Radio frequency Identification
ELATEC is pleased to announce its recent hire of Ron J. Fiedler, who joins the ELATEC team as Vice President of Strategic Alliances. In this role, Fiedler will expand ELATEC’s global presence through business development, strategic partnerships, and penetration of new markets. ELATEC RFID readers ELATEC designs and manufactures unique radio frequency identification (RFID) readers for user authentication and access control applications. ELATEC readers recognize and decode over 60 RFID tra...
The mindset behind a new law to prohibit the use of facial recognition and other security-related technologies by San Francisco police and other city agencies is obvious in the name of the new ordinance: “Stop Secret Surveillance.” Ordinance To Stop Secret Surveillance The San Francisco Board of Supervisors passed the ordinance 8-1 with two abstentions on May 14, and there will be another vote next week before it becomes law. We have an outsize responsibility to regulate the exces...
Unmanned aerial vehicles (UAVs), or drones, present a range of threats, from the careless and clueless to the criminal. While many incidents may seem harmless, the threat to any location at any time depends on a range of factors. Drones are inexpensive for criminals to buy or make, and there are continuously improving battery, airspeed, and payload capabilities. UAVs can also fly without an RF signal to jam or hack. Fortunately, sensor technologies including radar are available for security ag...
DTC Broadcast has announced a formal and extensive North American partnership with U.S. based Wave Central, a major provider of wireless broadcast camera and transmission technologies. High-end Radio Frequency (RF) Solutions Wave Central specializes in providing high-end RF solutions for major sports venues across North America. The partnership is structured in a way that gives Wave Central full access to the DTC product portfolio. DTC’s OEM technology will continue to be used with...
SJohnson Controls introduces the Tyco 360° Radar Detection, a low-cost, early threat detection family of radar sensors that can be easily integrated into existing video management systems for a more complete surveillance solution. Tyco Radar 360° Detection solution An ideal answer for advanced perimeter security needs, Tyco Radar 360° Detection offers long-range protection, which means quicker detection of breaches for areas seeking upgraded perimeter safety, such as power plants,...
ProdataKey (PDK), an innovator of cloud-based networked and wireless access control products and services, has announced the introduction of “touch io”, a new Bluetooth reader and credentialing option for smartphones designed for use with the company’s cloud-based access control solution, pdk io. Touch io Bluetooth Reader touch io does not require the user to unlock the phone in order to gain access through a protected door Touch io brings new levels of convenience and...
Identiv, Inc. has announced that it will demonstrate its complete radio-frequency identification (RFID), near-field communication (NFC), and inlay portfolio to secure the Internet of Things (IoT) during RFID Journal LIVE! on April 2 – 4, 2019 in Phoenix, Arizona, United States. RFID Journal LIVE! RFID Journal LIVE! is an event focused on RFID and related technologies. Now in its 17th year, the event features more than 200 exhibitors from 26 countries showcasing the best selection of RFID tags, readers, and software and implementation services. RFID Journal LIVE! is the world’s largest event focused on RFID and related technologies Event: RFID Journal LIVE! Date: April 2 - 4, 2019 Location: Booth 715 | Phoenix Convention Center | Phoenix, Ariz. RFID, NFC And Transponder Solutions Identiv’s showcase of transponder solutions for the IoT and hands-on demos to be presented at the event includes: Complete RFID, NFC, and inlay portfolio - Identiv’s innovative transponder portfolio brings smart identities and security to the IoT, features unique form factors and different shapes and finishes, and is available as dry inlays, wet inlays, printed labels, tickets, PVC cards, and more. New family of NTAG 424 DNA tags - The new tags use NXP’s state-of-the-art secure authentication chip, introducing security, privacy, and trust for NFC IoT applications while providing the most efficient method of digitally connecting products. High-performance UHF tags - Identiv’s ultra-high frequency (UHF) tags features high-performance RFID designs for applications requiring long read distances. Sensor-based inlays - Identiv’s portable-powered smart sensor tracks and stores temperature and humidity readings and can be read locally by RFID readers, such as cellphones, or uploaded to the Internet for analytic purposes. RFID Journal LIVE! will be held April 2 – 4, 2019 at the Phoenix Convention Center in Phoenix, Arizona, USA.
Matrix COSEC ARGO is a performance, design and engineering wonder that brings a modern design to the access control and time-attendance applications. The device is equipped with an enhanced 3.5” IPS LCD touchscreen for optimizing users’ visual experience. The door controller is designed to meet the aesthetics, technology and harsh environment application requirements of the large & multi-location enterprises, SME & SMB organizations. Matrix COSEC ARGO Door Controller: Enhanced 3.5’’ IPS Touchscreen LCD with Gorilla Glass 2x times Faster and Accurate User Verification Fingerprint – Optical & Multispectral, RF Card and PIN Bluetooth, Wi-Fi, PoE, Ethernet & GSM/VoLTE (Through Dongle) 50,000 Users and 500,000 Events Innovative Design - Wall and Flush Mount IP65, IK08, CE, BIS, FCC, RoHS Compliant
User authentication deficiencies, endpoint data leakage and excessive user permissions are the three most common cybersecurity risks facing health systems and hospitals, according to new data from Clearwater CyberIntelligence Institute. At the HIMSS19 Global Conference and Exhibition, February 11-15, 2019 in Orlando, Florida, ELATEC will be demonstrating its uniquely flexible radio frequency identification (RFID) reader, which mitigates these issues by strengthening user authentication for access control applications. With RFID, medical personnel simply swipe the same badges they use to gain entry to the building for fast and easy access to the records Access control is critical for healthcare institutions in order to protect patient safety and meet stringent HIPAA requirements for medical information privacy. Radio frequency identification (RFID) readers are an effective and efficient means of user authentication to ensure that only authorized personnel can access patient health records, change settings on medical devices or gain access to restricted medications, equipment or supplies. Better Security Than Passwords RFID readers are more secure and easier to manage than passwords, which are easy to share and often forgotten, creating both security risks and an unnecessary IT burden. Password systems also slow down medical personnel, requiring them to remember and enter passwords into different devices, often under emergency conditions or extreme time pressure. With RFID, medical personnel simply swipe the same badges they use to gain entry to the building for fast and easy access to the records, supplies and equipment they