The ability to treat patients in a secure environment is a base requirement of hospitals and other healthcare facilities. Whether facilities are large or small, security challenges abound, including perimeter security, access control of sensitive areas, video surveillance, and even a long list of cyber-risks. We asked this week’s Expert Panel Roundtable: What are the security challenges of hospitals and the healthcare industry?
With the rising number of active shooter events in the United States, Johnson Controls has released the new Detect360 Active Shooter Response (ASR) system. The system combines reliable gunshot detection with industry-leading notification technology to provide immediate warning when a gunshot is fired within a building. By providing early notification and precise location of the shooter, the ASR system gives occupants time to find safety and allows police and security personnel to mitigate the th...
Over a fifteen-month period, Sonitrol has opened new franchises and expanded current markets in eight states including Illinois, Indiana, Kentucky, Ohio, Connecticut, Massachusetts, California and Florida. The expansion of current markets where Sonitrol has a footprint assists in the growth of the Sonitrol brand and secure more businesses with the best in verified electronic security, keeping our communities safe and keeping more criminals off the streets. “Sonitrol is excited to continu...
Who is more likely to rob your home – a friend or a stranger? Is a burglary more likely to occur when you are at home or away? Does gun ownership contribute to more effective home security? What about a loud, barking dog? A recent survey by Reviews.org considered these and other consumer preconceptions about home security and how they compare with the facts. "Everyone wants to feel safe at home but not everyone knows which home safety measures will actually help protect them,” say...
Cybersecurity has become the ultimate buzzword in the physical security market. And it also represents one of the industry’s most intractable challenges. Several years ago, the problem with cybersecurity was lack of awareness among physical security practitioners. It’s now safe to say that awareness has increased. Everyone today talks about cybersecurity, but has it helped the larger problem? We asked this week’s Expert Panel Roundtable: Is greater awareness helping to increase...
As the track cools from the Indy 500, the director of security for Indianapolis Motor Speedway events will speak as part of a panel at the Closing Keynote Luncheon at ESX on June 6 in Indianapolis. In this session, three carefully selected panelists will discuss ways to implement better strategies that help reduce violent crimes against employees, students, visitors and customers. To most effectively explore possible solutions, ESX will include panelists from diverse backgrounds who have handle...
Delivering another high-value benefit to users, the Maxxess eFusion security management platform now integrates off-the-shelf and seamlessly with the widely used range of deister electronic key management systems. With this latest off-the-shelf integration, eFusion users can now manage all their keys from their centralized security management platform, reducing the risk of security breaches and streamlining their day-to-day operations. Modular and scalable, the deister electronic systems encompass a range of cabinets which can store anything from 8 keys to thousands. They can be used stand-alone or as part of a global corporate solution, in applications ranging from hotels and leisure settings to retail and up-scale residential developments. Reduces criminal activity Knowing who has a particular key at any given moment significantly reduces the risk of losses and criminal activity"“Knowing who has a particular key at any given moment significantly reduces the risk of losses and criminal activity,” says Lee Copland, Managing Director, Maxxess EMEA. “The deister electronic systems make that task much simpler. And with real-time reports logging all system usage, users can be held accountable for any misuse, theft of loss of keys – better protecting buildings and assets.” The integration with deister electronic systems is just the latest example of how the eFusion platform gives users the freedom to integrate, customize and adapt their security systems to meet both current needs and emerging risks. eFusion’s open technology software supports more than 60 off-the-shelf integrations from leading vendors, providing complete freedom to customize solutions combining surveillance, access control, fire and intruder systems with back-office processes. Making premises more secure Off-the-shelf integration between our key management systems and eFusion will deliver major benefits to customers"Crucially, integration with Maxxess eFusion also reduces complexity for installers and their customers and offers unlimited future scalability at affordable price points. “Off-the-shelf integration between our key management systems and eFusion will deliver major benefits to our customers,” says Darren Harrold, Head of UK Operations at deister electronics. “This means they can now link their essential systems together – including their surveillance, intruder, access and fire detection systems – making a wide range of premises easier to manage and more secure.” Visitors to IFSEC International can see Maxxess eFusion and deister key management in action, where both companies will be exhibiting on stand IF2120 and IF410 respectively from 18th to 20 June at London’s ExCel.
Workplaces, schools, hotels, sporting events, entertainment venues and other large –and sometimes not so large – facilities have become headlines in the news for all the wrong reasons: violent attacks. The Safer Solution is an effective training method that addresses public/workplace violence and active shooter incidents – by both alleviating a situation before it ever occurs, and by preparing civilians with appropriate response skills in the case of a crisis developing. The Safer Solution The Safer Solution was developed by Ken Good, Ted Westmoreland, and Michael Clarke The Safer Solution was developed by Ken Good, a Navy SEAL; Ted Westmoreland, an Army Special Forces Medic; and Michael Clarke, an Executive Protection Specialist – who, with their combined training, experiences and unique skillsets, have created a new method to teach individuals and organizations how to sense and assess an environment in order to act on red flags before it’s too late. In the event a crisis does occur, the training gives individuals proper skills to have a greater chance of survival as well as the ability to assist others. The Safer Solution provides training so that employees can: Increase situational awareness to allay an incident Identify and communicate threat concerns Protect themselves and others during an active-shooter situation Mitigate imminent and immediate attacks Perform lifesaving first responder actions Prevail overactive shooting situations through well-coordinated evacuation, barricade and engagement drills Training For Crisis Situations “It’s tragic and unfortunate, but the facts are that random acts of violence and active shooter incidents are increasing; ignoring these facts is no longer an option” said Michael Clarke, CEO of Archangel and one of the three partners in The Safer Solution. “We don’t believe that just telling people to ‘run, hide, and fight’ is effective training; individuals and organizations need a plan. The Safer Solution empowers people so they can prevent, protect, and prevail against aggressive attacks. Our training provides them with the tools and skills needed to make their work environments and public places safer.” The Safer Solution goes beyond the traditional ‘run, hide, fight’ direction" “The Safer Solution is our strategic partner in helping us design, implement, and maintain our workplace violence and active shooter program. With their guidance we have formulated strong company policy, in-depth training and coaching, and our threat response plan. The Safer Solution goes beyond the traditional ‘run, hide, fight’ direction. Their comprehensive in-person and online training has aided Randstad in developing and maintaining a comprehensive safety and security program to deal with the real threat of workplace violence.” - Corey Berghoefer, Senior Vice President – Risk Management & Insurance, Randstad US. Online Active Shooter Training Course “After having completed the online active shooter training from The Safer Solution, I am confident that this is the training our organization needs to help our staff prepare itself in case an active shooter situation was to arise. The training was interactive, kept me engaged and more importantly increased my knowledge of what to do if I were to ever find myself in that unfortunate circumstance. One of the key elements of the training is what to do after, the information is key, and may save a life.” - Rudy Amador, Director Safety, Dole Fresh Vegetables, Inc. The Safer Solution is offered through on-site presentations where the team will come to a location and provide “hands on” instruction, demonstrations and drills. An effective, online e-learning version of the training, complete with videos and self-assessment drills, is also recommended for larger organizations with multiple locations.
