The recent incident at London Gatwick airport caused major travel disruption for more than a day after drones were spotted flying over this sensitive area. This incident once again highlighted the need for anti-drone technologies to address this evolving threat and secure the safety of airplanes. Following the episode, the US Federal Aviation Administration was instructed to develop a strategy to allow wider use of counter drone technologies across airports. Detecting drones, and any UAV threat...
OPTEX, renowned global sensor manufacturer, will demonstrate the recently enhanced long-range RLS-3060 LiDAR series live on its stand, as well as showcase its new 180-degree outdoor sensor ideal for boundary protection. OPTEX LiDAR And REDSCAN Series Sensors “OPTEX’s LiDARs have been successfully deployed in the Middle East region for years, for a number of applications ranging from perimeter security to roof and asset protection. At this year’s Intersec we are looking forwar...
In my coverage of China Tariffs impacting the security industry over four recent articles, products on the tariff schedules routinely integrated into security solutions included burglar and fire alarm control and transmission panels, video surveillance lenses, HDTV cameras used for broadcast use cases and fiber optic media converters. The general ‘callout’ of ADP (Automatic Data Processing) devices and peripherals technically includes servers, workstations and microcomputers, all o...
The Middle East is proving to be a hot bed of business for global suppliers of security, safety, and fire protection, with the world’s top industry players all set to converge at Intersec 2019 in Dubai to drive more double digit growth. From video surveillance technologies with Artificial Intelligence and deep learning capabilities, to cloud-based access control solutions and flame retardant protective clothing, Intersec 2019 will shine the spotlight on game changing solutions solving cha...
FLIR Systems, Inc. announces three Neutrino midwave infrared (MWIR) camera cores: the small, lightweight FLIR Neutrino LC and two FLIR Neutrino Performance series cores, the SX12 and QX. The latest models expand the FLIR Neutrino cooled camera core family for commercial, industrial, and defense original equipment manufacturers (OEM) and system integrators. The Neutrino LC is FLIR’s first High Operating Temperature (HOT) MWIR camera core and the first model in the SWaP+C (Size,...
Terrorism by unmanned aircraft is a growing threat. Using drones to smuggle contraband into prisons is a current trend. While many countries are deploying UAVs in combat, the UAS technology is getting easier and easier to acquire by the general public and ill-intentioned groups. Most of current security systems set up in critical infrastructures are not sufficient to guarantee an appropriate level of protection. Over the past several months, more and more drones have been flying over Florida's p...
ISC East, in collaboration with premier sponsor, the Security Industry Association (SIA), reported strong growth results at the conclusion of this year’s industry event in New York City. The International Security Conference & Exposition is the Northeast’s largest security trade show, where close to 7,500 security and public safety professionals convened this month to meet experts from over 300 leading security brands, all the while co-locating with the launch of Unmanned Security Expo New York and Infosecurity North America, Europe’s global information security event. Welcoming 85 new companies and brands and close to 1,000 more industry professionals compared to 2017, the ISC East exhibit hall bustled and featured expanded in-depth content - including new technologies and product categories, more special events/networking opportunities, and a variety of all-new complimentary education through SIA Education@ISC and Unmanned Security Expo New York. Comprehensive Security for a Safer, Connected World The extensive variety of vendors and professionalism of the ISC staff make it one of the best shows out there" Mary Beth Shaughnessy, Event Director for ISC Security Events, noted, “It was exciting to see such a robust expo floor and high attendance growth with our New York event this year, all while matching up to our brand theme of Comprehensive Security for a Safer, Connected World. The top attended education sessions were formed around a diverse spectrum of topics including cyber-physical integration, converged security for smart cities buildings, the impact of IT and AI on video surveillance/intelligence, critical incidents prevention and mitigation, plus drones, drone-detection, drone-regulations and policies, and more. The present and future is bright for ISC East and we are committed to providing great solutions and education for this community.” Over the past 4 years, the ISC East Show Floor has grown by over 60% in square footage and has come to be known as ‘the highlight of the year,’ stated by Linda Esposito, Security Specialist of US Postal Inspection Service. “The extensive variety of vendors and professionalism of the ISC staff make it one of the best shows out there. In addition, Alex Pachikov of Sunflower Labs, a first-time exhibitor at Unmanned Security Expo, commented, “This was the perfect venue for us to introduce the Sunflower Labs drone-based security system. We had the perfect audience and fantastic exposure to potential customers, installation partners and system integrators.” Unmanned Security Expo Additionally, while Unmanned Security Expo presented 15+ sessions dedicated to the in-depth issues, policies and opportunities for UASs and UGVs, the SIA Education@ISC East program offered 25+ complimentary education courses and highlighted two distinct Keynote Speakers for the first time at ISC East - Philip Halpin, Senior Vice President & Head of Global Security for Brown Brothers Harriman, and James A. Gagliano, Retired FBI Supervisory Special Agent, CNN Law Enforcement Analyst, and Adjunct Assistant Professor at St. John’s University. SIA Education@ISC East 2018 SIA Education@ISC East 2018 was a great success, with hundreds of conference attendees participating in education sessions, engaging keynotes and hands-on workshops" “SIA Education@ISC East 2018 was a great success, with hundreds of conference attendees participating in our education sessions, engaging keynotes and hands-on workshops,” said Don Erickson, CEO of the Security Industry Association. “This year’s sessions highlighted cutting-edge topics like the move to smart cities, convergence in the security industry, the use of artificial intelligence in video analytics, and how some legacy connections leave modern access control data vulnerable to hacking.” With so much learning and knowledge-sharing happening on the show floor, security professionals still found time to participate and engage at the numerous special events that ISC East had to offer, including: the first-ever SIA Women in Security Forum Breakfast, the new Mission 500 Hygiene Kit Building, the ever-popular ASTORS Homeland Security Awards, ISC East’s Featured Product showcase featuring some of the most innovative product technologies, a high-profile celebrity appearance of former NY Yankees player Tino Martinez , the signature ISC East Grand Opening Ceremony, the Crack the Tap Cocktail Reception, and so much more. ISC Security Events As ISC East comes to a close, the ISC Security Events portfolio continues to provide comprehensive security for a safer, connected world through ISC West and Unmanned Security Expo, and Connected Security Expo taking place on April 9-12, 2019 (SIA Education@ISC: April 9-11 | Exhibit Hall: April 10-12) in Las Vegas.
Sentinel Consulting, a premier Manhattan-based full-service security consulting firm that advises high-profile, high-net-worth clients in the areas of security management, law enforcement, emergency services and security technology, announced the launch of its new Unmanned Technology Planning and Design Services. Applications for unmanned aerial systems (UAS), or drones, as well as robots and autonomous ground vehicles, will now be formally represented within Sentinel’s comprehensive plan/design/deploy/manage spectrum of services. Sentinel’s Unmanned Technology Planning and Design Services will be introduced at the Unmanned Security Expo New York, November 14-15, at New York City’s Javits Center. Protecting Facilities And Critical Infrastructure Industry analysts project that by 2020, the security investment in automated and robotic system will top $10.5 billionThe Company’s expanded focus to incorporate the security benefits and risks associated with unmanned technology is a proactive measure to ensure its client base is fully supported as it invests in this growing category of solutions. Industry analysts project that by 2020, the security investment in automated and robotic systems, specifically UAS, will top $10.5 billion. Unmanned technology has made major inroads into the protection and risk mitigation of high-profile facilities, critical infrastructure, large complexes and diverse other businesses, while at the same time, the potential asset risks from UAS have multiplied, including business espionage and potential attacks on critical sites. These security concerns are central to Sentinel’s customers. Autonomous Solutions For Commercial Security The Unmanned Security Expo, an all-new trade-only event focussed exclusively on providing autonomous solutions for commercial and government security and safety as well as drone detection/counter-system applications, is an opportunity for high-level security executives to evaluate manufacturers’ solutions and participate in educational seminars related to the complex issues surrounding the product category. Sentinel is led by a team of seasoned security professionals with certifications that include FAA Part 107, PSP and CPP Those seeking additional guidance will find that Sentinel is uniquely qualified to help them navigate the full range of challenges they will encounter, including ambiguous UAS regulations, issues related to insurance and liability, evaluating total cost-of-ownership and return-on-investment, defining standard operating procedures and policies, selecting the right manufacturing and contracting partners, and training security staff to operate and manage unmanned systems. Providing Certified Security Professionals Sentinel is led by a team of seasoned security professionals with certifications that include FAA Part 107 – Certified Drone Pilot, PSP – Physical Security Professional and CPP – Certified Protection Professional. Paul Benne, Sentinel’s CEO, explains, “Our unique combination of comprehensive expertise and fluency in security technology is at the core of our ability to consistently provide the right professional team to service our clients. As our clients begin to embrace unmanned technology as part of their security portfolios, they can feel confident that Sentinel will deliver an end-result that fully delivers on their security objectives, while taking the pain and confusion out of the entire process.”
