People have always had an innate need to feel secure, from building fires at the front of caves that ward off predators in prehistoric times, to today’s efforts of locking your front door. This need for security extends to venturing further afield from the home and is critical for communities to thrive and survive. More than ever, people want to be and feel safe; protected against physical and now biological threats.

When it comes to staying safe, populations around the world have recently demonstrated immense adaptability to changing the way we live our lives in order to protect ourselves and others. In the wake of the COVID-19 pandemic, it isn’t strange to walk down a high street and not see swathes of people wearing face masks, where as little as six months ago it may have been an unnerving sight. While wearing a mask may not be a choice made by the majority in ordinary times, people are compliant as it is helping them get back to a “new” normality in day-to-day interactions.

The same can be said for the use of technology. Beyond pure security, the technologies used to keep the public safe can become integrated into existing environments to make it easier to stay safe while visiting areas where there could be safety risks.

Technologies used to keep the public safe can become integrated into existing environments

Technology enabling freedom

A good example of this is airports. The aftermath of the 9/11 attacks in 2001 changed how we are checked in at airports before boarding a flight, and I’m sure countless lives have been saved as a result of this more stringent security measures.

However, the development of new technologies, which have been created against the backdrop of a more threat conscious world, could mean we are able to relax the experience of going through airport security for travellers. We now have innovations to spot, amongst hordes of people, those who pose a threat, while blending in with the general public. If we are able to make these identifications before an act is committed, we can cut out some of the draconian measures we are all so used to with scanning passengers before travel at a security checkpoint. If this is the case, then we could get to a model whereby you can pass through transport hubs, like airports, more freely, as fewer visible, large, overt checkpoints will be needed. And best of all, these new technologies can protect personal identity and civil liberties, until a threat object or behavior is detected.

Concealable security solutions

Today, visible checkpoints scan people in masses, using such large, wieldy devices, such as metal detectors, millimetre machines and hundreds of surveillance cameras peeking down from the ceilings. The use of these systems, which can feel intrusive and hold people up as they wait to pass through, can be reduced by employing new, innovative and concealable security solutions that are able to detect threats, but blend in with the existing environment; basically unseen, but always watching.

For example, new advancements in magnetic technologies can be concealed in everyday objects that are aesthetically pleasing, such as planter boxes, which people walk past these every day without really noticing. These threat detection sensors, concealed in planter boxes, can scan individuals and their bags for catalogued metal objects. They can distinguish between those that may pose a threat, e.g. gun, knife, rifle, and those that are unlikely to, e.g. phone, keys. With this advanced magnetic technology, it becomes possible to discover weapons on a person's body, allowing for immediate alert notification to onsite security.

Beyond physical objects, there are also small, concealable sensors that can detect, diagnose and track airborne trace explosives, chemical warfare agents and volatile organics. These sensors use tuneable electronic signals to detect chemical threats with a parts-per-billion sensitivity and can then send an immediate threat alert to security to investigate further. 

Threat detection sensors

Innovative threat detection sensors can be integrated with existing security solutions

These new, innovative threat detection sensors can be integrated with existing security solutions, such as access control systems, as well as security policies and procedures to enhance the effectiveness and performance of onsite security personnel and first responders. A great example of integration is using AI-driven/computer vision object recognition software with existing CCTV systems to detect visible threats, such as guns or knives. Every second in an early warning notification of a visible weapon drawn can save lives and possibly stop an attack from being carried out. Security and law enforcement can be alerted in real-time of the location and nature of the incident, so that action can be taken immediately.

Extending the security perimeter with new detection sensors means security personnel and law enforcement don’t have to rely on someone reaching a checkpoint before a physical or chemical-based weapon is detected. And as these solutions get deployed more and more, awareness of these technologies seep into the marketplace. Would be assailants will be more likely to be deterred, as they think about walking along a path to the building or checkpoint and getting caught before they can instigate an attack. And to my earlier point, it also affords law abiding citizens more freedom to move around public spaces as they do not need to go through the lengthy security checks that we currently experience.

