The Electronic Security Expo (ESX) sought to redefine the traditional purpose of industry shows within the electronic security and life safety channel. On June 3-6, ESX 2019 offered an outlet for professionals to come together in a collaborative environment — and it was a hit for many looking for a more modern take on the traditional “badge scan” expo, according to the organizers. Networking and connections Throughout the two expo days of the event, 78% of attendees reported...
The threat of drones is a growing concern around the perimeter and in the airspace surrounding airports. According to a UK Airprox Board report, the number of times a drone endangered the safety of an aircraft in the UK airspace rose more than a third in 2018 compared to the year before. The highest-profile recent drone incident was at UK’s Gatwick Airport, where a drone sighting last December triggered a three-day shutdown of the UK’s second busiest airport, disrupted the travel p...
Echodyne, the manufacturer of innovative, high-performance, small electronically scanned array (ESA) radars for government and commercial markets, announced that Maureen Swanson, Manager of Public Policy and Partner Engagement, will speak on June 5th at 2pm at the FAA UAS Symposium in Baltimore. The event takes place at the Baltimore Convention Center. Swanson will participate on the panel entitled ‘UAS Mitigation at Airports’ and discuss the importance of precisely tracking and cla...
BIRD Aerosystems, global developer of Airborne Missile Protection Systems (AMPS) and Special Mission Aircraft Solutions (ASIO), has announced plans to officially launch the OSCAR - Ocean Surveillance Control and Reconnaissance solution, and demonstrate it for the first time at the Paris Air Show 2019. Maritime Domain Awareness Combined with a secure over-the-cloud deployment and multi-sensor integration, OSCAR is an affordable and quick to deploy Maritime Domain Awareness (MDA) so...
Vintra, a maker of video analytics powered by machine learning and artificial intelligence, announces an integration with Genetec Inc., unified security, public safety, operations and business intelligence solutions. Genetec customers can now benefit from FulcrumAI, Vintra’s deep learning video analytics solution integrated with Genetec Security Center to deliver real-time, total-environment intelligence from any camera source, fixed or mobile. Vintra has built its proprietary deep learni...
The Electronic Security Expo (ESX) will be held at the Indiana Convention Center, June 3-6, in Indianapolis. The show focuses exclusively on the electronic security and life safety industry, including companies that service the connected Internet of Things (IoT) space for homes and businesses. The ESX Main Stage will highlight inspirational presentations from motivational speakers, Dr. Rick Rigsby and Kevin Brown. In addition, there will be a founder of a drone security company and an Entrepren...
Echodyne, the manufacturer of innovative, high-performance, small electronically scanned array (ESA) radars for government and commercial markets, has announced that it will demonstrate enhanced airspace situational awareness by visualizing EchoGuard sensor data through augmented reality at AUVSI XPONENTIAL 2019 in Chicago, IL. The UAV systems company will showcase the technology at Booth #2805 from April 30th to May 2nd, 2019. AUVSI XPONENTIAL 2019 At AUVSI XPONENTIAL 2019, Echodyne will display its state-of-the-art EchoGuard radar system During the AUVSI XPONENTIAL 2019 international security conference, Echodyne will display its state-of-the-art EchoGuard radar system and demonstrate how it offers superior performance for both primary UAS (Unmanned Aerial Surveillance) use cases: commercial mission safety, and counter-UAS (counter drone surveillance). The demonstration will feature an AR interactive experience using Microsoft’s Hololens and allows participants to experience unprecedented airspace situational awareness. Echodyne has quickly emerged as the preferred airspace situational awareness provider with its small, commercially-priced ESA radar– the first of its kind in the industry. Recently, the Company affirmed its participation in a number of initiatives at UAS Centers of Excellence across the country, including NASA’s Unmanned Traffic Management (UTM) Technical Capability Level (TCL), FAA’s UTM Pilot Program (UPP) and FAA’s UAS Integration Pilot Program (IPP). Airspace Management Solutions In addition, Echodyne’s co-founder and CTO, Tom Driscoll, will be leading a session track at AUVSI on sensor data fusion for successful airspace management solutions on Wednesday, May 1st at 11:00 AM. “Having the ability to demonstrate how our EchoGuard radar contributes to airspace safety at the premier conference for the unmanned systems industry is just another exciting step for Echodyne,” said Eben Frankenberg, CEO of Echodyne. “This is another example of Echodyne delivering high-tech innovation that enhances both mission and public safety.”
Trackforce, the security workforce management platform, announces the appointment of Christophe Kloussing as Vice President of Sales for North America. Kloussing brings 20 years of experience in senior positions in the U. S. and Europe to his new leadership of all Trackforce North America sales initiatives. He intends to identify and develop new business opportunities, implement fresh strategies for customer retention and growth, and uphold the company’s current position as market leader. Positively Impact Companies’ Operation Trackforce’s solutions positively impact how companies operate and how their security officers perform their important duties every day"“I’m excited to join Trackforce and work with a focused team at such a well-established, successful business with proven solutions,” says Kloussing. “Trackforce’s solutions positively impact how companies operate and how their security officers perform their important duties every day. I am very happy to become part of a great company that is focused on creating customer value. Mobile and analytics are rapidly becoming central components of the Trackforce platform’s strategy for organizations in a variety of industries - this is where I can help.” Kloussing is the former VP of sales, Analytics Americas, for Arvato CRM Solutions, a Bertlesmann company. He also served as Regional VP of Sales at NICE, the world's leading provider of both cloud and on-premises enterprise software solutions that delivers advanced data analytics. Sales Achievements In High Tech And Software “With his broad experience and renowned sales achievements in high tech and software, Christophe brings us a wealth of experience and a track record of success,” says Guirchaume Abitbol, CEO and founder of Trackforce. Trackforce's SaaS workforce management platform delivers crucial business intelligence, KPIs and analytics“We are confident that his strategic insight and ability to build and lead results-focused sales teams will be an asset to our company and help us sustain our current growth trajectory. We welcome him to our team.” Kloussing earned his MBA from ESSEC Business School in France and is fluent in French and English. In his spare time, he enjoys riding his Harley Davidson, traveling and piloting drones. Enhancing Security Officer Operations Over the past two decades, Trackforce has risen to become a recognized global market leader by improving security officer operations and productivity while reducing cost and risk via innovative mobile and desktop applications. The company implements solutions in 45 countries for clients such as G4S, Whelan Security, SecurAmerica, McKesson Corporation, and Inter-Con Security Systems. Their feature-rich, intuitive, and customisable SaaS workforce management platform eliminates the need for paper reports and antiquated guard tour devices. It also delivers crucial business intelligence, KPIs and analytics that enhance business operations. More than 200,000 professionals at over 20,000 customer sites use Trackforce every day to ensure reliable security and improve operational efficiency.
ShotSpotter, Inc., the provider of gunshot detection solutions that help law enforcement officials identify, locate and deter gun violence, announces a new technology innovation unit – ShotSpotter Labs – to expand the company’s current efforts supporting innovative uses of its technology to help protect wildlife and the environment. ShotSpotter Labs is launching with an initial focus on helping combat rhino poaching in South Africa. Later this year, the unit intends to explore other applications for global wildlife protection such as combatting illegal blast fishing in Malaysia with underwater sensors. Multiple Poacher Apprehensions In 2014, ShotSpotter began a pilot of its gunshot detection technology in the Intensified Protection Zone of Kruger National Park in South Africa, home to 60% of the last remaining rhinos. Given the vast expanse of the park, most poaching incidents went undetected with carcasses found days or weeks after the fact. With the introduction of ShotSpotter to detect, locate and alert park rangers to gunfire incidents in under 60 seconds, there have been multiple poacher apprehensions within the coverage area since its debut. The resulting speed and accuracy of the response not only increases our chances of making contact and effecting an arrest" “ShotSpotter changes the game by giving our rangers the exact location of the shot within seconds,” said Glenn Phillips, Managing Executive of Kruger National Park. “The resulting speed and accuracy of the response not only increases our chances of making contact and effecting an arrest, but over time we hope will send a powerful message to poachers to stay away.” Unmanned Aerial Vehicles In addition to significantly expanding coverage area in the park, ShotSpotter Labs plans to integrate with unmanned aerial vehicles (UAVs) for automated dispatch to the precise latitudinal and longitudinal coordinates of the gunfire. The UAVs will provide a video stream to rangers so that they can track the poachers. ShotSpotter has had to adapt its sensors and software for use in the sprawling expanse of Kruger National Park with no electricity available to power sensors. These types of system innovations required for anti-poaching are already being applied in other applications such as solar-powered sensors in freeway deployments with limited access to electricity. “I’ve seen the devastation to the rhino population firsthand in South Africa and it’s meaningful that ShotSpotter can make a difference to help these amazing animals survive for future generations,” said Ralph A. Clark, president and CEO of ShotSpotter. “This kind of engagement is not only the right thing to do, but it’s also an opportunity for us to develop innovative technology that can ultimately be incorporated back into core products across our business.”
