Qognify - the trusted advisor and technology solution provider for physical security and enterprise incident management - announced that it has completed the acquisition of the IP video management software (VMS) company - On-Net Surveillance Systems (OnSSI), including the pioneer of IP video technology - SeeTec GmbH. Backed by the global investment firm Battery Ventures, Qognify announced the agreement on December 22, 2018 and the deal closed on December 28, 2018. Expanding Geographic Reach Wi...
ThinkReps LLC, a security manufacturers’ rep firm in the New York Metropolitan area, announces that the company has expanded and added a new team member, Kenneth C. Kraemer to its roster. ThinkReps is a manufacturer's representation firm based in New York and focused on enhancing the sales and market awareness of the best physical security solutions in the industry. The company is committed to providing top notch sales and support to its customer base and continues to raise the bar on sal...
Hospitality businesses work to provide a safe and pleasant customer experience for their guests. Hotels offer a “home away from home” for millions of guests every day around the world. These are businesses of many sizes and types, providing services ranging from luxury accommodations to simple lodging for business travelers to family vacation experiences. Hospitality businesses also include restaurants, bars, movie theaters and other venues. Security needs are varied and require tech...
The Internet of Things (IoT) is having a significant and ever-changing impact on the way we view video security. Today, cameras are expected to be so much more than devices with which to simply capture images; they need to be far smarter than that. These future-facing cameras are becoming an integral part of the vast digital connectivity infrastructure, delivering a parallel performance as intelligent sensors with the ability to extract the kind of invaluable data that helps businesses make impr...
The term ‘marine’ comes from the Latin mare, meaning sea or ocean, and marine habitats can be divided into two categories: coastal and open ocean. Video surveillance (VS) applications can cover both types of marine environment with system for ships, maritime ports, onshore and offshore installations, etc. We should want to further analyze VS for ships and try to explain the types of ships on which it can be used, the ways in which VS can be used on ships, the typical certificat...
V5 Systems, a provider of self-powered outdoor security and computing solutions, has been selected by Pelco, by Schneider Electric , for integration with its V5 Camera Adaptive Platform (V5 CAP). The integration will enable Pelco to expand the capabilities of its world-class Sarix Professional IP Surveillance Cameras to the outdoor security market in areas without fixed power and communications. As a result, public safety can be improved in any outdoor area, even remote zones or blind spots. Pe...
As part of Johnson Controls continued commitment to providing customers with the most advanced and innovative solutions, the company is introducing Magos Systems perimeter protection radar to the North American commercial security market, which will be showcased at ASIS International’s 63rd Annual Seminar and Exhibits in Dallas, TX. This radar technology is suitable for a wide variety of security applications and can be implemented in facilities ranging from oil & gas production sites, utility substations, campus environments, ports, to smaller sites such as data centers, warehouses, car lots and construction sites. Cost Efficient Perimeter Protection Solution While radars traditionally were affordable only to governments, militaries, and highly budgeted entities, now Magos can provide a cost-effective solution to commercial security clients, that is simple to implement and works in all weather conditions. The cutting-edge technology helps reduce false alarms, cut down on the number of security cameras and eliminate the need for constant monitoring. “We recognized a need from our customers in North America for a low cost and effective perimeter protection solution,” said Joe Oliveri, Vice President and General Manager, Security, Johnson Controls’ Building Technologies & Solutions, North America. “After carefully examining options for superior perimeter protection solutions, we determined that Magos offers the most robust and lucrative technology and can become a game-changing offering. Johnson Controls teams evaluated the system through a series of customer-pilots for over a year, and results exceeded expectations. We are confident this revolutionary product will improve the efficiency of security systems for our customers.” Real-Time Detection Drexel University, a leading global research university located in Philadelphia, Pennsylvania was looking for ways to mitigate risks and deter unwanted visitors on their sport fields. “We are always looking for innovative efficient solutions to meet our security challenges and Johnson Controls introduced us to Magos to address perimeter protection issues,” said Joseph Spera, Director of Operations, Drexel Public Safety. “With our previous solution the area was vulnerable to unwanted visitors and damage, and real-time detection was impossible. With the new solution, including a Magos radar unit and a PTZ camera, we are notified of breaches as they occur and are now able to effectively deal with issues and mitigate risks, dispatching patrol when needed.” The reselling, distribution and integration agreement with Magos emerged from Johnson Controls Open Innovation, a program launched to foster collaboration between the company, customers and cutting-edge technologies by startups.
ComNet, Communication Networks of Danbury, Connecticut, a USA-based manufacturer of transmission and communication networking equipment, has introduced a new Cybersecurity feature in its latest generation of self-managed switches. The ComNet Port Guardian feature has the capability to physically disconnect a port if unauthorized access is detected. ComNet Port Guardian The value in Port Guardian comes in situations where network access is attempted by disconnecting an IP addressable device on the edge to connect to the network. When Port Guardian senses the disconnect, an SNMP notification is sent to the head end and the effected port is physically locked out, preventing access. The network administrator can reopen the port when the threat is eliminated. This feature also thwarts access through “Spoofing” by disconnecting the port as soon as an interruption is sensed. This new feature is being added to the newest generation of ComNet SMS products including the CNGE2+2SMS and CNGE4+2SMS. The feature will also be available on the new ComNet USA-made Managed Switch line. According to Andrew Acquarulo Jr., ComNet CEO, and President, “Unauthorized access issues or Cybersecurity is a critical challenge facing every network manager today. Your security network with its accessible outside connection, is an easy way to bring down your network. Cybersecurity is not something confined to just a security IP network. Any network can be infiltrated. By introducing this valuable feature on these cutting-edge products, we can provide another unmatched advantage to our partners.” “ComNet’s goal from day one has been to be a smart and secure choice for transmission products. Our position is that if you are concerned about the long-term success of your application, choosing ComNet ensures it will be,” said Skip Haight, ComNet VP of Marketing. “Port Guardian is another reason ComNet continues to move ahead of our competitors,” Haight continued. ComNet offers an extensive line of fiber optic, copper and wireless video and data transmission equipment that is uniquely designed to meet the needs of the Security, Intelligent Transportation System, Utility, and Industrial markets.
