Government Security


Down to Earth

One of the first reactionary attempts to bolster security after 9/11 occurred at airports. Immediately after air service was reinstated, the public saw uniformed Marines armed with M-16s at every security checkpoint, concrete barriers at each entry point, security guards ransacking passengers’ luggage and, of course, taller fences going up around airfield perimeters. As with most things in life, an unexpected event usually generates an unexpected— and sometimes irrational— response. Such was the case with the nation’s aviation facilities.

A Boost at the Border

Mention border security, and you might imagine the intersection of two countries, or perhaps the border separating government facilities from private land. But border security also can be defined as perimeter security, which expands the concept to encompass walls, fences, roads and other perimeters around businesses, schools, prisons, utilities, research facilities, and other properties and buildings.

Data Mining E-Mail Can Spot Insider Threats In Organizations

A rapid way to spot insider threats from individuals within an organization such as a multinational company or military installation is reported in the current issue of the International Journal of Security and Networks.

DHS Furthers Advancement Of HSPD-12 Goals

The Department of Homeland Security (DHS) announced recently that it will further advance the department’s Homeland Security Presidential Directive-12 (HSPD-12) goals by awarding contracts to three companies.

FBI’s Next Generation Biometric System To Be Developed By Lockheed Martin

The Federal Bureau of Investigation recently awarded Lockheed Martin a 10-year, $1 billion contract to develop and maintain the Bureau's Next Generation Identification (NGI) system, a multi-modal, state-of-the-art biometrics system for use by state, local and federal authorities.

Proposed Standards Will Allow Government Agencies To Share Biometric Data

An interagency subcommittee of the White House's National Science and Technology Council (NSTC) issued a draft document recently that lists recommended standards to enable government agencies to easily share biometric data.

Law Professor: 24 Has Seeped Into National Debate On Antiterrorism Tactics

Sure, it's just a TV show, but a University of Iowa law professor says 24 can have real-world legal implications

DHS Increases Funding For REAL ID Grant Program, Extends Application Deadline

The Department of Homeland Security (DHS) recently announced an increase in the total amount of funding available for REAL ID implementation and an extension in the deadline for FY 2008 REAL ID Demonstration Grant Program applications.



Report: REAL ID Final Rule Enables States To Begin Work On Technologies For Compliance

The final rule for REAL ID compliance provides the necessary guidance for states to begin building systems and linking networks to fulfill the mandates of the 2005 legislation, according to a newly released report by INPUT.

FERC Approves New Reliability Standards For Cyber Security

The Federal Energy Regulatory Commission (FERC) recently approved eight new mandatory critical infrastructure protection (CIP) reliability standards to protect the nation’s bulk power system against potential disruptions from cyber security breaches.

DHS Assistant Secretary Garcia Honored With Cybercrime Fighter Award

McAfee Inc. recently presented the McAfee Cybercrime Fighter Award to Gregory T. Garcia, Assistant Secretary for Cyber Security and Communications at the Department of Homeland Security.

DHS Releases National Response Framework

The Department of Homeland Security recently released the National Response Framework, successor to the National Response Plan.

Learning From the Best

The average small-business owner may view the world of federal government contracts as an intimidating, mind-boggling realm dominated by huge corporations— with the promise of great financial success just out of reach. However, breaking into the federal government marketplace is a feat that can be accomplished by small private companies—and one that has been achieved by countless organizations, especially in recent years.

A Growing Threat

In the United States, people encounter a perpetual tradeoff between freedom and security. The nation depends on a complex system of critical infrastructures to maintain a high quality of life and the freedoms enjoyed every day. New threats to security have these organizations taking a second look at their vulnerabilities, however, scrambling to minimize disruption and to maintain the integrity of their operations. In the past, national security was perceived as the role of government. Today, Department of Homeland Security efforts to protect critical infrastructures from physical attack are a shared responsibility of the public and private sectors, as well as individual citizens.

