Airports & Ports Security Applications
LAN airline, one of the most important airline companies in Latin America, is based in Lima, Peru. The airline company operates scheduled domestic and international services, controlling over seventy percent of the domestic market. Its main base and maintenance center are located in Jorge Chávez International Airport, Lima, which is a significant transfer hub and aviation infrastructure of South America. The LAN airline deploys its surveillance system with Dahua solutions for its office...
Manchester-Boston Regional Airport opened to serve the state of New Hampshire and the surrounding New England community in 1927, a little over two decades after the Wright brother’s first powered flight. Located three miles south of central Manchester, the Manchester-Boston Regional Airport is the fourth largest passenger and third largest cargo airport in New England. The airport is also the busiest in the state, qualifying under the Federal Aviation Administration (FAA) as a “small...
USS Iowa: A Naval Treasure Affectionately known as the “Battleship of Presidents” for having played host to more U.S. presidents than any other battleship, the USS Iowa is one of the most storied vessels in the history of the Navy. Originally commissioned in 1943, the Iowa saw significant action during both World War II and the Korean War. One of the battleship’s first missions was to escort President Franklin Delano Roosevelt across the Atlantic in November of that year for a...
Critical Infrastructure Airports, harbors and ports, railways, highways, pipelines, and bridges together make up much of the infrastructure and facilities the modern world relies upon for transportation. They are the entry and exit points for both domestic and international travel, and the critical infrastructure for the transhipment of people, freight, commodities, manufactured goods, and other cargo. Arecont Vision’s Superior Performance “Ease of installation, compatibilit...
Customer Jebel Ali Port is the flagship port of DP World, a leader in international marine terminal operations and development, logistics and related services. The port is the world's largest man-made harbor and the largest container port between Rotterdam and Singapore. Located 35 kilometers to the southwest of Dubai on the United Arab Emirates Arabian Gulf coast, the port’s strategic geographic location has enabled it to act as a maritime link between the Middle East and the western hem...
Port Fourchon plays a strategic role in supplying the United States with nearly 18 percent of its oil supply, servicing over 90 percent of the Gulf of Mexico’s deepwater exploration and production. Securing such an essential portion of the Gulf Coast requires a hands-on team of security professionals to watch for unauthorized activities and enhance the safety of workers and officers. When evaluating options for a surveillance system to feed its new maritime domain awareness platform GLPC-C...
They say that every choice has a cost. It's a basic principle that, economically speaking, nothing is free. If it doesn't cost actual money, it may be expensive in terms of time, attention and/or effort. These are interesting observations to keep in mind as one peruses the various "free" video management system (VMS) offerings available on the market. Some are provided by camera companies to unify their products into a "system", even if it's a small one. Other free VMS offerings are entry-level versions offered by software companies with the intent of the customer upgrading later to a paid version. For more insights, we asked this week's Expert Panel Roundtable: What is the value of “free” video management systems (VMSs) and how can a customer decide whether “free” is the right price for them?
Market dynamics are changing the U.S. residential security market, creating new business models that better appeal to the approximately 70% of households without a security system. Smart home adjacencies have helped revitalize the traditional security industry, and alternative approaches to systems and monitoring for the security industry are emerging, including a new batch of DIY systems. Growth in the residential security market and its position as the channel for smart home solutions have attracted numerous new entrants. Telecoms, cable operators, and CE (consumer electronics) manufacturers are joining traditional security players as they compete to fulfill consumer demand for safety and security. Connected products also provide a layer of competition as consumers must decide whether having category devices such as doorbell video cameras, networked cameras, and other products suffice for their security. Increasingly Competitive Landscape Smart home services can provide additional revenue streams for the security industry For instance, IP cameras are a highly popular smart home device rooted in security, and Parks Associates estimates 7.7 million standalone and all-in-one networked/IP cameras will be sold in the U.S. in 2018, with $889M in revenues. Product owners may feel their security needs are fulfilled with this single purchase, as such dealers and service providers are under increasing pressure to communicate their value proposition to consumers. Categorically, each type of player is facing competition uniquely—national, regional, and local dealers all have a different strategy for overcoming the increasingly competitive landscape. Smart home services can provide additional revenue streams for the security industry. In Parks Associates’ 2017 survey of U.S. security dealers, 58% report that smart home service capabilities enable extra monthly revenue. Almost half of dealers also note they have to offer smart home devices and services in order to keep up with their competition. While white-label devices are acceptable in some instances, dealers need to integrate with hero products whenever possible when those exist for a category. For dealers who have added smart home devices and services are all potential benefits and good for business Improved Customer Engagement That 2017 survey also revealed 36% of security dealers that offer interactive services report security system sales with a networked camera and 16% report sales with a smart thermostat. For dealers who have added smart home devices and services, enhanced system utility, increased daily value, and improved customer engagement with the system are all potential benefits and good for business. Security has served as the most productive channel for smart home solutions, mainly because the products create natural extensions of a security system’s functions and benefits, but as smart home devices, subsystems, and controllers expand their functionality, availability, and DIY capabilities, many standalone devices constitute competition to classical security. Particularly viable substitute devices include IP cameras, smart door locks, smart garage doors, or a combination of these devices. Products that are self-installed offer both convenience and cost savings, and these drivers are significant among DIY consumers—among the 6% of broadband households that installed a security system themselves, 39% did it to save money. Enhance Traditional Security