Black Sage now offers event-based counter drone protection (service) specifically for sports and other large-scale events. Stadiums and other open-air venues are particularly vulnerable to the growing risk posed by the proliferation of consumer drones and Black Sage is addressing this issue by offering a new service. Commercially available drones have quite literally added a new dimension to security threats not only in war zones, but also at large public gatherings here in the U.S. Operators w...
The rise to prominence of smart cities should not go unnoticed. To the untrained eye, you might not realise just how connected your city is and how it’s helping your everyday life. From crossing the road to monitoring water levels, technology is allowing cities to think quicker and act smarter. Data-Driven Decisions A recent whitepaper by ABI Research has revealed that the total global cost-saving potential offered by smart cities stands at more than $5 trillion. This shows how technolog...
Most technology companies have one goal in mind: to provide customers with high-quality, affordable products that can efficiently help streamline operations. Whether it's surveillance cameras, video management software, access control technology or any other type of security device, today's leading organizations invest in expertise in these product segments and strive to produce the highest quality solutions. To effectively fulfill this task, technology providers are always searching for emergi...
Surveillance systems can track the locations of cellphone users and spy on their calls, texts and data streams. The Washington Post has reported on such systems that are being turned against travelers around the world, according to security experts and U.S. officials. The summer season highlights the need to take extra precautions when traveling. When traveling anywhere in the world, for business or pleasure, citizens need to be aware of and alert to looming physical and cybersecurity threats....
UBM EMEA is proud to announce yet another successful IFSEC International. 2018 marked the show’s inaugural year of change following an intensive customer-led insight project, which saw demands from the security industry steer the show towards a high level integrated security summit. As evidence of its success, IFSEC International 2018 welcomed 27,353 visitors and a 10% increase in visitor density. Gerry Dunphy, Brand Director of IFSEC International commented, “It’s a privilege...
Live events at large venues like arenas, stadiums or convention halls – whether they involve wrestlers breaking chairs over each other’s heads, Axl and Slash letting bygones be bygones and reuniting Guns ‘n’ Roses, your favorite NFL team annihilating the opposition 62-3, or a convention involving anything from politics to food to Star Trek – are exciting affairs that channel the camaraderie of the crowd into a powerful collective energy. But they also are vulne...
The 2018 FIFA World Cup tournament is bringing 32 national teams and more than 400,000 foreign soccer fans from all over the world to 12 venues in 11 cities in Russia. Fans are crowding into cities including Moscow, St. Petersburg and Kazan. Given continuing global concerns about terrorism, security is top-of-mind. Protection of the World Cup games in Russia is focusing on an “integrated safety, security and service approach,” according to officials. Combining the term “security” with the terms “safety” and “service” is not an accident. An aggressive security stance is necessary, but at the end of the day, fan safety is paramount, and a service-oriented approach ensures a positive fan experience. Medical responders will be working side-by-side with police and antiterrorism personnel. Risk Management Best Practices We asked Sean T. Horner and Ben Joelson, directors of the Chertoff Group, a global advisory firm focused on best practices in security and risk management, to comment on security at FIFA World Cup 2018. Although not involved in securing the 2018 World Cup, the Chertoff Group is experienced at securing large events and enterprises using risk management, business practices and security. Integration is another important aspect of protecting the games, says Horner. The use of multiple resources, including Russian military, intelligence and law enforcement, will be closely integrated to provide the best security for the large-scale event in each of the host cities, he says. The approach will be centralized and flexible, with resource deployment guided by effective situational awareness.Primary security and emergency operations centers will be dispersed throughout each host city “There is a unified command structure at the Russian Federation level, and they will keep resources in reserve and shift them as needed to various events and venues based on any specific intelligence, in effect deploying resources where threats are greatest,” says Joelson. “There will also be some regional commands, and resources will incorporate a spectrum of police and military personnel ranging from the ‘cop on the beat’ to the Spetsnaz, the Russian ‘special forces.” Primary security and emergency operations centers will be dispersed throughout each host city, and additional forces can be shifted as necessary, he notes. Role Of Law Enforcement In Russia, the lines of separation between law enforcement and the military are not as stark as in the United States, for example, where military forces are restricted from deployment for domestic law enforcement by the Posse Comitatus Act. In Russia, there is no such restriction. A broad range of technology will play a role at the World Cup, Horner and Joelson agree. Technology will be used primarily as a force multiplier and a decision-support tool for security personnel. There are robust CCTV systems in many Russian cities, and mobile CCTV systems, such as camera towers or mobile security centers on wheels, will also be deployed. Technologies will include infrared cameras, flood lights, and ferromagnetic screening systems to scan hundreds of individuals as they walk by. In some locations, facial recognition systems will be used, tied into various intelligence, military and law enforcement databases of known bad actors. Behavior analytics will be used as a decision-support tool. In addition to security in public areas, private CCTV systems in hotels, at transportation hubs, and inside the venues themselves will be leveraged. Video analytics and detection will help personnel review live view of people who may be acting suspiciously or who leave a bag unattended. In some locations, facial recognition systems will be used, tied into various intelligence, military and law enforcement databases of known bad actors Rigorous Anti-Terrorism Measures A Fan ID card is required to enter the 2018 FIFA World Cup Tournament, even for Russian residents. The Russians have an aggressive stance against domestic terrorism, which will also help ensure the safety of the World Cup games, say Horner and Joelson. Terrorist group ISIS has promised “unprecedented violence” at the games, but they make similar threats at every major global event. Russia has been an active force disrupting ISIS in Syria, and experts suggest that losing ground geographically could lead to addition “asymmetric” terrorist attacks. However, Russia is leveraging all their intelligence resources to identify any plots and deploying their security apparatus to disrupt any planned attacks, experts say. Russia’s rigorous anti-terrorism measures include a total ban on planes and other flying devices (such as drones) around the stadiums hosting the World Cup. Private Security In addition to military, intelligence and law enforcement personnel, private