ASIS International, the globally renowned association for security management professionals, has announced that General Stan McChrystal, US Army (RET), will present a Global Security Exchange Plus (GSX+) keynote address on Military & Law Enforcement Appreciation Day at GSX+. The presentation, titled Leading in a New World, will take place on Wednesday, 23 September. Global Security Exchange Plus “GSX+ offers a unique opportunity to share the insights and guidance from global thought...
Today’s market wants access control systems that are always available, scalable, and integrated with other security solutions like video and intrusion systems to ensure the highest security and safety levels. At the same time, these systems must be easy to configure and use. With the introduction of the Access Management System 3.0, Bosch meets all of these requirements. Always available for security Access Management System 3.0 is designed to be available at all times. Its resilient des...
Everbridge Inc., the global provider in critical event management (CEM), announced that Siemens, one of the world’s producers of energy efficient technologies and #62 on the 2020 Forbes Global 2000, will adopt the Everbridge CEM Platform to help protect Siemens’ workforce and operations against critical events of all kinds, from the COVID-19 pandemic and political unrest to sudden economic changes and more. The two companies have also formed a technology alliance in which Siemens wi...
Hundreds of thousands of priceless artifacts in several Iraqi museums have been protected from the threat of theft and looting by marking them with SmartWater’s unique invisible code. Unique invisible code Funded by the British Council, approximately 273,000 artifacts held in Iraqi museums have been protected using this new approach. Priceless objects can be traced back to the site they were stolen from, making it easier for law enforcement agencies to prove theft, thereby creating a pow...
The Security Industry Association (SIA), the trade association representing security solutions providers, announced its strong opposition to the introduced bicameral Facial Recognition and Biometric Technology Moratorium Act. The bill would impose a blanket ban on most federal use of nearly all biometric and related image analytics technologies, incorrectly labeling all such technologies as surveillance regardless of application, while forcing essentially all state and local governments to do t...
While cybersecurity may not seem the most urgent priority for entrepreneurs and their start-up business ventures, increasing the emphasis placed on cybersecurity reaps rewards as the business matures. This is the key message from cyber risk analytics expert CyberCube in its contribution to a new World Economic Forum report published. The report Incentivising Responsible and Secure Innovation: A Framework for Investors and Entrepreneurs focuses on incentivising secure and responsible innovation...
UK-based Trustonic announces a strategic partnership with the smartphone manufacturer Samsung Electronics Co. Ltd. to better serve their mutual partners and customers. This multi-year deal will lead to the integration of Trustonic’s security platform with Samsung’s device-embedded Knox security platform. This creates a single-cloud solution for cellphone operators and distributors to manage and protect their Samsung smartphones and tablets throughout the supply chain. Trustonic’s platform also enables innovative financial services to be deployed by cellphone operators to drive new revenue growth. Samsung and Trustonic have both agreed to collaborate on commercial and go-to-market activities globally. Devices crime prevention Cellphone operators are facing mounting pressures on revenue and margins, while increasing investment in 5G rollouts as well as balancing a complex regulatory environment. Cellphone devices are increasingly valuable, and there is a growing requirement for subsidies and funding; the devices themselves are also a target for theft and fraudulent activity. Critically, this strategic partnership results in a premium solution which allows cellphone operators to improve financial performance by preventing fraud across the device portfolio, while increasing revenues through device financing, protecting device subsidies and growing their subscriber base. “This is a critical partnership that meets the demands of our cellphone operator customers,” commented Dion Price, CEO Trustonic. “As the choice in smartphones increases, so does the need for secure device financing solutions. Trustonic’s solution provides cellphone operators the opportunity to increase adoption of device financing options across Samsung’s smartphones within their Android portfolio.” Single cloud platform Trustonic’s solution provides a single cloud platform that supports multiple use cases from hardware (TEE) backed device lock, securing devices in the supply chain to device financing for cellphone operators. The platform puts control and management of the solution into the hands of the cellphone operator. It is used by some of the world cellphone operators and manages over 70M devices and counting. Samsung Knox provides a combination of a proven security foundation built into Samsung devices and mature suite of solutions leveraging this platform. It is built into Samsung devices, securing them from the moment one unpacks and turn them on. It provides multi-layered hardware and software security features that are always enabled.
Panasonic i-PRO Sensing Solutions, which was established on October 1, 2019 and formally operates as Panasonic i-PRO Sensing Solutions Corporation of America (PIPSA) in the United States of America, is changing its global brand to i-PRO. i-PRO branding The new i-PRO branding reflects a significant change in philosophy relative to the company’s go to market strategies, product and integrated system offerings, and reseller and technology partnerships. Comprised of the professional security surveillance, public safety, and medical imaging business units in the U.S., i-PRO will continue to build upon its expansive portfolio with new technologies and advanced AI-driven software and analytics that complement its best-in-class imaging technologies and edge products, and further build on a history of innovation and leadership that spans over 60 years with Panasonic. Innovative technologies and solutions i-PRO is more than just a new company name or brand. It represents a significant shift in vision for our organization globally" “i-PRO is more than just a new company name or brand. It represents a significant shift in vision for our organization globally, and the innovative technologies and solutions we currently have and will be introducing moving forward to support it,” said Bill Brennan, President, Panasonic i-PRO Sensing Solutions Corporation of America (PIPSA). “We are a more versatile and agile company that can establish and implement new strategies and market specific programs and technologies faster and more efficiently to deliver solutions that set new benchmarks in performance with higher ROI and lower TCO. This is the new i-PRO.” i-PRO is comprised of the following business units: Professional Security Surveillance, offering comprehensive IP and analog video surveillance, access control, and analytics solutions for professional applications that combine best-in-class hardware, management and control software, and deep learning AI analytics. Public Safety, providing advanced video solutions for law enforcement applications including next generation body worn cameras, in-vehicle video systems, evidence capture and management software, and intelligent analytics such as facial redaction to protect personal privacy. Medical Imaging, delivering high-performance cameras designed specifically for medical imaging devices and systems, and other industrial applications. Integrated solutions “By clearly focusing on these three core markets and working hand in hand with our dedicated channel partners, i-PRO will deliver new and innovative integrated solutions that meet today’s most demanding challenges with a forward-looking perspective to address tomorrow’s needs.” “And we will work in lockstep with our headquarters in Japan to address the specific needs of our customers in the U.S., while remaining close partners with Panasonic, a key investor in i-PRO. We hope you join us on this exciting journey and engage in the new i-PRO experience. Our future is brighter than ever,” concluded Brennan.