The second day of Global Security Exchange (GSX), the security industry’s flagship event, was jam-packed with security professionals eager to get first-hand exposure to exhibitors and vendors offering innovative solutions that solve traditional everyday security issues as well as deliver emerging technologies to solve problems of the future, such as AI, blockchain and AR/VR. Security Education And Insights GSX provides an outstanding opportunity for our members to gain education and insights about current security trends and threats" “GSX provides an outstanding opportunity for our members to gain education and insights about current security trends and threats, and also to see all the greatest and newest technologies out there on the expo floor,” said Kimberly Pratt, executive director of InfraGard National. “We hope ASIS members will come check out our booth and learn more about what InfraGard has to offer." “Today’s show exceeded our expectations based on the quality prospects who provided good conversations about our solutions,” said Paul Baratta, Business Development Manager, Axis Communications, Inc.; and ASIS Boston Chapter Treasurer; and member of the ASIS Healthcare Advisory Council. “It was overall a very successful day and I personally fully enjoyed the new X Stages as they provided more insight into the industry and the impact technologies are making today as well as how they will shape future engagements with our customers. We’re looking forward to the remainder of GSX!” Counter-UAV Defense Systems In the morning keynote, delivered by Scott Klososky, Founder and Principal of TriCorps Technologies, he addressed how the industry can leverage technology to solve challenges. Attendees were then released onto the GSX show floor featuring three new stages, including the X Stage, where they heard about revolutionary technologies poised to disrupt the industry first-hand. There was a standing-room only, live streamed school security panel as well as on-the-show floor demos showcasing the use of drones, droids and counter-UAV defense systems. Fortem Technologies, an innovative provider of AI-enabled airspace security and safety, conducted three drone shoot downs throughout the day, which has never happened on a security show floor to date. Prior to the doors opening, we saw a lot excitement about what new and exciting initiatives ASIS was bringing this year" “It has been an important show for us to be at over the years, and this year is no different. We’re seeing more convergence and integration of technology as well as partnerships, which aligns with our mission at the show,” said Eric Widlitz, Vice President of North America Sales, Vanderbilt Industries. “Prior to the doors opening, we saw a lot excitement about what new and exciting initiatives ASIS was bringing this year.” Career Guide For Security Professionals This afternoon ASIS and the Security Industry Association (SIA) unveiled the rollout of the Career Pathways Guide in the GSX Career HQ. This new career guide provides a first of its kind review of core competencies that are needed at every stage of a security professional’s career. “Now that the first day of the Expo Hall has closed, it is evident from the standing-room only theaters and shoulder-to-shoulder packed aisles, that the industry has fully embraced the new show format and features,” said Richard E. Chase, CPP, PCI, PSP, President of ASIS International.
PureTech Systems announces its latest capability, which provides for automated dispatch of a security drone to an alarm location. The alarm can originate from sensor sources capable of providing a location including PureActiv geospatial video analytics, radar, acoustic buried/fence sensor, UGS, access control, contact alarm, and user input. High resolution cameras, excellent stabilisation measures, lighter materials and better battery life have combined to make drones efficient surveillance platforms. PureTech System’s has leveraged these technology advancements along with its industry video analytics and flagship geospatial management system to provide automated security response that includes drone dispatch, flight path guidance to the alarm location, continuously updated drone location and camera Field-of-View on the GIS map, and live video from drone mounted cameras. Dispatch-Drone-To-Alarm Features Automatic drone stand-off distance and altitude calculation for fixed camera payloads to ensure view of target, as well as, the ability to maintain target Other key features of the Dispatch-Drone-to-Alarm include: Takeoff / Return – Fully automated drone start, take off and return. Flightpath Guidance – Automatic upload of waypoints to direct the drone to the event location. The integration also allows for flight plan changes and waypoint additions after initial dispatch. Live Video – Live streaming video to the PureActiv geospatial video management system (VMS) during all stages of the mission. Full support of both visible and thermal camera feeds, including recording, playback and forensic review. Target Detect & Monitor– Automatic drone stand-off distance and altitude calculation for fixed camera payloads to ensure view of target, as well as, the ability to maintain target in the camera view via drone heading control. PTZ Control – if outfitted, remote PTZ control in hover mode. Drone Position Tracking – Drone location tracking and route display on map-based VMS. Drone Status Indication –Operator display of real-time drone status and health condition. Security Surveillance Tool “Recent technology advanced have made drones a very attractive security surveillance tool, providing an additional layer of automation, detection and response,” notes Eric Olson, PureTech Systems vice president of marketing. we envision to be a robust technology roadmap, utilising PureTech Systems’ patents related to airborne operation and detection from moving platforms “This integration, allowing for the automatic dispatch of a drone or UAV to a security event, is the first step in what we envision to be a robust technology roadmap, utilising PureTech Systems’ patents related to airborne operation and detection from moving platforms, our know-how in sensor integration, use of geospatial methods, deep learning and further evolution of drone technology to bring remote security and automation to the next level.” Five-Hour Endurance The first integration was performed with The Perimeter, a hybrid gas-electric multicopter drone from the company Skyfront. The Perimeter, which boasts a record-breaking five-hour endurance and 100+ mile range, will be featured with PureTech Systems’ dispatch-to-alarm capability at customer demonstrations taking place concurrent with this release. “The combination of the Perimeter drone and PureActiv video management system is a cost-effective, scalable, and fundamentally better way to secure very large installations. Property owners can have eyes on the ground at the site of a breach, miles away, in less than five minutes. We look forward to demonstrating this solution to customers with PureTech Systems,” says Troy Mestler, CEO of Skyfront.
Following the successful launch of Kisi Labs with its first product vision ‘Drone Guard’, Kisi Inc., a pioneer in cloud-based keyless access control and security management, has reported the launch of a new security card test to drive physical access innovation through exposing the vulnerability of key cards. Anyone concerned about the security of their access card can send it to Kisi Labs to be tested for free. The original access card will be sent back to the user with a cloned or copied card and a report on how difficult it was for Kisi’s technicians to hack. Rather than hiring a security consultant or paying thousands of dollars for a penetration test, Kisi Labs aims to automate the process and offer this free service to as many people as possible. Different Options To Test Card Security Our goal is to make it easy and free to understand card security" There are three free options to test cards. Users can locate their card model in Kisi’s card security hacking database to see if it’s already listed. The second option is for users to send the card type and model for Kisi to check against its database of known exploits or hacks, as well as what tools are typically enlisted to breach the card. The third option requires sending the card to Kisi Labs to be tested by a technician for a full diagnosis, complete with video proof of the process as well as a cloned or copied card sent along with the original. Bernhard Mehl, Kisi’s Founder and CEO comments, “Our goal is to make it easy and free to understand card security, so that expensive physical penetration tests can focus on taking your security to the next level rather than doing your homework." Awareness About Card Security Mehl adds, "During our work with hundreds of security-sensitive companies we were surprised at how little awareness and knowledge there is surrounding card security. When we looked into the reason, we discovered that methods that should be available to everyone are buried under complicated penetration testing, which often costs thousands of dollars.”
The rapidly evolving security landscape and the technologies poised to disrupt the industry will take center stage in a reimagined expo hall at Global Security Exchange (GSX), being held Sept 23-27 at the Las Vegas Convention Center. In the first year of its rebrand following a 63-year history as the ASIS International Seminar and Exhibits, GSX is expected to attract more than 20,000 operational and cyber security professionals and 550 exhibitors for the industry’s flagship event. ASIS International is the world's largest association for security management professionals. “ASIS is reinventing the way our industry supports innovation,” said Richard E. Chase, CPP, PCI, PSP, 2018 President, ASIS International. “We're bringing together entrepreneurs, thought leaders, and business and industry veterans for conversations and hands-on demos of technologies that are reshaping entire industries. Attendees will hear perspectives from all vantage points and walk away with a better understanding of the risks and opportunities inherent in these applications. There is no other event in our industry offering these comprehensive discussions and demonstrations—directly on the expo floor.” The GSX show floor will feature immersive, experiential learning opportunities including the X Stage, the event’s signature innovation theater Leading Technologies At Learning Theatres Upending the traditional trade show experience, the GSX show floor will feature immersive, experiential learning opportunities including the X Stage, the event’s signature innovation theater. Here attendees will see frontier technologies demoed, and will hear how cryptocurrencies and AI/VR/AR are reshaping entire industries. Education on the X Stage includes: Blockchains, Crypto, and De-Centralization: Tuesday 11:00 a.m. - 11:30 a.m. Learn how these technologies are poised to revolutionise fundamental concepts within the security industry, like identity management, authentication, and personnel surety. Forecasting Security Needs Through Intelligence–How Information and Analytics Will Drive the Future: Tuesday 3:30 - 4:00 p.m. Hear firsthand from Ty Richmond, President, Integrated Security Solutions and Technology, Allied Universal, as he discusses Allied Universal investments in AI and Robotics and how they leverage technology to make deployment of human protective assets more efficient and effective. Enterprise Virtual Reality: Wednesday 2:30 - 3:00 p.m. STRIVR kicks off an afternoon of programming focused on AR/VR and wearable technology by discussing how virtual reality is changing the game in developing training content. Security Innovation Landscape: Thursday 11:00 a.m. - 12:00 p.m. Building off exciting news announced at Air Force Major General Bradley Spacy's Wednesday keynote, groups like AFWERX, Accenture, and the DHS Science and Technology Directorate will discuss the ways they are accelerating innovative solutions to create real long-term value. Xperience And Xcelerated Exchange Stage Additional theaters include the Xperience Stage–focused on tried and true best practices–and the Xcelerated Exchange Stage, which provides a ‘town hall’ forum for conversations between industry, technologists, and business and government leaders. Also, on the expo floor is the GSX D3 Xperience–providing hands-on demos and education around drones, droids, and anti-UAS defense systems.
