Remote monitoring security applications
Founded in 1871, Fulton County School System is the fourth largest school district in Georgia, United States. It consists of 101 schools and administrative support buildings, including 67 elementary schools, 19 middle schools, 17 high schools and eight charter organizations. Fulton’s mission is to provide a safe and secure environment for its more than 96,000 students and more than 12,000 full-time employees. To help enhance safety Search Technology at more than 100 schools, Fulton has in...
Customer Located in the Meadowlands and part of the MetLife Sports Complex in East Rutherford, New Jersey, MetLife Stadium is home to the New York Football Giants and the New York Jets. The $1.6 billion stadium was financed and built by a joint venture between the two teams, who operate it through the New Meadowlands Stadium Company. The stadium opened in April 2010 and boasts a seating capacity of 82,500, making it one of the NFL's largest stadiums. On February 2, 2014, MetLife Stadium played...
Background Delivering the future of guarding through technology and expertise The emergence of high-tech virtual guarding as a powerful and cost-effective alternative to traditional manned patrol approaches is a direct realization of the promise seen in the industry’s most innovative and high-performing technology. Currently, emergent leaders in the virtual guarding space are those who successfully leverage guarding and security expertise and match it with the right technology to move be...
Customer Buenos Aires is the capital and largest city of Argentina and the second-largest metropolitan area in South America. The city of Buenos Aires is an autonomous district, and the separate province of Buenos Aires is the largest and most populous province in Argentina. Challenge The local governments in Argentina needed a portable mobile solution to monitor and document speed limit violations. Megapixel Solution In a unique integrated solution, Arecont Vision 5-megapixel cameras are u...
Milestone Systems, the open platform company in IP video management software (VMS), provided ‘the right stuff’ as the technology for live monitoring with archived recordings when the Los Angeles Police Department (LAPD) needed to supervise every moment during the space shuttle Endeavour’s recent weekend-long journey from the Los Angeles International Airport to its final home at the California Science Center. Traveling to its final destination, the space shuttle Endeavour was...
Security for banks can be a real challenge when faced with a multitude of threats including: fraud, theft and physical attacks. One bank which is setting new standards in the Middle East, when it comes to the application of surveillance technology to keep its infrastructure, staff and customers safe and secure, is National Bank of Kuwait (NBK). This is thanks to the roll out of an advanced NetVu Connected CCTV solution from Dedicated Micros part of AD Group which is focused on the centralized mo...
I have been thinking a lot about the U.S. government’s ban on video surveillance technologies by Hikvision and Dahua. In general, I question the wisdom and logic of the ban and am frankly puzzled as to how it came to be. Allow me to elaborate. Chinese Camera Manufacturers Reality check: The government ban is based on concerns about the potential misuse of cameras, not actual misuse. Before the government ban, you occasionally heard about some government entities deciding not to use cameras manufactured by Chinese companies, although the reasons were mostly “in an abundance of caution.” Even so, I find the targeting of two Chinese companies – three if you count Hytera Communications, a mobile radio manufacturer – in a huge government military spending bill to be a little puzzling. I can’t quite picture how these specific companies got on Congress’s radar. The government ban is based on concerns about the potential misuse of cameras, not actual misuse What level of lobbying or backroom dealing was involved in getting the ban introduced (by a Missouri congresswoman) into the House version of the bill? And after the ban was left out of the Senate version, was there a new wave of discussions to ensure it was included in the joint House-Senate version (with some minor changes, and who negotiated those?). It all seems a little random. Concerns For The U.S. Furthermore, the U.S. ban solves neither of the two main concerns that are generally used as its justification: Concern: Cybersecurity. The U.S. ban “solves” the issue of cybersecurity only if both of the following statements are true. No security system that uses a Hikvision or Dahua camera or other component is cybersecure. Any system that does not use a Hikvision or Dahua camera or other component is cybersecure. What level of lobbying or backroom dealing was involved in getting the ban introduced into the House version of the bill? The ban ignores the breadth and complexity of cybersecurity and instead offers up two companies as scapegoats. Our industry has sought to address cybersecurity, and the one principle that has guided that effort is that cybersecurity is an issue that must be addressed by manufacturers, consultants, integrators and end users – in effect, everyone in the industry. Cybersecurity does not begin and end with the manufacturer and banning any manufacturers from the market does not ensure better cybersecurity. Concern: “Untrustworthy” Chinese companies. Hikvision and Dahua are only two Chinese companies. Any response to concerns about whether Chinese companies are trustworthy would need to cover many more companies that manufacture their products in China. Australian TV recently claimed that “All Chinese companies pose a risk. Because of Chinese laws, there is a requirement for companies to be engaged in espionage on behalf of the state.” Even if one embraces that extreme view, the logic fails when only two companies are targeted. One source told me that 60 to 65 percent of the global supply of commercial video cameras are manufactured in China, so it’s a much bigger issue than two companies.The Chinese government has much more effective ways of conducting espionage than exploiting security cameras And is U.S. security at risk unless or until it is cut off from more than half of the world’s supply of video cameras? Even Western camera companies manufacture some of their cameras and/or components in China. Why name only two (or three) companies, only one of which has ties to the Chinese government? If the goal of the U.S. ban was to address the possibility of cybersecurity and/or espionage by the Chinese government, shouldn’t there be other companies and product categories included? Clearly, video surveillance is not the only category that has the potential for abuse. The Chinese government has much more effective ways of conducting espionage than exploiting security cameras. Global Response To U.S. Ban And now that the U.S. ban has been passed, how is the ban being misused to justify a new level of alarm about Chinese companies? Australian television effortlessly made the leap from “software backdoors” to a concerted and organized effort by the Chinese government to use cameras to be the “number one country for espionage.” And it’s not just about government facilities: “Even on the street, [cameras] have the potential to inadvertently contribute toward Chinese espionage activity by providing real-time information about the situation on the ground,” says the Australian TV report. If all Chinese companies pose a risk, why is the U.S. government targeting specific companies rather than all Chinese companies? If all Chinese companies pose a risk, why is the U.S. government targeting specific companies rather than all Chinese companies, or at least those with electronics or computer products that could be used for espionage? What about the espionage potential of the 70% of mobile phones that are made in China? What about other consumer electronics such as PCs or smart TVs? How many government facilities that are eliminating Dahua and Hikvision cameras have employees who use iPhones or use other electronic equipment from China? Artificial Intelligence & IP-Over-Coax Also, consider the impact of the ban on business. Hikvision and Dahua have had many successes in the video surveillance market, including in the U.S. market. They have added value to many integrators and end user customers. They have been on the forefront of important trends such as artificial intelligence and IP-over-coax. And, yes, they have made technologies available at lower prices.Cybersecurity issues have plagued several companies in the industry, not just Hikvision and Dahua Cybersecurity issues have plagued several companies in the industry, not just these two, and both Hikvision and Dahua have worked to fix past problems, and to raise awareness of cybersecurity concerns in general. Is a U.S. ban on two companies an appropriate response to a series of geo-political concerns that are much bigger than those two companies (and bigger than our entire market)? Should two companies take the brunt of the anti-Chinese backlash? Video Surveillance Cameras Is the video surveillance market as a whole better or worse for the presence of Hikvision and Dahua? Is it up to the U.S. government to make that call? In some ways, thoughts of Chinese espionage are a sign of these uncertain political times. Fear of video surveillance is perfectly congruent with long-standing anxieties about “Big Brother;” suspicion about China taking over our video cameras just rings true at a time when Russia is (supposedly) controlling our elections. But should two companies be targeted while broader concerns are shrugged off?
