Airports & Ports Security Applications
LAN airline, one of the most important airline companies in Latin America, is based in Lima, Peru. The airline company operates scheduled domestic and international services, controlling over seventy percent of the domestic market. Its main base and maintenance center are located in Jorge Chávez International Airport, Lima, which is a significant transfer hub and aviation infrastructure of South America. The LAN airline deploys its surveillance system with Dahua solutions for its office...
Manchester-Boston Regional Airport opened to serve the state of New Hampshire and the surrounding New England community in 1927, a little over two decades after the Wright brother’s first powered flight. Located three miles south of central Manchester, the Manchester-Boston Regional Airport is the fourth largest passenger and third largest cargo airport in New England. The airport is also the busiest in the state, qualifying under the Federal Aviation Administration (FAA) as a “small...
USS Iowa: A Naval Treasure Affectionately known as the “Battleship of Presidents” for having played host to more U.S. presidents than any other battleship, the USS Iowa is one of the most storied vessels in the history of the Navy. Originally commissioned in 1943, the Iowa saw significant action during both World War II and the Korean War. One of the battleship’s first missions was to escort President Franklin Delano Roosevelt across the Atlantic in November of that year for a...
Critical Infrastructure Airports, harbors and ports, railways, highways, pipelines, and bridges together make up much of the infrastructure and facilities the modern world relies upon for transportation. They are the entry and exit points for both domestic and international travel, and the critical infrastructure for the transhipment of people, freight, commodities, manufactured goods, and other cargo. Arecont Vision’s Superior Performance “Ease of installation, compatibilit...
Customer Jebel Ali Port is the flagship port of DP World, a leader in international marine terminal operations and development, logistics and related services. The port is the world's largest man-made harbor and the largest container port between Rotterdam and Singapore. Located 35 kilometers to the southwest of Dubai on the United Arab Emirates Arabian Gulf coast, the port’s strategic geographic location has enabled it to act as a maritime link between the Middle East and the western hem...
Port Fourchon plays a strategic role in supplying the United States with nearly 18 percent of its oil supply, servicing over 90 percent of the Gulf of Mexico’s deepwater exploration and production. Securing such an essential portion of the Gulf Coast requires a hands-on team of security professionals to watch for unauthorized activities and enhance the safety of workers and officers. When evaluating options for a surveillance system to feed its new maritime domain awareness platform GLPC-C...
Security trade fairs can be daunting for attendees. At big shows like ISC West and Global Security Exchange (GSX), there can be hundreds of physical security manufacturers and dealers vying for your attention. Booths are sometimes spread out across multiple halls, often accompanied by a confusing floor plan. As the scope of physical security expands from video surveillance and access control to include smart building integrations, cyber security and the Internet of Things (IoT), there is an increasing amount of information to take in from education sessions and panels. Here, SecurityInformed.com presents eight hints and tips for visitors to make the most out of trade shows: 1. Outline your objectives. As the famous saying goes, “Failing to plan is planning to fail!” Before you plan anything else, ensure you know what you need to achieve at the show. By clearly noting your objectives, you will be able to divide your time at the show appropriately, and carefully choose who you speak to. If there is a particular project your organization is working on, search out the products and solutions that address your security challenges. If you are a security professional aiming to keep up with the latest trends and technologies, then networking sessions and seminars may be more appropriate. 2. Bring a standard list of questions Prepare a list of specific questions that will tell you if a product, solution or potential partner will help you meet your objectives. By asking the same questions to each exhibitor you speak to, you will be able to take notes and compare their offerings side by side at the end of the day. This also means you won’t get bogged down in details that are irrelevant to your goals. Most trade fair websites provide the option to filter exhibitors by their product category 3. Do your homework Once you know your objectives, you can start to research who is exhibiting and decide who you want to talk to. Lists of exhibitors can be daunting, and don’t always show you which manufacturers meet your needs. Luckily, most trade fair websites provide the option to filter exhibitors by their product category. Many exhibitions also offer a downloadable floor plan, grouping exhibitors by product category or by relevant vertical market. It may be easier to download the floor plan to your phone/tablet or even print it out, if you don’t want to carry around a weighty map or show-guide. 4. Make a schedule Once you have shortlisted the companies you need to see, you can make a schedule that reflects your priorities. Even if you are not booking fixed meetings, a schedule will allow you to effectively manage your time, ensuring you make time for the exhibitors you can’t afford to miss. If the trade show spans several days, aim to have your most important conversations early on day one. By the time the last afternoon of the show comes around, many companies are already packing up their booth and preparing to head home. When scheduling fixed meetings, keep the floor plan at hand to avoid booking consecutive meetings at opposite ends of the venue. This will ensure you can walk calmly between stands and don’t arrive at an important meeting feeling flustered! Look for panels and seminars which address the specific needs of your project, or which will contribute to your professional growth 5. Make time for learning If you’re on a mission to expand your knowledge in a given area, check the event guide beforehand to note any education sessions you may want to attend. Look for panels and seminars which address the specific needs of your project, or which will contribute to your professional growth. This is one of the best opportunities you will have to learn from industry leaders in the field. Be sure to plan your attendance in advance so you can schedule the rest of your day accordingly. 6. Keep a record Armed with your objectives and list of questions, you will want to make a note of exhibitors’ responses to help you come to an informed decision. If you’re relying on an electronic device such as a smartphone or tablet to take notes, you may like to consider bringing a back-up notepad and pen, so you can continue to take notes if your battery fails. Your record does not have to be confined to written bullet points. Photos and videos are great tools remind you what you saw at the show, and they may pick up details that you weren’t able to describe in your notes. Most mobile devices can take photos – and images don’t need to be high quality if they’re just to refresh your memory. 7. Network – but don’t let small talk rule the day It may be tempting to take advantage of this time away from the office to talk about anything but business! While small talk can be helpful for building strong professional relationships, remember to keep your list of questions at hand so you can always bring conversations back to your key objectives. Keeping these goals in mind will also help you avoid being swayed by any unhelpful marketing-speak. It may seem obvious, but don’t forget to exchange business cards with everyone you speak to, or even take the opportunity to connect via LinkedIn. Even if something doesn’t seem relevant now, these contacts may be useful in future. Have a dedicated section in your bag or briefcase for business cards to avoid rummaging around. With your most important conversations planned carefully, there should be time left to explore the show more freely 8. Schedule time for wandering With your most important conversations planned carefully, there should be time left to explore the show more freely. Allowing dedicated time to wander will give you a welcome break from more pressing conversations, and may throw up a welcome surprise in the form of a smaller company or new technology you weren’t aware of. Security Trade Fair Checklist: Photo Identification: As well as your event pass, some events require photo identification for entry. Notebook and pen: By writing as you go, you will be able to compare notes at the end of the day. Mobile device: Photos and videos are great tools to remind you what you saw at the show, and may pick up details you missed in your notes. Paper schedule & floor plan: In case batteries or network service fail. Business cards: Have a dedicated pouch or pocket for these to avoid rummaging at the bottom of a bag. Comfortable shoes: If you’re spending a whole day at an event, and plan on visiting multiple booths, comfortable shoes are a must!
