Federal | Agencies | Legislative
ASHINGTON – Acting Secretary of Homeland Security Elaine Duke this week met with Colombian Vice President Óscar Adolfo Naranjo Trujillo in Washington, DC. Acting Secretary Duke and Vice President Naranjo discussed mutual concerns regarding coca production in Colombia, and reaffirmed their commitment to continue cooperation and information sharing. They also discussed border security, aviation security, and close cooperation with other key partners in the region on maritime activities.
“The Department of Homeland Security remains committed to working with our partners in Colombia to address illegal drug production which often funds transnational criminal organizations,” said Acting Secretary Duke. “This week, we reaffirmed our commitment to addressing this issue as well as a variety of other shared interests between our countries.”
Earlier this year, DHS hosted the Conference on Prosperity and Security in Central America which brought together a diverse group of government and business leaders from the United States, Mexico, Canada, Central America, Colombia, and other countries to address economic, security, and governance challenges and opportunities. The participants dedicated the first day of the conference to advancing prosperity and economic growth in Central America, and the second day to achieving a stable and secure region. This week’s meeting continued the discussions from that conference.
Today, DHS and FBI released a pair of Joint Technical Alerts (TA17-318A and TA17-318B) that provide details on tools and infrastructure used by North Korea to target the media, aerospace, financial, and critical infrastructure sectors in the United States and globally.
The North Korean government malicious cyber activity noted in these alerts is part of a long-term campaign of cyber-enabled operations that impact the U.S. Government and its citizens. Working closely with our interagency, industry and international partners, DHS is constantly working to arm network defenders with the tools they need to identify, detect and disrupt state and non-state actors targeting the networks and systems of our country and our allies.
Earlier this summer, DHS and FBI released a technical alert and malware analysis report (MAR) of a malware variant, known as DeltaCharlie, used to manage North Korea’s distributed denial-of-service (DDoS) botnet infrastructure. The U.S. Government refers to all of this North Korean malicious cyber activity as HIDDEN COBRA and it is published on the National Cybersecurity and Communications Integration Center’s (NCCIC) U.S. Computer Emergency Readiness Team’s (US-CERT) website at www.us-cert.gov/hiddencobra.
On a daily basis, we share information about cyber threats, vulnerabilities, and other risks and the NCCIC is our primary hub for these important activities. Specifically, it occurs through the automated sharing of cyber threat indicators; the production of analytic reports and alerts containing threat and vulnerability mitigation information; and direct exchanges with analysts in the network defense community.
With our industry and government partners, we are looking to enhance our collaboration and partnerships across the globe to counter North Korea and another state or non-state actor’s malicious cyber activity, and we hope that, over time, public information sharing – such as the report today – will become a routine component of cooperation to address shared cyber threat.
Entities that find signs of this malicious cyber activity should report it to DHS’s National Cybersecurity and Communications Integration Center (NCCIC) or FBI through CyWatch or its local field offices.
Dubai, UAE—Global technology association ISACA will bring experts to this year’s 2017 Asia Pacific CACS conference for IT audit, risk, cyber security and governance professionals from around the world.
Taking place at the JW Marriott Marquis Hotel Dubai 29-30 November, the conference will offer more than 40 sessions in four educational tracks – IS Audit & Assurance, GRC, Security/Cyber Security, and Compliance/Privacy. Attendees can gain up to 23 continuing professional education (CPE) hours.
Speakers will include Tichaona Zororo, ISACA Board Director and IT advisory executive with Enterprise Governance of IT (EGEIT), who will examine “The Changing Focus of IT Audits,” and Leonard Ong, ISACA Board Director and Associate Director at Merck & Co Inc., who will present on “Cyber Resilience for the Changing World.”
Asia Pacific CACS 2017 also will feature sessions related to the role of assurance to address breaches and malware strikes; the benefits of pseudonymization for personal data; holistic IT governance and measurement metrics; the challenges of privacy in the Internet of Things; encryption across devices; and more.
