A Market Where Even the Tomatoes Need Security Clearance

A Market Where Even the Tomatoes Need Security Clearance

I think there’s hardly anything better than cold, fresh fruit and vegetables on a hot summer day from the local farmer’s market. I usually get up early, when the sun has just barely peeked out to introduce a new day and head to the market to engage my senses and buy pieces of nature’s bounty. Even NSA employees love a good market as they dreamed up the concept of their very own NSA Farmer’s Market.

Beginning last year as an alternative to the on-site cafeteria, NSA’s market launched with just a few local food producers and was held every Friday starting in spring until November. It was a huge success, so this year, NSA’s market was brought back again, this time even closer to the main building.

Can you imagine what type of security clearance you would need to become a vendor at NSA’s market? I would imagine a pretty high one.

Vendors can’t simply fill out an application as most are based on employee recommendations and receive an email invitation. The initial screening process requires vendors to give their place of birth, birthday, Social Security number and vehicle details. Once cleared, vendors must schedule in about 30 extra minutes on the day of the market to pass through two security checkpoints. Trained K-9s smell coolers and inspect vehicles for anything suspicious while refusing to gobble down treats being transported in. I’d say that takes some major restraint, especially since one of the vendors sells freshly-baked cupcakes!

NSA’s Farmer’s Market gives employees a chance to mingle across departments and become better acquainted as an agency. Even some of the vendors have befriended NSA employees but they must be careful how they interact outside the protective confines of the market. It’s okay to say something like, “It was great seeing you on Friday,” but the “where” must be left out.

Of the 10,000+ on-site employees, it is estimated that more than 1,000 visit the market every Friday.

About the Author

Ginger Hill is Group Social Media Manager.

Featured

  • Guiding Principles

    Construction sites represent a unique sector of perimeter security, especially amidst a steady increase in commercial construction. As in any security environment, assessing weaknesses and threats remains paramount and modern technology, coupled with sound access control principles, are critical in addressing vulnerabilities at even the most secure construction sites around the world. Read Now

  • Empowering 911

    In the wake of the tragic murder of UnitedHealth Group CEO Brian Thompson, media coverage flooded the airwaves with images, videos and detailed timelines of the suspect’s movements. While such post-incident analysis is not new, today’s 911 centers now have access to similar data in real-time. This technological evolution marks a pivotal transformation in emergency response, transitioning from analog calls to a digital ecosystem capable of saving more lives. Read Now

  • Security Industry Embraces Mobile Credentials, Biometrics and AI, New Trends Report From HID Finds

    As organizations navigate an increasingly complex threat landscape, security leaders are making strategic shifts toward unified platforms and emerging technologies, according to the newly released 2025 State of Security and Identity Report from HID. The comprehensive study gathered responses from 1,800 partners, end users, and security and IT personnel worldwide, and reveals a significant transformation in how businesses are approaching security, with mobile credentials and artificial intelligence emerging as key drivers of innovation. Read Now

  • UK’s NHS Hospital Transforms Security with Edge-processing Camera System

    i-PRO Co., Ltd.,(formerly Panasonic Security), a manufacturer of edge computing cameras for security and public safety, recently announced that a leading teaching hospital in Northeast England, has enhanced its security infrastructure with i-PRO X-Series cameras integrated with Milestone’s XProtect Video Management Software (VMS). Read Now

New Products

  • Mobile Safe Shield

    Mobile Safe Shield

    SafeWood Designs, Inc., a manufacturer of patented bullet resistant products, is excited to announce the launch of the Mobile Safe Shield. The Mobile Safe Shield is a moveable bullet resistant shield that provides protection in the event of an assailant and supplies cover in the event of an active shooter. With a heavy-duty steel frame, quality castor wheels, and bullet resistant core, the Mobile Safe Shield is a perfect addition to any guard station, security desks, courthouses, police stations, schools, office spaces and more. The Mobile Safe Shield is incredibly customizable. Bullet resistant materials are available in UL 752 Levels 1 through 8 and include glass, white board, tack board, veneer, and plastic laminate. Flexibility in bullet resistant materials allows for the Mobile Safe Shield to blend more with current interior décor for a seamless design aesthetic. Optional custom paint colors are also available for the steel frame.

  • ComNet CNGE6FX2TX4PoE

    The ComNet cost-efficient CNGE6FX2TX4PoE is a six-port switch that offers four Gbps TX ports that support the IEEE802.3at standard and provide up to 30 watts of PoE to PDs. It also has a dedicated FX/TX combination port as well as a single FX SFP to act as an additional port or an uplink port, giving the user additional options in managing network traffic. The CNGE6FX2TX4PoE is designed for use in unconditioned environments and typically used in perimeter surveillance.

  • Hanwha QNO-7012R

    Hanwha QNO-7012R

    The Q Series cameras are equipped with an Open Platform chipset for easy and seamless integration with third-party systems and solutions, and analog video output (CVBS) support for easy camera positioning during installation. A suite of on-board intelligent video analytics covers tampering, directional/virtual line detection, defocus detection, enter/exit, and motion detection.