Bugcrowd, the crowdsourced security company, released its 2020 Inside the Mind of a Hacker report, the study to date on the global hacking community. Among the report’s key findings, human ingenuity supported by actionable intelligence of the Bugcrowd platform were found to be critical ingredients to maintaining a resilient infrastructure. AI-powered solutions not enough In fact, 78% of hackers indicated AI-powered cybersecurity solutions alone aren’t enough to outmaneuver cyber attacks over the next decade. Nearly nine out of 10 hackers, 87%, say that scanners cannot find as many critical or unknown assets as humans. Hackers can adapt four to five low-impact bugs to exploit a single high-impact attack While 2019 was a record year for data breaches, the report found that hackers working on the Bugcrowd platform prevented $8.9B of cybercrime in 2019 and earned 38% more than they did in the previous period. In the next few years, hackers on the Bugcrowd platform are projected to prevent more than $55 billion in cybercrime for organisations worldwide. “Globally-distributed good-faith hackers are increasing in number and diversifying. Bugcrowd gives organisations the power to proactively leverage human ingenuity – the enabler of malicious cyberattacks – at-scale to prevent them,” said Casey Ellis, founder, chairman, and CTO of Bugcrowd. “While AI has a role to play in helping to reduce cyber risk, companies need to integrate crowdsourced security throughout their security lifecycle if they hope to outsmart and outmanoeuvre cybercriminals.” Limitations of machine intelligence Hacking as a profession is lucrative and highly attractive to young people “Hackers will always be one step ahead of AI when it comes to cybersecurity because humans are not confined by the logical limitations of machine intelligence,” said Jasmin Landry, Bugcrowd hacker. “For example, hackers can adapt four to five low-impact bugs to exploit a single high-impact attack vector that AI would likely miss without the creative flexibility of human decision-making. Experience allows hackers to recognize vulnerable misconfigurations that represent a true risk to organizations without all of the false positives that typically come with AI-powered solutions.” Nearly half of neurodiverse hackers (6%) experience Attention-Deficit/Hyperactivity Disorder (AD/HD) The Inside the Mind of a Hacker report analyzes 3,493 survey responses from working hackers, plus hacking activity on the Bugcrowd Platform between May 1, 2019 and April 30, 2020. In addition, the report incorporates data from 1,549 programs and 7.7 million platform interactions to provide a striking and in-depth view of emerging trends among Bug Bounty, Penetration Testing, Attack Surface Management, and Vulnerability Disclosure Programs. Younger and neurologically diverse hackers Hacking as a profession is lucrative and highly attractive to young people, with 53% of hackers under the age of 24. Remarkably, the report uncovered that 13% of hackers are neurodiverse and possess neurological advantages that help them provide extraordinary depth and dimension in security testing. Research found that hackers live on six continents and reside in more than 100 countries worldwide These unique strengths include exceptional memory skills, heightened perception, a precise eye for detail, and an enhanced understanding of systems. Nearly half of neurodiverse hackers (6%) experience Attention-Deficit/Hyperactivity Disorder (AD/HD) and thrive in environments of rapid change, such as security research, where creativity and out-of-the-box thinking are rewarded generously. Career Hacking in Emerging Countries Skyrockets The research found that hackers live on six continents and reside in more than 100 countries worldwide. Most notably, the report identified an 83% growth in respondents living in India and nearly three out of four hackers (73%) speak two or more languages. 93% of hackers primarily hack out of care for the well-being of the organisations with which they work Bugcrowd uncovered a growing social responsibility trend among businesses and hackers. 93% of hackers primarily hack out of care for the well-being of the organizations with which they work. Additionally, organizations made five-times the number of coordinated disclosures in the last twelve months. “The exponential growth of these disclosures highlights the value of transparency to stakeholders and demonstrates organisations are taking social responsibility more seriously than ever,” said Ellis. COVID-19 pandemic Increasing demand for career hackers The FBI reported a 400% rise in cybercrime after COVID-19 was declared a pandemic and organizations are investing more in bug bounty programs as a result. More than half of hackers (61%) have noticed an increase in available bug bounty programs to participate in due to widespread remote working conditions related to the COVID-19. Hackers (48%) believe the Healthcare industry is vulnerable to cybercrime during the unfolding crisis “We are in unprecedented territory – and COVID-19 has forced many businesses to accelerate digital transformation efforts,” said Ashish Gupta, CEO and president of Bugcrowd. “The rush to digitize businesses can create serious lapses in security and organizations are turning to bug bounty programs to proactively safeguard new products and applications against vulnerabilities.” Alternative polling methods not favored by hackers Like the larger security industry, career hackers also noted concerns about COVID-related fraud. Nearly half of hackers (48%) believe the Healthcare industry is vulnerable to cybercrime during the unfolding crisis, followed by Education and Community Support (17%) and Government and Military (16%). Additionally, as the government faces the potential impact of COVID-19 on the upcoming 2020 US Presidential election, 72% of hackers independently reported that they do not trust alternative polling methods, like electronic polling or mail-in ballots.
Crossword Cybersecurity PLC, the technology commercialisation company focused solely on cyber security and risk, has announced that its Consulting division has signed a three year contract with Agria Pet Insurance Ltd, the award winning lifetime pet insurer, working as its trusted cyber security partner. Crossword’s Virtual Chief Information Security Officer (vCISO) managed service will be used by Agria to improve its cyber security posture. This security partnership follows the successful completion of a project evaluating Agria’s security controls against best practice and industry security standards. The new contract will see Agria gain regular testing of its cyber security processes and technology, helping the company minimize its security risks, ensure continued compliance with latest regulations relevant to the sector, and make it more resilient in the face of the modern cyber security threats it faces along with its customers and partners. Crossword’s vCISO managed services are a virtual/remote CISO service, provided by Crossword Consulting cyber security experts. The vCISO services provide clients with a virtual cyber security team at a fraction of the cost of building their own. Clients can also leverage the deep cyber security and technical expertise provided by Crossword. Range of services This is the fifth insurance sector client Crossword has secured over the last eighteen months. Crossword’s consulting team offer a full range of services from penetration testing, cyber maturity assessment, transformation and certification, to third party assurance and it’s vCISO offering. Whatever an organization’s size or level of cyber maturity, Crossword Consulting is able to offer a service tailored to its individual needs. Regarding the recent deal announcements, Stuart Jubb, Managing Director of Crossword Consulting, commented: “We are delighted to form a long-term partnership with Agria Pet Insurance. This deal shows how well received our vCISO product is with clients and in particular how well received it has been in the Insurance sector. Building and maintaining a cyber-security team can be a slow and expensive process. Crossword’s vCISO offering gives companies immediate access to expertise and technology that can make a rapid impact, improving cyber security posture, processes, and minimizing risks.”
