Public spaces in cities and suburbs are important places for community development and promoting outdoor recreation. These areas may include main streets, parks, promenades, band shells and fields. Such locations are often utilized by public event planners for community activities, including summer festivals, wintertime ice skating rink installations, music concerts and art fairs. As the year draws to a close, holiday and Christmas markets as well as major New Year’s Eve events, present c...
According to the reports of not-for-profit organization Gun Violence Archive, the year 2018 has seen 323 mass shooting incidents as of November 28 in the United States. This number is 346 for the year 2017 and 382 for 2016 (more statistics are available here), with “mass shooting” defined as cases where four or more people are shot or killed in the same time period and location. While definitions of mass shooting vary with organizations in the US, the count of over 300 incidents per...
School shootings continue, as does a search for answers. What solutions are there to prevent school shootings and/or to improve the response (and thus minimize the death toll)? In the physical security industry, we like to think we have solutions that can help, if not “solve”, the problem, but realistically speaking, how effective are they at the end of the day? We like to think we have solutions that can help, if not “solve”, the problem: but how effective ar...
ISC East, in collaboration with premier sponsor, the Security Industry Association (SIA), reported strong growth results at the conclusion of this year’s industry event in New York City. The International Security Conference & Exposition is the Northeast’s largest security trade show, where close to 7,500 security and public safety professionals convened this month to meet experts from over 300 leading security brands, all the while co-locating with the launch of Unmanned Securit...
From satellite imagery to street views to indoor mapping, technology has disrupted our past world. This has left us dependent upon new ways to visualise large spaces. This new world has brought many benefits and risks. But what does that mean for the security professional or facility manager today and what technologies can be used to secure buildings and improve facility operations? A Brief History Of 3D Technology Starting May 5, 2007 (inception 2001), Google rolled out Google Street View to...
Governments and corporations face crisis events every day. An active shooter terrorizes a campus. A cyber extortionist holds a city for ransom. A hurricane washes away a key manufacturing facility. Not all critical events rise to the level of these catastrophic emergencies, but a late or inadequate response to even a minor incident can put people, operations and reputations at risk. Effective Response Plan In 2015, for example, the City of Boston experienced several record-breaking snowstorms...
Security 101, one of the fastest growing security integrators in the country, announced it has opened its 40th office in Austin. Kevin Schnyder, an experienced IT and physical security professional, is the owner and president of the new franchise. Most recently Schnyder was an IT manager with the Texas Municipal Power Agency. Previously, he worked with Marathon Oil Corporation in Malabo, Equatorial Guinea, West Africa on facility security, access control and perimeter surveillance. Security 101’s 40th Franchise Opening the 40th U.S. franchise is a milestone for Security 101 and a sign of the company’s momentum and the strength of the overall security market, according to Steve Crespo, Security 101’s chief executive officer. “Kevin has the ideal background for his new role at Security 101,” he said. “He has physical security experience combined with a background in IT which is essential for a security integrator today.” “Austin is one of the fastest growing metro areas in the U.S. with many people calling it a mini Silicon Valley,” Schnyder said. “We’re looking forward to being part of that growth by helping the business community with its security and safety needs.”
Eagle Eye Networks, Inc. announced the enhancement of the Eagle Eye Cloud Security Camera VMS to include the integration of Hikvision body worn cameras. The new Eagle Eye solution provides ease, reliability, and cybersecurity to body worn camera users seeking to synchronize and store video for extended periods in the cloud. The Eagle Eye Cloud Security Camera VMS will retrieve video and GPS data through a docking station connected to any Eagle Eye Bridge or Cloud Managed Video Recorder (CMVR) and securely transmit the video to the Eagle Eye Cloud Data Center. The body worn camera and its video appears in the Eagle Eye Customer Dashboard along with any fixed cameras attached to the system and can be reviewed, managed and analyzed. Integration With Mobile Cameras Eagle Eye Networks’ customers have requested the integration of mobile cameras in to the Eagle Eye interface to enable the combination of fixed position cameras with mobile cameras to better serve specific applications. Eagle Eye's customers are using mobile video for optimisation in robotics, manufacturing, emergency room management and home care services Law enforcement, guarding services, health care, retail management, training, warehouse management, and other service-oriented verticals create considerable value and reduce risk through the reliable and secure management of surveillance video in the cloud. Several of Eagle Eye Networks’ high-tech customers are using mobile video for business optimization in robotics, manufacturing, emergency room management and home care medical services. The challenge surrounding body worn and other types of mobile cameras has always been the lack of scalable, cost-effective, redundant storage. The Eagle Eye Cloud Security Camera VMS offers subscription-based storage for any period. Body Worn Cameras Lieutenant Kevin Francis, Head of the Bay County Sheriff’s Office Drug Enforcement Division stated, “We are excited to see Eagle Eye Networks adding body worn cameras to its system. The management of body worn video is cumbersome and unreliable from a storage perspective. The cloud makes it so much easier to store and retrieve evidentiary video.” The use cases for body worn cameras are endless. Body worn cameras began gaining momentum in law enforcement and private security, but there are other business optimization benefits that these cameras provide.Body worn camera users in retail are witnessing a decrease in customer standoffs and reduced claims against stores Businesses using body worn cameras have been able to improve profitability, communication, and customer service by using the footage to provide scenario-based training to employees. In the retail industry, for example, body worn camera users are witnessing a decrease in customer standoffs and reduced claims against stores based upon readily available visual evidence. Cloud-Powered Video Surveillance According to Dean Drako, CEO of Eagle Eye Networks, “Eagle Eye Networks is the industry’s go-to supplier of cloud video surveillance." "One of the many advantages of a cloud-based video management system is the ability to coalesce a wide variety of video collecting devices within a single user experience. Eagle Eye Networks will remain the leader in offering innovative solutions to combine connected, remote and mobile based camera technologies.”
Veracity, a global designer and manufacturer of innovative IP transmission products, long-term surveillance storage and an advanced, modular integration platform for Command and Control Centers, is a key sponsor of the IAPSC Annual Conference and will be presenting to the attended delegates in San Diego, CA during the three-day event. Veracity will be promoting VIEWSCAPE, their comprehensive Command and Control system. Featuring an advanced, modular integration platform, VIEWSCAPE gives operators flexible and immediate control over complex surveillance and security functions. VIEWSCAPE includes visual information received from IP and deployable CCTV cameras combined with interactive maps and incident management. Its flexibility adapts to new requirements whilst minimizing the challenges of integration with legacy systems.Live views may be mixed with playback and media streams such as broadcast news, online data streams, maps or other graphical displays TRINITY Direct-To-Storage Architecture VIEWSCAPE is fully integrated with Veracity’s TRINITY direct-to-storage architecture and the award-winning, advanced COLDSTORE surveillance storage system. It also features a full video and media wall display option that can be reconfigured on-the-fly and in response to specific incidents or emergency situations. Live views may be mixed with playback and media streams such as broadcast news, online data streams, maps or other graphical displays. Cost-Effective Security Solution “Our solution brings a new level of cost-effectiveness to the integrated Command and Control system market,” says Jack Meltzer, Director of A&E Programs at Veracity. “COLDSTORE has already established itself as the most reliable and cost effective long-term storage solution available, and the addition of VIEWSCAPE to our portfolio brings significant added-value for any project."Veracity’s innovative solutions will be presented to the attending conference delegates at the IAPSC Annual Conference IAPSC Annual Conference "The system can provide integration with access control, building management, intruder detection, VOIP intercom systems and video analytics including LPR and facial recognition” added Meltzer. “A number of native security functions can be added to the system in a modular, customisable way, such as guard tour, lone worker monitoring, dispatch, alarm monitoring and key management.” Veracity’s innovative solutions will be presented to the attending conference delegates at the IAPSC Annual Conference between the 29th April and the 1st May in the Kona Kai Resort in San Diego, California.