Security services are demanded by all sorts of businesses and events. Being that Los Angeles is the entertainment capital of the world and a favorite destination for entrepreneurship at all scales, it’s also listed as one of the cities in the USA with the highest crime rates. For this reason, security companies in Los Angeles have an increasing demand, which Hillquest Security has supplied since 2016. Hillquest Security serves individual and commercial clients with more than 10 different security services, like armed patrol, bodyguards, security guards, mobile patrols and even risk management. According to their website, “We will provide you and your organization the peace of mind that comes with highly trained, regularly audited and dedicated security operatives that have been working in the industry for years.'' Covering Majority Of Cities In Los Angeles According to the Yellow Pages, Hillquest Security is listed sixth as one of the Best 30 Security Guard Companies in Los AngelesAside from the different security options, Hillquest Security stands out by providing one of the largest coverage areas in their industry. Only in Los Angeles County, they cover cities like Aliso Viejo, Anaheim, Beverly Hills, Burbank, Carson, Capistrano, Century City, Cerritos, Dana Point, Downey, El Segundo, Gardena, Garden Grove, Hollywood, Huntington Beach, Huntington Park, Ladera Heights, La Habra, Long Beach, Los Angeles, North Hollywood, Santa Ana, Torrance, Venice, West Hollywood, Wilmington, Yorba Linda and many more. Hillquest Security was founded by a former Marine officer. The company’s team members go through a comprehensive screening process that includes a complete background check, honesty and drug profile, and a criminal history fingerprint check with the Department of Public Safety and the FBI. This, along with their 5 million dollar insurance policy make it “guaranteed to keep you and your business safe, even after the most challenging times,” according to Hillquest Security’s website. Listed Sixth Best Security Guard Company According to the Yellow Pages, Hillquest Security is listed sixth as one of the Best 30 Security Guard Companies in Los Angeles. There are also positive reviews featured on their social media and listing sites, like Yelp. Their 24/7 availability and the high standards of their guards and crew, in general, are among the reasons for such positive feedback. Their already wide coverage area is nowadays expanding to San Diego and Riverside counties.
Memoreyes, the developer of a smart, first-of-its-kind outdoor video surveillance system, is looking for qualified integrators to participate in its national dealer program. The company will provide integrators with training that centers on its patent-pending, Megapixel/HD–quality, pan-tilt-zoom camera system with machine learning. Memoreyes’ unique video offering provides an unprecedented set of advanced, almost human-like capabilities. Deter Criminal Activity “Integrators are a key part of our business plan,” says Memoreyes Founder and CEO John Collings. “Our Entrance System (Model 100) and All Property System (Model 360) go far beyond traditional outdoor cameras and opens up new opportunities for them to improve safety and deter criminal activity at multi-family housing, hospitals, campuses, office complexes, malls, and retail outlets and offer an entirely new category of managed services.” The Memoreyes system can quickly differentiate between authorised individuals and potentially hostile targets Thanks to this new technology, the Memoreyes system can quickly differentiate between authorized individuals and potentially hostile targets. Through machine learning (AI), it also intuitively anticipates potential risks and proactively responds to evolving situations using light, sound, and voice messages. Over time the system learns the habits and trends associated with each camera within a specific setting, enabling it to quickly identify departures from the norm. Strategically Positioned Cameras Collings, the original designer and founder of Uplink cellular service, says that one of the company’s biggest hurdles was to create a facility-wide WiFi system that would reliably work in an outside environment. With that solved, strategically positioned cameras now work in tandem to provide 360-degree tracking of residents, visitors, and vehicles on the property on an as-need basis. This means that the system can cover large outdoor areas with a handful of cameras as opposed to traditional systems that often require dozens or even hundreds to do the same job. While the primary objective of the Memoreyes Outdoor Video Surveillance System is to deter crime, a second benefit is the documentation of data collected before, during, and after an event has taken place. With its high-definition video, law enforcement can rely on this data for arrest purposes and a conviction in court of law. Concise License Plate Reading We have adopted comprehensive privacy policies, which protects owners, property managers, and residents" “We don’t rely on standard pixel-following methodology. Our sophisticated software is continually sampling the environment, analyzing visual and auditory inputs against known patterns,” explains Memoreyes Co-Founder and CTO David Tattersall. “At the same time, we have adopted comprehensive privacy policies, which protects owners, property managers, and residents alike.” The complete system includes the entry/exit monitoring Entrance System that provides video of all oncoming, passing, and departing vehicles. This includes clear and concise license plate reading, even at night or in bad weather. Beyond the revolutionary technology is the price point. Because the system can cover large outdoor areas with only a handful of cameras, the cost savings can be substantial, as much as 75 percent less than alternative systems. The company offers an affordable leasing program which will save end users money in both the short and long term.
S.A.F.E., the Safety Alerts for Education Foundation, announced that it is donating the Safety Alerts for Education (S.A.F.E.) emergency mobile alerts platform to all schools, colleges and Universities across the US for free and in perpetuity. This is the exact same, fully featured system that has been in use by The Department of Homeland Security (DHS) and The Massachusetts Emergency Management Agency (MEMA) and other Federal, state and local agencies, and police departments across the country for the past seven years. S.A.F.E may save lives in situations where a few extra seconds of warning can be the difference between life and death. Ping4Alerts Emergency Communications Technology Ping4 invented and developed the Ping4Alerts emergency communications technology that the S.A.F.E. Foundation usesThe S.A.F.E. Foundation is a non-profit 501c3 organization founded by the principals of Ping4 Inc., of Nashua, NH. Ping4 invented and developed the Ping4Alerts emergency communications technology that the S.A.F.E. Foundation uses. This S.A.F.E. system is currently offered and being implemented in New Hampshire and Massachusetts Schools. This same system, developed by Ping4, was used during the Boston Marathon bomber manhunt and in the aftermath of Hurricane Sandy. At a New Hampshire launch press conference Governor Sununu lauded “the opportunity that schools now have to create a first class, world class, security and communications system for their students.” Ensuring Safety Of Students “The wellbeing of our students, and the safety of our schools, matter to all of us,” said Jim Bender, CEO of Ping4. “This issue of school safety goes well beyond making sure that our children make it home safely from school each day. It is also about creating a positive school environment which is more conducive to learning, and more conducive to teaching. We are excited to expand our New Hampshire S.A.F.E. initiative to Massachusetts. “The Columbine High School massacre was nearly 20 years ago and not much has changed since then. In the first five months of 2018, more people were killed in American public schools than in US military operations globally. This impactful step toward improving school safety can be implemented immediately, without getting held up in contentious debates over gun laws or mental health issues.” Precise And Real-Time Emergency Alerts S.A.F.E. provides real-time instructions to those inside school buildings to better protect themselves and get out of harm's way quickerS.A.F.E. enables schools to send geographically precise emergency alerts, anonymously, and in real-time, to nearly any smartphone in any school building or on any campus. A favorite of law enforcement agencies and first responders, S.A.F.E. provides real-time instructions to those inside school buildings to better protect themselves and get out of harm's way quicker. First responders outside can also receive valuable information in real-time from inside a building, even before they arrive on the scene, reducing response times and giving greater situational awareness of a shooter or other emergency. Smartphone Application For School Safety “We are pleased to be among one of the first educational institutions in the country to encourage usage of this important and meaningful smartphone application, in an effort to keep our schools safe,” said Frank Edelblut, commissioner of the New Hampshire Department of Education. “As more schools opt-in, everyone connected to the school community – educators, parents, and students – will be able to stay informed during an emergency.” “When we reviewed every after-action report of school shootings across the country, communication was always an issue,” said Perry Plummer, Director of the Division of Homeland Security and Emergency Management for the state of NH. “How do we let the people know what they should do to protect themselves and how do we let parents know that their child is safe and where to pick them up.” Administrative Alert Dashboard S.A.F.E. provides an administrative alert dashboard for school administrators to send secure life-saving alertsA free download for school students and staff on iOS or Android, S.A.F.E. provides an administrative alert dashboard for school administrators to send secure life-saving alerts. S.A.F.E. delivers 2-way rich media messages in real-time, with any combination of audio, video, pictures and text, which can be very helpful to police, school administrators, and first responders in assessing situations, saving lives, and solving crimes. S.A.F.E. is completely anonymous and collects no personal data from users of the app. Parents of children in the school can preset ‘watched locations’ on their own phone, so that they will receive all alerts sent to their children at school, as well as designated, safe child pick-up locations, regardless of where the parents are at the time. S.A.F.E. messages can originate either from the school administration itself, or from local law enforcement, or both. S.A.F.E. can be implemented locally within weeks. Each school or school system can customize, manage and send out their own alerts via an easy to use web-based portal. S.A.F.E. can isolate a school building or campus on a map and only those in the designated areas will receive the alerts. S.A.F.E.’s ability to pinpoint locations with geographic accuracy is second to none.