need to perform their jobs. ELATEC readers are already widely used for secure print management and other healthcare ecosystem applications such as time and attendance, computer single sign-on, room scheduling, pharmaceutical and high-value supplies dispensing, and medical equipment access control. Recognize 60+ RFID Proximity Card Transponders ELATEC RFID readers can recognize and decode more than 60 RFID proximity card transponder types as well as smartphone BLE and NFCThere are dozens of RFID card technologies in use globally, creating challenges for hospital systems and device manufacturers wishing to implement RFID for access control beyond the front door. While other systems only recognize a few proprietary technologies, ELATEC RFID readers are universal. They can recognize and decode more than 60 RFID proximity card transponder types as well as smartphone Bluetooth Low Energy (BLE) and Near-field Communication. They are also certified for use in 110 countries. This means that large hospital systems that may be using multiple card technologies across different locations due to mergers and acquisitions can rely on a single reader type for access control and user authentication for all the other devices and systems they use. For medical device manufacturers and software developers, ELATEC readers provide a ‘single part number solution’ that allows them to sell their RFID-enabled devices into practically any hospital system throughout the world without worrying about what kind of card technologies their clients may be using. Cost-Efficient And Longer Durability "We describe ELATEC’s readers as being future proof,” explained John Tepley, President of ELATEC USA, Inc. "There are numerous technologies used for various applications throughout the region and the world, which means companies that want to integrate RFID into their solutions must be prepared to handle many different RFID transponder technologies. ELATEC is uniquely positioned to meet these challenges." ELATEC readers can be easily and remotely reconfigured to address emerging technologies, security threats and end-user requirements ELATEC readers can be easily and remotely reconfigured to address emerging technologies, security threats and end-user requirements, so they are inexpensive to maintain and will remain usable longer than competing reader technologies. As the healthcare ecosystem becomes more connected and complex, and the FDA puts increasing emphasis on cybersecurity risks for medical devices and software applications, developers need smart, easy solutions to close security vulnerabilities around user access and authentication. RFID provides fast, easy and secure authentication for all kinds of medical devices and applications. ELATEC readers can help developers meet emerging security challenges and address the needs of their healthcare clients.
Johnson Controls announces the release of CEM Systems AC2000 v10.1, which contains a number of new features that improve functionality and the user experience and help to mitigate health and safety risks. Support for a range of new third-party products that increase the performance and scope of the CEM Systems AC2000 access control system has also been added. The Health and Safety (H&S) Induction Check application for CEM Systems emerald intelligent access terminals allows cardholders to self-certify with a card swipe on the emerald terminal once they have completed H&S induction training and before they are provided access to a site. The application automatically records induction completed date on the CEM Systems AC2000 system, helping mitigate the risk of H&S incidents and report on who has and hasn’t completed training. CEM Systems AC2000 v10 Functionality at the edge has been improved with enhancements to the Local Access Remote application on the CEM Systems emerald terminal Another H&S feature now available with AC2000 v10.1 is the Emergency Responder Remote application which helps improve emergency response times during incidents. This application allows system users to quickly find emergency responders (Fire Marshalls, First Aiders and/or First Responders) via CEM Systems emerald terminals. Functionality at the edge has been improved with enhancements to the Local Access Remote application on the CEM Systems emerald terminal. This allows ‘Extra Access’ to be added, amended and removed via the app on the CEM Systems emerald terminal and provides potential cost savings for remote sites where a workstation client may not be feasible. MorphoWave Compact Biometric Access Reader Support has been added for the MorphoWave Compact frictionless biometric access reader, SimonsVoss SmartIntego wireless locking solutions and STid Architect range of RFID readers. This builds on the range of biometric, wireless lock solutions and RFID reader options that available to CEM Systems AC2000 system users.
For over a century, IEEE's mission has been to advance technology for the benefit of humanity. As the world’s largest technical professional organization, IEEE’s global community includes over 420,000 members in engineering, computing and technology, collaborating on communications, consumer electronics, robotics, sustainable energy, aerospace, life sciences, and many other critical initiatives. Dave George Felicitated With IEEE Life Membership Dave George has been an active IEEE member for over 40 years As the Chief Technologist behind Pryme Radio’s communications innovations, Dave George has been an active IEEE member for over 40 years. Recently, Mr. George was honored with IEEE Life Membership, a top echelon designation reserved only for those individuals demonstrating long-standing leadership, dedication, and who have made a significant impact on the development of technology. “I’m grateful for IEEE’s recognition, but it’s my job to find ways to better the lives and professions of Pryme’s customers through communications,” said George. “The fact that technologies have become ever more exotic and exciting is a bonus.” Never comfortable tooting his own horn, George’s demure demeanor belies the important role he’s played in moving the communication industry forward. In fact, George credits IEEE as being his primary source for leading edge electronic science data, which often help lead him to develop ground-breaking new products at Pryme. Pryme's Future Product Line In Sync With IoT George is a regional member of the IEEE Communications Society (ComSoc), Robotics & Automation Society (RAS), Intelligent Transportation Systems Society (ITS), and the Vehicular Technology Society (VTS.) His involvement has given rise to future product developments at Pryme that support emerging networks such as IoT, mesh, 5G, soon to be 6G, as well as intelligent vehicle to vehicle communications. George may shy away from the spotlight, but he is fearless when it comes to entering unexplored technological territories. The reward Dave George reveres most is creating products that make a difference. George’s philosophy mirrors the IEEE’s mission and is also reflected in Pryme’s guiding principle — Invent communications technologies that benefit public safety, security, government, education, transit, utilities, construction, manufacturing, retail, hospitality, field services, facilities, healthcare, professionals and humanity as a whole.