security will play a have a high profile during the 2018 World Cup in Russia. Private security personnel will be on the front lines in hotels and in “fan zones.” They will operate magnetometers at entrances, perform bag checks, enforce restrictions on hand-carried items, etc. Private security will be especially important to the “guest experience” aspects of protecting the games.Private security will be especially important to the “guest experience” aspects of protecting the games Another private security function at the World Cup is executive protection of dignitaries and high-net-worth individuals who will be attending. Executive protection professionals will arrive early, conduct advanced security assessments before VIPs arrive, and secure trusted and vetted transportation (including armored cars in some cases.) VIPs will include both Russian citizens and foreign (including U.S.) dignitaries attending the games. Private security details will be out in force. Aggressive Security Approach Overeager and outspoken fans are a part of the football culture, but Russia will deploy a near-zero tolerance policy against hooliganism and riots. An overwhelming force presence will take an aggressive approach to curbing any civil disturbances, and offenders will be removed quickly by Russian security forces. Strict restrictions on the sale and consumption of alcohol will be enforced in the venue cities before and after the matches. Officials will also be cognizant of the possibility of a riot or other event being used as a distraction to draw attention from another area where a terrorist event is planned. It will be a delicate balance between deploying an aggressive security approach and preserving the fan experience. Joelson notes that freedom of speech is not as valued in Russia as in other parts of the world, so the scales will be even more tipped toward security. “The last thing they want is for things to get out of control,” says Horner. “The event is putting Russia on the world stage, and they want visitors to walk away safely after having a great time and wanting to go back in the future.”Attendees should also have good situational awareness, and keep their heads up, scanning crowds and identifying unsafe situations" Precautions for World Cup attendees Attendees to the World Cup in Russia should take some basic precautions, Horner and Joelson agree. For example, Russia requires a translated, notarised letter explaining any prescription drugs. The country has a more aggressive foreign intelligence environment, so visitors cannot depend on their data being private. Joelson recommends the usual “social media hygiene” and privacy settings. Visitors should not post information about their travel plans or locations, and it’s best to travel with a disposable mobile phone that does not contain personal information. Location tracking should be deactivated. Travelers should also beware of talking and sharing information with others, or of saying anything derogatory. “They should also have good situational awareness, and keep their heads up, scanning crowds and identifying unsafe situations,” says Joelson. “If you bring a personal electronic device, you should expect that it has been compromised,” says Horner. Text messages and email will not be private, and he suggests creating an email address used only for travel. Don’t leave drinks unattended. Travelers from the U.S. should register at the Smart Traveler Enrollment Program (STEP) operated by the U.S. State Department. “Plan before you travel and before you get to the airport,” says Horner.
Audio is often overlooked in the security and video surveillance industry. There are some intercom installations where audio plays a key role, but it’s not typically thought about when it comes to security and event management. Audio takes a back seat in many security systems because audio captured from a surveillance camera can have a different impact on the privacy of those being monitored. Audio surveillance is therefore subject to strict laws that vary from state to state. Many states require a clearly posted sign indicating audio recording is taking place in an area before a person enters. Analytic information derived from audio can be a useful tool and when implemented correctly, removes any concerns over privacy or legal compliance. Audio analytics on the edge overcomes legal challenges as it never passes audio outside of the camera Focused Responses To Events Audio analytics processed in the camera, has been a niche and specialized area for many installers and end users. This could be due to state laws governing audio recording, however, audio analytics on the edge overcomes legal challenges as it never passes audio outside of the camera Processing audio analytics in-camera provides excellent privacy since audio data is analysed internally with a set of algorithms that only compare and assess the audio content. Processing audio analytics on the edge also reduces latency compared with any system that needs to send the raw audio to an on-premises or cloud server for analysis. Audio analytics can quickly pinpoint zones that security staff should focus on, which can dramatically shorten response times to incidents. Audio-derived data also provides a secondary layer of verification that an event is taking place which can help prioritise responses from police and emergency personnel. Microphones And Algorithms Having a SoC allows a manufacturer to reserve space for specialized features, and for audio analytics, a database of reference sounds is needed for comparisonMany IP-based cameras have small microphones embedded in the housing while some have a jack for connecting external microphones to the camera. Microphones on indoor cameras work well since the housing allows for a small hole to permit sound waves to reach the microphone. Outdoor cameras that are IP66 certified against water and dust ingress will typically have less sensitivity since the microphone is not exposed. In cases like these, an outdoor microphone, strategically placed, can significantly improve outdoor analytic accuracy. There are several companies that make excellent directional microphones for outdoor use, some of which can also combat wind noise. Any high-quality external microphone should easily outperform a camera’s internal microphone in terms of analytic accuracy, so it is worth considering in areas where audio information gathering is deemed most important. Surveillance cameras with a dedicated SoC (System on Chip) have become available in recent years with in-built video and audio analytics that can detect and classify audio events and send alerts to staff and emergency for sounds such as gunshots, screams, glass breaks and explosions. Having a SoC allows a manufacturer to reserve space for specialized features. For audio analytics, a database of reference sounds is needed for comparison. The camera extracts the characteristics of the audio source collected using the camera's internal or externally connected microphone and calculates its likelihood based on the pre-defined database. If a match is found for a known sound, e.g., gunshot, explosion, glass break, or scream, an event is triggered, and the message is passed to the VMS. If a match is found for a known sound, e.g., gunshot, explosion, glass break, or scream, an event is triggered, and the message is passed to the VMS Configuring A Camera For Audio Analytics Audio DetectionThe first job of a well-configured camera or camera/mic pair is to detect sounds of interest while rejecting ancillary sounds and noise below a preset threshold. Each camera must be custom configured for its particular environment to detect audio levels which exceed a user-defined level. Since