Self-installable smart home devices may resonate with a segment of the market who want security While many security dealers believe substitute offerings are a threat, some dealers do not find such devices an existential threat but instead view them as another path to consumer awareness. They argue that the difference between smart product substitutes and traditional security is that of a solution that provides knowledge versus a system that gives one the ability to act on that knowledge. A common theme among professional monitoring providers is that a homeowner who is aware of events happening in the home does not necessarily have a secure and protected household. For example, a Nest camera, a DIY product, notifies a consumer via smartphone about events in the home when it detects motion, but only when the notification is opened and identified will a consumer be able to act on the related event. Self-installable smart home devices may resonate with a segment of the market who want security but are unwilling to adopt professional monitoring; however, providers can leverage these devices to enhance traditional security features and communicate the value of professional monitoring. Smart home devices and features, while posing a threat to some security companies, are a potential way forward to increased market growth Increased Market Growth A key counterstrategy for security dealers and companies is to leverage their current, powerful role as the prime channel for smart home devices. Many security dealers now include smart home devices with their security systems to complement their offerings and increase system engagement. For example, as of Q4 2017, nearly 70% of U.S. broadband households that were very likely to purchase a security system in the next 12 months reported that they want a camera to be included as part of their security system purchase. In response, many security system providers now offer IP cameras as optional enhancements for their systems. Smart home devices and features, while posing a threat to some security companies, are a potential way forward to increased market growth. Security dealers have an opportunity to become more than a security provider but a smart home solutions provider rooted in safety. Provide Status Updates Comcast has entered both the professionally monitored security market and the market for smart home services The alternative is to position as a provider of basic security with low price as the key differentiator. Comcast has entered both the professionally monitored security market and the market for smart home services independent of security. It has discovered that monetizing smart home value propositions through recurring revenue becomes increasingly challenging as the value extends further away from life safety. Since the security industry remains the main channel for smart home services, security dealers are in a unique position to leverage that strength. Value propositions must shift from the traditional arming and disarming of a system to peace-of-mind experiences that builds off the benefits of smart devices in the home to provide status updates (e.g., if the kids arrived home safely) and monitoring at will (e.g., checking home status at any time to see a pet or monitor a package delivery). These types of clear value propositions and compelling use cases, which resonate with consumer and motivate them to expand beyond standalone products, will help expand the home security market.
Last week, the Schedule 84 Suppliers Research Panel participated in reviewing the 2018 contracting year with the GSA Schedule 84 leadership team. Our panel group consists of experienced contractors and consultants meeting for a monthly conference call. Schedule 84 is the GSA Schedules Contract for Total Solutions for Law Enforcement, Security, Facilities Management, Fire and Rescue. Our opinions are part of a research program to provide valuable feedback to the GSA Schedule 84 program and on to the GSA central office. The director of GSA Region 7 Schedules Program, the Schedule 84 Branch Chief and the Category Manager Subject Matter Expert who manages our suppliers' panel gave us their full attention as we discussed the successes of the program, hot topics, problems and the future. We determined 2018 under the Schedule 84 team to be a year of innovative thoughts, cooperative effort and renewed enthusiasm Innovative Review Team We determined 2018 under the Schedule 84 team to be a year of innovative thoughts, cooperative effort, renewed enthusiasm and productive changes building upon the successes of 2017. There was high praise for the accessibility to the Schedule 84 staff. Their consistent quick response to questions and concerns, thinking outside the box and supporting the program by partnering with their contractors was much appreciated. There has been a renewed spirit of partnering to cooperatively bring the best to agency customers. It seems to be working as per the Center Director sales are growing for GSA Schedule 84. Advocating For The Security Industry In my experience, business development starts with the Administrator from Region 7 in Ft. Worth, TX. As the annual Schedule 84 Industry Day at the SSAC begins he is shaking every hand and passing out his cards looking folks right in the eye asking, “how can I help you?” They have the best practices and most organized paperwork. The SSAC director has chosen well in her staff and is hands-on in every endeavor to direct things along when challenges occur or to improve the program. The new 84 Branch Chief is knowledgeable, innovative, tireless and has been heavily involved in advocating for the security industry It continues with the center’s CASE Manager encouraging the contractors at events, visiting agency customers and promoting the GSA Schedules Program by helping coordinate the partnering. The new 84 Branch Chief is knowledgeable, innovative, tireless and has been heavily involved in advocating for the security industry for adding new technology, meeting with industry associations, understanding the complexity and challenges of Homeland Security Presidential Directive 12 (HSPD12) and advocating for the purchasing Physical Access Control Systems (PACS) utilizing the appropriate standards and the GSA Program among other innovations. As far as the supplier panel, we gave our GSA Schedule 84 team and leaders high praise for 2018. GSA also added new categories or SINs for clearly identifying Physical Access Control Products that appear on GSA’s Approved Product List Changes In The GSA Program Some changes this year in certain GSA programmes included the creation of a new category of products/services Special Item Number (SIN) for Order Level Materials (OLM) developed to assist with solution procurements. This new SIN was added to Schedules 03FAC, 56, 70, 71, 00Corp, 738X and 84. Under Schedule 84 it is SIN 84-500. GSA Schedule 84 consolidated many Special Items Numbers (SINs) to make finding products and services less complex Essentially this SIN allows agencies procuring under the aforementioned GSA Schedules’ programmes to purchase and the contractor to add items and services not known prior to the task as a Contract Line Item Number (CLIN) not to exceed 