Some of the electronic features we all love in our new cars depend on a connection to the Internet. But what are the cybersecurity risks involved in that connection? Could a widespread cyberattack turn our cars into deathtraps and create a traffic catastrophe on the scale of 9/11? That’s the scenario described in a report from the nonprofit group Consumer Watchdog, which warns that a fleet-wide cyberattack at rush hour could result in a 9/11-style catastrophe with approximately 3,000 dea...
A video analytics system that provides ‘behavioral understanding’ can yield more meaningful and actionable data for a range of applications. In public safety and security, such a system can alert on violent or suspicious behaviors, such as people fighting, vandalism, people with weapons, etc. In advanced traffic surveillance and monitoring, it can provide alerts to vehicle collisions (accidents), traffic hazards or vehicle that aren’t using the road properly, such as a car th...
Keysight, the test and measurement vendor introduces its new Automotive Cybersecurity Program that delivers a broad cybersecurity portfolio, including hardware, software and services, to address the growing concern of cyber-attacks on connected vehicles. The cyber world is increasingly impacting the safe operation of automobiles, opening the risks of exposure, including malicious hacker activities. The new reality is that cyber-attacks against automobiles could result in the loss of human life....
The 2019 editions of Shanghai Intelligent Building Technology (SIBT) and Shanghai Smart Home Technology (SSHT) will be held from 3 ‒ 5 September at the Shanghai New International Expo Centre (SNIEC). Spurred by the fast development of China’s intelligent building, Internet of Things (IoT) and Artificial Intelligence (AI) sectors, the two exhibitions are close to capacity as there has been strong demand from exhibitors to participate at the shows. Smart neighborhoods The total exhibition...
Marking its European debut, Northrop Grumman Corporation’s Firebird product line will be showcased at the Royal International Air Tattoo at RAF Fairford, in the United Kingdom, July 19-21. The company is also announcing signed agreements with Tenax Aerospace and Grand Sky Development Company, LLC (‘Grand Sky’) for rights to purchase Firebird, the company’s new, optionally piloted intelligence, surveillance, and reconnaissance (ISR) aircraft system. Unmanned aerial vehic...
Artificial intelligence (AI) is expanding the capabilities of license plate readers and vehicle identification systems. Within a smart/safe city scenario, automatic license plate reader solutions are used to help analyze real-time video streams for site surveillance, inspection and public safety, and to offer actional information through a network of connected camera systems. Outside of law enforcement, this can include other public safety initiatives such as traffic tolls, car counting, and pa...
After entering into partnerships with Australian, Italian and Chinese trade fairs, the Deutsche Messe group of companies is now launching its own, fully proprietary INTERSCHUTZ trade fair in a foreign market: ‘INTERSCHUTZ USA’ is the name of the new event devoted to the North American firefighting equipment and safety/security sector. "Our new commitment in the U.S. represents an expansion of INTERSCHUTZ's worldwide network and allows us to occupy a key market with our strong brand," reported Dr. Andreas Gruchow, member of Deutsche Messe's Managing Board, adding: "While our foreign trade fairs are closely aligned with regional market conditions and needs, our Hannover-based INTERSCHUTZ – the world's flagship fair – focuses on the entire spectrum of global sales markets, supporting partnerships as well as business cooperation in the field of fire brigades, rescue services, civil protection and safety/security at the international level." Security solutions for fire brigades Firefighters in the U.S. have a great deal of respect for the INTERSCHUTZ brand as well as its size and scope"The first edition of INTERSCHUTZ USA will take place from 13 to 17 October 2020 in Philadelphia, Pennsylvania. The American subsidiary of Deutsche Messe, Hannover Fairs USA, is responsible for organizing the event. INTERSCHUTZ USA focuses on safety and security solutions, new technologies and the latest strategies for sustainable American fire brigades. "Firefighters in the U.S. have a great deal of respect for the INTERSCHUTZ brand as well as its size and scope," said Larry Turner, President and CEO of Hannover Fairs USA. "Many of the industry representatives we've met with are incredibly excited about the launch of our new show in America." Focusing on management Of fire brigades INTERSCHUTZ USA will focus on the requirements of fire departments in the 21st century, focusing, in particular, on the management level of American fire brigades. But vehicles, technologies and strategy aren't the only topic: At the same time, the new Philadelphia-based trade fair will also feature a supporting program designed to appeal to interested parties and fire department enthusiasts, as well as to families and potential young recruits from the east coast of the United States. INTERSCHUTZ USA enjoys the support of key local partners: "Members of the Philadelphia Fire Department are excited about welcoming the whole firefighting world to Philadelphia," said Adam Thiel, Fire Commissioner of the Philadelphia Fire Department and Director of the