Tagged: business

0

Military Consumers and Sentinel: A deeper dive

Last week, we gave you an overview of the latest Consumer Sentinel Network Data Book[1]. Today, let’s look a bit more closely at the data from military consumers. We got more than 113,000 reports from military consumers in 2017. Although not all of them gave details about their military status,more than 28,000 are servicemembers, their family members, and inactive Reserve or National Guard, and more than 78,000 are military retirees or veterans. Here are a few interesting take-aways.

Identity theft[2] and imposter scams[3] were among the top reports for both the general population and the military community. Imposter scammers pretend to be someone you trust, to convince you to send them money or personal information. There are many variations on the scheme. People may pretend to be from the government or from a business with technical support expertise. Others lie about being your online love or say there’s an emergency with your family member. These kinds of scams cost military consumers more money than any other type of scam, with $25 million reported lost. Military median losses were $699. For other consumers, the median loss was $500.

We’re not sure why, but military folks reported median losses much greater than civilians did for other frauds, too. For instance, the median loss from the general population for all types of fraud was $429, but for military consumers, it was $619. That’s more than 44% higher. On the other hand, military consumers also told us they lost money in just 15% of the frauds they reported, versus 21% in the general population. That tells us that military consumers are doing a great job reporting consumer fraud to the FTC, even if they didn’t lose money to it. More reports yield more data, tell a more detailed story, and help law enforcement go after unlawful practices.

References

  1. ^ Consumer Sentinel Network Data Book (www.ftc.gov)
  2. ^ Identity theft (www.militaryconsumer.gov)
  3. ^ imposter scams (www.militaryconsumer.gov)
0

2018 'ASTORS' Homeland Security Awards Open for Early Entries

Michael Madsen, AST Publisher, Cliff Quiroga, Vice President for Sharp Robotics Business Development and the team’s Director of Marketing, Alice DiSanto
Michael Madsen, AST Publisher, with 2017 ‘ASTORS’ Sponsor Cliff Quiroga, Vice President for Sharp Robotics Business Development, and the team’s Director of Marketing, Alice DiSanto

2018 ASTORSAmerican Security Today is pleased to announce that Early Entry Nominations are being accepted for the 2018 ‘ASTORS’ Homeland Security Awards Program – the most Comprehensive Awards Program in the Industry, through April 25th, 2018.

Acknowledge the Most Distinguished Vendors of Physical, IT, Cyber, Port of Entry Security, Law Enforcement, First Responders, Perimeter Protection, Communications as well as Federal, State, County and Municipal Government Agencies in Acknowledgment of Their Outstanding Efforts to: ‘Keep our Nation Safe – One City at a Time’

AST-Image-of-Eagle-and-Flag-resized-2

Access Control/ Identification Personal/Protective Equipment Law Enforcement Counter Terrorism
Perimeter Barrier/ Deterrent System Interagency Interdiction Operation Cloud Computing/Storage Solution
Facial/IRIS Recognition Body Worn Video Product Cyber Security
Video Surveillance/VMS Mobile Technology Anti-Malware
Audio Analytics Disaster Preparedness ID Management
Thermal/Infrared Camera Mass Notification System Fire & Safety
Metal/Weapon Detection Rescue Operations Critical Infrastructure
License Plate Recognition Detection Products And Many Others!

Don’t see a Direct Hit for your Product, Agency or Organization?

Submit your category recommendation for consideration to Michael Madsen, AST Publisher at: [email protected][1].

AST

Please View our Complete List of Categories & Opportunities[2] for Your Organization to Compete and Distinguish Your Achievements in this Exclusive Opportunity to receive the Recognition Your Public Safety, Law Enforcement & Homeland Security Deserves.

AST banner

AST focuses on New and Evolving Security Threats at All Levels of Homeland Security and Public Safety for personnel who are on the front lines of protecting our communities, cities and nation.

• Compelling, attractive and easy to read digital publications delivered daily to a select readership of over 70,000 decision makers in the American security and homeland security fields
• Compelling, attractive and easy to read digital publications delivered daily, weekly and monthly to a select readership of over 70,000 decision makers in the American security and homeland security fields

AST reaches both the private and public experts, essential to meeting today’s growing security challenges, including:

  • Federal, State & Local Government Agencies & Law Enforcement Organizations, Private Security Agencies… Security Directors… Port Directors… Airport Directors… IT/Cyber Security Directors & More
  • Transportation Hubs, Public Assemblies, Government Facilities, Sports Arenas, our Nation’s Schools, Higher Education Campuses and Commercial Business Destinations – are all enticing targets for extremist attacks due to the large numbers of persons and resources clustered together
  • The new integration, where major applications such as Perimeter Protection, Video Surveillance, Access Control and Alarm Systems communicate with one another in a variety of solutions to protect our Cities and Critical Infrastructure
  • Expanded readership into vital Critical Infrastructure audiences such as protection of Nuclear Facilities, Water Plants & Dams, Bridges & Tunnels and other potential targets of terrorism

local-800

The AST Digital Publications is distributed to over 70,000 qualified government and homeland security professionals in federal, state and local levels.

AST puts forward the Largest and Most Qualified Circulation in Government with Over 70,000 readers on the Federal, State and Local levels.

‘PROTECTING OUR NATION, ONE CITY AT A TIME’

Harness the Power of the Web – with our 100% Mobile Friendly Publications

American Security Today’s 2017 ‘ASTORS’ Homeland Awards Presentation Luncheon at ISC East was an overwhelming success, with distinguished guests from National, State and Local Governments, and Industry Leading Corporate Executives from companies allied to Government.

Over 100 professionals gathered from across North America and the Middle East to be honored from disciplines across the Security Industry in their respective fields which included:

  • The Department of Homeland Security
  • The Department of Justice
  • The Security Exchange Commission
  • State and Municipal Law Enforcement Agencies, and
  • Leaders in Private Security

Recognized for their Innovative Training and Education Programs, Outstanding Product Development Achievements and Exciting New Technologies to address the growing Homeland Security Threats our Nation is facing.

The 2017 ‘ASTORS’ Homeland Security Awards Presentation Luncheon
The 2017 ‘ASTORS’ Homeland Security Awards Presentation Luncheon

AST’s publisher Michael Madsen, has announced an AST ‘ASTORS’ Awards Preview Edition to be published in an upcoming AST Magazine – a Full Feature Issue devoted to the competing firms and their achievements with an introduction to our 70,000+ readers – so Enter Today!

american-security-expo-luncheon

The highlight of the 2018 ‘ASTORS’ Homeland Security Awards Program will be the Awards Presentation Luncheon at ISC East at the Javits Convention Center on Wednesday, November 14th.[3]

AST focuses on New and Evolving Security Threats at All Levels of Homeland Security and Public Safety for personnel who are on the front lines of protecting our communities, cities and nation.

AST reaches both the private and public experts, essential to meeting today’s growing security challenges.

For Sponsorship Opportunities and More Information on the AST 2017 ‘ASTORS’ Homeland Security Awards Program, please contact Michael Madsen, AST Publisher at: [email protected][4] or call 732.233.8119 (mobile) or 646-450-6027 (office)

Learn More…

2017 ‘ASTORS’ Homeland Security Award Winners Honored at ISC East[5]

References

  1. ^ [email protected] (americansecuritytoday.com)
  2. ^ Categories & Opportunities (americansecuritytoday.com)
  3. ^ 2018 ‘ASTORS’ Homeland Security Awards Program (americansecuritytoday.com)
  4. ^ [email protected] (americansecuritytoday.com)
  5. ^ 2017 ‘ASTORS’ Homeland Security Award Winners Honored at ISC East (americansecuritytoday.com)
  6. ^ Man Convicted for Making Bomb Parts to Kill American Soldiers in Iraq (americansecuritytoday.com)
  7. ^ Senstar Symphony Intelligent VMS Has a New Home (Learn More, Video) (americansecuritytoday.com)
0

2018 'ASTORS' Homeland Security Awards Open for Early Entries

Michael Madsen, AST Publisher, Cliff Quiroga, Vice President for Sharp Robotics Business Development and the team’s Director of Marketing, Alice DiSanto
Michael Madsen, AST Publisher, with 2017 ‘ASTORS’ Sponsor Cliff Quiroga, Vice President for Sharp Robotics Business Development, and the team’s Director of Marketing, Alice DiSanto

2018 ASTORSAmerican Security Today is pleased to announce that Early Entry Nominations are being accepted for the 2018 ‘ASTORS’ Homeland Security Awards Program – the most Comprehensive Awards Program in the Industry, through April 25th, 2018.

Acknowledge the Most Distinguished Vendors of Physical, IT, Cyber, Port of Entry Security, Law Enforcement, First Responders, Perimeter Protection, Communications as well as Federal, State, County and Municipal Government Agencies in Acknowledgment of Their Outstanding Efforts to: ‘Keep our Nation Safe – One City at a Time’

AST-Image-of-Eagle-and-Flag-resized-2

Access Control/ Identification Personal/Protective Equipment Law Enforcement Counter Terrorism
Perimeter Barrier/ Deterrent System Interagency Interdiction Operation Cloud Computing/Storage Solution
Facial/IRIS Recognition Body Worn Video Product Cyber Security
Video Surveillance/VMS Mobile Technology Anti-Malware
Audio Analytics Disaster Preparedness ID Management
Thermal/Infrared Camera Mass Notification System Fire & Safety
Metal/Weapon Detection Rescue Operations Critical Infrastructure
License Plate Recognition Detection Products And Many Others!

Don’t see a Direct Hit for your Product, Agency or Organization?

Submit your category recommendation for consideration to Michael Madsen, AST Publisher at: [email protected][1].

AST

Please View our Complete List of Categories & Opportunities[2] for Your Organization to Compete and Distinguish Your Achievements in this Exclusive Opportunity to receive the Recognition Your Public Safety, Law Enforcement & Homeland Security Deserves.

AST banner

AST focuses on New and Evolving Security Threats at All Levels of Homeland Security and Public Safety for personnel who are on the front lines of protecting our communities, cities and nation.

