78.9 F
Washington D.C.
Tuesday, April 30, 2024
Home Blog Page 3217

Vanderbilt Industries Provides High-level Security for Crider Foods

Vanderbilt Industries, a provider of state-of-the-art security systems,  announced Crider Foods, Stillmore, Ga. relies on Vanderbilt Industries SMS Access Control system to provide security for its large production and processing facilities. Tutela, Inc., out of Brunswick, Ga., is the integrator and installer on this long-running project.

Privately owned and operated, Crider Foods represents a commitment to quality, food safety and customer service. The Crider Foods Canning Facility was opened in Stillmore, Ga. after a fire destroyed their Augusta plant. In 2003, a “Fully Cooked” plant was added. Crider Foods is committed to being a leader in canning proteins and in its fully cooked operation. Crider is always investing in equipment and expertise to ensure continuous improvements.

After completion of the canning plant, Crider contracted with Vanderbilt and Tutela to set up a high-level security system. To date, the Vanderbilt SMS system manages access for over 500 employees and contractors at approximately 150 contact points spread over 11 locations at the Stillmore campus. Locations include the fully cook plant, company headquarters, the visitor’s Lodge, canning plant, cooler building, transportation building, warehouses and others.

“Our security system is absolutely critical to helping assure compliance to all the health and safety rules and regulations we have in the food production industry,” explained Ron Sasser, Crider’s IT director, who also oversees security. “We are committed to an extremely high level of access control management to prevent any cross contamination of our products.”

Sasser continued, “Our priority is to limit access for all our employees as to where they can go in the facility. The Vanderbilt system enables us to manage employees so that they can access only the areas where they have been scheduled to work, when they are scheduled to work. We also have the flexibility to easily change those access privileges as needed, at any time.”

Crider also uses their Vanderbilt access control system to verify time and attendance information. If an employee doesn’t punch in, Sasser and staff can use the system to verify when any employee has entered the property. In addition to controlling access to buildings and within buildings, Crider employs guards at the facility’s road entrances to verify all vehicles coming onto the property.

While asset protection is always an issue, for Crider Foods the number one priority is achieving full compliance with food and safety regulations in order to achieve the highest level of Safe Quality Food (SQF) Certification. Crider has succeeded in gaining SQF, Level 3.

“Only a few companies reach this level,” explained Sasser. “To reach such a certification level, we carefully control the movement of all individuals within the complex, and this means, for example, restricting access to chemicals and to the roofs of our buildings, among other sensitive areas.”

Crider also deploys 100 IP video surveillance cameras to keep any eye on operations. “Cameras are helpful,” said Sasser, “but you have to start with access. My access control system tells me who I’m seeing on the video. Now, I know who someone is, because the access control system puts them in that location. Without access control, the cameras are only so good.”

“The Vanderbilt system is working well, it’s doing everything it is supposed to do. We’ve used it for so many years, and Tutela has been very good taking care of any issues and system expansion needs along the way. If we have a need, this team gets it taken care of."

The Vanderbilt system, under Tutela’s watchful installation and administration, provides a layered level of security starting from the minute one steps onto the Crider property, down to limiting access to chemical storage. The system supplements time and attendance data and provides documentation for OSHA reporting. But, at the end of the day, Crider’s high-level security system provides management the tools they need to achieve one of the highest Safe Quality Food (SQF) Certification levels in the industry, and that’s worth a great deal in proof of product quality and company reputation.

Exacq Technologies Partners with VoloForce to Leverage Video Security for More than Just Theft

Exacq Technologies, part of the security products business unit of Tyco, a manufacturer of video management system (VMS) software and servers used for video surveillance, announced an integration with VoloForce Real Cadence, a software as a service (SAAS) real-time retail execution solution.

Real Cadence goes beyond loss prevention to leverage the exacqVision security system as much more than just a security system. This provides retailers with a tool to manage strategic branding, store operations and every aspect of the business.

Real Cadence by VoloForce enables exacqVision users to control their global brand appearance and improve the customer experience through operational insight. With the integration, users can visually see their product placement in each individual store throughout the world and ensure their brand is being properly executed.

This integration allows corporate office users and regional store managers to associate the exacqVision video of specific retail locations with corporate checklists and brand processes within Real Cadence, saving them time and reducing operational costs of traveling to each location. Video from the appropriate camera is automatically mapped to the zone within the store department.

Real Cadence also connects exacqVision video to the traffic counter feature to verify the video with the number of people entering and exiting the store. At any time, a regional manager can view and receive the necessary insight into all locations operations.