I have been thinking a lot about the U.S. government’s ban on video surveillance technologies by Hikvision and Dahua. In general, I question the wisdom and logic of the ban and am frankly puzzled as to how it came to be. Allow me to elaborate. Chinese Camera Manufacturers Reality check: The government ban is based on concerns about the potential misuse of cameras, not actual misuse. Before the government ban, you occasionally heard about some government entities deciding not to use cameras manufactured by Chinese companies, although the reasons were mostly “in an abundance of caution.” Even so, I find the targeting of two Chinese companies – three if you count Hytera Communications, a mobile radio manufacturer – in a huge government military spending bill to be a little puzzling. I can’t quite picture how these specific companies got on Congress’s radar. The government ban is based on concerns about the potential misuse of cameras, not actual misuse What level of lobbying or backroom dealing was involved in getting the ban introduced (by a Missouri congresswoman) into the House version of the bill? And after the ban was left out of the Senate version, was there a new wave of discussions to ensure it was included in the joint House-Senate version (with some minor changes, and who negotiated those?). It all seems a little random. Concerns For The U.S. Furthermore, the U.S. ban solves neither of the two main concerns that are generally used as its justification: Concern: Cybersecurity. The U.S. ban “solves” the issue of cybersecurity only if both of the following statements are true. No security system that uses a Hikvision or Dahua camera or other component is cybersecure. Any system that does not use a Hikvision or Dahua camera or other component is cybersecure. What level of lobbying or backroom dealing was involved in getting the ban introduced into the House version of the bill? The ban ignores the breadth and complexity of cybersecurity and instead offers up two companies as scapegoats. Our industry has sought to address cybersecurity, and the one principle that has guided that effort is that cybersecurity is an issue that must be addressed by manufacturers, consultants, integrators and end users – in effect, everyone in the industry. Cybersecurity does not begin and end with the manufacturer and banning any manufacturers from the market does not ensure better cybersecurity. Concern: “Untrustworthy” Chinese companies. Hikvision and Dahua are only two Chinese companies. Any response to concerns about whether Chinese companies are trustworthy would need to cover many more companies that manufacture their products in China. Australian TV recently claimed that “All Chinese companies pose a risk. Because of Chinese laws, there is a requirement for companies to be engaged in espionage on behalf of the state.” Even if one embraces that extreme view, the logic fails when only two companies are targeted. One source told me that 60 to 65 percent of the global supply of commercial video cameras are manufactured in China, so it’s a much bigger issue than two companies.The Chinese government has much more effective ways of conducting espionage than exploiting security cameras And is U.S. security at risk unless or until it is cut off from more than half of the world’s supply of video cameras? Even Western camera companies manufacture some of their cameras and/or components in China. Why name only two (or three) companies, only one of which has ties to the Chinese government? If the goal of the U.S. ban was to address the possibility of cybersecurity and/or espionage by the Chinese government, shouldn’t there be other companies and product categories included? Clearly, video surveillance is not the only category that has the potential for abuse. The Chinese government has much more effective ways of conducting espionage than exploiting security cameras. Global Response To U.S. Ban And now that the U.S. ban has been passed, how is the ban being misused to justify a new level of alarm about Chinese companies? Australian television effortlessly made the leap from “software backdoors” to a concerted and organized effort by the Chinese government to use cameras to be the “number one country for espionage.” And it’s not just about government facilities: “Even on the street, [cameras] have the potential to inadvertently contribute toward Chinese espionage activity by providing real-time information about the situation on the ground,” says the Australian TV report. If all Chinese companies pose a risk, why is the U.S. government targeting specific companies rather than all Chinese companies? If all Chinese companies pose a risk, why is the U.S. government targeting specific companies rather than all Chinese companies, or at least those with electronics or computer products that could be used for espionage? What about the espionage potential of the 70% of mobile phones that are made in China? What about other consumer electronics such as PCs or smart TVs? How many government facilities that are eliminating Dahua and Hikvision cameras have employees who use iPhones or use other electronic equipment from China? Artificial Intelligence & IP-Over-Coax Also, consider the impact of the ban on business. Hikvision and Dahua have had many successes in the video surveillance market, including in the U.S. market. They have added value to many integrators and end user customers. They have been on the forefront of important trends such as artificial intelligence and IP-over-coax. And, yes, they have made technologies available at lower prices.Cybersecurity issues have plagued several companies in the industry, not just Hikvision and Dahua Cybersecurity issues have plagued several companies in the industry, not just these two, and both Hikvision and Dahua have worked to fix past problems, and to raise awareness of cybersecurity concerns in general. Is a U.S. ban on two companies an appropriate response to a series of geo-political concerns that are much bigger than those two companies (and bigger than our entire market)? Should two companies take the brunt of the anti-Chinese backlash? Video Surveillance Cameras Is the video surveillance market as a whole better or worse for the presence of Hikvision and Dahua? Is it up to the U.S. government to make that call? In some ways, thoughts of Chinese espionage are a sign of these uncertain political times. Fear of video surveillance is perfectly congruent with long-standing anxieties about “Big Brother;” suspicion about China taking over our video cameras just rings true at a time when Russia is (supposedly) controlling our elections. But should two companies be targeted while broader concerns are shrugged off?
