Showing posts with label Monitoring. Show all posts
Showing posts with label Monitoring. Show all posts

January 17, 2021

Privacy Is Dead


I though this was a fascinating ad for the International Association of Privacy Professionals (IAPP).

The little girl hanging onto to the UAV drone.  

Reminds me of the wonderful classic film, The Red Balloon, where after the balloon follows the little boy everywhere, in the end, off he flews with it into the wild blue yonder. 

As much as we all wish privacy wasn't dead, for the most part, it really is!

Between ubiquitous and persistent satellites, drones, and video cameras, audio and video surveillance, call intercepts and eavesdropping, computer monitoring tools, smartphone location tracking, facial recognition, body implants, and more, let's just say you are never truly alone. 

For those who continue to dream the impossible dream of privacy, it is a noble endeavor but quite fruitless without either going deep underground or significant legislative and policy changes that can actually be enforced. 

My grandmother used to say that G-d sees everything and she was right. 

These days, others are watching as well!  ;-)


Share/Save/Bookmark

December 13, 2018

A Social System that Inspires Pride and Shame


This story continues to fascinate me. 

China's social credit system started in 2015. 

China scores individuals based on public data (social media, financial, insurance, health, shopping, dating, and more), and they have people that act as "information collectors" (i.e. neighborhood watchers) who record what their neighbors are doing--good and bad. 

Each individual starts with a 1,000 points. 

If you do good things in Chinese society--helping people, cleaning up, being honest--you get points added. 

If you do bad things in China--fight with people, make a mess, be dishonest--you get points deducted. 

Fail below 1,000 points and you are in trouble--and can get blacklisted!

A good score is something to be proud of and a bad score is something that shames people to hopefully change for the better. 

But more than that, your social score has tangible social impacts--it can determine your ability to get into certain schools, obtain better jobs, homes, loans/mortgages, high-speed internet, and even high-speed train tickets/airplane flights. 

While maybe well intentioned, certainly, this has the very real potential to become a surveillance state and the embodiment of "Big Brother"!

On one hand, it seems like a great thing to drive people and society to be better. Isn't that what we do with recognizing and rewarding good behavior and with our laws and justice system in punishing bad behavior?

Yet, to me this type of all-encompassing social credit system risks too much from a freedom and privacy perspective. Should the government and all your neighbors be privy to your most intimate doings and dealings?  And should people be controlled to such an extent that literally everything you do is monitored and measured and counted for/against you?

It seems to me that the price of sacrificing your very personal liberty is too high to make in order to push people towards positive social goals.

Guiding people is one thing, and rewarding outstanding acts and punishing horrific ones is understandable, but getting into people's knickers is another. 

This type of social credit system really borders on social control and moves us towards a very disturbing, dystopian future. ;-)
Share/Save/Bookmark

October 5, 2017

Reading Your Emails

So you know you typically get a message when you log on your computer at work that there is "no expectation of privacy."

Meaning...you're on the corporate network and so remember that you can be monitored. 

Well we all read that warning and sort of know it by heart.

But do you really think that someone is watching you.

Well be assured that they are!

Talking to one of my colleagues and friends recently and this is what happened.

He had to fire one of his senior guys. 

And I asked him why?

He said:
"Because he was dead wood."

I asked what he meant as this was a senior person in the organization that was being let go.

So he said:
"Well I read the last few days of his emails on his account and he was doing absolutely nothing!"

And I was like hmm, that's amazing that you actually go into his account and read his stuff.

Yeah, I know it's not really his employees--the guy is at work--but still it's his email account that he uses, seriously.

So it's not just some corporate spooks sitting in the bowls of the building in a darkened security operations center behind a lot of cool looking screens monitoring your accounts for suspicious activity.

It's your management too that can logon and see and read your stuff, whenever.

So this guy that was fired wasn't just dead wood, he was actually dead meat. 

"Smile you're on camera" in more ways then one.

So if you decide to write some juicy emails today or save some salacious files on "your" computer or on the network, the expectation surely is that they are being read--you can take that to your privacy bank. ;-)

(Source Photo: Andy Blumenthal)
Share/Save/Bookmark

December 13, 2015

Freedom Is Worth It

This was a photo I took of a sign in my daughter's old high school.

It says, "Respect for Self, Others, and the Environment."