“The VoloForce Real Cadence integration allows exacqVision users to leverage surveillance video for operational benefits beyond security,” said Exacq Technologies Director of Marketing Scott Dennison. “Now retailers can visually monitor their store’s key performance indicators without costly travel.”

This integration requires an exacqVision server with a current exacqVision professional or enterprise license.

President Declares War on Cyber Terrorists

President Obama’s used his second-to-last State of the Union Address on Tuesday night to declare war on cyber terrorists.

Read complete report here.

US Says American Joined Al Qaeda, Tried to Blow Up New York Railroad

Two Yemenis with alleged ties to Al Qaeda have been charged in US federal court with conspiring to murder Americans abroad, US officials said Tuesday.

Read complete report here.

ISIS has First Gunfight with the West

This past week marked the first firefight between western forces in Iraq and ISIS militants.

Until now neither the United States nor any other member of the coalition could say they’d fired on ISIS from anything but an aircraft overhead.

Read complete report here.

French Security: Chechens Arrested Amid High Alert

French police have detained five Chechens on suspicion of possessing explosives, with the country on high alert following attacks in Paris.

Read complete report here.

Terrorist Drone Hacking and Countermeasures, Buzzing Critical Infrastructures and Federal Rulemaking Update

Read our special feature, Eyes in the Sky, in the current issue of Homeland Security Today. We examine the issue of unmanned aerial vehicles’ (UAVs) vulnerability to hacking and their use by Islamist jihadists, explore the threat UAVs pose to critical infrastructure and an update on domestic UAV usage rulemaking by the Federal Aviation Administration.

Drones at Risk to GPS Spoofing and Hacking

Jihadists Find Drones of Strategic Cyber Importance

Soaring to Risky New Heights: UAVs Buzz World’s Critical Infrastructures

Defending Drones Against Cyber Attacks

He Who Hesitates is Last: An Update on Federal Drone Rulemaking

New Technical Brief on Explosion, Fireball and Pool Fire Threats from Ignited Crude Oil

In a follow-up to AristaTek’s January 2014 technical brief, Toxic Consequences of Smoke Plumes from Crude Oil Fires, that was prepared in response to the threat of an accident involving crude oil shipments, the company has prepared a new technical brief, Hazards Associated with Spilled Crude, to help with planning and response to accidents involving crude oil by consolidating several key pieces of information important to planners and responders.

A leading provider of hazardous materials planning and response solutions, AristaTek’s new brief to be released this week details the consequences of vapor cloud explosions, fireballs and pool fires for various quantities of spilled crude oil. AristaTek makes its technical briefings available at no cost to hazmat teams, fire departments, fire marshals, sheriffs, first responders and emergency response officials and any other public safety and health professionals to assist in their responsibility to protect their communities.

“We decided to do another tech brief on crude oil as there have been several articles lately about communities having done studies which show themselves to be largely unprepared for a disaster involving crude oil,” Homeland Security Today was told by AristaTek spokesman C. Scott Bunning. “Our briefprovides a ‘Hazard Table’ for explosive and burn effects of both fireballs and pool fires for various along with other consolidated info we hope responders and planners will find as a useful resource.”

“During a train derailment involving crude oil, the immediate threats that responders worry about the most are the vapor cloud explosions and pool fires,” said AristaTek CEO Bruce King. “We felt analyzing these threats and providing an easy to follow table for various quantities of spilled crude would be a useful resource for planners and responders alike.”

“According to the American Association of Railroads, there were 362,000 carloads of crude oil shipped in the first three quarters of 2014,” the company said, pointing out that, “This amount is twice that of the same time period only two short years ago in 2012. Several high-profile accidents in 2013 highlighted the inherent dangers this substance can present to communities. Many states have conducted recent surveys of their response capabilities for accidents involving spilled crude and have found their responders largely unprepared for a large accident involving the substance.”

“A typical tank car may contain 30,000 gallons of crude oil, and could be part of a unit train containing over 100 tank cars. The most common accident is a train derailment, which may or may not result in a rupture spilling crude oil,” the brief says. And, “Because of its flammable nature, the crude may ignite resulting in explosions, fireball and pool fire. Multiple rail cars may be involved. The fire will also produce a dense black smoke cloud which could require evacuations or shelter -in-lace. There may be environmental concerns because of spills into a waterways.”

AristaTek said, “Crude oil presents several hazards when it is spilled in the environment and [its new technical brief] summarizes these hazards in a useful table. The first hazards happen when the spilled crude vaporizes, contacts an ignition source, explodes and also rapidly burns in a fireball. The resulting hazards are an explosion who blast is measured in overpressure, and the fireball which has a burn hazard for those standing too close."