Governments and corporations face crisis events every day. An active shooter terrorizes a campus. A cyber extortionist holds a city for ransom. A hurricane washes away a key manufacturing facility. Not all critical events rise to the level of these catastrophic emergencies, but a late or inadequate response to even a minor incident can put people, operations and reputations at risk. Effective Response Plan In 2015, for example, the City of Boston experienced several record-breaking snowstorms that forced the city to close the subway system for three days. The extreme decision cost the state $265 million per day and was largely attributed to a lack of preparation and an inadequate response plan by the transportation department. The reputation of the head of the transportation department was so damaged by the decision she was forced to resign. Being able to better predict how the storms would impact the subway system’s aging infrastructure – and having a more effective response plan in place – could have saved the state hundreds of millions of dollars (not to mention the transit chief’s job). A comprehensive critical event management strategy begins before the impact of an event is felt and continues after the immediate crisis has ended. This full lifecycle strategy can be broken into four distinct phases – Assess, Locate, Act and Analyze. Assessing Threats For Prevention Security teams might have complained about not having enough intelligence data to make accurate predictionsIdentifying a threat before it reaches critical mass and understanding how it might impact vital assets is the most difficult challenge facing security professionals. In the past, security teams might have complained about not having enough intelligence data to make accurate predictions. Today, the exact opposite might be true – there is too much data! With crime and incident data coming from law enforcement agencies, photos and videos coming from people on the front line, topics trending on social media and logistical information originating from internal systems it can be almost impossible to locate a real signal among all the noise and chatter. Being able to easily visualize all this intelligence data within the context of an organization’s assets is vital to understand the relationship between threat data and the individuals or facilities in harm’s way. Social Media Monitoring Free tools like Google Maps or satellite imagery from organizations like AccuWeather, for example, can help understand how fast a storm is closing in on a manufacturing facility, or how close an active shooter is to a school. Their usefulness, however, is limited to a few event types and they provide only a very macro view of the crisis. Data from building access systems, wifi hotspots, corporate travel systems, among others, can be used to create a profile Critical event management (CEM) platforms, however, are designed specifically to manage critical events of all types and provide much greater visibility. Internal and external data sources (weather, local and national emergency management, social media monitoring software, security cameras, etc.) are integrated into these platforms and their data is visualised on a threat map. Security teams can quickly see if there are actual threats to the organizations or communities they are protecting and don’t lose time trying to make sense of intelligence reports. The more they can see on a ‘single pane of glass,’ the faster they can initiate the appropriate response. Locating A Threat Once a threat has been deemed a critical event, the next step is to find the people who might be impacted – employees/residents in danger, first responders and key stakeholders (e.g., senior executives or elected officials who need status updates). Often, this requires someone on the security team to access an HR contact database and initiate a call tree to contact each person individually, in a specific hierarchical order. This can be a time-consuming and opaque process. There is no information on the proximity of that person to the critical event, or if a person has skills such as CPR that could aid in the response. Ensuring ahead of time that certifications, skill sets, or on-call availability is included with contact information can save valuable time in the middle of a crisis response. Going even further, data from building access systems, wifi hotspots, corporate travel systems, among others, can be used to create a profile of where a person just was and where he or she might be going in a CEM platform. This information can be visualized on the threat map and help determine who is actually in danger and who can respond the fastest. The emergency response then becomes targeted and more effective. Security teams can quickly see if there are actual threats to the organizations or communities they are protecting Acting And Automating The third step is to act and automate processes. If there is a tornado closing in on a town, for example, residents should not have to wait for manual intervention before a siren is activated or a message sent out. Organizations can build and execute their standing operating procedures (SOPs) fully within a CEM platform. Sirens, alarms, digital signs and messages can all be automatically activated based on event type, severity and location. Using the tornado example, an integration with a weather forecasting service could trigger the command to issue a tornado warning for a specific community if it is in the path of the storm. Summon Security Guards Warning messages can be prepared in advance based on event type so there is no chance of issuing a misleading or unclear alert Warning messages can be prepared in advance based on event type so there is no chance of issuing a misleading or unclear alert. All communications with impacted individuals can be centralized within the platform and automated based on SOP protocols. This also includes inbound communications from first responders and impacted individuals. An employee confronted by an assailant in a parking garage could initiate an SOS alert from his or her mobile phone that would automatically summon security guards to the scene. Conference lines can also be instantly created to enable collaboration and speed response time. Additionally, escalation policies are automatically engaged if a protocol is broken. For example, during an IT outage, if the primary network engineer does not respond in two minutes, a designated backup is automatically summoned. Eliminating manual steps from SOPs reduces the chance for human error and increases the speed and effectiveness of critical event responses. Analysis Of A Threat Looking for ways to better prepare and respond to critical events will not only improve performance when similar events occur again It’s not uncommon for security and response teams to think that a critical event is over once the immediate crisis has ended. After all, they are often the ones pushing themselves to exhaustion and sometimes risking life and limb to protect their neighbours, colleagues, community reputations and company brands. They need and deserve a rest. In the aftermath of a critical event, however, it’s important to review the effectiveness of the response and look for ways to drive improvements. Which tasks took too long? What resources were missing? How many times did people respond quickly? With a CEM platform, team performance, operational response, benchmarking data and notification analysis are all captured within the system and are available in a configurable dashboard or in after-action reports for analysis. Continuously looking for ways to better prepare and respond to critical events will not only improve performance when similar events occur again, but it will also improve response effectiveness when unforeseen events strike. Coordinate Emergency Response Virtually every organization has some form of response plan to triage a critical event and restore community order or business operations. While many of these plans are highly effective in providing a structure to command and coordinate emergency response, they are reactive in nature and don’t account for the full lifecycle of a critical event – Assess, Locate, Act and Analyze. Whether it’s a large-scale regional emergency or a daily operational issue such as an IT outage, a comprehensive critical event management strategy will minimize the impact by improving visibility, collaboration and response.
