Metrasens, a provider of advanced ferromagnetic detection technologies, announced that it will be unveiling the next generation of its mass casualty threat detection solution, Proscreen 900 Plus, at ISC West 2019 in Las Vegas. The new solution bolsters Metrasens’ impressive ferromagnetic screening product line and provides a higher level of security for stadiums, arenas, event venues, hotels, campuses and other areas where security is paramount. Proscreen 900 Plus demonstrates Metrasens&r...
Shot Tracer, the innovator in high-performance, affordably-priced gunshot detection solutions, will be launching a new reseller recruitment program at ISC West 2019 (booth #1092) with a highly attractive on-boarding proposition for qualified dealers. Qualifying resellers can receive a Gunshot Simulator Kit valued at $1,000 when they commit to becoming a Shot Tracer dealer. Shot Tracer’s Eagle Gunshot Detection System is so advanced, yet it’s simple. It easily integrates with...
SightLogix, the technology pioneer for smart thermal camera systems, announces that Charlie Platipodis, a security industry veteran with over 30 years of executive sales leadership, has joined the company as vice president of sales and marketing. Charlie offered several factors that explained his rationale for joining SightLogix. “I was immediately struck by the company’s passion for building products on a foundation of great detection and high performance. Securing outdoors has alw...
FIREX International, alongside the co-located IFSEC International, Safety & Health Expo and Facilities Show, has announced that the Protection & Management series of events will be moving to a new dateline of 19-21 May for the 2020 edition at ExCeL, London. FIREX International 2019 Dates Unchanged Gerry Dunphy, Exhibition Director, FIREX, explains: “Major business decisions are made at FIREX every year, and the event has been in huge growth in its home in London, as we anti...
According to the reports of not-for-profit organization Gun Violence Archive, the year 2018 has seen 323 mass shooting incidents as of November 28 in the United States. This number is 346 for the year 2017 and 382 for 2016 (more statistics are available here), with “mass shooting” defined as cases where four or more people are shot or killed in the same time period and location. While definitions of mass shooting vary with organizations in the US, the count of over 300 incidents per...
MedixSafe, a pioneer in the access control cabinet market, is pleased to introduce its new GS1 Gun Safe. Initially custom-built to accommodate a request from a police department looking to secure firearms, the GS1 electronically controlled cabinet is an access control solution that law enforcement, airport security staff and private gun owners alike can count on to restrict access to their firearms. Easy to manage from any computer, the MedixSafe GS1 is equipped with a stand-alone networkable T...
Evolv Technology, creator of the Evolv EdgeTM people screening system that detects weapons and bombs, today announced the addition of Alan Cohen and David Orfao of General Catalyst to its Board of Directors. Both have deep experience scaling sales, marketing and distribution, ultimately building organizations that have created new multi-billion-dollar disruptive companies. Most recently, Cohen was a Board Member and Chief Commercial Officer at Illumio. A long-time enterprise tech veteran, his prior two companies, Airespace (acquired by Cisco for $450 million) and Nicira (acquired by VMware for $1.26 billion), were the market leaders in software-driven, cutting-edge technologies. Experience In Organizational Scaling Allaire grew from a venture-backed start-up to a $119 million public corporation trading Prior to Airespace, Cohen held executive roles at Cisco and IBM. He is well known for his experience in marketing and organizational scaling in several industries including networking, security, Software-as-a-Service (SaaS), and enterprise software. Cohen also serves as an advisor at Cohesity, Mist, and Netskope. Before co-founding General Catalyst, Orfao led Allaire Corporation from 1997 to 2000 as president, CEO and member of the Board of Directors. During his tenure, Allaire grew from a venture-backed start-up to a $119 million public corporation trading on the NASDAQ. Successfully Completing IPOs On The NASDAQ The company pioneered the internet application server market before merging with Macromedia. Prior to Allaire, Orfao held executive positions at Frame Technology Corporation, Claris Corporation and SQA Corporation, successfully completing Initial Public Offerings on the NASDAQ with Frame Technology and SQA Corporation. Orfao sits on the Board of Directors for several General Catalyst-backed companies including Circle, Envoy, OG Systems and RStudio. Their extensive experience scaling and transforming businesses will be invaluable" “We welcome Alan and David to the board – their extensive experience scaling and transforming businesses will be invaluable as we expand beyond the initial markets we have developed in 2018,” said Mike Ellenbogen, CEO at Evolv Technology. “These additions and the rest of our board and team of advisors share the same passion for applying technology to help solve important challenges. With their support and influence, we are well-equipped to extend our reach.” From battle-hardened security personnel, to former CIA and FBI operatives, Evolv’s list of advisors and board members includes the following experts that are helping improve the people screening experience with technology to keep people safe from mass shooting and mass casualty events. Advisors: David Cohen, one of the world’s leading authorities on intelligence analysis and operations from the CIA and NYPD. Juliette Kayyem, who has spent over 15 years working to make our nation more secure as Massachusetts’ Homeland Security Chief and Assistant Secretary at the U.S. Department of Homeland Security (DHS). John Pistole, former Transportation Security Administration (TSA) Administrator who helped transform the organization from a one-size fits all agency, to a risk-based, intelligence-driven agency. Board Members: Mark Sullivan, a federal law enforcement agent for nearly 35 years and former Director of the U.S. Secret Service. Bilal Zuberi, a partner at Lux Capital and former entrepreneur focused on backing entrepreneurs who imagine and build the world they want to live in. Mike Ellenbogen, co-founder and CEO of Evolv Technology focused on applying advanced technology to help make our world a safer place. Evolv Edge is used by a variety of venues including Oakland International Airport, a top NFL sports stadium, performing arts venues in New York City, iconic tourist attractions and airports across the U.S. and Europe.
Evolv Technology announced Evolv Edge, its people screening system that detects weapons and bombs, has achieved the U.S. Department of Homeland Security (DHS) SAFETY Act Designation. Following a rigorous application and due diligence process by DHS, the Evolv Edge is now a Qualified Anti-Terrorism Technology (QATT). As part of the Homeland Security Act of 2002, Congress enacted the Support Anti-Terrorism by Fostering Effective Technologies Act (SAFETY Act) to provide incentives for the development and deployment of anti-terrorism technologies. The purpose of the Act is to ensure that the threat of liability does not deter potential manufacturers or sellers of effective anti-terrorism technologies from developing and commercializing technologies that could save lives. The process to obtain the SAFETY Act Designation involves extensive review of the product, its use and experience – including a review of test results; operational, manufacturing and quality assurance practices and effectiveness; and feedback from customers. Security teams look for technology, such as the Evolv Edge, that is validated by the SAFETY Act to provide peace of mind" Preventing Physical Security Threats “The SAFETY Act Designation mitigates the impact of terrorism-related lawsuits, allowing our customers to focus on what’s most important: providing a seamless experience for their visitors and employees that help keep them safe,” said Mike Ellenbogen, CEO at Evolv Technology. “This Designation provides further validation and reassurance for Evolv Edge customers that the technology can be used effectively for its intended purpose of detecting and preventing physical security threats – ultimately helping people feel safer in places they visit.” “Venues like sports stadiums need to employ a comprehensive, multi-layered plan to ensure the safety and security of their fans, players and staff,” said Mark Sullivan, a member of the Evolv Technology Board of Directors and former director of the United States Secret Service. “Part of this effort includes carefully evaluating security technology to help protect against the kinds of threats we’re increasingly seeing in our world today. Security teams look for technology, such as the Evolv Edge, that is validated by the SAFETY Act to provide peace of mind that their technologies are working as they should, enabling them to be proactive before an event happens, and provide the safest visitor experience possible.” Hassle-Free People Screening Evolv Edge takes the hassle out of people screening by consistently scanning for bombs and weapons Evolv Edge takes the hassle out of people screening by consistently scanning for bombs and weapons without the need to empty pockets. The result is a positive experience for both employees and visitors. The systems have screened millions of people at many different types of venues globally including performing arts venues, sports stadiums, transportation hubs and government institutions. For example, Oakland International Airport (OAK) installed the Evolv Edge earlier this year to enhance its employee screening program; and an iconic tourist attraction with peak traffic of 13,000 visitors per day is using Evolv Edge for daily visitor screening. Evolv Edge also recently completed operational testing and evaluation by Safe Skies and was successfully tested by TNO, an internationally recognized detection and testing facility, among other certifications and awards.
