Facial recognition systems
Rhombus Systems, an enterprise video security startup, releases Unusual Behavior Detection (UBD) to quickly notify organizations when something is wrong. Last year, Rhombus Systems released their AI-Powered R1 security camera to provide organizations cloud-management, facial recognition, people analytics, and enterprise integrations at an affordable price point. Today’s existing video surveillance systems are reactive and used only after an incident has already occurred. Rhombus is changi...
Suprema, a global leader in biometrics and ID solutions, announces that the company has entered into a commercial software license and distribution agreement with Qualcomm Technologies, Inc., a subsidiary of Qualcomm Incorporated, for the licensing of Suprema's BioSign, its under-display fingerprint recognition algorithm. Suprema has entered the smartphone segment with the Samsung Galaxy J5 in its fingerprint solution for smartphones last year. In February 2018, the company launched BioSign 3.0...
In my coverage of China Tariffs impacting the security industry over four recent articles, products on the tariff schedules routinely integrated into security solutions included burglar and fire alarm control and transmission panels, video surveillance lenses, HDTV cameras used for broadcast use cases and fiber optic media converters. The general ‘callout’ of ADP (Automatic Data Processing) devices and peripherals technically includes servers, workstations and microcomputers, all o...
Ambarella, Inc. a developer of high-resolution video processing and computer vision semiconductors, introduced the CV25 camera System-on-Chip (SoC), the latest in the CVflow family, combining advanced image processing, high-resolution video encoding and CVflow computer vision processing in a single, extremely low power design. The CV25's CVflow architecture provides the Deep Neural Network (DNN) processing required for the next generation of affordable and intelligent home monitoring, professio...
Security is among the defining topics at the Consumer Electronics Show (CES) 2019 this week in Las Vegas. More than 4,500 exhibiting companies are participating, including some 1,200 startups, highlighting the next wave of innovation in consumer electronics – and security. Twenty-four product categories at CES feature solutions to transform how consumers live, work and play. Technologies being highlighted include 5G connectivity, artificial intelligence (AI), augmented and virtual reality...
The use of facial recognition has become a highly debated topic recently, and has increasingly and misleadingly been criticized by some for being an unethical tool used to spy on the public. The reason for such criticism is however largely due to lack of information and regulation around the technology. Used proportionately and responsibly, facial recognition can and should be a force for good. It has the ability to do a lot more to increase security in the future – from street crime to...
3xLOGIC, Inc., a provider of integrated, intelligent security solutions, and a three-time Deloitte Technology Fast 500 winner, announced a number of new products and innovations, led by the company’s new Facial Recognition camera. 3xLOGIC VISIX Facial Recognition Camera A special purpose, low cost, dual lens 2MP camera for instant face detection, identification, and notification of persons of interest (POI). Using camera-based analytics and 3xLOGIC’s exclusive Facial Recognition (FR) application and mobile app, users can review captured facial images and choose persons of interest to place on a watch list within the camera.Facial Recognition can also be used be used to identify VIPs or for accurate people counting" Using 3xLOGIC’s exclusive web-based Central Management Application in multi-site mode allows POIs to be added via standard AES encryption to one or multiple cameras at sites to notify locally via server or mobile app. “Customers have been searching for a low-cost solution for instant face detection and notification of persons of interest for a long time. Our new FR camera, in conjunction with our intuitive, easy to use server, and web-based and mobile applications, brings face detection technology to any SMB user, as well as to large retailers seeking to curtail repeat offenders engaged in shoplifting, disturbances, etc. Facial Recognition can also be used be used to identify VIPs or for accurate people counting,” said Mike Poe, 3xLOGIC Product Manager. VIGIL V250-16 Network Video Recorder (NVR) To enhance the company’s recording appliance line, they are adding a new 16 channel fully-integrated, intelligent video appliance. Pre-configured with VIGIL Video Management System (VMS) software, this 1U NVR is a highly cost-effective video management platform that combines all the key functionality of VIGIL VMS; unrivalled ease of setup; and 16 dedicated PoE ports for multiple IP devices. The V250-16 also includes alarm, serial, and audio inputs. Users can monitor their business with an integration to a wide variety of data sources including Point-of-Sale, ATM, access control, alarms, and audio devices. This data can then be tied to video, made searchable, and generate alarms based on specific, user-chosen criteria. Our new V250-16 fulfills the many requests to expand the IP camera capabilities of our V250 models" “Our new V250-16 fulfills the many requests to expand the IP camera capabilities of our popular 4 and 8-camera V250 models. Customers can now enjoy full 16 camera capability and processor improvements to the platform—all at a very attractive price point,” Poe added. Windows 10 On VIGIL And infinias Servers Windows 10 will begin shipping on all VIGIL and infinias servers and All-In-One edge recording appliances in January 2019. Windows 10, which features expanded hardware compatibility improvements as well as increased security, is the industry standard in OS and offers true 64-bit compatibility. Along with Windows 10 compatibility, 3xLOGIC is also introducing a new, streamlined and user-friendly recovery environment on all servers. PoE (Power over Ethernet) Splitter/Extender This small box created a big buzz at the 2018 ISC West show. It’s a PoE+ splitter/extender capable of taking one PoE+ CAT 5/6 run and splitting it into two, allowing the installer to either add an additional camera to an existing location, add an infinias access-controlled door, or install two cameras in one location. Applications for this device span IP cameras, thermal detection, or access control additions. For instance, a user can add a thermal imager to an existing IP camera location to provide an additional layer of protection. A PoE+ injector is required at the PoE switch to provide the additional power. The PoE Splitter enables the customer to leverage existing cabling infrastructure to increase their surveillance footprint while saving time and costly cable installation charges. 128GB SD Card Support For Multi-Sensor Device Customers can double the storage capacity of the current 64GB offering and enjoy the ability to host VIGIL ServerOur customers asked and we listened. The 3xLOGIC Indoor Multi-Sensor now has a 128GB SD card option. Customers can double the storage capacity of the current 64GB offering and enjoy the ability to host VIGIL Server, allowing the camera to record video to the onboard SD card, with full search capabilities in VIGIL Client, and in the View Lite II and infinias mobile apps. A true all-in-one solution, built-in Passive Infrared (PIR) sensors, 2-way audio with VIGIL Server, and digital I/O allow the Multi-Sensor to be an alarm annunciator, audio system, and video recorder, all in one, small unit. Protection For People And Property “These new products highlight our commitment to providing customers with leading edge, proactive security solutions that are key to the next level of protection for people and property, as well as providing data that presents an unparalleled view into the operational aspects of their business. This facial recognition technology extends our strategy of supplying highly-useful, real-time data that started with our thermal sensors and Multi-Sensor edge devices. “3xLOGIC’s global expansion is well underway and these innovations provide our partners with new opportunities, and their customers with the confidence they are operating in a leading-edge, secure, intelligent environment,” commented Bill Hobbs, VP of Sales for 3xLOGIC.