• Compelling, attractive and easy to read digital publications delivered daily to a select readership of over 70,000 decision makers in the American security and homeland security fields
• Compelling, attractive and easy to read digital publications delivered daily, weekly and monthly to a select readership of over 70,000 decision makers in the American security and homeland security fields

AST reaches both the private and public experts, essential to meeting today’s growing security challenges, including:

  • Federal, State & Local Government Agencies & Law Enforcement Organizations, Private Security Agencies… Security Directors… Port Directors… Airport Directors… IT/Cyber Security Directors & More
  • Transportation Hubs, Public Assemblies, Government Facilities, Sports Arenas, our Nation’s Schools, Higher Education Campuses and Commercial Business Destinations – are all enticing targets for extremist attacks due to the large numbers of persons and resources clustered together
  • The new integration, where major applications such as Perimeter Protection, Video Surveillance, Access Control and Alarm Systems communicate with one another in a variety of solutions to protect our Cities and Critical Infrastructure
  • Expanded readership into vital Critical Infrastructure audiences such as protection of Nuclear Facilities, Water Plants & Dams, Bridges & Tunnels and other potential targets of terrorism

local-800

The AST Digital Publications is distributed to over 70,000 qualified government and homeland security professionals in federal, state and local levels.

AST puts forward the Largest and Most Qualified Circulation in Government with Over 70,000 readers on the Federal, State and Local levels.

‘PROTECTING OUR NATION, ONE CITY AT A TIME’

Harness the Power of the Web – with our 100% Mobile Friendly Publications

American Security Today’s 2017 ‘ASTORS’ Homeland Awards Presentation Luncheon at ISC East was an overwhelming success, with distinguished guests from National, State and Local Governments, and Industry Leading Corporate Executives from companies allied to Government.

Over 100 professionals gathered from across North America and the Middle East to be honored from disciplines across the Security Industry in their respective fields which included:

  • The Department of Homeland Security
  • The Department of Justice
  • The Security Exchange Commission
  • State and Municipal Law Enforcement Agencies, and
  • Leaders in Private Security

Recognized for their Innovative Training and Education Programs, Outstanding Product Development Achievements and Exciting New Technologies to address the growing Homeland Security Threats our Nation is facing.

The 2017 ‘ASTORS’ Homeland Security Awards Presentation Luncheon
The 2017 ‘ASTORS’ Homeland Security Awards Presentation Luncheon

AST’s publisher Michael Madsen, has announced an AST ‘ASTORS’ Awards Preview Edition to be published in an upcoming AST Magazine – a Full Feature Issue devoted to the competing firms and their achievements with an introduction to our 70,000+ readers – so Enter Today!

american-security-expo-luncheon

The highlight of the 2018 ‘ASTORS’ Homeland Security Awards Program will be the Awards Presentation Luncheon at ISC East at the Javits Convention Center on Wednesday, November 14th.[3]

AST focuses on New and Evolving Security Threats at All Levels of Homeland Security and Public Safety for personnel who are on the front lines of protecting our communities, cities and nation.

AST reaches both the private and public experts, essential to meeting today’s growing security challenges.

For Sponsorship Opportunities and More Information on the AST 2017 ‘ASTORS’ Homeland Security Awards Program, please contact Michael Madsen, AST Publisher at: [email protected][4] or call 732.233.8119 (mobile) or 646-450-6027 (office)

Learn More…

2017 ‘ASTORS’ Homeland Security Award Winners Honored at ISC East[5]

References

  1. ^ [email protected] (americansecuritytoday.com)
  2. ^ Categories & Opportunities (americansecuritytoday.com)
  3. ^ 2018 ‘ASTORS’ Homeland Security Awards Program (americansecuritytoday.com)
  4. ^ [email protected] (americansecuritytoday.com)
  5. ^ 2017 ‘ASTORS’ Homeland Security Award Winners Honored at ISC East (americansecuritytoday.com)
  6. ^ Man Convicted for Making Bomb Parts to Kill American Soldiers in Iraq (americansecuritytoday.com)
  7. ^ Senstar Symphony Intelligent VMS Has a New Home (Learn More, Video) (americansecuritytoday.com)
0

2018 'ASTORS' Homeland Security Awards Open for Early Entries

Michael Madsen, AST Publisher, Cliff Quiroga, Vice President for Sharp Robotics Business Development and the team’s Director of Marketing, Alice DiSanto
Michael Madsen, AST Publisher, with 2017 ‘ASTORS’ Sponsor Cliff Quiroga, Vice President for Sharp Robotics Business Development, and the team’s Director of Marketing, Alice DiSanto

2018 ASTORSAmerican Security Today is pleased to announce that Early Entry Nominations are being accepted for the 2018 ‘ASTORS’ Homeland Security Awards Program – the most Comprehensive Awards Program in the Industry, through April 25th, 2018.

Acknowledge the Most Distinguished Vendors of Physical, IT, Cyber, Port of Entry Security, Law Enforcement, First Responders, Perimeter Protection, Communications as well as Federal, State, County and Municipal Government Agencies in Acknowledgment of Their Outstanding Efforts to: ‘Keep our Nation Safe – One City at a Time’

AST-Image-of-Eagle-and-Flag-resized-2

Access Control/ Identification Personal/Protective Equipment Law Enforcement Counter Terrorism
Perimeter Barrier/ Deterrent System Interagency Interdiction Operation Cloud Computing/Storage Solution
Facial/IRIS Recognition Body Worn Video Product Cyber Security
Video Surveillance/VMS Mobile Technology Anti-Malware
Audio Analytics Disaster Preparedness ID Management
Thermal/Infrared Camera Mass Notification System Fire & Safety
Metal/Weapon Detection Rescue Operations Critical Infrastructure
License Plate Recognition Detection Products And Many Others!

Don’t see a Direct Hit for your Product, Agency or Organization?

Submit your category recommendation for consideration to Michael Madsen, AST Publisher at: [email protected][1].

AST

Please View our Complete List of Categories & Opportunities[2] for Your Organization to Compete and Distinguish Your Achievements in this Exclusive Opportunity to receive the Recognition Your Public Safety, Law Enforcement & Homeland Security Deserves.

AST banner

AST focuses on New and Evolving Security Threats at All Levels of Homeland Security and Public Safety for personnel who are on the front lines of protecting our communities, cities and nation.

• Compelling, attractive and easy to read digital publications delivered daily to a select readership of over 70,000 decision makers in the American security and homeland security fields
• Compelling, attractive and easy to read digital publications delivered daily, weekly and monthly to a select readership of over 70,000 decision makers in the American security and homeland security fields

AST reaches both the private and public experts, essential to meeting today’s growing security challenges, including:

  • Federal, State & Local Government Agencies & Law Enforcement Organizations, Private Security Agencies… Security Directors… Port Directors… Airport Directors… IT/Cyber Security Directors & More
  • Transportation Hubs, Public Assemblies, Government Facilities, Sports Arenas, our Nation’s Schools, Higher Education Campuses and Commercial Business Destinations – are all enticing targets for extremist attacks due to the large numbers of persons and resources clustered together
  • The new integration, where major applications such as Perimeter Protection, Video Surveillance, Access Control and Alarm Systems communicate with one another in a variety of solutions to protect our Cities and Critical Infrastructure
  • Expanded readership into vital Critical Infrastructure audiences such as protection of Nuclear Facilities, Water Plants & Dams, Bridges & Tunnels and other potential targets of terrorism

local-800

The AST Digital Publications is distributed to over 70,000 qualified government and homeland security professionals in federal, state and local levels.

AST puts forward the Largest and Most Qualified Circulation in Government with Over 70,000 readers on the Federal, State and Local levels.

‘PROTECTING OUR NATION, ONE CITY AT A TIME’

Harness the Power of the Web – with our 100% Mobile Friendly Publications

American Security Today’s 2017 ‘ASTORS’ Homeland Awards Presentation Luncheon at ISC East was an overwhelming success, with distinguished guests from National, State and Local Governments, and Industry Leading Corporate Executives from companies allied to Government.

Over 100 professionals gathered from across North America and the Middle East to be honored from disciplines across the Security Industry in their respective fields which included:

  • The Department of Homeland Security
  • The Department of Justice
  • The Security Exchange Commission
  • State and Municipal Law Enforcement Agencies, and
  • Leaders in Private Security

Recognized for their Innovative Training and Education Programs, Outstanding Product Development Achievements and Exciting New Technologies to address the growing Homeland Security Threats our Nation is facing.

The 2017 ‘ASTORS’ Homeland Security Awards Presentation Luncheon
The 2017 ‘ASTORS’ Homeland Security Awards Presentation Luncheon

AST’s publisher Michael Madsen, has announced an AST ‘ASTORS’ Awards Preview Edition to be published in an upcoming AST Magazine – a Full Feature Issue devoted to the competing firms and their achievements with an introduction to our 70,000+ readers – so Enter Today!

american-security-expo-luncheon

The highlight of the 2018 ‘ASTORS’ Homeland Security Awards Program will be the Awards Presentation Luncheon at ISC East at the Javits Convention Center on Wednesday, November 14th.[3]

AST focuses on New and Evolving Security Threats at All Levels of Homeland Security and Public Safety for personnel who are on the front lines of protecting our communities, cities and nation.

AST reaches both the private and public experts, essential to meeting today’s growing security challenges.

For Sponsorship Opportunities and More Information on the AST 2017 ‘ASTORS’ Homeland Security Awards Program, please contact Michael Madsen, AST Publisher at: [email protected][4] or call 732.233.8119 (mobile) or 646-450-6027 (office)

Learn More…

2017 ‘ASTORS’ Homeland Security Award Winners Honored at ISC East[5]

References

  1. ^ [email protected] (americansecuritytoday.com)
  2. ^ Categories & Opportunities (americansecuritytoday.com)
  3. ^ 2018 ‘ASTORS’ Homeland Security Awards Program (americansecuritytoday.com)
  4. ^ [email protected] (americansecuritytoday.com)
  5. ^ 2017 ‘ASTORS’ Homeland Security Award Winners Honored at ISC East (americansecuritytoday.com)
  6. ^ Man Convicted for Making Bomb Parts to Kill American Soldiers in Iraq (americansecuritytoday.com)
  7. ^ Senstar Symphony Intelligent VMS Has a New Home (Learn More, Video) (americansecuritytoday.com)
0

Hood receives Army team award

Fort Hood’s Qualified Recycle Program stood out as the U.S. Army leader in recycling and was recently recognized as the winner of the Secretary of the Army Award for Environmental Quality for a team and will go on to represent the Army and compete in the Secretary of Defense Environmental Awards program this spring.

“As a true leader in solid waste management and recycling, we have the best QRP in the Army, here at Fort Hood,” Col. Hank Perry, Fort Hood garrison commander, said. “I take tremendous pride in our team’s efforts to inspire the community and the support of Soldiers, civilians and their Family members to do their part to recycle.”

In 2017, Fort Hood’s impressive program sold 16.516 million pounds of recyclable material, including cardboard, paper, plastic, metal, glass, toner cartridges, Styrofoam, civilian clothing and other miscellaneous recyclables.

Michael Bush, business operations manager for Fort Hood Recycle, attributed this success to his team and the Fort Hood community.