From satellite imagery to street views to indoor mapping, technology has disrupted our past world. This has left us dependent upon new ways to visualise large spaces. This new world has brought many benefits and risks. But what does that mean for the security professional or facility manager today and what technologies can be used to secure buildings and improve facility operations? A Brief History Of 3D Technology Starting May 5, 2007 (inception 2001), Google rolled out Google Street View to augment Google Maps and Google Earth; documenting some of the most remote places on earth using a mix of sensors (Lidar/GSP/Radar/Imagery). The mission to map the world moved indoors May 2011 with Google Business Photos mapping indoor spaces with low cost 360° cameras under the Trusted Photographer program. In the earlier days, 3D scanning required a high level of specialization, expensive hardware and unavailable computing power With the growth of 3D laser scanning from 2007 onwards, the professional world embraced scanning as effective method to create digitised building information modeling (BIM), growing fast since 2007. BIM from scanning brought tremendous control, time and cost savings through the design and construction process, where As-Built documentation offered an incredible way to manage large existing facilities while reducing costly site visits. In the earlier days, 3D scanning required a high level of specialization, expensive hardware, unavailable computing power and knowledge of architectural software. Innovation during the past 8 year, have driven ease of use and lower pricing to encourage market adoption. Major investments in UAVs in 2014 and the commercial emergence of 360° photography began a new wave of adoption. While 3D scanners still range from $20K – $100K USD, UAVs can be purchased for under $1K USD and 360° cameras for as low as $100. UAVs and 360° cameras also offer a way to document large spaces in a fraction of the time of terrestrial laser scanners with very little technical knowledge. Access to building plans, satellite imagery, Google Street View, indoor virtual tours and aerial drone reconnaissance prove effective tools to bad actors The result over the past 10+ years of technology advancement has been a faster, lower cost, more accessible way to create virtual spaces. However, the technology advances carry a major risk of misuse by bad actors at the same time. What was once reserved to military personal is now available publicly. Access to building plans, satellite imagery, Google Street View, indoor virtual tours and aerial drone reconnaissance prove effective tools to bad actors. Al Qaeda terror threats using Google Maps, 2007 UK troops hit by terrorists in Basra, 2008 Mumbai India attacks, 2016 Pakistan Pathankot airbase attacks, ISIS attacks in Syria using UAVs, well-planned US school shootings and high casualty attacks show evidence that bad actors frequently leverage these mapping technologies to plan their attacks. The weaponization of UAVs is of particular concern to the Department of Homeland Security: "We continue to face one of the most challenging threat environments since 9/11, as foreign terrorist organizations exploit the internet to inspire, enable or direct individuals already here in the homeland to commit terrorist acts." Example comparison of reality capture on the left of BIM on the right. A $250 USD 360° camera was used for the capture in VisualPlan.net software What Does This Mean For The Security Or Facility Manager Today? An often overlooked, but critical vulnerability to security and facility managers is relying on inaccurate drawing. Most facilities managers today work with outdated 2D plan diagrams or old blueprints which are difficult to update and share.Critical vulnerability to security and facility managers is relying on inaccurate drawing Renovations, design changes and office layout changes leave facility managers with the wrong information, and even worse is that the wrong information is shared with outside consultants who plan major projects around outdated or wrong plans. This leads to costly mistakes and increased timelines on facility projects. Example Benefits Of BIM There could be evidence of a suspect water value leak which using BIM could be located and then identified in the model without physical inspection; listing a part number, model, size and manufacture. Identification of vulnerabilities can dramatically help during a building emergency. First Responders rely on facilities managers to keep them updated on building plans and they must have immediate access to important building information in the event of a critical incident. Exits and entrances, suppression equipment, access control, ventilation systems, gas and explosives, hazmat, water systems, survival equipment and many other details must be at their fingertips. In an emergency situation this can be a matter of life or death. Example Benefit Of Reality Capture First Responders rely on facilities managers to keep them updated on building plans A simple 360° walk-through can help first responders with incident preparedness if shared by the facility manager. Police, fire and EMS can visually walk the building, locating all critical features they will need knowledge of in an emergency without ever visiting the building. You don’t require construction accuracy for this type of visual sharing. This is a solution and service we offer as a company today. Reality capture is rapidly becoming the benchmark for facility documentation and the basis from which a security plan can be built. Given the appropriate software, plans can be easily updated and shared. They can be used for design and implementation of equipment, training of personnel and virtual audits of systems or security assessments by outside professionals. Our brains process visual information thousands of times faster than text. Not only that, we are much more likely to remember it once we do see it. Reality capture can help reduce the need for physical inspections, walk-throughs and vendor site-visits but more importantly, it provides a way to visually communicate far more effectively and accurately than before. But be careful with this information. You must prevent critical information falling into the hands of bad actors. You must watch out for bad actors attempting to use reality capture as a threat, especially photo/video/drones or digital information and plans that are posted publicly. Have a security protocol to prevent and confront individuals taking photos or video on property or flying suspect drones near your facility and report to the authorities. Require authorization before capturing building information and understand what the information will be used for and by who.There are a number of technologies to combat nefarious use of UAVs today Nefarious Use Of UAVs There are a number of technologies to combat nefarious use of UAVs today, such as radio frequency blockers and jammers, drone guns to down UAVs, detection or monitoring systems. Other biometrics technologies like facial recognition are being employed to counter the risk from UAVs by targeting the potential operators. UAVs are being used to spy and monitor for corporate espionage and stealing intellectual property. They are also used for monitoring security patrols for the purpose of burglary. UAVs have been used for transport and delivery of dangerous goods, delivering weapons and contraband and have the ability to be weaponised to carry a payload.Investigating reality capture to help with accurate planning and visualization of facilities is well worth the time The Federal Aviation Administration has prevented UAV flights over large event stadiums, prisons and coast guard bases based on the risks they could potentially pose, but waivers do exist. Be aware that it is illegal today to use most of these technologies and downing a UAV, if you are not Department of Justice or Homeland Security, could carry hefty penalties. Facility managers must have a way to survey and monitor their buildings for threats and report suspicious UAV behaviours immediately to authorities. At the same time, it’s critical to identify various potential risks to your wider team to ensure awareness and reporting is handled effectively. Having a procedure on how identify and report is important. Investigating reality capture to help with accurate planning and visualization of facilities is well worth the time. It can help better secure your facilities while increasing efficiencies of building operations. Reality capture can also help collaboration with first responders and outside professionals without ever having to step a foot in the door. But secure your data and have a plan for bad actors who will try to use the same technologies for nefarious goals.