Help is immediately on hand for businesses who are urgently seeking to safely re-open their doors following the easing of COVID-19 related restrictions. Hanwha Techwin’s license-free Occupancy Monitoring application provides retailers, places of worship and museums, as well as leisure facilities, pubs, clubs and restaurants, with highly accurate data on the number of customers on their premises at any particular time. Edge-based Occupancy Monitoring Compatible with the recently introduced Wisenet P Series AI cameras, the edge-based Occupancy Monitoring application simultaneously counts the number of people entering or leaving a building. When the maximum permitted number of people has been reached, the application generates alarm outputs to control automatic doors or a traffic beacon, as well as ‘wait’ or ‘enter’ messages that can be displayed on a monitor. Serverless solution The Occupancy Monitoring application has the power to aggregate and process data from multiple cameras The Occupancy Monitoring application has the power to aggregate and process data from multiple cameras and is therefore, ideal for buildings with multiple entrances and exits. As a serverless solution, it negates the need for system integrators to spend time configuring complicated server-side software. It also significantly reduces the capital cost of a project as the end-user does not need to incur the cost of buying a server. Deep Learning AI built into cameras With the support of Deep Learning AI built into the cameras, the Occupancy Monitoring application offers the additional benefit of being able to accurately count people even when a camera is wall mounted. Unlike less accurate people counting solutions which use conventional video analytics, the camera does not have to be mounted on a ceiling to provide an overhead field of view. This means, the camera can be simultaneously used for security purposes and people counting, and users are also able to take advantage of a host of additional video analytics applications which can be run onboard the camera, including heat map and intrusion, loitering and people/object detection. The new Wisenet Occupancy Monitoring application is compatible with the following cameras: PNB-A9001 - 4K AI box camera PNO-A9081R - 4K AI bullet camera PNV-A9081R - 4K AI vandal-resistant dome camera with built-in IR illumination PND-A9081RF - 4K AI flush-mount dome camera with built-in IR illumination PND-A9081RV - 4K AI dome camera with built-in IR illumination Time and cost savings The dome cameras have a four-part magnetic modular design, which makes them extremely easy to install The dome cameras have a four-part magnetic modular design, which makes them extremely easy to install. The ability to prefigure IP network settings without the need to remove the camera modules from their packaging also reduces the time an engineer has to spend on site, thereby enabling companies with multiple sites to rapidly roll-out the application with minimal disruption to their business. Wisenet P Series AI cameras The high-performance and feature-rich Wisenet P Series AI cameras will continue to deliver significant benefits beyond the immediate requirement to support the Occupancy Monitoring application during COVID-19. In addition to being used to detect and monitor any criminal activity, they can easily be redeployed to capture valuable business intelligence and help companies improve productivity. Retailers, in particular, can analyze the impact of any marketing activities on footfall and by identifying a store’s busiest times, better manage the peaks and troughs of customer flow at checkouts. Integrated with Wisenet Retail Insight (v2.0) In this respect, the cameras are supported by Wisenet Retail Insight (v2.0), a business intelligence solution, which utilizes people counting, heat mapping and que management applications to display statistical analytics on a centralized dashboard, along with other practical information such as weather reports. With the help of AI algorithms onboard the Wisenet P Series AI cameras, Retail Insight is also able to display an estimated age and gender of store visitors. Hanwha Techwin has always been able to rapidly respond to changing market demands" License-free solution “At this most challenging of times for our communities and the economy, we are proud to have the opportunity to contribute to the efforts being made to recover from the effects of COVID-19 by offering the Occupancy Monitoring application as a license-free solution,” said Uri Guterman, Head of Product & Marketing for Hanwha Techwin Europe. Uri adds, “With the security budgets of many businesses being stretched, we have felt a social responsibility to offer the application license-free and in doing so, help maximize the number of end-users who are able benefit from it.” He further said, “Hanwha Techwin has always been able to rapidly respond to changing market demands and with countless businesses extremely eager to re-open, we have yet again been able to rise to the challenge. This rapidly deployable, innovative and highly effective solution can offer peace of mind by assisting the implementation of social distancing rules at any building open to the public.”
Cyber Management Alliance, the global frontrunner in cyber crisis management and training, is delighted to announce that its highly popular course, Cyber Incident Planning & Response (CIPR) has become the first course to be certified by the recently-rebranded NCSC’s certified training scheme, provided by APMG International. The Cyber Management Alliance course was first certified by the Government Scheme in 2016 and is also accredited by the Chartered Institute of Information Security (CIISec). Interactive, practical, and immersive, the entire course can be conveniently completed by attending a virtual classroom or via a self-paced e-learning environment. Besides gaining imperative insights into key cyber risk-reducing controls for their business, course participants also have the advantage of being trained by Amar Singh, renowned across the globe as one of the top cybersecurity practitioners and the founder and CEO of Cyber Management Alliance. Online delivery program Speaking on the launch, Amar said, “I am delighted that APMG has awarded NCSC Certified Training status for the CIPR course, including its online delivery program. The updated and comprehensive course is accessible for all levels of management and technical audiences. The CIPR course is a complete guide to planning and responding to a cyber crisis or a data breach.” APMG-International’s COO, Nick Houlton, said, “Protecting individuals, teams and organizations from the financial and reputational damage of Cyber Incidents is at the heart of the Information Security Agenda. APMG is delighted to certify this course on behalf of the UK National Cyber Security Center and looks forward to its continuing success in the market.” Online training Over 300 organizations in 20 different countries have benefitted from the course and internal workshops" Cyber Management Alliance’s co-founder, Bal Rai, said, “We are pleased to have received NCSC Certified Training certification status. Over 300 organizations in 20 different countries have benefitted from the course and internal workshops and with the launch of the online training it means every organization, globally, can access the knowledge and skills at any time.” Previous participants of the NCSC-Certified CIPR workshop have come from organizations including the United Nations, UK Ministry of Defense, several UK Police Forces, NHS Trusts, European Central Bank, Swiss National Bank, Microsoft, Ernst and Young and many others. Responding to a cyber incident One of the course attendees, Wayne Parkes, Head of ICT - Warwickshire Police UK, had this to say: "Quite a difficult subject to get over sometimes but I think Amar presented it really well. Nice mixture of technical knowledge and practical examples. Good for a very mixed audience as it wasn’t overly technical. I highly recommend it in terms of bringing a mixed group up to speed with the importance of responding to a cyber incident, and what the essentials are, about dealing with it."
Tragically, in the world we now live, mass shootings and gun violence are epic concerns not only in schools, but Big Box retail, hospitals, municipal buildings, festivals, sporting events, concert venues, and just about anywhere crowds gather or work. The number of incidents is not acceptable and is truly startling. There are many societal and mental health issues that can cause these events and their importance in solving this issue is critical. However, this article will be focussed on the technology side of preventing mass shooting events. Going beyond metal detectors The best way to eliminate mass shootings is to detect weapons before they ever enter, or as they enter, a building. Metal detectors have been effectively dispatched and used to identify weapons on a person entering a building. The major drawbacks of metal detectors are the cost to operate them, several security guards per machine, and the resultant bottlenecks which cause limited throughput at the entrances. The technology eliminates the need to empty pockets and allows backpacks, luggage bags, and purses to be scanned New technology on the market uses millimeter wave detection to quickly scan someone walking through a portal. The technology eliminates the need to empty pockets and allows backpacks, luggage bags, and purses to be scanned at the same time as the person. People can walk through the portals side by side to reduce bottlenecks. Additionally, the technology reduces the number of guards needed, reducing overall costs. Taking out the human element The first step in surviving a mass shooting is being situationally aware. Immediately accepting and understanding the sounds as gunshots is paramount. Just a few seconds can mean the difference between life and death during an active shooter situation. Gunshot detection can eliminate the fear factor, which in many cases temporarily paralyzes those involved and causes precious seconds to pass before action is taken. By using a trusted, effective gunshot detection solution properly partnered with a monitoring system can eliminate the human factor of indecision and delay. Further, coupled with a VMS camera system, it can visually verify the situation as an emergency, identify the shooter, and provide valuable, accurate information to First Responders—all within just a few seconds. The state of gunshot detection technology Gunshot detection technology has been explored and developed by the military since WWI, but commercially it has only been around for a few years. Such detection systems range from wide area coverage to room-to-room coverage. Most are acoustic based (using microphones) to listen for the sound of a gunshot, record the sound, then analyze it with sophisticated software to determine if it is, indeed, a gunshot. Many years have been invested fine-tuning the software to differentiate between a gunshot and other loud noises. Eliminating ambient noise is very difficult during this process. The locations and venues mentioned at the outset of this article inherently have loud, ambient noise. This, in most cases, causes systems to give a false-positive or to even fail to detect the gunshot. In turn, it can send unverified or wrong information to First Responders and Security and cause havoc of unwarranted fear and actions. To help increase the accuracy of the detection of an actual gunshot, many systems have added infrared sensors. Many systems use backroom or cloud servers to run the necessary analysis In addition to the challenge of false positives, many systems use backroom or cloud servers to run the necessary analysis. This not only increases the cost of the system but may increase the notification time of the actual gunshot. Integration of this data to alarm, notification, and camera systems is difficult and costly. And experts say none of these systems are yet 100 percent effective. Enter ultrasonic sensor technology Fortunately, new technology is emerging in the industry. Technology which can eliminate the false-positives and reduce the cost by doing away with the expensive software, servers, cloud servers, and human intervention. This technology uses non-acoustical ultrasonic sensors to detect the frequency of a gunshot concussive wave created by a bullet, leaving the chamber along with the explosion wave force. Because these sensors are not acoustic (microphone), they will not pick up the ambient noise like other systems. In addition, the ultrasonic sensors only detect the gunshot concussive wave within the determined frequency. This also helps eliminate confusion caused by loud noises such as thunder, cars backfiring, large boxes being dropped, etc. An added bonus is ultrasonic sensors are not acoustic, therefore they are never listening or recording, the sensors only operate when there is an actual gunshot; hence, they’re completely non-invasive. The ultrasonic sensors only detect the gunshot concussive wave within the determined frequency Finally, these non-acoustic sensors do much of the work through an onboard processor, no backroom or cloud servers are needed. Integration to systems such as VMS, Access Control, Alarm Panels, etc. requires minimal effort. This allows existing security systems to be integrated with gunshot detection, creating a low-cost, highly effective overall solution. Protecting our children, loved ones, employees, and customers is a monumental challenge for any security professional. Using newly available technology, combined with existing security infrastructure, we have the ability to add on layers of safety to help reduce the tragedy of gun violence and mass shootings. This article was co-written by Brad McMullen, General Manager at 3xLOGIC, and Brad Jarrett, CTO at Active Guardian.