Boon Edam Inc., a provider of security entrances and architectural revolving doors, is demonstrating significant growth and momentum in both their product offering and their business operations this year at ISC West 2018 (booth #8037). With the expansion of their Enterprise Customer Group, a range of new integrations, and the growing adoption of anti-tailgating and piggybacking entrance tech by Fortune 50 Global companies, the company is advancing its position as the market leader in the Americas in security entrance solutions. “While we have held the lion’s share of the Americas market for security entrances since 2012, according to IHS Markit reports, we are moving ahead now on a number of business fronts,” said Mark Borto, President and CEO, Boon Edam, Inc. “Enterprise sales have become a major market for us as a result of our expanded focus on global standardization and deployment. At the same time, we are integrating the most advanced technologies with the combination of biometrics and anti-piggybacking solutions, addressing some of the most pressing challenges for risk mitigation.”All of these solutions can operate without manned supervision as they incorporate Boon Edam’s proprietary StereoVision 2 Integrated Biometric Technologies Products on display in Boon Edam’s booth will showcase ease-of-use, speed and accuracy via integrated biometric technologies that enable multi-factor authentication combined with piggybacking prevention. Show attendees can experience the Circlelock security portal, a turnkey mantrap solution offering the highest security available in an entrance. It’s newly launched cousin, the Circlelock Combi ‘half portal’ saves both space and costs by transforming any fire-rated swinging door into a high-security mantrap entrance that prevents piggybacking. Boon Edam’s Tourlock 180+90, the industry’s best-selling security revolving door, delivers high, bi-directional throughput while preventing tailgating and piggybacking. All of these solutions can operate without manned supervision as they incorporate Boon Edam’s proprietary StereoVision 2, which prevents piggybacking using near infrared and optical sensors to determine if someone is entering the door alone, ensuring a level of reliability. Remote Access Control In addition, the super-slim Lifeline Speedlane Swing stylishly combines high throughput with high security via biometric identification. Technology on display from Boon Edam this year enables remote access and control of security entrances. This includes BoonConnect software, which provides diagnostic and configuration tools for the Tourlock and Circlelock via smart device, and BoonTouch, enabling management of multiple Boon Edam security entrances through a desktop control panel.We have put significant support behind the Enterprise Group initiative so that we are positioned to provide the best entrance solutions" Enterprise Customer Group An additional focus at ISC West this year is the expansion of Boon Edam’s Enterprise Customer Group. Originally launched in 2013 and now numbering at 11 employees, this sales and service team delivers exceptional entrance solution consulting, logistics planning and customer service to large national and global companies through every stage of the sales process. “Our Enterprise Group of dedicated specialists is bringing an unprecedented level of consultative expertise to the world’s biggest organizations,” said Mr. Borto. “We have put significant support behind this initiative so that we are correctly positioned to provide the best possible entrance solutions for this fast-growing segment of business.” Increasing Risk Recognition As recognition of risks and liabilities grows, it has also driven the need for users to focus on hardening entrances and perimeters. Some of the risks include active shooters, cyber-threats, workplace violence, protests in urban areas and more.Boon Edam is the official turnstile sponsor for ISC West with 2018 marking the 11th year of exhibitors and attendees walking through their turnstiles Boon Edam has seen market growth for their ability to stop a range of threats including tailgating and piggybacking. Other factors driving the company’s growth include the ability of their security entrances to facilitate identity verification, along with integrations between lobby turnstiles, elevator dispatch and visitor management systems. Consultation For Identity Verification Solutions “We’re now seeing more security entrances being deployed in the upper elevator lobbies in multi-tenant properties as well,” said Mr. Borto. “Every organization has its own varied needs for identity verification and security at differing entrances, and we provide consultative support in helping them determine the right mix of products for their needs.” Boon Edam is the official turnstile sponsor for ISC West and 2018 marks the 11th year that exhibitors and attendees will walk through Boon Edam turnstiles as they enter the exhibit halls, making the turnstiles a familiar site at the show. This year the company unveils 34 lanes of the sleek Speedlane Open, a new, barrier-free optical turnstile designed for deterring casual intrusion attempts.
Boon Edam Inc., global manufacturers of security entrances and architectural revolving doors, is demonstrating a new security portal solution at their ISC West 2018 booth (#8037). The Circlelock Combi will help security executives combat piggybacking and unauthorized entry in existing high security areas that currently have fire-rated swinging doors. Our new mantrap solution is a game changer for security managers who use fire-rated doors to protect their assets or data” Circlelock Combi Security Solution “Our new mantrap solution is a game changer for security managers who use fire-rated doors to protect their assets or data,” said Mark Borto, President and CEO of Boon Edam, Inc. “We designed the Circlelock Combi as a turn-key retrofit option to address the risk of tailgating that exists with swinging doors in facilities - once a swinging door is opened, anyone could slip inside behind an authorized user. But once the Combi is installed with that existing swing door, they still get all the benefits of a fire-rated entry, only now it’s a high security entrance that only lets authorized people enter and doesn’t need manned supervision.” The Circlelock Combi is a cylindrical mantrap portal solution that has a single sliding set of doors on one end and an opening on the other end that is mounted to an existing swing door. This also saves considerable space compared to traditional mantrap vestibules created from walls and two swinging doors. It provides a throughput of five to six people per minute and is ideal for any interior location where the most critical security is required. This could include data centers, government buildings, secure areas in airports, legal or patient record areas, prescription medication dispensaries, executive suites and more. Many facilities use fire-rated swing doors to protect data and assets from destruction by fire Fire-rated Swing Doors Many facilities use fire-rated swing doors to protect data and assets from destruction by fire, but this type of door cannot prevent tailgating or piggybacking. The Circlelock Combi attaches to the existing fire-rated door, converting it immediately into a mantrap solution that prevents piggybacking 24/7. One of the most important benefits of the Circlelock Combi is the enablement of multi-factor authentication – the ability to ensure that only one person, and the right person, is entering. Users can present a credential in front of the portal to open the sliding door and once inside and confirmed to be alone, can present another credential to unlock the swing door. The Combi can also accommodate a wide variety of identity verification technologies (iris scanner, facial reader, pushpad, etc.) in its interior with a customizable floor-to-ceiling post. Facial Scanning Technology Boon Edam will feature the Circlelock Combi solution in their ISC West booth as a two-factor authentication scenario: initial authentication using an AMAG Symmetry card reader to enter the portal, followed by facial scanning technology from StoneLock Pro to open the second door.
EverFocus, GeoVision, PLANET and VIVOTEK—were the highlights of a press conference at ISC West 2018, organized by the Taiwan External Trade Development Council (TAITRA), Taiwan’s foremost trade promotion organization. These breakthrough products, with potential to transform the global security market, include a futuristic Virtual Reality 720° camera, a facial recognition dome camera, a cutting-edge Internet of Vehicle (IoV) fleet surveillance system, an IP camera armed with anti-intrusion software, and a next-gen intuitive colour touch LCD switch.We are proud to showcase Taiwan’s finest at one of the United States’ most prestigious security tradeshows" Extensive Engagements “Today, the United States and Taiwan enjoy an ever-expanding relationship and extensive engagement in many fields, especially in electronic security." "Our products launch event unveil some of Silicon Island’s most cutting-edge products and technologies in the areas of IoT and Internet of Vehicles (IoV), unmanned security and cyber + physical integration." "We are proud to showcase Taiwan’s finest at one of the United States’ most prestigious security tradeshows and look forward to having participants experience the future of security,” said TAITRA Executive Director Simon Lai. These Taiwanese ICT companies, all winners of the Taiwan Excellence Awards, generated a lot of excitement and buzz with the unveiling of their new products at the conference. XFleet Management Platform EverFocus demonstrated its engineering and research prowess as Regional Technical Sales Manager Marques Phillips unveiled details of the company’s XFleet Management Platform which he described as not only transforming the IoV experience, but the future of vehicle fleet management. The new solution allows users to easily track, monitor and manage any type of fleet vehicles on a Web browser anywhere and anytime. With Xfleet, users can not only reduce overall costs by effectively utilizing resources such as vehicles, fuel, and manpower, but also improve management efficiency and business performance by keeping and analysing the historical records of the vehicle data as needed.GeoVision cameras can recognize human faces in 1.5 seconds, making possible identification of authorized versus un-authorized personnel Virtual Reality Camera GeoVision showed off the VR 360, the world’s first Virtual Reality camera that can provide a 720° view. President David Huang said it’s the only camera with two Fisheye lenses to provide a floor to ceiling, 720° view with no blind spots. It’s ideal for security environments such as airports, train stations, city streets, harbors and highways. The camera uses advanced computer vision technology to simulate a three-dimensional, highly realistic, and practical 3D space. It’s water-proof, vandal-proof and dust resistant, making it ideal for outdoors. It also boasts IR Night Mode for clear images even in dark environments. Huang also demonstrated new facial recognition IP dome camera with cutting-edge AI. It can recognize human faces in 1.5 seconds, making possible identification of authorized versus un-authorized personnel, creation of blacklists for restricted personnel, and VIP lists to improve relationship management. Intruitive Touch LCD Switch PLANET explained how the Intuitive Touch LCD Switch makes it possible to easily manage powered devices in real time, greatly enhancing network management efficiency. Tammy Huang, Sales Manager, noted that it’s the unique touch LCD that makes such management possible. In addition to the touch LCD interface, the solution features L2+ switching, intelligent PoE management and an ONVIF support function. An Industrial flat-type touch LCD switch model is also offered, making possible management of large-scale networks.VIVOTEK’s Smart Stream II and H.265 technology allows users to benefit from reduced bandwidth and data storage demands VIVOTEK’s Network Cameras With the theme ‘Security within Security,’ Shengfu Cheng, Director of Marketing and Product Development, demonstrated the first cybersecurity enhanced network cameras in the IP surveillance industry. The three new cameras are armed with Trend Micro’s anti-intrusion software, allowing them to automatically detect and prevent credential attacks and block suspicious events. They also feature VIVOTEK’s Smart Stream II and H.265 technology, allowing users to benefit from reduced bandwidth and data storage demands by up to 90% more than systems employing H.264. Low-Light Surveillance Add to that a new generation of night visibility technology, Supreme Night Visibility II (SNV II) which allows them to reproduce high-quality colour images, even in very low-light conditions. In the security industry, the United States is the largest buyer of electronic security products and spent $12.3 billion on imports in the field in 2016. And Taiwan constitutes North America’s 4th largest trade partner in the electronic security field, with an import value that was close to $1 billion in 2016. Throughout ISC West 2018, Taiwan exhibitors will present their latest innovations. In pursuit of Asia’s Silicon Valley vision of propelling Taiwan to the international forefront of technology, Taiwanese companies continue their pursuit of excellence and innovation.
