Radio frequency Identification
Matrix COSEC ARGO is a performance, design and engineering wonder that brings a modern design to the access control and time-attendance applications. The device is equipped with an enhanced 3.5” IPS LCD touchscreen for optimizing users’ visual experience. The door controller is designed to meet the aesthetics, technology and harsh environment application requirements of the large & multi-location enterprises, SME & SMB organizations. Matrix COSEC ARGO Door Controller: Enh...
Public spaces in cities and suburbs are important places for community development and promoting outdoor recreation. These areas may include main streets, parks, promenades, band shells and fields. Such locations are often utilized by public event planners for community activities, including summer festivals, wintertime ice skating rink installations, music concerts and art fairs. As the year drew to a close, holiday and Christmas markets as well as major New Year’s Eve events, presented...
User authentication deficiencies, endpoint data leakage and excessive user permissions are the three most common cybersecurity risks facing health systems and hospitals, according to new data from Clearwater CyberIntelligence Institute. At the HIMSS19 Global Conference and Exhibition, February 11-15, 2019 in Orlando, Florida, ELATEC will be demonstrating its uniquely flexible radio frequency identification (RFID) reader, which mitigates these issues by strengthening user authentication for acce...
Johnson Controls announces the release of CEM Systems AC2000 v10.1, which contains a number of new features that improve functionality and the user experience and help to mitigate health and safety risks. Support for a range of new third-party products that increase the performance and scope of the CEM Systems AC2000 access control system has also been added. The Health and Safety (H&S) Induction Check application for CEM Systems emerald intelligent access terminals allows cardholders to se...
From satellite imagery to street views to indoor mapping, technology has disrupted our past world. This has left us dependent upon new ways to visualise large spaces. This new world has brought many benefits and risks. But what does that mean for the security professional or facility manager today and what technologies can be used to secure buildings and improve facility operations? A Brief History Of 3D Technology Starting May 5, 2007 (inception 2001), Google rolled out Google Street View to...
In 1901 New York state made a pioneering regulation move and became the first US state to require automobile owners to register their vehicles. This marked the beginning of regulation on modern traffic, which - following decades of development - resulted in a multi-layer concept of regulation relating to vehicles and driver’s licenses, traffic signs and insurance mechanisms that we are all familiar with nowadays. While certain parallels can be drawn between the early days of cars and our...
For over a century, IEEE's mission has been to advance technology for the benefit of humanity. As the world’s largest technical professional organization, IEEE’s global community includes over 420,000 members in engineering, computing and technology, collaborating on communications, consumer electronics, robotics, sustainable energy, aerospace, life sciences, and many other critical initiatives. Dave George Felicitated With IEEE Life Membership Dave George has been an active IEEE member for over 40 years As the Chief Technologist behind Pryme Radio’s communications innovations, Dave George has been an active IEEE member for over 40 years. Recently, Mr. George was honored with IEEE Life Membership, a top echelon designation reserved only for those individuals demonstrating long-standing leadership, dedication, and who have made a significant impact on the development of technology. “I’m grateful for IEEE’s recognition, but it’s my job to find ways to better the lives and professions of Pryme’s customers through communications,” said George. “The fact that technologies have become ever more exotic and exciting is a bonus.” Never comfortable tooting his own horn, George’s demure demeanor belies the important role he’s played in moving the communication industry forward. In fact, George credits IEEE as being his primary source for leading edge electronic science data, which often help lead him to develop ground-breaking new products at Pryme. Pryme's Future Product Line In Sync With IoT George is a regional member of the IEEE Communications Society (ComSoc), Robotics & Automation Society (RAS), Intelligent Transportation Systems Society (ITS), and the Vehicular Technology Society (VTS.) His involvement has given rise to future product developments at Pryme that support emerging networks such as IoT, mesh, 5G, soon to be 6G, as well as intelligent vehicle to vehicle communications. George may shy away from the spotlight, but he is fearless when it comes to entering unexplored technological territories. The reward Dave George reveres most is creating products that make a difference. George’s philosophy mirrors the IEEE’s mission and is also reflected in Pryme’s guiding principle — Invent communications technologies that benefit public safety, security, government, education, transit, utilities, construction, manufacturing, retail, hospitality, field services, facilities, healthcare, professionals and humanity as a whole.
AES Corporation, global manufacturer of long-range wireless private mesh radio alarm communication products and services, is pleased to announce the appointment of Tim Lyon as the new Regional Sales Manager covering all of the New England, New York, New Jersey, and Pennsylvania territory. AES Corp. New Regional Sales Manager Lyon brings over 16 years of successful sales operations and security experience to AES. In his new role, he is responsible for engaging new business development efforts, building upon existing customer relationships, and supporting all sales programs for AES-IntelliNet and IntelliNet 2.0 related products in the Northeast region of the United States and Canada. Tim has attended training programs at Cardone University, Holden Advisors, and the Brookside Group Jim Burditt, AES Vice President of Sales, commented, “I’m excited to have Tim join our outside sales team. Although he will travel throughout the territory, he will also be spending time at AES Peabody corporate headquarters working closely with our inside sales team as well. We look forward to him making an impact in the Northeast region.” Security and Safety Solutions Expert Prior to joining AES, Tim worked in Account Executive and Territory Manager roles for a Fortune 500 company providing safety, security, and operational efficiency solutions for large scale systems and communities in the healthcare industry. Earlier in his career, he worked in the construction field as Sales Director for his family owned business. Tim recently relocated to the Boston area with his family after residing on the West Coast for more than 7 years. He has attended training programs at Cardone University, Holden Advisors, and the Brookside Group. “I’m happy to be here and part of the AES Team,” said Tim. “I look forward to meeting and working alongside our Customer Partners to help grow their alarm monitoring business and maximize their return on investment in AES patented technology.”
