Delta Scientific, a manufacturer of counter-terrorist vehicle control systems used in the United States and internationally, announced that its new bolt down DSC7090 beam barricade has passed its crash test garnering an ASTM M30/P1 rating. That means the DSC7090 will stop a 15,000 pound (6800 kg) truck going 30 mph (50 kph) with negative 6.3 feet (1.9 m) of penetration. Raising in only five seconds and lowering in merely two seconds yields a fast cycle rate of over 100 vehicles in and out per hour, making the new DSC7090 ideal for higher traffic and population locations. The dual beam design provides coverage of 12 to 24 feet (3.7 to 7.3 m) of roadway with a full 90 degree opening. Vehicle barricade designs HPU can be powered from a local single or three-phase power source "The DSC7090 beam barrier crash test is the culmination of one of a series of new products that we will be bringing to market," emphasizes David Dickinson, president of Delta Scientific. "Full scale crash testing provides unequivocal proof of the stopping capacity of each of our vehicle barricade designs. To date, Delta Scientific has conducted 67 full crash tests with more scheduled. That's another way in which we can commit to providing safety and security through product innovation." The new DSC7090 will be used in locations where wide roadways need to be secured from attacking vehicles and in larger parking areas where security systems are needed to deter theft. To meet these heightened demands, the DSC7090 deploys sophisticated touch screen controls and the same logic as used by key government organizations. This includes an LED light package with traffic lights. Also available is a strobe light and audible alarm package. Three-phase power source The DSC7090 operates remotely by means of an integral Hydraulic Pumping Unit (HPU) that is buttress enclosed. The HPU can be powered from a local single or three-phase power source. Alternative power options are also available. The DSC7090 is available to customers now.
The new H.265 Wisenet XNB-H6461H Pinhole Height Strip camera from Hanwha Techwin offers users the opportunity to covertly capture an image of a person’s face, and when used in conjunction with another camera, establish the approximate height of the person. Ideal for banks, petrol stations, convenience stores and other retail type applications, the Wisenet IP network Pinhole Height Strip camera is able to support face recognition analytics and designed to be installed at an exit door. Positioned at eye level and looking in, it is able to capture clear frontal images of faces which can be recorded and used as evidence to prosecute anyone arrested for theft or fraudulent activity. IP network cameras The Pinhole Height Strip camera enables covert capturing of image of the culprit on their first visit to the store" “Loss prevention managers have told us that it is not unusual for a thief to ‘case out’ a store before attempting to steal anything,” said Uri Guterman, Head of Product & Marketing for Hanwha Techwin Europe. He adds, “Having taken a close look at where the store’s video surveillance cameras are positioned, as well as the level of staffing, the thief then leaves the store only to return shortly afterwards with a cap or hat covering their face from the view of cameras which are normally installed on a ceiling looking down. The Pinhole Height Strip camera provides the opportunity to covertly capture a clear image of the culprit on their first visit to the store.” Wisenet XNB-H6461H Pinhole Height Strip camera The 2 MP Wisenet XNB-H6461H pinhole camera comes equipped with a 4.6mm fixed lens that provides a 73° field of view. It also benefits from enhanced Wide Dynamic Range (WDR), which performs at up to 120dB, to produce clear images from scenes containing a challenging mix of bright and dark areas. This is quite often the case at entry/exits points of a building and normally results in overexposed or underexposed images. In addition, built-in Highlight Compensation (HLC) technology solves the problem of overexposure created by the presence of strong light sources, such as from store spotlights. The camera’s Hallway View provides a highly effective way to monitor narrow vertical areas such as shopping aisles and corridors. This enables the Wisenet XNB-H6461H, which can generate images in the 9:16 and 3:4 aspect ratios, to work effectively in tall and narrow spaces, with the added bonus of minimizing bandwidth and video storage requirements. Other features of Wisenet XNB-H6461H include: Audio analysis which recognizes critical sounds such as raised voices, screams, broken glass, gunshots and explosions, and generates an alert to enable security personnel to quickly react to any incidents. A Dual MicroSD/SDHC/SDXC memory slot which allows video or data to be stored at the edge. Support for H.265, H.264 and MJPEG compression formats. WiseStream II, a complementary compression technology which improves bandwidth, efficiency by up to 99%, compared to current H.264 technology when combined with H.265 compression. Power over Ethernet (PoE) which negates the need to install a power supply and separate cabling for the camera. A USB port which helps reduce the time installers have to spend on site by enabling them to remotely check via Wi-Fi the Wisenet XNB-H6461H’s field of view and focus, from the convenience of a mobile device.
Allied Universal®, a security and facility services company in North America, recently hired Joshua Skule as the Senior Vice President of the Risk Advisory and Consulting Services division. Skule will be responsible for enhancing this division as a national and global provider of differentiating consulting, investigations and protective services. Skule joins Allied Universal after a distinguished 21-year career in the FBI, where he was recently the Executive Assistant Director for Intelligence leading the organization’s Intelligence Branch. In this role, he served as the strategic leader of the FBI’s intelligence program with centralized authority, responsibility and oversight for all the bureau’s intelligence work. In addition, he managed a global workforce of 5,000 personnel and a National Intelligence Program budget of over $3 billion. Security intelligence, counterterrorism “Josh’s vast expertise in security intelligence, counterterrorism and his previous work with Chief Security Officers (CSO’s) across the industry will be a great asset for our clients as we support their strategies to identify and mitigate risk and prevent loss as well as protect people, infrastructure and assets globally,” said Ty Richmond, President of Allied Universal® Risk Advisory and Consulting Services and International. During his career, Skule was co-chair of the Domestic Security Alliance Council (DSAC), which is a strategic partnership between the US federal law enforcement and over 500 CSO’s from private industry companies that enhance communication and promote the timely and effective exchange of security and intelligence information. In 2017, he was the recipient of the Presidential Rank Award for Meritorious Service As the Deputy Assistant Director within the FBI’s Counterterrorism Division, he developed a long-term strategic roadmap for technology investment in the bureau’s highest priority program. He nurtured extensive outreach to international law enforcement and intelligence partners to enhance information sharing. Disaster and emergency response Skule graduated from the Naval Academy with a bachelor’s degree in Political Science. He was a U.S. Marine Captain and led teams in multiple challenging deployments around the world. In 2017, he was the recipient of the Presidential Rank Award for Meritorious Service. Allied Universal® Risk Advisory and Consulting Services integrates security consulting, investigations, personal protection and threat, disaster and emergency response with traditional security services and technology systems to present a comprehensive picture of risk and actionable solutions to enhance security program effectiveness and ROI.