HSI Sensing is one of the five companies worldwide to achieve UL 634 Level 2 listing HSI Sensing, an Oklahoma-based manufacturer of custom reed switch and sensor technology, announced its Sentinel high-security entry-point sensor has been UL 634 Level 2 listed, placing it among an elite group of security sensors capable of monitoring highly sensitive areas. HSI Sensing is one of only five companies worldwide to achieve the UL 634 Level 2 listing.“We are very excited to announce the availability of Sentinel,” said Ryan Posey, CEO of HSI Sensing. “By using Hall effect technology, we were able to develop a new and unique product that meets all the needs of the high-security industry. Sentinel is an innovative product intended to be a door contact or entry point sensor useful in a wide range of security applications, for monitoring everything from bank safes to doors in government facilities.”Sentinel Entry-Point Sensor “We are very excited to announce the availability of Sentinel” Sentinel is designed with a wide range of anti-tamper features that allow it to resist physical, electrical and magnetic tampering, all in a package 50 percent smaller than comparable sensors, while still offering adaptive digital processing. At the core of Sentinel, multiple Hall sensors detect the actuator’s magnetic field in the x, y and z axis. Most security sensors only detect the presence of a magnetic field. Sentinel can detect small changes in the magnetic field caused by other magnets or movement from the actuator. This technology makes Sentinel ideal for monitoring highly-sensitive areas, including Sensitive Compartmented Information Facility (SCIF), financial institutions, data centers, military facilities, prisons, power grid facilities, airports, seaports, and other high-level secure applications.UL 634 StandardUL, an independent safety science company, introduced its UL 634 as the standard for all connectors and switches for use in burglar-alarm systems. It is the standard for SCIF intrusion detection systems for the government intelligence community, which has a preference for Level 2 devices. The UL 634 requires 40 standards be met to be listed, an additional eight testing criteria to achieve Level 1 and another eight requirements to achieve UL 634 Level 2. These eight requirements for Level 2 include passing a switch assembly removal test, a magnetic field compromise test, and an extended endurance test.Sentinel is offered in two variations, with a rear-exit cable and side-exit, metal jacketed cable. Every Sentinel sensor includes a recessed tamper plate, actuator, mounting hardware, and security screws. It’s aluminum housing can be anodized in a limited number of colors to help match the entry point it is monitoring.
Acquisition brings state-of-the-industry capability to McRoberts’ clients and adds expertise in certain specialized vertical niches to USA portfolio U.S. Security Associates (USA) announced the acquisition of McRoberts Protective Agency, Inc., the oldest security firm in America and a venerable brand synonymous with quality and innovation. The acquisition brings state-of-the-industry capability to McRoberts’ valued clients and adds expertise in certain specialized vertical niches to the USA portfolio. Richard Wyckoff, President and CEO of U.S. Security Associates commented. “We are excited to bring McRoberts Protective Agency into the fold. McRoberts has a core competency in superior customer service and forming partnerships with their clients to deliver customized security solutions. This acquisition supports our strategy for growth and strengthens our presence in multiple strategic markets.” “McRoberts is renown in the industry for their maritime knowledge and industry advancements. This provides a great national opportunity for our company to further augment in-house maritime capabilities,” stated Alton Harvey, Senior Vice President of National Accounts of U.S. Security Associates. “Our comprehensive training academy already includes a rigorous training and certification program to ensure our security officers meet the federal and international requirements set forth by the Maritime Transportation Security Act (MTSA) and the International Ship and Port Facility Security (ISPS) code.” Meredith McRoberts, fourth-generation CEO and majority shareholder of McRoberts, said, “U.S. Security Associates (USA) is clearly the best security company in the industry today and we are thrilled to be able to offer our external and internal clients USA’s capabilities and opportunities. McRoberts has always been committed to delivering maximum value to our stakeholders and this move is consistent with that commitment.”
INTREPID is designed for the protectionof fence lines, open areas, gates,entryways and rooftop applications Southwest Microwave will showcase a range of performance enhancements to its INTREPID™ Model 316 Digital Microwave Link at Transport Security Expo in London next month, highlighting the sensor’s expanded intrusion detection capabilities, nuisance alarm resistance and ability to withstand physical and cyber-tampering or environmental extremes. Superior Beam Control First introduced over a decade ago and successfully protecting critical infrastructure and assets at many of Europe’s most security-sensitive sites, Model 316 now couples Southwest Microwave’s field-proven RF detection technology with its leading-edge INTREPID embedded digital signal processing (DSP), maximizing the sensor’s ability to discriminate between legitimate intrusion attempts and environmental disturbances or other false targets. Designed for the protection of fence lines, open areas, gates, entryways and rooftop applications, this advanced, all-weather, CE-rated volumetric sensor has a 122-meter detection range and operates at K-band frequency, enabling detection of slow-moving intruders and limiting susceptibility to interference from external radar or other microwave systems. Unique parabolic dish and antenna design assures superior beam control and predictable Fresnel zones, further enhancing probability of detection (PD) and low nuisance alarm rates (NAR). “The sophistication of Model 316’s signal processing to classify disturbances positions this sensor as far superior to any other microwave technology on the market today,” explained Martin Lomberg, Southwest Microwave’s European General Manager. “Features like enhanced crawl or vehicle detection and unique Fresnel suppression algorithms enhance performance in challenging environments, letting the end-user most successfully mitigate risk of site compromise while preventing nuisance alarms.” Suitable For Security Sensitive Sites Offering maximum protection against sabotage, Model 316 is an ideal detection solution for security-sensitive sites such as critical utilities, correctional facilities or government / military installations. Heavy duty components and packaging, integrated radome tamper switches and optional steel enclosures for external wiring and connections prevent physical abuse. Integrated EMI/RFI shielding protects sensor electronics against external electromagnetic or RF interference. The sophistication of Model 316’s signal processing to classify disturbances positions this sensor as far superior to any other microwave technology on the market today “To address the needs of our most security sensitive customers, this sensor’s standalone configuration and on-board relay alarm outputs for monitoring of alarms eliminate the risk of hacking or other digital compromise faced by networked devices,” Lomberg explained. Model 316 features 6 crystal-controlled, field selectable modulation channels with narrow band filtering, preventing interference between sensors. Units can be dual, triple or quad stacked for ultra-high security applications. Simplified Set-Up User-friendly Installation Service Tool (IST) software simplifies sensor set-up, and graphically controls and monitors sensor status, control parameters and signal strength with laptop convenience via optically-isolated, surge protected USB-B connection. “All of our INTREPID solutions offer a unique feature set relative to competing technologies in terms of ease of use, consistently repeatable performance in maximising intruder detection while minimizing nuisance alarms, and ability to withstand tampering or climatic extremes,” said Lomberg. “Our enhanced Model 316 is no exception. As a standalone digital sensor with high PD, low NAR and superior protection against physical or digital compromise, it is an exceptional high-security solution for our customers.”