Governments and corporations face crisis events every day. An active shooter terrorizes a campus. A cyber extortionist holds a city for ransom. A hurricane washes away a key manufacturing facility. Not all critical events rise to the level of these catastrophic emergencies, but a late or inadequate response to even a minor incident can put people, operations and reputations at risk. Effective Response Plan In 2015, for example, the City of Boston experienced several record-breaking snowstorms that forced the city to close the subway system for three days. The extreme decision cost the state $265 million per day and was largely attributed to a lack of preparation and an inadequate response plan by the transportation department. The reputation of the head of the transportation department was so damaged by the decision she was forced to resign. Being able to better predict how the storms would impact the subway system’s aging infrastructure – and having a more effective response plan in place – could have saved the state hundreds of millions of dollars (not to mention the transit chief’s job). A comprehensive critical event management strategy begins before the impact of an event is felt and continues after the immediate crisis has ended. This full lifecycle strategy can be broken into four distinct phases – Assess, Locate, Act and Analyze. Assessing Threats For Prevention Security teams might have complained about not having enough intelligence data to make accurate predictionsIdentifying a threat before it reaches critical mass and understanding how it might impact vital assets is the most difficult challenge facing security professionals. In the past, security teams might have complained about not having enough intelligence data to make accurate predictions. Today, the exact opposite might be true – there is too much data! With crime and incident data coming from law enforcement agencies, photos and videos coming from people on the front line, topics trending on social media and logistical information originating from internal systems it can be almost impossible to locate a real signal among all the noise and chatter. Being able to easily visualize all this intelligence data within the context of an organization’s assets is vital to understand the relationship between threat data and the individuals or facilities in harm’s way. Social Media Monitoring Free tools like Google Maps or satellite imagery from organizations like AccuWeather, for example, can help understand how fast a storm is closing in on a manufacturing facility, or how close an active shooter is to a school. Their usefulness, however, is limited to a few event types and they provide only a very macro view of the crisis. Data from building access systems, wifi hotspots, corporate travel systems, among others, can be used to create a profile Critical event management (CEM) platforms, however, are designed specifically to manage critical events of all types and provide much greater visibility. Internal and external data sources (weather, local and national emergency management, social media monitoring software, security cameras, etc.) are integrated into these platforms and their data is visualised on a threat map. Security teams can quickly see if there are actual threats to the organizations or communities they are protecting and don’t lose time trying to make sense of intelligence reports. The more they can see on a ‘single pane of glass,’ the faster they can initiate the appropriate response. Locating A Threat Once a threat has been deemed a critical event, the next step is to find the people who might be impacted – employees/residents in danger, first responders and key stakeholders (e.g., senior executives or elected officials who need status updates). Often, this requires someone on the security team to access an HR contact database and initiate a call tree to contact each person individually, in a specific hierarchical order. This can be a time-consuming and opaque process. There is no information on the proximity of that person to the critical event, or if a person has skills such as CPR that could aid in the response. Ensuring ahead of time that certifications, skill sets, or on-call availability is included with contact information can save valuable time in the middle of a crisis response. Going even further, data from building access systems, wifi hotspots, corporate travel systems, among others, can be used to create a profile of where a person just was and where he or she might be going in a CEM platform. This information can be visualized on the threat map and help determine who is actually in danger and who can respond the fastest. The emergency response then becomes targeted and more effective. Security teams can quickly see if there are actual threats to the organizations or communities they are protecting Acting And Automating The third step is to act and automate processes. If there is a tornado closing in on a town, for example, residents should not have to wait for manual intervention before a siren is activated or a message sent out. Organizations can build and execute their standing operating procedures (SOPs) fully within a CEM platform. Sirens, alarms, digital signs and messages can all be automatically activated based on event type, severity and location. Using the tornado example, an integration with a weather forecasting service could trigger the command to issue a tornado warning for a specific community if it is in the path of the storm. Summon Security Guards Warning messages can be prepared in advance based on event type so there is no chance of issuing a misleading or unclear alert Warning messages can be prepared in advance based on event type so there is no chance of issuing a misleading or unclear alert. All communications with impacted individuals can be centralized within the platform and automated based on SOP protocols. This also includes inbound communications from first responders and impacted individuals. An employee confronted by an assailant in a parking garage could initiate an SOS alert from his or her mobile phone that would automatically summon security guards to the scene. Conference lines can also be instantly created to enable collaboration and speed response time. Additionally, escalation policies are automatically engaged if a protocol is broken. For example, during an IT outage, if the primary network engineer does not respond in two minutes, a designated backup is automatically summoned. Eliminating manual steps from SOPs reduces the chance for human error and increases the speed and effectiveness of critical event responses. Analysis Of A Threat Looking for ways to better prepare and respond to critical events will not only improve performance when similar events occur again It’s not uncommon for security and response teams to think that a critical event is over once the immediate crisis has ended. After all, they are often the ones pushing themselves to exhaustion and sometimes risking life and limb to protect their neighbours, colleagues, community reputations and company brands. They need and deserve a rest. In the aftermath of a critical event, however, it’s important to review the effectiveness of the response and look for ways to drive improvements. Which tasks took too long? What resources were missing? How many times did people respond quickly? With a CEM platform, team performance, operational response, benchmarking data and notification analysis are all captured within the system and are available in a configurable dashboard or in after-action reports for analysis. Continuously looking for ways to better prepare and respond to critical events will not only improve performance when similar events occur again, but it will also improve response effectiveness when unforeseen events strike. Coordinate Emergency Response Virtually every organization has some form of response plan to triage a critical event and restore community order or business operations. While many of these plans are highly effective in providing a structure to command and coordinate emergency response, they are reactive in nature and don’t account for the full lifecycle of a critical event – Assess, Locate, Act and Analyze. Whether it’s a large-scale regional emergency or a daily operational issue such as an IT outage, a comprehensive critical event management strategy will minimize the impact by improving visibility, collaboration and response.
