Aviation security
The number of women in the civil aviation workforce, especially in leadership positions like CEOs, pilots, air traffic controllers, and aircraft engineers, has been on an ascent, especially in the Middle East and North Africa (MENA) region as the global aviation industry heads toward growth and expansion. To boost their presence in leadership roles in the US$553.9 billion-value global airlines market, the International Air Transport Association (IATA), the trade association representing a...
Technology company Insta and the Finnish Defense Forces have agreed on a three-year acquisition package related to Finland's F-35 fighter program. The acquisition is based on the strategic partnership agreement between the Finnish Defense Forces and Insta and covers the years 2024–2026. The acquisition covers, among other things, building maintenance and service capabilities for the avionics of the Finnish Air Force’s Lockheed Martin F-35 Lightning II multi-role fighters, i.e., the...
Multinational companies are tapping the pioneering annual airport industry-dedicated event, set to take place in Dubai, to enter into meaningful networking as the regional airports hunt to acquire the latest technology and innovative services to meet the expectations of the fast-growing air travel market. Airport Show 2024 The 23rd edition of the dedicated B2B platform for the airports industry in the Middle East, North Africa, and South Asia (MENASA) region will be held from May 14&...
Genetec, a provider of unified security, public safety, operations, and business intelligence solutions, is pleased to announce its plans for the Passenger Terminal Expo 2024, taking place in Messe Frankfurt, Germany from April 16 – 18, 2024. Airport portfolio The company will be present at stand #D220, demonstrating its full airport portfolio designed to reduce security risk, improve planning, and automate airport operations. Representatives will be on hand to discuss the latest Genetec...
OSI Systems, Inc. (the ‘Company’ or ‘OSI Systems’) has announced that its Security division has been awarded a $16 million contract by an international airport to enhance its checkpoint security infrastructure. Checkpoint lane upgrade This checkpoint lane upgrade includes supplying advanced 920CT screening systems integrated with automated tray return systems (TRS) lanes to streamline security operations. As part of this award, OSI Systems is also expected to provide mu...
As the number of airline passengers has exploded to surpass the high pre-pandemic levels, airports across the world have been expanding and improvising their security regime and devoting wider resources to make the systems and processes smoother and free of glitches and shortcomings. The entire aviation value chain has been playing a key role in keeping the airports safe and secure as threats have remained a priority since the start of the 21st century. The threats continue to evolve...
News
International Security Expo is delighted to announce that it has appointed a new Chairwoman. Responsibilities Angela Essel, Senior Account Director MoD HQ at Thales UK, and Former Head of JSaRC, Homeland Security Group, Home Office, will be taking on the role effective immediately. Taking over from Admiral the Rt Hon Lord West of Spithead GCB DSC PC DUniv, former UK Security Minister, who steps down after having served eight years in the role, Angela will spearhead an Advisory Council that consists of an envious selection of the industry's foremost experts representing private companies, global transport hubs, critical national infrastructure, public sector, Government and more, all helping to steer the future direction and growth of International Security Expo. Work experience This broad experience working within both Government and the private sector makes her ideally suited In her previous position as Head of JSaRC, the UK Home Office’s Joint Security and Resilience Centre, Angela was a member of the International Security Expo Advisory Council and has spoken at the event’s Summit and Conferences numerous times. Angela held the post of Head of JSaRC for almost four years, moving into the private sector in April 2023 to work for Thales UK. This broad experience working within both Government and the private sector makes her ideally suited to understand the challenges and complexities of the industry as a whole, and she will bring an expert level of knowledge to the role. Targeted international delegation In 2024, International Security Expo will look to expand its international reach further, bringing together more visitors and exhibitors from even more countries through a targeted international delegation program supported by UK Defense & Security Exports (UKDSE), Department for Business & Trade. Buyers with active or future projects around the world will be attending to review cutting-edge solutions to enhance their security measures and learn more about the most pressing homeland and global security challenges and how best to solve them. Innovative solutions and services A new Aviation Security Zone will be dedicated to showcasing innovations in airport security, air traffic control systems Innovation will once again be at the heart of the event, with the exhibition floor showcasing a vast range of the latest security products and services from hundreds of exhibitors, providing groundbreaking solutions and interactive displays that collectively demonstrate the depth and breadth of innovation the security sector has to offer. A new Aviation Security Zone will be dedicated to showcasing innovations in airport security, air traffic control systems, cybersecurity for aviation, passenger screening technologies, and aircraft safety measures, aiming to bring together stakeholders who are committed to enhancing aviation security through the exploration of new technologies and strategies. Key themes In addition to focusing on international and homeland security development, key themes will also include policy updates from the Government, combatting the most prevalent serious and organized crime threats, people & skills, diversity, and sustainable security. Visitors can expect even more exciting live demonstrations, that will bring products and their applications in real-life scenarios even more to life. The event will also once again be co-located with the International Cyber Expo which will guide visitors through the ever-evolving landscape of digital security, bursting with networking and business opportunities and providing access to a highly sophisticated visitor base of IT security professionals. Positive impact International Security Expo is seen throughout the industry as one of the most respected security events" Speaking of her appointment Angela says, “I am thrilled to be taking on the Chairwoman role. International Security Expo is seen throughout the industry as one of the most respected security events, not just in the UK but globally." "I know first-hand the positive impact the event has on the industry, as well as on the safety and security of the public, so to be representing the event and leading this incredible Council of esteemed experts is a real honor. I cannot wait to help shape and develop this September’s event and those in future years.” Admiral's comment Admiral Lord West says, “It has been a privilege to spend so many years as Chairman of this exceptional event." "It is immensely gratifying to see the many thousands of visitors come through the doors each year in search of ways to make us all safer, and the positive impact this has on our security the world over. Angela did a tremendous job heading JSaRC and I have no doubts whatsoever that she will make a superb Chairwoman. I wish her the best of luck in the role.” Director's comment Rachael Shattock, Group Event Director, added, “Angela has been a valued friend of the International Security Expo for several years now, so we are delighted that she has agreed to take on the role of Chairwoman." "I am excited to see the influence she brings to the event this year and going forward, and it marks an exciting time for the International Security Expo following our recent rebrand and the exciting plans we have in place for this year. I would also like to thank Admiral Lord West for the fantastic work he has done guiding the Advisory Council and helping make the event the success it is.”
IDEMIA, the world-renowned secure identity solutions provider, in partnership with the Iowa Department of Transportation (Iowa DOT), has launched the next-generation of Mobile ID. Iowa residents can download the Iowa Mobile ID app from the Apple App Store or Google Play and start using it immediately to verify their identity from their mobile phone at TSA PreCheck® checkpoints at both the Des Moines International Airport and Cedar Rapids Municipal Airport, in addition to other participating airports in the country. Fully interactive identity solution This fully interactive identity solution has the capability to be used for identity verification This fully interactive identity solution has the capability to be used for identity verification at participating businesses, government agencies, and other organizations both in-person and online. Developed with IDEMIA’s patent portfolio and with principles of privacy by design, end-to-end security, and interoperability in mind, the Iowa Mobile ID is designed to conform to the International Organization for Standardization (ISO) standard for the mobile driving license (ISO 18013-5). Robust security features provide a high level of assurance, so relying parties of mobile ID can be confident that mobile ID holders are who they say they are. IDEMIA’s Mobile ID verification technology (ID Verify SDK) The state of Iowa has also integrated IDEMIA’s Mobile ID verification technology (ID Verify SDK) in the Iowa Alcoholic Beverages Division’s Age to Purchase app, which enables users to scan driver’s licenses with their smartphone. This app allows anyone selling age-restricted products such as alcohol or tobacco to quickly and directly determine the validity of the digital driver’s license and age of the customer using a built-in scanning function. Mobile ID allows Iowans greater control of their information Mobile ID allows Iowans to be in greater control of their information Mobile ID allows Iowans to be in greater control of their information, as users approve requests for each transaction, before any information is shared. Kim Reynolds, the Governor of Iowa, said “Iowa is the first state in the nation to roll out a mobile ID with a large number of businesses across the state capable of accepting the ID. I’m so proud of the DOT and the Department of Revenue’s Alcoholic Beverages Division working together on an innovative solution that provides convenience and added security for Iowans as they use their IDs for a variety of purposes.” Mobile ID App registration process The mobile ID App registration process contains multi-step verification for security and protection. Users register their device’s phone number, binding the mobile ID to their device and their device only. Next, following IDEMIA’s patented methodology, users capture both sides of their state issued physical ID using their smartphone camera and take a selfie that includes liveness detection. This information is verified against what is on file with the system of record, the Iowa Department of Transportation (Iowa DOT), as the second authentication factor. Once identity is confirmed, registration is complete. The third and final authentication factor is when users select and confirm a personal identification number, stored only on the device. Use biometrics, such as Face ID or fingerprint to access the app Users can also use other biometrics such as Face ID or fingerprint to access the app. With IOWADOT pushing regular credential updates to the Iowa Mobile ID app, Iowa businesses can have the most-up-to-date status, including if an ID has been revoked or canceled. With our long-standing partnership, Iowa has been a key player in this transformation since Day 1" Michael Hash, the Senior Vice President (SVP), Civil Identity for IDEMIA Identity and Security North America, said “As the world becomes increasingly more technologically advanced, it is vital state governments join the digital transformation journey, in order to continue to serve their residents, such as offering a convenient, secure, and trusted mobile identification.” He adds, “With our long-standing partnership, Iowa has been a key player in this transformation since Day 1, leading not only their state, but also other states along this journey.” Iowa – first state to deploy IDEMIA’s mobile ID platform Iowa was the first to launch a mobile driver license pilot in the nation using IDEMIA’s technology in 2015 and paved the way for states to step into mobile identification. Now, Iowa is the first state to launch IDEMIA’s latest mobile ID platform, which is designed to support the evolution of the ISO 18013 standard and AAMVA mID Implementation guidelines. With mobile ID, users must consent to sharing their information. Verifiers can identify customers while guaranteeing their privacy, as no personal customer information is stored on the device. Oklahoma, Delaware, Arizona, and Mississippi are additional states that have rolled out IDEMIA’s Mobile ID technology, with more states to launch later this year.