The Security Industry Association (SIA) has named HSI Sensing as an award winner at the 2019 SIA New Product Showcase Awards, the flagship awards program at ISC West recognizing innovative security products, services and solutions. HSI Sensing was selected as the 2019 winner of the Intrusion Detection and Prevention Solutions for its Sentinel Retro – PRX+12215 and recognized on the main stage at ISC West, the nation’s largest converged security trade show, on April 10 in Las Vegas, Nevada. Resistant To Tampering "The Sentinel Retro is designed as a drop-in replacement to simplify upgrading outdated technology and seeks to eliminate some of the most common issues that plague the industry, such as false alarms from shock and vibration, and alignment and mounting limitations,” said Travis Posey, Vice President of Business Development, HSI Sensing. Sentinel technology utilizes Hall sensors and intelligent algorithms, making them resistant to physical, electrical and magnetic tampering. Advanced engineering has also eliminated alignment issues at install and can accommodate long term door sagging. It is an honour for our Sentinel Retro to be recognized by the SIA" "It is an honor for our Sentinel Retro to be recognized by the SIA," said Posey. “We are grateful for this award and look forward to the continued development of this powerful line of products.” Innovative Products And Solutions “SIA’s New Product Showcase calls security companies to develop extraordinary, innovative products and solutions, and this year’s winners represent the best new offerings in the market,” said Don Erickson, CEO, SIA. “SIA congratulates HSI Sensing for standing out among the entries in this highly competitive program to earn the Intrusion Detection and Prevention Solutions distinction.” Since its inception in 1979, the SIA New Product Showcase has been the security industry’s premier awards-based marketing program. The 30 judges reviewed more than 95 entries from more than 80 companies in 2019, presenting awards for technologies covering more than 30 product and service categories and the prestigious Judges’ Choice Award.
Johnson Controls recently unveiled the findings of its 2018 Energy Efficiency Indicator (EEI) survey that examined the current and planned investments and key drivers to improve energy efficiency and building systems integration in facilities. Systems integration was identified as one of the top technologies expected to have the biggest impact on the implementation in smart buildings over the next five years, with respondents planning to invest in security, fire and life-safety integrations more so than any other systems integration in the next year. As advanced, connected technologies drive the evolution of smart buildings, security and safety technologies are at the center of more intelligent strategies as they attribute to overall building operations and efficiencies. SecurityInformed.com spoke with Johnson Controls, Building Solutions, North America, VP of Marketing, Hank Monaco, and Senior National Director of Municipal Infrastructure and Smart Cities, Lisa Brown, about the results of the study, smart technology investments and the benefits of a holistic building strategy that integrates security and fire and life-safety systems with core building systems. Q: What is the most striking result from the survey, and what does it mean in the context of a building’s safety and security systems? The results show an increased understanding about the value of integrating safety and security systems with other building systems Hank Monaco: Investment in building system integration increased 23 percent in 2019 compared to 2018, the largest increase of any measure in the survey. When respondents were asked more specifically what systems they we planning to invest in over the next year, fire and life safety integration (61%) and security system integration (58%) were the top two priorities for organizations. The results show an increased understanding about the value of integrating safety and security systems with other building systems to improve overall operations and bolster capabilities beyond the intended function of an individual system. Q: The survey covers integration of fire, life safety and security systems as part of "smart building" systems. How do smarter buildings increase the effectiveness of security and life safety systems? Hank Monaco: A true “smart building” integrates all building systems – security, fire and life-safety, HVAC, lighting etc. – to create a connected, digital infrastructure that enables individual technologies to be more intelligent and perform more advanced functions beyond what they can do on their own. For example, when sensors and video surveillance are integrated with lighting systems, if abnormal activity is detected on the building premise, key stakeholders can be automatically alerted to increase emergency response time. With integrated video surveillance, they also gain the ability to access surveillance footage remotely to assess the situation. When sensors and video surveillance are integrated with lighting systems abnormal activity on the premise can automatically be detected Q: How can integrated security and life safety systems contribute to greater energy efficiency in a smart building environment? Hank Monaco: Security, fire and life-safety systems can help to inform other building systems about how a facility is used, high-trafficked areas and the flow of occupants within a building. Integrated building solutions produce a myriad of data that can be leveraged to increase operational efficiencies. From an energy efficiency standpoint, actionable insights are particularly useful for areas that are not frequently occupied or off-peak hours as you wouldn’t want to heat or cool an entire building for just one person coming in on the weekend. When video surveillance is integrated with HVAC and lighting systems, it can monitor occupancy in a room or hallway. The video analytics can then control the dimming of lights and the temperature depending on occupant levels in a specific vicinity. Similarly, when access control systems are integrated with these same systems, once a card is presented to the reader, it can signal the lights or HVAC system to turn on. In this example, systems integration can ultimately help enable energy savings in the long run. Security and life safety systems contribute to help enable greater energy efficiency and energy savings in the long run Q: What other benefits of integration are there (beyond the core security and life safety functions)? Hank Monaco: Beyond increased security, fire and life-safety functions, the benefits of systems integration include: Increased data and analytics to garner a holistic, streamlined understanding of how systems function and how to improve productivity Ability to track usage to increase efficiency and reduce operational costs Enhanced occupant experience and comfort Increased productivity and workflow to support business objectives Smart-ready, connected environment that can support future technology advancements Q: What lesson or action point should a building owner/operator take from the survey? How can the owner of an existing building leverage the benefits of the smart building environment incrementally and absent a complete overhaul? Lisa Brown: Johnson Controls Energy Efficiency Indicator found that 77% of organizations plan to make investments in energy efficiency and smarter building technology this year. This percentage demonstrates an increased understanding of the benefits of smart buildings and highlights the proactive efforts building owners are taking to adopt advanced technologies. There is an increased understanding that buildings operate more effectively when different building systems are connected As smart buildings continue to evolve, more facilities are beginning to explore opportunities to advance their own spaces. A complete overhaul of legacy systems is not necessary as small investments today can help position a facility to more easily adopt technologies at scale in the future. As a first step, it’s important for building owners to conduct an assessment and establish a strategy that defines a comprehensive set of requirements and prioritizes use-cases and implementations. From there, incremental investments and updates can be made over a realistic timeline. Q: What is the ROI of smart buildings? Lisa Brown: As demonstrated by our survey, there is an increased understanding that buildings operate more effectively when different building systems are connected. The advanced analytics and more streamlined data that is gathered through systems integration can provide the building-performance metrics to help better understand the return on investment (ROI) of the building systems. This data is used to better understand the environment and make assessments and improvements overtime to increase efficiencies. Moreover, analytics and data provide valuable insights into where action is needed and what type of return can be expected from key investments.
