2:27
![](http://web.archive.org./web/20140710224144im_/http://i.ytimg.com/vi/OvabqFT2sZ0/0.jpg)
Categorize your environment for an ATO (step 1 of 5)
Receiving an Authority to Operate (ATO) for your environment can sometimes be a daunting t...
published: 06 Jun 2013
author: DellTechCenter
Categorize your environment for an ATO (step 1 of 5)
Categorize your environment for an ATO (step 1 of 5)
Receiving an Authority to Operate (ATO) for your environment can sometimes be a daunting task. Watch these brief videos that will provide a high level unders...- published: 06 Jun 2013
- views: 21
- author: DellTechCenter
0:37
![](http://web.archive.org./web/20140710224144im_/http://i.ytimg.com/vi/hAy58lnPrcc/0.jpg)
Research In Motion Inches Up More Than 2% on FIPS Security Certification
Research In Motion (RIMM) says BlackBerry 6 is now FIPS 140-2 certified. This FIPS (Federa...
published: 01 Dec 2010
author: FinancialNewsOnline
Research In Motion Inches Up More Than 2% on FIPS Security Certification
Research In Motion Inches Up More Than 2% on FIPS Security Certification
Research In Motion (RIMM) says BlackBerry 6 is now FIPS 140-2 certified. This FIPS (Federal Information Processing Standard) certification mean a variety of ...- published: 01 Dec 2010
- views: 56
- author: FinancialNewsOnline
2:21
![](http://web.archive.org./web/20140710224144im_/http://i.ytimg.com/vi/5I6uGSoTP5I/0.jpg)
Integral Crypto Drive - Encrypted USB Flash Drive (FIPS 140-2 PC Edition)
USB Flash Drive security can be a big headache for IT departments. The Crypto Drive FIPS 1...
published: 26 Jan 2011
author: IntegralMemoryTV
Integral Crypto Drive - Encrypted USB Flash Drive (FIPS 140-2 PC Edition)
Integral Crypto Drive - Encrypted USB Flash Drive (FIPS 140-2 PC Edition)
USB Flash Drive security can be a big headache for IT departments. The Crypto Drive FIPS 140-2 is Integral's secure and easy to use solution. FIPS 140-2 vali...- published: 26 Jan 2011
- views: 3691
- author: IntegralMemoryTV
2:29
![](http://web.archive.org./web/20140710224144im_/http://i.ytimg.com/vi/nJ8a0eDTfCA/0.jpg)
DATA ENCRYPTION STANDARD (DES) netwinz
netwinz DATA ENCRYPTION STANDARD (DES) Introduction: The Data Encryption Standard (DES) is...
published: 17 Jun 2011
author: jainarpitha7
DATA ENCRYPTION STANDARD (DES) netwinz
DATA ENCRYPTION STANDARD (DES) netwinz
netwinz DATA ENCRYPTION STANDARD (DES) Introduction: The Data Encryption Standard (DES) is a block cipher that uses shared secret encryption. It was selected...- published: 17 Jun 2011
- views: 9481
- author: jainarpitha7
1:07
![](http://web.archive.org./web/20140710224144im_/http://i.ytimg.com/vi/QIsSDmzzLrc/0.jpg)
News Update: Fortinet Security Earns U.S. Federal Certifications
Fortinet (NYSE:FTNT), a network security provider, announced that the FortiOS operating sy...
published: 13 Sep 2010
author: TradeTheTrend
News Update: Fortinet Security Earns U.S. Federal Certifications
News Update: Fortinet Security Earns U.S. Federal Certifications
Fortinet (NYSE:FTNT), a network security provider, announced that the FortiOS operating system has earned Federal Information Processing Standards from the N...- published: 13 Sep 2010
- views: 126
- author: TradeTheTrend
2:21
![](http://web.archive.org./web/20140710224144im_/http://i.ytimg.com/vi/qGuTkm5CJkY/0.jpg)
Integral Crypto Drive - Encrypted USB Flash Drive (FIPS 140-2 Mac Edition)
USB Flash Drive security can be a big headache for IT departments. The Crypto Drive Mac Ed...
published: 26 Jan 2011
author: IntegralMemoryTV
Integral Crypto Drive - Encrypted USB Flash Drive (FIPS 140-2 Mac Edition)
Integral Crypto Drive - Encrypted USB Flash Drive (FIPS 140-2 Mac Edition)
USB Flash Drive security can be a big headache for IT departments. The Crypto Drive Mac Edition FIPS 140-2 is Integral's secure and easy to use solution. FIP...- published: 26 Jan 2011
- views: 2859
- author: IntegralMemoryTV
1:16
![](http://web.archive.org./web/20140710224144im_/http://i.ytimg.com/vi/HT1_tK0WG6s/0.jpg)
PAYware Mobile Secure Hardware Overview by Dan Loomis
Dan Loomis, Global Product Marketing Manager, highlights the key features of the PAYware M...
