Government Security

SIA Calls for Greater Collaboration To Improve HSPD-12 Implementation

In recent testimony before the U.S. House Subcommittee on Government Management, Organization and Procurement, Rob Zivney called implementation of HSPD-12 a pioneering effort which will require both a financial investment and development of new infrastructure.

Ready for Takeoff

When hurricanes in 2005 leveled the Charlotte County Airport in Punta Gorda, Fla., airport officials chose to rebuild, and to do so stronger and smarter. That meant making sure the airport’s security system satisfied federal and state regulations in a post-9/11 world that had to protect against potential terrorists turning airplanes into deadly bombs.

The Fight for Immigration Reform

Immigration is one of those controversial issues that touch on many aspects of American life. It's challenging because on one hand, there are those who come to the United States to seek a better life. But in doing so, they are breaking the law. Three people believe they have the answers to resolve this issue, and oddly enough, all three want to be president of the United States.

Second National Fusion Center Conference Fosters Greater Collaboration

More than 900 federal, state and local law enforcement and homeland security officials recently attended the National Fusion Center Conference in Washington, D.C. to further the U.S. government’s plans to create a seamless network of these centers.

United States, Germany Agree To Share Fingerprint Databases, Information On Terrorists

Officials from the United States and Germany recently initialed a bilateral agreement related to sharing access to biometric data and spontaneous sharing of data about known and suspected terrorists.

DHS Conducts Cyber Storm II To Examine Preparedness, Response Capabilities

Cyber Storm II is the second in a series of congressionally mandated exercises that will examine the nation’s cyber security preparedness and response capabilities. The exercise will simulate a coordinated cyber attack on information technology, communications, chemical, and transportation systems and assets.

ASSE, ASIS Join Brady Center Against Oklahoma Guns-at-Work Law

The associations joined in an amicus brief urging the 10th Circuit Court of Appeals to agree that the Oklahoma statute, by forcing employers to allow guns such as this Beretta, runs afoul of the General Duty Clause.

Down to Earth

One of the first reactionary attempts to bolster security after 9/11 occurred at airports. Immediately after air service was reinstated, the public saw uniformed Marines armed with M-16s at every security checkpoint, concrete barriers at each entry point, security guards ransacking passengers’ luggage and, of course, taller fences going up around airfield perimeters. As with most things in life, an unexpected event usually generates an unexpected— and sometimes irrational— response. Such was the case with the nation’s aviation facilities.

A Boost at the Border

Mention border security, and you might imagine the intersection of two countries, or perhaps the border separating government facilities from private land. But border security also can be defined as perimeter security, which expands the concept to encompass walls, fences, roads and other perimeters around businesses, schools, prisons, utilities, research facilities, and other properties and buildings.

Data Mining E-Mail Can Spot Insider Threats In Organizations

A rapid way to spot insider threats from individuals within an organization such as a multinational company or military installation is reported in the current issue of the International Journal of Security and Networks.

DHS Furthers Advancement Of HSPD-12 Goals

The Department of Homeland Security (DHS) announced recently that it will further advance the department’s Homeland Security Presidential Directive-12 (HSPD-12) goals by awarding contracts to three companies.

FBI’s Next Generation Biometric System To Be Developed By Lockheed Martin

The Federal Bureau of Investigation recently awarded Lockheed Martin a 10-year, $1 billion contract to develop and maintain the Bureau's Next Generation Identification (NGI) system, a multi-modal, state-of-the-art biometrics system for use by state, local and federal authorities.

Proposed Standards Will Allow Government Agencies To Share Biometric Data

An interagency subcommittee of the White House's National Science and Technology Council (NSTC) issued a draft document recently that lists recommended standards to enable government agencies to easily share biometric data.

Law Professor: 24 Has Seeped Into National Debate On Antiterrorism Tactics

Sure, it's just a TV show, but a University of Iowa law professor says 24 can have real-world legal implications

DHS Increases Funding For REAL ID Grant Program, Extends Application Deadline

The Department of Homeland Security (DHS) recently announced an increase in the total amount of funding available for REAL ID implementation and an extension in the deadline for FY 2008 REAL ID Demonstration Grant Program applications.

FERC Approves New Reliability Standards For Cyber Security

The Federal Energy Regulatory Commission (FERC) recently approved eight new mandatory critical infrastructure protection (CIP) reliability standards to protect the nation’s bulk power system against potential disruptions from cyber security breaches.