Sensory, a provider of speech and vision technologies that enhance the user experience and security of consumer electronics, announces the release of its fourth generation of TrulySecure FIDO Certified multimodal biometric authentication technology. Now smarter, faster and more secure than ever before, the TrulySecure 4.0 SDK boasts a variety of new AI features that cater to today’s smartphones, mobile apps, and IoT devices, including support for 3D cameras, GPU utilization for authentication processing, new liveness challenges and options for integrating components of TrulySecure into cloud-based authentication systems. With each subsequent revision, Sensory continues to significantly enhance the performance, security and features offered by TrulySecure. Version 4.0 continues the trend by expanding on Sensory’s market-proven face authentication AI performance and accuracy. Facial Recognition Solutions A common problem with traditional 2D facial recognition solutions is the inability to authenticate users in challenging lighting or no-light scenarios With version 4.0, TrulySecure’s deep learning AI has been trained on a data set that is an order of magnitude larger than the previous generation, which has improved 2D facial recognition accuracy more than 50-percent. A common problem with traditional 2D facial recognition solutions is the inability to authenticate users in challenging lighting or no-light scenarios. The use of an IR illuminator completely eliminates this problem, essentially allowing TrulySecure to see clearly and authenticate users in all lighting conditions, including complete darkness. 3D camera support also increases the robustness of TrulySecure to varying pose angles, making the system more accurate during casual use across a broader range of conditions, and more resistant to spoof attacks. Biometric Authentication Data Processing TrulySecure's support of 3D camera data has been developed in collaboration with pmd Technologies from Germany, the worldwide 3D Time-of-Flight CMOS-based digital imaging technology supplier. 3D cameras from pmd are already integrated into smartphones, robots, cars and AR headsets. Another major update in TrulySecure is the ability to split the biometric authentication data processing load between a device’s GPU and applications processor. To accomplish this, key processor-heavy components of the core TrulySecure algorithm were isolated, streamlined and specially ported to run on a GPU. In testing, it was found that those isolated components of TrulySecure run as fast or even faster on the GPU than on the AP. Moving heavy processing components of TrulySecure from the AP to the GPU allows the applications processor to either prioritise other tasks, or work in parallel with the GPU to cut the amount of processing time required for the TrulySecure algorithm in half. Liveness Detection Capabilities The first major leap forward from the previous version of TrulySecure is the use of 3D image data for authentication As an added bonus, isolating and streamlining processor-heavy components of the TrulySecure algorithm has opened up a whole new realm of possibilities for porting to other embedded environments in the future. An area of concern for all authentication modalities is spoofing. While previous generations of TrulySecure face and voice recognition featured anti-spoofing and liveness detection capabilities, TrulySecure 4.0 makes spoofing a concern of the past. The first major leap forward from the previous version of TrulySecure is the use of 3D image data for authentication. This allows TrulySecure to not only recognize the user’s face, but the shape and contour of it too – and immediately reject 2D images and videos of the user’s face. Requiring 3D facial imagery serves as an excellent anti-spoofing measure, but not all devices have 3D cameras. For traditional 2D RGB camera applications, Sensory’s TrulySecure now features a face liveness challenge that makes it virtually impossible for anybody but the enrolled user to get in. Cloud-Based Authentication TrulySecure’s face liveness challenge requires the enrolled user to follow prompts telling them what kind of movement to make in order to be authenticated. Additionally, TrulySecure now features an ‘eyes open’ challenge, that requires the user’s eyes to be open during authentication. Sensory’s technologies have long been the go-to for those looking to integrate powerful AI at the edge, but now TrulySecure can make cloud-based authentication technologies faster, more convenient and more secure. One way that TrulySecure can do this is via its incredibly quick on-device enrollment component for federated authentication. With federated authentication, once a user completes the TrulySecure enrollment process on their device, TrulySecure creates a user enrollment template that can be handed off to the authentication server. Once the template is received by the server, it can be sent to other devices as needed, allowing the enrolled user to authenticate by face on any permitted device or app. Authentication Images This mitigates security risks associated with sending photos of a user’s face used for authentication over the internet TrulySecure can also be used to reduce authentication data loads sent to cloud-based authentication systems by moving pre-authentication steps like liveness detection and feature extraction to the edge. TrulySecure’s on-device liveness detection can be used to immediately verify user authentication samples for liveness before sending captured authentication images to the server for processing. Taking it another step further, by enabling TrulySecure’s on-device feature extraction, once the AI detects liveness, it can then immediately convert the user’s facial features into templates (irreversible mathematical data) that can be sent to the authentication server instead of sending multiple images. This mitigates security risks associated with sending photos of a user’s face used for authentication over the internet, and significantly reduces the amount of data sent to the cloud for authentication. Ideal for a wide range of applications, including smartphones, tablets, PCs, personal assistant technologies and robots, Sensory’s SDK for TrulySecure 4.0 face authentication is now available and currently supports ToF 3D cameras from pmd Technologies.
FLIR Systems, Inc. announced the FLIR Firefly camera family, the industry’s first deep learning inference-enabled machine vision camera. The FLIR Firefly, which integrates the Intel Movidius Myriad 2 Vision Processing Unit (VPU), is designed for image analysis professionals using deep learning for more accurate decisions, and faster, easier system development. Traditional rules-based software is ideal for straightforward tasks such as barcode reading or checking a manufactured part against specifications. The FLIR Firefly combines a new, affordable machine vision platform with the power of deep learning to address complex and subjective problems such as recognizing faces or classifying the quality of a solar panel. Improves Speed And Power Efficiency The FLIR Firefly leverages the Intel Movidius Myriad 2 VPU’s advanced capabilities in a compact and low-power cameraThe FLIR Firefly leverages the Intel Movidius Myriad 2 VPU’s advanced capabilities in a compact and low-power camera, ideal for embedded and handheld systems. Machine makers can load their trained neural networks directly onto the Firefly’s integrated VPU. Additionally, Intel Movidius Neural Compute Stick users can easily deploy their existing networks directly onto the Firefly. This unique design reduces system size and improves speed, reliability, power efficiency, and security. "Automated analysis of images captured by machines is a key part of our day-to-day lives that few of us think about,” said James Cannon, President and CEO of FLIR. “The quality, affordability, and speed-to-market of items like our smartphones or the food on our tables are made possible by systems using cameras doing both inspection and automated production. With the FLIR Firefly powered by Intel Movidius Myriad 2 VPU, we are enabling the designers of these systems to leverage deep learning faster and at lower costs.” Intel Movidius Myriad 2 VPU “The Intel Movidius Neural Compute Stick enabled FLIR to rapidly prototype, streamlining the early development of machine learning in the Firefly,” said Adam Burns, Director of Computer Vision Products at Intel. “Now the FLIR Firefly uses the compact, efficient Intel Movidius Myriad 2 VPU to perform real-time inference in the camera, without compromising the amazing levels of miniaturization that FLIR has achieved in this device.” FLIR will demonstrate a preview of the Firefly camera at the VISION conference in Stuttgart, Germany, in the FLIR booth (Hall 1, Stand 1B42).
GET Group North America, a provider of end-to-end solutions for secure credentials with over 20 years of experience in identity management, announced the availability of the CoreID Identity Management System (IDMS). Seamlessly combining biometric capture capabilities with back-end database functionality, Core ID can be used to issue and track physical or digital credentials throughout the credential’s lifecycle, as well as to manage enrollment workflows and ensure only the appropriate enrollment biometrics and data are collected for a specific credential. CoreID’s dynamic workflow management application enables the capture of personal identifiable information, biometrics, facial recognition and fraud detection to be configurable by an administrator at installation and modifiable whenever necessary. It enables administrators to have total control over devices and data architecture, providing a complete picture of the online/offline device topology. Integrating With Facial Recognition Systems Each CoreID management system is designed to be independent but can easily be paired with one another at any time The power of the CoreID product lies in the ability to integrate with virtually any relevant external application and devices such as figure and facial recognition systems, barcode and document readers, biometric capture devices, system of record and servers that the issuing authority already has, while upgrading their management system to the latest technology and security features available. Each CoreID management system is designed to be independent but can easily be paired with one another at any time. This allows the system to work in an online and offline mode, in case there is a power outage or an operator needs to enroll participants remotely. Secure Credentials “We are proud to support secure credentials from start to finish -- including enrollment, personalisation and issuance -- and to protect those credentials with extensive security functionalities throughout their lifecycle,” said Joel Perez, Program & Solutions Director, GET Group North America. “CoreID is the latest in our end-to-end offerings and is easy to use and optimized for enrolling a maximum number of participants in the shortest amount of time and requiring less resources.”
Vigilant Solutions - an AI and data analytics company that provides technology to public safety - announced it has entered the body worn camera market by acquiring Edesix Ltd, a global provider of wearable security hardware and software, and the United Kingdom's number one manufacturer of body worn cameras. The acquisition strengthens Vigilant's position as a market leader in image capture solutions by adding body worn camera images via hardware and software and in-car camera technology to its existing suite of automated license plate recognition (ALPR), facial recognition, ballistics analysis and gun crime mapping hardware and software solutions. Expanding Public Safety Customer Base This acquisition puts Vigilant in the position to offer public safety a full suite of image capture solutions including the ability to integrate our suite of technologies with in-car cameras""Vigilant Solutions is excited to enter the body worn and in-car camera markets," said Shawn Smith, Founder and President of Vigilant Solutions. "This acquisition puts Vigilant in the position to offer public safety a full suite of image capture solutions - both in the U.S. and internationally - including the ability to integrate our suite of technologies with in-car cameras. Edesix has a strong global footprint, which includes more than 20,000 body camera deployments across several industries and five continents. This acquisition allows us to continue to build Vigilant's global brand. In addition, Edesix also enhances Vigilant's hardware and software engineering capabilities." With the acquisition of Edesix, Vigilant is not only entering the body worn and in-car camera markets but is also expanding its presence beyond its traditional public safety customer base and will serve a broad range of commercial industries. Video Evidence Management System Body worn camera and in-car camera footage obtained via Vigilant's hardware, is stored in VideoManager, a robust video evidence management system. VideoManager is a component of Vigilant's cloud-based investigative platform, which includes image capture data and analytics for ALPR, facial recognition, ballistics and gun crime mapping. "The Edesix team is thrilled with the acquisition by Vigilant Solutions, which has been at the forefront of machine vision and machine learning technology innovation in the public safety community for years," said Richie McBride, CEO of Edesix. "The combination of Vigilant's image analytics solutions and our body worn and in-car camera products is truly exciting. When you consider that our solutions seamlessly integrate into Vigilant's investigative platform, the global public safety community has some incredibly powerful tools to keep them and their communities safe."
