Government Security


SIA Calls for Greater Collaboration To Improve HSPD-12 Implementation

In recent testimony before the U.S. House Subcommittee on Government Management, Organization and Procurement, Rob Zivney called implementation of HSPD-12 a pioneering effort which will require both a financial investment and development of new infrastructure.

Ready for Takeoff

When hurricanes in 2005 leveled the Charlotte County Airport in Punta Gorda, Fla., airport officials chose to rebuild, and to do so stronger and smarter. That meant making sure the airport’s security system satisfied federal and state regulations in a post-9/11 world that had to protect against potential terrorists turning airplanes into deadly bombs.

The Fight for Immigration Reform

Immigration is one of those controversial issues that touch on many aspects of American life. It's challenging because on one hand, there are those who come to the United States to seek a better life. But in doing so, they are breaking the law. Three people believe they have the answers to resolve this issue, and oddly enough, all three want to be president of the United States.

Second National Fusion Center Conference Fosters Greater Collaboration

More than 900 federal, state and local law enforcement and homeland security officials recently attended the National Fusion Center Conference in Washington, D.C. to further the U.S. government’s plans to create a seamless network of these centers.

United States, Germany Agree To Share Fingerprint Databases, Information On Terrorists

Officials from the United States and Germany recently initialed a bilateral agreement related to sharing access to biometric data and spontaneous sharing of data about known and suspected terrorists.

DHS Conducts Cyber Storm II To Examine Preparedness, Response Capabilities

Cyber Storm II is the second in a series of congressionally mandated exercises that will examine the nation’s cyber security preparedness and response capabilities. The exercise will simulate a coordinated cyber attack on information technology, communications, chemical, and transportation systems and assets.

ASSE, ASIS Join Brady Center Against Oklahoma Guns-at-Work Law

The associations joined in an amicus brief urging the 10th Circuit Court of Appeals to agree that the Oklahoma statute, by forcing employers to allow guns such as this Beretta, runs afoul of the General Duty Clause.

Down to Earth

One of the first reactionary attempts to bolster security after 9/11 occurred at airports. Immediately after air service was reinstated, the public saw uniformed Marines armed with M-16s at every security checkpoint, concrete barriers at each entry point, security guards ransacking passengers’ luggage and, of course, taller fences going up around airfield perimeters. As with most things in life, an unexpected event usually generates an unexpected— and sometimes irrational— response. Such was the case with the nation’s aviation facilities.



A Boost at the Border

Mention border security, and you might imagine the intersection of two countries, or perhaps the border separating government facilities from private land. But border security also can be defined as perimeter security, which expands the concept to encompass walls, fences, roads and other perimeters around businesses, schools, prisons, utilities, research facilities, and other properties and buildings.

Data Mining E-Mail Can Spot Insider Threats In Organizations

A rapid way to spot insider threats from individuals within an organization such as a multinational company or military installation is reported in the current issue of the International Journal of Security and Networks.

DHS Furthers Advancement Of HSPD-12 Goals

The Department of Homeland Security (DHS) announced recently that it will further advance the department’s Homeland Security Presidential Directive-12 (HSPD-12) goals by awarding contracts to three companies.

FBI’s Next Generation Biometric System To Be Developed By Lockheed Martin

The Federal Bureau of Investigation recently awarded Lockheed Martin a 10-year, $1 billion contract to develop and maintain the Bureau's Next Generation Identification (NGI) system, a multi-modal, state-of-the-art biometrics system for use by state, local and federal authorities.

Proposed Standards Will Allow Government Agencies To Share Biometric Data

An interagency subcommittee of the White House's National Science and Technology Council (NSTC) issued a draft document recently that lists recommended standards to enable government agencies to easily share biometric data.

Law Professor: 24 Has Seeped Into National Debate On Antiterrorism Tactics

Sure, it's just a TV show, but a University of Iowa law professor says 24 can have real-world legal implications

DHS Increases Funding For REAL ID Grant Program, Extends Application Deadline

The Department of Homeland Security (DHS) recently announced an increase in the total amount of funding available for REAL ID implementation and an extension in the deadline for FY 2008 REAL ID Demonstration Grant Program applications.