Global and domestic threats have highlighted the need for tighter security across all verticals. One of the technologies that has redefined situational awareness and intrusion detection is thermal imaging. Once a technology exclusively manufactured for the military operations, thermal cameras today are deployed across hundreds of security applications and continue to see strong demand in existing and emerging commercial markets. With thermal technology, security personnel can see in complete darkness as well as in light fog, smoke and rain Technology Overview And Early Adoption What distinguishes thermal cameras from optical sensors is their ability to produce images based on infrared energy, or heat, rather than light. By measuring the heat signatures of all objects and capturing minute differences between them, thermal cameras produce clear, sharp video despite unfavorable environmental conditions. With thermal technology, security personnel can see in complete darkness as well as in light fog, smoke and rain. Originally a military developed, commercially qualified technology, the first thermal cameras for military and aircraft use appeared in the 1950s. By the 1960s, the technology had been declassified and the first thermal camera for commercial use was introduced. However, it wasn’t until the late 1990s - when FLIR Systems introduced a camera with an uncooled thermal detector - when the technology began to see substantial adoption beyond government defense deployments. Installations At Critical Infrastructure Sites In the 2000s, industrial companies were some of the first adopters of thermal, using the technology for predictive maintenance to monitor overheating and machine malfunctions. In the years following the September 11 terrorist attacks in 2001, there was an increase in thermal camera installations across critical infrastructure sites. Stricter security requirements drove the deployment of thermal cameras for perimeter protection, especially in the nuclear power sector. Thermal cameras produce clear video in daylight, low light or no light scenarios and their sharp images result in higher performing analytics In 2010, the U.S. Nuclear Regulatory Committee released its 73.55 policy, which states nuclear facilities must “provide continuous surveillance, observation and monitoring” as a means to enhance threat detection and deterrence efforts onsite. Because thermal cameras produce clear video in daylight, low light or no light scenarios and because their sharp images result in higher performing analytics, thermal cameras quickly became the preferred option for nuclear facilities. Likewise, following the 2013 sniper attack on PG&E Corporation’s Metcalf transmission substation, the Federal Energy Regulation Commission introduced the Critical Infrastructure Protection Standard 014 (CIP-014). The policy requires utilities to identify threats to mission critical assets and implement a security system to mitigate those risks. This statute also led to more thermal installations in the utility sector as thermal cameras’ long-range capabilities are ideal for detection of approaching targets beyond the fence line. The demand from both industrial and critical infrastructure entities, as well as other factors, helped drive volume production and price reduction for thermal, making the technology more accessible to the commercial security marketplace. Commercial Applications In recent years, the increasing affordability of thermal cameras along with the introduction of new thermal offerings has opened the door to new commercial applications for the technology. In the past, thermal cameras were designed for applications with enormous perimeters, where the camera needed to detect a human from 700 meters away. Locations like car dealerships, marinas and construction supply facilities can be protected by precise target detection, thermal analytic cameras providing an early warning to security personnel Today, there are thermal cameras specifically designed for short- to mid-range applications. Developed for small to medium enterprises, these thermal cameras ensure property size and security funds are no longer barriers to adoption. Lumber yards, recreation fields and sports arenas are some of the commercial applications now able to implement thermal cameras for 24-hour monitoring and intrusion detection. Affordable thermal cameras with onboard analytics have become attractive options for commercial businesses Innovation And Advancements Innovation and advancements in the core technology have also spurred growth in thermal camera deployment, providing faster image processing, higher resolution, greater video analytic capabilities and better camera performance. In particular, affordable thermal cameras with onboard analytics have become attractive options for commercial businesses that need outdoor, wide area protection. Car dealerships, marinas and construction supply locations all store valuable merchandise and materials outside. Without protection, these assets are vulnerable to vandalism and theft. However, by providing precise target detection, thermal analytic cameras provide an early warning to security personnel so that they can intervene before a crime is committed. By helping to deter just one incident, the thermal solution delivers a clear ROI. New Market Opportunities Not only are there more thermal cameras in use today than ever before, but there are also more thermal sensors being integrated with other multi-sensor systems, driving the adoption of thermal in new markets. For large perimeter surveillance applications, thermal is repeatedly being integrated with radar and drones to expand situational awareness beyond the point of fixed cameras. Users get immediate, accurate alerts of approaching targets and evidentiary class video for target assessment In the commercial market, thermal imagers are combined with optical sensors, analytics and LED illuminators into one solution that integrates with central monitoring station platforms. By bringing these technologies together, users get immediate, accurate alerts of approaching targets and evidentiary class video for target assessment. The result is a lower number of false positives, reducing the total cost of ownership for the solution. These multi-sensor solutions also feature two-way audio capabilities, which enable remote security officers to act as “virtual guards” and speak to intruders in real-time to dissuade them from illegal activity. The introduction of solutions that integrate all these state-of-the-art technologies under one unit reduces the amount of capital and infrastructure needed for deployment. Consequently, more small businesses and alarm monitoring companies can implement advanced perimeter security technologies like thermal sensors, some for the very first time. Thermal cameras have gone from military defense devices to widespread commercial security cameras Multi-Sensor Thermal Solutions Multi-sensor solutions featuring thermal are quickly gaining traction and opening the door to new business opportunities for the security channel. One of the primary reasons for the strong market interest in these systems is they enable integrators to increase their recurring monthly revenue (RMR). With intense price competition and eroding margins on CCTV equipment, integrators have to rely on RMR to grow their businesses. Offering remote video monitoring services and virtual guarding technologies is one of the best ways to do so. Additionally, there is a clear demand for it. Central stations are continually looking for new technologies to offer their customers and businesses are interested in economical alternatives to physical guards. In conclusion, thermal cameras have gone from military defense devices to widespread commercial security cameras that are a substantial segment of the outdoor security protection market. From nuclear power plants to construction locations, thermal technology is being implemented to secure sites around the globe.
