Johnson Controls will showcase solutions and thought leadership critical to safe building reopening during the virtual Global Security Exchange Plus (GSX+) conference. From Sept. 21 to Sept. 25, 2020, Johnson Controls experts will demonstrate and discuss the latest security innovations that have become integral to intelligent security during the COVID-19 crisis and beyond. Attendees can interact with Johnson Controls leaders during keynote event sessions, technology demos and a thought leader interview to discover the future of safe, healthy and innovative buildings. Global Security Exchange Plus (GSX+) Our experts are excited to share how data-driven digital solutions help them create more intelligent buildings" “The industry leaders who are attending GSX+ are currently faced with not only reacting to the COVID-19 crisis, but also continuing to innovate for a smarter future,” said John Hudson, Vice President and General Manager of Security at Johnson Controls. John adds, “Our experts are excited to share how data-driven digital solutions allow them to do both, protect occupants during a pandemic and create more intelligent buildings. From infection control to employee screening, this technology provides the flexibility they need to create safer, more resilient environments, no matter what.” Digital security solutions on display Johnson Controls experts will be at the virtual marketplace throughout the conference, showcasing digital security solutions that better protect occupants and employees while streamlining daily operations, including: OpenBlue: It is an open digital platform that transforms how occupants interact with their buildings. This comprehensive suite of solutions and services creates dynamic and intelligent spaces. Leveraging AI and data-powered capabilities, OpenBlue accelerates building reopening by maximizing the health and safety of environments through a connected combination of hardware and software. OpenBlue includes solutions to re-enter, reoccupy and reimagine, including contact tracing, social distancing monitoring, thermal cameras, infection control, clean air solutions and more. Smart Elevated Skin Temperature Scanning Solution: Leveraging Tyco Illustra Pro thermal cameras, this contactless and frictionless solution rapidly scans groups of individuals for elevated body temperatures quickly, accurately and reliably. Advanced technology instantly alerts users to an elevated temperature, enabling them to leverage thermal imaging to identify the individual for a swift staff response. This thermal solution can be integrated with additional security systems such as access control and video management systems. Emergency Preparedness and Response: From gunshot and weapons detection, to mass notification systems (MNS), to AI analysis, Johnson Controls emergency preparedness and response portfolio ensures buildings can be safeguarded from the unexpected and help deliver successful emergency outcomes. Insights on biggest security themes and trends As a GSX+ sponsor, Johnson Controls thought leaders will participate and host sessions throughout the conference, to provide insight on the biggest security themes and trends of 2020 and beyond: Thought Leader Interviews, including: Digital Security and Open Blue, presented by Mike Ellis, Executive Vice President, Chief Customer and Digital Officer, Johnson Controls. Tuesday, Sept. 22, 11:30 – 11:50 a.m. EDT. Cyber and Physical Security, presented by Jason Christman, Vice President, Chief Product Security Officer, Johnson Controls. Wednesday, Sept. 23, 11:30 – 11:50 a.m. EDT. Gamer Changer session, HR and Travel Security Issues After COVID-19 Lockdowns, hosted by Hank Monaco, Vice President, Marketing, Johnson Controls, Building Solutions for North America. Tuesday, Sept. 22, 10:15 – 11:05 a.m. EDT. Featuring: Eduard Emde, Head of the health, safety and security section ESA/ESTEC at ESA European Space Agency, ESTEC Radek Havlis, Director CEE and Central Asia at PricewaterhouseCoopers Geert Coremans, Director, corporate safety & security at The Radisson Hotel Group Nicole McDargh, regional security and H&S director at Richemont Product demos, including: Thermal Cameras and Access Control Frictional Solutions, which will be hosted by Jason Ouellette, ACVS technology, Business Development, Global and George Grammer, Strategic Product Manager, access control and integrated systems, Johnson Controls. Wednesday, Sept. 23, 1:30 p.m. EDT. Emergency Preparedness and Response, hosted by Alka Khungar, Senior Portfolio Manager, Johnson Controls Building Solutions. Tuesday, Sept. 22, 11:30 a.m. EDT. Making buildings more secure and intelligent “Our experts have years of experience reimagining buildings to be more secure and intelligent,” said Hank Monaco, Vice President of marketing at Johnson Controls, Building Solutions North America. Hank adds, “Now, we are leveraging that experience to create environments that can not only safely reopen, but also remain resilient for years to come. Our team is excited to share our vision of this future at GSX+, and the solutions that will help us get there. We are more committed than ever to powering our customers’ missions for a safe and healthy world.”
Cyan Forensics is announcing a new partnership with Susteen. This partnership joins together Cyan Forensics scanning technology software with Susteen’s DataPilot DP10 platform, creating a triage capability for smartphones, meaning that police forces will be able to scan portable devices for illicit materials, such as child sexual abuse, swiftly and accurately. Evidence collection Partnership will allow investigators to use Cyan Forensics’ scanning technology with Datapilot DP10 to scan smartphones in the field faster than ever before Susteen’s Datapilot DP10 device is used extensively for evidence collection by police forces and governments around the world Cyan Forensics’ rapid triage technology is currently used by UK and European police to scan computers and hard drives for child abuse and terrorist content in minutes Cyan Forensics’ existing solution for laptop and hard drives is already used by the Home Office and counter terrorism policing in the UK Police and counter terrorism officials will now be able to scan smartphones quickly in the field to combat child sex abuse images and extremist material Importance of the investigation As 78% of adults use smartphones, new mobile capability will help UK and international law enforcement keep up with the overwhelming number of devices. In 2019 alone, there were over 3.2 billion smartphone users globally, creating an uphill battle for police forces Policing is experiencing a huge increase in the number of smartphones being examined for evidence. Online sex abuse of children in the European Union has increased during the COVID-19 pandemic, according to Europol
IDEMIA, the globally renowned provider of Augmented Identity and Identity Management solutions, has announced the appointment of Andrew Boyd to the position of President and Chief Executive Officer (CEO) for IDEMIA National Security Solutions. Andrew Boyd will be responsible for the over-all strategic growth and leadership of the team, delivering state-of-the-art technology solutions that support national defense, national security, and the classified missions’ space. Security and Intelligence expert Boyd joins IDEMIA with more than twenty-five years of military and industry experience Boyd joins IDEMIA with more than twenty-five years of military and industry experience in the creation of mission critical solutions within the United States Federal Government and commercial markets. Most recently, Boyd was Senior Vice President (SVP) of Defense and Intelligence for SAIC, where he led growth strategies for its IT modernization and digital transformation business unit. Prior to SAIC, Andrew served in leadership roles in the United States Air Force, Unisys Federal, Engility, Northrop Grumman and a number of other innovative small businesses. He was responsible for creating a wide range of IT Service and Product offerings across Intelligence, Defense and Federal Civilian Agencies. Extensive experience in Federal and Defense space “Andrew brings a wealth of knowledge and expertise to IDEMIA with a proven track-record of generating significant growth and profit throughout his career,” said Edward Casey, Chief Executive Officer (CEO) at IDEMIA Identity & Security North America. Edward adds, “His unique experience working in both the Federal and Defense space make him an ideal candidate to lead this critical area of our business. Andrew will be a valuable addition to the IDEMIA team, and I look forward to supporting Andrew as he takes on this new role.”