“Our employees work hard every day to make sure the operation runs smoothly,” Bush said. “We appreciate the support of our Soldiers and their Families to do the right thing and recycle as much as possible.”

Many accomplishments in 2017 include collecting 2.051 million pounds of recyclables in Family housing; greening the movie production set of “The Long Road Home” and collecting 15,100 pounds of scrap metal; and co-hosting a surge event for units to clear out CONEX containers of serviceable and unserviceable items that collected 557,000 pounds of scrap metal.

“A QRP can save a lot of time, effort and money for the Army when disposing of eligible unserviceable products,” Bush said. “If you want to get better at your disposal logistics, then you should engage your QRP and make sure they are part of your efforts. The impact on your installation can be very positive and very significant to your bottom line.”

The Fort Hood Recycle team leverages opportunities to inform and educate Soldiers, civilians and their Families to work together for a greener future, while giving back to the community.

The team provided $89,000 of recycle revenue to help sponsor 32 Soldier and Family events hosted by the Directorate of Family Morale, Welfare and Recreation.

“The recycle program has been a significant contributor of funding Soldier and Family programs such as our Independence Day massive firework display, as well as numerous other morale-building events for Soldiers, Families, retirees, survivors and Department of the Army civilians that would not have taken place without this critical support,” Nicholas Johnsen, director of Family and Morale, Welfare and Recreation, said.

With recycle containers at more than 500 locations across the installation and an upgraded single-stream facility, Fort Hood makes it easy for the community to be good stewards of the environment. The recycle team also developed an app called Fort Hood Recycle that is compatible with iOS and Android devices and allows users to search an item and learn how to best dispose of or recycle an item.

The team’s efforts engaged and empower stakeholders, aligned with Fort Hood’s mission to support Net Zero Waste, reduced the amount of material sent to the landfill.

“Our team is able to take valuable resources that would otherwise have ended up in the landfill, collect, process and sell them, generating funds that pay their overhead and generate a profit that goes back into our community,” Brian Dosa, director of Public Works, said. “They are helping us achieve Net Zero Waste goal while making a profit – amazing.”

“Fort Hood’s ability to accomplish Net Zero is a mission driven effort, and requires the same disciplined planning, and execution that all missions require,” Johnsen said.

With the community support from Soldiers, civilians and their Families, the Fort Hood Recycle team will continue to enhance the environment, promote litter prevention, and increase sales of recyclable material.

“We hope that other Central Texas communities and other Army installations see that recycling is a viable alternative to burying precious resources in landfills,” Dosa said. “Recycling can be profitable and generate valuable funds that communities can use to support other programs.”

0

Homeland Security Stylesheet: Incest Font

Consider Eric Gill, the English stone carver, typographer, sculptor—and progenitor of the typeface Gill Sans. A different Gill typeface, Joanna Nova, is the official font of the United States Department of Homeland Security, named after the only daughter (of three) that Gill did not sexually assault. Despite selecting the typeface dedicated to Gill’s only untouched daughter, the Department of Homeland Security is befouled by association—befouled because all of Gill’s typefaces feel impure after one reads excerpts from the typographer’s diaries, where Gill makes fastidious notes about molesting his servants, his sister, some children, the family dog.

Yet Gill’s typefaces persist in public:

Saab Automobile deploys Gill Sans.
Ferris Bueller’s Day Off
, for sure.
The US Department of Homeland Security, natch.
Save the Children, ditto.
Tommy Hilfiger also.

But some British designers, by way of internet declarations, have sworn off Gill Sans. They will not stuff (commercial) content into a contaminating form. Currently, the name of the font doesn’t reflect its mutating brand identity. I want the font to molt; let’s rechristen MS Gill Sans. At this moment, my fingers are typing in what I will now dub “Digital DaddyCock Sans.” But long after I’ve read the internet declarations from the British designers, the contrails of the incesting father persist; filthy crystals are the speech bubbles of quiet daughters. Homogenitus as declaritive human genitals.

Once established, the history of the font is embedded, and designers cannot simply excise it in hopes of miraculously restoring their pleasure at the control and spaciousness of DaddyCock Sans. The original events surrounding the typeface’s crafting become the substance of the font; this substance crowds and confuses the intended linguistic meaning of words encased in the font. Can a person—me, you—selectively refuse, as an act of resistance, to cognitively process a text executed in a specific font? DaddyCock Sans is the Spanish government’s official typeface on all public signage. Say a woman is driving through the mountains of Asturias, an area that long provided shelter to anarchist guerilla forces, and she suddenly finds herself psychologically incapable of reading all official signage in Spanish. She blows through a stop sign. At this point, she, the refuser, finds “ALTO” (Spanish for “HALT”) unintelligible in DaddyCock Sans. She misses road signs marked “Galicia”—where US nuclear submarines used to roost. She can’t read “Policia” either, as it too is encased in Daddycock Sans. This happens because she has totalized an ethos of resistance. Perhaps emergency illiteracy might be a temporary tactic for refusing the state melding of form and male authority.

James C. Scott, political scientist and anthropologist, suggests that certain forms of elective nonliteracy, when practiced collectively, can function as a “positive medium of cultural life as opposed to a deficiency.” He asserts that historically, marginalized peoples retreated from farming and written language in order to flee emerging nation-states. He focuses on Zomia, the name for a series of alpine terrains stretching across southeast Asia defined by “runaway, fugitive, maroon communities who have, over the course of two millennia, been fleeing the oppressions of state-making projects in the valleys—slavery, conscription, taxes, corvée labor, epidemics, and warfare.” Considered alongside the productive nonliteracy of Zomia, the abolition of select typefaces is an action for those who choose to remain within the nation-state.

Gill’s typefaces are so habitual and spare as to make them seem invisible; they sheath the moral decay of the maker and the corruption of the user. MS Joanna Nova, operating as an official font, provides a stylized interface with the US Department of Homeland Security—an entity that also mishandles human bodies, but on a institutional scale. Some instructional materials on design urge government officials to select a typeface that “achieves a level of harmony and legibility in print.” “Legibility” here pertains only to the kerning, layout, or thickness of the font—obviously it does not include making legible the fact that institutional bodies hold up and hole up specific human bodies. The web page is bright and simple, its whiteness internally lit by a digital sun; it suggests that the government’s hold on detainees is light, temporary, unremarkable. Additionally, some web visitors will have internalized the commercial history of the typeface—including the cover of the 1965 Penguin Modern Classics edition of Aldous Huxley’s Brave New World. They might experientially slide between categories: reader and witness, citizen and suspect. This is the design surface of US fascism.

See dhs.gov. Nested within the site is the home page of US Immigration and Customs Enforcement (ICE), responsible for the forced deportation of undocumented immigrants. When I logged on to the ICE home page in October 2017, a phrase in MS Joanna Nova floated above each image in the “Photos” section.

ENFORCEMENT AND REMOVAL—when in MS Joanna Novais easily received by the user’s eye. It is emblazoned above an image of an alleged child rapist, flanked by ICE officers, on a set of airstairs. Since this appears on a web page, the eye consolidates the inflammatory title and caption and the dull photograph into a unified image; this amalgam contains data without analysis, and competing traumas (rape and deportation) severed from context. The inherent banality of institutional websites paired with the evident boredom of the ICE cameraman eliminates the uncanny as a category of experience for this image. By March 2018, I don’t remember the shapes of the heads of the people in the image or the color of their clothing, so much as the casualness of the shot: a composition that could not locate its register (photojournalism or archival document or…).

Above the next image: ENFORCEMENT AND REMOVAL. In bright sunlight, a figure, bald and with glasses, enters a white van; he is charged with the sex trafficking of minors. Again, MS Joanna Nova. Under the snapshot, the caption reads: “Phoenix, Arizona,” in MS Joanna Nova. The sophisticated typeface is in tension with the artlessness of the composition. This half-hearted attention to style while documenting state power is its own style. Let’s dub it “American Bro,” because American violence, formal and informal, has often aimed to appear casual, effortless, masculine, normal, naturalized. I’m supposed to forget that power could ever be any other way.

Each user of the DHS website—grade-school teachers, businesswomen, DREAMers, cyberattack victims, job seekers, and me—is anonymous to one another. But together we users use in MS Joanna Nova; I use it to determine how the intentions of the state are visualized. In the ICE section, I note thick hands and holsters acting out narratives of white chivalry upon a collateral body of characters specified as rapists and pimps. A border economy based on captives and captors is dependent on feminine victims, actual or conjured. The feminine victim as political commodity also articulates itself in other contemporary ways, oblique and direct, ranging from the reproduction and circulation of images of physically-wasted children as a fundraising tool, to more recent instrumentalizations of conflict-related sexual violence to justify invasions.

For centuries, novelists and artists have recycled images of the female victim. See Beatrice (1866), for example, by Julia Margaret Cameron. For this photograph, Cameron worked with a thirteen-year-old model, May Prinsep. May has been instructed to channel sixteenth-century Beatrice Cenci, in the period after Beatrice’s rape at the hands of her father but before her beheading as ordered by the court. Beatrice and her brothers were executed for hiring assassins to kill their father in Florence, Italy. The sculptor Harriet Hosmer offered her own portrayal of Cenci in 1857. Cameron and Hosmer were attracted to the task of depicting a female victim who suffers twice over: once in the privacy of the home, and once at the hands of the state. Perhaps Hosmer—who, as a lesbian, was subject to a certain kind of erasure by the state—was hoping her prone marble Beatrice was covertly instructing: “You too can kill the father.”

Joanna Gill, the font’s muse, unofficially operates as ICE’s muse—an unmolested Anglo daughter. The use of a font created by Eric Gill, when Gill was never punished for his own crimes, feels ironic. Do my fella users feel that too? Feelings about Petra Gill, molested daughter … Indeterminate feelings about Petra’s Jersey (1922) by Eric Gill, a light sketch of a “clothed partial torso and arm.” The image floats on the surface of the viewer’s mind. It’s a relief not to see the face or skin of Petra, the middle daughter, just the slump of fabric. Human escaped. It is my fantasy that Petra unfurls the jersey like the Invisible Man’s bandages and vanishes into the air, reaching the edge of the exosphere, four hundred miles above the earth’s crust. Spare but prurient wood engravings by Gill—titled Girl in Bath I (1922), Girl in Bath II (1923), and Hair Combing (1922)—do not name teenage Petra as their subject. The totality of Gill’s personal papers were not acquired by UCLA until the 1950s. It is only decades later that the details of Gill’s abuses, as recorded in his archived diaries, are published in mainstream biographies. Petra’s image is only then transformed from the artist’s daughter to an actual victim of the artist. My daydream that Petra gets free persists, her perp stranded on the continental crust.

