April 2017 Digital Edition

Click Here

March 2017 Digital Edition

Click Here

Feb. 2017 Digital Edition

Click Here

Nov/Dec 2016 Digital Edition

Click Here

Oct 2016 Digital Edition

Click Here

Technology Sectors

Market Sectors

Today's News

SEI Seeks Participants for Cyber Intelligence Study Sponsored by Office of the Director of National Intelligence

PITTSBURGH, Nov. 16, 2017 -- The Emerging Technology Center at the Software Engineering Institute at Carnegie Mellon University today issued a call for organizations to participate in a cyber intelligence study sponsored by the Office of the Director of National Intelligence (ODNI).Cyber intelligence—acquiring and analyzing information about cyber capabilities, intentions, and activities to enhance decision making—is a rapidly changing field. The study, which the SEI will conduct over the next 18 months, will provide ODNI with insight into how organizations across the federal government, industry, and academia conduct cyber intelligence activities, identifying common challenges and best practices.

This study is a follow-up to the SEI's Cyber Intelligence Tradecraft Project, a 2013 study that examined 30 organizations and their approaches to cyber intelligence. The 2013 study has been widely cited and now is the basis of some university courses in cyber intelligence. Key findings from the 2013 study can be found at: https://www.sei.cmu.edu/library/assets/whitepapers/citp-summary-key-findings.pdf

"In 2013, we found areas where organizations struggled and where they were doing well," said Jared Ettinger, SEI cyber intelligence researcher and study technical lead. "Organizations were able to take the report and follow best practices, so now we'd like to see what has changed," he said.

Elements of the new study will include preliminary interviews with selected organizations to identify common themes and then a quantitative questionnaire to gain greater insight on those identified themes from a large number of respondents. The SEI will issue a report based on the study in early 2019.

Organizations participating in the study will benefit by:

understanding their unique cyber intelligence capabilities and challenges in an environment that safeguards participant anonymity
receiving access to study results prior to public release
identifying technology gaps and challenges to influence potential research/prototyping efforts
For more information about the study, see https://www.sei.cmu.edu/about/organization/etc/citp.cfm. Organizations wishing to participate in the study should contact the SEI at [email protected]

About the Carnegie Mellon University Software Engineering Institute
The Software Engineering Institute (SEI) is a federally funded research and development center sponsored by the U.S. Department of Defense and operated by Carnegie Mellon University. The SEI works with organizations to make measurable improvements in their software engineering and cybersecurity capabilities by providing technical leadership to advance the practice of software engineering and security. For more information, visit the SEI website at http://www.sei.cmu.edu.

SOURCE Carnegie Mellon Software Engineering Institute

Related Links

http://www.sei.cmu.edu

Raytheon, MetTel establish alliance to secure government, industry communications networks

NEW YORK and DULLES, Va., Nov. 16, 2017 -- Raytheon and MetTel today announced a global security alliance to protect government and commercial communications networks against growing cybersecurity threats, including those that exploit the proliferating Internet of Things (IoT). The companies will provide a range of cybersecurity offerings and support the migration from legacy technologies to ensure cybersecurity is designed into the government's telecom infrastructure.

This alliance is well-positioned to support the Administration's IT modernization and cybersecurity priorities, including the emerging security challenges posed by internet-connected devices, including computers, routers and security cameras.

"Security is foremost on everyone's mind today, especially with the constant emergence of new threat forms compounded by the exploding array of devices and network access points," said Ed Fox, vice president of Network Services for MetTel. "The world needs a network that meets the highest government security standards and together, MetTel and Raytheon are committed to delivering that network."

The MetTel-Raytheon alliance will provide a range of managed security services, professional consulting services and technologies to detect, assess and defeat potential intrusions on MetTel-owned or managed customer networks. The principal elements of the agreement include:

  • MetTel and Raytheon will build and operate Managed Trusted Internet Protocol Services for Federal government agencies through the GSA's Enterprise Infrastructure Solutions (EIS) contract. MetTel was named in August 2017 as a vendor for the $50 billion, 15-year award.
  • As part of MetTel's team on the EIS contract, Raytheon will offer cybersecurity experts on a contract basis to Federal agencies for custom consultations, including detailed insight and recommendations for incident remediation and vulnerability testing.
  • In addition, MetTel will employ Raytheon's Automated Threat Intelligence Platform (ATIP) and other advanced managed security services.