Using a smart phone as an access control credential is an idea whose time has come – or has it? The flexible uses of smart phones are transforming our lives in multiple ways, and the devices are replacing everything from our alarm clocks to our wallets to our televisions. However, the transformation from using a card to using a mobile credential for access control is far from a no-brainer for many organizations, which obstacles to a fast or easy transition. We asked this week’s Expert Panel Roundtable: When will mobile credentials dominate access control, and what are the obstacles to greater adoption?
In 1973, a brilliant economist named E.F. Schumacher wrote a seminal book titled ‘Small Is Beautiful:’ taking an opposing stance to the emergence of globalization and “bigger is better” industrialism. He described the advantages of smaller companies and smaller scales of production, highlighting the benefits of building our economies around the needs of communities, not corporations. In almost every industry or market that exists in the world today, you're likely to find a difference in size between companies. Whether it’s a global retail chain versus a small family-owned store, a corporate restaurant chain versus a mom-and-pop diner or a small bed and breakfast versus a large hotel chain — each side of the coin presents unique characteristics and advantages in a number of areas. Disparity In Physical Security Industry Customers are drawn to products and services from large enterprises as the big names typically imply stability This disparity very clearly exists in the physical security industry, and differences in the sizes of product manufacturers and service providers could have important implications for the quality and type of the products and services offered. All too often, customers are drawn to products and services from large enterprises, as the big names typically imply stability, extensive product offerings and global reach. And that's not to say that these considerations are unwarranted; one could argue that larger companies have more resources for product development and likely possess the combined expertise and experience to provide a wide range of products and services. But the value that a company’s products and services can bring isn’t necessarily directly related to or dependent on its size. In an age where the common wisdom is to scale up to be more efficient and profitable, it’s interesting to pause and think about some of the possible advantages of small- and medium-sized businesses (SMBs). Typically, “small” companies are defined as those with less than 100 employees and “medium” with less than 500. Providing Social Mobility Schumacher argued that smaller companies are important engines of economic growth. Indeed, according to the Organization for Economic Cooperation and Development (OECD), a group of 36 member countries that promotes policies for economic and social well-being, SMBs account for 60 to 70 percent of jobs in most OECD countries. Importantly, SMBs provide resilience in that there are often large economic and social impacts when big companies fail. Smaller companies are better for regional economies in general, as earnings stay more local compared to big businesses, which in turn generates additional economic activity. SMBs are also better at providing social mobility for disadvantaged groups by giving them opportunities and enabling them to realize their potential. Smaller companies are often more innovative, bringing to the market novel technologies and solutions such as Cloud, analytics, AI, and IoT New Companies Introduce New Technologies There's no denying the role of start-ups when it comes to innovation. In the security industry, many new technologies (e.g. Cloud, analytics, AI, IoT) are first brought to the market by newer companies. In general, smaller companies’ products and services often have to be as good or better than others to be competitive in the marketplace. They are therefore often more innovative, bringing to the market novel technologies and solutions. And these companies are also more willing to try out other new B2B solutions, while larger companies tend to be more risk-averse. Customer Service Aside from the quality of products and services, arguably one of the most important components of a security company’s success is its ability to interact with and provide customers the support that they deserve. Smaller companies are able to excel and stand out to their customers in a number of ways: Customer service. Customers’ perceptions of a product’s quality are influenced by the quality of support, and smaller manufacturers often possess a strong, motivated customer service team that can be relatively more responsive to customers of all sizes, not just the large ones. A superior level of support generally translates into high marks on customer satisfaction, since customers’ issues with products can be resolved promptly. Flexibility. SMBs have a greater capacity to detect and satisfy small market niches. While large companies generally create products and services for large markets, smaller companies deal more directly with their customers, enabling them to meet their needs and offer customized products and services. And this translates to adaptability, as SMBs become responsive to new market trends. By having a pulse on the market, smaller companies have much more flexibility in their supply chain and can adjust much faster in response to changing demand. Decision-making. Smaller companies are much more agile in decision-making, while larger enterprises often suffer from complex, tedious and lengthy decision-making processes. Communication is easier throughout SMBs, as smaller teams enable new ideas to flow and can solve problems faster. Job Satisfaction Employees working for SMBs connect more directly with the company's goals and objectives, which in turn increases motivation and job satisfaction Employees working for SMBs connect more directly with the company's goals and objectives, which in turn increases motivation and job satisfaction. SMBs are also generally more connected to local communities and participation in community activities leads to a greater sense of purpose. Additionally, SMBs have a much smaller impact on the environment, which is increasingly becoming an important consideration for today’s employees and customers. Though Schumacher's book takes a much deeper dive into the large global effects of scale on people and profitability, the general impact of a company’s size on its products and services is clear. It’s important for all players in the security industry to remember that the commitment and dedication to product quality can be found in businesses of all sizes. Ensuring Safety Of People, Property And Assets Large manufacturers may catch your eye, but small business shouldn’t be forgotten, as they can offer end users a robust set of attributes and benefits. While all security companies are aiming to achieve a common goal of providing safety for people, property and assets, smaller businesses can provide extensive value when it comes to driving the economy, innovating in the industry, providing quality employment and offering superior customer service.