published: 14 Dec 2009
author: VeriFone
PAYware Mobile Secure Hardware Overview by Dan Loomis
PAYware Mobile Secure Hardware Overview by Dan Loomis
Dan Loomis, Global Product Marketing Manager, highlights the key features of the PAYware Mobile Secure Card Reader. This includes a secure magnetic stripe re...- published: 14 Dec 2009
- views: 1942
- author: VeriFone
3:14
![](http://web.archive.org./web/20140710224144im_/http://i.ytimg.com/vi/wVDJECAkPeU/0.jpg)
Federal Video Remote Interpreting (VRI)
Federal Video Remote Interpreting (VRI) is now available! Federal Relay now offers instant...
published: 20 Mar 2013
author: sprintrelay
Federal Video Remote Interpreting (VRI)
Federal Video Remote Interpreting (VRI)
Federal Video Remote Interpreting (VRI) is now available! Federal Relay now offers instantaneous video interpreting for one-on-one meetings and appointments ...- published: 20 Mar 2013
- views: 7213
- author: sprintrelay
2:04
![](http://web.archive.org./web/20140710224144im_/http://i.ytimg.com/vi/llVUClW3f5c/0.jpg)
Cascade 9.6 -- Federal release -- "Built to last"
http://www.riverbed.com/us/products/cascade/ In this video, Dimitri Vlachos, Senior Direct...
published: 31 Jul 2012
author: Riverbed Technology
Cascade 9.6 -- Federal release -- "Built to last"
Cascade 9.6 -- Federal release -- "Built to last"
http://www.riverbed.com/us/products/cascade/ In this video, Dimitri Vlachos, Senior Director of Marketing and Products for Riverbed Cascade shows us why the ...- published: 31 Jul 2012
- views: 337
- author: Riverbed Technology
1:51
![](http://web.archive.org./web/20140710224144im_/http://i1.ytimg.com/vi/_KLPrfJ32NI/0.jpg)
i-DENTITY : Unleash your mobile workforce !
The United States Department of Defense (US DoD) has mandated the use of Public Key Infras...
published: 30 Oct 2013
i-DENTITY : Unleash your mobile workforce !
i-DENTITY : Unleash your mobile workforce !
The United States Department of Defense (US DoD) has mandated the use of Public Key Infrastructure (PKI) certificates for employees to "sign" documents digitally, encrypt and decrypt email messages, and establish secure online network connections. In compliance with DoD regulations, the i-DENTITY Mobile Productivity Suite allows the PKI certificates to be stored securely on the mobile device (soft-token) or be retrieved from a Smart Card (CAC -- PIV -- but also government issued eID - ...). The i-DENTITY i-Crypt mobile app provides applications access to the hardware certificates on the CAC via standards based Public Key Cryptography Standards (PKCS) APIs. In addition, the i-Crypt mobile app allows 3rd party apps to be secured by the CAC card, providing an additional level of mobile security. Issued by the National Institute of Standards and Technology (NIST), the Federal Information Processing Standard (FIPS) is a US security standard that helps ensure companies that collect, store, transfer, share and disseminate sensitive but unclassified (SBU) information and controlled unclassified information (CUI) can make informed purchasing decisions when choosing devices to use in their workplace. The i-DENTITY Mobile Productivity Suite meets the requirements for FIPS 140-2 Level 1 certification for both data-at-rest (DAR) and data-in-transit (DIT). The Mobile Productivity Suite support for DIT covers the following: - Web browser (HTTPS) - Email (S/MIME)*- IPSec VPN* *only on Android, not yet available for iOS The i-Store On-device Data Encryption (ODE) feature allows users and enterprise IT administrators to encrypt data on the entire device. The ODE feature uses a FIPS 140-2 certified Advanced Encryption Standard (AES) cipher algorithm with a 256-bit key (AES-256) and offers the levels of security required by government and regulated industries such as healthcare and finance. The key utilized for this encryption is developed from a user-created passphrase using well-known key-derivation algorithms such as Password-Based Key Derivation Function 2 (PBKDF2).- published: 30 Oct 2013
- views: 2
86:52
![](http://web.archive.org./web/20140710224144im_/http://i1.ytimg.com/vi/UYUcBqdTiIE/0.jpg)
Novell ZENworks Full Disk Encryption - omówienie i pokaz rozwiązania do pełnego szyfrowania dysków
Dowiedz się, jak objąć polityką bezpieczeństwa wszystkie dyski twarde na komputerach przen...
