Urban populations are expanding rapidly around the globe, with an expected growth of 1.56 billion by 2040. As the number of people living and working in cities continues to grow, the ability to keep everyone safe is an increasing challenge. However, technology companies are developing products and solutions with these futuristic cities in mind, as the reality is closer than you may think. Solutions that can help to watch over public places and share data insights with city workers and officials...
Hanwha Techwin, a global supplier of IP and analog video surveillance solutions, has announced the expansion of its line of public health surveillance technologies with the new Wisenet TNM-3620TDY body temperature detection camera. The multi-purpose device uniquely combines Artificial Intelligence (AI) with a dual-sensor design to securely monitor facility entrances and accurately identify potential health risks. Wisenet TNM-3620TDY camera The Wisenet TNM-3620TDY body temperature detection ca...
The Qatar Emiri Air Force’s NH90 helicopter program marked a major milestone last week with first flights performed in Italy and France. The first NH90 NATO frigate helicopter (NFH), assembled at Leonardo’s Venice Tessera facility, and the first tactical troop transport (TTH) over-land aircraft, assembled at Airbus Helicopters’ Marignane site, took to the air on 15th and 18th of December respectively. The flights allowed crews to evaluate general handling and basic system...
Leonardo has recently proven the newly-expanded capabilities of its ULISSES acoustic anti-submarine warfare (ASW) system in a demonstration off the coast of Italy. During the demo, Leonardo showed how the Firefly, AQS-18, dipping sonar from L3Harris Technologies worked in concert with the ULISSES processor to automatically locate simulated enemy submarines and alert the crew to their presence. Firefly sonar integration with ULISSES system The demonstration follows the successful integration o...
A groundbreaking ceremony for the new International Flight Training School was carried out at the Italian Air Force’s base in Decimomannu, located in Sardinia, Italy. Italian Defense Undersecretary Hon. Giulio Calvisi, the Sardinian Region’s Governor Hon. Christian Solinas, Italian Chief of Defense Staff Gen. Enzo Vecciarelli, Italian Air Force Chief of Staff Gen. Alberto Rosso, Leonardo Chairman Luciano Carta, Leonardo CEO Alessandro Profumo and Marco Zoff, Leonardo Aircraft MD, wer...
FLIR Systems, Inc., the globally renowned provider of video surveillance systems and drones has announced that it has acquired Altavian, Inc., a privately-held renowned manufacturer of small unmanned aerial systems (sUAS) for defense and public safety customers. Altavian’s airframes integrate multiple sensors, including FLIR thermal technology, to provide users with decision support and intelligence, surveillance, and reconnaissance (ISR) capability. Expertise in Avionics solutions Base...
The greatest challenge that the energy sector faces in modern times is how to meet the continuously changing risk factors and addressing all of the necessary security aspects. Considering their unique infrastructure, expensive and sensitive materials onboard, and sometimes even classified national assets, energy facilities and critical infrastructures will always be subject to varied security threats. With hundreds of oil refineries, nuclear power plants, research reactors and fuel cycle facilities in operation worldwide, preventing certain materials from falling into the hands of adversaries or threat elements who seeks to steal or even harm the station operators is the top priority of the corporations’ security teams. Use of explosive devices in energy sector attacks The overwhelming majority of attacks (74%) on energy targets, between 2010 and 2014, were carried out by the use of explosive devices, while facility and infrastructure attacks, including arson and sabotage tactics, were the second most common (CEI Security Stakeholder Group Manifest). In April 2013, terrorists used high-powered rifles to destroy several transformers at a transmission substation in California in an incident that incurred more than US$ 15 million in damages and required nearly a month to restore. Robust layer-upon-layer security network Energy plants are among North America’s most protected private sector facilities Still, energy plants are among North America’s most protected private sector facilities. They are extremely robust structures that, by design and construction, are very challenging to penetrate. These structures, a well-trained security force and strict access controls for operators and visitors provide a robust layer-upon-layer comprehensive security network. The security level increases as one gets closer to the ‘owner-controlled area’, which is fenced and secured by advanced systems and well-armed security officers. This security ring typically shields the reactor, the control room, the used fuel pool and the central security alarm stations. The systems provide: High-quality scanned images, Smart compare capabilities for the inspection of recurring vehicles, Fraud prevention tools backed by a unique vehicle ID, Full integration to barriers, bollards and access control systems, Automatic detection of illicit materials or unauthorized access on the first pass, COVID-19 compatible: Driver and passenger fever detection capabilities. Helios UVIS by UVeye Access to the owner-controlled area should be limited and protected by an automated access control system that integrates with the alarmed security doors and response system connected to federal or local law enforcement agencies, which can assist in the event of an attack. Helios UVIS by UVeye helps ensure that all measures are taken to control vehicles’ access to sensitive energy facilities and protect them from such risks. Helios UVIS is designed to detect illicit materials being smuggled in, prevent theft, and thwart unauthorized access or other malicious acts in and around the secured facility. UV Inspect, advanced vehicle pass solution UV Inspect can be used for vehicles that have not been previously scanned by a system Offering single- or multi-lane units, as well as stationary or mobile units, UVeye’s advanced deep learning algorithms were developed through training with millions of vehicles and allow UVeye to offer its first pass solution, UV Inspect. Built on a truly intimate understanding of what a wide range of vehicles are supposed to look like in various environmental conditions, UV Inspect can be used for vehicles that have not been previously scanned by a system. UVeye is the only under-vehicle inspection system (UVIS or UVSS) vendor to offer a verified first-pass solution that significantly increases security teams’ effectiveness. UV Compare, license plate or fingerprint ID recognition Another key feature from Helios is called UV Compare, which enables it to recognize previously scanned vehicles by their license plate or unique undercarriage fingerprint ID, and compare it to previous scans. Individuals who are granted access to the facility or protected area, whether they are employees, contractors or visitors, become part of this database. This feature can also help detect tiny objects such as paper bags, phones, miniature hard disks and other contraband. Securing confidential materials Due to their complex environment and sensitive information, energy sites are a target for technology and data theft scenarios. The physical protection of energy plants and associated facilities must include vehicle access point inspection to ensure these security systems’ effectiveness against defined risk factors by UVeye’s tailored security level, answering a wide range of security requirements. Given the industry’s unique work conditions and the varied types of vehicles accessing these facilities, Helios can withstand up to 40,000 pounds (20 tons) per axle, meaning that it will survive being driven over by even massive vehicles like trucks or SUVs. Durable with built-in thermal sensor Helios is also designed to respond to weather variation, such as daily changes in temperature Helios is also designed to respond to weather variation, such as daily changes in temperature, storms and weather hazards. It is fully operational at temperatures between 68°F and 104°F (20° and 40° Celsius) and is IP 68/54 compliant, meaning it offers full protection against sand, dust and rain. UVeye’s built-in thermal sensor can detect the body temperatures of the passengers in vehicles entering the site’s access roads, assuring the safety and security of everyone in and around the facility. Multi-layer access control security UVeye fully supports third-party integration and provides multiple layers of security for any facility. Integrations available and made in the past include: ALPR System Face Detection/Recognition Arm Barriers/Bollards VMS (Video Management System) Centralized data management system Centralized management system allows the client to access multiple systems and manage historical data Integrating to the centralized server provides the capability of connecting multiple systems or lanes across different sites, while also enabling central management and control via one screen. The centralized management system allows the client to access multiple systems and manage the other users and historical data. The undercarriage is one of the most critical parts of the vehicle to inspect and one of the most challenging areas to examine. Helios is the perfect solution to prevent any weapons or other illegal and dangerous items from entering energy facilities. Enhanced data security Integrating it with additional security and access control systems can provide a multi-layered approach to tighten the entry and exit points to any sensitive site while keeping personnel and data safe.