Across the country, law enforcement officers are finding it increasingly difficult to respond to the near overwhelming number of calls coming from security alarms. Police departments commonly define a false alarm as a call, which upon investigation, shows no evidence of criminal activity, such as broken windows, forced doors, items missing, or people injured. While false alarms bog down police, they can also negatively impact customers and integrators. End users can expect hefty fines for false alarm responses, and when these customers receive large bills from the city, many turn to installers, dealers, and even manufacturers expecting them to accept the responsibility and pay the check. What First Brought The Issue Of Alarm Verification To Your Attention? It is crucial to both see a situation and concurrently listen to any corresponding sounds to gain full insight I’ve been aware of the problem of false alarms for about 5 years. I believed audio capture, through microphone deployment, could be an active part of the solution when used as a second source for indicating ‘out of the norm’ activity and as an equal component with the video surveillance technology. In 2015, I found similarly minded security professionals when introduced to the Partnership for Priority Verified Alarm Response. After reading PPVAR’s paper on ‘Audio Verified Alarms Best Practices; [April 2015],’ I knew that the Partnership was on to something important. In our lives, two of the five senses we count on day-in and day-out are sight and sound. It is crucial to both see a situation and concurrently listen to any corresponding sounds to gain full insight. What Is The False Alarm Rate? In 2016, the International Association of Chiefs of Police reported that over 98 percent of all alarm calls in the United States were false. This number is obviously staggering, and something we need to work towards correcting. Why Did This Issue Resonate So Strongly With You? When I first investigated this issue, I was sure that the security industry would have already recognized this and was acting to ensure improved alarm verification, preferably through a combination of audio and video technologies. However, I quickly saw that this was not the case, or even close to the norm. I have questioned the rationale behind the lack of adoption and found the deployment of audio is often hindered by the concern of privacy. I’ve spearheaded many initiatives to explain the monitoring policies surrounding audio As CEO of Louroe Electronics, I’ve spearheaded many initiatives to explain the monitoring policies surrounding audio. I’ve had to reassure many security personnel and customers how the law supports the use of audio in public places as long as there is no expectation of privacy. By dispelling fears with facts around deploying and implementing audio sensors, customers can confidently include audio in their surveillance systems and gain a more effective security solution. Who Is Affected By This? Truth be told, everyone from the end user to the manufacturer is affected by this issue. Not to mention the strain this puts on law enforcement who are tired of ‘wasting time’ and effort out in the field on these nuisance alerts. When an end user receives a check for their false alarm, many of them will immediately blame the integrator and or the monitoring center for a faulty set up and management and expect the integrator to remedy the situation, including carry the burden of paying the fines. The integrator, on the other hand, will turn to the manufacturer, assuming faulty equipment and installation instructions; therefore, looking for reimbursement for the cost. What Is The Average False Alarm Fee? It depends on many factors, and especially your first responder assigned location for responseIt depends on many factors, and especially your first responder assigned location for response. According to the Urban Institute, fees generally range from $25-$100 for the first offense, rising as high as a few thousand dollars per false alarm if a location has a large number in a single year. What’s worse, in extreme cases, alarm systems may even be blacklisted by the police dispatch center if they have raised too many false alarms in the past. Why Do You Believe Audio Is The Ideal Technology For Secondary Source Verification? Video surveillance has been the main option for security monitoring and alarm validation for decades, however industry professionals are realising that video alone is not enough. Video only tells half of the story, by adding audio capture, the responsible party gains a turnkey solution with the ability to gather additional evidence to verify alerts and expand overall awareness. In reality, audio’s range is greater than the field of view for a camera. Sound pickup is 360 degrees, capturing voices, gunshots, breaking glass, sirens, or other important details that a fixed camera many not see. How Would A Secondary Source Verification System Work With Audio? Using a video monitoring solution equipped with audio, the microphone will pick up the sounds at the time a visual alert or alarm is triggered. If embedded with classification analytics, the microphone will send alerts for specific detected sounds. The captured audio, and any notifications are immediately sent to the monitoring station, where trained personnel can listen to the sound clip, along with live audio and video from their station. When law enforcement receives a validated alarm, they can better prioritise the response From here, an informed decision can then be made about the validity of the alarm, along with what the current threat is at the location. If the alarm is in fact valid, the information is then passed along to the law enforcement within minutes. When law enforcement receives a validated alarm, they can better prioritise the response. It also provides more information in a forensic evaluation. Are There Any Additional Resources You Would Suggest Looking Into? Yes, we would suggest looking into the following to see a few different perspectives on the matter: NSA Support For 2018 Model Ordinance For Alarm Management and False Alarm Reduction Partnership for Priority Verified Alarm Response Support for the Term “Verified Alarm” and Prioritising Verified Alarm Responses Urban Institute Opportunities for Police Cost Savings without Sacrificing Service Quality: Reducing False Alarms
The extensive analysis and discussion preceding any decision to implement a new physical security solution – whether it’s hardware, software or a combination of both – often focuses on technology, ROI and effectiveness. When it comes to deciding what type of security entrances to install at your facility, you will almost certainly also consider the aesthetics of the product, along with throughput and, if you’re smart, you’ll also look into service concerns. Each of these factors has its important place within the evaluation process, and none should be overlooked as they all have a significant effect on how well your entrances will perform once they are installed. Culture Influences Door Solution Decisions How significant will the change from current entrances to security entrances be for employees? Still, one additional factor actually trumps everything: if you have not considered your organization’s culture in choosing a security entrance, you may be missing the most important piece of the puzzle. Culture is a part of every other decision factor when selecting an entry solution. Before you make a decision about what type of entrance to deploy, you need to consider and understand the values, environment and personality of your organization and personnel. For example, how significant will the change from current entrances to security entrances be for employees? If people are accustomed to simply walking through a standard swinging door with no access control, this will be a culture change. Beyond this, whether you are considering a type of turnstile, a security revolving door or possibly a mantrap portal, simply walking through it will be a significant change as well. Training Employees On Door Security You’ll want to know whether employees have ever used security entrances before. If these types of entrances are in place in another part of the facility, or in a facility they’ve worked in at an earlier time, the adjustment will not be as great as if they’ve never used them at all. Consider, too, how your personnel typically react to changes like this in the organization or at your facility. They may be quite adaptable, in which case there will be less work to do in advance to prepare them. However, the opposite may also be true, which will require you to take meaningful steps in order to achieve buy-in and train employees to properly use the new entrances. With the increased importance of workplace security, discussing new entrances with workforces will help maintain a safer environment Communicate Through The Decision-Making Process All of this will need to be communicated to your staff, of course. There are a number of ways to disseminate information without it appearing to come down as a dictate. Your personnel are a community, so news about changes should be shared rather than simply decreed. As part of this process, you’ll need to give some thought to the level of involvement you want for your staff in the decision-making process. Finally, do not overlook the special needs among your personnel population. You undoubtedly have older individuals on staff, as well as disabled persons and others who bring service animals to the office. Entrances need to be accessible to all, and you never want to be in the position of having a gap in accessibility pointed out to you by the individual who has been adversely affected. New Security Entrance Installation By communicating early and often with your personnel, you can alleviate a great deal of the anxiety Once you have made the decision about which security entrances to install, training your personnel on how to use the new security entrances – both before and after the installation – will help to smooth the transition. Because workplace security is such a big issue right now, it makes sense to discuss the new entrances in the context of helping to maintain a safer environment. They will prevent violent individuals from entering, decrease theft, and most of all, promote greater peace of mind during the workday. If you can help them take control of their own safety in a responsible way, you have achieved much more than just a compliant workforce. By communicating early and often with your personnel, you can alleviate a great deal of the anxiety and concern that surrounds a significant change in the work environment. Schedule Group Meetings Consider your employees; what type of communications do they respond best to? A few suggestions to educate staff on the benefits of the new entrances include: Typically, you would communicate a general message 2-3 months in advance and then provide more specific information (for example, impacts to fire egress, using certain entrances during construction) in a follow up message closer to the installation date. Schedule group meetings to: announce the rationale for increased security, share statistics on crime, review the new security changes that are coming, show drawings/photos of the new doors/turnstiles, and show the orientation videos available from the manufacturer. These meetings are an excellent way to work through user questions and directly address any concerns. Once the installation of a new security system is complete, it is a good idea to have an "ambassador" on board to help employees use these new systems Ensure You Monitor Public Areas If you are implementing a lot of new changes, such as a new access control system, new guard service and security entrances, you might consider hosting a ‘security fair’ on a given day and have the selected vendors come for a day with tabletop displays to meet employees and answer questions during their lunch. This could be a great way to break the ice in a large organization. Make user orientation videos (provided by the manufacturer) available in several ways, for example: Intranet Site Monitors in public areas—lounges, cafeteria, hallways, etc. Send to all staff as email attachments Immediately after installation, once the doors or turnstiles are operational but before they are put into service, train ‘ambassadors’ on how to use the door/turnstile. Have these people monitor and assist employees during peak traffic times. What Is The Ultimate Success Of The Installation? By communicating clearly and openly with your population you can greatly facilitate adoption and satisfaction If you have thousands of employees, consider dividing them into groups and introduce the new entrance to one group at a time (Group A on Monday, Group B on Tuesday, etc.) to allow a little extra orientation time. Place user education ‘quick steps’ posters next to the door/turnstiles for a few weeks to help employees remember the basic steps and guidelines, e.g., ‘stand in front of the turnstile, swipe badge, wait for green light, proceed.’ Ask your manufacturer to provide these or artwork. While there are always going to be people who are resistant to change, by communicating clearly and openly with your population you can greatly facilitate adoption and satisfaction. Your responsiveness to any issues and complaints that arise during and after the implementation is equally fundamental to the ultimate success of the installation.