BCDVideo, the provider of enterprise-quality, purpose-built IP video storage solutions, and Scale Computing, a pioneer in edge computing and hyperconverged solutions, announced the certification of BCDVideo’s new Hyperconverged Infrastructure for Video Surveillance (HCI-VS). Developed over the last year and underpinned by Scale’s HC3 software, BCD218-HCI Series, built on a Dell OEM technology foundation, offers modularity and ease-of-use without sacrificing performance and quality. Initial tests of the solution, configured with Genetec’s Security Center software, ran at throughput of 1800Mbps with ten video archiver virtual machines (VMs). BCDVideo expects final testing in the 2200-2400Mbps range. “We acknowledge that recording video on virtual machines has been a challenge in this market for years. We decided to tackle this issue and finally through engineering and testing, b”uilt a viable solution,” said Tom Larson, Chief Technical Officer, BCDVideo. “We successfully adapted the technology for video.” The HCI-VS system installs at the project site within an hour and is a fully integrated cluster-wide resourceEliminating System Downtime BCDVideo’s new Hyperconverged Infrastructure for Video Surveillance (HCI-VS) Series greatly simplifies the deployment, management, and maintenance of its infrastructure, saving the security integrator training costs, and most importantly, eliminating system downtime. The HCI-VS system installs at the project site within an hour and is a fully integrated cluster-wide resource. Deploying new Virtual Machines (VMs) can be achieved in minutes and everything is managed through a very easy-to-use web interface. The native high availability built into this all-in-one solution utilizes automation and self-healing to eliminate the complexities around deployment and ongoing management. HC3 Self-Healing Machine Intelligence “It goes far beyond building an easy-to-deploy hyperconverged solution on the Dell OEM platform, although flexibility within that technology is an innovator’s dream,” reflected Jeff Burgess, Chief Executive Officer of BCDVideo. “It’s more about making a significant difference in a market that sincerely needs one. Customers need high-availability solutions that don’t cost an arm and a leg and perform as promised. BCDVideo has delivered on both counts.” The HC3 self-healing machine intelligence automatically identifies, mitigates, and corrects infrastructure problems in real-time" “The HC3 self-healing machine intelligence automatically identifies, mitigates, and corrects infrastructure problems in real-time, eliminating the need for infrastructure management componentry. This innovation makes HC3 simple for security integrators to manage and administer,” commented Jeff Ready, CEO and co-founder, Scale Computing. “The HCI-VS system, powered by Scale Computing, combines the HC3 self-healing automation with BCDVideo’s leading technology, giving customers a solution built to meet industry wide surveillance requirements while also simplifying the management and maintenance of their infrastructure.” HCI-VS Solution At ISC West The HCI-VS is currently available to ship. The company will showcase the solution at ISC West April 10th and 11th. ISC West is the largest converged security trade show in the United States, covering video surveillance, access control, smart home, public security, drones, robotics, and more. Conference attendees showcase the newest security products and technologies, network with colleagues and security professionals, and gain valuable industry training.
Growing drone use in populated areas poses significant risks that, without additional safeguards, could result in attacks by malicious entities and exploited for use in cyberattacks, terrorism, crime and invasion of privacy, according to a new research report by Ben-Gurion University of the Negev (BGU) and Fujitsu System Integration Laboratories Ltd. researchers. Computer Vision Algorithms The first comprehensive study on “Security and Privacy Challenges in the Age of Drones” evaluates 200 academic and industry techniques designed to detect and disable drones flying in both unrestricted and restricted areas. Its findings coincide with the U.S. government proposal to allow civilian drone flights with new security rules that permit deliveries and other commercial uses in populated areas. The researchers demonstrated a new physical method to disable drone’s active tracking functionality To highlight the threat, the researchers demonstrated a new physical method to disable drone’s active tracking functionality, a new technology that was recently introduced by drone manufacturers that is based on computer vision algorithms. Rise In Drone-Related Security Incidents “The cutting-edge technology and decreasing drone prices made them accessible to individuals and organizations but has created new threats and recently caused an increase in drone-related incidents,” says Ben Nassi, a Ph.D. student in BGU's Department of Software and Information Systems Engineering (SISE) and a researcher at the BGU Cyber Security Research Center. “There are many difficulties that militaries, police departments, and governments are seeking to overcome, as it is a recognized threat to critical infrastructure, operations, and individuals.” The researchers examined different ways to detect drones in drone-restricted areas including radar, RF Scanners, thermal cameras, sound and hybrids of these methods. However, they believe the biggest challenge is determining the drone’s purpose in non-restricted areas. Drones Challenge Security And Privacy “An open-skies policy that allow drones to fly over populated areas pose a significant challenge in terms of security and privacy within society” says Prof. Yuval Elovici, Ben Nassi’s Ph.D. advisor, who is director of the Deutsche Telekom Innovation Labs@BGU; director of the BGU Cyber Security Research Center, SISE faculty member and the Davide and Irene Sala Chair in Homeland Security Research. The researchers propose methods that enable flying drone identification as well as registration, which is now a U.S. regulationAttackers can also disguise a cyber-attack as legitimate drone pizza delivery by hiding the hardware they use inside the pizza box. “In an unrestricted area, we believe that there is a major scientific gap and definite risks that can be exploited by terrorists to launch a cyber-attack,” Nassi says. “It is inevitable that drones will become more widespread, but we need to recognize that open-skies policy pose multiple risks and that current solutions are unable to solve as a result of a major scientific gap in this area.” Flying Drone Identification The researchers propose methods that enable flying drone identification as well as registration, which is now a U.S. regulation. This includes dedicated techniques for authenticating drones and their operators. While in their previous study, the researchers demonstrated a new technique to detect a spying drone, new methods to determine the purpose of a nearby drone must be developed.
Percepto, the provider of on-site autonomous drone solutions, announced that it will attend ISC West, to share the surveillance and operational benefits of incorporating the industrial-grade Percepto Solution into security and safety operations. The all-weather drone-in-a-box system automatically runs scheduled aerial patrols, providing real-time detection and tracking of humans and vehicles and is capable also of detecting anomalies. Percepto will be at the Johnson Controls Booth (20005) at ISC West 2019, which takes place April 10-12 at Sands Expo, Las Vegas, NV. Each Sparrow is equipped with dual high-definition thermal cameras for 24/7 surveillance and monitoring The Percepto Solution is currently in use around the world including a number of Fortune 500 organizations. It is ideally suited to any large-scale enterprises looking to improve security, increase productivity and reduce safety risks and operational costs. HD Thermal Cameras For 24/7 Surveillance The industrial-grade solution comprises state-of-the-art Sparrow drones that are securely housed in the Percepto Base when not in flight. Each Sparrow is equipped with dual high-definition thermal cameras for 24/7 surveillance and monitoring, and are capable of operating in extremely hostile weather conditions including heavy rain, snow and dust. PerceptoCore technology is used to manage a single unit or a fleet of drones simultaneously. CEO of Percepto, Dor Abuhasira states: “The Percepto Solution provides security teams with reliable, fully automated, round the clock aerial surveillance and because it is able to cover more ground faster, it is ideal for augmenting guarding patrols and perimeter intrusion detection systems.” Autonomous Response To Alerts The Sparrow can be used to responds autonomously to alerts when integrated with third party systems such as a smart fence or motion detectorsThe Sparrow can also be used to responds autonomously to alerts when integrated with third party systems such as a smart fence or motion detectors. “When a Sparrow responds to an alert, a control room operator is able to instantly view real-time camera footage from the drone,” adds Abuhasira. “Crucially, the Percepto Solution can be fully integrated with control room infrastructure already in place including VMS and PSIM systems, to further help the operator take the appropriate action.” When each mission is completed, drones return to the Percepto Base where automated post flight checks and fast battery charging is completed, ensuring the Sparrow is always primed for the next mission.