HID Global, global provider of trusted identity solutions, announced that it has won the 2018 RFID Journal Live! Best New Product award for its new Mini Tamper-Evident Beacon, the industry’s first Bluetooth beacon to provide anti-theft protection for IoT-based location services and conditioning monitoring applications. “The latest addition to our IoT services for asset management addresses the escalating need to protect sensitive assets and equipment in more connected and intelligent environments,” said Marc Bielmann, Vice President and Managing Director for Identification Technologies at HID Global. “This accolade validates HID’s evolution in our identification and sensing technologies portfolio, which is focused on driving more secure, intuitive and efficient operations.” HID Mini Tamper-Evident Beacon HID’s Mini Tamper-Evident Beacon can be fully integrated into HID Location Services and HID Condition Monitoring Enabled by Bluvision, HID’s Mini Tamper-Evident Beacon can be fully integrated into HID Location Services (for item management) and HID Condition Monitoring (for managing the operational performance and health of equipment). Once integrated, real-time alerts and notifications can be sent when a beacon has been damaged or removed from an asset. John Sailer, Chief Operating Officer of Bluvision added, “The beacon packs a cost-effective solution into a small form factor to reduce risks and increase security using innovative conductive technology that enables the revolutionary deployment of tamper-evident IoT ecosystems. The combination of its size and security capabilities is what makes the beacon highly desirable to customers.” Inventory And Asset Tracking HID’s Mini Tamper-Evident Beacon is ideal for managing critical, proprietary and high value assets across three primary use cases: HID Location Services to track assets, inventory and equipment with 1-2-meter accuracy using real-time location services. HID Location Services to monitor gateways or portals, and to know when assets are near specified areas using proximity-based location services. HID Condition Monitoring to track the temperature, motion and vibration of vending machines, HVAC systems, equipment and motorized machinery to help determine the health and performance for more data-driven maintenance. The new Bluetooth beacon was selected by a panel of independent judges who recognized the most groundbreaking solutions that deliver business value, reduce cost and improve efficiencies.
Hytera Communications Corp. Ltd., Hytera America, Inc., and Hytera Communications America (West), Inc. (collectively, "Hytera") has filed a petition at the US International Trade Commission (ITC) requesting review of a Final Initial Determination issued on July 3, 2018 by ITC Administrative Law (ALJ) Judge MaryJoan McNamara that features in Hytera's Digital Mobile Radio (DMR) products sold in the US infringe patents of Motorola Solutions, Inc. (MSI). Hytera Files Petition at US ITC Hytera's position remains that its products sold in the US do not infringe MSI's patents, and that the initial determination is incorrect. MSI originally asserted seven patents in its complaint but later withdrew three. ALJ McNamara ruled that a limited number of claims in the four remaining patents at issue are infringed, but also determined that MSI did not satisfy the technical industry prong of the domestic industry requirement as to another of its patents and did not find Hytera to have violated the statute with respect to that patent. During proceedings in this case, before the period for factual discovery ended, Hytera had produced for the ALJ's consideration documents and source code related to several new designs. In addition to asking the ITC to reverse the ALJ's initial determination, Hytera has also petitioned the Commission to affirm that these latest products are not infringing. Hytera is confident that our designs for our next-generation DMR product portfolio do not infringe any of the asserted patents of MSI" Digital Mobile Radio Products "Hytera is confident that our designs for our next-generation DMR product portfolio do not infringe any of the asserted patents of MSI," said Tom Wineland, Vice President of Hytera Communications America (West), Inc. "MSI did not oppose our new designs based on six of the asserted patents." In June of 2018, Hytera announced a new range of features for its digital mobile radio (DMR) portfolio, including its mobile radios, portable radios, and repeaters. These new features include extending full-duplex calling into repeater-mode operation (RMO) and direct-mode operation (DMO), enlarging full-duplex coverage beyond trunking mode without requiring extra hardware. Hytera also extended its over-the-air programming capability to conventional repeater operation, allowing individual radios to be reprogrammed remotely. Furthermore, optimized push-to-talk (PTT) functionality allows users to talk instantly after PTT even before a call is established. Hytera Portable Radios and Repeaters Hytera's new features for digital mobile and portable radios and repeaters promote higher productivity "Hytera's new features for digital mobile and portable radios and repeaters promote higher productivity, help improve the safety of users, and offer a better user experience," added Hytera's Wineland. "They boost Hytera’s leading position in providing innovative, versatile, high-quality DMR solutions that also present a compelling value to our dealers and customers." Hytera's petition before the ITC remains confidential by terms established by the Commission, which typically completes reviews within 120 days. Since the Commission has not issued its final decision, there is presently no constraint on the import or sale of any of Hytera’s products. Hytera also learned in May of 2018 that the US Patent and Trademark Office's Patent Trial and Appeal Board has accepted three Hytera petitions to invalidate MSI's patents based on prior art. "Hytera looks forward to the disposition of this case at the ITC and to resolving the series of nuisance litigations our competitor has filed against us," adds Wineland. "Hytera is focused on innovation and prefers to compete fairly in the marketplace rather than in the courtroom. Hytera is confident that our products do not infringe."
Siklu Inc., the global supplier of mmWave wireless solutions, has awarded Convergint Technologies, worldwide service-based systems integrator, as their Top Security Systems Integrator Partner in North America in 2017-2018. This decision was based upon the successful partnership between the companies over the past 2 years. Siklu Wireless Fiber Solutions Siklu’s wireless fiber solutions were chosen by Convergint in a number of video surveillance projects across North America, including University Village in Seattle, the cities of Gardena, Lakewood, Bakersfield and many more. Recent projects include the Columbus International Airport, where Convergint upgraded local area network connectivity by installing Siklu’s multi-gigabit radios in two days. This solution provided interference-free connectivity as a fiber extension throughout inclement weather conditions. A broad selection of Siklu mmWave wireless products with a range of frequencies and distances are supported in the partnership, including P2P as well as P2MP, leveraging narrow beams in the uncongested frequency bands of 60-70/80 GHz, which are immune to heavy Wi-Fi signals. Transmitting high bandwidth information across security networks, the mmWave solutions are ideal for mission critical and smart cities deployments that demand secured always-on connectivity. We are extremely pleased with the overall performance of Siklu’s solutions" mmWave Wireless Products “We are extremely pleased with the overall performance of Siklu’s solutions,” said Tony Varco, VP Security Division at Convergint. “Our customers increasingly demand advanced solutions that perform at a high level combined with a low cost of ownership, and Siklu’s technology delivers in both areas. They offer a scalable, high-capacity wireless solution without compromising reliability and enables Convergint to continue to deliver high-quality service.” “We’re pleased to work with Convergint as one of our leading security partners,” said Eyal Assa, CEO of Siklu. “Siklu expands the infrastructure offering for Convergint customers, enabling them to benefit from industry-leading performance to create a network which is ready for the next generation of IoT.”