Live events at large venues like arenas, stadiums or convention halls – whether they involve wrestlers breaking chairs over each other’s heads, Axl and Slash letting bygones be bygones and reuniting Guns ‘n’ Roses, your favorite NFL team annihilating the opposition 62-3, or a convention involving anything from politics to food to Star Trek – are exciting affairs that channel the camaraderie of the crowd into a powerful collective energy. But they also are vulnerable to threats. Physical Security Solutions Terrorists and other malefactors have known for centuries that any large gathering of people has inherent vulnerabilities on which they can prey: Crowds make it hard for security to keep track of any single person or spot unusual behavior, and the number of people congregated in one space amplifies the impact of any attack. In recent years, organizers of large events have augmented the security methods they use to protect a venue, using both walk-through metal detectors and hand wands, and deploying K9 and police units to patrol the lines to enter security. But these current methods share a universal flaw: to be caught, evil-doers have to be on the verge of actually entering the venue with hundreds of other people, which means they can still cause a massive amount of destruction. In a survey conducted by Brivo, 50 percent of business security leaders felt they lack adequate budget and financial resources to invest in physical security solutions. Augmented Security Measures Organisers of large events have augmented the security methods they use to protect a venue, using both walk-through metal detectors and hand wands Security professionals and event organizers are constantly on the verge of finding new methods to implement in order to add an extra layer of security at venues and large facilities. For example, at this year’s Coachella Music Festival in Indio, California, which attracts over 100,000 attendees each year, organizers boosted their security initiatives by adding drones, armed guards, magnetometers and dog patrols. Unfortunately, large entertainment festivals have been a target for ill-intended individuals. Last year, the 91 Route Festival in Las Vegas, Nevada took the lives of more than 50 people and injured over 500. In the United Kingdom, 22 people lost their lives to a suicide bomber at an Arianna Grande concert in the Manchester Arena. Yet, concerts aren’t the only place new security initiatives and technology need to be implemented in, but also sports arena and large facilities. Metrasens partnered with Villa Park, the football grounds for Aston Villa Football Club in the UK, to conduct a trial using FMDS technology, Proscreen 900, to screen fans Current Screening Methods Conventional walk-through metal detectors are a compromise between effective screening and high throughput, as they successfully detect metal objects, but only can screen about five or six people each minute. They are generally placed 10 to 20 yards from a venue’s front façade, either just outside or just inside, to screen people as they enter the facility. Hand wands are used for anyone that sets off the walk-through detector as a secondary screening method for confirmation. Many facilities also use observational methods to screen, such as drones, surveillance cameras, security officers or police walking the crowd and looking for suspicious behavior, or explosives-sniffing K9 units patrolling the area. Security personnel are aware of these pre-security-screening vulnerabilities around the perimeter of the venue Security Method Limitations Each of these methods has intrinsic limitations. Observational security methods are just that – observation-based, not detection-based. They rely much more heavily on human factors that introduce greater degrees of error and chance, and positive visual identification of a suspicious threat requires a relatively close proximity to observe the threat. They’re also slow and laborious. Walk-through detectors and wands will catch someone trying to enter a facility with a weapon, but by the time they do, it may be too late – a terrorist will already be well within proximity to do a lot of damage. Bad guys don’t need to actually enter the venue; they just need to get close enough to injure or kill a large number of people. That can happen – and has happened, such as with Manchester Arena bombing in 2017 – right at the security point, where a terrorist will be surrounded by dozens or hundreds of people and 10 to 20 yards away from the critical asset: the interior of the venue. Security personnel are aware of these pre-security-screening vulnerabilities around the perimeter of the venue. What they haven’t had until recently is a way to screen mass amounts of people for weapons of mass casualty as far away from the critical asset as they can, and as far away from densely populated areas as they can, all while not impeding throughput resulting from the requirement for patrons to divest their possessions. Expanding Security Reach With FMDS The far perimeter of a venue is an ideal place to screen for weapons of mass casualty. Most of the time, a terrorist is trying to get closer to the immediate perimeter of the venue, to inflict the most damage to large groups of people waiting to get in; farther away, event attendees are walking toward the entrance and thus are more dispersed, not standing in clusters or lines. This advance screening is possible using ferromagnetic detection systems (FMDS). The FMDS systems in the trial, Proscreen 900, were placed outside, where individuals were screened for large weapons before they even entered the football stadium Metrasens recently partnered with a football stadium in Birmingham, UK to conduct a trial using FMDS technology to screen fans. The trial took place in March at Villa Park, the football grounds for Aston Villa Football Club. The stadium can hold over 42,000 people. The FMDS systems in the trial, Proscreen 900, were placed outside, where individuals were screened for large weapons before they even entered the football stadium, adding an extra layer of security. FMDS is highly accurate – there is no false alarm rate, because it is programmed to find only what security personnel need to find In the most basic terms, FMDS uses passive sensors that evaluate disturbances in the earth’s magnetic field made by something magnetic moving through its detection zone. Everything else is invisible to it; it doesn’t see people, clothing, backpacks, purses, etc. Nothing can be used to shield the threat, because FMDS doesn’t detect metallic mass; it detects a magnetic signature, down to a millionth of the earth’s magnetic field. It is also highly accurate – there is no false alarm rate, because it is programmed to find only what security personnel need to find (e.g., a weapon). Although it is a passive technology, it is more effective and reliable than using observational security methods to screen a perimeter, because the technology will never miss something the way a human would. Recognizing Moving Magnetic Signatures An important point is that the system only works on moving objects. This makes it immune to environmental conflicts such as rebar that would trip up conventional metal detectors and allowing people to be screened quickly and unobtrusively without stopping to divest their possessions as they walk toward a venue – up to 50 or 60 people a minute. FMDS does not need people to be organized into lines or groups; it simply detects a magnetic signature on anything that passes. It runs on batteries – there is no need for an electricity source, as with a walk-through detector – and can be placed on just about any form factor (a pole, a stand, etc.). This gives security personnel flexibility when deploying FMDS, allowing them to create a wide perimeter around a venue without worrying about portability or a power source. Screening can be as obvious or as concealed as personnel prefer for a particular situation, based on the form factor they select. FMDS simply gives the opportunity to add a layer of security where there currently is not an effective solution All of these combine into a solution that creates a way to close a gap in mass screenings at large events, by expanding the secure perimeter and creating a highly accurate way to detect weapons of mass casualty farther away from a critical asset and large crowds. It does not replace screening for smaller items necessarily, and all large venues should use a layered security solution that also deploys tactics like roving security guards, walk-through metal detectors and hand wands. FMDS simply gives the opportunity to add a layer of security where there currently is not an effective solution. Effective Mass Screening Solution Pessimists sometimes muse the world is getting more dangerous with each passing year, and that technology is at least partially responsible for both the breadth and depth of the increasingly creative ways bad guys harm people. But some technologies also are responsible for helping to fight against those threats and make the world safer, and FMDS is one of those. By providing a foolproof method of detecting weapons of mass casualty before terrorists get too close to an event venue, FMDS gives event security personnel a way to better protect large events, making them less dangerous and keeping people safe. Images source: Metrasens
It had been a particularly slow night. The plant security guard had just made his rounds on this Sunday evening shift. As soon as he passed the weighing scales, he could enter the guard shack and get off his feet. Challenging A Curious Incident However, on this night, he noticed the waste vendor’s truck sitting half on and half off the scale. He stopped dead in his tracks to see if the truck would back up and completely sit on the scale. It never did. The observant guard walked up to the truck and challenged the driver who seemed surprised. “Hey, you’re not weighing your truck properly.” The driver fumbled for a response before replying, “Sorry, I was on the phone with a friend. I didn’t notice it.” But this security guard had the presence of mind to demand the driver’s phone. The driver was caught off guard and surrendered the phone. The guard then pulled up the most recent incoming/outgoing calls and saw no calls during the last 30 minutes. “I don’t think so.” “You don’t think so what?” The security guard was frank, “You haven’t used this phone in over half an hour.” The truck driver sheepishly acknowledged the fact. It was decided to install video surveillance covering the weighing area and scales – no easy feat due to poor lighting Preventing Crime As It Happens Knowing the driver was lying, the security guard ordered the truck back on the scale for a correct weighing and advised the driver that he would report the incident. The security guard wrote up his report and handed it off to his supervisor who, in turn, contacted the local corporate investigator. This investigator was soon on the phone with his boss at corporate headquarters on the other side of the world. Together with Security, they decided to install video surveillance covering the weighing area and scales – no easy feat due to poor lighting. However, once completed, they waited. They would not have to wait long. For the next two months, the waste vendor trucks, filled to the brim with production waste, black-and-white paper and other waste products from the plant, would stop on the scale only for a moment and then drive the front half of the truck off the scale for weighing. It was obvious that the vendor was cheating the company by only paying for half the waste. After two months, it was decided to catch the next cheating driver “en flagrante.” Sure enough, the next truck went half on and half off the scale and was weighed. Security then asked the unsuspecting driver to park his truck and invited him inside the building to talk to a supervisor. The driver signed an incriminating statement about the scheme and his role therein. They sent him on his way asking him to keep it quiet Waiting for the driver in a large office was the local investigator and his close friend, the Head of Security. After a difficult interview, the driver admitted to cheating on the scales over a two-year period—he claimed that some of the scale cheating was done at the direction of the vendor’s management, while some of it he did himself by “ripping off” the vendor—which he acknowledged was dangerous. Working With Authorities The driver signed an incriminating statement about the scheme and his role therein. They sent him on his way asking him to keep it quiet—they would see what they could do for him later on. In the meantime, Corporate Investigations had received a due diligence report on the vendor company which contained disturbing news—the company and its managers were associated with a countrywide waste management mafia. The report suggested that the vendor had a reputation for thefts and involvement in numerous lawsuits regarding thefts and embezzlement. Shockingly, no prior due diligence had ever been conducted on the vendor. Fortunately, the plant’s finance and audit team had maintained good records over the past 5 years and were able to re-construct the amount of waste going out the plant door and the amounts being claimed and paid for by the vendor. The discrepancy and loss stood at a multi-million dollar figure. After consulting with the local police authorities and company lawyers, it was decided to pursue a civil case against the vendor. Pursuing Legal Action The regional lawyer, the Head of Investigations, the Head of Security and the CFO invited the vendor to discuss the problem. Some of the evidence was shown to the vendor’s CEO who became indignant and, in order to save face, promised to fire the truck drivers and to repay any losses for the last two months. Inter-dependent entities - security, investigations, finance/audit and legal - combined their resources and agendas to form a unified front That was not enough for the company and a protracted legal battle ensued which lasted several years and resulted in the vendor’s paying almost the entire amount in instalments. The vendor was dropped from the contract and internal controls strengthened—the only plant employee dealing with the waste issue left the company and was replaced by two individuals. The plant also began paying more attention to the waste process and less to the production side. Several “lessons learned” come to mind. First, the tripwire came in the person of an astute and well-trained security guard who exhibited some of the best characteristics you want to see from men and women in that profession. The Security Department was also adept at installing the surveillance system and capturing the fraud live on videotape. But a far greater lesson was learned—of what can happen when inter-dependent entities (security, investigations, finance/audit and legal) within a company combine their resources and agendas to form a unified front. The results speak for themselves.