The Security Executive Council proudly welcomes Mark Kelly and Bill King as their two newest Subject Matter Expert Faculty and Dave Komendat as Emeritus Faculty. Mark Kelly Mark Kelly has more than 25 years of experience managing global security programs for major multi-national organizations. His expertise spans the overall suite of physical security programs, but he specializes in supply chain security. He is the former Global Head of Field Security and Supply Chain operations for Dell, the former Senior Director of Field Security for McKesson, and he has held regional loss prevention roles for several retailers. Work experience He has also managed and mentored large teams spanning the globe and protecting offices Mark has developed end-to-end supply chain integrity and security programs for manufacturing and logistics operations, including third-party relationships and dependencies. He has also managed and mentored large teams spanning the globe and protecting offices, warehouses, manufacturing, and data center locations. Mark sits on several advisory boards and has been a repeat guest lecturer at Georgetown University as part of their Master’s program in Supply Chain. Bill King Bill King boasts more than 40 years of military and contract security experience. Bill spent 27 years in the U.S. Marine Corps, where he served as an infantryman, reconnaissance specialist, drill instructor, and Counterintelligence Agent. He has held management positions within the contract security business ranging from Security Officer to Vice President/General Manager. Industry Expert He is skilled in business development, officer training, fire and life safety training, and security program design He has worked extensively with large multi-facility clients, corporate campuses, and industrial and government facilities, and he is skilled in business development, officer training, fire and life safety training, and security program design. Bill is active in both professional and civic organizations including ASIS and the Marine Corps Counterintelligence Association. Dave Komendat Dave Komendat retired as the vice president and chief security officer for The Boeing Company, a role he held for 14 of his 36 years in the security profession. Komendat was responsible for the company’s global security and fire protection policy and procedures, site security, executive protection, supply chain and aviation security, structural and aircraft fire protection, government and proprietary information security, classified cyber security, strategic intelligence, international security, business continuity and disaster preparedness, Global Security Operations Center, and security background investigations. Experience and award In 2018, Dave was awarded the Director’s Award for Exceptional Public Service by FBI Director Christopher Wray He represented Boeing as past co-chairman and current board member on the Domestic Security Alliance Council and served as president of the International Security Management Association and a member of the Threats and Information Committee for the Overseas Security Advisory Council. In 2018, Dave was awarded the Director’s Award for Exceptional Public Service by FBI Director Christopher Wray. Subject matter experts The SEC is the only research and advisory firm to exclusively use former corporate security senior pioneers from Fortune 500 companies as the subject matter experts. The team leverages their experience and knowledge to help other security pioneers excel.
Last week, the 24th edition of inter airport Europe, the International Exhibition for Airport Equipment, Technology, Design & Services, ended at the Munich Trade Fair Centre in Germany after four days of flourishing business. From 10 - 13 October, more than 14,000 attendees of which over 7,500 were trade visitors came to Munich to network, discover the latest trends and developments in the airport industry and source innovative equipment and systems. This represents a 74% increase in visitor numbers compared to the previous show in 2021. The growth in visitor numbers, the high level of internationality and readiness to invest indicate that the recovery of the airport industry is in full swing. Enhanced passenger experience A total of 437 exhibitors from 37 countries showcased their products at the exhibition for the airport industry. The top-five exhibitor countries were Germany, Italy, the United Kingdom, France and the Netherlands. Visitors of inter airport Europe had a chance to explore many innovations and systems Visitors of inter airport Europe had a chance to explore many innovations and systems focusing on cost-efficiency, low or zero emission, enhanced passenger experience, automation, and digitalization. According to the preliminary results of the surveys, a total of 77% of the trade visitors made their way to the event from outside of Germany. Major visitor countries, next to Germany, were Italy, France, the Netherlands, the United Kingdom, Austria, Czech Republic, Poland, Switzerland, and Belgium. Airport-related technology There was also a notable presence of attendees from overseas countries such as Japan, the USA, UAE, Saudi Arabia, and China, which highlights the international importance of inter airport Europe. Furthermore, some 60% of all visitors do not attend any other trade show, which underlines the importance of the event in the industry. “As travel has returned to normal and passengers swarm the terminals again, the airport industry is keen to accelerate the current digitalization and decarbonization process to meet its environmental and social commitments while delivering on ROI,” says Jost Lammers, CEO at Munich Airport. He adds, “Airports like us are going to spend €250+ Mio in 2024 and with inter airport Europe, we have a unique marketplace here in Munich to meet with suppliers of airport-related technology, equipment and services from all over the globe.” International airport community More than 1,000 airport professionals had cast their votes and selected the winning companies During the first day of the show, Nicola Hamann, Managing Director of the organiser RX, opened the exhibition and greeted the speakers at the ceremony: Kay Bärenfänger, President GATE - German Airport Technology & Equipment e.V. and Jost Lammers, CEO at Munich Airport. After the opening ceremony, the inter airport Europe Innovation Award winners were announced and the awards were handed over to the winning companies. More than 30 product entries from exhibitors in the categories Terminal, Data, GSE and Sustainability were shortlisted for the awards this year and the international airport community was invited to vote online for their favorite innovation in each of the four categories. More than 1,000 airport professionals had cast their votes and selected the winning companies. Versatile signal lamps Award winner 2023 in the TERMINAL category was Rohde & Schwarz, who introduced a QPS self-screening solution, which utilizes AI-supported posture control, where passengers are automatically scanned upon correct positioning, reducing repeated scans. They received the award for their Airfield Portable Light Marking System POLARIS 2.0 The winner this year in the category DATA was ISO Software Systeme GmbH for their SKYport AOCC which integrates all operational systems i.e., AODB, RMS, CCTV or pax flow monitoring, providing a holistic view of all operational aspects. The winning company in the category GSE was S.C. ELECTRO MAX S.R.L. They received the award for their Airfield Portable Light Marking System POLARIS 2.0, which features versatile signal lamps with magnetic assembly, resilient materials for all-weather use. Post-pandemic evolution ChargePoint Germany GmbH won the SUSTAINABILITY Award. They have received this award for their comprehensive charging solutions, which allows airports of any size to quickly implement EV solutions. At this year’s show, visitors were able to join a comprehensive seminar program covering the following topics to discuss the continued recovery since the pandemic, the impacts of new technologies and what innovations are set to revitalise the airport industry: Terminal Technology, Disruptive Digital Innovations and Cutting Edge Apron Insights. Visitors were presented with the real opportunity to immerse themselves in new innovations, ideas and discussion around the post-pandemic evolution within the airport industry. The full program can be found on the exhibition website. Features of inter airport Europe 2023 The Matchmaking Program received a high demand with over 1,000 confirmed meetings In addition to the excellent cross-section of technologies and services for the entire airport supply chain, an impressive program of accompanying events, such as the Matchmaking Program, and the Hosted Buyer Program were also popular with exhibitors and visitors and very well received. Alongside a show floor packed with innovation, the co-located inter airport FOCUS – the Sustainability Summit offered a two-day high-profile networking and knowledge platform on sustainability strategies for the airport industry. The Matchmaking Program received a high demand with over 1,000 confirmed meetings to create business connections at inter airport Europe 2023. Dates for the next edition The Hosted Buyer Program offered a tailored networking experience with industry leaders from airfield construction, ground handling, ground support equipment, interior design, hardware and software solutions, terminal infrastructure, and operations in this year’s group. Existing and new exhibitors have already expressed their interest in participating at the upcoming show edition in 2025. inter airport Europe will take place from 7 - 9 October 2025 at the Munich Trade Fair Centre in Germany.