AES Corporation, global manufacturer of long-range wireless private mesh radio alarm communication products and services, is pleased to announce the appointment of Tim Lyon as the new Regional Sales Manager covering all of the New England, New York, New Jersey, and Pennsylvania territory. AES Corp. New Regional Sales Manager Lyon brings over 16 years of successful sales operations and security experience to AES. In his new role, he is responsible for engaging new business development efforts, building upon existing customer relationships, and supporting all sales programs for AES-IntelliNet and IntelliNet 2.0 related products in the Northeast region of the United States and Canada. Tim has attended training programs at Cardone University, Holden Advisors, and the Brookside Group Jim Burditt, AES Vice President of Sales, commented, “I’m excited to have Tim join our outside sales team. Although he will travel throughout the territory, he will also be spending time at AES Peabody corporate headquarters working closely with our inside sales team as well. We look forward to him making an impact in the Northeast region.” Security and Safety Solutions Expert Prior to joining AES, Tim worked in Account Executive and Territory Manager roles for a Fortune 500 company providing safety, security, and operational efficiency solutions for large scale systems and communities in the healthcare industry. Earlier in his career, he worked in the construction field as Sales Director for his family owned business. Tim recently relocated to the Boston area with his family after residing on the West Coast for more than 7 years. He has attended training programs at Cardone University, Holden Advisors, and the Brookside Group. “I’m happy to be here and part of the AES Team,” said Tim. “I look forward to meeting and working alongside our Customer Partners to help grow their alarm monitoring business and maximize their return on investment in AES patented technology.”
Public spaces in cities and suburbs are important places for community development and promoting outdoor recreation. These areas may include main streets, parks, promenades, band shells and fields. Such locations are often utilized by public event planners for community activities, including summer festivals, wintertime ice skating rink installations, music concerts and art fairs. As the year drew to a close, holiday and Christmas markets as well as major New Year’s Eve events, presented cities with constant public event security needs. The public nature of these events increases risks of incidents with high-speed vehicles that put attendees in danger. Fortunately, there are three ways for public space managers to prevent casualty-causing collisions and further promote the use of local public areas. Developing An Effective Action Plan When strategizing how to react to an alert, think about what time of the year and time of day the event is occurring It is important to have a plan developed before an incident or accident occurs. Warning systems, utilizing doppler radar and digital loop technologies, alert guards to abnormal vehicle velocity changes in the surrounding area. Managers of public areas should organize a meeting with public safety authorities and local agencies to discuss what must immediately occur when a high-speed vehicle is approaching a public event. When strategizing how to react to an alert, think about what time of the year and time of day the event is occurring. Having such a reaction plan in place combines technology and strategic planning to ensure everyone is on the same page to effectively target a threat and promote overall event safety. Securing Public Areas Ideally, there will be no need to implement a well-conceived action plan. After all, taking preventive measures to secure public areas where events take place is important to keep people safe from accidental vehicle collisions and intentional attacks. Protect attendees by clearly separating pedestrian and vehicle locations using security devices such as – Barricades Portable barriers Bollards Install Guard Booths Avoid the risk of vandalism and theft, making sure people are safe when walking back to the cars at night by keeping parking areas illuminated with flood lights. Install guard booths with employees who monitor activity in the parking area and who are prepared to react if an alert is triggered. Furthermore, prevent accidental collisions by clearly marking the parking area with informative warning signs and using barricades to direct traffic. These three tips can be used by public area managers to promote security at the next community event. Additionally, the technologies used to secure an event can also be used as infrastructure for year-round security. Installing gates that shut when the public space is closed or using aesthetically pleasing bollards are steps any public area manager can take to promote community safety.
From satellite imagery to street views to indoor mapping, technology has disrupted our past world. This has left us dependent upon new ways to visualise large spaces. This new world has brought many benefits and risks. But what does that mean for the security professional or facility manager today and what technologies can be used to secure buildings and improve facility operations? A Brief History Of 3D Technology Starting May 5, 2007 (inception 2001), Google rolled out Google Street View to augment Google Maps and Google Earth; documenting some of the most remote places on earth using a mix of sensors (Lidar/GSP/Radar/Imagery). The mission to map the world moved indoors May 2011 with Google Business Photos mapping indoor spaces with low cost 360° cameras under the Trusted Photographer program. In the earlier days, 3D scanning required a high level of specialization, expensive hardware and unavailable computing power With the growth of 3D laser scanning from 2007 onwards, the professional world embraced scanning as effective method to create digitised building information modeling (BIM), growing fast since 2007. BIM from scanning brought tremendous control, time and cost savings through the design and construction process, where As-Built documentation offered an incredible way to manage large existing facilities while reducing costly site visits. In the earlier days, 3D scanning required a high level of specialization, expensive hardware, unavailable computing power and knowledge of architectural software. Innovation during the past 8 year, have driven ease of use and lower pricing to encourage market adoption. Major investments in UAVs in 2014 and the commercial emergence of 360° photography began a new wave of adoption. While 3D scanners still range from $20K – $100K USD, UAVs can be purchased for under $1K USD and 360° cameras for as low as $100. UAVs and 360° cameras also offer a way to document large spaces in a fraction of the time of terrestrial laser scanners with very little technical knowledge. Access to building plans, satellite imagery, Google Street View, indoor virtual tours and aerial drone reconnaissance prove effective tools to bad actors The result over the past 10+ years of technology advancement has been a faster, lower cost, more accessible way to create virtual spaces. However, the technology advances carry a major risk of misuse by bad actors at the same time. What was once reserved to military personal is now available publicly. Access to building plans, satellite imagery, Google Street View, indoor virtual tours and aerial drone reconnaissance prove effective tools to bad actors. Al Qaeda terror threats using Google Maps, 2007 UK troops hit by terrorists in Basra, 2008 Mumbai India attacks, 2016 Pakistan Pathankot airbase attacks, ISIS attacks in Syria using UAVs, well-planned US school shootings and high casualty attacks show evidence that bad actors frequently leverage these mapping technologies to plan their attacks. The weaponization of UAVs is of particular concern to the Department of Homeland Security: "We continue to face one of the most challenging threat environments since 9/11, as foreign terrorist organizations exploit the internet to inspire, enable or direct individuals already here in the homeland to commit terrorist acts." Example comparison of reality capture on the left of BIM on the right. A $250 USD 360° camera was used for the capture in VisualPlan.net software What Does This Mean For The Security Or Facility Manager Today? An often overlooked, but critical vulnerability to security and facility managers is relying on inaccurate drawing. Most facilities managers today work with outdated 2D plan diagrams or old blueprints which are difficult to update and share.Critical vulnerability to security and facility managers is relying on inaccurate drawing Renovations, design changes and office layout changes leave facility managers with the wrong information, and even worse is that the wrong information is shared with outside consultants who plan