The 2018 FIFA World Cup tournament is bringing 32 national teams and more than 400,000 foreign soccer fans from all over the world to 12 venues in 11 cities in Russia. Fans are crowding into cities including Moscow, St. Petersburg and Kazan. Given continuing global concerns about terrorism, security is top-of-mind. Protection of the World Cup games in Russia is focusing on an “integrated safety, security and service approach,” according to officials. Combining the term “security” with the terms “safety” and “service” is not an accident. An aggressive security stance is necessary, but at the end of the day, fan safety is paramount, and a service-oriented approach ensures a positive fan experience. Medical responders will be working side-by-side with police and antiterrorism personnel. Risk Management Best Practices We asked Sean T. Horner and Ben Joelson, directors of the Chertoff Group, a global advisory firm focused on best practices in security and risk management, to comment on security at FIFA World Cup 2018. Although not involved in securing the 2018 World Cup, the Chertoff Group is experienced at securing large events and enterprises using risk management, business practices and security. Integration is another important aspect of protecting the games, says Horner. The use of multiple resources, including Russian military, intelligence and law enforcement, will be closely integrated to provide the best security for the large-scale event in each of the host cities, he says. The approach will be centralized and flexible, with resource deployment guided by effective situational awareness.Primary security and emergency operations centers will be dispersed throughout each host city “There is a unified command structure at the Russian Federation level, and they will keep resources in reserve and shift them as needed to various events and venues based on any specific intelligence, in effect deploying resources where threats are greatest,” says Joelson. “There will also be some regional commands, and resources will incorporate a spectrum of police and military personnel ranging from the ‘cop on the beat’ to the Spetsnaz, the Russian ‘special forces.” Primary security and emergency operations centers will be dispersed throughout each host city, and additional forces can be shifted as necessary, he notes. Role Of Law Enforcement In Russia, the lines of separation between law enforcement and the military are not as stark as in the United States, for example, where military forces are restricted from deployment for domestic law enforcement by the Posse Comitatus Act. In Russia, there is no such restriction. A broad range of technology will play a role at the World Cup, Horner and Joelson agree. Technology will be used primarily as a force multiplier and a decision-support tool for security personnel. There are robust CCTV systems in many Russian cities, and mobile CCTV systems, such as camera towers or mobile security centers on wheels, will also be deployed. Technologies will include infrared cameras, flood lights, and ferromagnetic screening systems to scan hundreds of individuals as they walk by. In some locations, facial recognition systems will be used, tied into various intelligence, military and law enforcement databases of known bad actors. Behavior analytics will be used as a decision-support tool. In addition to security in public areas, private CCTV systems in hotels, at transportation hubs, and inside the venues themselves will be leveraged. Video analytics and detection will help personnel review live view of people who may be acting suspiciously or who leave a bag unattended. In some locations, facial recognition systems will be used, tied into various intelligence, military and law enforcement databases of known bad actors Rigorous Anti-Terrorism Measures A Fan ID card is required to enter the 2018 FIFA World Cup Tournament, even for Russian residents. The Russians have an aggressive stance against domestic terrorism, which will also help ensure the safety of the World Cup games, say Horner and Joelson. Terrorist group ISIS has promised “unprecedented violence” at the games, but they make similar threats at every major global event. Russia has been an active force disrupting ISIS in Syria, and experts suggest that losing ground geographically could lead to addition “asymmetric” terrorist attacks. However, Russia is leveraging all their intelligence resources to identify any plots and deploying their security apparatus to disrupt any planned attacks, experts say. Russia’s rigorous anti-terrorism measures include a total ban on planes and other flying devices (such as drones) around the stadiums hosting the World Cup. Private Security In addition to military, intelligence and law enforcement personnel, private security will play a have a high profile during the 2018 World Cup in Russia. Private security personnel will be on the front lines in hotels and in “fan zones.” They will operate magnetometers at entrances, perform bag checks, enforce restrictions on hand-carried items, etc. Private security will be especially important to the “guest experience” aspects of protecting the games.Private security will be especially important to the “guest experience” aspects of protecting the games Another private security function at the World Cup is executive protection of dignitaries and high-net-worth individuals who will be attending. Executive protection professionals will arrive early, conduct advanced security assessments before VIPs arrive, and secure trusted and vetted transportation (including armored cars in some cases.) VIPs will include both Russian citizens and foreign (including U.S.) dignitaries attending the games. Private security details will be out in force. Aggressive Security Approach Overeager and outspoken fans are a part of the football culture, but Russia will deploy a near-zero tolerance policy against hooliganism and riots. An overwhelming force presence will take an aggressive approach to curbing any civil disturbances, and offenders will be removed quickly by Russian security forces. Strict restrictions on the sale and consumption of alcohol will be enforced in the venue cities before and after the matches. Officials will also be cognizant of the possibility of a riot or other event being used as a distraction to draw attention from another area where a terrorist event is planned. It will be a delicate balance between deploying an aggressive security approach and preserving the fan experience. Joelson notes that freedom of speech is not as valued in Russia as in other parts of the world, so the scales will be even more tipped toward security. “The last thing they want is for things to get out of control,” says Horner. “The event is putting Russia on the world stage, and they want visitors to walk away safely after having a great time and wanting to go back in the future.”Attendees should also have good situational awareness, and keep their heads up, scanning crowds and identifying unsafe situations" Precautions for World Cup attendees Attendees to the World Cup in Russia should take some basic precautions, Horner and Joelson agree. For example, Russia requires a translated, notarised letter explaining any prescription drugs. The country has a more aggressive foreign intelligence environment, so visitors cannot depend on their data being private. Joelson recommends the usual “social media hygiene” and privacy settings. Visitors should not post information about their travel plans or locations, and it’s best to travel with a disposable mobile phone that does not contain personal information. Location tracking should be deactivated. Travelers should also beware of talking and sharing information with others, or of saying anything derogatory. “They should also have good situational awareness, and keep their heads up, scanning crowds and identifying unsafe situations,” says Joelson. “If you bring a personal electronic device, you should expect that it has been compromised,” says Horner. Text messages and email will not be private, and he suggests creating an email address used only for travel. Don’t leave drinks unattended. Travelers from the U.S. should register at the Smart Traveler Enrollment Program (STEP) operated by the U.S. State Department. “Plan before you travel and before you get to the airport,” says Horner.