published: 06 Mar 2014
Novell ZENworks Full Disk Encryption - omówienie i pokaz rozwiązania do pełnego szyfrowania dysków
Novell ZENworks Full Disk Encryption - omówienie i pokaz rozwiązania do pełnego szyfrowania dysków
Dowiedz się, jak objąć polityką bezpieczeństwa wszystkie dyski twarde na komputerach przenośnych i stacjonarnych z systemami Windows XP, Vista i Windows 7/8 oraz inne nośniki zawierających wrażliwe dane. Stosując pełne szyfrowanie dysków zapewnisz ochronę danych np. w przypadku zgubienia lub kradzieży urządzenia. Na webinarze omawiamy możliwości i demonstrujemy działanie oprogramowania Novell ZENworks Full Disk Encryption, które pomaga sprostać wewnętrznym wymogom bezpieczeństwa firmy w zakresie ochrony danych jak również spełnić wymagania branżowych regulacji i państwowych przepisów -- wszystko to bez zwiększania obciążenia osób z działu IT odpowiedzialnych za zarządzanie. Podczas webinaru omawiamy, jak: - Chronić dane firmowe poprzez wprowadzenie sprawdzonych, niezawodnych mechanizmów szyfrowania całych dysków twardych, - Korzystać z modułu szyfrowania FIPS 140-2 (Federal Information Processing Standards) w sytuacji, gdy używane jest szyfrowanie sprzętowe Seagate, - Korzystać z modułu szyfrowania FIPS 140-1 w przypadku korzystania z szyfrowania za pomocą oprogramowania, - Wprowadzić w swojej organizacji wymóg, aby użytkownicy uwierzytelniali się przed uruchomieniem (pre-boot) systemu albo za pomocą nazwy użytkownika i hasła, albo za pomocą karty Smartcard lub osobistego numeru identyfikacyjnego (PIN), - Zablokować dostępu do danych na każdym urządzeniu, które przestanie być w zasięgu serwera ZENworks, - Zapewnić po wprowadzeniu szyfrowania dysków, że urządzenia nadal będą łatwe w zarządzaniu, włączając w to możliwość zdalnego odblokowania urządzeń, które zostały zabezpieczone pełnym szyfrowaniem, - Zastosować się do istotnych wytycznych branżowych i zapewnić zgodność z regulacjami rządowymi, takimi jak ochrona danych osobowych czy danych pacjenta. Zobacz w działaniu Novell ZENworks Full Disk Encryption. Przekonaj się, jak można szybko i łatwo tworzyć polityki szyfrowania urządzeń za pomocą pojedynczej konsoli opartej na przeglądarce internetowej!- published: 06 Mar 2014
- views: 17
2:47
![](http://web.archive.org./web/20140710224144im_/http://i1.ytimg.com/vi/8vFDT6w22IQ/0.jpg)
Technology Planning with Information Technology Solutions ITS
Technology Planning is complex and multi-layered. Pinpointing precisely what your needs ar...
published: 30 Aug 2013
Technology Planning with Information Technology Solutions ITS
Technology Planning with Information Technology Solutions ITS
Technology Planning is complex and multi-layered. Pinpointing precisely what your needs are and working within your budget can be, quite frankly, overwhelming. Solutions At Information Technology Solutions, we provide end-to-end solutions on not only your current needs but what your future needs will be as well. We work directly with you and provide support during the bid process and procurement to ensure the bidders are actually qualified and have the understanding of the full scope of the work. Government Compliance Part of the process is to make sure you're in compliance with Federal and State requirements. These are areas that require very specific knowledge and can be very confusing if you don't have the expertise to understand the technical details. The last thing we want is for our clients is to be concerned about Federal and State guidelines. We'll take care of that for you. We've had over 45 years of combined experience with Federal Information Processing Standards and Federal and State procurement guidelines. Information Technology There are really three main technology requirements in projects of this nature. The first is Information Technology. We have experts in all areas of technology including; fiber optic cabling, copper backbone, high speed horizontal copper station cabling, enterprise-level network electronics, Voice over IP, WiFi, trenching, racks and enclosures, UPS systems, grounding and bonding and more! Our expertise covers both Outside Plant Conduit and cabling as well. Audio/Video The second area is Audio/Video. We provide digital and hybrid solutions; High Definition and integrated systems; Single classroom projection systems to multi-screen theaters; tablet, computer, and user friendly touch panel control systems; Meeting rooms with Video Conference Systems; Specialized training rooms. We'll determine the properly sized equipment based on the true needs of the space and performance; we'll never recommend unnecessary, oversized equipment, we respect your budgetary requirements. We're your advocate, not the manufacturers. Electronic Safety and Security (ESS) The third requirement is Electronic Safety and Security Solutions. Your needs may range from spot locations to requiring full coverage. We are versed in HD security and surveillance cameras over IP, digital systems, legacy analog systems and integration. Also, DVR, NVR, SAN and IP based systems as well as building and campus access control systems. Team Building ITS can work directly with you, the client, or as part of a collaborative team of engineers and designers. Whichever best meets your needs. If you want the best in technology planning, choose Information Technology Solutions. ITS delivers the best in professional consulting, planning, and project management. For Technology Planning, E-Rate Planning, Project Management, Consulting Services, Design and Engineering, and Bid Assistance, call Information Technology Solutions at (760) 369-8418, email us at info@4its.org, or visit us on the web at www.4its.org- published: 30 Aug 2013
- views: 4
3:59
![](http://web.archive.org./web/20140710224144im_/http://i.ytimg.com/vi/K89cZVHMgVU/0.jpg)
Riverbed Technical Leader Steve Riley Q&A; on Data Protection
This is part three of my Federal IT Q&A; series with Riverbed technical lead Steve Riley. T...
