Johnson Controls will showcase solutions and thought leadership critical to safe building reopening during the virtual Global Security Exchange Plus (GSX+) conference. From Sept. 21 to Sept. 25, 2020, Johnson Controls experts will demonstrate and discuss the latest security innovations that have become integral to intelligent security during the COVID-19 crisis and beyond. Attendees can interact with Johnson Controls leaders during keynote event sessions, technology demos and a thought leader i...
Cyan Forensics is announcing a new partnership with Susteen. This partnership joins together Cyan Forensics scanning technology software with Susteen’s DataPilot DP10 platform, creating a triage capability for smartphones, meaning that police forces will be able to scan portable devices for illicit materials, such as child sexual abuse, swiftly and accurately. Evidence collection Partnership will allow investigators to use Cyan Forensics’ scanning technology with Datapilot DP10 t...
General Dynamics Mission Systems and Dedrone, the globally renowned company in airspace security and defense, has announced their strategic counter-drone partnership, providing General Dynamics' global network with access to Dedrone's complete drone detection and defeat technology. Counter-unmanned aerial systems As part of this strategic agreement, General Dynamics Mission Systems becomes a value-added reseller for Dedrone's counter-unmanned aerial system (C-UAS) capabilities and has made a s...
SMART SHOOTER, a designer, developer, and manufacturer of innovative fire control systems that significantly increase the accuracy and lethality of small arms, announces that it has successfully completed another step in testing the SMASH Hopper in different configurations. SMASH Hopper, SMART SHOOTER's Light Remote-Controlled Weapon Station (LRCWS), was mounted on Plasan Re’em’s Armoured Toyota Hilux and successfully shot and hit several moving ground and air targets from more than...
The Security Industry Association (SIA) has announced the 2020 winners of the SIA New Product Showcase Awards, the flagship awards program in partnership with ISC West recognizing innovative security products, services and solutions. Top among the winners – who were recognized July 9 during a virtual awards show – was Leica Geosystems, part of Hexagon, receiving the 2020 Best New Product Award. Since its inception in 1979, the SIA New Product Showcase has been the security industry&...
The Security Industry Association (SIA), the globally renowned trade association representing security solutions providers, has released its new policy principles guiding the development and deployment of facial recognition technology. facial recognition technology SIA believes all technology products, including facial recognition, must only be used for purposes that are lawful, ethical and non-discriminatory. “SIA recognizes that some community leaders have expressed deeply-held views...
BlackBerry Ltd. has announced that it has partnered with Dedrone, a globally renowned market and technology solutions company in airspace security, to deliver advanced counter-drone technology to secure the world’s most critical sites. Advanced counter-drone technology As part of this embedded technology partnership, Dedrone, is integrating BlackBerry AtHoc software into its products, to enable real-time secure alerts, when a malicious or unauthorized drone is detected in airspace. “When an unauthorized drone enters restricted airspace, time is of the essence. The more effectively the on-site personnel can respond, the better their chances of countering whatever the drone is there to do. BlackBerry AtHoc’s advanced alerting capabilities combined with Dedrone’s drone detection technology, enable our customers to react precisely and in time to control the situation,” said Aaditya Devarakonda, President and Chief Business Officer, Dedrone. Dedrone technology The Dedrone technology portfolio combines machine-learning software with state-of-the-art hardware sensors The Dedrone technology portfolio combines machine-learning software with state-of-the-art hardware sensors, electronic attack methods like smart jamming, and defeat weapons to provide early warning, classification of, and mitigation against drone threats. Dedrone’s capabilities are used by hundreds of customers globally, including the U.S. military, allied and coalition forces, correctional facilities, airports, utilities, as well as other public and private organizations. Integration with BlackBerry AtHoc software Working with the BlackBerry AtHoc API, Dedrone has integrated directly to BlackBerry AtHoc’s extensive and granular alerting functionality. This allows the creation of automated, highly targeted alerts based on a range of criteria, including flight zones, drone behavior, and user groups – for a more efficient, focused response to the presence of an unauthorized drone. “New advanced technologies have the potential to solve some of today’s most pressing challenges, however, they also introduce new security risks,” said Christoph Erdmann, Senior Vice President of Secure Communications, BlackBerry. Countering rising threat of unauthorized drones He adds, “Drones are one of the many IoT endpoints that add to the growing chaos that security experts must navigate. We’re excited to partner with Dedrone to offer a critical solution that organizations around the world can use to keep citizens and the public safe.” BlackBerry is a globally renowned company in secure communications and the BlackBerry AtHoc software is used by key organizations around the world, including 70% of the US Federal Government.
3DX-Ray has announced a contract for the supply of ThreatScan-LS1 flat screen scanner to a European Counter-Terrorist Unit. ThreatScan-LS1 flat screen scanner The flexibility of ThreatScan-LS1 flat screen scanner allows counter terror officers to rapidly examine and assess threats and suspect items on site, such as bags, laptops, furniture and more. The ThreatScan-LS1 scanner also enables them to locate and identify hidden cameras and surveillance equipment. Each system consists of a portable X-ray generator, a detection panel and an operator’s workstation running 3DX-Rays market-renowned image processing software, together with a customer-specific range of ancillary equipment. Highly efficient scanning device ThreatScan scanner can be used to inspect suspect bags and packages in mass transit areas ThreatScan-LS1 flat screen scanner is lightweight, incredibly thin, and has a large imaging area of 600 x 460mm, that facilitates bags and objects to be scanned in one scan. This scanning system can penetrate up to 34mm steel at 120kV while producing high quality, sub-millimeter resolution images. ThreatScan scanner can be used to inspect suspect bags and packages in mass transit areas, such as rail and bus stations, shopping malls, airports, stadia and sports arenas. It is also best suited for general security inspection by first responders such as Police, Military and Private and Government Security agencies. Versatile and flexible security system 3DX-RAY LTD, Sales and Marketing Director, Vincent Deery stated, “We are very pleased with this contract because it demonstrates how versatile and flexible the systems are in protecting and enabling police officers in the pursuit of their duties.”
ASIS International, the globally renowned association for security management professionals, has announced that General Stan McChrystal, US Army (RET), will present a Global Security Exchange Plus (GSX+) keynote address on Military & Law Enforcement Appreciation Day at GSX+. The presentation, titled Leading in a New World, will take place on Wednesday, 23 September. Global Security Exchange Plus “GSX+ offers a unique opportunity to share the insights and guidance from global thought leaders,” said Godfried Hendriks, CPP, 2020 President, ASIS International, adding “We are thrilled to have General McChrystal on our lineup to share his insights on leadership in an ever-changing global landscape on Military & Law Enforcement Appreciation Day at GSX+.” A retired four-star general, McChrystal is the former commander of US and International Security Assistance Forces (ISAF) Afghanistan and the former commander of the nation’s premier military counter-terrorism force, Joint Special Operations Command (JSOC). He is best known for developing and implementing a comprehensive counterinsurgency strategy in Afghanistan, and for creating a cohesive counter-terrorism organization that revolutionized the interagency operating culture. Crisis management and strategic operations McChrystal will provide practical and actionable guidance on what it takes to lead in a rapidly shifting world landscape In his GSX+ presentation, highlighting lessons from his crisis management and strategic operations playbook, McChrystal will provide practical and actionable guidance on what it takes to lead successfully in a rapidly shifting world landscape. In this insightful keynote, he will address such key leadership principles as transparency and inclusion, leveraging the power of teams through relationships, leading by influence, relentless mission focus, and sharing a clear vision with everyone who must execute against it, all against the shifting backdrop of the ever-evolving remote workplace. Military services veteran Throughout his military career, he commanded a number of elite organizations, including the 75th Ranger Regiment. After 9/11 until his retirement in 2010, he spent more than 6 years deployed to combat in a variety of leadership positions. In June 2009, the President of the United States and the Secretary General of NATO appointed him to be the Commander of US Forces Afghanistan and NATO ISAF. His command included more than 150,000 troops from 45 allied countries. On 1 August 2010 he retired from the US Army. Military & Law Enforcement Appreciation Day He is the New York Times bestselling author of My Share of the Task, Team of Teams: New Rules of Engagement for a Complex World, and Leaders: Myth and Reality. A passionate advocate for national service and veterans’ issues, McChrystal is the Chair of the Board of Service Year Alliance. He is a graduate of the United States Military Academy at West Point and the Naval War College. GSX+ is a new online experience that delivers the industry-renowned education sessions, robust marketplace, and unique peer-to-peer networking opportunities that security professionals have come to expect from the live GSX event. During Military & Law Enforcement Appreciation Day, all military, law enforcement, and first responders receive free one-day admission to GSX+.