Using a smart phone as an access control credential is an idea whose time has come – or has it? The flexible uses of smart phones are transforming our lives in multiple ways, and the devices are replacing everything from our alarm clocks to our wallets to our televisions. However, the transformation from using a card to using a mobile credential for access control is far from a no-brainer for many organizations, which obstacles to a fast or easy transition. We asked this week’s Expert Panel Roundtable: When will mobile credentials dominate access control, and what are the obstacles to greater adoption?
In 1973, a brilliant economist named E.F. Schumacher wrote a seminal book titled ‘Small Is Beautiful:’ taking an opposing stance to the emergence of globalization and “bigger is better” industrialism. He described the advantages of smaller companies and smaller scales of production, highlighting the benefits of building our economies around the needs of communities, not corporations. In almost every industry or market that exists in the world today, you're likely to find a difference in size between companies. Whether it’s a global retail chain versus a small family-owned store, a corporate restaurant chain versus a mom-and-pop diner or a small bed and breakfast versus a large hotel chain — each side of the coin presents unique characteristics and advantages in a number of areas. Disparity In Physical Security Industry Customers are drawn to products and services from large enterprises as the big names typically imply stability This disparity very clearly exists in the physical security industry, and differences in the sizes of product manufacturers and service providers could have important implications for the quality and type of the products and services offered. All too often, customers are drawn to products and services from large enterprises, as the big names typically imply stability, extensive product offerings and global reach. And that's not to say that these considerations are unwarranted; one could argue that larger companies have more resources for product development and likely possess the combined expertise and experience to provide a wide range of products and services. But the value that a company’s products and services can bring isn’t necessarily directly related to or dependent on its size. In an age where the common wisdom is to scale up to be more efficient and profitable, it’s interesting to pause and think about some of the possible advantages of small- and medium-sized businesses (SMBs). Typically, “small” companies are defined as those with less than 100 employees and “medium” with less than 500. Providing Social Mobility Schumacher argued that smaller companies are important engines of economic growth. Indeed, according to the Organization for Economic Cooperation and Development (OECD), a group of 36 member countries that promotes policies for economic and social well-being, SMBs account for 60 to 70 percent of jobs in most OECD countries. Importantly, SMBs provide resilience in that there are often large economic and social impacts when big companies fail. Smaller companies are better for regional economies in general, as earnings stay more local compared to big businesses, which in turn generates additional economic activity. SMBs are also better at providing social mobility for disadvantaged groups by giving them opportunities and enabling them to realize their potential. Smaller companies are often more innovative, bringing to the market novel technologies and solutions such as Cloud, analytics, AI, and IoT New Companies Introduce New Technologies There's no denying the role of start-ups when it comes to innovation. In the security industry, many new technologies (e.g. Cloud, analytics, AI, IoT) are first brought to the market by newer companies. In general, smaller companies’ products and services often have to be as good or better than others to be competitive in the marketplace. They are therefore often more innovative, bringing to the market novel technologies and solutions. And these companies are also more willing to try out other new B2B solutions, while larger companies tend to be more risk-averse. Customer Service Aside from the quality of products and services, arguably one of the most important components of a security company’s success is its ability to interact with and provide customers the support that they deserve. Smaller companies are able to excel and stand out to their customers in a number of ways: Customer service. Customers’ perceptions of a product’s quality are influenced by the quality of support, and smaller manufacturers often possess a strong, motivated customer service team that can be relatively more responsive to customers of all sizes, not just the large ones. A superior level of support generally translates into high marks on customer satisfaction, since customers’ issues with products can be resolved promptly. Flexibility. SMBs have a greater capacity to detect and satisfy small market niches. While large companies generally create products and services for large markets, smaller companies deal more directly with their customers, enabling them to meet their needs and offer customized products and services. And this translates to adaptability, as SMBs become responsive to new market trends. By having a pulse on the market, smaller companies have much more flexibility in their supply chain and can adjust much faster in response to changing demand. Decision-making. Smaller companies are much more agile in decision-making, while larger enterprises often suffer from complex, tedious and lengthy decision-making processes. Communication is easier throughout SMBs, as smaller teams enable new ideas to flow and can solve problems faster. Job Satisfaction Employees working for SMBs connect more directly with the company's goals and objectives, which in turn increases motivation and job satisfaction Employees working for SMBs connect more directly with the company's goals and objectives, which in turn increases motivation and job satisfaction. SMBs are also generally more connected to local communities and participation in community activities leads to a greater sense of purpose. Additionally, SMBs have a much smaller impact on the environment, which is increasingly becoming an important consideration for today’s employees and customers. Though Schumacher's book takes a much deeper dive into the large global effects of scale on people and profitability, the general impact of a company’s size on its products and services is clear. It’s important for all players in the security industry to remember that the commitment and dedication to product quality can be found in businesses of all sizes. Ensuring Safety Of People, Property And Assets Large manufacturers may catch your eye, but small business shouldn’t be forgotten, as they can offer end users a robust set of attributes and benefits. While all security companies are aiming to achieve a common goal of providing safety for people, property and assets, smaller businesses can provide extensive value when it comes to driving the economy, innovating in the industry, providing quality employment and offering superior customer service.