In 1901 New York state made a pioneering regulation move and became the first US state to require automobile owners to register their vehicles. This marked the beginning of regulation on modern traffic, which - following decades of development - resulted in a multi-layer concept of regulation relating to vehicles and driver’s licenses, traffic signs and insurance mechanisms that we are all familiar with nowadays. While certain parallels can be drawn between the early days of cars and our contemporary experience with quadcopters, we are facing a new challenging era that is far more complex to organize and regulate. Integrating Drones In Existing Regulatory Ecosystem Similar to other pioneering technologies in the past, drones need to integrate into a long existing and well-balanced ecosystem, the rules of which have first been drafted some one hundred years ago and have evolved without taking vehicles such as drones into account. Yet the safety risks related to aviation hinder the quick integration of drones into that ecosystem, broadening the gap between existing regulatory landscape and the exponentially growing popularity and ever-advancing technology of drones. The safety risks related to aviation hinder the quick integration of drones into the legislative ecosystem For the past several years, governments and legislators have been trying to tackle this problem by trying to answer two questions: how to properly integrate drones into the airspace without creating a hazardous impact on existing airborne operations, and how to enforce regulations in order to prevent the side-effects related to careless or malicious drone flights, taking into consideration public safety and physical security. Counter-UAS Measures And Regulations Up until 2018, legislators tried to tackle these two questions as a whole by introducing bundled legislation drafts covering the entire landscape of gaps they needed to address, which resulted in multi-parliamentary committee efforts both in the US and abroad to review and approve each bill - a process that is very slow by design. It was only in the beginning of this year that the issues were starting to be addressed separately: legislation related to limitations and counter-drone measures on the one hand, and legislation related to integration into airspace on the other. Let’s take a closer look at Counter-UAS (unmanned aerial systems) measures and what makes them challenging in terms of regulation. Over the past years, various counter-drone technologies have been introduced to enable control over rogue drones in order to either stop them from achieving their flight purpose or prevent them from creating safety hazards to people or property. These measures can be grouped into 3 types of technologies: Military grade solutions - including lasers and surface-air missiles Kinetic solutions - including net-guns and autonomous drones set out to catch the rogue drone and disable it airborne Non-kinetic RF-based solutions - aimed at either disabling, disrupting or accessing the drone’s communications channels in order to trigger a return-to-home function, or guide the drone into a safe landing route Aside from combat military operations, the legality of using the above technologies is questionable as they tamper with an airborne aircraft, might be considered as wiretapping and/or violate computer fraud laws. Therefore, one can conclude that unless changes to regulation are made, non-military facilities will continue to be defenseless from and vulnerable to rogue drones. One can conclude that unless changes to regulation are made, non-military facilities will continue to be defenseless from and vulnerable to rogue drones European c-UAS Legislation Next, let’s look at the state of c-UAS legislation in both Europe and US to better understand different legislative ecosystems and how they affect the possibilities of using counter drone measures. In the European Union, there is currently no uniform legislation, and the member countries rely on their own existing legal infrastructures. Roughly speaking, most countries use a method of exemptions to the communications and aviation laws to allow the use of counter drone measures after a close examination by the relevant authorities. Such exemptions are approved under scrutiny to particular sites, which provide some relief, but they do not allow broad use of countermeasures. Further discussion regarding a broader regulation change, on a country level or EU-wide, is only preliminary. US c-UAS Legislation Preventing Emerging Threats - provides an initial infrastructure for counter drone measures to be used by various DoJ and DHS agenciesUnlike the EU, in the US exemptions are not possible within the existing legal framework, and the possible violation of US code title 18 means that the hands of both the government or private entities are tied when attempting to protect mass public gatherings, sports venues, or critical infrastructure. Therefore, it was more urgent to introduce legislation that would allow countermeasures to some extent. In September, US Congress approved the FAA-reauthorization act for the next 5 years (H.R. 302), which was shortly after signed by the President and came into effect. Division H of the act - Preventing Emerging Threats - provides an initial infrastructure for counter drone measures to be used by various DoJ (Department of Justice) and DHS (Department of Homeland Security) agencies under strict limitations. However, the act avoids determining which technology the agencies should use, yet it requires minimal impact on privacy and overall safety in order to strike the necessary balance. This is the first profound counter-drone legislation and is expected to be followed by additional measures both in the US and in other countries. Updating Counter-Drone Legal Infrastructure In summary, 2018 has been a pioneering year for counter-drone legislation, and while technology already allows taking action when necessary, legal infrastructure needs further updates in order to close the existing gaps: covering additional federal assets, state-level governments, and private facilities of high importance, such as critical infrastructure sites. Legislators in the US and around the world need to continue working in a rapid tempo to keep up with the growing threat of drones. As with cars a century ago, the number of accidents will rise with the increase in time taken to regulate.
Global and domestic threats have highlighted the need for tighter security across all verticals. One of the technologies that has redefined situational awareness and intrusion detection is thermal imaging. Once a technology exclusively manufactured for the military operations, thermal cameras today are deployed across hundreds of security applications and continue to see strong demand in existing and emerging commercial markets. With thermal technology, security personnel can see in complete darkness as well as in light fog, smoke and rain Technology Overview And Early Adoption What distinguishes thermal cameras from optical sensors is their ability to produce images based on infrared energy, or heat, rather than light. By measuring the heat signatures of all objects and capturing minute differences between them, thermal cameras produce clear, sharp video despite unfavorable environmental conditions. With thermal technology, security personnel can see in complete darkness as well as in light fog, smoke and rain. Originally a military developed, commercially qualified technology, the first thermal cameras for military and aircraft use appeared in the 1950s. By the 1960s, the technology had been declassified and the first thermal camera for commercial use was introduced. However, it wasn’t until the late 1990s - when FLIR Systems introduced a camera with an uncooled thermal detector - when the technology began to see substantial adoption beyond government defense deployments. Installations At Critical Infrastructure Sites In the 2000s, industrial companies were some of the first adopters of thermal, using the technology for predictive maintenance to monitor overheating and machine malfunctions. In the years following the September 11 terrorist attacks in 2001, there was an increase in thermal camera installations across critical infrastructure sites. Stricter security requirements drove the deployment of thermal cameras for perimeter protection, especially in the nuclear power sector. Thermal cameras produce clear video in daylight, low light or no light scenarios and their sharp images result in higher performing analytics In 2010, the U.S. Nuclear Regulatory Committee released its 73.55 policy, which states nuclear facilities must “provide continuous surveillance, observation and monitoring” as a means to enhance threat detection and deterrence efforts onsite. Because thermal cameras produce clear video in daylight, low light or no light scenarios and because their sharp images result in higher performing analytics, thermal cameras quickly became the preferred option for nuclear facilities. Likewise, following the 2013 sniper attack on PG&E Corporation’s Metcalf transmission substation, the Federal Energy Regulation Commission introduced the Critical Infrastructure Protection Standard 014 (CIP-014). The policy requires utilities to identify threats to mission critical assets and implement a security system to mitigate those risks. This statute also led to more thermal installations in the utility sector as thermal cameras’ long-range capabilities are ideal for detection of approaching targets beyond the fence line. The demand from both industrial and critical infrastructure entities, as well as other factors, helped drive volume production and price reduction for thermal, making the technology more accessible to the commercial security marketplace. Commercial Applications In recent years, the increasing affordability of thermal cameras along with the introduction of new thermal offerings has opened the door to new commercial applications for the technology. In the past, thermal cameras were designed for applications with enormous perimeters, where the camera needed to detect a human from 700 meters away. Locations like car dealerships, marinas and construction supply facilities can be protected by precise target detection, thermal analytic cameras providing an early warning to security personnel Today, there are thermal cameras specifically designed for short- to mid-range applications. Developed for small to medium enterprises, these thermal cameras ensure property size and security funds are no longer barriers to adoption. Lumber yards, recreation fields and sports arenas are some of the commercial applications now able to implement thermal cameras for 24-hour monitoring and intrusion detection. Affordable thermal cameras with onboard analytics have become attractive options for commercial businesses Innovation And Advancements Innovation and advancements in the core technology have also spurred growth in thermal camera deployment, providing faster image processing, higher resolution, greater video analytic capabilities and better camera performance. In particular, affordable thermal cameras with onboard analytics have become attractive options for commercial businesses that need outdoor, wide area protection. Car dealerships, marinas and construction supply locations all store valuable merchandise and materials outside. Without protection, these assets are vulnerable to vandalism and theft. However, by providing precise target detection, thermal analytic cameras provide an early warning to security personnel so that they can intervene before a crime is committed. By helping to deter just one incident, the thermal solution delivers a clear ROI. New Market Opportunities Not only are there more thermal cameras in use today than ever before, but there are also more thermal sensors being integrated with other multi-sensor systems, driving the adoption of thermal in new markets. For large perimeter surveillance applications, thermal is repeatedly being integrated with radar and drones to expand situational awareness beyond the point of fixed cameras. Users get immediate, accurate alerts of approaching targets and evidentiary class video for target assessment In the commercial market, thermal imagers are combined with optical sensors, analytics and LED illuminators into one solution that integrates with central monitoring station platforms. By bringing these technologies together, users get immediate, accurate alerts of approaching targets and evidentiary class video for target assessment. The result is a lower number of false positives, reducing the total cost of ownership for the solution. These multi-sensor solutions also feature two-way audio capabilities, which enable remote security officers to act as “virtual guards” and speak to intruders in real-time to dissuade them from illegal activity. The introduction of solutions that integrate all these state-of-the-art technologies under one unit reduces the amount of capital and infrastructure needed for deployment. Consequently, more small businesses and alarm monitoring companies can implement advanced perimeter security technologies like thermal sensors, some for the very first time. Thermal cameras have gone from military defense devices to widespread commercial security cameras Multi-Sensor Thermal Solutions Multi-sensor solutions featuring thermal are quickly gaining traction and opening the door to new business opportunities for the security channel. One of the primary reasons for the strong market interest in these systems is they enable integrators to increase their recurring monthly revenue (RMR). With intense price competition and eroding margins on CCTV equipment, integrators have to rely on RMR to grow their businesses. Offering remote video monitoring services and virtual guarding technologies is one of the best ways to do so. Additionally, there is a clear demand for it. Central stations are continually looking for new technologies to offer their customers and businesses are interested in economical alternatives to physical guards. In conclusion, thermal cameras have gone from military defense devices to widespread commercial security cameras that are a substantial segment of the outdoor security protection market. From nuclear power plants to construction locations, thermal technology is being implemented to secure sites around the globe.