General Dynamics Mission Systems and Dedrone, the globally renowned company in airspace security and defense, has announced their strategic counter-drone partnership, providing General Dynamics' global network with access to Dedrone's complete drone detection and defeat technology. Counter-unmanned aerial systems As part of this strategic agreement, General Dynamics Mission Systems becomes a value-added reseller for Dedrone's counter-unmanned aerial system (C-UAS) capabilities and has made a significant equity investment in Dedrone. General Dynamics will exclusively supply Dedrone's counter-drone technology to their global defense, civil government, intelligence, and critical infrastructure customers. Counter-drone technology deployment We're excited to partner with Dedrone to provide counter-drone capabilities to our global customer base" "The intrusion of private and restricted airspace by unmanned aerial systems is one of the fastest-growing threats facing our customers, and Dedrone's counter UAS technology platform is the market-renowned solution to defeat those threats," said Chris Brady, President of General Dynamics Mission Systems and a newly appointed member of Dedrone's Advisory Board. Chris adds, "We're excited to partner with Dedrone to provide counter-drone capabilities to our global customer base." C-UAS detection technology In the counter-drone technology market, Dedrone's exclusive focus on C-UAS detection technology and counter-drone defense have enabled them to become an industry-renowned company with the rare distinction of having production systems fielded and in operational use worldwide. The Dedrone C-UAS technology portfolio combines machine-learning software with advanced hardware sensors, electronic attack methods such as smart jamming, and defeat weapons to provide early warning, classification of, and mitigation against drone threats. Mission-critical airspace security systems Dedrone's capabilities are used by hundreds of customers globally, including the U.S. military, allied and coalition forces, correctional facilities, airports, utilities, and corporations, as well as other public and private organizations. "Dedrone is thrilled to be partnering with General Dynamics Mission Systems, a globally renowned company in building smarter mission-critical products and systems," shares Aaditya Devarakonda, CEO of Dedrone. He adds, "With General Dynamics, Dedrone's technology will reach a broad, global customer base, opening opportunities to provide mission-critical airspace security systems to customers both in the U.S. federal and defense sectors, as well as their global critical enterprise security customers."
Safety and security have always been primary concerns for those running large events and gatherings, such as at concert venues or soccer stadiums. However, the Manchester Arena attack of 2017 highlighted that more should be done to protect those visiting these locations. This is the standpoint taken by Figen Murray, the mother of Martyn Hett – one of the 22 victims of the devastating attack. She has been campaigning for the introduction of stronger counter-terror security measures at public venues and has succeeded in gaining government backing for ‘Martyn’s Law’. According to the Home Office, the law would require venues to consider the risk of an attack and take “proportionate and reasonable measures” to protect those in attendance. Murray’s proposal would see increased physical security, such as airport-style metal detectors and scanners, become mandatory for major venues that draw large crowds, as well as training, incident response plans and exercises for staff. The law would seek to tackle the inconsistent nature of security practices currently seen at venues, and bring holistic counter-terror practices to the fore. Introducing airport-style security measures at concert venues isn’t a fix-all solution However, introducing airport-style security measures at concert venues isn’t a fix-all solution. The ecosystem of these locations must be considered and responded to accordingly. Adding extra checkpoints in areas with a high flow of people will not only result in additional queues and disgruntled visitors, but may have more disastrous consequences as large crowds are typically the target of terror attacks. Disruptive security measures may move the mass of people from inside the venue, where people will have had to pass through some form of security – if only just a bag check – to outside the venue, where there are typically no security measures in place. Disrupting threats with enhanced security So, what can be done to enhance the protection of those attending these locations? Investment into technology that can provide an additional layer of security without being intrusive is key, and facial recognition is one such tool. Security teams can use this innovative technology to scan crowds or queues for a sighting of a person of interest, whose biometric data is included on a watch list of known individuals. As well as providing an additional layer of protection, this tool can provide peace of mind for security teams who can monitor those who have not yet entered the venue or are waiting outside. When the facial recognition system identifies a potential match, staff must be prepared to act – as the system will never make the final decision over a person’s fate. They can analyze the picture from the watch list with the video of the individual identified, decide whether the detection was accurate and then interact directly with the person of interest. The level of contact may be as simple as asking for proof of identity and if adequately able to verify who the person is, no further action is needed and any biometric data is removed. Alternatively, it could lead to the acquisition of a known criminal, providing valuable intelligence of any immediate threat. When the facial recognition system identifies a potential match, staff must be prepared to act The real benefit of facial recognition is that response can be proactive as well as reactive, whether it be from fixed surveillance cameras or mobile devices such as body worn cameras. Devices capable of live streaming coupled with analytics such as facial recognition, offer an invaluable surveillance tool, allowing security teams and first responders to react quickly and more effectively to an unfolding situation, all in real-time. Control centre staff are still vital in this circumstance, but are able to work with heightened situational awareness thanks to the live streaming aspect. It allows them to more accurately assess a situation and therefore make decisions based on all of the information at hand, with outcomes that will be far more effective. For example, the information relayed to the emergency services will be more exact in terms of what happened, where and who was involved – rather than being based on fragmented eyewitness accounts. Planning ahead Even though it isn’t yet official, Martyn’s Law is already making waves in the industry – with Manchester City Council pledging to adopt the law early and the security minister, home secretary and prime minister all “100% behind” the proposal. Despite its early stages, operators of concert venues and stadia must start forward planning and enhancing security measures ahead of the government beginning to consult on the law in the spring. Only time will tell what the full legislation will entail, but we can all agree that action is necessary. In order to be as effective as possible, the law should not only mandate metal detectors and bag searches, but technology such as facial recognition and body worn cameras that can work to enhance these other measures and elevate the human response.