The EuroDASS consortium (Leonardo, Elettronica, Indra and HENSOLDT), which provides the Praetorian Defensive Aids Sub System (DASS) for the Eurofighter Typhoon, has launched its concept for the future of DASS, called “Praetorian Evolution”. The launch took place at the EuroDASS Future Capability user conference, which was attended by senior military and industry figures from the UK, Italy, Germany and Spain. Praetorian Defensive Aids Sub System (DASS) The existing Praetorian DASS equips the Typhoon with protection from threats including Infra-Red (IR or heat-seeking) and radar-guided missiles. Integrated sensors and jamming equipment also provide situational awareness and a digital stealth capability, achieved through advanced electronic deception techniques. The system has protected crews for over 20 years, including on peace-keeping operations in Libya and Syria. However, the Typhoon’s traditional position of air dominance could face threats in the future from the rapidly evolving nature of air and surface threats such as Integrated Air Defense Systems (IADS). Praetorian Evolution is the proposed roadmap to ensure the Typhoon retains its world-class level of protection for decades to come. Electronic Warfare and combat ISR functions Praetorian Evolution’s all-digital architecture will ensure ease of future upgrades, while life cycle costs will be optimized Praetorian Evolution will also look beyond the traditional protective role of DASS. In the future battlespace, the role of Typhoon will evolve and its DASS will need to do more to keep the fighter at the heart of the future fleet mix, alongside 5th generation and future platforms. Praetorian Evolution will propose a number of advanced new capabilities including multi-platform Electronic Warfare and combat ISR functions such as high-precision targeting and advanced combat ID. As Praetorian evolves to meet these future requirements, the EuroDASS partners recognize that value-for-money must be at the heart of this fundamental upgrade. Praetorian Evolution’s all-digital architecture will ensure ease of future upgrades, while life cycle costs will be optimized. This will also be an opportunity to take advantage of the latest hardware advances to increase the reliability and reduced integrated logistics support requirements. Praetorian Long Term Evolution (LTE) The launch follows the announcement earlier this year of the ‘Praetorian Long Term Evolution (LTE)’ study, which will feed into the Praetorian Evolution roadmap by delivering options for long-term technical solutions and enablers which will sustain the growth path of the platform in the future.
Insider threat programs started with counter-espionage cases in the government. Today, insider threat programs have become a more common practice in all industries, as companies understand the risks associated with not having one. To build a program, you must first understand what an insider threat is. An insider threat is an employee, contractor, visitor or other insider who have been granted physical or logical access to a company that can cause extensive damage. Damage ranges from emotional or physical injury, to personnel, financial and reputational loss to data loss/manipulation or destruction of assets. Financial and confidential information While malicious insiders only make up 22% of the threats, they have the most impact on an organization Most threats are derived from the accidental insider. For example, it’s the person who is working on a competitive sales pitch on an airplane and is plugging in financial and confidential information. They are working hard, yet their company’s information is exposed to everyone around them. Another type of insider, the compromised insider, is the person who accidentally downloaded malware when clicking on a fake, urgent email, exposing their information. Malicious insiders cause the greatest concerns. These are the rogue employees who may feel threatened. They may turn violent or take action to damage the company. Or you have the criminal actor employees who are truly malicious and have been hired or bribed by another company to gather intel. Their goal is to gather data and assets to cause damage for a specific purpose. While malicious insiders only make up 22% of the threats, they have the most impact on an organization. They can cause brand and financial damage, along with physical and mental damage. Insider threat program Once you determine you need an insider threat program, you need to build a business case and support it with requirements. Depending on your industry, you can start with regulatory requirements such as HIPAA, NERC CIP, PCI, etc. Talk to your regulator and get their input. Everyone needs to be onboard, understand the intricacies of enacting a program Next, get a top to bottom risk assessment to learn your organization’s risks. A risk assessment will help you prioritize your risks and provide recommendations about what you need to include in your program. Begin by meeting with senior leadership, including your CEO to discuss expectations. Creating an insider threat program will change the company culture, and the CEO must understand the gravity of his/her decision before moving forward. Everyone needs to be onboard, understand the intricacies of enacting a program and support it before its implemented. Determining the level of monitoring The size and complexity of your company will determine the type of program needed. One size does not fit all. It will determine what technologies are required and how much personnel is needed to execute the program. The company must determine what level of monitoring is needed to meet their goals. After the leadership team decides, form a steering committee that includes someone from legal, HR and IT. Other departments can join as necessary. This team sets up the structure, lays out the plan, determines the budget and what type of technologies are needed. For small companies, the best value is education. Educate your employees about the program, build the culture and promote awareness. Teach employees about the behaviors you are looking for and how to report them. Behavioral analysis software Every company is different and you need to determine what will gain employee support The steering committee will need to decide what is out of scope. Every company is different and you need to determine what will gain employee support. The tools put in place cannot monitor employee productivity (web surfing). That is out of scope and will disrupt the company culture. What technology does your organization need to detect insider threats? Organizations need software solutions that monitor, aggregate and analyze data to identify potential threats. Behavioral analysis software looks at patterns of behavior and identifies anomalies. Use business intelligence/data analytics solutions to solve this challenge. This solution learns the normal behavior of people and notifies security staff when behavior changes. This is done by setting a set risk score. Once the score crosses a determined threshold, an alert is triggered. Case and incident management tools Predictive analytics technology reviews behaviors and identifies sensitive areas of companies (pharmacies, server rooms) or files (HR, finance, development). If it sees anomalous behavior, it can predict behaviours. It can determine if someone is going to take data. It helps companies take steps to get ahead of bad behavior. If an employee sends hostile emails, they are picked up and an alert is triggered User sentiment detection software can work in real time. If an employee sends hostile emails, they are picked up and an alert is triggered. The SOC and HR are notified and security dispatched. Depending on how a company has this process set-up, it could potentially save lives. Now that your organization has all this data, how do you pull it together? Case and incident management tools can pool data points and create threat dashboards. Cyber detection system with access control An integrated security system is recommended to be successful. It will eliminate bubbles and share data to see real-time patterns. If HR, security and compliance departments are doing investigations, they can consolidate systems into the same tool to have better data aggregation. Companies can link their IT/cyber detection system with access control. Deploying a true, integrated, open system provides a better insider threat program. Big companies should invest in trained counterintelligence investigators to operate the program. They can help identify the sensitive areas, identify who the people are that have the most access to them, or are in a position to do the greatest amount of harm to the company and who to put mitigation plans around to protect them. They also run the investigations. Potential risky behavior Using the right technology along with thorough processes will result in a successful program You need to detect which individuals are interacting with information systems that pose the greatest potential risk. You need to rapidly and thoroughly understand the user’s potential risky behavior and the context around it. Context is important. You need to decide what to investigate and make it clear to employees. Otherwise you will create a negative culture at your company. Develop a security-aware culture. Involve the crowd. Get an app so if someone sees something they can say something. IT should not run the insider threat program. IT is the most privileged department in an organization. If something goes wrong with an IT person, they have the most ability to do harm and cover their tracks. They need to be an important partner, but don’t let them have ownership and don’t let their administrators have access. Educating your employees and creating a positive culture around an insider threat program takes time and patience. Using the right technology along with thorough processes will result in a successful program. It’s okay to start small and build.