The early stages of the reopening of the British economy are underway following the Government’s announcement in mid-May that some people could return to work if they were unable to work from home. Workers in manufacturing and construction are among the first to return to the workplace, with other industries on standby. Should the data from the easing of the lockdown allow it, other businesses are gearing up to reopen at the start of July. Security has a pivotal role to play in mitigating the risk of infection and contamination as people return to the workplace. However, before exploring that, I want to highlight the fantastic work that the industry has been doing throughout this crisis. Security officers Security officers across the country have demonstrated the importance of their work time and again in recent weeks. Even when offices and shops have been closed, security personnel have been going about their usual duties in protecting assets and securing premises. At Amulet, part of our business continuity planning had been to prepare for possible staff shortages, but the commitment of our teams to carry on with their roles has been amazing. But as workplaces start to become occupied again, officers will face new challenges which we all need to be ready for. Officers will face new challenges which we all need to be ready for Security officers are often the people that process the entrance and exits to buildings. This will now need to be done with social distancing in mind. Each workplace and building might have a slightly different set up in terms of how they will address social distancing, including tape on the ground to measure 2m distances, rope to help enforce one-way systems, and the opening of additional entrances and exits to a building. Checking temperatures Officers may also be responsible for checking the temperature of occupants as they enter using hand-held scanners, and for signing people in and out of a building to reduce the need for each person to come into contact with a logbook or touch-screen visitor management system. While it’s hoped that the vast majority of people will understand and respect the need for new systems, this is a stressful time for everyone and tempers can get frayed. Officers must be trained on how to manage confrontation. For example, a company may state that anyone with a temperature over 38.5 degrees cannot enter the building. An occupant might measure a fraction over and ask that they be allowed to enter. Security officers will need to be strict in reinforcing the rules and how to remove someone from a building if they do not comply. This could be a delicate situation, so a strong relationship between security staff and the client is essential. Security as brand ambassadors This goes alongside the continued role of security officers as brand ambassadors. This is arguably even more important now as officers still need to be just as welcoming and helpful when working within the new restrictions. Just as important as officers looking after building occupants is that employers look after their officers. Even with social distancing, they are going to come into closer contact with more people than most professions, and will also be using high-risk touchpoints more frequently, such as door handles and reception areas. We fully expect face masks to become a requirement for buildings We fully expect face masks to become a requirement for buildings, whether from Government advice or the decision of individual businesses. As such, we have supplied full plastic visors to all of our security personnel as well as other PPE. We’re also regularly communicating with teams to remind them on best practice for the safe use and maintenance of PPE. PPE and security Even before this crisis started, any PPE that we issued was accompanied by full training and a sign off procedure. It’s a vital step in being able to track the usage of equipment and making sure that it’s being used appropriately. It’s important to communicate with clients about PPE too – depending on the sector, clients may have different reactions to the need for PPE. The rail clients we work with are by nature more risk-averse and so are fully on board with security officers wearing PPE. They are doing everything they can to improve safety and hygiene in a high footfall environment. With other clients it may take a little more education and encouragement, especially around understanding HSE guidance. It’s understandable that some clients may think a full plastic visor is overboard for a small office building; this is again where having a strong relationship will be so beneficial. Getting clients on board will make it easier for them to communicate to building occupants about the security protocols in place, and why they have been implemented. The challenge of retail Crowds will need to be very carefully managed and stores will have to work together to maintain social distancing One sector that might be particularly challenging for security personnel is retail, especially shopping centers. Crowds will need to be very carefully managed and stores will have to work together to maintain social distancing outside of their doors. But the same basic principles will apply – wearing PPE, educating clients on HSE guidelines and agreeing on and enforcing social distancing measures. High-end boutique shops bring their own challenges. While security officers will not have to deal with high footfall, they will need to balance the enforcement of security measures with the requirement of providing a welcoming experience to customers keen to spend after months of lockdown. It’s likely that some potential customers will be wearing face masks, which would usually be a huge red flag for an officer at a luxury retail boutique. Now, they’ll have to judge the situation in a completely different way with the worry of losing a big sale if the customer doesn’t get the welcome they expect. As always, security personnel must work on this with the client to agree on what procedures to follow. The role of security in mitigating the risk as businesses reopen cannot be understated. With so much to consider, conversations with clients must start now to ensure that everything is in place for when the time comes.
Across the globe, healthcare providers and facilities from care homes to hospitals and private clinics are working around the clock to reduce the risk to their staff and reduce the spread within their facilities. There are increasing reports in the UK that the virus has devastating effects in care homes, with fears that the US will be next in tow. The impacts on healthcare staff have also been stark with absence levels growing. In some health bodies across the UK up to almost 20% of their staff are off sick. The consequences of COVID-19 are clear to see in the short term, but it may also drive the need for technology that will help mitigate against pandemics and the spread of disease in the long term. One of these technologies that offers some promise is long-range RFID. The value offered is more than just security and safety Why long-range RFID? The value offered is more than just security and safety. Implemented correctly, it not only helps minimize the dangers posed to staff and patients, but also helps improve the efficiency and workflow around the facility. Here are 5 reasons long-range access control is part of the solution: Reduce contact spread of viruses Most viruses spread through droplets inhaled from someone else’s cough or sneeze. But a common indirect way of infection is germs being passed on when people touch surfaces such as doors, pin pads and handles. This can lead to the dangerous spread within healthcare facilities as it only takes one infected person to spread the virus to those that touch the same surface. Hence, during the current times of peak capacity, the risk increases. The right long-range access control solution can help minimize the risk by reducing shared contact points. Integrating vehicle and people access Long-range RFID is gaining traction as a complete people and vehicle solution. As an ideal solution that automates vehicle access without the need for ticket stations, pin pads or manned gates, members of staff can now go from their doorstep to the room they are required in without having to touch surfaces in order to access the car park and building. All of this can be done from a card that is transferred from a special holder in your car to a land yard for centrally managed, hands-free access around the facility. Card readers providing hands-free access around the facility More efficient building workflow Time is a precious commodity for medical staff and any time that is wasted on trying to enter the building, search for a badge or entering a PIN should be limited. Once in the building, a long-range electronic ID badge allows automated access around the building without having to present a card to the reader. For more emergency situations, its also common to attach cards to push trolleys, wheelchairs and other heavy equipment to help protect staff and patient safety. Fight against theft It’s a sad circumstance that in times of crises, theft is an issue that healthcare facilities have to deal with. Amid global shortages, there have been numerous cases of masks, medical equipment and other supplies being stolen from hospitals. A modern access control solution using long range readers can help by keeping supplies locked in a dedicated room with access granted only for approved staff ID badges, whilst also restricting access in staff car parks to only approved staff members. Proactively manage the flow of staff members in your facility Access control software offers a unique insight of real-time data Access control software offers a unique insight of real-time data into key staff members and their movements within the building. This software can then compile the data collected into reports which can help reveal bottlenecks in the flow of staff members around the facility. In the case of an emergency, an access system with connections to readers and cameras, can lock/unlock certain doors, or revoke access to particular people in case their badge was stolen. Whilst we cannot accurately predict what the world will look like post COVID-19, long-range RFID technology could prove to be a powerful tool going forward. It offers solutions that go beyond just security, and helps healthcare facilities build a better future by improving workflow, manage medical equipment, protect patients, staff and visitors from infection and future pandemics.