Panasonic System Solutions Company of North America, Security Group, brings to market FacePRO, its deep learning facial recognition system using extreme sensing and enhanced detection technology to identify persons of interest and alert authorities of their presence in real-time, at the Global Security Exchange (GSX) 2018 Expo in Las Vegas, September 25-27, 2018. Visitors to GSX Booth can demo Panasonic’s core engine that boasts the world’s highest face recognition performance. FacePRO high-precision facial recognition software can identify faces that are difficult to recognize with conventional technologies, including faces at an angle of up to 45 degrees to the left or right or 30 degrees up or down, even those partially hidden by sunglasses. Deep Learning Technology FacePRO software provides real-time processing and the highest precision in facial recognition thanks to its new deep learning technology" “Panasonic continues to develop comprehensive, end-to-end security hardware and software solutions to help those organizations and institutions looking to improve safety and security. Our FacePRO software provides real-time processing and the highest precision in facial recognition thanks to its new deep learning technology.” said Domingo Martinez, Product Marketing, Panasonic System Solutions Company of North America. “We are excited to show the GSX audience the capabilities of the FacePRO technology.” The new software, which fits into the Panasonic unified and secure ecosystem, features the ‘iA (intelligent Auto) mode’ that automatically adjusts settings for the camera to shoot optimal images best suited for facial recognition. When used with Panasonic's i-PRO EXTREME series network cameras installed with the included ‘Best Shot License Key’, only the ‘Best Shots’ will be sent to the server for facial recognition. High-precision recognition The combination of Panasonic core devices and the facial recognition software maximises performance to achieve high-precision recognition. The company plans to add a function to recognize partially covered faces with a surgical mask, which is difficult with conventional systems, by the end of this year. Cost can be reduced by about 40 to 50% compared to conventional systems that do not use the Best Shot function Additionally, using this software with cameras equipped with the iA function enables image analysis to be performed on the camera instead of the server to send only the best images to the server. This will result in reducing server and network loads, which leads to overall system cost reductions. When 10 or more network cameras are connected to the system, the cost can be reduced by about 40 to 50% compared to conventional systems that do not use the Best Shot function. FacePRO's Key Features include: High precision: The world’s highest facial recognition engine as evaluated by NIST (IJB-A face challenge) - iA function and Best Shot images maximize facial recognition engine performance and provide high recognition precision System cost reduction: Sends only “Best Shot” images to reduce server and network load System expandability: Registers up to 30,000 faces (Available as an option) Integrated management with i-PRO monitoring system enables integrated management of a facial recognition system and monitoring system with the same GUI.
Timely and important issues in the security marketplace dominated our list of most-clicked-upon articles in 2018. Looking back at the top articles of the year provides a decent summary of how our industry evolved this year, and even offers clues to where we’re headed in 2019. In the world of digital publishing, it’s easy to know what content resonates with the security market: Our readers tell us with their actions; i.e., where they click. Let’s look back at the Top 10 articles we posted in 2018 that generated the most page views. They are listed in order here with a brief excerpt. 1. U.S. President Signs Government Ban On Hikvision and Dahua Video Surveillance The ban on government uses, which takes effect ‘not later than one year after … enactment,’ applies not only to future uses of Dahua and Hikvision equipment but also to legacy installations. The bill calls for an assessment of the current presence of the banned technologies and development of a ‘phase-out plan’ to eliminate the equipment from government uses. 2. Motorola Makes A Splash With Avigilon Video Surveillance Acquisition Early clues point to Motorola positioning Avigilon as part of a broader solution, especially in the municipal/safe cities market. The company says the acquisition will enable more safe cities projects and more public-private partnerships between local communities and law enforcement. Motorola sees Avigilon as ‘a natural extension to global public safety and U.S. federal and military’ applications, according to the company. 3. Impact Of Data-Driven Smart Cities On Video Surveillance One of the major areas of technology that is going to shift how we interact with our cities is the Internet of Things (IoT). One benefit will be the ability to use video surveillance to analyze data on large crowds at sporting events The IoT already accounts for swaths of technology and devices operating in the background. However, we’re increasingly seeing these come to the forefront of everyday life, as data becomes increasingly critical. Bosch is highlighting its “Simply. Connected” portfolio of smart city technology to transform security as well as urban mobility, air quality and energy efficiency 4. CES 2018: Security Technologies Influencing The Consumer Electronics Market Familiar players at security shows also have a presence at the Consumer Electronics Show (CES). For example, Bosch is highlighting its “Simply. Connected” portfolio of smart city technology to transform security as well as urban mobility, air quality and energy efficiency. Many consumer technologies on display offer a glimpse of what’s ahead for security. Are Panasonic’s 4K OLEDs with HDR10+ format or Sony’s A8F OLED televisions a preview of the future of security control room monitors? 5. SIA Predicts Top Physical Security Trends For 2018 Traditional security providers will focus more on deepening the customer experience and enhancing convenience and service. The rise of IoT also places an emphasis on cybersecurity, and security dealers will react by seeking manufacturers and technology partners with cyber-hardened network-connected devices. 6. High-Speed Visitor Screening Systems Will Improve Soft Target Security The system is more expensive than a metal detector, but about a third the cost of familiar airport body scanners. Labor reduction (because of faster throughput) can help offset the system costs, but “it’s difficult to quantify the improvement in the visitor experience,” says Mike Ellenbogen, CEO of Evolv Technology. 7. How To Prevent ATM Jackpotting With Physical And Cyber Security A new crime wave is hitting automated teller machines (ATMs); the common banking appliances are being rigged to spit out their entire cash supplies into a criminal’s waiting hands. The crime is called “ATM jackpotting” and has targeted banking machines located in grocery shops, pharmacies and other locations in Taiwan, Europe, Latin America and, in the last several months, the United States. Rough estimates place the total amount of global losses at up to $60 million. The safety and security world bring a complex problem to solve how to pick out a face in a moving and changing environment and compare it to several faces of interest 8. Why We Need To Look Beyond Technology For Smart City Security Solutions Although technology is necessary for an urban area to transition in to a safe and smart city, technology alone isn’t sufficient. Truly smart cities are savvy cities and that includes how they employ software, sensing, communications and other technologies to meet their needs. 9. How New Video Surveillance Technology Boosts Airport Security and Operations Employing airport security solutions is a complex situation with myriad government, state and local rules and regulations that need to be addressed while ensuring the comfort needs of passengers. Airport security is further challenged with improving and increasing operational efficiencies, as budgets are always an issue. As an example, security and operational data must be easily shared with other airport departments and local agencies such as police, customs, emergency response and airport operations to drive a more proactive approach across the organization. 10. The Evolution Of Facial Recognition From Body-Cams To Video Surveillance The safety and security world bring a complex problem to solve how to pick out a face in a moving and changing environment and compare it to several faces of interest. “One-to-many” facial recognition is a much harder problem to solve.