Several recent terrorist and mass violence attacks have been directed at soft targets, or relatively unprotected locations where people gather such as outside a music venue or in the unscreened passenger areas at airports. Attacks in public areas have led to the development of new security technologies aimed at protecting soft targets. One company addressing the challenges is Evolv Technology and its Edge automated high-speed personnel screening solution. The system integrates walkthrough firearm and explosive detection for high-throughput protection of events and soft targets.The Edge system has multiple detection sensitivity settings to respond to various threat scenarios Enhanced Visitor Experience The system seeks to increase security without compromising the ‘customer experience’. People simply walk through single-file – between two 5-foot-tall stanchions. One lane can screen up to 800 people per hour, and the system detects explosives or metallic objects without the need for pat-downs or wands or other invasive procedures. Any personal belongings can remain in visitors’ pockets. A single security guard is needed for each lane to verify any detected threats. “The system combines an improved security posture with a better visitor experience,” says Mike Ellenbogen, CEO of Evolv Technology. “We need to fly and have been trained to be screened at the airport, but we don’t expect to be screened going to see a ball game or a Mozart concert. Evolv recognized a need for a new way to inspect people before they enter these types of facilities. It’s a seamless system that pulls various technologies together. We want to feel safe but without having to sacrifice the quality of the experience.”Screening analytics provide data on the numbers of people screened by time of day and by result The system combines millimeter wave and magnetic field sensors, along with artificial intelligence (AI)/ machine learning and can incorporate additional data such as biometrics. Known bad actors can be identified using facial recognition. The system has multiple detection sensitivity settings to respond to various threat scenarios. Expanding Perimeter Protection A security guard provides the human touch by verifying any threats detected by the system. The locations of concealed items are displayed on a photo of the individual using a color-coded box overlay. Screening analytics provide data on the numbers of people screened by time of day and by result. Ellenbogen says the company is working to have the system adopted at entertainment venues, performing arts centers, sports centers, for air and rail transportation, and to protect high-profile government buildings. The Edge system can expand the protected perimeter to a wider area that was previously unprotected. The Edge system can expand the protected perimeter to a wider area that was previously unprotected For example, concert-goers exited the arena of an Ariana Grande concert May 22, 2017, in Manchester, U.K., and entered the surrounding area that was unscreened and unsecured. Placing a user-friendly screening system around a wider perimeter outside the concert venue might have prevented the use of an improvised explosive device in the terrorist attack.Placing a user-friendly screening system around a wider perimeter outside the concert venue might have prevented the use of an improvised explosive device in the terrorist attack Threat Mitigation With Soft Target Approach Likewise, a 2016 bombing at the Brussels Airport occurred in the departure hall outside the passenger screening areas. Securing a wider perimeter – for example, screening customers discreetly as they enter the airport building from a parking area – could have provided additional security against such an attack. Ellenbogen confirms Evolv has sold a number of systems to major European airports to screen visitors and passengers as they enter the front door. “Addressing the threat to an airport or train system is different than screening passengers; we are looking for different types of objects and different types of materials. The idea is to be able to detect threats to a venue before they get into the venue.” The soft target approach can also be applied to public buildings, such as courthouses, and used in lieu of more invasive metal detectors and x-ray machines. The portability of the Edge system enables a ‘pop-up’ approach to security – i.e., to relocate the system to address specific or changing security threats easily. The self-contained system only requires a wall plug. Labor reduction (because of faster throughput) can help offset the system costs but it’s difficult to quantify the improvement in the visitor experienceImproving Security Posture At Event Venues “It’s surprising the level of importance [venue owners] put on the visitor experience,” says Ellenbogen. “They see that their brand starts at the front door. They are eager to find alternative security solutions that come across as more inviting, less imposing, less closed down, less invasive than the solutions they have been using,” he says. “They are driven by a desire to improve the visitor experience as they improve the security posture.” He says current events, including terrorist attacks and mass shootings, drive awareness among venue owners to improve the security of soft targets. “The level of interest is high, and it spikes somewhat when there is a big headline,” Ellenbogen says. He notes that the system is more expensive than a metal detector, but about a third the cost of familiar airport body scanners. Labor reduction (because of faster throughput) can help offset the system costs, but “it’s difficult to quantify the improvement in the visitor experience,” Ellenbogen says.
“Mixed reality” may seem like a strange term to apply to the physical security industry, but it describes a new approach to enable the features of access control and video surveillance systems to be used by operators in the field. Mixed or augmented reality technology combines a real-time view of the world through Microsoft’s HoloLens headset, with placement of virtual devices and controls as holograms in a three-dimensional space. Virtual Devices And Controls In effect, a security guard wearing a HoloLens headset can approach a door in his facility and see the real-time status of that door, provided by an access control system, projected as a hologram alongside his live view of the door. It’s the first implementation of a technology with many possibilities. Related to video surveillance, real-time facial recognition could provide the identity of a person walking past a security officer in a hallway, for example. Basically, the approach extends the interfaces and capabilities available in a control room to a security officer on patrol. The officer can place and interact with a variety of virtual devices and controls as holograms in the 3-D space he or she views through the headset. Augmented Reality For Integrated Electronic Security The security industry technology has been developed by CodeLynx, a software engineering and systems integration company headquartered in North Charleston, S.C. As a systems integrator, CodeLynx specialises in audio-visual and physical security design and installation for A/V, access control and video surveillance systems. A complementary business is software engineering; Darren Cumbie, Director of the Software Engineering Division, and his team provide custom integrations of various technologies. The approach extends the interfaces and capabilities available in a control room toa security officer on patrol CodeLynx has developed software to adapt Microsoft’s HoloLens product for use in the physical security field. They are bringing it to market as ARIES (Augmented Reality for Integrated Electronic Security). The software operates using Microsoft’s HoloLens, introduced in 2016, a powerful, self-contained holographic computer worn as a headset. Specialized components enable holographic computing in lockstep with advanced sensors, including five cameras. Users can move freely throughout an environment and interact with holograms that augment the reality they view through the HoloLens. Cumbie says HoloLens provides the best mixed reality headset currently available: “Nothing else has the power, usability and scalability across an organization.” AMAG Symmetry Access Control Integration In ARIES, CodeLynx has created a certified integration with AMAG’s Symmetry access control system to enable operators to view information from Symmetry as holograms in their field of view through the HoloLens. The integration extends the functioning of Symmetry to operators in the field, thus expanding the control room environment. Holograms can be created and positioned for each user, and they function just like physical devices, tied into Symmetry. Approaching a door, an operator can request a list of the last five people who came through the door, for example; he or she can see a photo ID related to each person who swipes through a turnstile. CodeLynx is looking to expand the market for ARIES using integrations with other OEMs in addition to AMAG. “Instead of being chained to their desk looking at monitors or a display wall, operators can work in the field using the full functionality of their systems as they walk throughout the property,” says Drew Weston, CodeLynx Director of Sales and Marketing. “Meanwhile, I am not sitting at a desk, I am out in public.” Holograms can be created and positioned for each user, and they function just like physical devices, tied into Symmetry At some point, the headsets will likely get lighter and more ergonomically appealing. Right now, all the computing power is inside the headset (which, even so, only weighs only 1.3 lbs). In the future, more of that computing will likely be “offloaded” to a nearby desktop or laptop computer, or even to the cloud, and wirelessly “tethered” to the headset. In addition to making the headsets lighter and more ergonomically appealing, tethering would bring down costs from the current $5,000 per headset (possibly into the “three digit” range). CodeLynx is poised to leverage any Microsoft enhancements to the HoloLens environment. Currently the software is priced at $1,500 per user. Benefits For Systems Integrators For systems integrators, ARIES could be used to simplify installations, given its ability to view camera frames through the headset hands-free rather than needing to view a separate laptop when focusing or positioning a camera. For maintenance or troubleshooting, an operations center could access the field user’s view and direct him or her to correct a problem. In this way it would be a training tool to help integrators, which is a separate value proposition from how the devices may be deployed by end users. The ARIES approach could also eventually change how we think of a control room. Instead of video screens and walls, operators might sit in comfortable chairs in rooms with white walls, viewing all the control room “screens” through their headsets as holograms. Less power consumption would be among the benefits. ARIES plans to offer a “virtual operations center” in 2018, enabling command center operation from anywhere, user-customizable layout views and the ability to push content to specific HoloLens users. This video demonstrates how interaction with holograms can drive security functions: https://www.youtube.com/watch?v=B82oAlxt5_s
On September 2, torrential rain caused mountain flood and massive landslide swept Mengdong Town of Yunnan province in southwestern China. Local transportation, electricity and communications network were disrupted. At 9:00PM, in order to reinforce local rescue forces, Yunnan Provincial Fire Brigade dispatched 24 vehicles and 130 firefighters, who later experienced serious challenges in communications in areas where intermittent voice call and short messages in cellular service was available only on heights. Hytera swung into action immediately after being notified about the firefighting department’s emergency communications requirements. Hytera iMesh Broadband Network Solution A Hytera technical team brought the latest emergency communications equipment with them and joined the firefighters onsite. The team quickly set up an ad hoc wireless network with Hytera iMesh broadband networking solution. This broadband network has been facilitating real-time audio and video communications and coordination between the onsite forces and the Provincial Fire Brigade command center. Multiple casualties have been reported and more people are missing. The relief effort is ongoing.