Transport Security Expo have brought together speaker and opinion leaders from government, industry and academia Transport Security Expo will this year be delivering more learning opportunities than ever before – and all of them will be free-to-attend for all delegates on a first-come, first-served basis. The conference and seminar sessions will cover the full range of transport security sectors – Aviation, Maritime, Rail & Public Transport, Secure Transportation and Border Security. Working closely with its Advisory Board, the organisers of Transport Security Expo have brought together a roster of top-level speakers, all highly acclaimed opinion leaders, from across Government, industry and academia, including : - Ben Lowater, Deputy Director, Critical National Infrastructure, CESG Kashif Chaudry, Head of International Strategy & Engagement, Aviation Security, Department for Transport (DfT) John Lamond, General Manager - Safety Security & Business Continuity, Hong Kong International Airport Assistant Chief Constable Steve Thomas, British Transport Police (BTP) Assistant Commissioner Tim Cutbill, Head of Operational Resilience Department, London Fire Brigade Peter Drissell, Director of Aviation Security, The Civil Aviation Authority (CAA) Guido Peetermans, Project Manager - Smart Security, IATA Rear Admiral Cristiano Aliperta, Maritime Attaché, Embassy of Italy in the UK Speakers At The Conference Chris Stevens, Technical Security Director at SIDOS UK who will be speaking at the conference about emerging threats to transport infrastructures, commented: “I have attended every Transport Security Expo that has ever been run in the UK, and I’ve always found that it focuses on the audience’s needs, and on the specific areas that are critical to a country’s wellbeing – transport being one of these. I have presented at the Transport Security Expo for the past four years ... Transport Security Expo is a truly global conference, one that deals with very real issues, and I am delighted to be a part of it once again for 2015.” Robert Missen, Head of Unit: Land and Maritime Security, Directorate-General for Mobility & Transport, European Commission added: “… for me, Transport Security Expo is the most important UK event to attend: not just because of the UK’s eminence in the field of transport security, but because of the conference’s excellent international focus.” There will be two conference theatres located in the heart of the main exhibition area and all of the sessions will be CPD-accredited, courtesy of the Security Institute. There will also be a dedicated Presentation Theater forming part of the Expo’s Future Borders Experience and offering a rolling program of half-hour presentations delivered by leading experts in the field. In addition, the Security Innovation Seminars theater, also free-to-attend, will host a full two-day program of presentations and live demonstrations from a wide range of the event’s exhibitors who will be revealing some of the very latest technologies in numerous areas including: airport check point, perimeter security, large area monitoring, digital railways, surveillance solutions, biometrics, supply chain security and integrity, maritime security and text analytics. A number of Transport Security Expo partners will also be running their own seminars and workshops across the two days of Transec, including a Kidnap and Ransom workshop delivered by NYA International, the world-leading global risk and crisis management consultancy. Peter Jones, CEO of Nineteen Events, organisers of Transport Security Expo, commented: “We are very excited about the variety and the outstanding quality of the conference and seminar program we have put together this year. The fact that all of this leading edge content will be free-to-attend for all delegates will undoubtedly make Transport Security Expo a must-attend event for anyone involved in any area of transport security.”
Sea ports have a long tradition of handling important cargo, including equipment for oil and gas fields. These critical sites require complex security to protect vulnerable areas such as storage locations and unloading areas, as well as monitoring the surrounding waterways for emergency situations. Often, upgrading these sites with a future-proof security system can prove challenging, as there are likely to be expansive legacy systems in place. New systems may also need to be integrated with security and surveillance systems in the surrounding area. This study from FLIR Systems explores how the right VMS, coupled with an appropriate range of hardware components, can meet the challenge of providing a scalable, fully integrated and comprehensive video surveillance system in a harsh coastal port environment. What's Inside? Coastal port security requirements Scalable VMS Hardware integrations Control room performance Evidentiary-class video quality Public safety Click here to download the White Paper now!
Joining Pelco in late 2015, Sharad Shekhar is responsible for the entire global video business and is leading the charge to reinvigorate the Pelco brand with system integrators Back in the day, you literally couldn’t speak with a security company about a video surveillance project without the Pelco name coming up. It had a loyal following and an extremely large installation base. Over the years, that changed and the fervour with which integrators referred to the brand seemed to wane. Sharad Shekhar, Chief Executive Officer of Pelco, wants to change that, as he explains in this exclusive interview. Shekhar joined Pelco, a fully owned subsidiary of Schneider Electric, in October 2015. Based at Pelco headquarters in Clovis, California, Shekhar is responsible for the entire global video business. He has more than a decade of global business and technical knowledge, as well as a proven track record of increasing revenue growth and adaptability in highly competitive markets. Extending Pre- And Post-Sales Support To Systems Integrators SourceSecurity.com: Tell me about how Pelco plans to reinvigorate this iconic brand with systems integrators? Shekhar: Pelco by Schneider Electric is well regarded for its world-class service and support network, and our partners thrive with the backing of our strategic business and marketing services. Pelco will continue to enable the success of systems integrators through the delivery of our innovative product lines that ensure customer satisfaction and open doors to new business opportunities. The team at Pelco is strong,and I fully intend to leveragethe knowledge and expertisethat we have in ourorganization to deliver on ourgrowth aspirations Recently, Pelco has undergone significant transformation to streamline the development of these innovations, but we haven't forgotten that at the core, our products help enable integrators to support existing clients while helping new customers realize the full potential of the Pelco product line for their security needs. We have made significant organizational changes and process efficiency improvements that will help enable us to deliver world-class, pre- and post-sales support to our integrators and customers. SourceSecurity.com: What is your background and how/why do you feel you are a good fit for this endeavor? Shekhar: I joined Pelco from Cummins, another very technology-focused company, and more specifically, brought the experience of having worked in both the North American and Asia Pacific markets. I understand and possess the skills required in negotiations and to establish new efforts and develop technology, to oversee operations and to increase sales. I have significant experience in strategy, business development, alliances and joint ventures, sales, finance and operations management. I have also successfully led businesses through similar challenges as Pelco faces in the coming years in terms of bringing the right technology to market, building a strong product and alliance portfolio, and growing revenues and profits in an increasingly competitive landscape. Because of this, I can bring the same principles that were employed in other technology sectors to security and Pelco by Schneider Electric, because I understand the importance of producing reliable, flexible and cutting-edge solutions that keep the customer top-of-mind and meet the expectations they set forth. But it would be remiss for me not to mention that this is a team sport, and the team at Pelco is strong, and I fully intend to leverage the knowledge and expertise that we have in our organization to deliver on our growth aspirations. For video surveillance, integrators look for a high value for end users through areduction in upfront hardware and camera costs, with more high-resolution imagery Opportunities For Systems Integrators SourceSecurity.com: What do you currently know about what systems integrators are looking for in the field as far as video surveillance solutions? What's important to them and their end-user customers? Shekhar: Today's systems integrators are asked to push the envelope in regards to meeting customer needs for superior products while keeping ROI and scalability top-of-mind. For video surveillance, integrators look for a high value for end users through a reduction in upfront hardware and camera costs, with more high-resolution imagery. On the VMS side, they're looking for open architecture that allows integration with other major systems and an intuitive design that helps streamline deployment and administration. Customer feedback and demand helps Pelco address specific needs while designing security platforms that are scalable and flexible, as well as able to drive new levels of awareness for security and business intelligence. Our new technical support and customer engineering organization will work more closely with our integrators and provide them the backing they need to be more responsive and “creative” in terms of how we respond to varying customer requirements and tailor our products quickly to their needs. Implementing Strategic Security Management Policies SourceSecurity.com: What else might we see in the near future? Shekhar: Pelco has made significant investments in key vertical markets, including oil and gas, gaming and casinos, Safe Cities, and airports and seaports, and we will see significant focus on product and business development in these markets. We will look to further engage customers in these spaces by focusing not just on products, but on solutions that will solve security and operational challenges. Our new Advanced Technology and Engineering organization will focus on conceptualising and incubating technologies that will provide differentiation and value to our integrators and end users in these critical verticals. We will also engage in significant corporate development activities for strategic partnerships on the technology and channel side to reach our objectives. Video surveillance is only one part of a comprehensive security strategy, and moving forward, Pelco will help its partners think bigger by implementing strategic security policies and processes, and effective security personnel training and staffing. When these processes are combined with video surveillance and security management technologies, customers can develop a more holistic, proactive approach to security and emergency response. And that's what we hope to do more of in the future. Overall you will see Pelco as a much more open and engaging organization as it relates to our relationships with our industry, suppliers, technology and channel partners.