From satellite imagery to street views to indoor mapping, technology has disrupted our past world. This has left us dependent upon new ways to visualise large spaces. This new world has brought many benefits and risks. But what does that mean for the security professional or facility manager today and what technologies can be used to secure buildings and improve facility operations? A Brief History Of 3D Technology Starting May 5, 2007 (inception 2001), Google rolled out Google Street View to augment Google Maps and Google Earth; documenting some of the most remote places on earth using a mix of sensors (Lidar/GSP/Radar/Imagery). The mission to map the world moved indoors May 2011 with Google Business Photos mapping indoor spaces with low cost 360° cameras under the Trusted Photographer program. In the earlier days, 3D scanning required a high level of specialization, expensive hardware and unavailable computing power With the growth of 3D laser scanning from 2007 onwards, the professional world embraced scanning as effective method to create digitised building information modeling (BIM), growing fast since 2007. BIM from scanning brought tremendous control, time and cost savings through the design and construction process, where As-Built documentation offered an incredible way to manage large existing facilities while reducing costly site visits. In the earlier days, 3D scanning required a high level of specialization, expensive hardware, unavailable computing power and knowledge of architectural software. Innovation during the past 8 year, have driven ease of use and lower pricing to encourage market adoption. Major investments in UAVs in 2014 and the commercial emergence of 360° photography began a new wave of adoption. While 3D scanners still range from $20K – $100K USD, UAVs can be purchased for under $1K USD and 360° cameras for as low as $100. UAVs and 360° cameras also offer a way to document large spaces in a fraction of the time of terrestrial laser scanners with very little technical knowledge. Access to building plans, satellite imagery, Google Street View, indoor virtual tours and aerial drone reconnaissance prove effective tools to bad actors The result over the past 10+ years of technology advancement has been a faster, lower cost, more accessible way to create virtual spaces. However, the technology advances carry a major risk of misuse by bad actors at the same time. What was once reserved to military personal is now available publicly. Access to building plans, satellite imagery, Google Street View, indoor virtual tours and aerial drone reconnaissance prove effective tools to bad actors. Al Qaeda terror threats using Google Maps, 2007 UK troops hit by terrorists in Basra, 2008 Mumbai India attacks, 2016 Pakistan Pathankot airbase attacks, ISIS attacks in Syria using UAVs, well-planned US school shootings and high casualty attacks show evidence that bad actors frequently leverage these mapping technologies to plan their attacks. The weaponization of UAVs is of particular concern to the Department of Homeland Security: "We continue to face one of the most challenging threat environments since 9/11, as foreign terrorist organizations exploit the internet to inspire, enable or direct individuals already here in the homeland to commit terrorist acts." Example comparison of reality capture on the left of BIM on the right. A $250 USD 360° camera was used for the capture in VisualPlan.net software What Does This Mean For The Security Or Facility Manager Today? An often overlooked, but critical vulnerability to security and facility managers is relying on inaccurate drawing. Most facilities managers today work with outdated 2D plan diagrams or old blueprints which are difficult to update and share.Critical vulnerability to security and facility managers is relying on inaccurate drawing Renovations, design changes and office layout changes leave facility managers with the wrong information, and even worse is that the wrong information is shared with outside consultants who plan major projects around outdated or wrong plans. This leads to costly mistakes and increased timelines on facility projects. Example Benefits Of BIM There could be evidence of a suspect water value leak which using BIM could be located and then identified in the model without physical inspection; listing a part number, model, size and manufacture. Identification of vulnerabilities can dramatically help during a building emergency. First Responders rely on facilities managers to keep them updated on building plans and they must have immediate access to important building information in the event of a critical incident. Exits and entrances, suppression equipment, access control, ventilation systems, gas and explosives, hazmat, water systems, survival equipment and many other details must be at their fingertips. In an emergency situation this can be a matter of life or death. Example Benefit Of Reality Capture First Responders rely on facilities managers to keep them updated on building plans A simple 360° walk-through can help first responders with incident preparedness if shared by the facility manager. Police, fire and EMS can visually walk the building, locating all critical features they will need knowledge of in an emergency without ever visiting the building. You don’t require construction accuracy for this type of visual sharing. This is a solution and service we offer as a company today. Reality capture is rapidly becoming the benchmark for facility documentation and the basis from which a security plan can be built. Given the appropriate software, plans can be easily updated and shared. They can be used for design and implementation of equipment, training of personnel and virtual audits of systems or security assessments by outside professionals. Our brains process visual information thousands of times faster than text. Not only that, we are much more likely to remember it once we do see it. Reality capture can help reduce the need for physical inspections, walk-throughs and vendor site-visits but more importantly, it provides a way to visually communicate far more effectively and accurately than before. But be careful with this information. You must prevent critical information falling into the hands of bad actors. You must watch out for bad actors attempting to use reality capture as a threat, especially photo/video/drones or digital information and plans that are posted publicly. Have a security protocol to prevent and confront individuals taking photos or video on property or flying suspect drones near your facility and report to the authorities. Require authorization before capturing building information and understand what the information will be used for and by who.There are a number of technologies to combat nefarious use of UAVs today Nefarious Use Of UAVs There are a number of technologies to combat nefarious use of UAVs today, such as radio frequency blockers and jammers, drone guns to down UAVs, detection or monitoring systems. Other biometrics technologies like facial recognition are being employed to counter the risk from UAVs by targeting the potential operators. UAVs are being used to spy and monitor for corporate espionage and stealing intellectual property. They are also used for monitoring security patrols for the purpose of burglary. UAVs have been used for transport and delivery of dangerous goods, delivering weapons and contraband and have the ability to be weaponised to carry a payload.Investigating reality capture to help with accurate planning and visualization of facilities is well worth the time The Federal Aviation Administration has prevented UAV flights over large event stadiums, prisons and coast guard bases based on the risks they could potentially pose, but waivers do exist. Be aware that it is illegal today to use most of these technologies and downing a UAV, if you are not Department of Justice or Homeland Security, could carry hefty penalties. Facility managers must have a way to survey and monitor their buildings for threats and report suspicious UAV behaviours immediately to authorities. At the same time, it’s critical to identify various potential risks to your wider team to ensure awareness and reporting is handled effectively. Having a procedure on how identify and report is important. Investigating reality capture to help with accurate planning and visualization of facilities is well worth the time. It can help better secure your facilities while increasing efficiencies of building operations. Reality capture can also help collaboration with first responders and outside professionals without ever having to step a foot in the door. But secure your data and have a plan for bad actors who will try to use the same technologies for nefarious goals.
When a child goes missing in a large, crowded mall, we have a panicking mom asking for help from the staff, at least a dozen cameras in the area, and assuming the child has gone missing for only 15 minutes, about 3 hours’ worth of video to look through to find the child. Typical security staff response would be to monitor the video wall while reviewing the footage and making a verbal announcement throughout the mall so the staff can keep an eye out for her. There is no telling how long it will take, while every second feels like hours under pressure. As more time passes, the possible areas where the child can be will widen, it becomes more time-consuming to search manually, and the likelihood of finding the child decreases. What if we can avoid all of that and directly search for that particular girl in less than 1 second? Artificial neural networks are improving every day and now enable us to search for a person across all selected camera streamsWith Artificial intelligence, we can. Artificial neural networks are improving every day and now enable us to search for a person across all selected camera streams in a fraction of a second, using only one photo of that person. The photo does not even have to be a full frontal, passport-type mugshot; it can be a selfie image of the person at a party, as long as the face is there, the AI can find her and match her face with the hundreds or thousands of faces in the locations of interest. The search result is obtained in nearly real time as she passes by a certain camera. Distinguishing Humans From Animals And Statues The AI system continuously analyzes video streams from the surveillance cameras in its network, distinguishes human faces from non-human objects such as statues and animals, and much like a human brain, stores information about those faces in its memory, a mental image of the facial features so to speak. When we, the system user, upload an image of the person of interest to the AI system, the AI detects the face(s) in that image along with their particular features, search its memory for similar faces, and shows us where and when the person has appeared. We are in control of selecting the time period (up to days) and place (cameras) to search, and we can adjust the similarity level, i.e., how much a face matches the uploaded photo, to expand or fine-tune the search result according to our need. Furthermore, because the camera names and time stamps are available, the system can be linked with maps to track and predict the path of the person of interest. AI Face Search is not Face Recognition for two reasons: it protects people’s privacy, and it is lightweight Protecting People’s Privacy With AI Face Search All features of face recognition can be enabled by the system user, such as to notify staff members when a person of interest is approaching the store AI Face Search is not Face Recognition for two reasons: it protects people’s privacy, and it is lightweight. First, with AI Face Search, no names, ID, personal information, or lists of any type are required to be saved in the system. The uploaded image can be erased from the system after use, there is no face database, and all faces in the camera live view can be blurred out post-processing to guarantee GDPR compliance. Second, the