Philip Halpin, Senior Vice President & Head of Global Security for Brown Brothers Harriman, and James A. Gagliano, Retired FBI Supervisory Special Agent, CNN Law Enforcement Analyst, and Adjunct Assistant Professor, headline ISC East’s Keynote Series. ISC East, sponsored by the Security Industry Association (SIA), is proud to announce not one, but two new keynote speakers for this year’s inaugural Keynote Series. The ISC East Keynote Series features veterans of the security industry who are well-known for their widely-respected accomplishments; and who are prepared to help security and public safety professionals gain new perspectives to arm them with the information they need to lead the security industry into the future. Security Management & Analysis Halpin plans to discuss how technology is poised to disrupt the physical security industryFeatured in the Day One Keynote on November 14th titled “Friend or Foe? Technology Disruption and the Physical Security Industry,” Philip Halpin, Senior Vice President & Head of Global Security for one of the country’s oldest and largest privately held financial firms Brown Brothers Harriman, will speak on how he deals with the demands on security and people management, while riding the wave of technology disruption. Halpin also plans to discuss how technology has changed how we work and live, and how it’s clearly poised to disrupt the physical security industry. Day Two’s Keynote Series session on November 15th will highlight James A. Gagliano, a Retired FBI Supervisory Special Agent, CNN Law Enforcement Analyst, and Adjunct Assistant Professor at St. John’s University. Gagliano’s session, titled “Twenty-First Century Best Practices: Reporting from the Front Lines on How Law Enforcement and the Security Industry are Confronting Emerging Threats, ” will discuss some of the 21st Century changes in law enforcement and security postures, as well as address recent responses to contemporary challenges, such as active shooters, bombings, VIP protection, and drone applications by identifying and breaking down an ever-evolving threat matrix. Security Education “ISC East is honored to have Philip Halpin and James Gagliano as Keynote Speakers for our 2018 event. Their extensive experience managing real-world security and safety issues will be very valuable for our audience at the Show. The ISC East Keynote Series spans from corporate and private sector security to law enforcement and public safety, reflecting essential content in line with our ISC Security Events theme of Comprehensive Security for a Safer, Connected World,” said Will Wise, Group Vice President, Security Portfolio at Reed Exhibitions. The SIA Education@ISC East Program helps security professionals learn from experts and take their security to the next levelIn addition to the Keynote Series, ISC East features SIA Education@ISC, an inspiring free education program composed of over 25 sessions that provide critical information on the newest and most relevant technologies in the industry. Brought to you by SIA, the SIA Education@ISC East Program delivers all-new content on the most current business trends, technologies and latest developments to help security professionals learn from experts, keep up-to-date and take their security to the next level. Public Safety & Security “The security industry attends ISC East not only for the diversity of technology solutions on the Show Floor, but for the practical education and thought-provoking keynotes for which the event has become known for,” said Don Erickson, CEO of the Security Industry Association. “Keynote speakers like Philip Halpin and James Gagliano combined with more than two dozen compelling SIA Education@ISC sessions, create an exceptional content program for ISC East 2018.” Taking place November 14-15, 2018 at the Javits Center, ISC East is Northeast’s largest security trade show where over 7,000 security and public safety professionals convene in New York each year to meet experts from over 250 leading security brands through exhibits, education, networking events, and more. New this year, ISC East will be co-located with Unmanned Security Expo and Infosecurity North America, creating a fully comprehensive event for the security industry in New York City.
ShotSpotter, Inc, the provider of gunshot detection solutions that help law enforcement officials identify, locate and deter gun violence, announces that Verizon Communications Inc. has expanded its partnership to include reselling ShotSpotter Flex, the company’s flagship gunshot detection solution, as a stand-alone offering to its customers. ShotSpotter, used by more than 90 cities to help fight gun crime, expects to benefit from the scale and distribution Verizon offers. Longstanding Relationships “We believe adding the leadership, reach and influence of Verizon as a ShotSpotter reseller will be a force multiplier for our business, allowing us to access and serve more cities across the country,” said Ralph Clark, President and CEO of ShotSpotter. “Verizon’s large and experienced sales teams have longstanding relationships with many municipalities, so it’s a natural fit.” We expect the addition of ShotSpotter Flex within our Smart Communities suite of solutions, including public safety and traffic management “We expect the addition of ShotSpotter Flex within our Smart Communities suite of solutions, including public safety and traffic management, will be a clear value-add for cities, and we are excited to include this offering to our customers,” said Mrinalini Ingram, VP of Smart Communities for Verizon. Improve Response Times Earlier this year, ShotSpotter announced an agreement with Verizon to bring the ShotSpotter solution to cities across the country by leveraging Verizon’s Light Sensory Network, an IoT platform deployed on street lights. ShotSpotter Flex helps law enforcement agencies by quickly directing police to the location of gunfire incidents. The SaaS-based system sends alerts within 60 seconds of gunshot detection to dispatch centers and to patrol officers on their mobile computers and smartphones. The alerts improve response times to crime scenes to better aid victims and identify witnesses, as well as help police locate key evidence to identify and prosecute suspects.
Senstar is pleased to announce the FiberPatrol FP1150, the newest addition to its fiber optic perimeter intrusion detection line. The dual-channel FP1150 accurately detects and locates intrusion attempts for up to 10 km (6.2 mi) or 5 km (3.1 mi) per side in a platform that is more compact, more highly integrated, and more rugged than previous generations. Perimeter Intrusion Detection The FP1150 enhances the market-leading capabilities of the Senstar’s FiberPatrol line by extending the operational temperature range to 50°C (122°F), making the system more robust by using solid-state disk drives, and integrating previously-external optical modules – all while shrinking the system into a single 4U rack-mount enclosure and adding lower-cost options for shorter perimeters. The FiberPatrol FP1150 delivers all the core features and benefits of Senstar’s fiber optic technology while broadening the range of applicability" “The FiberPatrol FP1150 delivers all the core features and benefits of Senstar’s fiber optic technology while broadening the range of applicability,” said Product Manager Stewart Dewar. “With its new features and price options starting at distances as low as 1 km (3,280 ft), the FP1150 enables end users and integrators to standardize on FiberPatrol for use on shorter perimeters than ever before.” Fiber Optic Technology Senstar’s fiber optic technology features low nuisance alarm rates, distinguishes between real threats and environmental disturbances, provides true detection of simultaneous events, offers cut immune configuration options, requires no power or data infrastructure in the field, is EMI and lightning immune making it intrinsically safe for explosive atmospheres, provides software configurable detection zones, and integrates with a wide variety of SMS/PSIM platforms. Along with the FiberPatrol FP1150, Senstar’s FiberPatrol line includes the FiberPatrol FP1100X for long range fence-mounted applications, the FiberPatrol FP6100X for buried intrusion detection applications, and the FiberPatrol FP6100X TPI detection system for buried pipelines.
