Surveillance systems can track the locations of cellphone users and spy on their calls, texts and data streams. The Washington Post has reported on such systems that are being turned against travelers around the world, according to security experts and U.S. officials. The summer season highlights the need to take extra precautions when traveling.

When traveling anywhere in the world, for business or pleasure, citizens need to be aware of and alert to looming physical and cybersecurity threats.

To elaborate on expert security tips, strategies and advice for traveling this summer, we presented several questions to The Chertoff Group, a global security advisory firm that enables clients to navigate changes in security risk, technology and policy. Chris Duvall, Senior Director at The Chertoff Group, offers insights into cybersecurity concerns, physical security precautions, and recommends digital resources/apps for consumers while traveling.



Q: How are security risks – physical and digital – changing? Why are threats greater today than five years ago?

The exponential number of headlines over the past few years is a strong indication that both physical and digital risks are evolving and increasing

Duvall: The exponential number of headlines over the past few years is a strong indication that both physical and digital risks are evolving and increasing. The scope, severity and complexity of physical and cyber risks are increasing and becoming more dangerous and destructive. This is especially true for those traveling outside the U.S.

On the physical side, threat actors are actively seeking “soft targets” – public events, social settings, mass audience venues, etc. – to communicate their message, sow chaos and inflict catastrophic harm.

On the digital or cyber side, we have seen a shift from “thrill hacking,” to an increase of “hacking as a business” (through credential compromise and ransomware), to an increase in “hacking for harm” - with the rise of “nuke ware” and ransomware without a clear financial motivation.



Q. What specific precautions should a traveler take to protect their calls, texts and data streams from being spied on?

Duvall: When traveling abroad, we recommend to our clients that their personnel and executives should practice good internet and social media hygiene. Some best practices include:

  • Avoid using public Wi-Fi services—unless you use private VPN service for encryption
  • Increase the privacy setting on your technical devices
  • Disable location identifiers on apps
  • Create a new (unlinked) email for internet correspondence
  • Consider purchasing international MyFi devices to decrease the risk of getting your personal identification information (PII) or protected healthcare information (PHI) stolen 
  • Use temporary (i.e. burner) phones to protect your data and your contacts


Q. What cybersecurity concerns are likely to impact travelers? Are the threats greater outside the United States or in any specific parts of the world?

Significant precautions should be taken to protect personal electronic devices (PEDs) and the data connected to PEDs

Duvall: The international cybersecurity landscape has grown increasingly dynamic, with threats posed by government authorities (in some countries), terrorists, insurgents, and criminals, requiring travelers to be proactive and vigilant. U.S. citizens, particularly executives of U.S.-based technology companies, must be aware that they are considered high-value targets for nation-state intelligence services and criminally-motivated bad actors. Many countries will go to great lengths and expense to acquire and exploit proprietary information from U.S.-based companies, and views U.S. executives visiting the country as “soft” targets of opportunity. As such, significant precautions should be taken to protect personal electronic devices (PEDs) and the data connected to PEDs. The tactics, techniques and procedures (TTPs) utilized by bad actors are often covert and nearly undetectable by the affected person.

Threat actors routinely access, monitor and utilize Wi-Fi networks at hotels and in public spaces to compromise target devices. Other targeting methods include luggage searches, extensive questioning, and unnecessary inspection and downloading of information from personal electronic devices.

There are numerous, high-risk countries for which the U.S. Government warns travelers to be wary of mobile malware, mobile device privacy attacks and hot spots for mobile botnets. The U.S. Department of State has the most recent and up-to-date list. For example, the U.S. Government has investigated numerous incidents in which U.S. travelers’ PEDs (personal and company devices) have been compromised by Russian authorities while transiting Russian airports, left unattended in public spaces and in travelers’ hotel rooms.

	Protect your personal information and travel itinerary as much as possible
When traveling to an unfamiliar place, research your destination to understand the local roads and transportation, geography, local roads, culture, etiquette and laws


Q: What physical security precautions should a traveler take?

