Fleet surveillance
Balancing operational efficiencies and customer satisfaction with costs, resources, and legislative obligations is a challenge faced by every security services provider offering keyholding and alarm response. While mobile security operations must adhere to strict compliance, with BS 7984 standard and SIA licensing for guards at the very core of the operations, security providers are increasingly contending with a wider range of regulations. Among the most pressing are sustainability requirement...
Durite, a UK pioneer in transport safety, lighting and auto electrical parts for commercial vehicles, will unveil two of its latest innovations at this year’s FORS Annual Conference 2025, on 23 October at the International Convention Centre (ICC), Birmingham. The recently announced products reflect Durite’s continued commitment to advancing safety solutions for the transport sector, says the company. Approximately 1,800 bridge strikes occur annually in the UK, costing taxpayers an...
Intellian, the pioneer of mobile satellite communication antenna systems, is unveiling the all new 1m Global Xpress terminal, GX100NX at Intellian Asia-Pacific Partner Event held in Seoul, Korea. Intellian’s all new 1m Global Xpress terminal has been designed primarily for Inmarsat’s high-speed maritime satellite service Fleet Xpress and offers high-speed data rates and global operation with its high-efficient RF design. Cutting-edge modular design The antenna is future-proof supp...
The global maritime surveillance market is projected to grow from $21.9 billion in 2023 to $ 42.7 billion by 2033. This growth is being driven by increasing global trade, maritime security concerns, and the adoption of advanced surveillance technologies such as radars, drones, and satellite monitoring systems. Moreover, the global shipping industry is now on the frontlines of a new kind of conflict — one defined by economic coerc...
UVeye, the pioneer in AI-powered vehicle inspection technology, announced the appointment of Itay Erel as the General Manager of its UK and EU operations. This strategic hire is part of UVeye's ongoing efforts to broaden its footprint in European markets in order to offer advanced AI-powered vehicle inspection solutions to a wide range of partners, including pioneering dealerships, OEMs, and fleet operators. UVeye's vehicle inspection solutions UVeye has been operating in Europe since October...
Durite, a pioneer in vehicle safety, lighting, and auto electrical parts, will be showcasing its new AI Low Bridge Detection System at this year’s RTX show in Stoneleigh, on 24th-26th June. The Durite Low Bridge Detection System utilizes Smart AI-powered camera technology to detect and alert over-height vehicles to the presence of low bridges and also reads safety height signage. Durite’s range of vehicle safety The system is compatible with Durite’s range of vehicle safety...
News
Eviden, the Atos Group product brand, pioneering in advanced computing, cybersecurity products, mission-critical systems, and vision AI, announces the availability of a cybersecure and sovereign Ethernet switching solution, the XMC Ethernet switch card, specifically designed for mission-critical environments. This innovative solution uses a protocol break of communications to achieve the security and independence of critical communication systems. Designed and manufactured in France, this XMC-format Ethernet switch card is a sovereign alternative to market offerings. Ethernet switching solution It is produced at Eviden's Aix-en-Provence site in France by teams with expertise in mission-critical systems It is produced at Eviden's Aix-en-Provence site in France by teams with expertise in mission-critical systems. It complements Eviden's range of MLS Gateway solutions, which are multi-level security gateways designed for two-way communications between networks of different classifications. Eviden's new XMC Ethernet switch card is designed to protect data effectively. It incorporates powerful protection mechanisms that filter information, detect issues, and report anomalies to ensure secure and reliable transmission. XMC Ethernet switch card Eviden's XMC Ethernet switch card is configurable, allowing systems to evolve Coupled with the CPU card of a critical system, Eviden's XMC Ethernet switch card is configurable, allowing systems to evolve. It offers the ability to partition data between open and secure environments that require a break in protocol for security and confidentiality reasons. The card can be integrated on the mezzanine level with third-party embedded computers (air-land, naval or land-based) as well as with Eviden's multi-level gateway solutions (MLS Gateway). Designed for the highest levels of criticality, Eviden's XMC Ethernet switch card supports multiple protocols and is compatible with the AFDX standard, enabling seamless integration into existing avionics systems. It is also DO-254 DAL A certifiable and developed in accordance with standards that support certification to the CC EAL 4+ level. It incorporates technology from Cetrac.io, a specialist in hardware switching technologies and a partner of Eviden. Authority comment Bernard Payer, Head of Mission-Critical Systems at Eviden, Atos Group, said: "Eviden's XMC Ethernet switch card is a fusion of technologies designed to guarantee the security and compartmentalization of critical information flows without reliance on foreign technologies or operators.” “Our next-generation Ethernet switching solution provides operators in mission-critical environments with a sovereign solution in their hands, reflecting the know-how of our teams. I am particularly proud to announce the availability of this solution.” Eviden's XMC Ethernet switch card will be presented at SIAE, June 16-22, booth Avantix S3, GIFAS pavilion, hall 2B C140.
The Doha International Maritime Defense Exhibition and Conference (DIMDEX) announced Qatar Media Corporation (QMC) as its National Media Sponsor for the highly anticipated DIMDEX 2026 edition, taking place from 19 to 22 January, 2026, at the Qatar National Convention Centre (QNCC), in Doha, Qatar. Held under the patronage of His Highness Sheikh Tamim Bin Hamad Al-Thani, Amir of the State of Qatar, and hosted and organized by the Qatar Armed Forces, DIMDEX is set to welcome defense ministers, chiefs of staff, naval leaders, government officials, and industry executives from around the world for its ninth edition. DIMDEX 2026 This strategic partnership will leverage QMC’s extensive media network to amplify DIMDEX’s reach This strategic partnership will leverage QMC’s extensive media network to amplify DIMDEX’s reach, ensuring comprehensive coverage of the event’s key highlights, innovations, and strategic dialogs to the local and regional community. The agreement was signed by Staff Brigadier (Sea) Abdulbaqi Saleh Al-Ansari, Chairman of the Organizing Committee of DIMDEX, and Mr. Ali Saleh Al-Sada, Director of Qatar TV, in the presence of His Excellency Staff Major General (Navy) Abdullah Hassan Al Sulaiti, Commander of the Qatar Amiri Naval Forces. Highlighting DIMDEX’s global significance The renewed partnership with Qatar Media Corporation underscores the strategic importance of media collaboration in showcasing DIMDEX’s global significance. As demonstrated in previous editions, QMC’s extensive coverage has been instrumental in highlighting the event’s key themes, attracting international delegations, and fostering valuable connections within the maritime security and defense industry. Maritime defense and security technologies on display QMC will spotlight numerous key activities during the event, including the main exhibition QMC will spotlight numerous key activities during the event, including the main exhibition showcasing the latest maritime defense and security technologies; the Middle East Naval Commanders Conference (MENC), which addresses critical maritime security challenges; the participation of high-level delegations and industry leaders from around the world; and the Visiting Warships, among others Staff Brigadier (Sea) Abdulbaqi Saleh Al-Ansari, Chairman of the Organizing Committee of DIMDEX, said: “We are delighted to continue working closely with Qatar Media Corporation as our National Media Sponsor for DIMDEX 2026. Building on our long-standing relationship, this partnership ensures that we not only reach a wider audience, but also deliver impactful messaging that resonates with key decision-makers and stakeholders worldwide.” Exhibit new innovations and fostering vital collaborations Abdulbaqi Saleh Al-Ansari adds, “QMC’s reach and influence within Qatar and beyond are invaluable as we strive to connect the world’s maritime security and defense community, showcasing the latest innovations and fostering vital collaborations. QMC’s focus on delivering exceptional coverage mutually reinforces DIMDEX goals to enhance Qatar’s position on the international stage.” He adds, “We extend our sincere gratitude and appreciation to His Excellency Sheikh Saoud bin Abdulrahman bin Hassan bin Ali Al Thani, Deputy Prime Minister and Minister of State for Defense Affairs, and to His Excellency Lieutenant General (Pilot) Jassim bin Mohammed Al Mannai, Chief of Staff of the Qatar Armed Forces, for mobilizing all available resources to ensure the success of this important event for the Armed Forces.” Partnership supports national development goals Mr. Ali Saleh Al-Sada, Director of Qatar TV, expressed his gratitude to the Qatar Armed Forces and the Organizing Committee for renewing their confidence in Qatar TV as a strategic media partner. He affirmed that this partnership supports national development goals and reflects the institution’s capability to cover both national and international events, while enhancing the State’s media presence. Mr. Al-Sada also emphasized that Qatar TV will dedicate all its platforms to professionally covering the event’s activities in a manner that reflects its importance and promotes it both locally and internationally. He further expressed his appreciation for the strong support of His Excellency Sheikh Khalid bin Abdulaziz bin Jassim Al Thani, Acting CEO of the Corporation, commending his confidence in the capabilities of national talent. Role of Qatar Media Corporation (QMC) The Qatar Media Corporation (QMC) serves as the official media umbrella in the State of Qatar The Qatar Media Corporation (QMC) serves as the official media umbrella in the State of Qatar, encompassing various television and radio channels. The corporation diligently works to keep pace with the developments and advancements in media during the third millennium and strives to provide thoughtful content that contributes to development, aligns with the values of the State, and reflects its cultural identity and societal values. Four-day DIMDEX 2026 event Held under the theme: ‘A Global Hub for Defense Innovations: Invest in Possibilities to Shape a Secure Tomorrow’, DIMDEX 2026 is set to be the most impactful edition yet, bringing together key decision-makers, industry leaders, and government representatives from across the globe. The four-day event, a first in DIMDEX history, will serve as a key driver in fostering innovation, encouraging strategic investments in future-ready maritime technologies, and contributing to the creation of a safer and more sustainable maritime domain for future generations.