Insider threat programs started with counter-espionage cases in the government. Today, insider threat programs have become a more common practice in all industries, as companies understand the risks associated with not having one. To build a program, you must first understand what an insider threat is. An insider threat is an employee, contractor, visitor or other insider who have been granted physical or logical access to a company that can cause extensive damage. Damage ranges from emotional or physical injury, to personnel, financial and reputational loss to data loss/manipulation or destruction of assets. Financial and confidential information While malicious insiders only make up 22% of the threats, they have the most impact on an organization Most threats are derived from the accidental insider. For example, it’s the person who is working on a competitive sales pitch on an airplane and is plugging in financial and confidential information. They are working hard, yet their company’s information is exposed to everyone around them. Another type of insider, the compromised insider, is the person who accidentally downloaded malware when clicking on a fake, urgent email, exposing their information. Malicious insiders cause the greatest concerns. These are the rogue employees who may feel threatened. They may turn violent or take action to damage the company. Or you have the criminal actor employees who are truly malicious and have been hired or bribed by another company to gather intel. Their goal is to gather data and assets to cause damage for a specific purpose. While malicious insiders only make up 22% of the threats, they have the most impact on an organization. They can cause brand and financial damage, along with physical and mental damage. Insider threat program Once you determine you need an insider threat program, you need to build a business case and support it with requirements. Depending on your industry, you can start with regulatory requirements such as HIPAA, NERC CIP, PCI, etc. Talk to your regulator and get their input. Everyone needs to be onboard, understand the intricacies of enacting a program Next, get a top to bottom risk assessment to learn your organization’s risks. A risk assessment will help you prioritize your risks and provide recommendations about what you need to include in your program. Begin by meeting with senior leadership, including your CEO to discuss expectations. Creating an insider threat program will change the company culture, and the CEO must understand the gravity of his/her decision before moving forward. Everyone needs to be onboard, understand the intricacies of enacting a program and support it before its implemented. Determining the level of monitoring The size and complexity of your company will determine the type of program needed. One size does not fit all. It will determine what technologies are required and how much personnel is needed to execute the program. The company must determine what level of monitoring is needed to meet their goals. After the leadership team decides, form a steering committee that includes someone from legal, HR and IT. Other departments can join as necessary. This team sets up the structure, lays out the plan, determines the budget and what type of technologies are needed. For small companies, the best value is education. Educate your employees about the program, build the culture and promote awareness. Teach employees about the behaviors you are looking for and how to report them. Behavioral analysis software Every company is different and you need to determine what will gain employee support The steering committee will need to decide what is out of scope. Every company is different and you need to determine what will gain employee support. The tools put in place cannot monitor employee productivity (web surfing). That is out of scope and will disrupt the company culture. What technology does your organization need to detect insider threats? Organizations need software solutions that monitor, aggregate and analyze data to identify potential threats. Behavioral analysis software looks at patterns of behavior and identifies anomalies. Use business intelligence/data analytics solutions to solve this challenge. This solution learns the normal behavior of people and notifies security staff when behavior changes. This is done by setting a set risk score. Once the score crosses a determined threshold, an alert is triggered. Case and incident management tools Predictive analytics technology reviews behaviors and identifies sensitive areas of companies (pharmacies, server rooms) or files (HR, finance, development). If it sees anomalous behavior, it can predict behaviours. It can determine if someone is going to take data. It helps companies take steps to get ahead of bad behavior. If an employee sends hostile emails, they are picked up and an alert is triggered User sentiment detection software can work in real time. If an employee sends hostile emails, they are picked up and an alert is triggered. The SOC and HR are notified and security dispatched. Depending on how a company has this process set-up, it could potentially save lives. Now that your organization has all this data, how do you pull it together? Case and incident management tools can pool data points and create threat dashboards. Cyber detection system with access control An integrated security system is recommended to be successful. It will eliminate bubbles and share data to see real-time patterns. If HR, security and compliance departments are doing investigations, they can consolidate systems into the same tool to have better data aggregation. Companies can link their IT/cyber detection system with access control. Deploying a true, integrated, open system provides a better insider threat program. Big companies should invest in trained counterintelligence investigators to operate the program. They can help identify the sensitive areas, identify who the people are that have the most access to them, or are in a position to do the greatest amount of harm to the company and who to put mitigation plans around to protect them. They also run the investigations. Potential risky behavior Using the right technology along with thorough processes will result in a successful program You need to detect which individuals are interacting with information systems that pose the greatest potential risk. You need to rapidly and thoroughly understand the user’s potential risky behavior and the context around it. Context is important. You need to decide what to investigate and make it clear to employees. Otherwise you will create a negative culture at your company. Develop a security-aware culture. Involve the crowd. Get an app so if someone sees something they can say something. IT should not run the insider threat program. IT is the most privileged department in an organization. If something goes wrong with an IT person, they have the most ability to do harm and cover their tracks. They need to be an important partner, but don’t let them have ownership and don’t let their administrators have access. Educating your employees and creating a positive culture around an insider threat program takes time and patience. Using the right technology along with thorough processes will result in a successful program. It’s okay to start small and build.