Global and domestic threats have highlighted the need for tighter security across all verticals. One of the technologies that has redefined situational awareness and intrusion detection is thermal imaging. Once a technology exclusively manufactured for the military operations, thermal cameras today are deployed across hundreds of security applications and continue to see strong demand in existing and emerging commercial markets. With thermal technology, security personnel can see in complete darkness as well as in light fog, smoke and rain Technology Overview And Early Adoption What distinguishes thermal cameras from optical sensors is their ability to produce images based on infrared energy, or heat, rather than light. By measuring the heat signatures of all objects and capturing minute differences between them, thermal cameras produce clear, sharp video despite unfavorable environmental conditions. With thermal technology, security personnel can see in complete darkness as well as in light fog, smoke and rain. Originally a military developed, commercially qualified technology, the first thermal cameras for military and aircraft use appeared in the 1950s. By the 1960s, the technology had been declassified and the first thermal camera for commercial use was introduced. However, it wasn’t until the late 1990s - when FLIR Systems introduced a camera with an uncooled thermal detector - when the technology began to see substantial adoption beyond government defense deployments. Installations At Critical Infrastructure Sites In the 2000s, industrial companies were some of the first adopters of thermal, using the technology for predictive maintenance to monitor overheating and machine malfunctions. In the years following the September 11 terrorist attacks in 2001, there was an increase in thermal camera installations across critical infrastructure sites. Stricter security requirements drove the deployment of thermal cameras for perimeter protection, especially in the nuclear power sector. Thermal cameras produce clear video in daylight, low light or no light scenarios and their sharp images result in higher performing analytics In 2010, the U.S. Nuclear Regulatory Committee released its 73.55 policy, which states nuclear facilities must “provide continuous surveillance, observation and monitoring” as a means to enhance threat detection and deterrence efforts onsite. Because thermal cameras produce clear video in daylight, low light or no light scenarios and because their sharp images result in higher performing analytics, thermal cameras quickly became the preferred option for nuclear facilities. Likewise, following the 2013 sniper attack on PG&E Corporation’s Metcalf transmission substation, the Federal Energy Regulation Commission introduced the Critical Infrastructure Protection Standard 014 (CIP-014). The policy requires utilities to identify threats to mission critical assets and implement a security system to mitigate those risks. This statute also led to more thermal installations in the utility sector as thermal cameras’ long-range capabilities are ideal for detection of approaching targets beyond the fence line. The demand from both industrial and critical infrastructure entities, as well as other factors, helped drive volume production and price reduction for thermal, making the technology more accessible to the commercial security marketplace. Commercial Applications In recent years, the increasing affordability of thermal cameras along with the introduction of new thermal offerings has opened the door to new commercial applications for the technology. In the past, thermal cameras were designed for applications with enormous perimeters, where the camera needed to detect a human from 700 meters away. Locations like car dealerships, marinas and construction supply facilities can be protected by precise target detection, thermal analytic cameras providing an early warning to security personnel Today, there are thermal cameras specifically designed for short- to mid-range applications. Developed for small to medium enterprises, these thermal cameras ensure property size and security funds are no longer barriers to adoption. Lumber yards, recreation fields and sports arenas are some of the commercial applications now able to implement thermal cameras for 24-hour monitoring and intrusion detection. Affordable thermal cameras with onboard analytics have become attractive options for commercial businesses Innovation And Advancements Innovation and advancements in the core technology have also spurred growth in thermal camera deployment, providing faster image processing, higher resolution, greater video analytic capabilities and better camera performance. In particular, affordable thermal cameras with onboard analytics have become attractive options for commercial businesses that need outdoor, wide area protection. Car dealerships, marinas and construction supply locations all store valuable merchandise and materials outside. Without protection, these assets are vulnerable to vandalism and theft. However, by providing precise target detection, thermal analytic cameras provide an early warning to security personnel so that they can intervene before a crime is committed. By helping to deter just one incident, the thermal solution delivers a clear ROI. New Market Opportunities Not only are there more thermal cameras in use today than ever before, but there are also more thermal sensors being integrated with other multi-sensor systems, driving the adoption of thermal in new markets. For large perimeter surveillance applications, thermal is repeatedly being integrated with radar and drones to expand situational awareness beyond the point of fixed cameras. Users get immediate, accurate alerts of approaching targets and evidentiary class video for target assessment In the commercial market, thermal imagers are combined with optical sensors, analytics and LED illuminators into one solution that integrates with central monitoring station platforms. By bringing these technologies together, users get immediate, accurate alerts of approaching targets and evidentiary class video for target assessment. The result is a lower number of false positives, reducing the total cost of ownership for the solution. These multi-sensor solutions also feature two-way audio capabilities, which enable remote security officers to act as “virtual guards” and speak to intruders in real-time to dissuade them from illegal activity. The introduction of solutions that integrate all these state-of-the-art technologies under one unit reduces the amount of capital and infrastructure needed for deployment. Consequently, more small businesses and alarm monitoring companies can implement advanced perimeter security technologies like thermal sensors, some for the very first time. Thermal cameras have gone from military defense devices to widespread commercial security cameras Multi-Sensor Thermal Solutions Multi-sensor solutions featuring thermal are quickly gaining traction and opening the door to new business opportunities for the security channel. One of the primary reasons for the strong market interest in these systems is they enable integrators to increase their recurring monthly revenue (RMR). With intense price competition and eroding margins on CCTV equipment, integrators have to rely on RMR to grow their businesses. Offering remote video monitoring services and virtual guarding technologies is one of the best ways to do so. Additionally, there is a clear demand for it. Central stations are continually looking for new technologies to offer their customers and businesses are interested in economical alternatives to physical guards. In conclusion, thermal cameras have gone from military defense devices to widespread commercial security cameras that are a substantial segment of the outdoor security protection market. From nuclear power plants to construction locations, thermal technology is being implemented to secure sites around the globe.