Be it rape victim, victimized worker, raped worker, or worker raped while traversing the desert towards work, I wish to dodge the narrative orbit that places assault, née human sacrifice, as the whole of representation and the totality of a person’s end. Likewise, the bodies held by the Department of Homeland Security often get fed into a sentimental framework (a liberal reflex) that generates such volumes of emotion that emotion becomes the end experience of the witness as opposed to sparking actual structural change. The MS Joanna Nova typeface circuitously participates in the detention of force-fed bodies, restrained bodies in our private prisons, because it organizes the forward-facing end of the entity and thus conceals assault; it is designed to communicate that the organization is clean and “free of fancy business” (Gill). Do you suspect that I’m advocating for the DHS to replace MS Joanna Nova with MS Antiqua, a font celebrated by the Nazi Party? That I’m urging the adaptation of a font that provides a truer reflection of the DHS’s aims and feelings? I’m not. I only aim to expose unwitting alliances … and to dissolve phallic technique. Duh.

Is there a spell that can do that? What font is it in?

If I restricted myself to other typefaces roughly coeval with Gill’s, I would choose Doves Press font. Although Gill’s typefaces and Doves Press both emerged from the Arts and Crafts Movement, the social origins and physical end of Doves Press font differ from Gill’s typefaces. While Doves Press was financed by a militant suffragette, Anne Cobden-Sanderson, Gill’s best-remembered public engagement with women’s suffrage was his 1910 sculpture Votes For Women, I Don’t Think, purchased by economist John Maynard Keynes. Doves Press font predates Gill’s typography (1926) by twenty-seven years. But by 1919, the entirety of Doves Press font was sunk. In his diary, T. J. Cobden-Sanderson, the husband of Anne, records that the alphabet was “bequeathed to the sea.” T. J. wrapped the punches and matrices in paper parcels and over 105 visits threw the typeface over the Hammersmith, a suspension bridge spanning the Thames. One hundred fifty-one of its metal sorts were recovered from by the Port of London Authority’s diving team in November 2014. Some were moved along by the current and dredging; others were possibly destroyed in two IRA bombings of the bridge. It is not just T. J. Cobden-Sanderson’s suturing of his wife’s name to his own or the feminist bankrolling of the initial endeavor that makes Doves Press font the right typeface for a radical spell; it is that T. J.’s gesture was a furious and poetic hex on his former business partner, Emery Walker. What is a hex? The witches of the Susan B. Anthony coven once wrote that they were not circling in order to bake cupcakes. Their work was to curse. To not lament sexual assault but to extinguish its henchman’s momentum, because they rape so frequently and viciously. With what was this font imbued by being drowned, bombed, dredged, and resurrected? Maybe it can be repurposed to refuse abusive literacy, or to destroy it in kind.

But a typeface with a history of wizardly erasure is not casually purchased at Michaels craft emporium. Online, I make contact with a stencil service, which says I can special order Doves Press font at a price. Also online, former colleagues write to inquire about sexual harassment in one of the many art schools I have taught at; female students are confiding: male faculty members have made sexual overtures. The students decline to file reports. Surfing, I notice that a nontraditional undergraduate that I reported for sexually harassing students is now an adjunct professor at the same school. A secretly shared MS spreadsheet lists perpetrators working in the art field. I mentally note who has been listed and who has not. Three days later, the file disappears. Another Gchat window opens up; a friend talks about the article she is writing on sexual predators in the art world. Offline, my partner and I coolly discuss the named perpetrators while doing chores. Run faucet. “Dickie’s name was on it.” Wipe counter. “Not surprised.” Offline, outside of my home, is an abandoned black BMW. It isn’t mine. It belongs to a former resident of the building we live in. He, a pediatrician, is now in prison for possessing the largest stash of child pornography the cops have ever uncovered in the area. When we walk by the Beamer, my kid occasionally asks, “Why it is that car here?” “Oh, it’s a junker,” I say. “It’s for parts.” Next, I quip to the leaf blowers, who may also be in the know: “Can you please bury that in leaves?”

Tonight, I run the mouse over the Wi-Fi icon.

Router names pop up, including the pedophile’s router. I read his surname in MS Helvetica, and MS Helvetica transmogrifies—a default font for child molesters.

Helvetica, initially Neue Haas Grotesk, was designed by Swiss typographer Max Miedinger in 1957. Miedinger explains: “We designers are sellers of subliminal details that the average viewer does not see, but they do feel.”

Dear Viewer, I felt DaddyCock Sans; now we feel Helvetica. The local pedophile is scheduled to be released this year. He will come to fetch his mail, his Beamer, his router.

Recall again that Miedinger said: “We designers are sellers of subliminal details that the average viewer does not see, but they do feel. The message is somehow warmer, more memorable.”

Wi-Fi Router first accessed 09/01/2016, 12:12 p.m. Wi-Fi Router list last accessed 01/03/2018, 6:07 p.m.

I scroll past the pedophile’s router name in Helvetica. It is memorable, but not warmer. I feel it. My self as a cultural isolate … as if the the violence of the state and the violent sentimentality of capitalism both fall away from me and the ghost-router. This is not possible. My feelings have produced a political bio-fiction: a pedophile as autotroph, producing his own nutrients, operating within a closed system where he climaxes only to photographs of his child self.

01/05/2018, p.m.: After the dog shits and I bag it, I photograph the pedophile’s abandoned Beamer in our shared driveway because the snow plows have further buried it. The snow lips the window. The car cannot back out. I’m afraid the neighbors are watching me photograph the disappearing car. As a cover, I snap a picture of the abandoned basketball hoop … the clear blue sky … when to stop? … a beheaded lantern with a duct-taped nub … the copper beech with a sawn-off limb.

To daydream a law based on pedophiles as autotrophs.

(I realize I’m dreaming of punishment.)

A disassembled homeland security. A rudderless rapist. A self-cannibalized pedophile. A dead fascist?

To sleepwalk around the riot?

The Department of Homeland Security Style Guide, downloaded November, 2017.

White supremacists run free here. The Southern Poverty Law Center lists 724 US hate groups with some ideological stake in white supremacy. Some casual protesters fear that a physical confrontation with white supremacists will result in their own death. All summer there was white hand-wringing: Could a white one who chooses personal safety over resistance still regard itself as a moral being? Our whelp!!! was many Family Unit’s public justification, their tender excuse. Was it also mine? There seemed to be scant middle class identification with the Bread and Roses Strike (1912) and the ways in which strikers’ children were mobilized. There was little mainstream knowledge of the Battle of Hayes Pond (1958), where members of the indigenous Lumbee tribe—including fathers, uncles, and cousins—disrupted a Klu Klux Klan rally. Outnumbering the Klan, the Lumbee cut off the Klan’s light source, absconded with their sound system, and stomped on their abandoned banners while the Klan fled. The Lumbee provide an alternative family model. In these times, can middle-class family reunions be organized as marches against white supremacy?

By winter, the energy of resistance seemed to be redirected. Neo-Nazis swapped for Hollywood sexual predators and ivory-tower sexual predators and politician sexual predators. It is plausible that some pursue and pursued (longstanding) sexual predators in the workplace, at this juncture, because they have equated the pursuit of white supremacists with their own personal unrecoverable harm. The piggie Alabaman with a stiff “pinkie” (or his Hollywood counterpart or his NYC cosmopolitan brethren) are not perceived as murderous, despite public policies that prove otherwise (see their votes on policing, health, foreign policy).

It is possible that the majority of white people claiming to be anti-racist will never physically confront white supremacy because they can only imagine defeat. Perhaps some of their reluctance stems from a failure to imagine victory; they have little sense of what an anti-racist land feels like.

Towards a sort of sanity, I look backward online. I’m seeking an image to reassure me that fascism ends. The image: a dead fascist woman dangles from a meat hook. Her feet are bare and she is upside down. Attached to her corpse is a placard with her name. Ghoulishly, I ask: What font? Bathetically, I ask: Is this what the end of an ideology looks like? But this public desecration didn’t stop the form; the dismembered parts of this far-right belief system have reassembled. When our current iteration of fascism goes dormant again, will the beginning of its hibernation include its governing bodies being strung up … on a slowed internet? I am asking if a gory documentation of the political cycle will load sluggishly. To my own grotesque debasement and relief.

I nightdream, awake in the dark, of people dismantling a fascist state, couple by couple, decoupled, bone by bone, my bone. But my problem is compiling a workable to-do list of actions that will allow me to cross over the shape of the family unit. Guy Hocquenghem refers to this unit as “The Couple,” which includes both heterosexual and homosexual couples; as a form, The Couple has been produced by a millenium of patriarchy and centuries of capitalism. In my nightdream, there are millions of households that go beyond The Couple, that enfold not only mommies, dormies, unckies, but also junkies, roomies, furries, hubbies … generating and sustaining a structure suspended between where we shelter and where we love and rage with strangers. We sleep walkers are also sleep talkers—incoherence is our cover and our pleasure. This nocturnal orality happens in lieu of the waking texts recorded by security forces, We, woozily, operate outside of a passion for hierarchy; exterior reality as it exists today buckles under the flow of beings that cannot meet its passions.

Then I nightmare that you and I are belated, the Capitolocene being the end of our human time.

×

Tam Donner is an American artist and writer.

© 2018 e-flux and the author

0

Homeland Security Stylesheet: Incest Font

Consider Eric Gill, the English stone carver, typographer, sculptor—and progenitor of the typeface Gill Sans. A different Gill typeface, Joanna Nova, is the official font of the United States Department of Homeland Security, named after the only daughter (of three) that Gill did not sexually assault. Despite selecting the typeface dedicated to Gill’s only untouched daughter, the Department of Homeland Security is befouled by association—befouled because all of Gill’s typefaces feel impure after one reads excerpts from the typographer’s diaries, where Gill makes fastidious notes about molesting his servants, his sister, some children, the family dog.

Yet Gill’s typefaces persist in public:

Saab Automobile deploys Gill Sans.
Ferris Bueller’s Day Off
, for sure.
The US Department of Homeland Security, natch.
Save the Children, ditto.
Tommy Hilfiger also.

But some British designers, by way of internet declarations, have sworn off Gill Sans. They will not stuff (commercial) content into a contaminating form. Currently, the name of the font doesn’t reflect its mutating brand identity. I want the font to molt; let’s rechristen MS Gill Sans. At this moment, my fingers are typing in what I will now dub “Digital DaddyCock Sans.” But long after I’ve read the internet declarations from the British designers, the contrails of the incesting father persist; filthy crystals are the speech bubbles of quiet daughters. Homogenitus as declaritive human genitals.