Report: REAL ID Final Rule Enables States To Begin Work On Technologies For Compliance

The final rule for REAL ID compliance provides the necessary guidance for states to begin building systems and linking networks to fulfill the mandates of the 2005 legislation, according to a newly released report by INPUT.

DHS Assistant Secretary Garcia Honored With Cybercrime Fighter Award

McAfee Inc. recently presented the McAfee Cybercrime Fighter Award to Gregory T. Garcia, Assistant Secretary for Cyber Security and Communications at the Department of Homeland Security.

DHS Releases National Response Framework

The Department of Homeland Security recently released the National Response Framework, successor to the National Response Plan.

Learning From the Best

The average small-business owner may view the world of federal government contracts as an intimidating, mind-boggling realm dominated by huge corporations— with the promise of great financial success just out of reach. However, breaking into the federal government marketplace is a feat that can be accomplished by small private companies—and one that has been achieved by countless organizations, especially in recent years.

A Growing Threat

In the United States, people encounter a perpetual tradeoff between freedom and security. The nation depends on a complex system of critical infrastructures to maintain a high quality of life and the freedoms enjoyed every day. New threats to security have these organizations taking a second look at their vulnerabilities, however, scrambling to minimize disruption and to maintain the integrity of their operations. In the past, national security was perceived as the role of government. Today, Department of Homeland Security efforts to protect critical infrastructures from physical attack are a shared responsibility of the public and private sectors, as well as individual citizens.

Corrective Action

Correctional facility infrastructures are aging, inmate populations in the United States are increasing, and the cost of operating jails and prisons is growing twice as fast. Correctional facility officials know these facts all too well.

TSA Names Special Counselor

TSA recently announced the appointment of Kimberly Hubbard Walton as the assistant administrator for the Office of the Special Counselor (OSC).

Meeting the Mandates

The Department of Homeland Security’s publication of chemical facilities anti-terrorism (CFAT) standards has many chemical and petrochemical companies scrambling to develop security plans for their high-risk facilities. The continued post-9/11 threat of terrorism dictates urgency, and the DHS put teeth in the CFAT rules.

Gemalto VP Testifies on Privacy and Security of Government IDs

Gemalto's vice president urged DHS and congress to make privacy and data security the highest priorities in ID programs.

Company Joins DOD IT Team

SI International announced recently that it is a member of the KT Consulting team that has been awarded the IT Services, Program Support Services contract with DoD and WHS.

Federal Government To Spend $345 Million On Identity, Access Management In 2008

A recent report from INPUT projects the federal market for identity and access management to grow by 6.2 percent annually through 2012.

A Monumental Task

IT seems a shame to have to start yet another article on security with the words “in the aftermath of 9/11.” However, when it comes to protecting national monuments and treasures, the fact is security has had to change significantly in the past six years as a result of heightened terrorism concerns.

Safe and Sound

GOVERNMENT security has been the subject of unprecedented focus since 9/11. Before the attacks, advanced physical security was considered a necessary expenditure only for military facilities and key government installations in high-target areas around the world. Before 9/11, people were comfortable with security and confident terrorism would never touch the country directly on home soil.

Teaming Up

NAVIGATING the world of federal government contracts can be a head-spinning operation for even the most committed and headstrong business. But for many, working with the federal government, especially with the constantly growing Department of Homeland Security, is too big a proposition to pass up. With 183,000 employees and a budget of more than $42.7 billion in fiscal year 2007, DHS is the third-largest cabinet department in the federal government and a target for many companies to garner new business.

On Alert

SECURING the flow of oil from offshore platforms, land-based drilling rigs and pumping stations across miles of pipeline and infrastructure is a top priority for the government and the petroleum industry.

Fusion Frenzy

U.S. airports with one or more checkpoint areas, security officials have probably never thought of themselves as ID managers.

First-Class Upgrade

PROVIDING adequate airport security has become an ongoing debate of national importance after being plunged into a post-9/11 world. Who can forget the eerie sight of an empty sky during the immediate days following the infamous attack in the nation's history.

Homeland Security Insider

THE Transportation Security Administration is doing a good job protecting air travelers. Likewise, airport security managers are working hard to keep the public safe and to speed us through the facilities. Until recently, getting through airport security was technologically simple -- bags were run through an X-ray scanner while walking through a conventional metal detector.

