The federal government is moving

to modernize its aging infrastructure,”

said Kevin Hickey, President

and CEO at BeyondTrust. “But that

takes time, and in the meantime, federal

systems face a real risk. These are

simple steps IT can take today to help

mitigate that risk.”

Federal Cyber-Security

Threat Survey Report

For more information on the 2017 US

Federal Government Security Survey,

please visit: https://beyondtrust.com/

aging-fed-it-risky.

About BeyondTrust

BeyondTrust is a global information

security software company that

helps organizations prevent cyber attacks

and unauthorized data access

due to privilege abuse. Our solutions

give you the visibility to

confidently reduce risks

and the control to take

proactive, informed action

against data breach

threats. And because

threats can come from

anywhere, we built a

platform that unifies the

most effective technologies

for addressing both

internal and external

risk: Privileged Access Management

and Vulnerability Management. Our

solutions grow with your needs, making

sure you maintain control no matter

where your company goes. BeyondTrust’s

security solutions are trusted

by over 4,000 customers worldwide,

including half of the Fortune 100. To

learn more about BeyondTrust, please

visit www.beyondtrust.com.

(ISC)² delivers cybersecurity

workforce recommendations to

White House

Continued from page 36

cyber workforce; our recommendations

reflect the importance of

building future cybersecurity policy

— including the pending executive

order — on the existing foundation.”

About (ISC)²

(ISC)² is an international nonprofit

membership association focused

on inspiring a safe and secure cyber

world. Best known for the acclaimed

Certified Information Systems Security

Professional (CISSP®) certification,

(ISC)2 offers a portfolio of

credentials that are part of a holistic,

programmatic approach to security.

Our membership, over 120,000

strong, is made up of certified cyber,

information, software and infrastructure

security professionals who

are making a difference and helping

to advance the industry. Our vision

is supported by our commitment to

educate and reach the general public

through our charitable foundation

– The Center for Cyber Safety

and EducationTM. For more information

on (ISC)², visit www.isc2.

org, follow us on Twitter or connect

with us on Facebook.

© 2017 (ISC)² Inc., (ISC)², CISSP, SSCP, CCSP, CAP,

CSSLP, HCISPP, CCFP, ISSAP, ISSEP, ISSMP and CBK

are registered marks, of (ISC)², Inc.

CEO/Editorial Director

Adrian Courtenay

917-696-5782

acourtenay@gsnmagazine.com

Editor

Steve Bittenbender

502-552-1450

sbittenbender@gsnmagazine.com

Senior Writer

Karen Ferrick-Roman

412-671-1456

karenferrickroman@gmail.com

Columnist

Shawn Campbell

Campbell on Crypto

shawn.campbell@safenetat.com

Columnist

George Lane

Hazmat Science & Public Policy

georgelane@hotmail.com

Contributing Author

Lloyd McCoy Jr

Immix Group

The News Leader in Physical, IT and Homeland Security

Contributing Author

Walter Ewing

Contributing Author

Wendy Feliz

Contributing Author

Joshua Breisblatt

Contributing Author

J. Michael Barrett

Contributing Author

Christopher Millar

Gatekeeper Security

Art Director

Gerry O’Hara, OHDesign3

gerry@ohd3.com

203-249-0626

Production Manager

Brenden Hitt

Brenden.hitt@gsnmagazine.com

Direct: 203-216-7798

COMING ATTRACTIONS

May

Special Reports:

Technology Focus

License Plate Detection,

Smart Vehicle Surveillance

Market Sector Focus

Maritime, Coastal, Port Security

FREE SUBSCRIPTION

SIGN-UP

Monthly Digital Edition

Airport/Seaport Newsletter

Daily Insider Newsletter

Cybersecurity Newsletter

CLICK HERE

44 45

More magazines by this user
Similar magazines