Repercussions are rippling through the physical security industry since President Trump signed into law the ban on government uses of surveillance equipment by Chinese manufacturers Hikvision and Dahua. In addition to the direct and indirect consequences of the new law, there have also been other developments likely to impact the future of Chinese companies in the video surveillance market. The ban has raised awareness of Chinese companies’ role in video surveillance, and other developments are related to tariffs and possible sanctions, all playing out amid the backdrop of an escalating trade war. One Chinese manufacturer previously dismissed security concerns about its role in video surveillance as “Cold War rhetoric.” There has been an almost nostalgic tone recently to the escalating concerns about video cameras being used for spying. Hikvision and Dahua have both stated emphatically that they have not conducted any espionage-related activities. Even so, the U.S. government ban has emboldened the concerns. However, to be clear: No one has alleged that technologies from either of the companies have been used for espionage. Rather, the concerns are about the potential for misuse, not actual misuse. Also aggravating the situation are Chinese companies’ previous, actual problems with cybersecurity, which the companies say they have addressed. Here are some recent developments related to the U.S. government ban and Chinese manufacturers in general: Tariffs And Trade Concerns Additional rounds of U.S. tariffs have targeted an expanding array of Chinese goods, including data storage and processing components such as printed circuit boards, as well as video camera lenses. The escalating trade war has kept generalized concerns about China and its trade practices in the public eye and fomented a level of uncertainty in many markets, including physical security. Additional rounds of U.S. tariffs have targeted an expanding array of Chinese goods Involvement Of Surveillance In Chinese Human Rights Violations Concerns have surfaced in a Congressional hearing recently about the Chinese government’s surveillance activities targeting the Uyghurs and other Muslim ethnic minorities in the Zinjiang Urghur Autonomous Region (XUAR). Specific attention is being directed at the region’s surveillance system including “thousands of surveillance cameras, including in mosques,” and Hikvision and Dahua were mentioned in the Congressional hearing as profiting from security spending in the area. Increased Global Media Attention The ban has not been widely publicized in the U.S. mainstream media, but the topic has attracted global attention. For example, the Australian Broadcasting Corporation broadcast a 10-minute expose on the use of Chinese-made cameras in Australian government facilities, including “sensitive military facilities.” The report, which mentioned the U.S. ban, noted that “Both [Hikvision and Dahua] have had security flaws be exposed leading to fears that some of the flaws were placed there to help the Chinese government spy.” The report continues: “China is trying to set itself up as the number-one country for cyber-espionage, and this is part of that platform.” How broadly should one interpret the inclusion of "critical infrastructure" mentioned in the bill? Broader Interpretation Of The Bill Beyond The Federal Government The language in the bill leaves a level of ambiguity in terms of the scope of its application, and the security marketplace as a whole has been struggling to understand its full impact. Does the ban only restrict an integrator’s use of Chinese technology on a specific government job, or does it eliminate an integrator who installs the technology (even in non-government projects) from consideration for government jobs? How broadly should one interpret the inclusion of “critical infrastructure” mentioned in the bill, for example, non-governmental facilities? Will other governments and private entities assume they should ban Hikvision and Dahua in order to be compliant? For example, Suffolk, VA., has announced it will not to use Dahua or Hikvision cameras because the federal ban applies to “U.S. government-funded contracts and for critical infrastructure and national security usage.” The result of these developments is a kind of snowball effect, simultaneously drawing attention to the issues and adding new elements to an overall narrative. Taken together, these developments suggest the U.S. ban has set off a level of concern about Chinese companies that will have an industry-transforming impact in the months to come.
The Sabine-Neches Waterway runs 55 miles through Jefferson County, Texas, to the Gulf of Mexico, and includes the number-one commercial and military out-load port in the United States. It is the fourth largest port in terms of processed tonnage. A vast waterway traffic-monitoring network has been deployed to ensure all vessels (civilian, military and commercial) can safely navigate the waters with minimal interference such as collisions or other traffic stoppage. A new surveillance system also monitors the many petroleum refineries that line the channel. Backed by a Verizon Wireless 4G connection, the county cameras reside along the Sabine-Neches Waterway, networked through Milestone XProtect Enterprise for managing high definition video, live vessel movements and incident reporting. “Milestone’s open platform IP software is truly the best on the market. It integrates with all of the cameras seamlessly. Milestone XProtect provides the sheriff’s department with more high definition screen images and significantly better views of the waterway than the previous system. Now our system’s design provides live video and pushes to tablets, smartphones, dispatchers, and personnel on watercraft, who are given access to the video.” Mark Nolan, Knight Security Systems The Challenge Securing and monitoring 55 miles of waterway with traffic, including vessels ranging in size from small tugboats to huge tanker ships hauling hundreds of tons of oil and other commodities. When an incident is called into port security, the port authorities must assess the situation and respond immediately. Through the Milestone interface, reported incidents are checked on video to determine if the port must close or can continue operating. Closing the port for any amount of time is an expensive procedure, so having virtual eyes on the scene is imperative to operations. The previously installed system was only viewable and navigable in a control station building. The Solution Knight Security Systems designed and installed a Milestone XProtect Enterprise IP video surveillance solution with AXIS Q1604 and Sony SNC-ER550 cameras and more than eight terabytes of storage to provide 24 hours of monitoring. With the Milestone Mobile client, the sheriff’s department and port authorities have instant access to video at a moment’s notice, from anywhere. A Verizon Wireless 4G network for reliable and redundant operation powers the entire system. The Advantages The Milestone XProtect solution consolidates every one of the 24-hour monitored cameras into one centrally managed solution, viewable by all administrators in their respective offices, in the main monitoring station and on mobile devices. With high-level national security implications, live camera views and the ability to quickly check recorded video is essential to the port’s operational standards for efficiency. Every second between an incident report and confirmation of the validity of the report is crucial to the response process. A Vital Artery For US Oil Imports As the fourth largest port in the U.S., Port Arthur in Texas’ Jefferson County is the number-one crude oil destination for foreign tankers, as well as the number-one commercial and military out-load port. Hundreds of vessels are processed through the channel each day, making their way from other domestic ports and from all over the globe into the Gulf of Mexico and up the Sabine-Neches Waterway. With oil refineries and other critical infrastructure lining the 55 miles of river bank through Jefferson County, the sheriff’s department required a sophisticated security surveillance system to monitor waterway traffic and incidents. They need to ensure