Intersec, the globally renowned emergency services, security, and safety event, has announced that ex-MI6 Chief, Sir Alex Younger is one of the first announced international headliners, speaking for the first time in the UAE, as a guest speaker. Ex-MI6 Chief, Sir Alex Younger Alex Younger joined the United Kingdom’s Secret Intelligence Service (SIS), also known as MI6, in 1991 and served as a Diplomat and Undercover Operative. He was appointed Chief or ‘C’ of MI6 in 2014 and retired in 2020, making him the longest-serving Chief in 50 years. Throughout his career, Alex was posted to the Middle East in highly sensitive roles Throughout his career, Alex was posted to the Middle East in highly sensitive roles. He also acted as the Senior SIS Officer in Afghanistan, a position that marks him out as one of the world’s top authorities, on matters related to human rights in the country. Intersec’s Global Security Leaders’ Summit He will be sharing his unique insights, as the best minds in the industry gather, between January 16-18, 2022, at Intersec’s Global Security Leaders’ Summit, one of six conferences at the event, with hard-hitting discussions featuring global leaders debating and exchanging perspectives on challenges, strategic initiatives, and cooperation, to foster safety and security of all. The full program features over 500 speakers, the largest conference platform for the sector on a world-class stage. Commenting on his participation at the event, Sir Alex Younger said, “I am delighted to be speaking for the first time in the UAE at Intersec, and at a time when conversations for the Security and Safety industry has been thrust into the spotlight from recent global events.” He adds, “The Middle East has always fascinated me - the ever-shifting intricate dynamics of geopolitical relationships in the region and the impact they have internationally create a complex security landscape that I have been immersed in for much of my career.” Intersec 2022 For this industry, Intersec offers the most valuable platform for knowledge exchange" Alex Younger stated, “For this industry, Intersec offers the most valuable platform for knowledge exchange, on the protection of citizens from existing and future threats, and I look forward to sharing my perspective on a topic, which remains a global priority.” Sir Alex Younger is recognized for his unrivaled understanding of the region and has also spoken widely on matters pertaining to human rights in Afghanistan, academic freedom, and the geopolitical nature of China’s digital and technological interests in western infrastructure. Intelligence and security community veteran Alex Nicholl, Messe Frankfurt Middle East’s Head of Intersec, said “Intersec’s commitment to bringing the brightest, most qualified experts to the stage in 2022 is at the forefront of our strategy, to deliver the most relevant content for our audience. Sir Alex Younger is undoubtedly a legend in the intelligence and security community, and his storied career in the Middle East makes him the perfect addition to our conference line-up.” Alex adds, “This is Mr. Younger’s first time speaking publicly in the UAE and his participation underscores the value Intersec is bringing to its visitors, with exclusive opportunities, to engage with and learn from the very best in the industry. We are delighted to have Sir Alex onboard and look forward to welcoming him at the show.” Safety and security of future generations The 23rd edition of the flagship event is being held under the patronage of His Highness Sheikh Mansoor Bin Mohammed Bin Rashid Al Maktoum, at the Dubai World Trade Center, in Dubai, UAE, and will be focused on the theme of ‘Uniting the world’s leading industry specialists for the safety & security of future generations.’ Demonstrating Intersec’s strategic importance to the UAE, Official Supporters include Dubai Police, Dubai Civil Defense, Security Industry Regulatory Agency (SIRA), the UAE Cyber Security Council, and Dubai Municipality.
RaySecur, a security imaging technology company with the world’s first DHS Safety Act-designated millimeter wave (mmWave) desktop scanner, for mail and package threat detection, announced that former Boston Police Commissioner, Ed Davis has joined the company’s Advisory Board. Ed Davis will leverage his decades of law enforcement experience, in order to help RaySecur accelerate adoption of its flagship MailSecur mail and package threat detection solutions. MailSecur scanners MailSecur scanners use safe mmWaves to see inside of objects. They can detect more and smaller threats than X-ray scanners, including explosives, weapons, radiation, and other suspicious contents, as well as liquids and powders at 300x the sensitivity of X-rays. Unlike X-ray scanners, there are no safety concerns or need for specialized training. Mail threat incidents have been increasing, with the United States Postal Inspection Service (USPIS) and the Bureau of Alcohol, Tobacco, Firearms and Explosives (ATF), responding to an average of more than 10 dangerous mail or package incidents each day, for the last three years. In the last 16 months, AstraZeneca’s COVID-19 vaccine plant, Subway Sandwiches’ corporate headquarters, and Dr. Anthony Fauci have all been victims of dangerous mail threats. Mail and package threat detection Mail and package threat detection is an underestimated and vitally important component of public safety" Ed Davis stated, “Mail and package threat detection is an underestimated and vitally important component of public safety, and I’m excited to join the Advisory Board of a company that offers the only safe and scalable solution for organizations and individuals, to combat this problem.” He adds, “It’s crucial that law enforcement, enterprises, correctional facilities and government institutions have access to this technology, and ensure they can seamlessly scan every package, in a quick and efficient manner. I look forward to working with RaySecur, to help meet this important security need.” RaySecur's Advisory Board Ed Davis is the latest addition to a world-class team comprising technology, military, security and law enforcement professionals. He has a 35-year proven track record and is the President and Chief Executive Officer (CEO) of business strategy and security services firm, Edward Davis Company. Ed Davis served as the Boston Police Commissioner from December 2006 to October 2013, where he led the highly successful response to the Boston Marathon bombing. Prior to that, he was the Superintendent of the Lowell, Massachusetts Police Department for 12 years. Davis also serves on AT&T’s Advisory Board and was a former Safety Advisory Board Member at Uber. Enhancing mail security “We are honored to have an esteemed law enforcement figure, such as Ed Davis join our Advisory Board and help us continue closing the mail security gap,” said Alex Sappok, Ph.D., the Chief Executive Officer (CEO) of RaySecur. Alex adds, “Ed’s strong interest in RaySecur not only highlights the importance of improving mail security across industry and government, but also our solutions, which can easily address the problem at scale.”