Governments and corporations face crisis events every day. An active shooter terrorizes a campus. A cyber extortionist holds a city for ransom. A hurricane washes away a key manufacturing facility. Not all critical events rise to the level of these catastrophic emergencies, but a late or inadequate response to even a minor incident can put people, operations and reputations at risk. Effective Response Plan In 2015, for example, the City of Boston experienced several record-breaking snowstorms that forced the city to close the subway system for three days. The extreme decision cost the state $265 million per day and was largely attributed to a lack of preparation and an inadequate response plan by the transportation department. The reputation of the head of the transportation department was so damaged by the decision she was forced to resign. Being able to better predict how the storms would impact the subway system’s aging infrastructure – and having a more effective response plan in place – could have saved the state hundreds of millions of dollars (not to mention the transit chief’s job). A comprehensive critical event management strategy begins before the impact of an event is felt and continues after the immediate crisis has ended. This full lifecycle strategy can be broken into four distinct phases – Assess, Locate, Act and Analyze. Assessing Threats For Prevention Security teams might have complained about not having enough intelligence data to make accurate predictionsIdentifying a threat before it reaches critical mass and understanding how it might impact vital assets is the most difficult challenge facing security professionals. In the past, security teams might have complained about not having enough intelligence data to make accurate predictions. Today, the exact opposite might be true – there is too much data! With crime and incident data coming from law enforcement agencies, photos and videos coming from people on the front line, topics trending on social media and logistical information originating from internal systems it can be almost impossible to locate a real signal among all the noise and chatter. Being able to easily visualize all this intelligence data within the context of an organization’s assets is vital to understand the relationship between threat data and the individuals or facilities in harm’s way. Social Media Monitoring Free tools like Google Maps or satellite imagery from organizations like AccuWeather, for example, can help understand how fast a storm is closing in on a manufacturing facility, or how close an active shooter is to a school. Their usefulness, however, is limited to a few event types and they provide only a very macro view of the crisis. Data from building access systems, wifi hotspots, corporate travel systems, among others, can be used to create a profile Critical event management (CEM) platforms, however, are designed specifically to manage critical events of all types and provide much greater visibility. Internal and external data sources (weather, local and national emergency management, social media monitoring software, security cameras, etc.) are integrated into these platforms and their data is visualised on a threat map. Security teams can quickly see if there are actual threats to the organizations or communities they are protecting and don’t lose time trying to make sense of intelligence reports. The more they can see on a ‘single pane of glass,’ the faster they can initiate the appropriate response. Locating A Threat Once a threat has been deemed a critical event, the next step is to find the people who might be impacted – employees/residents in danger, first responders and key stakeholders (e.g., senior executives or elected officials who need status updates). Often, this requires someone on the security team to access an HR contact database and initiate a call tree to contact each person individually, in a specific hierarchical order. This can be a time-consuming and opaque process. There is no information on the proximity of that person to the critical event, or if a person has skills such as CPR that could aid in the response. Ensuring ahead of time that certifications, skill sets, or on-call availability is included with contact information can save valuable time in the middle of a crisis response. Going even further, data from building access systems, wifi hotspots, corporate travel systems, among others, can be used to create a profile of where a person just was and where he or she might be going in a CEM platform. This information can be visualized on the threat map and help determine who is actually in danger and who can respond the fastest. The emergency response then becomes targeted and more effective. Security teams can quickly see if there are actual threats to the organizations or communities they are protecting Acting And Automating The third step is to act and automate processes. If there is a tornado closing in on a town, for example, residents should not have to wait for manual intervention before a siren is activated or a message sent out. Organizations can build and execute their standing operating procedures (SOPs) fully within a CEM platform. Sirens, alarms, digital signs and messages can all be automatically activated based on event type, severity and location. Using the tornado example, an integration with a weather forecasting service could trigger the command to issue a tornado warning for a specific community if it is in the path of the storm. Summon Security Guards Warning messages can be prepared in advance based on event type so there is no chance of issuing a misleading or unclear alert Warning messages can be prepared in advance based on event type so there is no chance of issuing a misleading or unclear alert. All communications with impacted individuals can be centralized within the platform and automated based on SOP protocols. This also includes inbound communications from first responders and impacted individuals. An employee confronted by an assailant in a parking garage could initiate an SOS alert from his or her mobile phone that would automatically summon security guards to the scene. Conference lines can also be instantly created to enable collaboration and speed response time. Additionally, escalation policies are automatically engaged if a protocol is broken. For example, during an IT outage, if the primary network engineer does not respond in two minutes, a designated backup is automatically summoned. Eliminating manual steps from SOPs reduces the chance for human error and increases the speed and effectiveness of critical event responses. Analysis Of A Threat Looking for ways to better prepare and respond to critical events will not only improve performance when similar events occur again It’s not uncommon for security and response teams to think that a critical event is over once the immediate crisis has ended. After all, they are often the ones pushing themselves to exhaustion and sometimes risking life and limb to protect their neighbours, colleagues, community reputations and company brands. They need and deserve a rest. In the aftermath of a critical event, however, it’s important to review the effectiveness of the response and look for ways to drive improvements. Which tasks took too long? What resources were missing? How many times did people respond quickly? With a CEM platform, team performance, operational response, benchmarking data and notification analysis are all captured within the system and are available in a configurable dashboard or in after-action reports for analysis. Continuously looking for ways to better prepare and respond to critical events will not only improve performance when similar events occur again, but it will also improve response effectiveness when unforeseen events strike. Coordinate Emergency Response Virtually every organization has some form of response plan to triage a critical event and restore community order or business operations. While many of these plans are highly effective in providing a structure to command and coordinate emergency response, they are reactive in nature and don’t account for the full lifecycle of a critical event – Assess, Locate, Act and Analyze. Whether it’s a large-scale regional emergency or a daily operational issue such as an IT outage, a comprehensive critical event management strategy will minimize the impact by improving visibility, collaboration and response.