Dedrone, the pioneer in airspace security, announced the launch of DedroneBeyond, its solution to enable drone operations to fly beyond visual line of sight (BVLOS) for state, local, territorial, and tribal (SLTT) law enforcement and emergency services when deploying drone as first responders (DFR). Powered by the same computer-vision-enabled, sensor-fusion AI that currently protects over 500 sites around the world, DedroneBeyond delivers complete airspace situational awareness. This solution is being developed and tested in partnership with others, including Axon Air powered by DroneSense, for safe drone operation, providing an infrastructure for the positive drone economy to emerge. Author's quote DedroneBeyond unlocks that potential and makes it easier for law enforcement across the country" “Drones can provide more than just a birds-eye view of a situation; they can arrive at a scene faster than humans and then enable assessment of an emerging incident to provide critical information for law enforcement and first responders to make better decisions before sending in personnel. Today, this potential is hampered by the need to always have human eyes on a drone,” said Aaditya Devarakonda, CEO of Dedrone. “DedroneBeyond unlocks that potential and makes it easier for law enforcement across the country to implement scalable DFR programs. DedroneBeyond is a natural extension for Dedrone, leveraging the company’s deep knowledge and technology foundation for aircraft detection and multi-sensor fusion, to further expand its global leadership in airspace security.” Value of DFR “Eliminating the need for human visual observers is the key to unlocking the value of DFR and bringing its benefits to a larger number of communities," said Aydin Ghajar, General Manager of Axon Air. "We're incredibly excited to add DedroneBeyond to the Axon Air offering and the value it can bring in combination with all the hardware, software, and professional services we offer to agencies to operate a lifesaving drone program successfully.” ADS–B detection in Dedrone To fly a drone BVLOS in US, the FAA must issue a certificate of authorization to the end user To fly a drone BVLOS in the United States, the Federal Aviation Administration (FAA) must issue a certificate of authorization (COA) to the end user. To acquire a COA, an agency must show that its technology can reliably detect other aircraft to prevent mid-air collisions. DedroneBeyond layers Automatic Dependent Surveillance–Broadcast (ADS–B) detection into Dedrone’s existing premier detection and sensor-fusion technologies, technologies that have placed the company in a leadership position for airspace security. By using a drone to assess a situation, law enforcement agencies can respond faster and be more resource-efficient. Evaluation of DedroneBeyond solution "Embracing innovation is at the core of our mission to enhance public safety. Our partnership with Dedrone and Axon Air on the evaluation of the DedroneBeyond solution represents a crucial step towards strengthening our DFR program,” said Michael J. Bouchard, Sheriff, Oakland County, Mich. Sheriff’s Office. “This collaboration opens the door to exploring BVLOS operations, offering the potential to transform the way we respond to emergencies and keep our community safe." Dedrone’s suite of security solutions DedroneBeyond joins Dedrone’s suite of smart airspace security solutions, all of which leverage DedroneTracker.AI, the company’s pioneering command and control (C2) airspace security platform. With sophisticated AI models, the platform performs true sensor fusion to accurately monitor a drone’s flight path and behavior. Dedrone also offers this C2 capability across every kind of setting relying on customer needs Dedrone additionally offers this C2 capability across every kind of setting depending on customer needs, including DedroneCityWide, for zero-install drone detection and monitoring across wide areas, DedroneFixedSite, drone detection for critical infrastructure locations and mobile kits designed for specific situations, DedroneTactical for agile expeditionary environments and DedroneRapidResponse for mobile drone detection. Counter-drone solutions Most recently, DedroneCityWide has expanded to over 50 cities in the US and abroad, including Foxborough, MA; Honolulu, HI; Salt Lake City, UT; Jersey City, NJ; San Antonio, TX; Newark, NJ; Pittsburgh, PA and Indianapolis, IN. Dedrone is now able to offer protection from the threat of drones to over 50% of the US population. Dedrone is implemented across 30 countries and is used by five of the G-7 nation governments; 190 critical infrastructure sites; 30 airports; 60+ stadiums; 15+ US federal entities and 20+ non-US governments. The company actively provides counter-drone solutions for some of the most high-profile events around the world, working closely with over 120 public safety agencies globally.
Regula, a global developer of forensic devices and identity verification solutions, has reached another milestone in enlarging its identity document templates database. The world’s largest commercially available database, it contains over 13,000 templates of ID from 247 countries and territories. Adaptable identity verification What sets it apart is knowledge of a full set of security attributes used to protect a document, since Regula leverages its 30-year experience in forensic hardware devices and analysis to scrutinize every inch of a document. As a result, it empowers organizations to establish a robust and adaptable identity verification workflow, providing unrivaled precision. Detailed security features Recent documents reveal a growing trend for more protection against counterfeits When adding new identity documents to the database, Regula’s experts meticulously describe all security features, providing detailed descriptions of how every element should look and how exactly one can verify its genuineness. Recent documents, including those integrated into Regula's 2023 database update, reveal a growing trend for more protection against counterfeits, which leads to including more security features or sophisticating the existing ones. Electronic documents This trend has been particularly evident in the global increase in electronic documents, which have proved to be more fraud-resilient. In 2023, this trend continued evolving, as new countries introduced their first electronic passports. Among them are Bahrain, Iraq, Jamaica, Mongolia, Pakistan, and Somaliland. All of these documents are already in Regula’s database with the most detailed description of their features and references to compare with during the verification process. Identity verification solutions We ensure a seamless, swift, and accurate verification process, regardless of the document provided" “We aim to record every security and unique document feature as precisely as possible by using our expertise in forensic analysis and forensic device development. With identity fraud on the rise, it’s vital to know what exactly to pay attention to when verifying a document,” says Ihar Kliashchou, Chief Technology Officer at Regula. "By backing up our identity verification solutions with such a comprehensive database of IDs, we ensure a seamless, swift, and accurate verification process, regardless of the document provided." Examining a Swiss passport design A Swiss passport design is examined closely using ultraviolet light, revealing concealed images printed with invisible fluorescent ink. These “secret” images serve as a highly effective security element, as their intricate and hard-to-replicate details act as a natural deterrent to counterfeiting. Since the beginning of the year, Regula has added more than a thousand new document templates to its database. E-passports, ID cards, and driver's license In addition to the previously mentioned e-passports, it enlarged with: Passports: Barbados Canada China Finland Indonesia Pakistan Paraguay Uganda Vietnam ID cards: Djibouti Ethiopia Finland Greece Nepal Paraguay Switzerland Driver’s licenses: Cyprus Greece Iraq Latvia Niue Norway Sao Tome and Principe Somaliland Sudan Switzerland Zimbabwe Template library Besides, Regula has updated its extensive set of US driver’s licenses and ID cards that differ greatly from state to state. The vendor’s template library contains the documents issued in 2023, like those of Arizona, Idaho, North Dakota, Virginia, Washington D.C., West Virginia, and Wisconsin.