As International Security Week (ISWeek), 30 November – 3 December 2020, draws closer, experienced names in the industry are preparing to join together to dissect recent incidents of terrorism and how to combat extremism while protecting national assets. International Security Week The International Security Week marks five years since the shocking series of coordinated terrorist attacks across Paris, France which tragically killed 130 people. Recent incidents in Nice, France and Vienna, Austria have been a stark reminder that extremism and terrorism remains a key issue for nations, even during the ongoing COVID-19 pandemic. ISWeek will bring panels of counter terror experts together to look at how the industry can better share intelligence ISWeek, which incorporates International Security Expo (ISE), International Cyber Expo (ICE) and International Disaster Response Expo (IDR), will bring panels of counter terror experts together to look at how the industry can better share intelligence and best practice. Key insights on counter terrorism During Day One, sponsored by HS Security, attendees will hear from ex-jihadi Aimen Dean, who eventually defected to pass information to UK intelligence on Al-Qaeda’s networks and plots. He will explain how the Islamist movement is evolving in the wake of COVID-19. Steve Rodhouse, Director of General Operations will share perspectives from the National Crime Agency (NCA) on what will be the most pressing serious and organized crime to tackle in 2021. Balancing protection and access control Earlier this month, the UK’s alert level was raised to ‘severe’, and Niall Griffin, Hardstaff Barriers - Representing HS Security, a Division of Hill & Smith PLC, will explain why identification of risk and the implementation of measures must be managed carefully. Fay Tennet, Deputy Director of Security Operations at the Houses of Parliament will join a panel to deliberate the balance between protecting locations and ensuring it remains accessible for the general public. Steve Cooper OBE, Chief Operating Officer at Apstec Systems will speak to acclaimed security and intelligence journalist, Philip Ingram MBE about security screening in the post-pandemic era. Protecting Critical National Infrastructure (CNI) Mitigating the threats to Critical National Infrastructure requires careful policy and implementation Mitigating the threats to Critical National Infrastructure (CNI) requires careful policy and implementation. Justin Lowe, industry renowned expert in cyber resilience of energy and utilities and critical infrastructures and Senior Home Office Official, Shaun Hipgrave will take part in a panel discussion on Day Three, which focuses on Protecting Critical National Infrastructure & crowded places and adapting Law and Order, sponsored by Apstec Systems. Intelligence sharing in the Digital Age Intelligence sharing is made easier in the Digital Age, but Commissioner, Ian Dyson of the City of London Police will look at the impact of Brexit on the UK’s ability to share data with European and International colleagues and the solutions being put into place to continue effective transnational communication. Nineteen Events Ltd.’s Event Director, Rachael Shattock said “With 13 national infrastructure sectors in the UK, there is a tremendous amount for security professionals to consider when protecting a country’s way of life. That’s why we’re delighted to offer such a diverse range of voices at ISWeek in 2020, providing their experience in the fields of law and order, CNI protection and counter terrorism.” Rachael adds, “There are just days left to register to attend, so we encourage everyone in the industry to sign up today to access all of the fantastic content, as well as an exclusive report into the State of Security by Westlands Advisory.” Combined ISE, ICE and IDR events in one week Incorporating International Security Expo (ISE), International Cyber Expo (ICE) and International Disaster Response Expo (IDR), ISWeek will be filmed in a television studio setting, with high production value. Leading experts from around the globe will be interviewed by veteran security and intelligence journalist, Philip Ingram MBE, during high-level interactive panel discussions and ‘fireside chats’.
Utility, Inc., (Utility Associates, Inc.) announced the United States Patent and Trademark Office issuance of patent 10,812,755 for additional BodyWorn camera technology. Patent for BodyWorn cameras The patent covers mounting a BodyWorn camera in a holster that is embedded inside a body armor vest, duty shirt, winter coat or other garment with the camera lens fastened and aligned to provide a clear field of view through an opening in the garment. Embedding the camera within an article of clothing eliminates potential issues and concerns of the camera being pulled or falling off, which is a common limitation with body camera devices that are externally attached to law enforcement uniforms with clips or magnets. Patent covers automatic recording triggers The patent also includes claims for several capabilities incorporated into Utility, Inc.'s BodyWorn camera involving the automatic recording triggers, which are designed to ensure reliable video recording and reduce law enforcement distraction to increase safety for both the officer and the community. The automatic triggers in the patent claims include starting or stopping video recording anytime an officer: Enters into a GeoFence zone around the dispatched call for service location; Runs; Struggles with another person; Manually starts or stops video recording using an associated operational mode device, such as a wristband or duty belt-mounted controller; The BodyWorn camera receives data from an associated operational mode device, such as an in-car video system, gun holster sensor, or Video Integration Ecosystem (US Patent 10,560,668); or The officer goes to a horizontal orientation and does not respond to the BodyWorn camera's Officer Down alert prompts. Officer Down reporting and alerting The patent includes the technology of a near field communications sensor embedded in the BodyWorn holster The last capability, identified as Officer Down reporting and alerting, notifies central dispatch and nearby officers that a fellow officer is down and needs immediate assistance. Along with the instant notification, Utility's ecosystem provides turn-by-turn directions through the system to the Officer Down location. The patent also includes the technology of a near field communications sensor embedded in the BodyWorn holster that automatically associates the BodyWorn camera with the officer and the officer's in-car RocketIoT vehicle video management, GPS, vehicle diagnostics, 4G-LTE and WiFi communications server. This automatic association provides chain of custody relationship proof between the BodyWorn camera video and the officer who recorded the video. Automatic video technology "As we continue to innovate and add features to complement our existing technological advances, we appreciate knowing that our foundational technology is safeguarded," said Michael Nark, President and Chief Executive Officer (CEO) of Utility, Inc. Michael adds, "Our BodyWorn camera technology provides officer safety while solving several challenges facing law enforcement today, and our automatic video technology not only takes the burden off officers but also provides the community with peace of mind with features such as two-minute pre-event buffer and cloud upload." RocketIoT for in-car video support The company has a wide variety of solutions in addition to the BodyWorn camera. The Utility, Inc. ecosystem also includes the RocketIoT for in-car video and communications support, ALPR, AVaiLWeb cloud-based digital evidence management system and situational awareness software solutions for law enforcement, transportation agencies and utilities.
Briefcam, the industry’s renowned provider of Video Content Analytics and Video Synopsis solutions, has announced that its advanced video analytics software platform will serve as the analytics engine for Verizon’s Intelligent Video solution. Intelligent Video solution The comprehensive monitoring service from Verizon helps law enforcement and security teams keep public and private facilities secure with near real-time, actionable data from video content. The combined solution enhances the ability for these organizations to protect lives and property in remote locations and in the city centers - equally. This includes critical infrastructure from dams and power plants to oil refineries and transportation systems. Advanced video analytics The full solution leveraging BriefCam provides advanced video analytics, including near real-time and forensic video analysis, and trends in data through dashboard visualization, enabling rapid acceleration of video investigations. “Leveraging its renowned network, Verizon is creating a best-in-class solution to enable the protection of all facilities in a community whether in the city center or on the edge of town,” said Gili Rom, Vice President of Strategic Initiatives, BriefCam. Gili adds, “Bringing together Verizon’s wireless infrastructure with our advanced video analytics and other industry leading technologies allows security professionals to remotely optimize situational awareness while reducing time and resource investments.” Leveraging robust analytics software The solution was built to provide advanced analytics and benefits for an improved experience Verizon Intelligent Video leveraging BriefCam’s robust analytics software offers a comprehensive, bundled video management solution for cloud or wireless access that includes software licensing, installation, administration, training, and support. The solution was built to provide advanced analytics and benefits for an improved experience. BriefCam delivers the ability to monitor and analyze multiple sites remotely from a single interface and the insights needed to fully prevent or investigate and resolve issues. Automated video analysis Verizon Intelligent Video automates video analysis with an easy-to-use interface so that users can quickly drill down, and filter objects based on a wide range of object classifications, attributes, and behaviors. This accelerates investigations and helps users attain situational awareness sooner, to derive operational intelligence from video. The powerful solution makes it possible to do more with fewer monitoring, intelligence, and investigative resources.