FLIR, a Teledyne Technologies company, will showcase its revolutionary maintenance portfolio that keeps manufacturers' equipment running smoothly and helps ensure product quality at Maintec from June 4 to 5, 2025, at NEC Birmingham, Stand: 5/K60. Meet with technical specialist Jason Cargill and Acoustics specialist Florian Wiedemann to discuss how FLIR's advanced thermal and acoustic imaging solutions bring precision, efficiency, and peace of mind by spotting hidden faults and preventing costly downtime. Acoustic imaging detection technology Acoustic imaging detection technology from FLIR addresses two critical challenges faced by industries: detecting pressurized air and specialized gas leaks in compressed air systems and monitoring partial electrical discharges in high-voltage systems. These issues not only pose significant safety risks but also lead to operational inefficiencies and increased maintenance costs. Several Acoustic imaging cameras will be on display The Si2-LD acoustic imaging camera detect and reduce leaks in facilities, thereby cutting costs associated The Si2-LD acoustic imaging camera detect and reduce leaks in facilities, thereby cutting costs associated with compressed air and specialty gas leaks. Beyond these capabilities, it also identifies mechanical faults, such as bearing issues, facilitating preventative maintenance to avoid downtime. It delivers unparalleled performance, enhances decision support, simplifies fleet management, and integrates seamlessly with enterprise data, setting a new standard in its class. Si2x The Si2x-LD Acoustic Imaging Camera is specifically designed for use in hazardous gas and explosive dust environments, to easily reduce leaks of toxic or flammable gases to improve safety, or cut expenses associated with compressed air or gas leaks in the facilities Si1-LD The FLIR Si1-LD is an easy-to-use acoustic imaging camera for locating and quantifying pressurized leaks in compressed air systems. This lightweight, one-handed camera is designed to help maintenance, manufacturing, and engineering professionals identify air leaks faster than with traditional methods. FLIR Thermal Imaging Condition monitoring identifies problems before failures occur in order to prevent costly production stops FLIR Thermal Imaging is a powerful, non-invasive way to evaluate Facility Performance, monitor and troubleshoot building envelope problems, electrical/mechanical failures, and HVAC issues, whether it’s at an apartment, office complex, or manufacturing plant. Condition monitoring identifies problems before failures occur in order to prevent costly production stops. Typical equipment that is monitored includes high- and low voltage installations, turbines, compressors, and other electrical and mechanical equipment. Thermal imaging product highlights FLIR ONE® Edge Pro: This thermal camera for smart phones allows users to take crisp thermal images from any angle. Improved battery time and ruggedness makes sure the camera is ready to use in more industrial environments. FLIR E8 Pro: The FLIR E8 Pro is the must-have tool for locating and diagnosing electrical, mechanical, and building problems. FLIR T865: The FLIR T865 thermal imaging camera is a non-contact inspection tool with 180° rotating optical block that allows users to safely and comfortably assess the condition of critical electrical and mechanical equipment in utility and manufacturing applications FLIR T540: This portable, ergonomic thermal camera with1-Touch Level/Span and continuous laser-assisted autofocus makes it the perfect non-contact diagnostic tool to detect potential faults in industrial, electrical, and mechanical systems, or discover temperature anomalies in R&D testing with the 464 × 348 resolution. 80° Wide-Angle Thermal Lens: The FLIR 80° lens is designed to enable maintenance managers, engineers, and mechanical technicians to keep an eye on assets in a large target area for continuous monitoring, condition monitoring, and early intervention of developing faults. FLIR C5: With the FLIR C5 in the pocket, users will be ready anytime to find hot fuses, air leaks, plumbing issues, and more.
Under the patronage of His Highness Sheikh Tamim Bin Hamad Al-Thani, Amir of the State of Qatar, the Doha International Maritime Defense Exhibition and Conference (DIMDEX), hosted and organized by the Qatar Armed Forces, is set to welcome global naval pioneers, defense ministers, chiefs of staff, government officials, and industry executives from around the world for its ninth edition, taking place from 19 to 22 January 2026 at the Qatar National Convention Center (QNCC). Held under the theme “A Global Hub for Defense Innovations: Invest in Possibilities to Shape a Secure Tomorrow”, DIMDEX 2026 will serve as a key driver in fostering innovation, encouraging strategic investments in future-ready maritime technologies, and contributing to the creation of a safer and more sustainable maritime domain for future generations. Latest technological advancements Further enhancing its standing, DIMDEX 2026 will expand to a four-day format for the first time ever Further enhancing its standing, DIMDEX 2026 will expand to a four-day format for the first time ever. The exhibition will offer participants exceptional opportunities for strategic dialogue and commercial exchange, as well as the chance to explore the latest technological advancements in the defense sector and maritime equipment. Staff Brigadier (Sea) Abdulbaqi Saleh Al-Ansari, Chairman of the Organizing Committee of DIMDEX, stated: "We are honored to host the ninth edition of DIMDEX as a four-day event. Our theme, ‘A Global Hub for Defense Innovations,’ reflects our commitment to offering a vital platform for the international maritime defense and security community to connect, collaborate, and invest in innovations that will define the future of global security.” Latest advancements in maritime defense and security With a significant number of exhibitors expected at this biennial event, DIMDEX 2026 will showcase the latest advancements in maritime defense and security through its four key components: the Exhibition, featuring pioneering international defense companies; the Middle East Naval Commanders Conference (MENC), a forum for discussing critical issues that play an important role in shaping the features of the defense sector; VIP Delegations, providing exhibitors unparalleled access to key decision-makers; and the Visiting Warships Display at Hamad Port, offering a glimpse into modern naval capabilities. This integrated approach ensures a comprehensive and impactful experience for all participants. Maritime defense and security community DIMDEX remains steadfast in its mission to advance the global maritime defense and security community DIMDEX remains steadfast in its mission to advance the global maritime defense and security community, playing since its inception a vital role in providing a pioneering platform for showcasing the latest defense and maritime technologies and facilitating strategic dialogues that contribute to strengthening security and defense at both national and international levels. DIMDEX's success has attracted major local and international companies, as well as a diverse spectrum of high-level delegations from around the world, further solidifying its position as a key meeting point for stakeholders in this vital sector. Qatar’s economic development The previous edition of DIMDEX welcomed a record-breaking 25,000 visitors, with even greater attendance expected for DIMDEX 2026, underscoring the event’s growing influence and global reach. DIMDEX continues to showcase cutting-edge defense innovations, cultivate strategic partnerships, and unlock meaningful commercial opportunities. Beyond its industry impact, the event significantly contributes to Qatar’s economic development by drawing thousands of participants and visitors to Doha, while reinforcing the country’s long-term vision for enhanced security and prosperity, in alignment with the Qatar National Vision 2030.
Apricorn, the pioneering manufacturer of software-free, 256-bit AES XTS hardware-encrypted USB data storage devices, now announced the findings from its annual Freedom of Information (FoI) requests into device loss and data breaches across major government departments in 2024. The figures indicate that device security issues remain endemic across the public sector, with several departments reporting an increase in lost and stolen devices compared to the previous year, despite attempts to address the issue. Sensitivity of the information HM Revenue and Customs (HMRC) alone accounted for 804 of these losses, including 499 mobile phones Across the 17 departments questioned, more than 1,200 organizational devices were reported lost or stolen between January and December 2024. HM Revenue and Customs (HMRC) alone accounted for 804 of these losses, including 499 mobile phones. While this represents a modest decrease compared to the 1,015 devices lost by HMRC in 2023, the number remains troubling given the sensitivity of the information the department handles. Flagged legacy devices A large number of the reported phone losses were the result of an internal audit that flagged legacy devices replaced with newer models, highlighting ongoing inventory management challenges. Other departments showed a more worrying trend with The House of Commons reporting 100 devices lost or stolen during 2024, a significant increase from 65 devices the previous year. Similarly, the Department for Education (DfE) saw device losses climb from 78 in 2023 to 107 in 2024. HMRC’s numbers DESNZ also reported a rise, from 122 lost devices last year to 150 this year The Department for Energy Security and Net Zero (DESNZ) also reported a rise, from 122 lost devices last year to 150 this year. Meanwhile, the Department for Science, Innovation and Technology (DSIT) reported 113 missing devices. "Although HMRC’s numbers suggest some improvement following internal audits, the continued high levels of device loss across government departments show that fundamental issues have not been resolved," said Jon Fielding, Managing Director, EMEA, Apricorn. "Every lost or unaccounted device carries a risk for those individuals whose data could be exposed." Extent of personal data breaches The findings also reveal the extent of personal data breaches, with The House of Commons disclosing 49 incidents involving personal data during 2024, up from 41 reported the previous year. Despite these breaches, the House of Commons has not had to disclose any such personal data breach to the Information Commissioner’s Office (ICO) in this period. The figure highlights the continued vulnerability of sensitive personal information within Parliament and other institutions. Data breaches and reports Seven departments are still yet to respond within the deadline, including MoD Police Force, British Army Worryingly, several departments that had previously been forthcoming with breach and incident reporting have declined to respond in full this year. The Ministry of Justice (MoJ) and the Department for Education (DfE), for example, both refused to disclose details on data breaches and reports made to the ICO, citing exemptions under Section 24(2) of the Freedom of Information Act (FOIA). The exemption states that there is no duty to confirm or deny whether the requested information is held if doing so would prejudice national security. Seven departments are still yet to respond within the deadline, including MoD Police Force, British Army, British Navy, Royal Air Force, Royal Marines, UK Health Security Agency, and the Home Office/HM Passport Office. Holistic approach to data protection Fielding added, "This growing lack of transparency raises further questions about the true scale of data breaches occurring within government departments and the threat to data. While all departments confirmed their devices are encrypted, they must be supported by strong back-up protocols, inventory control, and employee awareness programmes." "A holistic approach to data protection, including frequent audits, multiple back-up copies, and rigorous disaster recovery testing, is essential to minimize the risks posed by device loss and theft."