Expert commentary
The average business owner or investor has some kind of security precaution in place, especially in the after-hours when there are fewer deterrents to inhibit criminal activity. Security guards, video surveillance systems, motion sensor lights, or even just fake cameras placed around the property are some of the common options people choose. Future of overnight security Smart business owners are starting to realize, however, that some of these traditional security measures are becoming antiquated and no longer cutting. The now and future of overnight security is in remote guarding. Pioneered by companies like Los Angeles-based Elite Interactive Solutions, which was founded back in 2007, remote guarding is revolutionizing the overnight security business. Minimizing criminal activity Remote guarding is fast becoming the most popular choice among commercial end-user property owners Remote guarding utilizes a combination of cutting-edge technology, “digital guards,” highly trained security agents, and local law enforcement if and when necessary to minimize the potential of criminal activity. For those adequately enlightened to its overwhelmingly impressive crime prevention capabilities, remote guarding is fast becoming the most popular choice among commercial end-user property owners to secure and protect their investments. What Is Remote Guarding? Remote guarding is a revolutionary concept and increasing trend in security systems that utilize a combination of methods to effectively analyze potential threats to property. Cameras and/or other monitoring devices running highly advanced algorithmic software are installed in strategic areas or vulnerable places onsite and remotely located security agents are immediately notified of any activity within a designated perimeter of the property. A blend of AI, cybersecurity, and video analytics When properly deployed by an expert provider, the technology stack includes a proprietary blend of video analytics, artificial intelligence, cybersecurity, and more. Done right, “noise” is effectively filtered out, allowing agents to act on legitimate alerts and achieve zero false alarms communicated to first responders. Today, there are a lot of terms and descriptions tossed around about remote guarding, remote video, virtual guarding, etc., but those attributes must be present to represent the true definition of the offering and its many virtues. Realtime situational awareness Many systems have a two-way speaker that allows the security agent to give a verbal warning When specially trained security agents are alerted to trespassers, possible intruders, or other suspicious activity, they analyze the situation in real time and determine the necessary level of action. Many systems have a two-way speaker that allows the security agent to give a verbal warning, known as a voice-down, to the individual(s) that they are being watched. Most perpetrators, often believing the response is emanating directly from security personnel on the property itself rather than from a remote command center, flee immediately. However, if the threat persists, the security agent enlists local law enforcement to get on the scene. Customized remote guarding When properly deployed, remote guarding systems are also customized to specific properties. A team of consultants visits the client’s property to evaluate its vulnerabilities and where to best place cameras and/or other monitoring devices for system efficacy. Traditional Security Shortfalls According to Keith Bushey, a retired commander for the Los Angeles Police Department, there is much frustration between law enforcement officers and potential victims of crime due to the historically unreliable performance of traditional burglar alarm systems and central monitoring stations. He states about 90% of security-related calls are false alarms, a problem that has been well-documented through the years. Onsite challenges When a legitimate emergency does occur, the perpetrators have often already done their damage When a legitimate emergency does occur, the perpetrators have often already done their damage and/or escaped by the time law enforcement arrives. Onsite security guards are not the remedy either as they bring their own set of issues and challenges. Unexpected costs Traditional security systems can also have unexpected costs. The cost is not only in the security guards’ paycheck or the cost of the equipment itself. The cost comes when an actual incident occurs. In worst-case scenarios, the security guard(s) are injured, the business suffers inventory loss, and/or damage is sustained to the property. The medical and other costs for the security guard(s), the loss of inventory, property damage, deployment of law enforcement resources, and possible fallout of legal expenses all add up. Even in the best-case scenario, false alarm expenses incur if law enforcement is dispatched. These, among many others, are some of the primary issues that remote guarding resoundingly answers as a superior alternative. A Bounty of Benefits Remote guarding systems have been proven to cut costs and be more effective than traditional security systems. Even though the monthly monitoring costs of remote guarding are significantly higher than traditional intrusion detection system monitoring, the much higher effectiveness in crime reduction, elimination of false alarms, and augmenting or replacement of manned guards result in a substantially higher return on investment (ROI) to the end user. Easy tracking of threats The security cameras already have their image captured on record, making them easier to track down For example, case studies have demonstrated reduced security costs for clients by 60%, on average. These reductions have come from the costs of security staff, inventory, or property loss, plus saving money on insurance premiums and deductibles. The nature of remote guarding reduces the risk and costs of false alarms, with professional security agents able to determine an actual threat before law enforcement is called. In a rare instance when a perpetrator escapes before law enforcement arrives or can detain the individual(s), the security cameras already have their image captured on record, making them easier to track down and identify. Reduction of false alarms The significant reduction in false alarms is greatly appreciated by law enforcement, as it allows them to focus on real emergencies or crises. Better relationships are also developed between clients and law enforcement, as remote guarding systems are highly reliable in providing accurate and real-time information to officers as they approach the scene. In short, it assists law enforcement in doing their job more effectively, as well as more safely thanks to having eyewitness information before engaging in an active crime scene. Partnership When you combine the decreased cost with the increased efficiency and success rate, it is easy to see why many commercial end-user property owners across the country are making the shift to remote guarding. It’s also an outstanding opportunity for professional security dealers and integrators to partner with a remote guarding services provider to bring a superior solution to their end customers and pick up a recurring monthly revenue stream in the process.
It’s no secret that the data security sector is constantly changing. It has an annual CGR of about 12.3%. Future trends in data security Much of this has to do with the rise of cybercrime in recent years, with reports showing that cyberattacks happen as often as every 39 seconds. To combat the growing rate of cybercrime, data security has been on the rise. As we journey further into this era, it becomes evident that a spectrum of significant trends is molding the future of data security. This exploration delves into a selection of these trends, unraveling their importance and the potential implications they carry 1. AI security tools will increase Artificial Intelligence is also being used in the development of smart attacks and malware The introduction of Artificial Intelligence in the data security industry brought significant changes, especially in cybersecurity. AI has been the golden standard for face detection, natural language processing, automated threat detection, and automated security systems. Additionally, Artificial Intelligence is also being used in the development of smart attacks and malware, bypassing even the latest security protocols in data control. And as time progresses, AI security tools will flourish and dominate the scene. Let’s take a more in-depth look at three of the top AI security tools. Targeted attack analysis tool Manufacturers utilize targeted attack analysis tools to uncover targeted and stealthy attacks. Artificial Intelligence can be applied to the program’s capabilities, processes, and knowledge. For instance, Symantec launched this tool to combat the Dragon 2.0 attack in 2022. The phishing attack reprimanded multiple energy companies while trying to gain access to their operational networks. Targeted Attack Analysis Tools can analyze incidents and look for similarities from previous situations. They also help detect suspicious activities and collect all the necessary data to determine whether a specific action is malicious. Intercept X tool Results from the Intercept X Tool feature high accuracy and a low false positive rate Sophos, a British security hardware and software company, launched the Intercept X Tool. It engages a neural network that records and analyses data like a human brain. Sophos’ Intercept X Tool can extract features from a single file and perform a deep analysis. It detects malicious activities within 20 milliseconds. Plus, it’s also trained to work on bi-directional sharing and real-world feedback of threat intelligence. Results from the Intercept X Tool feature high accuracy and a low false positive rate. IBM Watson Technology IBM’s QRadar Advisor uses IBM Watson Technology, a unique AI tool for fighting cyber attacks. Artificial Intelligence can auto-investigate activities and indicators for potential exploitation or compromise. With cognitive reasoning, IBM Watson Technology can present critical insights to accelerate the response cycle. Security analysts can utilize this technology to search for threat incidents, reducing the risk of letting them fly under the radar. 2. Blockchain as a security solution It guarantees no points of failure or hackable entrances that can expose datasets inside the system Blockchain is a type of distributed ledger technology (DLT) that aims to establish trust within an untrusting ecosystem. Today it’s one of the most robust cybersecurity technologies in the industry. Blockchain utilizes a decentralized ledger system, but your team members can still gain access to transparent information in the cloud. Members can also record, pass along, and view necessary transactional data in the blockchain. The entire blockchain process maintains data integrity within the system while establishing trust among team members. It guarantees no points of failure or hackable entrances that can expose datasets inside the system. Cybersecurity, biometrics Cybersecurity primarily benefits from these features because blockchain can create a secure and robust wall between data and hackers. On top of that, blockchain ledgers can include biometrics like fingerprints and retina scans. These prevent hackers from accessing any private data. Because blockchain is decentralized, it also limits hackable data. Together with the technology’s record-keeping system, each node is provided insight into data manipulation exposing real-time cybercrime attempts. 3. Increased and widened access control Without access control, expect your company to be open to security issues, including theft, data loss, and breach of data Access control is critical in data security. More than a valuable security tool, business leaders can use access control to regulate people accessing any given resource. A company with an IT security setting can control who has the liberty to edit certain files. One of the primary goals of access control is to minimize threats or attacks to organizations and businesses to keep people and data secure. Without access control, expect your company to be open to security issues, including theft, data loss, and breach of data protection laws. Benefits The benefits of increased and widened access control include: Identifying who can access and control your data at specific time intervals. Protecting data from overwriting, accidental deletion, and malicious intent. User permissions that can be readily changed. Compliance and regulation with data privacy laws. Central management of access to data through a reporting portal or a dashboard. Multi-factor authentication Access control comes in various types and systems, so it’s critical to know the features of what you’re looking for. The most common type is multi-factor authentication or MFA. It involves multiple steps before logging in, requiring the user to enter other relevant information besides the password. Some other examples of information include biometrics, answering a security question, or entering a code sent to the user’s email address. Two-factor authentication, role-based access control Two-factor authentication further prevents unauthorized entries that can result in unnecessary data possession Two-factor authentication further prevents unauthorized entries that can result in unnecessary data possession. Another type of access control is role-based access control. In this setup, only one individual can set up access guidelines and grant permissions to specific team members within an organization. 