In 1901 New York state made a pioneering regulation move and became the first US state to require automobile owners to register their vehicles. This marked the beginning of regulation on modern traffic, which - following decades of development - resulted in a multi-layer concept of regulation relating to vehicles and driver’s licenses, traffic signs and insurance mechanisms that we are all familiar with nowadays. While certain parallels can be drawn between the early days of cars and our...
Leaders in the security industry, government and technology gathered on June 27-28 in Washington, D.C., as the Security Industry Association (SIA) hosted its 2018 GovSummit. Each year, SIA GovSummit offers top-quality information sharing and education on security topics affecting federal, state and local agencies. This year’s summit tackled key security and policy issues like moving security services to the cloud, the use of artificial intelligence and machine learning for surveillance and...
Innovative laser scanning technology from OPTEX, can now be integrated with the Genetec Restricted Security Area (RSA) Surveillance module, to deliver a new era in security and detection in outdoor and indoor environments for airports and other critical infrastructure sites. Via the RSA Surveillance module, OPTEX’s award-winning REDSCAN laser sensors can now send real-time events and alarm data to the Genetec unified security platform, Security Center, alerting control room operators to a...
SecurAmerica, a leading U.S. man-guarding security company has announced the purchase of ERMC, based in Chattanooga, Tennessee. With headquarters in Atlanta, Georgia, SecurAmerica, headed by the legendary entrepreneur Frank Argenbright, will continue its relentless focus on growth. With this expansion of infrastructure, the combined business will operate in over 650 locations, employ more than 8,000 security officers, and have annual revenues of over $300 million. SecurAmerica will now be the fi...
Dedrone, a security company that developed the world’s first software to detect drones and protect high-value airspace from drone threats, announced their operations are expanding into serving the federal market, through the addition of three U.S. military veterans to their salesforce and advisory board, as well as expanding operations to a third office in Washington, D.C. Dedrone currently is headquartered in San Francisco and has operations in Kassel, Germany. The addition of former mili...
IndigoVision, a developer of end-to-end video security solutions, announced the appointment of Gary Tryon as Senior Sales Director for USA Southeast Region. Unparalleled Knowledge And Experience With 35 years’ experience selling and deploying security technology globally, Tryon brings a proven track record in building sales teams, creating market leadership positions and building the partner channel with top performing sales revenues. Tryon has a wealth of knowledge specifical...
Quantum Secure’s SAFE 5.0 represents the next generation in physical identity and access management software Quantum Secure, part of HID Global, a provider of secure identity solutions, continues to grow its roster of end users for its SAFE platform. 2016 growth was seen in the application of all SAFE core technologies and was additionally fueled by further expansion of the SAFE offerings including SAFE Tenant Manager, SAFE Sports and Events and SAFE Predictive Risk Analytics Updates. By industry, exceptional growth was seen in government, aviation, finance, utilities and high-tech markets. The company’s platform now manages 7.5 million identities worldwide, maintaining Quantum Secure’s position as the world’s largest Physical Identity and Access Management (PIAM) software vendor. Forefront Of Managed Physical Security “The ongoing strong results we see reflect our commitment to continued improvements and enhancements to the SAFE software suite and keep us in the forefront of managed physical security solutions,” said Ajay Jain, President and CEO, Quantum Secure. “More than ever, across a wide range of vertical market applications, SAFE is the solution of choice to automate processes that offer real-time insight for identifying potential risks and create a safer and more secure environment.” Key enhancements to SAFE that have helped maintain growth momentum include: SAFE Tenant Manager SAFE Tenant Manager provides a self-service interface for organizations that have multiple third-party vendors, contractors or tenants sharing a facility or multiple buildings. This allows administrators to submit new company and contractor information for more independent management of facility and access-related requests. Quantum Secure’s SAFE 5.0 represents the next generation in physical identity and access management software Tenants can request physical access and new badges, invite visitors as well as book freight elevators in a faster, more efficient way using the advanced user experience delivered by SAFE. This decentralization allows for smoother tenant management operations and allows the parent organization to maintain control centrally with the appropriate visibility and approvals in place. SAFE Sports And Events Quantum Secure’s SAFE Sports and Events Access Manager enables secure and rapid entry to stadiums or other venues providing a high-quality, high-security customer experience for temporary or limited-engagement events. This mobile-app solution removes the need to rely on clipboards and lists to manage contractors, vendors, volunteers and thousands of other non-ticket holders who need temporary access to venues. The solution also integrates with IT systems and multiple handheld devices for swift, accurate real-time validation and immediate onboarding and provisioning for a variety of identity types based on each identity’s appropriate access permissions. Additionally, the solution records identity access logs to track key operational and security metrics and streamline compliance processes. SAFE Predictive Risk Analytics Updates SAFE Risk Analytics aggregates and correlates data from multiple external systems to generate cross application reports and provides interactive, point-and-click views of key physical security and other integrated security risks. Additional 2016 Quantum Secure SAFE Highlights Certified for use by Lenel for OnGuard and with AMAG Technology’s Symmetry New customers in a number of industries: airports, high-tech, finance, automotive, sports and events, as well as government, and oil and gas customers. Quantum Secure’s SAFE 5.0 represents the next generation in physical identity and access management software. Featuring an intuitive interface and advanced reporting capabilities, SAFE 5.0 delivers critical information in a single view, providing organizations with actionable intelligence to make better decisions regarding security and operations. SAFE 5.0’s powerful dashboards can be viewed from virtually any device, streamlining and simplifying initiation and auditing of access-related requests.