lack of a required face database, a live view with frames drawn around the detected faces and constant face matching in the background also significantly reduces the amount of computing resource to process the video stream, hence the lightweight. Face Search Versus Face Recognition AI Face Search Face Recognition Quick search for a particular person in video footage Identify everyone in video footage Match detected face(s) in video stream to target face(s) in an uploaded image Match detected face(s) in video stream to a database Do not store faces and names in a database Must have a database with ID info Automatically protect privacy for GDPR compliance in public places May require additional paperwork to comply with privacy regulations Lightweight solution Complex solution for large-scale deployment Main use: locate persons of interest in a large area Main use: identify a person who passes through a checkpoint Of course, all features of face recognition can be enabled by the system user if necessary, such as to notify staff members when a person of interest is approaching the store, but the flexibility to not have such features and to use the search tool as a simple Google-like device particularly for people and images is the advantage of AI Face Search.Because Face Search is not based on face recognition, no faces and name identifications are stored Advantages Of AI Face Search Artificial Intelligence has advanced so far in the past few years that its facial understanding capability is equivalent to that of a human. The AI will recognise the person of interest whether he has glasses, wears a hat, is drinking water, or is at an angle away from the camera. In summary, the advantages of Face Search: High efficiency: a target person can be located within a few seconds, which enables fast response time. High performance: high accuracy in a large database and stable performance, much like Google search for text-based queries. Easy setup and usage: AI appliance with the built-in face search engine can be customised to integrate to any existing NVR/VMS/camera system or as a standalone unit depending on the customer’s needs. The simple-to-use interface requires minimal training and no special programming skills. High-cost saving: the time saving and ease of use translate to orders of magnitude less manual effort than traditionally required, which means money saving. Scalability: AI can scale much faster and at a wider scope than human effort. AI performance simply relies on computing resource, and each Face Search appliance typically comes with the optimal hardware for any system size depending on the customer need, which can go up to thousands of cameras. Privacy: AI Face Search is not face recognition. For face recognition, there are privacy laws that limits the usage. Because Face Search is not based on face recognition, no faces and name identifications are stored, so Face Search can be used in many public environments to identify faces against past and real-time video recordings. AI Face Search match detected face(s) in video stream to target face(s) in an uploaded image Common Use Cases Of AI Face Search In addition to the scenario of missing child in a shopping mall, other common use cases for the AI Face Search technology include: Retail management: Search, detect and locate VIP guests in hotels, shopping centres, resorts, etc. to promptly attend to their needs, track their behaviour pattern, and predict locations that they tend to visit. Crime suspect: Quickly search for and prove/disprove the presence of suspects (thief, robber, terrorist, etc.) in an incident at certain locations and time. School campus protection: With the recent increase in number of mass shootings in school campuses, there is a need to identify, locate and stop a weapon carrier on campus as soon as possible before he can start shooting. Face Search will enable the authorities to locate the suspect and trace his movements within seconds using multiple camera feeds from different areas on campus. Only one clear image of the suspect’s face is sufficient. In the race of technology development in response to business needs and security concerns, AI Face Search is a simple, lightweight solution for airports, shopping centres, schools, resorts, etc. to increase our efficiency, minimise manual effort in searching for people when incidents occur on site, and actively prevent potential incidents from occurring. By Paul Sun, CEO of IronYun, and Mai Truong, Marketing Manager of IronYun
More good news for exhibitors on the second day of the Global Security Exchange (GSX) in Las Vegas. Brisk attendance continued early in the day, and then slowed somewhat in the afternoon, but most comments from exhibitors were positive. Exhibitors such as Lenel were “thrilled” with the show, and noticed the steady, good traffic and lots of sales leads. Lenel’s position at the front of the hall probably helped. New developments in mobile credentialing are a big trend at GSX, and Lenel’s BlueDiamond mobile credentials are traveling on a new path, so to speak. The access control company is introducing the idea of “Pathways” as a way of automatically signaling intent to a Bluetooth-enabled smart phone to open a door. A recognizable “pathway” is programmed into the phone, based on signals from nearby readers and locks and also geolocation signals. The system recognizes when a user travels along the pathway and automatically signals the correct door(s) to be opened along the way without the user having to touch his smart phone.A recognizable “pathway” is programmed into the phone, based on signals from nearby readers, locks and also geolocation signals Providing A Lightweight Alternative “When you trigger a pathway, it’s signaling intent to open the door,” says Greg Berry, Vice President Mobile Credentialing, Global Security Products, for United Technologies, parent company of Lenel. “Pathways are customized to a user’s needs and are the common places you are going all the time.” A user who walks the same path daily to the door of an office will find that door opens automatically. Previously using mobile credentials has been “slightly more work than using a badge,” says David Weinbach, Manager of Identity and Product Innovation for Lenel. “Now with Pathways, it’s less work than using a badge.” Specifically, a user no longer has to take out his phone and push a button to signal intent. “Rather than trying to emulate the badge, you create an experience that is better than the badge,” adds Berry. “We want to change the paradigm and turn the market on its ear.”New browser-based clients are being released with each new version of OnGuard software Other news from Lenel includes the release of more mobile and browser-based clients for OnGuard to be used for greater convenience alongside the Window-based clients. Providing a “lightweight” alternative enables some of the functionality of the Windows client in a format that is easy to access on the go. New browser-based clients are being released with each new version of OnGuard software. Cloud-hosted systems using Microsoft Azure are also among the plans for OnGuard, which ultimately will offer on-premises and cloud options. There’s not much comment from the Lenel folks about their parent company United Technologies’ plan to acquire S2 Security, which was announced days before the show. They would only say that the acquisition is waiting for regulatory approval, and that the expectation is that the two companies’ products will be complementary, given S2’s focus on the SMB (small and medium-sized business) market and Lenel’s strength at the enterprise level. The acquisition strategy is to grow both businesses. More details to come about the new combined company. Modern Network Infrastructure NVT Phybridge, a PoE connections company located near the back of the hall, also reported steady booth traffic on Day 2. “There are lots of customers and partners here,” said Steven Fair, Executive Vice President. “We are pleased with the quality of people, but not overwhelmed with the quantity.” FacePRO AI facial recognition is used for real-time searches of terror suspects or criminals throughout a location NVT Phybridge, which provides IP networking products for the telephony industry as well as security, is focused on networking concepts at GSX, in particular the changing requirements for network infrastructure in the age of IoT. We are pleased with the quality of people, but not overwhelmed with the quantity.” Fair uses the term “Modern LAN” to describe the new, changing requirements and in consideration of the specific networking needs of each edge device, whether cameras, sensors, or door access control devices. “Start with the edge device — what does it need from the network? What are its needs and have there been any innovations to enable you to connect to the network more economically?” asks Fair. There is also a green aspect to designing network infrastructure. Can existing equipment, such as coaxial or single twisted-pair cabling, be used, and thus save on disposal costs of the used cabling as well as lowering installation costs? Among NVT Phybridge’s offerings that can serve the changing networking needs in the IoT era is Smart Path PoE, which offers smart power, smart network access and secure connections. The CLEER family of products provides ethernet over existing coaxial cabling to enable easy transition from analog to IP cameras. The PoLRE products supply ethernet and power to travel over a single unshielded twisted pair cable with reach over 400 meters. The products have been used recently to transition a series of cruise ships from analog to IP video without having to replace cabling and spending only two days in dry dock for the installs. A New Focus Away From AI Panasonic is looking to apply AI-based capabilities to vehicle recognition in the near future, with the ability to identify vehicle characteristics Deep learning and artificial intelligence (AI) seem to be taking a lower profile at this show, perhaps signaling the end of the hype. Companies that mention AI point to specific products that use the technology and are currently available. For example, Panasonic is featuring its FacePRO AI-based facial recognition system. The system uses face images captured from video — grabbing up to 30 to 35 faces a second as video is recorded. The system saves the best of those face images, eliminating extensive duplication, as thumbnails, which are linked to the video footage where the faces appear. To find video in which a face appears, the operator merely drags-and-drops the thumbnail image and commands the system to “go fetch” video that contains that face. The system then produces a timeline showing where the face appears in the feed from each video camera on the premises, so an operator can track the movements of a suspect throughout a facility. The tool helps to simplify and shorten the workflow of locating a suspect in real-time and is affordable for a wider range of uses beyond the traditional airports or high-end applications. The FacePRO software is offered on any Panasonic camera, and works with a separate FacePRO server that is integrated with the video recorder. The system can be added easily to existing systems and is useful for such applications as real-time searches for terror suspects or other criminals throughout a location. Panasonic is also looking to apply AI-based capabilities to vehicle recognition, too, in the near future, with the ability to identify vehicle characteristics such as color, type of vehicle and direction of travel. On the VMS side, Panasonic is transitioning its Video Insight software to a modular approach, tailoring solutions for a growing range of vertical markets, such as transportation and retail, all using “plug-ins” that enhance operation of Video Insight software. No additional license fees are involved That’s just a sampling of what I saw on Day 2 of the show. I have more to share in a final show report, including what I see tomorrow on the final (shortened) day.