Duvall: Here are some useful precautions:

  • When traveling to an unfamiliar place, research your destination to understand the local roads and transportation, geography, local roads, culture, etiquette and laws.
  • Protect your personal information and travel itinerary as much as possible.
  • Limit the amount of jewelry worn, cash, credit cards and electronic devices carried while traveling.
  • Avoid staying on the ground floor of a hotel. Consider choosing a room on the 2nd through 7th floors as these rooms may be more difficult to break into than those on the ground level, but still able to be accessed by fire/emergency response equipment.
  • Never answer your hotel room door for anyone until you’ve determined who they are, why they are at your door, and if it is necessary for you to open the door to interact with them.
  • Carry a rubber door stop/wedge with you to install on the room side of the door before you go to bed.
  • Vary your patterns and routines when venturing out in to a new location, do not become predictable.
  • Politely decline offers of food or drink from strangers (If you do accept beverages, ensure that they are in sealed containers and that there is no evidence of tampering).
  • Never discuss your itinerary, personal, business or other sensitive information where others can hear you.


Q: How can companies be proactive in protecting their business travelers?

Companies should educate their employees on the importance of maintaining good internet hygiene while traveling abroad

Duvall: When traveling on business, companies should provide their employees with clean computers and cell phones before departure. Upon return, the company should immediately wipe the computer clean to prevent any malicious threats from penetrating the company’s internal, cyber-infrastructure. Additionally, companies should educate their employees on the importance of maintaining good internet hygiene and recommend their employees disconnect from social media platforms while traveling abroad. Some general tips to recommend to your employees when traveling abroad include:

  • Register in the Smart Traveler Enrollment Program (https://step.state.gov/step/)
  • Visit Travel.State.Gov to view travel related information specific to the country or countries you’re visiting, including local US Embassy or Consulate contact information, as well as current travel advisories and alerts.
  • Always leave a copy of your transportation and hotel itinerary and driver’s license (or passport if traveling internationally) with a family member or trusted friend.
  • Always use a baggage tag with a protective cover
  • Avoid using public Wi-Fi services


Q: What digital resources and/or apps might a traveler benefit from (and how)?

Duvall: The Chertoff Group recommends researching the below travel-related Apps before departing on a trip:

  • TravWell: This app provides destination-specific vaccine recommendations, a checklist of what you need to do to prepare for travel, and a customizable healthy travel packing list. The app can store travel documents, keep records of medications and immunizations, and set reminders to get vaccine booster doses or take medicines.
  • My TSA: This app provides real-time updates on airport delays. It includes how long security lines are at various airports; information about what you can and cannot bring onto an airplane; and a frequently-asked question list, including new advanced imaging technology.
  • Border Wait Time: The app provides estimated wait times and open-lane status at land ports of entry, which may be particularly helpful when in an area with multiple crossings.
  • Mobile Pass: The Mobile Passport app speeds you through U.S. Customs and Border Protection at (1) cruise port and (24) airports


Q: As a security expert, what’s your best advice for travelers?

Duvall: At the end of the day, travel security is not rocket science. Simply put, travelers need to:

  • Be aware and situationally alert at all times.
  • Be aware and situationally alert to the location of your luggage and carry-ons at all times.
  • Don’t access unknown, unsecured or public Wi-Fi if at all possible.
  • Turn off “auto connect” features and institute stringent privacy controls as much as possible.
  • Try to “blend in” – you don’t have to try to look like a local but travelers should avoid gaudy and expensive attire wherever possible.
  • Use your common sense – if an offer, invitation or opportunity seems to good to be true... it probably is.
Share with LinkedIn Share with Twitter Share with Facebook Share with Facebook
Download PDF version

In case you missed it

ISC West Modifying Venetian Ballroom Layout in Absence of Chinese Companies
ISC West Modifying Venetian Ballroom Layout in Absence of Chinese Companies