Orca AI, a pioneer in maritime technology, announced it has closed an investment of $72.5 million in Series B funding. Brighton Park Capital led the round with participation from existing investors Ankona Capital and Hyperlink Ventures. The investment will enable Orca AI to further its autonomous platform, add new capabilities and enter new categories, including defense and security. Autonomous shipping capabilities The funding will maintain the company’s role as the market pioneer in autonomous shipping The funding will also strengthen the company’s position as the market pioneer in autonomous shipping. The completion of this round brings Orca AI’s total funding raised to $111 million with OCV Partners and Mizmaa Ventures also participating in previous rounds. Founded in 2018 by CEO Yarden Gross and CTO Dor Raviv, Orca AI is revolutionizing the traditionally opaque, conservative shipping industry with AI-powered decision-making and autonomous shipping capabilities. Marine visual dataset The company has the world’s largest marine visual dataset, built from over 80 million nautical miles. Powered by advanced AI and computer vision, this dataset forms the foundation for unmatched situational awareness capabilities in ocean navigation, helping captains and crew members identify risks and targets that cannot be spotted with the human eye. By delivering AI-based alerts and recommendations, Orca AI is able to significantly reduce the probability of collisions that have a severe economic and human impact, so crews can focus their attention on the most critical parts of their voyages. Orca AI’s alerts system Orca AI’s technology delivers significant improvements in operational decision-making and voyage safety Orca AI’s technology delivers significant improvements in operational decision-making and voyage safety. A 2024 analysis of Orca AI’s alerts system showed a 54% reduction in close encounter events, which improved overall safety and reduced associated accelerations. In turn, this led to an average of $100,000 savings in fuel per vessel per year – translating to a total estimated reduction of 195,000 tons in CO2 emissions in 2024. How the advancements in AI and connectivity "At Orca AI, we are constantly pushing the boundaries of what is possible when AI supports human decision-making at sea," said Yarden Gross, CEO and Co-Founder of Orca AI, adding "Over the past two years, ships have become increasingly connected to the cloud, enabling large-scale data collection and unlocking the potential of AI. Orca AI is pioneering this transformation, deploying advanced AI technologies that make vessels smarter, safer, and more automated." He continues, "We are grateful to have forward-thinking investors who, like us, can see how the advancements in AI and connectivity are opening up new opportunities to enhance autonomous shipping, which will define the future of maritime operations." New standard for the shipping industry Orca AI’s platform is trusted by major global shipping companies, including MSC, NYK, Scorpio, and Seaspan "By combining innovation and deep maritime industry expertise, Orca AI is setting a new standard for the shipping industry, driving remarkable advancements to dramatically improve nautical safety and operations, while charting the course towards autonomous shipping," said Ezra Berman, Vice President at Brighton Park Capital. Sam Kentor, Partner at Brighton Park Capital, continued, "At Brighton Park, we are proud to support founder-led companies like Orca AI that harness frontier technology to address complex challenges and deliver real impact. We look forward to collaborating with the Orca AI team as they build a more resilient global supply chain." Improvement in connectivity in remote waters Orca AI’s platform is already trusted by major global shipping companies, including MSC, NYK, Scorpio, and Seaspan. By helping mitigate accidents and operational issues, Orca AI enables hundreds of vessels to save billions of dollars in potential damage each year. The significant improvement in connectivity in remote waters, driven by satellite-based services like Starlink, allows real-time data to be transmitted to Orca AI for mapping routes, traffic monitoring, and sharing critical information. This capability is key to developing autonomous navigation, providing an unprecedented level of precision in vessel monitoring.


Expert commentary
Open platform video technology software is more than just a product; it's a tool that helps customers achieve their desired business outcomes. Safety, round-the-clock security, and increased operational efficiencies are now the norm due to video technology. Responsible Technology Despite humanity’s impressive technological advances, we also recognize the immense responsibility that comes with technological innovation. It's not enough to focus solely on the positive impact video technology can make, we must also be vigilant in identifying and addressing any potential negative consequences it can have on society and its citizens. This is the role of Responsible Technology. Data privacy We want to use all the good things that technology innovation brings, whether it be video, AI, ML, facial recognition, etc. We want to use all the good things that technology innovation brings, whether it be video, Artificial Intelligence, machine learning, facial recognition, etc. to serve people in societies in a responsible way. That means making sure that we regulate technology in a way that respects human rights and data privacy. Addressing the challenges The challenge is, that rather often technology leaders and policymakers either have conflicting interests or collaborate too late. To be responsible, business leaders must support their societies and policymakers in making regulations in the interest of the common good. At Milestone Systems, we are actively looking at how we develop our software responsibly, how our partners responsibly sell our software, and very importantly, how our customers use our software with a responsible mindset. Ensuring good corporate governance As a long-time partner within the security industry, we’re celebrating our 25th Anniversary this year, we are supporting the regulation of video technology for the good of society. However, it of course needs to strike the fine line between the right legislation and not hindering innovation. UNGP The UNGP is the most authoritative and widely adopted set of principles for responsible business At Milestone Systems, we want to play an active role in this and that is why we have pledged our support to the UN's Guiding Principles on Business and Human Rights (UNGP). The UNGP is the most authoritative and widely adopted set of principles for responsible business. The principles call on governments and companies to identify, prevent, mitigate, and remedy actual and potential human rights abuses. Since its launch in 2011, the UNGPs have received wide support from states, civil society organizations, and the private sector, making them the key global foundation for business and human rights. Protect, respect, and remedy Through this commitment, we are taking steps to ensure good corporate governance and ethical standards in the development of our technology. We're generating mechanisms to prevent misuse and we are building educational practices internally. Based on the UNGP’s three pillars: protect, respect, and remedy, we are developing a set of Responsible Technology Principles and procedures for the development, selling, and use of our products. Need for video technology regulation In addition, we are currently evaluating all the various technology areas in which our video software can be used, such as with third-party integrations that utilize e.g., facial recognition. We are mapping out the advantages and disadvantages for societies. One key area of concern is how local authorities are mapping and storing data about us as individuals. This is the reason why we're inviting more legislation to regulate video technology rather than less. Engaging With policymakers We are meeting ministers and trade organizations as we believe this needs to be a joint effort where all parties are heard We are proactively reaching out to and connecting with policymakers and other relevant stakeholders to discuss our approach to and take on Responsible Technology and encouraging the political landscape to work with us around regulation and legislation. We are meeting ministers and trade organizations as we believe this needs to be a joint effort where all parties are heard and where we can openly weigh the advantages and the challenges of technology, whether it is video, facial recognition, machine learning, Artificial Intelligence, or other technologies. Striking a balance Implementing Responsible Technology is a journey, not a destination. To give it the focus needed, we have created a dedicated team to implement this initiative at Milestone Systems. At the same time, we are reaching out to the political landscape to discuss how we balance regulation without hindering innovation. Video technology used ethically We are a global company with worldwide operations, and we are having dialogues about how video technology is being used and how we can have meaningful talks about what regulation and legislation should look like. However, we don’t necessarily want to limit access to the technology itself. Facial recognition We encourage the policymakers to engage with us in the industry so that together we can strike the fine line Facial recognition is a great example of this. The EU is considering making live facial recognition illegal. That would be a huge inhibitor of proactive terrorism prevention. For example, if a well-known terrorist is walking down the street and is being mapped out against Interpol’s most wanted list, the authorities should be able to react. However, if a person walking down the street but is not mapped out or does not have any priors then the city should not be allowed to store the data of that individual’s whereabouts at that point in time. This potential legislation is concerning to me as a citizen of Europe. Instead, we encourage the policymakers to engage with us in the industry so that together we can strike the fine line for the better good of all of us. Maintaining high ethical standards We have a firm understanding and expectation that ethical standards are a huge driver in the security business. Citizens are not in favor of technology companies abusing data about them and monetizing from things that they have not opted in to do. Soon, I think we will see many more companies and governments leaning toward suppliers that do have a responsible mindset and high ethical standards for partnerships. Ethical practices Our journey toward Responsible Technology is an ongoing process, and we must remain steadfast in our commitment to ethical practices and the protection of human rights. We recognize that the rapidly changing technological landscape continually presents new challenges and opportunities. For this reason, we continuously look into how we can improve, for example, our end-user license agreements to avoid potential human rights abuses. An industry responsibility Security companies must prioritize careful planning and preparation, including developing policies and procedures For Responsible Technology to truly become a reality, compliance with international human rights laws and data privacy regulations is critical. Security companies must prioritize careful planning and preparation, including developing policies and procedures that govern the ethical use of video surveillance systems. The secure and ethical community In today's technology environment where deep integrations, machine learning, and artificial intelligence are becoming the norm, Responsible Technology is more relevant than ever. The security industry has a unique opportunity to set an example for other sectors by promoting a secure and ethical development community that prioritizes Responsible Technology, trustworthy data collection, and the protection of human rights. We must all rise to this challenge and embrace our role as ethical leaders for the greater good of both people and societies.