UK citizens will vote on June 23rd 2016 on whether to remain within the European Union A significant aspect of the four-month operation leading to the capture in March of Salah Abdeslam, Europe’s most wanted man, is that French and Belgian police worked alongside each other with minimal protocol complications since the countries are not only geographical neighbours but members of the European Union. Abdeslam was arrested for his alleged involvement in the Paris attacks of last November. Joint Operations Between UK And European Security Forces On June 23rd (with a touch of congruity for our sector since it’s the last day of IFSEC) UK citizens will vote on whether to remain in the European Union. Nobody should ignore the fact that the Union is an economic community and began as a common market for trade in coal and steel. And yet, suggesting that the outcome of the referendum is anything other than crucial for physical security in Europe would strike most observers as naïve. Prime Minister David Cameron has weighed in on the possible consequences: “When it comes to terrorism, when it comes to security, when it comes to our borders, we are better off, we are stronger inside a reformed EU.” Certainly the recent bomb attacks in Brussels underline concerns about terrorism throughout Europe. French President Francois Hollande also warns: “I don’t want to scare you, I just want to say the truth – there will be consequences.” Of course it would be overstating the case to suggest that a "Leave" vote will bring an end to cooperation between UK security forces and European counterparts since police forces first began sharing information (though not necessarily resources) when Interpol was formed in 1923. The European Union is not the only backdrop to these matters, and the UK is currently tackling people smugglers by sending amphibious vessels to the Aegean Sea between Turkey and Greece in a NATO (as opposed to EU) initiative. Such joint exercises would continue even after an “Out” decision on Brexit. Tightening Border Control Security Measures However, the whispers from Paris on the security ramifications of a departure by the UK are teetering between ominous hints and naked threats. Currently, Britain is allowed to have its own border control officers at major French ports such as Calais and, as a reciprocal measure, French-run passport control is the first checkpoint you reach when taking your car to France from Dover. This arrangement is in fact the result of a bilateral treaty dating from 2003 and nothing to do with the European Union, but Monsieur Hollande has already made it clear that should my compatriots vote “Leave” then this cosy entente cordiale will become toast or “pain grillé.” With even responsible liberal-leaning media outlets reporting that the Calais “Jungle” transit camps contain would-be jihadists, it seems that UK security is under immediate threat. As security professionals, we all subscribe to the “layered protection” principle. If Dover and other ports on the English side of the Channel become our first opportunity to scrutinise people then border control is clearly weakened, and the Brussels attacks emphasize the need that it be strengthened. The recent bomb attacks in Brussels and Paris have heightened concerns of terrorism. What ramifications would Brexit have on security cooperations in Europe? Other Security Issues Of Brexit Unity usually produces strength, and UK voters may want to heed US General Philip Breedlove, senior NATO commander in Europe, who now believes that Russia and Syria are “weaponizing” the possibility of terrorists posing as refugees or economic migrants in order to destabilise Europe. Surely at a time when there is a credible threat of this magnitude, UK voters should forget the clichéd contentious trade issues such as farming subsidies and alleged “wine lakes” and “butter mountains?” The prospect of Vladimir Putin and Bashar al-Assad joining forces in this manner is more worthy of our immediate attention and should be a factor as voters debate where to put their X on the ballot slip come June. This article has begun with the macro issue of border control and national security. There is a raft of additional subjects to be considered. Major topics will be international legislation on location of CCTV cameras, regulations on retention of footage, collection of biometric data and the sharing of information between EU and non-EU states. There is also the small matter of a £1.5bn Anglo-French drone project that may create the next generation of unmanned combat aircraft. Repercussions Of A "Leave" Note On Security Powerhouses A “Leave” vote would undoubtedly produce economic uncertainty, but our sector would hardly be alone in this. One footnote, however: the UK will go to the referendum polls as a single country but a “Leave” vote may hasten a split into two. If the decision is to leave but a totalling up of votes in Scotland shows that the Scots wish to stay in Europe, then the Scottish Nationalist Party will demand another chance to devolve and then become a European Union member state. England and Wales will face the prospect of security powerhouses such as IndigoVision and Veracity being part of a separate economic territory. A vote to leave would not produce the mare’s nest you might expect in terms of certifying products and documenting working methods. CE markings certify compliance with EU legislation but make no claim as to point of manufacture. Similarly, our industry’s increasing use of International Standardization Organization (ISO) practice to show responsible quality control and concern with environmental impact will be unaffected by the referendum vote. The ISO has no affiliations with the European Union, pre-dates it having been formed in 1947 and is based in Switzerland, which is not an EU member and unlikely to become one anytime soon.