Cyber security concerns regularly top the list of things that keep business leaders up at night. The threat landscape is constantly shifting and evolving, as determined malicious actors launch new attacks and exploit vulnerabilities. Defending against threats and protecting company data can feel like a never-ending game where it’s impossible to stay one step ahead. To counteract this, Axis Communications (Axis) leads a collaborative effort with system integrators, security experts and end users. Here we explore the processes in place to ensure the highest-levels of surveillance system cyber security. Cyber security threat analysis A strategic approach to cyber security starts with an understanding of what common industry-specific threats an organization is likely to face, existing vulnerabilities in their defense and industry regulation. Axis recognizes this and proactively works with partners and customers to ensure they are equipped with the right knowledge and protocols to help defend against attacks. Unfortunately, security threats don’t fit into specific and well-defined boxes. They vary in terms of sophistication and impact. Highly complex attacks with the biggest impact to businesses and their customers tend to steal the most column inches and awareness, but these aren’t the most common. User error, a key factor in cyber-attacks User error is a top factor when it comes to successful cyber-attacks and shouldn’t be overlooked Rather, the threats that organizations need to worry most about arise far more frequently from lapses in protocol and what is often referred to as ‘deliberate or accidental misuse of the system’. User error is a top factor when it comes to successful cyber-attacks and shouldn’t be overlooked. This is something that Fred Juhlin, Global Senior Consultant at Axis Communications believes is one of the greatest misconceptions when it comes to threats. Fred Juhlin comments, “Many organizations mistakenly focus on protecting their businesses from the high profile threats, instead of getting the basics right. User error is a top factor when it comes to successful cyber-attacks and shouldn’t be overlooked when putting measures in place to improve cyber security.” Addressing cyber security vulnerabilities Vulnerabilities are weaknesses or opportunities for different threats to impact the system negatively and are a part of every system: no solution exists which is completely free from vulnerabilities. Rather than focus solely on the vulnerability itself, it’s important to quantify the potential impact on the organization if it is exploited. This will help qualify the associated risk and whether addressing the vulnerability should be prioritized. Axis Communications strives to apply cyber security best practises in the design, development, and testing of devices, so as to minimize the risk of flaws that could be exploited in cyber-attacks. However, securing a network, its devices, and the services it supports relies on active participation by the entire vendor supply chain, as well as the end-user organization. Axis Hardening Guide The Axis Hardening Guide describes each security control that can be applied with the device and recommends when, where and why it should be used when securing the network, devices, and services. From a vendor perspective, developing software products with security built in throughout the development lifecycle requires experience and maturity in secure software design and coding. In addition, these products must comply with prevailing legislation (for example, GDPR, CCPA for privacy and NDAA, DoD CCMC for secure supply chains and the UK Secure by Default legislation), and many more. Cyber security legislation and standards Wayne Dorris, CISSP, Business Development Manager – Cyber Security at Axis commented, “We dedicate a significant portion of our time to examining laws, legislation and standards for cyber security requirements to see where these may impact Axis.” He adds, “These regulations may differ according to geographical location, which presents a challenge to customers who need to deploy products across multiple markets. For example, it’s counterproductive to install one version of firmware for the Americas, when they need another version for EMEA.” Security Development Model Axis Communications approaches this challenge through its Security Development Model Axis Communications approaches this challenge through its Security Development Model, which is based on several cyber security industry best practices. The model defines the processes and tools used to build software with security built-in throughout the development lifecycle, spanning initial requirements, design, implementation, verification and deployment. Even with the best processes in place to prevent critical vulnerabilities being designed into a product, the threat landscape is in a continual state of change. Communicating information about these vulnerabilities to customers and partners as soon as they are discovered is the key. This will allow them to undertake risk assessments and take an action, such as patching, to rectify. Employing independent scanning tools Sometimes customers choose to take assessment into their own hands, employing independent scanning tools which report current vulnerabilities in the solution. These can be invaluable to keeping a system secure, but must be given right context and associated risk assessment. Without this, there is the chance that the wrong conclusions are drawn, leading to expensive and unnecessary actions. Without the right context and risk assessment, it’s easy to go down a rabbit hole. Steven Kenny, Industry Liaison Manager at Axis commented, “It’s great when customers take such a proactive stance to understanding the vulnerabilities that exist within their systems, but these reports can include many false positives. Without the right context and risk assessment, it’s easy to go down a rabbit hole, dedicating resources towards fixing a problem that has very little impact on the business.” Axis works closely with customers and partners regarding interpreting and prioritizing vulnerabilities, and developing a strategic and informed plan of action. Cyber security best practise education and training Education plays an important role in informing the development of security policies As part of this guidance on the latest vulnerabilities, education plays an important role in informing the development of security policies. One of the greatest cyber security weaknesses in an organization can be its staff. It is critical that they are made aware of how they can be targeted and the potential impact of failing to comply with security practises. Axis helps to deliver cyber awareness training and establish best practice guides for end users. Security personnel can also be a weak point in an organization’s cyber security, given their responsibility for managing security controls. This includes maintaining an up-to-date device inventory, secure deployment, patching and device account management. Keeping on top of this can be difficult, and Axis Device Manager (ADM) can support security personnel in this endeavor. However, customer needs are changing and demand for capabilities such as multi-site management and improved monitoring is increasing. To meet this demand, Axis has launched ADM Extend which enables a more flexible deployment which allows personnel to support multiple sites. Although ADM Extend is currently focusing on the common operations, it will include more policies, security automation, and integration with other systems in the near future. Moving towards a ‘zero trust’ approach Threat actors often work in collaboration, sharing information on the latest vulnerabilities, tactics and associated rewards. Faced with such a determined and often well-funded foe, organizations should not attempt to go into battle without the right armor and support. New threats continuously emerge a multi-layered approach, which is underpinned with cyber security education being essential to an organization’s defense. As the industry moves to a ‘zero trust’ approach to security where every entity is identified and defined by its risk profile, it is important to choose products which are designed with security in mind. Axis leverages over 30 years of experience to create robust products and employs a collaborative approach to ensure that partners and customers are armed with the key information and tools needed to react to changing threats.
Gunshot Detection Systems market report introduces basic information including definition, application, industry chain structure, industry overview, classification, policy analysis, and news analysis. Insightful predictions for the Gunshot Detection Systems Market for the coming few years have also been included in the report. Gunshot Detection Systems report The report provides a detailed analysis of global market size, segmentation market growth, regional and country-level market size, market share, competitive landscape, sales analysis, the impact of domestic and global market players, value chain optimization, trade regulations, recent developments, opportunities analysis, strategic market growth analysis, product launches, area marketplace expanding, and technological innovations. This report presents an intensive outline of the market and its normal development way over the period somewhere in the range of 2020 and 2029. The compound yearly development rate (CAGR %) for all fragments of the market is accommodated in this period. The report features the key patterns of, at various times, expected to assume a key job in the general improvement of the market over the forecast period. Variable driving and controlling the market The report additionally diagrams the urgent variables driving and controlling the market The report additionally diagrams the urgent variables driving and controlling the market. An itemized outline of rewarding development openings across key portions and local markets is additionally included. The report likewise presents a qualitative and quantitative investigation of the advancement observed in the field of Gunshot Detection Systems technologies in the previous years. Through essential and optional research endeavours, detailed information relating to new revelations to have forayed into the worldwide market in the previous years, have been remembered for the report. Information in regards to the buyer and seller scene, administrative system across key provincial markets, and areas with high-development possibilities are likewise remembered for the report. Trends and Opportunities One of the key variables driving the worldwide Gunshot Detection Systems market is the expanded interest for new procedures and standards for viably taking care of enormous information related issues and the rising appropriation of Gunshot Detection Systems-based automatons and different equipment in safety and military applications. Various different businesses are additionally contributing expanded entities on the appropriation of logical arrangements that can cut down operational expenses and make activities speedier and increasingly beneficial. Gunshot Detection Systems-based calculations As Gunshot Detection Systems-based calculations end up being viable in these zones and the mindfulness with respect to their advantages rises, the Gunshot Detection Systems is relied upon to profit hugely from a potential ascent in a set of uses. At long last, the report gives subtleties of serious advancements, for example, developments, understandings, new item dispatches, and acquisitions in the market for gauging, territorial interest, and gracefully factor, investment, market elements including specialized situation, consumer conduct, and end-use industry patterns and elements, capacity and spending were contemplated.