In my coverage of China Tariffs impacting the security industry over four recent articles, products on the tariff schedules routinely integrated into security solutions included burglar and fire alarm control and transmission panels, video surveillance lenses, HDTV cameras used for broadcast use cases and fiber optic media converters. The general ‘callout’ of ADP (Automatic Data Processing) devices and peripherals technically includes servers, workstations and microcomputers, all of which are commonly used to support security solutions. The underperformance, from June 15 to August 24, of U.S. stocks with high revenue-exposure to China, and that of Chinese stocks with high revenue-exposure to the United States was significant and almost identical at 3.2%, significant losses to some investors already involved in security industry M&A activity. Significant Public Safety Facial Recognition (FR) vendors leveraging AI expanded their market focus to retail and public safety While it was not apparent that practitioners’ security program budgets kept pace with the growth of the more popular solution providers like video surveillance and cyber security, the ICT industries supporting the security economy continued to expand, especially in wireless and wired infrastructure, including preparations for 5G wireless rollouts. These omnipresent technologies drove significant public safety, smart city and public venue projects in 2018. Facial Recognition (FR) vendors leveraging AI expanded their market focus to retail and public safety. In 2018, virtually every public presentation, webinar and published Q&A on social media monitoring and facial recognition technologies I worked on, involved significant pushback from privacy advocates, almost to the point of alarmism. Massive Risk Reduction Several solution providers in these areas have made significant strides on data protection, accuracy, powered by AI and documented crime reduction cases; however, this real news is quickly shadowed by privacy advocates, seemingly ignoring massive risk reduction, especially in the case of active assailants and gang-related crime. Will FR become mainstream? The cautious security industry may take a cue from the maverick retail industry, sports venue and VIP verification solution providers that grew in 2018. 2019 trends: presupposition or repudiation; winners and losers. Chinese tariffs have had a huge impact on the security industry, which can be seen from changes to U.S and Chinese stocks Although technology adoption forecasting is inexact, there are definitive opportunities in the security industry born on necessity. With the widespread problem of false alarm transmission and inability for first responders to ‘be everywhere,’ developers of solutions that provide automated verification and alternative security incident detection are expected to become mainstream. Promising Detection Systems The use of AI, NLP, LiDAR, UAS (Unmanned Aerial Vehicles aka drones) with surveillance and thermal imaging will grow, mostly due to higher acceptance in other industries like autonomous vehicles, rail safety, terrain and post devastation mapping/rescue. However, legacy ‘listing’ or certification organizations will be forced to make an important decision for their own survival: work toward integrating these promising detection systems into acceptance by insurance, licensing and standards development organizations. 2019’s ‘true’ Industrial Philanthropists will be needed to fund early warning tech for firefighters and the presence of active assailants 2019’s ‘true’ industrial philanthropists will be needed to fund early warning tech for firefighters and the presence of active assailants. For these use cases, 5G infrastructure rollouts, FR acceptance, lower cost perimeter detection and long range object and fire recognition by LiDAR and Thermal imaging will all be watched closely by investors. Should public agencies and philanthropical solution providers in the security industry cross paths, we may just yet see a successful, lifesaving impact. Cyber Risk Profile The ‘Digital twin’ refers to a digital replica of physical assets (physical twin), processes, people, places, systems and devices that can be used for various purposes. Your ‘Security Digital Twin’ has a similar physical and cyber risk profile, either through common threats, similar assets or both. Good news: managing your risk, protecting assets and securing your facilities in 2019 will get easier as security digital twin profiles will grow in maturity, while keeping their data sources private. This will be accelerated by the maturity of AI-based, auto-generated visualizations and image recognition, that happens to also drive the FR solutions. The 5G wireless infrastructure market is emerging as far more of a quantum leap in connectivity, like ‘wireless fiber optics’ performance, than an upgrade to 4G LTE. The 5G infrastructure market will be worth $2.86 billion by 2020 and $33.72 billion by 2026, growing at a compound annual growth rate (CAGR) of 50.9%. Intelligent Applications The explosion of ingested voice, video, and meta-data, the interconnectivity of devices, people and places, and the integration of intelligent applications into expanding ecosystems all require faster communications. To be more accurate, 5G rollouts will accelerate in 2019; however, current project funding will include and be impacted by future enterprise security connectivity: 5G and FWA (Fixed Wireless Access). 5G rollouts will accelerate in 2019; however, current project funding will include and be impacted by future enterprise security connectivity Quite simply put, larger solution providers are gently coaxing practitioners into seemingly ‘open systems;’ the negative discovery during an M&A process, audit or integration with a smart city’s public/private partnerships will continue to be revealed, and related industries will force reform. Autonomous things will be enabled by AI and image recognition. With few affordable rollouts of security robots and outdoor unmanned ground vehicles (UGV) that leveraged platforms popular with research and even NASA, the autonomous security robot was mostly MIA from a security practitioner’s program in 2018. Perimeter Intrusion Detection One platform was even accused of intimidating homeless people in a public place, at a major city. Industries mutually beneficial are often unaware of each other; this will change gradually: one major domestic airport is currently evaluating a UGV platform performing perimeter intrusion detection, runway weather conditions and potential aircraft taxiing dangers. The platform is being used largely in transportation research, yet offers significant opportunities to the security industry. Research firm Gartner estimates that 70% of today’s technology products and services can be enhanced with ‘multi-experience’-based VR/AR/MR The ‘immersive experience’ of virtually any security or threat detection is a twist on virtual/augmented/mixed reality (VR/AR/MR) with additional sensory features. Although VR/AR/MR is well underway in other industries, there are several companies with solutions like VR-based active assailant training that could provide a fighting chance for practitioners, employees, visitors, faculty and children. Research firm Gartner estimates that 70% of today’s technology products and services can be enhanced with ‘multi-experience’-based VR/AR/MR. Security Ecosystem Members Not necessarily MIA, but of special mention is the need of security and safety practitioners to prioritize communications systems over ‘nice to have’ expansive video surveillance systems for mass casualty threats. This will eventually improve with 5G for Enterprise solution rollouts. At the past GSX and upcoming CES Technology trade shows, a new roundup of technologies is discovered: a wider diversity of protection promise to save ASIS members on their technical security program is realized. With each of the ‘winners,’ (5G, AI, NLP, LiDAR, UAS [Unmanned Aerial Vehicles aka drones], thermal imaging, digital security twins and smart-city-friendly technologies) it is both exciting and challenging work for both security practitioners and solution providers. All things equal and with the necessary technology acceptance testing processes, this is a truly great time for security ecosystem members.
From satellite imagery to street views to indoor mapping, technology has disrupted our past world. This has left us dependent upon new ways to visualise large spaces. This new world has brought many benefits and risks. But what does that mean for the security professional or facility manager today and what technologies can be used to secure buildings and improve facility operations? A Brief History Of 3D Technology Starting May 5, 2007 (inception 2001), Google rolled out Google Street View to augment Google Maps and Google Earth; documenting some of the most remote places on earth using a mix of sensors (Lidar/GSP/Radar/Imagery). The mission to map the world moved indoors May 2011 with Google Business Photos mapping indoor spaces with low cost 360° cameras under the Trusted Photographer program. In the earlier days, 3D scanning required a high level of specialization, expensive hardware and unavailable computing power With the growth of 3D laser scanning from 2007 onwards, the professional world embraced scanning as effective method to create digitised building information modeling (BIM), growing fast since 2007. BIM from scanning brought tremendous control, time and cost savings through the design and construction process, where As-Built documentation offered an incredible way to manage large existing facilities while reducing costly site visits. In the earlier days, 3D scanning required a high level of specialization, expensive hardware, unavailable computing power and knowledge of architectural software. Innovation during the past 8 year, have driven ease of use and lower pricing to encourage market adoption. Major investments in UAVs in 2014 and the commercial emergence of 360° photography began a new wave of adoption. While 3D scanners still range from $20K – $100K USD, UAVs can be purchased for under $1K USD and 360° cameras for as low as $100. UAVs and 360° cameras also offer a way to document large spaces in a fraction of the time of terrestrial laser scanners with very little technical knowledge. Access to building plans, satellite imagery, Google Street View, indoor virtual tours and aerial drone reconnaissance prove effective tools to bad actors The result over the past 10+ years of technology advancement has been a faster, lower cost, more accessible way to create virtual spaces. However, the technology advances carry a major risk of misuse by bad actors at the same time. What was once reserved to military personal is now available publicly. Access to building plans, satellite imagery, Google Street View, indoor virtual tours and aerial drone reconnaissance prove effective tools to bad actors. Al Qaeda terror threats using Google Maps, 2007 UK troops hit by terrorists in Basra, 2008 Mumbai India attacks, 2016 Pakistan Pathankot airbase attacks, ISIS attacks in Syria using UAVs, well-planned US school shootings and high casualty attacks show evidence that bad actors frequently leverage these mapping technologies to plan their attacks. The weaponization of UAVs is of particular concern to the Department of Homeland Security: "We continue to face one of the most challenging threat environments since 9/11, as foreign terrorist organizations exploit the internet to inspire, enable or direct individuals already here in the homeland to commit terrorist acts." Example comparison of reality capture on the left of BIM on the right. A $250 USD 360° camera was used for the capture in VisualPlan.net software What Does This Mean For The Security Or Facility Manager Today? An often overlooked, but critical vulnerability to security and facility managers is relying on inaccurate drawing. Most facilities managers today work with outdated 2D plan diagrams or old blueprints which are difficult to update and share.Critical vulnerability to security and facility managers is relying on inaccurate drawing Renovations, design changes and office layout changes leave facility managers with the wrong information, and even worse is that the wrong information is shared with outside consultants who plan major projects around outdated or wrong plans. This leads to costly mistakes and increased timelines on facility projects. Example Benefits Of BIM There could be evidence of a suspect water value leak which using BIM could be located and then identified in the model without physical inspection; listing a part number, model, size and manufacture. Identification of vulnerabilities can dramatically help during a building emergency. First Responders rely on facilities managers to keep them updated on building plans and they must have immediate access to important building information in the event of a critical incident. Exits and entrances, suppression equipment, access control, ventilation systems, gas and explosives, hazmat, water systems, survival equipment and many other details must be at their fingertips. In an emergency situation this can be a matter of life or death. Example Benefit Of Reality Capture First Responders rely on facilities managers to keep them updated on building plans A simple 360° walk-through can help first responders with incident preparedness if shared by the facility manager. Police, fire and EMS can visually walk the building, locating all critical features they will need knowledge of in an emergency without ever visiting the building. You don’t require construction accuracy for this type of visual sharing. This is a solution and service we offer as a company today. Reality capture is rapidly becoming the benchmark for facility documentation and the basis from which a security plan can be built. Given the appropriate software, plans can be easily updated and shared. They can be used for design and implementation of equipment, training of personnel and virtual audits of systems or security assessments by outside professionals. Our brains process visual information thousands of times faster than text. Not only that, we are much more likely to remember it once we do see it. Reality capture can help reduce the need for physical inspections, walk-throughs and vendor site-visits but more importantly, it provides a way to visually communicate far more effectively and accurately than before. But be careful with this information. You must prevent critical information falling into the hands of bad actors. You must watch out for bad actors attempting to use reality capture as a threat, especially photo/video/drones or digital information and plans that are posted publicly. Have a security protocol to prevent and confront individuals taking photos or video on property or flying suspect drones near your facility and report to the authorities. Require authorization before capturing building information and understand what the information will be used for and by who.There are a number of technologies to combat nefarious use of UAVs today Nefarious Use Of UAVs There are a number of technologies to combat nefarious use of UAVs today, such as radio frequency blockers and jammers, drone guns to down UAVs, detection or monitoring systems. Other biometrics technologies like facial recognition are being employed to counter the risk from UAVs by targeting the potential operators. UAVs are being used to spy and monitor for corporate espionage and stealing intellectual property. They are also used for monitoring security patrols for the purpose of burglary. UAVs have been used for transport and delivery of dangerous goods, delivering weapons and contraband and have the ability to be weaponised to carry a payload.Investigating reality capture to help with accurate planning and visualization of facilities is well worth the time The Federal Aviation Administration has prevented UAV flights over large event stadiums, prisons and coast guard bases based on the risks they could potentially pose, but waivers do exist. Be aware that it is illegal today to use most of these technologies and downing a UAV, if you are not Department of Justice or Homeland Security, could carry hefty penalties. Facility managers must have a way to survey and monitor their buildings for threats and report suspicious UAV behaviours immediately to authorities. At the same time, it’s critical to identify various potential risks to your wider team to ensure awareness and reporting is handled effectively. Having a procedure on how identify and report is important. Investigating reality capture to help with accurate planning and visualization of facilities is well worth the time. It can help better secure your facilities while increasing efficiencies of building operations. Reality capture can also help collaboration with first responders and outside professionals without ever having to step a foot in the door. But secure your data and have a plan for bad actors who will try to use the same technologies for nefarious goals.