published: 27 Sep 2011
author: Riverbed Technology
Riverbed Technical Leader Steve Riley Q&A; on Data Protection
Riverbed Technical Leader Steve Riley Q&A; on Data Protection
This is part three of my Federal IT Q&A; series with Riverbed technical lead Steve Riley. This session examines the considerations for agencies to protect the...- published: 27 Sep 2011
- views: 226
- author: Riverbed Technology
9:18
![](http://web.archive.org./web/20140710224144im_/http://i.ytimg.com/vi/a40Y3o1MkUQ/0.jpg)
PIV Educational Video
Learn about Elliott's integration platform for Personal Identity Verification in complianc...
published: 26 Jan 2011
author: ElliottDataSystems
PIV Educational Video
PIV Educational Video
Learn about Elliott's integration platform for Personal Identity Verification in compliance with the National Institute of Standards & Technology's (NIST) Fe...- published: 26 Jan 2011
- views: 251
- author: ElliottDataSystems
Vimeo results:
23:38
![](http://web.archive.org./web/20140710224144im_/http://b.vimeocdn.com/ts/286/852/286852677_200.jpg)
Xingu - The Struggle of the People for the River (Indigenous Brazilians fight Amazon dam project)
Stop the Belo Monte Monster Dam
The Brazilian government is moving ahead "at any cost" wit...
published: 23 Aug 2011
author: Bangalô Filmes
Xingu - The Struggle of the People for the River (Indigenous Brazilians fight Amazon dam project)
Stop the Belo Monte Monster Dam
The Brazilian government is moving ahead "at any cost" with plans to build the third-largest dam in the world and one of the Amazon's most controversial development projects – the Belo Monte dam on the Xingu River in the state of Pará. The Belo Monte dam complex dates back to Brazil's military dictatorship and the government has attempted to build it through various series of national investment programs including Brasil em Ação and the Program to Accelerate Growth. Original plans to dam the Xingu have been greenwashed through multiple public relations programs over the course of two decades in the face of intense national and international protest.
Impacts on Environment and People
In order to feed the powerhouse of the Belo Monte dam complex, up to 80% of the Xingu River will be diverted from its original course, causing a permanent drought on the river's "Big Bend," and directly affecting the Paquiçamba and Arara territories of the Juruna and Arara indigenous peoples. To make this possible, two huge canals 500 meters wide by 75 km long will be excavated, unearthing more land than was removed to build the Panama Canal. Belo Monte's two reservoirs and canals will flood a total of 668 km2 of which 400 km2 is standing forest. The flooding will also force more than 20,000 people from their homes in the municipalities of Altamira and Vitoria do Xingu.
Hydroelectric energy is touted as both a solution to Brazil's periodic blackouts and as a "clean development" approach to global climate change. However, Philip Fearnside of the National Amazon Research Institute (INPA) has calculated that the forests flooded by Belo Monte's reservoirs will generate enormous quantities of methane, a greenhouse gas that is 25 times more potent than CO2.
Belo Monte will also attract 100,000 migrants to the region. However, at the height of construction, only 40,000 jobs – only 2,000 of them long-term – will have been created. The remaining labor pool will be driven to resort to illegal logging and cattle ranching, the two main causes of deforestation in the Amazon. In addition, new migrants could fuel social tensions as they look for work, pushing into indigenous territories and protected areas to carve out a livelihood. Meanwhile, the needs of those who do find jobs will add pressure to an already weak infrastructure and social services in the largest cities.
For the Xingu's poor farmers, temporary employment created by the dam is not a viable replacement for lost agricultural lands and the river's fish supply. Considered an "obstacle" to business interests, indigenous peoples are particularly vulnerable. Mega-projects typically confront indigenous communities with disease, loss of food and clean water sources, cultural disintegration and human rights abuses by illegal loggers, migrant workers and land speculators. The indirect and long term impacts of Belo Monte are of even greater concern as other unsustainable industries such as aluminum and metal refineries, soy plantations, logging, and mining expand into the area.