Managed Security Services for Federal Agencies
"As Federal agencies and businesses aggressively pursue digital transformation, this alliance will support the security of their data and systems," said John DeSimone, vice president of Cybersecurity and Special Missions for Raytheon Intelligence, Information and Services. "Raytheon will work with MetTel to leverage our 30 years of experience and significant investment in cybersecurity to hunt, detect and remediate advanced cyber threats on government and commercial networks."

Hardening the Network for MetTel and its Customers
In addition to supporting government customers, MetTel will integrate with Raytheon's Virtual Security Operations Center service to provide advanced threat hunting, intrusion analysis, incident notification and triage to safeguard its 10,000 customer locations worldwide.

"As rogue governments, nation-states and independent cyber criminals increasingly focus their attacks on commercial industry targets, the need becomes apparent for the combined forces of MetTel and Raytheon with our proven success in security and network management," Fox added.

Webinar – "2018 Security Threats: What's next…and will you be ready?"
Join MetTel and Raytheon for a joint webinar on Wednesday, December 6, 2017 @ 2:00pm ET. Register here: http://bit.ly/2zWJVFG

About MetTel
MetTel® is a leading global provider of integrated digital communications solutions for enterprise customers. By converging all communications over a proprietary network, MetTel enables enterprise companies to easily deploy and manage technology-driven voice, data, wireless and cloud solutions worldwide. MetTel's comprehensive portfolio of customer solutions boosts enterprise productivity, reduces costs and simplifies operations. Combining customized and managed communication solutions with a powerful platform of cloud-based software, the company's MetTel Portal enables customers to manage their inventory, usage, spend and repairs from one simple, user friendly interface. For more information visit www.mettel.net, follow us on Twitter (@OneMetTel) and on LinkedIn, or call us directly at 877.963.8663.   MetTel. Smart Communications Solutions.™

About Raytheon
Raytheon Company, with 2016 sales of $24 billion and 63,000 employees, is a technology and innovation leader specializing in defense, civil government and cybersecurity solutions. With a history of innovation spanning 95 years, Raytheon provides state-of-the-art electronics, mission systems integration, C5I products and services, sensing, effects, and mission support for customers in more than 80 countries. Raytheon is headquartered in Waltham, Massachusetts. Follow us on Twitter @Raytheon.

Media Contacts
Raytheon
Ellen Klicka
571.250.1029
[email protected] 

MetTel
Mike Azzi
347.420.0957 
[email protected]

SOURCE MetTel

US-CERT Alert: HIDDEN COBRA - North Korean Malicious Cyber Activity

Alert (TA17-318B)
HIDDEN COBRA – North Korean Trojan: Volgmer


Original release date: November 14, 2017 | Last revised: November 15, 2017

Systems Affected


Network systems
Overview
This joint Technical Alert (TA) is the result of analytic efforts between the Department of Homeland Security (DHS) and the Federal Bureau of Investigation (FBI). Working with U.S. government partners, DHS and FBI identified Internet Protocol (IP) addresses and other indicators of compromise (IOCs) associated with a Trojan malware variant used by the North Korean government—commonly known as Volgmer. The U.S. Government refers to malicious cyber activity by the North Korean government as HIDDEN COBRA. For more information on HIDDEN COBRA activity, visit https://www.us-cert.gov/hiddencobra.
FBI has high confidence that HIDDEN COBRA actors are using the IP addresses—listed in this report’s IOC files—to maintain a presence on victims’ networks and to further network exploitation. DHS and FBI are distributing these IP addresses to enable network defense and reduce exposure to North Korean government malicious cyber activity.
This alert includes IOCs related to HIDDEN COBRA, IP addresses linked to systems infected with Volgmer malware, malware descriptions, and associated signatures. This alert also includes suggested response actions to the IOCs provided, recommended mitigation techniques, and information on reporting incidents. If users or administrators detect activity associated with the Volgmer malware, they should immediately flag it, report it to the DHS National Cybersecurity and Communications Integration Center (NCCIC) or the FBI Cyber Watch (CyWatch), and give it the highest priority for enhanced mitigation.
For a downloadable copy of IOCs, see:
IOCs (.csv)
IOCs (.stix)
NCCIC conducted analysis on five files associated with or identified as Volgmer malware and produced a Malware Analysis Report (MAR). MAR-10135536-D examines the tactics, techniques, and procedures observed. For a downloadable copy of the MAR, see:
MAR (.pdf)
MAR IOCs (.stix)
Description
Volgmer is a backdoor Trojan designed to provide covert access to a compromised system. Since at least 2013, HIDDEN COBRA actors have been observed using Volgmer malware in the wild to target the government, financial, automotive, and media industries.
It is suspected that spear phishing is the primary delivery mechanism for Volgmer infections; however, HIDDEN COBRA actors use a suite of custom tools, some of which could also be used to initially compromise a system. Therefore, it is possible that additional HIDDEN COBRA malware may be present on network infrastructure compromised with Volgmer
The U.S. Government has analyzed Volgmer’s infrastructure and have identified it on systems using both dynamic and static IP addresses. At least 94 static IP addresses were identified, as well as dynamic IP addresses registered across various countries. The greatest concentrations of dynamic IPs addresses are identified below by approximate percentage:
India (772 IPs) 25.4 percent
Iran (373 IPs) 12.3 percent
Pakistan (343 IPs) 11.3 percent
Saudi Arabia (182 IPs) 6 percent
Taiwan (169 IPs) 5.6 percent
Thailand (140 IPs) 4.6 percent
Sri Lanka (121 IPs) 4 percent
China (82 IPs, including Hong Kong (12)) 2.7 percent
Vietnam (80 IPs) 2.6 percent
Indonesia (68 IPs) 2.2 percent
Russia (68 IPs) 2.2 percent