33% of the order. For more information and FAQs on OLMs go to www.gsa.gov/olm. This is not to take the place of “Open Market” items for adding products only that are not listed on a company’s GSA Contract. Physical Access Control Products Previously, GSA Schedule 84 consolidated many Special Items Numbers (SINs) to make finding products and services less complex for the agencies. GSA also added new categories or SINs for clearly identifying Physical Access Control Products that appear on GSA’s Approved Product List according to the standards created under FIPS201. These products appear under SIN 246 35-7 after being tested and approved by GSA. To be qualified to install these products under the GSA Program at least one individual from the GSA Contractor company must complete the class and be CSEIP certified before applying for labor SIN 246 60-5. Additionally, the company must demonstrate certain qualifications and have past performance for this type of work. The Security Technology Alliance offers the training class and certification. Certified individuals and approved products are listed at www.idmanagement.gov. Companies listed with SIN 246-35 7 and SIN 246-60 5 may be found by searching at www.gsaelibrary.gsa.gov. Updates To Guidance For Procurement Updates to guidance for procurement of PACS will continue to be posted to the GSA PACS Ordering Guide Updates to guidance for procurement of PACS will continue to be posted to the GSA PACS Ordering Guide. The ordering guide posted at www.gsa.gov/firesecurity is a valuable support tool created to assist agencies with understanding the requirements of FIPS201 and procuring a PACS. The guide includes relevant regulations, FAQs, sample systems designs, sample statements of work, a list of key points of contract for additional help and questions. In partnership with GSA and guided by the GSA Ombudsman group, the Security Industry Association and the Security Technology Alliance members and their contractor companies participated in a GSA Reverse Industry PACS Training Day on September 17, 2018. We presented from an industry perspective important fact on PACS system requirements, procurement planning, providing information on resources and further educating with panel discussions, individual presentations and amusing skits to over 300 Government agency staff and acquisition specialists. You can find some of the unedited recording of the PACS Reverse Industry Day Training on YouTube. Some changes included the creation of a new category of products/services Special Item Number (SIN) for Order Level Materials (OLM) GSA Schedules Program A hot topic about the GSA program for 2018 was also an issue for the prior year. The GSA Schedules Program is a streamlined contracting vehicle incorporating specific Federal Acquisition Regulations for more efficiently purchasing commercial items. Companies may apply per a continuous open season for a 5-year contract with three 5-year options to renew. Contractors are vetted for past performance, corporate experience and financial capability. Products and services are considered for offering to Federal, State and Local customers (for Schedule 84) with pricing that is determined to be fair and reasonable through negotiations with GSA. To make the determination for fair and reasonable pricing GSA carefully reviews the commercial practices of the contractor To make the determination for fair and reasonable pricing GSA carefully reviews the commercial practices of the contractor as well as the competition of identical or similar item pricing. The most vocal complaint of concern from the contractors was regarding the consideration of competitor contractors offering identical items with out-of-date pricing or holding a Letter of Supply not authorized by the manufacturer. GSA Pricing Tool Since the GSA utilizes a pricing tool to determine if the pricing offered is competitive, a rogue competitor can cause a pricing action to possibly be rejected due to out of date information even as the manufacturer offers an update of the product. This is an issue on all GSA Contracts that the supplier panel hopes will be reconsidered by GSA policymakers at the central office. Most of us believe the Letters of Supply should only be issued by the manufacturer or with documented specific permission of the manufacturer to a reseller. Manufacturers may want to have a better understanding of the Letter of Supply, how it is considered by GSA and more carefully choose their Government partners for experience and compliance. Another challenge for the security community is regarding the lack of accessibility of participating dealers to GSA eBuy Overcoming Challenges For The Security Community Contractors may only see RFQs which are posted under the Special items Number(s) that were awarded to their GSA Contract Another challenge for the security community is regarding the lack of accessibility of participating dealers to GSA eBuy. GSA eBuy is an online Request for Quotation (RFQ) program that is for GSA Contract holders only. Agencies will post their requirements by Special Item Number for at a minimum 48 hours. Contractors may only see RFQs which are posted under the Special items Number(s) that were awarded to their GSA Contract. GSA Participating Dealers may take orders on behalf of a manufacturer if they are authorized under the manufacturer’s GSA Contract. They may also have an online PO Portal to receive orders. But they have no access to GSA eBuy to response to RFQs. Usually, under these arrangements, the manufacturers do not respond directly, so there is a problem using GSA eBuy for opportunities as their GSA Participating Dealers have no access to respond. GSA Schedule 84 Leadership In some instances, a contracting officer may allow an emailed quotation. However, with the use of the electronic ordering system, this has become a common problem we hope to bring to the attention of policymakers. Some changes to the programmes may make the presentation of documentation more effective going forward The GSA Schedule 84 leadership has been helpful to explain the challenges to the agencies to try and resolve such issues. So, what’s up for 2019? GSA modernization is coming. There will be improvements to their tools and more consolidations of SINs and more. There have been discussions of a revival of the GSA Expo. The Expo offered training for contracting staff both Government and private industry. Valuable Tools For Vendor Training Equally important is the networking, meetings and the exhibits of the contractors. Expos have been discontinued since 2012 but smaller events have been growing as well as online webinar training. Webinars are valuable tools for GSA and vendor training, but they do not take the place of being able to meet your customers face-to-face. GSA online eOffer and eMod program have made processing actions more efficient. Some changes to the programmes may make the presentation of documentation more effective going forward. The GSA online website for viewing the items on the GSA Contract and for purchasing items, GSA Advantage could definitely use an update as it has been basically the same for 20 years. Keep an eye on GSA Interact for the latest happenings with GSA.