Inadequate security measures on your essential infrastructure can have severe consequences. Consequences Consider the rail industry: If a vandal cuts the cables on a vital mechanism that controls train signals, train safety is jeopardized. To avoid train collisions or derailments and thus significant damage to property and potential loss of life, the operating company must shut down the service until the infrastructure is repaired and the network is up and running again. The disruption affects the rail ecosystem itself, but also the people using the trains, the transportation of cargo, and more. The financial cost of repairing the damage, restoring signal functionality, and compensating for delays can be substantial. For another example, consider electrical substations: A fire or targeted attack can damage the system and lead to devastating power outages. Traditional surveillance limitations Traditional video surveillance has its limits when it comes to protecting transformer stations Traditional video surveillance has its limits when it comes to protecting transformer stations. The facilities are often located in rural areas, where straying animals or flying leaves trigger false alarms. 3D Surveillance solutions overcome these challenges by volumetrically securing the area and immediately detecting intruders only raising the alarm in the event of a human intruder and even identifying drone attacks. Protecting critical infrastructure with 3D surveillance Critical infrastructure must be monitored. It remains at risk if operators do not have systems for monitoring entire areas rather than just the periphery if security personnel has limited information in case of an intrusion and if security response protocols are not automated. 3D Surveillance solutions 3D Surveillance is an important tool for protecting critical infrastructure and ensuring the safety of those who rely on it. Integrating LiDAR technology, 3D Surveillance solutions provide a comprehensive view of the area being monitored with real-time monitoring and response, protecting critical infrastructure from damage and providing a more comprehensive security system. Advanced analytics and artificial intelligence Security personnel can identify and verify threats more easily and track the movements of individuals or vehicles, as well as respond to incidents as they happen. 3D Surveillance systems can be equipped with advanced analytics and artificial intelligence (AI) capabilities to detect patterns and anomalies that may indicate a potential threat. This can help to prevent potential attacks or accidents before they occur, as well as enable more accurate responses to incidents. Talent challenge Turning to autonomy by implementing sensor- and software-based solutions requires fewer if any, in-person patrols 3D Surveillance can also help tackle the talent challenge in the industry: Recruiting security professionals involves extensive background checks, and jobs in the industry are notorious for their low salaries, which results in high staff turnover. Turning to autonomy by implementing sensor- and software-based solutions requires fewer if any, in-person patrols and ensure reliable infrastructure protection. Additional security measures In many countries, more stringent legislation now mandates the implementation of additional security measures to safeguard critical infrastructure, particularly at a country's points of entry, such as airports and harbors. Protecting the perimeter is no longer enough. For instance, airport management must ensure that critical areas, including the space around aircraft and near unauthorized access points, are secure. While multi-layered screening of individuals at the perimeter is a valuable security measure, it must be complemented by smooth and efficient surveillance of the entire area, which can only be achieved through advanced technology. Different adoption rates 3D Surveillance technology is only beginning to gain traction in most locations, and adoption rates differ significantly from one region to another. For instance, Scandinavia and Eastern Europe have embraced 3D Surveillance to a greater extent than Western Europe. Regions with lower adoption rates will likely catch up as they seek to reinforce the security of their critical infrastructure, especially given the conflict in Eastern Europe. Vandalism and damage protection 3D Surveillance enhances the security of critical infrastructure, reduces the risk of downtime and loss of revenue 3D Surveillance offers reliable protection against vandalism and damage - major concerns for companies that rely on critical infrastructure. LiDAR-based, software-enhanced 3D Surveillance solutions provide real-time insights and enable automatic processing of the information so that operators can autonomously and quickly detect and respond to potential threats. These solutions are scalable and customizable, allowing companies to adapt their security measures to their unique needs and changing environments. 3D Surveillance enhances the security of critical infrastructure, reduces the risk of downtime and loss of revenue, and ensures compliance with regulatory requirements. Asset management and maintenance planning Beyond its security benefits, 3D Surveillance can help with tasks such as asset management and maintenance planning. It can help identify potential problems or maintenance needs before they become more serious issues by providing a real-time view of the monitored infrastructure. This can help to reduce downtime and keep critical infrastructure running smoothly. Real-time management The same technology can also perform volume monitoring tasks and thus facilitate the management of valuable resources such as bulk material, grain, wood chips, or chemicals. By scanning the stock 24/7 and automatically calculating stock volume updating records in real-time, this technology supports lean production systems and automated processing.
The security industry is going increasingly digital these days, with more small- and medium-sized businesses joining their global brethren by moving their data to the cloud, leveraging the benefits of artificial intelligence, and embracing more open solutions. Innovation is expected to continue at a rapid pace, thanks in part to the residual effects of the pandemic which has driven changes that might have otherwise taken five years or a decade or more to get into customers’ hands on a global scale. Let’s take a look at the trends that will dominate ISC West 2023. Improved analytics Analytics is about expedience, and in the surveillance world, it makes it possible to identify and search for the “who did it?” clip you need. For analytics, along with the cloud, it comes back to the core themes of being able to do more with technology Analytics also provides more actionable intelligence than a simple surveillance camera may provide, from identifying high-traffic areas during select times of the day and alerting staff to pay greater attention to these areas, to business intelligence that can enable a company to staff a store with more employees. For analytics, along with the cloud, it comes back to the core themes of being able to do more with technology and relying less on humans. Leveraging the cloud The cloud story is very related: it provides the ability to perform video-related tasks from anywhere on any device. In addition, the cloud makes it easier to share videos with other stakeholders and collaborate on investigations. By storing video on the cloud, end users reduce their total cost of ownership because they no longer have to invest in onsite storage solutions, while gaining greater storage capabilities and thereby future-proofing their solutions. Deployment patterns Because the cloud requires a less total cost of ownership and can be intuitive, it is driving interest in solutions Another interesting trend that we’ll be hearing more about this year is the overall deployment patterns of video surveillance systems. This is part of the cloud trend, but the broader trend is the amount of effort it takes to deploy, monitor and maintain the video surveillance system. Because the cloud requires less total cost of ownership and cloud access can be intuitive, it is driving interest for solutions that can be hosted in the cloud. Interoperability vs. proprietary Related to the debate of open vs. closed solutions is how much the surveillance market prefers a turnkey solution compared to a more custom best-of-breed and tailored solution. Smaller and mid-market companies will be more interested in the turnkey solutions provided by a single vendor, while enterprise-level companies traditionally gravitate toward investing in customized solutions that are more likely to address their unique security challenges. One other related trend to keep an eye on is the role of the integrator as part of the rise of cloud and Video Surveillance as a Service (VSaaS) offerings.
Security beat
Security professionals are recognizing the intelligence value of leveraging publicly and commercially available information. This information can now be accessed more effectively from typically hard-to-reach regions. Also, the technological capabilities have matured in our age of artificial intelligence, machine learning, and data science. Intelligence has historically been based on classified data. However, today’s unclassified data, including open-source intelligence (OSINT), is increasingly being used to provide context and queuing for other types of intelligence. Advanced identity intelligence Babel Street is a technology company providing advanced identity intelligence and risk operations using an AI-enabled data-to-knowledge platform to unlock insights from a flood of data. The company provides advanced data analytics and intelligence for the world’s most trusted government and commercial organizations. Experts have predicted that by 2025 over 463 exabytes of data will be generated each day globally The sheer volume of data is growing exponentially. Experts have predicted that by 2025 over 463 exabytes of data will be generated each day globally. Not only are we seeing exponential growth in the volume of data, but there is also disparity in the veracity and the variety of data. This is being compounded by the ‘app economy’ in which data is created in a new format for every app added around the globe. Human language technology “The problem is that the data ‘junk’ and the ‘crown jewels’ are in the same bucket, and government and commercial entities need better and faster ways to extract intelligence from these torrents of data,” says Farid Moussa, VP, Strategy & Public Sector, Babel Street. Prior to joining Babel Street, Farid retired from the National Security Agency (NSA). He has guided video, image, speech, and text analytics (VISTA) and developed an appreciation for human language technology. An elusive source of data is the Dark Web, where every user, by design, is attempting to obfuscate their identity, and bad actors are hiding much better. “This presents a cat and mouse game – the cat must be smarter than the mouse, but the mouse is continually getting smarter,” says Moussa. Intelligence tools for data analysis SIGINT and HUMINT – while both vital – are also the most expensive forms of intelligence There are several intelligence tools for analyzing data. One of them is signals intelligence (SIGINT), which refers to electronic transmissions collected by ships, planes, ground sites, or satellites. Another is human intelligence (HUMINT), which is collected in a human-to-human fashion. Open-source intelligence (OSINT) is obtained by searching on topics or entities of interest that are publicly available on the Internet at large. Today, these various categories are often done in ‘silos of excellence.’ However, the best practice is using all forms together in a holistic fashion. SIGINT and HUMINT – while both vital – are also the most expensive forms of intelligence, while OSINT, which is growing in importance, is most cost-effective. All are vital forms of intelligence; OSINT is complementary and crucial to holistic intelligence practices. Holistic intelligence practices When it comes to physical security of people and places, OSINT has become a critical source of actionable information. Security directors leverage Publicly Available Information (PAI) to safeguard against threats to individuals, property, travel routes, and event sites. By monitoring PAI, security teams can detect and respond to potential dangers, including during and after events where thorough preparation is vital. Online information can contain warning signs of impending threats. It informs security professionals in uncovering digital traces, confirming intentions, and addressing risks across language barriers, ensuring proactive risk management for the protection of people and property. Role of Natural Language Processing (NLP) The Internet and social media were mostly English language by default, but that has changed exponentially Natural Language Processing (NLP) is a crucial capability that has evolved to recognize the richness and variety of words and names in multiple languages and scripts, and their use across cultures. Using machine learning and linguistics algorithms, the technology simultaneously considers numerous types of name variations. At one time, the Internet and social media were mostly English language by default, but that has changed exponentially. Babel Street’s world-class entity matching technology measures over 100 features to calculate the similarity of entities across multiple languages. Despite advances in data management and the cloud, there are still multiple challenges and complexities with integration of these data elements. Challenges include spelling variances/phonetics, language translation issues, criminal evasion, human error upon input, typos, etc. Accessing data from a scattered landscape While there have been advancements in cloud technologies, agencies utilizing open-source data are typically working within a highly scattered data landscape and must use a wide array of tools to get at the relevant pieces. This fragmentation makes it difficult to run analytics and apply AI and machine learning at scale in order to derive actionable insights. Unstructured and relationship data are visualised through advanced link analysis As with many disciplines, artificial intelligence (AI) is changing the game when it comes to intelligence. NLP and AI algorithms are employed to enhance datasets for greater quality, usability, and completeness. Unstructured and relationship data are visualized through advanced link analysis, geographic heat maps, influential entity carousels, topic clouds, and patterns by time and day. Geographic heat maps The advanced algorithms accurately score and prioritize critical entities within the relationship network while providing the citations from which an AI/ML-based decision was made. “With the democratization of AI, the world is becoming flat,” says Moussa. “Just like the most prosperous countries, even the poorest countries have the most advanced capabilities to do damage. Third-world economies often present a scenario where the financial gain of nefarious schemes and low-to-no regulation combine to incentivize bad actors.” The Challenges of Name Matching Identity has been an ongoing challenge for intelligence analysis due to the vast complexity of linguistics, spelling and cultural variances, human error, as well as human evasion. Technology and data science approaches are maturing, however machine translation can still struggle with meaning. The best-of-breed natural language processing capabilities run against the data while it still is in its native language. This minimizes the occurrence of analytic errors caused by inaccurate machine translations. This minimizes the occurrence of analytic errors caused by inaccurate machine translations It’s tempting to think that name matching is like doing a keyword search. The complexity of language makes it more challenging. New names are constantly created, with multiple spellings and no set of rules to encompass how names are formed. They are variable across languages, scripts, cultures, and ethnicities. Culturally specific nicknames and aliases add to the complexity. Replacing human involvement The investigation of the Boston Marathon Bombing in 2013 spotlighted an example of the significance of intelligence analysis. Even though the FBI had issued a detain alert for Tamerlan Tsarnaev back in 2011, Tsarnaev managed to travel to Russia in January 2012; and in July 2012, he returned to Boston. He was not detained on either occasion because there were too many names on the lists, and Tsarnaev’s last name had been spelled differently from the way it was on travel documents, thus enabling him to get through security. With the Internet, social media, and the dark web, there’s been an exponential increase in public communications in various languages, adding significantly to the amount of analysis required to keep societies safe. Name matching, using AI, analyses multiple contextual data points across languages to arrive at matches. Name matching, using AI, analyzes multiple contextual data points across languages to arrive at matches A common misconception is that this technology will replace human intelligence. “It’s more accurate to recognize its role as a force-multiplier, allowing humans to focus on the on the harder problems and/or vetting the results of AI,” says Moussa. “The technology can efficiently analyze massive volumes of data and distill it into actionable information in a timely manner. It augments human capabilities, enabling analysis at speed and scale beyond human capacity, without replacing human involvement.” Commercial Technology to the rescue “When it comes to threat and identity intelligence, we face a risk-confidence gap, underscored by the challenge of integrating traditional tactics with the modern digital landscape,” adds Moussa. “We cannot ‘hire’ our way out of this problem. Instead, it is imperative that we adopt technology to scale our efforts and free humans to solve the harder problems that machines cannot solve yet.” The public sector loves to build things, but there are time-to-value and return-on-investment considerations to the ‘build or buy’ decision. When commercial technology can be leveraged by government, it frees resources up to work on problems that the commercial world hasn’t yet figured out, says Moussa. “The public and private sectors need to come together – one team, one nation, working together with mutual trust and collaboration,” he says.