Sensor system supplier HENSOLDT has been awarded a contract by Airbus Defense and Space to develop and produce a new AESA (Active Electronic Scanning Array) radar for the German and Spanish Eurofighter fleets. The project is jointly financed by the Eurofighter partner nations Spain and Germany, who will also be the first users of the radar in their fleets. Following budget approval by the Spanish government and most recently by the German Bundestag in mid-June, the contracts worth over 1.5 billion euros have now been signed. "The fact that Germany and Spain are taking a pioneering role in the modernization of the Eurofighter is a signal of confidence in European defense cooperation," said HENSOLDT CEO Thomas Müller. "This decision ensures that our armed forces will continue to be able to fulfil their mission in the future while being protected in the best possible way." Eurofighter digital multi-channel receiver and transmitter The contracts cover the German-Spanish new development of core components of the Eurofighter radar - including a digital multi-channel receiver and transmitter/receiver modules of the antenna - and the equipping of approximately 130 Eurofighter aircraft of tranches two and three. The development is being carried out by a Spanish-German industrial consortium under German leadership with the support of the Eurofighter nations Great Britain and Italy. HENSOLDT has already been involved in the development and production of the Eurofighter sensor technology currently in use. At its radar center in Ulm, HENSOLDT currently employs 2,200 people, and in the Eurofighter radar sector alone, the company expects to create 400 highly qualified jobs over the entire program period. The sensor specialist is also investing around 15 million euros in the necessary capacity expansion, primarily at the Ulm site.
Acquisition of business units of South African electronics and solution provider to complement HENSOLDT’s portfolio and expand footprint in Africa. HENSOLDT South Africa has signed an agreement to acquire the Air Traffic Management (ATM) and Defense & Security business units of Tellumat. The acquisition will see HENSOLDT further expand its portfolio as well as its presence in Africa. The agreement was signed by Rynier van der Watt, Managing Director of HENSOLDT South Africa and Andrew Connold, CEO of Tellumat, during a virtual ceremony hosted by HENSOLDT at its offices in Pretoria on 26 June. Defense electronics providers The transaction will be effective as soon as all regulatory approvals have been obtained. “With this transaction we are combining the activities of two defense electronics providers and strengthening our position as a defense, security and electronics brand in South Africa,” Van der Watt said. “The complementary product portfolios of HENSOLDT South Africa and Tellumat create a complete sensor solutions offering, that is in line with that of the HENSOLDT Group,” Van der Watt added that, “We will create new products and services that will build upon the significant expertise that is being acquired.” Air Traffic Management portfolio includes the supply, installation and maintenance of radar HENSOLDT South Africa and Tellumat have business areas that complement each other, including sensors and communications, particularly for unmanned aerial vehicles and other airborne intelligence, surveillance and reconnaissance (ISR) applications. The acquired activities represent a workforce of more than 100 people across offices in Cape Town and Pretoria, with demonstrated expertise in a range of capabilities complementing HENSOLDT South Africa’s offering. Air Traffic Management Tellumat’s defense and security portfolio covers identification friend or foe (IFF) systems, tactical communications (including radio and video links), and unmanned aerial vehicle (UAV) systems, including a full suite of data links and avionics. Its Air Traffic Management portfolio includes the supply, installation and maintenance of radar, navigational, voice communication and runway lighting systems for military and civilian airports. Tellumat was established in 1963 as Plessey South Africa, and became Tellumat in 1998 Tellumat was established in 1963 as Plessey South Africa, and became Tellumat in 1998. Over the decades it has built up vast skills and experience that have created a rich history and heritage. “While this new relationship advances the legacy of Tellumat’s well-proven and innovative products, services and solutions, it also further expands the sales reach of the acquired business units through the global footprint of the HENSOLDT Group,” Connold said. The transaction is in line with HENSOLDT South Africa’s aims to see targeted growth and expansion as the company focusses on both the local and international markets. Since HENSOLDT South Africa was formed in September 2019 as the brand housing HENSOLDT Optronics and GEW, it remains deeply committed to investing in the growth of its footprint in South Africa and the acquisition of the Tellumat business units is an example of that commitment. Expand global footprint Celia Pelaz, HENSOLDT Group Executive responsible for South Africa said that, “This acquisition is a further step in the HENSOLDT Group’s commitment to continue to invest in South Africa and to grow HENSOLDT South Africa as one of its home countries,” Pelaz added that, “We are leveraging the power of the HENSOLDT brand to expand its global footprint and open new market opportunities for the South African business.” The Tellumat transaction proves that HENSOLDT South Africa is well positioned to achieve its goal of becoming the sensor solution and defense electronics house in the region. HENSOLDT believes that international investment and cooperation utilizing local infrastructure, skills and capacity is a proven recipe for local economic growth and business success.
Globally renowned sensor systems supplier, HENSOLDT has welcomed the decision by the German Bundestag to develop the new AESA (Active Electronic Scanning Array) radar for the entire German Eurofighter fleet as a positive signal for Germany as a technology base and for successful European cooperation in the defense sector. "With this decision, Germany is taking on a pioneering role in the field of key technology for the Eurofighter for the first time," said HENSOLDT Chief Executive Officer (CEO), Thomas Müller. AESA radar Thomas adds, "This will create high-tech jobs in Germany and give the Bundeswehr the equipment it needs to respond to new threats. In addition, it is a signal for Europe that Germany is investing in a technology that is of crucial importance for European defense cooperation." With the release of the budget for the development, production and integration of new radar for the Eurofighter combat aircraft, HENSOLDT's share is over 1.5 billion Euros, the Bundestag's Budget Committee has cleared the way for the modernization of the Eurofighter in one crucial area, sensor technology. In contrast to the development of the radar to date in a consortium under British leadership, radar system responsibility will now pass into the hands of the German radar house, HENSOLDT. Eurofighter sensor technology In radar development, HENSOLDT works with the main contractor, Airbus and the Spanish defence electronics group, Indra The company, based in Taufkirchen, Bavaria, was already involved in the development and production of the Eurofighter sensor technology currently in use. HENSOLDT employs 2,000 people at its radar center in Ulm. In the Eurofighter radar departments alone an increase of 400 highly qualified jobs is expected over the duration of the program. In radar development, the company works closely with the main contractor, Airbus and the Spanish defense electronics group, Indra. TRS-4D naval radars At the same time, the Bundestag also approved the budget for the procurement of four MKS 180 multi-purpose combat ships for the German Navy. As a result of the product specification, HENSOLDT is supplying four TRS-4D naval radars, also based on AESA technology for this project. Radars of this type are already deployed on several German Navy ships.