Repercussions are rippling through the physical security industry since President Trump signed into law the ban on government uses of surveillance equipment by Chinese manufacturers Hikvision and Dahua. In addition to the direct and indirect consequences of the new law, there have also been other developments likely to impact the future of Chinese companies in the video surveillance market. The ban has raised awareness of Chinese companies’ role in video surveillance, and other developments are related to tariffs and possible sanctions, all playing out amid the backdrop of an escalating trade war. One Chinese manufacturer previously dismissed security concerns about its role in video surveillance as “Cold War rhetoric.” There has been an almost nostalgic tone recently to the escalating concerns about video cameras being used for spying. Hikvision and Dahua have both stated emphatically that they have not conducted any espionage-related activities. Even so, the U.S. government ban has emboldened the concerns. However, to be clear: No one has alleged that technologies from either of the companies have been used for espionage. Rather, the concerns are about the potential for misuse, not actual misuse. Also aggravating the situation are Chinese companies’ previous, actual problems with cybersecurity, which the companies say they have addressed. Here are some recent developments related to the U.S. government ban and Chinese manufacturers in general: Tariffs And Trade Concerns Additional rounds of U.S. tariffs have targeted an expanding array of Chinese goods, including data storage and processing components such as printed circuit boards, as well as video camera lenses. The escalating trade war has kept generalized concerns about China and its trade practices in the public eye and fomented a level of uncertainty in many markets, including physical security. Additional rounds of U.S. tariffs have targeted an expanding array of Chinese goods Involvement Of Surveillance In Chinese Human Rights Violations Concerns have surfaced in a Congressional hearing recently about the Chinese government’s surveillance activities targeting the Uyghurs and other Muslim ethnic minorities in the Zinjiang Urghur Autonomous Region (XUAR). Specific attention is being directed at the region’s surveillance system including “thousands of surveillance cameras, including in mosques,” and Hikvision and Dahua were mentioned in the Congressional hearing as profiting from security spending in the area. Increased Global Media Attention The ban has not been widely publicized in the U.S. mainstream media, but the topic has attracted global attention. For example, the Australian Broadcasting Corporation broadcast a 10-minute expose on the use of Chinese-made cameras in Australian government facilities, including “sensitive military facilities.” The report, which mentioned the U.S. ban, noted that “Both [Hikvision and Dahua] have had security flaws be exposed leading to fears that some of the flaws were placed there to help the Chinese government spy.” The report continues: “China is trying to set itself up as the number-one country for cyber-espionage, and this is part of that platform.” How broadly should one interpret the inclusion of "critical infrastructure" mentioned in the bill? Broader Interpretation Of The Bill Beyond The Federal Government The language in the bill leaves a level of ambiguity in terms of the scope of its application, and the security marketplace as a whole has been struggling to understand its full impact. Does the ban only restrict an integrator’s use of Chinese technology on a specific government job, or does it eliminate an integrator who installs the technology (even in non-government projects) from consideration for government jobs? How broadly should one interpret the inclusion of “critical infrastructure” mentioned in the bill, for example, non-governmental facilities? Will other governments and private entities assume they should ban Hikvision and Dahua in order to be compliant? For example, Suffolk, VA., has announced it will not to use Dahua or Hikvision cameras because the federal ban applies to “U.S. government-funded contracts and for critical infrastructure and national security usage.” The result of these developments is a kind of snowball effect, simultaneously drawing attention to the issues and adding new elements to an overall narrative. Taken together, these developments suggest the U.S. ban has set off a level of concern about Chinese companies that will have an industry-transforming impact in the months to come.
Newly modernized halls with lots of daylight will house hundreds of exhibitions and conference events at the upcoming Security Essen 2018 at Messe Essen, Germany. A new layout and hall numbering system will be unfamiliar to past attendees but promises to simplify the experience as it brings together attendees and exhibitors. European Physical Security Market Security Essen is an international trade fair, but the emphasis is more on German, Austrian and Swiss companies. In all, Security Essen will feature 1,000 exhibitors from 40 nations. The trade fair has more of a continental European “flavor” compared to IFSEC, which focuses more on the U.K market. At the last Security Essen in 2016, organizers reported about 40,000 visitors including conference participants, VIP guests, members of various delegations and journalists. Security Essen 2018 has more of a continental European “flavor” compared to IFSEC, which focuses more on the U.K market “This year, we have sharpened the profile of Security Essen,” says Oliver P. Kuhrt, CEO of Messe Essen, a trade fair, congress and event organiser with its own exhibition grounds. “The trade fair has become considerably more digital, more modern and more interactive. Due to the optimized hall layout, we are offering our exhibitors and visitors the best possible experience with short paths and direct communication.” Newly Modernized Messe Essen The newly modernised site of Security Essen will encompass eight halls, newly renumbered and with the subject areas reorganised, too. Visitors will find Services in Hall 1; Access, Mechanatronics, Mechanics and Systems in Halls 2 and 3 and the Galeria; Perimeter Protection in Hall 3; Video in Halls 5 and 7; and Fire, Intrusion and Systems in Halls 6 and 7. A helpful smart phone app, downloadable free from the Google Play Store (Android) or the Apple App Store (iOS), will be available two weeks before the event and include a show floor plan; the exhibitor list with booth numbers and contact information; and an overview of the supporting program. A separate hall – Hall 8 – will house new Cyber Security and Economic Security categories. Cyber Security Conference At the new Cyber Security Conference, located prominently at the new East Entrance, experts will share their knowledge about the more pressing challenges and potential of cybersecurity. The program opens and closes on 25 and 28 September with the main topic “Opportunities and Risks of Cyber Security”. On 26 September, discussions and lectures will center on “Entry, Admission, Access: Identification Options”.A helpful smart phone app, downloadable free will be available two weeks before the event and include a show floor plan On 27 September, the topic will be smart homes and focus on “Connected Building, Security in the Buildings of the Future”. Speakers will include the president of Germany’s Federal Office for Information Security, who will address cybersecurity as a challenge for politics, business and society. The fair organises the conference in cooperation with the BHE Federal Association of Security Technology and the technical support of the Federal Office for Information Security. In Hall 8, a new Public Security Forum will enable visitors to experience digital security technologies for public spaces from the areas of sensors/IoT, cyber security and surveillance. The products and solutions will be installed in four different building scenarios (town hall, school, hospital and library) and it will be possible to test them extensively. The forum, including lectures and discussions, will target municipal decision makers and planners of public spaces. Comprehensive Program A Security Expert Forum in Hall 2 will present a continuous program with more than 90 presentations during the period of the fair. Visitors will obtain information and solution ideas about all six subject areas covered at the fair, and the program will begin with a keynote lecture each morning and finish with a live demonstration in the evening. On the first day of the fair (25 September), Security Essen’s Career Forum will introduce retrainees, students, trainees and graduates to companies from the security industry. Targeted and professional communication will be established between companies and job applicants to facilitate making contacts, developing networks, and filling actual vacancies. Thursday (27 September) will be observed as Fire Prevention Day, and a Drone Course will be provided each day in Hall 7. One day admission to Security Essen is €41; a four-day ticket is €105. Advance sale tickets are discounted.