The global pandemic caused by the novel coronavirus is changing work environments to an unprecedented degree. More employees than ever are being asked to work remotely from home. Along with the new work practices comes a variety of security challenges. Without the proper precautions, working from home could become a cybersecurity nightmare, says Purdue University professor Marcus Rogers. “Criminals will use the crisis to scam people for money, account information and more,” he says. “With more people working from home, people need to make sure they are practicing good cybersecurity hygiene, just like they would at work. There is also a big risk that infrastructures will become overwhelmed, resulting in communication outages, both internet and cell.” Covid-19 concerns Concerns about the coronavirus have increased the business world’s dependence on teleworking. According to Cisco Systems, WebEx meeting traffic connecting Chinese users to global workplaces has increased by a factor of 22 since the outbreak began. Traffic in other countries is up 400% or more, and specialist video conferencing businesses have seen a near doubling in share value (as the rest of the stock market shrinks). Basic email security has remained unchanged for 30 years Email is a core element of business communications, yet basic email security has remained unchanged for 30 years. Many smaller businesses are likely to still be using outdated Simple Mail Transfer Protocol (SMTP) when sending and receiving email. “The default state of all email services is unencrypted, unsecure and open to attack, putting crucial information at risk,” says Paul Holland, CEO of secure email systems provider Beyond Encryption. “With remote working a likely outcome for many of us in the coming weeks, the security and reliability of our electronic communication will be a high priority,” says Holland. The company’s Mailock system allows employees to work from any device at home or in the office without concerns about data compromise or cybersecurity issues. Acting quickly and effectively As the virus spreads, businesses and organizations will need to act quickly to establish relevant communication with their employees, partners and customers surrounding key coronavirus messages, says Heinan Landa, CEO and Founder of IT services firm Optimal Networks. Employers should also enact proper security training to make sure everyone is up to speed with what’s happening and can report any suspicious online activity. Reviewing and updating telework policies to allow people to work from home will also provide flexibility for medical care for employees and their families as needed. Scammers, phishing, and fraud An additional factor in the confusing environment created by the coronavirus is growth in phishing emails and creation of domains for fraud. Phishing is an attempt to fraudulently obtain sensitive information such as passwords or credit card information by disguising oneself as a trusted entity. Landa says homebound workers should understand that phishing can come from a text, a phone call, or an email. “Be wary of any form of communication that requires you to click on a link, download an attachment, or provide any kind of personal information,” says Landa. Homebound workers should understand that phishing can come from a text, a phone call, or an email Email scammers often try to elicit a sense of fear and urgency in their victims – emotions that are more common in the climate of a global pandemic. Attackers may disseminate malicious links and PDFs that claim to contain information on how to protect oneself from the spread of the disease, says Landa. Ron Culler, Senior Director of Technology and Solutions at ADT Cybersecurity, offers some cyber and home security tips for remote workers and their employers: When working from home, workers should treat their home security just as they would if working from the office. This includes arming their home security system and leveraging smart home devices such as outdoor and doorbell cameras and motion detectors. More than 88% of burglaries happen in residential areas. When possible, it’s best to use work laptops instead of personal equipment, which may not have adequate antivirus software and monitoring systems in place. Workers should adhere to corporate-approved protocols, hardware and software, from firewalls to VPNs. Keep data on corporate systems and channels, whether it’s over email or in the cloud. The cyber-protections that employees depended on in the office might not carry over to an at-home work environment. Schedule more video conferences to keep communication flowing in a controlled, private environment. Avoid public WiFi networks, which are not secure and run the risk of remote eavesdropping and hacking by third parties. In addition to work-from-home strategies, companies should consider ways to ensure business cyber-resilience and continuity, says Tim Rawlins, Director and Senior Adviser for risk mitigation firm NCC Group. “Given that cyber-resilience always relies on people, process and technology, you really need to consider these three elements,” he says. “And your plan will need to be adaptable as the situation can change very quickly.” Employees and their employers Self-isolation and enforced quarantine can impact both office staff and business travelers Self-isolation and enforced quarantine can impact both office staff and business travelers, and the situation can change rapidly as the virus spreads, says Rawlins. Employees should be cautious about being overseen or overheard outside of work environments when working on sensitive matters. The physical security of a laptop or other equipment is paramount. “It’s also important to look at how material is going to be backed up if it’s not connected to the office network while working offline,” says Rawlins. It’s also a good time to test the internal contact plan or “call tree” to ensure messages get through to everyone at the right time, he adds.