Global and domestic threats have highlighted the need for tighter security across all verticals. One of the technologies that has redefined situational awareness and intrusion detection is thermal imaging. Once a technology exclusively manufactured for the military operations, thermal cameras today are deployed across hundreds of security applications and continue to see strong demand in existing and emerging commercial markets. With thermal technology, security personnel can see in complete darkness as well as in light fog, smoke and rain Technology Overview And Early Adoption What distinguishes thermal cameras from optical sensors is their ability to produce images based on infrared energy, or heat, rather than light. By measuring the heat signatures of all objects and capturing minute differences between them, thermal cameras produce clear, sharp video despite unfavorable environmental conditions. With thermal technology, security personnel can see in complete darkness as well as in light fog, smoke and rain. Originally a military developed, commercially qualified technology, the first thermal cameras for military and aircraft use appeared in the 1950s. By the 1960s, the technology had been declassified and the first thermal camera for commercial use was introduced. However, it wasn’t until the late 1990s - when FLIR Systems introduced a camera with an uncooled thermal detector - when the technology began to see substantial adoption beyond government defense deployments. Installations At Critical Infrastructure Sites In the 2000s, industrial companies were some of the first adopters of thermal, using the technology for predictive maintenance to monitor overheating and machine malfunctions. In the years following the September 11 terrorist attacks in 2001, there was an increase in thermal camera installations across critical infrastructure sites. Stricter security requirements drove the deployment of thermal cameras for perimeter protection, especially in the nuclear power sector. Thermal cameras produce clear video in daylight, low light or no light scenarios and their sharp images result in higher performing analytics In 2010, the U.S. Nuclear Regulatory Committee released its 73.55 policy, which states nuclear facilities must “provide continuous surveillance, observation and monitoring” as a means to enhance threat detection and deterrence efforts onsite. Because thermal cameras produce clear video in daylight, low light or no light scenarios and because their sharp images result in higher performing analytics, thermal cameras quickly became the preferred option for nuclear facilities. Likewise, following the 2013 sniper attack on PG&E Corporation’s Metcalf transmission substation, the Federal Energy Regulation Commission introduced the Critical Infrastructure Protection Standard 014 (CIP-014). The policy requires utilities to identify threats to mission critical assets and implement a security system to mitigate those risks. This statute also led to more thermal installations in the utility sector as thermal cameras’ long-range capabilities are ideal for detection of approaching targets beyond the fence line. The demand from both industrial and critical infrastructure entities, as well as other factors, helped drive volume production and price reduction for thermal, making the technology more accessible to the commercial security marketplace. Commercial Applications In recent years, the increasing affordability of thermal cameras along with the introduction of new thermal offerings has opened the door to new commercial applications for the technology. In the past, thermal cameras were designed for applications with enormous perimeters, where the camera needed to detect a human from 700 meters away. Locations like car dealerships, marinas and construction supply facilities can be protected by precise target detection, thermal analytic cameras providing an early warning to security personnel Today, there are thermal cameras specifically designed for short- to mid-range applications. Developed for small to medium enterprises, these thermal cameras ensure property size and security funds are no longer barriers to adoption. Lumber yards, recreation fields and sports arenas are some of the commercial applications now able to implement thermal cameras for 24-hour monitoring and intrusion detection. Affordable thermal cameras with onboard analytics have become attractive options for commercial businesses Innovation And Advancements Innovation and advancements in the core technology have also spurred growth in thermal camera deployment, providing faster image processing, higher resolution, greater video analytic capabilities and better camera performance. In particular, affordable thermal cameras with onboard analytics have become attractive options for commercial businesses that need outdoor, wide area protection. Car dealerships, marinas and construction supply locations all store valuable merchandise and materials outside. Without protection, these assets are vulnerable to vandalism and theft. However, by providing precise target detection, thermal analytic cameras provide an early warning to security personnel so that they can intervene before a crime is committed. By helping to deter just one incident, the thermal solution delivers a clear ROI. New Market Opportunities Not only are there more thermal cameras in use today than ever before, but there are also more thermal sensors being integrated with other multi-sensor systems, driving the adoption of thermal in new markets. For large perimeter surveillance applications, thermal is repeatedly being integrated with radar and drones to expand situational awareness beyond the point of fixed cameras. Users get immediate, accurate alerts of approaching targets and evidentiary class video for target assessment In the commercial market, thermal imagers are combined with optical sensors, analytics and LED illuminators into one solution that integrates with central monitoring station platforms. By bringing these technologies together, users get immediate, accurate alerts of approaching targets and evidentiary class video for target assessment. The result is a lower number of false positives, reducing the total cost of ownership for the solution. These multi-sensor solutions also feature two-way audio capabilities, which enable remote security officers to act as “virtual guards” and speak to intruders in real-time to dissuade them from illegal activity. The introduction of solutions that integrate all these state-of-the-art technologies under one unit reduces the amount of capital and infrastructure needed for deployment. Consequently, more small businesses and alarm monitoring companies can implement advanced perimeter security technologies like thermal sensors, some for the very first time. Thermal cameras have gone from military defense devices to widespread commercial security cameras Multi-Sensor Thermal Solutions Multi-sensor solutions featuring thermal are quickly gaining traction and opening the door to new business opportunities for the security channel. One of the primary reasons for the strong market interest in these systems is they enable integrators to increase their recurring monthly revenue (RMR). With intense price competition and eroding margins on CCTV equipment, integrators have to rely on RMR to grow their businesses. Offering remote video monitoring services and virtual guarding technologies is one of the best ways to do so. Additionally, there is a clear demand for it. Central stations are continually looking for new technologies to offer their customers and businesses are interested in economical alternatives to physical guards. In conclusion, thermal cameras have gone from military defense devices to widespread commercial security cameras that are a substantial segment of the outdoor security protection market. From nuclear power plants to construction locations, thermal technology is being implemented to secure sites around the globe.