Kogniz, a California-based technology company, announced the introduction of the company’s first product, AICam. The technology offers businesses fully artificial intelligence surveillance cameras that identifies people and threats in real-time, using video-based facial recognition and object detection. “In business environments, surveillance requires identifying problematic people and situations in real time, something humans aren’t good at. Kogniz leverages computer vision, artificial intelligence, and machine learning to identify people and threats in real-time with extraordinary accuracy,” said Daniel Putterman, Co-CEO and Head of Business for Kogniz. AICam is based on the Kogniz Edge Platform, a unique combination of advanced camera processing and cloud services Kogniz Edge Platform AICam is based on the Kogniz Edge Platform, a unique combination of advanced camera processing and cloud services. This architecture allows cameras to be added on-demand without any additional hardware or infrastructure, with multiple cameras working in unison to provide cross-location people identification and recognition. “While we have seen high innovation from companies such as Nest and Ring in the consumer realm, there has been a lack of breakthrough technology and products for enterprise,” added Putterman. Key Features Include: Visual Watchlists - Kogniz instantly identifies people of concern, such as a known criminal, shoplifter or ex-employee. Using highly accurate facial recognition, Kogniz alerts the business when that person is identified. Threat Detection - Kogniz is designed to detect potential threats, immediately warning when it recognizes a weapon or dangerous object. Access Control - Kogniz can watch over a secure area such as a data center, stock room, etc., and notify users when an unauthorized person comes into view. Suspect Watch - Kogniz identifies and remembers suspicious behaviours, allowing it to track visit patterns, dwell-time and other attributes that can help to identify patterns of suspicious behavior. Smart Recording - Kogniz stores relevant video in a private and secure cloud vault that can be accessed from anywhere. Kogniz products are currently in pilot programs with various law enforcement, government agencies, banks and corporations.
It amazes me how in a few short years security systems have gone from simple, dumb cameras witnessing events to intelligent eyes, ears, speech and touch solutions that boost situational awareness far beyond human capabilities. It seems the only senses missing from the equation now are smell and taste. And who knows, someone might be working on those in a lab somewhere right now. But what’s really fascinating to me is how the Internet of Things (IoT) has opened a world of possibilities for transforming security technology into something new yet again. With IoT we’re able to push and pull nuggets of intelligence from sources we never considered before: environmental sensors, pressure plates, door lock timers and much more. It’s helped us break through the constraining mindset that security systems are strictly single-purpose. With interconnectivity at the core, we’re starting to imagine myriad ways to apply these tools to challenges outside the realm of security. Here are just a few examples. Flood Management Assistance Network camera adds another dimension and timeliness to flood management by helping responders investigate remotely As recent hurricanes and floods have shown, water damage can be devastating to a community. That’s why some municipalities are using their city surveillance cameras in conjunction with water sensor to proactively address the problem. Water sensors collect data from multiple sources such as rain gutters, sewer systems and pump stations, in order to monitor fluctuations in water levels and water quality. If an alert triggers, having a network camera in proximity to visually verify the situation helps responders determine the best course of action. For instance, if multiple water detection sensors trigger alerts simultaneously or sequentially over a large area it’s probably due to natural runoff from recent rainfall. But without eyes on the scene, how can you be sure? Network camera adds another dimension and timeliness to flood management by helping responders investigate and identify the cause of a trigger remotely. It might be a fire hydrant spewing water, a water main break or even a chemical spill. With video streaming live to the command center, staff can remotely inspect the area, determine the cause of the trigger and decide whether remediation is required, thus avoiding the expense of dispatching an investigative crew to a non-event. Some municipalities are using their city surveillance cameras in conjunction with water sensor to proactively address the problem Environmental Control Assistance Data centers house the lifeblood of a business so it’s no wonder why companies work hard to protect them. We’re all familiar with the integration of network cameras with access control systems to visually verify who is actually using the credentials. Network camera adds another dimension and timeliness to flood management by helping responders investigate and identify the cause of a trigger remotely But there’s another aspect to protecting data centers and that’s environment control. Data centers need to maintain optimum humidity and temperature for the racks of electronics. When environmental sensors in the facility detect out-of-norm ranges technicians can remotely command a network camera to zoom in on the gauges and help them determine whether remediation might be necessary. Coupling network cameras with other sensors in the data center can provide visual confirmation of other conditions as well. For instance, every time a data rack door-open-close sensor detects an event it can trigger the camera to pan to the location and stream video to security. Some data centers employ weight sensors at the doorway to weigh personnel and equipment as they enter the room and when they exit to ensure no additional hardware is being taken out of the facility or left inside without permission. Any discrepancy would trigger the camera to zoom in for a close-up of the individual’s face and send a visual alert and ID information to security. Roadway Management And Parking Assistance Network cameras have long played a part in city-wide traffic management. Adding video analytics and integration with network sensors, makes those cameras that much smarter and versatile. They can detect cars driving in bike lanes or driving in the wrong direction and capture license plates of offenders. Their ability to detect anomalous traffic flow patterns can be integrated with car counting sensors, networked electronic road signs and traffic light systems to automatically redirect vehicles to alternate routes. They make great, intelligent parking lot attendants, too. Working in conjunction with weight sensors network cameras can count vehicles coming into and leaving a lot or garage and verify when the facility has reached capacity. License plate recognition and video analytics can be used to ascertain that a vehicle entering a reserved parking space doesn’t match the credentials and vehicle attributes in the database. With the addition of noise sensors and audio analytics, network cameras can improve roadway and parking facility safety by detecting and identifying specific sounds – breaking glass, car alarms, gun shots, and aggressive speech – and triggering a visual alert to first responders. Network cameras can improve roadway and parking facility safety by detecting and identifying specific sounds and triggering a visual alert to first responders Shopper Experience Assistance In the early days of online shopping, e-tailers designed their sites to replicate the in-store customer experience. In an ironic turn of events, today brick-and-mortar stores are trying to mirror the online shopping experience. To do so, they’re turning their security systems into adjunct sales assistance. With network video and audio system automation they can recognize and acknowledge loyal customers with personal greetings. Retailers are applying people counting video analytics to checkout activity to create rules-based consistency in customer service With heatmapping analytics they can measure how much time a customer spends in a specific department or observe how they walk through the aisles of the store. They can track shopping behaviors such as items looked at that made it into the cart or didn’t, or whether a customer actually checked out or left the merchandise behind. By capturing these shopping patterns and trends retailers can shape a more positive, more profitable customer shopping experience. For instance, integrating video analytics with point of sale systems and RFID sensors on merchandise tags can result in timely alerts to sales associates to recommend additional merchandise. This is a case of emulating how e-tailers let the customer know that other customers who bought X often also purchased items Y and Z. Or to avoid disappointing customers due to stock outages, retailers are linking weight sensors and video analytics to make sure their shelves are well-stocked and if not, quickly alert associates to what items need to be restocked. Capturing Business Intelligence Retailers are also using video cameras to monitor checkout queues and trigger automated announcements over the public-address system, closed system such as smartphones or other wireless communications devices that checkers are needed rather wait for a person to call for backup. IoT laid the groundwork for network security solutions to seamlessly integrate with other IP-based technologies, sensors and programs They’re applying people counting video analytics to checkout activity to create rules-based consistency in customer service. While retailers will always use their surveillance camera for loss prevention, they’re finding that integrating traditional technology in new ways can yield even bigger returns. Linking network video surveillance, video analytics, network communications system and sensors with point-of-sale systems and customer loyalty databases, retailers are capturing the business intelligence they need to get back in the game and make brick-and-mortar a greater overall experience than online shopping. A Natural Cross-Over Technology This trend towards integration has forever changed how organizations view their investment in security technology. The intelligence and versatility of a tool that can see, verify and analyze what’s happening in real-time is spurring users to tap its cross-over potential for a host of other tasks that could benefit from more astute situational awareness – everything from manufacturing and equipment maintenance to logistics, inventory control and beyond. IoT laid the groundwork for network security solutions to seamlessly integrate with other IP-based technologies, sensors and programs. How we capitalize on that connection is only limited by our imagination.