Southwest Microwave is pleased to announce the appointment of Mr. Don Bradfield as President, by the company’s Board of Directors, effective immediately. Based at the company’s Tempe, Arizona headquarters, Mr. Bradfield will oversee domestic and international operations of the Security Systems and Microwave Products Divisions, including Southwest Microwave, Ltd., located in Worcestershire, United Kingdom. Drive operational transformation “It’s my distinct honor to receive this new appointment,” said Don Bradfield, President, Southwest Microwave, adding “I look forward to working with internal and external stakeholders, across the security and microwave divisions, to continuously drive operational transformation and new product development that addresses the needs of our worldwide customers, and maintains our competitive advantage.” In his previous role as General Manager of the company’s Microwave Products Division, Don Bradfield expanded the manufacturing operation, introduced a range of new high-frequency connectors for specialized aerospace and military applications, and oversaw NIST and ITAR compliance initiatives. Intrusion detection and microwave interconnect solutions He has more than 30 years of design engineering and operations management experience “Don’s track record of product innovation, market expansion, process improvement and organizational strategy advancement will ensure that Southwest Microwave continues to offer industry-leading intrusion detection and microwave interconnect solutions,” said Richard McCormick, Chairman/CEO of Southwest Microwave, Inc. Don Bradfield joined Southwest Microwave in January 2014. He has more than 30 years of design engineering and operations management experience, in the RF/microwave/mmWave products industry. Vast industry experience His previous positions include Vice President of Operations at L-3 Communications/Narda Microwave West, Director of Technology at Crane Electronics, and Director of Operations, Manufacturing Engineering Manager, and Design Engineer at Herley Industries. Don Bradfield holds a Master’s of Science degree in Electrical Engineering from Johns Hopkins University and a Bachelor’s of Science degree in Electronic Engineering Technology from Capital Institute of Technology.
Qognify has announced the launch of the latest version of its renowned Cayuga video management system (VMS), Cayuga R17. Cayuga R17 Cayuga R17 provides control rooms with powerful new person tracking, masking, and camera forwarding capabilities, to improve real-time incident handling and post-incident investigation. The ability to act quickly, during a live security/safety incident, is vital to a successful outcome. Security operators need tools at their fingertips that are instinctive and intuitive, to ensure they respond appropriately, regardless of their knowledge and experience. Efficient person tracking with multiple cameras The Click2Track feature enables operators to easily follow persons of interest Tracking persons of interest across a camera network, in real-time, requires a deep understanding of where cameras are located and the ability to rapidly switch between them. This is where the Click2Track feature comes in, a new advanced investigation capability that has been added to Cayuga R17. The Click2Track feature enables operators to easily follow persons of interest, either in a real-time monitoring situation or as part of a post-incident investigation, across every camera connected to the VMS. Click2Track feature for security management The operator simply activates Click2Track and clicks on the appropriate highlighted area (depending on the direction of travel), displayed on the screen. They are then automatically presented with the next camera feed, the moment the subject is in its field of view, ensuring that the subject is always kept under close observation. Carsten Eckstein, the Head of Product Management for Cayuga, at Qognify said “Click2Track enables any operator to focus their full attention on managing a situation, to obtain the best possible outcome, rather than having to know where and how to locate the next best available camera, and juggling between feeds and screens.” New camera sharing feature Another feature added to Cayuga R17 enables operators to work together easily. With the new camera sharing feature, a camera feed can be instantly shared with other operators, in just three clicks. Carsten Eckstein adds, “It can often be the case that live footage needs to be shared with another operator or stakeholder, to take a decision on a course of action. In such time-critical circumstances, there is no need to involve an administrator to amend user rights, but temporary sharing can happen instantly, whenever it is vital that the transition is made on the fly.” Adhering to data protection and privacy laws Click2Mask feature automatically detects people in the camera view and creates a mask The need to mask footage, prior to exporting, i. e. because of GDPR requirements, is another time-consuming process that is improved significantly with Cayuga R17. Click2Mask feature automatically detects people in the camera view and creates a mask, together with a movement trajectory that preserves a person’s anonymity, in accordance with data protection and privacy laws. Click2Mask enables multiple areas to be masked at the same time and it can also be applied to obscure parts of the video, which could potentially leak commercially sensitive information, or compromise security. Support for multi-sensor devices Carsten Eckstein concludes, “Using Click2Mask can be as much as 10 times faster than the slow manual masking process, which will be familiar to many operators, working in control rooms right now.” Other new features in Cayuga R17 include one-click alarm categorization, enhanced support of multi-sensor devices, and integration with the new Bosch INTEOX camera platform. Easy camera firmware upgrade Cayuga R17 also makes it easier to upgrade camera firmware, through the use of Qognify’s web-based management and monitoring platform, Umbrella. Cayuga R17 also contains language support for Japanese and Romanian languages, increasing the number of available languages for the user interface to 17 now. Cayuga R17 is available now from Qognify.
The past year has elevated consumer awareness about personal safety, from COVID-19 issues to social unrest, making safety top-of-mind and the need for personal safety solutions, even more prevalent. In addition, consumers spent more time at home, as schools closed, events were canceled and remote work increased. This prompted two major shifts that, in my opinion, most significantly opened the need for and raised the popularity of mobile safety solutions. Demand for grocery and food delivery apps surged Rise in use of app-based delivery services During the past 18 months, the use of app-based delivery services has skyrocketed During the past 18 months, the use of app-based delivery services has skyrocketed. With more use comes more interactions among strangers in homes and businesses, and while the majority of these moments are completely safe and convenient, incidents are happening, ranging from uncomfortable situations to physical assaults. And, with more delivery drivers on the road, there are going to be more accidents among gig-economy workers. Based on recent estimates, food and grocery delivery are expected to remain popular, even as we get back to normal life. High popularity of mobile security apps and wearables With more work shifting from stationary locations to working on-the-go, mobile security apps or wearables can be a lifeline in all sorts of situations. It’s important for these mobile safety products to be comprehensive, dynamic and designed to address the full range of people’s safety and security needs, from providing simple human reassurance to dispatching emergency help. Domestic violence cases increased According to the National Domestic Violence Hotline, due to COVID-19 lockdown restrictions, domestic violence rose as a result of many victims being stuck at home with their abusers, while sheltering in place and working from home. Mobile safety apps, such as ADT’s SoSecure U.S. Attorneys General and other state-elected officials have endorsed mobile safety apps, like SoSecure by ADT These situations necessitate the need for discreet ways for victims to call for help. U.S. Attorneys General and other state-elected officials have endorsed mobile safety apps, like SoSecure by ADT, as a tool to help victims of domestic abuse, safely call for help, without alerting their abuser. Over the past year, the mobile safety app market has seen tremendous innovation, including more user-friendly ways to make SOS calls. Today, within a single app, a person can summon help hands-free, by saying a secret phrase, by text or by swiping a button. Extension of mobile safety into wearable devices And, users can connect with people trained to help in unsettling situations over video, which can be an effective deterrent and provide video evidence. We’ve also seen the extension of mobile safety into wearable devices, in order to make these devices more discreet and usable. There will always be some safety risks in our lives. However, the good news is there’s no need to live in a constant state of fear. The easiest, most direct way to be prepared and ready to ‘fight back’ is by having a personal safety tool in your pocket, a mobile safety app that is there, when you need it most.