the safety of those working and traveling through the port, and to keep traffic flowing for the sake of commerce that relies on a clear waterway. With Milestone Mobile client, the sheriff’s department and port authorities have instant access to video from anywhere The Problem Previously installed systems relied on T1 lines, leased communication lines and microwave communication methods. Jefferson County was relying on outside partners to host landing points and was constantly provided low definition video. The area is scattered with low-lying areas and swamps, which limited coverage for the low-capacity T1 lines which were easily corroded from damp conditions and salt corrosion. When monitoring the video during and after an incident, a command center was the only place where the sheriff, Coast Guard or port officials had access to the video. When looking to completely upgrade the county’s river surveillance, officials contracted Texas-based Knight Security for a better solution – one that would provide nearly lossless access to video at a moment’s notice, even for those stationed away from the central command center. “Our goal was to provide high-definition screen views and more efficient monitoring of the waterway,” stated Mark Nolan, Sales Engineer, Knight Security Systems, Gulf Coast Region. “The new video system was specifically designed to capitalize on the unique areas of the Port. We now have camera ‘eyes’ located on an array of tall locations in challenging environments. Coupled with Milestone XProtect, the system provides advanced coverage throughout the entire waterway. We are able to provide live video and push out to tablets and mobile devices to numerous dispatch stations, personnel on watercrafts and others to have immediate access to any incident.” Protecting the Port The only way to access Jefferson County through the waterway is via Sabine Pass, TX or through two entry points on the Intracoastal Waterway. With an advanced communications system and screening process, no vessel is unaccounted for. The cameras act as verification to confirm radio transmissions. The Vessel Traffic Service (VTS) at Port Arthur acts as the “keepers of the gate” aided by the Milestone video management solution. VTS Port Arthur trained operators scan the waterways efficiently and effectively, 24 hours a day. VTS issues advisories and works to minimize blind spots utilising cameras and radar. Activities are monitored with the aid of the Milestone XProtect interface. Whether it’s a dredge, accident, or other incident; almost every vessel, regardless of size, is within a camera’s field of vision. “If we pick up a radar blip that’s not transmitting an identification signal, it is imperative to identify that blip before it enters the port,” explained Michael Measells, Director of Vessel Traffic Service. “The cameras can do what radar can’t achieve. We can put an eye on a vessel through the Milestone XProtect software, allowing us to know what’s moving from a marine safety and security standpoint. That’s the number-one mission.” Uniquely Stationed Surveillance Points Cameras line the river and port entrance, placed in strategic locations from the roofs of buildings to the top of the Verizon Wireless 4G towers. A Jefferson County Sheriff helicopter also hosts a mounted camera ready to be called into action at any time, whether it’s monitoring an incident or making rounds. “Our cameras feed the entire system and with the added support of the 4G LTE, the chances that we’ll be blacked out are very low. Nearly all aspects of the system have a redundant counterpart,” stated Measells. “We’ve been up and running as a group for eight years and other than hurricanes we’ve never had a shut down due to the system.” Knight Security Systems can monitor the status of the sheriff’s cameras and immediately notify the client of a camera outage, which might not have been noticed by the authorities if they’ve not checked their mobile device. Downtime is completely minimised with the proactive monitoring and Milestone system alerts. “We’ve adapted to the ease of application, connectivity and versatility of the Milestone interface very quickly – it’s become so easy to use. It’s something we can just access without really putting too much extra work into it,” stated John Moore, Electronics Materials Officer, United States Coast Guard. “Milestone is always up and running and it loads extremely fast on any mobile operating system.” The system also includes a rapidly deployable camera system that can be connected to a generator and a camera on a portable frame to easily access the waterway. It can be deployed and launched live into the Milestone system via local cell towers within minutes of a reported incident. “The versatility of our Milestone setup also allows us to remotely provide access to our Sector Command Center in Houston so they can view any potential issue,” Moore continued. Incident Confirmation and Control "The versatility of our Milestone setup also allows us to remotely provide access to our Sector Command Center in Houston so they can view any potential issue" The port is a vital, active entity, responsible for millions of dollars in assets and manpower. If an incident is reported to the Sheriff’s Department or Coast Guard, which isn’t uncommon, there are established procedures to follow before any response is made. A response for any event, whether a boating accident, cargo spill or personal injury, has the potential to shut down the critical channel for an extended length of time. When an incident is reported, officials must immediately confirm the report. Once confirmed, the proper authorities are contacted and ground or water personnel deployed as needed. The sheriff’s department jurisdiction covers the entire 55 miles of critical infrastructure, so mobility is vital. “I’m not monitoring the lines 24 hours a day personally, but if I get a report of an incident, I’ll pull Milestone Mobile up on my tablet or phone to assess the situation,” stated Deputy Chief Mark Dubois, Jefferson County Sheriff. “XProtect helps us respond quickly, allowing us to pull up video from any particular time and cameras immediately, from any location, to confirm or deny an event.” “With our camera coverage, we can move from evaluation of a report to initiating a response in a matter of minutes, if not seconds,” Moore continued. “There’s time and money there. Once we confirm, all responders’ mindsets are immediately shifted into ‘response’.” The Benefits of Scalability and Usability Quickly allowing access to live and recorded video, Milestone can handle a large number of cameras should the sheriff’s department decide to upgrade or add more hardware devices to the monitoring solution. “Overall, it used to take a lot more time before the sheriff could react to an incident, which could have been a life-or-death difference over a few minutes,” continued Nolan. “Milestone provides the open platform capability, allowing the end user to stay current on the latest and greatest software, and scaling up without changing the entire system from the ground level up.” Training was quick and efficient among the three user groups -- field users on the ground and water, and users in the office reporting on analytics, recording and searching archives. Knight Security Systems created different user profiles and tailored training sessions for each group, showing them exactly the views and functions they will regularly access, rather than diving into processes that would not be relevant to their specific duty. In total, 40 personnel were trained on Milestone, from ‘power users’ to those who use the system casually or view cameras sporadically. Screen images are used for numerous activities besides security, including studying tow configurations, training, and exporting photos and data to port partners. “This is a high-traffic waterway and with a limited width, there are bound to be close calls and incidents,” said Measells. “It’s just good to have more eyes on each vessel. The cameras are high resolution enough to read a soccer player’s jersey number from a mile away in low light! We’re sending photo-quality screenshots throughout our network, which is incredibly valuable for investigations”.