Bosch starlight cameras are designed to deliver excellent images in the lowest light conditions Searidge Technologies, a provider of Remote Tower and Surface Optimization solutions to airports and Air Navigation Service Providers (ANSPs), has successfully integrated Bosch IP cameras into its solution offering. Live Traffic Monitoring Searidge leverages the Bosch MIC IP starlight 7000 HD pan-tilt-zoom (PTZ) and DINION IP starlight 8000 MP cameras to help airport operators monitor and manage surface operations, safely and efficiently. The ability to monitor live traffic, day and night, and in all weather conditions is critical to operating an airport around-the-clock, 365 days per year. As part of the Searidge offering, video streams from multiple Bosch starlight cameras are stitched together and run through sophisticated processing algorithms to deliver seamless panoramic views of the apron, gate, taxiway, and runway areas of the airport surface. Video is displayed live to users, such as air traffic controllers, airport operators, security personnel, and more, and is archived for future playback and review. “The critical nature of our customers’ airport operations requires high camera reliability and visual output,” says Thuan Nguyen, Head of Operations, Searidge Technologies. “We selected the Bosch starlight line because they offer proven quality, backed by strong sales and engineering support.” DINION IP Starlight 8000 MP Camera “The critical nature of our customers’ airport operations requires high camera reliability and visual output” Bosch starlight cameras are designed to deliver excellent images in the lowest light conditions. They produce full color images in the dark beyond the point where other cameras have switched to monochrome. The DINION IP starlight 8000 MP camera offers five-megapixel resolution and provides excellent color performance even with minimal ambient light. The MIC IP starlight 7000 HD are ruggedized PTZ cameras built to withstand harsh conditions, including extreme temperatures, rain and snow, high wind gusts and vibration. Bosch starlight cameras are currently deployed by Searidge Technologies to support a variety of surface management operations in airports worldwide, including its Remote Situational Awareness and Zone Occupancy solution at Dubai International airport, Remote Tower solution at Budapest Airport, and Remote Airport concept of operation at Milano Malpensa and Linate airports. “The integration of Bosch starlight cameras with the innovative airport surface management solutions developed by Searidge Technologies is an excellent example of how video surveillance can extend beyond security to improve operations and efficiency for facilities worldwide,” said Jacquelyn Hall-Davies, Vice President of Sales, Canada, for Bosch Security Systems.
By industry vertical, military and defense dominated the situation awareness system market in 2015 A new report published by Allied Market Research titled, "Situation Awareness System (SAS) Market - Global Opportunity Analysis and Industry Forecast, 2015 - 2022", states the situation awareness systems (SAS) market is projected to garner $32.6 billion by 2022, registering a CAGR of 8.2% during the forecast period of 2016 - 2022. North America dominates the global SAS market, owing to the huge demand for situation awareness systems in the United States.Based on product type, the global SAS market is segmented into command & control systems; fire & flood alarm systems; radio frequency identification (RFID); radar; chemical, biological, radiological, and nuclear (CBRN) systems; sonar; physical security information management (PSIM)/ access control (including HMI); and others.Security Awareness System ComponentsThe key components of situation awareness systems include network video recorders (NVR), sensors, global positioning system (GPS), displays, and others. Presently, displays segment drives the global situation awareness systems market by component, accounting for 44.4% share of the overall market in 2015. Displays offer visual representation of the data captured from devices such as network video recorders and surveillance cameras and find widespread applications in numerous industries.Furthermore, the SAS market is analyzed based on geography into North America, Europe, Asia-Pacific, and LAMEA. North America dominated the situation awareness systems market, accounting for 42% share of the overall market revenue in 2015. This region is expected to continue its dominance during the forecast period. "The key components ofsituation awarenesssystems include networkvideo recorders (NVR),sensors, global positioningsystem (GPS), displays,and others" From a growth perspective, Asia-Pacific is anticipated to witness the highest growth among all the regions. The SAS market in Asia-Pacific is projected to grow at a CAGR of 9.9% during the forecast period, owing to the presence of several key SAS providers and increasing demand for security and surveillance in countries such as India, China, and Japan.Various Markets Command & control system accounted for the maximum revenue share in 2015, constituting around 31% of the total market revenue. In terms of growth, the radio frequency identification (RFID) segment is estimated to register the fastest CAGR of 9.7% during the forecast period. Based on verticals, the market is segmented into military & defense, healthcare, aerospace, marine security, automotive, mining and oil & gas, industrial, cyber security, and others. Military & defense segment dominated the market in 2015, accounting for 31.6% share of the overall market in terms of revenue.Key Findings By industry vertical, military and defense dominated the situation awareness system market in 2015 Among the product types, RFID has the highest growth potential and is expected to grow at the fastest CAGR during the forecast period, owing to its increased application across industries such as automotive, marine security, and healthcare North America would be the dominant geography in the situation awareness systems (SAS) market throughout the forecast period (2016-2022), owing to the widespread adoption of SAS solutions across different industries for improved security The report also outlines the competitive scenario of the situation awareness systems (SAS) market, providing a comprehensive study of the key strategies adopted by companies operating in the SAS market. Key companies profiled in the report include Honeywell International Inc., Rockwell Collins, Inc., BAE Systems, Inc., Microsoft Corporation, Denso Corporation, D3 Security Management Systems, Inc., Lockheed Martin Corporation, Harris Corporation, and others. Save
Quantum Secure saw remarkable growth in its customer base in 2015 A number of factors, including high-quality new products, a customer-centric approach to security, new customers and updates to its SAFE software suite, combined to make 2015 a very good year for Quantum Secure, now part of HID Global, a worldwide leader in secure identity solutions. “2015 was the best year in our company’s history, spurred by the introduction of new technologies, record sales levels, strong partnerships and significant growth within a number of key vertical markets,” said Ajay Jain, Quantum Secure’s CEO. “Our SAFE software now manages more than 5.5 million identities globally, making Quantum the largest PIAM software vendor in the world.” HID Acquisition Without question, the biggest development for Quantum Secure in 2015 was the company’s acquisition by HID Global in March. In acquiring Quantum Secure, HID took a significant step in enhancing its ability to create, use and manage secure identities from physical security to logical security domain. The combination of HID’s best-in-class technologies and global reach with Quantum Secure’s software suite helps end users – especially those in heavily-regulated industries such as finance, aviation and healthcare – streamline identity management, mitigate risk and ensure compliance. Customer Acquisitions Quantum Secure saw remarkable growth in its customer base in 2015, with more than 5.5 million identities managed by SAFE globally. This growth has been spurred by large numbers of new customers in the aviation, finance, government, high-tech, critical infrastructure markets, and a handful of Fortune 500 companies. Notable customer acquisitions in 2015 include Dallas-Fort Worth Airport, Orlando International Airport, Richmond International Airport, Portsmouth International Airport, Bank of America, Capitol One, Credit Suisse, Shell, Florida Power and Light, Twitter, and Salesforce. SAFE Version 4.9 Reflecting the company’s commitment to delivering solutions with a customer-centric approach to security, Quantum Secure provided significant enhancements to the latest version of its SAFE Predictive Security Software. Among the many updates found in version 4.9 are: Improved user interfaces designed to speed processing of visitors and provide self-service options to enhance customer convenience. New predictive reports and dashboards for identifying behavior anomalies to further strengthen SAFE’s predictive analytics and reporting ability. SAFE Monitoring Agent, which tracks system performance and reports potentially critical issues and is used for detecting and/or monitoring system- or data-related issues and notifying appropriate individuals about critical errors that could impact the ability for SAFE to operate at optimal levels. Predictive Security In acquiring Quantum Secure, HID took a significant step in enhancing its ability to create, use and manage secure identities from physical security to logical security domain In the last year, Quantum Secure has taken a leading role in promoting and providing predictive analysis capabilities within the security industry. Introduced at ISC West 2015, the software “connects the dots” by analyzing data from a variety of security and non-security systems to generate actionable intelligence. With a clear understanding of security operations and risks, organizations can initiate preventive action to potentially thwart incidents before they can occur – moving security toward a proactive rather than reactive function. To further support analysis, the software includes automated, actionable responses which can help reduce costs, reduce insider threat and enhance compliance. Contractor Management To ease the traditionally challenging task of effectively managing contractor identities, Quantum Secure’s Contractor Management Portal enables facility administrators to streamline the physical access and provisioning activities of their contractors. The portal allows administrators to provide a self-service website for contractors. The portal also tracks approvals with the contractor’s customer for specific area access requests. This ensures faster access provisioning of identities enabling rapid changes in the access levels, and managing badging requirements in a cost-effective manner. Partnerships Quantum Secure has continually sought to build relationships with leading security providers. In 2015 the company formed a partnership with Siemens Industry, Inc. Building Technologies Division. As an authorized value-added reseller of Quantum Secure’s SAFE software suite, Siemens is able to provide its global customer base with a high-performance enterprise-level physical security management solution that connects disparate security, IT and operational systems and reduces costs and risks by automating manual security processes. “We’re looking forward to carrying this momentum into the next year and beyond,” said Mr. Jain. We’re already working hard to ensure that 2016 will supplant 2015 as our best year ever.”