One of the biggest recent security divestitures in the news was the sale of Mercury Security to HID Global, which occurred around a year ago. The seller in that transaction was ACRE (Access Control Related Enterprises), also the parent company of Vanderbilt and ComNet. We recently spoke to founder and CEO Joe Grillo, a 30-year industry veteran, about the mergers and acquisitions (M&A) market, ACRE’s future, and new opportunities opened up by the Mercury sale. Q: What’s new with ACRE? Grillo: We have an opportunity to have organic growth and to have some scale on a global basis to be a decent size player" ACRE is a company I founded in 2012, and since then we have had six acquisitions and one divestiture. We’ll never focus on ACRE as a brand, but we currently have more visibility of ACRE as a parent company with our two strong brands, ComNet and Vanderbilt. Last year was a very busy year [with the sale of Mercury Security to HID Global] because it takes as long to sell a brand as to buy one, maybe more so. Q: What’s next? Grillo: What you are seeing from us this year is that we are again in a buying mode. No announcement yet, but we expect one by the end of the year. We are well-funded, have great partners, and see an opportunity to continue to grow acquisitively as our highly fragmented space of access control continues to consolidate. From the standpoint of ACRE, with the ComNet and Vanderbilt brands, we are also doing more integration on the backside – not what the customer sees. We will continue to grow toward a $200 million business. We were there when we owned Mercury, and we will get there again. We have an opportunity to have organic growth and to have some scale on a global basis to be a decent size player. Because ACRE are owned by a private equity company, we are brought into every opportunity: ComNet is a good example" Q: Do you see the M&A market being more competitive – more companies looking to acquire? Grillo: There’s a lot of money chasing not-so-many deals, so evaluations can get expanded. But as interest rates creep up, it is definitely a challenge to find the right valuation, the right financing and the right strategic fit. It is a very strategic market. Q: There have been some big acquisitions lately. Were you guys involved at all in evaluating those opportunities? Grillo: Because we are owned by a private equity company, we are brought into every opportunity. An example of that was ComNet. I would not have been aware that the founder passed away two years ago and that there was this opportunity to own the business. So we look at everything; anything that’s out there we look at. The biggest recent announcement in our world was S2 (being sold to UTC/Lenel), and, yeah, we looked at that. It didn’t fit our profile – it was too expensive. Great business, and it’ll be interesting to see how it fits into the UTC environment. There was also Isonas [which was recently sold to Allegion], but the size didn’t add enough scale, but I like the technology. ComNet sells communication networking solutions and products, which is more attractive than video systems for ACRE Q: So what are you looking for in an acquisition? Grillo: It’s hard for us to find something that moves the needle, and you have to find that right balance. Is it something we can digest and have the financing for, and also is there room on the back end? We are private equity-owned, so we know there will be an exit for our investors, too. So we have to find the right balance, good valuations, the right size and digestible. If you look at our acquisitions, we have done two “carve outs.” The Vanderbilt name didn’t exist until we bought the business from Ingersoll Rand, and then we bought the [intruder] business from Siemens. That’s how Vanderbilt came about. You get a lot of value when you carve out a business, but there’s a lot of work. In the case of Mercury or Access Control Technology (ACT) that we acquired; they were growing and profitable but they stretch your finances a lot more. So you have to find the right mix in there. Q: Does video interest ACRE at all? Grillo: We have to find the right balance, good valuations, the right size and digestible"ComNet is our video play. ComNet sells communication networking solutions and products, and 70 to 80 percent of that is used for video systems. But unlike cameras, which don’t interest us, it’s actually good margins, highly specialized repeat business and with good channel partners. So where are we going to play? Cameras – no (because of commoditization). We have some recorder technology (from the Siemens acquisition) and we have the communication networking technology (with ComNet). On the software side, we have looked at a lot of the VMS companies, and a lot of them have been on the market. But the valuation expectations can be high because they are software companies. And we really believe in partnering as a good thing, too. If we integrate to Milestone or Salient or some of these companies, we will never lose an access control client because they chose a particular VMS. Q: ACRE is also looking to grow organically, isn’t it? Grillo: From a technology perspective, we are a product company and we are continuing to bring new products to the market with the ComNet communication networking business and the access control business. And in Europe, we have a third leg of the stool, which is the very successful intrusion and burgular alarm business we acquired from Siemens (SPC products now sold under the Vanderbilt brand). That business continues to do well and is now one of the highest performing segments in our portfolio.The intrusion and burgular alarm continues to do well and is now one of the highest performing segments in our portfolio" Q: But you don’t have to own a company to make it part of your solution. Grillo: An important word is integration. We have to integrate to all the wireless locks. We have to integrate to the VMS systems. But we don’t have to own them. Q: How has the Mercury Security divestiture impacted the rest of your business? Grillo: It has opened up the opportunity for us to look at Mercury partners as possible acquisition targets without worrying about conflicts with the very good business of Mercury. We have more flexibility now compared to the Mercury era. Q: How will the economic cycle impact the security market? Grillo: Interest rates are a much bigger issue than the overall economic cycle. We talk a lot about it with our owners – clearly interest rates are tightening up. If you go out to do acquisitions or to borrow money to do something with your business, it will be tougher than it was two years ago, and it may get worse in the next two years. Security is less impacted by the economic cycle than some industries.
In the simplest terms, video systems capture and record video. But supporting these basic operations are a growing number of other functions that expand usefulness and the ability to interact with related elements in a larger system. As video system functionality expands, we asked this week’s Expert Panel Roundtable: What is the most important function of a video surveillance system and why?