Philadelphia Office of Emergency Management, adding: "Since 1736, the Philadelphia Fire Department has been dedicated to safety, innovation, and best practices." Helping companies to exhibit in the US An additional partner for the event will be Local 22 IAFF of the Philadelphia Firefighters and Paramedics UnionAn additional partner for the event will be Local 22 IAFF of the Philadelphia Firefighters and Paramedics Union. "Local 22 IAFF is delighted that a prestigious event like INTERSCHUTZ, with such a diverse array of exhibitors, is coming to Philadelphia under the name of INTERSCHUTZ USA," remarked Mike Bresnan, President of Local 22 IAFF. The aim is to help companies from around the world – and particularly companies exhibiting at INTERSCHUTZ in Hannover – to get active on the American market, either as individual exhibitors or as members of a group pavilion. This has already been successfully practiced at the other INTERSCHUTZ events staged outside of Germany. These are currently ‘AFAC powered by INTERSCHUTZ’ (27–30 August 2019 in Melbourne, Australia), ‘REAS powered by INTERSCHUTZ’ (4–6 October 2019 in Montichiari, Italy) and ‘CEFE powered by INTERSCHUTZ’ (5–7 November 2019 in Shanghai, China).
NELA Locksmith, a Los Angeles locksmith, announces that it has expanded into serving residential and commercial markets. Previously, they had been primarily focused on emergency services that are available 24/7. This expansion means that their residential services will include 24-hour locksmith services. Additionally, their services will include broken key extraction, lock changing and re-keying, as well as cabinet and mailbox lock services. They’ll even be able to install and provide any subsequent maintenance for electric and smart locks. Vehicular lockouts Commercial services will include many of the same services mentioned above. However, the commercial services will be scaled to the size of the location. Despite being a newer company, NELA Locksmith has professionals who have experience in the locksmith industry. “We’ve been helping people in Los Angeles with their locks for a long time. When we started this company, the goal was to be able to offer people a better price on their residential and commercial locks. We’re not just locksmiths; we’re part of this community. So, we wanted to be able to give the community a bit more,” said Luis Bravo from NELA Locksmith. In addition to the residential locksmith and commercial services, NELA Locksmith offers automotive locksmith services as well. Those include vehicular lockouts, lock changing and others.
IDIS announces the launch of its IDIS Dynamic Privacy Masking (IDPM) solution, a quick and efficient privacy tool, provided free of charge to its users. Continuing the company’s tradition of delivering specific solutions responsive to market conditions and concerns, IDPM offers a quick and efficient solution to the previously labor-intensive, and at time prohibitively expensive, problem of obscuring or ‘de-identifying’ persons in surveillance footage who are incidental, irrelevant, or protected by law when footage is to be reviewed by, shared with, or provided to a third party (such as for evidence in a legal proceeding). Video surveillance camera Video surveillance is further regularly reviewed in law enforcement, legal and court proceedings Laws and regulations governing privacy throughout North America increasingly allow for various types and levels of access to surveillance footage, and last year, the European Union’s GDPR provisions granted rights to any person captured by video surveillance camera to access a copy of their personal recorded data. Video surveillance is further regularly reviewed in law enforcement, legal and court proceedings; as part of campus investigations and disciplinary actions; or released to the media and public by public and private entities alike to confirm or explain events. This increases the need—and, at times, legal requirement—to ethically protect the identities of unrelated or protected individuals (such as minors) featured in the recorded video. De-identify faces Meeting these requirements, especially for small to medium businesses, can be cumbersome and involve additional expense, unbudgeted and/or better utilized elsewhere. Solving this problem, IDPM’s anonymization and obscuring features are now available from the IDIS Partners Portal as a direct download without cost. Using the software, authorized system users can blur sensitives areas and dynamically de-identify faces, vehicles, etc. Notably, IDPM does this automatically for the duration of the clip, even as the object or person moves around the scene. Recorded video data Users also have options to set passwords and expiration dates Users can then quickly save masked video as clips or project files via the IDIS Clip Player which, crucially, preserves the integrity of the footage. Importantly, masking can be easily removed later by the authorized user, should that become necessary in the course of an investigation or proceeding. Users also have options to set passwords and expiration dates, and to control who can access and play video files. The integrity of recorded video is assured throughout this process with IDIS Chained Fingerprint technology, which extracts distinctive features of recorded video data to create fingerprints for each frame and then embeds each fingerprint into the data of the next frame, connecting each frame together with the next like a blockchain.