Report: REAL ID Final Rule Enables States To Begin Work On Technologies For Compliance

The final rule for REAL ID compliance provides the necessary guidance for states to begin building systems and linking networks to fulfill the mandates of the 2005 legislation, according to a newly released report by INPUT.

FERC Approves New Reliability Standards For Cyber Security

The Federal Energy Regulatory Commission (FERC) recently approved eight new mandatory critical infrastructure protection (CIP) reliability standards to protect the nation’s bulk power system against potential disruptions from cyber security breaches.

DHS Assistant Secretary Garcia Honored With Cybercrime Fighter Award

McAfee Inc. recently presented the McAfee Cybercrime Fighter Award to Gregory T. Garcia, Assistant Secretary for Cyber Security and Communications at the Department of Homeland Security.

DHS Releases National Response Framework

The Department of Homeland Security recently released the National Response Framework, successor to the National Response Plan.

Learning From the Best

The average small-business owner may view the world of federal government contracts as an intimidating, mind-boggling realm dominated by huge corporations— with the promise of great financial success just out of reach. However, breaking into the federal government marketplace is a feat that can be accomplished by small private companies—and one that has been achieved by countless organizations, especially in recent years.

A Growing Threat

In the United States, people encounter a perpetual tradeoff between freedom and security. The nation depends on a complex system of critical infrastructures to maintain a high quality of life and the freedoms enjoyed every day. New threats to security have these organizations taking a second look at their vulnerabilities, however, scrambling to minimize disruption and to maintain the integrity of their operations. In the past, national security was perceived as the role of government. Today, Department of Homeland Security efforts to protect critical infrastructures from physical attack are a shared responsibility of the public and private sectors, as well as individual citizens.

Corrective Action

Correctional facility infrastructures are aging, inmate populations in the United States are increasing, and the cost of operating jails and prisons is growing twice as fast. Correctional facility officials know these facts all too well.

TSA Names Special Counselor

TSA recently announced the appointment of Kimberly Hubbard Walton as the assistant administrator for the Office of the Special Counselor (OSC).

Meeting the Mandates

The Department of Homeland Security’s publication of chemical facilities anti-terrorism (CFAT) standards has many chemical and petrochemical companies scrambling to develop security plans for their high-risk facilities. The continued post-9/11 threat of terrorism dictates urgency, and the DHS put teeth in the CFAT rules.

Gemalto VP Testifies on Privacy and Security of Government IDs

Gemalto's vice president urged DHS and congress to make privacy and data security the highest priorities in ID programs.

Company Joins DOD IT Team

SI International announced recently that it is a member of the KT Consulting team that has been awarded the IT Services, Program Support Services contract with DoD and WHS.

Federal Government To Spend $345 Million On Identity, Access Management In 2008

A recent report from INPUT projects the federal market for identity and access management to grow by 6.2 percent annually through 2012.

A Monumental Task

IT seems a shame to have to start yet another article on security with the words “in the aftermath of 9/11.” However, when it comes to protecting national monuments and treasures, the fact is security has had to change significantly in the past six years as a result of heightened terrorism concerns.

Safe and Sound

GOVERNMENT security has been the subject of unprecedented focus since 9/11. Before the attacks, advanced physical security was considered a necessary expenditure only for military facilities and key government installations in high-target areas around the world. Before 9/11, people were comfortable with security and confident terrorism would never touch the country directly on home soil.

Teaming Up

NAVIGATING the world of federal government contracts can be a head-spinning operation for even the most committed and headstrong business. But for many, working with the federal government, especially with the constantly growing Department of Homeland Security, is too big a proposition to pass up. With 183,000 employees and a budget of more than $42.7 billion in fiscal year 2007, DHS is the third-largest cabinet department in the federal government and a target for many companies to garner new business.

Fusion Frenzy

U.S. airports with one or more checkpoint areas, security officials have probably never thought of themselves as ID managers.

On Alert

SECURING the flow of oil from offshore platforms, land-based drilling rigs and pumping stations across miles of pipeline and infrastructure is a top priority for the government and the petroleum industry.