The impact of the COVID-19 pandemic has accentuated our digital dependency, on a global scale. Data centers have become even more critical to modern society. The processing and storage of information underpin the economy, characterized by a consistent increase in the volume of data and applications, and reliance upon the internet and IT services. Data centers classed as CNI As such, they are now classed as Critical National Infrastructure (CNI) and sit under the protection of the National Cyber Security Centre (NCSC), and the Centre for the Protection of National Infrastructure (CPNI). As land continues to surge in value, data center operators are often limited for choice, on where they place their sites and are increasingly forced to consider developed areas, close to other infrastructures, such as housing or industrial sites. Complex security needs One misconception when it comes to data centers is that physical security is straightforward One misconception when it comes to data centers is that physical security is straightforward. However, in practice, things are far more complex. On top of protecting the external perimeter, thought must also be given to factors, such as access control, hostile vehicle mitigation (HVM), protecting power infrastructure, as well as standby generators and localizing security devices to operate independently of the main data center. Face value How a site looks is more important than you may think. Specify security that appears too hostile risks blatantly advertising that you’re protecting a valuable target, ironically making it more interesting to opportunistic intruders. The heightened security that we recommend to clients for these types of sites, include 4 m high-security fences, coils of razor wire, CCTV, and floodlighting. When used together in an integrated approach, it’s easy to see how they make the site appear hostile against its surroundings. However, it must appear secure enough to give the client peace of mind that the site is adequately protected. Getting the balance right is crucial. So, how do you balance security, acoustics and aesthetics harmoniously? Security comes first These are essential facilities and as a result, they require appropriate security investment. Cutting corners leads to a greater long-term expense and increases the likelihood of highly disruptive attacks. Checkpoints Fortunately, guidance is available through independent accreditations and certifications, such as the Loss Prevention Certification Board’s (LPCB) LPS 1175 ratings, the PAS 68 HVM rating, CPNI approval, and the police initiative - Secured by Design (SBD). Thorough technical evaluation and quality audit These bodies employ thorough technical evaluation work and rigorous quality audit processes to ensure products deliver proven levels of protection. With untested security measures, you will not know whether a product works until an attack occurs. Specifying products accredited by established bodies removes this concern. High maintenance Simply installing security measures and hoping for the best will not guarantee 24/7 protection. Just as you would keep computer software and hardware updated, to provide the best level of protection for the data, physical security also needs to be well-maintained, in order to ensure it is providing optimum performance. Importance of testing physical security parameters Inspecting the fence line may seem obvious and straightforward, but it needs to be done regularly. From our experience, this is something that is frequently overlooked. The research we conducted revealed that 63% of companies never test their physical security. They should check the perimeter on both sides and look for any attempted breaches. Foliage, weather conditions or topography changes can also affect security integrity. Companies should also check all fixtures and fittings, looking for damage and corrosion, and clear any litter and debris away. Accessibility When considering access control, speed gates offer an excellent solution for data centres. How quickly a gate can open and close is essential, especially when access to the site is restricted. The consequences of access control equipment failing can be extremely serious, far over a minor irritation or inconvenience. Vehicle and pedestrian barriers, especially if automated, require special attention to maintain effective security and efficiency. Volume control Data centers don’t generally make the best neighbors. The noise created from their 24-hour operation can be considerable. HVAC systems, event-triggered security and fire alarms, HV substations, and vehicle traffic can quickly become unbearable for residents. Secure and soundproof perimeter As well as having excellent noise-reducing properties, timber is also a robust material for security fencing So, how do you create a secure and soundproof perimeter? Fortunately, through LPS 1175 certification and CPNI approval, it is possible to combine high-security performance and up to 28dB of noise reduction capabilities. As well as having excellent noise-reducing properties, timber is also a robust material for security fencing. Seamlessly locking thick timber boards create a flat face, making climbing difficult and the solid boards prevent lines of sight into the facility. For extra protection, steel mesh can either be added to one side of the fence or sandwiched between the timber boards, making it extremely difficult to break through. A fair façade A high-security timber fence can be both, aesthetically pleasing and disguise its security credentials. Its pleasant natural façade provides a foil to the stern steel bars and mesh, often seen with other high-security solutions. Of course, it’s still important that fencing serves its primary purposes, so make sure you refer to certifications, to establish a product’s security and acoustic performance. Better protected The value of data cannot be overstated. A breach can have severe consequences for public safety and the economy, leading to serious national security implications. Countering varied security threats Data centers are faced with an incredibly diverse range of threats, including activism, sabotage, trespass, and terrorism on a daily basis. It’s no wonder the government has taken an active role in assisting with their protection through the medium of the CPNI and NCSC. By working with government bodies such as the CPNI and certification boards like the LPCB, specifiers can access a vault of useful knowledge and advice. This will guide them to effective and quality products that are appropriate for their specific site in question, ensuring it’s kept safe and secure.