ISC East is making a name for itself as a must-attend regional conference and trade show in New York City that brings together the large community of law enforcement and private sector security professionals from the Tri-State area. ISC East, being held Nov. 14-15 at New York’s Javits Center, is emerging from the long shadow of its sister show – ISC West in Las Vegas in the spring – and making its own mark on the industry. ISC East is 20% larger than last year, and exhibitors have swelled from 230 to more than 300. Familiar names at ISC East this year (who were absent in 2017) include Allegion, Arecont Vision Costar, Bosch Security Systems, and Seagate Technology. In all, there are 115 new exhibitors compared to 2017.Familiar names at ISC East this year (who were absent in 2017) include Allegion, Arecont Vision Costar and Bosch Security Systems “We purposefully make sure we reflect the region we are in,” says Will Wise, Group Vice President, Security Portfolio, Reed Exhibitions. “It’s not a mistake that both our keynote speakers have New York-centric backgrounds and have topics to reach a larger market. We want to tap into the strengths of the region.” ISC East (International Security Conference & Exposition) has come a long way in the last five years. In 2014, the show was a mere 28,000 square feet, and this year it has grown to 44,000 square feet of exhibit space. One factor driving growth has been improvements in the educational session, powered largely by show partner Security Industry Association (SIA). The two-day event is characterized by “good energy” on both days, says Wise. There is less than 10% duplication of attendance with ISC West. Liability Issues Of Event Security A big topic for New York and surrounding areas is event security, and one session covers “Confined Space Protection & Risk Mitigation for Today’s Industry Leaders.” The session will focus on safeguarding event organizers’ brands, protecting them from liability, and balancing the need for security that doesn’t negatively impact the “guest experience.” One factor driving growth has been improvements in the educational session, powered largely by show partner Security Industry Association (SIA) Liability issues of event security are especially timely now, given MGM Resorts' recent lawsuit asking the courts to protect it from legal liability in the wake of the Las Vegas massacre last October. “Event security is integration of physical security with smart technology and not being overzealous,” says James DeMeo, Founder, President and CEO of Unified Sports & Entertainment Security Consulting LLC. DeMeo’s presentation on event security is one of the “back by popular demand” sessions at ISC East – there was a big turnout for his previous sessions at last year’s ISC East and at ISC West. “A big part of event security is integrating technology, but we also need the human element,” says DeMeo. “Good guest security and harmonious relationships require a level of training that includes escalation, behavioral analysis, and communicating more harmoniously.” ISC East is 20% larger than last year, and exhibitors have swelled from 230 to more than 300 Holistic Approach And Technology Integrations From the session, DeMeo hopes attendees will take away awareness of the need for responsible social media monitoring, integration of technology, threat behavior analysis and early attack indicators, proactive risk mitigation, and staff training. The emphasis is on a holistic approach “from the top down and the bottom up,” says DeMeo. “It’s a sophisticated niche based on potential liability, and we must do everything possible to protect fans and patrons.” Crowd security is another ISC East topic that is tailor-made to the New York location of the show Crowd security is another ISC East topic that is tailor-made to the New York location of the show. A session on installation of safety and security barriers to protect pedestrians and crowds is another session that is “back by popular demand.” Rob Reiter, co-founder of the Storefront Safety Council, will present the session on protecting urban environments. Another return session is about drone security and regulations. It will provide an overview of current policy and regulatory framework and provide understanding of how to get involved in the discussion to enable drone use in security applications. Converged Security And Smart Cities A new session at ISC East this year will be “Smart Cities, Smart Buildings and the Evolution of the Converged Security Approach.” Pierre Bourgeix, president of ESI Convergent, will help attendees understand converged security and how it relates to the smart cities and smart buildings movement. Located on the ISC East exhibit floor, Unmanned Security Expo will include exhibits and demos of UAVs, UGVs and autonomous systems SIA and ASIS International will present findings from a study on how successful individuals can gain experience and skills they need to advance their security careers. Co-locating with ISC East will be the Unmanned Security Expo, which focuses on Unmanned Aerial Vehicles (UAVs), Unmanned Ground Robotics & Vehicles (UGVs), counter-drone solutions and software applications to support them. Located on the ISC East exhibit floor, Unmanned Security Expo will include exhibits and demos of UAVs, UGVs and autonomous systems. Also co-locating with ISC East will be Infosecurity North America, which includes a conference program with well-respected industry speakers, an expo floor and networking opportunities.
Newly modernized halls with lots of daylight will house hundreds of exhibitions and conference events at the upcoming Security Essen 2018 at Messe Essen, Germany. A new layout and hall numbering system will be unfamiliar to past attendees but promises to simplify the experience as it brings together attendees and exhibitors. European Physical Security Market Security Essen is an international trade fair, but the emphasis is more on German, Austrian and Swiss companies. In all, Security Essen will feature 1,000 exhibitors from 40 nations. The trade fair has more of a continental European “flavor” compared to IFSEC, which focuses more on the U.K market. At the last Security Essen in 2016, organizers reported about 40,000 visitors including conference participants, VIP guests, members of various delegations and journalists. Security Essen 2018 has more of a continental European “flavor” compared to IFSEC, which focuses more on the U.K market “This year, we have sharpened the profile of Security Essen,” says Oliver P. Kuhrt, CEO of Messe Essen, a trade fair, congress and event organiser with its own exhibition grounds. “The trade fair has become considerably more digital, more modern and more interactive. Due to the optimized hall layout, we are offering our exhibitors and visitors the best possible experience with short paths and direct communication.” Newly Modernized Messe Essen The newly modernised site of Security Essen will encompass eight halls, newly renumbered and with the subject areas reorganised, too. Visitors will find Services in Hall 1; Access, Mechanatronics, Mechanics and Systems in Halls 2 and 3 and the Galeria; Perimeter Protection in Hall 3; Video in Halls 5 and 7; and Fire, Intrusion and Systems in Halls 6 and 7. A helpful smart phone app, downloadable free from the Google Play Store (Android) or the Apple App Store (iOS), will be available two weeks before the event and include a show floor plan; the exhibitor list with booth numbers and contact information; and an overview of the supporting program. A separate hall – Hall 8 – will house new Cyber Security and Economic Security categories. Cyber Security Conference At the new Cyber Security Conference, located prominently at the new East Entrance, experts will share their knowledge about the more pressing challenges and potential of cybersecurity. The program opens and closes on 25 and 28 September with the main topic “Opportunities and Risks of Cyber Security”. On 26 September, discussions and lectures will center on “Entry, Admission, Access: Identification Options”.A helpful smart phone app, downloadable free will be available two weeks before the event and include a show floor plan On 27 September, the topic will be smart homes and focus on “Connected Building, Security in the Buildings of the Future”. Speakers will include the president of Germany’s Federal Office for Information Security, who will address cybersecurity as a challenge for politics, business and society. The fair organises the conference in cooperation with the BHE Federal Association of Security Technology and the technical support of the Federal Office for Information Security. In Hall 8, a new Public Security Forum will enable visitors to experience digital security technologies for public spaces from the areas of sensors/IoT, cyber security and surveillance. The products and solutions will be installed in four different building scenarios (town hall, school, hospital and library) and it will be possible to test them extensively. The forum, including lectures and discussions, will target municipal decision makers and planners of public spaces. Comprehensive Program A Security Expert Forum in Hall 2 will present a continuous program with more than 90 presentations during the period of the fair. Visitors will obtain information and solution ideas about all six subject areas covered at the fair, and the program will begin with a keynote lecture each morning and finish with a live demonstration in the evening. On the first day of the fair (25 September), Security Essen’s Career Forum will introduce retrainees, students, trainees and graduates to companies from the security industry. Targeted and professional communication will be established between companies and job applicants to facilitate making contacts, developing networks, and filling actual vacancies. Thursday (27 September) will be observed as Fire Prevention Day, and a Drone Course will be provided each day in Hall 7. One day admission to Security Essen is €41; a four-day ticket is €105. Advance sale tickets are discounted.