Energy Inefficiency and Future Upstream Dams
Belo Monte will be one of the most energy inefficient dams in the history of Brazil. It will produce only 10% of its 11,233 megawatt (MW) installed capacity during the 3-5 month-long dry season, an average of only 4,462 MW throughout the year, or 39% of its nominal capacity. To guarantee a year-round flow of water, the government would need to construct a series of large dams on the Xingu and its tributaries that will gravely impact forests and forest peoples.
The original plans for damming the Xingu included six dams: Kararão, Babaquara, Jarina, Ipixuna, Iriri, and Kokraimoro. However, when the indigenous people of the Xingu rejected the dams and defended the river in 1989, the government changed their approach: the name Kararão (a war cry in Kayapó) became "Belo Monte", the name Babaquara became "Altamira", and so forth.
At the Second Historical Encounter in Defense of the Xingu in May 2008, the government announced it would only license and auction one dam complex – "Belo Monte" – which in reality is three dams: the main dam at Ilha do Pimental, a complementary reinforcement dam called Bela Vista, and the main turbine house at Belo Monte do Pontal. However, because of the dramatic variations in the Xingu River's flow between the rainy season and dry season, the government knows that building Belo Monte is economically unviable unless more dams are built upstream. Earlier plans for Belo Monte called for four additional upstream dams: Altamira, Iriri, Pombal, and São Felix.
The possible future upstream dams would impact Kayapó indigenous territories, flood the lands of peoples such as the Araweté, Assuriní and Arara, and cause extensive damage to forests and fisheries across the region.
What the Electricity is For
The government claims that Belo Monte's cheap energy will power the houses of Brazilian fami
4:49
![](http://web.archive.org./web/20140710224144im_/http://b.vimeocdn.com/ts/205/347/205347444_200.jpg)
AA/ETH Pavilion, Zurich, 2011
Out of a collaboration between the Emergent Technologies and Design program (EmTech) of th...
published: 14 Oct 2011
author: shanky jain
AA/ETH Pavilion, Zurich, 2011
Out of a collaboration between the Emergent Technologies and Design program (EmTech) of the Architectural Association, London, and the Chair of Structural Design at the Swiss Federal Institute of Technology (ETH), Zurich, a temporary light timber construction has been design that functions as sun shading for parts of the grand stairs in front of the architecture department of the ETH. It is based on bending behaviour under selfweight of oversized sheets of plywood of up to 11 x 2.5 m. The design activates the material properties as the defining element in the transfer of forces. The exploration of the sheet material and the manipulation of its bending properties by controlling the number of layers of ply and the fibre direction of these layers was the starting point of the design process. The precise geometry of the bending curve emerged out of the distribution of matter, the hierarchy within plywood as composite material and given load conditions.
Based on a systematic investigation into the defining parameters, sheets of 18 mm thickness with fibres mainly in longitudinal direction have been used for the pavilion. Cuts within the sheets influence the bending resistance of the sheets, enable a larger spatial enclosure and reduced wind load acting upon the structure, and additionally produces a shadow pattern on the stairs that are used as seating area during summer time. Varying the length of the sheets generates small variations of the bending curve that have been utilized for the overlapping and interlocking of adjacent elements resulting in a system of self-stabilizing vaults. The vaults are cross-braced by a sequence of cables. These cables distribute all other load conditions evenly within the edge strips, and so reduce additional deformation of the arched form to a minimum.
The design refinement as well as details of the construction and fabrication process of the pavilion have been worked out by a design team of EmTech-students. The initial design idea derived from the winning entry of a competition team during an internal design competition within EmTech. In addition, the work of the design team has been informed by material test and design studies conducted during a workshop of all EmTech students at the ETH. In general, precedents to this field of work commence with the work of Alvar Aalto and Charles Eames in plywood, and the techniques of scoring, cutting and bending to achieve curvature have been established in a variety of materials in jewelry design, surface ornamentation, paper and other craft practices, as well as in airplanes and boats. Recent contributions include Skylar Tibbits’ Surface Ornamentation at the MIT – Massachusetts Institute of Technology (2008), and The Probotics of the AA DRL - Architectural Association Design Research Laboratory (2010).