Transport Security Expo have brought together speaker and opinion leaders from government, industry and academia Transport Security Expo will this year be delivering more learning opportunities than ever before – and all of them will be free-to-attend for all delegates on a first-come, first-served basis. The conference and seminar sessions will cover the full range of transport security sectors – Aviation, Maritime, Rail & Public Transport, Secure Transportation and Border Security. Working closely with its Advisory Board, the organisers of Transport Security Expo have brought together a roster of top-level speakers, all highly acclaimed opinion leaders, from across Government, industry and academia, including : - Ben Lowater, Deputy Director, Critical National Infrastructure, CESG Kashif Chaudry, Head of International Strategy & Engagement, Aviation Security, Department for Transport (DfT) John Lamond, General Manager - Safety Security & Business Continuity, Hong Kong International Airport Assistant Chief Constable Steve Thomas, British Transport Police (BTP) Assistant Commissioner Tim Cutbill, Head of Operational Resilience Department, London Fire Brigade Peter Drissell, Director of Aviation Security, The Civil Aviation Authority (CAA) Guido Peetermans, Project Manager - Smart Security, IATA Rear Admiral Cristiano Aliperta, Maritime Attaché, Embassy of Italy in the UK Speakers At The Conference Chris Stevens, Technical Security Director at SIDOS UK who will be speaking at the conference about emerging threats to transport infrastructures, commented: “I have attended every Transport Security Expo that has ever been run in the UK, and I’ve always found that it focuses on the audience’s needs, and on the specific areas that are critical to a country’s wellbeing – transport being one of these. I have presented at the Transport Security Expo for the past four years ... Transport Security Expo is a truly global conference, one that deals with very real issues, and I am delighted to be a part of it once again for 2015.” Robert Missen, Head of Unit: Land and Maritime Security, Directorate-General for Mobility & Transport, European Commission added: “… for me, Transport Security Expo is the most important UK event to attend: not just because of the UK’s eminence in the field of transport security, but because of the conference’s excellent international focus.” There will be two conference theatres located in the heart of the main exhibition area and all of the sessions will be CPD-accredited, courtesy of the Security Institute. There will also be a dedicated Presentation Theater forming part of the Expo’s Future Borders Experience and offering a rolling program of half-hour presentations delivered by leading experts in the field. In addition, the Security Innovation Seminars theater, also free-to-attend, will host a full two-day program of presentations and live demonstrations from a wide range of the event’s exhibitors who will be revealing some of the very latest technologies in numerous areas including: airport check point, perimeter security, large area monitoring, digital railways, surveillance solutions, biometrics, supply chain security and integrity, maritime security and text analytics. A number of Transport Security Expo partners will also be running their own seminars and workshops across the two days of Transec, including a Kidnap and Ransom workshop delivered by NYA International, the world-leading global risk and crisis management consultancy. Peter Jones, CEO of Nineteen Events, organisers of Transport Security Expo, commented: “We are very excited about the variety and the outstanding quality of the conference and seminar program we have put together this year. The fact that all of this leading edge content will be free-to-attend for all delegates will undoubtedly make Transport Security Expo a must-attend event for anyone involved in any area of transport security.”
There is a growing demand for advancedelectronic ID credentials to improve citizenexperience and maintaining security levels HID Global®, a worldwide leader in secure identity solutions, will showcase the mobile ID experience on smartphones and share its latest innovations in thin secure polycarbonate e-passport datapages at the International Civil Aviation Organization (ICAO) Machine Readable Travel Documents (MRTD) Conference, October 14 through 16, 2015, in Montreal. HID Global executives will be featured speakers at the conference. HID Global will display its broad offering of government credentials and citizen ID solutions in Booth #2 at the conference, with a special focus on ICAO compliance challenges and how to meet them. The highlight is a thin polycarbonate electronic datapage at the heart of today’s high-security e-passports. HID Global’s new datapages are among the industry’s thinnest, which reduces e-passport thickness, provides increased flexibility, or provides the additional room needed to add more security features on both sides of the datapage to prevent duplication while still complying with ICAO standards. “We’re seeing a growing global demand for more advanced electronic ID credentials as governments look to improve the citizen experience while maintaining the highest levels of security through ICAO compliance,” said Joseph Pearson, Vice President of Government ID Solutions Sales, North America with HID Global. “As an industry leader in secure identity solutions, we find that conferences such as ICAO provide us with the excellent opportunity to share the latest advancements in our ICAO-compliant datapage offerings for thinner and more flexible e-passport documents. ICAO is also an ideal venue for showcasing to attendees the latest evolution in mobile identity for smartphones.” HID Global Executives Will Also Be Featured Speakers In Two Sessions At The ICAO Conference: “Change is coming: Virtualization and Travel Documents.” Rob Haslam, vice president of Government ID Solutions with HID Global, will highlight important principles that are driving policy discussion and development so that mobile driver licenses and other mobile government identities will meet the needs of users, issuing agencies, law enforcement, and other stakeholders who rely on secure IDs for a wide range of purposes. Tuesday, October 13, 2015, during the welcome reception from 5 p.m. to 7 p.m. "What governments want: Developments in durability, datapage solutions and beyond." Jorge Castrillo, senior sales director of Government ID Solutions with HID Global, will describe the key secure polycarbonate electronic datapage attributes required to meet the needs posed by rapid growth in the demand for e-passports and e-IDs made from these materials. Thursday, October 15, 2015, from 10:20 a.m. to 10:40 a.m. during the solutions oriented workshop.