Operational technology (OT) uses hardware and software to monitor and control physical processes, devices, and infrastructure. Historically, OT systems were not connected to the Internet and were therefore not vulnerable to cyber-threats. Internet of Things (IoT) However, today’s OT systems are increasingly part of a company’s networks as technologies converge and the Internet of Things (IoT) gains prominence. No longer can OT systems be counted on to be “air-gapped,” that is, not connected to other systems. When OT systems are vulnerable, companies face a “cyber-physical risk.” A bad actor could create a catastrophic risk in the physical security world by compromising OT systems. To understand more about OT and the related cybersecurity concerns, we spoke with Lisa Hammill, VP of Commercial Markets for Shift5, a company that applies cybersecurity best practices to OT systems and networks, thus dramatically reducing their cyber risk. Q: What is operational technology (OT)? How are the cybersecurity concerns for OT different than those for information technology (IT) systems? Hammill: Operational technology (OT) refers to the computer systems that underpin critical infrastructure, enabling it to run continuously and reliably. For example, planes and trains rely on OT to execute basic flying or driving commands. OT cybersecurity solutions for planes, trains, or weapon systems must be capable of the basics of IT cyber-hygiene Most OT is built on legacy technology manufactured before cybersecurity became a priority and relies on serial bus networks like MIL-STD 1553, CAN 2.0, or RS-232, instead of the standard TCP/IP communications protocols that IT security solutions can monitor and defend. Any effective OT cybersecurity solution for planes, trains, or weapon systems must be capable of the basics of IT cyber-hygiene, including ensuring signed software and firmware updates, full data capture, and continuous monitoring and detection aboard planes, trains, and weapon systems. This all makes cybersecurity for onboard OT difficult, but not impossible. Q: What is a “cyber-physical risk” and why is the term important? Hammill: Cyber-physical systems integrate digital components into physical objects and infrastructure; we focus on critical infrastructure like transportation as well as weapon systems. Cyber-physical risks manifest when actors intrude on these delicate processes to manipulate real-world outcomes, whether that’s grounding plane flights, or disabling train brakes. The risks of attacks facing OT within cyber-physical systems are highly consequential, can cause disruptions to civil society, economic disruption, and potential harm to citizens, as well as shift the balance of power in military conflict and geo-political matters. Q: Please describe the breadth of the risks when it comes to OT cybersecurity. Hammill: Cyber-physical attacks can jeopardize business and mission-critical operations, and risks are highly consequential when it comes to transportation systems, creating safety risks for operators and passengers, economic impact, and millions in downtime losses, remediation, and ransom payments. Transportation is a particularly vulnerable sector of critical infrastructure. An attacker could leverage a tested playbook to disrupt operations with minimal effort As we’ve seen from recent attacks demonstrating the attackers’ focus is trained on this space. The motivation of an attacker will vary, but for example, let’s say a bad actor wanted to target an aircraft to disrupt service and ground a flight. There have been examples of basic cyber-attacks targeting noncritical aircraft systems; however, many of these systems remain vulnerable. An attacker could leverage a tested playbook to disrupt operations with minimal effort. An attacker could target a system considered least critical to passenger safety systems categorized as a Design Assurance Level E (DAL E) like an in-flight entertainment system. This type of system has been hacked before and could be used as a vector for a ransomware attack. If an attacker takes control of video screens on seatbacks mid-flight, they would certainly damage passenger trust. They would also likely try to move up the design assurance level chain to gain further access. For example, when a plane pulls into a gate, communication between the aircraft and airline operations happens automatically. An attacker could exploit this connection to move from one system to another. If an attacker gets into those communications channels, they could alter data or hold it hostage, while the airline halted operations to resolve the issue. Q: What industries/markets are most vulnerable to OT cybersecurity threats and why? Hammill: Operational technology lacks the historical focus on cybersecurity that IT has, and basic best practices are nascent for OT industry-wide. Cyber-attacks targeting Colonial Pipeline and Florida's water systems (in 2021) have spurred those industries into action to prioritize cyber hygiene. The aviation and rail industries are watching and taking proactive steps to prevent such cyber-attacks. As weapons systems and vehicles on roads, rail lines, and in the air add on new technology, they are at risk of cyber-attacks Shift5 defends planes, trains, and weapon systems because these vehicles leverage a vast swath of distinct serial bus networks and protocols unseen in other critical infrastructure technologies. We have experts creating a tool that can monitor and detect traffic aboard these bespoke networks. And as weapons systems and vehicles on roads, rail lines, and in the air add on new technology, like autonomation, they are increasingly at risk of cyber-attacks. Q: What are the various sources of OT cybersecurity risks (e.g., other governments, individual hackers, criminal organizations, etc.)? Which are the most urgent and/or pervasive? Hammill: Because of their ability to cause deeply consequential impacts on the business, economy, and human safety, OT cybersecurity risks must be considered scrupulously. Attackers targeting OT could have a range of motivations, from financial gain or market advantage through the theft of intellectual property, to insider threats and geopolitical advantage in a contested environment. It’s no secret that most malicious adversaries choose the path of least resistance when developing their attack strategy. When OT is aboard planes, trains, and tanks, we’re only in the early innings of creating obstacles for those actors to overcome. One threat we’re watching closely is the evolution of ransomware targeting OT. Digital extortion could cause operational disruption and impact consumer trust. Q: What is the Shift5 approach to cybersecurity? Hammill: Shift5 extends 40 years of expertise in adversarial tactics, techniques, and procedures from IT endpoint security into the OT world. For the first time in history, operators can apply cybersecurity best practices to OT systems and networks, dramatically reducing their cyber risk. Shift5 allows rail, aerospace, and defense to generate data-informed insights and make accurate decisions Shift5 brings complete observability and threat detection to OT systems as cyber-physical attacks become an increasingly attractive strategy for digital attackers. By providing visibility into the data that powers their most expensive, longest-lived, and most consequential fleet assets, Shift5 allows rail, aerospace, and defense companies to generate data-informed insights and make timely, accurate decisions once considered impossible. Q: Has OT cybersecurity trailed IT cybersecurity in terms of awareness? If so, why is it true, and how can organizations become more aware (and more prepared) of OT cybersecurity risks? Hammill: OT cybersecurity is nascent compared to IT security, but the industry is catching up. While most organizations understand the importance of visibility and observability in IT systems to enable their defense, very few have this same level of oversight for their most expensive, consequential, and longest-lived OT-powered assets. Simple best practices geared towards defending OT can make an adversary’s job more difficult. Start with taking inventory of all OT assets, then move to gain situational awareness so you can develop your baseline for “normal” operations (and can identify any abnormal events), and finally take steps to shore up gaps in cybersecurity. Q: Tell me more about Shift5. Hammill: Shift5 was founded by Josh Lospinoso and Michael Weigand, two of 40 people hand-selected to stand up to U.S. Cyber Command, the nation’s most elite unit of cyber-defenders. There, Mike and Josh became familiar with challenges in defending weapons systems, and the idea for Shift5 was born. Shift5 provides OT cybersecurity and operational intelligence for fleet operators and military platforms Military weapon systems are built on the same OT infrastructure found within planes and trains, and today Shift5 provides OT cybersecurity and operational intelligence for fleet operators and military platforms. Our customers include the DoD, US Army, Air Force, and Navy, and several of the largest U.S. passenger rail and household-name aviation companies. Many of these industries are beginning to seek out partnerships with Shift5; for example, AEI HorizonX, the venture capital investment platform formed between AE Industrial and The Boeing Company, today works with Shift5. Q: What is the biggest misconception when it comes to OT cybersecurity? Hammill: A common misconception is that OT aboard planes, trains, or weapon systems isn’t at risk. Many security experts have implemented air gapping as a cybersecurity strategy to keep cybersecurity threats away from sensitive systems. However, due to the convergence of IT and OT, there are more inroads to OT than ever, and air gapping isn’t as effective. Transportation assets like planes and trains are flying and rolling data centers that produce valuable and useful data, and they need to be protected just as we protect client data or IP. It’s a hard problem to solve, but the stakes are high and attackers are increasingly aiming their attention at this surface area. Modern cybersecurity principles must be extended to the onboard OT networks of aerospace, rail, and defense Amid the war in Ukraine, we saw attackers target the Belarusian Rail System to thwart Russian adversaries, and Russia digitally attacked Viasat to disable this critical piece of infrastructure ahead of a kinetic strike. Digital attacks facing aerospace, rail, and defense targets are on the rise, and modern cybersecurity principles must be extended to their onboard OT networks. Q: How can organizations start to address these challenges? Hammill: Cybersecurity done well is a lot of preventative work, and when we hear no news, that’s often good news. The U.S. government has increased the levels of dialogue around cybersecurity risks facing US critical infrastructure operators and has led by example in sharing information to help critical infrastructure organizations bolster their defenses. I recommend that transportation organizations engage proactively with local FBI field offices or CISA Regional Offices to establish relationships in advance of any cyber-incidents and visit the websites of CISA and the FBI where they will find technical information and other useful resources. They should also take advantage of other resources like TSA, AAR, ICA, and relevant ISACs that have working groups focused on these challenges. I encourage every transportation operator to understand the risks for these large transportation assets through vulnerability assessments, pen testing, and exercises just as they do with their IT environments.