Addressing current threats to act fast

Unfortunately, annually we are seeing a rise in gun crime and knife attacks in soft target areas, with daily incidents reported across the US and UK. This has been exacerbated, specifically in the US, by the coronavirus pandemic and civil unrest, where gun sales have escalated in recent months - the FBI conducted 3.7m background checks on those wishing to purchase firearms in March 2020, an increase of 1.1m over March 2019. With so many more guns on the street, it increases the opportunity for bad actors to use these weapons with ill intent within their communities.

It is important to harden soft target areas where our communities gather, such as schools, churches, resorts, office buildings, and stadiums and arenas. However, the nature of these venues - somewhere to meet, have fun and relax - do not lend themselves to prison-style, fortress-feel security measures. As well as the big, overt and visible technologies mentioned before, can in fact prove targets for terror. However, the good news is that some public sites have started to invest in and install these new innovative weapon detection solutions. This contributes to the creation of a seamless experience for civilians, who are able to enter and enjoy these locations without forsaking the way of life they have come to know and love, without divesting item in their pockets, pat downs, and slow walkthrough security scanners.

Making public areas safer

Beyond single-site installations at these locations, city managers and city councils are now looking at the widespread deployment of these new, concealable, touchless and unobtrusive security technologies, all with a goal to make their public areas safer.

Once a threat is detected in one venue, an alert can be sent out in the immediate area

Furthermore, by having an interconnected security system, once a threat is detected in one venue, an alert can be sent out in the immediate area. This will be picked up by other local security personnel in nearby sites, so they can be on guard to protect members of the public around their premises, as well as support law enforcement in finding and neutralising the threat.   

We’ve all heard the phrase smart cities, but with innovations in physical and biological threat detection, these cities can be as safe as they are smart.

Share with LinkedIn Share with Twitter Share with Facebook Share with Facebook
Download PDF version Download PDF version

In case you missed it

Safety In Smart Cities: How Video Surveillance Keeps Security Front And Center
Safety In Smart Cities: How Video Surveillance Keeps Security Front And Center