Security’s intersection with consumer electronics is on view at CES 2020, the world’s largest technology event, Jan. 7-10 in Las Vegas. The giant show features more than 170,000 attendees, 4,500 exhibitors and 1,100 industry thought-leaders featured on the CES stage. A range of technologies will be on display, from artificial intelligence (AI) to 5G, vehicle technology to AR/VR (augmented and virtual reality), robotics to home automation. Security plays a prominent role, too.The impact of this event for the smart home could be about delivering home analytics and enhancing privacy" Smart home market on the forefront The smart home market is a major focus. “For the smart home market at CES this year, we expect to see numerous announcements regarding home awareness,” says Blake Kozak, Senior Principal Analyst at IHS Markit. “This will include brands offering up additional analytics for consumer security cameras with a focus on edge-based solutions.” “The impact of this [event] for the smart home could be about delivering home analytics and enhancing privacy through cloudless architectures and new electronic door lock approaches,” he adds. An example of cloud analytics is the Resideo Home app, introduced in December, which will make whole-home monitoring possible for four critical networks of the home – water, air, energy and security. Resideo promises a “simplified and integrated smart home experience.” Video is also prominent at the show. “For cameras, we can expect to see more cameras focused on the outdoor space and possibly new form factors for video doorbells,” says Kozak. Familiar security industry brands exhibiting at CES 2020 include ADT, Ring, August Home and Yale (both part of ASSA ABLOY), Bosch and Alarm.com. Focus on Cybersecurity In 2020, companies will continue to focus on solutions for protecting consumer data" Cybersecurity is an aspect of many of the devices on display at CES. “Device security and data privacy play a key role in the adoption of connected devices,” says Elizabeth Parks, President, Parks Associates. “Consumer security concerns for smart home products will continue to be a barrier to adoption in the U.S. and Europe, and these concerns can actually intensify with device adoption-71% of U.S. smart home households are concerned about cybersecurity. In 2020, companies will continue to focus on solutions for protecting consumer data. One big area of interest is protection on the network router, providing whole home solutions, which are very appealing to consumers.” “At CES we will see the traditional players introducing new DIY (do-it-yourself) products, as well as new players announcing new product features, services, and partnerships,” Parks adds. Smart access control Smart locks will be among the security products at CES 2020. For example, PassiveBolt, a lock company, will show the Shepherd Lock, a touch-enabled smart lock with enhanced security through sensors and AI. The add-on lock converts existing locksets into touch-activated devices. Another lock manufacturer is Kwikset, whose door locks and door hardware include Wi-Fi-enabled smart locks, Bluetooth-enabled smart locks, keyless and keyway-less locks and connected home technology. Video doorbells, including industry-innovator Ring, have been a hit in the consumer market. At CES, Ring will expand the mission to make neighborhoods safer by creating a “Ring of Security” around homes and communities with a suite of home security products and services. The “Neighbors by Ring” app enables affordable, complete, proactive home and neighborhood security. Homeguard offers a range of affordable CCTV solutions for home and small business DIY CCTV demonstrations DIY security systems are another market. Homeguard is a leading DIY consumer brand offering a range of affordable CCTV solutions for home and small business, including wired and wireless CCTV kits, smart cameras, home alarm systems and wire-free HD CCTV kits. Swann Communications is also at the forefront of surveillance and monitoring with new products developments including wire-free HD cameras and doorbells, professional CCTV video surveillance systems, and 1080p full HD systems with “True Detect” heat and motion sensing. AVTECH, and subsidiary YesGo Tech, will demonstrate a compact Wi-Fi home security set, a series of special cameras with face recognition, thermal detection and license plate recognition, customized central management software and a university ID tag that is compatible with access control, OEM and ODM opportunities. Security and automation solutions D-Link’s home networking, security and automation solutions will help consumers connect, view, share, entertain, work and play. SECO-LARM, manufacturer of a Room Occupancy Monitor that shows whether a room is in use, has a line of keypads and proximity readers with built-in Bluetooth for convenient access. Another smart home security solutions provider, Climax Technology, integrates wireless security, home automation, energy management, home emergency monitoring and live visual monitoring. Personal safety mobile application Manufacturers are positioning outdoor cameras as deterrents to theft before a burglary happens" WaryMe designs and develops a personal safety mobile application to improve a user’s security in public places, schools, transports and companies by addressing major risks such as terrorism attacks, intrusion, fire and even industrial accidents. An all-in-one mobile application integrates alerting, crisis management and mass notification features. “Market players are looking to expand beyond established smart home devices like smart thermostats and networked cameras to products like smart water leak detectors, smart pet feeders, and smart air purifiers,” says Elizabeth Parks. “Manufacturers are positioning outdoor cameras as deterrents to theft before a burglary happens. This trend is part of a broader security marketing effort to extend the perimeter of home security beyond traditional home access points.” “Familiarity with smart home devices lags behind familiarity with smart entertainment products; it even lags that of smart speakers, which are quite new in the market,” adds Parks. “In 2020, we will see players working to advance the visibility and marketing around device integration, and specifically focus on use case scenarios around safety, security, and convenience, which have always been the primary drivers of adoption of these types of products.”