The UK Government has been working to reduce the risks associated with illegal drone use since a high-profile incident at UK’s Gatwick Airport in December 2018, when a drone sighting triggered a three-day shutdown of the UK’s second busiest airport, disrupting the travel plans of 140,000 people and affecting 1,000 flights. To address growing security threats by drones, the UK Government has released its ‘Counter-Unmanned Aircraft Strategy’. ‘Counter-Unmanned Aircraft Strategy’ This strategy sets out our approach to countering the threat the malicious or negligent use of drones can bring" “This strategy sets out our approach to countering the threat the malicious or negligent use of drones can bring,” says Brandon Lewis, the U.K. Minister of State for Security. “It will provide the security the public and drone users require to continue to enjoy the benefits of leisure and commercial drone use and facilitate the growth of the drone industry.” “Given the challenge posed by rapid advances in drone technology and the potential threat, the strategy will provide overarching direction to our efforts,” says Lewis. The strategy focuses on ‘small drones’, those weighing less than 20 kg (44 pounds). Countering malicious use of aerial drones The UK Counter-Unmanned Aircraft Strategy centers on mitigating the highest-harm domestic risks resulting from malicious use of aerial drones. They are: Facilitating terrorist attacks, such as modifying commercially-available drones to conduct reconnaissance or attacks. Facilitating crime, especially in prisons, where drones are currently used to deliver contraband. Disrupting critical national infrastructure, such as airports, where a malicious incursion using a drone can have serious safety, security and economic consequences. Potential use by hostile state actors. Maximizing benefits of drone technology The initiative will also look to build strong relationships with industry to ensure high security standards Over the next three years, the strategy will seek to reduce the risks posed by the highest-harm use of drones while maximizing the benefits of drone technology. It will develop a comprehensive understanding of evolving risks and take a “full spectrum” approach to deter, detect and disrupt the misuse of drones. The initiative will also look to build strong relationships with industry to ensure high security standards. Further, promoting access to counter-drone capabilities and effective legislation, training and guidance will empower the police and other operational responders. Tactical response to drone-based threats Because technology is rapidly evolving, the response needs to keep pace, according to the strategy document. Lewis adds, “We will therefore work to understand how drone-based threats might evolve in the future, both at the tactical and strategic levels.” The strategy will be to build an end-to-end approach to tackling the highest-harm criminal use of drones. It will also work to make it easier to identify malicious drone use against a backdrop of increased legitimate use. Legal drone operators will be required to register with the Civil Aviation Authority (CAA) and to pass an online competency test before flying a drone. Retailers who follow a specific set of safety guidelines when selling drones will be designated ‘DroneSafe’. Unmanned traffic management system The government is working toward future implementation of an unmanned traffic management (UTM) system, which provides a means of preventing collisions between unmanned aircraft and other manned or unmanned aircraft. The current strategy includes early planning for the system. An Industry Action Group will ensure a continuing relationship with the drone industry and help to improve existing counter-drone measures and identify new opportunities, such as use of ‘Geo-Fencing’ to restrict drones from flying in certain areas. Regulating commercial and domestic drones The UK Department of Transport is responsible for safe and lawful use of drones within the UK airspace The strategy will seek to communicate the UK’s security requirements to the counter-drone industry and to encourage a thriving sector that is aware of, and responsive to, the needs of government. Regulating drones is the responsibility of two UK government departments. The UK Department of Transport is responsible for safe and lawful use of drones within the UK airspace, while the Home Office has overall responsibility for domestic counter-drone activity. Fast-evolving drone and counter-drone technology Also, the Center for the Protection of National Infrastructure (CPNI) has been involved in reducing the vulnerability of sensitive sites, including airports. New performance measures will track the strategy’s success. Due to the fast-evolving nature of drone and counter-drone technology, the intent is to review and, if necessary, refresh the strategy in three years.
As the deal/no deal prospects of Brexit are tossed in a whirlwind of UK and EU politics, the uncertainty of the back-and-forth has broadly impacted general economic trends, and by extension, the physical security market. The new deadline for a Brexit agreement is October 31, already postponed six months from the scheduled April 12 departure date. Numbers show that Britain’s GDP shrank in the second quarter, possibly reflecting fewer exports because of Brexit uncertainty. And beyond the current indecision lies the long-term impact of a possible change in trading status between the United Kingdom and continental Europe. Other issues include capital flow and labor mobility. Brexit uncertainty leading to security concerns Loss of shared information with the EU will make the UK less safe “Companies … are unclear about their future,” comments Martin Warren of the Institute of Chartered Accountants in England and Wales. “Companies are making decisions now about jobs, supply chains, headquarters and asset locations, incurring significant, and possibly unnecessary, cost and upheaval.” Warren fears the destructive effects of a ‘no deal’ outcome and hopes politicians will break the deadlock and restore business confidence. Security implications of Brexit extend beyond economics. Loss of shared information with the EU will make the UK less safe. Extradition across EU borders will be more difficult, and exchange of data such as fingerprints and vehicle registrations is at risk. The Irish border after Brexit is of particular concern to security professionals. Countering threat of international terrorism Robert Hall of London First and Alison Wakefield of Security Institute say the security impact of departing the EU will be long lasting and profound. “In security terms, the UK will still have to contend with international terrorism, transnational crime and the global movement of people, all challenges that require wide scale cooperation.” They add that leaving the EU will require “a significant investment in people, resources and databases to cope with the anticipated volumes of traffic through ports, airports and tunnels.” Analyst company IHS Markit earlier commented about the impact on the security industry of Brexit’s drag on the UK economy, “Access control, intruder and fire alarm markets typically track construction rates closely and are forecast to be affected most. However, a large cut to infrastructure spending would be just as damaging to the video surveillance market.” UK security companies Prefer ‘soft exit’ from EU If a ‘soft exit’ trade deal is not negotiated, the UK would have to revert to WTO trade rules If a ‘soft exit’ trade deal is not negotiated, the UK would have to revert to World Trade Organization (WTO) trade rules, which means tariffs on trade between the UK and the EU, says IHS Markit. There are five British-based access-control and intruder-alarm vendors supplying the European market in significant quantity – each with revenue exceeding $10 million. IHS Markit estimates these companies combined account for less than 10 percent of total European, Middle-Eastern and African (EMEA) market revenues for both industries. Uncertain future of UK security marketplace Asset protection specialist VPS Security Services has warned that the ongoing Brexit saga will likely lead to a rise in vacant commercial and residential properties as developers and investors are more reluctant to move forward with their UK real estate strategies. Seemingly endless machinations and shifting proposals are making the eventual outcome of Brexit very much a guessing game. Uncertainty translates into a volatile and changing outlook, and the eventual impact on the broader economy is an open question. As a reflection of that economy, the security marketplace will inevitably feel the economic impact, too, not to mention the new security challenges likely to ensue.