Gordon Buchanan, a freelance cameraman who sometimes works for the BBC, claims Bosch's AEGIS UFLED infrared illuminators have revolutionised night-time filming.Lost Land of the Volcano is a three-part nature documentary series that follows a scientific expedition to the island of New Guinea. During filming an international team of scientists, cavers and wildlife filmmakers ventured deep into the heart of the remote tropical island of New Guinea to explore a giant extinct volcano - Mount Bosavi. The team lived deep in the rainforest and searched for rare and endangered species.Using Bosch's AEGIS illuminators, the team found a previously undiscovered species of cuscus in the crater, where it has developed in isolation from its other relatives, in time becoming a sub species of the silky cuscus family. Identified as it left its daytime hideout and went in search of food in the forest at night, the Bosavi cuscus - which looks like a small bear - is a marsupial that lives in trees, feeding on fruits and leaves.Having struggled for more than a decade using what he describes as ‘Frankenstein' like lighting contraptions ranging from rally car headlights and hunting spotlights, Gordon has welcomed the advances in infrared technology that enable him to capture broadcast quality night-time footage. "Every lighting method I have used up until recently has had a drawback - carrying heavy acid batteries on my back and only having two hours filming power being just one of them," he says. "Now the team is able to access more remote areas as transporting compact infrared units is no longer an issue. The battery packs last for several hours and are interchangeable with our cameras."Field of view was another issue for Gordon. Historically illuminators have provided an uneven blanket of light causing ‘hot spots' in the captured image but, as Gordon explains: "The AEGIS UFLED units give the most consistent covering of light of any I have trialled. The distance the infrared light travels is also second to none. Whenever I am planning a shoot, Bosch's IR units will be one of the first pieces of kit in my bag."
It’s widely known that used copper commands a high price on the re-sale market worldwide; and it has turned out to be far higher than expected for thieves who broke into a recycling center in Denmark to steal copper-based cables. The thieves had taken action to bypass the CCTV system but ended up revealing themselves anyway, thanks to a Visonic RealAlarm™ visual alarm verification system – ending with their capture and arrest. Lars Ellesgaard, from ADI Denmark, tells the story: “AlmstenSikring, one of my customers, wanted to test the PowerMaster-10 security system with RealAlarm visual alarm verification at a recycle center that was being targeted by night-time thieves stealing cables in order to get copper,” says Ellesgaard. “The customer made a box for a Next CAM detector, so that the detector could sit outside on the building. We installed a PowerMaster-10 control panel with wireless connection to three Next CAM PG2 detectors. The panel is connected to our PowerManage server at the ADI central monitoring station, enabling our customer to receive alerts when the alarm is activated.” Security system installed in the right place, at the right time The action began right away, with an alarm activated on the first night after the system was installed. “In the alert that was sent in an email to the monitoring station, the team could see three thieves walk around in front of the Next CAM detector” recalls Ellesgaard. “The fun part is that the recycling center had a CCTV system on the building and on one of the video clips from the Next CAM, they saw one of the thieves with a covered face walk to the CCTV camera and tip it downward, remove the cover from his face, and then look straight up at the Next CAM (which got a good picture of him) and walk away. He thought the Next CAM was just a regular PIR detector!” Plans are underway to install Real Alarm at another five recycling sites around Denmark The thieves managed to get away that night, but their freedom was short-lived. “Two nights later there was an alarm again, and this time a guard and the police were ready and showed up with three dogs. Two thieves were captured in a little forest next to the recycling center and the third thief was captured two blocks away by the dogs,” reports Ellesgaard. ADI Denmark moved the Real Alarm system and three Next CAMs to another recycling center owned by the same customer. There too, thanks to the visual alarm verification system, three more thieves were captured, along with two girls who were waiting nearby in their getaway car. Having caught two teams of thieves red-handed, the recycling center management is planning to install Real Alarm with the Powermaster-10 control panel and Next CAM detectors at another five of its sites around Denmark.