SV3, the cloud-based visitor, vehicle and vendor management system from Building Intelligence, has received SAFETY Act Certification, the highest level of accreditation awarded by the U.S. Department of Homeland Security for anti-terrorism technologies, making it the only visitor and vehicle management solution to achieve this level of federal recognition. “By using technology to secure loading docks and parking garages, as well as providing a smart method for managing vehicle access to secure areas, the SV3 platform from Building Intelligence enables the protection of people and property – the very core of DHS' mission,” said the Hon. Dr. Thomas A. Cellucci, former and first Chief Commercialization Officer of the Executive Branch of the United States. Qualified Anti-Terrorism Technology Specifically, all three major components of SV3, the visitor, vehicle and vendor modules, have been awarded the SAFETYAct certification status as a Qualified Anti-Terrorism Technology (QATT). The certification is valid until April 2020 when it will be eligible for renewal and is retroactive for sales as early as 2015. “Meeting the standards for certification under the SAFETY Act is a demanding and challenging process that not all companies are capable of achieving and requires specific demonstration of how vendors develop and maintain their technology to achieve SAFETY Act Certification,” said Akmal Ali, principal at Catalyst Partners and a former Deputy Director of the DHS Office of SAFETY Act Implementation. “SV3 not only helps fulfill that mission, but also plays an important part in assisting venue operators in their own pursuit of SAFETY Act, which is important to our country's mission of creating a stronger public-private partnership in the fight against terrorism.” Downstream liability protections "This is a major validation of our SV3 technology and our effort and commitment to our clients and business partners," said Jeffrey C. Friedman, CEO of Building Intelligence. "The SAFETY Act Certification, the highest-quality standards available, assures our current and future clients that they are able to downstream liability protections in the event of a terrorist attack.”
Senstar, a provider of video management systems (VMS) and perimeter intrusion detection systems (PIDS), is pleased to announce its products were recently selected to protect five airports in various locations around the world. These sites join the list of hundreds of civilian and military airports currently using Senstar products. “Airport infrastructure and assets represent a vital economic engine for many cities and countries making them prime targets for vandals, thieves and terrorists,” said Senior Vice President and Chief Operating Officer Jeremy Weese. “Senstar products help to keep operations, goods and people safe and moving.” Improve security monitoring Senstar’s VMS, video analytics, and associated hardware reduce operator workload and improve overall security monitoring by automatically detecting persons of interest, items left in public spaces, crowd formations, and wrong way movement between landside-airside egress points. These technologies also streamline operations and centralize IT management in the cloud, saving time and money. While Senstar VMS and PIDS are open platforms designed for integration with a wide variety of systems" Senstar’s PIDS provide early warning of unauthorized entry onto airport grounds, including into sensitive areas within the apron such as aircraft parking, fuel storage, electrical substations, and navigation/communication equipment areas. “While Senstar VMS and PIDS are open platforms designed for integration with a wide variety of systems, they work even better together,” said Mr. Weese. Perimeter intrusion attempt Built-in integration enables security personnel to monitor a wide range of sensors and cameras from a single workstation, with the end result being simplified operator interfaces and reduced response times. For a real world demonstration on the benefits of integrated VMS and PIDS solutions, watch Senstar’s surveillance video of a recent perimeter intrusion attempt. The new airport projects use the following Senstar products: Symphony VMS (manages 250 cameras), Enterprise Manager software (centralized cloud management), Thin Client network video display appliances, Face Recognition, Automatic License Plate Recognition, Left and Removed Item Detection, Outdoor People and Vehicle Tracker analytics, FiberPatrol® fiber optic fence-mounted intrusion detection system, and OmniTrax® buried cable intrusion detection system.