In 1901 New York state made a pioneering regulation move and became the first US state to require automobile owners to register their vehicles. This marked the beginning of regulation on modern traffic, which - following decades of development - resulted in a multi-layer concept of regulation relating to vehicles and driver’s licenses, traffic signs and insurance mechanisms that we are all familiar with nowadays. While certain parallels can be drawn between the early days of cars and our contemporary experience with quadcopters, we are facing a new challenging era that is far more complex to organize and regulate. Integrating Drones In Existing Regulatory Ecosystem Similar to other pioneering technologies in the past, drones need to integrate into a long existing and well-balanced ecosystem, the rules of which have first been drafted some one hundred years ago and have evolved without taking vehicles such as drones into account. Yet the safety risks related to aviation hinder the quick integration of drones into that ecosystem, broadening the gap between existing regulatory landscape and the exponentially growing popularity and ever-advancing technology of drones. The safety risks related to aviation hinder the quick integration of drones into the legislative ecosystem For the past several years, governments and legislators have been trying to tackle this problem by trying to answer two questions: how to properly integrate drones into the airspace without creating a hazardous impact on existing airborne operations, and how to enforce regulations in order to prevent the side-effects related to careless or malicious drone flights, taking into consideration public safety and physical security. Counter-UAS Measures And Regulations Up until 2018, legislators tried to tackle these two questions as a whole by introducing bundled legislation drafts covering the entire landscape of gaps they needed to address, which resulted in multi-parliamentary committee efforts both in the US and abroad to review and approve each bill - a process that is very slow by design. It was only in the beginning of this year that the issues were starting to be addressed separately: legislation related to limitations and counter-drone measures on the one hand, and legislation related to integration into airspace on the other. Let’s take a closer look at Counter-UAS (unmanned aerial systems) measures and what makes them challenging in terms of regulation. Over the past years, various counter-drone technologies have been introduced to enable control over rogue drones in order to either stop them from achieving their flight purpose or prevent them from creating safety hazards to people or property. These measures can be grouped into 3 types of technologies: Military grade solutions - including lasers and surface-air missiles Kinetic solutions - including net-guns and autonomous drones set out to catch the rogue drone and disable it airborne Non-kinetic RF-based solutions - aimed at either disabling, disrupting or accessing the drone’s communications channels in order to trigger a return-to-home function, or guide the drone into a safe landing route Aside from combat military operations, the legality of using the above technologies is questionable as they tamper with an airborne aircraft, might be considered as wiretapping and/or violate computer fraud laws. Therefore, one can conclude that unless changes to regulation are made, non-military facilities will continue to be defenseless from and vulnerable to rogue drones. One can conclude that unless changes to regulation are made, non-military facilities will continue to be defenseless from and vulnerable to rogue drones European c-UAS Legislation Next, let’s look at the state of c-UAS legislation in both Europe and US to better understand different legislative ecosystems and how they affect the possibilities of using counter drone measures. In the European Union, there is currently no uniform legislation, and the member countries rely on their own existing legal infrastructures. Roughly speaking, most countries use a method of exemptions to the communications and aviation laws to allow the use of counter drone measures after a close examination by the relevant authorities. Such exemptions are approved under scrutiny to particular sites, which provide some relief, but they do not allow broad use of countermeasures. Further discussion regarding a broader regulation change, on a country level or EU-wide, is only preliminary. US c-UAS Legislation Preventing Emerging Threats - provides an initial infrastructure for counter drone measures to be used by various DoJ and DHS agenciesUnlike the EU, in the US exemptions are not possible within the existing legal framework, and the possible violation of US code title 18 means that the hands of both the government or private entities are tied when attempting to protect mass public gatherings, sports venues, or critical infrastructure. Therefore, it was more urgent to introduce legislation that would allow countermeasures to some extent. In September, US Congress approved the FAA-reauthorization act for the next 5 years (H.R. 302), which was shortly after signed by the President and came into effect. Division H of the act - Preventing Emerging Threats - provides an initial infrastructure for counter drone measures to be used by various DoJ (Department of Justice) and DHS (Department of Homeland Security) agencies under strict limitations. However, the act avoids determining which technology the agencies should use, yet it requires minimal impact on privacy and overall safety in order to strike the necessary balance. This is the first profound counter-drone legislation and is expected to be followed by additional measures both in the US and in other countries. Updating Counter-Drone Legal Infrastructure In summary, 2018 has been a pioneering year for counter-drone legislation, and while technology already allows taking action when necessary, legal infrastructure needs further updates in order to close the existing gaps: covering additional federal assets, state-level governments, and private facilities of high importance, such as critical infrastructure sites. Legislators in the US and around the world need to continue working in a rapid tempo to keep up with the growing threat of drones. As with cars a century ago, the number of accidents will rise with the increase in time taken to regulate.
The Sabine-Neches Waterway runs 55 miles through Jefferson County, Texas, to the Gulf of Mexico, and includes the number-one commercial and military out-load port in the United States. It is the fourth largest port in terms of processed tonnage. A vast waterway traffic-monitoring network has been deployed to ensure all vessels (civilian, military and commercial) can safely navigate the waters with minimal interference such as collisions or other traffic stoppage. A new surveillance system also monitors the many petroleum refineries that line the channel. Backed by a Verizon Wireless 4G connection, the county cameras reside along the Sabine-Neches Waterway, networked through Milestone XProtect Enterprise for managing high definition video, live vessel movements and incident reporting. “Milestone’s open platform IP software is truly the best on the market. It integrates with all of the cameras seamlessly. Milestone XProtect provides the sheriff’s department with more high definition screen images and significantly better views of the waterway than the previous system. Now our system’s design provides live video and pushes to tablets, smartphones, dispatchers, and personnel on watercraft, who are given access to the video.” Mark Nolan, Knight Security Systems The Challenge Securing and monitoring 55 miles of waterway with traffic, including vessels ranging in size from small tugboats to huge tanker ships hauling hundreds of tons of oil and other commodities. When an incident is called into port security, the port authorities must assess the situation and respond immediately. Through the Milestone interface, reported incidents are checked on video to determine if the port must close or can continue operating. Closing the port for any amount of time is an expensive procedure, so having virtual eyes on the scene is imperative to operations. The previously installed system was only viewable and navigable in a control station building. The Solution Knight Security Systems designed and installed a Milestone XProtect Enterprise IP video surveillance solution with AXIS Q1604 and Sony SNC-ER550 cameras and more than eight terabytes of storage to provide 24 hours of monitoring. With the Milestone Mobile client, the sheriff’s department and port authorities have instant access to video at a moment’s notice, from anywhere. A Verizon Wireless 4G network for reliable and redundant operation powers the entire system. The Advantages The Milestone XProtect solution consolidates every one of the 24-hour monitored cameras into one centrally managed solution, viewable by all administrators in their respective offices, in the main monitoring station and on mobile devices. With high-level national security implications, live camera