Over 3,800 Sony network security cameras contribute to a greater sense of public safety – and lower crime rates – in the Republic of Honduras’ two biggest cities of San Pedro Sula and Tegucigalpa. In order to combat high crime levels, the Honduran government Ministry of Security established the country’s 911 National Emergency System in 2015. Uniting police, fire and ambulance departments, Red Cross and other public bodies, the system improves the handling speed and efficient resolution of 911 emergency calls. At the system’s heart is a powerful situational management platform that collates all incidents reported by phone, radio or detected by the network of cameras. Allowing a swifter response to reported incidents, the cutting-edge system offers further benefits. The cameras’ excellent Full HD imaging performance made them ideal for this challenging large-scale application An Effective Tool Round-the-clock monitoring of many different locations gives Honduran authorities a deep understanding of crime or emergency patterns. In addition, the platform is an effective tool in auditing each agency’s performance while handling incidents, thus helping to improve processes. The ‘eyes’ of this extensive security system are over 3,800 Sony video security cameras. The cameras’ excellent Full HD imaging performance made them ideal for this challenging large-scale application. Sony’s unique XDNR, Wide Dynamic Range and Visibility Enhancer technologies optimize picture quality in all lighting conditions, from sun-drenched city streets and backlit entrances to dim low-light conditions. Ideal For City Surveillance “We determined that Sony was a very reliable company with a strong reputation in the security industry,” notes Otoniel Martinez, regional business director at security integration specialist Grupo Visión. “In addition, the directors of this national project love the quality and resolution of the Sony cameras.” “The weather- and vandal-resistant SNC WR632C rapid dome camera combines powerful 30x optical zoom with gyro stabilisation. This ensures stable close-ups of suspicious activity, even when cameras are subject to strong winds and mechanical vibration on tall mounting poles. The solution has delivered excellent quality and performance"“Before making our decision, we carefully compared the performance of several security brands,” confirms Oscar Alcerro, Director of Operations at Dynamic Corporation that worked with Grupo Visión to deliver the major project. “With valuable features like high-power zoom and fast autofocus, these Sony cameras are ideal for city surveillance. We had already used Sony on previous projects, and were convinced they are excellent in every respect.” Improves Citizens' Security SNC-VB630 and SNC-VB640 box cameras feature Sony’s highly sensitive Exmor CMOS sensor technology for clear low-noise Full HD images, even in high-contrast scenes with areas of intense sunlight and dark shadow. Based on careful analysis of ‘hotspot’ areas, the cameras’ visible location – at bus stops, streets, retail centres, parks and residential areas – improves citizens’ sense of security. “Our expectations have been 100 percent met,” confirms Juan Carlos Degrandez, Deputy Director of the 911 National Emergency System. “The solution has delivered excellent quality and performance, with very few failures”. Since launching the 911 project, both Honduran cities have experienced a significant drop in crime rates.
The use of drones has increased dramatically in the last few years. Indeed, by 2021, the FAA says the number of small hobbyist drones in the U.S. will triple to about 3.55 million. With that growth, drone capabilities have increased while costs have decreased. For example, the DJI Phantom 4 can deliver a 2-pound payload to a target with 1.5m accuracy from 20 miles away for the less than $1000.00. This is an unprecedented capability accessible to anyone. This new technology has created an entirely new security risk for businesses and governments. Drone Security Risks Already, rogue groups such as ISIS have used low cost drones to carry explosives in targeted attacks. Using this same method, targeting high profile locations within our borders to create terror and panic is very possible. Security professionals and technologists are working furiously to address the gaps in drone defense. Currently, the most common technologies in use for drone detection are video, acoustic sensors, radio, and air surveillance radar. Each of these has advantages, but they also have flaws that make it difficult to detect drones in all conditions. Both optical and thermal cameras, as well as acoustic sensors, do not operate in severe weather such as fog and snow. And while radio and air surveillance radar cover a wide area of detection, they suffer from high installation costs and limiting technical challenges, such as being unable to detect low flying drones on autopilot. Compact Surveillance Radar (CSR) Compact Surveillance Radar (CSR) is a security technology addressing the problems with other types of detection. CSR, like traditional radar, has the benefit of being able to detect and track foreign objects in all weather conditions, but at a fraction of the size and cost. The compact size allows the radar to be mounted on existing structures or even trees, providing extensive perimeter defense almost anywhere that you can imagine. CSR can also filter out clutter such as birds by using an advanced algorithm reducing the number of false alarms. While the use of CSR and the other detection technologies are legal in the US and in most locations throughout the world, the response mechanisms are generally not. Current regulations in the US prohibit the use of jamming or GPS spoofing in all cases except for a few federal agencies Regulations Limiting Drones Current regulations in the US prohibit the use of jamming or GPS spoofing in all cases except for a few federal agencies. This makes it difficult to stop the damage that drones can cause. The FAA has put into place new regulations that limit some uses of drones. However, in most cases it is still illegal for even state or local governments to stop or interfere with drones other than to locate the operator and have them land the drone. In 2016 the first law to neutralize a drone in the United States was passed in Utah to respond to drones in wildfire areas because of their interference with airborne firefighting. This law may very well provide a model for other states dealing with drones in situations where people’s lives are being put at risk by drones. At the federal level, much effort is being put into evaluating the regulations and technology surrounding the misuse of drones. In the 2016 reauthorization bill for the FAA, Section 2135 included a pilot program for the investigation of methods to mitigate the threat of unmanned aircraft around airports and other critical infrastructure. There are many federal agencies that are evaluating the use of a variety of technologies to respond to this threat. Both optical and thermal cameras, as well as acoustic sensors, do not operate in severe weather such as fog and snow Effective Countermeasure Technologies The most effective countermeasure for drones is jamming, currently off-limits to the private sector. This includes stadiums, convention centers, and other large gathering areas. A number of companies are developing new response technologies that do not require the use of jammers or hacking. Several companies have developed net guns that shoot a net at an approaching drone. These are only effective at less than 100m and frequently miss the target, especially when the drone is approaching at high speed. Several other companies have taken this method a step further, with drones that capture other drones. Once a radar detects a drone, another defense drone is launched and flies to the point of detection. Then, using video analytics it homes in on the drone and fires a net to disable the drone and take it to a safe location. While this drone capturing technique is still in its infancy, it shows a great deal of promise and will not be restricted in the same fashion as jamming. However, even this solution is difficult under current regulations, as all commercial drones in the US must be under direct control of a human operator within their line of sight. This effectively means that a drone operator is required to be on-site at all times to protect a facility, event, or persons. One thing is for certain, technology will continue to adapt and security companies will continue to invent new methods to protect their facilities and the people they are sworn to protect.
