April 2017 Digital Edition

Click Here

March 2017 Digital Edition

Click Here

Feb. 2017 Digital Edition

Click Here

Nov/Dec 2016 Digital Edition

Click Here

Oct 2016 Digital Edition

Click Here

Technology Sectors

Market Sectors

Technology Sectors

If the FBI doesn’t tell Apple how they hacked the San Bernardino iPhone, they’re putting lives at risk

Following public outcry about the dangers of government-mandated backdoors, the FBI backed down and opened the San Bernardino shooter’s iPhone without Apple’s help. If they really care about public safety, they must disclose the vulnerability they used to Apple to prevent criminals, hackers, and terrorists from exploiting the same security flaw and using it to do harm.

Encryption protects our hospitals, airports, power plants, and water treatment facilities. Sensitive information about critical infrastructure is stored on phones, computers, and in the cloud. The only thing preventing it from falling into the wrong hands is strong security technology.

Security experts agree that when a government agency discovers a security flaw that it can exploit for surveillance purposes, the best thing to do is to disclose that flaw to the company so that it can fix it for future products. That’s because vulnerabilities are never just used by law enforcement. Time and time again, security flaws that were created or hoarded by agencies like the FBI and NSA have been used by criminal hackers and foreign governments to carry out attacks.

Even the White House agrees, and has created a program specifically for the government to share vulnerabilities in cases exactly like this. But so far, the FBI is dodging the question, and won’t say whether they’ll do the right thing here.

The FBI claimed to the court at least 19 times that there was no way they could unlock the iPhone of the San Bernardino shooter without forcing Apple to build a government backdoor into their operating system. They maintained this repeatedly. Under oath. But the consensus among security experts is that this was never true; the FBI misled the court and the public in pursuit of a dangerous precedent.

Now that they’ve opened the iPhone in question, the mainstream media is already speculating as to how they did it. And it goes without saying that hackers, other governments, and those wishing to exploit this security flaw to do harm to the public are already hard at work trying to figure it out. Worse, the FBI has a terrible track record of protecting it’s own data. Just recently they leaked personal information about more than 20,000 FBI agents. They’re clearly not capable of keeping this exploit from falling into the wrong hands.

 

The only responsible thing for the FBI to do to protect all of our safety and security is to disclose the method they used to Apple so they can fix it and make sure it can’t be used to carry out future attacks.

Symetrica’s advanced radiation detection technology helps secure contract with US Department of Homeland Security

Symetrica has announced that its patented radiation detection and identification technology will be deployed in the latest Handheld Radioisotope Identification Devices (RIIDs) that Smiths Detection Inc. has agreed to supply to the U.S. as part of a contract with the Department of Homeland Security (DHS). Symetrica’s Discovery Technology is at the heart of the Smiths Detection RadSeeker handheld radiation detectors for which the DHS Domestic Nuclear Detection Office (DNDO) recently awarded an IDIQ (indefinite delivery/indefinite quantity) contract with a maximum value of $143 million for the technology, its maintenance and associated training.

The Smiths Detection RadSeeker is a handheld, rugged and highly accurate radioisotope detector and identifier, specifically designed to meet the U.S. DHS mission requirements for a next-generation system capable of detecting and identifying varied nuclear threats. It is easy to use while supplying the operator with quick, simple, specific information for threat assessment. Applications include customs inspection, border protection, emergency response, and radiological facilities/personnel monitoring.

Symetrica’s Discovery Technology in the RadSeeker provides improved identification of threat materials in shielded, masked or concealed situations in operational environments. This is achieved through the coupling of advanced spectrum processing and identification algorithms with state of the art detectors with automatic stabilisation and calibration. This provides two critical benefits to operators; ultra-reliable gamma and neutron threat identification, and permanent readiness at the point of need through resilience to environmental extremes and temperature changes and zero scheduled maintenance.

Commenting on the award announcement, Heddwyn Davies, Symetrica’s CEO, states: “The contract that Smiths Detection has been awarded from the U.S. Department of Homeland Security represents a significant milestone for Symetrica and our radiation detection technology. Discovery Technology is at the core of Smith Detection’s RadSeeker and its success has already been recognized at the highest levels across a range of stakeholders -  from users through to senior government agency representatives. With this latest award, we expect this success story to continue”. 