That is a great principle, which I was reminded of today in sitting for an IT certification exam--how lucky we are to live in a country that affords us respect to be ourselves...to speak, write, and practice as we believe. 

In this case, the certification exam was typically given on Saturday, but as a Sabbath observer, I was able to provide a request for an accommodation, and was able to take the exam this morning, Sunday.

What was absolutely amazing to me though going for the exam at this designated fancy facility, in Washington, D.C.--and with two proctors--was that I was the only one taking the exam today.

This was not just some lip-service tolerance for differences, but rather true respect for diversity, even when it's not convenient and it is costly. 

I have got to say, how grateful I am to be part of a society where we are free to be who we are--what can be more amazing than that?

I feel this all the more when we are at a time in history when still so many in the world are battling dictatorships, demagogues, terrorist and corrupt regimes that impose harsh restrictions, censorship, monitoring, and severe punishments on those who don't follow the dictates of the authority holding power. 

When we fight those restrictive regimes--from ISIS to Communism--that are looking not just to hold, but to spread their clutches on power and abuses of freedom--we are really fighting to be who we are and that is a serious fight worth having. ;-)

(Source Photo: Andy Blumenthal)
Share/Save/Bookmark

August 22, 2014

Smart Electronic Skin

I liked this concept reported on in BBC Technology about using swarms of sensors to create a type of electronic or "smart skin."

Like nerves in our human skin, multitudes of sensors placed on anything that we want to monitor, could create a sensing/feeling and reporting mechanism for evaluating the health or condition of that thing. 

Rather than wait for something to fail or break, we could actively collect information on changes in "temperature, strain, and movement" and other environmental impacts to analyze and predict any issues and proactively address them with countermeasures, maintenance, or fixes. 

As human beings, we are architected with regular monitoring and self-healing biological systems to protect ourselves from daily dangers around us, we can develop homes, factories, transport, robots, and everything important around us with similar properties to be more durable, last longer and be more productive.  

When we emulate in our own development efforts what G-d has created for the good in the world, we are on the right track. ;-)

(Source Photo: Andy Blumenthal)
Share/Save/Bookmark

March 9, 2014

SCADA in Pictures




So SCADA are Supervisory Control and Data Acquisition systems.

They are a form of Industrial Control Systems (ICS) that monitor and control major industrial processes from power generation, transmission, and distribution, to water treatment, chemical production, air traffic control, traffic lights, building controls, and more. 

These are part of our nation's critical infrastructure. 

In the lab, we are able to use tools to capture and analyze communication packets and edit and re-use them to: 

- Turn on and off lights

- Open/close perimeter gates

- Control water and gas pipelines

- And even open and close a bridge

This was very scary!

No one, unauthorized, should be able to do this in real life, in the physical world. 

This is a major security vulnerability for our nation:

- SCADA systems should not be openly available online, and instead they should be able to be controlled only either locally or remotely through an encrypted virtual private network (VPN).

- SCADA systems should not be available without proper access controls--there must be credentials for user id and passwords, and even two-step authentication required. 

No one but vetted, cleared, authorized, and trained personnel should be able to monitor and control our critical infrastructure--otherwise, we are giving them the keys to disrupt it, destroy it, and use it for terror. 

We owe our nation and families better, much better. 

(Source Photos from lab: Andy Blumenthal)

Share/Save/Bookmark

October 10, 2013

Halo Arrives To Our Warfighters


So excited about the Army's experimental Tactical Assault Light Operator Suit (TALOS). 

This is really our fast, strong, and agile fighting force of the future. 

The integration of technologies for the individual warfighter, including sensors, exoskeleton body armor, weapon systems, communications, and monitoring of health and power makes this an unbelievable advance. 

I think the MIT research on magnetorheological fluids--which convert from liquid to solid body armor in milliseconds (sort of like Terminator 2) with a magnetic field or electric current (controlled, so the enemy doesn't bog down the forces) is a true game changer for balancing agility and force protection. 

In the future, I believe these suits will even incorporate capabilities to drive, dive, and fly. 

This will complement unmanned swarms of dumb drones with intelligent human fighters that will take the battlefield on Earth and beyond. ;-)
Share/Save/Bookmark

May 26, 2013

Mayim Chaim

You can only live about 3 days without water--that's why protecting our water is so critical.

Emergency Management (May/June 2013) says, "There are numerous ongoing threats to our water supply. Some of them [natural or man made] could be catastrophic."