Audio is often overlooked in the security and video surveillance industry. There are some intercom installations where audio plays a key role, but it’s not typically thought about when it comes to security and event management. Audio takes a back seat in many security systems because audio captured from a surveillance camera can have a different impact on the privacy of those being monitored. Audio surveillance is therefore subject to strict laws that vary from state to state. Many states require a clearly posted sign indicating audio recording is taking place in an area before a person enters. Analytic information derived from audio can be a useful tool and when implemented correctly, removes any concerns over privacy or legal compliance. Audio analytics on the edge overcomes legal challenges as it never passes audio outside of the camera Focused Responses To Events Audio analytics processed in the camera, has been a niche and specialized area for many installers and end users. This could be due to state laws governing audio recording, however, audio analytics on the edge overcomes legal challenges as it never passes audio outside of the camera Processing audio analytics in-camera provides excellent privacy since audio data is analysed internally with a set of algorithms that only compare and assess the audio content. Processing audio analytics on the edge also reduces latency compared with any system that needs to send the raw audio to an on-premises or cloud server for analysis. Audio analytics can quickly pinpoint zones that security staff should focus on, which can dramatically shorten response times to incidents. Audio-derived data also provides a secondary layer of verification that an event is taking place which can help prioritise responses from police and emergency personnel. Microphones And Algorithms Having a SoC allows a manufacturer to reserve space for specialized features, and for audio analytics, a database of reference sounds is needed for comparisonMany IP-based cameras have small microphones embedded in the housing while some have a jack for connecting external microphones to the camera. Microphones on indoor cameras work well since the housing allows for a small hole to permit sound waves to reach the microphone. Outdoor cameras that are IP66 certified against water and dust ingress will typically have less sensitivity since the microphone is not exposed. In cases like these, an outdoor microphone, strategically placed, can significantly improve outdoor analytic accuracy. There are several companies that make excellent directional microphones for outdoor use, some of which can also combat wind noise. Any high-quality external microphone should easily outperform a camera’s internal microphone in terms of analytic accuracy, so it is worth considering in areas where audio information gathering is deemed most important. Surveillance cameras with a dedicated SoC (System on Chip) have become available in recent years with in-built video and audio analytics that can detect and classify audio events and send alerts to staff and emergency for sounds such as gunshots, screams, glass breaks and explosions. Having a SoC allows a manufacturer to reserve space for specialized features. For audio analytics, a database of reference sounds is needed for comparison. The camera extracts the characteristics of the audio source collected using the camera's internal or externally connected microphone and calculates its likelihood based on the pre-defined database. If a match is found for a known sound, e.g., gunshot, explosion, glass break, or scream, an event is triggered, and the message is passed to the VMS. If a match is found for a known sound, e.g., gunshot, explosion, glass break, or scream, an event is triggered, and the message is passed to the VMS Configuring A Camera For Audio Analytics Audio DetectionThe first job of a well-configured camera or camera/mic pair is to detect sounds of interest while rejecting ancillary sounds and noise below a preset threshold. Each camera must be custom configured for its particular environment to detect audio levels which exceed a user-defined level. Since audio levels are typically greater in abnormal situations, any audio levels exceeding the baseline set levels are detected as being a potential security event. Operators can be notified of any abnormal situations via event signals allowing the operator to take suitable measures. Finding a baseline of background noise and setting an appropriate threshold level is the first step. Noise ReductionA simple threshold level may not be adequate enough to reduce false alarms depending on the environment where a camera or microphone is installed. Noise reduction is a feature on cameras that can reduce background noise greater than 55dB-65dB for increased detection accuracy. Installers should be able to enable or disable the noise reduction function and view the results to validate the optimum configuration during setup. With noise reduction enabled, the system analyzes the attenuated audio source. As such, the audio source classification performance may be hindered or generate errors, so it is important to use noise reduction technology sparingly. Audio Source ClassificationIt’s important to supply the analytic algorithm with a good audio level and a high signal-to-noise ratio to reduce the chance of generating false alarms under normal circumstances. Installers should experiment with ideal placement for both video as well as audio. While a ceiling corner might seem an ideal location for a camera, it might also cause background audio noise to be artificially amplified. Many cameras provide a graph which visualises audio source levels to allow for the intuitive checking of noise cancellation and detection levels. Messages And EventsIt’s important to choose a VMS that has correctly integrated the camera’s API (application programming interface) in order to receive comprehensive audio analytic events that include the classification ID (explosion, glass break, gunshot, scream). A standard VMS that only supports generic alarms, may not be able to resolve all of the information. More advanced VMS solutions can identify different messages from the camera. Well configured audio analytics can deliver critical information about a security event, accelerating response times and providing timely details beyond video-only surveillance. Analytics take privacy concerns out of the equation and allow installers and end users to use camera audio responsibly. Hanwha Techwin's audio source classification technology, available in its X Series cameras, features three customizable settings for category, noise cancellation and detection level for optimum performance in a variety of installation environments.
With the recent tragic events in Florida, it’s evident that schools require more tools to help ensure their students’ safety. With that, school and municipal officials all over the country are looking for more advanced ways to combat gun violence. While there is no perfect solution for the myriad of threats and emergencies with which our schools are confronted, many have looked to technology to help improve communications before, during and after incidents. For schools across the state of Arkansas; Nassau County, New York; Snohomish County, Washington; New Castel County, Delaware; Limestone County, Alabama and scores of others, the answer was the implementation of technologies that connect school personnel directly with local police, fire and EMS, and designated individuals at the school. Communication tools have proven invaluable when a potential active shooter situation was being discussed on social media Key to these schools’ choice in technology was the recognition that while the most traumatic of threats is the active assailant, any technology investment should be just as effective in handling the more frequent day-to-day incidents. Communication Technologies For Incident Management How have technologies such as mobile panic buttons and anonymous texting helped impact school safety? Here are a few examples: In Limestone County, Alabama, 9-1-1 Director Brandon Wallace led an effort to implement technology tools across the county to help prevent and more quickly notify personnel of possible emergency situations. Communication tools have proven invaluable especially when a potential active shooter situation was being discussed on social media. Advanced Technology Integration The technology not only connected directly to emergency personnel, but also ensured that school faculty were able to communicate with one another during a potential emergency and account for students. Following the tragic shooting in Newtown, Connecticut, the school superintendent Dr. Joseph V. Erardi, Jr. chose to make communication technology a part of their new safety plan. The integration of advanced technology has given staff and teachers a greater sense of safety with not only active shooter events but also events like medical emergencies that require fast action and a quick response from public safety officials. Trainings ensure that staff and students are prepared for any type of situation and be on the same page in an emergency situation Implementing Enhanced Safety Measures What are some lessons learned from these schools that can be applied to protect students in other areas? Here are some tips for implementing more safety measures into schools: Make sure your solution has a daily use. Unfortunately, many great technologies have sat unused when emergencies struck simply because those involved weren’t familiar with them or were under extreme duress and forgot about them. Training is an obvious necessity, but finding solutions with daily use cases (such as value in medical emergencies) can have a huge impact not only on ROI but also during an incident. Evaluate past incidents. Response during past incidents can always help future plans. Whether incidents have been handled well or have room for improvement, it’s important to continue to develop incident responses. For Limestone County, Alabama, the use of technology in their response plan was first tested during a medical emergency which helped to confirm the continued use within the school. Knowing the ease of use and responsiveness of emergency response tools, the county decided to build upon the technology already in place to help thwart future incidents. Train staff on the newest measures. Snohomish County, Washington holds trainings with teachers and staff, alongside local emergency personnel to prepare for active shooter incidents. Trainings ensure that staff and students can be prepared for any type of situation and be on the same page in the event of an emergency. Especially as new technology is introduced, integrating the tools with staff first will help ensure greater adoption throughout the process. Integrate practice drills. Fire drills are a common part of the school year; why not implement practicing other scenarios which may affect your school? Not only will this help with preparedness but will also highlight any measures that might need to be adjusted. New tools can then be tested to ensure that all staff and students are comfortable in the event they will need to utilize it in the future. Expand those involved in your drills to be those who will actually be involved in an incident. All too often, drills are siloed and don’t include outside agencies. Re-Evaluating Safety Procedures Schools across the country can learn a lot from districts that have implemented and actually used new communications technologies addressing school safety, which are leading the way in how teachers and faculty are preparing to keep students safe. However, it will remain important to re-evaluate safety procedures and integrate technology to help ensure that these steps remain effective. As the tools continue to advance, the available safety measures will only continue to grow.