audio levels are typically greater in abnormal situations, any audio levels exceeding the baseline set levels are detected as being a potential security event. Operators can be notified of any abnormal situations via event signals allowing the operator to take suitable measures. Finding a baseline of background noise and setting an appropriate threshold level is the first step. Noise ReductionA simple threshold level may not be adequate enough to reduce false alarms depending on the environment where a camera or microphone is installed. Noise reduction is a feature on cameras that can reduce background noise greater than 55dB-65dB for increased detection accuracy. Installers should be able to enable or disable the noise reduction function and view the results to validate the optimum configuration during setup. With noise reduction enabled, the system analyzes the attenuated audio source. As such, the audio source classification performance may be hindered or generate errors, so it is important to use noise reduction technology sparingly. Audio Source ClassificationIt’s important to supply the analytic algorithm with a good audio level and a high signal-to-noise ratio to reduce the chance of generating false alarms under normal circumstances. Installers should experiment with ideal placement for both video as well as audio. While a ceiling corner might seem an ideal location for a camera, it might also cause background audio noise to be artificially amplified. Many cameras provide a graph which visualises audio source levels to allow for the intuitive checking of noise cancellation and detection levels. Messages And EventsIt’s important to choose a VMS that has correctly integrated the camera’s API (application programming interface) in order to receive comprehensive audio analytic events that include the classification ID (explosion, glass break, gunshot, scream). A standard VMS that only supports generic alarms, may not be able to resolve all of the information. More advanced VMS solutions can identify different messages from the camera. Well configured audio analytics can deliver critical information about a security event, accelerating response times and providing timely details beyond video-only surveillance. Analytics take privacy concerns out of the equation and allow installers and end users to use camera audio responsibly. Hanwha Techwin's audio source classification technology, available in its X Series cameras, features three customizable settings for category, noise cancellation and detection level for optimum performance in a variety of installation environments.
Twitter has around 350 million active users a month, all eagerly posting 280-character “tweets” about the world around them. It’s a vast amount of data from all over the globe. Security professionals have begun to appreciate the value of mining all that data for insights to help them protect people, assets and operations. One company leveraging the Twitterverse to provide real-time situational awareness to corporate security end users is Dataminr.Dataminr assembles this information flow into a useful timeline that summarizes the ongoing sequence of events Algorithms For Actionable Security Signals The New York-based technology company has developed algorithms that comb through the full Twitter dataset to provide actionable signals to security professionals around the world about security-related events as they unfold. For corporate security, early information about an unfolding event enables them to take action faster in order to secure their people, locations and business operations. “OMG! Just heard a loud bang on the quad,” a tweet might declare. Combined with location information gleaned from a cell phone, such a tweet could be the first indicator of an unfolding security incident. As an event unfolds, hundreds of such tweets are likely to be posted from the surrounding areas, collectively offering a running narrative of developing events. Dataminr assembles this information flow into a useful timeline that summarises the ongoing sequence of events. Many times, tweets are the first information available from an incident even before the arrival of first responders.Dataminr’s information is provided in a variety of platforms, from a web-based dashboard to a mobile app or notification via email “Early notification allows security professionals to be more proactive,” says Dillon Twombly, SVP, Corporate Sales at Dataminr. “We have a broad range of users across Fortune 1000 companies, and also including country security managers, security operations centers, and executive protection. "In retail, we provide information for security operations or loss prevention. Events sometimes have a potential to spin out of control, and we allow security professionals to react faster and get ahead of an event proactively.” Various Security Platforms Dataminr’s information is provided in a variety of platforms, from a web-based dashboard to a mobile app or notification via email. The system can be integrated with a company’s workflow, and the software interfaces with various security platforms, such as physical security information management (PSIM) systems. Another corporate use for Dataminr is in public relations, where social media could be a source of misinformation or rumors about an issue or event Dataminr addresses all regulatory and legal concerns, and it is GDPR-compliant. However, privacy is generally not a big concern because Twitter data is posted publicly, and Dataminr gleans information related to a specific event, not a specific Twitter user’s individual data. “Over the past couple of years, we have grown the security vertical,” says Twombly. “The market is receptive to the value of social media as a tool for users tasked with responding in a comprehensive way to a range of issues.”The company’s services are useful across the full range of vertical markets in the security industry Public Safety And Security In addition to security and public safety applications, Dataminr also provides services to financial companies and even media outlets. In fact, the 9-year-old company started in finance, where stock or currency traders were able to leverage breaking news notifications to make decisions faster. In the media vertical, Dataminr provides information to 500 newsrooms globally. Public safety and security uses have evolved, and Twombly currently spearheads the company’s work in corporate security, calling on his experience in the security world. Another corporate use for Dataminr is in public relations, where social media could be a source of misinformation or rumors about an issue or event.Customers can customize the kind of information they want to receive, and Dataminr algorithms use the full publicly available data set of Twitter Tracking Twitter posts enables a company to get ahead of an evolving story and help to shape the narrative. Twombly says Dataminr has “deep and broad relationships” with corporate customers and delivers information that can possibly be used by multiple departments in an organization. The company’s services are useful across the full range of vertical markets in the security industry, from transportation to major industrials to financial services to energy. In the education vertical, major universities are customers, as are local school districts. Customers can customize the kind of information they want to receive, and Dataminr algorithms use the full publicly available data set of Twitter. Twombly says the company’s software is constantly evolving and being fine-tuned in response to changing needs. Dataminr is a “strategic partner” of the social media giant and works closely with them on product development, he adds.