What effect will the attacks in Brussels have on aviation security? Screenings inpre-security airport areas have been uncommon, but may become standard practice Will the Brussels airport attack herald a new era of aviation security? Like the bombing of Moscow’s Domodedovo Airport in 2011, the Brussels attack took place “landside”, meaning that security precautions would have been low-key and limited to spot checks and the general watchfulness of police officers for unusual behavior. Combination Of Security Techniques Even the tabloid press has had the sense not to second-guess Belgian authorities and ask why there were no metal detectors and body scanners at the departure hall. Only airports with particularly chequered pasts in terms of terrorism and sectarian violence (Istanbul, Nairobi and Mumbai) have screening operations at pre-security areas. However, unless their aim is to undermine public confidence by evading security measures or taking control of a plane, it makes little difference to terrorists exactly where they kill aviation passengers. CCTV still images from Brussels, which flashed around the world shortly after the attacks, showed Najim Laachraoui, who blew himself up at the airport. We now know that Laachraoui not only made the Brussels bombs but probably also made the suicide vests used in Paris back in November – fragments recovered there contained his DNA. A mug shot identifying Laachraoui as a significant terrorist suspect had been distributed by Belgium Federal Police only days before the attack in their capital. Consider the imaginary scenario of a comprehensive database of possible jihadists shared by transport hubs all around Europe. Combine that with perfect facial recognition CCTV (from all angles), not just airside but in the departure hall. And assume the resulting information is actionable quickly enough to intercept attackers. Then and only then would the Belgian airport trio have been halted. Video Analytics For Airport Security Clearly this is the stuff of fantasy, though I’m aware of current progress and invite facial recognition vendors to weigh in. But here’s a sobering statistic from London: the Metropolitan Police’s forensic imaging team has admitted that, of the 4,000 images entered onto their database after the 2011 riots in the UK, only one person has been recognized solely by facial geometry. More generalised video analytics have a definite role to play in protecting airports; there are algorithms that will alarm on unusual direction of movement and loitering when other passengers are flowing through the site. Yes, there were peculiar aspects to the bombers. Two of them were wearing a glove on one hand only (concealing links to detonation devices), and they had large suitcases but no carry-on luggage. But this is the kind of atypical behavior that is likely to register with human rather than artificial intelligence. I concede that analytics can do much to reveal an abnormal gait that might indicate the weight of a bomb vest but would challenge any movement algorithm developer to report much about a passenger when they are pushing a trolley. Key terror suspect Mohamed Abrini open up. #BrusselsAttack #ISIS #MohamedAbrinihttps://t.co/s4onH32OeL pic.twitter.com/3Y82I1kKQE — Indiacom (@indiacom) April 9, 2016 Explosive Device Detection The immediate potential for improving security throughout airport premises probably lies with alerts on explosives through trace (minute particulate) detection. Military-grade explosives are a rarer commodity now than 10 years ago (the physical security sector can take some credit for this) and without sponsorship by a rogue state, the terrorist’s current explosive of choice is triacetone triperoxide (TATP). A crystalline powder, TATP is a synthesis of three commonly available materials – hydrogen peroxide and acetone (staples of the beauty industry) and mineral acid. Known to bomb-makers as “The Mother of Satan” because of its volatility, TATP is also a nightmare for security since (unlike fertilizer bombs) it contains no nitrogen that can be detected with relative ease. TATP has been used by terrorists ranging from “shoe bomber” Richard Reid to the jihadists in London on 7/7 and more recently in Paris and Brussels. One of the bombs carried into the Brussels airport remained undetonated within a suitcase, and authorities found it to be composed of metal bolts and nails with TATP as the explosive. A handheld device from Oregon-based FLIR Systems can now collect particulates from surfaces and create a noticeable change in fluorescence signal when TATP is detected. Most explosive materials tend to be sticky and will defeat attempts to prevent them from collecting on clothes and hair by all but the most determined and skilled bomber. Challenges For European Security Community Other detection methods include CT (computerized tomography) scanning to compare the density of items in bags and suitcases with the density values of substances known to pose a threat of explosion. Adding TATP to libraries of suspicious density values has been a logical and fairly easy step by manufacturers. As TATP detection devices become cheaper, more portable and unobtrusive it will be possible to use them extensively in transport locations. Few analysts would have failed to note that the Brussels bombings came four days after the capture of Salah Abdeslam, who is suspected of having masterminded the Paris attacks. Abdeslam’s lawyer has said that his client is cooperating with authorities in Belgium. The Brussels airport and Metro attacks were improvised measures by a cell who knew they were in imminent danger of capture. The bombers had another target in mind, and given more time would have mounted a more concerted operation. Speculation can of course be feverish, but there have been suggestions that the real target was one of Belgium’s seven nuclear reactors or the UEFA Euro 2016 soccer championship to be held in France this summer. The enormity of the two possible targets is worrying, but security professionals may be equally concerned by the fact that these are such different threats. Both concern perimeter protection but of an almost diametrically opposite kind. The range of challenges facing the European security community is dizzying.