The reason for long lines at U.S. airports is that the airlines now charge fees for checked bags. It’s as good an explanation as any of why airport passenger screening lines suddenly and mysteriously grew out of control during May (and then became manageable again in June). It’s not the only explanation floating about – there’s plenty about high travel volumes, Transportation Security Administration (TSA) personnel shortages, etc. etc. – but it’s the one that appeals to the disgruntled traveler in all of us. In the absence of definitive answers, why shouldn’t two of the biggest gripes we all have with air travel – luggage fees and long security wait times – be a case of cause and effect? I acknowledge the oversimplification. However, in addition to its obvious appeal, the explanation also has a germ of truth, and skipping past the details, it’s the government’s fault! US Government Negligence Towards TSA Officers Specifically, the U.S. government has levied a 7.5 percent excise tax on airplane ticket prices. However, the tax doesn’t apply to baggage fees. In effect, there is an incentive for airlines to lower ticket prices (subject to the tax) and implement or raise baggage fees (which are not) to offset the reductions. The approach gives travellers a specific incentive (say, $25) to carry their bags onto the plane rather than check them before going through the screening area. More bags clog up the operation, thus delaying airport screening. Absent the federal tax, it makes sense to “bundle” the charges into a higher ticket price rather than charging separately. Hence the argument: It’s the government’s fault! Experts say a roughly 10 percent reduction in screening personnel has coincided with a 15 percent increase in passenger volume, contributing to the recent crisis There are other possible explanations that are also the government’s fault, from not enough overtime pay for TSA-employed screening officers, to insufficient staffing of screening checkpoints. The leader of the union that represents TSA officers says Congress has “starved TSA of the resources it needs to meet growing demands at our nation’s airports.” Experts say a roughly 10 percent reduction in screening personnel has coincided with a 15 percent increase in passenger volume, contributing to the recent crisis. Nobody likes to wait two hours (or more!) in an airport screening queue, which was the unfortunate situation that flooded news reports during much of May. Attempted Solutions Add To Airport Security Check Delays And some of the proposed solutions seemed to contribute to the problem. For example, a new automated technology – so-called Innovation Lanes – provides expedited screening processes and promises to move passengers through the system more quickly. However, it was the installation of the new equipment at a security checkpoint in Atlanta (during which the checkpoint was closed) that contributed to some of the more extreme wait times in May. Another proposed solution is the TSA PreCheck lanes, where prescreened passengers get to speed through wearing their belts and shoes. But fewer than the projected number of passengers opted to pay the $85 fee for the program, and some observers have suggested that resources devoted to screening PreCheck passengers could do more overall good if reassigned to screening the masses. “I got here two and a half hours before my flight, and security took two to three hours to get through,” one traveler recently told a TV station in Chicago. In March, TSA Administrator Peter Neffenger said wait times had nearly doubled over the previous year. Not to mention reports of data showing that TSA agents fail 95 percent of security tests involving passing weapons through security. For now, the problem seems to have abated, and airport and TSA officials were congratulating each other all around after average wait times improved drastically over the Memorial Day holiday weekend. A new TSA 10-point plan (more officers, overtime, canine teams, etc.) is being implemented. But what about the upcoming busy summer travel season? We may not have seen the end of those long security wait times…
Milestone Systems, a provider of video management software (VMS), is the chosen solution for protecting the Port of Antwerp, the second largest seaport area in Europe, covering more than 12,000 hectares, the equivalent of 20,000 football fields. Large areas like ports are very difficult to secure in a traditional way. Reporting incidents using only radio communications can lack information at an optimal level of detail and accuracy. It takes time for responders to reach incidents. Analog video solutions have issues with very long distances, meaning video amplifiers must be used which lead to fragile and inflexible infrastructure. Milestone XProtect Corporate and XProtect Smart Client have enabled the port authorities to establish a central control center with a consolidated view of the harbour. This enables rapid and relevant response to incidents, reducing the impact of incidents on assets and persons. Milestone steps in to ensure that this business-critical system in the port receives a high level of supportOpen Platform Technology The open platform technology pioneered by Milestone combined with the solution power of the Milestone Partner Community enabled the Port of Antwerp to choose the perfect infrastructure components and cameras for their challenges. Lenovo, Dell and multiple camera partners are elements of the solution. Thanks to the usability of network video, the port can utilize Milestone open platform for solutions that augment the already rich functionality of XProtect VMS. In addition to the infrastructure, the Port of Antwerp is taking advantage of Milestone Care Premium. Milestone Care is a complete suite of operational maintenance and support services grouped into four different packages, enabling Milestone customers to choose the support coverage that fits their exact need, now and in the future. With the chosen level of support, Milestone steps in to ensure that this business-critical system in the port receives a high level of support. Advanced Security Installation Furthermore, Milestone Professional Services has also been in play for this advanced installation, to guide and counsel the port on the best capabilities of the open platform VMS. This consultancy service ensures the port can adapt and expand this system as needed for an ever-expanding, always relevant surveillance solution. “We are extremely pleased to have been chosen by Port of Antwerp for their video safety system,” says Michaël Fontaine, Country Manager Benelux, Milestone Systems. “This is a clear testimonial to the solution power of XProtect and our open platform partner community. This has already been proven in a number of other ports worldwide, and now in the modern Port of Antwerp.”
Mirasys offers the possibility to increase productivity and savings with powerful connectivity to other systems Mirasys Video Management Solutions are being utilized in a number of transport projects which include ports, motorways, airports, trains and logistic centers. Each project needs a highly adaptive solution which adapts to changing requirements, technologies and regulations, and provides unlimited scalability and high reliability. Mirasys VMS Increases Efficiency The transportation sector provides a great example of how an intelligent video management system can increase the efficiency of activities, safety, and ensure smooth-running operations. Mirasys offers the possibility to increase productivity and savings with powerful connectivity to other systems. Mirasys VMS includes a number of intelligent features. Playback and powerful search tools identify incidents quickly and efficiently. The intuitive storyboard function helps in reporting events and incidents and high quality images can be used for evidence. Advanced motion detection and alarm event settings let you decide what you want to track; reducing operational costs and the number of false alarms. Mirasys Video Content Analytics Mirasys VCA (Video Content Analytics) provides full VCA functionality with object classification and enter / exit, direction, vehicle speed, stopping, dwell time, etc. filtering. The setup is versatile and supports, for example, different type of vehicle classification, zone definitions, entering directions and vehicle speed. You have plenty of different analytic alternatives available per camera. The object that is being analyzed can have several different analysis rules active simultaneously. The ingenious use of cameras and analytics increases the flow of cargo, luggage and passenger traffic. You can, for example: Tighten platform security Improve crowd management Identify people and any unusual behavior such as running Identify abandoned objects Manage queues and staffing level Control the number of vehicles in the area Vast Integration Possibilities With Mirasys and its endless integration possibilities, you can speed up the logistic center’s functions, transport management efficiency, and ensure the undisturbed flow of cargo operations. The use of Mirasys integrations will increase the value of visual information captured by the system, and bring significant cost savings. The information from video images can be linked to the information received from other sensors, also enabling the utilization of IoT (Internet of Things). Different organizations can use the same Mirasys system to manage their part of the surveillance and security, but each party has its own rights When integrating a bar code reader with the video management system in a warehouse, the movements of each package can be searched and visualized. The images from cameras can be found immediately, which helps to determine the condition of the package at the time of entering and leaving the warehouse, and on which vehicle it is located. For each and every event, the system provides the exact time, visual information from a number of different cameras, and delivers event reports to specified recipients. This results in a clear decrease in the time spent in resolving customer complaints. Automatic License Plate Recognition With the Mirasys ANPR+ (Automatic License Plate Recognition) application you can automate the management and guidance of the vehicles in a certain area. For example, based on the license plate information the system can advise: Which loading bridge the vehicle is assigned to, Which driving lane the vehicle is assigned to, Driving through automatic weight-in-motion (WIM) is needed, etc. The system can monitor the vehicle on its way in and out, film it from the side, top, front and back and is therefore a great solution for vehicle damage control. Using integration to the automatic weight-in-motion (WIM) function you can also ensure automatically that the amount and type of product loaded on the vehicle is correct. In harbors and airports different entities, such as Security, Police and Customs, need different information from the same system Automate Operations With The ANPR+ A forwarding company can book a space for its truck from a shipping company’s ticket selling system. When the truck arrives at the shipping company’s area, for example in a harbor, it is automatically measured, and if the measurements match the ticket, the truck is guided to the green lane. If the measurements deviate from the ticket data then the truck is guided to the ticket window lane. The measurement information will be sent automatically to the system optimizing the ship loading. If a vehicle exceeds its allowed time to stay in one place, or deviation from the planned route of the vehicle is detected, the system will report an event. In harbors and airports different entities, such as Security, Police and Customs, need different information from the same system. Different organizations can use the same Mirasys system to manage their part of the surveillance and security, but each party has its own rights; simultaneous users are no problem. Information from different sources flows automatically between organizations, resulting in faster response times on investigations, and increasing the performance level considerably in handling the joint security issues. Decreased Total Cost Of Ownership Mirasys is an industry-recognized Video Management System provider. Limitless integration possibilities of the Mirasys VMS offers the freedom to build the system that serves your needs. Mirasys also gives you the freedom and possibility to connect several sites into one logical entity. The centrally managed Mirasys system allows you to add or remove cameras and servers, set users’ rights, manage live and recorded video and export evidence with a few simple clicks. The system can have centralized, de-centralized or mixed topology configurations.