While there is much hype around drone technology today, initial successful drone usage for security can be dated back to the 1960s, when the US utilized the Lightning Bug 147, a camera-equipped unmanned aerial vehicle that could travel 600 miles for surveillance in Vietnam, China and Korea. Drones For Effective Surveillance Since this initial deployment, drones have been used for a variety of security and surveillance applications. However, as professional-grade commercial drones incorporate newer, more advanced features and technologies, their capabilities will allow for many new scenarios and applications within fully-integrated security systems. The security industry, in addition to first response and law enforcement, will be among the first to truly experience the benefits of the most current drone technologies. And, these industries have already started to utilize drones in new ways—the most recent example being the use of commercial drones to save lives during hurricanes Irma and Harvey. For these reasons, UAVs are becoming an integral tool in multiple industries and according to PwC, will have an expected total value of $127 billion by 2020, $10.5 billion of which will be in security applications of drones.There is room to improve on cost, efficiency and safety, so the opportunity for commercial drone technologies is large Drones In Fire, Border And Perimeter Security Current drone users in the security arena are comprised of law enforcement, fire departments, border security and first responders, who primarily use UAVs for border control, perimeter surveillance and monitoring, anti-terror operations and searching for missing persons. These tasks generally require manned teams and can even include helicopters, the results being costly, time-consuming and potentially dangerous. Alternatively, these teams use consumer-grade drones, which simply lack the capabilities and levels of security necessary to be used safely for such operations. This makes the opportunity for commercial drone technologies large, as there is room to significantly improve on cost, efficiency and safety. By adding autonomous drones to their arsenals, security forces are able to accomplish their objectives more easily and effectively by removing the need for a security team member to operate the drone—as it works on its own—and instead, focus on responding to the security situation at hand. Employing fully autonomous systems, especially in surveillance, is a critical feature most drone systems currently don't allow UAVs can also enter narrow spaces, produce minimal noise, and can be equipped with night vision cameras and thermal sensors, allowing them to see beyond what the human eye can detect. They can also quickly cover large expanses of ground and access hard to reach places. However, most drones today have not reached the pinnacle of what is possible for advanced commercial UAVs. Drawbacks Of Current Drone Solutions Despite how far drone technology has come, drones used in security settings are still riddled with shortcomings. This is apparent in the build quality of current drones, most of which are made from hardened plastic, which falters when faced with rough weather conditions or after experiencing tough falls and crashes. Closed-system integration is another key element current UAVs lack. Not being able to integrate drones into wider closed-security systems creates major gaps in the efficacy of security operations. The use of carbon fibre in the build of drone hulls will increase drones' weather durability - and ultimately make them more valuable Lastly, employing fully autonomous systems, especially in surveillance, is a critical feature most drone systems currently don't allow - both due to shortcomings in the technology and due to the need for regulations to catch up to the advancements and capabilities of drone technologies. The combination of these drawbacks can create lacklustre drone results, and when lives are on the line, these results simply aren't enough. Why Commercial Drones Can Make A Difference That being said, 2018 is the year where the security sector will experience increased drone adoption. That’s because there are some drone technologies being developed today that overcome many of the shortcomings outlined above. These are the technologies we will see having the greatest impact within the security industry. Here are some of the drivers of change, both in the industry and technology that will allow drones to effectively integrate into the security market: Increased processing power: This will allow autonomous drones, powered by AI technology, to track objects in real time, and adjust their courses and actions as needed. This allows for greater drone operational efficiency while simultaneously drawing less power from the battery, thereby lengthening the drone’s flying time. These improved processors will also make way for increased broadcast range capabilities, allowing for longer distance drone operations. Regulations will catch up to the technology: This is a trend we began to see at the tail end of 2017. Governments in both the United States and Europe have realized that drone regulations must keep up to gain the most from UAV technologies, as well as to counter the use of drones for terror or other nefarious tasks. To that end, the US government began talks with drone developers to discuss the expansion of commercial drone operations, and the UK government introduced tougher regulations to crackdown on dangerous flying and criminal drone use. Drone regulation will move in favor of autonomous drone operation: As governments increase regulations in favor of the commercial drone industry, commercial players will increase pressure to allow for fully autonomous operation. Full autonomy means Beyond Visual Line Of Sight (BVLOS) drone functionality. This enables drone operators to fly a UAV with the drone out of their line of sight, maximizing the capabilities of the UAV, and in the case of security missions, keeping the pilot out of harm’s way. New materials will increase drone hull durability: As drone makers will have learned from their drones’ lack of weather resistance following the tumultuous hurricanes the U.S. experienced this past year, the use of carbon fiber in the build of drone hulls will increase their weather durability. Better capabilities will encourage adoption among security: New commercial drones will have longer flight times, longer battery lives, will carry heavier payloads, and will integrate advanced computer vision technologies and real-time connectivity. This will enable drones on security missions in remote areas to send a live stream of their field of vision to drone operators at a central command station. Full integration of security systems: The interoperability of a variety of technologies will make drones another sensor in fully integrated and closed security systems that may include smart fences, security cameras and other infrastructure elements. Full integration also means that these elements will be controlled from the same central command center, whether for securing a specific facility, or as part of surveillance system on a military base, or other closed location. This will allow security personnel to use drones more effectively, saving time, money, and increasing the safety of security professionals in the field. This year is going to be huge for the drone security market, as it is about to experience a significant improvement in drone performance, which will lead to a widespread escalation in drone adoption. The results will be prolific for both drone makers and security force users.