Project Coordinator: Toni Kotnik (DARCH, ETH Zurich; EmTech, AA London)
Academic Supervisors: Toni Kotnik (DARCH, ETH Zurich; EmTech, AA London), Michael Weinstock (EmTech, AA London), George Jeronimidis (EmTech, AA London), Wolf Mangeldorf (Buro Happold, London)
Competition Team: Norman Hack, Pierluigi D'Acunto, Camila Rock De Luigi, Paula Velasco, Shibo Ren, Shanky Jain, Alkistis Karakosta (EmTech, AA London)
Design Team: Norman Hack, Pierluigi D'Acunto, Camila Rock De Luigi, Paula Velasco (EmTech, AA London)
Project Management: Darrick Borowski (EmTech, AA London), Özgür Keles (DARCH, ETH Zurich)
Structural Analysis: Pierluigi D’Acunto, Shibo Ren (EmTech, AA London)
Structural Consulting: Luke Epp (Buro Happold, London), Joseph Schwartz (DARCH, ETH Zurich)
Shading Analysis: Yassaman Mousavi (EmTech, AA London)
Fabrication Team: Fatima Nasseri, Yassaman Mousavi, Paula Velasco, Camila Rock De Luigi, Shanky Jain, Sherwood Wang, Nicolás Villegas Giorgi, Norman Hack, Pierluigi D’Acunto, Gabriel Ivorra, Sebastian Partowidjojo (EmTech, AA London)
Steel Work: Peter Jenni (Metal Workshop D-BAUG, ETH Zurich)
Wood Work: Oliver Zgraggen & Paul Fischlin (Carpentry, ETH Zurich)
Material: KERTO Q LVL Standard not sanded 18mm (Finnforest Switzerland, Zurich); INOX Stranded Wire 4mm (Jakob AG, Trubschachen)
15:54
![](http://web.archive.org./web/20140710224144im_/http://b.vimeocdn.com/ts/135/777/135777531_200.jpg)
Larry Halloran on HB2372 interview on KAKE
What we DIDN't see... the good stuff hit the cutting room floor so they could EMPHASIZE "t...
published: 16 Mar 2011
author: Bob Bowser
Larry Halloran on HB2372 interview on KAKE
What we DIDN't see... the good stuff hit the cutting room floor so they could EMPHASIZE "the color of one's skin" which is NO where to be found in the Bill.
www.kslegislature.org/li/b2011_12/year1/measures/hb2372/
Larry's Testimony in Support of HB 2372
Testimony of Larry Halloran in support of HB 2372;
Chairman Kinzer and Members of the House Judiciary Committee,
We ask for your support of HB 2372; An Act concerning immigration; requiring verification of employment eligibility and making other amendments concerning immigration.
The fundamental question today is not illegal immigration itself. If we are a nation of laws and are faithful to our obligations as citizens or legislators then we will rightfully conclude that the rule of law is the bedrock foundation of our society and passage of this legislation should require little debate.
I would not dispute that employer and citizen alike have found the blind eye beneficial to their pocket book but financial gain, open borders or humanitarian compassion are not acceptable substitutes for the rule of law. Yesterdays benefit (however perceived) is today's liability as our citizens find themselves struggling to meet the increased burden of illegal immigration on our society that cannot be measured in financial terms alone.
The blessings and benefits of America are bountiful. But, if they are to be preserved for our posterity and those seeking the benefit of citizenship they must be secured by principled adherence to our state and federal Constitutions.
Illegal immigration is a festering cancer that damages both our society and those unlawfully seeking employment. It creates the necessity for a second society operating under the radar that inhibits the necessary assimilation of new immigrants into the America family. We are no longer concerned with a few thousand illegal immigrants that could be easily absorbed but rather tens of millions that now tax the limits of our social networks. It is past time for the half measured approaches, nod and wink policies and felonious excuses of citizen, employer and legislator alike related to the employment eligibility of illegal immigrants are put to rest. It is time that a lawful approach to employment eligibility verification becomes the rule for all employers and the accepted social norm for all citizens. Of even greater importance is that you, the citizen legislator, honor your oath of office and uphold the rule of law.
Our Founders studied the laws and customs of many nations (both failed and existing) and took from them guidance for our Constitution that best protected a free people and society. For over 200 years, our Constitution has served as the legal binder for our citizens and those wishing to assimilate into a free society. Today, many seek to dilute the authority of our Constitution through substitution of unlawful privileges that in essence establish an equal but separate society within our borders. A society that stands in stark contrast and in opposition to the fundamental necessity of assimilation at the expense of individual liberties guaranteed to all by our Constitution. Such practices serve to disadvantage the citizens and legal immigrants that play by the rules and adhere to our laws by granting unearned favor to the illegal immigrant.
Surely, we are all aware of the inequities, consequences and unquestionable failures of equal but separate jurisprudence practiced at times within our own society. To turn a blind eye or foster such practices is treasonous to our founding principles, documents and the faith of those who gave all to defend and preserve the greatest grant of freedom ever known to man; America.
The challenges before us in preserving the free society and America are indeed great but do include a provision for national suicide. Tolerance does not beget equal but separate in a free society but instead requires assimilation through shared core values and equal application of the laws
Thank you for your favorable support of HB 2372, your service and the defense of freedom for all.
Respectfully,
Larry Halloran, Chairman
Wichita - South Central KS 912 Group
Mulvane, KS 67110
Testimony of Lana Reed in Support of HB 2372
Testimony
Of
Lana Reed
Provided Pursuant to
K.S.A. 75-2973
Kansas Whistleblower Act
On The
HB 2372
Before the
House Judiciary Committee
"Under the current SRS system Kansas taxpayers are having millions of dollars stolen from them through fraud. Perhaps worse Kansas citizens, who are footing the bill, are being denied benefits that illegal aliens are approved for. The SRS system works for the illegal aliens and the illegal aliens know how to work the system...."
p.12
Representative Lance Kinzer, Chairman
Thursday, March 10, 2011, 3:30 p.m.