ISC West is being affected only minimally by the COVID-19 coronavirus, which is having an impact on international business travel, specifically to and from China. One consequence of coronavirus travel restrictions is a decision by Reed Exhibitions International not to proceed with a dedicated pavilion for Chinese companies at ISC West, March 17-20. In the main hall, however, some Chinese companies will remain in the show and staff their exhibit booths with U.S. office personnel and resources. Importantly, the ISC West event is moving forward as planned. Several trade show organizers globally have canceled events because of fears of spreading the disease. For example, the Mobile World Congress in Barcelona was canceled at the end of February. “Our clear focus is on the health and safety for our entire ISC community, and empathy and compassion for our Chinese customers relative to personal health and safety, and the very challenging business predicament for these companies,” says Will Wise, Group Vice President, Security & Gaming Portfolio, Reed Exhibitions. Minimal Impact Our clear focus is on the health and safety for our entire ISC community, and empathy and compassion for our Chinese customersThe ISC West team and Reed Exhibitions International colleagues in China have been working diligently to assess the status of all ISC West exhibitors from China, given the travel restriction, says Wise. Among show attendees, Chinese travel restrictions will have a negligible impact. In past years, only a tiny fraction of attendees traveled to Las Vegas from China for the show. Immediate action by the U.S. government as soon as the world became aware of the COVID-19 coronavirus has enabled a controlled business and health and safety dynamic that will allow the show to proceed as planned. The U.S. took quick action to put major travel restrictions in place, including no incoming flights/travel from China. “The status is ever-evolving and we’ll be keeping the expo floor plan updated,” says Wise. The China pavilion In previous years, the China pavilion had hosted 50 or more companies as part of what was formerly known as “Global Expo,” located in the Venetian Ballroom adjacent to the Sands Convention Center.  In 2019, the slate of companies in the Venetian Ballroom expanded to include some domestic exhibitors as well as the international companies. Importantly, the ISC West event is moving forward as plannedThis year, Venetian Ballroom exhibits will continue without the participation of Chinese companies. There will be international exhibitors from countries outside China as well as some domestic companies, including the Emerging Technology Zone, where new startups will highlight their latest innovations. The Security Industry Association (SIA) New Product Showcase will also be featured in the Venetian Ballroom, as well as a VIP international lounge. Additionally, a new pavilion highlighting Loss Prevention and Supply Chain companies will be featured, and there will be an educational theater offering free sessions on topics such as drones and robotics.  Reed Exhibitions strongly urges exhibitors and visitors to refer to the guidelines and protocols as suggested by the World Health Organization and local /national public health authorities to contain and mitigate against any further spread of the virus. Suggested precautions include frequent hand washing (including alcohol-based hand rubs) and maintaining a three-foot distance between oneself and other people, particularly those who are coughing, sneezing and have a fever.

How ISC West Has Changed The Game In Security Over The Years
How ISC West Has Changed The Game In Security Over The Years

Being in the physical security industry for almost two decades has been an exciting journey, with significant changes that have impacted the world of security. Companies today must be proactive when it comes to securing their facility and are lucky to have so many choices when it comes to security technology. From the beginning, the ISC West show was always at the forefront of new technology and brought together the very best technology and industry professionals in the “City of Lights”. Back in 2001 when I first entered the security world, video surveillance was the key driver, and transitioning from analog cameras to IP video cameras was the talk of the town. In the early 2000s, the ISC West show was filled with video manufacturers showcasing their new IP cameras and the IT folks were just starting to get involved with the security decisions.  