• Archive for the Category » IT Security Services «

    Why We are Proud to be Crows! AOC Celebrates its 49th Birthday

    The Association of Old Crows (AOC) is entering its 49th birthday dedicated to advancing electronic warfare strategy, policy and programs. From the very beginnings until now, the association has grown its mission statement to include Information Operations (IO) and Electromagnetic Spectrum (EMS) operations. The AOC is comprised of people from industry, government, and military who get together at AOC conferences and symposiums to discuss issues related to EW/IO and come up with solutions benefiting the warfighter and our nation’s defense. As an international association, the AOC has 66 chapters around the world where members can meet locally andContinue Reading

    Top 5 Concerns of Security Directors and Managers: Infographic

    In the world of perimeter security the practice to see first, know first and act first is not always the organizations primary mission. Security Managers share some of their primary concerns to optimize their standard operating procedures. Have a look at Perceptics’ Infograpic by clicking on the title above.

    White Paper-Jamming at the Gate, Part Three

    We have now looked at offensive planning (Part One) and at defensive planning (Part Two), and we have discussed vehicle inspection, blast resistant modules (often Ballistically uparmored) or use as control rooms, and at data acquisition in large complex systems. How can it all be tied together not just in an Integrated Security Plan document but also how the architect of the entire system might leverage one aspect and/or another to create a cost effective and quickly integrated system for a client/command. We also discussed securing SCADA nodes and everything discussed in that posting applies as well. Basic architecture considerations include: HardenedContinue Reading

    White Paper-VTI: Data Acquisition and Functional Test

    When KTC has to secure a large perimeter or build and deliver systems which incorporate large complex units or units with subsystems which – if handled improperly or allowed to operate off spec – can injure or kill people (such as very high power x-ray systems), we must instrument the perimeter, the complex unit or the subsystems so that we can monitor, continuously, all aspects of the perimeter or unit. To do that we must employ proven data acquisition (DAQ) systems. Systems which track movement, temperatures and pressures, state-of-health of the instrumentation itself and so on. KTC searched variousContinue Reading

    White Paper-Perceptics: Why State Identification is Vital in License Plate Readers

    KTC is pleased to continue this series of point papers on subjects we are frequently asked about. For this we asked our partner Perceptics (www.perceptics.com) to address the issue of identifying the state of issue for license plates. Perceptics manages the highest accuracy rate of any vendor, even for vehicles traveling at road speeds (guaranteed at >95%) and still manages to identify the plate number and the state – quickly! So, Phil, Jennie, Don – over to you… Why State Identification is Vital in License Plate Readers for Access Control Vehicle identifications and inspections constitute key components of many perimeter and accessContinue Reading

    White Paper- A Box 4 U SAFETYsuite: Productivity Inside Blast Resistant Outside

    We are pleased to introduce Mr. Ross Draney, who heads up A Box 4 U’s Safety and Security Division , as he and the company’s founder discuss the SAFETYsuite and its underlying technology. KTC has chosen A Box 4 U based on our history providing safe spaces throughout our industry. We offer both a standard leasing fleet and custom SAFETYsuites which include: • Control Rooms • SCADA Node Structures • Change Rooms • Continue Reading

    White Paper-KTC and Cyber Defense: Why the Cyber Pearl Harbor Comment Should Hit Home

    The US Secretary of Defense is not known as a “hyper” person; it is hard to expect that he suddenly has fallen into hyperbole. Indeed, KTC has been working in cyber warfare and cyber defense for many years. Many other firms and many people have been as well. But the work has been mostly in the darkness, not only so-called “Black” programs – but literally in the closed office/carrel where someone sits glued to a computer screen. In fact most hackers are lone wolves, and most corporations and government groups think those wolves are their enemy and so they create a smallContinue Reading

    White Paper-Jamming at the Gate, Part Two

    In Part One (“Offensive Side”) we discussed the use of jamming technology to effect spectrum control and protection (active, purposeful denial or “blanking” of some or all of the communication frequencies of potential use by adversaries or Opposing Forces [OPFORS]). The “Defensive Side”, which is discussed here, is the OPFORS’ use of jammers designed to defeat Friendly Forces’ sensors and communication subsystems and the Counter-Electronic Countermeasures used to defeat these attacks. These countermeasures are often called PSIM or Physical Security Information Management – known to most designers of large scale security systems as the preferred all-encompassing electronic security system. “Physical Security Information Management,Continue Reading

    White Paper- Jamming at the Gate, Part One

    Not a reference to music but a hot topic nonetheless. This two-sided issue is often the “non-issue” or the topic professionals prefer to overlook or not discuss with clients. Side one (“Offense”): the use of jamming technology to effect spectrum control and protection (active, purposeful denial or “blanking” of some or all of the communication frequencies of potential use by adversaries or Opposing Forces [OPFORS]). All systems are monitored, extensively. IT Security   Side two (“Defense”): OPFORS’ use of jammers designed to defeat Friendly Forces’ sensors and communication subsystems and the Counter-Electronic Countermeasures used to defeat these attacks. This blog entry is focused onContinue Reading