4. Greater use of the zero-trust security model The zero-trust security model is a framework that requires every user within and outside the organization to undergo authentication, authorization, and validation. These are all essential to ensure proper security configuration before access is granted to the company’s applications and data. A zero-trust model assumes that anyone can cause data breaches and that a traditional network edge is not taken into effect. Moreover, it addresses the following modern-day challenges: Hybrid cloud environments. Security of remote workers. Ransomware threats. This framework utilizes the combination of multiple advanced technologies, including: A risk-based multi-factor authentication. Endpoint security. Identity protection. Cloud workload technology. The zero-trust model uses all these innovative tools for system identification, user verification, access consideration, and system security maintenance. Constant validation and monitoring Enforcing strict policies and compliance with data privacy laws are also essential Additionally, it also considers data encryption, email security, and asset verification before establishing connections with applications. The architecture of a zero-trust framework requires constant validation and monitoring of the users and the devices they are using. Enforcing strict policies and compliance with data privacy laws are also essential. More importantly, the zero trust architecture requires all organizations to be aware of all their available services and accounts to gain complete control of data handling and manipulation. 5. Increased privacy regulations Privacy regulations and policies guide organizations in proper data control, handling, and security. These policies guide organizations in proper data control, handling, and security. As a responsible business owner, you must comply with these regulations to avoid legal issues. With cybersecurity attacks becoming common, expect increased and stricter privacy regulations to be released in the next few years. While current policies are still taken into effect, various modifications and adjustments will occur to compete with the rising numbers of data breaches, thefts, data loss, and more. California Privacy Rights Act (CPRA) Currently, the California Privacy Rights Act (CPRA) is the most comprehensive legislation on state data privacy. It only started to take effect on January 1, 2023. The CPRA introduces the following principles: Broad individual consumer rights. Significant duties of people who need to collect sensitive and personal information. Additional definitions of data privacy and security. An individual’s duties include releasing information about data collection to concerned data subjects and proper access, correction, and deletion of information. Final thoughts 2023 is a big year for data security. Trends such as increased adoption of zero-trust policies, a greater reliance on AI security tools, and the implementation of blockchain as a security solution are all things we expect to see shortly. Staying up-to-date with these trends is important for keeping your business current and ensuring that you’re adhering to new and changing regulations. Doing so can give you an edge over the competition and keep you out of legal hot water.
Global transportation networks are becoming increasingly interconnected, with digital systems playing a crucial role in ensuring the smooth operation of ports and supply chains. However, this reliance on technology can also create vulnerabilities, as demonstrated by the recent ransomware attack on Nagoya Port. As Japan's busiest shipping hub, the port's operations were brought to a standstill for two days, highlighting the potential for significant disruption to national economies and supply chains. Transportation sector The attack began with the port's legacy computer system, which handles shipping containers, being knocked offline. This forced the port to halt the handling of shipping containers that arrived at the terminal, effectively disrupting the flow of goods. The incident was a stark reminder of the risks associated with the convergence of information technology (IT) and operational technology (OT) in ports and other critical infrastructures. This is not an isolated incident, but part of a broader trend of escalating cyber threats targeting critical infrastructure. The transportation sector must respond by bolstering its defenses, enhancing its cyber resilience, and proactively countering these threats. The safety and efficiency of our transportation infrastructure, and by extension our global economy, depend on it. Rising threat to port security and supply chains XIoT, from sensors on shipping containers to automatic cranes, are vital to trendy port functions OT, once isolated from networked systems, is now increasingly interconnected. This integration has expanded the attack surface for threat actors. A single breach in a port's OT systems can cause significant disruption, halting the movement of containers and impacting the flow of goods. This is not a hypothetical scenario, but a reality that has been demonstrated in recent cyberattacks on major ports. Adding another layer of complexity is the extended Internet of Things (XIoT), an umbrella term for all cyber-physical systems. XIoT devices, from sensors on shipping containers to automated cranes, are now integral to modern port operations. These devices are delivering safer, more efficient automated vehicles, facilitating geo-fencing for improved logistics, and providing vehicle health data for predictive maintenance. XIoT ecosystem However, the XIoT ecosystem also presents new cybersecurity risks. Each connected device is a potential entry point for cybercriminals, and the interconnected nature of these devices means that an attack on one, which can move laterally and can have a ripple effect throughout the system. The threat landscape is evolving, with cybercriminals becoming more sophisticated and their attacks more damaging with a business continuity focus. The growing interconnectivity between OT and XIoT in port operations and supply chains is also presenting these threat actors with a greater attack surface. Many older OT systems were never designed to be connected in this way and are unlikely to be equipped to deal with modern cyber threats. Furthermore, the increasing digitization of ports and supply chains has led to a surge in the volume of data being generated and processed. This data, if not properly secured, can be a goldmine for cybercriminals. The potential for data breaches adds another dimension to the cybersecurity challenges facing the transportation sector. Role of Cyber Resilience in Protecting Service Availability Cyber resilience refers to organization's ability to prepare for, respond to, and recover from threats As the threats to port security and supply chains become increasingly complex, the concept of cyber resilience takes on a new level of importance. Cyber resilience refers to an organization's ability to prepare for, respond to, and recover from cyber threats. It goes beyond traditional cybersecurity measures, focusing not just on preventing attacks, but also on minimizing the impact of attacks that do occur and ensuring a quick recovery. In the context of port operations and supply chains, cyber resilience is crucial. The interconnected nature of these systems means that a cyberattack can have far-reaching effects, disrupting operations not just at the targeted port, but also at other ports and throughout the supply chain. A resilient system is one that can withstand such an attack and quickly restore normal operations. Port operations and supply chains The growing reliance on OT and the XIoT in port operations and supply chains presents unique challenges for cyber resilience. OT systems control physical processes and are often critical to safety and service availability. A breach in an OT system can have immediate and potentially catastrophic physical consequences. Similarly, XIoT devices are often embedded in critical infrastructure and can be difficult to patch or update, making them vulnerable to attacks. Building cyber resilience in these systems requires a multi-faceted approach. It involves implementing robust security measures, such as strong access controls and network segmentation, to prevent attacks. It also involves continuous monitoring and detection to identify and respond to threats as they occur. But perhaps most importantly, it involves planning and preparation for the inevitable breaches that will occur, ensuring that when they do, the impact is minimized, and normal operations can be quickly restored. Building resilience across port security and supply chains In the face of cyber threats, the transport sector must adopt a complete method of cybersecurity In the face of escalating cyber threats, the transportation sector must adopt a comprehensive approach to cybersecurity. This involves not just implementing robust security measures, but also fostering a culture of cybersecurity awareness and compliance throughout the organization. A key component of a comprehensive cybersecurity strategy is strong access controls. This involves ensuring that only authorized individuals have access to sensitive data and systems. It also involves implementing multi-factor authentication and regularly reviewing and updating access permissions. Strong access controls can prevent unauthorized access to systems and data, reducing the risk of both internal and external threats. Network segmentation Network segmentation is another crucial measure. By dividing a network into separate segments, organizations can limit the spread of a cyberattack within their network. This can prevent an attack on one part of the network from affecting the entire system. Network segmentation also makes it easier to monitor and control the flow of data within the network, further enhancing security. Regular vulnerability assessments and patch management are also essential. Vulnerability assessments involve identifying and evaluating potential security weaknesses in the system, while patch management involves regularly updating and patching software to fix these vulnerabilities. These measures can help organizations stay ahead of cybercriminals and reduce the risk of exploitation. EU’s NIS2 Directive EU’s NIS2 Directive came into effect, and member states have until October 2024 to put it into law The transportation sector must also be prepared for greater legislative responsibility in the near future. The EU’s NIS2 Directive recently came into effect, and member states have until October 2024 to put it into law. The Directive aims to increase the overall level of cyber preparedness by mandating capabilities such as Computer Security Incident Response Teams (CSIRTs). Transport is among the sectors labeled as essential by the bill, meaning it will face a high level of scrutiny. Getting to grips with the complexities of XIoT and OT integration will be essential for organizations to achieve compliance and avoid fines. Global transportation infrastructure Finally, organizations must prepare for the inevitable breaches that will occur. This involves developing an incident response plan that outlines the steps to be taken in the event of a breach. It also involves regularly testing and updating this plan to ensure its effectiveness. A well-prepared organization can respond quickly and effectively to a breach, minimizing its impact and ensuring a quick recovery. In conclusion, mastering transportation cybersecurity requires a comprehensive, proactive approach. It involves implementing robust technical measures, fostering a culture of cybersecurity awareness, and preparing for the inevitable breaches that will occur. By taking these steps, organizations can enhance their cyber resilience, protect their critical operations, and ensure the security of our global transportation infrastructure.