The mindset behind a new law to prohibit the use of facial recognition and other security-related technologies by San Francisco police and other city agencies is obvious in the name of the new ordinance: “Stop Secret Surveillance.” Ordinance To Stop Secret Surveillance The San Francisco Board of Supervisors passed the ordinance 8-1 with two abstentions on May 14, and there will be another vote next week before it becomes law. We have an outsize responsibility to regulate the excesses of technology precisely because they are headquartered here" The irony of such a law emanating from northern California, where tech giants promote the use of numerous technologies that arguably infringe on privacy, is not lost on Aaron Peskin, the city supervisor who sponsored the bill. “We have an outsize responsibility to regulate the excesses of technology precisely because they are headquartered here,” he told the New York Times. Regulating Facial Recognition Technology Although the facial recognition aspects of the ordinance have been the most publicized, it also targets a long list of other products and systems. According to the ordinance, "Surveillance Technology" means “any software, electronic device, system utilizing an electronic device, or similar device used, designed, or primarily intended to collect, retain, process, or share audio, electronic, visual, location, thermal, biometric, olfactory or similar information specifically associated with, or capable of being associated with, any individual or group.” Broadly interpreted, that’s a lot of devices. Includes Biometrics, RFID Scanners The ordinance lists some examples such as automatic license plate readers, gunshot detection hardware and services, video and audio monitoring and/or recording equipment, mobile DNA capture technology, radio-frequency ID (RFID) scanners, and biometric software or technology including facial, voice, iris, and gait-recognition software and databases. Among the exceptions listed in the ordinance are physical access control systems, employee identification management systems, and other physical control systems; and police interview rooms, holding cells, and internal security audio/video recording systems. The ordinance ban applies to city departments and agencies, not to the general public and exceptions include physical access control systems, employee identification management systems, and internal security audio/video recording systems Airport Security Not Part Of Ordinance The ban only applies to city departments and agencies, not to private businesses or the general public. Therefore, San Franciscans can continue to use facial recognition technology every day when they unlock their smart phones. And technologies such as facial recognition currently used at the San Francisco airport and ports are not impacted because they are under federal jurisdiction. Furthermore, the San Francisco police department does not currently use facial recognition anyway, although it has been deployed in places such as Las Vegas, Orlando, Boston and New York City. Safeguarding Privacy Of Citizens The ordinance appears to have a goal of avoiding government uses of technologies that can invade individual privacy, seeking to avoid worst-case scenarios such as an existing system in China that uses millions of surveillance cameras to keep close tabs on the Uyghurs, a Muslim minority population. Any new plans to use surveillance technology must be approved by the city government, and any existing uses must be reported and justified by submitting a Surveillance Technology Policy ordinance for approval by the Board of Supervisors within 180 days. Surveillance Technology Policy Banning use of facial recognition just when its capability is being realized is counterproductive But might such a ban on technology uses undermine their potential value as crime-fighting tools just when they are poised to become more valuable than ever? Ed Davis, a former Boston police commissioner, told the New York Times it is “premature to be banning things.” He notes: “This technology is still developing, and as it improves, this could be the answer to a lot of problems we have about securing our communities.” Technology development doesn’t happen in a vacuum and banning uses of facial recognition and other technologies just when their capabilities are being realized is counterproductive. We should be thoughtful, deliberate and transparent in how we embrace new technologies. However, discarding them out-of-hand using emotionally charged words such as “secret surveillance” does not promote the best use of technology to the benefit of everyone.
Knightscope’s long-term mission is to “make America the safest country in the world,” says William Santana Li, Chairman and CEO. “The company was started six years ago as we had grown tired and horrified by the ongoing violence in our country and decided to do something about it.” But are security robots the solution to crime and violence in the United States? “There are 2+ million law enforcement and security professionals trying to secure 328+ million people across the 50 states,” Mr. Li says. “The math just doesn’t work, which is why our country pays $1+ trillion in negative economic impact annually – a hidden tax we all pay in blood, tears and treasure.” Robots provide professionals with new tools. “We make really smart eyes and ears that operate 24/7/365 for an affordable price,” says Mr. Li. “We have actually operated more than 700,000 hours in the real world, both outdoors and indoors, across 15 states and are now operating across five time zones – fully autonomous without any human intervention.” Utilizing Robotics And AI AI helps Knightscope robots interact better with humans and perform activities like identifying peopleKnightscope is a security technology company that utilizes self-driving technology, robotics and artificial intelligence to provide security professionals additional eyes and ears to do their jobs much more effectively – as well as provide a consistent around-the-clock physical deterrence to help minimize negative behavior. Knightscope says its K1, K3 and K5 security robots, and accompanying user interface, the Knightscope Security Operations Center (KSOC), continue to make significant contributions to the safety of its client base. Artificial intelligence helps Knightscope robots interact better with humans and perform activities like identifying people, looking up license plates, detecting rogue wireless devices, having a machine-to-human dialog and, in the future, detecting dangerous objects in a scene automatically. “Our long-term plan is to have the machines be able to see, feel, hear and smell, so advances in sensor capabilities, efforts in sensor fusion, and the future with 5G capabilities will make for profound advances,” says Mr. Li. Facial Recognition Software At ISC West 2019 was Knightscope’s fourth time exhibiting at ISC West, and they have also exhibited at GSX/ASIS, ISC East, numerous other trade shows, and have hosted some of their own. Mr. Li has seen the reaction to security robots evolve over the years. People are realizing that the technology is not science fiction but science fact and looking to see how it can be an integral part of their respective security programs “At first, it was typically ‘what is that?’ or ‘what does it do?’ But the last 12 to 18 months have been very different. There has been much more meaningful, implementation-focused dialog, feedback, requests for new features, etc. Now folks are realizing that our technology is not science fiction but science fact and looking to see how it can be an integral part of their respective security programs.” Their ISC West presence this year highlighted facial recognition software that utilizes deep learning to detect, analyze and compare faces. Pechanga Resort Casino in Temecula, Calif., an existing Knightscope customer, is using the beta format on its K1 security robot platform. Additional Benefits Of Using Robots Knightscope has raised over $40 million to develop and deploy its technology and is backed by more than 6,000 family offices, accelerators, funds, private investors and four major corporations, says Mr. Li. As the machines get smarter and more capable over time – the number of applications will become endless" Robots also provide additional benefits beyond security, says Mr. Li, such as branding, community relations and public relations opportunities for clients. “In some cases, our clients have utilized our Concierge feature to allow for human-to-machine customer service interactions,” he says. “We have also been able to showcase and inspire STEM (science, technology, engineering and math) students with practical applications of technology for the good of society. And robot selfies have certainly become a thing.” Endless Number Of Applications In terms of vertical markets, in the near term, Knightscope has seen positive scaling and growth on corporate campuses and at logistics facilities, manufacturing plants, hospitals, casinos, commercial real estate and malls. “As the machines get smarter and more capable over time – the number of applications will become endless,” says Mr. Li. They currently drop new software code every two weeks and new hardware typically a couple of times a year. “In my opinion, it is ill advised for early stage technology companies to utilize B2G (business-to-government) sales as the initial go-to-market strategy,” says Mr. Li. “For Knightscope we have been primarily focused on B2B (business-to-business) sales and actually until 2017 were geographically constrained to California only. What we are doing is technologically extremely difficult as these are effectively self-driving cars. Additionally, despite the never-ending international interest, we are laser focused on the United States.”