Once established, the history of the font is embedded, and designers cannot simply excise it in hopes of miraculously restoring their pleasure at the control and spaciousness of DaddyCock Sans. The original events surrounding the typeface’s crafting become the substance of the font; this substance crowds and confuses the intended linguistic meaning of words encased in the font. Can a person—me, you—selectively refuse, as an act of resistance, to cognitively process a text executed in a specific font? DaddyCock Sans is the Spanish government’s official typeface on all public signage. Say a woman is driving through the mountains of Asturias, an area that long provided shelter to anarchist guerilla forces, and she suddenly finds herself psychologically incapable of reading all official signage in Spanish. She blows through a stop sign. At this point, she, the refuser, finds “ALTO” (Spanish for “HALT”) unintelligible in DaddyCock Sans. She misses road signs marked “Galicia”—where US nuclear submarines used to roost. She can’t read “Policia” either, as it too is encased in Daddycock Sans. This happens because she has totalized an ethos of resistance. Perhaps emergency illiteracy might be a temporary tactic for refusing the state melding of form and male authority.

James C. Scott, political scientist and anthropologist, suggests that certain forms of elective nonliteracy, when practiced collectively, can function as a “positive medium of cultural life as opposed to a deficiency.” He asserts that historically, marginalized peoples retreated from farming and written language in order to flee emerging nation-states. He focuses on Zomia, the name for a series of alpine terrains stretching across southeast Asia defined by “runaway, fugitive, maroon communities who have, over the course of two millennia, been fleeing the oppressions of state-making projects in the valleys—slavery, conscription, taxes, corvée labor, epidemics, and warfare.” Considered alongside the productive nonliteracy of Zomia, the abolition of select typefaces is an action for those who choose to remain within the nation-state.

Gill’s typefaces are so habitual and spare as to make them seem invisible; they sheath the moral decay of the maker and the corruption of the user. MS Joanna Nova, operating as an official font, provides a stylized interface with the US Department of Homeland Security—an entity that also mishandles human bodies, but on a institutional scale. Some instructional materials on design urge government officials to select a typeface that “achieves a level of harmony and legibility in print.” “Legibility” here pertains only to the kerning, layout, or thickness of the font—obviously it does not include making legible the fact that institutional bodies hold up and hole up specific human bodies. The web page is bright and simple, its whiteness internally lit by a digital sun; it suggests that the government’s hold on detainees is light, temporary, unremarkable. Additionally, some web visitors will have internalized the commercial history of the typeface—including the cover of the 1965 Penguin Modern Classics edition of Aldous Huxley’s Brave New World. They might experientially slide between categories: reader and witness, citizen and suspect. This is the design surface of US fascism.

See dhs.gov. Nested within the site is the home page of US Immigration and Customs Enforcement (ICE), responsible for the forced deportation of undocumented immigrants. When I logged on to the ICE home page in October 2017, a phrase in MS Joanna Nova floated above each image in the “Photos” section.

ENFORCEMENT AND REMOVAL—when in MS Joanna Novais easily received by the user’s eye. It is emblazoned above an image of an alleged child rapist, flanked by ICE officers, on a set of airstairs. Since this appears on a web page, the eye consolidates the inflammatory title and caption and the dull photograph into a unified image; this amalgam contains data without analysis, and competing traumas (rape and deportation) severed from context. The inherent banality of institutional websites paired with the evident boredom of the ICE cameraman eliminates the uncanny as a category of experience for this image. By March 2018, I don’t remember the shapes of the heads of the people in the image or the color of their clothing, so much as the casualness of the shot: a composition that could not locate its register (photojournalism or archival document or…).

Above the next image: ENFORCEMENT AND REMOVAL. In bright sunlight, a figure, bald and with glasses, enters a white van; he is charged with the sex trafficking of minors. Again, MS Joanna Nova. Under the snapshot, the caption reads: “Phoenix, Arizona,” in MS Joanna Nova. The sophisticated typeface is in tension with the artlessness of the composition. This half-hearted attention to style while documenting state power is its own style. Let’s dub it “American Bro,” because American violence, formal and informal, has often aimed to appear casual, effortless, masculine, normal, naturalized. I’m supposed to forget that power could ever be any other way.

Each user of the DHS website—grade-school teachers, businesswomen, DREAMers, cyberattack victims, job seekers, and me—is anonymous to one another. But together we users use in MS Joanna Nova; I use it to determine how the intentions of the state are visualized. In the ICE section, I note thick hands and holsters acting out narratives of white chivalry upon a collateral body of characters specified as rapists and pimps. A border economy based on captives and captors is dependent on feminine victims, actual or conjured. The feminine victim as political commodity also articulates itself in other contemporary ways, oblique and direct, ranging from the reproduction and circulation of images of physically-wasted children as a fundraising tool, to more recent instrumentalizations of conflict-related sexual violence to justify invasions.

For centuries, novelists and artists have recycled images of the female victim. See Beatrice (1866), for example, by Julia Margaret Cameron. For this photograph, Cameron worked with a thirteen-year-old model, May Prinsep. May has been instructed to channel sixteenth-century Beatrice Cenci, in the period after Beatrice’s rape at the hands of her father but before her beheading as ordered by the court. Beatrice and her brothers were executed for hiring assassins to kill their father in Florence, Italy. The sculptor Harriet Hosmer offered her own portrayal of Cenci in 1857. Cameron and Hosmer were attracted to the task of depicting a female victim who suffers twice over: once in the privacy of the home, and once at the hands of the state. Perhaps Hosmer—who, as a lesbian, was subject to a certain kind of erasure by the state—was hoping her prone marble Beatrice was covertly instructing: “You too can kill the father.”

Joanna Gill, the font’s muse, unofficially operates as ICE’s muse—an unmolested Anglo daughter. The use of a font created by Eric Gill, when Gill was never punished for his own crimes, feels ironic. Do my fella users feel that too? Feelings about Petra Gill, molested daughter … Indeterminate feelings about Petra’s Jersey (1922) by Eric Gill, a light sketch of a “clothed partial torso and arm.” The image floats on the surface of the viewer’s mind. It’s a relief not to see the face or skin of Petra, the middle daughter, just the slump of fabric. Human escaped. It is my fantasy that Petra unfurls the jersey like the Invisible Man’s bandages and vanishes into the air, reaching the edge of the exosphere, four hundred miles above the earth’s crust. Spare but prurient wood engravings by Gill—titled Girl in Bath I (1922), Girl in Bath II (1923), and Hair Combing (1922)—do not name teenage Petra as their subject. The totality of Gill’s personal papers were not acquired by UCLA until the 1950s. It is only decades later that the details of Gill’s abuses, as recorded in his archived diaries, are published in mainstream biographies. Petra’s image is only then transformed from the artist’s daughter to an actual victim of the artist. My daydream that Petra gets free persists, her perp stranded on the continental crust.

Be it rape victim, victimized worker, raped worker, or worker raped while traversing the desert towards work, I wish to dodge the narrative orbit that places assault, née human sacrifice, as the whole of representation and the totality of a person’s end. Likewise, the bodies held by the Department of Homeland Security often get fed into a sentimental framework (a liberal reflex) that generates such volumes of emotion that emotion becomes the end experience of the witness as opposed to sparking actual structural change. The MS Joanna Nova typeface circuitously participates in the detention of force-fed bodies, restrained bodies in our private prisons, because it organizes the forward-facing end of the entity and thus conceals assault; it is designed to communicate that the organization is clean and “free of fancy business” (Gill). Do you suspect that I’m advocating for the DHS to replace MS Joanna Nova with MS Antiqua, a font celebrated by the Nazi Party? That I’m urging the adaptation of a font that provides a truer reflection of the DHS’s aims and feelings? I’m not. I only aim to expose unwitting alliances … and to dissolve phallic technique. Duh.

Is there a spell that can do that? What font is it in?

If I restricted myself to other typefaces roughly coeval with Gill’s, I would choose Doves Press font. Although Gill’s typefaces and Doves Press both emerged from the Arts and Crafts Movement, the social origins and physical end of Doves Press font differ from Gill’s typefaces. While Doves Press was financed by a militant suffragette, Anne Cobden-Sanderson, Gill’s best-remembered public engagement with women’s suffrage was his 1910 sculpture Votes For Women, I Don’t Think, purchased by economist John Maynard Keynes. Doves Press font predates Gill’s typography (1926) by twenty-seven years. But by 1919, the entirety of Doves Press font was sunk. In his diary, T. J. Cobden-Sanderson, the husband of Anne, records that the alphabet was “bequeathed to the sea.” T. J. wrapped the punches and matrices in paper parcels and over 105 visits threw the typeface over the Hammersmith, a suspension bridge spanning the Thames. One hundred fifty-one of its metal sorts were recovered from by the Port of London Authority’s diving team in November 2014. Some were moved along by the current and dredging; others were possibly destroyed in two IRA bombings of the bridge. It is not just T. J. Cobden-Sanderson’s suturing of his wife’s name to his own or the feminist bankrolling of the initial endeavor that makes Doves Press font the right typeface for a radical spell; it is that T. J.’s gesture was a furious and poetic hex on his former business partner, Emery Walker. What is a hex? The witches of the Susan B. Anthony coven once wrote that they were not circling in order to bake cupcakes. Their work was to curse. To not lament sexual assault but to extinguish its henchman’s momentum, because they rape so frequently and viciously. With what was this font imbued by being drowned, bombed, dredged, and resurrected? Maybe it can be repurposed to refuse abusive literacy, or to destroy it in kind.

But a typeface with a history of wizardly erasure is not casually purchased at Michaels craft emporium. Online, I make contact with a stencil service, which says I can special order Doves Press font at a price. Also online, former colleagues write to inquire about sexual harassment in one of the many art schools I have taught at; female students are confiding: male faculty members have made sexual overtures. The students decline to file reports. Surfing, I notice that a nontraditional undergraduate that I reported for sexually harassing students is now an adjunct professor at the same school. A secretly shared MS spreadsheet lists perpetrators working in the art field. I mentally note who has been listed and who has not. Three days later, the file disappears. Another Gchat window opens up; a friend talks about the article she is writing on sexual predators in the art world. Offline, my partner and I coolly discuss the named perpetrators while doing chores. Run faucet. “Dickie’s name was on it.” Wipe counter. “Not surprised.” Offline, outside of my home, is an abandoned black BMW. It isn’t mine. It belongs to a former resident of the building we live in. He, a pediatrician, is now in prison for possessing the largest stash of child pornography the cops have ever uncovered in the area. When we walk by the Beamer, my kid occasionally asks, “Why it is that car here?” “Oh, it’s a junker,” I say. “It’s for parts.” Next, I quip to the leaf blowers, who may also be in the know: “Can you please bury that in leaves?”