While there is much hype around drone technology today, initial successful drone usage for security can be dated back to the 1960s, when the US utilized the Lightning Bug 147, a camera-equipped unmanned aerial vehicle that could travel 600 miles for surveillance in Vietnam, China and Korea. Drones For Effective Surveillance Since this initial deployment, drones have been used for a variety of security and surveillance applications. However, as professional-grade commercial drones incorporate newer, more advanced features and technologies, their capabilities will allow for many new scenarios and applications within fully-integrated security systems. The security industry, in addition to first response and law enforcement, will be among the first to truly experience the benefits of the most current drone technologies. And, these industries have already started to utilize drones in new ways—the most recent example being the use of commercial drones to save lives during hurricanes Irma and Harvey. For these reasons, UAVs are becoming an integral tool in multiple industries and according to PwC, will have an expected total value of $127 billion by 2020, $10.5 billion of which will be in security applications of drones.There is room to improve on cost, efficiency and safety, so the opportunity for commercial drone technologies is large Drones In Fire, Border And Perimeter Security Current drone users in the security arena are comprised of law enforcement, fire departments, border security and first responders, who primarily use UAVs for border control, perimeter surveillance and monitoring, anti-terror operations and searching for missing persons. These tasks generally require manned teams and can even include helicopters, the results being costly, time-consuming and potentially dangerous. Alternatively, these teams use consumer-grade drones, which simply lack the capabilities and levels of security necessary to be used safely for such operations. This makes the opportunity for commercial drone technologies large, as there is room to significantly improve on cost, efficiency and safety. By adding autonomous drones to their arsenals, security forces are able to accomplish their objectives more easily and effectively by removing the need for a security team member to operate the drone—as it works on its own—and instead, focus on responding to the security situation at hand. Employing fully autonomous systems, especially in surveillance, is a critical feature most drone systems currently don't allow UAVs can also enter narrow spaces, produce minimal noise, and can be equipped with night vision cameras and thermal sensors, allowing them to see beyond what the human eye can detect. They can also quickly cover large expanses of ground and access hard to reach places. However, most drones today have not reached the pinnacle of what is possible for advanced commercial UAVs. Drawbacks Of Current Drone Solutions Despite how far drone technology has come, drones used in security settings are still riddled with shortcomings. This is apparent in the build quality of current drones, most of which are made from hardened plastic, which falters when faced with rough weather conditions or after experiencing tough falls and crashes. Closed-system integration is another key element current UAVs lack. Not being able to integrate drones into wider closed-security systems creates major gaps in the efficacy of security operations. The use of carbon fibre in the build of drone hulls will increase drones' weather durability - and ultimately make them more valuable Lastly, employing fully autonomous systems, especially in surveillance, is a critical feature most drone systems currently don't allow - both due to shortcomings in the technology and due to the need for regulations to catch up to the advancements and capabilities of drone technologies. The combination of these drawbacks can create lacklustre drone results, and when lives are on the line, these results simply aren't enough. Why Commercial Drones Can Make A Difference That being said, 2018 is the year where the security sector will experience increased drone adoption. That’s because there are some drone technologies being developed today that overcome many of the shortcomings outlined above. These are the technologies we will see having the greatest impact within the security industry. Here are some of the drivers of change, both in the industry and technology that will allow drones to effectively integrate into the security market: Increased processing power: This will allow autonomous drones, powered by AI technology, to track objects in real time, and adjust their courses and actions as needed. This allows for greater drone operational efficiency while simultaneously drawing less power from the battery, thereby lengthening the drone’s flying time. These improved processors will also make way for increased broadcast range capabilities, allowing for longer distance drone operations. Regulations will catch up to the technology: This is a trend we began to see at the tail end of 2017. Governments in both the United States and Europe have realized that drone regulations must keep up to gain the most from UAV technologies, as well as to counter the use of drones for terror or other nefarious tasks. To that end, the US government began talks with drone developers to discuss the expansion of commercial drone operations, and the UK government introduced tougher regulations to crackdown on dangerous flying and criminal drone use. Drone regulation will move in favor of autonomous drone operation: As governments increase regulations in favor of the commercial drone industry, commercial players will increase pressure to allow for fully autonomous operation. Full autonomy means Beyond Visual Line Of Sight (BVLOS) drone functionality. This enables drone operators to fly a UAV with the drone out of their line of sight, maximizing the capabilities of the UAV, and in the case of security missions, keeping the pilot out of harm’s way. New materials will increase drone hull durability: As drone makers will have learned from their drones’ lack of weather resistance following the tumultuous hurricanes the U.S. experienced this past year, the use of carbon fiber in the build of drone hulls will increase their weather durability. Better capabilities will encourage adoption among security: New commercial drones will have longer flight times, longer battery lives, will carry heavier payloads, and will integrate advanced computer vision technologies and real-time connectivity. This will enable drones on security missions in remote areas to send a live stream of their field of vision to drone operators at a central command station. Full integration of security systems: The interoperability of a variety of technologies will make drones another sensor in fully integrated and closed security systems that may include smart fences, security cameras and other infrastructure elements. Full integration also means that these elements will be controlled from the same central command center, whether for securing a specific facility, or as part of surveillance system on a military base, or other closed location. This will allow security personnel to use drones more effectively, saving time, money, and increasing the safety of security professionals in the field. This year is going to be huge for the drone security market, as it is about to experience a significant improvement in drone performance, which will lead to a widespread escalation in drone adoption. The results will be prolific for both drone makers and security force users.
The use of drones has increased dramatically in the last few years. Indeed, by 2021, the FAA says the number of small hobbyist drones in the U.S. will triple to about 3.55 million. With that growth, drone capabilities have increased while costs have decreased. For example, the DJI Phantom 4 can deliver a 2-pound payload to a target with 1.5m accuracy from 20 miles away for the less than $1000.00. This is an unprecedented capability accessible to anyone. This new technology has created an entirely new security risk for businesses and governments. Drone Security Risks Already, rogue groups such as ISIS have used low cost drones to carry explosives in targeted attacks. Using this same method, targeting high profile locations within our borders to create terror and panic is very possible. Security professionals and technologists are working furiously to address the gaps in drone defense. Currently, the most common technologies in use for drone detection are video, acoustic sensors, radio, and air surveillance radar. Each of these has advantages, but they also have flaws that make it difficult to detect drones in all conditions. Both optical and thermal cameras, as well as acoustic sensors, do not operate in severe weather such as fog and snow. And while radio and air surveillance radar cover a wide area of detection, they suffer from high installation costs and limiting technical challenges, such as being unable to detect low flying drones on autopilot. Compact Surveillance Radar (CSR) Compact Surveillance Radar (CSR) is a security technology addressing the problems with other types of detection. CSR, like traditional radar, has the benefit of being able to detect and track foreign objects in all weather conditions, but at a fraction of the size and cost. The compact size allows the radar to be mounted on existing structures or even trees, providing extensive perimeter defense almost anywhere that you can imagine. CSR can also filter out clutter such as birds by using an advanced algorithm reducing the number of false alarms. While the use of CSR and the other detection technologies are legal in the US and in most locations throughout the world, the response mechanisms are generally not. Current regulations in the US prohibit the use of jamming or GPS spoofing in all cases except for a few federal agencies Regulations Limiting Drones Current regulations in the US prohibit the use of jamming or GPS spoofing in all cases except for a few federal agencies. This makes it difficult to stop the damage that drones can cause. The FAA has put into place new regulations that limit some uses of drones. However, in most cases it is still illegal for even state or local governments to stop or interfere with drones other than to locate the operator and have them land the drone. In 2016 the first law to neutralize a drone in the United States was passed in Utah to respond to drones in wildfire areas because of their interference with airborne firefighting. This law may very well provide a model for other states dealing with drones in situations where people’s lives are being put at risk by drones. At the federal level, much effort is being put into evaluating the regulations and technology surrounding the misuse of drones. In the 2016 reauthorization bill for the FAA, Section 2135 included a pilot program for the investigation of methods to mitigate the threat of unmanned aircraft around airports and other critical infrastructure. There are many federal agencies that are evaluating the use of a variety of technologies to respond to this threat. Both optical and thermal cameras, as well as acoustic sensors, do not operate in severe weather such as fog and snow Effective Countermeasure Technologies The most effective countermeasure for drones is jamming, currently off-limits to the private sector. This includes stadiums, convention centers, and other large gathering areas. A number of companies are developing new response technologies that do not require the use of jammers or hacking. Several companies have developed net guns that shoot a net at an approaching drone. These are only effective at less than 100m and frequently miss the target, especially when the drone is approaching at high speed. Several other companies have taken this method a step further, with drones that capture other drones. Once a radar detects a drone, another defense drone is launched and flies to the point of detection. Then, using video analytics it homes in on the drone and fires a net to disable the drone and take it to a safe location. While this drone capturing technique is still in its infancy, it shows a great deal of promise and will not be restricted in the same fashion as jamming. However, even this solution is difficult under current regulations, as all commercial drones in the US must be under direct control of a human operator within their line of sight. This effectively means that a drone operator is required to be on-site at all times to protect a facility, event, or persons. One thing is for certain, technology will continue to adapt and security companies will continue to invent new methods to protect their facilities and the people they are sworn to protect.