Williams Meredith recently stepped out of his Kentucky home to see a drone hovering over his porch, videotaping his young daughters by the family pool. It wasn’t the first time one of these small flying devices had wandered over to take a look, but it had never gotten so close. So he did what any red-blooded American would do when confronted with a home invader – he blew it from the sky with a single shotgun blast. The confrontation is another example of the rising use of unmanned aerial vehicles (UAVs), and a confirmation that neither laws or law enforcement have kept up. In recent months, drones have been used to smuggle drugs behind prison walls and enable paparazzi to crash celebrity weddings. Officials at power plants and other secure facilities report seeing these vehicles buzzing their perimeters, sparking concern they could be used by criminals or terrorists. Tracking Drones Those fears have opened up a new market for drone detection systems like those marketed by Dedrone, whose Drone Tracker device has been installed by a variety of companies with property to protect. Williams Meredith decided to get one to protect his home. “This has happened before, and when the police come there is no evidence there was even a drone here – let alone where it was over my property,” he explains. “Now we have the capacity of being alerted when it gets here no matter where it is. We now have video and sound of it being here.” Dealing with drones has beencomplicated by laws and regulationsthat never considered the idea of small, relatively cheap unmanned remote controlled vehicles For Meredith, the issue is protecting home and family and providing evidence to law enforcement. After shooting down the drone it was he (not the drone’s owner) who was arrested and charged with first degree criminal mischief and wanton endangerment for discharging a firearm. Drones are so new that privacy and property protection laws haven’t caught up. The Federal Aviation Administration – after prodding by Congress – has recently begun to rewrite regulations and in preparation to issue permits for the commercial use of UAVs. “They finally published [regulations] for comment at the beginning of this year, and they’ll be lucky if they get them passed and promulgated by some time in 2016,” says John Fry, a partner in the new drone practice group at Morris, Manning & Martin, LLP. Meredith expects the charges against him to be dropped, and some experts agree that’s likely even in the absence of new laws. University of Miami law professor Michael Froomkin says it’s reasonable for a homeowner to assume that “robotic intrusions” are menacing and that you may have the right to “employ violent self-help.” That’s also the way Meredith looks at it. Growing Market For Drone Trackers “There are very few products on the market today that are really addressing the security concerns with drones,” says Dedrone CEO Brian Edmunds. “Ours differs quite a bit from some of the others in that we have a multi-sensor approach to drone detection.” It’s equipped with microphones for audio recording, video cameras and near-infrared sensors for image detection in low light. Using multiple parameters such as noise, shape, and movement patterns, it can detect all types of drones including silent gliders. The built-in camera saves images and videos in HD quality, providing the type of evidence of the threat intrusion that Meredith lacked in his drone encounter. “Detection is really a big task because there are so many things flying in any area,” says Edmunds. “You have planes, helicopters, birds, leaves, and you have to be able to differentiate between the things that are safe and the drone that may be flying in your airspace.” Critical infrastructure such as gasand electric generation companiesand nuclear power plants are alsodeploying the system to guard theirfacilities against a threat thatoften goes undetected The system is programed to distinguish these objects based on sound and unique flight patterns. Once confirmed, the system automatically sends a text or email alert to a smartphone or other device. It also starts recording video that is stored locally for later use. As drones have multiplied, some have garnered headlines. Early this year, when a drunken intelligence agency employee crashed his drone on the White House lawn, inquiries coming into Dedrone ratcheted up as well. “Right now we’ve been talking with prison facilities, private industry and individuals as well,” says Edmunds. “People are starting to see more and more that this is a threat and they want (Drone Tracker) for their own personal security.” Critical infrastructure such as gas and electric generation companies and nuclear power plants are also deploying the system to guard their facilities against a threat that often goes undetected, he adds. Lagging Laws For UAVs Dealing with drones has been complicated by laws and regulations that never considered the idea of small, relatively cheap unmanned remote controlled vehicles. The FAA has been writing drone regulations, but only for commercial use. The FAA is issuing licenses – called 333 Exemptions – to companies such as Amazon.com, which wants to use the vehicles to deliver packages to customers. The agency has issued almost 2,000 of the exemptions so far this year. “That’s a pretty dramatic increase in the allowance rate, but we still have one of the most significant aspects of drone operation, which is the airspace management and safety, still being managed by exemption,” observes Fry. In the meantime, states are beginning to debate and pass legislation to protect privacy and property rights, according to Tony Roehl, another partner in the Morris, Manning & Martin, LLP drone group. “We found that the U.S. is behind other countries that have addressed drones much more comprehensively at the national government level,” he explains. “That’s why you’re seeing a lot of innovation in drones coming from outside the United States.” Meanwhile, business and individuals are taking matters into their own hands, deploying detection systems and even confronting drones head on.
Preventive security measures and security training of personnel in the line of fire have improved dramatically Aviation security has significantly intensified since 9-11, and we’re making it more and more difficult for terrorists to get to us on the ground and in the air. In February the FBI arrested three men in Brooklyn plotting to hijack an airliner, and in the 14 years since the terrorist attacks of 9-11, officials have foiled dozens of plots against airlines, buildings, people and events. Counter Terror Successes Some of these successes are very recent: Just a few days ago, for example, FBI Director James Comey told CNN that the bureau had foiled a number of terrorist plots hatched to kill U.S. citizens over the Fourth of July holiday. Comey speculated that terrorists abroad may have recruited, supported and encouraged the actors in these plots, but wouldn’t reveal additional details. For the most part, officials aren’t talking about their domestic law enforcement successes in counter terrorism, and the numbers of terrorist plots may be much higher than what the media discovers and reports. Lacking Intelligence Capabilities? Shortly after 9-11, Stephen Flynn, author of two books about 9-11, terrorism and security, told me that the nation’s intelligence capabilities were way behind when it came to terrorism. He also said that it would take several years to build up those capabilities. Eventually, he noted, good intelligence would make us much safer. Could his prediction be coming true? Intelligence has prevented a number of plots in recent years before they could get started. According to the TSA, currenttechnologies can even detectnon-metallic weapons, such asplastic handguns — an issueof great concern for many yearsafter 9-11. Some critics disagree. One school of thought contends that many FBI arrests of Muslim-Americans actually involve criminal activity inspired by the FBI. According to this theory, undercover FBI informants convince Muslim-Americans to undertake terrorist activities. When they get under way, the FBI arrests them. However, it makes better sense to suggest that successful intelligence operations are making us safer most of the time. Changes In Airport Security In addition to higher quality intelligence, preventive security measures and security training of personnel in the line of fire have improved dramatically, as well. Look at what the airline industry has done to prevent and foil attacks. Created immediately after 9-11, the Transportation Security Administration (TSA) immediately instituted a comprehensive aviation security program. TSA began to thoroughly screen all passengers and luggage. The agency cordoned off all airports, allowing only ticketed passengers to pass through airport security. The TSA technology center, working with private industry, developed — and continues to develop — advanced screening technologies capable of detecting explosives, weapons and other implements of destruction. According to the TSA, current technologies can even detect non-metallic weapons, such as plastic handguns — an issue of great concern for many years after 9-11. For sure, TSA doesn’t geteverything right. They can beinvasive in their pat downs. Thescreening slows movementthrough airports so much thatmany of us have come to dislikeflying. Still, TSA appears by andlarge to be succeeding inpreventing terrorists from gettingto our airplanes. TSA has also created the Federal Flight Deck Officer Program, which trains and authorizes flight crewmembers to use firearms to defend against hi-jackers. Cockpits have been secured with combination locks on Kevlar-constructed doors. Courage & Crisis Management For sure, TSA doesn’t get everything right. They can be invasive in their pat downs. The screening slows movement through airports so much that many of us have come to dislike flying. Still, TSA appears by and large to be succeeding in preventing terrorists from getting to our airplanes. Everyday people are on the alert, too. In March of this year, a passenger on a United Airlines plane rushed the cockpit screaming “jihad, jihad.” Passengers jumped the man and restrained him while the pilot turned the plane around and returned to the airport. The incident brings to mind the inspiring courage of the passengers on Flight 93 who rose up against the terrorists in their cockpit and sacrificed their lives preventing the plane from crashing into the White House or Capitol Building in Washington, D.C., on 9-11. In the end, we’re all everyday people, people who often fail to deal adequately with large threats to society. Our collective response to terrorism over the past 14 years suggests that we can succeed in taking on big challenges and crises — once we see clearly what needs to be done.