First-Class Upgrade

PROVIDING adequate airport security has become an ongoing debate of national importance after being plunged into a post-9/11 world. Who can forget the eerie sight of an empty sky during the immediate days following the infamous attack in the nation's history.

Homeland Security Insider

THE Transportation Security Administration is doing a good job protecting air travelers. Likewise, airport security managers are working hard to keep the public safe and to speed us through the facilities. Until recently, getting through airport security was technologically simple -- bags were run through an X-ray scanner while walking through a conventional metal detector.

Right On Track

SEPTEMBER 2006 marked the fifth anniversary of the Sept. 11, 2001, attacks on the World Trade Center, sparking widespread debate on whether the United States is any safer today than it was on that fateful day in 2001. Since 9/11, much has been done to promote greater vigilance of both foreign and homegrown terrorist activities. But until another successful or unsuccessful terrorist attack, the nation may never know the complete answer.

Flying High

NOWADAYS, it takes much more to have a safe flight, and airports are strengthening security to ensure passengers do travel safely.

The Last Word

SECURITY, a once seemingly mundane staple of American life, has seen a drastic reconstruction in recent years. In part, protecting utility infrastructures has sped to the forefront of the debate. Water, and its infrastructure for delivery, has been no exception.

The Magic Touch

THE fluctuating state of global migration, combined with international terrorism threats, make ID verification increasingly important at border crossings. According to Customs and Border Protection, in 2005, the United States had an average of 1.2 million visitors per day at the 314 land, air and seaports last year.

Homeland Security Insider

AFTER returning from a business trip earlier this week, I undertook the all too familiar task of sorting through mail, newspapers and magazines that had accumulated during my absence.

Take the Heat

THE security of critical infrastructure and facilities is vital in today's world. With recent advances in technology, there are more choices on how to protect facilities from crime, terrorism, sabotage and intruders.

A Door Wide Open

IN the last four and a half years, new government mandates for tighter physical security at critical infrastructure sites have led to significant strides in physical access control innovation.

Laying Down the Law

THE legal environment for small businesses has dramatically changed over the past few years, starting with the fraudulent activities of companies, such as Enron, along with the rash of high profile information thefts at Choicepoint and Lexis-Nexis.

The Network Sweet Spot

THE shelves in the Wi-Fi network candy store are filling up with the newest products fresh from the factory.

A Chemical Reaction

OVER the past several years, changes in EPA regulations have made it more difficult for manufacturing companies to stock large amounts of raw material for production, leading to the use of chemical storage facilities.

Featured

  • Gaining a Competitive Edge

    Ask most companies about their future technology plans and the answers will most likely include AI. Then ask how they plan to deploy it, and that is where the responses may start to vary. Every company has unique surveillance requirements that are based on market focus, scale, scope, risk tolerance, geographic area and, of course, budget. Those factors all play a role in deciding how to configure a surveillance system, and how to effectively implement technologies like AI. Read Now

  • 6 Ways Security Awareness Training Empowers Human Risk Management

    Organizations are realizing that their greatest vulnerability often comes from within – their own people. Human error remains a significant factor in cybersecurity breaches, making it imperative for organizations to address human risk effectively. As a result, security awareness training (SAT) has emerged as a cornerstone in this endeavor because it offers a multifaceted approach to managing human risk. Read Now

  • The Stage is Set

    The security industry spans the entire globe, with manufacturers, developers and suppliers on every continent (well, almost—sorry, Antarctica). That means when regulations pop up in one area, they often have a ripple effect that impacts the entire supply chain. Recent data privacy regulations like GDPR in Europe and CPRA in California made waves when they first went into effect, forcing businesses to change the way they approach data collection and storage to continue operating in those markets. Even highly specific regulations like the U.S.’s National Defense Authorization Act (NDAA) can have international reverberations – and this growing volume of legislation has continued to affect global supply chains in a variety of different ways. Read Now

  • Access Control Technology

    As we move swiftly toward the end of 2024, the security industry is looking at the trends in play, what might be on the horizon, and how they will impact business opportunities and projections. Read Now

Webinars

New Products

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file. 3

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis. 3

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure. 3