Data was always bound to be a hot topic at this year's IFSEC International event. Artificial Intelligence (AI) has been a buzzword since last year's show. This year, manufacturers are ready to demonstrate solutions capable of processing and analyzing large volumes of information to bolster security and provide business intelligence. Organisers deliberately positioned IFSEC as a converged security event, highlighting the inherent link between the security of physical assets and the security of data. In the wake of the recent passing of the European General Data Protection Regulation (GDPR), visitors to the London-based show sought reassurance that physical security systems could help them comply to stricter rules regarding the collection and protection of personal information. Analyzing Big Data Seagate Technology, known for providing the surveillance industry with hard disk drives and storage solutions, showcased its Skyhawk AI hard disk drive, its first drive created specifically to enable artificial intelligence (AI) applications for video surveillance. Seagate's drive is designed for data-intensive workloads associated with recording large volumes of footage The drive is designed for data-intensive workloads associated with recording and analyzing large volumes of video surveillance footage. According to Seagate's Sales Manager Andy Palmer, AI-enabled analytics at the edge can avoid the latency associated with cloud-based systems. This makes the solution suitable for smart city applications requiring 24/7 intelligence from multiple cameras. The company also highlighted its strategic partnership with video surveillance provider Dahua Technology, with the latter seeking to leverage Seagate's technology to boost its own AI solutions. The Digital Barriers solution allows organisations to optimise how video data is transmitted depending on their particular needs Video Transmission And Privacy One manufacturer addressing the challenges of data transmission was Digital Barriers. The company demonstrated the integration of its EdgeVis Live platform with Milestone's XProtect video management system (VMS). The platform is designed for safe city applications, in which law enforcement and security professionals may need to stream incidents and events in real time over a limited bandwidth. The Digital Barriers solution allows organizations to optimize how video data is transmitted depending on their particular needs. For example, while some applications may favor a high clarity of video, others necessitate low data usage or a quick turnover of frames. The full, high quality video can then be downloaded later, meaning no intelligence is lost.While some applications may favour a high clarity of video, others necessitate low data usage or a quick turnover of frames The company also demonstrated its deep-learning facial recognition software, which can be used to identify suspects or vulnerable persons. To maximize accuracy, the deep learning system is trained on a wide range of images with varying angles and lighting. The solution is designed around data protection and privacy, explained Product Manager Fernande van Schelle, as all information is encrypted, and the system only identifies faces of known individuals on a pre-defined watch-list. Daniel Chau, Overseas Marketing Director at Dahua; Adam Brown, security Solutions Manager at Synopsys; Udo Scalla, Global Head Centre of Excellence - IOT Privacy, TÜV Rheinland Group GDPR For Physical Security Professionals Dahua Technology addressed data protection concerns with an expert panel dedicated to the cybersecurity questions posed by the new European General Data Protection Regulation (GDPR). Speakers included Daniel Chau, Overseas Marketing Director at Dahua; and Adam Brown, security Solutions Manager at Synopsys. Chau explained that Dahua encourages customers to address cybersecurity by undertaking independent audits and penetration tests. Brown elaborated that for any organization, cybersecurity must be a boardroom issue. Stakeholders must avoid a 'tick box' methodology for assessing cybersecurity, and instead integrate the concept into the company's overall strategy so that best practices can cascade through the organization.Stakeholders must avoid a 'tick box' methodology for assessing cybersecurity The panel also included insights from Udo Scalla, who specializes in data protection for IoT and smart home devices at TÜV Rhineland Group. Scalla proposed that manufacturers must avoid focusing on how best to capture data, and instead ask why the data is being collected, and whether it should even be collected in the first place. Integrators must ask why the customer intends to install the system, and what they want to do with the data – only then can they begin to assess the GDPR requirements. While the possibilities for collecting data are now endless, explained Scalla, not everything that is technologically possible ought to be made into a business reality. MOBOTIX highlighted its Cactus Concept cybersecurity campaign with a large blue cactus Protecting Video Surveillance Systems Video surveillance manufacturer VIVOTEK also tackled cybersecurity, with a presentation on 'Security within Security.' The company showcased its partnership with cybersecurity software provider Trend Micro, which enables VIVOTEK to provide cybersecurity-enhanced cameras. The cameras include embedded anti-intrusion software to prevent and mitigate cyber-attacks by detecting hacking attempts and blocking the source IP address. Should a camera be compromised, explained Shengfu Cheng, VIVOTEK's Director of Marketing and Product Planning, it can be quarantined to stop the spread of the attack, thus controlling the damage and reducing the cost of the infection. The Cactus Concept campaign aims to educate partners and customers on how to build a cyber-secure video surveillance system Cybersecurity was also a key theme at the MOBOTIX stand. The stand played host to a large blue cactus, a very literal representation of the German manufacturer's Cactus Concept. The campaign, launched earlier this year, aims to educate partners and customers on how to build a cyber-secure video surveillance system. According to the concept, every element of the system, from image capture through to video management, must be encrypted. These are the digital "thorns" which prevent the entire system –the cactus – being compromised. Exhibitors at IFSEC 2018 made a conscious effort to address customers' challenges around the collection, transmission and protection of security system data. As solutions become more powerful, with increasing numbers of connected sensors, this is a theme which is unlikely to go away anytime soon.
The 2018 FIFA World Cup tournament is bringing 32 national teams and more than 400,000 foreign soccer fans from all over the world to 12 venues in 11 cities in Russia. Fans are crowding into cities including Moscow, St. Petersburg and Kazan. Given continuing global concerns about terrorism, security is top-of-mind. Protection of the World Cup games in Russia is focusing on an “integrated safety, security and service approach,” according to officials. Combining the term “security” with the terms “safety” and “service” is not an accident. An aggressive security stance is necessary, but at the end of the day, fan safety is paramount, and a service-oriented approach ensures a positive fan experience. Medical responders will be working side-by-side with police and antiterrorism personnel. Risk Management Best Practices We asked Sean T. Horner and Ben Joelson, directors of the Chertoff Group, a global advisory firm focused on best practices in security and risk management, to comment on security at FIFA World Cup 2018. Although not involved in securing the 2018 World Cup, the Chertoff Group is experienced at securing large events and enterprises using risk management, business practices and security. Integration is another important aspect of protecting the games, says Horner. The use of multiple resources, including Russian military, intelligence and law enforcement, will be closely integrated to provide the best security for the large-scale event in each of the host cities, he says. The approach will be centralized and flexible, with resource deployment guided by effective situational awareness.Primary security and emergency operations centers will be dispersed throughout each host city “There is a unified command structure at the Russian Federation level, and they will keep resources in reserve and shift them as needed to various events and venues based on any specific intelligence, in effect deploying resources where threats are greatest,” says Joelson. “There will also be some regional commands, and resources will incorporate a spectrum of police and military personnel ranging from the ‘cop on the beat’ to the Spetsnaz, the Russian ‘special forces.” Primary security and emergency operations centers will be dispersed throughout each host city, and additional forces can be shifted as necessary, he notes. Role Of Law Enforcement In Russia, the lines of separation between law enforcement and the military are not as stark as in the United States, for example, where military forces are restricted from deployment for domestic law enforcement by the Posse Comitatus Act. In Russia, there is no such restriction. A broad range of technology will play a role at the World Cup, Horner and Joelson agree. Technology will be used primarily as a force multiplier and a decision-support tool for security personnel. There are robust CCTV systems in many Russian cities, and mobile CCTV systems, such as camera towers or mobile security centers on wheels, will also be deployed. Technologies will include infrared cameras, flood lights, and ferromagnetic screening systems to scan hundreds of individuals as they walk by. In some locations, facial recognition systems will be used, tied into various intelligence, military and law enforcement databases of known bad actors. Behavior analytics will be used as a decision-support tool. In addition to security in public areas, private CCTV systems in hotels, at transportation hubs, and inside the venues themselves will be leveraged. Video analytics and detection will help personnel review live view of people who may be acting suspiciously or who leave a bag unattended. In some locations, facial recognition systems will be used, tied into various intelligence, military and law enforcement databases of known bad actors Rigorous Anti-Terrorism Measures A Fan ID card is required to enter the 2018 FIFA World Cup Tournament, even for Russian residents. The Russians have an aggressive stance against domestic terrorism, which will also help ensure the safety of the World Cup games, say Horner and Joelson. Terrorist group ISIS has promised “unprecedented violence” at the games, but they make similar threats at every major global event. Russia has been an active force disrupting ISIS in Syria, and experts suggest that losing ground geographically could lead to addition “asymmetric” terrorist attacks. However, Russia is leveraging all their intelligence resources to identify any plots and deploying their security apparatus to disrupt any planned attacks, experts say. Russia’s rigorous anti-terrorism measures include a total ban on planes and other flying devices (such as drones) around the stadiums hosting the World Cup. Private Security In addition to military, intelligence and law enforcement personnel, private security will play a have a high profile during the 2018 World Cup in Russia. Private security personnel will be on the front lines in hotels and in “fan zones.” They will operate magnetometers at entrances, perform bag checks, enforce restrictions on hand-carried items, etc. Private security will be especially important to the “guest experience” aspects of protecting the games.Private security will be especially important to the “guest experience” aspects of protecting the games Another private security function at the World Cup is executive protection of dignitaries and high-net-worth individuals who will be attending. Executive protection professionals will arrive early, conduct advanced security assessments before VIPs arrive, and secure trusted and vetted transportation (including armored cars in some cases.) VIPs will include both Russian citizens and foreign (including U.S.) dignitaries attending the games. Private security details will be out in force. Aggressive Security Approach Overeager and outspoken fans are a part of the football culture, but Russia will deploy a near-zero tolerance policy against hooliganism and riots. An overwhelming force presence will take an aggressive approach to curbing any civil disturbances, and offenders will be removed quickly by Russian security forces. Strict restrictions on the sale and consumption of alcohol will be enforced in the venue cities before and after the matches. Officials will also be cognizant of the possibility of a riot or other event being used as a distraction to draw attention from another area where a terrorist event is planned. It will be a delicate balance between deploying an aggressive security approach and preserving the fan experience. Joelson notes that freedom of speech is not as valued in Russia as in other parts of the world, so the scales will be even more tipped toward security. “The last thing they want is for things to get out of control,” says Horner. “The event is putting Russia on the world stage, and they want visitors to walk away safely after having a great time and wanting to go back in the future.”Attendees should also have good situational awareness, and keep their heads up, scanning crowds and identifying unsafe situations" Precautions for World Cup attendees Attendees to the World Cup in Russia should take some basic precautions, Horner and Joelson agree. For example, Russia requires a translated, notarised letter explaining any prescription drugs. The country has a more aggressive foreign intelligence environment, so visitors cannot depend on their data being private. Joelson recommends the usual “social media hygiene” and privacy settings. Visitors should not post information about their travel plans or locations, and it’s best to travel with a disposable mobile phone that does not contain personal information. Location tracking should be deactivated. Travelers should also beware of talking and sharing information with others, or of saying anything derogatory. “They should also have good situational awareness, and keep their heads up, scanning crowds and identifying unsafe situations,” says Joelson. “If you bring a personal electronic device, you should expect that it has been compromised,” says Horner. Text messages and email will not be private, and he suggests creating an email address used only for travel. Don’t leave drinks unattended. Travelers from the U.S. should register at the Smart Traveler Enrollment Program (STEP) operated by the U.S. State Department. “Plan before you travel and before you get to the airport,” says Horner.