 

For more information about Discovery Technology’s application within Smiths Detection’s RadSeeker, please visit: http://www.symetrica.com/discovery-technology-case-study-radseeker 

SatCom Frontier: Automatic Bean Switching is the latest link in a long chain of ISR

If you know the enemy and know yourself, you need not fear the result of a hundred battles. If you know yourself but not the enemy, for every victory gained you will also suffer a defeat. If you know neither the enemy nor yourself, you will succumb in every battle.” Sun Tzu, The Art of War

March 16, 2016 - Military leaders have long understood that mission success often depends on knowing both the enemy’s and one’s own capabilities. For Napoleon at Austerlitz, Lee at Chancellorsville, Eisenhower on D-Day, and the “Left Hook” of Desert Storm, knowledge of the enemy was key to victory.

Today this requirement is further complicated by the speed of operations and the desire to push intelligence to the lowest tactical units.

In this environment, it is not surprising that combatant commanders’ first priority is ISR (intelligence, surveillance, and reconnaissance) – usually provided by remotely piloted aircraft (RPAs).

RPAs provide immediate information on enemy forces, friendly forces, and environmental conditions that are invaluable to the military decision maker. The immediacy of this information enables the military to achieve greater depth, agility, versatility, initiative, and synchronization — the five tenets of U.S. Army operations.

But delivering ISR to the tactical edge of combat requires vast amounts of bandwidth. And this bandwidth demand increases as more sensors and applications are added to RPAs.

High-throughput satellites (HTS), such as Intelsat’s EpicNG, help solve this problem by increasing the available bandwidth by 300-400% using high-throughput spot beams. In designing our EpicNG satellites, engineers looked at the possible loss of signal as RPAs passed from one small spot beam to the next.

To address this concern, IGC partnered with L-3 Communications Systems West to develop a software update for automatic beam switching (ABS) so that RPAs could fully benefit from the new HTS capabilities of EpicNG.

This video offers a look at how ABS works. Using real air and ground satellite terminals connected to Intelsat’s Horizons-1 satellite and a navigation simulator, this demonstration shows how the system automatically changes both frequency and polarization as the RPA moves from one beam to another with minimal effect.

The next demonstration will use an RPA and the first EpicNG satellite, IS-29e, successfully launched on January 27.

 

There are few constants in warfare, but one constant is that knowledge of the enemy and of one’s self are key. RPAs are the U.S. military’s best tool to achieve this goal and ABS insures that we can continue to support RPA operations using Intelsat’s high-performance EpicNG satellites.

In wake of Brussels attack, House members want transit grant program bolstered

Eric Swalwell

By Steve Bittenbender

In response to last week’s terrorist attack in Brussels, 66 members of the U.S. House of Representatives called on their Congressional colleagues to budge more money for a grant program aimed bolstering security for transit agencies across the country.

Specifically, the House members want the Homeland Security Appropriations Subcommittee to set aside $105 million for the Fiscal Year 2017 Transit Security Grant Program. That would mark a $20 million increase from what President Obama proposed in his budget, and a nearly identical amount increase from previous budgets.

TSGP is a competitive grant program administered by the Federal Emergency Management Agency that lets eligible public transit agencies apply for funds to help them secure their operations in a number of ways. Transit agencies can apply for funding a variety of reasons, including to expand training opportunities, to bolster surveillance capabilities or to protect infrastructure from attacks.

The members requesting the additional funding sent a letter to Rep. John Carter, the subcommittee chair, and Rep. Lucille Roybal-Allard, the ranking Democrat, and added they oppose any plan that would lump TSGP with other homeland security grant programs.

“(R)equiring mass transit security needs to be pitted against other homeland security challenges could mean mass transit security is not properly funded,” the Congress members wrote.

The Maelbeek Metro station in Brussels was one of two targets for ISIS-backed terrorists on March 22. An hour after an attack on the city’s airport, another blast rocked the transit station, killing 15 and injuring 55. Combined, bombs at both locations killed 35.

Those requesting the additional funding said that transit stations in the U.S. are particularly vulnerable, and that an attack similar to what occurred in Brussels last week, London in 2005 or Madrid in 2004, would be devastating. The impact would not just be in terms of human casualties but in economic damage as well as the transit systems are a vital resource for communities to transport workers, students and tourists on a daily basis.