"The other hazard," the firm said, "is a burn hazard associated with burning pool of spilled crude. The table offers safe-standoff distances for various quantities of spilled crude for all three hazards. The brief also offers some highlights of the recently issued industry reports on Bakken crude oil detailing characteristics of this type of crude and its lower flash point, and points out several government and industry sources for response information and protocols for emergency response.”

“The table of hazards was prepared using our flagship PEAC-WMD software, the world’s leading hazardous materials technical reference and modeling software,” King said. “Preparing this table and the brief overall is one of our efforts to provide a free but effective resource for those planners and responders attempting to prepare for this threat that isn’t going away any time soon despite the recent drop in oil prices.”

Photo: Harvey Henkelmann.

Senate Introduces House Version of Secure Our Borders First Act

As the House Committee on Homeland Security Wednesday began a full committee markup of the Secure Our Border First Act of 2015 (H.R. 399)  Homeland Security Today reported was introduced this week by committee chairman Rep. Michael McCaul (R-Texas) and 14 other cosponsors, a companion bill has been introduced in the Senate by Sens. Ron Johnson (R-Wis.), chairman of the Senate Committee on Homeland Security and Governmental Affairs, Senate Majority Whip John Cornyn (R-Texas) and Jeff Flake (R-Ariz.).

Described as, “The toughest border security bill ever before Congress, with real penalties for the administration for not doing their job,” the bill is designed to gain and maintain control of the nation’s land and maritime borders.

“I appreciate chairman McCaul’s efforts to put forward a bill to secure our borders,” Johnson said, “and I am happy to introduce a companion bill in the Senate with Senators Cornyn and Flake. This bill uses a sector-by-sector approach to outline capability requirements and includes a prescriptive list of required fencing and border security infrastructure. I believe this bill is an important first step toward finally securing our borders. Through committee hearings, I will build on chairman McCaul’s efforts to ensure that our final bill prescribes what is truly needed at our borders and that the Department of Homeland Security effectively implements our border security prescriptions.”

“By unilaterally going around Congress and taking executive action on immigration, the President has only exacerbated the administration’s message to the world that our laws will not be enforced. Fixing our broken immigration system starts with a strong plan that enhances border security, increases enforcement assets and speeds up legitimate trade and travel at our ports of entry,” Cornyn said, adding, “I look forward to working with Sen. Johnson and House Republicans to finally secure our porous border so we can find ways to promote the type of legal immigration that benefits our economy and our broader society.”

"Arizonans deserve a secure border, and I am pleased to support Senate introduction of the Border Security First Act, which will require that operational control of the border be attained and seek to hold those responsible for it accountable,” Flake added.

"I commend Sens. Johnson, Cornyn and Flake for introducing the companion legislation to my border security bill today,” McCaul said. “The porous state of our borders is a national security issue. For 25 years, we have waited for action on border security while human traffickers, drug cartels and potential terrorists have taken advantage of the situation at our southern, northern and maritime borders. The federal government’s number one priority under the Constitution is to provide for the common defense, but this administration has failed to do so. Now, Congress must lead.

McCaul said, "This bill is the toughest border security bill ever before Congress. It provides the administration with prescriptive measures from Congress on how to secure the border with real penalties for the administration for not doing their job. We need this legislation to protect the American people and sovereignty of this nation."

Not all of McCaul’s colleagues agree, however. Rep. Bennie G. Thompson (D-Miss.), ranking member of the House Committee on Homeland Security, said in a statement that, "After working across the aisle on border security legislation just last year, it is extremely unfortunate that chairman McCaul has quickly abandoned it to placate the most extreme factions of the Republican Conference.”

“To be clear,” Thompson asserted, “this new bill talks tough, but offers few solutions. It would require the federal government to spend billions of taxpayer dollars on fencing, road projects and equipment that has not been vetted or even requested – all to achieve what McCaul himself has acknowledged, time and again, is an unrealistic and unachievable standard.”

In his opening remarks at the House Homeland Security Committee’s markup of the bill, McCaul stated, "It is a fundamental responsibility of the federal government to ensure the territory of this nation is secure against any illicit entry and concealed threats, but on that account the government has failed consistently."

"Despite billions of dollars and decades of policy debates, the border is not secure. That is a fact," McCaul said, adding, "Illegal entries into this country continue at an astounding pace, and criminal enterprises have continued to exploit our weaknesses to get drugs, weapons, and other illicit goods into our communities."

"Our enemies have also taken note that there is a backdoor into America," McCaul said.

"This is a national security issue of the highest order. I’ve been working on this problem of border security for over a decade in Congress and prior to that as a federal prosecutor, and I will tell you that the American people are losing faith that we can fulfill this core responsibility," McCaul said.