Farpointe Data, the access control industry's OEM for RFID credentials and readers, announces that its Conekt mobile smart phone access control identification solution now integrates advantages that Apple iOS 12 delivers, such as 3-D touch, Widget and Auto-Unlock, into the Conekt Wallet App, version 1.1.0. All new improvements create increased user convenience. “These improved Wallet App features let access control system manufacturers, integrators and dealers provide their customers with the simplest to use mobile access credentials in the market,” explains Scott Lindley, general manager of Farpointe Data. Mobile Access Control “Our Conekt solution provides the easiest way to distribute mobile credentials with features that include allowing the user to register only once and requires only the handset's phone number. We need no portal accounts or activation features. By removing these and additional information disclosures, we've also addressed privacy concerns that have been slowing adoption of this technology.” The newly improved Widget lets the user make up to three mobile access control credentials as widgets For instance, the newly improved Widget lets the user make up to three mobile access control credentials as widgets. This saves time by allowing quicker access to credentials supporting divergent building systems such as payroll, parking and cafeteria systems, directly from the smartphone's home screen. Biometric Defences With 3-D Touch, a new pressure-sensitive feature, the user simply pushes on the Wallet App to select from up to three of the most commonly used mobile credentials. Each user can choose their own combination. For example, a delivery driver may gain entrance to the van parking area while the vice president gets access to the boardroom. Lastly, Auto-Unlock lets a user select a MAC as their favorite. Once designated, a little star appears in the upper right corner of the mobile access credential. As the favorite, it is transmitted immediately whenever the Wallet App is selected. All new Wallet App features are available immediately and will continue to operate securely behind the smart phone's PIN code and biometric defences.
Artificial intelligence allows machines to do jobs previously done by people. When it comes to security and surveillance, this technology allows cameras and control room equipment to identify a wide range of threats automatically and in real time across hundreds or even thousands of cameras – allowing security teams to take immediate action to protect people and assets. AI Technology And Surveillance Solutions Artificial Intelligence technology built into surveillance solutions help organizations optimize their security Video surveillance cameras are the electronic eyes of any security operation. In the past, human supervision was needed to make sense of the images captured, and to assess whether certain events posed a security risk or not. With some organizations using hundreds or even thousands of cameras to protect their people and assets, manual review of footage is simply impossible – potentially leaving them vulnerable to security breaches. Advanced Artificial Intelligence technology built into surveillance solutions can help organizations overcome this challenge and optimize their security. This means cameras, control-room equipment and back-end infrastructure can now ‘learn’ about potential threats for themselves by recognizing people, vehicles and even behaviors. Detection And Prevention The manual interventions needed with traditional security systems mean that teams were frequently reacting to breaches that had already happened. Artificial intelligence changes all this by recognizing potential threats before they impact company’s people or assets – allowing security teams to react immediately to neutralise any potential threat. Artificial intelligence solutions can automatically trigger alerts when a person appears in a restricted area For example, artificial Intelligence solutions can automatically trigger alerts when a person appears in a restricted area, or when a vehicle with a blacklisted number plate enters a site. With alerts delivered in real time, teams can identify and react to security threats and protect people and assets more effectively. And because alerts are automated, potential threats are hardly missed or overlooked. How Does Artificial Intelligence Work? Artificial intelligence systems become more intelligent over time, building databases of potential threats and reacting to new events accordingly. This allows systems to ‘think for themselves’ and to alert teams of any suspicious events or people who are caught on camera. Artificial intelligence technologies use advanced algorithms based on Deep Learning to distinguish between different kinds of security events and threats. Technologies incorporated into the Hikvision portfolio include: Facial recognition which allows law enforcement personnel to identify suspects and commercial teams to identify VIP customers in real time. Vehicle identification which can be used to identify vehicle number plates and