The UK Government has been working to reduce the risks associated with illegal drone use since a high-profile incident at UK’s Gatwick Airport in December 2018, when a drone sighting triggered a three-day shutdown of the UK’s second busiest airport, disrupting the travel plans of 140,000 people and affecting 1,000 flights. To address growing security threats by drones, the UK Government has released its ‘Counter-Unmanned Aircraft Strategy’. ‘Counter-Unmanned Aircraft Strategy’ This strategy sets out our approach to countering the threat the malicious or negligent use of drones can bring" “This strategy sets out our approach to countering the threat the malicious or negligent use of drones can bring,” says Brandon Lewis, the U.K. Minister of State for Security. “It will provide the security the public and drone users require to continue to enjoy the benefits of leisure and commercial drone use and facilitate the growth of the drone industry.” “Given the challenge posed by rapid advances in drone technology and the potential threat, the strategy will provide overarching direction to our efforts,” says Lewis. The strategy focuses on ‘small drones’, those weighing less than 20 kg (44 pounds). Countering malicious use of aerial drones The UK Counter-Unmanned Aircraft Strategy centers on mitigating the highest-harm domestic risks resulting from malicious use of aerial drones. They are: Facilitating terrorist attacks, such as modifying commercially-available drones to conduct reconnaissance or attacks. Facilitating crime, especially in prisons, where drones are currently used to deliver contraband. Disrupting critical national infrastructure, such as airports, where a malicious incursion using a drone can have serious safety, security and economic consequences. Potential use by hostile state actors. Maximizing benefits of drone technology The initiative will also look to build strong relationships with industry to ensure high security standards Over the next three years, the strategy will seek to reduce the risks posed by the highest-harm use of drones while maximizing the benefits of drone technology. It will develop a comprehensive understanding of evolving risks and take a “full spectrum” approach to deter, detect and disrupt the misuse of drones. The initiative will also look to build strong relationships with industry to ensure high security standards. Further, promoting access to counter-drone capabilities and effective legislation, training and guidance will empower the police and other operational responders. Tactical response to drone-based threats Because technology is rapidly evolving, the response needs to keep pace, according to the strategy document. Lewis adds, “We will therefore work to understand how drone-based threats might evolve in the future, both at the tactical and strategic levels.” The strategy will be to build an end-to-end approach to tackling the highest-harm criminal use of drones. It will also work to make it easier to identify malicious drone use against a backdrop of increased legitimate use. Legal drone operators will be required to register with the Civil Aviation Authority (CAA) and to pass an online competency test before flying a drone. Retailers who follow a specific set of safety guidelines when selling drones will be designated ‘DroneSafe’. Unmanned traffic management system The government is working toward future implementation of an unmanned traffic management (UTM) system, which provides a means of preventing collisions between unmanned aircraft and other manned or unmanned aircraft. The current strategy includes early planning for the system. An Industry Action Group will ensure a continuing relationship with the drone industry and help to improve existing counter-drone measures and identify new opportunities, such as use of ‘Geo-Fencing’ to restrict drones from flying in certain areas. Regulating commercial and domestic drones The UK Department of Transport is responsible for safe and lawful use of drones within the UK airspace The strategy will seek to communicate the UK’s security requirements to the counter-drone industry and to encourage a thriving sector that is aware of, and responsive to, the needs of government. Regulating drones is the responsibility of two UK government departments. The UK Department of Transport is responsible for safe and lawful use of drones within the UK airspace, while the Home Office has overall responsibility for domestic counter-drone activity. Fast-evolving drone and counter-drone technology Also, the Center for the Protection of National Infrastructure (CPNI) has been involved in reducing the vulnerability of sensitive sites, including airports. New performance measures will track the strategy’s success. Due to the fast-evolving nature of drone and counter-drone technology, the intent is to review and, if necessary, refresh the strategy in three years.
A week of mass shootings this summer has again spotlighted the horror of gun violence in public spaces. A 19-year-old gunman opened fire at the Gilroy Garlic Festival in California on July 28, injuring 13 and killing four (including the gunman). In El Paso, Texas, less than a week later, a lone gunman killed 22 people and injured 24 others. In Dayton, Ohio, a day later, a gunman shot 26 people during a 30-second attack, killing 9 and injuring 17. Rising active shooting incidents Beyond the grim statistics are three distinct incidents, linked only by the compressed timeline of their occurrence. Still, there is a tendency to want to find a pattern: Why do these incidents happen? How can we prevent them? In total, 91 people were killed and 107 more were injured in locations such as workplaces, schools, and public areas One attempt to analyze trends and commonalities among mass shooting incidents is a research report published by the U.S. Secret Service National Threat Assessment Center (NTAC) titled “Mass Attacks in Public Spaces – 2018.” Looking at the totality of major mass attacks last year, the report seeks to find patterns that can shed light on the attacks and suggest strategies to prevent and mitigate future incidents. Mass shootouts Between January and December 2018, 27 incidents of mass attacks – in which three or more persons were harmed – were carried out in public spaces within the United States. In total, 91 people were killed and 107 more were injured in locations such as workplaces, schools, and other public areas. The National Threat Assessment Center report considered all the mass attack incidents in 2018 and analyzed some trends and statistics: Over half (59%) took place between the hours of 7 a.m. and 3 p.m., and 63% of the attacks ended within 5 minutes of when they were initiated. Most of the attackers were male (93%); the youngest was a 15-year-old student and the oldest was 64. Nearly a fourth of the attackers (22%) had substance abuse problems, and half (48%) had a criminal history, whether violent or non-violent. About two-thirds (67%) experienced mental health symptoms, commonly depressant and psychotic symptoms such as paranoia, hallucinations or delusions. Almost half (44%) had been diagnosed with a mental illness prior to the attack. The main motives were domestic, personal or workplace grievances (52%); followed by mental health/psychosis (19%); 22% had unknown motives. Most (85%) of attackers had at least one significant stressor in their lives in the last five years; 75% had experienced stressors that occurred in the previous year before the attack. Personal stressors included the death of a loved one, a broken engagement of physical abuse. Work- or school-related stressors included losing a job, being denied a promotion, or being forced to withdraw from classes. More than half of attackers (56%) experienced stressors related to financial instability. Personal issues such as homelessness or losing a competition were also stressors. Nearly all the attackers (93%) engaged in prior threatening or concerning communications. Most of the attackers (78%) also exhibited behaviors that caused concerned in others. For the majority of the attackers (70%), that concern was so severe that others feared specifically for the safety of the individual, themselves, or others. The Secret Service report also analyzed the overall impact of several factors: Mental health and mental wellness - Mental illness, alone, is not a risk factor for violence, and most violence is committed by individuals who are not mentally ill. Two-thirds of the attackers in this study, however, had previously displayed symptoms indicative of mental health issues, including depression, paranoia, and delusions. Other attackers displayed behaviors that do not indicate the presence of a mental illness but do show that the person was experiencing some sort of distress or an emotional struggle. The importance of reporting - Since three-quarters of the attackers had concerned the people around them, with most of them specifically eliciting concerns for safety, the public should be encouraged to share concerns they may have regarding coworkers, classmates, family members, or neighbors. Need for a multidisciplinary threat assessment approach - There is a need to standardize the process for identifying, assessing, and managing individuals who may pose a risk of violence. Law enforcement and others are taking steps to ensure that those individuals who have elicited concern do not “fall through the cracks.” Law enforcement personnel should continue developing close partnerships with the mental health community, local schools and school districts, houses of worship, social services, and other private and public community organizations. Threat assessment Threat assessment refers to a proactive approach to violence prevention, an investigative model Many of the resources to support the threat assessment process are already in place at the community level, but require leadership, collaboration, and information sharing to facilitate their effectiveness at preventing violence, according to the report. ‘Threat assessment' refers to a proactive approach to violence prevention, an investigative model originally developed by the U.S. Secret Service to prevent assassinations. It has since been adapted to prevent all forms of targeted violence, regardless of motivation, including K-12 school shootings and acts of workplace violence. When implemented effectively, a threat assessment generally involves three key components: Identify, Assess and Manage. Identify, Assess and Manage Public safety entities rely on people who observe concerns to identify the individual to law enforcement or to someone else with a public safety responsibility. In educational settings or workplaces, concerns may be reported to a multidisciplinary threat assessment team that works in conjunction with law enforcement when needed. The responsible public safety entity is then tasked to assess the situation to determine how they can manage any risk of violence posed by the individual.