In 1901 New York state made a pioneering regulation move and became the first US state to require automobile owners to register their vehicles. This marked the beginning of regulation on modern traffic, which - following decades of development - resulted in a multi-layer concept of regulation relating to vehicles and driver’s licenses, traffic signs and insurance mechanisms that we are all familiar with nowadays. While certain parallels can be drawn between the early days of cars and our contemporary experience with quadcopters, we are facing a new challenging era that is far more complex to organize and regulate. Integrating Drones In Existing Regulatory Ecosystem Similar to other pioneering technologies in the past, drones need to integrate into a long existing and well-balanced ecosystem, the rules of which have first been drafted some one hundred years ago and have evolved without taking vehicles such as drones into account. Yet the safety risks related to aviation hinder the quick integration of drones into that ecosystem, broadening the gap between existing regulatory landscape and the exponentially growing popularity and ever-advancing technology of drones. The safety risks related to aviation hinder the quick integration of drones into the legislative ecosystem For the past several years, governments and legislators have been trying to tackle this problem by trying to answer two questions: how to properly integrate drones into the airspace without creating a hazardous impact on existing airborne operations, and how to enforce regulations in order to prevent the side-effects related to careless or malicious drone flights, taking into consideration public safety and physical security. Counter-UAS Measures And Regulations Up until 2018, legislators tried to tackle these two questions as a whole by introducing bundled legislation drafts covering the entire landscape of gaps they needed to address, which resulted in multi-parliamentary committee efforts both in the US and abroad to review and approve each bill - a process that is very slow by design. It was only in the beginning of this year that the issues were starting to be addressed separately: legislation related to limitations and counter-drone measures on the one hand, and legislation related to integration into airspace on the other. Let’s take a closer look at Counter-UAS (unmanned aerial systems) measures and what makes them challenging in terms of regulation. Over the past years, various counter-drone technologies have been introduced to enable control over rogue drones in order to either stop them from achieving their flight purpose or prevent them from creating safety hazards to people or property. These measures can be grouped into 3 types of technologies: Military grade solutions - including lasers and surface-air missiles Kinetic solutions - including net-guns and autonomous drones set out to catch the rogue drone and disable it airborne Non-kinetic RF-based solutions - aimed at either disabling, disrupting or accessing the drone’s communications channels in order to trigger a return-to-home function, or guide the drone into a safe landing route Aside from combat military operations, the legality of using the above technologies is questionable as they tamper with an airborne aircraft, might be considered as wiretapping and/or violate computer fraud laws. Therefore, one can conclude that unless changes to regulation are made, non-military facilities will continue to be defenseless from and vulnerable to rogue drones. One can conclude that unless changes to regulation are made, non-military facilities will continue to be defenseless from and vulnerable to rogue drones European c-UAS Legislation Next, let’s look at the state of c-UAS legislation in both Europe and US to better understand different legislative ecosystems and how they affect the possibilities of using counter drone measures. In the European Union, there is currently no uniform legislation, and the member countries rely on their own existing legal infrastructures. Roughly speaking, most countries use a method of exemptions to the communications and aviation laws to allow the use of counter drone measures after a close examination by the relevant authorities. Such exemptions are approved under scrutiny to particular sites, which provide some relief, but they do not allow broad use of countermeasures. Further discussion regarding a broader regulation change, on a country level or EU-wide, is only preliminary. US c-UAS Legislation Preventing Emerging Threats - provides an initial infrastructure for counter drone measures to be used by various DoJ and DHS agenciesUnlike the EU, in the US exemptions are not possible within the existing legal framework, and the possible violation of US code title 18 means that the hands of both the government or private entities are tied when attempting to protect mass public gatherings, sports venues, or critical infrastructure. Therefore, it was more urgent to introduce legislation that would allow countermeasures to some extent. In September, US Congress approved the FAA-reauthorization act for the next 5 years (H.R. 302), which was shortly after signed by the President and came into effect. Division H of the act - Preventing Emerging Threats - provides an initial infrastructure for counter drone measures to be used by various DoJ (Department of Justice) and DHS (Department of Homeland Security) agencies under strict limitations. However, the act avoids determining which technology the agencies should use, yet it requires minimal impact on privacy and overall safety in order to strike the necessary balance. This is the first profound counter-drone legislation and is expected to be followed by additional measures both in the US and in other countries. Updating Counter-Drone Legal Infrastructure In summary, 2018 has been a pioneering year for counter-drone legislation, and while technology already allows taking action when necessary, legal infrastructure needs further updates in order to close the existing gaps: covering additional federal assets, state-level governments, and private facilities of high importance, such as critical infrastructure sites. Legislators in the US and around the world need to continue working in a rapid tempo to keep up with the growing threat of drones. As with cars a century ago, the number of accidents will rise with the increase in time taken to regulate.
Unmanned aerial vehicles (UAVs), or drones, present a range of threats, from the careless and clueless to the criminal. While many incidents may seem harmless, the threat to any location at any time depends on a range of factors. Drones are inexpensive for criminals to buy or make, and there are continuously improving battery, airspeed, and payload capabilities. UAVs can also fly without an RF signal to jam or hack. Fortunately, sensor technologies including radar are available for security agencies and personnel to protect assets and the public. Radio-Wave Signals Radar works as a deterrent by sending out a radio-wave signal using a transmitter antenna, and a small portion of that signal reflects off objects in its path and returns to a receiver antenna. The highest performing radars use an antenna technology called Active Electronically Scanning Array (AESA), which enables all-electronic reconfiguration of the antennas. When an AESA radar detects an object, it can ‘focus’ its antennas to track the object, in much the same way as the zoom on a camera does. Multiple objects can be tracked while continuing to scan. Kirkland, WA-based Echodyne offers a radar product that brings these ESA capabilities to non-military security applications at commercial price points. Combining proprietary hardware with intelligent software, Echodyne produces a compact, solid-state, electronically scanning array Echodyne’s ESA Radar Echodyne says they are reinventing radar price-performance for security applications in the ground (people, vehicles) or air (counter-UAS) domains. Combining proprietary hardware with intelligent software, Echodyne produces a compact, solid-state, electronically scanning array (ESA) radar that is affordable for commercial, law enforcement, and governmental customers. The company is backed by high profile investors, including Bill Gates, Madrona Venture Group, Vulcan Capital, NEA, and Lux Capital. “Radar is a sensor,” says Leo McCloskey, Echodyne VP Marketing. “It is most applicable when security professionals can both understand its capabilities and define risk assessment and deployment requirements that call for those capabilities. Our customers are primarily security system integrators and consultancies, which integrate the performance of radar into a sensor array that meets mission requirements.” Radar Technology For Border Surveillance Echodyne was selected by the Science and Technology Directorate of the Department of Homeland Security (DHS) for its Silicon Valley Innovation Program (SVIP) to demonstrate the performance of its radar technology for border surveillance applications. The radar was deployed both in fixed remote surveillance towers and as a lightweight rapid deployment kit for field agents. Able to surveil ground and air domains, the radar combines versatility and commercial price with surveillance capabilities. “We set out to build the world’s best compact, solid-state ESA radar sensor, and we are demonstrating that we’ve reached that objective,” says McCloskey. “We’re excited to introduce these capabilities for other security applications.” Able to surveil ground and air domains, the radar combines versatility and commercial price with surveillance capabilities MESA Technology Echodyne’s proprietary technology provides a small true electronically scanning array (ESA) radar. Unlike expensive Active ESA (AESA) phased array radars, MESA requires no physical phase shifters, thus reducing the cost, size, weight, and power by several orders of magnitude while maintaining all the benefits of fast ESA radar. Echodyne combines its MESA technology with an intelligent software suite, Acuity, to produce a configurable, software-defined radar for commercial, law enforcement, and governmental security applications. The capability is also useful for temporary events such as rallies and marathons, and many other market applications “Technology seems to make everything more available to more people over time,” says McCloskey. “What is a retail product today will be a purchased self-assembly kit tomorrow and an improvised self-made drone the following day. The Federal Aviation Administration (FAA) is diligently at work on creating rules for safe UAV operation, though any final rules remain some distance off. As drone volumes increase, delineating friend from foe in the airspace requires clear legal and regulatory frameworks, which are nascent but would help distinguish the threat of nuisance flyers from illegal overflight.” Radar Sensor For Security Applications “Detecting and tracking airspace objects of interest is imperative for airports, chemical plants, oil and gas installations, refineries, water and energy utilities, stadiums and other public spaces”, says McCloskey. The capability is also useful for temporary events such as rallies and marathons, and many other market applications. “As with any product, our applicability will depend on variables like location, terrain, risk assessment, and existing security technologies,” says McCloskey. “Our mission is to deliver the very best radar sensor for security applications.”