GSX 2018 is both a new event for the security industry and the continuation of a 63-year tradition. Global Security Exchange (GSX) is the new branding for ASIS International’s annual seminar and exhibits, which have been held since 1955. In recent years, the ASIS event has joined forces with other organizations to expand its scope and to appeal to a broader audience. Partners include ISSA (Information Systems Security Association) and Infragard, a public-private partnership between U.S. businesses and the Federal Bureau of Investigation (FBI). The expansion is continuing this year with the addition of 30 supporting organizations representing industry verticals and reflecting ASIS’s intent to unite the full spectrum of security. Improving The State Of Cyber Security The Cyber Security Summit will co-locate with GSX, offering cyber security programming at a time when it is needed the most Held September 23-27 at the Las Vegas convention Center, GSX 2018 seeks to attract more than 20,000 operational and cyber security professionals and 550 exhibitors. Other elements will further expand the 2018 event’s scope. The Cyber Security Summit will co-locate with GSX, offering cyber security programming at a time when it is needed the most. Top government, industry and academic thought leaders will engage in a dialog to improve the state of cyber security. The 2018 Security Cares Program will address school violence prevention and response in a free education program. Topics will include pre-violence indicators, target hardening, and best practices to involve the entire community of school administrators, law enforcement, security professionals and mental health providers. Experts To Deliver Keynote Speeches Keynote speakers including CNN host Fareed Zakaria will bestow celebrity appeal. Air Force Major General Bradley D. Spacy will share details about the new AFWERX innovation and tech hub in Las Vegas and how the U.S. Air Force is collaborating with the private sector to bring new security product ideas to market. Spacy’s keynote on Sept. 26 will kick off Military and Law Enforcement Appreciation Day. Also, K.T. McFarland, former Trump Administration Deputy National Security Advisor, will share an insider’s perspective on critical foreign policy and defense industries. Attendees to ASIS International’s annual gathering typically list networking and education as big benefits of the event. Historically, the trade show aspect has existed separately from the educational program, and foot traffic to the exhibits has sometimes suffered from the competition. Beginning last year, and continuing in 2018, ASIS International has pursued innovative approaches to integrate the trade show more closely into the overall attendee experience. “The integration of programming and exhibits is truly seamless,” says one observer of the new approach. Held Sept. 23-27 at the Las Vegas convention Center, GSX 2018 seeks to attract more than 20,000 operational and cyber security professionals and 550 exhibitors X Learning Theatres GSX has sought to transform the exhibit hall into a ‘learning lab environment’ that features thousands of security products, technologies and service solutions (provided by the exhibitors), in addition to ‘immersive learning opportunities to connect the current and emerging threat landscape with solutions available in the marketplace’. There are several ‘X Learning Theatres’, including one (‘X-Stage’) focused on leading-edge technologies such as blockchain, cryptocurrencies, AI, drones, and robotics. There is also an ‘Xcelerated Exchange Stage’ to facilitate discussions among security practitioners and solution providers. The ‘Xperience Stage’ showcases case studies and best practices. Also attracting more attendees to the Exhibit Hall will be ‘Career HQ’, a free career fair and enhanced career center. ‘D3 Xperience’ (Drones, Droids Defense) will focus on unmanned systems with education and demos. The ‘Innovative Product Awards (IPAs) Showcase’ will highlight winners of an awards program. Focusing On Security Practices GSX is not as much about sales leads as about making connections and contributing to a larger conversation about how to protect people, facilities and assets ASIS International (now GSX 2018) is often compared to ISC West, the U.S. industry’s largest show held in Las Vegas in the spring. GSX 2018 this year may face even more scrutiny based on the changes, rebranding, and location (also in Las Vegas). However, GSX is a completely different show than ISC West, which focuses on the business of security. In contrast, GSX is much more about the practice of security than business. The international network of ASIS International members attend the yearly conference to make new connections, to learn and to benefit from the experiences of other security professionals around the world. The successful trade show exhibitors are the ones that approach the show with that understanding. GSX is not as much about sales leads as about making connections and contributing to a larger conversation about how to protect people, facilities and assets. ASIS International deserves credit for their efforts to integrate the trade show element into the larger goal of the event. Hopefully their new approach will enhance the overall experience for both attendees and exhibitors – and help to make the world a safer place as a consequence.
Communication makes the world much, much smaller - but it also becomes critical to everyone. Once life-enriching communication technologies are embraced, not only do we like and enjoy the benefits, but we also become hooked on it day and night. "There is no doubt that the transportation industry is benefiting from always available communications, making sure drivers, mechanics, dispatchers are always connected and can exchange information when necessary," says Sagi Subocki, Vice President of Products and Marketing for MCC technology leader Softil. "However, for the most part until now, the transportation industry has had to rely on the traditional radio or simply standard mobile phones to perform all communications tasks. That's about to change with the advent of Mission Critical Communications over LTE and 5G as defined in the 3GPP Release 13-15 standard," adds Subocki. Mission Critical Communication Over LTE MCC over LTE offers push to talk, push to video, text and multimedia chat, as well as location information for groups and point to point communications Mission critical communication (MCC) over LTE offers push to talk, push to video, text and multimedia chat, as well as location information for groups and point to point communications. Think about a driver who can push a button and instantly talk to all drivers within a 50-mile radius, for example, to inform them of road conditions, accidents, road works and other incidents. In the event of a breakdown, the truck driver can quickly obtain help from experts using video chat, which makes a driver's life a lot easier. Using the same MCC over LTE capabilities, the driver can see the location of all other drivers using the same radios, can engage in chat sessions with nearby garages and much, much more. And let's not forget that MCC over LTE communications can be prioritized over regular public mobile voice and data traffic, which can help in the case of accidents and natural disasters. Advanced Communication Solutions In Mining While different from the transportation industry, mining's reliance on advanced communication technologies might be even greater than the needs of the transportation market. Subocki explains: "Mission critical push to talk and push to video with guaranteed, prioritized delivery might well make the difference for mining workers. The ability to ask for urgent assistance simply at the push of a button is crucial in the day-to-day operations of an oil rig and a diamond mine." But the benefits of MCC over LTE don't stop there. As MCC over LTE communication is delivered over modern, very capable, rugged smartphones, these devices can be used to interface and collect data from all available sensors - air quality, temperature, radiation, presence of dangerous gases - all this information can be obtained automatically via MCC over LTE integration with IoT and can be used to increase safety. Drones In MCC Over LTE In addition to engaging with all sensors, MCC over LTE communications can include drones which would provide video feeds whenever necessary In addition to engaging with all sensors, MCC over LTE communications can include drones which would provide video feeds whenever necessary - and the 3GPP MCPTT Release 16 standard will extend mission critical communication to include robots, which might be priceless. "Think about the implications of sending an MCC enabled robot to investigate a mine explosion and you'll see the future of MCC over LTE and 5G communications in the mining industry," adds Subocki. Market Value And Outlook A report from ABI Research found the total mission-critical communications market for base stations, repeaters, handsets and infrastructure in 2022 will be US$10 billion. The North American market continues to account for more than half of this world market with the rapidly growing Asia-Pacific region in second place with a 20 percent market share. Public-safety radio was the ancestor of critical communications providing mission-critical voice services and continues to represent over half of this market, followed by the industrial, transportation and utility segments. However, the need for mobile broadband data has also entered the equation driving critical communications systems to evolve to digital radio for data handling and spectrum efficiency. As a result, critical communications systems are slowly evolving from the current TETRA, Digital Mobile Radio (DMR) and Project 25 (P25) to coexist and interoperate with Long Term Evolution (LTE)-based systems. Softil's MCC Over LTE Leadership Softil is a leader in Mission Critical Communication over LTE solutions for developers. Historically, Softil always focused on the full embrace of open communication standards - starting from close participation in the work of the appropriate SDOs, then developing best-of-breed APIs and implementation of the relevant standards, and most importantly, paying utmost attention to the interoperability of the offered solution by active participation and leading all relevant industry-wide interoperability testing events. Softil actively participates in development of the MCC over LTE standards in 3GPP, as well as interoperability testing at the ETSI Plugtest Events. Most importantly, Softil 3GPP Release 13-15 compliant client SDK implementation had been already commercially deployed on the market - in Korea, Softil powers latest and greatest implementation of the MCC over LTE-R communication devices installed on the newest high-speed train line, such as one connecting Incheon airport to PyongChang during the Olympic games.