“From BART to Metro and everywhere in between, funds spent now to protect mass transit from terrorists could save a much larger future cost in terms of lives, physical damage, and economic harm,” said Rep. Eric Swalwell, whose California district includes the Bay Area Rapid Transit system.

In 2014, more than 10.7 billion passengers rode the nation’s local and regional mass transit systems, including bus, rail and ferry systems. Unlike airports or government buildings, the entrances to these systems are open as passengers are not screened.

“The special challenges in securing mass transit systems and the potential disaster that could occur from an attack mean we have to be extra cognizant of providing the necessary resources for this transportation sector,” the letter stated.

FEMA awarded $87 million in TSGP funding to 34 transit authorities for Fiscal Year 2015, with awards ranging from $44,000 to $22.3 million. The same amount is currently available for agencies for this fiscal year, and FEMA is accepting applications until April 25. Recipients have 36 months from the date of award to utilize the funding.

A copy of the letter can be found at: swalwell.house.gov/sites/swalwell.house.gov/files/wysiwyg_uploaded/Transit%20Security%20Grant%20Program%20FY%202017.pdf

Customs and Border Protection releases independent review of its complaint system

By Guillermo Cantor

As part of its announced efforts to become more transparent and accountable, U.S. Customs and Border Protection (CBP) just released the results of a review of its processes for handling allegations of employee misconduct. The review, which was conducted by an independent consulting firm and completed four months ago, yielded 19 findings and 62 recommendations. According to CBP’s statement, “CBP concurs with the vast majority of recommendations [and] a workgroup is actively implementing and addressing the recommendations through improved policies, procedures, training, processes and reporting requirements.”

While CBP did not make public which specific recommendations it has decided to accept and act upon, the agency did inform that it is working to:

  1. Enhance the overall efficiency of the investigative and disciplinary process,
  2. Make avenues for reporting allegations of misconduct more accessible,
  3. Ensure consistency in the administration of the disciplinary process, and
  4. Increase transparency and accountability on employee misconduct.

 

Many of the findings of the review are consistent with evidence and demands previously presented by research and advocacy groups. For example, the review confirmed the existence of multiple gateways for filing complaints with varying degrees of accessibility to them; the lack of a single system to record and track misconduct allegations; the inconsistency of investigation and discipline processes across multiple offices and geographic locations; and the absence of uniform controls in place to ensure individual accountability of people in the investigation and discipline system.

In order to address these and other identified problems, the consulting firm that carried out the review recommends that CBP develop an end-to-end case processing roadmap that begins with the initial allegation and ends with case disposition; establish regular joint strategic meetings as well as reporting requirements for all components involved; develop standard case handling checklists to enhance consistency; and create an agreement between DHS’ Office of the Inspector General and CBP Office of Internal Affairs on minimum case referral guidelines. The report also recommends that CBP explore the feasibility of parallel investigations for administrative and criminal cases.

If properly implemented, these and other recommendations could improve the overall efficiency of CBP’s systems for handling complaints. And this, in turn, could contribute to the development of a more accountable, law-abiding agency. In recent years, numerous reports have shown the extent to which U.S. Border Patrol agents routinely ignore the constitutional and other legal rights of both immigrants and U.S. citizens. More precisely, agents of the Border Patrol are known for regularly overstepping the boundaries of their authority by using excessive force, engaging in unlawful searches and seizures, making racially motivated arrests, detaining people under inhumane conditions, and removing people from the U.S. through the use of coercion and misinformation.

To a large extent, the abuse of migrants while in U.S. custody arises from a lack of transparency and accountability within CBP. While officials in any institution may engage in unlawful conduct, such behavior can be minimized or kept in check if there are clear rules, norms, and sanctions that hold those officials accountable. In other words, without rigorous investigations and sanctions, Border Patrol agents’ misconduct has gone, for a long time, largely unchecked.

The release of the results of the independent review of its complaints and discipline systems by CBP shows a clear attempt by CBP’s leadership to make the agency more transparent. It remains to be seen whether these good intentions will result in effective measures that are able to permeate and modify what has been a well-established culture of impunity.