Urban populations are expanding rapidly around the globe, with an expected growth of 1.56 billion by 2040. As the number of people living and working in cities continues to grow, the ability to keep everyone safe is an increasing challenge. However, technology companies are developing products and solutions with these futuristic cities in mind, as the reality is closer than you may think. Solutions that can help to watch over public places and share data insights with city workers and officials are increasingly enabling smart cities to improve the experience and safety of the people who reside there. Rising scope of 5G, AI, IoT and the Cloud The main foundations that underpin smart cities are 5G, Artificial Intelligence (AI), and the Internet of Things (IoT) and the Cloud. Each is equally important, and together, these technologies enable city officials to gather and analyze more detailed insights than ever before. For public safety in particular, having IoT and cloud systems in place will be one of the biggest factors to improving the quality of life for citizens. Smart cities have come a long way in the last few decades, but to truly make a smart city safe, real-time situational awareness and cross-agency collaboration are key areas which must be developed as a priority. Innovative surveillance cameras with integrated IoT Public places need to be safe, whether that is an open park, shopping center, or the main roads through towns Public places need to be safe, whether that is an open park, shopping center, or the main roads through towns. From dangerous drivers to terrorist attacks, petty crime on the streets to high profile bank robberies, innovative surveillance cameras with integrated IoT and cloud technologies can go some way to helping respond quickly to, and in some cases even prevent, the most serious incidents. Many existing safety systems in cities rely on aging and in some places legacy technology, such as video surveillance cameras. Many of these also use on-premises systems rather than utilising the benefits of the cloud. Smart programming to deliver greater insights These issues, though not creating a major problem today, do make it more challenging for governments and councils to update their security. Changing every camera in a city is a huge undertaking, but in turn, doing so would enable all cameras to be connected to the cloud, and provide more detailed information which can be analyzed by smart programming to deliver greater insights. The physical technologies that are currently present in most urban areas lack the intelligent connectivity, interoperability and integration interfaces that smart cities need. Adopting digital technologies isn’t a luxury, but a necessity. Smart surveillance systems It enables teams to gather data from multiple sources throughout the city in real-time, and be alerted to incidents as soon as they occur. Increased connectivity and collaboration ensures that all teams that need to be aware of a situation are informed instantly. For example, a smart surveillance system can identify when a road accident has occurred. It can not only alert the nearest ambulance to attend the scene, but also the local police force to dispatch officers. An advanced system that can implement road diversions could also close roads around the incident immediately and divert traffic to other routes, keeping everyone moving and avoiding a build-up of vehicles. This is just one example: without digital systems, analyzing patterns of vehicle movements to address congestion issues could be compromised, as would the ability to build real-time crime maps and deploy data analytics which make predictive policing and more effective crowd management possible. Cloud-based technologies Cloud-based technologies provide the interoperability, scalability and automation Cloud-based technologies provide the interoperability, scalability and automation that is needed to overcome the limitations of traditional security systems. Using these, smart cities can develop a fully open systems architecture that delivers interoperation with both local and other remote open systems. The intelligence of cloud systems can not only continue to allow for greater insights as technology develops over time, but it can do so with minimal additional infrastructure investment. Smart surveillance in the real world Mexico City has a population of almost 9 million people, but if you include the whole metropolitan area, this number rises sharply to over 21 million in total, making it one of the largest cities on the planet. Seven years ago, the city first introduced its Safe City initiative, and ever since has been developing newer and smarter ways to keep its citizens safe. In particular, its cloud-based security initiative is making a huge impact. Over the past three years, Mexico City has installed 58,000 new video surveillance cameras throughout the city, in public spaces and on transport, all of which are connected to the City’s C5 (Command, Control, Computers, Communications and Citizen Contact) facility. Smart Cities operations The solution enables officers as well as the general public to upload videos via a mobile app to share information quickly, fixed, body-worn and vehicle cameras can also be integrated to provide exceptional insight into the city’s operations. The cloud-based platform can easily be upgraded to include the latest technology innovations such as license plate reading, behavioral analysis software, video analytics and facial recognition software, which will all continue to bring down crime rates and boost response times to incidents. The right cloud approach Making the shift to cloud-based systems enables smart cities to eliminate dependence on fiber-optic connectivity and take advantage of a variety of Internet and wireless connectivity options that can significantly reduce application and communication infrastructure costs. Smart cities need to be effective in years to come, not just in the present day, or else officials have missed one of the key aspects of a truly smart city. System designers must build technology foundations now that can be easily adapted in the future to support new infrastructure as it becomes available. Open system architecture An open system architecture will also be vital for smart cities to enhance their operations For example, this could include opting for a true cloud application that can support cloud-managed local devices and automate their management. An open system architecture will also be vital for smart cities to enhance their operations and deliver additional value-add services to citizens as greater capabilities become possible in the years to come. The advances today in cloud and IoT technologies are rapid, and city officials and authorities have more options now to develop their smart cities than ever before and crucially, to use these innovations to improve public safety. New safety features Though implementing these cloud-based systems now requires investment, as new safety features are designed, there will be lower costs and challenges associated with introducing these because the basic infrastructure will already exist. Whether that’s gunshot detection or enabling the sharing of video infrastructure and data across multiple agencies in real time, smart video surveillance on cloud-based systems can bring a wealth of the new opportunities.

Which new buzzwords reflect the security industry’s trends?
Which new buzzwords reflect the security industry’s trends?

As an industry, we often speak in buzzwords. In addition to being catchy and easy to remember, these new and trendy industry terms can also reflect the state of the security market’s technology. In short, the latest buzzwords provide a kind of shorthand description of where the industry is - and where it’s going. We asked this week’s Expert Panel Roundtable: What new buzzword(s) rose to prominence in the security industry in 2020? (And how do they reflect industry trends?)