Hoverfly Technologies Inc., global supplier of tether-powered aerial drone systems, is pleased to announce it has engaged retired Deputy Chief of Los Angeles Police Department Mike Hillmann to consult and provide expertise to Hoverfly and public safety officials of cities, counties and special law enforcement agencies who are considering the use of Small Unmanned Aerial Systems (sUAS) to assist in keeping their cities safe. Small Unmanned Aerial Systems (sUAS) When incidents and/or events happen, having ‘real-time, situational awareness’ from above the scene is critical to managing risk and upholding public safety “With 24-hour news cycles, a never-ending stream of social media posts, mid-term elections and potential threats to the public at large, getting fast, accurate situational awareness from the air during an incident has never been more important when it comes to keeping the public safe. We are thrilled to have Chief Hillmann advising on use cases and how best to implement and integrate this new technology,” says Hoverfly SVP of Systems, Lew Pincus. When incidents and/or events happen, having ‘real-time, situational awareness’ from above the scene is critical to managing risk and upholding public safety and the safety of those who serve our communities. Aerial/Drone Surveillance He adds, “We typically have relied on manned aircraft to provide aerial coverage over a variety of incidents. On occasion, those assets have not always been available, deemed too disruptive or too expensive to deploy in certain situations where an aerial view clearly could have helped an incident commander better understand the situation. Deploying small tether-powered, highly portable, unobtrusive persistent cameras positioned high above the scene can now be used as either a standalone capability or integrated system with existing networks, security infrastructure and even manned aircraft.” Hoverfly tether-powered sUAV (Small Unmanned Aerial Vehicles) systems solve short battery-life problems associated with free-flying dronesToday, Mr. Hillmann is helping chiefs of police, local city and county officials and other public safety personnel understand how Hoverfly’s tether-powered LiveSky systems can be deployed from police or EMS vehicles providing incident commanders with actionable intelligence from high above the scene within minutes of arrival. “Tactically, having the ability to stay in the air monitoring the situation from above for hours, days, even weeks at a time represents an amazing capability we never had before. During my career, I can think of hundreds of situations where having a drone in the air to provide real-time intelligence, surveillance and reconnaissance would have helped keep my officers and the community much safer. It’s a force multiplier that should be exploited by public safety,” says Hillmann. Hoverfly’s LiveSky Systems Hoverfly tether-powered sUAV (Small Unmanned Aerial Vehicles) systems solve short battery-life problems associated with free-flying drones because they operate using a standard 120VAC power source or vehicle inverter. The power, command and control information and video are transmitted over the tether making the entire system completely secure from jamming, hacking or spoofing, ensuring the privacy of the data and improving safety. Perhaps the biggest benefit of Hoverfly systems is they are autonomous and require no piloting skills. The CEO of Hoverfly likes to say, “if you can operate an elevator, you can operate our LiveSky system.”
Major events require a major security operation, and the recent Royal Wedding was one of the biggest operations in recent times. Security was heightened due to the importance of the occasion due to the potential threat of terror to such a major event. There was a drone no-fly zone put in place, however this measure does not necessarily stop drones from entering the area. This kind of measure is put in place to ensure the safety of the attendees, and to limit the threat posed by drones, but it doesn’t prevent it. Drone License Plate Detection System How can you ensure that these measures are adhered to? Drone detection systems are becoming more prominent. DJI’s recently released Aeroscope is ground-breaking Commercial drone experts COPTRZ supplied a number of units to law enforcements agencies involved in security at the Royal Weddingtechnology. It’s a purpose-built drone detection system that allows the operator to track telemetry data from DJI aircraft in surrounding airspace within a radius of up to 20km. It’s in effect, a drone license plate detection system, as well as a data provider. Commercial drone experts COPTRZ recently supplied a number of units to law enforcements agencies and made the technology available to various agencies involved with the security at the Royal Wedding. Monitoring And Intercepting Drone Intrusion The Aeroscope will be used by the law enforcement agencies to protect high profile events. Particularly following the recent Royal Wedding’s no-fly-zone, Aeroscope is a useful tool to ensure that drones in the air near the zone are monitored and if needed are intercepted to ensure the security of the wedding attendees and the royal family alike. Steve Coulson, Managing Director and Founder of COPTRZ has commented on the deal: “We are absolutely delighted to be able to supply drone detection systems to law enforcement agencies. Particularly with big events such as the Royal Wedding and the upcoming World Cup, it’s imperative agencies take advantage of the technology available to them. It’s only a matter of time until technology like the Aeroscope become a necessity for law enforcement agencies worldwide.”
Airbus has expanded the range of its application portfolio for the Tactilon Dabat and partnered with new professional application developers. The aim is to better serve the communications markets in the field of public safety, transportation and healthcare. At the CCW exhibition in Berlin from 15 to 17 May 2018, Airbus is showcasing selected applications for professionals that combine multimedia real-time functions with highest standards of security. “The apps that we showcase at the CCW work in various areas, whether it is industry, public safety or the health sector. They meet specific customer needs and requirements for different regions in the world,” explains Rahim Zaknoun, Head of Innovation & Developer Ecosystem at Secure Land Communications of Airbus. "We selected these apps for our customers and created them for the hybrid Tactilon Dabat.” For instance, the digitalized Triage application from Exomi helps first responders (paramedics) to send complex health data of patients from the ambulance on the scene to the hospital. The delivery of the constantly updated information is standardized and reliable. It can easily be shared not only via the Tactilon Dabat, the Android smartphone and Tetra radio in one device, but also on other platforms in control rooms or in the field. Thus, the application streamlines processes and accelerates a more accurate treatment for the patients. Commanders and group members (Tetra and smartphone users) can easily follow each other on the Dabat’s display based on a map configuration with GPS Live Video Sharing Platform The application ES-Core features a live video sharing function that is secure and supports external video sources, such as from drones or vehicles. Even with little radio coverage the transmission is of high quality. Moreover, footing can be stored as evidence or for the purpose of analysis. “Clearly, this is a tool for police officers. However, paramedics work increasingly with this app on the scene and companies can also master situations by transmitting a live video stream,” says Rahim Zaknoun. Another application can fill frequently the gap of non-existing radio coverage in many public buildings: the ‘indoor positioning’ system for large sites creates a real-time situational awareness when communication groups move around in- and outdoors. Based on a map configuration with a GPS function, commanders and group members (Tetra and smartphone users) can easily follow each other on the Dabat’s display. The application serves especially security personnel in airports, train stations, or event sites: no configuration is needed, a seamless in- and outdoor positioning is put in place and the app works without broadband connection. Track Worker Protection In order to save lives of railway track workers and minimize the risk of collisions, the company Intelligence on Wheels invented the app ‘Track Worker Protection’. This application with a clear map display receives permanent train location updates. Our SmarTWISP application developer programme is the key reference point when it comes to creating secure apps" The signals will be sent from the train operator’s control room and the train itself, which is equipped with a Train Collision Avoidance System. Critical scenarios can now be easily managed with the Tactilon Dabat and the ‘track worker protection’. “Our SmarTWISP application developer programme is the key reference point when it comes to creating secure apps,” says Rahim Zaknoun. “It enables the innovation and professional application development on the top of Airbus’ existing communication technology. It boosts our strong developer ecosystem."
Hikvision, a global manufacturer and supplier of video surveillance equipment, is helping to ensure a safe and reliable electricity supply across South Africa, with the deployment of a massive remote surveillance monitoring solution, covering thousands of electricity substations and power transmission lines. Operated by the largest electricity power distributor in South Africa, Eskom, a network of more than 400,000 kilometers of overhead power lines and several thousand electricity substations, provides electricity to the country’s domestic and business customers. In recent years, this critical power infrastructure has become the target for cable theft, metal theft and other infrastructure related crimes, resulting in vastly expensive and disruptive damage and losses to service providers.Eskom enlisted the help of South Africa’s Combined Private Investigations (CPI) Mitigating Equipment Thefts Organized criminals have increasingly targeted the more remote sections of the supply network, stealing copper cabling, metal and industry grade batteries. Up to 15 incidents per day are currently being reported. If not seriously addressed, it could lead to the interruption of the supply to thousands of domestic customers; commercial operations, hospitals and railway systems. To combat this wide-scale problem, the national electricity provider (Eskom) enlisted the help of South Africa’s leading information driven investigation company, Combined Private Investigations (CPI). CPI was established by a number of experienced law enforcement agents, forensic investigators and corporate security officials, primarily to investigate a high-level cartel for one of the largest parastatals in South Africa. Currently, CPI is the sole supplier of investigations to several parastatals, with an acknowledged record of addressing copper cable and other infrastructure-related crimes successfully, achieving very high recovery levels. CPI arrests between 35 to 85 cable thieves per month and maintains a conviction rate on average of 90%.The impact of downtime for a substation hit by material theft can be significant Preventing Power Loss As a corporate investigations firm comprising over 900 staff members across 18 locations, CPI specializes in the prevention and investigation of non-ferrous metal theft. The company’s main objective is to support electricity supply companies and railway service providers in their fight against organized crime syndicates targeting electrical networks for illegal gain. “Copper and metal theft targeting the power transmission infrastructure has become a real problem for maintaining the reliable supply of electricity in South Africa,” says Roy Robertson, Principal Director of CPI. “The impact of downtime for a substation hit by material theft can be significant, with loss of power to homes, hospitals, schools, factories