The Port of Wilmington, which opened in 1923 and handles nearly 400 vessels and 4 million tons of cargo each year is the busiest port on the Delaware River, and the leading North American importation site for fresh fruit, bananas and juice concentrate. It was also the first seaport to use the Transportation Worker Identification Credential (TWIC) card, beginning with the TWIC Technology Phase pilot program in October 2003. TWIC is designed to add a layer of security at ports by ensuring that workers in secure areas have received a background check and do not pose a national security threat. As the TWIC program expanded as part of the Maritime Security (MARSEC) criteria, so did the need for a software program that could read and record information from both the existing TWIC protype cards used with the port’s physical access control system and the latest TWIC cards. In addition, it was important to find a solution that would allow the port to access the Transportation Security Administration’s (TSA) ‘TWIC Canceled Card List’, a real-time database of unauthorized TWIC users, so port security personnel can quickly identify those with revoked rights. Port officials chose HID Global’s pivCLASS Registration Engine software, which drives the Datastrip mobile readers and also resides on a desktop enrolment workstation in the port’s main office pivCLASS Registration Engine Software recognizing this need, Port of Wilmington officials began exploring their options for software that could work with their existing Honeywell security management platform, Pro-Watch and work on mobile card readers to deploy the enrolment process throughout the facility. Port officials chose HID Global’s pivCLASS Registration Engine software, which drives the Datastrip mobile readers and also resides on a desktop enrolment workstation in the port’s main office. An additional license for certificate management allows the port to re-validate TWICs each day, once they are enroled with the Honeywell system. Operational With Datastrip’s DSV2+Turbo Mobile Card Readers Before the Port of Wilmington became a pilot site for the TWIC smart card program, it relied on 125kHz proximity cards and readers for worker identification. With the advent of TWIC compliance standards, port officials needed a way to register TWIC cards with their existing Honeywell Pro-Watch physical access control system and enter cardholder data into their database that would merge both TWIC and existing ID cards. With this merger, the port would need only one card for the access control system. It was also important to be able to enrol TWIC cardholders at the various access points to the port, which spans 307 acres of land. Therefore, the software needed to be functional with rugged mobile card readers, such as Datastrip’s DSV2+Turbo. TWIC credentials are required for entry to the port by anyone requiring frequent, unescorted access to the facility that is entirely designated as a secure and restricted area Finally, Port Security wanted the ability to access the TSA TWIC Canceled Card List and match it against those being enroled in the Port’s database as well as those using their TWIC cards. This would allow Security to take the appropriate steps when necessary, such as suspending a card, identifying people who were already enroled in the Port’s database and not double enroling them, or spotting a potential terrorist. TWIC Credentials For Entry To The Port By using pivCLASS Registration Engine, which was deployed on mobile Datastrip readers as well as a desktop computer, port officials are now able to register TWIC holders throughout the port and transmit that information to the Pro-Watch system. These cards can then be read at the fixed card readers located at various entrances and access points throughout the port. TWIC credentials are required for entry to the port by anyone requiring frequent, unescorted access to the facility that is entirely designated as a secure and restricted area. These include longshoremen, truck drivers, surveyors, agents, chandlers, port chaplains and labourers who access secure areas. Tenants who have their offices at the port, such as produce giants Chiquita and Dole, are also required to be enroled in TWIC. Integrated With Existing Access Control System Patrick Hemphill, retired Manager, Port Security and Facility Security Officer at the Port of Wilmington who lead this project said the mobile readers have been taken to local union halls to enrol longshoremen before they arrive at the port. “This saved us a lot of time,” explained Hemphill. “We met with union leaders and set aside two, two-hour periods on pay days. The members were made aware of the need to know their PIN and we were able to enrol the majority of (union) members during those two days without interrupting their work schedule.” After seeing a demo of the software, and its ability to read TWIC card information, Floyd-Kennard recognized it as a possible solution that could be integrated with the port’s existing access control system pivCLASS Registration Engine first came to the attention of Port of Wilmington’s Director of Human Resources, Sylvia Floyd-Kennard during an American Association of Port Authorities conference. After seeing a demo of the software, and its ability to read TWIC card information, Floyd-Kennard recognized it as a possible solution that could be integrated with the port’s existing access control system. Testing The Software In-house Eric Schaeffer, President of Advantech Inc., the port’s systems integrator on the TWIC project, said one of the deciding factors in using this software was the ability to test the software in-house before making a commitment. He wanted to ensure that it would integrate with the existing Pro-Watch system. “Some companies have reservations about testing before buying,” Schaeffer noted, “but HID Global was confident in their product and were comfortable with us testing it.” Since this was one of the first implementations of pivCLASS Registration Engine software integrated with the Honeywell Pro-Watch system, Schaeffer said HID Global worked alongside Advantech to make sure everything worked as planned. Registering TWIC FASC-N Number And Expiration Date For a major facility such as the Port of Wilmington, being able to enrol TWIC holders and verify their information anywhere using a mobile card reader results in a savings of security personnel, time and effort. Personnel can go where the enrolees are, rather than requiring everyone to come to a central location. The port is also able to continue to leverage its legacy physical access control system while adding in the important TWIC component. The pivCLASS Registration Engine software allows the port to register TWIC information, such as the TWIC FASC-N number and expiration date, into the existing PACS cardholder record" “The pivCLASS Registration Engine software allows the port to register TWIC information, such as the TWIC FASC-N number and expiration date, into the existing PACS cardholder record,” said Geri Castaldo, vice president of Business Development, Federal Identity with HID Global. “If a new person is added, Pro-Watch automatically creates a brand-new cardholder record using the information from the TWIC such as first name, last name, FASC-N, expiration date and photo.” pivCLASS Certificate Manager Checking against the TSA TWIC Canceled Card List is a key benefit with the addition of HID Global’s pivCLASS Certificate Manager. The pivCLASS Certificate Manager goes out to the TSA list and re-validates the TWIC card status daily or on a user-defined schedule, so security personnel can see what has changed and react to the status of cardholders. In the case of an elevated threat level, HID Global’s software is able to provide the additional authentication piece that would be required. If the threat level at the port is raised under the three-level MARSEC system, it can the use required use of a fixed readers with a biometric component.