According to the reports of not-for-profit organization Gun Violence Archive, the year 2018 saw 323 mass shooting incidents as of November. This number is 346 for the year 2017 and 382 for 2016, with ‘mass shooting’ defined as cases where four or more people are shot or killed in the same time period and location. A variety of gunfire detection solutions and other technology approaches seek to address the problem. ShotSpotter SiteSecure and ShotSpotter SecureCampus provide critical outdoor infrastructure protection against active shooter attacks. SiteSecure delivers critical information such as the number of shots fired, a detailed map of the airport or transportation facility, with the shooting location clearly identified. SiteSecure also provides law enforcement and transportation facility management with real-time information that can be useful to identify and address false alarms and reduce mass panic. Gunfire detection and precise shooter location Designed for college campuses and K-12 schools, ShotSpotter SecureCampus provides gunfire detectionShotSpotter SecureCampus solution is a gunfire detection system designed to provide outdoor coverage at university and school campuses. Designed for college campuses and K-12 schools, SST SecureCampus provides gunfire detection, precise location, and number of shooters to first responders and school personnel, enabling faster response to an incident. Data capture form to appear here! Gunshot detection can offer tremendous benefits in mitigating active shooting incidents occurring in a public facility or commercial environment. Data shows that active shooter attacks often begin outside a building and then progress indoors. Thus, the first line of defense for security professionals lies outside a facility, in a zone of protection surrounding it or comprising the entire outdoor area of a larger facility of many buildings. audio solutions for perimeter security Video cameras are effective surveillance tools in the event of a shooting incident, but they are not able to capture everything. Deploying audio solutions can automatically flag incidents not caught on camera, as well as alert central station guards of what surveillance zones need to be closely monitored. Audio analytics solutions for aggression and gunshot detection are some of the best security tools in the security market when it comes to detection, intervention and deterrence. They are the next generation of monitoring; equipping security teams with critical information and enhancing perimeter security. End users can identify high-risk situations in real-time and prevent acts of physical aggression before they happen Aggression detectors are capable of accurately recognizing duress in a person’s voice. The software automatically and objectively detects the presence of rising human aggression, anger or fear, and subsequently warns staff by a visual alert or alarm trigger. As a result, end users can identify high-risk situations in real-time and prevent acts of physical aggression before they happen. Artificial intelligence to detect weapons A gunshot detector recognizes firearm discharge from various firearms in different settings. Within seconds of a gunshot, the software accurately classifies and triggers an immediate notification through a designated VMS. Security staff can then verify the alert, effectively reducing the reaction time of first responders. With the development of artificial intelligence (AI) in object recognition, AI weapons detection offers an efficient alternative to gunshot detection to prevent active shooting: AI can visually detect guns based on their shapes before they are fired. The AI is trained to recognize firearms in different shapes, sizes, colors, and at different angles in videos, so that the AI weapon detector can be deployed with existing camera systems, analyze the video feeds, and instantly notify security staff when a gun is spotted. Audio analytics, processed inside a video camera, are another approach that can quickly pinpoint zones that security staff should focus on, which can dramatically shorten response times to incidents. Audio-derived data also provides a secondary layer of verification that an event is taking place which can help prioritize responses from police and emergency personnel. Detecting audio levels and alerting operators Operators can be notified of abnormal situations via event signals allowing the operator to take suitable measuresThe first job of a well-configured camera or camera/mic pair is to detect sounds of interest while rejecting ancillary sounds and noise below a preset threshold. Each camera must be custom-configured for its particular environment to detect audio levels which exceed a user-defined level. Since audio levels are typically greater in abnormal situations, any audio levels exceeding the baseline set levels are detected as being a potential security event. Operators can be notified of any abnormal situations via event signals allowing the operator to take suitable measures. Finding a baseline of background noise and setting an appropriate threshold level is the first step. Well configured audio analytics can deliver critical information about a security event, accelerating response times and providing timely details beyond video-only surveillance. Analytics take privacy concerns out of the equation and allow installers and end users to use camera audio responsibly. Hanwha Techwin's audio source classification technology, available in its X Series cameras, features three customisable settings for category, noise cancellation and detection level for optimum performance in a variety of installation environments.
Sitting on the banks of the river Niger in West Africa is Niamey, Niger’s capital city. The capital city faces some unique challenges to the safety of its local residents and visitors. To help tackle these issues, the government of Niger is working with Hikvision’s West Africa team to install a state-of-the-art, cutting-edge video surveillance solution across the region. Niamey has a history of trade and commerce. Its large and bustling open air market – the Grand Marché – sells everything from clothes, to jewelry, to food, and attracts an estimated 20,000 tourists a year. But while the city has long been known as one of the more relaxed capitals of West Africa, in recent years Niamey has received high profile attention due to criminal incidents in and around the capital city. African Union Summit The city would also receive high profile guests from around the world, including key personnel from the UN and WTO When it was announced that Niamey would host the 33rd Session of the African Union (AU) Summit for the very first time, the Government of Niger decided to seize the opportunity to establish a complete urban video surveillance network. It was vital that this high profile event could run for the full five days without any disruption or untoward incidents, as Niamey would attract visitors and heads of states from across the continent. The city would also receive high profile guests from around the world, including key personnel from the United Nations and World Trade Organization. Complete video surveillance solution Vincent Wang, Technical Support Engineer for Hikvision West Africa, says, “The AU Summit is a key event in Africa’s diary, and always requires a high security presence. It gave us the ideal springboard for launching a complete surveillance solution that would provide security to those in attendance, while giving the city a robust set of tools to help prevent and manage security incidents long into the future.” When seeking out the ideal surveillance solution for this project, the Government of Niger learned about several similar projects that Hikvision had already completed in African cities and was impressed how well the solution is running. “They wanted to emulate a project, so that’s what we set about doing.” says Vincent. Hikvision high resolution cameras Vincent and the team worked with technology partners, ITS Solutions to design a complete urban surveillance network in Niamey, which would protect residents and visitors across the whole city during the summit and beyond. Central to the solution was the installation of more than 100 Hikvision high resolution cameras for 24-hour monitoring of the city. Along the 12 main roads, and at key intersections throughout the city, the government’s security team installed the Hikvision DarkFighter 2 MP Speed Dome Cameras (DS-2DF8225IX-AEL). These cameras are designed to deliver high quality images in low light or dark environments. They are also equipped with license plate recognition technology so as to effectively identify vehicle violations, such as over speeding or other traffic rules violations, even at midnight with no light. Hikvision PanoVu Series 180° Panoramic + PTZ Cameras Security personnel can also know close-up details of the scene with the 180 degree panoramic PTZ cameras Meanwhile, Hikvision PanoVu Series 180° Panoramic + PTZ Cameras (DS-2DP0818ZIX-D/236) were installed at the entrances and exits of the main government offices and hotels, for reliable surveillance and overall protection of all visitors with panoramic view at the time of the summit event. Security personnel can also know close-up details of the scene with the 180 degree panoramic PTZ cameras. And the high speed PTZ also offers the function of fast detail positioning over the panoramic area. In the control center, security teams were given Hikvision iVMS-8600 video management software (VMS) in conjunction with large LCD monitor screens, to display a live stream from all the city’s surveillance cameras. Hikvision’s urban video security solution also includes mobile surveillance, allowing law enforcement or government officials to use a mobile device to see a live stream from any Hikvision camera installed in the city, even while on the move. Enhancing network infrastructure The installation was thoroughly planned. “The existing local infrastructure provided some challenges,” says Vincent. “But we investigated it fully during our test phase, so we could design a surveillance network to suit”. “For instance, we found a few potential issues with the local power supply, but to remedy this we installed a UPS network to guarantee power to the cameras for at least 2 hours should the grid fail. We also assessed the local network infrastructure, and the ambient lighting at night. This work was fully completed during our proof of concept several months before the summit.” Hikvision surveillance solution for smart city The African Union Summit was well received and passed without event. The Hikvision surveillance solution undoubtedly played a key role. “The people of Niger feel a certain confidence when talking about the summit,” says S.E Brigi Rafini, the Premier Ministre, at the government of Niger. “It couldn’t have happened without the support of Hikvision technology. The comprehensive security solution was central to the event’s success.” Counseil de Bureau de Securité at the Government of Niger kept positive attitude towards the future potential of this solution. “Thanks to Hikvision technology, Niamey now has a comprehensive city safety solution that will help us to both prevent crime, and respond in real time when incidents do occur. It’s a landmark project for our country and the region as a whole, and we are very interested to see how this innovative technology can help our city and our people to be safer.”