recognize different types of vehicles (even down to make and model), or to trigger alerts when vehicles enter restricted areas. Perimeter protection which helps organizations to identify real threats by distinguishing people and vehicles from other moving objects and keeping false alarms to a minimum. Business intelligence which employs people counting, queue detection, and heat mapping technologies, so that organizations can enhance operational efficiency by making use of the data report. Increasing Commercial Success Artificial intelligence isn’t just useful for identifying security threats – although this is a key strength of the technology. It can also help organizations increase their competitiveness and commercial success. For example, VIP customers who opt to participate in special marketing promotions or other incentives can be identified so staff can provide the right kind of service at the right time. This gives organizations the opportunity to personalize the service experience, foster loyalty and maximize customer lifetime revenues. Artificial Intelligence can help organizations to better understand customers and meet their needs more effectively In the same way, artificial Intelligence can help organizations to better understand customers and meet their needs more effectively – leading to more commercial opportunities. One feature – called People Counting – allows stores and commercial centers to map footfall at peak times, ensuring that staffing is optimized to meet demand. At the same time, stores can see which areas of the building customers visit most and adjust their merchandising and product positioning accordingly to maximize the sales opportunities. Artificial Intelligence At Hikvision Hikvision’s family of artificial intelligence products include the DeepinView network cameras and DeepinMind NVRs. The products help to tackle security with facial recognition; monitoring and counting of people; and recognition and detection of vehicles, to name a few. These features all depend on artificial intelligence technology to recognize, classify and respond to security threats. This article was written by Hikvision.
Public spaces in cities and suburbs are important places for community development and promoting outdoor recreation. These areas may include main streets, parks, promenades, band shells and fields. Such locations are often utilized by public event planners for community activities, including summer festivals, wintertime ice skating rink installations, music concerts and art fairs. As the year drew to a close, holiday and Christmas markets as well as major New Year’s Eve events, presented cities with constant public event security needs. The public nature of these events increases risks of incidents with high-speed vehicles that put attendees in danger. Fortunately, there are three ways for public space managers to prevent casualty-causing collisions and further promote the use of local public areas. Developing An Effective Action Plan When strategizing how to react to an alert, think about what time of the year and time of day the event is occurring It is important to have a plan developed before an incident or accident occurs. Warning systems, utilizing doppler radar and digital loop technologies, alert guards to abnormal vehicle velocity changes in the surrounding area. Managers of public areas should organize a meeting with public safety authorities and local agencies to discuss what must immediately occur when a high-speed vehicle is approaching a public event. When strategizing how to react to an alert, think about what time of the year and time of day the event is occurring. Having such a reaction plan in place combines technology and strategic planning to ensure everyone is on the same page to effectively target a threat and promote overall event safety. Securing Public Areas Ideally, there will be no need to implement a well-conceived action plan. After all, taking preventive measures to secure public areas where events take place is important to keep people safe from accidental vehicle collisions and intentional attacks. Protect attendees by clearly separating pedestrian and vehicle locations using security devices such as – Barricades Portable barriers Bollards Install Guard Booths Avoid the risk of vandalism and theft, making sure people are safe when walking back to the cars at night by keeping parking areas illuminated with flood lights. Install guard booths with employees who monitor activity in the parking area and who are prepared to react if an alert is triggered. Furthermore, prevent accidental collisions by clearly marking the parking area with informative warning signs and using barricades to direct traffic. These three tips can be used by public area managers to promote security at the next community event. Additionally, the technologies used to secure an event can also be used as infrastructure for year-round security. Installing gates that shut when the public space is closed or using aesthetically pleasing bollards are steps any public area manager can take to promote community safety.