The last day of Global Security Exchange (GSX) in Las Vegas proved to be the calm after the storm. But a slower third day could not undermine a largely successful 2018 show for exhibitors and attendees. Sometimes the success of a trade show isn’t measured by numbers of attendees (which were reportedly down again this year). Sometimes it’s the individual successes that make an impression. “Just learning about this made the whole trip worthwhile,” said one GSX attendee at the Johnson Controls booth, referring to the company’s new PowerSeries Pro intrusion devices. It’s the kind of feedback that makes the expense of exhibiting at a big trade show worthwhile. The new PowerSeries Pro is an extension of Johnson Controls’ existing line that is expressly designed for the commercial security market. The ‘hybrid’ (wired or wireless) device offers ease of installation and full cybersecurity including 128bit AES encryption with spread spectrum for no jamming or interference. It employs frequency hopping technology first developed for the Israeli defense force. Wireless Technology For Cybersecurity PowerG eliminates the need for wires by providing ‘invisible wired technology’, a marketing term that emphasises the cybersecurity of the product PowerSeries Pro uses PowerG wireless technology and expands the portfolio of PowerG devices from residential through commercial. For use in a wired solution, the main advantage is ease of installation; terminal blocks ‘pop out’ easily and can be wired and plugged back in. Alternatively, PowerG eliminates the need for wires by providing ‘invisible wired technology’, a marketing term that emphasises the cybersecurity of the product – wireless at the same level of cybersecurity as wired. Johnson Controls addresses three big factors with the product line: cybersecurity, user control, and easy installation and dependability. It’s part of Johnson Controls’ broader approach to provide ‘one-stop shopping’, enabling an end user to control their environments, video and access, and protect their contents, according to the company. Need For More Security In K-12 Schools In addition to reaching end users, lock company Allegion sees the show as an opportunity to meet with technology partners. “It’s great to bring together a concentration of people in the industry,” said Brad Aikin, Channel Led Business Leader, Integrator Channel. “We have had good conversations with technology companies here at the show in terms of partnering, both physical access control and OEM partners. We have also had good conversations with the integrator channel.” From speaking with education end users at GSX, Aikin sees a large unmet need for security in K-12 schools, more so than in colleges and universities. “K-12 is underserved,” he says. “They need to identify their priority of needs, and now they can serve needs they couldn’t before, both layering levels of security and phasing in implementation over time. Now things can be applied and tried out without disrupting the environment.” An example is the Von Duprin RU RM (Remote Undogging and Remote Monitoring) door exit devices, which are being integrated by access control partners Sielox, IDenticard and Vanderbilt. Intelligence is added to the door exit device to enable inexpensive monitoring of secondary, previously unconnected doors. The doors can be monitored and locked or unlocked at various points in the day. Lock company Allegion sees the show as an opportunity to meet with technology partners Bridging The Gap Between IT And Physical Security One exhibitor – ADT – noticed more information technology (IT) professionals accompanying their physical security counterparts at this year’s GSX exhibition. “They come along to kill dreams on the spot,” said Morgan Harris, Senior Director Enterprise Solutions, noting the IT department’s frequent hesitancy to add untrustworthy elements to the network. ADT is looking to transform and expand its 144-year-old brand in the commercial security space and has completed eight acquisitions in the last year to accomplish the goal. Some of the acquisitions build on ADT’s expanding cybersecurity initiative, which is both a fully-functioning stand-alone business and an effort to bridge the divide between IT and physical security. ADT is positioning itself to manage enterprise risk in the broadest sense. Combining IT And Cybersecurity The Internet of Things (IoT) is fuelling convergence but are we missing out on how to talk to each other and communicate effectively between IT and security?" “The Internet of Things (IoT) is fueling convergence but are we missing out on how to talk to each other and communicate effectively between IT and security?” asked Harris. “Projects have failed because information was lost in translation.” ADT seeks to have skillsets, experience and certifications on both sides of the issue. “It enables us to be the in-between,” says Harris. “We can blend the two together and be the translator. It’s great for both sides, advocating for security counterparts and for the network simplifies deployment and processes.” Harris sees a trade-off between cybersecurity and convenience in the industry. For example, if a manufacturer says they have a simplified process and only offers firmware updates once a year, cybersecurity suffers, he said. Lack of third-party testing is another way that manufacturers sometimes trade cybersecurity for convenience, at heightened risk to integrators and end users. Training Courses For Integrators And Partners Milestone Systems is expanding its level of involvement with integrator partners, and now provides Partner Business Reviews (PBR) to assess an integrator’s activities, sales and training, pipeline and marketing initiatives. The partner reviews often uncover issues that can be easily rectified through additional training, says Megan McHugh, Milestone’s Training Marketing Manager, Learning and Performance. Milestone uses a dashboard to track each integrator’s completed training courses and can point out additional courses needed to ensure an integrator partner’s success. Milestone offers a variety of in-person, e-learning and YouTube video courses to train installing partners, systems integrators and self-integrators on best practices Milestone offers a variety of in-person, e-learning and YouTube video courses (in 12 different languages) to train installing partners, systems integrators and self-integrators on best practices. ‘Cloud Labs’ are instructor-led online classes. All courses are linked to a variety of support resources. Sometimes a simple checklist accessed on a smart phone can ensure that every aspect of an install is performed and can instill added confidence in customers. The open platform company’s new agile development cycle – releasing multiple versions of XProtect software throughout the year – creates extra challenges to keep learning initiatives up to date. Along with each new release, various existing courses are updated. The concepts of “training and certification” are being replaced at Milestone with “learning and performance,” says McHugh. Milestone is also looking to hire 170 new R&D staff and open a new center in Barcelona (in addition to current R&D centers in Copenhagen and Sofia, Bulgaria). Making Camera Installation Easy Hanwha Techwin is another company that is seeing more interest in cybersecurity, as well as concern about whether a product is supported professionally. They have doubled-up production in South Korea and added capacity in Vietnam to avoid manufacturing in China. Thinking about their integrators, Hanwha Techwin is putting more emphasis on making installation easy. Installation costs may be up to 50 percent of a job, so easier installation frees up money to buy more or better cameras. With a new design of their cameras, an electrical contractor can now install the camera base and conduit, and then the integrator can easily plug in the camera later. Camera bases are common across multiple models, so a customer could switch out a 5-megapixel for a 2-megapixel camera later on if they want to (same housing plate). ‘Skins’ allow the color of cameras to be changed to match surrounding décor. “We are changing the idea of how people approach selling a camera, and it’s a whole new idea of how to install cameras,” said Tom Cook, Senior Vice President, North American Sales, Hanwha Techwin. Hanwha cameras can include a sound classification analytic to detect sounds such as gunshots Cameras With Sound Detection Technology Hanwha offers more flexibility in the field – interchangeable parts are packed together to enable configuration on site. And there is no need to stand on a ladder to position cameras; stepper motors help with remote camera positioning. Multi-sensor cameras have modules (combining lenses and sensors) that can be switched out at installation. Hanwha Techwin cameras can also include a sound classification analytic to detect sounds such as gunshots, screams or glass breaks, especially useful in K-12 education environments. Unification and the customer journey were a key emphasis for Genetec at GSX 2018. Unification for Genetec means combining multiple functions on one platform, from one vendor and using one source code. The company approaches the market by analyzing each customer’s journey as it relates to Genetec products. A typical customer journey involves (1) a company looking for standalone systems; (2) the need to centralize systems through integration and unification; (3) increasing automation and workflow; and (4) adding intelligence for more informed decision-making. “Genetec wants to get more in-depth with customers, be more comfortable with their business, and understand their challenges,” said Derek Arcuri, Product Marketing Manager. “We want to get naked with our customers.” Machine Learning Engine For Crime Prevention In the city of Chicago, Citigraf detects patterns in crime behavior and determines where a crime is likely to occur There was a big crowd at the Genetec booth, and not because the comment was applied literally. Genetec has divided itself into multiple parts, each focused on a vertical market such as retail or transportation. The approach is to operate as a ‘federation of startups’, with each market sector accountable to fill in the gaps in the portfolio to meet the specific needs of each vertical. For example, Genetec’s Citigraf is an unsupervised machine learning engine with an algorithm to detect anomalies and trends from a large pool of data in a municipal environment. In the city of Chicago, Citigraf detects patterns in crime behavior and determines where a crime is likely to occur. The system alerts operators in a bureau or area that has a higher risk level and should beef up the number of first responders. Chicago has seen a 39 percent decrease in average response time of first responders as a result. In the retail market, Genetec leverages the security infrastructure to analyze shopping trends and provide data for merchandising and operations. “Each customer is getting a portfolio of products tailored to the industry they are in,” says Arcuri. Demonstrating IoT Devices Axis Communications displayed its range of products at GSX, demonstrating its almost total transformation from an IP camera company to a supplier of a full range of Internet of Things (IoT) devices. “Axis is broadening its portfolio to include more solutions,” said Scott Dunn, Senior Director, Business Development Systems and Solutions. “Our success is driven by continuing to innovate our portfolio. The market is continuing to grow, and Axis is continuing to expand its market share.” Eight ‘Axis Customer Experience Centers’ around the United States help Axis stay close to their integrators, customers, partners and prospects. IP addressable audio speakers from Axis can provide music as a service, and then can be interrupted for audio messages on behalf of physical security Axis has offered access control IP edge devices since 2013, and now has a new A1601 door controller being sold with partner-only software (no embedded Axis software like previous A1001 devices). In audio products, Axis has a portfolio of speakers, intercoms, and public address systems. Acquisition Of IP Door Intercom Company Enhancing the audio line was acquisition in 2016 of 2N, an IP door intercom company headquartered in Prague, Czech Republic. In North America, the 2N team is now fully part of Axis. The line emphasises simple architecture, programmability, and the ability to integrate widely. The products use Session Initiation Protocol (SIP) to integrate through the cloud or peer-to-peer. IP addressable audio speakers from Axis can provide music as a service, and then can be interrupted for audio messages on behalf of physical security. Retail, education and enterprise customers are gravitating to IP audio. An IP bridge can tie existing analog components into the IP system. For perimeter security, Axis offers a radar device to help eliminate false alarms, as well as thermal cameras.