Could Drones Be Used for Civilian/Commercial Surveillance Within Five Years? Drone strikes in war zones are reported routinely now in the news, but unmanned aerial vehicles (UAVs) or drones are still not common in commercial and civilian applications. Commercial uses may still be several years away, but is it too soon to start thinking about the possible security applications? Currently in the United States, Congress has directed the Federal Aviation Administration to come up with a plan by September 2015 to “integrate” unmanned aircraft safely into U.S. airspace. After that, presumably, the FAA will grant licenses to fly the vehicles for various civilian and commercial uses. The agency projects that five years after it issues regulations for drones weighing 55 pounds or less, there will be 7,500 such devices in the air. Meanwhile, technology advances are making the process of flying the drones both more precise and more automated. By the time drones are widely used in the commercial world, it will be a mature technology that has performed many years in military applications. The effective wartime use of drones has encouraged greater consideration of how the devices can be used in commercial applications such as security. Enhancing video surveillance for large perimeters The most obvious security application is the ability to add new bird’s-eye views to video surveillance systems. Drones programmed to “patrol” a perimeter could expand current capabilities of security to provide an early warning, or could even be programmed to follow a target as it approaches a protected facility. Drones could be used to view very large areas, such as along petroleum pipelines which may now be unprotected. Use of a variety of sensors and other electronic components makes the potential benefits of drones for security applications almost limitless. Even as the U.S. regulatory issues are being settled, it is likely commercial uses will continue to be developed in other places in the world, ready to deploy domestically as soon as they are allowed. Other civilian applications include policing and firefighting or other work that is dangerous or unpleasant. How might the interaction of such uses with existing security systems promote greater protection and faster emergency response? How should the security industry be preparing for civilian uses of drones? (For that matter, what new vulnerabilities and threats does the technology represent and how should the industry prepare?) Drones are already being used for surveillance at the U.S.-Mexican border, and the Washington Post reported earlier this year that various federal, state and local law enforcement agencies often borrow the drones for missions such as disaster relief and searching for marijuana crops. We have all watched how fast technology can change our market. It may not be too soon to be thinking about how drones could become a valuable new tool for the security market. Five years isn’t very long.
HENSOLDT, the independent sensor solutions house, will deliver its IFF interrogator (IFF = Identification-friend-or-foe) for very short range and short range air defense applications to the French Ministry for the Armed Forces. The contract awarded to Hensoldt France SAS covers the delivery of 134 MSR1000I (monopulse secondary radar) destined for integration on the French Army’s MISTRAL missile launchers and MARTHA air defense command and control stations. The MSR1000I IFF interrogator has been successfully qualified by the French Defense Procurement Agency DGA in December 2018 and will perform NATO IFF interrogation together with the mini crypto-computer QRTK6NG, also manufactured by Hensoldt France. Following this, the first tranche has been notified and 41 MSR1000I compliant with the STANAG 4193 Edition 3 will be delivered in 2020. Precise Identification Of Ships And Aircraft IFF systems precisely identify ships and aircraft by automatically sending interrogation signalsThe French very short range and short range air defense platforms wiIl then be able to perform mode 4 and mode 5 interrogations. IFF systems precisely identify ships and aircraft by automatically sending interrogation signals which are answered by so-called transponders on-board friendly aircraft or ships. Thus, IFF enables field commanders to quickly distinguish friendly from hostile forces. Unlike Mode 4 used hitherto, Mode 5 employs sophisticated encryption techniques to avoid hostile signal manipulation, thus ensuring that the identification process is absolutely reliable and secure. With the decommissioning of 'Mode 4', ‘Mode 5’ needs to be introduced in all western armies, then being a precondition of joint operations of NATO and allied forces. IFF Systems For Ground And Naval Platforms HENSOLDT supplies customers all over the world with IFF equipment. Based on the experience of predecessor companies like Matra, Airbus and Siemens, the company is under contract to upgrade German, French, UK, US and other armed forces’ platforms with IFF systems using the latest ‘Mode 5’ standard. It has already delivered IFF systems – including crypto devices - to ground and naval platforms of 42 NATO and NATO-allied nations. HENSOLDT has already delivered IFF systems to ground and naval platforms of 42 NATO and NATO-allied nations In France, the company’s equipment is deployed on the ‘Charles de Gaulle’ aircraft carrier, the Rafale and Mirage 2000 combat aircraft, the NH90 helicopters and several air defense platforms. In Germany, the company has established the air traffic control/IFF network of the German Air Force and delivers interrogators and transponders to a number of airborne and naval platforms. In total, HENSOLDT has about 450 IFF systems under contract for more than 80 platform types.
Johnson Controls announce that the aviation specific CEM Systems AC2000 Airport access control solution has been selected to secure the new Bahrain International Airport. The powerful CEM Systems AC2000 Airport software and industry leading CEM Systems hardware is being installed at Bahrain International Airport to ensure the highest level of integrated security and assist in controlling passenger flow across the airport. The contract was awarded by Thales and will be delivered by regional partner Tyco Fire and Security Middle East. Bahrain International Airport is the international airport of Bahrain, located in Muharraq, an island about 7 km northeast of the capital Manama. The airport is currently undergoing a $1.1 billion expansion that will boost the airport's capacity to fourteen million passengers per year. Resilient Solution For Aviation Security “This contract to secure Bahrain International Airport represents another significant win for CEM Systems AC2000 Airport solution in the growing aviation sector in the Middle East region,” said Philip Verner, regional sales director, Building Technologies & Solutions, Johnson Controls. “The powerful CEM Systems AC2000 Airport has a proven record as one of the most reliable and resilient access control and security management solutions available for aviation security. It not only provides Bahrain International Airport with advanced access control throughout terminal buildings and airside/landside boundaries, but it also provides a range of software applications to enhance the airport’s onsite operations and increase business efficiency.”