Corrective Action

Correctional facility infrastructures are aging, inmate populations in the United States are increasing, and the cost of operating jails and prisons is growing twice as fast. Correctional facility officials know these facts all too well.

TSA Names Special Counselor

TSA recently announced the appointment of Kimberly Hubbard Walton as the assistant administrator for the Office of the Special Counselor (OSC).

Meeting the Mandates

The Department of Homeland Security’s publication of chemical facilities anti-terrorism (CFAT) standards has many chemical and petrochemical companies scrambling to develop security plans for their high-risk facilities. The continued post-9/11 threat of terrorism dictates urgency, and the DHS put teeth in the CFAT rules.

Gemalto VP Testifies on Privacy and Security of Government IDs

Gemalto's vice president urged DHS and congress to make privacy and data security the highest priorities in ID programs.

Company Joins DOD IT Team

SI International announced recently that it is a member of the KT Consulting team that has been awarded the IT Services, Program Support Services contract with DoD and WHS.

Federal Government To Spend $345 Million On Identity, Access Management In 2008

A recent report from INPUT projects the federal market for identity and access management to grow by 6.2 percent annually through 2012.

A Monumental Task

IT seems a shame to have to start yet another article on security with the words “in the aftermath of 9/11.” However, when it comes to protecting national monuments and treasures, the fact is security has had to change significantly in the past six years as a result of heightened terrorism concerns.

Safe and Sound

GOVERNMENT security has been the subject of unprecedented focus since 9/11. Before the attacks, advanced physical security was considered a necessary expenditure only for military facilities and key government installations in high-target areas around the world. Before 9/11, people were comfortable with security and confident terrorism would never touch the country directly on home soil.

Teaming Up

NAVIGATING the world of federal government contracts can be a head-spinning operation for even the most committed and headstrong business. But for many, working with the federal government, especially with the constantly growing Department of Homeland Security, is too big a proposition to pass up. With 183,000 employees and a budget of more than $42.7 billion in fiscal year 2007, DHS is the third-largest cabinet department in the federal government and a target for many companies to garner new business.

Fusion Frenzy

U.S. airports with one or more checkpoint areas, security officials have probably never thought of themselves as ID managers.

On Alert

SECURING the flow of oil from offshore platforms, land-based drilling rigs and pumping stations across miles of pipeline and infrastructure is a top priority for the government and the petroleum industry.

First-Class Upgrade

PROVIDING adequate airport security has become an ongoing debate of national importance after being plunged into a post-9/11 world. Who can forget the eerie sight of an empty sky during the immediate days following the infamous attack in the nation's history.

Homeland Security Insider

THE Transportation Security Administration is doing a good job protecting air travelers. Likewise, airport security managers are working hard to keep the public safe and to speed us through the facilities. Until recently, getting through airport security was technologically simple -- bags were run through an X-ray scanner while walking through a conventional metal detector.

Right On Track

SEPTEMBER 2006 marked the fifth anniversary of the Sept. 11, 2001, attacks on the World Trade Center, sparking widespread debate on whether the United States is any safer today than it was on that fateful day in 2001. Since 9/11, much has been done to promote greater vigilance of both foreign and homegrown terrorist activities. But until another successful or unsuccessful terrorist attack, the nation may never know the complete answer.

Flying High

NOWADAYS, it takes much more to have a safe flight, and airports are strengthening security to ensure passengers do travel safely.

The Last Word

SECURITY, a once seemingly mundane staple of American life, has seen a drastic reconstruction in recent years. In part, protecting utility infrastructures has sped to the forefront of the debate. Water, and its infrastructure for delivery, has been no exception.

The Magic Touch

THE fluctuating state of global migration, combined with international terrorism threats, make ID verification increasingly important at border crossings. According to Customs and Border Protection, in 2005, the United States had an average of 1.2 million visitors per day at the 314 land, air and seaports last year.