785-296-7692
Table of Contents
Executive Summary.
Fraud in the Kansas SRS System..
Hiding Illegal Aliens and Fraud.
Types of Fraud.
Fake Documents.
Legitimate SSNs.
Multiple Identities.
Living the Goo
67:23
![](http://web.archive.org./web/20140710224144im_/http://b.vimeocdn.com/ts/175/574/175574390_640.jpg)
53rd Journalism Awards Gala (part 1)
A. JOURNALISTS OF THE YEAR
A1. PRINT (Over 50,000 circulations)
Patrick Range McDonal...
published: 18 Jul 2011
author: EDP
53rd Journalism Awards Gala (part 1)
A. JOURNALISTS OF THE YEAR
A1. PRINT (Over 50,000 circulations)
Patrick Range McDonald, LA Weekly
Comments: "Range" is an appropriate middle name. What incredibly
detailed reporting on a variety of complicated topics. What an ability to
make us feel as if we know the players. What skill in explaining messy
situations. The very essence of solid journalism.
2nd place: David Evans, Bloomberg Markets, "Duping the Families of
Fallen Soldiers"
HM: Mariel Garza, Los Angeles Daily News Editorials
A2. PRINT (Under 50,000 circulation)
Radley Balko, Reason Magazine
Comment: ―Radley Balko is one of those throw-back journalists that
understands the power of groundbreaking reporting and how to make a
significant impact through his work. Time and time again, his stories cause
readers to stop, think, and most significantly, take action.
Congratulations!‖
2nd Place: Dan Evans, Glendale News-Press
HM: Ryan Vaillancourt, Los Angeles Downtown News
A3. TELEVISION JOURNALIST
Ana Garcia and Fred Mamoun, KNBC-TV
Garcia and Mamoun shoot, write and edit compelling stories. One of
their strengths as a team is the obvious respect for their subjects, and the
ability through contacts in the community to land exclusive interviews and
opportunities. They are strong storytellers and the pieces move!
2nd Place: Antonio Valverde, Univision
Valverde has a wide range as a journalist. He is able to work with various
segments of the community to tell compelling stories. He has political
acumen and can accurately and fairly tell stories, while also reaching out
to the disenfranchised to share their stories of life in L.A.
A4. RADIO JOURNALIST
Susan Valot, KPCC
Comments: Well-rounded reports with authoritative, informed tone. Great
use of sound. Valot‘s work is some of the best we‘ve heard.
2nd Place: Brian Watt: KPCC
HM: Kitty Felde: KPCC
A5. ONLINE JOURNALIST
Daniel Heimpel, FosteringMediaConnections.org
2nd Place: Chris Hedges, Truthdig.com
HM: Robert Scheer, Truthdig.com
A6. SPORTS JOURNALIST
N/A
A7. ENTERTAINMENT JOURNALIST
Kim Masters, KCRW-FM Radio
Comments: Nice voice in both senses of the word, along with substantive
content. Covering a story about outed CIA agent Valerie Plame, she
tracked down Plame to comment on her portrayal, rather than just talking
to the actress. She also gave a lot of information on entertainment agents
that broadened the picture the public was likely to have of that
occupation.
2nd Place: Tara Wallis-Finestone, NBC LA
HM: George Pennacchio, KABC-TV
A8. PHOTO JOURNALIST
Rick Loomis, Los Angeles Times
A9. DESIGNER
N/A
B. DAILY/WEEKLY NEWSPAPERS
Over 50,000 circulations – including news bureaus and correspondents
B1. HARD NEWS
Tracy Manzer and Sarah Peters, Long Beach Press-Telegram, "Heroes foil
bank heist"
Comments: The writing was appropriately-paced for the category and
the story content. I enjoyed the writers' use of sensory details and factual
information, presented with a slightly humorous/sarcastic tone that made
this piece fun to read.
B2. NEWS FEATURE
Patrick Range McDonald, LA Weekly, ―The Parent Trigger‖.
Comments: Documents a groundswell of democracy while explaining a
new law through a real-world prism. Powerful. Incredibly well-sourced and
informative, yet provides a human touch. The story of poor minorities trying
to make a change documented how the masses can move the
establishment. Inspiring to others, this story shows what newspaper do like
no other. Bravo.