At a major music festival, a fan in the crowd aggressively leapt over a barricade to approach a famous artist. Personnel from Force Protection Agency immediately implemented extrication protocol to shield the artist from physical harm, quickly reversed course and calmly led the client away from the threat. Force Protection Agency (FPA) personnel intentionally did not engage the threatening fan in any way, as local venue security personnel were present and tasked with apprehending the rogue fan. FPA’s efforts were directed expressly toward the protection of the client, avoiding unnecessary escalation or complications and minimizing physical, visual, and legal exposure. Dedicated to the safety of clients Force Protection Agency is a unique, elite-level agency inspired by a vision for excellence and innovation Specializing in protecting celebrities and high-net-worth individuals, Force Protection Agency is a unique, elite-level agency inspired by a vision for excellence and innovation, and dedicated to the safety and success of clients. The agency was formed in 2017 by Russell Stuart, a California State Guard officer and security and entertainment industry veteran. The agency is the culmination of 20 years of experience in the fields of security, military, emergency management, logistics and technology, media and entertainment, and celebrity management. We interviewed Russell Stuart, Founder and CEO of Force Protection Agency (FPA), which has been called “the Secret Service of Hollywood,” for his insights into providing security for celebrities. Q: What unique need in the marketplace do you seek to serve, and how are you qualified to serve it? Stuart: The needs of celebrity and high-net-worth clients are complex and constantly changing. When dealing with a high-profile individual, discretion is paramount, extensive communication is required, and adaptation is ongoing. A critical objective is anticipating and planning for all types of potential negative scenarios and preventing them from even starting, all while not disrupting the normal course of operation of the client's day or their business. Force Protection Agency is poised to serve these needs by innovating and intelligently managing the planning, procedures, and personnel used in every facet of protecting the client’s interests and achieving their objectives. Q: What is the typical level of "professionalism" among bodyguards and security professionals that protect celebrities? Why does professionalism matter, and how do you differentiate yourself on this point? Stuart: Professionalism is an overall way of approaching everything to do with the business, from recruiting, to training, to making sure the right agent is with the right client. Nothing matters more; polish and precision are not only critical to mission success, but also support the comprehensive best interest of the client while preventing costly collateral damage and additional negative consequences. True “professional protective services" is intelligent strength and proper execution, not emotional or reactionary violence. Unfortunately, the latter is frequent among many celebrity bodyguards, and often incurs extremely expensive and even dangerous repercussions. Q: Your company has been described as "the Secret Service of Hollywood." How true is that comparison, and how does your work differ from (e.g.) protecting the President? Force Protection Agency prides itself on providing its services with discretion, precision, and poise Stuart: Totally true, and for this reason: the keys to success in protection are prioritization, and planning. Most people fail to even recognize the first, negating any level of effort given to the second. Establishing the true needs and the correct priority of objectives for each individual client and situation, and firmly committing to these without deviation, are what distinguishes both government secret services and Force Protection Agency from the vast majority of general security firms. Also, the term “secret service” implies an inconspicuous yet professional approach, and Force Protection Agency prides itself on providing its services with discretion, precision, and poise. Q: What is the biggest challenge of protecting celebrities? Stuart: The very nature of celebrity is visibility and access, which always increases risk. The challenge of protecting a high-profile individual is facilitating that accessibility in a strategic and controlled manner while mitigating risk factors. A client’s personal desires and preferences can often conflict with a lowest risk scenario, so careful consideration and thorough preparation are essential, along with continual communication. Q: How does the approach to protection change from one celebrity (client) to another? What variables impact how you do your job? Stuart: The approach is largely determined by the client’s specific needs, requests and objectives. The circumstances of a client's activities, location, and other associated entities can vastly disrupt operation activities. A client may prefer a more or less obvious security presence, which can impact the quantity and proximity of personnel. Force Protection Agency coordinates extensively with numerous federal, state, and municipal government agencies, which also have a variety of influence depending on the particular locations involved and the specific client activities being engaged in. Q: Are all your clients celebrities or what other types of "executives" do you protect – and, if so, how are those jobs different? Stuart: Force Protection Agency provides protective services for a wide range of clients, from the world’s most notable superstars to corporate executives and government representatives. We also provide private investigation services for a vast variety of clientele. Force Protection Agency creates customized solutions that surpass each individual client’s needs and circumstances. The differences between protecting a major celebrity or top business executive can be quite different or exactly the same. Although potentially not as well known in popular culture, some top CEOs have a net worth well above many famous celebrities and their security needs must reflect their success. Q: What is the role of technology in protecting famous people (including drones)? Technology is crucial to the success of security operations Stuart: Technology is crucial to the success of security operations and brings a tremendous advantage to those equipped with the best technological resources and the skills required to maximize their capabilities. It affects equipment such as communication and surveillance devices like drones, cameras, radios, detection/tracking devices, GPS, defensive weapons, protective equipment, and more. Technology also brings immense capabilities to strategic planning and logistical operations through the power of data management and is another aspect of Force Protection Agency operation that sets us apart from the competition. Q: What additional technology tools would be helpful in your work (i.e., a “technology wish list”)? Stuart: The rapidly growing and evolving realm of social media is a massive digital battlefield littered with current and potential future threats and adversaries. Most mass shooters as of late have left a trail of disturbing posts and comments across social media platforms and chat rooms that telegraphed their disturbing mindset and future attacks. A tool that could manage an intelligent search for such threats and generate additional intel through a continuous scan of all available relevant data from social media sources would be extremely useful and could potentially save many lives. Q: Anything you wish to add? Stuart: Delivering consistent excellence in protection and security is both a vital need and a tremendous responsibility. Force Protection Agency is proud of their unwavering commitment to “Defend, Enforce, Assist” and stands ready to secure and satisfy each and every client, and to preserve the life and liberty of our nation and the world.
The UK Government has been working to reduce the risks associated with illegal drone use since a high-profile incident at UK’s Gatwick Airport in December 2018, when a drone sighting triggered a three-day shutdown of the UK’s second busiest airport, disrupting the travel plans of 140,000 people and affecting 1,000 flights. To address growing security threats by drones, the UK Government has released its ‘Counter-Unmanned Aircraft Strategy’. ‘Counter-Unmanned Aircraft Strategy’ This strategy sets out our approach to countering the threat the malicious or negligent use of drones can bring" “This strategy sets out our approach to countering the threat the malicious or negligent use of drones can bring,” says Brandon Lewis, the U.K. Minister of State for Security. “It will provide the security the public and drone users require to continue to enjoy the benefits of leisure and commercial drone use and facilitate the growth of the drone industry.” “Given the challenge posed by rapid advances in drone technology and the potential threat, the strategy will provide overarching direction to our efforts,” says Lewis. The strategy focuses on ‘small drones’, those weighing less than 20 kg (44 pounds). Countering malicious use of aerial drones The UK Counter-Unmanned Aircraft Strategy centers on mitigating the highest-harm domestic risks resulting from malicious use of aerial drones. They are: Facilitating terrorist attacks, such as modifying commercially-available drones to conduct reconnaissance or attacks. Facilitating crime, especially in prisons, where drones are currently used to deliver contraband. Disrupting critical national infrastructure, such as airports, where a malicious incursion using a drone can have serious safety, security and economic consequences. Potential use by hostile state actors. Maximizing benefits of drone technology The initiative will also look to build strong relationships with industry to ensure high security standards Over the next three years, the strategy will seek to reduce the risks posed by the highest-harm use of drones while maximizing the benefits of drone technology. It will develop a comprehensive understanding of evolving risks and take a “full spectrum” approach to deter, detect and disrupt the misuse of drones. The initiative will also look to build strong relationships with industry to ensure high security standards. Further, promoting access to counter-drone capabilities and effective legislation, training and guidance will empower the police and other operational responders. Tactical response to drone-based threats Because technology is rapidly evolving, the response needs to keep pace, according to the strategy document. Lewis adds, “We will therefore work to understand how drone-based threats might evolve in the future, both at the tactical and strategic levels.” The strategy will be to build an end-to-end approach to tackling the highest-harm criminal use of drones. It will also work to make it easier to identify malicious drone use against a backdrop of increased legitimate use. Legal drone operators will be required to register with the Civil Aviation Authority (CAA) and to pass an online competency test before flying a drone. Retailers who follow a specific set of safety guidelines when selling drones will be designated ‘DroneSafe’. Unmanned traffic management system The government is working toward future implementation of an unmanned traffic management (UTM) system, which provides a means of preventing collisions between unmanned aircraft and other manned or unmanned aircraft. The current strategy includes early planning for the system. An Industry Action Group will ensure a continuing relationship with the drone industry and help to improve existing counter-drone measures and identify new opportunities, such as use of ‘Geo-Fencing’ to restrict drones from flying in certain areas. Regulating commercial and domestic drones The UK Department of Transport is responsible for safe and lawful use of drones within the UK airspace The strategy will seek to communicate the UK’s security requirements to the counter-drone industry and to encourage a thriving sector that is aware of, and responsive to, the needs of government. Regulating drones is the responsibility of two UK government departments. The UK Department of Transport is responsible for safe and lawful use of drones within the UK airspace, while the Home Office has overall responsibility for domestic counter-drone activity. Fast-evolving drone and counter-drone technology Also, the Center for the Protection of National Infrastructure (CPNI) has been involved in reducing the vulnerability of sensitive sites, including airports. New performance measures will track the strategy’s success. Due to the fast-evolving nature of drone and counter-drone technology, the intent is to review and, if necessary, refresh the strategy in three years.