The excitement of ISC West 2019 continued until the very end – almost. Exhilarated by the first two busy days of the show, attendees and exhibitors seemed to welcome a slower third day. There were no complaints about booth traffic, and still plenty of thoughtful conversations taking place, everyone determined to maximize the value of face time with customers until the last second. Building An IoT Ecosystem In SAST At a show lacking in high-profile new technology announcements, the biggest news is perhaps the possible long-term impact of first-time exhibitor Security and Safety Things (SAST), a Bosch startup. SAST is building a new Internet of Things (IoT) ecosystem for the security and safety industry, including an app store, an open and secure camera operating system, a software developer environment, and a portal for integrators. SOCs (system-on-chips inside cameras) are becoming much more capable" Their 1,800-square-foot booth was big for a first-time exhibitor, and the American football theme was well received, as was the substance of the company’s effort to drive innovation in a highly fragmented industry. Seeing actual cameras and apps on display at the ISC West booth is “more real than PowerPoint,” says Hartmut Schaper, CEO of Security and Safety Things (SAST). “For us, seeing is believing,” says Schaper. “It was important for us to show cameras and apps for the first time. People are surprised at how far down the road we are.” “This dynamic will change in the industry,” says Schaper. “SOCs (system-on-chips inside cameras) are becoming much more capable. Soon there will be more processing power on the edge. People will find a way to use the extra processing power.” “Seeing is believing” at the SAST booth at ISC West 2019, where CEO Hartmut Schaper showed several manufacturers’ cameras whose functionality can be expanded using Android apps Developing More Apps Several large manufacturers are already involved in the initiative, but there are some holdouts. “We are having ongoing talks with everyone to convince them to join,” Schaper says. “Some of the bigger ones will come around. We are not a camera manufacturer, and not a threat. We are owned by Bosch but are managed completely separately. There will be more and more apps developed, and momentum will increase.” “A year from now we will have successful customers we can talk about, and more camera manufacturers on board,” he says. “This year we are taxiing on the runway, but next year we will have cleared the tarmac and be climbing.” If the approach succeeds, their first appearance at ISC West will be remembered as historic. Future Of Surveillance Cameras Off the show floor, in a nearby meeting room, chip maker Ambarella demonstrated technologies that will be driving the future of video surveillance cameras, including more intelligence at the edge. “People have been using more traditional video analytics approaches, though most of them have been disappointing,” says Chris Day, Ambarella VP of Marketing and Business Development. “What is ground-breaking now is the use of neural networks and real artificial intelligence, which has increased capabilities 100x. "You will see camera products coming out over the next year that are massively better than before. It’s not just incrementally getting better. Cameras will be coming out later this year with analytics that are absolutely amazing based on [the new chips.]” Larry Anderson, editor-in-chief of SecurityInformed.com, talks about Ambarella HDR and Low Light Solutions with Jerome Gigot, Senior Director of Marketing for Ambarella. (Source: Ambarella) New Systems-on-Chips Ambarella has introduced four new systems-on-chips (SoCs) in the last year, with emphasis on computer vision (video analytics). The newest is the S6LM Camera SoC with 4K imaging technology, unveiled at ISC West. The S6LM includes Ambarella's latest high dynamic range (HDR) and low-light processing technology, highly efficient 4K H.264 and H.265 encoding, multi-streaming, on-chip 360-degree de-warping, cyber-security features, and a quad-core CPU. People shouldn’t forget what a good camera is, and there doesn’t have to be a tradeoff" “With so much focus on AI and computer vision, I’m concerned the industry has taken focus away from low light imaging, wide dynamic range and image quality,” says Day. “You have to see the details in an image. People shouldn’t forget what a good camera is, and there doesn’t have to be a tradeoff, it’s all included in one chip.” From Products To Systems With a new general manager on board (Daniel Gundlach, formerly of Bosch), FLIR Systems Security Division is continuing its transition from a product company to a solutions provider, removing internal silos to clear the path. FLIR offers a strong end-to-end portfolio for Smart Cities applications, including the TruWITNESS line of body worn cameras and newly acquired Aeryon drones. FLIR’s historical strength as the top thermal imaging provider continues, but today they are much more than a thermal imaging company, offering visible day/night cameras, infrared pan-tilt-zoom cameras, video management systems and other technologies to provide a broader platform. FLIR's Saros security cameras combine multiple security technologies, including thermal sensors, high-resolution visible imaging, IR and visible LED illuminators, onboard analytics and two-way audio and digital input/outputs. Products In Critical Infrastructure Applications In addition to Safe Cities, FLIR installs a range of products in critical infrastructure applications, such as oil and gas and electric utilities. Ports also tend to combine traditional security with an emphasis on perimeter protection, a FLIR strength. Existing perimeter protection applications can open opportunities for the broader platform. For example, installing a complete system in an airport that already uses FLIR’s thermal technology represents “low-hanging fruit” for the company, says Fredrik Wallberg, FLIR Director of Marketing – Security and Intelligent Transportation Systems. Ambarella demonstrates its latest imaging technology for video security during ISC West 2019 (Source: Ambarella) Integrated Solutions Bosch's Focus At the Bosch booth, there was an emphasis on integrated solutions and the customer experience. A mock retail store setup demonstrated systems such as overhead cameras for people counting and alarm communication to provide an alert if a refrigerator door is left ajar. A wireless panic button generates a silent alarm, communicates with a 2-way radio, and triggers a camera to focus on the area. An AVIOTEK IP camera alarms if there is a fire, based on observing actual flames rather than smoke. A new Bosch fixed dome camera series offers wireless remote commissioning capabilities that reduce installation and set-up time by up to 75 percent. Set-up only takes three steps: install the mounting bracket, connect the cables, and attach the camera module. Commissioning can be done wirelessly or remotely with no need for ladders or lifts. Dahua Marks Five Years In The States An IR illuminator is attached to each lens module to ensure there is always illumination in the field of view Time flies in the security industry, and it has already been five years since the Dahua brand entered the U.S. market. Today the company offers products through ADI and some 20 distributors, and has more than 30 technical consultants and technical support employees and 50 or 60 sales people in the field (including independent rep firms). “We are growing,” says Tim Shen, Director of Marketing at Dahua Technology USA. “It’s exciting for the company.” At ISC West, Dahua introduced a line of Multi-Flex panoramic cameras with lens modules that can be repositioned along an internal track for 180-, 270- or 360-degree views, providing flexibility for integrators. An IR illuminator is attached to each lens module to ensure there is always illumination in the field of view. Cost savings come from ease of installation (one camera instead of four) and only one VMS license (instead of four). AI And Night Color Cameras Dahua is also emphasising its Night Color cameras that remain in full color mode regardless of how dark it gets. There is no IR illumination or IR cut filter – the camera stays in color mode and displays any visible image in colour with as little as 1 lux of illumination. The 2 megapixel version is on display at ISC West, and a 4 megapixel version will come in the fall. A year ago at ISC West, Dahua emphasised its initiatives in artificial intelligence (AI) in order to position the company as a technology leader. This year, the message was more general – ‘Power Through Technology.’ The range of Dahua technologies includes AI, Night Color, Starlight low-light imaging, fifth-generation HDCVI, and e-POE (Enhanced Power over Ethernet). Dahua USA's Director of Marketing says "the market itself likes AI", and expects more AI applications to follow (Source: Dahua USA's LinkedIn) “When we present AI to customers, they are happy, but when it comes to the budget they don’t have it,” says Shen. “The market itself likes AI, and it’s very much a buzzword. But we still need a proof of concept that it can do something good for end users. We need time to develop broader applications. The ‘smart retail’ market and education are good places to start.” he says. “AI is for project business,” adds Jennifer Hackenburg, Dahua’s Senior Product Marketing Manager. “Projects that are looking at AI haven’t come to fruition yet; they are still in the pipeline. It’s not for your everyday business. They are implementing it, but not as fast.” Access Control Beyond Doors Access control should extend beyond doors. That’s the message I heard at the ASSA ABLOY booth, which displayed a variety of physical locks and intelligent access systems. An example is traffic cabinets, those metal boxes in public locations that could potentially be accessed to invade an internal network. ASSA ABLOY emphasises the need to secure the variety of enclosures, cabinets, drawers and small spaces ASSA ABLOY emphasizes the need to secure the variety of enclosures, cabinets, drawers and small spaces throughout an enterprise. The company’s ‘security continuum’ message draws attention to the need for the right level of security for the right opening, using existing infrastructure as well as new electronic technologies. “Customers face a combination of non-traditional access control and questions on how they can secure things that are not doors,” says David Corbin, ASSA ABLOY Director of Access Control Accessories. The security message is resonating beyond the traditional security department to involve other stakeholders in an enterprise, including IT directors. There is new awareness of vulnerabilities that have been there forever, such as traffic cabinets that can be opened with a key purchased on eBay.