The use of drones has increased dramatically in the last few years. Indeed, by 2021, the FAA says the number of small hobbyist drones in the U.S. will triple to about 3.55 million. With that growth, drone capabilities have increased while costs have decreased. For example, the DJI Phantom 4 can deliver a 2-pound payload to a target with 1.5m accuracy from 20 miles away for the less than $1000.00. This is an unprecedented capability accessible to anyone. This new technology has created an entirely new security risk for businesses and governments. Drone Security Risks Already, rogue groups such as ISIS have used low cost drones to carry explosives in targeted attacks. Using this same method, targeting high profile locations within our borders to create terror and panic is very possible. Security professionals and technologists are working furiously to address the gaps in drone defense. Currently, the most common technologies in use for drone detection are video, acoustic sensors, radio, and air surveillance radar. Each of these has advantages, but they also have flaws that make it difficult to detect drones in all conditions. Both optical and thermal cameras, as well as acoustic sensors, do not operate in severe weather such as fog and snow. And while radio and air surveillance radar cover a wide area of detection, they suffer from high installation costs and limiting technical challenges, such as being unable to detect low flying drones on autopilot. Compact Surveillance Radar (CSR) Compact Surveillance Radar (CSR) is a security technology addressing the problems with other types of detection. CSR, like traditional radar, has the benefit of being able to detect and track foreign objects in all weather conditions, but at a fraction of the size and cost. The compact size allows the radar to be mounted on existing structures or even trees, providing extensive perimeter defense almost anywhere that you can imagine. CSR can also filter out clutter such as birds by using an advanced algorithm reducing the number of false alarms. While the use of CSR and the other detection technologies are legal in the US and in most locations throughout the world, the response mechanisms are generally not. Current regulations in the US prohibit the use of jamming or GPS spoofing in all cases except for a few federal agencies Regulations Limiting Drones Current regulations in the US prohibit the use of jamming or GPS spoofing in all cases except for a few federal agencies. This makes it difficult to stop the damage that drones can cause. The FAA has put into place new regulations that limit some uses of drones. However, in most cases it is still illegal for even state or local governments to stop or interfere with drones other than to locate the operator and have them land the drone. In 2016 the first law to neutralize a drone in the United States was passed in Utah to respond to drones in wildfire areas because of their interference with airborne firefighting. This law may very well provide a model for other states dealing with drones in situations where people’s lives are being put at risk by drones. At the federal level, much effort is being put into evaluating the regulations and technology surrounding the misuse of drones. In the 2016 reauthorization bill for the FAA, Section 2135 included a pilot program for the investigation of methods to mitigate the threat of unmanned aircraft around airports and other critical infrastructure. There are many federal agencies that are evaluating the use of a variety of technologies to respond to this threat. Both optical and thermal cameras, as well as acoustic sensors, do not operate in severe weather such as fog and snow Effective Countermeasure Technologies The most effective countermeasure for drones is jamming, currently off-limits to the private sector. This includes stadiums, convention centers, and other large gathering areas. A number of companies are developing new response technologies that do not require the use of jammers or hacking. Several companies have developed net guns that shoot a net at an approaching drone. These are only effective at less than 100m and frequently miss the target, especially when the drone is approaching at high speed. Several other companies have taken this method a step further, with drones that capture other drones. Once a radar detects a drone, another defense drone is launched and flies to the point of detection. Then, using video analytics it homes in on the drone and fires a net to disable the drone and take it to a safe location. While this drone capturing technique is still in its infancy, it shows a great deal of promise and will not be restricted in the same fashion as jamming. However, even this solution is difficult under current regulations, as all commercial drones in the US must be under direct control of a human operator within their line of sight. This effectively means that a drone operator is required to be on-site at all times to protect a facility, event, or persons. One thing is for certain, technology will continue to adapt and security companies will continue to invent new methods to protect their facilities and the people they are sworn to protect.
The UK Government has been working to reduce the risks associated with illegal drone use since a high-profile incident at UK’s Gatwick Airport in December 2018, when a drone sighting triggered a three-day shutdown of the UK’s second busiest airport, disrupting the travel plans of 140,000 people and affecting 1,000 flights. To address growing security threats by drones, the UK Government has released its ‘Counter-Unmanned Aircraft Strategy’. ‘Counter-Unmanned Aircraft Strategy’ This strategy sets out our approach to countering the threat the malicious or negligent use of drones can bring" “This strategy sets out our approach to countering the threat the malicious or negligent use of drones can bring,” says Brandon Lewis, the U.K. Minister of State for Security. “It will provide the security the public and drone users require to continue to enjoy the benefits of leisure and commercial drone use and facilitate the growth of the drone industry.” “Given the challenge posed by rapid advances in drone technology and the potential threat, the strategy will provide overarching direction to our efforts,” says Lewis. The strategy focuses on ‘small drones’, those weighing less than 20 kg (44 pounds). Countering malicious use of aerial drones The UK Counter-Unmanned Aircraft Strategy centers on mitigating the highest-harm domestic risks resulting from malicious use of aerial drones. They are: Facilitating terrorist attacks, such as modifying commercially-available drones to conduct reconnaissance or attacks. Facilitating crime, especially in prisons, where drones are currently used to deliver contraband. Disrupting critical national infrastructure, such as airports, where a malicious incursion using a drone can have serious safety, security and economic consequences. Potential use by hostile state actors. Maximizing benefits of drone technology The initiative will also look to build strong relationships with industry to ensure high security standards Over the next three years, the strategy will seek to reduce the risks posed by the highest-harm use of drones while maximizing the benefits of drone technology. It will develop a comprehensive understanding of evolving risks and take a “full spectrum” approach to deter, detect and disrupt the misuse of drones. The initiative will also look to build strong relationships with industry to ensure high security standards. Further, promoting access to counter-drone capabilities and effective legislation, training and guidance will empower the police and other operational responders. Tactical response to drone-based threats Because technology is rapidly evolving, the response needs to keep pace, according to the strategy document. Lewis adds, “We will therefore work to understand how drone-based threats might evolve in the future, both at the tactical and strategic levels.” The strategy will be to build an end-to-end approach to tackling the highest-harm criminal use of drones. It will also work to make it easier to identify malicious drone use against a backdrop of increased legitimate use. Legal drone operators will be required to register with the Civil Aviation Authority (CAA) and to pass an online competency test before flying a drone. Retailers who follow a specific set of safety guidelines when selling drones will be designated ‘DroneSafe’. Unmanned traffic management system The government is working toward future implementation of an unmanned traffic management (UTM) system, which provides a means of preventing collisions between unmanned aircraft and other manned or unmanned aircraft. The current strategy includes early planning for the system. An Industry Action Group will ensure a continuing relationship with the drone industry and help to improve existing counter-drone measures and identify new opportunities, such as use of ‘Geo-Fencing’ to restrict drones from flying in certain areas. Regulating commercial and domestic drones The UK Department of Transport is responsible for safe and lawful use of drones within the UK airspace The strategy will seek to communicate the UK’s security requirements to the counter-drone industry and to encourage a thriving sector that is aware of, and responsive to, the needs of government. Regulating drones is the responsibility of two UK government departments. The UK Department of Transport is responsible for safe and lawful use of drones within the UK airspace, while the Home Office has overall responsibility for domestic counter-drone activity. Fast-evolving drone and counter-drone technology Also, the Center for the Protection of National Infrastructure (CPNI) has been involved in reducing the vulnerability of sensitive sites, including airports. New performance measures will track the strategy’s success. Due to the fast-evolving nature of drone and counter-drone technology, the intent is to review and, if necessary, refresh the strategy in three years.