Technical Details
As a backdoor Trojan, Volgmer has several capabilities including: gathering system information, updating service registry keys, downloading and uploading files, executing commands, terminating processes, and listing directories. In one of the samples received for analysis, the US-CERT Code Analysis Team observed botnet controller functionality.
Volgmer payloads have been observed in 32-bit form as either executables or dynamic-link library (.dll) files. The malware uses a custom binary protocol to beacon back to the command and control (C2) server, often via TCP port 8080 or 8088, with some payloads implementing Secure Socket Layer (SSL) encryption to obfuscate communications.
Malicious actors commonly maintain persistence on a victim’s system by installing the malware-as-a-service. Volgmer queries the system and randomly selects a service in which to install a copy of itself. The malware then overwrites the ServiceDLL entry in the selected service's registry entry. In some cases, HIDDEN COBRA actors give the created service a pseudo-random name that may be composed of various hardcoded words.
Detection and Response
This alert’s IOC files provide HIDDEN COBRA indicators related to Volgmer. DHS and FBI recommend that network administrators review the information provided, identify whether any of the provided IP addresses fall within their organizations’ allocated IP address space, and—if found—take necessary measures to remove the malware.
When reviewing network perimeter logs for the IP addresses, organizations may find instances of these IP addresses attempting to connect to their systems. Upon reviewing the traffic from these IP addresses, system owners may find some traffic relates to malicious activity and some traffic relates to legitimate activity.
Network Signatures and Host-Based Rules
This section contains network signatures and host-based rules that can be used to detect malicious activity associated with HIDDEN COBRA actors. Although created using a comprehensive vetting process, the possibility of false positives always remains. These signatures and rules should be used to supplement analysis and should not be used as a sole source of attributing this activity to HIDDEN COBRA actors.
Network Signatures
alert tcp any any -> any any (msg:"Malformed_UA"; content:"User-Agent: Mozillar/"; depth:500; sid:99999999;)
___________________________________________________________________________________________________
YARA Rules
rule volgmer
{
meta:
    description = "Malformed User Agent"
strings:
    $s = "Mozillar/"
condition:
    (uint16(0) == 0x5A4D and uint16(uint32(0x3c)) == 0x4550) and $s
}
Impact
A successful network intrusion can have severe impacts, particularly if the compromise becomes public and sensitive information is exposed. Possible impacts include
temporary or permanent loss of sensitive or proprietary information,
disruption to regular operations,
financial losses incurred to restore systems and files, and
potential harm to an organization’s reputation.
Solution


Mitigation Strategies
DHS recommends that users and administrators use the following best practices as preventive measures to protect their computer networks:
Use application whitelisting to help prevent malicious software and unapproved programs from running. Application whitelisting is one of the best security strategies as it allows only specified programs to run, while blocking all others, including malicious software.
Keep operating systems and software up-to-date with the latest patches. Vulnerable applications and operating systems are the target of most attacks. Patching with the latest updates greatly reduces the number of exploitable entry points available to an attacker.
Maintain up-to-date antivirus software, and scan all software downloaded from the Internet before executing.
Restrict users’ abilities (permissions) to install and run unwanted software applications, and apply the principle of “least privilege” to all systems and services. Restricting these privileges may prevent malware from running or limit its capability to spread through the network.
Avoid enabling macros from email attachments. If a user opens the attachment and enables macros, embedded code will execute the malware on the machine. For enterprises or organizations, it may be best to block email messages with attachments from suspicious sources. For information on safely handling email attachments, see Recognizing and Avoiding Email Scams. Follow safe practices when browsing the web. See Good Security Habits and Safeguarding Your Data for additional details.
Do not follow unsolicited web links in emails. See Avoiding Social Engineering and Phishing Attacks for more information.