The UK government recently announced a doubling of the Safer Streets Fund to £45 million, as it seeks to reassure the public that safety is a top priority, as the night-time economy makes a return. More than just surveillance While this funding increase is much needed, it’s vital that the government and local councils use the money strategically, or risk missing out on a great opportunity to deliver real change and enhance safety across the United Kingdom. One of the main strategies cited by the government is to increase the current vast number of CCTV cameras installed across the country, despite the fact that the UK is already one of the most surveilled nations in the world. Investing in video analytics London alone has around 700,000 cameras, but to effectively monitor them all would be an incredibly inefficient use of manpower and require a huge number of staff. Therefore, I believe the clearest and most cost-effective way for this project to succeed in its overall mission, is by investing in smarter technology, such as video analytics. Incorporating video analytics into existing infrastructure is the clear solution This technology offers a more efficient use of resources, faster response times and enables more informed, time-critical decision making, when reacting to unfolding events in real time. Incorporating video analytics into existing infrastructure is the clear solution, as the technology enables legacy assets, such as analog CCTV cameras, to become more than just after the fact evidence gathering tools and instead be used to help enhance real-time responses to unfolding incidents. Artificial intelligence-enabled solutions Artificial intelligence-enabled solutions are trained using vast datasets of images and video footage, in order to better understand people, objects and vehicles that are captured on film, and they continue ‘learning’ and improving, while in use. The system’s algorithms analyze and prioritize input from video data to decide which inputs are of value, automatically classifying the footage and notifying security personnel accordingly. This reduces response times by notifying CCTV operators of an incident, as it happens, meaning law enforcement and security personnel can react faster and intervene in an ongoing situation. Edge technology and real-time video streaming A key consideration should be choosing a technology that can operate at the edge and deliver real-time video streaming, even at the lowest bandwidths, so it isn’t limited to use in areas with good connectivity, which would exclude most remote areas. Quality really does matter and technology that can operate over low bandwidths is crucial for allowing operators to zoom in on areas of interest, such as a car number plate or face, and retrieve full-resolution images that can make a real difference in ongoing investigations. Analytics-based security approach Introducing an analytics-based security approach would also help curtail the rising cost of tackling crime Introducing an analytics-based security approach would also help curtail the rising cost of tackling crime. Research conducted by the UK’s Labour Party recently found that the annual cost of crime reached a staggering £100 billion. While statistics show that crime rates in general have been fairly stable over recent years, experts point to the increase in specific types of violent crime, such as knife crime which rose by over 20% during 2020. Implementing smart analytics-based technology Implementing smart analytics-based technology would help maintain staffing costs, as the system can identify incidents without an operator’s input, as well as reducing the cost of managing crime, as more incidents will be intervened in before they escalate too far. This dramatically reduces the burden on staff and allows a single surveillance operator to monitor many more cameras. On the other hand, this level of automation also reduces false alarm fatigue and operator overload, which can quickly sap efficiencies and reduce operator alertness, if left unchecked. Data driven problem-solving approach to crime prevention Procurement officials should avoid the common mistake of simply doubling down and throwing more staff and security assets at the problem to bring results. Instead, they should take a more data driven problem-solving approach to crime prevention by leveraging technologies that can enhance response and preserve their existing investments in cameras. The smart use of real-time video analytics could make the difference by preventing dangerous situations from escalating into serious incidents.
Security’s intersection with consumer electronics is on view at CES 2020, the world’s largest technology event, Jan. 7-10 in Las Vegas. The giant show features more than 170,000 attendees, 4,500 exhibitors and 1,100 industry thought-leaders featured on the CES stage. A range of technologies will be on display, from artificial intelligence (AI) to 5G, vehicle technology to AR/VR (augmented and virtual reality), robotics to home automation. Security plays a prominent role, too.The impact of this event for the smart home could be about delivering home analytics and enhancing privacy" Smart home market on the forefront The smart home market is a major focus. “For the smart home market at CES this year, we expect to see numerous announcements regarding home awareness,” says Blake Kozak, Senior Principal Analyst at IHS Markit. “This will include brands offering up additional analytics for consumer security cameras with a focus on edge-based solutions.” “The impact of this [event] for the smart home could be about delivering home analytics and enhancing privacy through cloudless architectures and new electronic door lock approaches,” he adds. An example of cloud analytics is the Resideo Home app, introduced in December, which will make whole-home monitoring possible for four critical networks of the home – water, air, energy and security. Resideo promises a “simplified and integrated smart home experience.” Video is also prominent at the show. “For cameras, we can expect to see more cameras focused on the outdoor space and possibly new form factors for video doorbells,” says Kozak. Familiar security industry brands exhibiting at CES 2020 include ADT, Ring, August Home and Yale (both part of ASSA ABLOY), Bosch and Alarm.com. Focus on Cybersecurity In 2020, companies will continue to focus on solutions for protecting consumer data" Cybersecurity is an aspect of many of the devices on display at CES. “Device security and data privacy play a key role in the adoption of connected devices,” says Elizabeth Parks, President, Parks Associates. “Consumer security concerns for smart home products will continue to be a barrier to adoption in the U.S. and Europe, and these concerns can actually intensify with device adoption-71% of U.S. smart home households are concerned about cybersecurity. In 2020, companies will continue to focus on solutions for protecting consumer data. One big area of interest is protection on the network router, providing whole home solutions, which are very appealing to consumers.” “At CES we will see the traditional players introducing new DIY (do-it-yourself) products, as well as new players announcing new product features, services, and partnerships,” Parks adds. Smart access control Smart locks will be among the security products at CES 2020. For example, PassiveBolt, a lock company, will show the Shepherd Lock, a touch-enabled smart lock with enhanced security through sensors and AI. The add-on lock converts existing locksets into touch-activated devices. Another lock manufacturer is Kwikset, whose door locks and door hardware include Wi-Fi-enabled smart locks, Bluetooth-enabled smart locks, keyless and keyway-less locks and connected home technology. Video doorbells, including industry-innovator Ring, have been a hit in the consumer market. At CES, Ring will expand the mission to make neighborhoods safer by creating a “Ring of Security” around homes and communities with a suite of home security products and services. The “Neighbors by Ring” app enables affordable, complete, proactive home and neighborhood security. Homeguard offers a range of affordable CCTV solutions for home and small business DIY CCTV demonstrations DIY security systems are another market. Homeguard is a leading DIY consumer brand offering a range of affordable CCTV solutions for home and small business, including wired and wireless CCTV kits, smart cameras, home alarm systems and wire-free HD CCTV kits. Swann Communications is also at the forefront of surveillance and monitoring with new products developments including wire-free HD cameras and doorbells, professional CCTV video surveillance systems, and 1080p full HD systems with “True Detect” heat and motion sensing. AVTECH, and subsidiary YesGo Tech, will demonstrate a compact Wi-Fi home security set, a series of special cameras with face recognition, thermal detection and license plate recognition, customized central management software and a university ID tag that is compatible with access control, OEM and ODM opportunities. Security and automation solutions D-Link’s home networking, security and automation solutions will help consumers connect, view, share, entertain, work and play. SECO-LARM, manufacturer of a Room Occupancy Monitor that shows whether a room is in use, has a line of keypads and proximity readers with built-in Bluetooth for convenient access. Another smart home security solutions provider, Climax Technology, integrates wireless security, home automation, energy management, home emergency monitoring and live visual monitoring. Personal safety mobile application Manufacturers are positioning outdoor cameras as deterrents to theft before a burglary happens" WaryMe designs and develops a personal safety mobile application to improve a user’s security in public places, schools, transports and companies by addressing major risks such as terrorism attacks, intrusion, fire and even industrial accidents. An all-in-one mobile application integrates alerting, crisis management and mass notification features. “Market players are looking to expand beyond established smart home devices like smart thermostats and networked cameras to products like smart water leak detectors, smart pet feeders, and smart air purifiers,” says Elizabeth Parks. “Manufacturers are positioning outdoor cameras as deterrents to theft before a burglary happens. This trend is part of a broader security marketing effort to extend the perimeter of home security beyond traditional home access points.” “Familiarity with smart home devices lags behind familiarity with smart entertainment products; it even lags that of smart speakers, which are quite new in the market,” adds Parks. “In 2020, we will see players working to advance the visibility and marketing around device integration, and specifically focus on use case scenarios around safety, security, and convenience, which have always been the primary drivers of adoption of these types of products.”