Creating a Sustainable ID Card System

Craig Sandness

By Craig Sandness We live and work in an increasingly ‘green’ world and our customers are looking for any opportunity or product that allows them to reduce their overall resource consumption and waste. According to a recent Neilson report, 55% percent of global online consumers across 60 countries say they are willing to pay more for products and services provided by companies that are committed to positive social and environmental impact. Still not convinced? U.S. President Barack Obama recently committed the Department of Defense to invest in alternative energy investments and practices— which mirrors the EPA's Environmentally Preferable Purchasing (EPP) Program that helps agencies across the federal government comply with green purchasing requirements.  Whether you believe in climate change, bettering the environment or simply doing your small part, ‘Green Demand’ is here and it is driving our markets and influencing the purchasing habits of all our customers. 

 

Security solutions may have been slow to adopt these practices but recent ‘green’ advances in technology are now allowing organizations of all types to purchase secure solutions that help protect their facilities, resources, people - even the environment. For instance, let’s look at how large organizations can now solve their ID card issuance challenges while reducing energy consumption, overall waste and even save money in the process.

ID Card Printing with ‘Wasteless’ Lamination Technology

Large organizations – universities, enterprises, government agencies – issue a staggering amount of ID cards every year.  Sometimes this issuance is done by a service bureau (a company specializing in the personalization and issuance of identity cards) but more often, this process is done onsite by the organization itself.  In this scenario, an organization relies on a desktop printer that personalizes blank or pre-printed card stock with visual cardholder information. To increase card durability - thus reducing the hassle and cost associated with issuing replacement cards - a lamination patch is then applied to the card to finish the issuance process.

In this process, lamination patches adhere to a strip of clear film known as "carrier film" that connects two rolls or cores. The card passes from the main printer into a lamination chamber or module, where the lamination patch is applied to the card. After which the carrier film, which has no other use than to act as a "carrier" of the overlaminate patch, ends up as waste. Using this traditional lamination method, an organization produces a considerable amount of this waste - especially when done in high volumes. Collectively and over time, this can have a measurable environmental impact to landfill contribution.

However this need not be the case any longer.  By taking advantage of new ID Card printers featuring ‘wasteless’ lamination technology, this end waste can be eliminated from the printing process altogether.  With wasteless lamination technology, overlaminate patches are attached to one another in a continuous stream of material on a single roll and without an underlying carrier. As each patch is detached from its supply roll and adhered to a card, the lamination cycle is complete. Once the supply roll has been depleted, all that's left is a single empty core. This process significantly reduces both the cost of the consumables and the waste product. 

Wasteless lamination has proven to be very cost effective, reducing lamination consumables costs as much as 50 percent while maintaining the highest levels of security and durability. This subsequently results in a significantly lower cost-per-card and total cost of ownership. This makes wasteless lamination an ideal alternative for cost-conscious companies, universities, government agencies or any organization that has strict budget limitations.

Green Circle Certification

Reduction of your carbon footprint is another focus of environmental responsibility. And reducing overall energy consumption has an easily quantified impact on an organization’s bottom line. As such, other advancements in card lamination technologies have reduced the significant energy required to heat up and maintain optimal operating temperature. By leveraging advanced technologies such as "instant on" or intelligent temperature control - which will heat rapidly and maintain optimal operating temperature – new ID lamination solutions can conserve significant amounts of energy as well as save time. These energy-conscious solutions carry the GreenCircle® certification in recognition of their energy savings.

For companies, universities and government agencies that produce high volumes of laminated ID cards, wasteless lamination is an excellent way to meet the growing demands of an environmentally responsible market. Secure ID card solutions with such eco-friendly technology innovations as wasteless lamination and intelligent temperature control are simple, cost-effective ways for any organization to minimize their environmental impact.

Editor’s Note: In a recent HID article on the importance of “Ensuring biometric data is useless to identity thieves,” the Lumidigm company was incorrectly spelled as “Lumisigm company.” GSN regrets the error.