views and the ability to quickly check recorded video is essential to the port’s operational standards for efficiency. Every second between an incident report and confirmation of the validity of the report is crucial to the response process. A Vital Artery For US Oil Imports As the fourth largest port in the U.S., Port Arthur in Texas’ Jefferson County is the number-one crude oil destination for foreign tankers, as well as the number-one commercial and military out-load port. Hundreds of vessels are processed through the channel each day, making their way from other domestic ports and from all over the globe into the Gulf of Mexico and up the Sabine-Neches Waterway. With oil refineries and other critical infrastructure lining the 55 miles of river bank through Jefferson County, the sheriff’s department required a sophisticated security surveillance system to monitor waterway traffic and incidents. They need to ensure the safety of those working and traveling through the port, and to keep traffic flowing for the sake of commerce that relies on a clear waterway. With Milestone Mobile client, the sheriff’s department and port authorities have instant access to video from anywhere The Problem Previously installed systems relied on T1 lines, leased communication lines and microwave communication methods. Jefferson County was relying on outside partners to host landing points and was constantly provided low definition video. The area is scattered with low-lying areas and swamps, which limited coverage for the low-capacity T1 lines which were easily corroded from damp conditions and salt corrosion. When monitoring the video during and after an incident, a command center was the only place where the sheriff, Coast Guard or port officials had access to the video. When looking to completely upgrade the county’s river surveillance, officials contracted Texas-based Knight Security for a better solution – one that would provide nearly lossless access to video at a moment’s notice, even for those stationed away from the central command center. “Our goal was to provide high-definition screen views and more efficient monitoring of the waterway,” stated Mark Nolan, Sales Engineer, Knight Security Systems, Gulf Coast Region. “The new video system was specifically designed to capitalize on the unique areas of the Port. We now have camera ‘eyes’ located on an array of tall locations in challenging environments. Coupled with Milestone XProtect, the system provides advanced coverage throughout the entire waterway. We are able to provide live video and push out to tablets and mobile devices to numerous dispatch stations, personnel on watercrafts and others to have immediate access to any incident.” Protecting the Port The only way to access Jefferson County through the waterway is via Sabine Pass, TX or through two entry points on the Intracoastal Waterway. With an advanced communications system and screening process, no vessel is unaccounted for. The cameras act as verification to confirm radio transmissions. The Vessel Traffic Service (VTS) at Port Arthur acts as the “keepers of the gate” aided by the Milestone video management solution. VTS Port Arthur trained operators scan the waterways efficiently and effectively, 24 hours a day. VTS issues advisories and works to minimize blind spots utilising cameras and radar. Activities are monitored with the aid of the Milestone XProtect interface. Whether it’s a dredge, accident, or other incident; almost every vessel, regardless of size, is within a camera’s field of vision. “If we pick up a radar blip that’s not transmitting an identification signal, it is imperative to identify that blip before it enters the port,” explained Michael Measells, Director of Vessel Traffic Service. “The cameras can do what radar can’t achieve. We can put an eye on a vessel through the Milestone XProtect software, allowing us to know what’s moving from a marine safety and security standpoint. That’s the number-one mission.” Uniquely Stationed Surveillance Points Cameras line the river and port entrance, placed in strategic locations from the roofs of buildings to the top of the Verizon Wireless 4G towers. A Jefferson County Sheriff helicopter also hosts a mounted camera ready to be called into action at any time, whether it’s monitoring an incident or making rounds. “Our cameras feed the entire system and with the added support of the 4G LTE, the chances that we’ll be blacked out are very low. Nearly all aspects of the system have a redundant counterpart,” stated Measells. “We’ve been up and running as a group for eight years and other than hurricanes we’ve never had a shut down due to the system.” Knight Security Systems can monitor the status of the sheriff’s cameras and immediately notify the client of a camera outage, which might not have been noticed by the authorities if they’ve not checked their mobile device. Downtime is completely minimised with the proactive monitoring and Milestone system alerts. “We’ve adapted to the ease of application, connectivity and versatility of the Milestone interface very quickly – it’s become so easy to use. It’s something we can just access without really putting too much extra work into it,” stated John Moore, Electronics Materials Officer, United States Coast Guard. “Milestone is always up and running and it loads extremely fast on any mobile operating system.” The system also includes a rapidly deployable camera system that can be connected to a generator and a camera on a portable frame to easily access the waterway. It can be deployed and launched live into the Milestone system via local cell towers within minutes of a reported incident. “The versatility of our Milestone setup also allows us to remotely provide access to our Sector Command Center in Houston so they can view any potential issue,” Moore continued. Incident Confirmation and Control "The versatility of our Milestone setup also allows us to remotely provide access to our Sector Command Center in Houston so they can view any potential issue" The port is a vital, active entity, responsible for millions of dollars in assets and manpower. If an incident is reported to the Sheriff’s Department or Coast Guard, which isn’t uncommon, there are established procedures to follow before any response is made. A response for any event, whether a boating accident, cargo spill or personal injury, has the potential to shut down the critical channel for an extended length of time. When an incident is reported, officials must immediately confirm the report. Once confirmed, the proper authorities are contacted and ground or water personnel deployed as needed. The sheriff’s department jurisdiction covers the entire 55 miles of critical infrastructure, so mobility is vital. “I’m not monitoring the lines 24 hours a day personally, but if I get a report of an incident, I’ll pull Milestone Mobile up on my tablet or phone to assess the situation,” stated Deputy Chief Mark Dubois, Jefferson County Sheriff. “XProtect helps us respond quickly, allowing us to pull up video from any particular time and cameras immediately, from any location, to confirm or deny an event.” “With our camera coverage, we can move from evaluation of a report to initiating a response in a matter of minutes, if not seconds,” Moore continued. “There’s time and money there. Once we confirm, all responders’ mindsets are immediately shifted into ‘response’.” The Benefits of Scalability and Usability Quickly allowing access to live and recorded video, Milestone can handle a large number of cameras should the sheriff’s department decide to upgrade or add more hardware devices to the monitoring solution. “Overall, it used to take a lot more time before the sheriff could react to an incident, which could have been a life-or-death difference over a few minutes,” continued Nolan. “Milestone provides the open platform capability, allowing the end user to stay current on the latest and greatest software, and scaling up without changing the entire system from the ground level up.” Training was quick and efficient among the three user groups -- field users on the ground and water, and users in the office reporting on analytics, recording and searching archives. Knight Security Systems created different user profiles and tailored training sessions for each group, showing them exactly the views and functions they will regularly access, rather than diving into processes that would not be relevant to their specific duty. In total, 40 personnel were trained on Milestone, from ‘power users’ to those who use the system casually or view cameras sporadically. Screen images are used for numerous activities besides security, including studying tow configurations, training, and exporting photos and data to port partners. “This is a high-traffic waterway and with a limited width, there are bound to be close calls and incidents,” said Measells. “It’s just good to have more eyes on each vessel. The cameras are high resolution enough to read a soccer player’s jersey number from a mile away in low light! We’re sending photo-quality screenshots throughout our network, which is incredibly valuable for investigations”.