A week of mass shootings this summer has again spotlighted the horror of gun violence in public spaces. A 19-year-old gunman opened fire at the Gilroy Garlic Festival in California on July 28, injuring 13 and killing four (including the gunman). In El Paso, Texas, less than a week later, a lone gunman killed 22 people and injured 24 others. In Dayton, Ohio, a day later, a gunman shot 26 people during a 30-second attack, killing 9 and injuring 17. Rising active shooting incidents Beyond the grim statistics are three distinct incidents, linked only by the compressed timeline of their occurrence. Still, there is a tendency to want to find a pattern: Why do these incidents happen? How can we prevent them? In total, 91 people were killed and 107 more were injured in locations such as workplaces, schools, and public areas One attempt to analyze trends and commonalities among mass shooting incidents is a research report published by the U.S. Secret Service National Threat Assessment Center (NTAC) titled “Mass Attacks in Public Spaces – 2018.” Looking at the totality of major mass attacks last year, the report seeks to find patterns that can shed light on the attacks and suggest strategies to prevent and mitigate future incidents. Mass shootouts Between January and December 2018, 27 incidents of mass attacks – in which three or more persons were harmed – were carried out in public spaces within the United States. In total, 91 people were killed and 107 more were injured in locations such as workplaces, schools, and other public areas. The National Threat Assessment Center report considered all the mass attack incidents in 2018 and analyzed some trends and statistics: Over half (59%) took place between the hours of 7 a.m. and 3 p.m., and 63% of the attacks ended within 5 minutes of when they were initiated. Most of the attackers were male (93%); the youngest was a 15-year-old student and the oldest was 64. Nearly a fourth of the attackers (22%) had substance abuse problems, and half (48%) had a criminal history, whether violent or non-violent. About two-thirds (67%) experienced mental health symptoms, commonly depressant and psychotic symptoms such as paranoia, hallucinations or delusions. Almost half (44%) had been diagnosed with a mental illness prior to the attack. The main motives were domestic, personal or workplace grievances (52%); followed by mental health/psychosis (19%); 22% had unknown motives. Most (85%) of attackers had at least one significant stressor in their lives in the last five years; 75% had experienced stressors that occurred in the previous year before the attack. Personal stressors included the death of a loved one, a broken engagement of physical abuse. Work- or school-related stressors included losing a job, being denied a promotion, or being forced to withdraw from classes. More than half of attackers (56%) experienced stressors related to financial instability. Personal issues such as homelessness or losing a competition were also stressors. Nearly all the attackers (93%) engaged in prior threatening or concerning communications. Most of the attackers (78%) also exhibited behaviors that caused concerned in others. For the majority of the attackers (70%), that concern was so severe that others feared specifically for the safety of the individual, themselves, or others. The Secret Service report also analyzed the overall impact of several factors: Mental health and mental wellness - Mental illness, alone, is not a risk factor for violence, and most violence is committed by individuals who are not mentally ill. Two-thirds of the attackers in this study, however, had previously displayed symptoms indicative of mental health issues, including depression, paranoia, and delusions. Other attackers displayed behaviors that do not indicate the presence of a mental illness but do show that the person was experiencing some sort of distress or an emotional struggle. The importance of reporting - Since three-quarters of the attackers had concerned the people around them, with most of them specifically eliciting concerns for safety, the public should be encouraged to share concerns they may have regarding coworkers, classmates, family members, or neighbors. Need for a multidisciplinary threat assessment approach - There is a need to standardize the process for identifying, assessing, and managing individuals who may pose a risk of violence. Law enforcement and others are taking steps to ensure that those individuals who have elicited concern do not “fall through the cracks.” Law enforcement personnel should continue developing close partnerships with the mental health community, local schools and school districts, houses of worship, social services, and other private and public community organizations. Threat assessment Threat assessment refers to a proactive approach to violence prevention, an investigative model Many of the resources to support the threat assessment process are already in place at the community level, but require leadership, collaboration, and information sharing to facilitate their effectiveness at preventing violence, according to the report. ‘Threat assessment' refers to a proactive approach to violence prevention, an investigative model originally developed by the U.S. Secret Service to prevent assassinations. It has since been adapted to prevent all forms of targeted violence, regardless of motivation, including K-12 school shootings and acts of workplace violence. When implemented effectively, a threat assessment generally involves three key components: Identify, Assess and Manage. Identify, Assess and Manage Public safety entities rely on people who observe concerns to identify the individual to law enforcement or to someone else with a public safety responsibility. In educational settings or workplaces, concerns may be reported to a multidisciplinary threat assessment team that works in conjunction with law enforcement when needed. The responsible public safety entity is then tasked to assess the situation to determine how they can manage any risk of violence posed by the individual.
The mindset behind a new law to prohibit the use of facial recognition and other security-related technologies by San Francisco police and other city agencies is obvious in the name of the new ordinance: “Stop Secret Surveillance.” Ordinance To Stop Secret Surveillance The San Francisco Board of Supervisors passed the ordinance 8-1 with two abstentions on May 14, and there will be another vote next week before it becomes law. We have an outsize responsibility to regulate the excesses of technology precisely because they are headquartered here" The irony of such a law emanating from northern California, where tech giants promote the use of numerous technologies that arguably infringe on privacy, is not lost on Aaron Peskin, the city supervisor who sponsored the bill. “We have an outsize responsibility to regulate the excesses of technology precisely because they are headquartered here,” he told the New York Times. Regulating Facial Recognition Technology Although the facial recognition aspects of the ordinance have been the most publicized, it also targets a long list of other products and systems. According to the ordinance, "Surveillance Technology" means “any software, electronic device, system utilizing an electronic device, or similar device used, designed, or primarily intended to collect, retain, process, or share audio, electronic, visual, location, thermal, biometric, olfactory or similar information specifically associated with, or capable of being associated with, any individual or group.” Broadly interpreted, that’s a lot of devices. Includes Biometrics, RFID Scanners The ordinance lists some examples such as automatic license plate readers, gunshot detection hardware and services, video and audio monitoring and/or recording equipment, mobile DNA capture technology, radio-frequency ID (RFID) scanners, and biometric software or technology including facial, voice, iris, and gait-recognition software and databases. Among the exceptions listed in the ordinance are physical access control systems, employee identification management systems, and other physical control systems; and police interview rooms, holding cells, and internal security audio/video recording systems. The ordinance ban applies to city departments and agencies, not to the general public and exceptions include physical access control systems, employee identification management systems, and internal security audio/video recording systems Airport Security Not Part Of Ordinance The ban only applies to city departments and agencies, not to private businesses or the general public. Therefore, San Franciscans can continue to use facial recognition technology every day when they unlock their smart phones. And technologies such as facial recognition currently used at the San Francisco airport and ports are not impacted because they are under federal jurisdiction. Furthermore, the San Francisco police department does not currently use facial recognition anyway, although it has been deployed in places such as Las Vegas, Orlando, Boston and New York City. Safeguarding Privacy Of Citizens The ordinance appears to have a goal of avoiding government uses of technologies that can invade individual privacy, seeking to avoid worst-case scenarios such as an existing system in China that uses millions of surveillance cameras to keep close tabs on the Uyghurs, a Muslim minority population. Any new plans to use surveillance technology must be approved by the city government, and any existing uses must be reported and justified by submitting a Surveillance Technology Policy ordinance for approval by the Board of Supervisors within 180 days. Surveillance Technology Policy Banning use of facial recognition just when its capability is being realized is counterproductive But might such a ban on technology uses undermine their potential value as crime-fighting tools just when they are poised to become more valuable than ever? Ed Davis, a former Boston police commissioner, told the New York Times it is “premature to be banning things.” He notes: “This technology is still developing, and as it improves, this could be the answer to a lot of problems we have about securing our communities.” Technology development doesn’t happen in a vacuum and banning uses of facial recognition and other technologies just when their capabilities are being realized is counterproductive. We should be thoughtful, deliberate and transparent in how we embrace new technologies. However, discarding them out-of-hand using emotionally charged words such as “secret surveillance” does not promote the best use of technology to the benefit of everyone.