Response to Unauthorized Network Access
Contact DHS or your local FBI office immediately. To report an intrusion and request resources for incident response or technical assistance, contact DHS NCCIC ([email protected](link sends e-mail) or 888-282-0870), FBI through a local field office, or the FBI’s Cyber Division ([email protected](link sends e-mail) or 855-292-3937).
References
Revisions
November 14, 2017: Initial version

HIDDEN COBRA - North Korean Malicious Cyber Activity
The information contained on this page is the result of analytic efforts between the Department of Homeland Security (DHS) and the Federal Bureau of Investigation (FBI) to provide technical details on the tools and infrastructure used by cyber actors of the North Korean government. The intent of sharing this information is to enable network defenders to identify and reduce exposure to North Korean government cyber activity. The U.S. Government refers to the malicious cyber activity by the North Korean government as HIDDEN COBRA.

For more information, see:
November 14, 2017: Alert (TA17-318A) HIDDEN COBRA – North Korean Remote Administration Tool: FALLCHILL
November 14, 2017: Alert (TA17-318B) HIDDEN COBRA – North Korean Trojan: Volgmer
August 23, 2017: Malware Analysis Report (MAR-10132963) – Analysis of Delta Charlie Attack Malware
June 13, 2017: Alert (TA17-164A) HIDDEN COBRA – North Korea’s DDoS Botnet Infrastructure

INTTRA Unveils a New Suite of Applications Boosting Operational Effectiveness

Parsippany, N.J., and Singapore, November 15, 2017- INTTRA, the largest neutral electronic transaction platform, software and information provider at the center of the ocean shipping industry, today announced two new cloud-based products and enhancements. The first is a new Container Forecasting and Allocation Solutions Tool (C-FAST) for Freight Forwarders and NVOCC's that matches the forecast of their customers' anticipated container volume to carrier capacity availability. The second is an enhanced version of its Ocean Schedules offering that optimizes the shipment planning experience for ocean supply chain professionals.

The announcements were made today in Singapore at INTTRA's Asia Technology Summit, a forum attended by approximately 200 senior industry leaders to share their views on how digitization and technology are changing the ocean industry sector, and where INTTRA outlined its technology whitepaper -- Blueprint 2032: How Technology Transforms Ocean Container Shipping.

INTTRA's new C-FAST addresses a key issue, which is forecasting and allocating for future customer shipments can be a complicated, time consuming manual process requiring collecting multiple customer and carrier contract data. INTTRA C-FAST can help achieve up to 40 percent operational improvement in organizations, and up to $4 million annual cost savings across multiple operating regions.

INTTRA C-FAST offers automated allocation solutions that optimize contract management and enhance customer planning with improved matching capabilities by performing the allocation of customer forecasting and carrier availability commitments, resulting in impressive, easy-to-interpret cargo steering recommendations. Initiated with easily imported customer forecasts, carrier commitments and contracts, C-FAST considers quantity commitment, contract type, and carrier-space contractual obligations by port to optimize decisions. Further, it enables a dashboard review of planned-to-actual bookings, which also helps ocean leaders plan for next year's costs and minimum-quantity commitments from carrier suppliers.

"The ocean shipping industry is becoming increasingly interconnected, driving towards full digitization, with technology enabling businesses to improve operationally and financially," said John Fay, CEO of INTTRA. "Our goal is to help our customers fully embrace digitization, providing the best products and services to optimize and deliver more efficient logistics management. The introduction of C-FAST and offering a newer generation of Ocean Schedules is just the beginning of a much larger phase."

"INTTRA has understood the requirements of capacity management by launching a product which combines the carrier's space management with our customer's forecasting. With an easy-to-use GUI and direct response to bookings made we believe to have found a tool which makes our sea freight world a lot more efficient." said Johannes Saade, Global Head of Trade Management for Hellmann Worldwide Logistics Air & Sea GmbH & Co. KG.

"Container allocation is a critical process in how we support our customers' most strategic demands", said Matthew Burgess, VP, Global Ocean Consolidation Services at JAS Worldwide Management, Inc. "Gaining access to an automated tool like C-FAST would better enable us to prioritize, organize and manage the steering of cargo for multiple clientele, allowing JAS to maintain focus on the continued growth of its business and manage our key carrier providers."