Back then the ISC West show consisted of a myriad of video manufacturers exhibiting their camera lines. Where now in 2020 the high-profile enterprise-level camera manufacturers dominate the show floor. Over the last two decades, keeping up with the technology advancements of IP cameras was a difficult feat for most camera manufacturers and the high-profile manufacturers who had the funds to invest in R & D were the only ones that survived. Changing the game in video surveillance and access control  In the early 2000s, the ISC West show was filled with video manufacturers showcasing their new IP cameras Another huge change that our industry has seen over the years was the increase in the number of acquisitions. Smaller security manufacturers started being acquired by the larger ones, which changed the game in video surveillance and access control. In addition to manufacturers, large security integrators like Convergint Technologies & Anixter were also buying smaller commercial integrators and dominating the market. At ISC West today, you will see predominately high profile – big name manufacturers and integrators where the smaller companies were either acquired or went out of business.    Revolutions in the industry The security industry also faced a huge revolution with three major technologies driving growth in the security market – Network-based technologies (IoT enabled solutions), Access Control as a Service (ACaaS) and Mobile Credentials. ISC West saw this evolution coming and created specific educational seminars dedicated to these topics. Another big push that came into play in the last few years was being able to integrate a host of technologies like video and access control by using an open architecture platform. Many partnerships were formed in the security industry due to this massive push for integration. At ISC West, we now see many companies having their partners sharing booth space. This helps reduce costs for exhibitors in addition to giving smaller companies credibility by being recognized with the bigger players in the industry. In addition, ISC West makes it easy for attendees to plan out their show schedule in advance with the mobile app; creating a convenient way to access show information from mobile devices.  From the beginning, the ISC West show was always at the forefront of new technology Emerging excitement  Today, ISC West continues to be an exciting show that is jammed packed with educational sessions, networking events, and new pavilions that help segment the security industry into different sectors. An example of some new technology pavilions includes drones & robotics, loss prevention & supply chains, and emerging tech. All new start-up companies that are 5 years old or less can be part of the emerging tech section of the show. Here entrepreneurs can unveil new and upcoming security technologies; creating a win win situation for any size business looking to make its name known in the industry. New technology, innovations and rising trends Another huge focus at the ISC West show is public safety. A full range of solutions are offered at the Public Safety Pavilion including barriers/bollards/gates/perimeter security, surveillance, access control, and alarms - along with innovative technologies for gunshot and drug detection, license plate recognition, acoustics, facial recognition and AI, connected vehicles, communication systems and devices, alerts and monitoring, and active shooter solutions Today, ISC West continues to be an exciting show that is jammed packed with educational sessions, networking events, and new pavilions and training. Virtual reality demonstrations have also been available at the show to help attendees with preventative measures when it comes to school and public safety. Some new vape and metal detection technology built on the IoT concept will be featured at ISC West 2020 to help combat the vaping epidemic in our country. With active shooter incidents on the rise, metal detection and perimeter protection at schools will be an important part of the show. Awards and showcases When it comes to show press, we have also seen an influx of awards for security manufacturers that are exhibiting at the show. The major security publications have been offering manufacturers the opportunity to submit a product in distinct categories and win a prestigious award at the show. This creates “buzz” about your product and great for social media postings. Live video interviews at an exhibitors’ booth has also become a very popular tool to increase brand awareness and thought leadership for exhibitors. The ISC West show offers numerous ways to drive traffic to your booth and promote new product launches seamlessly. Over the years, the show has created a conduit The ISC West show offers numerous ways to drive traffic to your booth and promote new product launches seamlesslyfor manufactures and integrators to showcase new products and technologies to end users across multiple vertical markets.      At the top of the game  While the security industry continues to evolve, the one thing that stays constant is the wealth of information that ISC West offers to its attendees.  The show always brings together the latest technologies and thought leaders that will continue to change the game in security for years to come.