The conference will present “COBIT 5 for Risk,” a one-day workshop featuring Mark Thomas, president of Escoute. The workshop format is designed to help attendees drive better business performance using COBIT 5 for Risk. The framework was developed for enterprises to increase understanding of business risk associated with IT and to achieve strategic enterprise objectives.
Many of the Asia Pacific CACS 2017 sessions take up themes explored in ISACA’s latest research on business and emerging technologies, “Digital Transformation Barometer.” The research and reports are based on a survey of more than 4,100 business technology professionals worldwide, 18% from the Middle East and Asia.
The research found that only 53% of respondents worldwide believe their organizations’ leadership are digitally literate. Respondents in the Middle East and Asia identified big data analytics as the emerging technology that stands the greatest chance of delivering transformational value to their organizations (36%), followed by the Internet of Things (20%) and artificial intelligence/machine learning/cognitive tech (20%).
To register or view more information on this year’s Asia Pacific CACS conference, please visit: www.isaca.org/AsiaPacificCACS.
Nearing its 50th year, ISACA (isaca.org) is a global association helping individuals and enterprises achieve the positive potential of technology. Today’s world is powered by technology, and ISACA equips professionals with the knowledge, credentials, education and community to advance their careers and transform their organizations. ISACA leverages the expertise of its half-million engaged professionals in information and cyber security, governance, assurance, risk and innovation, as well as its enterprise performance subsidiary, CMMI Institute, to help advance innovation through technology. ISACA has a presence in more than 188 countries, including more than 215 chapters and offices in both the United States and China.
Release Date: November 27, 2017, SALTON CITY, Calif., – El Centro Sector Border Patrol agents assigned to the Highway 86 checkpoint, arrested a man suspected of smuggling methamphetamine inside his pickup’s gas tank on Friday morning.
The incident occurred at approximately 11:40 a.m., when a 66-year-old man approached the checkpoint in a 2003 Chevy Silverado. Before the driver reached the primary inspection area, a Border Patrol canine detection team alerted to the driver’s side of the vehicle.
Agents referred the man to secondary inspection for a closer inspection of his pickup.
Upon further inspection, Border Patrol agents found 74 packages stuffed inside the pickup’s gas tank. Agents tested the contents of the packages. That test indicated a positive for characteristics of methamphetamine.
The total weight of the methamphetamine was 77.22 pounds with an estimated street value of $270,270.
Gas tanks are a common hiding place drug traffickers use to smuggle their narcotics.
The man, a naturalized citizen, the vehicle and narcotics were turned-over to the Drug Enforcement Administration for further investigation.
In fiscal year 2018, El Centro Sector has seized more than 197.54 pounds of methamphetamine.
Agents Arrest Man for Smuggling Meth, Fentanyl
TUCSON, Ariz., November 27, 2017 – Tucson Sector Border Patrol agents working at the immigration checkpoint on Interstate 19 near Amado found more than 50 pounds of methamphetamine and multiple fentanyl pills in a Nissan sedan following a canine’s alert on Nov. 22.
Agents referred the driver, an 18-year-old man from Nogales, Arizona, for a secondary inspection of the vehicle after a Border Patrol canine alerted to an odor it was trained to detect. As a result, agents found multiple packages of meth, worth in excess of $162,000, and more than half a pound of fentanyl valued at nearly $12,000.
Agents arrested the driver for narcotics smuggling and seized the sedan and its contents.
According to information posted on DEA.gov, Fentanyl is a potent synthetic opioid, prescribed for severe chronic pain, or breakthrough pain, to patients who are already receiving opioid medication. It is considered to be about 100 times more potent than morphine.
Border Patrol Arrests Convicted Sex Offender and MS-13 Gang Member
OCOTILLO, Calif., November 27, 2017 – U.S. Border Patrol agents assigned to the El Centro Sector arrested two potentially dangerous men, a previously deported sex offender and an MS-13 gang member, who illegally entered the United States Friday morning.