The mindset behind a new law to prohibit the use of facial recognition and other security-related technologies by San Francisco police and other city agencies is obvious in the name of the new ordinance: “Stop Secret Surveillance.” Ordinance To Stop Secret Surveillance The San Francisco Board of Supervisors passed the ordinance 8-1 with two abstentions on May 14, and there will be another vote next week before it becomes law. We have an outsize responsibility to regulate the excesses of technology precisely because they are headquartered here" The irony of such a law emanating from northern California, where tech giants promote the use of numerous technologies that arguably infringe on privacy, is not lost on Aaron Peskin, the city supervisor who sponsored the bill. “We have an outsize responsibility to regulate the excesses of technology precisely because they are headquartered here,” he told the New York Times. Regulating Facial Recognition Technology Although the facial recognition aspects of the ordinance have been the most publicized, it also targets a long list of other products and systems. According to the ordinance, "Surveillance Technology" means “any software, electronic device, system utilizing an electronic device, or similar device used, designed, or primarily intended to collect, retain, process, or share audio, electronic, visual, location, thermal, biometric, olfactory or similar information specifically associated with, or capable of being associated with, any individual or group.” Broadly interpreted, that’s a lot of devices. Includes Biometrics, RFID Scanners The ordinance lists some examples such as automatic license plate readers, gunshot detection hardware and services, video and audio monitoring and/or recording equipment, mobile DNA capture technology, radio-frequency ID (RFID) scanners, and biometric software or technology including facial, voice, iris, and gait-recognition software and databases. Among the exceptions listed in the ordinance are physical access control systems, employee identification management systems, and other physical control systems; and police interview rooms, holding cells, and internal security audio/video recording systems. The ordinance ban applies to city departments and agencies, not to the general public and exceptions include physical access control systems, employee identification management systems, and internal security audio/video recording systems Airport Security Not Part Of Ordinance The ban only applies to city departments and agencies, not to private businesses or the general public. Therefore, San Franciscans can continue to use facial recognition technology every day when they unlock their smart phones. And technologies such as facial recognition currently used at the San Francisco airport and ports are not impacted because they are under federal jurisdiction. Furthermore, the San Francisco police department does not currently use facial recognition anyway, although it has been deployed in places such as Las Vegas, Orlando, Boston and New York City. Safeguarding Privacy Of Citizens The ordinance appears to have a goal of avoiding government uses of technologies that can invade individual privacy, seeking to avoid worst-case scenarios such as an existing system in China that uses millions of surveillance cameras to keep close tabs on the Uyghurs, a Muslim minority population. Any new plans to use surveillance technology must be approved by the city government, and any existing uses must be reported and justified by submitting a Surveillance Technology Policy ordinance for approval by the Board of Supervisors within 180 days. Surveillance Technology Policy Banning use of facial recognition just when its capability is being realized is counterproductive But might such a ban on technology uses undermine their potential value as crime-fighting tools just when they are poised to become more valuable than ever? Ed Davis, a former Boston police commissioner, told the New York Times it is “premature to be banning things.” He notes: “This technology is still developing, and as it improves, this could be the answer to a lot of problems we have about securing our communities.” Technology development doesn’t happen in a vacuum and banning uses of facial recognition and other technologies just when their capabilities are being realized is counterproductive. We should be thoughtful, deliberate and transparent in how we embrace new technologies. However, discarding them out-of-hand using emotionally charged words such as “secret surveillance” does not promote the best use of technology to the benefit of everyone.
Global MSC Security announced that it has been appointed by the City of Edinburgh Council to consult on a planned upgrade of its video surveillance system from analog to IP, as Edinburgh progresses towards its vision to become one of the world smartest capital cities. Working with the Council, Global MSC Security will use its public sector expertise to oversee the preparation of a tender specification of a fully integrated public space surveillance operation. Upgrading public realm CCTV surveillance system The appointment of Global MSC Security follows the announcement that the City of Edinburgh Council is investing over £1 million in its public realm CCTV (including housing blocks, transport network and Council buildings) and has also secured £712,000 from the 'Scotland's 8th City, the Smart City' European Regional Development Fund Strategic Intervention in support of an upgrade to its CCTV infrastructure, as part of its smart city program. Global MSC Security has a wealth of expertise in public space surveillance, having consulted on dozens of local authority CCTV surveillance projects, including The Royal Borough of Windsor and Maidenhead, Central Bedfordshire, Buckinghamshire, Herefordshire, North Somerset, Barnet, Bristol City, Dorset, Neath and Port Talbot, Mid Devon and Maidstone and Luton Councils. Installing new IP cameras, VMS and encoders Global MSC Security will ensure the City of Edinburgh Council is able to upgrade its public space cameras, VMS and encoders Global MSC Security will ensure the City of Edinburgh Council is able to upgrade its public space cameras, video management system (VMS) and encoders, with the right technology at the best price and implemented smoothly. Global MSC Security’s Managing Director, Derek Maltby stated “We offer a wealth of experience in specifying public space surveillance systems for local authorities. Global MSC Security is proud to be involved in what is a major initiative not only for the City but Scotland and its position as a leader in smart services and society.” Resilient and secure city surveillance system He adds, “This important and essential infrastructure upgrade represents a significant investment, and the resulting system will provide the Council with a function-rich, future-proof, highly resilient and secure surveillance system.” Derek further stated, “However, for any organization making the switch from analog to IP, it is vital that the transition is managed in the correct way, to maximize resources and optimize system performance. That begins with a robust tender specification, which is where our expertise lies.” The tender specification is expected to be released by the City of Edinburgh Council in February 2021 and the contract awarded in September.