In today’s technology-driven markets, a platform is a business model that connects producers and consumers in an interactive ecosystem. Some examples of platforms are Uber and Airbnb, which have disrupted and transformed traditional markets. Isn’t it time to deploy the platform model in the physical security industry? That’s the goal of the Open Security & Safety Alliance (OSSA), a non-profit organization. Interactions And Exchange The book ‘Platform Revolution’ defines a platform as ‘a business based on enabling value-creating interactions between external producers and consumers.’ The description continues: ‘The platform provides an open, participatory infrastructure for these interactions and sets governance conditions for them. The platform’s overarching purpose is to consummate matches among users and facilitate the exchange of goods, services, or social currency, thereby enabling value creation for all participants.’ Platform For Security And Safety Solutions OSSA’s plan is to build a common standardized platform for security and safety solutions. Founding members are Bosch Building Technologies, Hanwha Techwin, Milestone Systems, Pelco and VIVOTEK. Anyone can join the alliance, which is growing rapidly and gaining traction as the Internet of Things (IoT) expands. OSSA’s plan is to build a common standardised platform for security and safety solutions OSSA members could be found throughout the recent ISC West show in Las Vegas, and a social event after hours at the show brought them together and set the tone for development to come. A Technology Stack “We want to create an ecosystem, define a common market approach and open new market opportunities,” says Johan Jubbega, OSSA President. “We want to go from a product business to a platform business. It’s better for us and better for the end-users.” OSSA seeks to develop a specification for a common Technology Stack to cater to innovation and reduce fragmentation within the security and safety market, according to OSSA. Its mission is complementary to organizations like ONVIF. Video Information And Low Friction The video surveillance industry creates vast amounts of information in the form of video, but typically less than 1 percent of that data is used by today’s video surveillance systems – think about that one or two frames of video among thousands that might be used to solve a crime, for example. The rest of the data remains unused, and yet the potential value of the data is huge. OSSA seeks to create a platform to leverage the value of the data. “If we don’t unlock that value in our industry, someone will do it for us,” says Jubbega. OSSA is developing a vendor-agnostic operating system that simplifies low-level device integration and standardizes elements such as cybersecurity and security update patches Among the important elements in developing the platform are to create a level of trust among all the stakeholders involved, and to lower the ‘friction’ involved in participating in the platform. “We want to make it easy and fun to do business with anyone who joins the platform,” says Jubbega. “By taking away the friction, we will create scalability.” System-On-Chip Development of customisable system-on-chip (SoC) components in today’s video cameras provide the capacity to host a variety of ‘apps’ to expand system functionality and leverage the value of data. OSSA is developing a vendor-agnostic operating system that simplifies low-level device integration and standardizes elements such as cybersecurity and security update patches. Building on top of that operating system, vendors can create new levels of differentiation. “Our purpose is to start from a common business model to spur innovation and add value for users,” according to OSSA. Cybersecurity And Data Protection SAST is creating the operating system and setting up the IoT infrastructure to make apps available Simply speaking, app developers can use the standard operating system to build new functionalities that can easily be ‘loaded’ on cameras and sold in an ‘app store’ scenario. Security and Safety Things (SAST), a Bosch startup and member of OSSA, is creating the operating system and setting up the IoT infrastructure to make the apps available. Development of these elements is happening concurrently with the evolution of OSSA. “We offer you an opportunity to come with us on this journey,” Jubbega told attendees at the ISC West social event. “We want to have a common approach to tackling cybersecurity and data protection – to raise the bar in the industry. You can still differentiate, but from a higher base.” OSSA members who exhibited at ISC West included Anixter Inc., Bosch Building Technologies, Hanwha Techwin, Milestone Systems, NetApp Inc., Pelco, SAST, Socionext Inc., United Technologies and VIVOTEK Inc.
Located in the buzzing heart of England’s capital city, University College London is one of the top ranking establishments for higher education in the world. Founded in 1826, London’s first university institution, the College now has an estimated 28,600 enrolled students and 14,600 members of staff. Including agency staff, academic associates, and other visitors, UCL currently has a system of over 48,000 valid cardholders. Based primarily in the Bloomsbury area, UCL’s main campus is situated on Gower Street and includes departments such as biology, chemistry, economics, engineering, geography, history, languages, mathematics, philosophy, politics, physics, architecture and the Slade School of Fine Art, as well as the preclinical facilities of the UCL Medical School and the London Centre for Nanotechnology. Electronic access control UCL has been used as a location for a number of high profile film and television productions While the UCL Cancer Institute and Faculty of Laws are also nearby, notable College buildings include the original Wilkins Building and Gower Street’s Cruciform Building, previously home to University College Hospital. The University has further sites based elsewhere in and around London, such as the UCL Institute of Ophthalmology, the UCL Institute of Orthopaedics and Musculoskeletal Science, The Royal Free Hospital Medical School, and also the UK’s largest university-based space research group, the Mullard Space Science Laboratory, and UCL’s own astronomical observatory at Mill Hill. Due to its position within London and the historical nature of its buildings, UCL has been used as a location for a number of high profile film and television productions, including Gladiator, The Mummy Returns, The Dark Knight and Inception. The sheer scale of the University’s operations, with thousands of occupants fluctuating between its numerous facilities, has dictated the need for a comprehensive electronic access control security system – one which has evolved over many years. Physical locking controls UCL’s Security Systems Manager, Mike Dawe explains that while adhering to the University’s culture of ‘general openness’ on campus, Gallagher systems have been introduced as “a progressive response to the need for more security control on site.” Security throughout the University is managed by the Security Department of the Estates Division, which has responsibility for all the physical locking controls and electronic systems, as well as the provision of the security guarding service. By and large an open campus, a number of university buildings are free to visitors from the general public, while others are controlled by turnstiles accessible by valid cardholders only. Many other research areas are available only to those with specific security passes. Gallagher’s systems have been in place with the University since 1993 and were originally chosen for the Gallagher Commander Hardware’s ability to communicate effectively over long distances between buildings. Key industry challenges Following were the key industry challenges involved: Ensuring appropriate access to students/staff onsite Implementation of lockdown and evacuation procedures Controlling access to key University areas Protecting University property Providing unobtrusive but robust security Control and management of multiple systems Visitor time and access management Central records systems Full data integration was achieved in 2006 when the system was linked to UCL’s central HR Recognized by Mike as the ‘next important direction for the University’, the subsequent introduction of the Gallagher Access Control system (formally Cardax FT) in 2003 enabled Gallagher’s main security system to be integrated with UCL’s other data systems. Additionally, Mike highlights how “Gallagher’s ‘building blocks’ approach to programming the software also provided greater flexibility when using the system, while the network infrastructure enabled us to move away from our own discrete wiring.” Full data integration was achieved in 2006 when the system was linked to UCL’s central HR, student records and visitor records databases. Combining the regular ID card with a single access control card then followed, and validity is kept fully updated by the University’s central records systems. Currently the University has 101 buildings on the Gallagher system, which controls 939 doors, 32 turnstiles and 15 lifts. General perimeter control Typically, Gallagher security is used for the general perimeter control of the buildings, such as those with both turnstile access and a reception at the entrance, as well as additional control within College buildings to divide public and semi-public areas from departmental spaces. Gallagher systems also control UCL’s top security areas such as high risk research space and data centers. Describing UCL’s security operation, Mike explains how the Gallagher solution has been integrated with the inhouse HR, student and visitor records systems and filters duplications to ensure a single identity. This information is then fed through the Gallagher system to update cardholder records using an ‘import/export’ function. The Gallagher technology is also used to automatically send barcode information to the Library systems and update the student records system with student photos. Scheduled email notification reports are also sent regularly which, according to Mike, “has proved very useful for UCL’s high value areas.” Security operations team We routinely use reports and produce these in response to departmental concerns and requests" “We routinely use reports and produce these in response to departmental concerns and requests”, he explains. “Typically this is done by the security operations team, which analyses the information, along with CCTV data to investigate suspected crimes.” UCL is planning to integrate the Gallagher Security system with its existing CCTV system and will use this, in addition to the new Command Centre Premier client, to improve the provision of site information to the Security Control room staff. The University is also currently developing its import/ export process to automatically provide access levels based on person-type information, such as department, course etc. Gallagher would like to thank Mike Dawe, UCL’s Security Systems Manager, for his support with the production of this site profile. We would also like to acknowledge the support of our security partner, Reach Active Limited who has contributed significantly to the successful implementation of the Gallagher system at University College London.