The first incident happened at approximately 5:15 a.m., when Border Patrol agents patrolling approximately 22 miles west of the Calexico Port of Entry, encountered a man who was illegally present in the United States.
Agents arrested the man and transported him to the El Centro Station for processing.
Agents conducted record checks which revealed that the man had a previous notice to appear from San Jose, CA for lewd acts with a child under 14.
The man a 44-year-old Mexican citizen, will be removed to his country of origin.
The second incident occurred at approximately 1:15 p.m., when Border Patrol agents patrolling 11 miles west of the Calexico Port of Entry, encountered a man who had illegally entered the United States.
Border Patrol agents arrested the man and transported him to the El Centro Station for processing.
After agents conducted record checks they were able to identify that the man had a previous record with affiliation to the MS-13 gang from Honduras.
The man was removed in 2010 and will be processed as a Reinstatement of previous removal.
The man, a 24-year-old Honduras citizen, will be removed to his country of origin.
Armed Mexican Smuggler Arrested near Gila Bend
TUCSON, Ariz., November 27, 2017 – Tucson Sector Border Patrol agents from the Ajo Station seized a Dodge minivan and a handgun Sunday after identifying the driver and three passengers as Mexican nationals illegally present in the United States.
Agents stopped the minivan on westbound Interstate 8, outside of Gila Bend, Arizona, Sunday afternoon to conduct an immigration inspection. While questioning the occupants, agents determined all individuals were Mexican nationals who had entered the country illegally.
During a subsequent search of the vehicle, agents discovered a 9mm pistol and ammunition, belonging to the driver.
In addition to seizing the vehicle and weapon, agents arrested the four occupants for immigration violations, in accordance with Tucson Sector guidelines. The driver will also be presented for prosecution and could face additional charges for his role in the smuggling attempt, as well as for illegal possession of a firearm.
Agents Arrest Illegal Alien Convicted of Rape
TUCSON, Ariz, November 27, 2017 – Border Patrol agents from the Tucson Station apprehended a 40-year-old Mexican man in the desert near Sasabe, Arizona, on Saturday afternoon for illegally entering the United States.
While processing Juan Sotelo-Carasco, agents conducted a records check and learned he was convicted and sentenced in 2016 for rape in Contra Costa County, California.
Sotelo is being held in federal custody pending prosecution for felony criminal immigration violations.
OMAHA, Neb., Nov. 27, 2017 -- Long airport security checkpoint lines are the accepted norm. But should individuals who have already been fingerprinted and passed a background check be subjected to Transportation Security Administration screening to enter the TSA PreCheck program?
Wounded Warriors Family Support supports TSA PreCheck for retired military members with a valid U.S. Department of Defense Form 2 (retired identification card) and honorably discharged veterans without having to submit another background check and pay $85.
"Every honorably discharged veteran has gone through a National Agency Check and those who have held Top Secret clearance have had a thorough months-long Single Scope Background Investigation conducted," said Col. John Folsom, USMCR (Ret.), founder and president of Wounded Warriors Family Support. "Our background checks are equal to, and in many cases exceed, the background checks TSA conducts for its PreCheck program. Many honorably discharged veterans have lost limbs. Not to extend this courtesy can cause them pain when they stand on their prosthetics as they wait in a long TSA line.
"As a retired vice admiral of the United States Coast Guard, TSA Administrator David Pekoske knows than an honorably discharged veteran is not a security risk," he said. "Honorably discharged veterans should be shown respect by being assigned a Known Traveler Number without having to go through another background check and paying a fee. It's the right thing to do for our honorably discharged and retired veterans."
TSA PreCheck is a government-sponsored program that started in October 2011. It grants approved passengers on domestic flights – and some international – to expedite screening. TSA PreCheck costs $85 for a five-year membership.