Attendance has been growing steadily year-over-year for ISC West, and the 2018 show exceeded 30,000 total industry visitors for the first time. So it’s safe to expect ISC West 2019, April 10-12 at the Sands Expo in Las Vegas, will be bigger than ever. Preregistration for the 2019 show is on track to bring even more visitors than last year. “This is a show for everyone, for converged security,” says Mary Beth Shaughnessy, Event Director for Reed Exhibitions. “We bring a lot of different verticals together with IT and network security, physical security and robots and drones. It’s one-stop shopping and the number one security show in North America.” Identifying Buying Influencers The event organisers of ISC West make a concerted effort to bring the industry’s top buyers to the show The event organisers of ISC West make a concerted effort to bring the industry’s top buyers to the show. The ISC West Executive’s Club is a ‘top buyer program’ created to welcome high-level buying influencers who have current projects in the pipeline. The program works throughout the year, networking, researching and identifying buying influencers among end users, integrators, dealers/installers and consultants who are working on current projects. Approximately 1,300 attendees are participating in the program this year. An Executive’s Club member might be an integrator working with several large projects or represent a school system that is building a new campus or retrofitting their systems. During the trade show, these guests get the VIP treatment with a variety of benefits, including a lounge, cocktail receptions, and continental breakfasts. Personalized Matchmaking Programs ISC West also provides personalized matchmaking programs to bring together these buyers with companies that can meet their needs. The Executive Club members are also led on guided exhibit hall tours, based on product interest, that highlight new and innovative solutions. The program also contributes to ISC West’s goal to grow its end user audience. In this case, it is a group of eager buyers with immediate needs. Another growing aspect of ISC West is its role shaping exhibiting companies’ technology roadmaps, in particular the timing of new product releases. Many new products and technologies are announced at ISC West, and attendees are conditioned to attend the show to see what’s new in the marketplace. “Vendors try and work to get whatever solutions they are promoting together in time for ISC West,” says Shaughnessy. “Vendors know that attendees have fresh budgets and new initiatives early in the year.” Network Security Products ISC West will partner with the Security Industry Association (SIA) to make educational sessions available April 9-11 ISC West showcases the latest products, services, and technology including access control, video surveillance, disaster recovery, IT security products, network security products, wireless security products, and thousands more helping ensure safety by giving attendees the right tools and defenses to protect against security risks. In addition to the exhibition, ISC West will partner with the Security Industry Association (SIA) to make educational sessions available April 9-11. SIA Education@ISC will kick off the day before the start of the exhibition. The comprehensive program includes 85+ accredited sessions covering a range of industry topics aimed at providing the critical knowledge attendees need to protect and defend against developing threats in today's security landscape.
Communication makes the world much, much smaller - but it also becomes critical to everyone. Once life-enriching communication technologies are embraced, not only do we like and enjoy the benefits, but we also become hooked on it day and night. "There is no doubt that the transportation industry is benefiting from always available communications, making sure drivers, mechanics, dispatchers are always connected and can exchange information when necessary," says Sagi Subocki, Vice President of Products and Marketing for MCC technology leader Softil. "However, for the most part until now, the transportation industry has had to rely on the traditional radio or simply standard mobile phones to perform all communications tasks. That's about to change with the advent of Mission Critical Communications over LTE and 5G as defined in the 3GPP Release 13-15 standard," adds Subocki. Mission Critical Communication Over LTE MCC over LTE offers push to talk, push to video, text and multimedia chat, as well as location information for groups and point to point communications Mission critical communication (MCC) over LTE offers push to talk, push to video, text and multimedia chat, as well as location information for groups and point to point communications. Think about a driver who can push a button and instantly talk to all drivers within a 50-mile radius, for example, to inform them of road conditions, accidents, road works and other incidents. In the event of a breakdown, the truck driver can quickly obtain help from experts using video chat, which makes a driver's life a lot easier. Using the same MCC over LTE capabilities, the driver can see the location of all other drivers using the same radios, can engage in chat sessions with nearby garages and much, much more. And let's not forget that MCC over LTE communications can be prioritized over regular public mobile voice and data traffic, which can help in the case of accidents and natural disasters. Advanced Communication Solutions In Mining While different from the transportation industry, mining's reliance on advanced communication technologies might be even greater than the needs of the transportation market. Subocki explains: "Mission critical push to talk and push to video with guaranteed, prioritized delivery might well make the difference for mining workers. The ability to ask for urgent assistance simply at the push of a button is crucial in the day-to-day operations of an oil rig and a diamond mine." But the benefits of MCC over LTE don't stop there. As MCC over LTE communication is delivered over modern, very capable, rugged smartphones, these devices can be used to interface and collect data from all available sensors - air quality, temperature, radiation, presence of dangerous gases - all this information can be obtained automatically via MCC over LTE integration with IoT and can be used to increase safety. Drones In MCC Over LTE In addition to engaging with all sensors, MCC over LTE communications can include drones which would provide video feeds whenever necessary In addition to engaging with all sensors, MCC over LTE communications can include drones which would provide video feeds whenever necessary - and the 3GPP MCPTT Release 16 standard will extend mission critical communication to include robots, which might be priceless. "Think about the implications of sending an MCC enabled robot to investigate a mine explosion and you'll see the future of MCC over LTE and 5G communications in the mining industry," adds Subocki. Market Value And Outlook A report from ABI Research found the total mission-critical communications market for base stations, repeaters, handsets and infrastructure in 2022 will be US$10 billion. The North American market continues to account for more than half of this world market with the rapidly growing Asia-Pacific region in second place with a 20 percent market share. Public-safety radio was the ancestor of critical communications providing mission-critical voice services and continues to represent over half of this market, followed by the industrial, transportation and utility segments. However, the need for mobile broadband data has also entered the equation driving critical communications systems to evolve to digital radio for data handling and spectrum efficiency. As a result, critical communications systems are slowly evolving from the current TETRA, Digital Mobile Radio (DMR) and Project 25 (P25) to coexist and interoperate with Long Term Evolution (LTE)-based systems. Softil's MCC Over LTE Leadership Softil is a leader in Mission Critical Communication over LTE solutions for developers. Historically, Softil always focused on the full embrace of open communication standards - starting from close participation in the work of the appropriate SDOs, then developing best-of-breed APIs and implementation of the relevant standards, and most importantly, paying utmost attention to the interoperability of the offered solution by active participation and leading all relevant industry-wide interoperability testing events. Softil actively participates in development of the MCC over LTE standards in 3GPP, as well as interoperability testing at the ETSI Plugtest Events. Most importantly, Softil 3GPP Release 13-15 compliant client SDK implementation had been already commercially deployed on the market - in Korea, Softil powers latest and greatest implementation of the MCC over LTE-R communication devices installed on the newest high-speed train line, such as one connecting Incheon airport to PyongChang during the Olympic games.