major projects around outdated or wrong plans. This leads to costly mistakes and increased timelines on facility projects. Example Benefits Of BIM There could be evidence of a suspect water value leak which using BIM could be located and then identified in the model without physical inspection; listing a part number, model, size and manufacture. Identification of vulnerabilities can dramatically help during a building emergency. First Responders rely on facilities managers to keep them updated on building plans and they must have immediate access to important building information in the event of a critical incident. Exits and entrances, suppression equipment, access control, ventilation systems, gas and explosives, hazmat, water systems, survival equipment and many other details must be at their fingertips. In an emergency situation this can be a matter of life or death. Example Benefit Of Reality Capture First Responders rely on facilities managers to keep them updated on building plans A simple 360° walk-through can help first responders with incident preparedness if shared by the facility manager. Police, fire and EMS can visually walk the building, locating all critical features they will need knowledge of in an emergency without ever visiting the building. You don’t require construction accuracy for this type of visual sharing. This is a solution and service we offer as a company today. Reality capture is rapidly becoming the benchmark for facility documentation and the basis from which a security plan can be built. Given the appropriate software, plans can be easily updated and shared. They can be used for design and implementation of equipment, training of personnel and virtual audits of systems or security assessments by outside professionals. Our brains process visual information thousands of times faster than text. Not only that, we are much more likely to remember it once we do see it. Reality capture can help reduce the need for physical inspections, walk-throughs and vendor site-visits but more importantly, it provides a way to visually communicate far more effectively and accurately than before. But be careful with this information. You must prevent critical information falling into the hands of bad actors. You must watch out for bad actors attempting to use reality capture as a threat, especially photo/video/drones or digital information and plans that are posted publicly. Have a security protocol to prevent and confront individuals taking photos or video on property or flying suspect drones near your facility and report to the authorities. Require authorization before capturing building information and understand what the information will be used for and by who.There are a number of technologies to combat nefarious use of UAVs today Nefarious Use Of UAVs There are a number of technologies to combat nefarious use of UAVs today, such as radio frequency blockers and jammers, drone guns to down UAVs, detection or monitoring systems. Other biometrics technologies like facial recognition are being employed to counter the risk from UAVs by targeting the potential operators. UAVs are being used to spy and monitor for corporate espionage and stealing intellectual property. They are also used for monitoring security patrols for the purpose of burglary. UAVs have been used for transport and delivery of dangerous goods, delivering weapons and contraband and have the ability to be weaponised to carry a payload.Investigating reality capture to help with accurate planning and visualization of facilities is well worth the time The Federal Aviation Administration has prevented UAV flights over large event stadiums, prisons and coast guard bases based on the risks they could potentially pose, but waivers do exist. Be aware that it is illegal today to use most of these technologies and downing a UAV, if you are not Department of Justice or Homeland Security, could carry hefty penalties. Facility managers must have a way to survey and monitor their buildings for threats and report suspicious UAV behaviours immediately to authorities. At the same time, it’s critical to identify various potential risks to your wider team to ensure awareness and reporting is handled effectively. Having a procedure on how identify and report is important. Investigating reality capture to help with accurate planning and visualization of facilities is well worth the time. It can help better secure your facilities while increasing efficiencies of building operations. Reality capture can also help collaboration with first responders and outside professionals without ever having to step a foot in the door. But secure your data and have a plan for bad actors who will try to use the same technologies for nefarious goals.
In 1901 New York state made a pioneering regulation move and became the first US state to require automobile owners to register their vehicles. This marked the beginning of regulation on modern traffic, which - following decades of development - resulted in a multi-layer concept of regulation relating to vehicles and driver’s licenses, traffic signs and insurance mechanisms that we are all familiar with nowadays. While certain parallels can be drawn between the early days of cars and our contemporary experience with quadcopters, we are facing a new challenging era that is far more complex to organize and regulate. Integrating Drones In Existing Regulatory Ecosystem Similar to other pioneering technologies in the past, drones need to integrate into a long existing and well-balanced ecosystem, the rules of which have first been drafted some one hundred years ago and have evolved without taking vehicles such as drones into account. Yet the safety risks related to aviation hinder the quick integration of drones into that ecosystem, broadening the gap between existing regulatory landscape and the exponentially growing popularity and ever-advancing technology of drones. The safety risks related to aviation hinder the quick integration of drones into the legislative ecosystem For the past several years, governments and legislators have been trying to tackle this problem by trying to answer two questions: how to properly integrate drones into the airspace without creating a hazardous impact on existing airborne operations, and how to enforce regulations in order to prevent the side-effects related to careless or malicious drone flights, taking into consideration public safety and physical security. Counter-UAS Measures And Regulations Up until 2018, legislators tried to tackle these two questions as a whole by introducing bundled legislation drafts covering the entire landscape of gaps they needed to address, which resulted in multi-parliamentary committee efforts both in the US and abroad to review and approve each bill - a process that is very slow by design. It was only in the beginning of this year that the issues were starting to be addressed separately: legislation related to limitations and counter-drone measures on the one hand, and legislation related to integration into airspace on the other. Let’s take a closer look at Counter-UAS (unmanned aerial systems) measures and what makes them challenging in terms of regulation. Over the past years, various counter-drone technologies have been introduced to enable control over rogue drones in order to either stop them from achieving their flight purpose or prevent them from creating safety hazards to people or property. These measures can be grouped into 3 types of technologies: Military grade solutions - including lasers and surface-air missiles Kinetic solutions - including net-guns and autonomous drones set out to catch the rogue drone and disable it airborne Non-kinetic RF-based solutions - aimed at either disabling, disrupting or accessing the drone’s communications channels in order to trigger a return-to-home function, or guide the drone into a safe landing route Aside from combat military operations, the legality of using the above technologies is questionable as they tamper with an airborne aircraft, might be considered as wiretapping and/or violate computer fraud laws. Therefore, one can conclude that unless changes to regulation are made, non-military facilities will continue to be defenseless from and vulnerable to rogue drones. One can conclude that unless changes to regulation are made, non-military facilities will continue to be defenseless from and vulnerable to rogue drones European c-UAS Legislation Next, let’s look at the state of c-UAS legislation in both Europe and US to better understand different legislative ecosystems and how they affect the possibilities of using counter drone measures. In the European Union, there is currently no uniform legislation, and the member countries rely on their own existing legal infrastructures. Roughly speaking, most countries use a method of exemptions to the communications and aviation laws to allow the use of counter drone measures after