Biometrics Provides Industries With Security, Access Control And Data Protection
Biometrics Provides Industries With Security, Access Control And Data Protection

Several major players vigorously employ biometric recognition technologies around the globe. Governments use biometrics to control immigration, security, and create national databases of biometric profiles. Being one of the most striking examples, the Indian Aadhaar includes face photos, iris, and fingerprints of about 1.2 billion people. Financial institutions, on their part, make use of biometrics to protect transactions by confirming a client's identity, as well as develop and provide services without clients visiting the office. Besides, biometric technology ensures security and optimizes passenger traffic at transport facilities and collects data about customers, and investigates theft and other incidents in retail stores. Widespread use of biometrics Business, which suddenly boosted the development of biometrics, is an active user of biometric technology Business, which suddenly boosted the development of biometrics, is another active user of biometric technology. Industries choose biometric systems, as these systems are impossible to trick in terms of security, access control, and data protection. Being in demand in business, these three tasks are also relevant for the industry. However, the use of biometrics at industrial sites is discussed unfairly seldom. Therefore, it is the face identification that is the most convenient there, as workers often use gloves, or their hands may be contaminated, and the palm pattern is distorted by heavy labor. All these features make it difficult to recognize people by fingerprints or veins and significantly reduce identification reliability. Therefore, industries seek facial recognition solutions. Thus, let us demonstrate the application of face recognition technology at different enterprises, regardless of the area. Facial recognition use in incident management Facial biometric products are known to automate and improve the efficiency of security services by enriching any VMS system. These systems provide an opportunity of instantly informing the operator about recognized or unrecognized people, and their list membership, as well as save all the detected images for further security incident investigation. Furthermore, some sophisticated facial biometric systems even provide an opportunity to build a map of the movements of specific people around a site. Besides, it is relevant not only for conducting investigations but also in countering the spread of the COVID-19 virus. Identifying and tracking COVID-19 positive cases Therefore, if an employee or visitor with a positive COVID-19 test enters a facility, the system will help to track his/her movement and identify his/her specific location. It will also help to take the necessary measures for spot sanitary processing. Thus, the introduction of biometric facial recognition at the industrial enterprise can improve and speed up the incidents’ response and investigations without spending hours watching the video archive. Access control system to secure physical assets The right access control system can help industries secure physical and informational assets The right access control system can help industries secure physical and informational assets, cut personnel costs, and keep employees safe. Facial recognition systems may enrich access control systems of any company by providing more security. As biometric characteristics, by which the system assesses the compliance of a person with the available profiles in the database, cannot be faked or passed. The human factor is also reduced to zero, due to the fact that while identity documents can be changed, the inspector can make a mistake or treat his/her task carelessly, be in collusion with an intruder, the biometric system simply compares a person in front of the camera with the biometric profiles database. Biometric facial identification software For example, RecFaces product Id-Gate, a specialized software product for reliable access control to the site, checks the access rights by using biometric facial identification alone or in conjunction with traditional IDs (electronic passes, access keys, etc.), which means that there is almost a zero probability of passing to the site by someone else's ID. The access control system’s functionality allows one to strictly account the number and time of all the facility’s visitors and also track their movement. When unauthorized access is attempted or a person from the stop list is detected, Id-Gate sends an automatic notification to the access control system and operator. Enhanced data and information security Even despite the division of access to different industrial enterprise areas, the security service needs to provide independent information system security. Employees with the same facility access rights may have different access rights to data. However, in that case, a personal password is not enough, as an employee may forget it, write it down and leave it as a reminder, tell a colleague to do something for him/her during the vacation, or just enter it at another person’s presence. Password-free biometric authentication systems make the procedure user-friendly and secure Password-free biometric authentication Password-free biometric authentication systems make the procedure user-friendly and secure. Such systems usually provide an option of two-step verification when successful password entry is additionally confirmed by biometric recognition. Hence, it is particularly relevant due to the current lockdown in many countries. To sum up, the application of biometric technologies solves several issues of the industry, such as: Optimizes and partially automates the work of the security service, as it provides reliable identification and verification of visitors/employees, reduces the amount of time spent on finding a person on video and making a map of his/her movements, without spending hours on watching video archive in case of investigation. Provides a high level of reliability and protection from unauthorized access to the enterprise and the information system. Provides a two-step verification of the user/visitor (including password and biometric data) and almost eliminates the risk of substitution of user data/ID.