"C-FAST will help NVOs and freight forwarders drive operational efficiency, improve procurement strategies and enhance vendor management practices in order to accelerate their business growth," said Inna Kuznetsova, President and COO of INTTRA. "Our user friendly, collaborative tool improves global operations and decision making by providing an automated and intuitive contract-aware allocation process."

Enhanced Cloud-Based Ocean Schedules Product Offering Introduced

INTTRA today also launched an enhanced version of its industry leading Ocean Schedules product offering, which for the past ten years has been a key tool in the planning process for ocean supply chain professionals. INTTRA's upgraded Ocean Schedules is now cloud-based and is available with an expanded data set and the latest web services application programming interface (API) technology. Ocean Schedules is offered with a new, enhanced web interface for users of INTTRA's ocean shipping web portal, in addition to a new API for customers who want to integrate schedules data into their TMS, rate management system or other in-house applications. INTTRA also offers ocean carriers a new API for direct request/response access to their schedules data that provides end-users with the most current information direct from the carrier's scheduling system.

"We listened carefully to the needs of supply chain professionals when designing our cloud-enhanced Ocean Schedules," said Jeff Howard, Senior VP, Product Management and Chief Product Officer at INTTRA. "The new Ocean Schedules API enables forwarders and cargo owners to easily integrate the latest schedules data from over 35 carriers directly into their transportation management or rates management systems and reduce shipment planning times by up to 80 percent."

INTTRA

U.S. Air Force Awards Lockheed Martin JASSM® Telemetry Kit Production Contract

ORLANDO, Fla., Nov. 14, 2017 -- Lockheed Martin (NYSE: LMT) received a $44.1 million contract from the U.S. Air Force to produce Intelligent Test Instrumentation Kits (iTIK) to be used on Joint Air-to-Surface Standoff Missile (JASSM) flight tests for telemetry and flight termination purposes.

This contract for iTIKs provides benefits across multiple missile programs. These upgraded iTIKs eliminate obsolete parts from previous generation test kits and provide a new product that can be used on several different missiles.

Lockheed Martin's Joint Air-to-Surface Standoff Missile (JASSM) is a long-range, conventional, air-to-ground, precision standoff missile for the U.S. and allied forces. The company received a contract from the U.S. Air Force to provide Intelligent Test Instrumentation Kits to be used on flight tests for telemetry and flight termination purposes.
Lockheed Martin's Joint Air-to-Surface Standoff Missile (JASSM) is a long-range, conventional, air-to-ground, precision standoff missile for the U.S. and allied forces. The company received a contract from the U.S. Air Force to provide Intelligent Test Instrumentation Kits to be used on flight tests for telemetry and flight termination purposes.
"The new iTIK provides a next generation telemetry kit for both JASSM baseline and Extended Range missiles, as well as the Long Range Anti-Ship Missile," said Kim Oyler, program manager at Lockheed Martin Missiles and Fire Control. "The electronic components in this new kit will provide enhanced reliability over the previous generation's mechanical configuration."

The new iTIKs will be compatible with all production lots of JASSM already in inventory, as well as future lots and variants.

Armed with a penetrating blast-fragmentation warhead, JASSM-Extended Range (ER) can be used in all weather conditions. The stealthy 2,000-pound cruise missile employs an infrared seeker and enhanced digital anti-jam GPS receiver to dial into specific points on high-value, well-fortified, fixed and relocatable targets. The B-1B carries JASSM-ER. Integration on other aircraft platforms is ongoing. More than 2,150 JASSM and JASSM-ER missiles have been delivered.

About Lockheed Martin
Headquartered in Bethesda, Maryland, Lockheed Martin is a global security and aerospace company that employs approximately 97,000 people worldwide and is principally engaged in the research, design, development, manufacture, integration and sustainment of advanced technology systems, products and services.

SOURCE Lockheed Martin

Global Entry Enrollment on Arrival Expands to 11 Additional International Airports

WASHINGTON—U.S. Customs and Border Protection announced today the expansion of Global Entry Enrollment on Arrival to 11 additional international airports. Enrollment on Arrival enables conditionally-approved Global Entry applicants to complete their interview, the final step of the Global Entry enrollment process, while clearing CBP processing. The program is currently available at nine new locations including Dallas/Fort Worth International Airport (DFW), Detroit Metropolitan Airport (DTW), Minneapolis-Saint Paul International Airport (MSP), Phoenix Sky Harbor International Airport (PHX), Salt Lake City International Airport (SLC), San Diego International Airport (SAN), Norman Y. Mineta San Jose International Airport (SJC), Seattle-Tacoma International Airport (SEA), and Toronto Pearson International Airport (YYZ), and will launch later this week at Denver International Airport (DEN) and Philadelphia International Airport (PHL).

