Homeland Security


ID'ed Indeed

NATIONAL identification cards were being promoted long before the terrorist attacks of Sept. 11, 2001, as a means to identify potential terrorists, curb illegal immigration and thwart criminal activity. Countries around the world are already using national ID cards. Singapore recently implemented Singapore Personal Access, or “SingPass,” an ID used for e-government services. Germany uses an encrypted biometric national ID. Malaysia established “Mykad,” a universal-purpose ID card, and no less than a dozen other countries have issued contracts to develop the infrastructure to support a national ID card.



Securing the Friendly Skies

ANYWHERE in the world, most security and intelligence officers will agree that transportation security is about managing risk. It's about detecting potential threats as early as possible, reacting appropriately and mitigating the ripple effects, all the while focusing on simplifying travel for billions of passengers who do not warrant concern.

Protecting Mobility

FROM Barcelona to Berlin and all across Europe, workers today need to access corporate information outside the workplace. Remote access frees workers from the restrictions of the corporate work environment. By working from any location and at any time, employees can collaborate more effectively, work more efficiently and ultimately be much more productive.

Going With the Flow

Closing the Loop

THE security industry has a long and proud history of working side by side with the government to develop new technologies that result in an improved way of life for Americans. While commercial security products and practices have deep affiliation with both government applications, military and non-military, a new breed of security concerns gave birth to new security requirements and solutions–especially those pertaining to border control.

All Eyes on the Road

A heightened sense of awareness of threats that face the United States has placed ongoing pressure at a national, state and local level to keep citizens safe from terrorism, as well as natural disasters and other unplanned events.

Homeland Security Insider

A few hours after taking control of Congress and following 12 years of Republican dominance, House Democrats announced a plan they say will strengthen homeland security. Accusing Republicans of neglect, Democrats on the Homeland Security Committee say their plan will implement the unfinished 9/11 Commission recommendations; require private companies to prepare for terrorism; require the government to inspect cargo on passenger planes; and require all cargo containers carried on ships to be scanned and sealed before leaving for an American port.

Visit with the Shrink

TO a significant extent, shrink can be predicted and tamed with targeted security resources, institutional awareness and effective, operationally feasible countermeasures. In statistical analysis, the goal is to explain variation and to determine what part of that variation is systematic and predictable.

Teaming Up

NAVIGATING the world of federal government contracts can be a head-spinning operation for even the most committed and headstrong business. But for many, working with the federal government, especially with the constantly growing Department of Homeland Security, is too big a proposition to pass up. With 183,000 employees and a budget of more than $42.7 billion in fiscal year 2007, DHS is the third-largest cabinet department in the federal government and a target for many companies to garner new business.

Homeland Security Insider

FOUR years in the making, the drive to implement HSPD-12 at long last began by issuing smart identification cards last October. Every federal agency has now opened at least one facility where employees can go to get personal identification verification (PIV) cards fitted to the strict criteria of FIPS 201. This year, federal agencies will begin to activate a massive interoperable system of card readers in which any agency's readers will be able to read and process cards presented by any and all federal employees -- no matter what agency employs them.

Fusion Frenzy

U.S. airports with one or more checkpoint areas, security officials have probably never thought of themselves as ID managers.

On Alert

SECURING the flow of oil from offshore platforms, land-based drilling rigs and pumping stations across miles of pipeline and infrastructure is a top priority for the government and the petroleum industry.

Featured

New Products

  • Mobile Safe Shield

    Mobile Safe Shield

    SafeWood Designs, Inc., a manufacturer of patented bullet resistant products, is excited to announce the launch of the Mobile Safe Shield. The Mobile Safe Shield is a moveable bullet resistant shield that provides protection in the event of an assailant and supplies cover in the event of an active shooter. With a heavy-duty steel frame, quality castor wheels, and bullet resistant core, the Mobile Safe Shield is a perfect addition to any guard station, security desks, courthouses, police stations, schools, office spaces and more. The Mobile Safe Shield is incredibly customizable. Bullet resistant materials are available in UL 752 Levels 1 through 8 and include glass, white board, tack board, veneer, and plastic laminate. Flexibility in bullet resistant materials allows for the Mobile Safe Shield to blend more with current interior décor for a seamless design aesthetic. Optional custom paint colors are also available for the steel frame.

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions.

  • Hanwha QNO-7012R

    Hanwha QNO-7012R

    The Q Series cameras are equipped with an Open Platform chipset for easy and seamless integration with third-party systems and solutions, and analog video output (CVBS) support for easy camera positioning during installation. A suite of on-board intelligent video analytics covers tampering, directional/virtual line detection, defocus detection, enter/exit, and motion detection.