There are more than 5 million members enrolled as 42 airlines work in cooperation with TSA PreCheck at 200 airports across the U.S. Unlike the regular security line, PreCheck passengers do not need to remove their shoes, laptops, liquids, belts and light jackets, which means less time in line. In October, 97 percent of TSA PreCheck passengers waited less than five minutes in a security line, according to the TSA website.
Wounded Warriors Family Support hopes to have support from the American Legion, Marine Corps League, Non Commissioned Officers Association, Retired Military Officers Association and Veterans of Foreign Wars in this request to Pekoske and Congress.
"This is another way the American people can recognize the honorable service of our veterans and their families," Folsom said.
About Wounded Warriors Family Support
Wounded Warriors Family Support is an independent nonprofit organization whose mission is to provide support to the families of those who have been wounded, injured or killed during combat operations. This organization is run by combat veterans for combat veterans. Rated a four-star nonprofit by Charity Navigator, Wounded Warriors Family Support aids veterans and their families in healing the wounds that medicine cannot. For more information about Wounded Warriors Family Support, visit www.wwfs.org.
Amsterdam, – To help device manufacturers meet a growing demand for long-lasting low-power NarrowBand (NB) IoT modules, Gemalto and Huawei – via its semiconductor arm, HiSilicon – are working together to develop the next generation of modules that combine an extra level of security and consume very low power. By combining the expertise from both companies, these NB-IoT modules will help manufacturers reduce the cost and size of their devices, and lengthen the battery life of the devices to up to ten years.
NB IoT has been developed to address lower bit rates and lower cost segments, and works virtually anywhere. It offers ultra-low power consumption enabling devices to be battery operated for periods of up to 10 years. Applications include smart parking sensors, intruder and fire alarms, personal healthcare appliances, tracking devices, and street lamps to name a few. According to ABI Research, NB IoT modulesconnecting objects to networks are forecast to represent over 20% of all cellular shipments by 2021.
"2017 is the year of commercial NB IoT rollouts for us, and we will be building 30 such networks in 20 countries worldwide by the end of the year. Huawei has been a major player in this arena, and we continue to capitalize on this vast opportunity," said XiongWei, president of LTE solution, Huawei. "We look to supply the market with solutions that provide stable connectivity, low energy consumption, and cost efficiency. The network roll-out will now come with an enhanced integration and flexibility thanks to this collaboration with Gemalto."
"The combination of our expertise in IOT cellular connectivity, and digital security, and Huawei's high-performance NB IoT chipsets will help device manufacturers and service providers take the plunge into cellular IoT mass deployment thanks to a standardized solution," said Suzanne Tong-Li, SVP Greater China and Korea for Mobile Services and IoT and China President, Gemalto. "Our collaboration simplifies the implementation of NB IoT projects combining solid security and flexibility."
Gemalto (Euronext NL0000400653 GTO) is the global leader in digital security, with 2016 annual revenues of €3.1 billion and customers in over 180 countries. We bring trust to an increasingly connected world.
From secure software to biometrics and encryption, our technologies and services enable businesses and governments to authenticate identities and protect data so they stay safe and enable services in personal devices, connected objects, the cloud and in between.
Gemalto’s solutions are at the heart of modern life, from payment to enterprise security and the internet of things. We authenticate people, transactions and objects, encrypt data and create value for software – enabling our clients to deliver secure digital services for billions of individuals and things.
Our 15,000+ employees operate out of 112 offices, 43 personalization and data centers, and 30 research and software development centers located in 48 countries.
SOUTHWEST ASIA, Nov. 27, 2017 — U.S. and coalition military forces have continued to attack the Islamic State of Iraq and Syria yesterday, conducting 11 strikes consisting of 36 engagements Nov. 24 and 25, Combined Joint Task Force Operation Inherent Resolve officials reported today.
Officials reported details of the most recent strikes, noting that assessments of results are based on initial reports and adding that no strikes have yet been reported as having taken place in Syria or Iraq yesterday.