USS Iowa: A Naval Treasure Affectionately known as the “Battleship of Presidents” for having played host to more U.S. presidents than any other battleship, the USS Iowa is one of the most storied vessels in the history of the Navy. Originally commissioned in 1943, the Iowa saw significant action during both World War II and the Korean War. One of the battleship’s first missions was to escort President Franklin Delano Roosevelt across the Atlantic in November of that year for a critical meeting between the allies at the Tehran Conference, which was also attended by Soviet leader Josef Stalin and British Prime Minister Winston Churchill. In early 1944, the Iowa was sent to the Pacific Ocean theater where it would play a pivotal role in some of the key battles of the war. When the Empire of Japan officially surrendered aboard the USS Missouri in September 1945, the Iowa was also in Tokyo Bay broadcasting the ceremony to the world. The Iowa and her crew would continue to serve the nation for another four decades before being decommissioned for the last time in 1990. Given the ship’s rich legacy, it was eventually relocated to a permanent berth at the Port of Los Angeles in 2012 and converted into a museum. Visitors can now stroll along the decks of this American icon from a bygone age and get a firsthand look at the 16”/50 caliber guns that earned the Iowa its nickname of the “The Big Stick” as well as other historical artefacts on board the battleship. Of course, turning a vessel that stretches over 880-feet long and contains numerous rooms and compartments into a tourist attraction comes with its own set of unique security challenges. Security Challenges The job of securing the Battleship USS Iowa museum is the responsibility of Security Manager Michael Dahl, a former law enforcement officer who was asked to take over the full-time security operations for the museum following his stint as a volunteer aboard the ship. While the museum has yet to experience a major security event during its brief existence, the threat posed by trespassers after-hours or a visitor wandering off the beaten path is not lost on Dahl and the rest of the management team at the museum. However, aside from having a small number of consumer-grade, off-the-shelf security cameras placed in strategic areas, there was not any real video surveillance infrastructure to speak of on board the ship. That changed approximately one year ago when David Canfield, the museum’s vice president and CIO, who also happens to be a veteran of the high-tech industry, decided they needed to significantly upgrade the surveillance system and install a solution that would more adequately address the facility’s needs. Arteco and Arecont Vision donated the respective technology solutions for the USS Iowa project “We wanted to install cameras to monitor the exterior of the ship, particularly when we’re not open to the public, so we can monitor our gangways to see if anybody does try to access the area,” said Dahl. “Also on the inside of the ship, we wanted to make sure we didn’t have our visitors, as well as our crew members who are volunteers, getting off the designated routes and into areas where we didn’t want them. There are some sensitive areas where, if you don’t know what you’re doing, they could be hazardous.” Arteco’s VEMS Solutions After speaking with CV Reps, a local manufacturer’s representation firm, Dahl and the museum’s leadership team decided to install a system with the Arteco Next video event management software (VEMS) and a network of Arecont Vision cameras. Because the battleship museum is a non-profit organization, both Arteco and Arecont Vision donated the respective technology solutions for the project. A total of 11 high-definition IP cameras have been installed on the Iowa since the project got underway in mid-2015. At the beginning of 2016, Dahl was able to bring the Arteco software online and he has been extremely impressed with its performance. Leveraging the video analytics suite provided by Arteco Next, Dahl has been able to set up an alert within the VEMS client that notifies him when certain physical boundaries are crossed by people on board the Iowa. “With the Next software I’m able to configure alert areas after hours — so if anybody were to try to come on the ship it would alert me,” added Dahl. “We also have an alert for our cash-handling room just outside our vault that is set up so that anytime anybody goes through that door, it lets me know.” User-Intuitive Video Software Because Dahl, who has sole responsibility for running the surveillance system, is a relative novice when it comes to operating today’s surveillance technology, it was also important that the video software the museum deployed be user-intuitive so that he could bring himself up to speed quickly. After only a few hours of training on the Logic Next platform, Dahl was able to learn the basics of the software and familiarize himself with its more advanced settings. Arteco NEXT VEMS allows users to take full control of a video surveillance system from anywhere, quickly and easily. With NEXT’s specifically designed graphical interfaces, video retrieval, direct management of alarms, video analytics or access control events are made easy from the start. This enables users to focus on taking hold of the benefits delivered by the system immediately, rather than waiting for training. In the future, Dahl plans to deploy more cameras to keep the USS Iowa and its rich history secure. “I have several locations where I still want to deploy cameras; it’s just a matter of being able to procure them and deploy them as resources allow,” said Dahl.
Airports and ports are subject to a tough balancing act when it comes to security measures. On the one hand, these locations must maximize the movement of passengers and cargo to ensure a happy customer experience, while at the same time exercising security measures that will ensure their safety. Access Points In Transport Hubs Airports and ports are large areas with many access points, a necessity to facilitate the efficiency needed to handle the large volumes of traffic they generate. This accessibility is also their Achilles heel in the eyes of would-be terrorists, smugglers, and thieves. Herein lays the conundrum. People want to travel without fear of falling victim to attack, but security cannot be so invasive that it makes travel unpleasant. Vanderbilt’s solutions respond to the agility, adaptability, and dependability that this sector requires and facilitate free movement while allowing for effective safeguarding measures.Vanderbilt’s ACTpro is a PC-based access control system that eliminates the need for traditional keys, instead utilising cards and tokens to gain access Access Control Scenarios For ACTpro For instance, Vanderbilt’s ACTpro is a PC-based access control system that eliminates the need for traditional keys. Instead, it enables authorized individuals to use a card or a token to gain access to protected areas. Staff appreciate that the cards mean they need to carry fewer conventional keys and can gain prompt access to vital areas. If a tag or card is lost, it can easily be disabled by the system, ensuring a high-security level. So, what are some access control scenarios that ACTpro can provide against at airports and ports? To name a few, tailgating, hierarchy rights, and allowing for holding areas between doors. Coupled with ACT Enterprise software, ACTpro provides a vast array of integrations. Specifically, this can be used to provide unrivaled protection against ‘tailgating’ through interaction between badge systems and video surveillance cameras like Eventys. Vanderbilt’s Eventys provides quality images should a suspicious event arise that needs to be investigated. Hierarchy Of Acess Privileges The access status at airports and ports can vary greatly depending. For example, flight crew require different access rights compared to terminal retail staff, maintenance staff, or emergency staff. ACTpro, coupled with ACT Enterprise, can provide this strict hierarchy of access privileges based on seniority and job function. The ACTpro system also includes the ability to execute ‘airlock’ or holding areas between pairs of doors. This means the doors cannot be opened simultaneously except in emergencies when a supervisor activates an override. This function helps defeat concerted intrusion attempts. In addition, the software provides invaluable health and safety abilities for fire mustering.