a close examination by the relevant authorities. Such exemptions are approved under scrutiny to particular sites, which provide some relief, but they do not allow broad use of countermeasures. Further discussion regarding a broader regulation change, on a country level or EU-wide, is only preliminary. US c-UAS Legislation Preventing Emerging Threats - provides an initial infrastructure for counter drone measures to be used by various DoJ and DHS agenciesUnlike the EU, in the US exemptions are not possible within the existing legal framework, and the possible violation of US code title 18 means that the hands of both the government or private entities are tied when attempting to protect mass public gatherings, sports venues, or critical infrastructure. Therefore, it was more urgent to introduce legislation that would allow countermeasures to some extent. In September, US Congress approved the FAA-reauthorization act for the next 5 years (H.R. 302), which was shortly after signed by the President and came into effect. Division H of the act - Preventing Emerging Threats - provides an initial infrastructure for counter drone measures to be used by various DoJ (Department of Justice) and DHS (Department of Homeland Security) agencies under strict limitations. However, the act avoids determining which technology the agencies should use, yet it requires minimal impact on privacy and overall safety in order to strike the necessary balance. This is the first profound counter-drone legislation and is expected to be followed by additional measures both in the US and in other countries. Updating Counter-Drone Legal Infrastructure In summary, 2018 has been a pioneering year for counter-drone legislation, and while technology already allows taking action when necessary, legal infrastructure needs further updates in order to close the existing gaps: covering additional federal assets, state-level governments, and private facilities of high importance, such as critical infrastructure sites. Legislators in the US and around the world need to continue working in a rapid tempo to keep up with the growing threat of drones. As with cars a century ago, the number of accidents will rise with the increase in time taken to regulate.
I have been thinking a lot about the U.S. government’s ban on video surveillance technologies by Hikvision and Dahua. In general, I question the wisdom and logic of the ban and am frankly puzzled as to how it came to be. Allow me to elaborate. Chinese Camera Manufacturers Reality check: The government ban is based on concerns about the potential misuse of cameras, not actual misuse. Before the government ban, you occasionally heard about some government entities deciding not to use cameras manufactured by Chinese companies, although the reasons were mostly “in an abundance of caution.” Even so, I find the targeting of two Chinese companies – three if you count Hytera Communications, a mobile radio manufacturer – in a huge government military spending bill to be a little puzzling. I can’t quite picture how these specific companies got on Congress’s radar. The government ban is based on concerns about the potential misuse of cameras, not actual misuse What level of lobbying or backroom dealing was involved in getting the ban introduced (by a Missouri congresswoman) into the House version of the bill? And after the ban was left out of the Senate version, was there a new wave of discussions to ensure it was included in the joint House-Senate version (with some minor changes, and who negotiated those?). It all seems a little random. Concerns For The U.S. Furthermore, the U.S. ban solves neither of the two main concerns that are generally used as its justification: Concern: Cybersecurity. The U.S. ban “solves” the issue of cybersecurity only if both of the following statements are true. No security system that uses a Hikvision or Dahua camera or other component is cybersecure. Any system that does not use a Hikvision or Dahua camera or other component is cybersecure. What level of lobbying or backroom dealing was involved in getting the ban introduced into the House version of the bill? The ban ignores the breadth and complexity of cybersecurity and instead offers up two companies as scapegoats. Our industry has sought to address cybersecurity, and the one principle that has guided that effort is that cybersecurity is an issue that must be addressed by manufacturers, consultants, integrators and end users – in effect, everyone in the industry. Cybersecurity does not begin and end with the manufacturer and banning any manufacturers from the market does not ensure better cybersecurity. Concern: “Untrustworthy” Chinese companies. Hikvision and Dahua are only two Chinese companies. Any response to concerns about whether Chinese companies are trustworthy would need to cover many more companies that manufacture their products in China. Australian TV recently claimed that “All Chinese companies pose a risk. Because of Chinese laws, there is a requirement for companies to be engaged in espionage on behalf of the state.” Even if one embraces that extreme view, the logic fails when only two companies are targeted. One source told me that 60 to 65 percent of the global supply of commercial video cameras are manufactured in China, so it’s a much bigger issue than two companies.The Chinese government has much more effective ways of conducting espionage than exploiting security cameras And is U.S. security at risk unless or until it is cut off from more than half of the world’s supply of video cameras? Even Western camera companies manufacture some of their cameras and/or components in China. Why name only two (or three) companies, only one of which has ties to the Chinese government? If the goal of the U.S. ban was to address the possibility of cybersecurity and/or espionage by the Chinese government, shouldn’t there be other companies and product categories included? Clearly, video surveillance is not the only category that has the potential for abuse. The Chinese government has much more effective ways of conducting espionage than exploiting security cameras. Global Response To U.S. Ban And now that the U.S. ban has been passed, how is the ban being misused to justify a new level of alarm about Chinese companies? Australian television effortlessly made the leap from “software backdoors” to a concerted and organized effort by the Chinese government to use cameras to be the “number one country for espionage.” And it’s not just about government facilities: “Even on the street, [cameras] have the potential to inadvertently contribute toward Chinese espionage activity by providing real-time information about the situation on the ground,” says the Australian TV report. If all Chinese companies pose a risk, why is the U.S. government targeting specific companies rather than all Chinese companies? If all Chinese companies pose a risk, why is the U.S. government targeting specific companies rather than all Chinese companies, or at least those with electronics or computer products that could be used for espionage? What about the espionage potential of the 70% of mobile phones that are made in China? What about other consumer electronics such as PCs or smart TVs? How many government facilities that are eliminating Dahua and Hikvision cameras have employees who use iPhones or use other electronic equipment from China? Artificial Intelligence & IP-Over-Coax Also, consider the impact of the ban on business. Hikvision and Dahua have had many successes in the video surveillance market, including in the U.S. market. They have added value to many integrators and end user customers. They have been on the forefront of important trends such as artificial intelligence and IP-over-coax. And, yes, they have made technologies available at lower prices.Cybersecurity issues have plagued several companies in the industry, not just Hikvision and Dahua Cybersecurity issues have plagued several companies in the industry, not just these two, and both Hikvision and Dahua have worked to fix past problems, and to raise awareness of cybersecurity concerns in general. Is a U.S. ban on two companies an appropriate response to a series of geo-political concerns that are much bigger than those two companies (and bigger than our entire market)? Should two companies take the brunt of the anti-Chinese backlash? Video Surveillance Cameras Is the video surveillance market as a whole better or worse for the presence of Hikvision and Dahua? Is it up to the U.S. government to make that call? In some ways, thoughts of Chinese espionage are a sign of these uncertain political times. Fear of video surveillance is perfectly congruent with long-standing anxieties about “Big Brother;” suspicion about China taking over our video cameras just rings true at a time when Russia is (supposedly) controlling our elections. But should two companies be targeted while broader concerns are shrugged off?