Hoverfly Technologies Inc., global supplier of tether-powered aerial drone systems, is pleased to announce it has engaged retired Deputy Chief of Los Angeles Police Department Mike Hillmann to consult and provide expertise to Hoverfly and public safety officials of cities, counties and special law enforcement agencies who are considering the use of Small Unmanned Aerial Systems (sUAS) to assist in keeping their cities safe. Small Unmanned Aerial Systems (sUAS) When incidents and/or events happen, having ‘real-time, situational awareness’ from above the scene is critical to managing risk and upholding public safety “With 24-hour news cycles, a never-ending stream of social media posts, mid-term elections and potential threats to the public at large, getting fast, accurate situational awareness from the air during an incident has never been more important when it comes to keeping the public safe. We are thrilled to have Chief Hillmann advising on use cases and how best to implement and integrate this new technology,” says Hoverfly SVP of Systems, Lew Pincus. When incidents and/or events happen, having ‘real-time, situational awareness’ from above the scene is critical to managing risk and upholding public safety and the safety of those who serve our communities. Aerial/Drone Surveillance He adds, “We typically have relied on manned aircraft to provide aerial coverage over a variety of incidents. On occasion, those assets have not always been available, deemed too disruptive or too expensive to deploy in certain situations where an aerial view clearly could have helped an incident commander better understand the situation. Deploying small tether-powered, highly portable, unobtrusive persistent cameras positioned high above the scene can now be used as either a standalone capability or integrated system with existing networks, security infrastructure and even manned aircraft.” Hoverfly tether-powered sUAV (Small Unmanned Aerial Vehicles) systems solve short battery-life problems associated with free-flying dronesToday, Mr. Hillmann is helping chiefs of police, local city and county officials and other public safety personnel understand how Hoverfly’s tether-powered LiveSky systems can be deployed from police or EMS vehicles providing incident commanders with actionable intelligence from high above the scene within minutes of arrival. “Tactically, having the ability to stay in the air monitoring the situation from above for hours, days, even weeks at a time represents an amazing capability we never had before. During my career, I can think of hundreds of situations where having a drone in the air to provide real-time intelligence, surveillance and reconnaissance would have helped keep my officers and the community much safer. It’s a force multiplier that should be exploited by public safety,” says Hillmann. Hoverfly’s LiveSky Systems Hoverfly tether-powered sUAV (Small Unmanned Aerial Vehicles) systems solve short battery-life problems associated with free-flying drones because they operate using a standard 120VAC power source or vehicle inverter. The power, command and control information and video are transmitted over the tether making the entire system completely secure from jamming, hacking or spoofing, ensuring the privacy of the data and improving safety. Perhaps the biggest benefit of Hoverfly systems is they are autonomous and require no piloting skills. The CEO of Hoverfly likes to say, “if you can operate an elevator, you can operate our LiveSky system.”
Major events require a major security operation, and the recent Royal Wedding was one of the biggest operations in recent times. Security was heightened due to the importance of the occasion due to the potential threat of terror to such a major event. There was a drone no-fly zone put in place, however this measure does not necessarily stop drones from entering the area. This kind of measure is put in place to ensure the safety of the attendees, and to limit the threat posed by drones, but it doesn’t prevent it. Drone License Plate Detection System How can you ensure that these measures are adhered to? Drone detection systems are becoming more prominent. DJI’s recently released Aeroscope is ground-breaking Commercial drone experts COPTRZ supplied a number of units to law enforcements agencies involved in security at the Royal Weddingtechnology. It’s a purpose-built drone detection system that allows the operator to track telemetry data from DJI aircraft in surrounding airspace within a radius of up to 20km. It’s in effect, a drone license plate detection system, as well as a data provider. Commercial drone experts COPTRZ recently supplied a number of units to law enforcements agencies and made the technology available to various agencies involved with the security at the Royal Wedding. Monitoring And Intercepting Drone Intrusion The Aeroscope will be used by the law enforcement agencies to protect high profile events. Particularly following the recent Royal Wedding’s no-fly-zone, Aeroscope is a useful tool to ensure that drones in the air near the zone are monitored and if needed are intercepted to ensure the security of the wedding attendees and the royal family alike. Steve Coulson, Managing Director and Founder of COPTRZ has commented on the deal: “We are absolutely delighted to be able to supply drone detection systems to law enforcement agencies. Particularly with big events such as the Royal Wedding and the upcoming World Cup, it’s imperative agencies take advantage of the technology available to them. It’s only a matter of time until technology like the Aeroscope become a necessity for law enforcement agencies worldwide.”
Airbus has expanded the range of its application portfolio for the Tactilon Dabat and partnered with new professional application developers. The aim is to better serve the communications markets in the field of public safety, transportation and healthcare. At the CCW exhibition in Berlin from 15 to 17 May 2018, Airbus is showcasing selected applications for professionals that combine multimedia real-time functions with highest standards of security. “The apps that we showcase at the CCW work in various areas, whether it is industry, public safety or the health sector. They meet specific customer needs and requirements for different regions in the world,” explains Rahim Zaknoun, Head of Innovation & Developer Ecosystem at Secure Land Communications of Airbus. "We selected these apps for our customers and created them for the hybrid Tactilon Dabat.” For instance, the digitalized Triage application from Exomi helps first responders (paramedics) to send complex health data of patients from the ambulance on the scene to the hospital. The delivery of the constantly updated information is standardized and reliable. It can easily be shared not only via the Tactilon Dabat, the Android smartphone and Tetra radio in one device, but also on other platforms in control rooms or in the field. Thus, the application streamlines processes and accelerates a more accurate treatment for the patients. Commanders and group members (Tetra and smartphone users) can easily follow each other on the Dabat’s display based on a map configuration with GPS Live Video Sharing Platform The application ES-Core features a live video sharing function that is secure and supports external video sources, such as from drones or vehicles. Even with little radio coverage the transmission is of high quality. Moreover, footing can be stored as evidence or for the purpose of analysis. “Clearly, this is a tool for police officers. However, paramedics work increasingly with this app on the scene and companies can also master situations by transmitting a live video stream,” says Rahim Zaknoun. Another application can fill frequently the gap of non-existing radio coverage in many public buildings: the ‘indoor positioning’ system for large sites creates a real-time situational awareness when communication groups move around in- and outdoors. Based on a map configuration with a GPS function, commanders and group members (Tetra and smartphone users) can easily follow each other on the Dabat’s display. The application serves especially security personnel in airports, train stations, or event sites: no configuration is needed, a seamless in- and outdoor positioning is put in place and the app works without broadband connection. Track Worker Protection In order to save lives of railway track workers and minimize the risk of collisions, the company Intelligence on Wheels invented the app ‘Track Worker Protection’. This application with a clear map display receives permanent train location updates. Our SmarTWISP application developer programme is the key reference point when it comes to creating secure apps" The signals will be sent from the train operator’s control room and the train itself, which is equipped with a Train Collision Avoidance System. Critical scenarios can now be easily managed with the Tactilon Dabat and the ‘track worker protection’. “Our SmarTWISP application developer programme is the key reference point when it comes to creating secure apps,” says Rahim Zaknoun. “It enables the innovation and professional application development on the top of Airbus’ existing communication technology. It boosts our strong developer ecosystem."
Hikvision, a global manufacturer and supplier of video surveillance equipment, is helping to ensure a safe and reliable electricity supply across South Africa, with the deployment of a massive remote surveillance monitoring solution, covering thousands of electricity substations and power transmission lines. Operated by the largest electricity power distributor in South Africa, Eskom, a network of more than 400,000 kilometers of overhead power lines and several thousand electricity substations, provides electricity to the country’s domestic and business customers. In recent years, this critical power infrastructure has become the target for cable theft, metal theft and other infrastructure related crimes, resulting in vastly expensive and disruptive damage and losses to service providers.Eskom enlisted the help of South Africa’s Combined Private Investigations (CPI) Mitigating Equipment Thefts Organized criminals have increasingly targeted the more remote sections of the supply network, stealing copper cabling, metal and industry grade batteries. Up to 15 incidents per day are currently being reported. If not seriously addressed, it could lead to the interruption of the supply to thousands of domestic customers; commercial operations, hospitals and railway systems. To combat this wide-scale problem, the national electricity provider (Eskom) enlisted the help of South Africa’s leading information driven investigation company, Combined Private Investigations (CPI). CPI was established by a number of experienced law enforcement agents, forensic investigators and corporate security officials, primarily to investigate a high-level cartel for one of the largest parastatals in South Africa. Currently, CPI is the sole supplier of investigations to several parastatals, with an acknowledged record of addressing copper cable and other infrastructure-related crimes successfully, achieving very high recovery levels. CPI arrests between 35 to 85 cable thieves per month and maintains a conviction rate on average of 90%.The impact of downtime for a substation hit by material theft can be significant Preventing Power Loss As a corporate investigations firm comprising over 900 staff members across 18 locations, CPI specializes in the prevention and investigation of non-ferrous metal theft. The company’s main objective is to support electricity supply companies and railway service providers in their fight against organized crime syndicates targeting electrical networks for illegal gain. “Copper and metal theft targeting the power transmission infrastructure has become a real problem for maintaining the reliable supply of electricity in South Africa,” says Roy Robertson, Principal Director of CPI. “The impact of downtime for a substation hit by material theft can be significant, with loss of power to homes, hospitals, schools, factories and public transport services." Intelligence-Driven Approach "These incidents can also have a massive detrimental effect on the provision of key support services, as well as to basic health and safety, so it was vital to our client that not only should the perpetrators of these crimes be investigated and brought to justice, but that the theft incident rate should be significantly reduced.” “To do this, and as a priority, we needed to protect the most vulnerable and remote electricity substations, as these sites were being targeted and experiencing the highest percentage of theft and associated service disruption. At CPI we strive to capitalize on the latest technologies to support our intelligence-driven approach. As such, we approached global