Genetec Inc., a globally renowned technology provider of unified security, public safety, operations, and business intelligence solutions, has announced that City Council District E in New Orleans has taken an innovative approach to address illegal dumping using Security Center, the unified security platform from Genetec. Countering illegal dumping menace Illegal dumping is a problem in most cities around the world, but enforcing laws to prevent it can be quite difficult and resource-intensive. To catch culprits in the act, law enforcement and other city staff have to physically watch known sites and wait to spot illegal dumping activity. Most city officials know that's an impossible task, as officers can't be everywhere all the time, and offenders take full advantage of that reality. New Orleans’ RTCC and Sanitation Department has begun installing a network of cameras at known dumping sites In response, New Orleans City Council District E Councilwoman, Cyndi Nguyen, has taken a hands-on approach tackling illegal dumping head-on as a part of a larger push toward revitalising the community she serves. Nguyen’s team, working in partnership with New Orleans’ Real Time Crime Center (RTCC) and Sanitation Department has begun installing a network of cameras at known dumping sites. All cameras are portable so they can be moved to new dumping hotspots as needed. Genetec security technology platform deployed “This security technology from Genetec certainly helps re-enforce the message I’m putting out there, that we can and will enforce illegal dumping offenses in District E. We also have this great partnership with the Sanitation Department, our local Police Department, and the RTCC, and that’s extending out into our community as well,” said New Orleans City Councilwoman, Cyndi Nguyen. She adds, “I am working hard to get more residents and businesses involved in supporting these initiatives, because keeping our city safe and clean is a shared responsibility.” Real Time Crime Center (RTCC) The Real Time Crime Center (RTCC) already uses Security Center to manage its citywide public safety improvement initiatives. To help monitor illegal dumping activities, the Crime Center’s IT department also set up an event-to-action rule in the Security Center platform to processes motion detection in a defined zone of the camera’s field of view. As soon as motion is detected, the security system bookmarks it and notifies IT staff As soon as motion is detected, the security system bookmarks it and notifies IT staff so that they can evaluate the situation and determine if collection of the debris is warranted. The system also takes a snapshot of the video and emails it to designated personnel on the team, so as to enable them to identify and investigate any potential dumping perpetrators, and take appropriate action. Crime detection with video evidence In an example of a recent case, this event-to-action led to the arrest of a repeat offender who had previously been convicted and sentenced for dumping 14,000 tires. All snapshots and video evidence were securely shared with the New Orleans Police Department so as to enable them to quickly identify the perpetrator, apprehend him and complete their investigation. “Without this technology, finding these offenders comes down to chance or it could take a police officer hours and hours of investigative work. Instead, it took us minutes to set up the event-to-action in Security Center, and just about two days from the time we were notified about this offender to the time we were able to apprehend him,” said Bill Wood, IT Supervisor at New Orleans’ Real Time Crime Center (RTCC). Bill adds, “We love working with the Genetec Security Center security platform. It’s very user friendly and helps us cut down that investigation time exponentially.”
Bird Aerosystems, the developer of Airborne Missile Protection Systems (AMPS) and Airborne Surveillance, Information, and Observation (ASIO) solutions, has won a new contract in Central Europe. Under the contract, Bird Aerosystems will upgrade and improve the AMPS systems which were previously provided to the Czech Air Force. Bird’s AMPS are installed on the Czech Air Force Mi-17 helicopters and successfully and operationally deployed in different dangerous and complicated conflict zones, including Afghanistan. The overall program includes an upgrade to the MILDS UV detection sensors and the MCDU Mission computers provided by Bird Aerosystems as well as provision for future installation of Bird’s MACS (Missile Approach Confirmation Sensor). Air Force protection “We see this as a sign of proof for the operational value that Bird’s AMPS bring to the customer and are honored that the Czech Air Force chose to conduct an upgrade to the systems it is using for several years, in order to align with the latest developments and ensure optimal protection for its soldiers and personnel. Bird’s AMPS were deployed in various missions, including missions in Afghanistan – where the Czech Air Force was operating as part of the NATO forces,” said Ronen Factor, Co-Chief Executive Officer and Founder at Bird Aerosystems. He added: “We believe that this overall improvement will allow the Czech Air force to keep focusing on important operational missions while knowing that their force is protected.” Protection for military and civilian aircraft Bird Aerosystems’ Airborne Missile Protection System (AMPS) provides enhanced protection for military and civilian aircraft against all known Surface to Air Missiles (SAM), including MANPADS, Laser Beam Rider threats, and radar-guided missiles. AMPS automatically detect, verify, and foil SAM attacks through the effective use of countermeasure decoys (Flares and Chaff) or DIRCM that jam the missile’s IR seeker and protects the aircraft. AMPS is provided as a turn-key solution that includes installation design, installation, integration, certification, and support, and is certified by aircraft manufacturers.
Generally, the Less Than Load (LTL) industry is always looking to increase the amount of product shipped per truck. A lesser amount of product on a truck equates to a lower amount of billable product per trip. Raw Load Average (RLA) Raw Load Average (RLA) is the percentage of product on a truck – 100% is a completely full trailer. As the name implies, LTL averages less than 100%. In the fast- paced world of logistics, delivering millions of packages per day, than how do companies maximize the RLA? Most shipping managers are responsible for inspecting each trailer, before it leaves for several additional items. They make sure that the packages are secure and then evaluate whether the truck can handle any more inventory. There might be 200+ dock doors in a 400,000 sq. ft. facility and dozens of trucks waiting to leave and get on with their trips. At peak times, inspections will require several individuals running all over the facility. Less Than Load (LTL) Industry experts estimate that only about 80% of trucks are actually inspected Industry experts estimate that only about 80% of trucks are actually inspected. The missed trucks are now at risk for unsecured packages arriving damaged. More importantly, they are leaving 74% full. If the truck had waited another 30 minutes for inspection, they could have added another one skid of products to increase the load to 75%. That 1% difference does not sound like much. However, considering the volume of shipments that the top 10 LTL companies deliver, the 1% will amount to somewhere between US$ 6 million and US$ 12 million per year, which goes directly to the bottom line. Role of video security systems So, what is the role of security video systems here? Well most people say that security video does not have a real Return on Investment (ROI) in its traditional role. It’s hard to disagree. One exception might be when security companies have used video systems to reduce the number of guards. Using video, one guard can see as much as 3 or 4 guards could see in the past, without ever having to leave their post. This certainly reduces cost, but at the end of the day, guarding is still an overall cost to the bottom line. This case study will highlight how a couple of Salient’s very resourceful customers have transformed video into cash generating systems. Operational efficiency with video In the guarding scenario, video can put one person in several places at once. This operational efficiency can also be applied to how many people are needed to inspect trailers. But the ROI doesn’t come from removing a couple of salaries from the payroll. The real money comes into play because now inspecting 100% of the trailers leaving the dock are possible versus 80% and get that RLA up by 2 or 3%. Then, it’s about the big bucks. And that’s just the tip of the iceberg, when looking at the overall operational efficiencies available by utilizing video. Using video for misclassified products or shipment validation In logistics, there is a huge revenue miss every year when it comes to products being ‘accidentally’ misclassified In logistics, there is a huge revenue miss every year when it comes to products being ‘accidentally’ misclassified when shipped. All products being shipped have a classification, and each classification has a specific associated cost. These per-pound costs fluctuate based on the value of the product, required insurance, risk and other factors. An example would be a sporting goods manufacturer shipping ammunition and firearms, under the code for clothing. In this example, a 200-pound load would be billed at about US$ 100, when it should be billed at closer to US$ 300. Multiply this by hundreds of packages a day and the total of the missed revenue is astronomical. So how would a video