- Water poisoning: Already in the 1st century, Roman Emperor Nero poisoned the wells of his enemies.  These days you'd need a large supply, like "several dump trucks of cyanide or arsenic to poison a reservoir.  Plus the water system is monitored and has purification protections such as chlorine, so it's not that simple. We can also issue "boil alerts" for people to boil the water before drinking it. Then again, we saw what some radiation did to the Japanese water supplies after Fukushima.

- Blowing it up: The water system infrastructure can be disrupted using explosives, so keeping intruders far away from it is important to keeping it safe.

- Earthquakes/Hurricanes: Much of the water system pipes are old--some built during the Civil War--and these can be destroyed by natural disasters or even a construction crew jackhammer hitting in the wrong place. 

- Electrical outage: If you shut down the electricity, you shut down the water pumps...and even with generators taking over for a while, your up against the clock, if you don't get the juice flowing again soon. 

- Cyber Attack: Our water systems, like other industrial control systems are vulnerable to cyber attack. A hacker that gets control of the systems could overheat it, overtreat it, flood it, or otherwise break it and shut it down. 

Keeping our water infrastructure secure, the water supply safe and potable, the transport pipes intact, the electricity working, and the systems under control--are not little matters--they are the difference between life and death for millions. 

As in The Rime of The Ancient Mariner, when the ship gets blown off course into unchartered waters and the crew is thirsty for water and desperate to survive, the poet states, "Water, Water. Everywhere. And All The Boards Did Shrink; Water, Water, Everywhere. Nor Any Drop To Drink."

In Hebrew, there is a short saying that sums up this topic, "Mayim Chaim"--water is life. ;-)

(Source Photo: Dannielle Blumenthal)

Share/Save/Bookmark

February 3, 2013

A Seeing Eye


This video from NOVA is an amazing display of the surveillance capabilities we have at our disposal.

ARGUS-IS Stands for Automated Real-Time Ground Ubiquitous Surveillance Imaging System.

Like a "Persistent Stare," ARGUS provides continuous monitoring and tracking over a entire city, but also it has the ability to simply click on an area (or multilple areas--up to 65 at a time) to zoom in and see cars, people, and even in detail what individuals are wearing or see them even waving their arms!

Created by the Defense Advanced Research Projects Agency (DARPA), ARGUS uses 368 imaging chips and provides a streaming video of 1.8 gigapixels (that is 1.8 billion pixels) of resolution and attaches to the belly of a unmanned aerial vehicle (UAV) drone. 

ARGUS captures 1 million terabytes of a data a day, which is 5,000 hours of high-definition footage that can be stored and returned to as needed for searching events or people. 

The Atlantic (1 February 2013) points out how using this over an American city could on one hand, be an amazing law enforcement tool for catching criminals, but on the other hand raise serious privacy concerns like when used by government to collect data on individuals or by corporations to market and sell to consumers. 

What is amazing to me is not just the bird's eye view that this technology provides from the skies above, but that like little ants, we are all part of the mosaic of life on Earth.  We all play a part in the theater of the loving, the funny, the witty, and sometimes the insane. 

My Oma used to say in German that G-d see everything, but now people are seeing virtually everything...our actions for good or for shame are visible, archived, and searchable. ;-)

Share/Save/Bookmark

January 1, 2013

A Healing Environment

We’ve all been in work environments that make us either feel good about coming to the office in the morning, and those which don’t.

For those that don’t -- is it the mundane and unsatisfying work? Unpredictable work hours and demands? Annoying co-workers? Bullying boss? 

Let’s face it—the environment we work in can make the difference between whether we enjoy a long happy career someplace or whether we want to run out the door screaming. 

At the extreme, I remember a colleague telling me how when they were temping in college they worked in some mind-numbing jobs for some awful companies and they literally lasted in some cases until noon before they couldn’t take it anymore. 

Factors aside from the people can make a person feel good or bad. 

In an interesting article in Fast Company (December 2012/January 2013) called “Spaces That Heal,” hospitals have found that the patient’s room itself can actually be designed to aid in bringing people back to good health.

Research shows that “the color, shape, layout, and accoutrements of a hospital room have a direct effect on health.”