Rye Meads is situated next to the River Lee on the outskirts of Hoddesdon in Hertfordshire. Visitors can view the various wildlife areas including reedbeds, open water, woodland and meadow, whilst utilising the observation hides to watch the wildlife close-up.Summer attractions include a colony of common terns that nest on specially made rafts in the lagoons, whilst kingfishers breed in an artificial sandbank. During winter, shoveler, gadwall and tufted ducks can be seen on the open water. With this diverse wildlife resource has come increased visitor numbers and RSPB management felt a comprehensive update of their original CCTV system was called for. By taking advantage of the latest developments in CCTV technology, they aimed to increase visitors' enjoyment of the reserve, as well as providing a surveillance tool for disabled visitors to view the full array of wildlife attractions available. To progress the upgrade, Rye Meads management turned to Ron Rigby of Aaction Electronics, whose experience of large outdoor systems would prove invaluable in the delicate installation of the reserve's CCTV system. After a comprehensive site survey Aaction Electronics specified Dennard 2060 dome cameras to cover the sixty-acre site. These were positioned on the outside of the hides (providing visitors with a view of the site in poor weather conditions) and on the manmade rafts in the main lagoon (giving an unprecedented close-up view of the nesting birds). Due to the geographical nature of the area, Ron was required to address many issues when specifying a transmission system to relay images from the isolated cameras. Minimal disturbance to the reserve was a priority both in the time taken to complete the installation and the civil works required. As multiple cameras were sited on the lagoon rafts, the video transmission system had to cross a large amount of water. The answer was provided utilising Network Video Technologies' (NVT) video transmission equipment and Unshielded Twisted Pair (UTP) cabling housed within a waterproof casing. As an alternative to coax cabling, this brought several advantages, Ron Rigby explains: "The hostile nature of the reserve's environment required a robust and reliable video transmission method. With NVT and UTP we were confident of its performance under these conditions. In addition, the cost savings over a coax-based system were substantial, with the additional advantage of a quick and easy installation resulting in minimal disruption to the reserves visitors and its wildlife." Using NVT's Active Transmitters and Receivers meant Ron could draw on NVT's technical resource and support to achieve a perfect signal. As Ron explains: "NVT's expert help and technical backup was invaluable in a diverse and challenging project such as this, and their products' consistent quality of interference free image meant that we could be confident of yielding the same high standard of picture display for each and every camera." RSPB Rye Meads now own and operate a high-tech CCTV system that provides visitors with an intimate view of the rare birds and their habitat. The high-quality images provided on NVT UTP are distributed to a central control point onsite. They can also be viewed on screens within the public areas and worldwide, via a live IP link to the RSPB website.
With a history spanning over 180 years, University College London (UCL), is one of the oldest and most well known seats of learning in the UK. Secured with a CCTV system comparable in size to most town center installations, UCL's security management are now reaping the numerous cost and performance benefits of a NVT UTP Hybrid Video transmission solution, designed to cater for ever-expanding camera numbers. Today, UCL continues to be London's leading multidisciplinary university, with 8,000 staff and 22,000 students, from over 150 countries, and is proud to be a true global university and research center of world-renown. With a central campus located on Gower Street in the Bloomsbury area of London, the university continues to expand within new buildings located throughout the area. UCL's mix of faculties, spread over an openly accessible campus area, has provided the university's management with quite a challenge to meet the requirement for an effective security surveillance solution. A primary CCTV system, consisting of 25 external cameras, was installed eleven years ago, covering the main pedestrian and vehicular routes on campus. Growing through the years via a series of expansions, 2003 saw the disparate elements of the CCTV network consolidated into a more focused structure. Paul Hayden, Control Room Manager at UCL explains: "By this time we had quite a large system connected via an ageing and complicated coax cable network. At that time, we wanted to add a number of cameras and relocate the control room, so it seemed an ideal point to re-evaluate the system's direction. With technical input from our onsite contractor, Trio Security Systems Ltd we redesigned the system from the ground up. Taking into account the long-term needs and tight budget constraints of both our new and existing camera network, we established that our needs would be best served through the installation of an NVT UTP video transmission system." UTP vs. coax Andy Halcro, Director of Trio Security Systems explains: "Introducing the use of NVT UTP video transmission meant the university would no longer be tied to the existing coax network that had become cumbersome, as well as difficult and costly to expand, particularly in view of the kind of additional camera numbers they required. "The university consists of several, historically important buildings, some of which date from the beginning of its 180-year history. Using NVT UTP meant we could harness the video transmission potential of the university's Twisted Pair cable infrastructure, already installed as part of its internal telephone network, but not fully utilised. This comprehensive network, which connects all of the university's buildings, is contained in underground ducting alongside other building infrastructure, such as power and data communication services. Capitalising on NVT's inherent interference rejection capabilities allowed direct connection to this network, with no interference issues from other services being experienced whatsoever. "During the relocation of the control room, it was important that images from each live camera incurred minimal downtime. Using NVT transmission we were able to patch images across to the new UTP network utilising NVT's rack-mounted receivers, keeping images streaming into the old control room, before we simply unplugged the relevant connection and reconnected it into the new control room facility. This afforded a seamless transition between the two, and meant the university didn't lose any camera footage throughout the system change-over period." Superior video LCD monitors show live high quality camera footage at the entranceways of UCL's main buildings Paul Hayden adds: "The process of unplugging the coax cables and instantly replacing it with NVT UTP transmission from the same camera really highlighted the difference in image quality between the two transmission methods. The NVT UTP images were noticeably sharper and a clear improvement over the previous coax based pictures." Using NVT technology to transmit video on a Twisted Pair cable infrastructure that already existed at the site also meant ideal scene coverage could be achieved for each camera, by affording exact camera placement within these historical surroundings, Paul Hayden explains: "By utilising compact and flexible UTP cable runs, versus the burden of cumbersome coax bundles, we were able to mount cameras in the best possible locations, even within the 180 years old buildings, where disturbing historical fixtures and fittings was just