surveillance leader Hikvision, to provide the latest electronic security solutions to effectively combat the thefts.”Hikvision Smart Video Content Analytics (VCA) technology embedded into the cameras was set-up for intruder detection Smart Video Analytics Providing a technical team to assess at remote sites, CPI collaborated with Hikvision to assess the most effective technical specification of products to detect and deter thefts. This specification then formed a blueprint to be rolled-out across all of the most vulnerable electricity substations across South Africa. Using their own engineering teams, CPI installed Hikvision DS-2CD2T42WD-I8 and DS-2DE5120W-AE cameras covering the internal and perimeter areas of each remote site. Equipped with 4MP resolution, 120dB Wide Dynamic Range, 3D DNR, EXIR high performance LEDs and 80 metres IR range, the DS-2CD2T42WD-I8 4MP EXIR Network Bullet Camera was the perfect choice to monitor the remote substations, utilizing its advanced performance to provide crystal clear images day and night. Additionally, the Hikvision DS-2DE5120W-AE 1.3MP 20X Network PTZ Cameras were used to provide 3D intelligent positioning and 20X Optical Zoom, to deliver instant visual confirmation on any on-site intruder detection – and all in crystal clear 1.3MP resolution. In conjunction with PIR devices covering the sites’ perimeters, Hikvision Smart Video Content Analytics (VCA) technology embedded into the specified cameras was set-up to perform intruder detection utilizing line detection, to confirm alarm activations and eliminate false alarms.Hikvision’s advanced iVMS 5200 professional software with video wall driver was used to monitor thousands of remote sites Central Monitoring Recorded locally to Hikvision IDS-9632 NXI-1816S Embedded Plug & Play NVRs, specified due to their superior performance and system stability, the NVR’s simple installation reduce engineering installation and set-up time on site, whilst up to 6 megapixel recording resolution and a capacity of up to 4 SATA interfaces ensured the high-quality of local recording needed. Both live and recorded images are transmitted over a wireless LAN, back to CPI’s own control room located at their National Operations Centre in Johannesburg. At the control room, Hikvision’s advanced iVMS 5200 professional software with optional video wall driver was deployed to enable CPI operators to monitor the thousands of remote sites on 24/7 basis, via a ‘monitoring by exception’ basis. Intrusion Detection Monitoring the massive Hikvision integrated surveillance system, in the event of an automated intruder alert being activated to indicate unauthorized movement on-site, surveillance operators are able to quickly visually verify the activity in seconds, examining the high-performance camera network’s high-resolution images. During the process, all evidential video is tagged and automatically archived for future identification and prosecution usage. In the event of unauthorized intruders being detected, the CPI control room operators can instigate a host of anti-intrusion measures, including the dispatch of rapid response teams to a specific locationWe no longer need to deploy response personnel to a site when it may be the subject of a false alarm Integrated Surveillance "These teams comprise highly trained operatives ready to tackle any situation,” continues Roy. “The Hikvision surveillance system ensures we can respond very rapidly to any intrusion detected at the sites, and our manned guard response teams are equipped to get to sites as quickly as is possible, to catch the perpetrators in the act. "We can even call on our Robinson helicopter R44 Police equipped with infra-red camera that can rapidly deploy personnel to reach the most remote locations in just a matter of minutes.” “We work closely with the police and various local authorities, using the evidential video footage produced by the Hikvision systems to very good effect in prosecution cases. The high-definition quality of the Hikvision camera images have proved critical in detecting and prosecuting offenders of metal theft." "Not only is it reducing these incidents, but it enables us to visually confirm the precise cause of an alarm at any remote site at the touch of a button. This means we no longer need to deploy response personnel to a site when it may be the subject of a false alarm – negating the waste of valuable man hours and costs, and vastly improving the effectiveness of our security operation.”We plan to harness more Hikvision technology to fortify power transmission security in South Africa Drone-Assisted Surveillance “We have been so impressed with the Hikvision surveillance technology and the support we have received that we are continuing to roll out this Hikvision based security blueprint to many other power substation sites across South Africa,” Roy continues. “To date, over 1,000 electrical substations are protected by Hikvision systems - making a real difference to the provision of a reliable power service to all sections of industry and society across South Africa.” “In future, we plan to harness more Hikvision technology to fortify power transmission security in South Africa. From additional electronic surveillance systems, to the use of camera-equipped Hikvision Quad-rotor Unmanned Aerial Vehicles (drones) to protect remote sites and respond to incidents – we’re looking forward to completing more successful projects with the assistance of Hikvision’s highly capable technology solutions.”
Prison drone pioneers introduce Government to perimeter savings. The integrated security team behind a British prison’s pioneering war against drones is to share its innovative and cost-saving approach with the UK Government. Les Nicolles Prison on Guernsey became the first in the world to use a new system designed to stop drones smuggling drugs, weapons and other contraband over perimeter walls. A group of four collaborating British companies styling itself as The Perimeter Security Center of Excellence (PSCoE) installed the comprehensive perimeter protection package, including the new ‘Sky Fence’ technology. Now PSCoE (stand Z35) is exhibiting at the official UK Government global security event, Security & Policing 2018, which takes place from 6 to 8 March at Farnborough International Exhibition and Conference Center. A group of four collaborating British companies styling itself as The Perimeter Security Center of Excellence (PSCoE) installed the comprehensive perimeter protection Latest Equipment, Training And Support The unique three-day event, established over 30 years ago, is the premier platform for UK suppliers to showcase the very latest equipment, training and support, to police services, Government departments, organizations and agencies from the UK and overseas. Binns Fencing, the leading fencing contractor for the Ministry of Justice, led the Guernsey project for the conglomerate, which offers the simplicity and efficiencies of a single line of communication and management from cradle to grave of high-security perimeters. Eclipse Digital Solutions is the second of the collaborators. It created Sky Fence with fellow British company Drone Defense and offers full turnkey security design through to installation. Eclipse’s Joe Vasso said: “Our proposition is all about seamless integration to offer the most cost-effective high-end security for perimeters – whether that be along a border, around a prison, airport or the Olympic Games, or even airborne above ground, on roofs and the like. The beauty of our conglomerate is that our relationships have been formed over years and we’re all friends, so the trust is absolute and we care about each other.” Our proposition is all about seamless integration to offer the most cost-effective high-end security for perimeters" Significant Cost Savings The other two members are Harper Chalice, an intrusion detection company providing PIDs, electric fencing and RADAR detection, and ISM, which offers integrated security systems, PSIM software and intercom security systems. Together, they believe the UK Government could make significant savings by adopting its proposed model for delivering perimeter security and PIDs procurement and delivery. Their single point of contact for the complete perimeter security package provides greater opportunity for innovation, reduced complexity and no need to manage multiple contractors. PSCoE believes this could offer significant cost savings on PIDs cable installation and contract and project management costs – as with Les Nicolles, where the State of Guernsey that runs the prison saved £1.3 million. The other two members are Harper Chalice, an intrusion detection company providing PIDs, electric fencing and RADAR detection, and ISM, which offers integrated security systems Trusted Advice And Design State Deputy Mary Lowe said: “The committee decided, following discussions with key staff, that it was possible to continue housing Category B prisoners at Les Nicolles without the installation, at significant expense, of a second fence. While the second fence is advised under UK guidelines for Category B prisons, the committee is comfortable that the current technological upgrade offers security that enables Guernsey to continue housing Category B prisoners. Sending such prisoners off island to serve their sentence comes at a significant cost of approximately £50,000 per year each. The committee decided that these upgrades, which will cost £1.3m less than a second fence, offered a Guernsey-appropriate solution.” Binns MD Adam Binns said: “We have devised this model in consultation with the Government, main contractors and suppliers, to deliver best value and a greater potential to innovate with a single point of contact throughout procurement, delivery and installation. The model will give them trusted advice on design, manufacturing and installation from exclusively British companies with British products from electronic systems of CCTV, detection, video management and access control to physical security fencing, gates and hostile vehicle mitigation.” We have devised this model in consultation with the Government, main contractors and suppliers, to deliver best value and a greater potential" Security & Policing Security & Policing provides a platform for professionals from the UK and across the world to engage with the very highest level of security expertise and the latest technology. It provides the level of industry engagement needed to enable UK Government to procure and deliver its national security priorities. Major specifiers and Government specified users can obtain reference to its products from the Home Office. Normal commercial users can obtain reference to its specialist electronic perimeter security systems on the police ‘Secured by Design’ website. Harper Chalice Group’s products and systems are sold, installed and maintained worldwide via a network of specialist accredited dealers. ISM (Intergrated Security Manufacturing) ISM (Intergrated Security Manufacturing) has been at the forefront of innovation, design and manufacturing excellence in integrated security systems for almost 30 years. ISM operates from an extensive manufacturing and design facility in the United Kingdom, close to Gatwick Airport. It is the UK’s leading developer of integrated security management, intercom and cell call systems.
Round table discussion
What is a business, or an industry, but a collection of people and the results of their work? People make all the difference in the destiny of a business or industry. And the people involved in a business reflect the impact of demographic changes – and the passage of time. The security industry has been largely built by Baby Boomers, who are getting older and increasingly stepping aside to make way for younger folks. We asked this week’s Expert Panel Roundtable: Is there a “new generation” of employees and managers entering the physical security marketplace, and what will be the impact?
ISC West 2019 is in the industry’s rear-view mirror, and what a show it was! The busy three days in April offered a preview of exciting technologies and industry trends for the coming year. We asked this week’s Expert Panel Roundtable: What was the big news at ISC West 2019?
When security topics become a part of current events, it is usually in a negative light. Security generally only becomes news when it fails, sometimes in a dramatic, high profile and tragic way. However, security failures can also shed light on lessons learned and opportunities to improve. Working toward better security can translate into the purchase of more goods and equipment supplied by our market. For additional insights into the intersection of security and current events, we asked this week’s Expert Panel Roundtable: Good news or bad news? How do news reports and/or current events influence the general public’s opinion of physical security?