Security beat
Travel volumes at airports have been increasing of late, although still below the 2.5 million or so passengers the Transportation Security Administration (TSA) screened every day, on average, before the pandemic. As passengers return, they will notice the airport security experience has changed during the pandemic – and many of the changes are likely to continue even longer. Need for touchless technology The lowest U.S. air travel volume in history was recorded last April, with approximately 87,500 passengers. As passenger traffic plummeted, the aviation community sought to explore the potential of new technologies to make security checkpoints more contactless and flexible when the traffic numbers return. The pandemic has seen an increase in touchless technology deployed in the screening area. Used for cabin baggage screening, Computed Tomography (CT) produces high-quality, 3-D images to enable a more thorough analysis of a bag’s contents. Imaging Technology Millimeter-wave body scanners began replacing metal detectors globally as a primary screening method Enhanced Advanced Imaging Technology (eAIT), which uses non-ionizing radio-frequency energy in the millimeter spectrum, safely screens passengers without physical contact for threats such as weapons and explosives, which may be hidden under a passenger’s clothing. Millimeter-wave body scanners began replacing metal detectors globally as a primary screening method. AI algorithms Other innovations include an automatic screening lane, centralized image processing, and artificial intelligence (AI). Looking ahead, AI algorithms have the ability to clear most passengers and bags automatically, making the process smoother and freeing up staff to focus only on alarms. The pandemic’s need for contactless screening may accelerate the adoption of AI. CAT machine Credential Authentication Technology (CAT) machines automatically verify identification documents presented by passengers during the screening process. The TSA continues to accept expired Driver’s Licenses and state-issued IDs for up to a year after expiration, based on the premise that license renewals may be delayed and/or more difficult during the pandemic. The REAL ID enforcement deadline was extended to Oct. 1, 2021. Health precautions Checkpoint health precautions have been a part of the airport screening experience since early in the pandemic. Last summer, the TSA announced the “Stay Healthy. Stay Secure” campaign, which included requirements such as social distancing among travelers, ID verification without physical contact, plastic shielding installed at various locations, and increased cleaning and disinfecting. In January 2021, President Biden signed an Executive Order requiring travelers to wear face masks when in airports and other transportation facilities (to remain in effect until May 11). Checkpoint screening Clear is a privately owned company that provides expedited security that uses biometrics either a person’s eyes or face to speed along the process of getting people through checkpoints. TSA officers wear masks and gloves at checkpoints and may also wear eye protection or clear plastic face shields. The limits on allowable liquids a passenger may take on board were broadened to include a hand sanitizer container of up to 12 ounces, one per passenger in a carry-on bag. a paradigm shift Just as aviation security changed after 9/11, the COVID-19 crisis is expected to lead to a paradigm shift to create a safer and more secure environment. Measures were implemented so that passengers, staff and other stakeholders could have continued assurance and confidence in airports amid and after the pandemic.
Facial recognition continues to be a political football and a target of privacy activists in the United States. For example, San Diego has suspended its use of facial recognition scanners by law enforcement after a campaign by civil rights groups. The San Diego Tactical Identification System (TACIDS) program included a database of facial recognition scans shared by 30 local, state and federal agencies. A California law, passed in the fall, puts a three-year moratorium on law enforcement use of face recognition technology. A proposal in Congress would prohibit use of biometric recognition technology in most public and assisted housing units funded by the Department of Housing and Urban Development (HUD), thus protecting the more than two million public housing residents nationwide from being “over-surveilled.” The “No Biometric Barriers to Housing Act” is supported by the NAACP, the National Housing Law Project, National Low-Income Housing Coalition, National Action Network, Color of Change, and the Project on Government Oversight. The problems of Facial Recognition "Studies that show that facial recognition systems may misidentify many individuals including women and people of colour" A letter from seven members of Congress to HUD Secretary Ben Carson questioned the use of facial recognition in federally assisted housing because it “could be used to enable invasive, unnecessary and harmful government surveillance of…residents.” The letter cites studies that show that facial recognition systems may misidentify many individuals including women and people of color, thus “exacerbating vulnerabilities that marginalized groups already face in life.” In June, Somerville, Mass., became the second U.S. city to ban the use of facial recognition technology in public spaces. The first was San Francisco. A coalition of organizations and trade associations has issued a letter to Congress outlining concerns with “blanket prohibitions” or moratoriums on facial recognition technology and listing beneficial uses for public safety, national security and fighting fraud. The Security Industry Association (SIA) is part of the coalition, the Information Technology and Innovation Foundation. A letter from seven members of Congress to HUD Secretary Ben Carson questioned the use of facial recognition in federally assisted housing Facial recognition technology has benefited Americans in many ways, such as helping to thwart identity thieves" The letter says: “While polls consistently show that Americans trust law enforcement to use facial recognition technology responsibly, some groups have called for lawmakers to enact bans on [the] technology. While we agree that it is important to have effective oversight and accountability of these tools to uphold and protect civil liberties, we disagree that a ban is the best option.” Development and guidance As alternatives to outright bans, the letter proposes expanded testing and performance standards, develop of best practices and guidance for law enforcement, and additional training for different uses of the technology. “Facial recognition technology has benefited Americans in many ways, such as helping to fight human trafficking, thwart identity thieves and improve passenger facilitation at airports and enhance aviation security,” says Don Erickson, CEO of SIA. “SIA believes this advanced technology should be used in a safe, accurate and effective way, and look forward to working with Congress to help the U.S. set the example on how to ethically and responsibly govern this technology.” SIA has produced a document called “Face Facts: Dispelling Common Myths Associated with Facial Recognition Technology.”
Could Drones Be Used for Civilian/Commercial Surveillance Within Five Years? Drone strikes in war zones are reported routinely now in the news, but unmanned aerial vehicles (UAVs) or drones are still not common in commercial and civilian applications. Commercial uses may still be several years away, but is it too soon to start thinking about the possible security applications? Currently in the United States, Congress has directed the Federal Aviation Administration to come up with a plan by September 2015 to “integrate” unmanned aircraft safely into U.S. airspace. After that, presumably, the FAA will grant licenses to fly the vehicles for various civilian and commercial uses. The agency projects that five years after it issues regulations for drones weighing 55 pounds or less, there will be 7,500 such devices in the air. Meanwhile, technology advances are making the process of flying the drones both more precise and more automated. By the time drones are widely used in the commercial world, it will be a mature technology that has performed many years in military applications. The effective wartime use of drones has encouraged greater consideration of how the devices can be used in commercial applications such as security. Enhancing video surveillance for large perimeters The most obvious security application is the ability to add new bird’s-eye views to video surveillance systems. Drones programmed to “patrol” a perimeter could expand current capabilities of security to provide an early warning, or could even be programmed to follow a target as it approaches a protected facility. Drones could be used to view very large areas, such as along petroleum pipelines which may now be unprotected. Use of a variety of sensors and other electronic components makes the potential benefits of drones for security applications almost limitless. Even as the U.S. regulatory issues are being settled, it is likely commercial uses will continue to be developed in other places in the world, ready to deploy domestically as soon as they are allowed. Other civilian applications include policing and firefighting or other work that is dangerous or unpleasant. How might the interaction of such uses with existing security systems promote greater protection and faster emergency response? How should the security industry be preparing for civilian uses of drones? (For that matter, what new vulnerabilities and threats does the technology represent and how should the industry prepare?) Drones are already being used for surveillance at the U.S.-Mexican border, and the Washington Post reported earlier this year that various federal, state and local law enforcement agencies often borrow the drones for missions such as disaster relief and searching for marijuana crops. We have all watched how fast technology can change our market. It may not be too soon to be thinking about how drones could become a valuable new tool for the security market. Five years isn’t very long.