Brown County, Wisconsin, has upgraded disparate DVR systems that were time consuming and unreliable to an improved system designed to keep workers and publicly owned property safe with streamlined efficiency. They installed a fiber communications network with an IP-based surveillance system. Network cameras from Axis Communications are interconnected through Milestone XProtect® Corporate video management software (VMS). Brown County now efficiently monitors public buildings including the museum, library, courthouse, jail, community treatment center – even the solid waste facilities. At the Austin Straubel International Airport, Agent Vi analytics are integrated with the MilestoneXProtect platform for critical alerts. Brown County, Wisconsin covers 530 square miles and is home to the Green Bay Packers, 13 townships, nine villages and two cities. With departments scattered throughout, the new surveillance system had to be centrally administrated and controlled with restricted access from specific areas, enabling all departments to share video, with fast and efficient views of security related events. A video management system that offered easy integration with third-party systems and multi-phase scalability for a future-proof investment was designed by Technology Resource Advisors, Inc. (TRA). They carried out the county-wide installation. “When the information came from TRA about Milestone’s IP open platform allowing analytics integrations and other security systems for access control, we were very impressed,” stated Kevin Raye, Network Support Manager, Brown County. “Everything - including the pricing standpoint and the fact that Milestone’s technology is compatible with a large variety of cameras - helped us in our final decision to choose this surveillance solution.” “From a user standpoint, the Milestone system is especially great for Brown County,” stated Carrie Borofka, Programmer/Analyst for Brown County. “As an administrator of the software, I turn it on and quickly open up to the Milestone XProtect® Smart Client and see the entire system, log in and we’re good to go.” For users logging in from multiple sites, the central administrators securely and rapidly allow or deny access to views as needed. For example, the community treatment center is a state-licensed psychiatric facility where surveillance may be used for medical instances – more than just security. Patient privacy concerns are considered, so the assigned roles set up in the system mean that unauthorized users are blocked. The system’s storage capabilities give the flexibility to determine video backup on a camera-by-camera basis. A minimum of 30 days of full video backup is kept for the entire county and can be adjusted if archived images are required for longer periods. “We were able to develop a solution that combined multiple aspects including Milestone Federated Architecture™ and Agent Vi analytics to fit the large-scale needs of Brown County,” stated Tom Reminga, CTO, Technology Resource Advisors, Inc. “The reliable, cost-effective and scalable nature of Milestone allows the county’s IT department, along with other department administration, to easily monitor government buildings for the safety of the community.” Throughout Austin Straubel International Airport, an analytics system called Vi-System from Milestone Solutions Partner Agent Vi has been integrated with the Milestone XProtect VMS. Rather than stationing TSA agents or security guards at additional checkpoints in the airport, Agent Vi’s real-time detection and alert software monitors the video footage for predefined security scenarios. When an event is detected, an alert is sent to the VMS, which triggers various actions including live video pop up from the relevant camera. Agent Vi’s analytics are used in other applications at the airport, including ‘sterile zone’ monitoring where Vi-System alerts security personnel of movement by people in restricted areas. This enables an immediate response in line with the level of threat associated with the event. The runways also use Axis thermal IP cameras to monitor the movement of airplanes, service vehicles and personnel. Vi-System analyzes the images provided by the thermal cameras to differentiate between people, vehicles and static objects. Here Vi-System has been predefined to detect and alert when there are people present in a vehicle-only lane, while disregarding the movement of vehicles in that area.
The harbor in Lavagna is one of the largest in the entire Mediterranean. Its 1,600 berths make it a destination for ships and yachts from all over the world. The requirement to integrate the harbor as part of the city while safeguarding the boats against theft and vandalism without limitations was not an easy task. However, 64 DualDome cameras, 3 Allround cameras and 12 hemispheric cameras from MOBOTIX provide an overview of the entire harbor area. In addition to image quality, the weather-resistant robust housings and the wide operating temperature range from -30 to +60 °C are the most important decision-making criteria in favour of the MOBOTIX solution. Personnel from the security staff and law enforcement authorities are the only ones permitted to have viewing access to the network cameras. The number of on-board thefts has been significantly reduced since the installation. Moreover, the video recording allowed four perpetrators to be identified and handed over to police authorities for unlawful appropriation.