The UK Government has been working to reduce the risks associated with illegal drone use since a high-profile incident at UK’s Gatwick Airport in December 2018, when a drone sighting triggered a three-day shutdown of the UK’s second busiest airport, disrupting the travel plans of 140,000 people and affecting 1,000 flights. To address growing security threats by drones, the UK Government has released its ‘Counter-Unmanned Aircraft Strategy’. ‘Counter-Unmanned Aircraft Strategy’ This strategy sets out our approach to countering the threat the malicious or negligent use of drones can bring" “This strategy sets out our approach to countering the threat the malicious or negligent use of drones can bring,” says Brandon Lewis, the U.K. Minister of State for Security. “It will provide the security the public and drone users require to continue to enjoy the benefits of leisure and commercial drone use and facilitate the growth of the drone industry.” “Given the challenge posed by rapid advances in drone technology and the potential threat, the strategy will provide overarching direction to our efforts,” says Lewis. The strategy focuses on ‘small drones’, those weighing less than 20 kg (44 pounds). Countering malicious use of aerial drones The UK Counter-Unmanned Aircraft Strategy centers on mitigating the highest-harm domestic risks resulting from malicious use of aerial drones. They are: Facilitating terrorist attacks, such as modifying commercially-available drones to conduct reconnaissance or attacks. Facilitating crime, especially in prisons, where drones are currently used to deliver contraband. Disrupting critical national infrastructure, such as airports, where a malicious incursion using a drone can have serious safety, security and economic consequences. Potential use by hostile state actors. Maximizing benefits of drone technology The initiative will also look to build strong relationships with industry to ensure high security standards Over the next three years, the strategy will seek to reduce the risks posed by the highest-harm use of drones while maximizing the benefits of drone technology. It will develop a comprehensive understanding of evolving risks and take a “full spectrum” approach to deter, detect and disrupt the misuse of drones. The initiative will also look to build strong relationships with industry to ensure high security standards. Further, promoting access to counter-drone capabilities and effective legislation, training and guidance will empower the police and other operational responders. Tactical response to drone-based threats Because technology is rapidly evolving, the response needs to keep pace, according to the strategy document. Lewis adds, “We will therefore work to understand how drone-based threats might evolve in the future, both at the tactical and strategic levels.” The strategy will be to build an end-to-end approach to tackling the highest-harm criminal use of drones. It will also work to make it easier to identify malicious drone use against a backdrop of increased legitimate use. Legal drone operators will be required to register with the Civil Aviation Authority (CAA) and to pass an online competency test before flying a drone. Retailers who follow a specific set of safety guidelines when selling drones will be designated ‘DroneSafe’. Unmanned traffic management system The government is working toward future implementation of an unmanned traffic management (UTM) system, which provides a means of preventing collisions between unmanned aircraft and other manned or unmanned aircraft. The current strategy includes early planning for the system. An Industry Action Group will ensure a continuing relationship with the drone industry and help to improve existing counter-drone measures and identify new opportunities, such as use of ‘Geo-Fencing’ to restrict drones from flying in certain areas. Regulating commercial and domestic drones The UK Department of Transport is responsible for safe and lawful use of drones within the UK airspace The strategy will seek to communicate the UK’s security requirements to the counter-drone industry and to encourage a thriving sector that is aware of, and responsive to, the needs of government. Regulating drones is the responsibility of two UK government departments. The UK Department of Transport is responsible for safe and lawful use of drones within the UK airspace, while the Home Office has overall responsibility for domestic counter-drone activity. Fast-evolving drone and counter-drone technology Also, the Center for the Protection of National Infrastructure (CPNI) has been involved in reducing the vulnerability of sensitive sites, including airports. New performance measures will track the strategy’s success. Due to the fast-evolving nature of drone and counter-drone technology, the intent is to review and, if necessary, refresh the strategy in three years.
As the deal/no deal prospects of Brexit are tossed in a whirlwind of UK and EU politics, the uncertainty of the back-and-forth has broadly impacted general economic trends, and by extension, the physical security market. The new deadline for a Brexit agreement is October 31, already postponed six months from the scheduled April 12 departure date. Numbers show that Britain’s GDP shrank in the second quarter, possibly reflecting fewer exports because of Brexit uncertainty. And beyond the current indecision lies the long-term impact of a possible change in trading status between the United Kingdom and continental Europe. Other issues include capital flow and labor mobility. Brexit uncertainty leading to security concerns Loss of shared information with the EU will make the UK less safe “Companies … are unclear about their future,” comments Martin Warren of the Institute of Chartered Accountants in England and Wales. “Companies are making decisions now about jobs, supply chains, headquarters and asset locations, incurring significant, and possibly unnecessary, cost and upheaval.” Warren fears the destructive effects of a ‘no deal’ outcome and hopes politicians will break the deadlock and restore business confidence. Security implications of Brexit extend beyond economics. Loss of shared information with the EU will make the UK less safe. Extradition across EU borders will be more difficult, and exchange of data such as fingerprints and vehicle registrations is at risk. The Irish border after Brexit is of particular concern to security professionals. Countering threat of international terrorism Robert Hall of London First and Alison Wakefield of Security Institute say the security impact of departing the EU will be long lasting and profound. “In security terms, the UK will still have to contend with international terrorism, transnational crime and the global movement of people, all challenges that require wide scale cooperation.” They add that leaving the EU will require “a significant investment in people, resources and databases to cope with the anticipated volumes of traffic through ports, airports and tunnels.” Analyst company IHS Markit earlier commented about the impact on the security industry of Brexit’s drag on the UK economy, “Access control, intruder and fire alarm markets typically track construction rates closely and are forecast to be affected most. However, a large cut to infrastructure spending would be just as damaging to the video surveillance market.” UK security companies Prefer ‘soft exit’ from EU If a ‘soft exit’ trade deal is not negotiated, the UK would have to revert to WTO trade rules If a ‘soft exit’ trade deal is not negotiated, the UK would have to revert to World Trade Organization (WTO) trade rules, which means tariffs on trade between the UK and the EU, says IHS Markit. There are five British-based access-control and intruder-alarm vendors supplying the European market in significant quantity – each with revenue exceeding $10 million. IHS Markit estimates these companies combined account for less than 10 percent of total European, Middle-Eastern and African (EMEA) market revenues for both industries. Uncertain future of UK security marketplace Asset protection specialist VPS Security Services has warned that the ongoing Brexit saga will likely lead to a rise in vacant commercial and residential properties as developers and investors are more reluctant to move forward with their UK real estate strategies. Seemingly endless machinations and shifting proposals are making the eventual outcome of Brexit very much a guessing game. Uncertainty translates into a volatile and changing outlook, and the eventual impact on the broader economy is an open question. As a reflection of that economy, the security marketplace will inevitably feel the economic impact, too, not to mention the new security challenges likely to ensue.