Tonight, I run the mouse over the Wi-Fi icon.

Router names pop up, including the pedophile’s router. I read his surname in MS Helvetica, and MS Helvetica transmogrifies—a default font for child molesters.

Helvetica, initially Neue Haas Grotesk, was designed by Swiss typographer Max Miedinger in 1957. Miedinger explains: “We designers are sellers of subliminal details that the average viewer does not see, but they do feel.”

Dear Viewer, I felt DaddyCock Sans; now we feel Helvetica. The local pedophile is scheduled to be released this year. He will come to fetch his mail, his Beamer, his router.

Recall again that Miedinger said: “We designers are sellers of subliminal details that the average viewer does not see, but they do feel. The message is somehow warmer, more memorable.”

Wi-Fi Router first accessed 09/01/2016, 12:12 p.m. Wi-Fi Router list last accessed 01/03/2018, 6:07 p.m.

I scroll past the pedophile’s router name in Helvetica. It is memorable, but not warmer. I feel it. My self as a cultural isolate … as if the the violence of the state and the violent sentimentality of capitalism both fall away from me and the ghost-router. This is not possible. My feelings have produced a political bio-fiction: a pedophile as autotroph, producing his own nutrients, operating within a closed system where he climaxes only to photographs of his child self.

01/05/2018, p.m.: After the dog shits and I bag it, I photograph the pedophile’s abandoned Beamer in our shared driveway because the snow plows have further buried it. The snow lips the window. The car cannot back out. I’m afraid the neighbors are watching me photograph the disappearing car. As a cover, I snap a picture of the abandoned basketball hoop … the clear blue sky … when to stop? … a beheaded lantern with a duct-taped nub … the copper beech with a sawn-off limb.

To daydream a law based on pedophiles as autotrophs.

(I realize I’m dreaming of punishment.)

A disassembled homeland security. A rudderless rapist. A self-cannibalized pedophile. A dead fascist?

To sleepwalk around the riot?

The Department of Homeland Security Style Guide, downloaded November, 2017.

White supremacists run free here. The Southern Poverty Law Center lists 724 US hate groups with some ideological stake in white supremacy. Some casual protesters fear that a physical confrontation with white supremacists will result in their own death. All summer there was white hand-wringing: Could a white one who chooses personal safety over resistance still regard itself as a moral being? Our whelp!!! was many Family Unit’s public justification, their tender excuse. Was it also mine? There seemed to be scant middle class identification with the Bread and Roses Strike (1912) and the ways in which strikers’ children were mobilized. There was little mainstream knowledge of the Battle of Hayes Pond (1958), where members of the indigenous Lumbee tribe—including fathers, uncles, and cousins—disrupted a Klu Klux Klan rally. Outnumbering the Klan, the Lumbee cut off the Klan’s light source, absconded with their sound system, and stomped on their abandoned banners while the Klan fled. The Lumbee provide an alternative family model. In these times, can middle-class family reunions be organized as marches against white supremacy?

By winter, the energy of resistance seemed to be redirected. Neo-Nazis swapped for Hollywood sexual predators and ivory-tower sexual predators and politician sexual predators. It is plausible that some pursue and pursued (longstanding) sexual predators in the workplace, at this juncture, because they have equated the pursuit of white supremacists with their own personal unrecoverable harm. The piggie Alabaman with a stiff “pinkie” (or his Hollywood counterpart or his NYC cosmopolitan brethren) are not perceived as murderous, despite public policies that prove otherwise (see their votes on policing, health, foreign policy).

It is possible that the majority of white people claiming to be anti-racist will never physically confront white supremacy because they can only imagine defeat. Perhaps some of their reluctance stems from a failure to imagine victory; they have little sense of what an anti-racist land feels like.

Towards a sort of sanity, I look backward online. I’m seeking an image to reassure me that fascism ends. The image: a dead fascist woman dangles from a meat hook. Her feet are bare and she is upside down. Attached to her corpse is a placard with her name. Ghoulishly, I ask: What font? Bathetically, I ask: Is this what the end of an ideology looks like? But this public desecration didn’t stop the form; the dismembered parts of this far-right belief system have reassembled. When our current iteration of fascism goes dormant again, will the beginning of its hibernation include its governing bodies being strung up … on a slowed internet? I am asking if a gory documentation of the political cycle will load sluggishly. To my own grotesque debasement and relief.

I nightdream, awake in the dark, of people dismantling a fascist state, couple by couple, decoupled, bone by bone, my bone. But my problem is compiling a workable to-do list of actions that will allow me to cross over the shape of the family unit. Guy Hocquenghem refers to this unit as “The Couple,” which includes both heterosexual and homosexual couples; as a form, The Couple has been produced by a millenium of patriarchy and centuries of capitalism. In my nightdream, there are millions of households that go beyond The Couple, that enfold not only mommies, dormies, unckies, but also junkies, roomies, furries, hubbies … generating and sustaining a structure suspended between where we shelter and where we love and rage with strangers. We sleep walkers are also sleep talkers—incoherence is our cover and our pleasure. This nocturnal orality happens in lieu of the waking texts recorded by security forces, We, woozily, operate outside of a passion for hierarchy; exterior reality as it exists today buckles under the flow of beings that cannot meet its passions.

Then I nightmare that you and I are belated, the Capitolocene being the end of our human time.

×

Tam Donner is an American artist and writer.

© 2018 e-flux and the author

0

Congress Mulls a CIO's Authority, Future of Homeland Security and Data Breaches

Lawmakers are scheduled to vote Tuesday on a bill that would boost the buying authority of the Federal Communications Commission chief information officer.

The FCC CIO Parity Act[1] is tucked into Ray Baum’s Act[2], legislation that would reauthorize the FCC for the first time in 15 years and contains several measures to improve communications infrastructure and internet access.

The FCC Parity Act would grant the CIO “a significant role” in planning, budgeting and hiring processes related to IT at the agency. These powers would be similar to what the Federal Information Technology Acquisition Reform Act grants to CIOs at CFO Act agencies.

“Aligned with Sen. Moran’s past priorities included in FITARA, the senator feels strongly that federal agencies are increasingly reliant upon IT in their day-to-day operations. As agencies plan for budgets, it only makes sense for the expertise of the CIO to be included in these critical operational decisions,” a spokesman for Sen. Jerry Moran, R-Kan., told Nextgov. Moran and Sen. Tom Udall, D-N.M., introduced the Senate version of the bill back in December. The duo previously pushed the Modernizing Government Technology Act, which not only passed but is now taking agency proposals[3] for funds.

“The FCC is charged with regulating close to a sixth of our economy, but their information technology systems are severely out of date—leaving sensitive industry material vulnerable to increasingly dangerous cyberattacks,” Udall told Nextgov. “The inclusion of this provision will empower the FCC CIO and give the CIO the authority necessary to modernize and take the necessary steps to protect sensitive data.”

Another notable bill tucked into the package is the MOBILE NOW Act[4] introduced by Sens. John Thune, R-S.D., and Bill Nelson, D-Fla., directing the FCC to make more spectrum available to the private sector for fixed and mobile wireless broadband development.

Credit Over-Extended

House Energy and Commerce Committee leaders requested a briefing with the company investigating the Equifax data breach, Mandiant, Thursday after news the credit score giant identified 2.4 million additional victims.

“This latest announcement from Equifax is deeply concerning, and raises even more questions about the company’s total failure in safeguarding consumers’ information and providing adequate tools for protection post-breach,” committee Chairman Greg Walden, R-Ore., and Rep. Bob Latta, R-Ohio, who chairs the committee’s consumer protection panel, said in a statement.

Senate Commerce Chairman John Thune, R-S.D., also said his committee would be reaching out to Equifax for additional information.

Speaking of Equifax

Rep. Ted Lieu, D-Calif., introduced two bills Thursday aimed at protecting consumers from the next major credit reporting agency data breach.

The first bill, the Protecting Consumer Information Act[5], would direct the Federal Trade Commission to study whether current law mandates sufficient cybersecurity protections for credit ratings agency and to promulgate new regulations if the current ones are insufficient.

The second bill, the Ending Forced Arbitration for Victims of Data Breaches Act[6], would prohibit companies from forcing data breach victims to all go through individual arbitration before launching a class action lawsuit.

Forging Ahead on FOSTA

A controversial bill aimed at curbing online sex-trafficking passed the House Tuesday despite pushback from tech-savvy lawmakers and industry groups. The Allow States and Victims to Fight Online Sex Trafficking Act[7] would allow states and victims to sue websites that are “knowingly assisting, supporting or facilitating a violation” of federal anti-sex trafficking laws, but the tech community argues the bill could open companies to frivolous lawsuits.

Though early amendments to FOSTA brought many original opponents on board, tech groups renewed their criticism after lawmakers revised the bill’s final text to more closely mirror its Senate counterpart[8], which takes a stiffer position against online platforms. The Senate is expected to vote on FOSTA the week of March 12, and the measure is widely expected to pass.

Overdoing the Oversight

The Senate Homeland Security Committee is working on a Homeland Security Department reauthorization bill that will pare back the roughly 100 congressional committees and subcommittees that department staff must report to, Chairman Ron Johnson, R-Wisc., said[9] Wednesday.  

Those crisscrossing oversight lines were left unaddressed in the House version of the reauthorization bill, which passed that chamber in July. Johnson has suggested forming a congressional commission to study the problem.

The Senate bill will also likely include language strengthening the department’s election cybersecurity mission, senators said.  

Let’s Make This Thing Official

Also Wednesday, House Homeland Security Chairman Michael McCaul, R-Texas, introduced a bill[10] giving legislative backing to the work of Homeland Security’s cyber incident response teams. The Homeland Security Committee is scheduled to mark up[11] the bill Wednesday.

Senate Pushes Cyber Cooperation With Ukraine

Sen. Sherrod Brown, D-Ohio, introduced legislation[12] Tuesday urging the State Department to help Ukraine secure its digital networks[13] against Russian cyberattacks and to reduce the nation’s reliance on Russian internet infrastructure. The bill merely states the “sense of Congress” and does not mandate any State Department action. A similar bill passed the House[14] Feb. 7.

Ukraine has suffered numerous digital attacks since the 2014 Russian annexation of Crimea that are widely believed to have been launched by the Russian government. Among those was a 2015 attack that severely disrupted electricity across the nation. It was likely the first widely successful cyberattack against an electric grid.