Right On Track

SEPTEMBER 2006 marked the fifth anniversary of the Sept. 11, 2001, attacks on the World Trade Center, sparking widespread debate on whether the United States is any safer today than it was on that fateful day in 2001. Since 9/11, much has been done to promote greater vigilance of both foreign and homegrown terrorist activities. But until another successful or unsuccessful terrorist attack, the nation may never know the complete answer.

Flying High

NOWADAYS, it takes much more to have a safe flight, and airports are strengthening security to ensure passengers do travel safely.

The Last Word

SECURITY, a once seemingly mundane staple of American life, has seen a drastic reconstruction in recent years. In part, protecting utility infrastructures has sped to the forefront of the debate. Water, and its infrastructure for delivery, has been no exception.

The Magic Touch

THE fluctuating state of global migration, combined with international terrorism threats, make ID verification increasingly important at border crossings. According to Customs and Border Protection, in 2005, the United States had an average of 1.2 million visitors per day at the 314 land, air and seaports last year.

Homeland Security Insider

AFTER returning from a business trip earlier this week, I undertook the all too familiar task of sorting through mail, newspapers and magazines that had accumulated during my absence.

Take the Heat

THE security of critical infrastructure and facilities is vital in today's world. With recent advances in technology, there are more choices on how to protect facilities from crime, terrorism, sabotage and intruders.

A Door Wide Open

IN the last four and a half years, new government mandates for tighter physical security at critical infrastructure sites have led to significant strides in physical access control innovation.

Laying Down the Law

THE legal environment for small businesses has dramatically changed over the past few years, starting with the fraudulent activities of companies, such as Enron, along with the rash of high profile information thefts at Choicepoint and Lexis-Nexis.

The Network Sweet Spot

THE shelves in the Wi-Fi network candy store are filling up with the newest products fresh from the factory.

A Chemical Reaction

OVER the past several years, changes in EPA regulations have made it more difficult for manufacturing companies to stock large amounts of raw material for production, leading to the use of chemical storage facilities.


  • 12 Commercial Crime Sites to Do Your Research

    12 Commercial Crime Sites to Do Your Research

    Understanding crime statistics in your industry and area is crucial for making important decisions about your security budget. With so much information out there, how can you know which statistics to trust? Read Now

  • Boosting Safety and Efficiency

    Boosting Safety and Efficiency

    In alignment with the state of Mississippi’s mission of “Empowering Mississippi citizens to stay connected and engaged with their government,” Salient's CompleteView VMS is being installed throughout more than 150 state boards, commissions and agencies in order to ensure safety for thousands of constituents who access state services daily. Read Now

  • Live From GSX: Post-Show Review

    Live From GSX: Post-Show Review

    This year’s Live From GSX program was a rousing success! Again, we’d like to thank our partners, and IPVideo, for working with us and letting us broadcast their solutions to the industry. You can follow our Live From GSX 2023 page to keep up with post-show developments and announcements. And if you’re interested in working with us in 2024, please don’t hesitate to ask about our Live From programs for ISC West in March or next year’s GSX. Read Now

    • Industry Events
    • GSX
  • People Say the Funniest Things

    People Say the Funniest Things

    By all accounts, GSX version 2023 was completely successful. Apparently, there were plenty of mix-ups with the airlines and getting aircraft from the East Coast into Big D. I am all ears when I am in a gathering of people. You never know when a nugget of information might flip out. Read Now

    • Industry Events
    • GSX


New Products

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure. 3

  • PE80 Series

    PE80 Series by SARGENT / ED4000/PED5000 Series by Corbin Russwin

    ASSA ABLOY, a global leader in access solutions, has announced the launch of two next generation exit devices from long-standing leaders in the premium exit device market: the PE80 Series by SARGENT and the PED4000/PED5000 Series by Corbin Russwin. These new exit devices boast industry-first features that are specifically designed to provide enhanced safety, security and convenience, setting new standards for exit solutions. The SARGENT PE80 and Corbin Russwin PED4000/PED5000 Series exit devices are engineered to meet the ever-evolving needs of modern buildings. Featuring the high strength, security and durability that ASSA ABLOY is known for, the new exit devices deliver several innovative, industry-first features in addition to elegant design finishes for every opening. 3

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions. 3