Leonardo delivered the first two M-345 jet trainer aircraft to the Italian Air Force, which to-date has ordered 18 units from a total requirement for up to 45 aircraft. The new type of jet trainer aircraft, designated T-345A by the Italian Air Force, will gradually replace the 137 MB-339s which have been in service since 1982. M-345 jet trainer aircraft Marco Zoff, Leonardo Aircraft Managing Director, said “Building on our heritage and expertise in jet trainers, the M-345 will allow our customers to achieve a significant improvement in training effectiveness while at the same time reducing operating costs. This first delivery to the Italian Air Force is a key milestone, the result of a longstanding and productive team working closely together with the operator.” The new M-345 jet trainer aircraft, designed to meet basic and basic-advanced training requirements, will complement the in-service M-346, which is used for advanced pilot training. Integrated training system Leonardo’s integrated training system developed around the M-345 platform is representative of the company’s technological leadership in training pilots to fly current and future generation aircraft. The system benefits from experience with, and technology developed for, the M-346, which includes a ‘Live Virtual Constructive’ capability. This allows aircraft which are flying live training missions to incorporate simulated ‘friend’ or ‘foe’ elements into scenarios, allowing the pilot to be exposed to the full range of possible operational situations. M-345 HET (High Efficiency Trainer) The new M-345 HET (High Efficiency Trainer) reduces the time required for air forces to train pilots The M-345 is a high-performance aircraft which supports a pilot’s transition from basic trainers to latest-generation fighters. The Italian Air Force’s acquisition of the new aircraft is an important step forward in the modernization of its fleet, with the M-345 replacing the MB-339A in Air Force’s second and third military pilot training phases. The M-345 has also been chosen as the new aircraft of the Italian Air Force’s acrobatic team, the ‘Frecce Tricolori’. The new M-345 HET (High Efficiency Trainer) reduces the time required for air forces to train pilots. It also gives trainees the chance to fly an aircraft that features higher performance characteristics than other basic/advanced trainer aircraft currently in service around the world. Delivering high quality training at low cost The performance of the M-345 allows it to carry out the most demanding mission types found in a training syllabus, delivering high quality training at significantly lower cost. The M-345 cockpit architecture is the same as that of frontline fighters. The aircraft is also able to perform operational roles, thanks to an extended flight envelope, with a high-speed maneuvering capability even at high altitudes, modern avionics systems, high load capacity and performance. Health and Monitoring Usage System The M-345 is designed with a long life-cycle and a two-level approach to maintenance The M-345 is designed with a long life-cycle and a two-level approach to maintenance, eliminating the need for expensive general overhauls. The aircraft’s Health and Monitoring Usage System (HUMS) also contributes to a lower cost of ownership. A sophisticated on-board training simulator confers a number of benefits. For instance, M-345 pilots are able to plan maneuvers before live training, allowing for higher efficiency during flight. Mission Planning and Debriefing Station Trainees are also able to fly in formation with other pilots in the air and those training on the ground in simulators, via a real-time data-link. The aircraft’s Mission Planning and Debriefing Station (MPDS) allow trainees to analyze the missions they have just flown. The M-345’s engine is a Williams FJ44-4M-34 turbo fan optimized for military and aerobatic use. The cockpit is based on HOTAS (Hands-On-Throttle-And-Stick) controls and features a glass cockpit with a three-color MFD (Multi-function Display) touch screen. The aircraft’s heads-up display is mirrored on a fourth screen in the rear seat.
One of the key problems in airport security is the sheer size of the perimeter and a large number of incidents are in fact linked to unauthorized access onto the airfield, either runways or where aircrafts are being loaded or refueled posing an extremely high risk. Most airports will combine multiple sensors and technologies to protect the actual perimeter fence and even beyond the perimeter fence, to warn of potential threats. OPTEX LiDAR sensor integration with RSA module Some airports have found the level of information generated by the perimeter security systems quite challenging to deal with and they wanted to decrease the number of events so operators could focus on what was critical. The Airport development team at Genetec integrated the OPTEX LiDAR sensor into their Restricted Security Area (RSA) Surveillance module, an extension of the Genetec Security Center platform with the purpose to unify data from the sensor and camera to present more meaningful information to the operators. Restricted Security Area Surveillance module The RSA module has been designed specifically with a view to providing wide area protection The RSA module has been designed specifically with a view to providing wide area protection and integrating with wide area surveillance technology, including radar, fiber optic and laser detection devices. The solution allows security staff to determine the level of threat for each area, map them, and utilize OPTEX technologies to identify and locate quickly and precisely the point of intrusion. For instance, with Fiber optic fence sensor, zones can be 100m-200m long and will identify people cutting through a fence, crawling under or climbing over. Newer fiber technologies provide point location. Another way to pin-point exact intruder location is with OPTEX LiDAR technologies or with Radar. ‘Fuse’ data into a single event A particularly intelligent feature of the system is its ability to ‘fuse’ data (known as ‘target fusion’) coming from multiple sources and confirm an event as a single (i.e. the same) activity rather than a multiple threat. For instance, using the X&Y coordinates provided by OPTEX REDSCAN sensors, RSA allows to map exactly the path of the intruders or moving vehicles, fuses the path from one camera to the other and considers it as one event, one target and tracks it precisely on the map. Intelligent Tracking and event categorization This gives a more meaningful picture to the operator and presents events in a unified and intelligent way. This helps support the security team in making the right decisions. The deeper integration of OPTEX’s technologies into Genetec’s RSA platform enables intelligent tracking and event categorization, making it a very precise security system for airports.
ZeroEyes, the only AI-based platform focused solely on weapons detection, has been selected by the Kenosha Unified School District (KUSD) of Wisconsin to help improve security on its campuses. ZeroEyes proprietary solution ZeroEyes’ proprietary solution will identify visible guns if present and send alerts to school administrators and security personnel within three to five seconds, helping to stop violent threats before they occur. KUSD is the third-largest school district in Wisconsin, with over 21,000 students and 4,200 employees in 23 elementary schools, five middle schools, five high schools and five charter schools. Integration with IP security cameras ZeroEyes currently integrates with KUSD’s IP security cameras to help detect visible weapons and serve as a proactive measure to prevent any violent threats on campus. When ZeroEyes positively detects a weapon, the platform sends a notification to school administrators, school resource officers and local 911 dispatch, ensuring the school can enact security protocols and give first responders real-time information to help prevent active shooting tragedies and save lives. Enhancing staff and students’ security “It’s a grim reality that active shootings happen in schools across the country, and we’ve needed to understand and implement the solutions that can keep our students, staff and visitors safe,” said Kevin Christoun, Maintenance, Environmental and Safety Manager at KUSD. Kevin adds, “At KUSD, we have a multi-layered security approach that includes the most effective and innovative technologies and resources, and ZeroEyes’ platform clearly supports our strategy.” Weapons detection solution ZeroEyes proprietary and comprehensive datasets focus exclusively on weapons detection Founded by a group of former Navy SEALs and military veterans, ZeroEyes proprietary and comprehensive datasets focus exclusively on weapons detection, to actively monitor and detect for visible weapons. ZeroEyes also trains and collaborates with customers and local first responders to conduct extensive pilots before its solution is fully implemented. In the future, KUSD plans to roll out additional installations to remaining schools in the district. Effectively countering active shooting incidents “ZeroEyes was founded upon the realization that a proactive solution was needed to help keep people safe, with real-time information to adequately address violent threats and prevent mass shooting tragedies,” said Dustin Brooks, Vice President of Education at ZeroEyes. Dustin adds, “KUSD focuses on providing a safe and productive learning environment to its students and faculty, and we’re honored to provide a 24/7 solution that supports their goals.”