McCaul said, "The number of individuals theBorder Patrol apprehended last year rose for the third time in row—to half a million. That’s just who we stopped. We have no way of telling how many people we didn’t catch, or what they brought with them."

"At last count, the Government Accountability Office determined the Department of Homeland Security (DHS) had less than half of the southwest border and only two percent of the northern border under operational control," McCaul said. "This is not security by any measure, and there is plenty of blame to go around. Administrations of both parties have failed to tackle this challenge, and the American people deserve better.

"Last Congress," he said, "this committee passed a bipartisan border security bill. But rather than use that bill as an opportunity to make sweeping changes to secure our territory, the department took no real action. Key officials instead doubled down on claims that our borders were more secure than ever. Ask Americans in border states whether that claim is true."

"The time to rely on the department or this administration to measure border security progress has come and gone," McCaul said, concluding that, "It is time for Congress to lead. And through this legislation, we tell the department and the administration how to get this job done once and for all."

Federal Agencies Cautious of Cloud Commitment

Although government agencies understand the benefits of migrating services to the cloud, nearly three quarters of federal cloud users remain wary of fully committing to cloud computing, according to MeriTalk, a public-private partnership focused on improving the outcomes of government IT.

Meritalk’s new report, Cloud without Commitment, underwritten by Red Hat and Cisco, examined federal barriers to cloud adoption including migration, data portability, integration and future agility.

Surveying 150 public sector IT professionals, Meritalk found most federal cloud users want to migrate more services to the cloud, with nearly one in five saying they deliver some of their agency’s IT services fully or partially via the cloud. However, security and control concerns are preventing them from fully embracing the cloud.

The surveyed IT professionals estimated that 32 percent of their data cannot be moved to the cloud due to security or data sovereignty issues. Moreover, while federal cloud users put Federal Risk and Authorization Management Program (FedRAMP) certification—a standardized set of security requirements for cloud—on their wish, almost a quarter of agencies are uncomfortable sharing sensitive data with FedRAMP-certified cloud providers.

However, Meritalk found agencies that use or are open to using open-source are seeing greater cloud success than the average. Seventy-two percent say data security has improved by moving services to the cloud in the past year versus 47 percent of those not using/open to using open source options.

“Open source is not only driving much of the technology innovation in cloud, it is also enabling government agencies to answer their questions about cloud portability and integration,” said Mike Byrd, senior director, Government Channel Sales, Red Hat. “In this way, it is not surprising to me that the survey respondents who have embraced open source reported greater cloud success.”

The report also revealed that more than half of federal cloud users say cloud/legacy system integration is a barrier to further migration. Their concerns echo those of a Government Accountability Office (GAO) report issued last year that found many government agencies only consider moving to the cloud when the legacy technology needs to be modernized or replaced.

According to GAO, General Services Administration officials indicated that, “as they move the management of servers and software off site, a continuing challenge is getting agency staff to adapt to an operational environment where they do not have direct control and access to agency IT resources.”

Moreover, the Meritalk report indicates that of the federal cloud users currently using or open to open-source software, 67 percent of respondents have found that data is safer in the cloud than in legacy systems.

“Particularly with mission-critical systems, Feds want assurance they can integrate with legacy tools, and easily migrate data between the two,” said Mike Younkers, director, US Federal Systems Engineering at Cisco. “Open source opens up new options. And, Feds using open source are reporting positive results.”

Although the report indicated federal agencies continue to lag behind in migrating to the cloud, initiatives like Cloud First and FedRAMP have pushed them to test the waters. Agencies have started small by moving simple systems, such as emailand website hosting, to the cloud. However, security concerns continue to hinder the move of more complicated systems, like enterprise resource planning and custom apps.

Starting small is a step in the right direction, according to Meritalk. Agencies should begin by migrating services with low security and privacy concerns and less operational risk before attempting to move to more complicated systems.

Moreover, Meritalk said agencies that have worked with a cloud consultant outside their agency have a smoother transition moving to the cloud, with 56 percent of those surveyed indicating that a consultant was “very helpful.”

Agencies should also work with a cloud provider who understands the agency’s unique needs and can help integrate cloud data with legacy systems. Exploring other options, such as open-source, can also open new doors and further cloud adoption.

“Feds don’t have to always be the bridesmaid when it comes to cloud,” said Steve O’Keeffe, founder of MeriTalk. “Connect with peers who have been down the aisle. And if you feel locked in –get a good prenup. Cloud is all about choice and agility. Otherwise, we end up back where we started.”