ADT is looking to "bring the voice of the customer" into the continuing development and expansion of Z-Wave, the radio frequency (RF) communication and product-level interoperability technology that enables wireless networking of battery-powered devices in the home. ADT is the newest Principal Member of the Z-Wave Alliance consortium. Z-Wave is one of the enabling technologies of ADT’s Pulse security and home automation system, which enables a home's electronics to communicate with each other and with the user. Z-Wave unifies devices like door locks and lighting controls into an integrated network. ADT is the Z-Wave Alliance’s seventh and newest Principal Member, and also the first service-based company represented on the Z-Wave Board of Directors. The other Principal Members are original equipment manufacturers GE/Jasco, Ingersoll-Rand, Linear, Evolve, FAKRO and Sigma Designs. “As a service provider who touches the end user directly, we bring a different perspective that rounds out the Z-Wave board,”says Steve Shapiro, ADT’s Vice President of Industry Relations. ADT was previously a full-level member and has been active in the Z-Wave Alliance since implementing Z-Wave as part of ADT Pulse. Becoming a Principal Member “reaffirms [ADT’s] commitment to the technology going forward,” he adds. The Z-Wave Alliance oversees development and implementation of the technology. The Alliance is made up of member companies participating at various tiers in technology working groups and accessing the technology to develop products. The Z-Wave Alliance includes 160 full-level members involved in developing products and about 110 Affiliate members (mostly resellers and installers). At the top level of the Z-Wave Alliance are the companies that guide development and implementation of the technology, the Principal Members whose representatives make up the Alliance Board of Directors. Shapiro is joining the Z-Wave Alliance Board. Z-Wave technology is used throughout the security and home automation markets, enabling radio frequency (RF)communication and product-levelinteroperability among battery-powereddevices in the home Z-Wave technology is used throughout the security and home automation markets, enabling radio frequency (RF) communication and product-level interoperability among battery-powered devices in the home, including climate controls, door locks, security sensors, appliances and remote control. There are 1,000 or so products from 100 companies that are Z-Wave certified, which means they communicate within a 50-foot range using low power consumption that allows one- or two-year battery life. Mesh networks of these devices, each communicating and also relaying signals from other devices, can extend the operable range to cover an entire house or small commercial facility. Z-Wave enables greater wireless networking in the home and realization of home automation systems with more capabilities. “ADT adds a complementary view to the board based on their knowledge of customer needs,” says Mark Walters, Z-Wave Alliance chairman. “Having North America’s leader in residential security advising the Z-Wave Alliance at the Board level brings a focus to that market segment in terms of guiding the alliance in both marketing and technical development. Security companies now have someone representing them who understands and directly participates in their business.” Principal Members must be nominated by an existing Principal Member and then approved by the Board of Directors. “We are not just a security company, but a service provider for home and business automation,” Shapiro says. “Security is a great platform for automation, and it’s a natural combination.” He notes that 44 percent of ADT customers opt for the ADT Pulse service, and the number has been climbing quarter over quarter since 2010. “It confirms how the different kinds of systems make sense together,” he says.
IndiaNivesh is one of the leading financial services conglomerate in India. IndiaNivesh is into various aspects of investment banking and consulting business. It plans to emerge as a dynamic, customer-centric, and progressive financial group in the country with PAN India presence. Having its head office in Mumbai, IndiaNivesh is growing with eight regional offices and 29 branch offices across India. Project Specifics Application: Time-Attendance and Access Control Locations: 32 (PAN India) Users: 500 Units Installed: 60 Readers: Fingerprint and RFID Card IndiaNivesh being widely involved in financial services business with 29 branch offices and 8 regional offices across India, required eradication of forged attendance data and manual attendance process, as security is a crucial aspect for them. To streamline and manage attendance data of all employees accurately and perform calculation of error-free salary has been a tedious task. It has been challenging to integrate their existing payroll software with the time-attendance software. COSEC Time-Attendance Solution Matrix offered COSEC time-attendance solution helped in connecting all its regional and branch offices to their head office in Mumbai Matrix offered COSEC time-attendance solution which has web-based architecture and helped in connecting all its regional and branch offices to their head office in Mumbai. Implemented automatic salary calculation as Matrix COSEC time-attendance software got easily integrated with existing payroll software. Result Real-time attendance of all employees at a centralized location Integration with its existing payroll software Ease of Implementation using the existing infrastructure Fraudulent timekeeping is completely eliminated Accurate In/Out time of each employee recorded Live monitoring of In/Out timing Generation of time-attendance and access control reports and charts for all branches Improved overall productivity of the organization Continuous operations with excellent service support Biometric Access Control Solutions COSEC DOOR FOP - Optical fingerprint-based door controller for access control and time-attendance COSEC DOOR CAS – Card-based door controller for access control and time-attendance COSEC PANEL - Site controller to manage multiple door controllers and advanced access control Features COSEC LE PLATFORM - Application server platform for 1000 users and expandable up to one million users COSEC LE TAM - Comprehensive time-attendance and leave management module for COSEC LE platform COSEC LE ACM - Comprehensive access control module for COSEC LE platform