In order to improve security standards, in the last few months and since the beginning of the 2018/2019 season the Panomera camera system has been installed and tested in the Generali Arena in Prague, home ground of AC Sparta Praha. This technology is also used by many football clubs in the German Bundesliga and the English Premier League. After successful completion of the test phase, the club then switched the system into operational mode. AC Sparta Praha has launched a modernisation project for its security system with the objective of providing fans greater comfort and a feeling of increased security in their home arena, and to help prevent the occurrence of unwelcome incidents. Substantial Financial Investment If the rules are violated while a match is being played, this technology makes it possible to bring charges against individual offenders The system is also used for incident analysis, to deliver better video material so that the involvement of specific individuals can be proven accurately when offences occur. If the rules are violated while a match is being played, this technology makes it possible to bring charges against individual offenders or a larger group of fans. The system records continuously and stores what is happening at all locations on the tribunes. This in turn enables the direct display and investigation of incidents and their causes, which is made simpler by the simultaneous, time-synchronized playback of multiple video streams. The installation of this new camera system is not a reaction to what took place during the Europa League qualifying round match against Subotica, but a strategic measure for which the ACS club management decided earlier despite the substantial financial investment. Evidentiary Procedure By the time of the game against the Serbian team Subotica, which was played on 2 August 2018, the CCTV system was already in the final stage of testing, which meant that the material recorded could be used for the investigation and evidentiary procedure. The club is prosecuting fans who engaged in unacceptable behavior during the match extremely vigorously, and long stadium bans and fines have already been imposed. The club cooperated successfully with three companies to achieve the implementation of this CCTV solution: with Dallmeier – manufacturer of the Panomera technology, with T-Mobile – data infrastructure provider – and with Made in PUBLICITY, which was responsible for integrating the system and installation. Unambiguous Facial Identification The video material recorded with Panomera far surpasses the standard 1080-HD format, while capturing up to 30 images per second in real time The Panomera camera system has already been installed successfully in most stadiums in the Bundesliga (e.g., Allianz Arena - Bayern Munich, Signal Iduna Park - Borussia Dortmund, Commerzbank Arena - Eintracht Frankfurt) and in the English Premier League (e.g., Old Trafford - Manchester United, Emirates Stadium - Arsenal London) as well as in modern stadiums in Russia, host nation to the 2018 World Cup competition. The video material recorded with Panomera far surpasses the standard 1080-HD format, while capturing up to 30 images per second in real time. Recording is performed in a resolution of up to 320 pixels per meter, enabling unambiguous facial identification. For comparison: typically only half of this resolution, 125 pixels per meter is needed for normal facial recognition.
Season-ticket holders at Belgian football club RWD Molenbeek will soon find it easier to enter the stands at their stadium, thanks to facial recognition technology that is set to be introduced at the turnstiles. Although the project is still in the test phase, fans ordering their season tickets on-line can already upload an ID photo. This photo will be compared in real time with images taken by two cameras installed in the season-ticket holders’ queue at the stadium entrance, allowing supporters to enter much faster. An automatic gate will be installed in early 2019. Data Processing Facility Spectators who have forgotten their paper ticket can still enter the stadium with no problem. Those who haven't uploaded a photo, or who have borrowed an entry ticket, will still have to pass through the conventional gates and show their ticket at the turnstiles. The system was installed by Zetes using Panasonic facial recognition technology. The detection system, with its fast and reliable data processing facility, means we can install a system to speed up entry checks to the stadium" The facial recognition software applies only to the access checks, as a further benefit for season-ticket holders. Thierry Dailly, chairman of RWDM, explains: “The detection system, with its fast and reliable data processing facility, means we can install a system to speed up entry checks to the stadium.” Alain Wirtz, CEO of Zetes, adds: “This project is a perfect example of how we can benefit from the innovative capabilities provided by the Panasonic group, owner of Zetes. Zetes specialises in this identification technology, which has many different applications. We hope this project can act as a shop window for our products.” The pilot project will run for about a year. Guaranteeing Confidentiality Supporters’ photos are scanned and stored on an RWDM server, which is not connected to the Internet or to any other system. Only RWDM-authorized personnel have access to the data. Data collected by the entrance gate cameras is not recorded, guaranteeing confidentiality for the supporters. At this stage, the system is still in the test phase, and the facial recognition facility is not yet fully operational. The installation of the automatic gate at the beginning of 2019 will complete the planned program. 2017 April, Panasonic acquired a majority shareholding in Zetes and 2017 July completed the acquisition of 100% shares of Zetes. Zetes was founded in 1984, and employs 1100 employees in 21 countries in EMEA in 2016. Its headquarters is in Brussels.