King’s College London, based in the center of London in UK, is a world-leading university and a founding college of the renowned University of London. One of the oldest universities in England, it was established by King George IV and the Duke of Wellington in 1829, receiving its Royal Charter in the same year. Campus security, access control King’s College London had been using a variety of access control products to control and manage security across its multiple campuses. Its key requirement was a standardized access control system that could operate college-wide and be scaled to include new buildings and establishments. Also, considering the college campus is based in the heart of London, the threat of terrorism and active shooter incidents is a major concern for KCL, especially in more recent times where attacks have taken place extremely close to college buildings and campus. With thousands of students and employees to protect, the need to adopt the latest security features is essential in order for the college to keep all areas secure, in particular student accommodation, high security labs and research facilities. Gallagher access control solution Gallagher’s access control products were easily integrated with King’s College’s existing systems With Gallagher technology already successfully deployed in isolation at the university’s Guy’s and Strand campuses, it made sense to select Gallagher as the access control platform of choice for the entire college. Gallagher’s access control products were easily integrated with King’s College’s existing systems, including staff and student databases, and sources for cardholder information. This included the college’s enterprise Identity Management system, called FIM, which provides daily updates on joiners, movers and leavers to allow accurate decision-making by the security team. Additionally, Gallagher products were integrated to work alongside SITS, the college’s student management system, providing rapid updates of new students so that individual ID cards can be issued once the registration process is complete. Gallagher Mobile Connect app KCL has also invested in new mobile technology, with Gallagher readers that can be accessed via a mobile phone using the Gallagher Mobile Connect app. This will allow students and staff to conveniently access designated areas, control lighting, visitor access, and more. While it is still early days for the college using this technology, the system is adaptable and provides the ability to add features that meet future requirements. The overall benefits of the Gallagher security solution deployed at King’s have proved significant. Nick O’Donnell, Director of Estates and Facilities at King’s College London, says the Gallagher solution “improves service to King’s College’s facility users, especially its students, and reduces the college’s reputational risk by removing technical barriers to comprehensive security management.” Streamlining multiple security systems Streamlining the differing security systems used by individual campuses by introducing a college-wide standardized system has highlighted many additional advantages, including a considerable reduction in costs for training, special projects and operator skills. Gallagher integrations allow extra security features to connect to Gallagher Command Center Gallagher integrations allow extra security features to connect to Gallagher Command Center, creating a central administration system that keeps things simple to manage. Integrating with Aperio, for example, ensures doors are locked when people leave the room – providing peace of mind that rooms won’t be accidentally left open over night or during the weekend. Student and staff ID management Gallagher’s proven technology has boosted King’s College’s confidence in its electronic system. When there are alerts, the university’s security services can consult a single system and react quickly. Card holders are also now registered on one system, allowing tighter management of passes. Overall, the college reports fewer system failures, with better decision-making between its numerous estates and libraries, while multi-site students, staff and visitors have experienced easier card management.