Brown County, Wisconsin, has upgraded disparate DVR systems that were time consuming and unreliable to an improved system designed to keep workers and publicly owned property safe with streamlined efficiency. They installed a fiber communications network with an IP-based surveillance system. Network cameras from Axis Communications are interconnected through Milestone XProtect® Corporate video management software (VMS). Brown County now efficiently monitors public buildings including the museum, library, courthouse, jail, community treatment center – even the solid waste facilities. At the Austin Straubel International Airport, Agent Vi analytics are integrated with the MilestoneXProtect platform for critical alerts. Brown County, Wisconsin covers 530 square miles and is home to the Green Bay Packers, 13 townships, nine villages and two cities. With departments scattered throughout, the new surveillance system had to be centrally administrated and controlled with restricted access from specific areas, enabling all departments to share video, with fast and efficient views of security related events. A video management system that offered easy integration with third-party systems and multi-phase scalability for a future-proof investment was designed by Technology Resource Advisors, Inc. (TRA). They carried out the county-wide installation. “When the information came from TRA about Milestone’s IP open platform allowing analytics integrations and other security systems for access control, we were very impressed,” stated Kevin Raye, Network Support Manager, Brown County. “Everything - including the pricing standpoint and the fact that Milestone’s technology is compatible with a large variety of cameras - helped us in our final decision to choose this surveillance solution.” “From a user standpoint, the Milestone system is especially great for Brown County,” stated Carrie Borofka, Programmer/Analyst for Brown County. “As an administrator of the software, I turn it on and quickly open up to the Milestone XProtect® Smart Client and see the entire system, log in and we’re good to go.” For users logging in from multiple sites, the central administrators securely and rapidly allow or deny access to views as needed. For example, the community treatment center is a state-licensed psychiatric facility where surveillance may be used for medical instances – more than just security. Patient privacy concerns are considered, so the assigned roles set up in the system mean that unauthorized users are blocked. The system’s storage capabilities give the flexibility to determine video backup on a camera-by-camera basis. A minimum of 30 days of full video backup is kept for the entire county and can be adjusted if archived images are required for longer periods. “We were able to develop a solution that combined multiple aspects including Milestone Federated Architecture™ and Agent Vi analytics to fit the large-scale needs of Brown County,” stated Tom Reminga, CTO, Technology Resource Advisors, Inc. “The reliable, cost-effective and scalable nature of Milestone allows the county’s IT department, along with other department administration, to easily monitor government buildings for the safety of the community.” Throughout Austin Straubel International Airport, an analytics system called Vi-System from Milestone Solutions Partner Agent Vi has been integrated with the Milestone XProtect VMS. Rather than stationing TSA agents or security guards at additional checkpoints in the airport, Agent Vi’s real-time detection and alert software monitors the video footage for predefined security scenarios. When an event is detected, an alert is sent to the VMS, which triggers various actions including live video pop up from the relevant camera. Agent Vi’s analytics are used in other applications at the airport, including ‘sterile zone’ monitoring where Vi-System alerts security personnel of movement by people in restricted areas. This enables an immediate response in line with the level of threat associated with the event. The runways also use Axis thermal IP cameras to monitor the movement of airplanes, service vehicles and personnel. Vi-System analyzes the images provided by the thermal cameras to differentiate between people, vehicles and static objects. Here Vi-System has been predefined to detect and alert when there are people present in a vehicle-only lane, while disregarding the movement of vehicles in that area.
The harbor in Lavagna is one of the largest in the entire Mediterranean. Its 1,600 berths make it a destination for ships and yachts from all over the world. The requirement to integrate the harbor as part of the city while safeguarding the boats against theft and vandalism without limitations was not an easy task. However, 64 DualDome cameras, 3 Allround cameras and 12 hemispheric cameras from MOBOTIX provide an overview of the entire harbor area. In addition to image quality, the weather-resistant robust housings and the wide operating temperature range from -30 to +60 °C are the most important decision-making criteria in favour of the MOBOTIX solution. Personnel from the security staff and law enforcement authorities are the only ones permitted to have viewing access to the network cameras. The number of on-board thefts has been significantly reduced since the installation. Moreover, the video recording allowed four perpetrators to be identified and handed over to police authorities for unlawful appropriation.