Some design items in the hospital that aid recovery, for example, are:

- Sunnier and brighter spaces with big windows (unless you are having a migraine!)
- Exposure to “nature and art” (I choose nature—the greener, the better)
- Classical music (make mine high energy or pop)
- Colored walls (light blue is relaxing for me)
- Lot of clean circulating fresh air (I like the air conditioner on all year long--even Winter!)
- Presence of family members (well certain family members anyway) :-)

Additionally, rooms wired for smartphones, tablets, and computers and that keep patients busy and engaged are another big positive—I remember when I was in the hospital and my wife brought me a device so I could blog and be me, and I felt like a productive human being again.

New room design in hospitals will also be single rooms (yes, a little privacy and personal space when you’re not feeling well).
They will also have beds at an angle that “face both the window and the media wall”—the media wall is very cool where you can look at everything from digital photos of your kids to watching Netflix or being able to Skype.

Beds will be placed in line of sight of nursing stations for safe monitoring, and bathrooms will have dual accessibility from the patient’s room for doing your business, and from the hall for hospital staff to come and restock it or clean without waking a resting patient. 

The environment we recuperate in matters to how we recover and the environment we work in matters to how we stay healthy, happy, and productive. 

People are not machines, but thinking and feeling beings, and how they are treated physically, emotionally, and mentally all make a world of a difference to their success or failure—and to that of the organization that employs them. ;-)

(Source Photo: here with attribution to Be Live Hotels)

Share/Save/Bookmark

December 10, 2012

I'm Looking At You Looking At Me Looking At You

Almax, the Italian maker of mannequins has a new high-tech version that does more than stand around and look pretty.

The EyeSee Mannequin has a camera built into its eye that watches you while you shop. 

According to Bloomberg BusinessWeek (6 December 2012), the EyeSee Mannequin sells for about $5,130 and it conducts consumer profiling--using technology to identify criminals--it determines your age, gender, and race and tracks your shopping patterns. 

Newer versions of EyeSee will likely have a sensor for hearing you as well, so it can "eavesdrop on what shoppers say about the mannequin's attire."

Next to these mannequins, you have to consider who are the real dummies, when everything you do and say can be monitored. 

Next time, you're peering at that mannequin, be careful, it may be peering right back at you--and when it says something be ready to jump. ;-)

(Source Photo: Andy Blumenthal)

Share/Save/Bookmark

July 12, 2012

100% Burglar Proof--Tell Me Another One

So I saw this advertisement for a "100% burglar proof" system and I was just bewildered.

Does anyone really think we can be 100% sure of anything--let alone security?

Everyday thieves rob the safest banks, cyber criminals hack the most secure systems, and crooks break into the most secure sites.

Everything we do comes down to risk management--assessing and classifying risk, selecting controls to mitigate risk, and monitoring those for effectiveness and necessary modifications. 

For children, maybe things are basic black and white--it's simpler that way "good guys" and "bad guys" and so on, but for adults we know there are at least "50 shades of grey" and that means that there are no certainties in life--whether security, sure financial bets, or perfect opportunities--everything is a gamble in some respects. 

I remember someone once joked about even marriage being somewhat chancy, since "you never really know the person until you wake up with them in the morning every day."

With 20-20 hindsight, all the pundits seem brilliant, but only the prophets can predict the future with accuracy. 

As to any product or vendor that markets itself as having a 100% success rate, you better get yourself a money back guarantee on it, because you will definitely need it! ;-)

(Source Photo: Andy Blumenthal)

Share/Save/Bookmark

April 20, 2012

Robot Guard Thyself


The Asian Forum of Corrections in South Korea has developed this 5' tall robot for patrolling prisons.

But rather than restraints and weapons, this prison guard carries a suite of technology:

- 3-D Cameras for monitoring safety and security

- Recording devices for capturing activity

- 2-way wireless communications between corrections officials and prisoners

- Pattern recognition and anomaly detection software for differentiating normal behavior from problems

While this sparks the imagination for where this might go in the future, I'm not quite sold on this. 

Firstly, how well can these robots really recognize and interpret human behavior, especially from those who may be fairly adroit at hiding or masking their activities, day-in and day-out. 

And maybe more importantly, without some serious defensive and offensive tricks up its robot sleeve, I have a feeling that many a prisoner with a two by four, would put this million dollar robot in the junk yard pretty fast, indeed. 