not an option!" Hybrid analog-IP solution "Images from each camera are transmitted to multiple NVT NV-862, NV-1662, and NV-3262 Active UTP video receiver hubs located in a purpose-built equipment room, adjacent to the new control room." Andy Halcro continues: "For the CCTV system's control and recording we made the decision at the start of the project to use a Pelco IP-based control system, but wanted to avoid the use of a total IP infrastructure and its associated limitations, such as equipment cost and control latency. This is where using NVT's UTP technology to provide a Hybrid Video solution gave us the benefits of both worlds, with none of the drawbacks, obviating the need for expensive and comparatively poor performing IP cameras, along with the latency control issues associated with an end-to-end IP network. The high-quality analog camera images received in the adjacent equipment room are now encoded and transmitted via a dedicated IP network, to the control room next door, where a team of two operators control and monitor the images via a video wall and spot monitors. Recording is provided by multiple DVRs, again located in the equipment room. "The system now covers all aspects of the university's buildings, many of which are Pelco domes supplied with NVT connectivity already built-in, making them very quick and easy to integrate. In addition, we now have a scaleable system, affording the ability to connect additional cameras in existing buildings to the ‘spare' UTP pairs installed. Being involved from the start with any new building works means we can specify dedicated UTP networks to be installed at the time of build. This kind of expert involvement right from the start of the project enables UCL to minimize the cost, whilst maximising the performance and flexibility of operation." Visual benefits Working in conjunction with access control and a comprehensive manned guarding team, the new CCTV system is used to protect students, staff and university facilities 24 hours a day. From the security control room, operators can access images from all campus exteriors and interiors, such as main entrances/exits, corridors, and refectory and leisure areas. "Thanks to the clarity of the NVT UTP video transmission based camera images, we can readily identify individuals from video footage, or forward prosecutional quality images if required, to the Police for further investigation." continues Paul Hayden: "The system is primarily designed to keep unauthorized people from entering the various campuses and buildings. As well as the safety of our staff, we have expensive equipment in many of the faculties, which could be targeted by thieves, so the extra ‘eyes' of the camera network are invaluable in assisting our security team, and give us an unparalleled overview of any areas of the site. The new CCTV system provides 24/7 surveillance and operators can access images from all areas around campus "During the expansion of the surveillance system, both criminal and anti-social instances were reduced dramatically the moment new cameras were introduced, an effect that was particularly evident at the number of bicycle storage areas across all campuses. We believe this effect is greatly enhanced if the presence of the cameras is promoted effectively. That's why in addition to CCTV signage, we employ large LCD displays in the entranceways of main buildings. These show live camera coverage of the immediate vicinity and are a great way of reinforcing the quality of images we have available from the system. They also for example, provide a measure of reassurance for female staff leaving the building late at night, as they can check the surrounding area outside the building before they leave. "We also use the system to track vehicular movements around the campuses. With space being limited and having to manage quite a number of deliveries most days, it is important that we manage the onsite traffic movement in the most effective way. The system has also proved a great health and safety management tool in other instances too, such as within the clean environment rooms of our Nano Technology building, where the adherence to Health and Safety protocols is critical." The latest expansion to the system has included UTP video transmission runs of over 900 metres and uses the latest NVT Digital EQ hubs, sourced from Norbain. Andy Halcro enthuses: "The continuous self adjustment of the Digital EQ Hubs means as well as fast installation, any variation in video signal content is automatically compensated for. For instance, if university telecom engineers replace a section of old UTP cable across the university network, this can alter the signal received by the hub in the communication room, but with NVT's Digital EQ hubs, this is automatically compensated for, with no intervention being required by us, in the long term saving time and money on service call outs." As University College London continues to expand on, and improve its network of buildings, the NVT UTP Hybrid Video transmission solution will continue to provide the key to a high performance, cost effective and flexible future-proofed electronic surveillance network.
Established in 1923, Solheim Lutheran Home in Los Angeles is a non-profit nursing home that provides assisted living for seniors. Solheim Lutheran Home spans over two and one half acres and is home to residents from all walks of life, from former teachers to a World War II fighter pilot.Solheim Lutheran Home is a busy place. Licensed charge nurses are on duty 24/7 here and look after nearly 200 residents. They required a surveillance camera to help keep an eye on the residents. They had several requirements that had to me met. First, images had to be high quality, day or night. Staff had to be able to quickly ID a person. Next, the cameras had to be easy to use. Nurses needed to be able to do a quick playback and take snap shots with little training. Third, the parking lot had to be monitored. Car make and model, license plate and the surrounding areas all needed to be obtained.Several security solutions were considered. In the end, MESSOA cameras were chosenMESSOA cameras were handpicked for this job. They were chosen for their specific abilities.MESSOA NDR890 fixed dome cameras and NCR875 infrared bullet cameras installed outside to watch the whole street With the Messoa cameras, the building perimeters could be closely monitored for increased safety The NDR890 was placed near the entrances to the building for wide area monitoring. Cameras covered every angle at the main entrance where a major street was located. The NCR875 was used for mid-range area monitoring. These Messoa cameras were installed to watch the building perimeters including side streets and sidewalks. Most of these areas had little to no light. However, that wasn't a problem. The NDR890 and NCR875 could still see anybody who entered or exited the building and even track them down streets.Messoa NDF820 cameras were selected to be installed at the check-in points of the nursing home. They watched and recorded everyone who passed by these areas. Management at Solheim wanted a camera that was powerful yet affordable and packed full of features. That's what they got with the NDF820.Nurses found the MESSOA cameras simple to understand and operateAfter installation was complete, the nurses got to test out the new system. It was so simple that they hardly needed any additional training to learn how to operate the cameras. "It really is simple to use the camera software. I learned how to play back videos and take snap shots in less than 5 minutes. Most of it is common sense," explained one nurse.Nurses are satisfied with the ease of use. Management felt like they got the most bang for their buck and residents feel more comfortable knowing that their care has been given the utmost priority.