The 2018 FIFA World Cup tournament is bringing 32 national teams and more than 400,000 foreign soccer fans from all over the world to 12 venues in 11 cities in Russia. Fans are crowding into cities including Moscow, St. Petersburg and Kazan. Given continuing global concerns about terrorism, security is top-of-mind. Protection of the World Cup games in Russia is focusing on an “integrated safety, security and service approach,” according to officials. Combining the term “security” with the terms “safety” and “service” is not an accident. An aggressive security stance is necessary, but at the end of the day, fan safety is paramount, and a service-oriented approach ensures a positive fan experience. Medical responders will be working side-by-side with police and antiterrorism personnel. Risk Management Best Practices We asked Sean T. Horner and Ben Joelson, directors of the Chertoff Group, a global advisory firm focused on best practices in security and risk management, to comment on security at FIFA World Cup 2018. Although not involved in securing the 2018 World Cup, the Chertoff Group is experienced at securing large events and enterprises using risk management, business practices and security. Integration is another important aspect of protecting the games, says Horner. The use of multiple resources, including Russian military, intelligence and law enforcement, will be closely integrated to provide the best security for the large-scale event in each of the host cities, he says. The approach will be centralized and flexible, with resource deployment guided by effective situational awareness.Primary security and emergency operations centers will be dispersed throughout each host city “There is a unified command structure at the Russian Federation level, and they will keep resources in reserve and shift them as needed to various events and venues based on any specific intelligence, in effect deploying resources where threats are greatest,” says Joelson. “There will also be some regional commands, and resources will incorporate a spectrum of police and military personnel ranging from the ‘cop on the beat’ to the Spetsnaz, the Russian ‘special forces.” Primary security and emergency operations centers will be dispersed throughout each host city, and additional forces can be shifted as necessary, he notes. Role Of Law Enforcement In Russia, the lines of separation between law enforcement and the military are not as stark as in the United States, for example, where military forces are restricted from deployment for domestic law enforcement by the Posse Comitatus Act. In Russia, there is no such restriction. A broad range of technology will play a role at the World Cup, Horner and Joelson agree. Technology will be used primarily as a force multiplier and a decision-support tool for security personnel. There are robust CCTV systems in many Russian cities, and mobile CCTV systems, such as camera towers or mobile security centers on wheels, will also be deployed. Technologies will include infrared cameras, flood lights, and ferromagnetic screening systems to scan hundreds of individuals as they walk by. In some locations, facial recognition systems will be used, tied into various intelligence, military and law enforcement databases of known bad actors. Behavior analytics will be used as a decision-support tool. In addition to security in public areas, private CCTV systems in hotels, at transportation hubs, and inside the venues themselves will be leveraged. Video analytics and detection will help personnel review live view of people who may be acting suspiciously or who leave a bag unattended. In some locations, facial recognition systems will be used, tied into various intelligence, military and law enforcement databases of known bad actors Rigorous Anti-Terrorism Measures A Fan ID card is required to enter the 2018 FIFA World Cup Tournament, even for Russian residents. The Russians have an aggressive stance against domestic terrorism, which will also help ensure the safety of the World Cup games, say Horner and Joelson. Terrorist group ISIS has promised “unprecedented violence” at the games, but they make similar threats at every major global event. Russia has been an active force disrupting ISIS in Syria, and experts suggest that losing ground geographically could lead to addition “asymmetric” terrorist attacks. However, Russia is leveraging all their intelligence resources to identify any plots and deploying their security apparatus to disrupt any planned attacks, experts say. Russia’s rigorous anti-terrorism measures include a total ban on planes and other flying devices (such as drones) around the stadiums hosting the World Cup. Private Security In addition to military, intelligence and law enforcement personnel, private security will play a have a high profile during the 2018 World Cup in Russia. Private security personnel will be on the front lines in hotels and in “fan zones.” They will operate magnetometers at entrances, perform bag checks, enforce restrictions on hand-carried items, etc. Private security will be especially important to the “guest experience” aspects of protecting the games.Private security will be especially important to the “guest experience” aspects of protecting the games Another private security function at the World Cup is executive protection of dignitaries and high-net-worth individuals who will be attending. Executive protection professionals will arrive early, conduct advanced security assessments before VIPs arrive, and secure trusted and vetted transportation (including armored cars in some cases.) VIPs will include both Russian citizens and foreign (including U.S.) dignitaries attending the games. Private security details will be out in force. Aggressive Security Approach Overeager and outspoken fans are a part of the football culture, but Russia will deploy a near-zero tolerance policy against hooliganism and riots. An overwhelming force presence will take an aggressive approach to curbing any civil disturbances, and offenders will be removed quickly by Russian security forces. Strict restrictions on the sale and consumption of alcohol will be enforced in the venue cities before and after the matches. Officials will also be cognizant of the possibility of a riot or other event being used as a distraction to draw attention from another area where a terrorist event is planned. It will be a delicate balance between deploying an aggressive security approach and preserving the fan experience. Joelson notes that freedom of speech is not as valued in Russia as in other parts of the world, so the scales will be even more tipped toward security. “The last thing they want is for things to get out of control,” says Horner. “The event is putting Russia on the world stage, and they want visitors to walk away safely after having a great time and wanting to go back in the future.”Attendees should also have good situational awareness, and keep their heads up, scanning crowds and identifying unsafe situations" Precautions for World Cup attendees Attendees to the World Cup in Russia should take some basic precautions, Horner and Joelson agree. For example, Russia requires a translated, notarised letter explaining any prescription drugs. The country has a more aggressive foreign intelligence environment, so visitors cannot depend on their data being private. Joelson recommends the usual “social media hygiene” and privacy settings. Visitors should not post information about their travel plans or locations, and it’s best to travel with a disposable mobile phone that does not contain personal information. Location tracking should be deactivated. Travelers should also beware of talking and sharing information with others, or of saying anything derogatory. “They should also have good situational awareness, and keep their heads up, scanning crowds and identifying unsafe situations,” says Joelson. “If you bring a personal electronic device, you should expect that it has been compromised,” says Horner. Text messages and email will not be private, and he suggests creating an email address used only for travel. Don’t leave drinks unattended. Travelers from the U.S. should register at the Smart Traveler Enrollment Program (STEP) operated by the U.S. State Department. “Plan before you travel and before you get to the airport,” says Horner.