Multiple Construction sites in the Albuquerque area are managed by Shumate Constructors, Inc., an Albuquerque, New Mexico-based construction contractor, that is also renowned for building educational facilities. In addition to building schools from the ground up, Shumate Constructors completes school additions and remodels. Construction site thefts Three years ago, the company began having problems keeping thieves out of its construction sites during non-working hours. Unwatched construction sites are hot beds for a variety of thefts - from copper pipes and wire to hand tools to heavy-duty machinery. The loss of machinery, such as front-end loaders, would cost hundreds-of-thousands of dollars. Sometimes workers will arrive to a site in the morning only to find materials, such as copper pipe, gone along with their tools. Enhancing construction site security The sites also presented a challenge due to changing construction conditions The result is the loss of a whole day and sometimes multiple days of work. On top of the lost time, the contractor has to cover the cost of replacing materials, file an insurance claim for each theft and complete additional administrative paperwork that they weren’t planning to invest time in. The sites also presented a challenge due to changing construction conditions. Equipment or storage containers are delivered and removed, the sites are graded/re-graded and as sections of build were completed, tools, materials and supplies were moved to different areas. Flexible, reliable wireless solution At a contractor trade show a few years ago, Mark Shumate, President of Shumate Constructors met Dave Meurer, President of Albuquerque’s Armed Response Team. Meurer introduced Shumate to the idea of a flexible, reliable wireless solution that could continually monitor the entire site without the need to trench around the perimeter. “Mark [Shumate] was fed up with theft at his construction sites so we started to discuss some prevention ideas,” said Meurer, adding “I knew this was a great fit for the combined Inovonics transmitter and Optex sensor solution.” Optex sensors installed He further said, “At the Armed Response Team, we refer to this solution as the never sleeping, non-blinking eye. Shumate was not aware of any reliable solutions that could provide this type of theft prevention, but we explained that we were very confident in this application and he was definitely interested.” To install each combined sensor, the Armed Response Team attached the Optex sensors to a freestanding steel post with a base plate on it and deployed them throughout the site. This allowed the flexibility to be easily moved to accommodate site changes. Once installed, a signal was easily achieved. iSeries Optex/Inovonics sensors The amount of iSeries Optex/Inovonics sensors needed at Shumate’s sites vary The sensors in the combined solution often need to communicate as far as an entire city block and the perimeters can be several thousands of feet. The iSeries Inovonics/Optex solution was able to easily accomplish this feat. The amount of iSeries Optex/Inovonics sensors needed at Shumate’s sites vary. For some sites, it can be as few as a dozen, and others it can be as many as 30 or more. “Together, the products offer a great solution,” noted Meurer, adding “The Optex sensors can handle varying weather conditions and Inovonics’ wireless connectivity offers less signal drop and more consistent reporting signal than any of the other transmitters we’ve tried.” Efficient perimeter security solution “Between the perimeter technology by Inovonics and Optex, and the Armed Response Team’s follow-up, we have seen zero thefts for all projects since installation. With the integrated wireless solution, the construction sites are monitored on a real-time basis and immediately notify the Armed Response Team upon unauthorized access,” said Mark Shumate, President of Shumate Constructors. He adds, “We look at the perimeter security solution as a great investment. Annually, the cost of manpower, replacement of lost or stolen items and damage repairs could easily cost three times more than we spend on Armed Response Teams’ services with the Optex and Inovonics solution.”
OPTEX Teams up with Mobile Pro Systems to create a Rapid Security Deployment Solution for a high-end condominium builder in Extreme Weather Conditions. The solution was required for a large construction site for Cove Properties, one of Alberta, Canada’s premier luxury condo builders. Weather conditions With many developers and construction companies building throughout the year, they're forced to battle a myriad of different weather conditions including rain, sleet, snow and extreme cold. On top of this, they still face the inevitable problem of theft and vandalism. Theft of tools, machinery, new materials and scrap material cost contractors millions of dollars per year and leaves the construction companies and their sub-contractors with the effect of having to deal with their losses. The general contractors and developers feel the chain reaction as well, as they have to deal with higher insurance premiums and weeks and months of project delays. To avoid the major effects of construction site theft, Cove Properties turned to 2020 Digital Security Solutions of Alberta, Canada for help. Cove’s requirements included a mobile solution capable of wireless communication that could be moved from site to site with surveillance, motion detection, lighting and remote monitoring capabilities. In addition, it had to survive the harsh outdoor elements of Northern Canada. Powering network and surveillance solution 2020 Digital Security Solutions took all of Cove’s requirements into consideration and found the perfect solution in the PowerSentry by Mobile Pro Systems. The PowerSentry is a self-sufficient, temporary, semi-permanent or permanent surveillance solution. Cove is using 6 Redscans with 2 fixed cameras on six poles, and ran power to each pole Built as a “power platform”, it can power anything from surveillance, security, communications and/or network technologies. And with its universal mounting options, the PowerSentry can be mounted to a pole, a wall or tripod or can be easily hooked over a fence or roof parapet for superior mobility. It accepts 90-277VAC to minimize re-wiring and is equipped with a high quality Lithium-Ion battery pack as a backup power source due to loss of power or power outages. In addition, the PowerSentry has a unique remote system status and control software called Power Broker, which monitors the PowerSentry’s battery voltage, current power usage, displays active map GPS monitoring, intrusion detection reporting, warning and flood lighting control and horn/speaker control. Motion-activated floodlights To help solve the limited daylight obstacle, 2020 DSS had two 8,000 lumen LED flood lights mounted to the chassis of the PowerSentry. The LED floodlights are motion activated and have a pre-determined setting of how long they will stay on. The lights can also be turned on and off manually through the Power Broker software. “Due to the short amount of daylight during the winter months, the flood lights will help light the site in the evening hours and after hours if there is a breach in the perimeter,” said Gene Telfer, president of 2020 DSS. The perimeter and the interior of the construction site is protected by an Optex RedScan laser perimeter detection device which was connected to the PowerSentry and mounted 8’ below providing a 200’ horizontal area of detection. “We decided to mount the RedScan below the PowerSentry instead of on it because we will get a wider detection range and a firmer detection trigger,” Telfer said. Optex Redscan laser detectors With abnormal cold temperatures hitting the Northern United States and almost all of Canada, the first test was in late December into early January when normal temperatures fell to -40°F and -60°F with the wind chill. “The systems are working great and we haven’t had a system go down at all,” Telfer said. According to Telfer, Cove is using 6 Redscans with 2 fixed cameras on six poles, and ran power to each pole that made installation very quick and easy. They are using Milestone video management software that integrates with the cameras and Redscan laser detectors for visual verification and event response in one platform.