surveillance system correct this problem? Certainly, security cameras cannot see though a box, but one would expect a box with 200 pounds of clothes to be a fairly large box. But if the box were full of firearms or ammunition, the video would reveal a much smaller box. This anomaly when noticed would prompt an operator to investigate the contents of the box and contact the manufacturer to rectify the billed amount. This process might seem a bit hypothetical, but already a current customer of Salient Systems is capturing over US$ 40 million a year with the right system components. Using video to reduce OSHA violations and false claims The logistics industry requires a tremendous amount of labor in order to operate. The more labor hours, the greater the propensity for on-the-job injuries, OSHA violations, insurance payouts, lawsuits and business interruption. False claims are also a consideration. Let’s look at some real-world examples of using video to reduce or eliminate these issues: OSHA reports that 5,250 workers died on the job in 2018 (3.5 per 100,000 full-time equivalent workers), on average, more than 100 a week or more than 14 deaths every day. The loss of an employee is one of the most emotionally devastating situations a business can encounter. There are several benefits of video that can increase safety. One result of a fatality is typically an OSHA investigation. An action item that could result from this investigation would be to increase security guards. This is a perpetual cost that could continue for several months to years. Video systems enhance guards’ efficiency Video systems have been shown to improve the efficiency of guards, allowing them to have eyes on multiple areas Video systems have been shown to improve the efficiency of guards, allowing them to have eyes on multiple areas at the same time. The systems can be coupled with the use of video analytics to alert guards to specific situations such as motion in areas that should be unoccupied or traffic proceeding in an unauthorized direction. In these ways, video systems can reduce the quantity of physical guards, thereby reducing the cost. One of Salient’s customers is saving almost US$ 20,000 per month with the reduction of two guards and it has OSHA’s approval. The end result is that the safety of the employees has been increased and operational cost is lowered by implementing technology. Inadvertently, this same type deployment at another facility helped mitigate a US$ 900,000 slip-and-fall lawsuit, which could have also been a possible cause for an OSHA investigation. Validation of safety policy Validation of safety policy can also be a drain on resources. Auditing seatbelt use for forklift drivers, pedestrians using appropriate marked walking paths, and proper social distancing in work spaces are a few examples among many. Assigning an individual to monitor this activity is costly and people typically obey the rules only when that individual is present. However, video can capture this information all the time without huge labor cost. This information can then be audited and used for education processes. OSHA statistics indicate that there are roughly 85 forklift fatalities and 34,900 serious injuries each year, with 42 percent of the forklift fatalities from the operator's being crushed by a tipping vehicle. The safest place for the driver to be is strapped. A facility that used video to audit seatbelt usage showed a 65% compliance rate. After the information was presented to the manager and employees, the next audit resulted in a jump to 87% compliance rate. In the event of an injury, this type of verifiable data can go a long way to prove that the employer is serious about employee safety and investing in ways to improve the safety culture within the company. Using video to increase sales LTL is a very competitive business and it is viewed primarily as a commodity type operation LTL is a very competitive business and it is viewed primarily as a commodity type operation. A few pennies per pound can typically sway a decision-maker. Already some great operational efficiencies and benefits from video to lower cost and to making LTL more competitive has been discussed. But these ideas still don’t move LTL out of the ‘dog-eat-dog race to the bottom on price’ world. Now, let’s look at how to use the implementation of these same video systems to provide value propositions and competitive advantages for customers. Many LTL customers have sensitive merchandise for which the safety and security of its delivery might outweigh cost differences. An example is freight regulated by government agencies, such as Drug Enforcement Agency (DEA), Alcohol, Tobacco and Firearms Agency (ATF), and Dept. of Energy (DOE). For example, the DEA reported ‘The overall trend of incidents of Controlled Prescription Drugs lost in transit increased in 2018 with the highest number since 2010.’ Extra layer of security And the ATF’s Interstate Theft Program states that ‘Under the program, hundreds of reports of thefts and losses from interstate shipments are received each year’. With statistics like these, customers in these categories have a heightened sense of vulnerability. Offering systems such as surveillance video can add that extra layer of security and added confidence. This is a marketable differentiator to help LTL companies set themselves apart from the traditional companies that only offer a lower cost. This, bundled with some of the other cost-saving measures outlined above, could be the icing on the cake needed for security departments to convince C-Level executives in their organization to invest in video.
For most people, prison ranks high on the list of places to avoid. Yet, take no pride: U.S. prisons are filled to capacity with individuals who have committed some type of crime that warrants incarceration. Prison Policy Initiative In 2018, according to data from the Prison Policy Initiative, there were 1.3 million U.S. adults in prison and 615,000 incarcerated in jails for crimes ranging from murder, manslaughter, illegal drug possession, burglary, theft, driving under the influence, property crimes, and more. In addition to traditional security concerns such as perimeter surveillance, ID card management, visitor and vendor management, crime, and theft, prisons and correctional facilities have unique security challenges that other enterprises typically do not have. Prison security Correctional facilities face regular security audits that are conducted by the National Institute of Corrections The challenges include inmate escapes, hostage situations, gangs, contraband, riots, and overcrowding, in addition to increasing privacy and regulatory mandates. Even more, correctional facilities face regular security audits that are conducted by the National Institute of Corrections. Security teams must always be on guard and watching every individual and action of the inmate population – for an inmate’s physical safety – in addition to their own. It is not uncommon for security staff and correctional officers to receive physical injuries from prisoners, especially when trying to break up an inmate fight or transporting them to other locations. Use of drones in prison smuggling An emerging concern for prison officials is the use of drones by individuals who are looking to smuggle drugs, cellphones, weapons, and other contraband into prisons for use by inmates. Many states are working on anti-drone legislation around correctional institutions. For example, Missouri is one of the most recent US States to have introduced legislation to tackle the problem. Missouri HB 324 would make it illegal for drone pilots to fly an unmanned aircraft near any correctional center, private jail, county jail, municipal jail or mental health hospital. Anyone caught violating the law would be charged with a Class A misdemeanor and possibly other felony charges, depending on the pilot’s illegal intentions. Importance of video surveillance Video surveillance is a necessary security technology for prison and correctional facility staff, as it allows personnel to mitigate those unique security challenges. “Video surveillance is prevalent throughout facilities; even if it’s a typical two-bed jail cell or a 2,000 bed prison,” says Brad Wareham, Director of Key Accounts at Salient Systems. He adds, “In cases where facilities face a shortage of staff members to watch over the inmate population, video surveillance supports the oversight of inmates and increases accountability. Inmates know that despite the lack of staff and officer presence, they are being observed by cameras that can catch even the smallest details. Video surveillance can follow inmates anywhere. There are very few blind spots.” Upgrading to hybrid video surveillance systems They are upgrading to hybrid and/or fully digital solutions, all while maintaining the HMI model Increasingly, prisons and correctional facilities are upgrading their older analog video systems, due to age degradation and lack of adequate support resources. “They are upgrading to hybrid and/or fully digital solutions, all while maintaining the Human Machine Interfaces (HMI) model,” Wareham notes. “They continue to face security challenges typical of the corrections space, such as PLC controllers, RTSP capture, intercoms, lock controls, and more, which are atypical of larger facilities. In addition, many older analog solutions will eventually be cost prohibitive,” Wareham said, adding “and will no longer operate, due to an increasing inability to find replacement parts and to the proliferation of IP-based video surveillance solutions”. IP-based video surveillance systems For many correctional facilities, upgrading a video surveillance system to an