The UK Government has been working to reduce the risks associated with illegal drone use since a high-profile incident at UK’s Gatwick Airport in December 2018, when a drone sighting triggered a three-day shutdown of the UK’s second busiest airport, disrupting the travel plans of 140,000 people and affecting 1,000 flights. To address growing security threats by drones, the UK Government has released its ‘Counter-Unmanned Aircraft Strategy’. ‘Counter-Unmanned Aircraft Strategy’ This strategy sets out our approach to countering the threat the malicious or negligent use of drones can bring" “This strategy sets out our approach to countering the threat the malicious or negligent use of drones can bring,” says Brandon Lewis, the U.K. Minister of State for Security. “It will provide the security the public and drone users require to continue to enjoy the benefits of leisure and commercial drone use and facilitate the growth of the drone industry.” “Given the challenge posed by rapid advances in drone technology and the potential threat, the strategy will provide overarching direction to our efforts,” says Lewis. The strategy focuses on ‘small drones’, those weighing less than 20 kg (44 pounds). Countering malicious use of aerial drones The UK Counter-Unmanned Aircraft Strategy centers on mitigating the highest-harm domestic risks resulting from malicious use of aerial drones. They are: Facilitating terrorist attacks, such as modifying commercially-available drones to conduct reconnaissance or attacks. Facilitating crime, especially in prisons, where drones are currently used to deliver contraband. Disrupting critical national infrastructure, such as airports, where a malicious incursion using a drone can have serious safety, security and economic consequences. Potential use by hostile state actors. Maximizing benefits of drone technology The initiative will also look to build strong relationships with industry to ensure high security standards Over the next three years, the strategy will seek to reduce the risks posed by the highest-harm use of drones while maximizing the benefits of drone technology. It will develop a comprehensive understanding of evolving risks and take a “full spectrum” approach to deter, detect and disrupt the misuse of drones. The initiative will also look to build strong relationships with industry to ensure high security standards. Further, promoting access to counter-drone capabilities and effective legislation, training and guidance will empower the police and other operational responders. Tactical response to drone-based threats Because technology is rapidly evolving, the response needs to keep pace, according to the strategy document. Lewis adds, “We will therefore work to understand how drone-based threats might evolve in the future, both at the tactical and strategic levels.” The strategy will be to build an end-to-end approach to tackling the highest-harm criminal use of drones. It will also work to make it easier to identify malicious drone use against a backdrop of increased legitimate use. Legal drone operators will be required to register with the Civil Aviation Authority (CAA) and to pass an online competency test before flying a drone. Retailers who follow a specific set of safety guidelines when selling drones will be designated ‘DroneSafe’. Unmanned traffic management system The government is working toward future implementation of an unmanned traffic management (UTM) system, which provides a means of preventing collisions between unmanned aircraft and other manned or unmanned aircraft. The current strategy includes early planning for the system. An Industry Action Group will ensure a continuing relationship with the drone industry and help to improve existing counter-drone measures and identify new opportunities, such as use of ‘Geo-Fencing’ to restrict drones from flying in certain areas. Regulating commercial and domestic drones The UK Department of Transport is responsible for safe and lawful use of drones within the UK airspace The strategy will seek to communicate the UK’s security requirements to the counter-drone industry and to encourage a thriving sector that is aware of, and responsive to, the needs of government. Regulating drones is the responsibility of two UK government departments. The UK Department of Transport is responsible for safe and lawful use of drones within the UK airspace, while the Home Office has overall responsibility for domestic counter-drone activity. Fast-evolving drone and counter-drone technology Also, the Center for the Protection of National Infrastructure (CPNI) has been involved in reducing the vulnerability of sensitive sites, including airports. New performance measures will track the strategy’s success. Due to the fast-evolving nature of drone and counter-drone technology, the intent is to review and, if necessary, refresh the strategy in three years.