Since the introduction of smartphones with downloadable applications, vendors have been trying to replace the traditional plastic identification (ID) card with a mobile phone application. People might lose or misplace an ID card, but most people immediately recognize if they are without their mobile phone. Mobile ID badges for access control Bluetooth Low Energy iBeacon technology Technical challenges The logical extension is to replace or augment the traditional corporate ID and access control card with a smartphone ID application. There are numerous benefits associated with using a smartphone as an ID badge. Fundamentally, they are more secure because smartphones can be locked, data encrypted and access restricted. Secure ID access can also be remotely installed and activated or deactivated on a smartphone with little effort from the IT or security department. In addition, there is no need to physically visit the security office to get a replacement badge. Mobile ID Badges And Open Systems The industry-wide adoption of mobile ID badges has been hindered by the evolution of existing and available technology and the vendor/partner ecosystems that have controlled the technology and markets. For a general application to achieve significant market adoption, it must have the required open systems and technology infrastructure in place and enabled to achieve scalable and secure deployments. Simply put, a mobile ID badge application needs support from the major phone manufacturers and interoperability with existing industry standard security models and protocols established in the market today. It was not until the promise of near field communication (NFC) that the idea of a mobile ID badge for access control started to take hold as a realistic possibility. After all, if you can replace your credit cards by waving your phone with a digital wallet over a point of sale (POS) device in a retail store, why can’t you replace your corporate ID card for physical access by waving it in front of a door reader? One major issue that hindered the broad adoption of NFC was the lack of support by major phone manufacturers – specifically Apple with the iPhone - which limited the growth of phone-based mobile IDs for door readers that control physical access. To create a practical smartphone-based mobile ID badge app, there are several technical challenges which must be addressed BLE Beacons Development Apple eventually announced a new Bluetooth Low Energy (BLE) iBeacon technology and Google followed suit with its Android-based Eddystone BLE beacon in 2015. BLE beacons are small, low-cost hardware devices that transmit a unique identifier over Bluetooth low energy to nearby electronic devices such as mobile phones. The initial use of BLE beacons were centered around determining location for mobile marketing applications. For example, if a customer is passing a merchandise display, it could notify them of a coupon or sale while they are in the store. Because BLE is universally available on all smartphones, the use of BLE beacons has enabled new experiential smartphone apps based on physical location presence. In the corporate environment, vendors have quickly determined that there are many ways to leverage BLE to simplify workplace-related functions. These include asset tracking, logging into networks and cloud resources, access to print jobs, meeting room usage, attendance systems, and even employee location tracking. PACS Two-way Communication And Universal Access Physical Access Control System (PACS) vendors and security organizations find BLE technology attractive as an access control application because of the two-way communication capability and universal access in smartphones. This is important because the smartphone acts as a reader and can determine presence or location next to a BLE beacon or communicate to a door reader access control device. For this reason, they have quickly determined ways to leverage BLE to enable access control and ID badges for both existing and new PACS solutions. For example, smartphones can be installed with a mobile ID badge application that can communicate with BLE-enabled door readers. One behavioral challenge associated with this solution is that people today are accustomed to using RFID-enabled access control cards as part of their daily lifespans vendors leverage the technology limits of an access control card read distance (1-3 cm) to the door reader to administer physical access. For example, the location of the reader next to the door or the timing of the read and door access strike opening the door, can all be orchestrated behind the scenes to provide a seamless door entry experience. This is the current user expectation and ensures the proper level of security while reducing tailgating, enforcing badge reads and preventing backups or entry queues. All of this happens transparently to ensure the frictionless access control users enjoy today. The “door open” event needs to occur just as a person approaches a door to avoid potential security breaches Mobile ID Badge App Challenges BLE beacons by design broadcast a unique adjustable signal over a wide range of up to 150 feet. While this is ideal for creating mobile ID apps for shopping or presenting location-based notifications and alerts, there are some concerns about when it should be used to provide access control and open a door. The “door open” event needs to occur just as a person approaches a door to avoid potential security breaches. Other key considerations include how to account for multiple doors within close proximity, avoiding a door detection from someone walking behind or away from a door and tailgating events. To create a practical smartphone-based mobile ID badge app, these technical challenges must be addressed. Some concepts being tested and used today include having a door open acknowledgment response via a notification, or waving the phone or using another gesture to acknowledge that you are in front of a door to request accessible still has some challenges to overcome before becoming the de facto industry standard for mobile ID badge access. Once the challenges are addressed, it has the potential to drive the next wave of innovation in access control and enable the next generation of ubiquitous mobile ID badge applications that will provide the seamless and secure access control that we enjoy today with traditional ID cards.