Foot traffic remained at respectable levels during Day Two of IFSEC International 2016 at ExCeL London. Attendees are bombarded with sensory overload as manufacturers look for new ways to stand out from the crowd. The result sometimes seems more like a lot of noise. Everyone is looking for ways to stand out from the noise of competing product features and claims at the show. One exhibitor, Tyco Security Products, is taking a different approach at this year's show, abandoning traditional emphasis on individual products and opting instead to focus on customer solutions targeted to end users. Tyco Security Products’ End-User Targeted Solutions Peter Ainsworth, Tyco Security Products' Director of Marketing for Europe, Middle East and Africa (EMEA), says everything at the Tyco stand -- from the layout to collateral material -- is built around the need to answer "so-what" questions from customers. "They want to know how we can save them money and make their lives better," says Ainsworth. A single brochure provides the "ultimate takeaway" for Tyco's visitors at this year's show; the "augmented reality" brochure has images that can be scanned with a smartphone to provide additional information, data sheets, etc. Tyco Security Products is also giving away a "magic cube" that can be configured as a cube showing Tyco's product lines, and then reconfigured into a multi-sided "star" shape that depicts various vertical market applications. There are "trigger points" on the cube that can be scanned using a smartphone app to provide additional information for potential customers, including videos. The design of both the brochure and the cube emphasize the message that Tyco Security Products understands customers' businesses. "This is where we see our product fitting within your establishment," says Ainsworth. "We take them through the journey at our stand." The brochure depicts the same journey and "helps the end customer understand what we can do for them," he adds. "It's not about intrusion, access or video, but about the total solution." "At a trade show like IFSEC, we are one of hundreds of stands," says Ainsworth. "We want something that people will remember us for. It's different and innovative, and reflects who we are as an organization." TDSi Gardis Access Control "At a trade show like IFSEC, weare one of hundreds of stands.We want something that peoplewill remember us for. It's differentand innovative. It's not aboutintrusion, access or video, butabout the total solution" In addition to getting customers' attention, some manufacturers have other agendas. Gathering feedback for product development is another way exhibitors can get the most out of IFSEC. For example, TDSi is previewing its new Gardis access control platform at IFSEC, including all-new, intuitive software that is easier to navigate, and a new hardware controller, both conformant to ONVIF Profiles A and C. Two years in development, the system will be easier to integrate with third party systems, using a REST-based application programming protocol (API). The new TDSi products are six months or so away from launch, and TDSi is using the IFSEC show to get feedback about changes customers might like to see as the software is fine-tuned; then it will undergo extensive field trials in the next several months. Getting feedback from potential customers is an invaluable tool for TDSi's development engineers, and IFSEC is an ideal venue to provide the feedback. "We can do an awful lot in three days that would take us weeks driving around in a car or flying around," says John Davies, TDSi's Managing Director. "It's a cost-effective way to achieve the same thing. Also, every year at the show we dig up a couple of projects that pay for the stand. This year we met with a customer that has 900 sites. We're in the early stages of talking with them about the new platform." IFSEC 2016 provides a first look at the new TDSi technology, which Davies says the company will introduce to the U.S. market by 2017, likely as a hardware component of an OEM partner's access control system. The open, ONVIF-conformant strategy makes it possible. TDSi has not been active in the U.S. market for 10 years or more; developing the open-architecture product is a favorable alternative to entering the large market with an older, "me too" product, says Davies. HID Global Seos And Mobile Access Solution Also at the show, HID Global introduced new high-definition direct-to-card printers, and showed its HID Mobile Access solution, powered by Seos. The company also emphasized integration of its Seos mobile credentialing system with time and attendance, fleet management and hand-held devices. There is a related managed services offering. A lot of buzz has surrounded Seos since it came on the market in September 2014, and currently there are several hundred mobile access systems installed worldwide, including hundreds of thousands of mobile identities in use in Western Europe and the United States. There have been several notable installations in the United States, especially among colleges and universities. HID Global is currently in the process of building out a "global wallet" in cooperation with chip manufacturer NXP, which is preloading its computer chips with Seos, usable for many applications beyond physical access control. At IFSEC, HID Global announced it has been selected by Vodafone Italy to modernize the company's physical access control system by providing a group of employees a mobile access solution across multiple sites and applications at the Vodafone Village in Milan.
Case studies
Keihan Bus, established in 1922, is a long-standing public transportation provider with over 100 years of service in Japan. Its network spans Osaka, Kyoto, and Shiga prefectures, offering a wide range of safe and reliable transportation services and carrying over 10,000 passengers daily. The company also operates routes that serve major tourist destinations such as Kiyomizu-dera in Kyoto and Dotonbori in Osaka, as well as direct access to the venue of Expo 2025 Osaka, Kansai, Japan—a major international event expected to attract millions of visitors from around the world. Through these services, Keihan Bus contributes to both regional mobility and Japan’s broader efforts to welcome global travelers. Among all its depots, the Hirakata Depot manages the largest fleet and is regarded as one of the company’s key operational hubs. To enhance manpower dispatch efficiency in its bus depot, Keihan Bus implemented VIVOTEK’s intelligent traffic solution to improve operational workflows. Challenges Hirakata Depot expanded its parking space and increased its fleet to around 120 vehicles As part of its relocation on March 23, 2025, the Hirakata Depot expanded its parking space and increased its fleet to around 120 vehicles, underscoring the need for a more efficient vehicle management system. Even before the move, manually verifying each bus’s parking location was labor-intensive and inefficient. Staff had to physically check where each bus was parked and update a whiteboard using numbered magnets to represent each bus. Compounding the issue, new regulations introduced in April 2024 limiting driver work hours further exacerbated the shortage of bus drivers. This heightened the urgency of reducing operational workloads through digital transformation. To meet these challenges, Keihan Bus aimed to modernize its analog parking management process and streamline daily operations, especially at its busiest depot. Solutions LPR cameras were installed throughout the depot to capture and recognize the license plates of buses in real time To achieve operational efficiency, Keihan Bus, in close collaboration with IBS Japan and Mobile Create, implemented a Bus Depot Monitoring System powered by VIVOTEK’s license plate recognition (LPR) technology, using VIVOTEK’s IP9165-LPR-v2 JPN 12–40mm cameras. LPR cameras were installed throughout the depot to capture and recognize license plates of buses in real time during entry, exit, and parking. The captured data is processed to identify the latest detected location of each vehicle, and the parking information is displayed on digital signage. This allows drivers to quickly find their assigned bus before beginning their shift, reducing unnecessary delays and confusion. By replacing this analog system with digital monitoring, the company has significantly improved its efficiency and reduced the workload for both drivers and depot staff. Benefit According to Keihan Bus, choosing VIVOTEK’s solution has brought multiple advantages: Reliable Performance: The camera evaluation results were highly positive, with excellent recognition accuracy that inspired confidence in the system’s reliability. VIVOTEK’s WDR Pro technology effectively reduces the impact of harsh backlighting, such as strong afternoon sunlight, while its SNV (Supreme Night Visibility) ensures that license plates remain clearly visible even in low-light conditions. User-Friendly Setup: Compared to other options, VIVOTEK's system offered a more intuitive setup process. Strong Local Support: The local support provided by IBS Japan, including on-site assistance, was more responsive and comprehensive than that of other vendors. System Compatibility: The data transfer format was compatible with the depot’s existing infrastructure, allowing for a smoother integration process. Customer feedback “After implementing the system, we monitored its performance and fine-tuned the settings to fit our operational environment. As a result, the accuracy has remained consistently high and stable over time. Knowing that long-term maintenance support is available makes us feel secure,” Keihan Bus Hirakata Depot. “This was our first experience working on a solution-based project, and we started from scratch, feeling our way through. Thanks to the strong support from IBS Japan, we were able to successfully take off.” “Gaining hands-on experience with a camera-based solution has become a major source of confidence for us. Although this was our first time implementing an LPR solution, having this successful case now gives us the confidence to apply and propose it for future projects as well,” Mobile Create Co., Ltd.
Iveda®, a pioneer in AI-driven video surveillance and smart-city technologies, announced that Subic Sun Development, Inc. has chosen the IvedaAI™ platform as the video surveillance solution for the soon-to-open Subic Sun Resort, Convention & Casino. IvedaAI was selected early in the build-out to inform camera placement and ensure frictionless integration with future-ready, AI-powered analytics. Focus on safety and service Located on the former U.S. naval base in the Subic Bay Freeport Zone—a special economic hub that hosts thousands of international and local businesses—the resort will feature 500 guest rooms, a state-of-the-art convention center, a luxury casino, and two Accor-brand hotels, Ibis Styles and Mercure, scheduled to open in December 2025. The decision comes as global resort operators sharpen their focus on safety, service, and operational efficiency. The global resort market generated $347 billion in 2024 and is projected to reach nearly $945 billion by 2030, an 18.5% CAGR. IvedaAI’s AI-enabled video analytics IvedaAI’s AI-enabled video analytics will help property staff lower security costs, respond to incidents faster IvedaAI’s AI-enabled video analytics will help property staff lower security costs, respond to incidents faster and unlock data-driven insights that boost both guest satisfaction and bottom-line performance. “Iveda being selected as a premier security and surveillance provider before the first Subic Sun Resort guest ever checks in is a powerful endorsement of our commitment to providing state-of- the-art monitoring technology,” said David Ly, CEO and Founder of Iveda. IvedaAI’s real-time analytics Ly added: “By designing camera layouts around IvedaAI’s real-time analytics, Subic Sun can optimize coverage, reduce blind spots, and deliver safer, smoother guest experiences—without a costly equipment overhaul. We expect more ground-up projects to follow this blueprint.” Iveda Philippines—Iveda’s joint venture focused on nationwide smart-city deployment—secured the Subic Sun contract and will oversee the on-site rollout. The win represents the team’s first major hospitality project and advances its plan to generate US$ 3 million in smart-city revenue by FY 2026, building on the broader initiative it announced last year.