Iris ID, a provider of iris recognition technology, announces it will provide its biometric recognition technology to the County of Los Angeles to make its prisoner release process safer, more accurate and efficient. Iris ID’s OU7S-AK camera module will be part of 163 Livescan stations in 114 law enforcement locations throughout the county. The new criminal booking solution will bring iris-based identity authentication capabilities to a system that previously relied on fingerprints and photos to enroll and identify individuals arrested in the nation’s most populous county. Identification of all criminals arrested The Los Angeles County Sheriff’s Department is one of 64 law enforcement agencies in the county that are part of the Los Angeles County Regional Identification System (LACRIS), which is the entity responsible for the identification of all criminals arrested in the county. Tim Meyerhoff, director, Iris ID, said the company’s contactless iris-based technology was part of an FBI-funded pilot project began in 2015. “The Iris ID system will allow for a more accurate release of individuals as a person’s iris is much less susceptible to damage than their fingerprints,” he said. Automated fingerprint identification system “With more than 300,000 bookings annually, the Los Angeles County Sheriff’s Department is always interested in eliminating the improper release of any individual.” The iris capture technology is part of a larger contract to be overseen by South Carolina-based DataWorks Plus which will also supply central servers, supporting software and implementation and support services. The contract will be paid for using funds from the state Automated Fingerprint Identification System. Program implementation will begin after July 1, the start of the county’s 2020-2021 fiscal year. Full deployment is expected to be completed within six months.
Optex installs intrusion detectors at a gated, luxury motor coach resort community in the desert area of Southern California. The property features a clubhouse, fitness room, community pool, and 141 "Casitas": 1200 sq ft. custom-built living spaces with waterfront motor coach pad. Because most owners were on site only a portion of the year, the property faced an increasing issue with trespassers in the off- season months. The increase in trespassing also lead to an increase in vandalism and theft cases. The large perimeter, combined with the desert heat, required a robust, long distance solution that would stand up to the elements. Detection range of 650 feet The integrator worked directly with OPTEX to plan out a perimeter system that would overcome the challenges faced on the site. Because power was readily available and a long distance solution was required, hardwired AX-650TF beams with a detection range of 650ft. were selected. After discussing possible mounting options with the OPTEX sales representative, the integrator decided on the AX-TW200 photobeam tower. Because the customer provided a site plan, OPTEX was able to pre-build the towers and mount the beams in them at no additional charge. Once installed, the tower and beam solution provided full perimeter protection by activating strobes and notifying an on-site guard to the location of an intrusion. The result was a huge decrease in the amount of unknown trespassers, thus greatly reducing reports of theft and vandalism.
A high school campus in an Atlanta suburb underwent a complete remodel. Temporary modular buildings were set up on a large area of the campus to act as classrooms during the year-plus long construction. Due to the temporary structures, accessible HVAC units and threat of vandalism, a stable and reliable solution was needed that would also be easy to both install and move if necessary. Wireless passive infrared detectors An integrator was selected who then teamed up with Optex to create a reliable, effective security solution that included iSeries battery-powered, wireless passive infrared detectors. This allowed for a simple, inexpensive yet effective way to protect the assets inside the structures, as well as the HVAC units on the exterior. The detectors protecting the perimeters of the site were set up to trigger strobe lights that alert an on-site guard to the location of any breach, while the system as a whole is monitored by the district's security team. Because the integrator chose to install a battery-powered, wireless option, any of the units can also be relocated if needed, based on changing site conditions or future security needs. Crime prevention at perimeter The temporary campus now maintains a secure perimeter and campus that detects intruders and prevents theft and vandalism. With the battery-powered system in place, the end user has multiple levels of protection and can respond quickly to alarms before any damage is done. Benefits and features of the iSeries battery-powered, wireless outdoor PIR detectors from OPTEX include: No trenching or wiring required allows for a quicker and less expensive install. End user will experience less downtime to business operations. iSeries version includes Inovonics EN1941 transmitter and batteries pre-installed, allowing for a quicker set-up time on job site. Dual PIR feature greatly increase stability outdoor and drastically reduces any false or missed alarms. Units can be easily relocated based on changing site conditions. Outdoor multiple detection pattern Optex’s outdoor PIR detectors (excluding the LX series) utilize the Multiple Detection Pattern technology, where two double-layered detection patterns (upper and lower) have to be activated to generate an alarm condition. This reduces false alarms, particularly those caused by temperature changes, light reflection and small animals. The size judging function virtually eliminates false alarms due to small animals and other moving objects such as vehicles. By utilizing originally developed pyro-elements, it creates a configuration area consisting of 94 high density detection zones. Also, the detection pattern technology requires both detection areas have to be activated in order to generate an alarm condition making it more tolerant to false alarms caused by small animals or pets.
Renowned consultants have specified OPTEX's REDSCAN laser detector as their choice for securing medical marijuana Grow Op facilities. U.S. retail cannabis sales will rise more than five-fold over the next five years, from an estimated $2.2-$2.6 billion in 2014 to $7.4-8.2 billion in 2018, according to new financial data released in the 2014 edition of the Marijuana Business Factbook. Because of this growth, local governments are setting strict regulations including detailed security specifications to prevent theft or diversion of medical marijuana at “Grow Op” facilities. In addition, security specifications outline how companies communicate, assist and alert local law enforcement of unlawful activities. Part of this specification outline focuses on perimeter intrusion and surveillance systems. Video Management Software REDSCAN’s state-of-the-art motion detection technology meets state-by-state security specifications To meet perimeter intrusion and surveillance system requirements, the renowned consultants have specified OPTEX’s REDSCAN Laser Detectors as their choice for securing medical marijuana Grow Op facilities. With large deployments across North America, REDSCAN has proven to be highly effective due to its flexible motion detection capabilities, IP integration into leading Video Management Software (VMS) and its ability to be deployed across multiple perimeter applications utilizing indoor and outdoor functions. REDSCAN’s state-of-the-art motion detection technology meets state-by-state security specifications and is both UL and FDA approved. Effective IP intrusion REDSCAN can detect an object's size, speed and distance with precision accuracy. It provides a number of flexible detection applications within the Grow Op's perimeter. It can be mounted horizontally to actively detect and track objects or vertically mounted to create invisible laser walls triggering cameras to preset positions. Because all remotely monitored security systems rely on a motion trigger, REDSCAN works seamlessly with surveillance cameras preventing and/or recording theft and diversion of medical marijuana. Because Redscan is integrated with all the popular video management software, its users now have highly effective IP intrusion, surveillance and security event management options.
Round table discussion
We are all more aware than ever of the need for cybersecurity. The Internet of Things is a scary place when you think about all the potential for various cyber-attacks that can disrupt system operation and negatively impact a customer’s business. Because most physical security systems today are IP-based, the two formerly separate disciplines are more intertwined than ever. We asked this week’s Expert Panel Roundtable: How can cybersecurity challenges impact the physical security of a company (and vice versa)?
Video is widely embraced as an essential element of physical security systems. However, surveillance footage is often recorded without sound, even though many cameras are capable of capturing audio as well as video. Beyond the capabilities of cameras, there is a range of other audio products on the market that can improve system performance and/or expand capabilities (e.g., gunshot detection.) We asked this week’s Expert Panel Roundtable: How does audio enhance the performance of security and/or video systems?
2019 was a big year for the Expert Panel Roundtable. The range of topics expanded, and we had more participation from more contributors than ever before. In closing out the year of contemplative discussions, we came across some final observations to share. They can serve both as a postscript for 2019 and a teaser for a whole new year of industry conversations in our Expert Panel Roundtable in 2020.
Automatic Vehicle Identification: State Of The Industry 2020Download
How Analytics Engines Mitigate Risk, Ensure Compliance And Reduce CostDownload
11 Considerations For Embedded System RFID ReadersDownload