Case studies
The Transportation Services and Mobility department for the city of Grand Prairie, Texas recently completed a substantial project to replace the locks on their Intelligent Traffic Cabinets with a better and more secure choice. Turns out what they needed was only a few miles away with ALCEA’s Traffic Cabinet Locking Solution powered by ABLOY technology. ALCEA is the brand formerly known as ASSA ABLOY Global Solutions - Critical Infrastructure. The ALCEA Traffic Cabinet Locking Solution has gained traction with transportation infrastructure departments in major cities across the United States. It was developed by Jerry Burhans, managing director for North America, and Michael Woody, manager of the ALCEA Competence Center in Irving, which shares a border with Grand Prairie. Now this access management solution is beginning to impact medium-sized communities like them. Proactive cybersecurity measures Perez said this skill project will save all city signal cabinets from tampering and unauthorized key Raul Perez, a 13-year transportation industry veteran who has served as Grand Prairie’s ITS Specialist for 2-1/2 years, said this installation project will protect all city signal cabinets from tampering and unauthorized access. Involving 240 smart locks, 210 high-security mechanical locks, and padlocks on all city traffic cabinets plus 10 message boards, 191 mechanical locks for all school flashing sign cabinets, and 20 Bluetooth keys is in step with the city’s policy of adopting proactive cybersecurity measures. “Having control over who has access and when to our traffic cabinets was a major driver for this project,” he acknowledged. “We have not had people trying to force their entry into our cabinets, but we did have several occasions where contractors were gaining access to them without permission or notice. ALCEA was the clear choice for our smart lock needs, offering a solution that aligns with our requirements.” Substantial growth and the need to safeguard assets Grand Prairie has a long history associated with technology. Located in the Dallas-Fort Worth metroplex, it is the sixteenth largest city in Texas with a population of more than 207,000 people. During World War I and since, it began an association with the defense and aviation industries and served as an aircraft production site. The city sits 12 miles west of downtown Dallas and is only 10 minutes south of the Dallas-Fort Worth International Airport. With rail lines and major interstates 20 and 30 running through it, Grand Prairie has become a well-established distribution center. The majority of the Great Southwest Industrial District’s approximately 80 million square feet of space is in the city. State’s transportation infrastructure Grand Prairie’s growth resembles the rest of Texas, the largest of the 48 continuous states Combine major attractions like the Lone Star Park horse racetrack and Epic Waters, one of the largest indoor waterparks in Texas, and the city’s 81 square miles of road experience heavy traffic activity all day long. Grand Prairie’s growth resembles the rest of Texas, the largest of the 48 continuous states. After an unprecedented boom, the U.S. Census Bureau declared it is now home to more than 30 million residents following a 43% increase from 2020 to 2022. That development in part led to the Texas Department of Transportation announcing a $142 billion investment in the state’s transportation infrastructure last August as part of a 10-year state roadways plan. About the same time the announcement was made is when the city of Grand Prairie began researching options for a separately funded project to increase cybersecurity preparedness. Flexibility of a Hybrid Locking Solution “I started looking for smart locks and found ALCEA’s mechanical lock with a high-security key during an online search. I was intrigued so I contacted them, inquired about their product and arranged a visit to their office for a presentation,” said Perez, who also evaluated the offerings of three other vendors. “It was then I learned about the capability of unlocking both the electronic and mechanical locks – including padlocks – and the versatility of their keys. I was very impressed by the user-friendly design of their Bluetooth smart key,” he said in reference to the ABLOY PROTEC2 CLIQÔ system. Mechanical and electromechanical locks Remote access control system mixes the parts of robotic and electromechanical locks The remote access management system combines the best characteristics of mechanical and electromechanical locks. After the initial meeting with ALCEA, Perez said he was convinced of the value of this hybrid solution but had to secure buy-in from his supervisor and department director. “Working with the ALCEA team, we tailored a price quote aimed at convincing our department director to allocate funds for this investment. The initiative was successfully integrated into our budget by the end of 2023, and the purchase order was placed in mid-January.” Demonstrated by the ALCEA team The city of Grand Prairie chose ALCEA for several key reasons. “Their product offered the advantage of securing all our enclosures with a single key, with efficiency and convenience,” said Perez. “The versatility of giving us the capability to integrate both mechanical and electronic locks, as well as padlocks, contributed to a more cost-effective final solution. The user-friendly key system, coupled with the security features, ensures ease of use without compromising safety." “The expertise, customer service, and professionalism demonstrated by the ALCEA team added confidence in our decision-making process,” added Perez. “Being a local company, they are able to provide localized support.” Common problems with #2 keys protecting roadside equipment The mechanical lock series that was installed contains ABLOY’s unique high-security cylinder The mechanical lock series that was installed contains ABLOY’s unique high-security cylinder. The electromechanical locks support electronic access control, key tracking, and audit trails with CLIQ Web Manager software. Perez says it instantly solves a problem that existed with their old system. “The challenges we encountered before are widespread in the transportation industry. Many traffic enclosures are accessible with a #2 key, which is impossible to track and makes unauthorized access a potential risk,” he explained. “Anyone can buy that type of key for a couple of dollars. This lack of accountability is a significant security concern, particularly with the increasing prevalence of cyber threats targeting government agencies.” Open cabinet locks and padlocks Perez says the ALCEA solution gives Grand Prairie continuity for its program. “Given the critical nature of our infrastructure and the investment in our high-tech signal control devices, protecting our assets is a top priority,” he acknowledged. “We now have versatility where the same key will open cabinet locks and padlocks, and it can be updated by using the CLIQ app, which is convenient for everyone on our team. Technicians and supervisors wiil be using most of the keys, and the others are for the contractors who need access to the traffic cabinets on an occasional basis.”
RecFaces, a facial recognition software company, has announced the successful deployment of its flagship product, Id-Guard at Jorge Chávez International Airport in Lima, Peru. This implementation marks a significant milestone in bolstering security measures at one of South America's busiest airports, underscoring the importance of maintaining a high level of safety at public transportation hubs. Jorge Chávez International Airport Jorge Chávez International Airport serves as a vital gateway for travelers and cargo, welcoming more than 20 million international and national passengers every year. With such a high flow of people, ensuring the safety and security of passengers and airport personnel becomes crucial. Recognizing this need, RecFaces collaborated with airport authorities to implement their state-of-the-art Id-Guard solution and help ensure the safety of the facility. Enhanced security measures The solution's features enable airport authorities to prevent suspicious individuals from accessing the site The implementation of Id-Guard has significantly enhanced security measures, allowing for proactive monitoring and rapid response to potential security threats. The solution's features enable airport authorities to prevent suspicious individuals from accessing the site, thereby safeguarding the safety of passengers and staff. Highest level of security “Airport representatives felt the need for facial recognition to strengthen the security structure within the airport as a whole,” notes Maria Kazhuro, Business Development Director for the LATAM region, RecFaces. Maria Kazhuro adds, “Our goal was not only to provide the highest level of security but also to simplify work processes for security guards. We can confidently say that the installation of an ID guard has significantly improved security in the facility. Now both airport visitors and employees can be sure that they are under even greater protection than before.” Id-Guard facial recognition The deployment of Id-Guard at the Peruvian airport demonstrates RecFaces' dedication to excellence and innovation in the field of facial recognition technology. As airports worldwide continue to prioritize security and passenger experience, RecFaces remains at the forefront of delivering advanced biometric solutions tailored to the evolving needs of the aviation industry.