As the deal/no deal prospects of Brexit are tossed in a whirlwind of UK and EU politics, the uncertainty of the back-and-forth has broadly impacted general economic trends, and by extension, the physical security market. The new deadline for a Brexit agreement is October 31, already postponed six months from the scheduled April 12 departure date. Numbers show that Britain’s GDP shrank in the second quarter, possibly reflecting fewer exports because of Brexit uncertainty. And beyond the current indecision lies the long-term impact of a possible change in trading status between the United Kingdom and continental Europe. Other issues include capital flow and labor mobility. Brexit uncertainty leading to security concerns Loss of shared information with the EU will make the UK less safe “Companies … are unclear about their future,” comments Martin Warren of the Institute of Chartered Accountants in England and Wales. “Companies are making decisions now about jobs, supply chains, headquarters and asset locations, incurring significant, and possibly unnecessary, cost and upheaval.” Warren fears the destructive effects of a ‘no deal’ outcome and hopes politicians will break the deadlock and restore business confidence. Security implications of Brexit extend beyond economics. Loss of shared information with the EU will make the UK less safe. Extradition across EU borders will be more difficult, and exchange of data such as fingerprints and vehicle registrations is at risk. The Irish border after Brexit is of particular concern to security professionals. Countering threat of international terrorism Robert Hall of London First and Alison Wakefield of Security Institute say the security impact of departing the EU will be long lasting and profound. “In security terms, the UK will still have to contend with international terrorism, transnational crime and the global movement of people, all challenges that require wide scale cooperation.” They add that leaving the EU will require “a significant investment in people, resources and databases to cope with the anticipated volumes of traffic through ports, airports and tunnels.” Analyst company IHS Markit earlier commented about the impact on the security industry of Brexit’s drag on the UK economy, “Access control, intruder and fire alarm markets typically track construction rates closely and are forecast to be affected most. However, a large cut to infrastructure spending would be just as damaging to the video surveillance market.” UK security companies Prefer ‘soft exit’ from EU If a ‘soft exit’ trade deal is not negotiated, the UK would have to revert to WTO trade rules If a ‘soft exit’ trade deal is not negotiated, the UK would have to revert to World Trade Organization (WTO) trade rules, which means tariffs on trade between the UK and the EU, says IHS Markit. There are five British-based access-control and intruder-alarm vendors supplying the European market in significant quantity – each with revenue exceeding $10 million. IHS Markit estimates these companies combined account for less than 10 percent of total European, Middle-Eastern and African (EMEA) market revenues for both industries. Uncertain future of UK security marketplace Asset protection specialist VPS Security Services has warned that the ongoing Brexit saga will likely lead to a rise in vacant commercial and residential properties as developers and investors are more reluctant to move forward with their UK real estate strategies. Seemingly endless machinations and shifting proposals are making the eventual outcome of Brexit very much a guessing game. Uncertainty translates into a volatile and changing outlook, and the eventual impact on the broader economy is an open question. As a reflection of that economy, the security marketplace will inevitably feel the economic impact, too, not to mention the new security challenges likely to ensue.
Being isolated on the edge of wilderness means there’s a need for a video system that is both reliable and flexible. For that reason, the team at Jackson Hole Airport (JAC), since 2009, has relied on video management software (VMS) from Milestone Systems, to enhance security, safety, and efficiency at the airport. Milestone XProtect VMS installed At the edge of the frontier, Jackson Hole Airport has experienced considerable growth over the years. Significant capital investments in expansions have made new video system integrations possible several times and Milestone XProtect VMS has supported the airport’s needs along the way. As of 2020, over 220 cameras are in use, but the airport shows no signs of slowing down As of 2020, over 220 cameras are in use, but the airport shows no signs of slowing down. New projects will include building a fuel farm, a car wash, and expanded parking facilities. As the need to increase security continues, XProtect open platform software will enable IT team growth and the seamless integration of new cameras, and data storage capabilities. Enhanced situational awareness All video is kept for up to a full year, with most of the system’s cameras set for motion recording, around the clock. As a result, administrators achieve greater situational awareness and better security. The video system has enabled improvements throughout the entire airport. For example, Jackson Hole Airport contends with a great deal of plane de-icing, for several months each year. The process occurs at a distance from the main buildings. Thanks to the video expansion, each airline is now able to monitor the de-icing of their planes. Allowing airline personnel to monitor progress on their own has saved airport staff time and resources. Monitoring security In addition, the airport uses the system to closely monitor the security checkpoint, to capture video documentation, in case of an incident. By monitoring baggage areas, it’s possible to investigate lost bags and left-behind items, by reviewing recorded video. New 4K multi-sensor cameras support an investigatory system, helping staff see previously uncovered areas. The cameras capture high-resolution video and provide enough data to zoom in, after the fact. Deployed Agent Vi’s video analytics Milestone Systems’ XProtect Smart Client has improved general situational awareness in the airport Additionally, the team has deployed video analytics from Agent Vi, to provide a layer of automated alarms, for flagging abnormal occurrences. For example, video analytics can detect travelers moving against the foot traffic flow and crossing into restricted areas. Milestone Systems’ XProtect Smart Client has improved general situational awareness in the airport. Authorized users now have a new standard for accessing surveillance remotely. It provides seamless viewing of live and recorded video, instant control of cameras and connected security devices, and a comprehensive activity overview. Force multiplication using advanced technology The ongoing use of Milestone’s VMS makes it possible to maintain the independence and efficiency of a small team of personnel, delivering maximum security at the edge of a wild frontier. Andrew Wells, IT Manager for the Jackson Hole Airport, said “Situational awareness for our team and our clients allow us to be as secure and efficient as possible, with our small team. The flexibility of the open platform VMS allows us to scale our system and add the features we need now and in the future.” Jackson Hole Airport Jackson Hole Airport lies seven miles north of Jackson, Wyoming, at the base of the Teton Mountains, in the USA. It is unique for being entirely within the Grand Teton National Park limits. It is the busiest airport in the state of Wyoming, with nearly 500,000 in-bound passengers welcomed annually. The Jackson Hole Airport covers over 500 acres of land area and has one runway, nine boarding gates, and three baggage carousels.