Several recent terrorist and mass violence attacks have been directed at soft targets, or relatively unprotected locations where people gather such as outside a music venue or in the unscreened passenger areas at airports. Attacks in public areas have led to the development of new security technologies aimed at protecting soft targets. One company addressing the challenges is Evolv Technology and its Edge automated high-speed personnel screening solution. The system integrates walkthrough firearm and explosive detection for high-throughput protection of events and soft targets.The Edge system has multiple detection sensitivity settings to respond to various threat scenarios Enhanced Visitor Experience The system seeks to increase security without compromising the ‘customer experience’. People simply walk through single-file – between two 5-foot-tall stanchions. One lane can screen up to 800 people per hour, and the system detects explosives or metallic objects without the need for pat-downs or wands or other invasive procedures. Any personal belongings can remain in visitors’ pockets. A single security guard is needed for each lane to verify any detected threats. “The system combines an improved security posture with a better visitor experience,” says Mike Ellenbogen, CEO of Evolv Technology. “We need to fly and have been trained to be screened at the airport, but we don’t expect to be screened going to see a ball game or a Mozart concert. Evolv recognized a need for a new way to inspect people before they enter these types of facilities. It’s a seamless system that pulls various technologies together. We want to feel safe but without having to sacrifice the quality of the experience.”Screening analytics provide data on the numbers of people screened by time of day and by result The system combines millimeter wave and magnetic field sensors, along with artificial intelligence (AI)/ machine learning and can incorporate additional data such as biometrics. Known bad actors can be identified using facial recognition. The system has multiple detection sensitivity settings to respond to various threat scenarios. Expanding Perimeter Protection A security guard provides the human touch by verifying any threats detected by the system. The locations of concealed items are displayed on a photo of the individual using a color-coded box overlay. Screening analytics provide data on the numbers of people screened by time of day and by result. Ellenbogen says the company is working to have the system adopted at entertainment venues, performing arts centers, sports centers, for air and rail transportation, and to protect high-profile government buildings. The Edge system can expand the protected perimeter to a wider area that was previously unprotected. The Edge system can expand the protected perimeter to a wider area that was previously unprotected For example, concert-goers exited the arena of an Ariana Grande concert May 22, 2017, in Manchester, U.K., and entered the surrounding area that was unscreened and unsecured. Placing a user-friendly screening system around a wider perimeter outside the concert venue might have prevented the use of an improvised explosive device in the terrorist attack.Placing a user-friendly screening system around a wider perimeter outside the concert venue might have prevented the use of an improvised explosive device in the terrorist attack Threat Mitigation With Soft Target Approach Likewise, a 2016 bombing at the Brussels Airport occurred in the departure hall outside the passenger screening areas. Securing a wider perimeter – for example, screening customers discreetly as they enter the airport building from a parking area – could have provided additional security against such an attack. Ellenbogen confirms Evolv has sold a number of systems to major European airports to screen visitors and passengers as they enter the front door. “Addressing the threat to an airport or train system is different than screening passengers; we are looking for different types of objects and different types of materials. The idea is to be able to detect threats to a venue before they get into the venue.” The soft target approach can also be applied to public buildings, such as courthouses, and used in lieu of more invasive metal detectors and x-ray machines. The portability of the Edge system enables a ‘pop-up’ approach to security – i.e., to relocate the system to address specific or changing security threats easily. The self-contained system only requires a wall plug. Labor reduction (because of faster throughput) can help offset the system costs but it’s difficult to quantify the improvement in the visitor experienceImproving Security Posture At Event Venues “It’s surprising the level of importance [venue owners] put on the visitor experience,” says Ellenbogen. “They see that their brand starts at the front door. They are eager to find alternative security solutions that come across as more inviting, less imposing, less closed down, less invasive than the solutions they have been using,” he says. “They are driven by a desire to improve the visitor experience as they improve the security posture.” He says current events, including terrorist attacks and mass shootings, drive awareness among venue owners to improve the security of soft targets. “The level of interest is high, and it spikes somewhat when there is a big headline,” Ellenbogen says. He notes that the system is more expensive than a metal detector, but about a third the cost of familiar airport body scanners. Labor reduction (because of faster throughput) can help offset the system costs, but “it’s difficult to quantify the improvement in the visitor experience,” Ellenbogen says.
CNL Software, a provider of Physical Security Information Management (PSIM) software, is pleased to announce that its award-winning PSIM technology was used to support a multiagency security program for Super Bowl LIII. The company’s IPSecurityCenter PSIM solution is installed in the Atlanta Police Department’s Video Integration Center (VIC) and helps secure the city and surrounding metro area, keep the metro area’s transportation networks and systems safe, and to help law enforcement personnel make sense of the huge volume of video intelligence that is generated day-to-day and during large-scale events like Super Bowl. Provide Law Enforcement Atlanta is no stranger to hosting large-scale events, which includes a previous Super Bowl, and has invested in a multitude of surveillance, analytic, data fusion, and communications systems and technologies in recent years. The City has also established an innovative public-private partnership, known as Operation Shield, that effectively leverages the surveillance assets and infrastructure of other participating Atlanta metro area departments and agencies, including the City’s Metro Atlanta Rail and Transit Authority (MARTA) and Hartsfield Jackson International Airport, and the City’s business community, while also bridging communication gaps between and across them. IPSecurityCenter by CNL Software integrates these disparate systems in the Atlanta Police Department’s VIC to provide law enforcement IPSecurityCenter by CNL Software integrates these disparate systems in the Atlanta Police Department’s VIC to provide law enforcement and other public safety professionals with the data and video intelligence they need to effectively respond to incidents before they arrive on scene. Crowd Size Monitoring “Estimates are that nearly one million people traveled to Atlanta for Super Bowl Week. As with all major events, ensuring public safety and security is a big job and huge concern,” comments Mike Mostow, General Manager – Americas at CNL Software. “IPSecurityCenter was installed in the VIC by the Atlanta Police Department to provide the real-time situational awareness and decision support they need to ensure public safety and security during large-scale special security events like Super Bowl LIII.” IPSecurityCenter PSIM is installed in some of the largest public safety and security programs in some of the world’s largest cities. The platform enables the most intelligent integration of the widest range of disparate public safety, security, emergency management, and homeland defense system and sensor technologies, including video and video analytics, facial recognition, license plate recognition, crowd size monitoring, gunshot detection, chemical, biological, radiological/nuclear and explosives detection, geospatial mapping, and asset tracking.
Located in the Northern Italian town of La Spezia, the Biblioteca Civica Pietro Mario Beghi is a state-of-the-art public library with an extensive collection of books and media across three floors. The 1,560-square meter facility with its bright, modern interior architecture was completed in April 2017 in a historic building remodeled by the architect’s firm 5+1AA. It continues the region’s long literary tradition: The harbor town is situated on the “Golfo dei Poeti” (meaning “Poet’s Golf”), named for the many writers and poets who have lauded the coastal area throughout history. EN 54 Fire Detection And Alarm System Standard Aside from a self-service book lending station, a child reading room and a 72-seat auditorium, the Beghi library is also home to the La Spezia Institute for the History of the Resistance and the Contemporary Age. With so many valuable books and original documents under one roof, end-to-end fire protection according to the high demands of the European Union’s EN 54 fire detection and fire alarm system standard – plus demands by the local fire brigade – was a prime requisite from the start. Choosing a fire alarm and evacuation solution for the library in an open tender, the municipality of La Spezia had an open ear when local system integrator Bagnone SNC proposed a comprehensive solution: An interface between a high-end fire alarm system and evacuation system delivered by Bosch as the single provider. Convincing the officials, the Bosch system could be installed discretely without disturbing the library’s upscale interior design. Addressable Fire Panel 1200 Series The comprehensive solution enables automated alarm messages and public addresses over wall-mounted speakers After receiving the contract, Bagnone SNC installed the Addressable Fire Panel 1200 Series from Bosch interfaced via a serial connection with the Plena Voice Alarm System, supporting also multi-stage evacuation. The comprehensive solution enables automated alarm messages and public addresses over wall-mounted speakers from Bosch that match the library’s color palette. The system accurately detects fires via automatic optical fire detectors and three beam smoke detectors strategically placed across the building. Alarms can also be triggered via manual call points, while in the case of an emergency, pre-recorded messages, sounders and strobes direct building occupants to safety. As a result of the interfaced solution, the Biblioteca Civica Pietro Mario Beghi benefits from highly accurate fire detection and efficient evacuation in an aesthetically pleasing package from Bosch as the single provider. “Our expectations have been exceeded in a major way. Everything went as planned from both a technical and a management point of view,” said Claudio Canneti, Technical Public Works Manager, La Spezia Municipality.