Bahrain International Airport is an important regional hub for all aviation activities because of its geographical location in the Middle East. The busy airport which is served through 30 different international carriers has around 8 million passengers every year. In order to handle a passenger capacity of 12 million in the near future there are plans to upgrade the airport with an additional terminal. Business objective: To provide announcements throughout the airport with high clarity on a zone wise selection basis, the system in consideration had to provide the following essential functions: - Digital base platform with full scalability - Integrated digital audio database providing natural sounding announcements in Arabic, English and Hindi - Allowance for the automatic broadcast of Islamic Prayer Calls (Aadhan = call to prayer) at 5 different times a day, varying with each day throughout the whole year - Allowance to be integrated to a "Flight Information Display System" Solution: Given the critical nature of the project, it was essential for the customer "Civil Aviation Authority Bahrain" to award the Bahrain International Airport. The fact that the earlier solution, based on Philips SM40 equipment (Philips-CSI was acquired by Bosch Security Systems in 2003) had served well over the last 12 years made the choice for a follow-up system fairly simple. An integrated Bosch Praesideo solution offered by the installer Mohammed Fakhroo & Bros was finally selected by the customer. For meeting the requirements as well as the objectives of the customer, the following equipment design was defined: 1. An equipment rack consisting of a Praesideo network controller and an assortment of 22 Praesideo amplifiers, providing the possibility to integrate additional units as well 2. More than 1150 constant directivity ceiling loudspeakers distributed in 20 zones 3. 13 Praesideo call stations to be used in gates for local or common area announcements 4. A PC Master call station with geographic lay-out for selecting the particular required zone operational ease for multiple staff handling different shift duties was given. 5. A special audio server, with a customised audiodata base as well as the relevant interface to the Praesideo platform and "Flight Information Display Sytems" (FIDS) supported by a XML file exchange mechanism Thanks to the Bosch solution, clear passenger contact with an integrator with high standing has been achieved Through using the "Object linking and embedding protocol open architecture Interface" (OPC) of the Bosch Praesideo system, the unique software and hardware integration was achieved. Thus, important zoning and priority requirements for the calls could be easily considered. Result: Thanks to the installed Bosch solution, clear passenger contact with an integrator with high standing in local communication has been achieved. Moreover, the solutions are provided using an international manufacturer of repute with proven track record in similar installations. Thus, the Air Navigation directorate, an entity of "Civil Aviation Authority Bahrain", which was responsible for the selection of the system, was more than pleased to have the Bosch Praesideo up and working in such a short time frame. Even the long time wish for an automated Aadhan prayer call announcement system for the airport became finally reality in 2008. Indeed, Mohammed Fakhroo & Bros are well justified in making the right decision for the right reasons with the help of excellent Bosch solutions.
VideoIQ adaptive analytics and edge storage provide accuracy, reliability and real-time HD video surveillance so you can monitor and protect your most important assets. These security solutions are specifically designed to address challenging surveillance conditions and infrastructure constraints including remote perimeters, extreme environments and variable lighting situations. Each HD camera and encoder is bundled with patented intelligent analytics, onboard, distributed storage and VMS software so you can start real-time monitoring in less than 30 minutes. And with affordable multi-channel encoder options, HD video surveillance couldn’t be easier or more cost effective. The industry’s most advanced, reliable analytics. VideoIQ adaptive analytics — based on pattern analysis rather than pixel analysis — are different. They accurately and consistently classify objects as humans or vehicles and disregard inconsequential scene movement from animals, weather and other disruptions. These analytics become more precise every minute, resulting in fewer missed events and fewer false alarms. And, VideoIQ analytics require zero calibration and can evaluate a full HD image, delivering 2-3x the range than most surveillance systems. Edge storage means real-time HD surveillance for the most challenging environments. Edge storage means the VideoIQ solution can be deployed in any environment with almost no infrastructure impact. There’s no need to stream video to a central server, which reduces network traffic and bandwidth consumption by over 90%. Light reflections, bright sunshine, water ripples and vibrations do not impact the accuracy of detection because our analytics are driven by pattern analysis and not pixel analysis. Fewer events are missed even in extreme conditions. System-wide notification enables faster response. Our View software has user-configurable, rules-based alerts that trigger automatic notifications to multiple VMS users when a real-time threat is detected. View is free to use and can be ready in 15 minutes. On the go alerts also help guard resources be more responsive and effective. VideoIQ products also seamlessly integrate with most VMS providers. Affordable HD surveillance. The Rialto Bridge product line offers multi-channel solutions with reliable edge storage options and a very small footprint. These products are easy to install and use, and also include VideoIQ ViewÔ VMS software for immediate pro-active monitoring. VideoIQ HD video surveillance solutions are the proven solution for outdoor perimeter and infrastructure protection. Just ask our customers. Contact your VideoIQ representative to learn more about these highly effective, easy to use solutions. Contact VideoIQ to learn more about these highly effective, easy to use solutions.
IDENTA is supplying EADS with new triple-technology company ID cards and is preparing for international roll-out of new company ID cards with LEGIC Cross-Standard Transponder Chips (CTC4096) for the EADS subsidiary, Airbus. EADS, a world leading group for air travel, space travel and defense, is introducing the new triple-technology company ID cards in Ottobrunn (Germany), London (England) and Montmorency, Suresne and Toulouse (France). This step was a necessary consequence of the EADS group’s rebranding. In the initial phase, IDENTA will deliver around 4,000 ID cards to the EADS HQ. At IDENTA, in the strictest possible security measures, the EADS company ID cards will be personalized with a photo, name, etc. and categorized by status (e.g. employee, temporary worker, student, external, etc.) and be endowed with different coloured security strips to denote different levels of authorization. Finally, the EADS company ID card will be coded in the coding department with three RFID technologies (LEGIC prime 1024, LEGIC advant ATC4096-MP311 and Prox 125 kHZ) and be provided with an additional contact chip on the reverse. Individual EADS employee ID cards will be issued with an EADS accessory kit consisting of an EADS lanyard, a card holder and an extendable badge holder. For 2012, IDENTA is planning the international roll-out of around 19,000 new company ID cards for EADS companies Airbus, Cassidian, Eurocopter, ATR and Astrium for entrance control, time & attendance, canteen, PC login, etc. These will be equipped with the new LEGIC CTC4096 chip, which supplies LEGIC RF and LEGIC advant functionalities in a single module. In addition, a contact chip will be implanted for the PKI application. These multi-application ID cards feature a radio interface with two standards: ISO/IEC 14443 A and LEGIC RF Standard and comply with the high security requirements of LEGIC advant Systems.