Several recent terrorist and mass violence attacks have been directed at soft targets, or relatively unprotected locations where people gather such as outside a music venue or in the unscreened passenger areas at airports. Attacks in public areas have led to the development of new security technologies aimed at protecting soft targets. One company addressing the challenges is Evolv Technology and its Edge automated high-speed personnel screening solution. The system integrates walkthrough firearm and explosive detection for high-throughput protection of events and soft targets.The Edge system has multiple detection sensitivity settings to respond to various threat scenarios Enhanced Visitor Experience The system seeks to increase security without compromising the ‘customer experience’. People simply walk through single-file – between two 5-foot-tall stanchions. One lane can screen up to 800 people per hour, and the system detects explosives or metallic objects without the need for pat-downs or wands or other invasive procedures. Any personal belongings can remain in visitors’ pockets. A single security guard is needed for each lane to verify any detected threats. “The system combines an improved security posture with a better visitor experience,” says Mike Ellenbogen, CEO of Evolv Technology. “We need to fly and have been trained to be screened at the airport, but we don’t expect to be screened going to see a ball game or a Mozart concert. Evolv recognized a need for a new way to inspect people before they enter these types of facilities. It’s a seamless system that pulls various technologies together. We want to feel safe but without having to sacrifice the quality of the experience.”Screening analytics provide data on the numbers of people screened by time of day and by result The system combines millimeter wave and magnetic field sensors, along with artificial intelligence (AI)/ machine learning and can incorporate additional data such as biometrics. Known bad actors can be identified using facial recognition. The system has multiple detection sensitivity settings to respond to various threat scenarios. Expanding Perimeter Protection A security guard provides the human touch by verifying any threats detected by the system. The locations of concealed items are displayed on a photo of the individual using a color-coded box overlay. Screening analytics provide data on the numbers of people screened by time of day and by result. Ellenbogen says the company is working to have the system adopted at entertainment venues, performing arts centers, sports centers, for air and rail transportation, and to protect high-profile government buildings. The Edge system can expand the protected perimeter to a wider area that was previously unprotected. The Edge system can expand the protected perimeter to a wider area that was previously unprotected For example, concert-goers exited the arena of an Ariana Grande concert May 22, 2017, in Manchester, U.K., and entered the surrounding area that was unscreened and unsecured. Placing a user-friendly screening system around a wider perimeter outside the concert venue might have prevented the use of an improvised explosive device in the terrorist attack.Placing a user-friendly screening system around a wider perimeter outside the concert venue might have prevented the use of an improvised explosive device in the terrorist attack Threat Mitigation With Soft Target Approach Likewise, a 2016 bombing at the Brussels Airport occurred in the departure hall outside the passenger screening areas. Securing a wider perimeter – for example, screening customers discreetly as they enter the airport building from a parking area – could have provided additional security against such an attack. Ellenbogen confirms Evolv has sold a number of systems to major European airports to screen visitors and passengers as they enter the front door. “Addressing the threat to an airport or train system is different than screening passengers; we are looking for different types of objects and different types of materials. The idea is to be able to detect threats to a venue before they get into the venue.” The soft target approach can also be applied to public buildings, such as courthouses, and used in lieu of more invasive metal detectors and x-ray machines. The portability of the Edge system enables a ‘pop-up’ approach to security – i.e., to relocate the system to address specific or changing security threats easily. The self-contained system only requires a wall plug. Labor reduction (because of faster throughput) can help offset the system costs but it’s difficult to quantify the improvement in the visitor experienceImproving Security Posture At Event Venues “It’s surprising the level of importance [venue owners] put on the visitor experience,” says Ellenbogen. “They see that their brand starts at the front door. They are eager to find alternative security solutions that come across as more inviting, less imposing, less closed down, less invasive than the solutions they have been using,” he says. “They are driven by a desire to improve the visitor experience as they improve the security posture.” He says current events, including terrorist attacks and mass shootings, drive awareness among venue owners to improve the security of soft targets. “The level of interest is high, and it spikes somewhat when there is a big headline,” Ellenbogen says. He notes that the system is more expensive than a metal detector, but about a third the cost of familiar airport body scanners. Labor reduction (because of faster throughput) can help offset the system costs, but “it’s difficult to quantify the improvement in the visitor experience,” Ellenbogen says.