i-PRO Co., Ltd. (formerly Panasonic Security), a pioneering manufacturer of edge computing cameras for security and public safety, announced that a pioneering teaching hospital in Northeast England, has enhanced its security infrastructure with i-PRO X-Series cameras integrated with Milestone’s XProtect Video Management Software (VMS). The hospital, known for its forward-thinking approach to medicine and healthcare, is part of the National Health Service (NHS) Trust in the Northeast of the UK. Over the past decade, the hospital has made significant advancements in its security infrastructure, transitioning from analog CCTV systems to a fully IP-based setup. As part of this transformation, the hospital recently installed 25 i-PRO X-Series edge-processing cameras. The hospital's goal was to enhance the security of its large campus using the latest AI-enabled camera technology while optimizing operations. The Challenge The main challenge the hospital faced was upgrading portions of its existing security system The main challenge the hospital faced was upgrading portions of its existing security system with state-of-the-art, AI-enabled cameras without exceeding strict public sector budget constraints and with minimal disruption to the daily operations of a busy hospital. Additionally, with a vast campus and numerous security vulnerabilities, the hospital required a solution that could extend the capabilities of existing non-AI cameras while providing enhanced monitoring capabilities. High level of security "The primary challenge was upgrading the system within budget limitations while maintaining a high level of security and operational efficiency," said Chris Lakin, Director at Oracle Vision, the system integrator overseeing the project. "This client wanted a solution that could integrate with their current infrastructure, provide advanced AI capabilities to better protect hospital patients, staff, and assets while being adaptable for future needs." The solution Cameras enabled the hospital to add AI functionality to their existing, non-AI cameras After a detailed assessment, the hospital decided to install i-PRO X-Series edge-processing cameras, a premium and innovative solution that delivers exceptional value while seamlessly integrating with Milestone’s XProtect VMS platform. Importantly, these cameras enabled the hospital to add AI functionality to their existing, non-AI cameras—an innovation that allowed them to maximize the potential of their current equipment without needing to replace all cameras. X-Series AI cameras The X-Series AI cameras are equipped with the AI Processing Relay feature, which allows non-AI cameras, including those from other manufacturers, to gain AI capabilities. Such an approach maximizes the life of existing surveillance systems while significantly reducing false alarms. The hospital was able to enhance its video protection capabilities with new AI features across 100 cameras by installing 25 i-PRO X-Series AI cameras and linking them with their existing non-AI models. i-PRO’s AI Processing Relay app The hospital was able to enhance its video protection capabilities with new AI features across 100 cameras "It was a bit of a no-brainer for the hospital. With i-PRO, they didn’t need to replace their entire fleet of cameras to gain important new functionality. We were able to upgrade their existing system by adding AI capabilities to 75 existing non-AI cameras, helping them maximize value while staying within budget,” says Lakin. “The flexibility of i-PRO’s AI Processing Relay app is impressive. It turns any connected camera into an AI-enhanced solution. This system now allows the hospital to achieve a level of security and operational insight that wasn’t previously possible with their older equipment.” Advanced AI capabilities The i-PRO X-Series AI cameras include on-site learning features that allow the hospital’s security team to customize what the cameras can detect and monitor. For example, operators can teach the cameras to recognize specific objects, such as vehicles or individuals, and receive alerts when certain behaviors or activities occur in sensitive areas like emergency entrances. Benefits from AI-driven analytics The hospital also benefits from AI-driven analytics, which helps security staff manage crowd control The hospital also benefits from AI-driven analytics, which helps security staff manage crowd control, identify suspicious behavior, and even integrate with their Paxton access control system. The cameras are connected to the hospital’s XProtect Smart Wall, where events triggered by AI analytics or access control events, such as a security breach or abnormal behavior, automatically display on screen, allowing staff to respond in real time. Futureproofing with advanced AI features The i-PRO X-Series cameras utilize Ambarella’s AI SoC (CV52) to provide high-performance edge computing, enabling the hospital to handle complex analytics locally without burdening the network. With the capability to run nine different AI applications, such as i-PRO’s Privacy Guard, which blurs the faces or the entire bodies of patients for privacy, the cameras can allow the hospital to enhance its security while also gathering operational metrics such as tracking the movement of specific equipment or personnel across the campus. Features of i-PRO’s cameras i-PRO’s cameras also feature a WDR of up to 144dB, ensuring best image quality i-PRO’s cameras also feature a Wide Dynamic Range (WDR) of up to 144dB, ensuring superior image quality in all lighting conditions. With models offering up to 6MP resolution and IR illumination up to 70 meters, the cameras deliver high-definition video regardless of the environment. Results By implementing i-PRO’s X-Series AI cameras, the hospital has enhanced its security infrastructure while remaining within tight budgetary constraints. The advanced AI capabilities provide the hospital with real-time alerts and automation features that streamline its security operations. Most notably, the flexibility of i-PRO’s cameras allowed the hospital to effectively upgrade 100 cameras with AI features by installing only 25 i-PRO cameras, providing exceptional value while future-proofing its investment.
DP World Yarimca, one of the largest container terminals of the Gulf of İzmit and Turkey, is a strong proponent of using industry-pioneering technology to deliver unrivaled value to its customers and partners. As the port is growing, DP World Yarimca needs to continue to provide uninterrupted operations and a high level of security. To address these challenges, DP World Yarimca has embraced innovative technological products, including FLIR's comprehensive portfolio of security monitoring solutions. DP World Yarimca: An overview DP World Yarimca is located in the heart of Anatolia, Turkey. The port is the gateway to overseas markets to many Turkish firms and it supports economic activity in the East Marmara region and a large part of Anatolia. DP World Yarimca can berth four vessels or two ultra-large container ships at the same time, making it Turkey’s fastest and most efficient port. Maintaining safe and uninterrupted operations for its customers is one of the main tasks of the DP World Yarimca port operators, but it’s frequently complicated by illegal fishing, diving, and mussel poaching along the region. Challenges faced by DP World Yarimca Illegal fishing and mussel poaching Harvesting the mussels could also damage the port’s cathodic protection system Mussels are growing abundantly on the piles that support the port’s berths. This is a main attraction for mussel poachers. Not only is this activity illegal, but it also poses a serious safety risk for poachers as well as for people who are legally active in the port. Harvesting the mussels could also damage the port’s cathodic protection system, a system that prevents corrosion on submerged and underground metallic structures. “Mussel poachers prevent us from efficiently monitoring our port activity and they potentially interrupt our operations,” says Ismail Karaçam, HSSE Manager at DP World Yarimca. Delays in vessel maneuvering In addition, illegal hunters and divers can enter the vessel maneuvering areas and cause delays in the berthing and departure of vessels. This can cause disruptions in the supply chain. DP World Yarimca's commitment to security Since its formation, the port has always viewed security as its top priority. The organization has always provided the necessary technology to monitor activities from the seaside and to guarantee security and sustained operations at the container site. When their current security monitoring system reached the end of life, DP World’s security team was looking for a new solution that could help them detect intruders both onshore and at sea. Finding the right port security monitoring solution The port security team scanned the market for new technology and learned about FLIR’s visible portfolio The port security team scanned the market for new technology and learned about FLIR’s visible and thermal security monitoring portfolio through Turkish distributor and integrator IRMARINETECH. “We had completed port security projects in Turkey before,” says Koray Serbest, founder of IRMARINETECH. “This already instilled confidence in the team of DP World that we could meet their needs. After convincing product demonstrations and proofs of concepts, DP World Yarimca decided to collaborate with us and FLIR.” Enhancing port security with FLIR’s thermal and visible cameras FLIR's thermal and visible camera systems have revolutionized DP World Yarimca's approach to port security. These advanced technologies empower the port's security team to monitor illegal activities during nighttime, inclement weather conditions, and from extended distances. Monitoring activities at sea and at night “The illegal fishermen and divers had proven to be very resourceful in their activities,” says Ismail Karaçam. “One of their tactics was to paint their boat black, so they were invisible at night for our current camera systems." "That’s when we knew we needed thermal camera technology. With the thermal cameras from FLIR, we can now monitor any illegal activity at night, in challenging weather conditions like rain or fog, and from a long distance.” Detection of intruders and man-overboard situations The port operators have a 24/7 view of intruders at sea, but they also use cameras to monitor To monitor the port’s 800-meter shoreline and activities up to 200 meters out to sea, the port invested in FLIR’s thermal cameras, including the FC-Series ID analytical camera, the Saros dome camera, and the M232 pan/tilt marine thermal camera. The port operators have a 24/7 view of intruders at sea, but they also use the cameras to monitor for man overboard situations and oil spills. The port’s security patrols also make use of a FLIR Scion thermal handheld camera to detect fishermen and divers hiding under the rocks, who enter under the berth in complete darkness. Perimeter security and container area monitoring A combination of thermal and visible cameras, like the FLIR Quasar panoramic and PTZ cameras, are used to monitor the site’s perimeter security as well as the activities inside the container area. FLIR’s wide portfolio and local support DP World Yarimca was well aware of FLIR’s strong reputation in the field of port security monitoring. Ultimately, it was the visual quality of the thermal camera systems and the ability to offer highly accurate imaging over a long distance that convinced the DP World Yarimca security management team. In addition, FLIR was able to present a suitable solution for every specific security need and application in the port by bringing in a combination of the company’s wide portfolio of enterprise, perimeter security, and maritime monitoring solutions. Support and service The support of IRMARINETECH was a confirmation that DP World Yarimca had made the right choice The support of a dedicated and local FLIR support partner like IRMARINETECH was a confirmation that DP World Yarimca had made the right choice. “We want to guarantee continued security to our customers, which means that we just cannot afford technical downtime,” says the Security Manager at DP World Yarimca. “So, in case we need technical maintenance, spare parts, or a quick product replacement, we are confident that we can rely on the support and service from our local partner IRMARINETECH.” DP World Yarimca's focus on technology innovation As a firm believer in digital transformation, DP World Yarimca continually seeks opportunities to enhance its physical infrastructure's efficiency. FLIR stands as a reliable partner, supporting DP World Yarimca's commitment to leveraging technology for future growth and security advancements. The port is actively exploring collaborations with FLIR to implement additional security measures and augment existing systems. Future collaborations and security advancements The port is already collaborating with FLIR to investigate how visible and thermal camera technology can bring the organization additional security gains. The possibility of detecting fires in an early stage is a valuable contribution to the port’s security strategy One of the possibilities they are exploring is the addition of thermal boom cameras installed on cranes to monitor the surroundings of the vessels. Another application is the addition of thermal fire detection cameras. Many of the port’s customers are carrying highly flammable products into the port. The possibility of detecting fires in an early stage is a valuable contribution to the port’s security strategy. FLIR FH-Series R Thermal cameras like the FLIR FH-Series R can automatically spot small temperature changes in their field of view, identify hot spots before they ignite, and provide an early warning response to avoid a full-on fire outbreak before assets are harmed or safety is compromised. Upon detection, an alert can be sent to an operator through a connected Video Management System (VMS) for instantaneous assessment and deployment of response tactics.