Iris recognition measures the unique patterns in the coloured portion of the eye (the iris) and compares that ‘signature’ to the one on file Since the late 1990s, iris recognition technology has been used in banks and airports as a means of identity authentication. Today, its use is widespread in government facilities, schools/research centers, correctional/judicial facilities, healthcare and others. There are a number of reasons for its rising popularity, but first, a brief overview of the technology is in order. Iris recognition measures the unique patterns in the coloured portion of the eye (the iris) and compares that ‘signature’ to the one on file in the system to verify and authenticate identity. The iris pattern has the most desirable properties for verification compared to other biometrics because of its uniqueness, stability over time and relatively easy accessibility. It also has the highest accuracy among all biometrics. Today’s iris recognition systems have been designed for ease of use and to lessen any perceived concern about the technology 1. Ease of use Today’s iris recognition systems have been designed for ease of use and to lessen any perceived concern about the technology. In fact, it’s as simple as taking a selfie. In the enrollment process a camera captures a detailed image of the iris and the system’s biometric software makes a template or 'map' of the person's iris pattern for storage in the system. To verify identity later, an individual simply looks at the iris reader from a comfortable distance, and the system compares the patterns in the individual's iris against the templates stored in the database. If there's a match, the individual’s identity is verified. 2. Cost Whether used in security or business applications, iris readers are proving cost effective – particularly from a lifecycle perspective. There are no cards to be replaced when worn out or lost; no RFID blocking sleeves are necessary to prevent hacking; and operations can be streamlined through reduced time and labor. Some systems allow scanning of up to 30 people per minute from a distance of several feet. And because no contact with the camera is required, either for enrollment or authentication, wear and tear on the cameras and contamination issues are greatly reduced. In a real sense, card-based systems are using the card as confirmation of the identity of the person carrying the card 3. Vulnerability It has been said that using lower-accuracy access systems such as cards/readers for facility access is the equivalent of locking a car door – easily compromised. Stolen cards can be duplicated or the information contained in the card can be used to hack into other areas of a facility. These vulnerabilities can lead to a less secure environment and put the safety of employees, visitors and assets at risk. Iris readers can overcome many of these concerns and help ensure a higher level of security. There are no cards to be lost, loaned or duplicated, and iris information cannot be falsified. An iris cannot be shared or stolen, and iris readers cannot be fooled by makeup, hair or clothing changes. 4. Identity Authentication In common access control systems, access is authorized either by the reader/controller or by the reader/server based on presentation of a pre-programmed access card by the individual. Neither decision is dependent upon any type of identity recognition. Without physical identity verification, the reader does not have the ability to confirm that the user is in fact the individual assigned to that card. Even two-factor authentication (i.e. access card plus PIN or password) can be defeated with readily available skimmers In a real sense, card-based systems are using the card as confirmation of the identity of the person carrying the card. However, because cards can be stolen, loaned, lost or duplicated, that link is both tenuous and vulnerable. Even two-factor authentication (i.e. access card plus PIN or password) can be defeated with readily available skimmers. Iris recognition access control systems on the other hand require authenticated identification before allowing access. The individual is uniquely and permanently linked to their iris. Some readers even work in outdoor environments as well as through eyeglasses, sunglasses, and contact lenses. 5. Multiple uses As an identity management solution, iris readers have been deployed in mainstream security locations in addition to environments as diverse as federal, state and local law enforcement, correctional facilities, travel and border security, healthcare and financial services as well as sports and entertainment venues. Outside security applications, organizations that are investigating ways to update and improve business procedures are considering the efficiency and productivity gains with the use of biometrics. Examples include protecting against insurance fraud, maintaining time and attendance records, and even ensuring a patient gets the right medication in a hospital. And, because of the non-contact interface – the user simply looks into the iris reader – the technology is often selected for applications where the user is gloved, such as in pharmaceutical manufacturing or in a construction site or port, or in environments where users wear protective clothing. A benefit of iris recognition systems is the capability for integration with other security systems to improve access control security 6. Integration Another benefit of iris recognition systems is the capability for integration with other security systems to improve access control security and provide greater operational efficiencies. For example, available today are IOM Android® tablets that fuse access control readers, biometrics, keypads, intercoms, cameras and more. These iris biometric-embedded tablets combine the accuracy and convenience of iris recognition with the functionality and customization of a mobile computing platform for increased security levels. The high functioning tablets can also be integrated with building management functions and time and attendance systems for even greater efficiencies. The high functioning tablets can also be integrated with building management functions and time and attendance systems for even greater efficiencies 7. Throughput Efficiency in system usage is critical for high volume throughput in applications such as airports/border crossings. It’s also critical in maintaining efficient throughput in facility access or at large public venues where lengthy delays could lead to user dissatisfaction and ultimately security vulnerabilities. To overcome these obstacles, new systems on the market offer high speed, making it possible for users to simply walk through a checkpoint without the need to stop and look into a reader. Iris recognition’s accuracy rates also contribute to ease of throughput. It’s extremely low FAR (False Acceptance Rates) and FRR (False Rejection Rates) are superior to those of other biometric modalities, making it better positioned for widespread usage. Iris recognition has proven to be a game changer in both physical and logical security. Its strong authentication capability also has potential for the home security market in devices such as biometric locks, Bluetooth devices and even cloud-based security. As costs come down, innovations will abound and the seven things you now know will help you navigate the future of biometric security.
I have been thinking a lot about the U.S. government’s ban on video surveillance technologies by Hikvision and Dahua. In general, I question the wisdom and logic of the ban and am frankly puzzled as to how it came to be. Allow me to elaborate. Chinese Camera Manufacturers Reality check: The government ban is based on concerns about the potential misuse of cameras, not actual misuse. Before the government ban, you occasionally heard about some government entities deciding not to use cameras manufactured by Chinese companies, although the reasons were mostly “in an abundance of caution.” Even so, I find the targeting of two Chinese companies – three if you count Hytera Communications, a mobile radio manufacturer – in a huge government military spending bill to be a little puzzling. I can’t quite picture how these specific companies got on Congress’s radar. The government ban is based on concerns about the potential misuse of cameras, not actual misuse What level of lobbying or backroom dealing was involved in getting the ban introduced (by a Missouri congresswoman) into the House version of the bill? And after the ban was left out of the Senate version, was there a new wave of discussions to ensure it was included in the joint House-Senate version (with some minor changes, and who negotiated those?). It all seems a little random. Concerns For The U.S. Furthermore, the U.S. ban solves neither of the two main concerns that are generally used as its justification: Concern: Cybersecurity. The U.S. ban “solves” the issue of cybersecurity only if both of the following statements are true. No