Schools today are charged to provide an environment that is both safe and conducive to learning, which can be difficult considering the range of security incidents and challenges they face, including bullying, fights, graffiti, theft and more. In addition to working within often tight budgetary constraints, a main challenge is to provide the highest level of security in an aesthetically pleasing way that doesn’t make students feel as if they are in prison. While these two needs may seem mutually exclusive to some degree, that doesn’t have to be the case. School security can be achieved without building 20-foot walls or putting barbed wire around the perimeter. The key to balancing the security and learning environment can be found in the four pillars of a good school security strategy, namely people, practices, technology and physical environment. A mobile app or text notification system could be used to alert students and staff of potential problems Situational Awareness One of the most effective measures to take is to educate staff and even students to learn to be aware about their surroundings and adopt the 'If you see something, say something' mentality. In an emergency, time is of the essence, so the speed of response becomes critical. Educating staff and students to recognize potential problems and report them is a good first step. Augmenting this with mobile apps and/or texting capabilities, for example, that allow someone to send a photo to school security or law enforcement for quick assessment and evaluation, can speed response even more. A mobile app or text notification system could also be used to alert students and staff of potential problems and provide instructions on what steps to take in order to remain safe. By providing real-time situational awareness about potential responses, these types of technologies can reduce the number of armed guards or resource officers needed to patrol a school or campus, which also makes students more comfortable and able to learn in a non-prison-like environment. Security Best Practices Every school should establish a set of security policies and procedures and ensure that staff and students understand what to do if they suspect a problem or if an incident should unfold at the school. However, too often, schools may not know where to start when seeking out best practices. And once these policies are in place, there may be confusion about how to audit them to ensure people are properly educated. The NFPA has begun work on a school security standard that would address a range of issues schools face on a daily basis A number of organizations are available to aid with this process, such as the Partner Alliance for School Safety a group founded in cooperation with SIA (Security Industry Association), which provides resources and tools to help schools and security professionals evaluate and establish the best security protection for their buildings. These guidelines and best practices are designed to help schools spend their often limited funds on the right security solutions. Safe and Sound Schools provides downloadable school security toolkits, and the National Fire Protection Association (NFPA) has recently released the NFPA 3000 Active shooter response guidelines and has begun work on a school security standard that would address a range of issues schools face on a daily basis. The key takeaway is that the information is out there, and the organisations mentioned above are excellent resources for helping schools create safe, secure and learning-conducive environments. Technology In School Security The second thing that needs to be considered is how technology can be brought to bear to contribute to school security. Video surveillance with video analytics can be deployed to monitor areas at certain times of day. For example, once school starts, there shouldn’t be a lot of activity in the parking lot or in particular areas around the school. For these situations, intelligent cameras with video analytics can be used to detect activity in those areas of interest to alert school security that something may need their attention. This might be a vehicle entering a lot or driving against the normal traffic flow, which may simply be a parent arriving to pick their child up early, or it could be something worth following up on. Radar detection is ideal for perimeters, where a device can be set up unobtrusively to alert when someone enters a particular area In any case, this is something that should be brought to the attention of someone who can quickly assess the situation and determine what, if any, response is needed. Because the goal in a potentially dangerous situation is speed response times. The faster you’re able to detect something using technology, the faster you’re able to respond. Therefore, being able to identify something happening in a parking lot and alert school resource officers could provide 30 seconds or a minute head start for response, which can get the school into a lockdown situation and get first responders on site more quickly.Facial recognition systems and providing access through smartphones could help create a more welcoming and secure environment for students, staff and parents After-Hour Monitoring Solutions Monitoring buildings and facilities after hours presents a different set of challenges. For sporting events, the National Center for Spectator Sports and Security (NCS4) at the University of Southern Mississippi provides best practice guidance for sporting facilities and events not only just for universities but even including those at high schools. It’s been shown that using lighting at night can deter crime. However, it can be expensive to keep a building and grounds illuminated all night, every night. To mitigate these concerns and potential costs, there are video cameras available with extreme low-light capability that allows them to see in near-dark or in some cases complete darkness. This allows a school to save money by turning lights off while achieving a level of surveillance performance similar to daytime deployments. Radar Detection Another technology for effective school security, both during and after school hours, is radar detection. This is ideal for perimeters, where a device can be set up unobtrusively to alert when someone enters a particular area. Radar can be deployed with a single PTZ camera, which can track whatever has been detected to provide real-time situational awareness for a school resource officer or law enforcement to investigate to determine the potential threat, if any, related to the perimeter breach.Following the four pillars of school security can ease the process while improving the effectiveness and efficiency of securing educational facilities More often than not, schools are faced with issues that are not necessarily the worst-case scenario everyone fears, such as how to identify parents and others who are authorized to pick a child up from school early. In this instance, facial recognition systems and providing access through smartphones could help create a more welcoming and secure environment for students, staff and parents. Lighting And Landscaping In addition to technology, one of the things that can contribute to a safer school environment is environmental design. CPTED provides four basic principles, one of which is natural surveillance, which follows a 'see and be seen' philosophy. In other words, when people know they can be seen, they are less likely to commit a crime. The main points in this general principle are lighting and landscaping. For example, a school doesn’t want to block potentially vulnerable areas with landscaping, so the height and thickness of any potential landscaping elements should be carefully considered. In general, openness and visibility should be the guiding factors. Securing Physical Environment Another aspect of the physical environment is maintenance. If a window gets broken but isn’t fixed right away, that tends to invite vandalism. These are just two of the guidelines CPTED offers for creating a more secure environment that doesn’t feel like a prison. In general, finding the right mix between maintaining security and providing a welcoming, aesthetically pleasing and learning-conducive environment can seem like a difficult – if not impossible – task. Following the four pillars of school security can ease the process while improving the effectiveness and efficiency of securing educational facilities.
ESX has revealed meet and greets, live music and more as part of its ESX Central Stage programming. Beginning June 20 at 1 p.m. and continuing throughout the Expo, the Central Stage will provide free entertainment and interactive events to attendees. In the spirit of the Music City, ESX will host Kristen Merlin, country singer and finalist on NBC’s 'The Voice', for a two-hour performance, sponsored by Rapid Response Monitoring Services, on June 20 on the Central Stage. Merlin performed at last year’s event and will return to provide a fun atmosphere on the expo floor once more. The Innovation Award TechVision Challenge winners will be announced from the Central Stage on June 20 as well, following the meet and greet with Scott Stratten, President of Unmarketing and ESX Keynote Speaker. The excitement of the Central Stage is yet another way that ESX encourages quality conversations at its event Security Experience On Thursday, boxed lunches will be available at noon, followed by a meet and greet with ESX General Session Speaker and New York Times Best Selling author Don Yaeger. An interactive activity and leadership presentation with former Special Forces Officer Terry Peters will conclude the Central Stage programming at 2 p.m. The excitement of the Central Stage is yet another way that ESX encourages quality conversations at its event. The up-close and lively atmosphere is part of the passionate security experience and is a unique factor that sets ESX apart from other shows. A detailed schedule of Central Stage events can be found at esxweb.com/Schedule/Full-Schedule. All of this programming is included in the show’s free, expo-only pass. Upgraded Premium Passes are available at $299 in advance of the show.