Craig Sandness, Vice President, Government ID Solutions
Craig Sandness is the vice president, Government ID Solutions with HID Global, where he is responsible for market penetration and strategic worldwide expansion of the company’s government-to-citizen ID programs. Prior to this role, Mr. Sandness was the Managing Director of HID Global – Asia Pacific, where he was responsible for setting the business objectives, strategy development and maximizing the company’s sales revenues and profits across the region. Sandness has held various executive roles with HID Global, including Vice President of Global Accounts as well as Vice President of International Sales with FARGO, where he was responsible for building FARGO’s international sales effort across more than 90 countries. Mr. Sandness holds a BA degree in International Management from Hamline University, in St. Paul, Minnesota, USA, where he graduated with magna cum laude honors.

FAA reports indicate number of drone sightings continues to rise; relaxes altitude caps for some drones

By Steve Bittenbender

Late last week, the Federal Aviation Administration released updated figures on Friday indicating that the number of drone reports continues to increase.

Based on the last two reports delivered by the FAA, officials received 1,210 reports in 2015 from pilots, air traffic controllers and the general public. That’s nearly 1,000 more than the agency received in 2014.

The use of unmanned aircraft, both by recreational and commercial users, rose dramatically in 2015, prompting the FAA to implement some regulations to ensure the drones did not interfere with piloted crafts. And, it’s quite possible significant increases in reports will only continue.

For example, there were 238 drone reports in all of 2014. In June and July of 2015, the FAA received 275 reports. However, in January the FAA got 93 reports. In January 2015, it had just 26.

"We have a number of educational initiatives with our government and industry partners to teach drone operators how to fly safely, including the drone registry we launched last December," said FAA Administrator Michael Huerta. “But enforcement goes hand-in-hand with education, and we will take action against anyone who operates irresponsibly to the full extent of the law.”

While some experts have questioned whether a drone can do significant damage or even poses a serious risk to other aircraft, the FAA has taken several steps to implement new regulations. Those include a drone registry that now has had more than 406,000 users sign up since December. The agency also continues to promote its “Know Before You Fly” educational campaign, which informs operators where they can use their drones legally and safely.

The FAA also has been working with law enforcement agencies to pursue investigations, such as working with Los Angeles County officials after a drone was reported within 200 feet of a Lufthansa plane at an altitude of about 5,000 feet less than 15 miles from Los Angeles International Airport. No charges have been filed in the case.

“The agency wants to send out a clear message that operating drones around airplanes, helicopters and airports is dangerous and illegal,” the agency said on its Web site. “Unauthorized operators may be subject to stiff fines and criminal charges, including possible jail time.”

The most notable penalty came last October, when Chicago-based aerial photography company SkyPan International, Inc. received a record $1.9 million fine for taking 65 unauthorized flights. Most took place in New York City’s Class B airspace, which surrounds the city’s airports to a ceiling of 10,000 feet.

While the FAA has worked to place more restrictions on drone users, it has loosened some as well. On Tuesday, the administration announced that drone operators with a Section 333 exemption can fly their aircraft at 400 feet instead of the previously enforced 200-foot ceiling.

The FAA said the change, which was approved for drone weighing less than 55 pounds, was made after conducting a comprehensive risk analysis. While drone enthusiasts supported the measure, many still seek more changes from the agency in charge of regulating the skies.

“The FAA’s decision to raise the operating altitude of the blanket COA from 200 feet to 400 feet provides greater flexibility to those receiving FAA exemptions and makes it easier for more commercial UAS operators to access the skies,” said AUVSI President and CEO Brian Wynne in a statement. “However, the FAA still needs to finalize its small UAS rule as quickly as possible to allow anyone who follows the rule to fly. The new blanket COA altitude remains lower than the operating ceiling of 500 feet proposed in the small UAS rule.” 

Authorities believe EgyptAir hijacking was not a terrorist event

By Steve Bittenbender

A middle-aged man was arrested in Cyprus Tuesday after he hijacked an EgyptAir plane and forced its diversion to the Mediterranean island.

However, the incident did not appear to be related to terrorism, as the man identified by Cyprus officials as Seif Eldin Mustafa threw a letter on the tarmac of Larnaca Airport. The letter was addressed to his ex-wife who lives in the country.

The New York Daily News posted several pictures of the hijacker, who was wearing what he had called a suicide belt. One of the images appeared to be a selfie taken with a British passenger. Before the pictures were taken, he had used the purported belt to take control of the flight, which took off from Alexandria and arrive in Cairo. The airline posted on Twitter about an hour after takeoff that the plane had been officially hijacked.