New VMS Features Worth Your Time and Attention at ISC West 2020
New VMS Features Worth Your Time and Attention at ISC West 2020

ISC West, the world's largest security industry trade show, is just around the corner. This in-person show gathered more than 1,000 manufacturers and over 30,000 visitors from all over the world in 2019. On top of that, more than 200 brands exhibited at ISC West for the first time. This year's event promises to be just as exciting, if not more so. Let’s overview some leading security trends in video management systems development, and what's worth your time and attention at ISC West 2020. AI analytics Emerging two or three years ago, the AI-based video analytics market is experiencing a boom in growth. The prototypes and ideas displayed at ISC West 2019 could This year's event promises to be just as exciting, if not more soalready be part of a functioning system today. There's a lot of hype around this new trend. So, if you're looking for solutions for your needs, it is important to be able to tell the difference between technologies that work and marketing bluster. To do that, you have to understand what today's AI-based analytics (also often referred to as a neural network, deep learning, or machine learning) can and can't do. Let's start with what AI can't do in video surveillance. It can't analyze the sequence in which events occur or understand the 'logic' of what's happening in the scene. In other words, there's no such thing as a 'suspicious behavior detection tool'. Nevertheless, neural networks are really good at recognizing and classifying objects. For instance, they can distinguish humans from vehicles, vehicles from other moving objects, and cyclists from pedestrians. Neural network trackers This technology is primarily used as a neural network tracker or object tracker that can identify and track objects of a specific type. Usually, it's applied to complex scenes with a large amount of non-relevant details where a classic tracker would drown in false alarms. The neural tracker can be used to detect people in dangerous areas at production facilities, cyclists riding on pedestrian lanes, or poachers trying to sneak into a nature preserve. Neural networks are really good at recognizing and classifying objectsObject identification function can be used for other site-specific tasks, such as detecting people without a helmet or a high-visibility vest at facilities where those are required by safety regulations. It can also be used to detect fire and smoke in open spaces, or at big premises with high ceilings or active air circulation, where common fire alarm systems can't be used or may go off too late. Behavior analytics  Behavior analytics is another field of analytics based on artificial neural networks. Even if recognizing suspicious or inappropriate behavior is nearly impossible, it can detect risky situations based on human postures, such as an active shooter pose, raised arms, crouching, or man down. In addition to that, AI has been successfully used to perform facial and license plate recognition for quite some time now. Although these systems aren't new, their recognition quality improves each year. Looking for solutions? You'll definitely find some interesting and new options from developers specializing in VMS and modular AI analytics at ISC West 2020. Even if recognizing suspicious or inappropriate behavior is nearly impossible, AI can detect risky situations based on human postures Smart search The ability to perform a quick, flexible search in a video archive is one of the most important features of a video surveillance system. In many ways, it's even more AI has been successfully used to perform facial and licence plate recognition for quite some time nowimportant than real-time monitoring itself. Constantly keeping an eye out for what's happening onsite is the security service's job. Medium- to large-sized companies usually have that kind of department. Meanwhile, lots of small businesses and households use video footage to investigate accidents, resolve conflicts, or analyze employee's work. They generally don't need real-time monitoring, but video search is a crucial element. The most basic search tools offer an interface that enables easy access to recorded video and event-based search (from video analytics, detectors, etc.). Smart systems with forensic search features that allow the user to set criteria enhance the system's search capabilities even more. How it works  VMS analyzes the video as it is recorded and saves the resulting metadata to a database. In the most basic case, the metadata contains information about motion in the scene as well as the moving object's coordinates. When searching, you can select an area of interest within the frame and take a quick look at all video segments containing motion in this area. More advanced systems save the parameters of moving objects, such as their size, color, motion speed and direction. TThe ability to perform a quick, flexible search in a video archive is one of the most important features of a video surveillance systemYou'll quickly find what you're looking for by setting more precise criteria. The first VMS with forensic search features appeared in the early 2010s. Since then, a growing number of users and VMS developers have recognized the importance of these tools. More and more manufacturers enrich their products with forensic search features, starting from basic search by motion detection. Integrating search functions with AI Recently, search technologies have gone even further by integrating search functions with AI analytics. Some systems are capable to recognize all faces and number plates captured by cameras and save them to the database. You can quickly find all videos containing an image of a person or a car just by searching a photo or a number plate across multiple camera archives at a time. One usage scenario for these systems can be seen in law enforcement deploying them to find suspects using CCTV cameras around the city. Another option for integrating smart search and AI is searching by criteria based on a neural network tracker. When you use it, you can set object's size, color, motion speed and direction in the scene, as well as object's type (such as a human or a vehicle). So, if you need to find out when a red car appeared in the surveillance area, the system will show you only red cars while ignoring other objects like people in red clothes. This technology lets you find what you're looking for even faster. If you or your clients use VMS primarily to record video, be sure to ask the manufacturers you'll talk to at the show what search capabilities they offer. More advanced systems save the parameters of moving objects, such as their size, color, motion speed and direction Hardware AI acceleration High CPU resource consumption is one of the hardest challenges that stem from implementing a neural network–based video analytics system. This significantly decreases the number of cameras that can be connected to a server that hosts AI analytics. It also makes the system much more expensive. AI technology lets you find what you're looking for even fasterThe solution is to use AI accelerators. GPUs and dedicated accelerator cards are used on servers to provide hardware acceleration for the neural networks' workload. These devices are mostly manufactured by Intel and NVIDIA. Intel also offers the OpenVINO™ toolkit, a software package for developers that helps distribute workload between CPU, GPU, and accelerators as effectively as possible using all available resources. New solutions Due to AI's growing popularity, lots of minor microchip manufacturers became interested in developing neural accelerator chips. The healthy competition will work in the market's favor, serving to stimulate tech development and cut prices. New solutions in the field were on display at ISC West 2019; they'll definitely be present at ISC West again in 2020. Developers specializing in VMS and modular AI video analytics should absolutely check these out. But users should understand that it's impossible to build a cost-effective video surveillance system with significant number (10–20 and more) of AI analytics channels without using neural accelerators. That said, various accelerator models may significantly differ in price and power consumption. So, when you talk to developers specializing in VMS and AI analytics modules, ask what accelerator makes and models they support. In conclusion Whether you're an integrator looking for interesting VMS offers for clients or an end-user searching for solutions to your own tasks, check out what AI analytics can do. This sector is developing very fast and is continuously introducing new features that may be just what you're looking for. Incorporating forensic search in recorded video footage is key to building an effective video surveillance system for users, and important to creating a unique product offering for integrators. Needless to say, you can't build a cost-effective video surveillance system without using CPU resources wisely. If a system's functionality completely aligns with what you're looking for, ask what neural accelerator hardware it supports to correctly estimate the cost of your video servers.