Most retailers invest in a video surveillance solution to improve security. Many also use it as an investigation tool to help resolve customer disputes, liability claims and reduce losses from theft and fraud. Intelligent Video Solutions Complete Releaf relies on its intelligent video solution for all of those reasons, however compliance with state regulations was the primary objective when CEO and owner Eric Ryant started looking for a video system for his new, 3,000 square foot cannabis dispensary in Lafayette, Colorado. Unlike many other types of retail environments, cannabis dispensaries must comply with strict rules governing the type of video surveillance equipment used, where cameras and equipment are placed, and how long video evidence must be retained. Already familiar with the regulations based on his experience operating a second dispensary and a cultivation center in Lafayette, Colorado, Ryant sourced multiple bids for his new video solution. In the end, I selected the March Networks proposal. It had everything I was looking for, including POS integration, and additional capabilities" POS Integration “Once all the bids were in, I went through the process of analyzing each one and ended up narrowing the contenders down to two,” said Ryant. “In the end, I selected the March Networks proposal from our systems integrator, Falcon Networks. The solution had everything I was looking for, including POS integration, and additional capabilities I thought might be useful down the road. It met all of the compliance criteria, and the price was comparable.” Prior to opening the boutique dispensary in January 2018, Ryant worked with its system integrator to design and install a fully-compliant video solution. IR Dome Cameras Today, IR dome cameras mounted inside the dispensary capture clear 4MP video of all activity at entrances and exits, in storage and equipment rooms, and at each point-of-sale (POS) system. In addition, 360° cameras are installed above the sales floor and in every corner to provide further panoramic coverage. The 360° cameras are also installed on the dispensary’s exterior to capture people entering and exiting, as well as any activity in the surrounding parking lot and back loading area. The cameras were selected and placed strategically to ensure that the system meets multiple legislated requirements, such as recording all activity occurring within 20 feet of any ingress/egress point, capturing clear video in all lighting conditions, and making sure that the recorded video is sharp enough to identify customer and employee facial features at each POS. Hybrid Network Video Recorder At the center of Complete Releaf’s video solution is a hybrid network video recorder (NVR) At the center of Complete Releaf’s video solution is a hybrid network video recorder (NVR). The recorder provides IP and analog video capture and unparalleled reliability through features such as diagnostic LEDs, an internal battery backup, and a customized embedded Linux operating system. All IP channel licenses are included with the recorder, making it a convenient and cost-effective option for the dispensary. Equally important, the recorder provides Complete Releaf with 32TB of internal storage, so it is compliant with the state’s 40-day video retention requirement. “Essentially, we need 100 percent coverage with no ‘blind spots’ on our retail floor, and a clear picture of people’s faces. It’s a truly reliable product, and we’ve had no difficulties achieving our 40 days of archived video,” said Ryant. Searchlight Intelligent Software While security and compliance were both top priorities for Ryant, finding a video solution that would also help him run Complete Releaf more efficiently – and profitably – was also important. That’s why he’s so pleased with the March Networks Searchlight for Retail application software he is also using. The intelligent software enables Ryant and his team to proactively identify and review suspect transactions using integrated video and transaction data pulled from the dispensary’s Green Bits POS system. It provides them with an easy-to-use loss prevention tool that reduces the time it takes to investigate incidents from hours to minutes. It also arms them with strong video and data evidence to support successful prosecutions or recoveries. Ryant is also testing the Searchlight application in his cultivation facility “Having video surveillance in our dispensary definitely deters theft,” said Ryant. “Combining the video with transaction data goes a step further and really causes people to think twice before they do something they’ll probably regret.” Radio Frequency Identification Tags Ryant is also testing the Searchlight application in his cultivation facility, taking advantage of the software’s ability to integrate with data from the Radio Frequency Identification (RFID) tags he is required to add to each plant through the cultivation process as part of Colorado’s Inventory Tracking System (Metrc). The software would enable Ryant to leverage his RFID investment by making the data searchable in the dashboard and tying it to recorded video. If there’s ever an incident during the cultivation process, Ryant could use the software to easily locate the video footage to see what actually happened and who was involved.
Losing keys is a given. It’s just something that happens at some point. One study in the UK estimated around 10,000 annually end up just in the refuse, by mistake*. At CROUS Montpellier student accommodation block in southern France, they sought a solution to lost keys and the other hassles of managing an outdated mechanical master-key system for a large facility with a transient population. Aperio Wireless Locking Devices CROUS Montpellier fixed lost key problems by exchanging their mechanical locks for Aperio cylinders. Aperio wireless locking devices with built-in RFID readers are already trusted at universities all over Europe to protect staff, students and assets against burglary and unauthorized intruders. Easy-to-fit Aperio locks have transformed facility management for the accommodation block. To date, 1,500 wireless Aperio cylinders are seamlessly integrated online with their ARD security system, which gives facility managers an overview of block security in real time. Aperio Cylinders Integrated With ARD Security System Now, when a student loses their key-card, it’s simple for a site manager to cancel the old credential and issue a new one. There is no need to engage a locksmith to replace physical locks, saving everyone’s time and CROUS money. A constant drain on resources has been eliminated. Aperio easily integrates with payment and other smart-card systems, as well as access control Because Aperio integration at CROUS is online, managers block lost credentials quickly using the software, without visiting the door. It is just as easy to de-authorize credentials for students who leave, even if they forget to return their smart-card. An operator simply removes them from the system database, and they are locked out. Aperio-Access Control System Integration Aperio easily integrates with payment and other smart-card systems, as well as access control. “Aperio provides a comfortable access solution. Our students can access their accommodation, use the printer and pay in the canteen with the same card,” explains Cyril Combacal at CROUS Montpellier. Because Aperio is easily scalable and can expand any security system when needs change, investments in new wireless locking can be rolled out over time. It has made logistics and budgeting much easier for CROUS. Refurbishment at CROUS Montpellier is ongoing: up to 500 new Aperio cylinders are installed efficiently and wirelessly every year.