I'd rate this as not there yet! ;-)

Share/Save/Bookmark

December 21, 2011

Getting Control By Getting Back To Basics

I don't know if you've seen this--it's pretty popular, but I just really liked it:
“Beware of your thoughts, they become your words.
Beware of your words, they become your actions.
Beware of your actions, they become your habits.
Beware of your habits, they become your character.
Beware of your character, it becomes your destiny.”

To me it just makes so much sense--and it's how we can either get ourselves on a track for successful living or potentially into some pretty big trouble:

It starts with a simple thought--good or bad--light bulb goes on, bling!
Utter the thought (in word) and it begins to take form--blah, blah, blah.
Put that thought into action, and now--boy oh boy--what have you done?
Repeat once, twice, three times, and you have a habit--or in Jewish tradition a "Chazakah," something firm or established--think of it as, you're hooked.
Habits sure as heck breed character--and don't pretend otherwise...
And your character is your calling card with others and ultimately with G-d.

The good thing is that we have 5 steps to intervene--to gain control over where we are going with our lives.

And we can turn things around, at any time.
- Change your thinking.
- Clean up your mouthpiece.
- Act with kindness.
- Repeat only the things you want to ingrain.
- Guard your character through regular monitoring and course correction.

(Source Photo: here)

Share/Save/Bookmark

September 9, 2011

Visualizing IT Security


I thought this infographic on the "8 Levels of IT Security" was worth sharing.

While I don't see each of these as completely distinct, I believe they are all important aspects of enterprise security, as follows:

1) Risk Management - With limited resources, we've got to identify and manage the high probability, high impact risks first and foremost.

2) Security Policy - The security policy sets forth the guidelines for what IT security is and what is considered acceptable and unacceptable user behavior.

3) Logging, Monitoring, and Reporting - This is the eyes, ears, and mouth of the organization in terms of watching over it's security posture.

4) Virtual Perimeter - This provides for the remote authentication of users into the organization's IT domain.

5) Environment and Physical - This addresses the physical protection of IT assets.

6) Platform Security - This provides for the hardening of specific IT systems around aspects of its hardware, software, and connectivity.

7) Information Assurance - This ensures adequate countermeasures are in place to protect the confidentiality, integrity, availability, and privacy of the information.

8) Identification and Access Management - This prevents unauthorized users from getting to information they are not supposed to.

Overall, this IT security infographic is interesting to me, because it's an attempt to capture the various dimensions of the important topic of cyber security in a straightforward, visual presentation.

However, I think an even better presentation of IT security would be using the "defense-in-depth" visualization with concentric circles or something similar showing how IT security products, tools, policies, and procedures are used to secure the enterprise at every level of its vulnerability.

IT security is not just a checklist of do's and don't, but rather it is based on a truly well-designed and comprehensive security architecture and its meticulous implementation for protecting our information assets.

Does anyone else have any other really good visualizations on cyber security?

(Source Photo: here)

Share/Save/Bookmark

July 30, 2011

Sensors, Sensors Everywhere

Three_surveillance_cameras

Sensors will soon be everywhere--waiting, watching, and working to capture information about you and the environment we inhabit.

Every sensor is an opportunity to collect data and use that data for making better decisions.

Of course, we see sensors deployed first and foremost from our military overseas, in Iraq and Afghanistan, which uses drones to spy on and strike on our adversaries. The drones are really flying platforms of sensors and in some cases with weapons at ready. According to the New York Times (20 June 2011) "From blimps to bugs, an explosion in aerial drones is transforming the way America fights and thinks about its wars..the pentagon now has some 7,000 aerial drones...[and] has asked for nearly $5 billion for drones for next year." These drones are providing "a Tsunami of data" from intelligence, surveillance, and reconnaissance. The change to drones is so significant in our military that the Times reports that "already the Air Force is training more remote pilots, 350 this year alone, than fighter and bomber pilots combined."

Similarly, the Wall Street Journal (5 July 2011) reports that another type of sensor--surveillance cameras--are being deployed big time in China with a new surveillance network in Chongqing of 500,000 cameras (Beijing already has 280,000 cameras in its system) "that officials says will prevent crime but that human-rights advocates warn could target political dissent." While this project is significantly larger and more aggressive than other cities have deployed, China is certainly not alone in deploying surveillance cameras in their cities--Chicago has 10,000, New York has 8,000, and London has over 10,000. According to the WSJ, the overall market last year for surveillance-equiptments sales, not including networking gear or software totaled $1.7 billion! So smile, you are on camera--and it's candid, indeed.