For most people, prison ranks high on the list of places to avoid. Yet, take no pride: U.S. prisons are filled to capacity with individuals who have committed some type of crime that warrants incarceration. Prison Policy Initiative In 2018, according to data from the Prison Policy Initiative, there were 1.3 million U.S. adults in prison and 615,000 incarcerated in jails for crimes ranging from murder, manslaughter, illegal drug possession, burglary, theft, driving under the influence, property crimes, and more. In addition to traditional security concerns such as perimeter surveillance, ID card management, visitor and vendor management, crime, and theft, prisons and correctional facilities have unique security challenges that other enterprises typically do not have. Prison security Correctional facilities face regular security audits that are conducted by the National Institute of Corrections The challenges include inmate escapes, hostage situations, gangs, contraband, riots, and overcrowding, in addition to increasing privacy and regulatory mandates. Even more, correctional facilities face regular security audits that are conducted by the National Institute of Corrections. Security teams must always be on guard and watching every individual and action of the inmate population – for an inmate’s physical safety – in addition to their own. It is not uncommon for security staff and correctional officers to receive physical injuries from prisoners, especially when trying to break up an inmate fight or transporting them to other locations. Use of drones in prison smuggling An emerging concern for prison officials is the use of drones by individuals who are looking to smuggle drugs, cellphones, weapons, and other contraband into prisons for use by inmates. Many states are working on anti-drone legislation around correctional institutions. For example, Missouri is one of the most recent US States to have introduced legislation to tackle the problem. Missouri HB 324 would make it illegal for drone pilots to fly an unmanned aircraft near any correctional center, private jail, county jail, municipal jail or mental health hospital. Anyone caught violating the law would be charged with a Class A misdemeanor and possibly other felony charges, depending on the pilot’s illegal intentions. Importance of video surveillance Video surveillance is a necessary security technology for prison and correctional facility staff, as it allows personnel to mitigate those unique security challenges. “Video surveillance is prevalent throughout facilities; even if it’s a typical two-bed jail cell or a 2,000 bed prison,” says Brad Wareham, Director of Key Accounts at Salient Systems. He adds, “In cases where facilities face a shortage of staff members to watch over the inmate population, video surveillance supports the oversight of inmates and increases accountability. Inmates know that despite the lack of staff and officer presence, they are being observed by cameras that can catch even the smallest details. Video surveillance can follow inmates anywhere. There are very few blind spots.” Upgrading to hybrid video surveillance systems They are upgrading to hybrid and/or fully digital solutions, all while maintaining the HMI model Increasingly, prisons and correctional facilities are upgrading their older analog video systems, due to age degradation and lack of adequate support resources. “They are upgrading to hybrid and/or fully digital solutions, all while maintaining the Human Machine Interfaces (HMI) model,” Wareham notes. “They continue to face security challenges typical of the corrections space, such as PLC controllers, RTSP capture, intercoms, lock controls, and more, which are atypical of larger facilities. In addition, many older analog solutions will eventually be cost prohibitive,” Wareham said, adding “and will no longer operate, due to an increasing inability to find replacement parts and to the proliferation of IP-based video surveillance solutions”. IP-based video surveillance systems For many correctional facilities, upgrading a video surveillance system to an IP-based solution, in addition to a video management system (VMS), makes sense and benefits a prison or correctional facility in multiple ways. Solutions exist that allow prison facilities to keep pre-existing hardware in place during an upgrade, while allowing for replacements and component upgrades as funding permits. Specific benefits that advanced video surveillance and VMS solutions can provide a correctional institution include: Increased Coverage – Many prisons and correctional facilities are large, and have multiple areas that need to be under surveillance, such as hallways, throughout cellblocks, healthcare facilities, dining areas, exercise yards, and more. Outdated systems may have a difficult time monitoring all areas, while an IP video system can provide continuous coverage of an entire facility Clarity of Video – Older analog cameras struggle with the ability to provide clear images. New IP cameras, coupled with an advanced VMS, will produce crisp and clear images that are necessary to mitigate security risks. Inmate Tracking – One of the biggest benefit of a VMS solutions is video analytic software, which is capable of tracking a moving target and searching for specific objects. Video analytics can count human beings, monitor queues, and even identify a geographical location. VMS solutions allow security to search video archives quickly and find archived video that matches custom criteria within minutes, which is helpful in investigations. Alerts – Video analytics within a VMS solution can be programmed to detect specific activity and activate an alarm or alert system when the activity occurs. Facial Recognition – The ability to recognize a face is another key benefit of a VMS solution used in a crowded correctional institution, in particular when inmates may be wearing the same type and color of clothing. Perimeters – Video surveillance placement on the exterior perimeter of a facility can document suspicious activity occurring in outside recreational yards where contraband can enter. Many VMS solutions allow for detecting movement throughout specific areas for an established duration of time. Mobility – The ability for correctional officers to view video on a mobile device is critical, given the large landscape of facilities. For example, Salient’s TouchView Mobile solution, combined with its CompleteView 20/20 VMS, allows users to instantly access, monitor and review live and recorded video from any camera connected to any CompleteView 20/20 recording server. Cameras from multiple servers can be accessed simultaneously with PTZ control. The solution’s DRS (dynamic resolution scaling) automatically sizes the video for live viewing, which significantly reduces network usage and provides higher frame rates over mobile connections. Securing prisons and correctional facilities You can’t have a correctional facility without video surveillance and an audit trail for forensic evidence" Overall, Wareham notes, video surveillance and VMS solutions are a necessary and critical solution for securing prisons and correctional facilities. “You can’t have a correctional facility without video surveillance and an audit trail for forensic evidence,” Wareham stated, adding “Facilities with challenging budget constraints are still required to have a functional Video Management System, regardless of the technology or age of their infrastructure.” Salient VMS solution For security integrators, Salient’s VMS solutions provide a steady ROI. “Salient plays a critical role in providing a viable cost per channel ROI that is superior in the VMS industry,” Wareham said. He adds, “As the requirements for third-party encoding hardware is negated, and coupled with our customer support for virtually all aspects of the detention and corrections space, Salient’s VMS solution addresses budget constraints.” For prisons and correctional facilities, an advanced video surveillance and VMS is not just a product, it is a necessity that enables correctional facilities to stay safe and secure. “In the corrections industry, surveillance goes hand in hand with the employee, inmate, and visitor safety, while coupled with procedural compliance and enforcement,” Wareham concluded.