Quit Concealing Climate Change

The Congressional Safe Climate Caucus penned a letter[15] to President Trump condemning the White House push to reduce public access to federal climate change information. The 26 lawmakers said they are “alarmed” by the administration’s “systematic effort” to remove web pages and language related to climate change from federal sites. They accused the administration of violating the Federal Records Act—which requires agencies to collect, retain and preserve records—and pushed the White House to “consider the fact that human-caused global climate change is one of the greatest existential threats to the future of our planet” in its future online practices.

Coming Up

Tuesday and Wednesday this week will be chock full of tech and cyber activity on the hill. Here’s a rundown.

The Senate Armed Services Committee will hold its annual worldwide threats hearing[16] Tuesday.

The Senate Finance Committee will also hear testimony[17] that day about protecting online consumers from counterfeit goods and the House Energy and Commerce Committee will hold an oversight hearing[18] of the National Telecommunications and Information Administration.

The House Small Business Committee will hold a Tuesday hearing[19] on challenges for rural broadband providers.

On Wednesday, the Senate Homeland Security Committee will hold its third business meeting[20] focused on reauthorizing the Homeland Security Department for the first time since its inception.

Also that day, the House Homeland Security Committee will examine[21] efforts to strengthen the department’s cybersecurity workforce and the House Financial Services Committee will consider[22] legislative proposals to reform data security and breach notification regulations.

The House Oversight Committee will also hold the second in a series of hearings focused on how artificial intelligence can benefit the federal government.[23]

References

  1. ^ FCC CIO Parity Act (www.congress.gov)
  2. ^ Ray Baum’s Act (www.congress.gov)
  3. ^ taking agency proposals (www.nextgov.com)
  4. ^ MOBILE NOW Act (www.congress.gov)
  5. ^ Protecting Consumer Information Act (lieu.house.gov)
  6. ^ Ending Forced Arbitration for Victims of Data Breaches Act (lieu.house.gov)
  7. ^ Allow States and Victims to Fight Online Sex Trafficking Act (www.nextgov.com)
  8. ^ Senate counterpart (www.nextgov.com)
  9. ^ said (www.nextgov.com)
  10. ^ bill (www.congress.gov)
  11. ^ mark up (docs.house.gov)
  12. ^ introduced legislation (www.congress.gov)
  13. ^ help Ukraine secure its digital networks (www.brown.senate.gov)
  14. ^ passed the House (boyle.house.gov)
  15. ^ penned a letter (beyer.house.gov)
  16. ^ worldwide threats hearing (www.armed-services.senate.gov)
  17. ^ hear testimony (www.finance.senate.gov)
  18. ^ oversight hearing (energycommerce.house.gov)
  19. ^ Tuesday hearing (smallbusiness.house.gov)
  20. ^ third business meeting (www.hsgac.senate.gov)
  21. ^ examine (homeland.house.gov)
  22. ^ consider (financialservices.house.gov)
  23. ^ focused on (oversight.house.gov)
0

Congress Mulls a CIO's Authority, Future of Homeland Security and …

Lawmakers are scheduled to vote Tuesday on a bill that would boost the buying authority of the Federal Communications Commission chief information officer.

The FCC CIO Parity Act[1] is tucked into Ray Baum’s Act[2], legislation that would reauthorize the FCC for the first time in 15 years and contains several measures to improve communications infrastructure and internet access.

The FCC Parity Act would grant the CIO “a significant role” in planning, budgeting and hiring processes related to IT at the agency. These powers would be similar to what the Federal Information Technology Acquisition Reform Act grants to CIOs at CFO Act agencies.

“Aligned with Sen. Moran’s past priorities included in FITARA, the senator feels strongly that federal agencies are increasingly reliant upon IT in their day-to-day operations. As agencies plan for budgets, it only makes sense for the expertise of the CIO to be included in these critical operational decisions,” a spokesman for Sen. Jerry Moran, R-Kan., told Nextgov. Moran and Sen. Tom Udall, D-N.M., introduced the Senate version of the bill back in December. The duo previously pushed the Modernizing Government Technology Act, which not only passed but is now taking agency proposals[3] for funds.

“The FCC is charged with regulating close to a sixth of our economy, but their information technology systems are severely out of date—leaving sensitive industry material vulnerable to increasingly dangerous cyberattacks,” Udall told Nextgov. “The inclusion of this provision will empower the FCC CIO and give the CIO the authority necessary to modernize and take the necessary steps to protect sensitive data.”

Another notable bill tucked into the package is the MOBILE NOW Act[4] introduced by Sens. John Thune, R-S.D., and Bill Nelson, D-Fla., directing the FCC to make more spectrum available to the private sector for fixed and mobile wireless broadband development.

Credit Over-Extended

House Energy and Commerce Committee leaders requested a briefing with the company investigating the Equifax data breach, Mandiant, Thursday after news the credit score giant identified 2.4 million additional victims.

“This latest announcement from Equifax is deeply concerning, and raises even more questions about the company’s total failure in safeguarding consumers’ information and providing adequate tools for protection post-breach,” committee Chairman Greg Walden, R-Ore., and Rep. Bob Latta, R-Ohio, who chairs the committee’s consumer protection panel, said in a statement.

Senate Commerce Chairman John Thune, R-S.D., also said his committee would be reaching out to Equifax for additional information.

Speaking of Equifax

Rep. Ted Lieu, D-Calif., introduced two bills Thursday aimed at protecting consumers from the next major credit reporting agency data breach.

The first bill, the Protecting Consumer Information Act[5], would direct the Federal Trade Commission to study whether current law mandates sufficient cybersecurity protections for credit ratings agency and to promulgate new regulations if the current ones are insufficient.

The second bill, the Ending Forced Arbitration for Victims of Data Breaches Act[6], would prohibit companies from forcing data breach victims to all go through individual arbitration before launching a class action lawsuit.

Forging Ahead on FOSTA

A controversial bill aimed at curbing online sex-trafficking passed the House Tuesday despite pushback from tech-savvy lawmakers and industry groups. The Allow States and Victims to Fight Online Sex Trafficking Act[7] would allow states and victims to sue websites that are “knowingly assisting, supporting or facilitating a violation” of federal anti-sex trafficking laws, but the tech community argues the bill could open companies to frivolous lawsuits.

Though early amendments to FOSTA brought many original opponents on board, tech groups renewed their criticism after lawmakers revised the bill’s final text to more closely mirror its Senate counterpart[8], which takes a stiffer position against online platforms. The Senate is expected to vote on FOSTA the week of March 12, and the measure is widely expected to pass.

Overdoing the Oversight

The Senate Homeland Security Committee is working on a Homeland Security Department reauthorization bill that will pare back the roughly 100 congressional committees and subcommittees that department staff must report to, Chairman Ron Johnson, R-Wisc., said[9] Wednesday.  

Those crisscrossing oversight lines were left unaddressed in the House version of the reauthorization bill, which passed that chamber in July. Johnson has suggested forming a congressional commission to study the problem.

The Senate bill will also likely include language strengthening the department’s election cybersecurity mission, senators said.  

Let’s Make This Thing Official

Also Wednesday, House Homeland Security Chairman Michael McCaul, R-Texas, introduced a bill[10] giving legislative backing to the work of Homeland Security’s cyber incident response teams. The Homeland Security Committee is scheduled to mark up[11] the bill Wednesday.

Senate Pushes Cyber Cooperation With Ukraine

Sen. Sherrod Brown, D-Ohio, introduced legislation[12] Tuesday urging the State Department to help Ukraine secure its digital networks[13] against Russian cyberattacks and to reduce the nation’s reliance on Russian internet infrastructure. The bill merely states the “sense of Congress” and does not mandate any State Department action. A similar bill passed the House[14] Feb. 7.

Ukraine has suffered numerous digital attacks since the 2014 Russian annexation of Crimea that are widely believed to have been launched by the Russian government. Among those was a 2015 attack that severely disrupted electricity across the nation. It was likely the first widely successful cyberattack against an electric grid.

Quit Concealing Climate Change

The Congressional Safe Climate Caucus penned a letter[15] to President Trump condemning the White House push to reduce public access to federal climate change information. The 26 lawmakers said they are “alarmed” by the administration’s “systematic effort” to remove web pages and language related to climate change from federal sites. They accused the administration of violating the Federal Records Act—which requires agencies to collect, retain and preserve records—and pushed the White House to “consider the fact that human-caused global climate change is one of the greatest existential threats to the future of our planet” in its future online practices.

Coming Up

Tuesday and Wednesday this week will be chock full of tech and cyber activity on the hill. Here’s a rundown.

The Senate Armed Services Committee will hold its annual worldwide threats hearing[16] Tuesday.

The Senate Finance Committee will also hear testimony[17] that day about protecting online consumers from counterfeit goods and the House Energy and Commerce Committee will hold an oversight hearing[18] of the National Telecommunications and Information Administration.

The House Small Business Committee will hold a Tuesday hearing[19] on challenges for rural broadband providers.

On Wednesday, the Senate Homeland Security Committee will hold its third business meeting[20] focused on reauthorizing the Homeland Security Department for the first time since its inception.

Also that day, the House Homeland Security Committee will examine[21] efforts to strengthen the department’s cybersecurity workforce and the House Financial Services Committee will consider[22] legislative proposals to reform data security and breach notification regulations.

The House Oversight Committee will also hold the second in a series of hearings focused on how artificial intelligence can benefit the federal government.[23]

References

  1. ^ FCC CIO Parity Act (www.congress.gov)
  2. ^ Ray Baum’s Act (www.congress.gov)
  3. ^ taking agency proposals (www.nextgov.com)
  4. ^ MOBILE NOW Act (www.congress.gov)
  5. ^ Protecting Consumer Information Act (lieu.house.gov)
  6. ^ Ending Forced Arbitration for Victims of Data Breaches Act (lieu.house.gov)
  7. ^ Allow States and Victims to Fight Online Sex Trafficking Act (www.nextgov.com)
  8. ^ Senate counterpart (www.nextgov.com)
  9. ^ said (www.nextgov.com)
  10. ^ bill (www.congress.gov)
  11. ^ mark up (docs.house.gov)
  12. ^ introduced legislation (www.congress.gov)
  13. ^ help Ukraine secure its digital networks (www.brown.senate.gov)
  14. ^ passed the House (boyle.house.gov)
  15. ^ penned a letter (beyer.house.gov)
  16. ^ worldwide threats hearing (www.armed-services.senate.gov)
  17. ^ hear testimony (www.finance.senate.gov)
  18. ^ oversight hearing (energycommerce.house.gov)
  19. ^ Tuesday hearing (smallbusiness.house.gov)
  20. ^ third business meeting (www.hsgac.senate.gov)
  21. ^ examine (homeland.house.gov)
  22. ^ consider (financialservices.house.gov)
  23. ^ focused on (oversight.house.gov)
0

Remarks by Vice President Pence at the Department of Homeland Security 15th Anniversary Event

Ronald Reagan Building Amphitheater
Washington, D.C.