Customs and Border Protection needed a faster way to correlate information about the location and status of arms The Australian Customs and Border Protection Service is responsible for the protection of the Australian community, while supporting legitimate trade and travel. At a time of unprecedented threat levels – illicit drug trafficking, terrorism, people smuggling – Customs and Border Protection manages the security and integrity of Australia’s borders, working closely with other government and international agencies, to detect and deter unlawful movement of goods and people across the border. Rapid Commerce And Travel Growth Concurrently, Customs and Border Protection is responsible for protecting Australian economic interests during an era of rapid growth in international commerce and travel. By enforcing trade regulations and collecting rates, Customs and Border Protection helps Australia compete in a global economy. “Customs and Border Protection plays a vital role in national security, derived from its broader responsibilities at the border and the extensive powers, expertise and technology it brings to bear,” said Michael Carmody, Chief Executive Officer, of Australian Customs and Border Protection Service. “Modernization of customs organizations will remain imperative, with the Australian Customs and Border Protection Service motivated by continuing pressure for more sophisticated and integrated processes.” Border Protection Responsibility Border protection responsibility lies in the capable hands of over 5500 Customs and Border Protection employees in over 50 locations around Australia and overseas, and is managed from the Central Office in Canberra. The Customs and Border Protection Strategic Outlook (2007) projects that by 2015, these employees will assume responsibility for the annual oversight and management of: 1 million international passengers 7 million import sea containers 7 million export sea containers 5 million air cargo consignments 220 million postal articles 22,865 arriving ships Protecting the Australian community demands sophisticated intelligence, targeting high-risk aircraft, vessels, cargo, postal items and travelers. It also requires sophisticated tools, including thousands of items of weaponry, protective gear, specialized equipment and vehicles. Furthermore, effective deployment and management of these tools is vital to assure the safety and security of Customs and Border Protection’s officers, and the 22.6 million Australian citizens they serve and protect. Search For A Solution Prior to 2011, Customs and Border Protection maintained a system of separate spreadsheets to track and manage this considerable arsenal. More importantly, the view from Central Office in Canberra lacked immediacy. Lags in reporting times could lead to delays in repairing or replacing critical equipment, or in identifying a missing or stolen weapon. What Customs and Border Protection sought was a fast and easy way to correlate information about the location and status of arms and bulletproof vests with the officers to which they had been assigned. As staff across different locations kept their own spreadsheets, Customs and Border Protection needed a solution that could easily deliver accurate and up to date views to Central Office. Under Michael Carmody’s imperative for more efficient, integrated processes, the Australian Customs and Border Protection Service issued a global tender for an asset tracking system. They discovered a partnership between Relegen and HID Global best fit their needs. Customs and Border Protection opted to use the Relegen asset solution, with assetDNA software The Relegen Solution Relegen specializes in the development and delivery of asset intelligence solutions. The Australian Defense Force [ADF] has employed Relegen’s technology – assetDNA™ – to manage critical assets for over a decade. The similarities between the ADF’s and Customs and Border Protection’s asset management needs, combined with the flexibility of the assetDNA solution, made Relegen the clear choice around which to build Customs and Border Protection’s new system. The Relegen solution is enhanced by their assetDNA software technology, which enables users to assign a globally unique identity to each asset. In this case, Customs and Border Protection have opted to use the assets’ serial number. This identifier is then carried by Relegen’s proprietary assetDNA tagging solution. A third layer of security is added through DataTraceDNA®, a covert security technology from DataDot Technology Ltd. This means that even in the event that the assetDNA tag is removed or destroyed, Customs and Border Protection can still identify the asset as one of their own. “Our ten plus years’ experience at a mission-critical level with the Australian Defense Force prepared us well to deliver the comprehensive asset tracking solution Customs and Border Protection requires,” reports Paul Bennett, Managing Director, Relegen. “The combination of our assetDNA software and multi-layer, intelligent tagging solution enables Customs and Border Protection to track each asset uniquely. Even if a tag is separated from a weapon, Customs and Border Protection can still identify the asset through DataTraceDNA.” HID Global RFID The ability of assetDNA to track each asset uniquely, and in real-time, is made possible by radio frequency identification technology from HID Global. A world leader in the development and production of innovative identification tags and readers, HID provides innovative asset tags and technical support vital to the Customs and Border Protection solution. Before HID could recommend tagging solutions, a thorough assessment of each asset was required: How is the asset used, by whom is it used, and under what conditions? For Customs and Border Protection, each tag must withstand the rigors of daily use under potentially hazardous conditions. HID manufactures asset tags that adhere and function under extreme conditions, resisting impact and vibration, and exposure to saltwater and chemicals. HID was able to provide Customs and Border Protection with a customized compilation of RFID tagging solutions According to Paul Bennett, “assetDNA is a powerful asset intelligence system. However, our ability to collect data is enormously dependent on reliable tags that can withstand the rigors of daily use in extreme conditions. That’s why we rely on HID. Their tags perform.” “All Customs and Border Protection assets were analyzed in terms of materials of construction and conditions of use,” says Tony Hilder, Sales Director, Industry and Logistics for Asia Pacific HID Global. “Then, we were able to match a HID tag to deliver the necessary level of reliable performance over the life of each asset.” Customized RFID Tagging Solutions HID was able to provide Customs and Border Protection with a customized compilation of RFID tagging solutions that will: Withstand impact and vibration – on an assault rifle, or in a physical confrontation Resist exposure to harmful elements – including saltwater, or chemical agents Install covertly and inconspicuously – to prevent detection or tampering Maintain data integrity and performance – assuring systemic veracity The HID Logi Tag® Family is being applied where mechanical, chemical and temperature resistance is imperative, with the HID IN Tag Family providing ruggedized tag solutions for severe environs. Greater Security For Officers Relegen and HID are working together to help implement the sophisticated asset tracking system across all Customs and Border Protection locations. This includes the tagging of each of the armaments and critical assets in each agency, as well as training for all Customs and Border Protection personnel. The result will be a comprehensive system that gives Customs and Border Protection a real-time view of all assets deployed and in inventory, empowering the Central Office to make critical decisions based on the latest information at-hand. It will also mean greater safety and security for Customs and Border Protection officers. Officers can perform their duties, confident they have been issued the correct equipment, and assured that it is in proper working order. In addition, the new system further minimizes the risk that weapons may be stolen or remanufactured. Significant Productivity Enhancements The new system will also enable optimization of asset use. Customs and Border Protection can now identify each asset’s progress through its lifecycle, and identify specific assets in need of immediate repair or replacement. Customs and Border Protection will recognize significant productivity enhancements in staff time spent mustering their formidable arsenal. Going forward, the Customs and Border Protection asset-tracking system provides a model for any organization managing operation-critical assets, in routine or emergency response situations. Worldwide, police forces, fire departments, emergency medical teams, hospitals, and other organizations are employing solutions from Relegen and HID Global to respond quickly and comprehensively in emergencies, provide better safety for their employees, and drive the performance of their mission critical assets more effectively.