IP-based solution, in addition to a video management system (VMS), makes sense and benefits a prison or correctional facility in multiple ways. Solutions exist that allow prison facilities to keep pre-existing hardware in place during an upgrade, while allowing for replacements and component upgrades as funding permits. Specific benefits that advanced video surveillance and VMS solutions can provide a correctional institution include: Increased Coverage – Many prisons and correctional facilities are large, and have multiple areas that need to be under surveillance, such as hallways, throughout cellblocks, healthcare facilities, dining areas, exercise yards, and more. Outdated systems may have a difficult time monitoring all areas, while an IP video system can provide continuous coverage of an entire facility Clarity of Video – Older analog cameras struggle with the ability to provide clear images. New IP cameras, coupled with an advanced VMS, will produce crisp and clear images that are necessary to mitigate security risks. Inmate Tracking – One of the biggest benefit of a VMS solutions is video analytic software, which is capable of tracking a moving target and searching for specific objects. Video analytics can count human beings, monitor queues, and even identify a geographical location. VMS solutions allow security to search video archives quickly and find archived video that matches custom criteria within minutes, which is helpful in investigations. Alerts – Video analytics within a VMS solution can be programmed to detect specific activity and activate an alarm or alert system when the activity occurs. Facial Recognition – The ability to recognize a face is another key benefit of a VMS solution used in a crowded correctional institution, in particular when inmates may be wearing the same type and color of clothing. Perimeters – Video surveillance placement on the exterior perimeter of a facility can document suspicious activity occurring in outside recreational yards where contraband can enter. Many VMS solutions allow for detecting movement throughout specific areas for an established duration of time. Mobility – The ability for correctional officers to view video on a mobile device is critical, given the large landscape of facilities. For example, Salient’s TouchView Mobile solution, combined with its CompleteView 20/20 VMS, allows users to instantly access, monitor and review live and recorded video from any camera connected to any CompleteView 20/20 recording server. Cameras from multiple servers can be accessed simultaneously with PTZ control. The solution’s DRS (dynamic resolution scaling) automatically sizes the video for live viewing, which significantly reduces network usage and provides higher frame rates over mobile connections. Securing prisons and correctional facilities You can’t have a correctional facility without video surveillance and an audit trail for forensic evidence" Overall, Wareham notes, video surveillance and VMS solutions are a necessary and critical solution for securing prisons and correctional facilities. “You can’t have a correctional facility without video surveillance and an audit trail for forensic evidence,” Wareham stated, adding “Facilities with challenging budget constraints are still required to have a functional Video Management System, regardless of the technology or age of their infrastructure.” Salient VMS solution For security integrators, Salient’s VMS solutions provide a steady ROI. “Salient plays a critical role in providing a viable cost per channel ROI that is superior in the VMS industry,” Wareham said. He adds, “As the requirements for third-party encoding hardware is negated, and coupled with our customer support for virtually all aspects of the detention and corrections space, Salient’s VMS solution addresses budget constraints.” For prisons and correctional facilities, an advanced video surveillance and VMS is not just a product, it is a necessity that enables correctional facilities to stay safe and secure. “In the corrections industry, surveillance goes hand in hand with the employee, inmate, and visitor safety, while coupled with procedural compliance and enforcement,” Wareham concluded.
Three more UK police forces have jointly upgraded to Sepura SC20 TETRA radios, significantly improving their front line officers’ ability to communicate with colleagues. Bedfordshire Police, Cambridgeshire Constabulary and Hertfordshire Constabulary made use of their joint purchasing power to equip officers from across all three forces with the new SC20 TETRA radios. In all over 1,900 radios were purchased across the three forces, to work alongside their existing fleet of Sepura radios. SC20 TETRA radios By using the SC20 TETRA radios, officers will benefit from powerful, robust radios with loud, clear audio By using the SC20 TETRA radios, officers will benefit from powerful, robust radios with loud, clear audio, ensuring that critical voice communications can be clearly heard and understood, even in noisy environments. In addition the radios are applications ready, meaning that each force can in time develop bespoke applications to enable quick, secure access to critical data. A key advantage of the Sepura solution is that their radio programming solution Radio Manager can work across different Sepura products, meaning that the transition to new devices is as smooth as possible. Intuitive user interface Andy Gregory, Business Development Director at Sepura said, “After conducting trials, the response from the forces was that the SC20 benefitted from robust design, an intuitive user interface and loud audio, making it ideally suited to the users’ operational needs. The sale is significant to Sepura of course, as Cambridgeshire are Sepura’s ‘home’ force, and many of our staff live in Bedfordshire and Hertfordshire where the new radios are now being deployed.” Gary Maughan, Regional Sales Director for the UK and Ireland at Sepura added, “Sepura radios continue to be chosen by police organizations in the UK and across Europe as the leading TETRA device available on the market today. We are proud to work with our local forces as we do with all UK police forces, ensuring that they are equipped with the best communication solution possible.”
Body Worn Cameras (BWCs) are transforming policing and security around the globe, helping to create new connected officers who can stream video, access information and collaborate in real-time enabling them to operate safely and more efficiently in the field. Richie McBride, Managing Director of BWC experts Edesix, says "BWCs are now built for a connected world and are being used by officers on the front line to help prevent both criminal and anti-social behavior when out on patrol.” Importance of body worn cameras in policing Innovative solutions driving creation of connected officers who can stream and access information in real-time He adds, "Technology has transformed policing and security in recent years. New innovative solutions have driven the creation of new connected officers who can stream, access information and collaborate in real-time. BWC captured footage not only provides greater transparency of interactions with the public, but also significantly increases early guilty pleas and saves officers valuable time as they often do not need to attend court”. Richie further said, "Police officers have always been connected, either to the public and communities they serve, or with their colleagues on the street and in the control room. They have shared information and generated insights to help address common problems and protect those with common vulnerabilities. However, digital technology has now enhanced these connections, enabling officers to feel more empowered, supported and secure." VideoBadges enhance police personnel VideoBadges have been utilized by police forces across the UK for some time now. Police forces, such as the Police Service of Northern Ireland (PSNI), have utilized our BWCs since 2016 to enhance the security of both officers and the general public, and to improve training and best practice. There are now 2,500 cameras being used by over 7,000 officers covering approximately 173,000 incidents each year in Northern Ireland. The BWCs are being utilized by Local Policing Teams, Neighborhood Policing Teams, Tactical Support Groups, Roads Policing Units, Dog Section, District Support Teams and Armed Response Units. Importance of good video evidence Body Worn Video has the potential to improve the quality of evidence provided by police officers" PSNI Superintendent David Moore adds, "Video evidence puts the victims of crime first. The pilot of this technology in Foyle district demonstrated how Body Worn Video has the potential to improve the quality of evidence provided by police officers and thereby increase the number of offenders brought to justice. Video evidence provides a compelling account of events and enables the raw emotion and action from a scene to be replayed in the courts in a manner that could never be captured in a witness statement.” He adds, "It also supports accountability and transparency, both of which are key elements in increasing public confidence in policing. The introduction of this new technology is the latest example of our commitment to these principles as we continue to work together with the community to keep people safe." Head-mounted cameras Armed response and firearms teams are also being equipped with head-mounted cameras due to the fact that chest-mounted cameras could potentially obstruct an officer's view during firearms use. The Metropolitan Police recently began rolling-out 1000 head-mounted cameras, with West Yorkshire Police and North Wales Police following suit.