security system that uses a Hikvision or Dahua camera or other component is cybersecure. Any system that does not use a Hikvision or Dahua camera or other component is cybersecure. What level of lobbying or backroom dealing was involved in getting the ban introduced into the House version of the bill? The ban ignores the breadth and complexity of cybersecurity and instead offers up two companies as scapegoats. Our industry has sought to address cybersecurity, and the one principle that has guided that effort is that cybersecurity is an issue that must be addressed by manufacturers, consultants, integrators and end users – in effect, everyone in the industry. Cybersecurity does not begin and end with the manufacturer and banning any manufacturers from the market does not ensure better cybersecurity. Concern: “Untrustworthy” Chinese companies. Hikvision and Dahua are only two Chinese companies. Any response to concerns about whether Chinese companies are trustworthy would need to cover many more companies that manufacture their products in China. Australian TV recently claimed that “All Chinese companies pose a risk. Because of Chinese laws, there is a requirement for companies to be engaged in espionage on behalf of the state.” Even if one embraces that extreme view, the logic fails when only two companies are targeted. One source told me that 60 to 65 percent of the global supply of commercial video cameras are manufactured in China, so it’s a much bigger issue than two companies.The Chinese government has much more effective ways of conducting espionage than exploiting security cameras And is U.S. security at risk unless or until it is cut off from more than half of the world’s supply of video cameras? Even Western camera companies manufacture some of their cameras and/or components in China. Why name only two (or three) companies, only one of which has ties to the Chinese government? If the goal of the U.S. ban was to address the possibility of cybersecurity and/or espionage by the Chinese government, shouldn’t there be other companies and product categories included? Clearly, video surveillance is not the only category that has the potential for abuse. The Chinese government has much more effective ways of conducting espionage than exploiting security cameras. Global Response To U.S. Ban And now that the U.S. ban has been passed, how is the ban being misused to justify a new level of alarm about Chinese companies? Australian television effortlessly made the leap from “software backdoors” to a concerted and organized effort by the Chinese government to use cameras to be the “number one country for espionage.” And it’s not just about government facilities: “Even on the street, [cameras] have the potential to inadvertently contribute toward Chinese espionage activity by providing real-time information about the situation on the ground,” says the Australian TV report. If all Chinese companies pose a risk, why is the U.S. government targeting specific companies rather than all Chinese companies? If all Chinese companies pose a risk, why is the U.S. government targeting specific companies rather than all Chinese companies, or at least those with electronics or computer products that could be used for espionage? What about the espionage potential of the 70% of mobile phones that are made in China? What about other consumer electronics such as PCs or smart TVs? How many government facilities that are eliminating Dahua and Hikvision cameras have employees who use iPhones or use other electronic equipment from China? Artificial Intelligence & IP-Over-Coax Also, consider the impact of the ban on business. Hikvision and Dahua have had many successes in the video surveillance market, including in the U.S. market. They have added value to many integrators and end user customers. They have been on the forefront of important trends such as artificial intelligence and IP-over-coax. And, yes, they have made technologies available at lower prices.Cybersecurity issues have plagued several companies in the industry, not just Hikvision and Dahua Cybersecurity issues have plagued several companies in the industry, not just these two, and both Hikvision and Dahua have worked to fix past problems, and to raise awareness of cybersecurity concerns in general. Is a U.S. ban on two companies an appropriate response to a series of geo-political concerns that are much bigger than those two companies (and bigger than our entire market)? Should two companies take the brunt of the anti-Chinese backlash? Video Surveillance Cameras Is the video surveillance market as a whole better or worse for the presence of Hikvision and Dahua? Is it up to the U.S. government to make that call? In some ways, thoughts of Chinese espionage are a sign of these uncertain political times. Fear of video surveillance is perfectly congruent with long-standing anxieties about “Big Brother;” suspicion about China taking over our video cameras just rings true at a time when Russia is (supposedly) controlling our elections. But should two companies be targeted while broader concerns are shrugged off?
ADT is looking to "bring the voice of the customer" into the continuing development and expansion of Z-Wave, the radio frequency (RF) communication and product-level interoperability technology that enables wireless networking of battery-powered devices in the home. ADT is the newest Principal Member of the Z-Wave Alliance consortium. Z-Wave is one of the enabling technologies of ADT’s Pulse security and home automation system, which enables a home's electronics to communicate with each other and with the user. Z-Wave unifies devices like door locks and lighting controls into an integrated network. ADT is the Z-Wave Alliance’s seventh and newest Principal Member, and also the first service-based company represented on the Z-Wave Board of Directors. The other Principal Members are original equipment manufacturers GE/Jasco, Ingersoll-Rand, Linear, Evolve, FAKRO and Sigma Designs. “As a service provider who touches the end user directly, we bring a different perspective that rounds out the Z-Wave board,”says Steve Shapiro, ADT’s Vice President of Industry Relations. ADT was previously a full-level member and has been active in the Z-Wave Alliance since implementing Z-Wave as part of ADT Pulse. Becoming a Principal Member “reaffirms [ADT’s] commitment to the technology going forward,” he adds. The Z-Wave Alliance oversees development and implementation of the technology. The Alliance is made up of member companies participating at various tiers in technology working groups and accessing the technology to develop products. The Z-Wave Alliance includes 160 full-level members involved in developing products and about 110 Affiliate members (mostly resellers and installers). At the top level of the Z-Wave Alliance are the companies that guide development and implementation of the technology, the Principal Members whose representatives make up the Alliance Board of Directors. Shapiro is joining the Z-Wave Alliance Board. Z-Wave technology is used throughout the security and home automation markets, enabling radio frequency (RF)communication and product-levelinteroperability among battery-powereddevices in the home Z-Wave technology is used throughout the security and home automation markets, enabling radio frequency (RF) communication and product-level interoperability among battery-powered devices in the home, including climate controls, door locks, security sensors, appliances and remote control. There are 1,000 or so products from 100 companies that are Z-Wave certified, which means they communicate within a 50-foot range using low power consumption that allows one- or two-year battery life. Mesh networks of these devices, each communicating and also relaying signals from other devices, can extend the operable range to cover an entire house or small commercial facility. Z-Wave enables greater wireless networking in the home and realization of home automation systems with more capabilities. “ADT adds a complementary view to the board based on their knowledge of customer needs,” says Mark Walters, Z-Wave Alliance chairman. “Having North America’s leader in residential security advising the Z-Wave Alliance at the Board level brings a focus to that market segment in terms of guiding the alliance in both marketing and technical development. Security companies now have someone representing them who understands and directly participates in their business.” Principal Members must be nominated by an existing Principal Member and then approved by the Board of Directors. “We are not just a security company, but a service provider for home and business automation,” Shapiro says. “Security is a great platform for automation, and it’s a natural combination.” He notes that 44 percent of ADT customers opt for the ADT Pulse service, and the number has been climbing quarter over quarter since 2010. “It confirms how the different kinds of systems make sense together,” he says.