2nd Place: Thomas Curven, Los Angeles Times, ―Walking Away from Grief‖
HM: Kristopher Hanson, Long Beach Press-Telegram, ―Dangers Close to
Home‖
B3. PERSONALITY PROFILE
Steve Friess, LA Weekly, ―A Tragic Love Story‖
2nd Place: Charlotte Hsu, LA Weekly, ―Forever Scared — The Story of
Herman Atkins‖
HM: Karen Robes Meeks, Long Beach Press-Telegram, ―Murchison: A
Portrait of a Long Beach Lobbyist‖
B4. INVESTIGATIVE/SERIES
David Evans, Bloomberg News, "Fallen Soldiers' Families Denied Cash
Payout as Insurers Profit"
Comments: These articles are the soul of great investigative journalism,
uncovering a shocking system whereby the families of slain soldiers are
tricked about benefits, and where shameless insurance companies reap
big profits at the expense of those families.
Best of all, it led to immediate Congressional investigations and action.
2nd place: Beth Barrett, LA Weekly, "The Dance of the Lemons"
HM: Monica Alonzo and Simone Wilson, LA Weekly, "Culture of Cruelty"
B5. BUSINESS
Alana Semuels, Los Angeles Times, "California unfriendly to business?
Figures say no"
Comments: This is an authoritative and well-documented piece that
refutes the common wisdom of California's tax structure being unfriendly
to business.
2nd place: Beth Barrett, LA Weekly, "Barry Minkow 2.0"
HM: Donna Howell, Investor's Business Daily,
Youtube results:
1:51
![](http://web.archive.org./web/20140710224144im_/http://i.ytimg.com/vi/BIMaBeB_sSI/0.jpg)
IDeePal 3.0 for iPad Demo - Best Password Manager - HD
IDeePal 3.0 for iPad Demo - Best Password Manager - HD Application Description: IDeePal is...
published: 26 Jul 2010
author: bobies2999
IDeePal 3.0 for iPad Demo - Best Password Manager - HD
IDeePal 3.0 for iPad Demo - Best Password Manager - HD
IDeePal 3.0 for iPad Demo - Best Password Manager - HD Application Description: IDeePal is the first online password manager that offers true single tap log ...- published: 26 Jul 2010
- views: 1224
- author: bobies2999
9:37
![](http://web.archive.org./web/20140710224144im_/http://i.ytimg.com/vi/rCmiAgC2WK4/0.jpg)
IDeePal 3.0 for iPhone Training Video Complete - Best Password Manager for iPhone iPad YT-HD
IDeePal 3.0 for iPhone Training Video Complete - Best Password Manager for iPhone iPad - Y...
published: 24 Jul 2010
author: bobies2999
IDeePal 3.0 for iPhone Training Video Complete - Best Password Manager for iPhone iPad YT-HD
IDeePal 3.0 for iPhone Training Video Complete - Best Password Manager for iPhone iPad YT-HD
IDeePal 3.0 for iPhone Training Video Complete - Best Password Manager for iPhone iPad - YT HD - Course Contents - Introduction - How to add an infoCard - Ho...- published: 24 Jul 2010
- views: 716
- author: bobies2999
11:06
![](http://web.archive.org./web/20140710224144im_/http://i1.ytimg.com/vi/2y_tidbY-Lw/0.jpg)
Cryptography Advanced Encryption Standard AES Tutorial,fips 197
Computer Security, Cryptography Advanced Encryption Standard AES,fips 197
The Advanced En...
published: 20 Jan 2014
Cryptography Advanced Encryption Standard AES Tutorial,fips 197
Cryptography Advanced Encryption Standard AES Tutorial,fips 197
Computer Security, Cryptography Advanced Encryption Standard AES,fips 197 The Advanced Encryption Standard (AES) specifies a FIPS-approved cryptographic algorithm that can be used to protect electronic data. The AES algorithm is a symmetric block cipher that can encrypt (encipher) and decrypt (decipher) information. Encryption converts data to an unintelligible form called ciphertext; decrypting the ciphertext converts the data back into its original form, called plaintext. The AES algorithm is capable of using cryptographic keys of 128, 192, and 256 bits to encrypt and decrypt data in blocks of 128 bits. aes encryption and decryption aes encryption example aes encryption tutorial aes encryption online- published: 20 Jan 2014
- views: 5
1:17
![](http://web.archive.org./web/20140710224144im_/http://i.ytimg.com/vi/PPfUGIh0Q18/0.jpg)
IDeePal for iPhone Demo - Best Password Manager - HD-320x480 WMV
IDeePal for iPhone Demo - Best Password Manager - HD-320x480 WMV Application Description: ...
published: 25 Jul 2010
author: bobies2999
IDeePal for iPhone Demo - Best Password Manager - HD-320x480 WMV
IDeePal for iPhone Demo - Best Password Manager - HD-320x480 WMV
IDeePal for iPhone Demo - Best Password Manager - HD-320x480 WMV Application Description: IDeePal is the first online password manager that offers true singl...- published: 25 Jul 2010
- views: 789
- author: bobies2999