Upon hearing Pablo Picasso’s famous praise of art’s ability to clear “the dust of everyday life,” one’s thoughts could easily turn to one of Arizona’s newest landmarks, the Mesa Arts Center. Set proudly amidst the dust of the Sonoran Desert, the Mesa Arts Center is a striking complex of buildings, art installations, and public throughways, offering a rich blend of visual impressions in glass, water, stone, and metal, with splashes of vibrant color and metallic reflection. At more than 21,000 sq. feet, the award-winning $95 million campus is the largest and most comprehensive performing, visual and educational arts complex in Arizona, serving as a gathering point for the citizens of Mesa and region alike, seeking to enjoy the indoor and outdoor spaces, public events, classes, and art exhibitions. The presence of an adjacent light rail station and hosting of multiple festivals throughout the year further increase traffic to, from, and through the open planned site at various hours of the day, and on weekends and even holidays. IP Video Surveillance The heart of the Mesa Arts Center complex is a grand promenade that knits together all of its pieces The heart of the Mesa Arts Center complex is a grand promenade that knits together all of its pieces, while providing places for group gatherings, performances, and quiet reflection, comfort and relaxation. Ensuring a safe, family friendly environment is essential to fulfilling the role the center plays as a gathering point for all walks of life. In addition to welcoming visitors to the Center, the open configuration of the complex invites commuters coming off the nearby light rail line to stroll through on their way to and from the station, and draw loiterers, would-be vandals, and itinerant populations (attracted to the semi-secluded spaces created by outdoor art installations and the complex’s fountains and water elements). Particularly outside of traditional hours of operation, such factors can increase the risk of nuisance crimes, vandalism, and petty theft, and potentially more serious crimes against visitors and staff, without a vigilant and comprehensive security and surveillance operation. Additionally, complex spaces, varied materials, and water elements increase risk for incident and accident without proper prevention and/or prompt response. Manned Guarding And CCTV While customary approaches to similar venues have typically relied heavily on a combination of CCTV and human security guards, the size and complexity of the Mesa Arts Center campus makes a traditional manned guarding solution, even when supported by a typical surveillance technology, both cost prohibitive and potentially inadequate. The Mesa Arts Center is an architectural showpiece and regional destination, requiring comprehensive surveillance at all hours, every day of the year, under highly variable conditions. A comprehensive technical solution with proven power, performance, and reliability was paramount to ensure protection of property and the safety of everyone on campus. The City of Mesa, who operates the center, in partnership with Scottsdale’s Surveillance Acquisition Response Center (SARC) and IDIS technology provide a mix of surveillance cameras and network video recorders (NVRs) able to meet the varied requirements of a campus housing multiple art galleries, studios, performance spaces, walkways and cut-throughs, and outdoor gathering spaces, and support SARC’s innovative approach to virtual guarding, which incorporates military, police, and intelligence best practices and personnel to enhance traditional remote monitoring models and outcomes. IDIS DirectIP NVRs And Surveillance Cameras The City of Mesa’s previous successes implementing SARC and IDIS technology at the Mesa Grande Cultural Park made the integration of technology and monitoring a natural fit The City of Mesa’s previous successes implementing SARC and IDIS technology at the Mesa Grande Cultural Park made the integration of technology and monitoring selected for the Mesa Arts Center a natural fit. Featuring multiple IDIS DirectIP [model number] network video recorders (NVRs), and IDIS Direct IP [model number] cameras, with [feature set] at the heart of a comprehensive security posture, SARC monitors use IDIS’s powerful, modular, and feature-rich VMS, IDIS Solution Suite and their unique military, law enforcement, and intelligence-derived protocols and best practices to support on-site personnel and cover the campus comprehensively at night and during other off-hours. Additionally, the IDIS solution also seamlessly integrates with, recording and managing footage from other camera installations, demonstrating the IDIS dedication to eliminating the common frustrations and complexities of security systems. The implementation of SARC’s virtual guard protection and protocols to support on-site personnel, and the highly visible, but seamlessly integrated, presence of IDIS surveillance cameras, as part of a total IDIS solution, have contributed to the Mesa Arts Center’s reputation as one of the region’s most welcoming and inviting community spaces among the area’s art lovers, families, and neighborhood’s workers (who regularly use the space without fear or discomfort as a gathering place for lunch or pathway to and from the local light rail station). 24/7, the integrated on-site and virtual guarding professionals identify, deter, and document threats to the campus and those within it, using innovative surveillance application bringing together IDIS’s highest quality remote viewing and VMS offerings and SARC’s remote “voice down” virtual guarding protocol, which informs those under surveillance, in real time, that they are being watched and should leave the property immediately or face consequences. IDIS IP Video Surveillance Secures Mesa Arts Center The successful implementation of this solution has placed the City of Mesa and Mesa Arts Center management at the forefront of innovation in keeping the people, places, and property under their protection safe and secure, and marked them as leaders in responsible stewardship of taxpayer, grant, and donor dollars, through the implementation of a system that provides more comprehensive coverage, measurably better outcomes, and enhanced visitor experiences 24/7, year-round for a fraction of the cost of previous manned guarding solutions.
Property is one of the biggest targets for crime in the UK, especially open land. There are thousands of acres worth of property across the UK which aren’t effectively secured, as a result of which they have become hot-beds for crime, anti-social behavior, and not least fly-tipping. Security therefore must be a top priority for property owners, too many of whom tend to favor traditional methods such as fencing or hiring security guards. But, these methods come with a premium budget, with manned security running at a cost typically of some £300 per day. Nor is it possible to guarantee that every inch of a property is monitored. An increasingly adopted solution is Ad Hoc Property Management’s Smart Tower Security System and Smart Alarm System. Ad Hoc’s Smart Camera Security Tower sits six metres tall with a 36x optical zoom magnifying distances of up to 150 yards Ad Hoc Smart Camera Security Haringey Council contacted Ad Hoc Property Management after one of its industrial sites, Rosebery Industrial Estate in London, was repeatedly being targeted by fly-tippers over the course of many years. Every time the property was dumped with waste, it was costing the council hundreds of pounds to have their waste contractor called out to clean-up. By November 2017, they had expensed literally hundreds of thousands of pounds. By the end of the month the first Ad Hoc Smart Camera Security Tower was deployed, since then costs and incidents have plummeted. In fact, there have been no major incidents and local residents and tenants alike are delighted, welcoming the improved local environment. Ad Hoc’s Smart Camera Security Tower sits six meters tall with a 36x optical zoom magnifying distances of up to 150 yards, and a 12x digital zoom to enhance optical performance. Using state-of-the-art SMART technology (the same technology used in monitoring US Defense Center, The Pentagon), the tower boasts a 360 degree camera which can be programmed to move zones at set intervals for 24/7 monitoring. Utilizing wireless technology, the camera is able to filter large objects from those that are small, ensuring the alarm is only triggered when there is a clear threat. Ad Hoc’s Smart Cameras have been deployed successfully by numerous property owners around the UK" Ad Hoc's Property Security Solutions “Open land is one of the biggest targets for waste dumping, but it doesn’t have to be. Ad Hoc’s Smart Cameras have been deployed successfully by numerous property owners around the UK, preventing anti-social behavior and, more importantly, reducing opportunity for property-related crime,” said Darren Tubb, General Manager, Ad Hoc Security UK Limited. Land owners aren’t the only ones who can benefit from Ad Hoc’s security solutions; property owners of retail spaces, industrial buildings and homes who traditionally look at hiring in security guards, can benefit too, deterring fly-tipping and other anti-social crimes. As it stands, if a property is fly-tipped and no one is caught, it is the responsibility of the property owner to remove the waste legally at their own expense, which means hiring in a company licensed to remove these materials. However, as more property owners become aware of the technology available to them through Ad Hoc, not just in protecting the property but in helping police to identify the culprits, we could see property damage and fly-tipping become a thing of the past.