Invictus, the latest ruggedised PTZ camera from UK’s CCTV manufacturer 360 Vision Technology, has been installed against a tight deadline to cover a major public event in a north London Borough. Specified for installation by DSSL Group, the new high-performance 360 Vision Technology Invictus cameras were installed in record time, to complete the upgrade of the London Borough’s Public Safety camera system in time to ensure the safe passage of a major public event - as well as to play a continuing role in the borough’s mix of public safety measures. Talking about the new town centre installation, Aaron Stephens, Director at DSSL Group commented: “From the initial decision to specify Invictus cameras for the borough’s High Street and surrounding areas, all 22 Invictus units in the first phase were delivered, installed and commissioned within four weeks.” Invictus uses an upright mount to provide unhindered 360-degree coverage" Superb Operational Results “We like the authoritative appearance of the new Invictus camera, similar in style to 360 Vision’s Predator camera, but unlike imported speed domes that look less public safety and more commercial, Invictus looks very much the part in the town centre streets. Versus the use of domes on swan necks that inherently introduce a visual blind spot, Invictus uses an upright mount to provide unhindered 360-degree coverage. In addition and again unlike a dome camera, Invictus can look both up and down.” “As highlighted in the Proof of Concept trial, the cameras’ excellent depth of autofocus is quite superb, with crystal clear focus across the entire image frame. This performance attribute is great for post event retrieval of recorded footage, where it will be used to assist the local authority in maximising their incident analysis and prosecutional evidence. It was also great to work with a respected UK manufacturer who provided on the ground technical support to help ensure the smooth delivery of this local authority project. From the superb operational results, we’d recommend Invictus to any other local authorities looking to upgrade their systems to the latest HD camera technology.” Color At Night Discussing the integration of cameras to the system’s new Genetec Video management software platform, DSSL Group’s commissioning engineer, Jordon Stephens, commented: “Adding the Invictus cameras as an ONVIF 2.4 Profile S compliant device to the Genetec Security Control Centre was extremely simple. In my experience, this process isn’t always straight forward, so the Invictus gets 10 out of 10 for easy ONVIF setup!” Jordon went on to explain that: “The cameras’ pre-set factory default night-time settings are ideal for effective color video at night. Invictus copes incredibly well with the town centre’s mix of lighting conditions and shadow areas, providing excellent ‘color at night’ imaging - whereas in the same locations, other existing HD cameras on the system had switched to monochrome.” DSSL Group’s attention to detail is phenomenal; they clearly take great pride in their workmanship" Help The Heroes Commenting on the installation, Adrian Kirk, Director at 360 Vision Technology enthused: “We are proud that the new Invictus ruggedized PTZ camera was selected for such an important town centre project and especially as the cameras were commissioned in time to provide security and safety surveillance coverage for the major public event. Manufacturing CCTV cameras in the UK since 2002, and this installation marks the introduction of 360 Vision’s next generation ultra-low light imaging technology - featuring incredibly detailed night-time HD quality colour images.” "In addition, we couldn't have asked for a better installation to showcase Invictus. DSSL Group’s attention to detail is phenomenal; they clearly take great pride in their workmanship. From the way they have contained the cable, through to the layout, neatness and set-up of system equipment, including the column equipment cabinets, the engineering team at DSSL Group really deserve great credit for their professionalism.” “Celebrating the great men and women of the British Armed Forces, for each Invictus camera sold and including those installed in this installation, 360 Vision Technology is donating a contribution to the Help the Heroes charity.”
HID Global, global trusted identity solutions provider has announced that it has been appointed the ‘official ticket maker’ for the 2018 FIFA World Cup, the largest and most important sports event in the world. HID Global will deliver more than 3 million secure RFID tickets for the 64 matches of the 2018 World Cup, which will be held in 11 host cities of the Russian Federation from 14 June to 15 July 2018. The 2018 FIFA World Cup ticket is a smart ticket containing a Radio Frequency Identification (RFID) inlay and manufactured with special security papers The 2018 FIFA World Cup ticket is a smart ticket containing a Radio Frequency Identification (RFID) inlay and manufactured with special security papers and integrates several security features designed to prevent counterfeiting and forgery. Data that is stored in a ticket’s RFID chip is encrypted and digitally signed. Radio Frequency Identification (RFID) Tickets “HID Global is providing FIFA with a formidable defense against ticket fraud and simplifying the process of a fan’s picking a ticket and using it to tap and go into the stadium,” said Stefan Widing, President and CEO of HID Global. “We’re confident that this RFID solution, along with the other advanced ticket security features, will give FIFA and attendees an extra level of security and a better overall FIFA World Cup experience.” Illicit ticket sales are a major concern for FIFA World Cup events, where tickets are always in very high demand. In a recent press release, FIFA reminded prospective tournament attendees that “FIFA regards the illicit sale and distribution of tickets as a serious issue and in cooperation with local authorities, including consumer protection agencies in numerous countries, strives to identify and curb unauthorized ticket sales.” FIFA cautions soccer fans that tickets obtained from any other source than the official FIFA.com/tickets website will be automatically canceled once identified, barring the holder access to the stadium or to any refund or other compensation. RFID differs from traditional barcoded tickets, which can more easily be counterfeited RFID Technology helps Curb Ticket Fraud RFID differs from traditional barcoded tickets, which can more easily be counterfeited. RFID transmits the unique identity of a ticket and ticket holder via radio waves. Unlike barcode readers, RFID scanners do not need a line of sight with the RFID chips. This means attendees can simply tap their tickets to a reader to validate them and gain access to an event, speeding up admissions dramatically in high-volume events such as World Cup matches. As part of the project, HID Global has also provided pre-personalisation, fulfillment, consignment and delivery services for the secure tickets, in addition to the development of middleware and a key management system dedicated to the event cycle, including the libraries for the access control device key management. HID’s ticketing solution represents a new way to provide secure tickets at an event and play “goalkeeper” against fraud.