There is a saying that ‘Everything is Bigger in Texas’, and the Dallas, Texas police department is no exception. The city of Dallas is ranked in the top 10 cities in the U.S. in terms of population, at 1.2 million people. The Dallas Police Department is the ninth largest municipal police force in the U.S., based on 3,012 sworn officers. It is led by Chief of Police, U. Reneé Hall. The department is located in the Jack Evans Police Headquarters building, which was built in 2003. It is 358,000 square feet, has six floors, is spread over a three-acre site, has a separate 1,200 car parking garage and a two-acre, open parking lot for additional visitor parking. Prior to 2003, the department was housed in the circa 1914 former City Hall Building. Preventing terrorist attack and hazards Police officials worked with a Police Design Consultant to help design the building to resist terrorist attacksThe Jack Evans Police Headquarters building was under construction when 9/11 terrorists flew airplanes into the World Trade Buildings in New York. That event was preceded by the Oklahoma City Murrah Federal Building bombing in April 1995. Therefore, security was a concern in its design. Police officials worked with a Police Design Consultant – McClaren, Wilson, and Lawrie Architects of Phoenix – to help design the building to resist a terrorist attack and isolate potential hazards. The building also needed to control visitor traffic and access. On an average month, there are 5,000 public visitors to the Jack Evans building. In addition, shots fired at police buildings nationally are not uncommon, says Paul M. Schuster, Senior Corporal/Facilities Management for the Dallas Police Department. Ready to anticipate dangerous crimes “For the most part they are random, single shot drive-by shootings. Often, the officers are unaware that the building has been shot at, until they find a bullet hole in the brick or glass. Increasingly, police tend to be a symbol of government and some citizens see that as a visible target to lash out at. Police officers are trained to expect the routine types of calls, such as domestic violence, traffic accidents, and other crimes. Yet they must be flexible to anticipate the non-routine that can be dangerous and change in a heartbeat.” On June 13, 2015, after midnight, a 35-year-old male placed a duffle bag with a remote-controlled bomb to detonate later between cars in the parking lot of the headquarters building. The suspect then began shooting continuously at the lobby windows. Officers responded to the scene, a vehicle chase began, and the incident ended outside the city. Luckily officers in the lobby took cover and were not injured. Conducting building security assessment The assessment included testing various construction materials for bullet resistance to various types of weaponsFollowing that incident, the Dallas Police Department conducted a security assessment of the building and also at seven patrol stations throughout the city. The assessment included testing various construction materials for bullet resistance to various types of weapons. Gensler Architects and Guidepost Solutions, LLC developed the solutions and plans. “Yesterday we were concerned about handguns, today we are worried about rifles, and the idea of terrorism is always present with outright attack or bombs,” Schuster notes. “The police officers and police staff only want a place that is safe and where they can do their good work.” Funding of $1.3 million was approved to upgrade the lobbies of the seven patrol stations to withstand rifle rounds, and $1.9 million to improve headquarters lobby security, and to upgrade an aging security system. Turner Construction Company and Convergint Technologies, LLC conducted the renovations and security technology integration. Challenges in upgrading lobby security Visitors were allowed free entry into the lobby and were only screened in an open area to the side if going to other floorsThe headquarters’ lobby was initially designed as a two-story glass-walled structure, with an information desk and public records service windows. Visitors were allowed free entry into the lobby and were only screened in an open area to the side if going to other floors. “The challenge in upgrading lobby security was the two-story lobby entrance glass. The glass was not bullet rated, due to budget constraints. Changing the front of the building to support ballistic rifle-rated glass would have caused extensive time, exposed the inside of the lobby to weather, and would not have solved all of the security issues,” Schuster says. “In addition, there were concerns about keeping an ‘open’ and friendly service concept in mind and ensuring that the lobby would not resemble a ‘fortress’,” Schuster notes. Bullet-rated glass and bullet resistant wall The solution was to keep the existing exterior unchanged and focus on adding a layer of security once a person enters the lobby. Visitors now enter the headquarters and immediately proceed to a side room where security screening is conducted. Once inside the screening room, the visitor has belongings x-rayed, and they walk through a metal detector A new secondary wall with bullet-rated glass and solid bullet resistant wall materials was constructed inside the lobby to channel visitors to the room. Once inside the screening room, which also has bullet resistant walls, the visitor has belongings x-rayed, and they walk through a metal detector. In the event that anyone was to produce a gun and begin shooting, the incident could be contained inside that room. Tourlock 180+90 security revolving door Once a visitor has been cleared, they proceed into the main lobby via a Boon Edam Tourlock 180+90 security revolving door. This automatic, four-wing door is the most advanced, security revolving door in the Boon Edam product range that offers maximum throughput, allowing users to enter and leave the building simultaneously. In the event that a large number of persons try to force their way into the facility, the Tourlock 180+90 will determine that more than one person is trying to enter and will reject the person and lock out any others from entering. Once a visitor is ready to leave the lobby and exit the building, they pass through another Boon Edam Tourlock 180+90 that leads to a vestibule with exterior swinging doors. In the event that someone tries to go back into the lobby from the front vestibule area, without going through the security screening room, the Tourlock security revolving door will reject their entry. Preventing tailgating and piggybacking The Boon Edam security revolving doors accurately prevent both tailgating and piggybackingThe Jack Evans Headquarters security upgrades for the lobby improved security and still kept the best aspects of the lobby design, including the antique police car, and the overhead police helicopter. The Boon Edam security revolving doors accurately prevent both tailgating and piggybacking, and provide the department with maximum security while controlling traffic flow. “While it would be great to have a building totally open to the public and then add security as needed, such is not the world we live in anymore,” Schuster adds. Future security plans include exterior site security upgrades to the patrol stations and the headquarters to include security fencing with card access controls for fleet and employee vehicles at each of the sites.
Everbridge, Inc., the global pioneer in critical event management, announced that it has been awarded a multi-year contract to support the deployment of Australia’s next-generation national early warning system. In combination with Australia’s major telecommunications companies, the Everbridge Public Warning solution will be used to power Emergency Alert in Australia, providing population-wide alerting to help reach the country’s over 25 million residents and approximately 9 million annual visitors. If residing within an area where a sudden, critical event occurs such as fire, extreme weather or a terror attack, residents and visitors to Australia will receive location-based SMS notifications on their mobile phones, in addition to smart phone mobile app notifications and fixed line voice alerts, among other modalities. Supports first responder communications Everbridge Public Warning leverages telecom infrastructure to reach everyone within a geographic areaEverbridge Public Warning leverages existing telecom infrastructure, with no opt-in required, to reach everyone within a geographic area to reduce disaster risk, support first responder communications, and analyze disaster communication effectiveness for subsequent mitigation activities. “Our Public Warning solution enables government organizations and public safety agencies to immediately connect with every person in an affected area during a critical event regardless of nationality, residency or mobile telephone handset type,” said Jaime Ellertson, Chief Executive Officer and Chairman of Everbridge. “Australia has served as a model example for population-wide alerting and emergency preparedness over the past decade, and we are honored to support them on the evolution of their national system.” The next-generation system is scheduled to become operational in 2020.
Round table discussion
Public spaces provide soft targets and are often the sites of terrorist or active shooter attacks. Public spaces, by definition, require easy accessibility and unrestricted movement. Given that openness, what security technologies can provide real results? We asked this week’s Expert Panel Roundtable: How is technology innovation impacting the security of public spaces?
Statistically speaking, incidents of terrorism are unlikely to impact most businesses and institutions. However, the mere possibility of worst-case-scenario attacks is enough to keep security professionals awake at night. Compounding the collective anxiety is the minute-by-minute media coverage when an attack does occur. The immediacy of the shared experience of global tragedy impacts us all – including security system decision-makers. We asked this week’s Expert Panel Roundtable: How is the rise in terrorism impacting the physical security market?
When security topics become a part of current events, it is usually in a negative light. Security generally only becomes news when it fails, sometimes in a dramatic, high profile and tragic way. However, security failures can also shed light on lessons learned and opportunities to improve. Working toward better security can translate into the purchase of more goods and equipment supplied by our market. For additional insights into the intersection of security and current events, we asked this week’s Expert Panel Roundtable: Good news or bad news? How do news reports and/or current events influence the general public’s opinion of physical security?