As Philadelphia beat New England at U.S. Bank Stadium, fans were able to enjoy the spectacle safely, in part thanks to Lenel. As the host of major national and international events, U.S. Bank Stadium in Minneapolis, Minnesota counts on Lenel to provide advanced security systems that help protect fans attending some of the world’s leading sporting events and concerts. Lenel is part of UTC Climate Controls & Security, a unit of United Technologies Corp. Working in such a high-profile venue, Lenel teams are constantly adjusting systems to maintain a high-level of security. Lenel’s OnGuard security management system has been a vital hub in the $1.12 billion stadium’s comprehensive, layered security plan since the first event in July 2016. In addition to major events, which can hold 66,000 people, the stadium routinely hosts a range of other activities for area residents such as college baseball, distance running and inline skating. The Lenel team helped us create a comprehensive system that works exactly as we drew it up" Integrated Security Bill Langenstein, director of event services for U.S. Bank Stadium venue manager SMG, said OnGuard’s integration of systems helps defuse potentially dangerous situations. “I don’t know of another platform capable of integrating the number and size of disparate systems we have in this stadium,” Langenstein said. “The Lenel team helped us create a comprehensive system that works exactly as we drew it up. The result is we are more efficient and proactive.” The OnGuard system acts as the single platform integrating access control with: More than 400 surveillance cameras monitoring seating areas, concourses and exterior perimeters Visitor management systems checking identifies at delivery gates Video intercoms protecting doors on high-value rooms More than 250 intrusion system alarm points protecting retail shops and ticket windows A real-time incident management system safeguarding attendees and staff Incidents such as an altercation in the stands or a door improperly left open generates a real-time alert for the security team"Pre-Defined Alerts Alex Housten, Vice President and General Manager of Fire & Security Products – Americas, said the incident management integration was critical as it provides stadium security with pre-defined alerts from all systems. Alerts are received in the command centers or on smartphones or tablets carried by patrolling guards. “Incidents such as an altercation in the stands or a door improperly left open generates a real-time alert for the security team,” Housten said. “The OnGuard system helps guards take immediate action. And with the entry of a few keywords, other types of events can be added to the alert list.” Secure Viewing Experience Housten credited the Lenel Custom Solutions Group with seamlessly integrating the incident management system with the OnGuard platform. The group designs, develops and delivers software solutions to create custom solutions often by automating third-party integrations. Langenstein said it’s vital that his team be able to perform their duties at the highest standard as many stadium events draw tens of thousands of fans and millions more television viewers. “We strive to execute our jobs flawlessly,” he said. “It helps to be on the cutting edge of technology. With the Lenel integration, we know we’ll be ready to provide a memorable and secure experience no matter what type of event guests attend at U.S. Bank Stadium.”
To improve safety and instil a tranquil environment for citizens of Lagos de Carrasco (Carrasco Lakes), this residential community in Uruguay invested in a new monitoring system based on video management software from Milestone Systems. Milestone Systems open platform IP video management software (VMS), is helping the lakeside community of Carrasco Lakes in Uruguay to benefit from better security control. Previous multiple standalone systems were not efficient enough. The new networked solution allows ongoing expansions with more cameras and video analytics. Located to the east of Uruguay’s capital Montevideo, Lagos de Carrasco stretches across two islands, and is known for its beautiful houses perched on the lakes’ shores. However, because the semi-private residential community can be freely accessed through city streets, the topic of security is of keen interest to its residents. A few years ago, as the neighbourhood began to grow, the area’s residents decided to invest in updating its video surveillance. Considering its location and conditions, with certain factors like humidity, electrical currents and the physical difficulties surrounding cable extensions, the system that was formerly installed deteriorated over time. This lead to a negative impact on the quality of the surveillance images, as well as to the stability of the system in general. We installed an IP network system that connected to several of the power supply points and featured a wireless connection that stretched across both islands" Installation of IP cameras and XProtect VMS Lagos de Carrasco worked with Milestone Partner Foxsys to execute the modernization project. Its commercial director, Juan Martín González, explained: “In light of the situational requirements, we installed an IP network system that connected to several of the power supply points and featured a wireless connection that stretched across both islands. This was in addition to acquiring new cameras and a video control system in the height of the project.” The previous system’s cameras, roughly five years old, were removed and replaced with about 34 IP cameras manufactured by HikVision and Arecont Vision. With the goal of combining each of these technologies and their new functions, Lagos de Carrasco chose the video management software XProtect Professional from Milestone Systems. Reduced Bandwidth González manages the system bandwidth with the software configuration. “All the security cameras are IP based, and we depend on failover redundancy with the video. It’s a big challenge to work with restricted bandwidth, and XProtect Professional allows us to optimize it, lower our consumption in real time and maintain the best recording resolution possible.” Surveillance is performed in two ways: from the central neighbourhood security office and remotely, from security company BLITZ’s main headquarters. Jaime Márquez, director of BLITZ and manager of security at Lagos de Carrasco, adds that the previously implemented systems were a complex challenge for the operators. “With the introduction of Milestone Systems software, we could optimize the concentration of CCTV personnel, immediately observe different incidents and qualify the seriousness of them. What’s more, we’re now able to conduct pre-analyses to prevent potential crime through the identification of people and/or actions,” says Márquez. This is a complicated situation, seeing as there have been several intrusions specific to the area" Video Analytics For Tresspasser Identification The initial investment is the first of three stages that the Lagos de Carrasco community has planned – another stage focuses on expanding to the farther most western perimeters of the neighbourhood, potentially adding 20-25 additional cameras. “This is a complicated situation, seeing as there have been several intrusions specific to the area. Due to a lot of vegetation and precarious conditions, it faces some larger technical challenges,” González explains. The third and final stage involves integrating different video analytics through Milestone Solution Partners. These include prowling detection methods, identifying trespassers in restricted areas and registering them, identifying and recognizing license plates, as well as establishing alerts for license plates not belonging to any of the residents that enters the neighbourhood.
Ellams, a global manufacturer and supplier of telephone scratch cards based in Nairobi, Kenya, required a foolproof security solution, integrated with access control and video surveillance for their manufacturing units. Matrix provided Ellams with an Integrated Access Control solution comprising of Card based Entry and Exit Readers. Established in the year 1977, Ellams primarily started off as a Security Documents Printer and Business Forms Manufacturer. In the year 2001, Ellams started off with the new venture of developing Telephone Scratch Cards for local telecom and cellular operators. Ellams has two manufacturing units based in Nairobi that supply secure pre-paid scratch cards to Central, Western, Eastern, and Northern Africa. Security being crucial for Ellams with respect to its manufacturing unit, the company was on a look out for a vendor who could meet the below mentioned requirements. Challenges: Dual verification of credentials at main entrance Allow entry or exit to a user in an employee zone if a guard is present in his cabin Guard does not leave while employees are present in an employee zone Keep a check on employees’ movements – whether they enter after gaining access or not, etc. Access Control in each department Pre-defined number of users allowed in a department When a user enters an area, the event is recorded till he/she leaves Generate alarm on violation of access rules Solutions: Web-based access control solution with card-based entry and exit readers Integration with beam detector for checking user availability in an area after entering the premises Man-Trap feature to open one gate at a time Employees allowed access only if guard is present Occupancy control to ensure defined number of people are allowed in the respective zone Camera remains on in presence of employees in a respective zone and turns off in their absence Instant alarm notification to take immediate action upon violation of access rules Benefits: Improves security with integrated solution Real-time alarm notification helps take immediate action upon violation of access rules Ensures the guard continuously monitors entry and exit of employees Products: COSEC DOOR CAP - RF card based premium door controller COSEC PATH RDCE – EM proximity card-based reader COSEC PANEL LITE- Site controller for multiple door controllers COSEC CENTRA GE- Application software for 100 users, expandable up to 500 users COSEC GE ACM- Access control module for COSEC CENTRA GE