Most retailers invest in a video surveillance solution to improve security. Many also use it as an investigation tool to help resolve customer disputes, liability claims and reduce losses from theft and fraud. Intelligent Video Solutions Complete Releaf relies on its intelligent video solution for all of those reasons, however compliance with state regulations was the primary objective when CEO and owner Eric Ryant started looking for a video system for his new, 3,000 square foot cannabis dispensary in Lafayette, Colorado. Unlike many other types of retail environments, cannabis dispensaries must comply with strict rules governing the type of video surveillance equipment used, where cameras and equipment are placed, and how long video evidence must be retained. Already familiar with the regulations based on his experience operating a second dispensary and a cultivation center in Lafayette, Colorado, Ryant sourced multiple bids for his new video solution. In the end, I selected the March Networks proposal. It had everything I was looking for, including POS integration, and additional capabilities" POS Integration “Once all the bids were in, I went through the process of analyzing each one and ended up narrowing the contenders down to two,” said Ryant. “In the end, I selected the March Networks proposal from our systems integrator, Falcon Networks. The solution had everything I was looking for, including POS integration, and additional capabilities I thought might be useful down the road. It met all of the compliance criteria, and the price was comparable.” Prior to opening the boutique dispensary in January 2018, Ryant worked with its system integrator to design and install a fully-compliant video solution. IR Dome Cameras Today, IR dome cameras mounted inside the dispensary capture clear 4MP video of all activity at entrances and exits, in storage and equipment rooms, and at each point-of-sale (POS) system. In addition, 360° cameras are installed above the sales floor and in every corner to provide further panoramic coverage. The 360° cameras are also installed on the dispensary’s exterior to capture people entering and exiting, as well as any activity in the surrounding parking lot and back loading area. The cameras were selected and placed strategically to ensure that the system meets multiple legislated requirements, such as recording all activity occurring within 20 feet of any ingress/egress point, capturing clear video in all lighting conditions, and making sure that the recorded video is sharp enough to identify customer and employee facial features at each POS. Hybrid Network Video Recorder At the center of Complete Releaf’s video solution is a hybrid network video recorder (NVR) At the center of Complete Releaf’s video solution is a hybrid network video recorder (NVR). The recorder provides IP and analog video capture and unparalleled reliability through features such as diagnostic LEDs, an internal battery backup, and a customized embedded Linux operating system. All IP channel licenses are included with the recorder, making it a convenient and cost-effective option for the dispensary. Equally important, the recorder provides Complete Releaf with 32TB of internal storage, so it is compliant with the state’s 40-day video retention requirement. “Essentially, we need 100 percent coverage with no ‘blind spots’ on our retail floor, and a clear picture of people’s faces. It’s a truly reliable product, and we’ve had no difficulties achieving our 40 days of archived video,” said Ryant. Searchlight Intelligent Software While security and compliance were both top priorities for Ryant, finding a video solution that would also help him run Complete Releaf more efficiently – and profitably – was also important. That’s why he’s so pleased with the March Networks Searchlight for Retail application software he is also using. The intelligent software enables Ryant and his team to proactively identify and review suspect transactions using integrated video and transaction data pulled from the dispensary’s Green Bits POS system. It provides them with an easy-to-use loss prevention tool that reduces the time it takes to investigate incidents from hours to minutes. It also arms them with strong video and data evidence to support successful prosecutions or recoveries. Ryant is also testing the Searchlight application in his cultivation facility “Having video surveillance in our dispensary definitely deters theft,” said Ryant. “Combining the video with transaction data goes a step further and really causes people to think twice before they do something they’ll probably regret.” Radio Frequency Identification Tags Ryant is also testing the Searchlight application in his cultivation facility, taking advantage of the software’s ability to integrate with data from the Radio Frequency Identification (RFID) tags he is required to add to each plant through the cultivation process as part of Colorado’s Inventory Tracking System (Metrc). The software would enable Ryant to leverage his RFID investment by making the data searchable in the dashboard and tying it to recorded video. If there’s ever an incident during the cultivation process, Ryant could use the software to easily locate the video footage to see what actually happened and who was involved.
Losing keys is a given. It’s just something that happens at some point. One study in the UK estimated around 10,000 annually end up just in the refuse, by mistake*. At CROUS Montpellier student accommodation block in southern France, they sought a solution to lost keys and the other hassles of managing an outdated mechanical master-key system for a large facility with a transient population. Aperio Wireless Locking Devices CROUS Montpellier fixed lost key problems by exchanging their mechanical locks for Aperio cylinders. Aperio wireless locking devices with built-in RFID readers are already trusted at universities all over Europe to protect staff, students and assets against burglary and unauthorized intruders. Easy-to-fit Aperio locks have transformed facility management for the accommodation block. To date, 1,500 wireless Aperio cylinders are seamlessly integrated online with their ARD security system, which gives facility managers an overview of block security in real time. Aperio Cylinders Integrated With ARD Security System Now, when a student loses their key-card, it’s simple for a site manager to cancel the old credential and issue a new one. There is no need to engage a locksmith to replace physical locks, saving everyone’s time and CROUS money. A constant drain on resources has been eliminated. Aperio easily integrates with payment and other smart-card systems, as well as access control Because Aperio integration at CROUS is online, managers block lost credentials quickly using the software, without visiting the door. It is just as easy to de-authorize credentials for students who leave, even if they forget to return their smart-card. An operator simply removes them from the system database, and they are locked out. Aperio-Access Control System Integration Aperio easily integrates with payment and other smart-card systems, as well as access control. “Aperio provides a comfortable access solution. Our students can access their accommodation, use the printer and pay in the canteen with the same card,” explains Cyril Combacal at CROUS Montpellier. Because Aperio is easily scalable and can expand any security system when needs change, investments in new wireless locking can be rolled out over time. It has made logistics and budgeting much easier for CROUS. Refurbishment at CROUS Montpellier is ongoing: up to 500 new Aperio cylinders are installed efficiently and wirelessly every year.
The Eurofighter will be equipped with a new generation of radar which will enhance the aircraft’s capabilities and survivability. In the Euroradar consortium, the sensor solutions provider HENSOLDT is pressing ahead with the development of the Eurofighter’s new Captor-E radar system. Following the successful acceptance test, HENSOLDT has now delivered the second antenna ready for series production to Leonardo UK in Edinburgh. This means that the production of the so-called e-scan antenna can commence at the HENSOLDT site in Ulm/Germany according to plan. This paves the way for the delivery of the first radar systems as of mid-2019. Resource Management As early as spring 2018, the radar has successfully completed two flight campaigns at British Aerospace Systems (BAES) in Warton and at Airbus Defense and Space in Manching and met the requirements of the Critical Design Review (CDR) exactly on schedule. The Captor-E radar is based on AESA (Active Electronically Scanned Array) technology and will significantly enhance the performance of the Eurofighter The Captor-E radar is based on AESA (Active Electronically Scanned Array) technology and will significantly enhance the performance of the Eurofighter. Electronic beam scanning combined with flexible radar resource management provide outstanding detection performance and ensure simultaneous multi-target tracking, missile guidance and perception of the situation. The Eurofighter’s nose is larger than that of all the comparable fighters, which means that the antenna is much larger and consequently more powerful than that of competing aircraft. Radio-Frequency Components This, together with the ability to mechanically rotate the antenna with a larger angle of view, increases both the detection area and the field of regard in comparison with the AESA radar systems used by the competitors. The further development of radar technology is one of the main focal points of the sensor specialist HENSOLDT. For this reason, HENSOLDT operates one of the largest cleanroom production lines for radio-frequency components in Europe. HENSOLDT’s radar systems are deployed worldwide by armed forces, including the US and German Navy, as well as at the bases of the Canadian, Australian and German Air Force. The Eurofighter radar is being developed by the Euroradar consortium comprising Leonardo (Great Britain, Italy), Indra (Spain) and HENSOLDT (Germany). The consortium has already developed and produced more than 400 Captor radars.