Major events require a major security operation, and the recent Royal Wedding was one of the biggest operations in recent times. Security was heightened due to the importance of the occasion due to the potential threat of terror to such a major event. There was a drone no-fly zone put in place, however this measure does not necessarily stop drones from entering the area. This kind of measure is put in place to ensure the safety of the attendees, and to limit the threat posed by drones, but it doesn’t prevent it. Drone License Plate Detection System How can you ensure that these measures are adhered to? Drone detection systems are becoming more prominent. DJI’s recently released Aeroscope is ground-breaking Commercial drone experts COPTRZ supplied a number of units to law enforcements agencies involved in security at the Royal Weddingtechnology. It’s a purpose-built drone detection system that allows the operator to track telemetry data from DJI aircraft in surrounding airspace within a radius of up to 20km. It’s in effect, a drone license plate detection system, as well as a data provider. Commercial drone experts COPTRZ recently supplied a number of units to law enforcements agencies and made the technology available to various agencies involved with the security at the Royal Wedding. Monitoring And Intercepting Drone Intrusion The Aeroscope will be used by the law enforcement agencies to protect high profile events. Particularly following the recent Royal Wedding’s no-fly-zone, Aeroscope is a useful tool to ensure that drones in the air near the zone are monitored and if needed are intercepted to ensure the security of the wedding attendees and the royal family alike. Steve Coulson, Managing Director and Founder of COPTRZ has commented on the deal: “We are absolutely delighted to be able to supply drone detection systems to law enforcement agencies. Particularly with big events such as the Royal Wedding and the upcoming World Cup, it’s imperative agencies take advantage of the technology available to them. It’s only a matter of time until technology like the Aeroscope become a necessity for law enforcement agencies worldwide.”
Sports fans and festival goers will enjoy greater peace of mind from vehicle as a weapon (VAAW) attacks with the arrival of a new lightweight rapid-deploy vehicle security barrier (VSB). The Rapid Defender temporary VSB was deployed in minutes to protect spectators and competitors from VAAW threat at the London Marathon and at football stadia and events the length and breadth of the country. Rosehill Security, a manufacturer of perimeter security solutions, has created the innovative hostile vehicle mitigation (HVM) barrier, made up of robust units of recycled rubber weighing just 49kg each. More than 150 people have died in 18 months of VAAW in cities from London to Manhattan and Melbourne – and just last week, Toronto Fast Deployment StadiumTM – a specialist event services supplier of traffic management, stewarding, security and training services to the events industry that protects crowds at Premier League and EFL clubs, festivals and city-wide events – is extolling its benefits. Founder, owner and MD David McAtamney says: “We want to change the face of crowd safety through HVM barriers. The Rapid Defender makes this a reality because of its speed of deployment – our teams installed 13m of the barrier in just five minutes at the London Marathon!” More than 150 people have died in 18 months of VAAW in cities from London to Manhattan and Melbourne – and just last week, Toronto. Rosehill Security has designed the Rapid Defender specifically to provide protection for crowds of people from such attacks. Integration For Enhanced Security Sales manager Dalton Marshall says: “It is surface-mounted with no foundations and weighs less than a third of comparable concrete barriers, so can be deployed in minutes almost anywhere, from the streets surrounding stadia to uneven festival sites.” The Perimeter Security Suppliers Association has launched a new online source of help and information on HVM – the HVMHubThe 333mm-wide units are connected by 20mm diameter steel cables or rods, creating an HVM barrier of any length. Four men can manually install a barrier across the width of a road in less than five minutes with no special tools or lifting equipment. It can then be removed and reused. The Rapid Defender can be anchored or integrated with other temporary or permanent HVM systems to create a stronger physical barrier as part of a holistic HVM solution. The Perimeter Security Suppliers Association (PSSA), to which Rosehill Security belongs, has just launched a new online source of help and information on HVM – the HVMHub – in conjunction with the Home Office’s Joint Security and Resilience Centre.