Apstec Systems announces that its Human Security Radar (HSR), the first fully automatic real-time mass people screening solution, has been selected by Esenboga Airport, Ankara, to significantly boost security in land side areas. Chosen following a rigorous selection process, including a pilot installation, HSR will be installed at the terminal entrances as part of ongoing security enhancement measures by the Turkish State Airports Authority. It will enable people screening without slowing down the flow of traffic, with each system capable of scanning up to 10,000 individuals per hour. The technology was deployed in partnership with local distributer AKBA. Cost-Effective Solution The devastating attacks on Ataturk Airport in Istanbul and Brussels Airport highlighted the vulnerability of the land side of airports to terrorism The devastating attacks on Ataturk Airport in Istanbul and Brussels Airport highlighted the vulnerability of the land side of airports to terrorism. Since these events there has been global interest in securing the land side of airports, but traditional aviation style security checkpoints or manual searches, which scan one individual at a time, are not suited to purpose and result in large queues of passengers, which are vulnerable to attack in their own right. With existing approaches to security screening providing impractical, inconvenient and expensive to operate, terminals have remained susceptible to attack, or are subject to intrusive and disruptive security screening regimes. HSR was designed to address this challenge, and offers a practical and cost-effective solution to security screening in such high footfall scenarios. Enhanced Security Measures The first fully automated, real-time mass screening solution, HSR provides seamless security to protect public places from terrorist attacks. The walkthrough system uniquely combines unparalleled high throughput, speed and accuracy, simultaneously screening multiple subjects in real-time for threats, without the need for an operator to inspect suspect materials. With 40,000 passengers traveling through Esenboga Airport every day, the deployment of HSR will be instrumental in improving security for millions of people. Through deploying HSR as part of its commitment to terminal safety and enhanced security measures" “HSR constitutes a major breakthrough in the way airports protect the land side of terminals,” commented Osman Aksoy & Sirzat Balin,Co-Founders, AKBA. “Through deploying HSR as part of its commitment to terminal safety and enhanced security measures, the Turkish Airport Authority has taken a major step to prevent the reoccurrence of terrorist attacks.” Mass Transport Hubs Esenboga Airport’s uptake of HSR is the latest major deployment of the technology, which is currently utilised by some of the world’s largest airports, as well as sports stadiums, entertainment venues, mass transport hubs and networks, places of worship, hotels and high-end retail and entertainment centres. “HSR is proven to dramatically improve safety in crowded public spaces, and enables venue owners to close a critical security capability gap,” added Gregory Labzovsky, CEO, Apstec. “We’re therefore delighted to be working with Esenboga Airport to enhance safety for millions of travellers. AKBA, our distributor in Turkey, were instrumental in helping the Turkish Authorities understand the potential of HSR.”
Hoverfly Technologies Inc., global supplier of tether-powered aerial drone systems, is pleased to announce it has engaged retired Deputy Chief of Los Angeles Police Department Mike Hillmann to consult and provide expertise to Hoverfly and public safety officials of cities, counties and special law enforcement agencies who are considering the use of Small Unmanned Aerial Systems (sUAS) to assist in keeping their cities safe. Small Unmanned Aerial Systems (sUAS) When incidents and/or events happen, having ‘real-time, situational awareness’ from above the scene is critical to managing risk and upholding public safety “With 24-hour news cycles, a never-ending stream of social media posts, mid-term elections and potential threats to the public at large, getting fast, accurate situational awareness from the air during an incident has never been more important when it comes to keeping the public safe. We are thrilled to have Chief Hillmann advising on use cases and how best to implement and integrate this new technology,” says Hoverfly SVP of Systems, Lew Pincus. When incidents and/or events happen, having ‘real-time, situational awareness’ from above the scene is critical to managing risk and upholding public safety and the safety of those who serve our communities. Aerial/Drone Surveillance He adds, “We typically have relied on manned aircraft to provide aerial coverage over a variety of incidents. On occasion, those assets have not always been available, deemed too disruptive or too expensive to deploy in certain situations where an aerial view clearly could have helped an incident commander better understand the situation. Deploying small tether-powered, highly portable, unobtrusive persistent cameras positioned high above the scene can now be used as either a standalone capability or integrated system with existing networks, security infrastructure and even manned aircraft.” Hoverfly tether-powered sUAV (Small Unmanned Aerial Vehicles) systems solve short battery-life problems associated with free-flying dronesToday, Mr. Hillmann is helping chiefs of police, local city and county officials and other public safety personnel understand how Hoverfly’s tether-powered LiveSky systems can be deployed from police or EMS vehicles providing incident commanders with actionable intelligence from high above the scene within minutes of arrival. “Tactically, having the ability to stay in the air monitoring the situation from above for hours, days, even weeks at a time represents an amazing capability we never had before. During my career, I can think of hundreds of situations where having a drone in the air to provide real-time intelligence, surveillance and reconnaissance would have helped keep my officers and the community much safer. It’s a force multiplier that should be exploited by public safety,” says Hillmann. Hoverfly’s LiveSky Systems Hoverfly tether-powered sUAV (Small Unmanned Aerial Vehicles) systems solve short battery-life problems associated with free-flying drones because they operate using a standard 120VAC power source or vehicle inverter. The power, command and control information and video are transmitted over the tether making the entire system completely secure from jamming, hacking or spoofing, ensuring the privacy of the data and improving safety. Perhaps the biggest benefit of Hoverfly systems is they are autonomous and require no piloting skills. The CEO of Hoverfly likes to say, “if you can operate an elevator, you can operate our LiveSky system.”