Crime, loitering and general disorder are common problems at inner-city, public housing sites. Most of the crime is committed by outsiders who typically come into the facility to deal drugs, gamble, drink or congregate. At the very least, this is disturbing to the housing residents and often progresses to include property damage, vandalism and theft. At its worst, residents may be verbally and/or physically assaulted as they enter and leave their homes. Such was the case with the Housing Authority of Joliet, located in Joliet, IL. Since the housing authority’s security force is limited and local police cannot be everywhere, an innovative and cost-effective solution was required. The solution was to install a video surveillance system that would not only record criminal activity, but deter it. Most video surveillance systems could be considered passive systems that trigger an active response, that is, some activity is observed and guards or law enforcement are deployed to the site to investigate, intervene or make an arrest. As video systems have evolved and technology has advanced, this is beginning to change with on-site equipment now able to provide a primary level of deterrence without the need for security to deploy to the site every time an incident occurs. A highly effective solution that provides primary deterrence was proposed to the Housing Authority of Joliet by Commercial Electrical Systems (CES). It's All in the Integration CES, a systems integrator located in Joliet, IL, recommended a custom designed system that combined the latest in IP Video Surveillance, Wireless Mesh Networking and an on-site method of deploying the system that both protects the equipment and provides an active alarm when the security team wants to let the “bad guys’ know that they are being watched and that they should leave. To provide this solution, CES led a team consisting of Vicon® Industries Inc., a leading supplier of IP Video Surveillance systems and Firetide® Inc, a leading provider of multi-service mesh networks, who joined forces to develop an innovative system that has the residents of the Housing Authority of Joliet feeling safer and more secure. CES coordinated the design of the system, including selection of the equipment, and oversaw the installation of the system and the training of the security personnel. “This project presented some interesting challenges for us,” states Bob Cmolik, Account Manager for CES, “each monitoring station is a self-contained node that operates independently, but forms a part of the wireless mesh communications network. Because the information is being transmitted over the air, security was a huge issue. The Firetide and Vicon systems worked very well together providing a flexible and secure system that would not have been possible just a few years ago.” Powerful flashing lights above the enclosures can be set off by the security staff when suspicious activity is absorbed The Video Surveillance System Vicon Surveyor VFT pan-tilt-zoom cameras, Kollector™ Network Digital Recorders/Servers and a Firetide wireless transmitter mesh node are mounted in Montel Technologies Eagle Armor enclosures approximately 30 feet above the ground. The enclosures are lined with Kevlar®, which makes the already rugged enclosures bullet-proof and almost impervious to damage or vandalism. To deter the offenders, powerful flashing lights are mounted above the enclosures that are set off by the security staff when suspicious activity is observed. This provides immediate feedback to anyone doing something that they shouldn’t be, and lets them know that if they do not leave immediately, a response is coming. Visibility is superb with the cameras mounted at the 30-foot height. Each one has a clear view extending up to four blocks away. The cameras’ ability to pan, tilt or zoom by remote command allows the security staff to see and anticipate problems before they happen. Paramount to the effectiveness of an installation like this is the system’s scalability, data preservation and security capabilities and the ability of the various parts to work together seamlessly. The experience of system designer and installer, CES, the power of the Vicon ViconNet® IP Video Management software and the reliability of Firetide’s wireless mesh networking system make this system both dependable and secure. Vicon provides a totally integrated system that includes all of the hardware required including the cameras, DVRs, servers and workstations and the ViconNet software that provides the video management system` for transporting, storing and managing digital video from multiple sources. ViconNet is highly scalable and will allow the housing authority to expand however and whenever it wants. The current setup has 5 cameras located throughout the complex providing video feeds through the wireless mesh network to the housing authority’s recreation center. From there a VPN provides the video feeds to the security control center. The Joliet Police Department can also view the video through wireless connections to laptop computers in its patrol cars. The wireless network backbone enables cameras to be installed just about anywhere without the need for running network cabling. Wireless Mesh technology makes it all possible The Firetide wireless mesh network provides the flexibility to expand the system at any time, since most, if not all, of the issues associated with locations that are too difficult, large or expensive to wire are eliminated. The wireless network backbone enables cameras to be installed just about anywhere without the need for running network cabling. On each pole, the cameras' MPEG-4 video feeds are sent to a 2.4 GHz wireless transmitter made by Firetide. These transmitters are incorporated into integrated hardware packages that serve as mesh nodes. With the ability to deploy cameras quickly and cheaply, the housing authority can expand the system with minimal additional staff or installation costs. Security is not an issue because the proprietary ViconNet software must be used to view the video. The mesh network allows every transceiver (or node) to communicate with any other transceiver on the network. This allows the signals to take the fastest possible path from one node to another, as they make their way to the local video monitoring center. The mesh network architecture also ensures signal path redundancy. If the path in one direction is blocked, the signals automatically find another way to get to their destination. A mesh network doesn't suffer the kind of bottlenecks suffered by conventional networks, due to the multiple signal paths available. System throughput is typically 25 Mbps, but speeds as high as 34 Mbps are attainable. The video is also simultaneously recorded to the video recorder/server mounted in the enclosure along with the other equipment. Again, using the mesh network, the archived footage can be managed and retrieved by ViconNet software from any place connected to the mesh network or the VPN, including transmission over the Internet. The local servers can store up to 800 GB of video, with more storage available on the workstation at the control center. Video can be copied and saved for use when prosecuting crimes. The ViconNet navigator window graphically displays a timeline of recorded video. It contains all function buttons necessary to control the playback of video. A scalable timeline can be set to define the “from” and “to” time/date intervals of video. A “Create AVI” button can be used to create an AVI file of the selected video segment. Another powerful feature that aids in searching and retrieving video is Museum Search, which allows the user to review playback video using Areas of Interest (AOI) and scalable motion detection to capture video events. Everyone's Happy But the Bad Guys The system has been a great success. Crime and loitering has diminished immensely, and the residents and employees feel safer. “The Housing Authority of Joliet is very pleased with the security camera system. Since its installation, Residents, Staff and Guests feel a higher sense of security and safety. City of Joliet Police officials also indicate anti-social activities have declined in the Housing Development as evidenced by fewer calls for police. The system has resulted in a more peaceful community.” states Henry Morris, Executive Director of the Housing Authority of Joliet. The housing authority has just placed an order to expand the current system with 2 more cameras. It also plans to equip other housing sites with the system. This combination of technologies that was not available just a few years ago has provided the housing authority with the following benefits: The deterrence capability of the system allows the guards to employ the flashing lights to disperse intruders. This is usually all that is needed to clear an area. The scalability of the system. The ViconNet software will allow the housing authority to add as much capacity it needs in the future. The flexibility of the Firetide Mesh Networking system. This allows for the placement of monitoring units anywhere they are needed without concern for running network cabling. The security of the system. The proprietary ViconNet software cannot be intercepted by unauthorized users. The seamless integration and cost-effectiveness of the system.