The Polizei Bayern successfully opened its first operations centre in mid-September at its Police Headquarters in Central Franconia in Nuremberg. At the heart of the communication system was the Frequentis 3020 LifeX platform including digital radio connections and the newly developed AudioHub. The headquarters in Nuremberg is the second largest operations centre in the German state of Bavaria. It comprises 21 operator working positions that receive and process between 800 and 1,200 police calls per day. In the event of an emergency, an additional 13 operator working positions can be activated. Dispatch Calls Successfully Within the first week of operation the system was put to the test during a storm which led to over 900 emergency calls in the space of seven hours Within the first week of operation the system was put to the test during a storm which led to over 900 emergency calls in the space of seven hours. The system proved its stability and operators were able to dispatch calls successfully without issue. "The professionalism of Frequentis during the preparation, implementation and follow-up commissioning of the system gave us confidence in their abilities. All of the aspects important to us as customers were immediately considered and processed by the Frequentis team. Above all, the usability of the system was well received by the operators.", said Anton Beierweck, Head of State-wide IT Procedures at the Police Headquarters Upper Bavaria South. Provides Highest Protection LifeX was first deployed for Bavarian Police Force in 2015, ahead of the G7 summit. The system was adapted to the needs of the event which required 18,000 emergency services personal to protect government leaders and control demonstrations. The police headquarters of Mittelfranken is the pilot for the rollout of nine additional control rooms in Bavaria through October 2020 "What has been clear from the start of the project is the willingness of the Polizei Bayern to innovate. We are very proud to have met their high requirements in terms of technology and services and appreciate the professional cooperation with the organization who provides the highest protection and security in Bavaria.", Robert Nitsch, Frequentis Vice President Public Safety. The police headquarters of Mittelfranken is the pilot for the rollout of nine additional control rooms in Bavaria through October 2020. Two more operational centres are planned to be brought on line before the end of 2018.
In the booming workspace market, a professional welcome is crucial to success. At Barcelona’s Gran Vía Business Centre, 2,500m2 of offices and shared collaborative workspaces in the heart of the city, managers chose SMARTair wireless access control system — because it protects and manages their premises, and also projects the right image for a contemporary co-working environment. Gran Vía is a flexible and well-equipped home for companies from international corporates to local start-ups. Fiber optic broadband, LED lighting, an on-site restaurant and adjacent rental apartments are also part of Gran Vía’s high-end service. This is why, they sought an upgrade and replacement for an existing, out-of-date access control system. SMARTair Access Control Locks SMARTair access control locks now control access to Gran Vía’s six floors of offices, meeting spaces and communal areasGran Vía needed more flexibility and control over access to their premises; a system to seamlessly manage diverse access needs of permanent versus temporary users, and that would cope with rapid personnel turnover. Locking devices must complement the professional, modern image of the workspace, which attracts high-profile, design-savvy business clients. On top of these demands, any new system would have to be fitted without disrupting day-to-day business. SMARTair access control locks now control access to Gran Vía’s six floors of offices, meeting spaces and communal areas. Access requirements change all the time at the business center, and security managers now have a system where programming and reprogramming access rights is fast and easy. Thanks to the slick, flexible management software behind SMARTair, everything works in the background — keeping site users safe almost without anyone noticing. "SMARTair is an effective solution that is easy to use,” says Esther Portillo, Marketing Director at Gran Vía Business Centre. RFID Operated Wireless Escutcheons SMARTair wireless door and wall devices complement Gran Vía’s contemporary aestheticOver 50 new SMARTair wireless escutcheons are operated with RFID smart-cards, so security is not compromised if an office user loses their credential. Security administrators simply cancel the lost credential’s access rights — much quicker, cheaper and more professional than replacing a traditional mechanical lock. The user gets their new smart-card validated at one of five SMARTair wall updaters: it is the perfect combination of contemporary image and efficient user experience for Gran Vía’s clients. Importantly, SMARTair wireless door and wall devices complement Gran Vía’s contemporary aesthetic. “SMARTair has a modern design and suits our installations perfectly,” confirms Esther Portillo. Bringing more doors into any installed SMARTair system is straightforward, because SMARTair escutcheons fit wood, glass, emergency exit and fire-resistant doors. Gran Vía now has an access control system they can reconfigure and expand to suit both their needs and their clients’.
Hytera, a global provider of innovative Professional Mobile Radio (PMR) communications solutions, announces that it has signed contracts with Secretariat of Public Security of the State of Alagoas, Brazil to provide TETRA communications infrastructure as the expansion of the statewide mission critical communications network and four-year maintenance service. The total contracts value is around 6.5 million US dollars with the infrastructure contract around 1.3 million and the service contract around 5.2 million. “We are excited being chosen as the equipment and service provider of Alagoas’s statewide TETRA system. The state authority shows confidence in Hytera’s ability to deliver advanced and reliable public safety communications networks. For the expansion, we presented the latest development of TETRA technologies,” said John Zhou, the General Manager of Hytera Brazil. “The new contracts as a milestone for Hytera Brazil recognize us not only as a leading TETRA solution provider, but also a trusted service provider, and it is the embodiment of Hytera transformation globally.” In early 2014 Hytera delivered TETRA infrastructure, terminals and dispatcher to the public safety users of State of Alagoas TETRA Communications Network In early 2014 Hytera delivered TETRA infrastructure, terminals and dispatcher to the public safety users of State of Alagoas, who were modernising its communications systems to better serve the communities and prepare for the global soccer fiesta, the World Cup 2014. The newly signed equipment contract includes 31 sites with Hytera’s latest TETRA innovation, DIB R5 base station. It adopts a maintenance-free, space-saving design and can be installed on walls, antenna masts or in tunnels. Thanks to its low power consumption and passive cooling, it is ideal for use in areas where power supply is critical or where there is a need for battery-based, portable base station solutions. With the expansion of the TETRA network, different public safety forces such as police, firefighters and emergency response in the State of Alagoas will share the network to facilitate optimal cooperation when the situation requires, which is another big step forward by the local authorities to improve the security of the state.