“Global Entry continues to be one of CBP’s most successful and popular programs and we have made it a priority to improve the enrollment process for those looking to join the ranks of Trusted Traveler,” said Acting Commissioner Kevin McAleenan. “Last month, we launched a modernized, mobile-friendly application website making the initial step of the process more user friendly and now with these additional Enrollment on Arrival locations we have added greater flexibility for those looking to complete the enrollment process.”

Since the program’s launch in July, more than 5,200 conditionally-approved Global Entry applicants have completed the final step of the enrollment process at an Enrollment on Arrival location. Enrollment on Arrival is also available at George Bush Intercontinental Airport (IAH), William P. Hobby Airport (HOU), Austin-Bergstrom International Airport (AUS), San Francisco International Airport (SFO) and Vancouver International Airport (YVR).

Conditionally-approved applicants looking to utilize Enrollment on Arrival do not need to schedule an interview appointment ahead of time.

Once a traveler is conditionally-approved, instead of scheduling an interview at a Global Entry Enrollment Center, the traveler can complete the enrollment interview during CBP primary inspection at a participating airport. Upon arrival, travelers will be directed to a primary booth designated specifically for Enrollment on Arrival. A CBP officer will conduct both the primary processing and Global Entry interview and collect the traveler’s biometrics to complete the enrollment. The traveler will then be cleared for entry into the United States and, if approved, will be a Global Entry member.

Currently available at 54 U.S. airports and 15 Preclearance locations, Global Entry streamlines the international arrivals process at airports for trusted travelers. The more than 4.7 million Global Entry members bypass traditional CBP inspection lines and use an automated kiosk to complete their admission to the United States. As an added benefit, Global Entry members are also eligible to participate in the TSA Pre✓™ expedited screening program.

U.S. citizens, U.S nationals and U.S. Lawful Permanent Residents may apply for Global Entry as well as passport holders from Argentina, Colombia, Germany, India, Mexico, the Netherlands, Panama, the Republic of Korea, Singapore, Switzerland, Taiwan and the United Kingdom. Canadian citizens and residents enrolled in NEXUS may also use the Global Entry kiosks.

Interested travelers apply through the Trusted Traveler Programs website. The non-refundable application fee for a five-year Global Entry membership is $100 and applications must be submitted online. Once the applicant successfully passes a background check, a CBP officer will conduct an interview with the applicant at one of the more than 100 Global Entry Enrollment Centers located throughout the U.S., Canada, and Qatar or at an Enrollment on Arrival location and then make a final eligibility determination.

While the goal of Global Entry is to speed travelers through the process, members may be selected for further examination when entering the United States. Any violation of the program’s terms and conditions will result in appropriate enforcement action and may result in the revocation of the traveler’s membership privileges.

Visit CBP’s Global Entry website for more information on the Global Entry Program and the Enrollment on Arrival website for an updated list of available locations.

NEC Announces Expanded Footprint in Washington, D.C. Opening of Government Relations Office Adds Focus and Support to Global Technology Leader's Safety and Security Customers

Tokyo, Japan & Irving, Texas – NEC Corporation (NEC; TSE: 6701) and NEC Corporation of America (NECAM), an industry leading provider of biometrics and communications technology and integrator of IT solutions, today announced the expansion of its offices in Washington, D.C., to include a new government relations function.    

The office will be responsible for understanding U.S. government requirements for areas such as effective border management and counterterrorism as part of assuring NEC innovation and R&D are aligned to the needs of the United States. The office will also seek to improve NEC's brand awareness throughout the D.C. area.

The new government relations office will be led by Shinsuke (Shin) Takahashi, current Chairman and former President and CEO of NECAM.  In this role, Mr. Takahashi will further strengthen NEC's relationships with government agencies by aligning NEC's strategic initiatives with the goals of the U.S. government. Specific areas of collaboration will focus on security policy, international trade and other matters that affect national safety and security.

NECAM first opened its sales office in Washington, D.C., in May 2016 with a focus on providing biometric security solutions to the U.S. government.  In a short time, NEC has expanded its federal government business, where NEC was selected to participate in the U.S. Department of Homeland Security's Biometric Exit pilot program using NEC's NeoFace® Express face recognition rapid matching technology.