A third article ran in Government Computer News (July 2011) on a more innocuous type of sensors to be used--this being the mass deployment of mobile sensors for the National Weather Service (NWS) on vehicle fleets such as Greyhound buses etc. Beginning in October, "2,000 commercial vehicles will be equipped with sensors...and will be sending data to NWS in near real time. We will be rolling out coverage on the national level." The mobile sensors will be taking 100,000 observations daily--every 10 seconds, about every 300 meters--measuring temperature, humidity, dew, precipitation, and solar information." In the future, we are looking at the potential of a "a sensing probe in every car"--for collecting information on hazardous roads, traffic patterns, and preventing accidents. Other applications for mobile sensors could be for "monitoring chemical and biological agents," nuclear and radiological ones, or CO2 and Ozone and more.

While sensors can collect data that can be used to analyze situations early and often to help people; certainly, they can also be misused to spy on one's citizens and suppress freedom. It can be a slippery slope. Perhaps that why Wired Magazine recently ask (July 2011) who's "Watching the Watchers" making the distinction between:

1) Surveillance--the monitoring of events by those above, the authorities--with CCTV etc. and monitoring events from control rooms, potentially from anywhere around the world.
2) Sousveillance--the monitoring of events by those below, the citizens--with everyday smartphones, cameras, and videocams and posting the digital images and sound bytes to YouTube, Facebook, Twitter, and so on for the world to see.

With IPV6 providing enough Internet address for attaching sensors to every atom on the surface of the earth and sensors becoming smaller and more imperceptible, we can soon monitor and report on everything, everywhere all the time. Some of the biggest challenges remain ensuring the information monitored is kept secure, private, and used legally and ethically and sifting through all the data to identify the truly meaningful information from what's just noise.

(Source Photo: here)

Share/Save/Bookmark

August 7, 2010

No Real Solution Without Integration

Emergency Management Magazine (July/August 2010) has an article called “Life Savers” that describes how a convergence of new technologies will help protect and save first responder lives. These new technologies can track first responders’ location (“inside buildings, under rubble, and even below ground”) and monitor their vital signs and send alerts when their health is in danger.

There are numerous technologies involved in protecting our first responders and knowing where they are and that their vitals are holding up:

  • For locating them—“It will likely take some combination of pedometers, altimeters, and Doppler velocimeters…along with the kinds of inertial measurement tools used in the aerospace industry.”
  • For monitoring health—“We’ve got a heart monitor; we can measure respiration, temperature. We can measure how much work is being done, how much movement.”

The key is that none of the individual technologies alone can solve the problem of first responder safety. Instead, “All of those have to be pulled together in some form. It will have to be a cocktail solution,” according to the Department of Homeland Security (DHS), Science and Technology (S&T) Directorate that is leading the effort.

Aside from the number of technologies involved in protecting first responders, there is also the need to integrate the technologies so they work flawlessly together in “extreme real world conditions,” so for example, we are not just monitoring health and location at the scene of an emergency, but also providing vital alerts to those managing the first responders. This involves the need to integrate the ability to collect inputs from multiple sensors, transmit it, interpret it, and make it readily accessible to those monitoring the scene—and this is happening all under crisis situations.

While the first responder technology “for ruggedized vital-sign sensors could begin in two years and location tracking in less than a year,” the following lessons are clear:

  • The most substantial progress to the end-user is not made from lone, isolated developments of technology and science, but rather from a convergence of multiple advances and findings that produce a greater synergistic effect. For example, it clearly takes the maturity of numerous technologies to enable the life saving first responder solution envisioned.
  • Moreover, distinct technical advances from the R&D laboratory must be integrated into a solution set that performs in the real world for the end-user; this is when product commercialization becomes practical. In the case of the first responder, equipment must function in emergency, all hazard conditions.
  • And finally, to bring the multiple technologies together into a coherent end-user solution, someone must lead and many parties must collaborate (often taking the form of a project sponsor and an integrated project team) to advance and harmonize the technologies, so that they can perform as required and work together seamlessly. In the case of the first responder technology, DHS S&T took the lead to come up with the vision and make it viable and that will save lives in the future.


Share/Save/Bookmark