Government regulations continue to step up security demands at federal agencies, requiring identity cards to support multiple identity assurance factors and be validated at entries into a building or location. Because of the cost and infrastructure that goes along with many security upgrades, federal agencies must wait months or, in many cases, years to implement changes. The Federal Aviation Administration—an operating mode of the U.S. Department of Transportation—is no different. The FAA is tasked with the colossal mission of regulating and overseeing all aspects of civil aviation in the United States. With offices around the world, including its headquarters in Washington, D.C., the FAA has a large number of employees and buildings to oversee. With so many people coming into and out of the buildings each day, it is particularly important that security personnel have reliable tools to validate employee credentials Need Of Tools For Validating Employee Credentials As part of its security requirements, the FAA must validate Personal Identity Verification (PIV) cards at checkpoints within its facilities. With so many people coming into and out of the buildings each day, it is particularly important that security personnel have reliable tools to validate employee credentials. As recently as a year ago, FAA security personnel were conducting visual inspection of PIV cards at the gates into facilities that did not have PIV card readers. They had no way of telling if the card was authentic, revoked, or if the employee had access rights to a checkpoint at a particular time. At the FAA headquarters, which employs just under 6,000 permanent employees, and another FAA facility, the Minneapolis Air Route Traffic Control Center, which is the organization’s 11th busiest airport traffic control tower, visual verification just wasn’t enough. Automating The Verification Process In order to comply with HSPD-12 and the Office of Management and Budget (OMB) Memorandum 11-11, the FAA needed a process beyond visual verification that allowed security personnel to quickly check the authenticity and revocation status of a card, as well as access rights to a particular area of the facility. With as many as 5,000 people coming into the FAA headquarters facility daily, the organization’s primary goal was to automate the verification process. “The project needed to provide guards the ability to validate PIV cards at FAA facilities where the gates did not have PIV card readers,” said Craig Auguston, HSPD-12 Program Manager at the Federal Aviation Administration. “We also wanted a mobile solution for backup and for roaming guards to be able to validate secure areas, such as parking garages.” Codebench’s OMNICheck Plus Software OMNICheck Plus was ultimately decided upon because it is integrated with many physical access control systems including the P2000 The FAA began looking at products that could not only meet its requirements for mobile validation, but also integrate seamlessly with its P2000 security management database from Johnson Controls (JCI), according to Auguston. “This upgrade was important to meet the FAA’s requirement to validate PIV cards at all check points,” Auguston said. The FAA’s former process of visual verification was not allowing security guards to check the status of a PIV card, such as revocation status and specific access rights, both of which the organization needed to meet its security goals. After testing a couple of mobile software validation programs, the organization chose OMNICheck Plus software from Codebench, a HID Global Company. OMNICheck Plus was ultimately decided upon because it is integrated with many physical access control systems including the P2000, and it is listed on the GSA’s FIPS 201 Approved Products List as a CAK authentication system when running on an ARM-based mobile device such as the DAP CE3240B, which both FAA facilities use. Giving Mobile Access To The Security Guards “They really needed something that was going to allow their security guards to be mobile in certain parts of a facility,” said Botio Mandov of Johnson Controls. Johnson Controls, the integrator for the project, helped the FAA implement a larger security upgrade, which included the security management database and mobile validation software. Together, the FAA’s mobile DAP devices and OMNICheck Plus software enabled roaming security guards to use the mobile handheld devices in FAA parking garages and other entry points that needed to be secured, but do not have stationary PIV card readers. One of the most important aspects of authentication software for the FAA was the ability to check an employee’s access rights directly on the mobile card readers Checking Access Rights On Mobile Card Readers In addition to mobility, one of the most important aspects of authentication software for the FAA was the ability to check an employee’s access rights directly on the mobile card readers—something only their organization’s P2000 physical access control system could do previously. With an OMNICheck module called Data Import, certain cardholder information housed in the FAA’s P2000 database, such as access rights, was pushed down into the DAP mobile devices used by security personnel. “Access rights allow FAA security guards to make sure employees’ cards are not only valid, but that they are allowed to be in a certain area at a certain time,” Mandov said. In addition, FAA security administrators can run audit reports that show which cards were checked and when. The implementation took about five months, including testing the interface with the access control system and coming up with a training guide for the security guards, according to Auguston. The FAA is currently using 31 DAP CE3240B mobile readers with OMNICheck Plus. Saving Money By Eliminating Physical Parking Passes Prior to the OMNICheck Plus installation, FAA security personnel had an unreliable way of authenticating PIV cards and access rights. Now, security personnel are able to verify digital certificates, revocation status and access rights, all while having an audit trail of the cards checked in the system. An additional, unexpected benefit for the FAA has been the cost savings of eliminating physical parking passes at its two facilities. “We are able to positively identify cardholders’ status when they try to enter the facility. We were able to save money by eliminating the physical parking pass by using OMNICheck to validate cardholder’s status for parking in FAA-controlled facilities,” Auguston explained.
Johnson Controls announces that the aviation specific CEM Systems AC2000 Airport access control system has been selected to secure Muscat International Airport and Salalah Airport, Oman. AC2000 Airport access control solution with intelligent CEM Systems, IP card readers and CEM Systems S3040 portable hand-held readers will ensure the highest levels of integrated security, and provide a solution that goes beyond security by helping in airport operations. Oman Airports Management Company (OAMC) is the government company responsible for the management and operation of Muscat International Airport and Salalah Airport. Muscat International Airport is the largest airport in Oman. Currently undergoing an expansion phase, Muscat International Airport will have the capacity to handle 12 million passengers annually. Salalah International Airport currently handles more than one million passengers annually. Aviation Specific Access Control “Johnson Controls is delighted to be supplying the CEM Systems AC2000 Airport access control system for these two important projects in Oman’s infrastructure development,” said Philip Verner, regional sales director, Building Technologies & Solutions, Johnson Controls. “The team behind the CEM Systems AC2000 Airport system has a proven history of understanding the dynamics and needs of airports, and the industry leading AC2000 Airport system has been used to secure airports around the world for over 25 years. This contract to secure Muscat and Salalah Airports represents another significant win for Johnson Controls in the growing aviation sector in the Middle East region.” The powerful AC2000 Airport system has a proven record as one of the most reliable and resilient aviation specific access control and security management solutions available. It not only provides the airports with advanced access control throughout terminal buildings, airside and landside boundaries, but it also provides a range of software applications to enhance the airport’s onsite operations and increase business efficiency. Using the CEM Systems AC2000 VIPPS (Visual Imaging Pass Production) application, ID cards can then be personalized and printed allowing the airport to produce card passes that include logos, staff signatures, and images. Integrated Passenger Control System AC2000 Airport paired with CEM Systems intelligent IP card readers and integrated controllers also provide the airports with aviation specific modes such as ‘Passenger mode’ which allow efficient management of gate rooms for departing and arriving passengers. Passenger mode controls door open times, and via interlocking, ensures Gate Room doors are opened or closed depending on the configuration set for the specific flight on the stand. The user-friendly LCD display on the CEM Systems intelligent card readers also allow staff to easily manage the process and see current status of the door mode at the gate. Additionally the CEM Systems S610f fully integrated intelligent fingerprint card reader and controller combined can be used in high security areas where there are requirements for three stage verification (card, PIN, and fingerprint). The CEM Systems S3040 lightweight and rugged hand-held portable card reader will provide Muscat International Airport and Salalah Airport security staff with the ability to conduct random checks on airside and landside personnel as well as providing ID card validation at temporary entrances or remote sites which have no power.