The Buffalo and Erie County Naval & Military Park, in Buffalo, N.Y., has a clear mission based on four pillars: to honor all veterans, educate the public about the sacrifices made by those who serve, inspire a sense of patriotism and appreciation for those protecting Americans’ rights and freedoms, and preserve the artifacts entrusted to the Park’s care. Buffalo Park The Park regularly hosts events and takes visitors inside America’s military history with in-depth tours of decommissioned naval vessels, exhibits, and displays. The team’s goal is to highlight its monuments and artifacts while providing a welcoming and secure environment for visitors. A key challenge was the Park’s large open and unfenced grounds, allowing the public access to the facilities at any time of the day or night. Challenge Provide a welcoming and secure environment for visitors and deter criminal activity within the park. Achieve 360° coverage across all interior and exterior areas without using cables, which would have made the project cost-prohibitive. Design a wireless surveillance system to cover the park’s large areas of open ground. Surveillance system installation “We had begun to notice an increased rate of delinquent incidents happening during the day and off hours, including graffiti placed on the artifacts and monuments,” said Paul Marzello, Sr., President & CEO, Buffalo and Erie County Naval & Military Park. The Park engaged Mario Rodriguez, president of Forseti Protection Group, and Erik Schiefer, account executive at Seibold Security, to design and install a surveillance system based on Hanwha Vision’s multi-directional and AI-equipped cameras. “When we did our research, we found that Hanwha Vision certainly was a pioneer in the industry,” said Marzello. Factors to consider From a risk and public safety perspective, the goal from the start was to maintain an open and welcoming environment “We conducted a site survey, considering the line of sight, the cameras’ capabilities, the density of groups of visitors and where they tend to gravitate, and criminal history in the Park,” said Bill Abbott, Director of Operations, Buffalo and Erie County Naval & Military Park. “Those were all factors in how we determined the layout. We wanted to make sure that we had the right coverage.” From a risk and public safety perspective, the goal from the start was maintaining an open and welcoming environment while keeping public safety top-of-mind. Solution Install a Hanwha Vision surveillance system comprising multidirectional and AI cameras. 4K multi-sensor cameras Schiefer has extensive experience with Hanwha cameras from previous projects. “Their new 4K multi-sensor cameras are first class and as far as 360° coverage, with the ability to monitor several areas, Hanwha was the first choice,” he said. The ability to view 360° coverage from one camera that essentially is divided into multiple sectors was significant. “That gives us full visibility and lets us be open and welcoming while keeping out of the public’s way without being imposing or intimidating,” Rodriguez said. Ease of playback Schiefer added that one key benefit of using the Hanwha 360° cameras to cover such a large area Schiefer added that one key benefit of using the Hanwha 360° cameras to cover such a large area is the ease of playing back footage and monitoring activity after the fact. “They are broken out into four sensors, so you don’t necessarily have to go back and look through a large amount of footage,” he said. “You can pick the area you're looking for, go directly to that sensor within the camera that we have in that area, and you can pull footage much easier that way.” Cable cost and distance One challenge the team encountered during the design phase was running a cable for a project of this scale. “The cost to run buried cable at such long distances with switches would have rendered this project almost completely impossible,” Schiefer said. “We incorporated wireless network cards into the poles around the park and all the cameras feed directly back to the Hanwha NVR without using any sort of cabling.” NDAA compliant solutions The Park’s priorities included the use of National Defense Authorization Act (NDAA) compliant solutions and having more streamlined communication with law enforcement. “We wanted to make sure that the cameras themselves were secure,” said Abbott. “The cameras also needed to be used to positively identify someone who had done something, either damage or acts of violence. In the past, we could not effectively supply law enforcement with usable information to identify a suspect." Use of AI in cameras The Hanwha cameras’ use of AI plays a key role in delivering those capabilities "We've now changed that with the quality of cameras that we're using. We can share footage and data to produce an outcome that's satisfying to everybody as far as finding a culprit and holding them accountable." The Hanwha cameras’ use of AI plays a key role in delivering those capabilities. “You can use key identifiers, whether it's the color of someone's shirt, if they're wearing a backpack, or there's some physical feature that we can then go through and locate that person through the system,” Abbott said. Sense of security “We absolutely would see an increase in the value and number of cameras that we use,” said Abbott. Marzello added, “From an operations standpoint, we feel a greater sense of security knowing the cameras are there and will help us identify activities that we can hopefully prevent. This system meets our needs today and will also be able to grow with us.” Results Ability to effectively monitor all park areas and more effective forensic searches. Reduction in on-premise incidents. Streamlined collaboration with law enforcement agencies.
The Buffalo and Erie County Naval & Military Park, in Buffalo, N.Y., has a clear mission based on four pillars: to honor all veterans, educate the public about the sacrifices made by those who serve, inspire a sense of patriotism and appreciation for those protecting Americans’ rights and freedoms, and preserve the artifacts entrusted to the Park’s care. The Park regularly hosts events and takes visitors inside America’s military history with in-depth tours of decommissioned naval vessels, exhibits, and displays. The team’s goal is to highlight its monuments and artifacts while providing a welcoming and secure environment for visitors. A key challenge was the Park’s large open and unfenced grounds, allowing the public access to the facilities at any time of the day or night. Hanwha Vision’s AI-equipped cameras Design and install a surveillance system based on Hanwha Vision’s multi-directional cameras “We had begun to notice an increased rate of delinquent incidents happening during the day and off hours, including graffiti placed on the artifacts and monuments,” said Paul Marzello, Sr., President & CEO, Buffalo and Erie County Naval & Military Park. The Park engaged Mario Rodriguez, president of Forseti Protection Group, and Erik Schiefer, account executive at Seibold Security, to design and install a surveillance system based on Hanwha Vision’s multi-directional and AI-equipped cameras. “When we did our research, we found that Hanwha Vision certainly was a pioneer in the industry,” said Marzello. Risk and public safety perspective “We conducted a site survey, considering line of sight, the cameras’ capabilities, the density of groups of visitors and where they tend to gravitate, and criminal history in the Park,” said Bill Abbott, Director of Operations, Buffalo and Erie County Naval & Military Park. “Those were all factors in how we determined the layout. We wanted to make sure that we had the right coverage.” From a risk and public safety perspective, the goal from the start was maintaining an open and welcoming environment while keeping public safety top-of-mind. Extensive experience with Hanwha cameras Schiefer has extensive experience with Hanwha cameras from previous projects Schiefer has extensive experience with Hanwha cameras from previous projects. “Their new 4K multi-sensor cameras are first class and as far as 360° coverage, with the ability to monitor several areas, Hanwha was the first choice,” he said. The ability to view 360° coverage from one camera that essentially is divided into multiple sectors was significant. “That gives us full visibility and lets us be open and welcoming while keeping out of the public’s way without being imposing or intimidating,” Rodriguez said. Benefit of using the Hanwha 360° cameras Schiefer added that one key benefit of using the Hanwha 360° cameras to cover such a large area is the ease of playing back footage and monitoring activity after the fact. “They are broken out into four sensors, so you don’t necessarily have to go back and look through a large amount of footage,” he said. “You can pick the area you're looking for, go directly to that sensor within the camera that we have in that area, and you can pull footage much easier that way.” One challenge the team encountered during the design phase was running a cable for a project of this scale. Incorporated wireless network cards The Park’s priorities included the use of NDAA-compliant solutions and more streamlined communication “The cost to run buried cable at such long distances with switches would have rendered this project almost completely impossible,” Schiefer said. “We incorporated wireless network cards into the poles around the park and all the cameras feed directly back to the Hanwha NVR without using any sort of cabling.” The Park’s priorities included the use of National Defense Authorization Act (NDAA) compliant solutions and having more streamlined communication with law enforcement. Supply law enforcement “We wanted to make sure that the cameras themselves were secure,” said Abbott. “The cameras also needed to be used to positively identify someone who had done something, either damage or acts of violence." "In the past, we had no capacity to effectively supply law enforcement with usable information to identify a suspect. We've now changed that with the quality of cameras that we're using. We can share footage and data to produce an outcome that's satisfying to everybody as far as finding a culprit and holding them accountable." Greater sense of security The Hanwha cameras’ use of AI plays a key role in delivering those capabilities. “You can use key identifiers, whether it's the color of someone's shirt, if they're wearing a backpack, or there's some physical feature that we can then go through and locate that person through the system,” Abbott said. “We absolutely would see an increase in the value and number of cameras that we use.” Marzello added, “From an operations standpoint, we feel a greater sense of security knowing the cameras are there and will help us identify activities that we can hopefully prevent. This system meets our needs today and will also be able to grow with us.”


Round table discussion
As physical security technologies become more complex, it is incumbent on the dealer/integrator to have the skills and expertise needed to ensure that a system operates smoothly. The value of integrators increasingly rests on the skill sets they bring to bear when installing a system. If the skills are missing, there is a problem. We asked this week’s Expert Panel Roundtable: What missing skills among security integrators can cause problems for customers?
The transportation industry is unique because it plays a role in both the minutiae of everyday life and the overall economy's well-being. Providing uninterrupted and efficient transportation services depends heavily on the safety and security of transportation entities. Due to the vast amount of people frequenting transit stations and the importance of the items on ships and ferries, the transportation sector faces multiple challenges that evolve as the industry advances. We asked this week’s Expert Panel Roundtable: What are the security challenges of the transportation industry?