"In my previous role as President and CEO of NECAM over the past five years, it was exciting to be part of our growth in the U.S. government," said Mr. Takahashi. "My aim as Head of Government Relations is not only to advance our business, but to collaborate and build relationships in Washington so that we can contribute to a safer, more secure society."

In addition to the office's focus on U.S. government issues, Mr. Takahashi will also be responsible for developing relationships with international organizations like World Bank, IDB, and the United Nations. NEC's expansion in Washington D.C. will become effective in early December.  

Smiths Detection Receives Order for Vehicle Scanning Technologies From U.S. Customs and Border Protection

Edgewood, MD –  Smiths Detection Inc. (SDI) announces orders totaling $7.1 million for HCVM e35 NA and ScanVan technologies under existing indefinite delivery/indefinite quantity (IDIQ) contracts with U.S. Customs and Border Protection (CBP).

Smiths Detection’s ScanVan is a small, easily maneuvered vehicle, fitted with HI-SCAN 100100T technology, a state-of-the-art X-ray system capable of scanning objects such as cargo, strollers, boxes or electronics. It is specially designed for the needs of customs facilities, airports, transport operators, and couriers - or wherever temporary high-security checkpoints are required.

The HCVM e35 NA is a fully integrated mobile solution used to inspect whole trucks, containers and vehicles. Utilizing state-of-the-art software platforms to provide detailed X-ray image views, customizable image options, and comparison tools to enhance screening outcome, it screens for contraband and threats such as explosives, narcotics, and weapons. The solutions also help operators to reduce screening times and increase data collection capability.  

Stephen Esposito, Vice President of Business Development and Sales, said, “Smiths Detection’s advanced technology, reputation for custom solutions, responsiveness, and reliable service  have helped us to become long-term providers for agencies around the world. Our experience allows us to continue to work closely with CBP to provide world-leading solutions that help to protect our borders and secure locations across the country.”

For more information, please visit www.smithsdetection.com

###

Avinor Oslo Airport Expands its Qognify Security Solution With Situator

Qognify, the leader in big data solutions for physical security and operations, today announced that it has recently expanded its security solution at Gardermoen Oslo Airport with Situator, the company's market-leading situation management solution. Avinor, the group responsible for managing Norway's airports, decided to not only expand and upgrade Oslo Airport, but unify its different systems to create a unified security platform.
Extending to Situation Management

A Qognify video management solution user since 2008, the Airport, with the support of Racom, Qognify's partner, the airport now added Situator Situation Management solution. The comprehensive platform integrates all existing systems - Qognify and third-party, including thousands of surveillance cameras, access control and other sensors. Situator structures and correlates the information from these different systems for greater situational awareness, incident management and effective response.
Flexigate override support
Being a major European airport, Oslo serves many Schengen flights, meaning flights to the 26 European countries that have officially abolished passport and all other types of border control at their borders. Allowing the area to function as a single country for international travel purposes dictates special operational requirements using advanced Flexigate system. The Flexigate system avoids incidents where the wrong doors are opened to ensure that passengers who should go through the border control actually do so. Situator integrates with the advanced Flexigate access control system, and overrides switching of gates between Schengen and non-Schengen flights, as well as the domestic flights if the control systems are out of operations.
Avinor Oslo Airport: "Situator allows us to leverage our existing technology, and extend the capabilities of those systems for increased value. Our long-term partnership with Racom and Qognify has given us the ability to smartly and cost-effectively upgrade our security without having to rip & replace previous, viable investments."
"Adding Qognify Situator to the security and operations program at Oslo Airport has enabled us to confidently build true best-of-breed solution," said Frode Igland, CEO, Racom AS. "The new capabilities provide a common operating picture for all stakeholders, improving security and operations."
"Oslo Airport's security program is one of the most advanced ones among the many airports we are involved in," commented Moti Shabtai, Qognify's CEO & President. "Our partnership with Avinor and Racom is a testament to how deep, long-term collaboration can produce exceptional return on investment for the airport."
About Racom
Racom is a privately owned Norwegian company providing intelligent technology solutions with value added professional services. Our mission is to optimize operations, security, safety, network and communication to critical infrastructure and critical community functions, for the purpose of facilitating to future needs.
http://www.racom.no
About Qognify
Qognify helps organizations mitigate risk, maintain business continuity, and optimize operations. The Qognify portfolio includes video management, video and data analytics, and PSIM/ Situation Management solutions that are deployed in financial institutions, transportation agencies, airports, seaports, utility companies, city centers, and to secure many of the world's highest-profile public events.
http://www.Qognify.com

Coast Guard offloads approximately 10 tons of cocaine in Port Everglades

MIAMI — The crew of the Coast Guard Cutter Spencer offloaded approximately 10 tons of cocaine and 23 kilograms of heroin Tuesday in Port Everglades worth an estimated $300 million wholesale seized in international waters off the Eastern Pacific Ocean.