Three more UK police forces have jointly upgraded to Sepura SC20 TETRA radios, significantly improving their front line officers’ ability to communicate with colleagues. Bedfordshire Police, Cambridgeshire Constabulary and Hertfordshire Constabulary made use of their joint purchasing power to equip officers from across all three forces with the new SC20 TETRA radios. In all over 1,900 radios were purchased across the three forces, to work alongside their existing fleet of Sepura radios. SC20 TETRA radios By using the SC20 TETRA radios, officers will benefit from powerful, robust radios with loud, clear audio By using the SC20 TETRA radios, officers will benefit from powerful, robust radios with loud, clear audio, ensuring that critical voice communications can be clearly heard and understood, even in noisy environments. In addition the radios are applications ready, meaning that each force can in time develop bespoke applications to enable quick, secure access to critical data. A key advantage of the Sepura solution is that their radio programming solution Radio Manager can work across different Sepura products, meaning that the transition to new devices is as smooth as possible. Intuitive user interface Andy Gregory, Business Development Director at Sepura said, “After conducting trials, the response from the forces was that the SC20 benefitted from robust design, an intuitive user interface and loud audio, making it ideally suited to the users’ operational needs. The sale is significant to Sepura of course, as Cambridgeshire are Sepura’s ‘home’ force, and many of our staff live in Bedfordshire and Hertfordshire where the new radios are now being deployed.” Gary Maughan, Regional Sales Director for the UK and Ireland at Sepura added, “Sepura radios continue to be chosen by police organizations in the UK and across Europe as the leading TETRA device available on the market today. We are proud to work with our local forces as we do with all UK police forces, ensuring that they are equipped with the best communication solution possible.”
Videalert, one of the UK’s renowned suppliers of intelligent traffic enforcement and management solutions, has supplied Wiltshire Council with a new mobile enforcement vehicle (MEV) which is initially being used to enforce residential permit parking in Salisbury. The vehicle is equipped with a complete suite of Videalert software giving it the ability to be used in future for a wide range of safety-related parking applications including bus stops and the enforcement of keep clears outside schools. The council is also deploying Videalert cameras to enforce two bus gates in Devizes. According to Joanne Pattison, Parking Manager at Wiltshire Council, “Videalert has provided the council with a flexible, hosted solution that will help us to significantly increase the productivity of the whole parking team. It will also enable us to cost effectively extend enforcement to other safety-related applications as required and provide a more efficient service.” Peugeot 108 equipped with ANPR cameras Videalert supplied a Peugeot 108 equipped with two roof-mounted ANPR cameras and two color cameras Videalert supplied a Peugeot 108 equipped with two roof-mounted ANPR cameras and two color cameras to capture contextual video evidence. The ONVIF-compliant cameras accurately capture reflective number plates at distances of up to 40 metres with capture rates of up to 98%. Importantly, this can be achieved with just a single pass at normal road speeds. Used in conjunction with the latest video analytics, the system delivers the highest productivity at the lowest operating cost in any traffic environment. Wiltshire Council is also installing Videalert cameras to enforce bus gates located at two housing developments in Devizes. These locations, situated next to main arterial routes into the market town, have previously been controlled using rising bollards, which have proved to be increasingly unreliable due to water damage. The first cameras have been installed at the Newman Road bus gate and will provide uninterrupted enforcement around the clock while delivering cost savings by eliminating the ongoing maintenance liability of the rising bollards. Hosted digital video platform Images of contraventions are transmitted to Videalert’s hosted digital video platform where evidence packs can be viewed and validated prior to sending to the council’s back office system for the issuance of penalty charge notices (PCN). Videalert’s flexible hosted platform makes it a quick and cost effective process to deploy enforcement as it does not require the installation of any IT at the council’s offices. To reduce the number of appeals, PCN recipients can view still photographs and video footage of the alleged offense over the internet. Tim Daniels, Sales and Marketing Director at Videalert added, “Videalert MEVs have proved to deliver industry-leading capture rates while consistently outperforming vehicles from other suppliers. These multi-purpose MEVs give councils greater flexibility to enforce a wide range of moving traffic and parking contraventions.”
Patriot One, developer of the PATSCAN Multi-Sensor Covert Threat Detection platform, is pleased to announce a collaboration partnership with Los Angeles Football Club (LAFC), part of Major League Soccer (MLS), to pilot its PATSCAN platform at Banc of California Stadium. Threat and intrusion detection “We are excited to announce this PATSCAN pilot deployment project with another U.S. major sport franchise,” said Martin Cronin, Patriot One CEO and president, adding “In the New Year, our installation team will begin work with the Los Angeles Football Club and Banc of California Stadium on this important game safety initiative. MLS fans will enjoy an added layer of security while attending their favorite team’s home games in Southern California”. Martin further said, “Our vision is to not only to create a world safe from acts of violence, but also to help save a way of life people have come to expect in their normal everyday lives, and that includes participating in professional sports and entertainment activities with their fellow fans.” PATSCAN Multi-Sensor Covert Threat Detection The PATSCAN Multi-Sensor Covert Threat Detection platform will ship in January 2020 to the security team at LAFC The PATSCAN Multi-Sensor Covert Threat Detection platform will ship in January 2020 to the security team at Los Angeles Football Club, where they will be joined by Banc of California Stadium security and Patriot One implementation engineers to begin the integration and pilot deployment project. Specific location of the Platform’s deployment will not be disclosed. “Customer safety is our number one priority at Banc of California Stadium,” said LAFC Vice President of Information Technology Christian Lau. “We are excited to work with Patriot One to give customers an extra layer of security while attending events at our world-class venue in the heart of Los Angeles.” Stadium security Following the initial pilot deployment of the PATSCAN platform with LAFC at an undisclosed location within Banc of California Stadium, Patriot One will work with the team and stadium management to broaden deployment throughout the complex.
Round table discussion
The new year is several weeks old, so it is safe to say that many of our New Year resolutions have fallen by the wayside. Despite the limited success of our personal resolutions, the new year is a great time to take stock, look ahead, and plan to make 2020 the best year yet. Thinking about our industry as a whole, we asked this week’s Expert Panel Roundtable: What should be the security industry’s “New Year’s resolution?”
Public spaces provide soft targets and are often the sites of terrorist or active shooter attacks. Public spaces, by definition, require easy accessibility and unrestricted movement. Given that openness, what security technologies can provide real results? We asked this week’s Expert Panel Roundtable: How is technology innovation impacting the security of public spaces?
Statistically speaking, incidents of terrorism are unlikely to impact most businesses and institutions. However, the mere possibility of worst-case-scenario attacks is enough to keep security professionals awake at night. Compounding the collective anxiety is the minute-by-minute media coverage when an attack does occur. The immediacy of the shared experience of global tragedy impacts us all – including security system decision-makers. We asked this week’s Expert Panel Roundtable: How is the rise in terrorism impacting the physical security market?