In addition, officials today reported details of a Nov. 23 strike consisting of one engagement near Abu Kamal, Syria, for which the details were unavailable in time for the most recent previous report. The strike engaged an ISIS tactical unit and destroyed an ISIS vehicle.
Strikes in Syria
On Nov. 24 in Syria, coalition military forces conducted four strikes consisting of seven engagements against ISIS targets:
-- Near Abu Kamal, three strikes engaged three ISIS tactical units and destroyed two ISIS vehicles.
-- Near Shadaddi, a strike damaged an ISIS supply route.
On Nov. 25 in Syria, coalition military forces conducted five strikes consisting of eight engagements near Abu Kamal, engaging six ISIS tactical units and destroying four ISIS vehicles and a headquarters.
Strikes in Iraq
On Nov. 24 in Iraq, coalition military forces conducted two strikes consisting of 21 engagements against ISIS targets:
-- Near Baaj, a strike engaged two ISIS tactical units and destroyed six ISIS vehicles and two ISIS-held buildings.
-- Near Mosul, a strike damaged an ISIS supply route.
No strikes were reported in Iraq for Nov. 25, officials said.
Part of Operation Inherent Resolve
These strikes were conducted as part of Operation Inherent Resolve, the operation to destroy ISIS in Iraq and Syria. The destruction of ISIS targets in Iraq and Syria also further limits the group's ability to project terror and conduct external operations throughout the region and the rest of the world, task force officials said.
The list above contains all strikes conducted by fighter, attack, bomber, rotary-wing or remotely piloted aircraft; rocket-propelled artillery; and some ground-based tactical artillery when fired on planned targets, officials noted.
Ground-based artillery fired in counterfire or in fire support to maneuver roles is not classified as a strike, they added. A strike, as defined by the coalition, refers to one or more kinetic engagements that occur in roughly the same geographic location to produce a single or cumulative effect.
For example, task force officials explained, a single aircraft delivering a single weapon against a lone ISIS vehicle is one strike, but so is multiple aircraft delivering dozens of weapons against a group of ISIS-held buildings and weapon systems in a compound, having the cumulative effect of making that facility harder or impossible to use. Strike assessments are based on initial reports and may be refined, officials said.
The task force does not report the number or type of aircraft employed in a strike, the number of munitions dropped in each strike, or the number of individual munition impact points against a target.
NEW YORK-- L3 Technologies (NYSE:LLL) announced today the award of multiple contracts relating to the development of Free Space Optics (FSO) capabilities for U.S. Department of Defense (DoD) and space customers. FSO technology enables high-bandwidth communication while protecting signal integrity in a highly contested spectrum environment and is a proven next-generation solution for high-capacity, over-the-air communications.
“Our continued investment in FSO technologies builds on our leadership in providing state-of-the-art data links that deliver the most reliable and secure communications possible for our customers,” said Christopher E. Kubasik, L3’s President and Chief Operating Officer. “Our focus on bringing innovation to the space and near-space domains reflects our strategy of aligning with our customers’ priorities in these markets to increase their efficiencies and overall mission effectiveness.”
Work on these contracts will be done by L3 Communication Systems-West (L3 CS-West), which is part of the company’s Communication Systems business segment. L3 CS-West has been developing robust and reliable FSO communications since 2007, enabling long- and short-haul transmission capabilities for enhanced dissemination of large volumes of video and data.
L3 CS-West is a leader in communication systems for high-performance networks, including intelligence collection, imagery processing and satellite communications for the DoD and other customers. The company provides high data rate, wideband, secure, real-time communication systems for surveillance and reconnaissance. To learn more about L3 CS-West, please visit the company’s website at www.L3T.com/CSW.
Headquartered in New York City, L3 Technologies employs approximately 38,000 people worldwide and is a leading provider of a broad range of communication, electronic and sensor systems used on military, homeland security and commercial platforms. L3 is also a prime contractor in aerospace systems, security and detection systems, and pilot training. The company reported 2016 sales of $10.5 billion.