Once in Cyprus, he let most of the passengers depart, except for a couple of British passengers, Cyprus’ Foreign Minister Ioannis Kasoulides told reporters. After his attempts to negotiate apparently failed, the hijacker released the rest of his captives. He then deplaned and surrendered to authorities.

“The explosives on him were examined,” Kasoulides said. “They weren’t explosives, but mobile phone covers.”

Egyptian officials released video of Mustafa receiving a screening at the Alexandria airport, including a pat-down of his body, showing that he passed security without

Once the situation came to a conclusion, Egypt’s Minister of Civil Aviation flew to Cyprus to be onboard the EgyptAir flight as it resumed its flight. It landed in Cairo shortly after 4 pm Eastern time.

“The minister recommended to offer the passengers all facilities needed to resume their flight to their destinations from Cairo Int'l Airport or travel from Larnaca Int'l Airport upon their request,” the airline posted on its Twitter account.

Once down in Cairo, Egyptian Prime Minister Sherif Ismail, EgyptAir Chairman Safwat Musallam and Yehia Rashed, the country’s minister of tourism, greeted those who flew back to the north African country.

Tuesday’s hijacking was the second major aviation incident taking place in Egypt in the last five months. On Oct. 31, all 224 people aboard a Russian Metrojet flight leaving the Sinai Peninsula en route to St. Petersburg died after the plane crashed a few minutes after takeoff.

Terrorist group ISIS claimed responsibility for the crash, saying it used a bomb to bring down the Airbus plane. Last month, Egyptian officials confirmed the crash was due to a terrorist act.

Russian officials have since suspended air service to Egypt.

According to the airliner and media reports, there were 56 passengers and seven crew members aboard. That included eight Americans.

“We know of no injuries to those American citizens that were on that flight,” State Department Deputy Spokesman John Kirby said.

EgyptAir is the country’s national airline, with its origins dating to 1932. The fleet consists of 79 aircraft criss-crossing the world to 79 destinations in 53 countries, fulfilling the needs of both business and leisure travelers. The Fleet includes the latest generation of aircraft: B777-300 ER, B777-200, A330-300, A330-200, A340, A320, A321, B737-800, B737-500, EMBREAR 170 and A300-600 freighter.

Coast Guardsmen from Cutter Bertholf seize 12,800 pounds of cocaine 30 miles S.W. of Panama

Alameda, CA - Coast Guardsmen seized more than 12,800 pounds of cocaine and apprehended four suspected drug smugglers from a self-propelled semisubmersible, or SPSS, about 300 miles southwest of Panama March 3.

The crew of the Coast Guard Cutter Bertholf from Alameda, California, was notified by a Customs and Border Protection aircraft about the SPSS off the two interceptor boats to stop the suspected drug smuggling vessel, which was laden with more than $203 million worth of cocaine.

“Transnational organized crime groups continue to adjust their tactics to avoid detection indicated by a recent rise in the use of SPSS vessels,” said Vice Adm. Charles Ray, commander, Pacific Area. “Despite these efforts, we will continue to execute an offensive strategy that targets, attacks and disrupts these dangerous criminal networks.”

Since June 2015, the Coast Guard has interdicted five SPSS vessels. These vessels are constructed for illicit trafficking with a mostly submerged hull; a cockpit and exhaust pipe are visible just above water. These vessels are extremely difficult to detect and interdict because of their low-profile.  

This is the second SPSS interdiction by the Coast Guard in Fiscal Year 2016, which runs from Oct. 1, 2015, to Sept. 30, 2016. The crew of the Coast Guard Cutter Northland interdicted an SPSS approximately 280-miles southwest of the Mexican-Guatemalan border in January 2016. The suspects in that case scuttled the smuggling vessel as Coast Guardsmen arrived at the scene but were safely apprehended.

“SPSS interdictions are inherently dangerous, yet we persevere to disrupt the funding sources of illicit organizations causing violence and instability in Central America,” said Capt. Laura Collins, commanding officer of the Cutter Bertholf. “Our boarding teams are trained to constantly assess and prioritize the safety of our personnel and the SPSS crew during the case.”