The Eurofighter will be equipped with a new generation of radar which will enhance the aircraft’s capabilities and survivability. In the Euroradar consortium, the sensor solutions provider HENSOLDT is pressing ahead with the development of the Eurofighter’s new Captor-E radar system. Following the successful acceptance test, HENSOLDT has now delivered the second antenna ready for series production to Leonardo UK in Edinburgh. This means that the production of the so-called e-scan antenna can commence at the HENSOLDT site in Ulm/Germany according to plan. This paves the way for the delivery of the first radar systems as of mid-2019. Resource Management As early as spring 2018, the radar has successfully completed two flight campaigns at British Aerospace Systems (BAES) in Warton and at Airbus Defense and Space in Manching and met the requirements of the Critical Design Review (CDR) exactly on schedule. The Captor-E radar is based on AESA (Active Electronically Scanned Array) technology and will significantly enhance the performance of the Eurofighter The Captor-E radar is based on AESA (Active Electronically Scanned Array) technology and will significantly enhance the performance of the Eurofighter. Electronic beam scanning combined with flexible radar resource management provide outstanding detection performance and ensure simultaneous multi-target tracking, missile guidance and perception of the situation. The Eurofighter’s nose is larger than that of all the comparable fighters, which means that the antenna is much larger and consequently more powerful than that of competing aircraft. Radio-Frequency Components This, together with the ability to mechanically rotate the antenna with a larger angle of view, increases both the detection area and the field of regard in comparison with the AESA radar systems used by the competitors. The further development of radar technology is one of the main focal points of the sensor specialist HENSOLDT. For this reason, HENSOLDT operates one of the largest cleanroom production lines for radio-frequency components in Europe. HENSOLDT’s radar systems are deployed worldwide by armed forces, including the US and German Navy, as well as at the bases of the Canadian, Australian and German Air Force. The Eurofighter radar is being developed by the Euroradar consortium comprising Leonardo (Great Britain, Italy), Indra (Spain) and HENSOLDT (Germany). The consortium has already developed and produced more than 400 Captor radars.
The Polizei Bayern successfully opened its first operations centre in mid-September at its Police Headquarters in Central Franconia in Nuremberg. At the heart of the communication system was the Frequentis 3020 LifeX platform including digital radio connections and the newly developed AudioHub. The headquarters in Nuremberg is the second largest operations centre in the German state of Bavaria. It comprises 21 operator working positions that receive and process between 800 and 1,200 police calls per day. In the event of an emergency, an additional 13 operator working positions can be activated. Dispatch Calls Successfully Within the first week of operation the system was put to the test during a storm which led to over 900 emergency calls in the space of seven hours Within the first week of operation the system was put to the test during a storm which led to over 900 emergency calls in the space of seven hours. The system proved its stability and operators were able to dispatch calls successfully without issue. "The professionalism of Frequentis during the preparation, implementation and follow-up commissioning of the system gave us confidence in their abilities. All of the aspects important to us as customers were immediately considered and processed by the Frequentis team. Above all, the usability of the system was well received by the operators.", said Anton Beierweck, Head of State-wide IT Procedures at the Police Headquarters Upper Bavaria South. Provides Highest Protection LifeX was first deployed for Bavarian Police Force in 2015, ahead of the G7 summit. The system was adapted to the needs of the event which required 18,000 emergency services personal to protect government leaders and control demonstrations. The police headquarters of Mittelfranken is the pilot for the rollout of nine additional control rooms in Bavaria through October 2020 "What has been clear from the start of the project is the willingness of the Polizei Bayern to innovate. We are very proud to have met their high requirements in terms of technology and services and appreciate the professional cooperation with the organization who provides the highest protection and security in Bavaria.", Robert Nitsch, Frequentis Vice President Public Safety. The police headquarters of Mittelfranken is the pilot for the rollout of nine additional control rooms in Bavaria through October 2020. Two more operational centres are planned to be brought on line before the end of 2018.
In the booming workspace market, a professional welcome is crucial to success. At Barcelona’s Gran Vía Business Centre, 2,500m2 of offices and shared collaborative workspaces in the heart of the city, managers chose SMARTair wireless access control system — because it protects and manages their premises, and also projects the right image for a contemporary co-working environment. Gran Vía is a flexible and well-equipped home for companies from international corporates to local start-ups. Fiber optic broadband, LED lighting, an on-site restaurant and adjacent rental apartments are also part of Gran Vía’s high-end service. This is why, they sought an upgrade and replacement for an existing, out-of-date access control system. SMARTair Access Control Locks SMARTair access control locks now control access to Gran Vía’s six floors of offices, meeting spaces and communal areasGran Vía needed more flexibility and control over access to their premises; a system to seamlessly manage diverse access needs of permanent versus temporary users, and that would cope with rapid personnel turnover. Locking devices must complement the professional, modern image of the workspace, which attracts high-profile, design-savvy business clients. On top of these demands, any new system would have to be fitted without disrupting day-to-day business. SMARTair access control locks now control access to Gran Vía’s six floors of offices, meeting spaces and communal areas. Access requirements change all the time at the business center, and security managers now have a system where programming and reprogramming access rights is fast and easy. Thanks to the slick, flexible management software behind SMARTair, everything works in the background — keeping site users safe almost without anyone noticing. "SMARTair is an effective solution that is easy to use,” says Esther Portillo, Marketing Director at Gran Vía Business Centre. RFID Operated Wireless Escutcheons SMARTair wireless door and wall devices complement Gran Vía’s contemporary aestheticOver 50 new SMARTair wireless escutcheons are operated with RFID smart-cards, so security is not compromised if an office user loses their credential. Security administrators simply cancel the lost credential’s access rights — much quicker, cheaper and more professional than replacing a traditional mechanical lock. The user gets their new smart-card validated at one of five SMARTair wall updaters: it is the perfect combination of contemporary image and efficient user experience for Gran Vía’s clients. Importantly, SMARTair wireless door and wall devices complement Gran Vía’s contemporary aesthetic. “SMARTair has a modern design and suits our installations perfectly,” confirms Esther Portillo. Bringing more doors into any installed SMARTair system is straightforward, because SMARTair escutcheons fit wood, glass, emergency exit and fire-resistant doors. Gran Vía now has an access control system they can reconfigure and expand to suit both their needs and their clients’.