The drugs were interdicted along Mexico and Central America by multiple U.S. Coast Guard cutters.

The offload represents 14 separate, suspected drug smuggling vessel interdictions by the Coast Guard:

    The CGC Steadfast was responsible for one case, seizing an estimated 940 kilograms of cocaine
    The CGC James was responsible for two cases, seizing an estimated 690 kilograms of cocaine
    The CGC Alert  was responsible for six cases, seizing an estimated 3,305 kilograms of cocaine and 23 kilograms of heroin
    The CGC Aspen was responsible for one case, seizing an estimated 102 kilograms of cocaine
    The CGC Vigorous  was responsible for one case, seizing an estimated 1,150 kilograms of cocaine
    The CGC Spencer was responsible for two cases, seizing an estimated 3,000 kilograms of cocaine
    The CGC Thetis was responsible for one case, seizing an estimated 1,060 kilograms of cocaine

Numerous U.S. agencies from the Departments of Defense, Justice and Homeland Security are involved in the effort to combat transnational organized crime. The Coast Guard, Navy, Customs and Border Protection, FBI, Drug Enforcement Agency, and Immigration and Customs Enforcement along with allied and international partner agencies play a role in counter-drug operations. The fight against transnational organized crime networks in the Eastern Pacific requires unity of effort in all phases from detection, monitoring and interdictions, to prosecutions by U.S. Attorneys in California, on the East Coast, and in the Caribbean.

"This offload today is not just the result of one unit, but the combined efforts of multiple Coast Guard cutters, aircraft and support, as well as that of our partners and allied men and women who continue to work day and night to stop these criminal organizations from profiting off transnational crime and smuggling," said Cdr. John Mctamney, Commanding Officer Coast Guard Cutter Spencer. "While this offload represents approximately 10 tons of illicit drugs that will never hit out streets, it also represents a significant depletion to the cash flow to these criminal organizations."

The Coast Guard increased U.S. and allied presence in the Eastern Pacific Ocean and Caribbean Basin, which are known drug transit zones off of Central and South America, as part of its Western Hemisphere Strategy. During at-sea interdictions in international waters, a suspect vessel is initially located and tracked by allied, military or law enforcement personnel. The interdictions, including the actual boarding, are led and conducted by U.S. Coast Guardsmen. The law enforcement phase of counter-smuggling operations in the Eastern Pacific are conducted under the authority of the 11th Coast Guard District headquartered in Alameda, California.

The cutter Steadfast is a 210-foot medium-endurance cutter homeported in Astoria, Oregon. The cutter James is a 418-foot national security cutter homeported in Charleston, South Carolina. The cutter Alert is a 210-foot medium-endurance cutter homeported in Astoria, Oregon. The cutter Aspen is a 225-foot buoy tender homeported in San Francisco, California. The cutter Vigorous is a 210-foot medium-endurance cutter homeported in Virginia Beach, Virginia. The cutter Spencer is a 270-foot medium-endurance cutter homeported in Boston, Massachusetts. The cutter Thetis is a 270-foot medium-endurance cutter homeported in Key West, Florida.

Pages

 

Recent Videos

HID Global is opening the door to a new era of security and convenience.  Powered by Seos technology, the HID Mobile Access solution delivers a more secure and convenient way to open doors and gates, access networks and services, and make cashless payments using phones and other mobile devices. ...
Mobile device forensics can make a difference in many investigations, but you need training that teaches you how to get the most out of your mobile forensics hardware and software, and certifies you to testify in court. Read this white paper to learn how to evaluate mobile forensics training...
PureTech Systems is a software company that develops and markets PureActiv, its geospatial analytics solution designed to protect critical perimeters and infrastructure.  Its patented video analytics leverage thermal cameras, radars and other perimeter sensors to detect, geo-locate, classify, and...
PureTech Systems is a technology leader in the use of geospatial video, focusing on perimeter security.  When combining geospatial capabilities with video analytics and PTZ camera control, managers of critical facilities can benefit by allowing the video management system to aid them in the process...