and public transport services." Intelligence-Driven Approach "These incidents can also have a massive detrimental effect on the provision of key support services, as well as to basic health and safety, so it was vital to our client that not only should the perpetrators of these crimes be investigated and brought to justice, but that the theft incident rate should be significantly reduced.” “To do this, and as a priority, we needed to protect the most vulnerable and remote electricity substations, as these sites were being targeted and experiencing the highest percentage of theft and associated service disruption. At CPI we strive to capitalize on the latest technologies to support our intelligence-driven approach. As such, we approached global surveillance leader Hikvision, to provide the latest electronic security solutions to effectively combat the thefts.”Hikvision Smart Video Content Analytics (VCA) technology embedded into the cameras was set-up for intruder detection Smart Video Analytics Providing a technical team to assess at remote sites, CPI collaborated with Hikvision to assess the most effective technical specification of products to detect and deter thefts. This specification then formed a blueprint to be rolled-out across all of the most vulnerable electricity substations across South Africa. Using their own engineering teams, CPI installed Hikvision DS-2CD2T42WD-I8 and DS-2DE5120W-AE cameras covering the internal and perimeter areas of each remote site. Equipped with 4MP resolution, 120dB Wide Dynamic Range, 3D DNR, EXIR high performance LEDs and 80 metres IR range, the DS-2CD2T42WD-I8 4MP EXIR Network Bullet Camera was the perfect choice to monitor the remote substations, utilizing its advanced performance to provide crystal clear images day and night. Additionally, the Hikvision DS-2DE5120W-AE 1.3MP 20X Network PTZ Cameras were used to provide 3D intelligent positioning and 20X Optical Zoom, to deliver instant visual confirmation on any on-site intruder detection – and all in crystal clear 1.3MP resolution. In conjunction with PIR devices covering the sites’ perimeters, Hikvision Smart Video Content Analytics (VCA) technology embedded into the specified cameras was set-up to perform intruder detection utilizing line detection, to confirm alarm activations and eliminate false alarms.Hikvision’s advanced iVMS 5200 professional software with video wall driver was used to monitor thousands of remote sites Central Monitoring Recorded locally to Hikvision IDS-9632 NXI-1816S Embedded Plug & Play NVRs, specified due to their superior performance and system stability, the NVR’s simple installation reduce engineering installation and set-up time on site, whilst up to 6 megapixel recording resolution and a capacity of up to 4 SATA interfaces ensured the high-quality of local recording needed. Both live and recorded images are transmitted over a wireless LAN, back to CPI’s own control room located at their National Operations Centre in Johannesburg. At the control room, Hikvision’s advanced iVMS 5200 professional software with optional video wall driver was deployed to enable CPI operators to monitor the thousands of remote sites on 24/7 basis, via a ‘monitoring by exception’ basis. Intrusion Detection Monitoring the massive Hikvision integrated surveillance system, in the event of an automated intruder alert being activated to indicate unauthorized movement on-site, surveillance operators are able to quickly visually verify the activity in seconds, examining the high-performance camera network’s high-resolution images. During the process, all evidential video is tagged and automatically archived for future identification and prosecution usage. In the event of unauthorized intruders being detected, the CPI control room operators can instigate a host of anti-intrusion measures, including the dispatch of rapid response teams to a specific locationWe no longer need to deploy response personnel to a site when it may be the subject of a false alarm Integrated Surveillance "These teams comprise highly trained operatives ready to tackle any situation,” continues Roy. “The Hikvision surveillance system ensures we can respond very rapidly to any intrusion detected at the sites, and our manned guard response teams are equipped to get to sites as quickly as is possible, to catch the perpetrators in the act. "We can even call on our Robinson helicopter R44 Police equipped with infra-red camera that can rapidly deploy personnel to reach the most remote locations in just a matter of minutes.” “We work closely with the police and various local authorities, using the evidential video footage produced by the Hikvision systems to very good effect in prosecution cases. The high-definition quality of the Hikvision camera images have proved critical in detecting and prosecuting offenders of metal theft." "Not only is it reducing these incidents, but it enables us to visually confirm the precise cause of an alarm at any remote site at the touch of a button. This means we no longer need to deploy response personnel to a site when it may be the subject of a false alarm – negating the waste of valuable man hours and costs, and vastly improving the effectiveness of our security operation.”We plan to harness more Hikvision technology to fortify power transmission security in South Africa Drone-Assisted Surveillance “We have been so impressed with the Hikvision surveillance technology and the support we have received that we are continuing to roll out this Hikvision based security blueprint to many other power substation sites across South Africa,” Roy continues. “To date, over 1,000 electrical substations are protected by Hikvision systems - making a real difference to the provision of a reliable power service to all sections of industry and society across South Africa.” “In future, we plan to harness more Hikvision technology to fortify power transmission security in South Africa. From additional electronic surveillance systems, to the use of camera-equipped Hikvision Quad-rotor Unmanned Aerial Vehicles (drones) to protect remote sites and respond to incidents – we’re looking forward to completing more successful projects with the assistance of Hikvision’s highly capable technology solutions.”
Prison drone pioneers introduce Government to perimeter savings. The integrated security team behind a British prison’s pioneering war against drones is to share its innovative and cost-saving approach with the UK Government. Les Nicolles Prison on Guernsey became the first in the world to use a new system designed to stop drones smuggling drugs, weapons and other contraband over perimeter walls. A group of four collaborating British companies styling itself as The Perimeter Security Center of Excellence (PSCoE) installed the comprehensive perimeter protection package, including the new ‘Sky Fence’ technology. Now PSCoE (stand Z35) is exhibiting at the official UK Government global security event, Security & Policing 2018, which takes place from 6 to 8 March at Farnborough International Exhibition and Conference Center. A group of four collaborating British companies styling itself as The Perimeter Security Center of Excellence (PSCoE) installed the comprehensive perimeter protection Latest Equipment, Training And Support The unique three-day event, established over 30 years ago, is the premier platform for UK suppliers to showcase the very latest equipment, training and support, to police services, Government departments, organizations and agencies from the UK and overseas. Binns Fencing, the leading fencing contractor for the Ministry of Justice, led the Guernsey project for the conglomerate, which offers the simplicity and efficiencies of a single line of communication and management from cradle to grave of high-security perimeters. Eclipse Digital Solutions is the second of the collaborators. It created Sky Fence with fellow British company Drone Defense and offers full turnkey security design through to installation. Eclipse’s Joe Vasso said: “Our proposition is all about seamless integration to offer the most cost-effective high-end security for perimeters – whether that be along a border, around a prison, airport or the Olympic Games, or even airborne above ground, on roofs and the like. The beauty of our conglomerate is that our relationships have been formed over years and we’re all friends, so the trust is absolute and we care about each other.” Our proposition is all about seamless integration to offer the most cost-effective high-end security for perimeters" Significant Cost Savings The other two members are Harper Chalice, an intrusion detection company providing PIDs, electric fencing and RADAR detection, and ISM, which offers integrated security systems, PSIM software and intercom security systems. Together, they believe the UK Government could make significant savings by adopting its proposed model for delivering perimeter security and PIDs procurement and delivery. Their single point of contact for the complete perimeter security package provides greater opportunity for innovation, reduced complexity and no need to manage multiple contractors. PSCoE believes this could offer significant cost savings on PIDs cable installation and contract and project management costs – as with Les Nicolles, where the State of Guernsey that runs the prison saved £1.3 million. The other two members are Harper Chalice, an intrusion detection company providing PIDs, electric fencing and RADAR detection, and ISM, which offers integrated security systems Trusted Advice And Design State Deputy Mary Lowe said: “The committee decided, following discussions with key staff, that it was possible to continue housing Category B prisoners at Les Nicolles without the installation, at significant expense, of a second fence. While the second fence is advised under UK guidelines for Category B prisons, the committee is comfortable that the current technological upgrade offers security that enables Guernsey to continue housing Category B prisoners. Sending such prisoners off island to serve their sentence comes at a significant cost of approximately £50,000 per year each. The committee decided that these upgrades, which will cost £1.3m less than a second fence, offered a Guernsey-appropriate solution.” Binns MD Adam Binns said: “We have devised this model in consultation with the Government, main contractors and suppliers, to deliver best value and a greater potential to innovate with a single point of contact throughout procurement, delivery and installation. The model will give them trusted advice on design, manufacturing and installation from exclusively British companies with British products from electronic systems of CCTV, detection, video management and access control to physical security fencing, gates and hostile vehicle mitigation.” We have devised this model in consultation with the Government, main contractors and suppliers, to deliver best value and a greater potential" Security & Policing Security & Policing provides a platform for professionals from the UK and across the world to engage with the very highest level of security expertise and the latest technology. It provides the level of industry engagement needed to enable UK Government to procure and deliver its national security priorities. Major specifiers and Government specified users can obtain reference to its products from the Home Office. Normal commercial users can obtain reference to its specialist electronic perimeter security systems on the police ‘Secured by Design’ website. Harper Chalice Group’s products and systems are sold, installed and maintained worldwide via a network of specialist accredited dealers. ISM (Intergrated Security Manufacturing) ISM (Intergrated Security Manufacturing) has been at the forefront of innovation, design and manufacturing excellence in integrated security systems for almost 30 years. ISM operates from an extensive manufacturing and design facility in the United Kingdom, close to Gatwick Airport. It is the UK’s leading developer of integrated security management, intercom and cell call systems.