UNC Greensboro (UNCG) is one of 17 campuses within the University of North Carolina system. Founded in 1891, UNCG is the largest and most diverse university in the Piedmont Triad region, serving more than 20,000 students and employing approximately 2,800 faculty members. UNC Greensboro (UNCG) The university is in the heart of Greensboro, which boasts nearly 260,000 people, making it visible within the larger community as well. Landlocked by local streets, the 200-acre campus with 30 buildings poses unique security issues, as it is crisscrossed with major roads, making it a priority to ensure pedestrian and bicycle safety. UNCG has its own police department (UNCG PD), with more than 40 members, who ensure the safety of the campus As a public institution, UNCG is also largely open to the community and hosts numerous events, activities, and services, which are regularly accessed by residents of nearby neighborhoods and the city of Greensboro at large. UNCG has its own police department (UNCG PD), with more than 40 members, who ensure the safety of the campus. UNCG PD relies on its video surveillance system to alert them to incidents, record video for forensic purposes, and also provide video analytics for traffic and crowd control. Proactive video surveillance and camera system With a growing campus and rising security needs, UNCG PD, with the help of its systems integrator, NETCom Cabling and Security Systems, located in Greensboro, North Carolina, recognized it required a more efficient and proactive video surveillance and camera management system. The days when DVRs could provide the necessary recorded data quickly, gave way to the need for a more responsive approach, such as a shared enterprise system, to bring together cameras, recording, and the intelligent usage of both. The exacqVision platform and Z-Series video recorders UNCG PD’s foray beyond the NVR/DVR world began with the installation of the exacqVision platform, starting with its Z-Series recorders, to cover its parking decks. From there, it began to incorporate a hybrid platform, including exacqVision VMS, to support the analog cameras used for the parking decks, as well as the IP cameras being installed for security elsewhere. The migration began several years ago, but today the campus boasts nearly 900 cameras in use, with about 700 IP and the remainder analog. Each recorder can handle up to 128 IP cameras and 64 analog ones, and it works with thousands of IP camera models. Within that time, the UNCG PD has also grown to become a state-of-the-art department, with its own command and emergency operations center, where it can monitor and manage its video surveillance system. Intuitive video surveillance system In selecting the exacqVision Z-Series, UNCG’s police department was seeking an intuitive system In selecting the exacqVision Z-Series, UNCG’s police department was seeking an intuitive system that would put the necessary information at the fingertips of whosoever was on duty. It was also critical to deploy a system with built-in redundancy, to protect against any data loss, in the event of a power issue or system fail. “It’s a pretty easy end-user experience for our officers, without a lot of technological background,” said Joshua Green, Technical Services Analyst for the UNCG PD. Scalable video security system The software within the system makes it simple to perform tasks, such as playing back recordings or searching for data, using a single screen. One of the biggest benefits of the Z-Series is its scalability, offering one of the largest processors and fastest speeds of the DVRs on the market. The system’s design also makes it easy to add new cameras and licensing. One of the common usages of the exacqVision platform is for traffic management. Using the video from the exacqVision system, they can perform tasks, such as counting parking spaces, to know when a parking lot is full, as well as to watch crosswalks, to see how pedestrian and vehicle traffic is moving, or where people are congregating. Key inputs for efficient resource allocation It can also be used to help the police department determine where to put resources. For example, how many people are in the workout room and does that area need extra patrols, or are there concerns about equipment in the computer lab and how should that be monitored? There is also time savings to be gained, by working with exacqVision VMS platform There is also time savings to be gained, by working with exacqVision VMS platform, a system that lets the user easily search recorded video, with a timeline search. Green recalled an instance when someone was concerned that an iPad had been stolen, but a quick check of the video showed within a matter of minutes that the item had been safety stored away, rather than taken. UNCG, NETCom and Intelligent Marketing Inc. partnership As a long-time user of the Z series and exacqVision VMS, UNCG, NETCom and Intelligent Marketing Inc. are quick to share their success stories and concerns to improve the product. “These guys, (Tim Reese, Sergeant for the technical services area, and Green), are working with Exacq engineers on changes that everyone will benefit from,” such as improvements to the mapping feature,” said Bob Moulton, North Carolina’s Territory Manager for Intelligent Marketing, a security manufacturer representative firm that works closely with end-user customers. Smart video surveillance solution The ability to make integrations down the road, because of the scalability of the system, whether it’s adding card access or expanding the number of cameras, makes the Z-Series a smart strategic investment for the university. We are looking to the future of our surveillance system to ensure the safety of the university’s students" “We are looking to the future of our surveillance system to ensure the safety of the university’s students, faculty and visitors,” said Tim Reese, Sergeant for the technical services area, adding “Migrating to and implementing a new NVR platform provides the university with an important foundation for future surveillance capabilities and usability.” Implementing new NVR platform Systems integrator, NETCom Cabling and Security Systems concurred with those sentiments. “We enjoyed the opportunity to collectively work together with the University of North Carolina’s police department and Intelligent Marketing Inc. to support the University’s goal of continuously making improvements to ensure the campus remains secure,” said Aaron Spivey, Director of Security at NETcom Cabling. Aaron Spivey adds, “Together, we’ve achieved that objective and we look forward to continuing to work together in the future.” Security system providers: Intelligent Marketing Inc., based in Haverhill, Massachusetts., works in concert with manufacturers, distributors, specifiers, and integrators to assist with system design and specifications. Intelligent Marketing Inc. delivers proactive customer service, training, and support from project inception to completion, and more. NETcom Cabling and Security Systems, Greensboro, North Carolina, has been in business since 1990, specializing in category 5e/6 and 6a copper, indoor/outdoor fiber installations, card access, cameras, perimeter detection, gate entry systems, paging and AV solutions. NETcom has the capabilities to create comprehensive commercial cabling and security plans, through its in-house CAD department.