The first forensic science-based crime prevention system in New York State was installed at luxury Swiss watch manufacturer, Richard Mille. It is the fourth system to be deployed in the United States. The technology, the Intruder Spray System from SelectaDNA, utilizes forensic science to reduce burglary, robbery and high-value theft by a documented range of 40 to 86 percent. The cutting-edge technology was installed at the world-renowned watch brand’s architecturally stunning flagship boutique, located on ‘Billionaire’s Row’ on 57th Street in Manhattan. Irrefutably identify criminals The forensic technology is synthetically manufactured in an accredited ISO 17025 laboratory The system uses the power of forensic marking science to considerably deter crime and, if a crime is committed, enhances law enforcement ability to irrefutably identify criminals, then apprehend and prosecute them. The technology has been used for more than ten years in 46 countries on five continents. It is now available and beginning to be deployed in the United States. The forensic technology is synthetically manufactured in an accredited ISO 17025 laboratory. It is scientifically structured, and functions, the same as organic DNA – but is more durable. Each unit of the forensic solution contains a universally unique code (sequence), which is never replicated; thus; providing an exclusive identifying marker for each client. Each unique forensic code provides an uncontestable link between a criminal, or stolen item, to a specific crime scene and the rightful owners. Remote video monitoring The system – comprised of a control box, spray head and PIR – is easily integrated with other security systems such as burglary, access control, intrusion, video, and many others. Installations take approximately four hours. The system can also be installed as a standalone crime-fighting solution. There are various modalities of system activation, including but not limited to panic buttons, money clips, remote video monitoring via Milestone Systems, RFID and facial recognition technology. When the system is activated, the invisible, non-toxic and water-based forensic solution remains on marked criminals’ skin for four to six weeks, and clothing for two to three months. The solution is only visible via a special frequency UV light, leaving criminals exposed to identification and apprehension well after leaving the crime scene. Crime-fighting technology SelectaDNAs forensic marking technology is a well-documented tool to prevent and deter a large percentage of crime" “We’re pleased to provide Richard Mille with a proven crime-fighting technology to further enhance its already impressive security measures,” said Henrik Olsen, CEO of CSI Protect, the exclusive provider of SelectaDNA technology in the United States. “SelectaDNAs forensic marking technology is a well-documented tool to prevent and deter a large percentage of crime across the globe and now in the United States.” Many Fortune 500 and iconic, well-known companies have used SelectaDNA technology, including, Tag Heuer, LVMH, Chanel, Pandora, Watchfinder & Co., 7-Eleven, Circle K, G4S, Securitas, GlaxoSmithKline, Lloyds Bank, The Royal Bank of Scotland (RBS), Bank of New Zealand, McDonald’s, KFC, Balfour Beatty, Shell, Texaco, Raptis Rare Books and thousands of others. Offender marking solutions The co-founder of Milestone Systems, Henrik Friborg Jacobsen, is a major proponent of the technology and anticipates major growth of its use in the United States. Friborg Jacobsen is also an investor in, and chief advisor to, CSI Protect. SelectaDNA is a pioneer in forensic marking offering a full range of property, infrastructure and offender marking solutions, using a completely secure and unique forensic technology. SelectaDNA, which is water-based, non-toxic and non-flammable, is proven to reduce crime (especially robbery, burglary and high-value theft) by up to 86%. SelectaDNA not only reduces crime, but also enables law enforcement to link criminals to crime scenes and secure convictions.
Siklu, the pioneer in 5G mmWave wireless network solutions, announced that its radios have been deployed in the City of Cambridge, located roughly 100km West of Toronto in Ontario, to provide outdoor video security and support potential public Wi-Fi network services. The city has fiber connections connecting several municipal buildings and continues to deploy more where it makes economic sense. fiber is used to connect fire stations to City Hall, for example. However, this particular application, outdoor video security, was one that needed more flexibility to accommodate the necessary camera locations. Most parking lots, Intersections and pedestrian walkways do not have a fiber POP (‘point of presence’) nearby. This meant the answer would almost certainly have to be a wireless solution. Need of flexible video security solution The wireless network would need to be able to backhaul gigabit per second public Wi-Fi APs with no additional truck rollsThe solution to be chosen had several additional requirements. It needed to be flexible when it came to expanding the video security coverage, it had to be secure and it also had to have enough capacity that it could support additional high bandwidth applications, such as the deployment of Public Wi-Fi. The wireless network would then need to be able to backhaul gigabit per second public Wi-Fi APs (‘access points’) with no additional truck rolls. The successful bidder on the project was Alliance Security Systems. Alliance investigated 5 GHz solutions as well as 60 GHz and determined that only 60 GHz products could meet current and future requirements. The ‘EtherHaul 600’ point-to-point 60 GHz solution from Siklu features plenty of capacity (from 100Mbps up to 1Gbps, software upgradeable), flexible deployment options (up to 1km “link” range), small size (mountable on street light poles) and immunity to radio interference (e.g., 5 GHz systems are subject to the ever increasing Wi-Fi noise floor). Deployment of P3717 multi-Lens cameras Phase 1 of the program supported ten multi-lens camera deployments, and the network design had six 1-Gbps Siklu V-Band radios collocated at the city Clock Tower. This dense colocation was a result of the very narrow 60GHz radio beams and the abundant spectrum (14GHz) available. Deployment of the Siklu radios was accomplished within a week and incorporated an Axis Communications P3717 multi-lens cameras managed by a Genetec Security Center unified security platform. Since the installation of the video security network, a car theft ring was apprehended and there has been a reduction in crimeTom Hackett, Alliance Security Systems stated: “By utilizing the point to point technology in such a way where we co-locate the head end, we end up approaching a cumulative speed of over 10Gbps per second once Phase 2 is commissioned. That’s just an astounding wireless speed in today’s world. The network has been such a success that beyond expansion plans with Cambridge, we are in discussions with other municipalities.” Reduction in crimes The City also operates the Phase 1 network to provide access to police as requested for specific incidents or investigations. Since the installation of the video security network, a car theft ring was apprehended and there has been a noticeable reduction in crime. Beginning in June 2019 or as soon as light poles become available, Phase 2 will add seven new cameras and will be supported by Siklu’s V-Band ‘EtherHaul 600’ radios. The EtherHaul 600 units feature 1 Gbits of capacity and can accommodate future expansions of the system. “The network was installed and is delivering in all aspects – high up time and excellent video quality,” said Trevor McWilliams, Manager of Business Development for the City of Cambridge Ontario Economic Development. “We are confident that the network deployed will operate for many years and be able to support new applications as needed.”