ThruVis is used operationally in US during Christmas 2016 travel surge period and at National Security Special Events Digital Barriers plc the specialist provider of visually intelligent solutions to the global surveillance, security and safety markets, confirms today that its ThruVis public safety solution has been used successfully in the US by the Transportation Security Administration (TSA) to help protect high profile events. These operational deployments follow the award of a $1.65m contract with the TSA in September 2016 to begin the implementation of ThruVis to help protect mass transit systems and other public spaces across the US against 'soft target' terrorist attacks. ThruVis is a unique camera technology that can detect objects such as weapons and explosives concealed under clothing. The technology is mobile, rapidly deployed, and operates without compromising passenger throughput, safety or privacy. High Performance In Extreme Operational Environments ThruVis was used operationally in the US during the Christmas 2016 travel surge period and as part of security measures at specific locations during National Security Special Events (NSSE's) in early 2017. In these extreme operational environments, ThruVis performed to expectations and its use was operationally successful. End-user feedback from this period and input from TSA's own extensive testing is being used to enhance ThruVis's operational capabilities. Digital Barriers is ready to support ongoing US Government operational deployments of ThruVis to enhance overall security effectiveness. Zak Doffman, CEO of Digital Barriers, said, "The fact that ThruVis has now been deployed successfully in the US to help protect high profile events, as part of the preparation for wider deployments, is a real game changer for this unique solution. In total, more than $100m of public and private money has now been invested in developing ThruVis. For the first time, it's possible to successfully detect body-worn concealed weapons and explosives being carried into public spaces, hardening soft targets against terrorist attacks."
IPSecurityCenter PSIM allows the intelligent integration of the widest range of security CNL Software, a provider of Physical Security Information Management (PSIM) software, announced that its award-winning technology will be utilized as part of the multi-agency security program at the 2017 presidential inauguration. The company’s IPSecurityCenter PSIM solution is deployed in Washington, DC to help secure the city, keep its transportation facilities and networks operational, and the people that rely on them safe, as well as to make sense of the huge volume of data and video intelligence generated during inaugural activities. IPSecurityCenter will be used to help ensure inaugural events run smoothly. Situational Awareness Event security agencies are responsible for the safety of the public, security and law enforcement and counter terrorism activities during what may be the most dynamic threat environment in history of the U.S. “The swearing-in of a new President is a momentous occasion in our nation’s capital, and we will see huge numbers of people coming from across and beyond the U.S. to witness the inauguration. As with all major events, security is a huge concern,” comments Mike Mostow, General Manager at CNL Software Americas. “IPSecurityCenter is deployed in Washington, DC, providing real-time situational awareness and decision support to security and law enforcement personnel during large scale special security events like the inauguration. One of IPSecurityCenter’s key capabilities is allowing multi-level collaboration between and across the various safety, security, law enforcement and emergency management agencies working to protect the President and others attending inaugural activities, its spectators, and the wider public.” Incident Detection “IPSecurityCenter offers comprehensive situational awareness and intelligence to bolster security” “Aside from the threat of a major incident, there are more frequent public safety and security incidents to consider. From monitoring crowds and the accurate and early detection of incidents, to enabling rapid post event forensics, IPSecurityCenter offers comprehensive situational awareness and intelligence to bolster security. Having more digital eyes on the ground becomes a force multiplier to help identify and resolve security incidents faster and more incisively.” IPSecurityCenter PSIM is deployed in some of the largest public security programs today in global cities supporting the safety and security of citizens, visitors, commerce, and infrastructure. IPSecurityCenter PSIM allows the intelligent integration of the widest range of security and homeland defense technologies such as video surveillance and analytics, facial recognition, license plate recognition, crowd monitoring, gunshot detection, chemical, biological, radiological/nuclear and explosives detection, geospatial mapping, and asset tracking.
“Mode 5” employs highly sophisticated encryption techniques to avoid hostile signal manipulation Airbus DS Electronics and Border Security (EBS), future HENSOLDT, equips the recently ordered A330 MRTT multirole tanker aircraft of the South Korean armed forces with cryptographic technology employing the latest “Mode 5” NATO standard. Under a contract awarded by Airbus Defense and Space, the future HENSOLDT will deliver until beginning of 2018 eight cryptographic computers which will protect the MRTT’s identification systems against hostile spoofing and jamming. Identification-Friend-Foe Systems The European-manufactured and US-certified QRTK-crypto computers are the key element of the identification-friend-foe (IFF) systems of armed forces which use the automatic exchange of encrypted signals between ground stations and aircraft to distinguish friendly from hostile forces. Effective identification is necessary to avoid own or allied forces being attacked erroneously by friendly forces. Unlike the “Mode 4” standard used in western armies hitherto, “Mode 5” employs highly sophisticated encryption techniques to avoid hostile signal manipulation, thus ensuring that the identification process is absolutely reliable and secure. By 2019, “Mode 5” will be introduced in all western armies, then being a precondition of joint operations of allied forces. Ground And Naval Applications The future HENSOLDT is under contract to upgrade German, French, and UK armed forces’ IFF systems to the “Mode 5” standard. It has already delivered IFF systems – including crypto devices - to several NATO nations, for ground and naval applications. Among others, the company’s equipment is deployed on all German Navy ships as well as several UK Royal Navy ships. In Germany, the company has established the air traffic control/IFF network of the German Air Force covering an airspace of 1,700 x 1,500 kilometers. In total, HENSOLDT has more than 400 IFF systems under contract in 42 nations. In the Republic of Korea, Airbus DS EBS has already equipped Korean Air Force and Army’s Low Altitude Radars with its IFF Mode 5 Technology in cooperation with local Korean defense industries.
The NET system is capable of detecting safety situations, by using big data, to make the city safer The great explosion that happened on midnight of August 12th, 2015, in Tianjin harbor killed 165 people in total and caught everyone’s eyeball in and out of China. That tragedy lead people to think: How did it happen? How could it happen? Detecting Safety Situations Tianjin government took this painful experience as a warning for the future, and put together a NET of prevention and control to monitor and audit the compliance to safety regulation in the city. Dahua technology helped Tianjin Safety Supervision Bureau establish the Major Hazard Sources Monitoring and Production Safety Prevention & Control System. The system is capable of detecting safety situations, by using big data, to make the city safer. Preventing Chemical Accidents The application of the system greatly improved the online monitoring of the companies responsible for the production, transportation and storage of dangerous chemical products. It serves to prevent dangerous chemical accidents and ensure thorough clean-up of hidden danger in production sites by building intelligence into the security control system. Real-Time Monitoring By the beginning of 2016, 1446 sites that produce or deal with dangerous chemical had been connected to the NET, including 891 gas stations. All information from above sites is real time monitored.
Round table discussion
A big trade show, such as the upcoming ISC West, has a lot to offer for attendees. How can attendees maximize the value they get out of ISC West? For advice, we go to our Expert Panel Roundtable, all seasoned veterans of many big trade shows. Specifically, we asked the panel: How can attendees get the most out of a big trade show like ISC West?