Cosmo Music was established in Richmond Hill, Ontario, Canada in 1968. Its current 56,000 sq ft store opened in 2008, making it the largest music instrument store in North America. It is also home to the Cosmopolitan Music Hall venue. Needing to replace a 20-year-old analog video system, Cosmo Music Vice President and COO Rudi Brouwers, started researching modern video management software (VMS). Initially he intended to purchase IP cameras and a basic VMS with the ability to record and playback. But Brouwers soon learned of the vast capabilities of modern systems. He turned his focus to finding one that went beyond basic video management to offer business intelligence. Identify Suspicious Customers Brouwers ultimately decided on Axis cameras and Senstar’s Symphony VMS with its Face Recognition analytic In particular, he was interested in face recognition, which would enable Cosmo Music to identify suspicious customers to prevent shoplifting. Working with integrator Northern Alarm Protection Ltd. (NAP), Brouwers looked at a number of different systems, and ultimately decided on Axis cameras and Senstar’s Symphony VMS with its Face Recognition analytic. “I was sold on Symphony when I got to actually use it,” said Brouwers. “It floored me how easy it is to work, how straightforward it is. It is so user friendly it is unbelievable.” Brouwers likes several of Symphony’s core features, including: the ability to save video for up to six months (he had been hoping for 90 days) customization options (for example, recording only when motion is detected) ability to bookmark video the mobile app, which lets users connect to Symphony via a smartphone or tablet to view and playback video, control pan-tilt-zoom (PTZ) cameras, manage I/O devices, receive alarm notifications, and more. Face Recognition Analytic Before implementing Senstar’s Face Recognition video analytic, when a suspicious customer was identified through video surveillance, Brouwers would screen capture an image, email it to staff, and ask them to keep an eye out for that person. With Senstar’s Face Recognition video analytic, Brouwers can flag suspicious customers in Symphony. When that person enters the store again, Brouwers is automatically notified. One of our staff had a full beard one day and it was shaved off the next day and the system still picked him up" Brouwers tested the analytic thoroughly and was amazed by its capabilities. “One of our staff had a full beard one day and it was shaved off the next day and the system still picked him up,” said Mr. Brouwers. “That’s what sold me on it.” Symphony and the Face Recognition analytic, deployed on Senstar’s R-Series network video recorder (NVR) hardware, have been running at Cosmo Music since April 2018 and Brouwers couldn’t be happier. Business Intelligence Applications “It’s everything I dreamed of and more,” he said. From an integrator perspective, NAP, who had significant VMS experience but never used Symphony, thinks the product is a great option for business intelligence applications. “Symphony is the right fit for any application that requires enhanced security such as analytics. It’s superior to many other systems out there,” said NAP President and CEO Dave Koziel. “From a deliver what is promised standpoint, it’s 12 out of 10 on the scale.” Senstar’s Face Recognition analytic adds an additional layer of security to any video surveillance deployment Identify known and unknown individuals Create allow and deny lists, and be alerted when someone on that list is identified Save time and resources with a robust search functionality that lets users look for registered and unknown people in video Search across multiple cameras, and filter search results by match score or date and time Two-factor authentication processes for access control applications
Senstar, a global provider of video management and perimeter intrusion detection solutions, announces that its Symphony video management software and Face Recognition video analytic are helping to protect Cosmo Music. Working with integrator Northern Alarm Protection (NAP) Ltd., Richmond Hill, Ontario, Canada-based Cosmo Music selected Senstar after comprehensive research and testing to replace its 20-year-old analog video system. “Senstar Symphony delivers an all-in-one solution for video management, video analytics, perimeter intrusion detection system integration, and alarm management for deployments of all sizes,” said Justin Shorn, Senstar’s Vice-President of Product Management. “We are glad that Symphony’s core features and ease-of-use, along with our Face Recognition analytic, were able to meet Cosmo Music’s needs.” Flag Suspicious Customers Senstar’s Face Recognition analytic adds an additional layer of security to any video surveillance deployment and is a powerful tool for retail loss prevention. At Cosmo Music, the analytic is used to identify and flag suspicious customers and provide real-time alerts if a flagged individual enters the store, with the goal to prevent theft. “(During testing) one of our staff had a full beard one day and it was shaved off the next day and the system still picked him up,” said Rudi Brouwers, Vice-President and COO of Cosmo Music. “That’s what sold me on it.”
Princeton Identity Inc., a provider of secure biometric security systems, has announced the deployment of its Biometric Conex, designed to assist customers with quick and accurate personnel authentication for campuses and facilities. The Conex is a 20-foot long standard shipping container outfitted with on-the-move facial, iris and fingerprint biometric capture technology, which can be operational in less than 24 hours. Biometric Conex Princeton Identity is showcasing the Biometric Conex at the 2018 AUSA Annual Meeting & Exposition in Washington, DC The first two containers will be shipped in October to government facilities. Princeton Identity is showcasing the Biometric Conex at the 2018 AUSA Annual Meeting & Exposition in Washington, DC. The Conex’s combination of patented authentication technology and portable configuration give organizations the flexibility to deploy these high throughput, accurate authentication units anytime, anywhere. Biometric High-Throughput System The multi-modal, biometric high-throughput system offers more secure rapid personnel authentication and the following features: Face, dual iris, and 8 fingerprint rapid enrollment of personnel and on-the move multi-modal personnel identification Throughputs of over 15 people per minute Self-contained or networked configurations Allow list and watch list capable Can support large personnel database configurations Climate controlled, air conditioned and weatherproof Can be powered by a generator and comes with UPS backup Facility Entry Control The Biometric Conex eliminates these issues and provides a more accurate, seamless entry process Current facility entry control procedures generally rely on credentials or limited biometric information to allow entry. In many cases, these procedures can cause excessive queuing, require extensive manpower, and are limited in their identification accuracy. The Biometric Conex eliminates these issues and provides a more accurate, seamless entry process. It contains a rapid enrollment station to simultaneously register subjects’ biometric signatures – fingerprints, face and irises – which takes less than a minute to process. The fusing of these three separate biometric modalities ensures the highest level of identification accuracy and eliminates potential spoofing attacks. When subjects enter the Conex, they walk through at a normal pace without stopping or touching any sensors, gain clearance, and are granted access to the facility. Contactless Iris Authentication “The government engaged with Princeton Identity to provide these units because we are the only identification firm with patented walkthrough, contactless iris authentication capabilities to support large groups of people,” said Mark Clifton, CEO of Princeton Identity. “Our software and physical hardware provide versatile identity authentication solutions designed to verify and manage individuals’ identities for a wide range of physical security and access applications, and we are already exploring other commercial uses for the Biometric Conex.”
According to Save The Rhino statistics, over 1000 rhinos are killed annually in South Africa. These harrowing poaching statistics display a gloomy future for survival of this beautiful species. While many attempts have been undertaken over the past ten years to combat the devastating results of poaching, the country has not yet seen a steady decline in numbers year-on-year. It is with this knowledge that AxxonSoft’s Global Marketing Director, Colleen Glaeser, who is based in South Africa, decided to create a strategical and proactive anti-poaching approach, utilising the tools at her disposal, assisting a country in dire need of assistance. While Deep Learning, using Artificial Intelligence and neural network analytics in its algorithm, is not new to the security and surveillance industry, Colleen and the team at AxxonSoft global took the technology a step further, developing and implementing the software to help differentiate between humans and animals. Identifying Actual Poaching Threats AxxonSoft’s surveillance software, which leverages Artificial Intelligence and Deep Learning technology now alerts the operators in the control room to an immediate poaching threat The implementation of this technology in game reserves and parks across South Africa has certainly been a game-changer regarding the war against poaching. For two reasons namely; this neural network solution can identify actual poaching threats (distinguishing poachers from their prey) while providing a proactive surveillance solution as opposed to a reactive one. Predominately utilised for face and license plate recognition, Deep Learning technology has never been adapted to tell the difference between humans and animals. Prior to the incorporation of Deep Learning in anti-poaching surveillance, software often failed control rooms and response units in that false alarms were on many occasions, set off by animals, insects and weather. Control rooms were not able to tell the difference between an actual threat and a false alarm, which often resulted in exhausting resources as teams were dispatched for animals who had touched the fence while grazing in their natural habitat. AxxonSoft’s leading surveillance software, which leverages Artificial Intelligence and Deep Learning technology now alerts the operators in the control room to an immediate poaching threat as poachers try and breach the fence perimeter to enter the reserve or park. Proactive Surveillance Solution AxxonSoft’s Deep Learning technology provides a proactive solution to surveillance whereas previous systems were somewhat archaic and reactive in their response to real threats Global Marketing Director for AxxonSoft, Colleen Glaeser says, “Our Deep Learning technology has been extremely successful thus far in telling the difference between animals and humans as the neural network algorithm can identify, through certain indicators, whether a human or animal has set off the alarm. If the software detects a human, the operations team is immediately notified and a dispatch team is sent to the scene in question.” Furthermore, AxxonSoft’s Deep Learning technology provides a proactive solution to surveillance whereas previous systems were somewhat archaic and reactive in their response to real threats. Due to expansive terrain and limited resources, rangers and antipoaching units often get to the scene of the crime too late. With the AxxonSoft technology, as soon as the breach occurs, cameras will identify if the breach has been caused by an animal or human, and the control room is immediately notified as to where the occurrence has taken place in the reserve or park. The dispatch team is given the necessary information and they head to the site where the occurrence has taken place. Real-Time Identification Of Threats By utilising this technology, we have been able to take a proactive approach, identifying the threat in a real time situation" The beauty about Deep Learning and Neural Network analysis is in its ability to learn and understand the conditions which lead up to an event, and that ultimately allows us to prepare for threats or potential breaches when the known conditions are met. “AxxonSoft’s technology has proved very successful in preventing killings as the team is able to get to the scene of the crime quickly. “By utilising this technology, we have been able to take a proactive approach, identifying the threat in a real time situation. The AxxonSoft team and I really believe this anti-poaching solution can aid in the war against poaching and drastically bring down the upsetting statistics. I can attest to the fact that we have seen great success in curbing poaching,” concludes Glaeser.