To learn more about L3, please visit the company’s website at www.L3T.com. L3 uses its website as a channel of distribution of material company information. Financial and other material information regarding L3 is routinely posted on the company’s website and is readily accessible.
Safe Harbor Statement Under the Private Securities Litigation Reform Act of 1995
Except for historical information contained herein, the matters set forth in this news release are forward-looking statements. Statements that are predictive in nature, that depend upon or refer to events or conditions or that include words such as “expects,” “anticipates,” “intends,” “plans,” “believes,” “estimates,” “will,” “could” and similar expressions are forward-looking statements. The forward-looking statements set forth above involve a number of risks and uncertainties that could cause actual results to differ materially from any such statement, including the risks and uncertainties discussed in the company’s Safe Harbor Compliance Statement for Forward-Looking Statements included in the company’s recent filings, including Forms 10-K and 10-Q, with the Securities and Exchange Commission. The forward-looking statements speak only as of the date made, and the company undertakes no obligation to update these forward-looking statements.
GSA’s Next Generation of Alliant is Here; 61 Companies Awarded Spots on “Best-in-Class” Alliant 2 Governmentwide Acquisition Contract for IT services
WASHINGTON, D.C.-- Today the U.S. General Services Administration (GSA) announced the award of its $50 billion Alliant 2 (A2) Governmentwide Acquisition Contract (GWAC). The A2 GWAC is a Multiple Award, Indefinite-Delivery, Indefinite-Quantity (IDIQ) contract to provide customized Information Technology (IT) services and IT services-based solutions to the government. A2 provides federal agencies with access to 61 companies providing integrated information technology (IT) solutions for evolving needs on a global basis. Further, A2 allows for the application of technology to meet business needs including the ability to stay on the forefront of emerging IT services. To see the complete list of awarded industry partners, please visit www.fbo.gov.
The next-generation A2 contract is available to all federal agencies and has already earned "best-in-class" status from the Office of Management and Budget. It’s a follow up to the first successful GSA GWAC, Alliant, which aggregates custom IT providers on one full-range vehicle to meet the evolving needs of Federal agencies.
"The next generation Alliant continues to build on GSA’s success collaborating with industry partners to design solutions that support federal agencies with mission-critical, complex IT services requirements," said GSA Office of Information Technology Category Assistant Commissioner Kay T. Ely. ”The team’s work to earn a best-in-class designation by including pricing strategies and data-driven demand management practices will serve federal agencies well, and lower costs for american taxpayers.”
“I applaud the great work the Alliant 2 team did to make this solution a reality,” said Federal Acquisition Service Commissioner Alan Thomas. “Alliant 2 provides agencies with a vehicle to help modernize mission-critical IT and meet the government’s requirements not just today, but well into the future.”
The new A2 comes with significant enhancements, such as scope improvements, new IT service labor categories, new cybersecurity standards, new environmental standards, and the incorporation of required Defense Federal Acquisition Regulation Supplement (DFARS) regulations/provisions into the master contract so they automatically flow down to the task order level on any/all task orders issued by a Department of Defense (DOD) agency.
A2 also includes:
- A highly qualified pool of information technology industry partners;
- A robust scope aligned with the Federal Enterprise Architecture (FEA) and Department of Defense Enterprise Architecture (DoDEA);
- Access to a full range of comprehensive IT services and IT services-based solutions;
- Flexibility as emerging technologies and the definition of information technology evolve;
- Ancillary support (non-IT) permitted when it is integral to, and necessary for, the IT services-based outcome;
- On-ramp and off-ramp provisions, ensuring retention of a highly-qualified pool of contractors;
- A full spectrum of contract types, including cost reimbursement;
- Worldwide coverage;
- Complimentary scope-compatibility reviews;
- Acquisition templates, and
- Sample Statements of Work (SOWs).
The first-generation Alliant GWAC will expire in April 2019. The A2 unrestricted contract allows federal clients that have long-term task order requirements exceeding five years to consider the A2 GWACs. For more information, please visit www.gsa.gov/alliant2 or download the Alliant 2 brochure.