10:45 A.M. EST

THE VICE PRESIDENT:  Well, thank you, Secretary Nielsen.  Thank you for that kind introduction, and more to the point, thank you for your leadership of the extraordinary men and women who sit before me today and who you represent all across the United States of America.  I am told that you are, in fact, the first employee of the Department of Homeland Security who’s ever gone on to lead it.  Would you all join me in thanking, again, the Sixth Secretary of Homeland Security — (applause) — Secretary Kirstjen Nielsen.  I’m proud of you.

To all the honored guests who are here, all the dedicated men and women of this great Department, and all of you who wear the various uniforms and see to the security of this nation and defend our people: It is an honor to be with you today, on behalf of the President of the United States, to commemorate the 15th anniversary of the United States Department of Homeland Security.  Fifteen years of making America safe.  (Applause.)

And as I stand here today and I think of all those 15 years, and I think of having been a new member of Congress when this agency was forged, I know that the Department of Homeland Security is not just 15 years old, it is 15 years strong.  (Applause.)

And I want to bring greetings to all of you from a leader who’s absolutely committed to making this Department and our nation stronger still.  As you all know, he is a great champion of men and women who protect our country, patrol our borders, and enforce our laws.  I bring greetings, this morning, from the 45th President of the United States of America, President Donald Trump.  (Applause.)

When the President spoke to you last year, he said, and I quote, “Homeland Security is in the business of saving lives.”  And that’s exactly what you’ve been about for the past 15 years.

The Old Book says that, “If you owe debts, pay debts; if honor, then honor; if respect then respect.”  And I’m here today on behalf of our President and on behalf of a grateful nation to pay a debt of gratitude and honor and respect to the men and women of DHS — all of you who work tirelessly with honor and integrity to “safeguard the American people, our homeland, and our values.”  Give yourselves a round of applause.  (Applause.)

And as the Secretary said, I was there on Capitol Hill on 9/11.  I watched the Congress come together, setting politics completely aside to forge this Department, taking the counsel of some of the best minds in both political parties and the best minds in security of this nation, and to move quickly to adapt the security of this country to a near — new era of threats.

I served as a member of Congress with two great Secretaries of this Department.  In fact, I’ll never forget that day, I, with member of Congress, we were gathered in the basement at the Capitol Hill Police Headquarters, and President Bush’s Homeland Security Advisor was on the phone speaking to members of Congress.  He said to us then, “The only thing we know for sure is that they want to hit us again and they want to hit us worse.”  And I just knew then that Tom Ridge was the right man to be the first Secretary of the Department of Homeland Security and we are honored to have you here, Mr. Secretary.  (Applause.)  We truly are.

In the early days of this agency as well, it was led by the capable hands of another great expert in security, someone who I had the privilege of working with on the Judiciary Committee.  And I saw the way that he steered this agency to that careful balance between protecting the American people and protecting the liberties of our nation.  And Secretary Michael Chertoff, we are honored to have you here and we are grateful for your service.  (Applause.)

And I just saw him a few moments ago going back to the White House to get right back to work.  But I know you heard today from Secretary Nielsen’s immediate predecessor, an American hero who has devoted his entire life to serving the nation he loves.  Join me in thanking John Kelly  — (applause) — for his great season of service to this agency.

And to all of you who work at this Department every day, thank you.  Thank you for stepping up to protect our homeland and our people.  Day in and day out, across the country and, frankly, across the wider world, the men and women of DHS work tirelessly to prevent terrorist attacks, secure our borders, protect critical infrastructure, defend our interests in cyberspace, and ensure the resilience of our communities when disasters strike.

America is safer and more secure because of you, because of your service, because of your courage and sacrifice.  And President Trump and I, and our entire administration, are grateful every day for the service you provide.

As I said before, this Department was forged in the crucible of crisis.  But over the past 15 years it has distinguished itself as a cornerstone of America’s national security and law enforcement enterprise.

Just over one year after the terrorist attacks of September 11th, President Bush signed The Homeland Security Act, which pulled together 22 separate agencies, from 7 different Cabinet departments to form a unified Department of Homeland Security.  Since that day, March 1, 2003, the men and women of DHS have worked tirelessly to keep America safe.  And so you have.

Through the TSA, you protect America’s arteries of commerce and transportation systems.  Through Customs and Border Protection, United States Citizenship and Immigration Services, Immigration and Customs Enforcement, you enforce our nation’s immigration laws, secure our borders and ports of entry, to prevent terrorists, drug dealers, violent criminals from entering our country and threatening our people.

Through the Coast Guard, one of the five Armed Forces of the United States, you defend America’s borders on the high seas, you safeguard our maritime economy, fight transnational criminal syndicates, stop the flow of illicit drugs, and save the lives of Americans in harm’s way.

Last year, the heroes who serve on the Long Blue Line performed countless search-and-rescue missions across America in the midst of hurricanes, storms, floods, fires, and mudslides.  And let me just say — and you’ve already heard it from the President more than once — the men and women of the United States Coast Guard have inspired the nation.  (Applause.)  “Always Ready,” always serving with “Honor, Respect, Devotion, and Duty.”  We’re proud of our Coast Guard.

Through the Federal Emergency Management Agency, you steward the nation through those natural disasters.  For my part, I saw the professionalism of FEMA’s officers firsthand when I traveled to communities that were devastated by last year’s hurricanes and wildfires –- California, Texas, Florida, Puerto Rico, the U.S. Virgin Islands.  Since January of last year, I’m proud to report that FEMA has actually administered more than $7.6 billion in disaster assistance to Americans and American communities.  (Applause.)

And through the Secret Service — some people I spend a fair amount of time with — (laughter) — you do so much more than looking after the First and Second Family.  You safeguard the nation’s financial systems as well.  You protect many who serve.

The President and I couldn’t be more grateful for the devotion of men and women, the dedication of men and women of the Secret Service.  It’s something that I’ve really come to appreciate over the last 13 months.  They stand a quiet sentry; they stand out of the way.  But they stand in the gap.  Would you thank the Secret Service for me?  (Applause.)  Seven thousand men and women.  True American patriots “worthy of trust and confidence.”

But no matter what part of DHS you work for, the men and women of this Department are widely respected and well known.  DHS has become synonymous with your professionalism and dedication to mission.

So, today, let me assure you and let me promise you: As your mission goes forward from this 15th anniversary, you have a champion in President Donald Trump.  (Applause.)

We live in a world of widening challenges and unknowable threats.  To protect America’s homeland, we all know that we have to detect and defeat those who would dare threaten us before they reach our shores.

That’s why the President has signed executive orders to strengthen our counterterrorism efforts and empower the men and women of DHS to implement tough new security protocols across every route a terrorist might use to enter the United States, including enhanced screening and vetting measures.

Already, these stricter measures have enabled you to prevent potential terrorists and criminals from entering the United States.  Here at home, our administration stands with those who stand watch on America’s borders.  We’re proud of every one of you.  As the President told a group of Border Patrol agents last month, we are with you 100 percent.  (Applause.)

From the first day of this administration, the President has worked tirelessly to give the men and women of DHS the resources and support you need to enforce our immigration laws and secure our borders.

Since the start of our administration, arrests of MS-13 gang members are up more than 80 percent, and illegal crossings at our southern border have been cut by nearly 50 percent in just one year.  (Applause.)  The President observed yesterday, illegal border crossings have actually fallen to a 45-year low.  And that’s a credit to your dedication and your professionalism.

But as all of you know well, we still have much work to do.  I saw this firsthand two weeks ago, when I traveled with Secretary Nielsen to the Rio Grande Valley Sector of our southern border.  We toured and spoke with the great men and women who serve the Hidalgo Port of Entry.  We met with great Americans that stand a sentry there every day and keep us safe.  We heard about the challenges they face, the legal loopholes that allow some that might be a threat to this country to have access.

Despite recent progress, our Border Patrol still apprehends more than 1,100 people illegally entering our country every day.  And the American people deserve to know it.  In fact, every day the Department interrupts the attempted entry of seven known or suspected terrorists –- roughly 2,500 per year.

One of the most shocking stories we heard was in the last fiscal year, as a reminder about the sacrifices our Border Patrol makes: attacks on our Border Patrol agents had increased by 73 percent.  This is simply unacceptable.  The frontline officers and agents who secure our borders and protect our communities are heroes and we will give them the support they need to do their job and come home safe.  (Applause.)

That’s why the President and our administration have called on Congress to invest more than $21 billion to provide our frontline agents with the personnel, the technology, the equipment, and the facilities to do their job.  And we’re seeking $18 billion for a border wall system because, as the men and women of DHS know, walls work.  And we will build that wall for the American people and our security.  (Applause.)

As President Trump has said, in his words, his highest loyalty, his greatest compassion, his “constant concern is for America’s children, America’s struggling workers, and America’s forgotten communities.”

And as we continue to fight every day for an immigration system that puts hardworking Americans first, know that we will always stand with those of you who stand on the frontlines to protect our nation and our security.

As I close, I, standing among all these great public servants, I know we all realize it’s been a challenging time in the life of our nation.  Unspeakable acts of violence visited upon our citizens in Parkland, Florida; Sutherland Springs, Texas; Las Vegas, Nevada; and in earlier days in other places around the country, in California and Florida.

And I want to promise each and every one of you, as the President said yesterday, we will continue to call on this Congress and leaders around the country to act, to move swiftly, and we will answer the call to make our schools and our communities safe.  (Applause.)

We mourn with those who mourn, and we grieve with those who grieve.  But as the President said yesterday, now is the time to act.  And we will work closely with members of Congress in both political parties to move forward legislation and policies that will advance the security of the American people and our families.

All of you in this room know something about answering the call.  Each of you, and those that might be looking on in this agency across the country, have answered the call of service.  You’ve considered the people of this country more important than yourselves.  You’ve dedicated your lives to protecting the homeland.  And for 15 years, you’ve done just that with distinction and with integrity.  And the American people are grateful.

And I truly do believe that with your continued courage and commitment, with President Donald Trump in the White House, with the strong and continued support of representatives of the American people, and with God’s help, we will keep our nation safe.  We will make our nation more secure than ever before.

So I commend you.  I commend you for 15 years of homeland security.  And may God continue to bless each and every one of you and your families as you serve and protect the families of this great nation.  God bless you all.  And God bless the United States of America.  (Applause.)

END

11:03 A.M. EST