Wellington is the southernmost capital city in the world and is the center of New Zealand government. With the second highest population in the country, Wellington is a large coastal city with a diverse range of facilities and attractions. A large portion of those facilities and attractions are the responsibility of the Wellington City Council (WCC) – a local body government organization employing around 1,800 staff. As with all councils that manage a large number of facilities on behalf of their city, the WCC has a broad range of security needs and an accountability to the rate-paying citizens of Wellington. Since 2001, WCC has met those security needs with Gallagher’s integrated security solutions. Central management platform WCC developed a five year plan to migrate all 150 sites on to the Gallagher system With 1,800 employees and 150 sites located across Wellington, the council has a large number of people and assets to secure. With sites including libraries, swimming pool complexes, community and recreation centers, housing blocks, a city zoo, event facilities, and a multi-story central office building, the security requirements vary considerably. “We’re responsible for securing and monitoring all 150 sites around the clock” said Chetan Prasad, Security Manager for Wellington City Council. “It’s imperative we have a reliable system that provides us with a complete view of activity at all sites”. In order to deliver this, WCC uses Gallagher’s Command Centre central management platform to manage security across numerous sites. Utilizing a single security platform has been a long-term objective of the council. Initially operating six different systems, WCC developed a five year plan to migrate all 150 sites on to the Gallagher system. Chetan links the Council’s growth with their need to become smarter about how security is managed. Primary security solution “Gallagher’s system has enabled us to standardize our infrastructure and bring all elements including alarm management, fire systems, vehicle bollards, video surveillance, facility and carpark access, reporting, visitor management, and more, on to one platform. That was a key factor in why we chose Gallagher initially, and why we will continue with them as our primary security solution.” Visibility is critical when you have 150 independent sites to secure. An integration between Command Centre and over 400 cameras located throughout the WCC’s facilities provides live video footage to the security team. “Our camera integration with Command Centre means that in addition to being able to continuously observe critical areas, any site alarm that is triggered will immediately bring up a live video feed for the security staff in our control room. This visibility is invaluable for us in activating appropriate responses and, in the event of a crime, being able to provide crucial evidence to police” said Prasad. Electronic access control WCC is utilizing Gallagher security technology to ensure staff are protected In addition to securing facilities and assets, WCC secures and protects staff working at each of its sites. From initiatives like integrating building elevators with access control to prohibit unauthorized entry, to the integration of panic buttons at each site, WCC is utilizing Gallagher security technology to ensure staff are protected and that in the event of an incident, a rapid security response is initiated. According to Prasad, the Gallagher system is delivering cost savings to the Council in several key areas. The first area relates to the shift from traditional key systems to smart card technology. “With such a large staff base and so many sites, we inevitably faced challenges with traditional keys being lost or not returned by staff or contractors” said Prasad. Rekeying a site cost the Council approximately $4,000 each time – an expense that has now been eliminated by the replacement of traditional lock and key systems with electronic access control. Visitor management solution “Now if a card is lost or not returned, we simply deactivate it in our system. Not only is it a solution that saves us money” said Prasad, “it is also a solution that can be applied instantly.” Similarly, the ability for security personnel to assess a site and reprogram an alarm remotely, also saves the council considerable costs associated with dispatching guards to site. The second area where cost savings are apparent relates to intelligent automation. An integration with WCC’s HR system means that as staff leave employment, their cardholder profiles are automatically disabled in the system. The use of Gallagher’s Visitor Management solution, means that appropriate staff are automatically notified if a guest or contractor fails to sign out or return a key. These two automations alone, save the WCC security team approximately 4-5 days of cardholder administration each year. Software Maintenance contract WCC elected to take a 10 year Software Maintenance agreement with Gallagher In 2014, following 13 years as a Gallagher customer, WCC elected to take a 10 year Software Maintenance agreement with Gallagher. The Software Maintenance contract ensures the Council have access to the latest developments as soon as they are released, keeping WCC at the forefront of security technology. “Software Maintenance makes good business sense” says Prasad. “It gives us access to a comprehensive range of licensable features and benefits, and ensures our upgrade costs are effectively distributed.” Prasad describes the Council’s confidence in Gallagher as another significant factor in the 10 year agreement. “We have found Gallagher’s security solution to be a reliable and versatile, highly secure, modern system. It has supported our significant growth to date, and we are committed to using Gallagher systems for the Wellington City Council’s future.”
NEC Corporation has announced that NEC Technologies India (NECTI), a pioneer in the integration of IT and network technologies, has partnered with the Centre for Development of Advanced Computing (C-DAC) to deploy its industry-leading automated fingerprint identification system (AFIS) for the Kerala State Police in India. The new AFIS will be used by the Kerala State Police to match unknown fingerprints against a central database of known fingerprints for criminal investigation. More than 600 police/enforcement facilities across the state, including police stations and the district police headquarters, will have access to the system for verification and new registration of fingerprints. Faster and accurate fingerprint verification The new system is able to enhance the quality of fragmented fingerprints captured at crime scenesThis new system will help state police accelerate investigations more efficiently by providing a faster and more accurate fingerprint verification. The new system is able to enhance the quality of fragmented fingerprints captured at crime scenes and makes it possible to match the prints against the central database. NEC's AFIS boasts the world's no. 1 authentication accuracy and is a core technology of the company's portfolio of leading biometric solutions, ‘Bio-Idiom’. Mr. Takayuki Inaba, Managing Director, NECTI, said, "NEC has always been at the forefront of public safety. As a world leader in biometrics technologies, we are delighted to be working with C-DAC and the Kerala State Police to implement a new fingerprint recognition infrastructure, and are committed to building safer and smarter cities in India."
A boiler business subjected to hundreds of thousands of pounds of theft has installed Palisade fencing, electric doors and barriers to combat the threat. Perimeter security specialists Fieg Access Systems (FAS Ltd) of Madeley have beefed up protection at the victimised business on recommendations made by security consultant John Bracewell. He recommended Palisade fencing from Wolverhampton steel fencing manufacturer Zaun Ltd, the first panels of which were delivered within a week. Bracewell said: “Their service was excellent; their product is always top quality; and their lead times and delivery were great – and the combination of measures should drive the thieves away.” Uncompromised site security Zaun’s Palisade fencing comes with either ‘D’ or ‘W’ and with three different pale head options – triple point, round and notched and single point – in heights from 1.2m to 3.6m. Palisade fencing panels can be easily raked to follow the undulations of the site without compromising the rigidity of the system or the security of the site. Zaun is the sole remaining manufacturer of Palisade, welded and woven mesh fencing systems that manufactures the entire system in the UK. FAS Ltd was initially set up to provide the end user with a repair and service provider of perimeter security and access control equipment. The business now fabricates its own gates and supplementary equipment from a factory in Madeley, Telford.
Round table discussion
Statistically speaking, incidents of terrorism are unlikely to impact most businesses and institutions. However, the mere possibility of worst-case-scenario attacks is enough to keep security professionals awake at night. Compounding the collective anxiety is the minute-by-minute media coverage when an attack does occur. The immediacy of the shared experience of global tragedy impacts us all – including security system decision-makers. We asked this week’s Expert Panel Roundtable: How is the rise in terrorism impacting the physical security market?
When security topics become a part of current events, it is usually in a negative light. Security generally only becomes news when it fails, sometimes in a dramatic, high profile and tragic way. However, security failures can also shed light on lessons learned and opportunities to improve. Working toward better security can translate into the purchase of more goods and equipment supplied by our market. For additional insights into the intersection of security and current events, we asked this week’s Expert Panel Roundtable: Good news or bad news? How do news reports and/or current events influence the general public’s opinion of physical security?
There is no expectation of privacy in a public space. That’s the premise on which most video surveillance applications are justified. But new concerns about privacy, specifically the General Data Protection Regulation (GDPR) in Europe, are changing expectations. And what if a camera must be positioned where a private area happens to be within its range? Fortunately, there are technology approaches to solving these dilemmas, as our Expert Panelists explain. We asked: What new technologies are helping video systems overcome concerns about privacy?