Press Conference Information: GSA invites reporters to attend a conference call Q&A session with Deputy Assistant Commissioner for IT Category Management Operations, Bill Zielinski, at 2:00 pm EST today (Monday, November 20, 2017). For dial-in information please RSVP to [email protected] by 1:00 pm EST.
# # #
Salient CRGT Expands Mobility Product Offering to Provide Law Enforcement Quick Access to Investigative Data
FAIRFAX, Va., Nov. 21, 2017 -- Whether it's a state trooper needing an immediate background check on a motorist or an investigator requiring timely criminal evidence for a case, law enforcement officials demand instant access to crucial investigative information. Recognizing this challenge to rise to higher level of performance, Salient CRGT, Inc., a leading provider of technology consulting services has partnered with Kaseware, the leader in investigative case management solutions, to integrate Salient CRGT's Voyager™ Query for Law Enforcement within the Kaseware investigative case management system to make it easier for law enforcement agencies to obtain criminal justice data.
Kaseware investigative case management system combines incident and case management, dispatching, evidence management, and analytics in a single, integrated system. Salient CRGT's Voyager Query's proven, cloud-based CJIS integration platform, paired with Kaseware's integrated system eliminates the need to maintain multiple software products or reinvent connecting to legacy systems and databases. As a result, this strategic partnership enables agencies to cost effectively support information sharing, comprehensive investigations, and crime reduction programs.
"Data sharing in law enforcement is a powerful tool used to not only protect the lives of law enforcement officers, but also enhance public safety and neutralize criminal activity. Partnering with Kaseware further expands Voyager Query's commercial reach and enhance the delivery of critical information to the hands of first responders," said Dr. Larry Rose, SVP of Commercial Services at Salient CRGT.
Salient CRGT currently serves more than 250 law enforcement communities encompassing over 2,100 users using Voyager Query for Law Enforcement. Voyager Query's infrastructure allows authorized agencies to access critical Criminal Justice Information Services (CJIS) compliant data over any wireless network and the ability to message between multiple users and agencies provides a new level of information sharing capability. Kaseware is offered as a CJIS compliant SaaS or on premises integrated suite of capabilities that's easy to use and full featured.
"Kaseware was developed by the same team that built the FBI's current global investigations and case management system. We understand the critical impact of relevant and timely law enforcement data to any investigation," said Chad Fulgham, Co-Founder and CEO of Kaseware and former FBI CIO. "Kaseware's offering of Salient CRGT's National Crime Information Center searching at no extra cost for all Kaseware law enforcement officials customers is yet another example of how Kaseware is committed to supporting our law enforcement professionals."
About Salient CRGT
Salient CRGT provides federal civilian, defense, homeland, and intelligence agencies, as well as Fortune 1000 companies, with expertise and leadership in health, data analytics, cloud, agile software development, mobility, cyber security, and infrastructure solutions. We support these core capabilities with full life‐cycle IT services and training—to help our customers meet critical goals for pivotal missions. The most innovative talent delivery model in the industry, scientifically providing exactly the right people for the customers' most pressing requirements, fuels these critical capabilities. Salient CRGT has earned a record of success with integration and operations of large‐scale, high‐volume solutions. On March 1, 2017, Salient CRGT completed its acquisition of Information Innovators, Inc. – visit newsroom and explore www.salientcrgt.com.
Kaseware is a tech startup that empowers agencies of any size with advanced investigative and case management technology to deliver incident and case management, investigations, analytics, and information sharing solutions to law enforcement, intelligence, government, and corporate security organizations. Its solution is offered as Software-as-a-Service (SaaS) or On-Premises Enterprise and always supports modern browsers and major mobile platforms
Tweet: [email protected]_CRGT expands mobility product offering to provide law enforcement quick access to investigative data http://bit.ly/1MGSz5l
SOURCE Salient CRGT