Delta Scientific, manufacturer of counter-terrorist vehicle control systems used in the United States and internationally, has announced that Delta's innovative MP5000 portable barrier systems were selected to protect people attending the 2018 Commonwealth Games. The Commonwealth Games held from 4-15 April on the Gold Coast, Queensland, Australia, included 4,400 athletes from 70 Commonwealth nations throughout the world, competing in 19 championship sports. It was the largest sporting event in Australia since the 2000 Sydney Olympic Games. Organizers required a vehicle access system that could be rapidly deployed and would create secure vehicle check points that carried crash-certification. It was important for the Games' operations that access for emergency and authorized vehicles was maintained through the duration of the event" Hostile Vehicle Mitigation Security focus had begun years prior to the games. The focus went beyond hostile vehicle mitigation (HVM) measures to include various other identified security risks. Perimeter security measures were aligned with the recently implemented Australia and New Zealand Counter Terrorism Committee (ANZCTC) strategy for the protection of places of mass gatherings. A core element of this strategy was the effective and practical implementation of HVM measures at key locations. As the Australian partner of Delta Scientific, Knight Brothers Pty Ltd secured the contract for the vehicle barrier systems in late 2017 and liaised closely with organizers to ensure that specific security measures could be achieved through implementing Delta's unique barrier systems. "Barriers protected major event venues including the main games stadium, Gold Coast Convention Centre, the Athletes Village and critical street closures throughout the Gold Coast area," reports Matthew Knight, director of Knight Brothers. "It was important for the Games' operations that access for emergency and authorized vehicles was maintained through the duration of the event.” Delta MP5000 Portable Barriers "The primary use of the 20-foot (6m) Delta portable barriers was in public areas where ground fixation or in-situ HVM measures were not practical or achievable," Matthew Knight adds. "Barriers were deployed in a variety of configurations in order to meet security and access needs. This included direct access points as well as heightened temporary security check points with stringent vehicle inspections undertaken by Australian Defense Force personnel. Secure access points at other locations were operated by contracted security personnel." Knight Brothers worked closely with Delta Scientific to adapt certain elements of the barrier systems to meet the needs of the Commonwealth Games Delta's MP5000 portable barricades can be installed in 15 minutes or less to protect streets, entrances or wide expanses such as access to pedestrian areas. They protect people and critical infrastructures at public events and places of mass gathering, such as the Commonwealth Games. These mobile deployable vehicle crash barriers carry a recognized K8 rating (M40 ASTM rating). They lower to let vehicles through but, when raised, they will stop a 6800 kg vehicle traveling 64 km/h. At the Games, stand-alone battery operated hydraulic systems with supplementary solar power charging and remote-control operation activated the barriers and allowed a high rate of vehicle throughput in meeting specific operational requirements. Knight Brothers worked closely with Delta Scientific to adapt certain elements of the barrier systems to meet the needs of the Commonwealth Games. This included the ability to externally power the system through Australian compliant methods such as mains power or solar power arrays. Barrier Deployment "Training of barrier deployment and operation were conducted directly to Commonwealth Games security staff during barrier delivery and commissioning. This ensured seamless integration of the systems across the various deployment locations," reports Daniel Knight, director of Knight Brothers. "We were very proud to be a part of this prestigious sporting event and to provide the first known deployment of portable active vehicle barriers systems on Australian soil. With the continued support of industry leading Delta Scientific, we look forward to expanding our offering to Australian event and venue organizers, to enable them to meet their ever-increasing requirements of temporary HVM measures," Daniel Knight adds.
As Philadelphia beat New England at U.S. Bank Stadium, fans were able to enjoy the spectacle safely, in part thanks to Lenel. As the host of major national and international events, U.S. Bank Stadium in Minneapolis, Minnesota counts on Lenel to provide advanced security systems that help protect fans attending some of the world’s leading sporting events and concerts. Lenel is part of UTC Climate Controls & Security, a unit of United Technologies Corp. Working in such a high-profile venue, Lenel teams are constantly adjusting systems to maintain a high-level of security. Lenel’s OnGuard security management system has been a vital hub in the $1.12 billion stadium’s comprehensive, layered security plan since the first event in July 2016. In addition to major events, which can hold 66,000 people, the stadium routinely hosts a range of other activities for area residents such as college baseball, distance running and inline skating. The Lenel team helped us create a comprehensive system that works exactly as we drew it up" Integrated Security Bill Langenstein, director of event services for U.S. Bank Stadium venue manager SMG, said OnGuard’s integration of systems helps defuse potentially dangerous situations. “I don’t know of another platform capable of integrating the number and size of disparate systems we have in this stadium,” Langenstein said. “The Lenel team helped us create a comprehensive system that works exactly as we drew it up. The result is we are more efficient and proactive.” The OnGuard system acts as the single platform integrating access control with: More than 400 surveillance cameras monitoring seating areas, concourses and exterior perimeters Visitor management systems checking identifies at delivery gates Video intercoms protecting doors on high-value rooms More than 250 intrusion system alarm points protecting retail shops and ticket windows A real-time incident management system safeguarding attendees and staff Incidents such as an altercation in the stands or a door improperly left open generates a real-time alert for the security team"Pre-Defined Alerts Alex Housten, Vice President and General Manager of Fire & Security Products – Americas, said the incident management integration was critical as it provides stadium security with pre-defined alerts from all systems. Alerts are received in the command centers or on smartphones or tablets carried by patrolling guards. “Incidents such as an altercation in the stands or a door improperly left open generates a real-time alert for the security team,” Housten said. “The OnGuard system helps guards take immediate action. And with the entry of a few keywords, other types of events can be added to the alert list.” Secure Viewing Experience Housten credited the Lenel Custom Solutions Group with seamlessly integrating the incident management system with the OnGuard platform. The group designs, develops and delivers software solutions to create custom solutions often by automating third-party integrations. Langenstein said it’s vital that his team be able to perform their duties at the highest standard as many stadium events draw tens of thousands of fans and millions more television viewers. “We strive to execute our jobs flawlessly,” he said. “It helps to be on the cutting edge of technology. With the Lenel integration, we know we’ll be ready to provide a memorable and secure experience no matter what type of event guests attend at U.S. Bank Stadium.”