Homeland Security Insider

AFTER returning from a business trip earlier this week, I undertook the all too familiar task of sorting through mail, newspapers and magazines that had accumulated during my absence.

Take the Heat

THE security of critical infrastructure and facilities is vital in today's world. With recent advances in technology, there are more choices on how to protect facilities from crime, terrorism, sabotage and intruders.

A Door Wide Open

IN the last four and a half years, new government mandates for tighter physical security at critical infrastructure sites have led to significant strides in physical access control innovation.

Laying Down the Law

THE legal environment for small businesses has dramatically changed over the past few years, starting with the fraudulent activities of companies, such as Enron, along with the rash of high profile information thefts at Choicepoint and Lexis-Nexis.

The Network Sweet Spot

THE shelves in the Wi-Fi network candy store are filling up with the newest products fresh from the factory.

A Chemical Reaction

OVER the past several years, changes in EPA regulations have made it more difficult for manufacturing companies to stock large amounts of raw material for production, leading to the use of chemical storage facilities.

Featured

  • Maximizing Your Security Budget This Year

    The Importance of Proactive Security Measures: 4 Stories of Regret

    We all want to believe that crime won’t happen to us. So, some business owners hope for the best and put proactive security measures on the back burner, because other things like growth, attracting new customers, and meeting deadlines all seem more pressing. Read Now

  • Today's Enterprise

    Protecting servers and data has evolved rapidly over the past 15-plus years. Early on, concerns centered around the environmental conditions of where servers were housed within a building and the effects of humidity, temperature and air quality on their performance. This led to a better understanding of the need for a controlled environment to maximize equipment lifespan and capacity. It was also a driving force behind consolidating servers in a common space, i.e., the data center. Read Now

  • Study Proves It: Security Awareness Training Reduces Phishing Attacks

    Attackers are increasingly targeting human-based vulnerabilities to infiltrate organizations. Humans have direct access to insider systems and data – any threat actor can easily phish users, steal their credentials and secure keys to the kingdom without having to fight advanced cybersecurity defenses. Studies show social engineering attacks and human errors are behind 68% of all breaches.  Read Now

  • Security Questions Persist After Attempted Assassination Attempt of Donald Trump

Webinars

New Products

  • Mobile Safe Shield

    Mobile Safe Shield

    SafeWood Designs, Inc., a manufacturer of patented bullet resistant products, is excited to announce the launch of the Mobile Safe Shield. The Mobile Safe Shield is a moveable bullet resistant shield that provides protection in the event of an assailant and supplies cover in the event of an active shooter. With a heavy-duty steel frame, quality castor wheels, and bullet resistant core, the Mobile Safe Shield is a perfect addition to any guard station, security desks, courthouses, police stations, schools, office spaces and more. The Mobile Safe Shield is incredibly customizable. Bullet resistant materials are available in UL 752 Levels 1 through 8 and include glass, white board, tack board, veneer, and plastic laminate. Flexibility in bullet resistant materials allows for the Mobile Safe Shield to blend more with current interior décor for a seamless design aesthetic. Optional custom paint colors are also available for the steel frame. 3

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions. 3

  • Camden CM-221 Series Switches

    Camden CM-221 Series Switches

    Camden Door Controls is pleased to announce that, in response to soaring customer demand, it has expanded its range of ValueWave™ no-touch switches to include a narrow (slimline) version with manual override. This override button is designed to provide additional assurance that the request to exit switch will open a door, even if the no-touch sensor fails to operate. This new slimline switch also features a heavy gauge stainless steel faceplate, a red/green illuminated light ring, and is IP65 rated, making it ideal for indoor or outdoor use as part of an automatic door or access control system. ValueWave™ no-touch switches are designed for easy installation and trouble-free service in high traffic applications. In addition to this narrow version, the CM-221 & CM-222 Series switches are available in a range of other models with single and double gang heavy-gauge stainless steel faceplates and include illuminated light rings. 3