On Saturday, the 27th Of January, 2024 an intoxicated man managed to gain access to The Indira Gandhi International Airport’s runway, he was soon after arrested on the tarmac of the runway by the Central Industrial Security Force and then handed to the New Delhi police force. Luckily this man was only drunk, what if he was a determined criminal or even worse a terrorist, think about what damage could have happened in the time between the perimeter being breached and by the time he was arrested. Airport perimeter security deficiencies This starkly illustrates the glaring deficiencies in airport perimeter security, underscoring the urgent need for businesses and proprietors to prioritize this aspect. Perimeter security serves as the first line of defense against unauthorized access, theft, and all threats With such lapses evident in major airports globally, it serves as a compelling reminder of the vulnerability that extends to all. Perimeter security serves as the first line of defense against unauthorized access, theft, and all threats to physical and digital assets. It establishes a boundary, safeguarding critical infrastructure, sensitive information, and personnel. APS Electro-Fence and Flexiguard By deterring intruders and providing early detection, it mitigates risks, enhances safety, and preserves the integrity of protected areas. Advanced Perimeter Systems provides a variety of different perimeter security systems to help prevent events such as this from happening, APS Electro-Fence and Flexiguard would have prevented this from happening.
Chopin Airport in Warsaw, named after the famous Polish composer Frédéric Chopin, has recently undergone an impressive improvement in acoustic technology. System features The installation of an extensive Praesensa system from Bosch Building Technologies marks a turning point in the way information and music are transmitted and played in the airport building. The new system features advanced loudspeaker technology and a high level of automation, providing outstanding sound quality and clear, crisp voice transmission, which is of great benefit to the operator, passengers, and ground staff. Innovative technology for precise communication It uses LS1-OC100E-1 hemi-directional ceiling loudspeakers and LC1-UM12E8 built-in loudspeakers The new passenger information system is based on the Praesensa solution from Bosch. It uses LS1-OC100E-1 hemi-directional ceiling loudspeakers and LC1-UM12E8 built-in loudspeakers, which ensure that passengers at every gate are addressed with pinpoint accuracy and excellent intelligibility. Text-to-speech solution By integrating a text-to-speech solution from a third-party provider, the flight number, airline, destination, and boarding information are automatically retrieved from the central computer at Chopin Airport and reproduced in synthesized voice information. These are output in Polish and English as well as other available languages, achieving a previously unattainable sound quality. The result is a significant reduction in the workload of airport staff. Overcoming old challenges The modernization of the public address and voice alerting system was urgently needed The modernization of the public address and voice alerting system was urgently needed, as the old analog system had reached its limits. Information was often lost in an indistinct fog of sound, and manual announcements of boarding information were both time-consuming and labor-intensive. Enthusiasm for efficiency and quality The integration of the new system into the airport's existing infrastructure went smoothly, which significantly shortened the installation time. The automation and increased efficiency provided by the Praesensa system is appreciated by both staff and passengers alike. The scalability of the system ensures its suitability for future developments and requirements. “Chopin Airport now has a state-of-the-art public address system. The fact we could build on the existing IP infrastructure significantly reduced the amount of time for the installation work,” says Józef Bycul, Project Manager at Bosch Building Technologies.
OSI Systems, Inc. (the ‘Company’ or ‘OSI Systems’) (OSIS) has announced that its Security division was awarded a contract from an international airport for approximately $18 million to provide various checkpoint and hold baggage screening solutions. Among the systems to be provided are the RTT®110 (Real Time Tomography) explosive detection system for screening hold baggage, Metor® Walk-Through Metal Detector, and Itemiser® 5X explosive trace detection system for secondary screening of passengers. OSI Systems' checkpoint and hold baggage screening solutions The Company is also engaged to provide comprehensive multi-year maintenance, service, and support As part of this award, the Company is also engaged to provide comprehensive multi-year maintenance, service, and support. OSI Systems, Inc.’ Chairman and Chief Executive Officer (CEO), Deepak Chopra, commented, “We are delighted to work with this major airport customer and look forward to providing our inspection system platforms with advanced technologies that are designed to achieve the highest airport security standards, enhancing both the safety and the overall experience of air passengers.” OSI Systems, Inc. OSI Systems, Inc. is a vertically integrated designer and manufacturer of specialized electronic systems and components for critical applications in the homeland security, healthcare, defense, and aerospace industries. The Company combines more than 40 years of electronics engineering and manufacturing experience with offices and production facilities in more than a dozen countries, in order to implement a strategy of expansion into selective end product markets.
Quanergy Solutions, Inc., a global provider of 3D LiDAR (Light Detection and Ranging) security solutions, was chosen by Vancouver International Airport (YVR) to analyze footfall and passenger journeys and ultimately improve passenger happiness. Quanergy’s solution surpassed the capabilities of existing solutions and delivered accurate, data-driven insights for enhanced operational efficiency, passenger satisfaction, and cost savings. Real-time alerts “Through the implementation of Quanergy’s solutions, we have harnessed the power of real-time insights, gaining a deep understanding of passenger volumes and the associated wait times at different stages of their journey through the terminal,” said Jason Williams, Manager, of Innovation & Technology Group, YVR. He adds, “With this high-precision data at our disposal, we can trigger real-time alerts whenever we approach or exceed predefined thresholds. This invaluable capability enables us to collaborate seamlessly with our stakeholders, ensuring that our travelers experience a smooth and stress-free journey through our airport.” Challenges: Camera-based and 3D stereoscopic sensor solutions However, with these solutions in place, the airport struggled to gather accurate data due to system limitations Before Quanergy’s deployment, YVR had previously employed several camera-based and 3D stereoscopic sensor solutions to provide que analysis and people-counting in several areas around the airport. However, with these solutions in place, the airport struggled to gather accurate data due to systems limitations including restricted fields of view and inaccurate depth perception. This ultimately would skew the occupancy or que counts, making it very difficult to drive impactful change and deploy systems cost-effectively at scale. Solution with Q-Track With Quanergy’s 3D LiDAR sensor and advanced perception software solution, Q-Track, YVR can accurately identify, classify, and track people/objects for enhanced operational insights. YVR currently uses these insights to meet several operational and business imperatives such as reducing check-in time and time spent passing through security, which ultimately sees an increase in customer happiness. Reduced costs The cost of installation, cabling, and maintenance made Quanergy’s TCO advantage even more stark Quanergy is also able to reduce deployment costs, with one of its 3D LiDAR sensors providing the coverage of up to five stereoscopic cameras. YVR needed to use only 1 Quanergy LiDAR to cover the same area that would have needed 7 or more of their existing (competitors’) sensors. In addition to the reduction in the number of sensors, the cost of installation, cabling, and maintenance made Quanergy’s total cost of ownership (TCO) advantage even more stark. This allowed YVR to scale the solution quickly with plans to implement Q-Track landside and airside for enhanced traffic control outside of the terminal. Enhance security, streamline operations “We are pleased to have collaborated closely with the YVR team, resolving a multifaceted challenge encountered by many passenger terminals today,” said Adam Andres, Vice President of Global Sales, at Quanergy. He adds, “The forward-thinking of the YVR Innovation and Technology Group, in embracing Quanergy’s field-tested and fully scalable Q-Track solution, led to the achievement of our project objectives. We take pride in our contribution, providing real-time actionable intelligence to enhance security, streamline operations, and elevate the overall passenger experience.”
Round table discussion
Headlines of violence in our schools are a reminder of the need to keep educational institutions safe. In fact, if there is a positive aspect to the constant bombardment of headlines, it is that it keeps our attention perpetually focused on how to improve school security. But what is the role of physical security systems? As the new school year begins, we asked this week’s Expert Panel Roundtable: Are schools safer because of physical security systems? Why or why not?
As physical security technologies become more complex, it is incumbent on the dealer/integrator to have the skills and expertise needed to ensure that a system operates smoothly. The value of integrators increasingly rests on the skill sets they bring to bear when installing a system. If the skills are missing, there is a problem. We asked this week’s Expert Panel Roundtable: What missing skills among security integrators can cause problems for customers?
Driving the smart homes market is the convenience of simple technology solutions. Almost every home now has a “smart speaker” that makes it easier than ever for homeowners to interface and control their technology. But where does security fit into the new landscape of smart home systems? We asked this week’s Expert Panel Roundtable: What’s new in smart homes and residential security systems?
Multi-Residential Access Management And Security
DownloadGuide For HAAS: New Choice Of SMB Security System
DownloadPrecision And Intelligence: LiDAR's Role In Modern Security Ecosystems
DownloadHikvision: Solar Powered Product Introduction + HCP
DownloadGunshot Detection
Download