As a multi-faceted community with several buildings, public safety services, healthcare facilities, schools, childcare, barracks, a commissary and a visitor’s center, a typical U.S. Military base is a city in itself. Beyond the protection of armed forces personnel, the base is responsible for the safety of many civilians and civil servants. With such high standards and complex needs, U.S Military bases recognize the need for intelligent security systems that enable proactive monitoring, provide fast and smart forensics and comply with NDAA Section 889. Challenges faced by the US Military Base Inadequate situational awareness - The size and diversity of the military base pose a challenge. Past security measures led to gaps in coverage, leaving the base vulnerable to both internal and external threats. In addition, the COVID-19 pandemic created the need for increased situational awareness. Without a real-time and dynamic understanding of the environment, it became increasingly difficult to enforce preventative measures to control and mitigate the risk of transmission. Slow incident response time - Speed is critical. Within the confines of the military base, the consequences of slow incident response time can be devastating and even sometimes deadly. The longer it takes for the Security Operation Center (SOC) to gather, understand, and analyze the details of the incident, the greater the threat becomes. It became clear that responding to an Active Shooter, vehicle breach, or an assault, required immediate action that wasn’t available through their existing technology. Limited real-time analytic capabilities - The base wanted to prevent incidents from occurring rather than reacting after an incident has occurred. The traditional method of receiving an emergency call and responding after the fact was too costly. The US Base needed a platform that would provide the security team with automation notifications and alerts based on anomalies and rule-violations that were captured on video. NDAA-889 compliance - All military bases must meet the NDAA-889 compliance which states that the U.S. Government has banned specific telecommunications and video surveillance equipment utilising chips manufactured in China. Government contractors must help agencies remove/ replace banned equipment by Aug 12, 2021. Why Ava? One U.S. Military Base recently turned to Ava for an end-to-end intelligent security solution that would meet its full range of needs. Their requirements were a platform that was: Proactive - When there is a need to respond to a threat, the response needed to be immediate. Precise - On a base of this size, it was critical to pinpoint the exact location and nature of a security event in seconds - not hours or days. Simple - The system needed be straightforward to implement, manage and use within the existing infrastructure and cameras. Ease of use saves time and lives. Scalable - The system needed to be able to scale to thousands of cameras. Protecting military personnel and staff at the base Using Ava, operators can add maps of all the US Military Bases’ locations to gain situational awareness and insights Ava understood that the ability to protect military personnel and civilians that run the US Military Base is of utmost importance with even seconds being critical. Ava’s wicked-fast and smart forensic searches and powerful analytics transform the manually intensive examination of massive surveillance footage into accurate and useful results within mere minutes. Security operators are using powerful appearance, event, or image search functions to narrow down and track people or objects of interest. Using Ava, security operators can add maps of all the US Military Bases’ locations to gain situational awareness and insights. Each map can be configured and includes camera views, alarm views, as well as the ability to track people and objects as they move around the campus. Only Ava could meet their challenges by providing: Advanced Situational Awareness: Powered by Ava’s Smart Presence, the company’s use of AI and machine learning allows security personnel and operators to detect anything unusual at any time. Ava Aware VMS understands perimeters and behaviours, identifies, classifies, and tracks people of interest, vehicles, or other objects to send alerts before threats escalate. Operators now receive immediate alerts on unidentified loud noises including the exact source of the sound through microphones. The US Military Base’s security teams are now able to stop threatening actions, before there is damage to property or people. Rapid Incident Response: Powered by Ava’s Spotlight, video streams change dynamically to bring only the relevant feeds to the attention of the operator. Real-time alerts and notifications show up on the video wall to describe the incident, the time, and place it occurred. Using Ava’s Smart Search, the base is able to search by event and similarity to perform appearance and image detection powered by machine learning capabilities to comb through countless hours of video within seconds. Real-time Analytics: Ava provided the US Military Base with threat detection and notifications in real-time and uses intelligent algorithms and self-learning to detect abnormal behavior. The platform will alert the base’s security operators in real-time. It will intelligently highlight what’s relevant from all of the US Base’s cameras, in real-time, all the time. NDAA Compliant - Ava’s video hardware is TAA (Trade Agreement Act) Compliant, enabling any base to be fully NDAA 889 compliant. Ava’s solution provided operational efficiencies, such as: Seamless integration with existing cameras - Whether a military base is replacing all or some of their cameras, Ava Aware VMS easily integrates into and enhances existing cameras with the same AI capabilities. Now, existing ONVIF cameras are enhanced with analytics such as object detection, people and vehicle count, similarity based searching and more. By linking all existing cameras into a larger, AI-based video analytic platform, the base can leverage these powerful analytics across ‘all the cameras, all the time’. Access Control Integration - Ava’s solution easily integrates into access control, remote monitoring, and existing infrastructure. Monitoring the entire military base can be done as part of a single video management system. Scalable - The platform can easily be clustered to meet the growing needs of a base, from hundreds to thousands of cameras. Deployment simplicity - Ava’s system is designed for overall simplicity and readiness for deployment. With security cameras that were ready to go, fully loaded with out-of-the-box Ava Aware software, the base could easily replace cameras in a phased implementation, minimizing installation time and eliminating downtime. Ava’s simplified licensing/pricing model further simplified deployment. Plug and play configuration Plug and play configuration removes the need for user names and passwords The same simplicity extends to maintaining scalable management within a base’s group configuration policies. Plug and play configuration removes the need for user names and passwords, pre-configuration steps, and default settings. And finally, the base chose the Ava system for its general ease of use. Security operators now have access to detailed camera information, activity logs, and advanced video adjustments in a single, user-friendly screen view. Set up for success with intelligent video security The US Military Base is now set up for success with an end-to-end intelligent video security system that will scale with their needs. Highlights include: Camera installation, which will put the base into full compliance with NDAA-889. The US Military Base now has the highest level of security, to protect against the vulnerabilities of the connected world. The equipment has end-to-end encryption, factory-installed certificates, and records detailed audit trails of both operators and administrators to assist with any other compliance requirements. Security operators have gone from having ‘data overload’ to easily and quickly accessing ‘actionable insights’ to drive more confident and proactive security decisions. By leveraging powerful analytics, the base’s operators are able to respond in real-time and investigate incidents faster and with fewer resources. Operators are able to act on the system’s identification of objects, events, anomalies, and similarities that detect issues as they unfold. Furthermore, operators also have full occupancy insight to manage the flow of people and traffic across the base, in support of COVID-19 rules and regulations. Ava Smart Presence includes a people and vehicle counter to track objects in real-time, allowing for historical analysis and reporting. Configurable maps of all locations provide instant situational awareness and insights. The US Military Base seamlessly integrated the new system with existing access controls and non-banned cameras to cost-effectively meet the mandate and fully leverage analytics across the entire security system. Security teams at the base can trust in a powerful security solution that doesn’t inadvertently contain technology that poses a new threat. Whether enhancing existing cameras with advanced video analytics, replacing the entire video security system to meet the NDAA mandate, or creating a solution from scratch, the U.S. Military and supporting agencies can benefit from Ava’s secure cameras and leverage Ava’s powerful analytics for the highest levels of proactive security.
Genetec Inc., a globally renowned technology provider of unified security, public safety, operations, and business intelligence solutions, has announced that City Council District E in New Orleans has taken an innovative approach to address illegal dumping using Security Center, the unified security platform from Genetec. Countering illegal dumping menace Illegal dumping is a problem in most cities around the world, but enforcing laws to prevent it can be quite difficult and resource-intensive. To catch culprits in the act, law enforcement and other city staff have to physically watch known sites and wait to spot illegal dumping activity. Most city officials know that's an impossible task, as officers can't be everywhere all the time, and offenders take full advantage of that reality. New Orleans’ RTCC and Sanitation Department has begun installing a network of cameras at known dumping sites In response, New Orleans City Council District E Councilwoman, Cyndi Nguyen, has taken a hands-on approach tackling illegal dumping head-on as a part of a larger push toward revitalising the community she serves. Nguyen’s team, working in partnership with New Orleans’ Real Time Crime Center (RTCC) and Sanitation Department has begun installing a network of cameras at known dumping sites. All cameras are portable so they can be moved to new dumping hotspots as needed. Genetec security technology platform deployed “This security technology from Genetec certainly helps re-enforce the message I’m putting out there, that we can and will enforce illegal dumping offenses in District E. We also have this great partnership with the Sanitation Department, our local Police Department, and the RTCC, and that’s extending out into our community as well,” said New Orleans City Councilwoman, Cyndi Nguyen. She adds, “I am working hard to get more residents and businesses involved in supporting these initiatives, because keeping our city safe and clean is a shared responsibility.” Real Time Crime Center (RTCC) The Real Time Crime Center (RTCC) already uses Security Center to manage its citywide public safety improvement initiatives. To help monitor illegal dumping activities, the Crime Center’s IT department also set up an event-to-action rule in the Security Center platform to processes motion detection in a defined zone of the camera’s field of view. As soon as motion is detected, the security system bookmarks it and notifies IT staff As soon as motion is detected, the security system bookmarks it and notifies IT staff so that they can evaluate the situation and determine if collection of the debris is warranted. The system also takes a snapshot of the video and emails it to designated personnel on the team, so as to enable them to identify and investigate any potential dumping perpetrators, and take appropriate action. Crime detection with video evidence In an example of a recent case, this event-to-action led to the arrest of a repeat offender who had previously been convicted and sentenced for dumping 14,000 tires. All snapshots and video evidence were securely shared with the New Orleans Police Department so as to enable them to quickly identify the perpetrator, apprehend him and complete their investigation. “Without this technology, finding these offenders comes down to chance or it could take a police officer hours and hours of investigative work. Instead, it took us minutes to set up the event-to-action in Security Center, and just about two days from the time we were notified about this offender to the time we were able to apprehend him,” said Bill Wood, IT Supervisor at New Orleans’ Real Time Crime Center (RTCC). Bill adds, “We love working with the Genetec Security Center security platform. It’s very user friendly and helps us cut down that investigation time exponentially.”
10 Step Guide to Staying Ahead of Emerging Security ThreatsDownload
2021 Trends in Video SurveillanceDownload
Exploring New Vertical Markets for Professional Security SystemsDownload
Capture New Opportunities With Computer Vision And Video AnalyticsDownload