Bahrain International Airport is an important regional hub for all aviation activities because of its geographical location in the Middle East. The busy airport which is served through 30 different international carriers has around 8 million passengers every year. In order to handle a passenger capacity of 12 million in the near future there are plans to upgrade the airport with an additional terminal. Business objective: To provide announcements throughout the airport with high clarity on a zone wise selection basis, the system in consideration had to provide the following essential functions: - Digital base platform with full scalability - Integrated digital audio database providing natural sounding announcements in Arabic, English and Hindi - Allowance for the automatic broadcast of Islamic Prayer Calls (Aadhan = call to prayer) at 5 different times a day, varying with each day throughout the whole year - Allowance to be integrated to a "Flight Information Display System" Solution: Given the critical nature of the project, it was essential for the customer "Civil Aviation Authority Bahrain" to award the Bahrain International Airport. The fact that the earlier solution, based on Philips SM40 equipment (Philips-CSI was acquired by Bosch Security Systems in 2003) had served well over the last 12 years made the choice for a follow-up system fairly simple. An integrated Bosch Praesideo solution offered by the installer Mohammed Fakhroo & Bros was finally selected by the customer. For meeting the requirements as well as the objectives of the customer, the following equipment design was defined: 1. An equipment rack consisting of a Praesideo network controller and an assortment of 22 Praesideo amplifiers, providing the possibility to integrate additional units as well 2. More than 1150 constant directivity ceiling loudspeakers distributed in 20 zones 3. 13 Praesideo call stations to be used in gates for local or common area announcements 4. A PC Master call station with geographic lay-out for selecting the particular required zone operational ease for multiple staff handling different shift duties was given. 5. A special audio server, with a customised audiodata base as well as the relevant interface to the Praesideo platform and "Flight Information Display Sytems" (FIDS) supported by a XML file exchange mechanism Thanks to the Bosch solution, clear passenger contact with an integrator with high standing has been achieved Through using the "Object linking and embedding protocol open architecture Interface" (OPC) of the Bosch Praesideo system, the unique software and hardware integration was achieved. Thus, important zoning and priority requirements for the calls could be easily considered. Result: Thanks to the installed Bosch solution, clear passenger contact with an integrator with high standing in local communication has been achieved. Moreover, the solutions are provided using an international manufacturer of repute with proven track record in similar installations. Thus, the Air Navigation directorate, an entity of "Civil Aviation Authority Bahrain", which was responsible for the selection of the system, was more than pleased to have the Bosch Praesideo up and working in such a short time frame. Even the long time wish for an automated Aadhan prayer call announcement system for the airport became finally reality in 2008. Indeed, Mohammed Fakhroo & Bros are well justified in making the right decision for the right reasons with the help of excellent Bosch solutions.
VideoIQ adaptive analytics and edge storage provide accuracy, reliability and real-time HD video surveillance so you can monitor and protect your most important assets. These security solutions are specifically designed to address challenging surveillance conditions and infrastructure constraints including remote perimeters, extreme environments and variable lighting situations. Each HD camera and encoder is bundled with patented intelligent analytics, onboard, distributed storage and VMS software so you can start real-time monitoring in less than 30 minutes. And with affordable multi-channel encoder options, HD video surveillance couldn’t be easier or more cost effective. The industry’s most advanced, reliable analytics. VideoIQ adaptive analytics — based on pattern analysis rather than pixel analysis — are different. They accurately and consistently classify objects as humans or vehicles and disregard inconsequential scene movement from animals, weather and other disruptions. These analytics become more precise every minute, resulting in fewer missed events and fewer false alarms. And, VideoIQ analytics require zero calibration and can evaluate a full HD image, delivering 2-3x the range than most surveillance systems. Edge storage means real-time HD surveillance for the most challenging environments. Edge storage means the VideoIQ solution can be deployed in any environment with almost no infrastructure impact. There’s no need to stream video to a central server, which reduces network traffic and bandwidth consumption by over 90%. Light reflections, bright sunshine, water ripples and vibrations do not impact the accuracy of detection because our analytics are driven by pattern analysis and not pixel analysis. Fewer events are missed even in extreme conditions. System-wide notification enables faster response. Our View software has user-configurable, rules-based alerts that trigger automatic notifications to multiple VMS users when a real-time threat is detected. View is free to use and can be ready in 15 minutes. On the go alerts also help guard resources be more responsive and effective. VideoIQ products also seamlessly integrate with most VMS providers. Affordable HD surveillance. The Rialto Bridge product line offers multi-channel solutions with reliable edge storage options and a very small footprint. These products are easy to install and use, and also include VideoIQ ViewÔ VMS software for immediate pro-active monitoring. VideoIQ HD video surveillance solutions are the proven solution for outdoor perimeter and infrastructure protection. Just ask our customers. Contact your VideoIQ representative to learn more about these highly effective, easy to use solutions. Contact VideoIQ to learn more about these highly effective, easy to use solutions.
IDENTA is supplying EADS with new triple-technology company ID cards and is preparing for international roll-out of new company ID cards with LEGIC Cross-Standard Transponder Chips (CTC4096) for the EADS subsidiary, Airbus. EADS, a world leading group for air travel, space travel and defense, is introducing the new triple-technology company ID cards in Ottobrunn (Germany), London (England) and Montmorency, Suresne and Toulouse (France). This step was a necessary consequence of the EADS group’s rebranding. In the initial phase, IDENTA will deliver around 4,000 ID cards to the EADS HQ. At IDENTA, in the strictest possible security measures, the EADS company ID cards will be personalized with a photo, name, etc. and categorized by status (e.g. employee, temporary worker, student, external, etc.) and be endowed with different coloured security strips to denote different levels of authorization. Finally, the EADS company ID card will be coded in the coding department with three RFID technologies (LEGIC prime 1024, LEGIC advant ATC4096-MP311 and Prox 125 kHZ) and be provided with an additional contact chip on the reverse. Individual EADS employee ID cards will be issued with an EADS accessory kit consisting of an EADS lanyard, a card holder and an extendable badge holder. For 2012, IDENTA is planning the international roll-out of around 19,000 new company ID cards for EADS companies Airbus, Cassidian, Eurocopter, ATR and Astrium for entrance control, time & attendance, canteen, PC login, etc. These will be equipped with the new LEGIC CTC4096 chip, which supplies LEGIC RF and LEGIC advant functionalities in a single module. In addition, a contact chip will be implanted for the PKI application. These multi-application ID cards feature a radio interface with two standards: ISO/IEC 14443 A and LEGIC RF Standard and comply with the high security requirements of LEGIC advant Systems.