Foreign embassies are an essential part of establishing and maintaining peaceful cooperation, and collaboration between countries all over the world. They can also be the focus of tensions, peaceful and violent protests, terrorism, and many other risks, which mean that thorough and effective security solutions are essential to keep people, property, and sensitive documents safe. Foreign embassies Usually located in capital cities, each foreign embassy is the workplace and often residence, of a Country Ambassador. They are used for important diplomatic meetings, holding events, hosting VIPs, and a range of other activities that focus on the political, cultural, and social relationships with the host nation. In some instances, foreign embassies even provide sanctuary to their nationals and individuals from other nations In some instances, foreign embassies even provide sanctuary to their nationals and individuals from other nations, during times of trouble. G4S security services in Jordan “Anywhere in Amman, where a foreign embassy has outsourced their security, you can be certain that G4S is the company they have come to,” said Ashraf Abul-Hajj, the Managing Director of G4S in Jordan. Ashraf Abul-Hajj adds, “We’ve been doing this for decades and have excellent, long-standing relationships providing security for many embassies in the capital city. We secure over 30 embassies at the moment, and we’ve been working with some of them for over 20 years.” In fact, it was a small Jordanian security company, called Safe and Sound (now under G4S), which started to provide embassy security in Amman, Jordan, all those years ago, before it became a part of G4S, in 2004. Embassy security services G4S now provides a wide range of services to the embassies that it secures in Jordan. These include manned guarding, installing and maintaining security systems, such as CCTV, access control and alarms, secure escorting for VIPs, during their visits, with G4S vehicles and highly-trained drivers, and coordinating security for events, which are being hosted at the embassy. “The main purpose of most of our security solutions is to ensure that nobody gains access to an embassy, who shouldn’t be there,” said Ashraf Abul-Hajj, adding “There are a lot of different risks that embassies face - big and small. Terrorist incidents, while very rare, remain a threat, so our security teams are trained to be vigilant and notice any suspicious behavior.” Securing embassies during protests Protests at embassies are more common, when people disagree with the actions of a specific country" Ashraf Abul-Hajj adds, “Protests at embassies are more common, when people disagree with the actions of a specific country. Protests, even peaceful ones, are volatile and have the potential to turn violent, so our security officers and systems are there to monitor tensions, continuously assess the risk levels and prevent breaches.” Terrorism and protests are the more extreme examples of security threats, but day-to-day G4S security teams also deal with lower level threats that still need to be managed sensitively and professionally. Preventing breaches Ashraf Abul-Hajj stated, “People try to access their foreign embassies for a variety of reasons, often at times of personal stress or hardship, and can become distressed, and even aggressive, if they are not permitted to enter.” He adds, “Sometimes, we have to deal with very unusual scenarios. At one embassy, a man turned up saying that he had been informed by the embassy that he had won a competition and he was visiting the embassy to collect his cash prize. It was obvious to the team that he was the victim of a con, but his behavior became very challenging, when he realized this and could not gain entry. Our security officers had to try to calm him down, while stopping him from entering the embassy, without consent.” Ashraf Abul-Hajj concludes, “This shows how varied the challenges facing our teams at foreign embassies can be. An embassy can be peaceful for a long time, but it can only take one negative news story or a single social media post, to spark a significant protest. With our security systems, highly trained security officers and extensive experience, G4S is more than prepared to meet those risks. We are proud to deliver such an important service, keeping foreign embassies safe and secure in Jordan.”
Ipsotek, an Atos company and a pioneer in Artificial Intelligence-powered video analytics, has announced the fulfillment of its contract with Sydney Trains, the operator of rail services across the metropolitan Sydney area, to increase security capabilities at 13 railway stations. Following a competitive tendering process, Ipsotek was selected by Sydney Trains, to deliver an AI-based video analytics solution. This has seen the train operator, Sydney Trains, integrate a range of Ipsotek’s AI-powered video analytics solutions with its security cameras, to identify incidences of tunnel and track intrusion at its 13 stations, located across the metropolitan Sydney area. AI-based video analytics solution Ipsotek’s AI solutions are at the core of Atos Computer Vision Platform, a unique end-to-end computer vision platform that offers pre-trained & customizable AI models, powered by the BullSequana server range, enabled by NVIDIA GPUs and enriched by worldwide expert labs. Mark Edmonds, the Manager of Security Capability for Transport at Sydney Trains, commented “Sydney Trains chose Ipsotek, after an extensive comparison of a number of products. Ipsotek’s proven track record in the AI Video Analytics space, its partnership with Genetec and its work with Innovate UK’s Small Business Research Initiative (SBRI) for railway-focused AI applications, made it a well-deserved choice.” Enhancing security at Sydney Trains’ stations The project with Sydney Trains is the second transportation project in the region for Ipsotek Chris Bishop, Sales Director APAC & Marketing Director at Ipsotek, said “As a British SME, competing against some of the industry’s big-named companies, we are delighted to have been chosen by Sydney Trains, to deliver this project. It represents a welcome validation of our expertise within the transportation and more specifically, the rail sector and we are proud to have supported Sydney Trains with its commitment, to delivering enhanced security practices across its network.” The project with Sydney Trains is the second transportation project in the region for Ipsotek, which is working with accelerated computing solutions firm, NVIDIA on implementation. Ipsotek, member of NVIDIA Metropolis partner group Ipsotek is a member of the NVIDIA Metropolis partner program, which brings together a computing platform and extensive ecosystem of specialists, to help create smarter spaces and solve some of the world’s most pressing problems, which involve operational efficiency and public safety. Sudarshan Ramachandran, the Country Manager, Enterprise, ANZ at NVIDIA, commented “As an NVIDIA Metropolis partner, Ipsotek delivers incredibly valuable capabilities, solving deeply challenging video-analytics problems using AI and the NVIDIA GPU accelerated computing stack.” AI video analytics for public transport Ipsotek’s project with Sydney Trains follows the company’s previous success in delivering an initial program of work via the Innovate UK SBRI initiative, for the development of AI video analytics, to enhance the rail experience for passengers and staff in the UK.
Round table discussion
The death of Michael Brown at the hands of police in Ferguson, Missouri, in August 2014, highlighted to the public, the importance of body-worn cameras. There was no bodycam footage of the Ferguson tragedy. Arguably, it would have shed additional light on the shooting. Since then, body cameras have become a tangible legacy of Ferguson, Missouri. Bodycam footage is seen as providing greater accountability and ensuring an impartial record that can support, or debunk, any claims of police misconduct. Body-worn cameras are also finding their way into broader usage, even including customer service applications. We asked this week’s Expert Panel Roundtable: How important will body-worn cameras be moving forward?
A new generation of security professional is waiting in the wings. They will be faced with unprecedented challenges, as they seek to transform the security marketplace to the ‘next level’. Technology changes ensure the market will be very different 10 years from now and the fresh labor pool will need to be able to meet the host of new challenges. We asked our Expert Panel Roundtable: What exciting career opportunities in the security industry await the next generation?
Many of us take critical infrastructure for granted in our everyday lives. We turn on a tap, flip a switch, push a button, and water, light, and heat are all readily available. But it is important to remember that computerized systems manage critical infrastructure facilities, making them vulnerable to cyber-attacks. The recent ransomware attack on the Colonial Pipeline is an example of the new types of threats. In addition, any number of physical attacks is also possibilities. We asked this week’s Expert Panel Roundtable: What are the security challenges of protecting critical infrastructure?