Coast Guardsmen from Bertholf entered the SPSS numerous times to retrieve contraband and evidence. Boarding officers from Bertholf also discovered a loaded gun in the cockpit of the SPSS.  

Both Fiscal Years 2015 and 2016 have been marked by multiple SPSS interdictions for the first time since Fiscal Year 2012. These multiple SPSS interdictions and other cases contributed to the Coast Guard removing more than 319,000 pounds of cocaine in Fiscal Year 2015. The Coast Guard has already removed more than 201,000 pounds in Fiscal Year 2016.

This is the second SPSS interdiction by Bertholf’s crew, which in 2015 seized over 20 tons of cocaine alone. This is the fifth SPSS interdiction for the 418-foot national security cutters, the service’s newest and most capable major cutter. Alameda-based national security seized almost 68,000 pounds of cocaine in the Eastern Pacific ocean in Fiscal Year 2015.

Ultra-low cost SecuGen Hamster Pro™ and UPx OEM sensor now available

Santa Clara, California (February 15, 2016) – SecuGen, a world leading optical fingerprint device and technology vendor, is pleased to announce that they will be unveiling a new, lower cost fingerprint reader, the Hamster Pro™, at the RSA Conference 2016 in San Francisco’s Moscone Center.

Attendees are invited to come by SecuGen’s booth, number 4615 in the North Hall of Moscone Center to see a demonstration of the new, low cost fingerprint reader and accompanying OEM sensor.

The Hamster Pro is a compact, accurate, and robust fingerprint reader, being offered at an incredibly low price. SecuGen is well known around the world and throughout the biometrics industry for providing high quality fingerprint products at prices suitable for large deployments. The Hamster Pro is SecuGen’s lowest price fingerprint reader to date.

The UPx is the OEM version of the same product. The UPx is compact for easy integration and very low priced for large deployments.

SecuGen’s complete line of fingerprint readers include PIV and FAP 20 certified models and now includes the Hamster Pro for circumstances where PIV certification is not required but a low cost option is mandatory. SecuGen’s product line also includes dual mode products that combine contact and contactless smartcard readers together with SecuGen’s rugged and accurate fingerprint sensors.

The Hamster Pro fingerprint reader and the companion UPx OEM sensor will both be released in March of this year and will be compatible with SecuGen’s software development kits for Windows, Linux, and Android.

VP of Engineering Dan Riley stated, “The SecuGen engineering team keeps coming up with new ways to reduce costs. The Hamster Pro fingerprint reader and UPx sensor are remarkable in that they combine the ability to capture a high contrast, high quality image with rock bottom prices. These truly are amazing products!”

Won Lee, CEO of SecuGen, said, “Our focus is always to deliver the high quality products and tools that our reseller partners require. Our engineering team had done it again with the UPx sensor and the Hamster Pro. These are exactly the products that our partners have been asking for.”

About SecuGen

SecuGen Corporation is the world's leading provider of advanced, optical fingerprint recognition technology, products, tools and platforms for physical and information security. SecuGen designs and develops FBI-certified fingerprint readers and OEM components, developer kits and software, including NIST/MINEX-compliant algorithms. Known for high quality, ruggedness, and performance in a wide variety of applications and environmental conditions, SecuGen products are used by world-leading financial, medical, government, educational and corporate institutions and are sold through an extensive network of reseller partners including original equipment manufacturers, independent software vendors and system integrators around the world.

Pages

 

Recent Videos

HID Global is opening the door to a new era of security and convenience.  Powered by Seos technology, the HID Mobile Access solution delivers a more secure and convenient way to open doors and gates, access networks and services, and make cashless payments using phones and other mobile devices. ...
Mobile device forensics can make a difference in many investigations, but you need training that teaches you how to get the most out of your mobile forensics hardware and software, and certifies you to testify in court. Read this white paper to learn how to evaluate mobile forensics training...
PureTech Systems is a software company that develops and markets PureActiv, its geospatial analytics solution designed to protect critical perimeters and infrastructure.  Its patented video analytics leverage thermal cameras, radars and other perimeter sensors to detect, geo-locate, classify, and...
PureTech Systems is a technology leader in the use of geospatial video, focusing on perimeter security.  When combining geospatial capabilities with video analytics and PTZ camera control, managers of critical facilities can benefit by allowing the video management system to aid them in the process...