In my coverage of China Tariffs impacting the security industry over four recent articles, products on the tariff schedules routinely integrated into security solutions included burglar and fire alarm control and transmission panels, video surveillance lenses, HDTV cameras used for broadcast use cases and fiber optic media converters. The general ‘callout’ of ADP (Automatic Data Processing) devices and peripherals technically includes servers, workstations and microcomputers, all of which are commonly used to support security solutions. The underperformance, from June 15 to August 24, of U.S. stocks with high revenue-exposure to China, and that of Chinese stocks with high revenue-exposure to the United States was significant and almost identical at 3.2%, significant losses to some investors already involved in security industry M&A activity. Significant Public Safety Facial Recognition (FR) vendors leveraging AI expanded their market focus to retail and public safety While it was not apparent that practitioners’ security program budgets kept pace with the growth of the more popular solution providers like video surveillance and cyber security, the ICT industries supporting the security economy continued to expand, especially in wireless and wired infrastructure, including preparations for 5G wireless rollouts. These omnipresent technologies drove significant public safety, smart city and public venue projects in 2018. Facial Recognition (FR) vendors leveraging AI expanded their market focus to retail and public safety. In 2018, virtually every public presentation, webinar and published Q&A on social media monitoring and facial recognition technologies I worked on, involved significant pushback from privacy advocates, almost to the point of alarmism. Massive Risk Reduction Several solution providers in these areas have made significant strides on data protection, accuracy, powered by AI and documented crime reduction cases; however, this real news is quickly shadowed by privacy advocates, seemingly ignoring massive risk reduction, especially in the case of active assailants and gang-related crime. Will FR become mainstream? The cautious security industry may take a cue from the maverick retail industry, sports venue and VIP verification solution providers that grew in 2018. 2019 trends: presupposition or repudiation; winners and losers. Chinese tariffs have had a huge impact on the security industry, which can be seen from changes to U.S and Chinese stocks Although technology adoption forecasting is inexact, there are definitive opportunities in the security industry born on necessity. With the widespread problem of false alarm transmission and inability for first responders to ‘be everywhere,’ developers of solutions that provide automated verification and alternative security incident detection are expected to become mainstream. Promising Detection Systems The use of AI, NLP, LiDAR, UAS (Unmanned Aerial Vehicles aka drones) with surveillance and thermal imaging will grow, mostly due to higher acceptance in other industries like autonomous vehicles, rail safety, terrain and post devastation mapping/rescue. However, legacy ‘listing’ or certification organizations will be forced to make an important decision for their own survival: work toward integrating these promising detection systems into acceptance by insurance, licensing and standards development organizations. 2019’s ‘true’ Industrial Philanthropists will be needed to fund early warning tech for firefighters and the presence of active assailants 2019’s ‘true’ industrial philanthropists will be needed to fund early warning tech for firefighters and the presence of active assailants. For these use cases, 5G infrastructure rollouts, FR acceptance, lower cost perimeter detection and long range object and fire recognition by LiDAR and Thermal imaging will all be watched closely by investors. Should public agencies and philanthropical solution providers in the security industry cross paths, we may just yet see a successful, lifesaving impact. Cyber Risk Profile The ‘Digital twin’ refers to a digital replica of physical assets (physical twin), processes, people, places, systems and devices that can be used for various purposes. Your ‘Security Digital Twin’ has a similar physical and cyber risk profile, either through common threats, similar assets or both. Good news: managing your risk, protecting assets and securing your facilities in 2019 will get easier as security digital twin profiles will grow in maturity, while keeping their data sources private. This will be accelerated by the maturity of AI-based, auto-generated visualizations and image recognition, that happens to also drive the FR solutions. The 5G wireless infrastructure market is emerging as far more of a quantum leap in connectivity, like ‘wireless fiber optics’ performance, than an upgrade to 4G LTE. The 5G infrastructure market will be worth $2.86 billion by 2020 and $33.72 billion by 2026, growing at a compound annual growth rate (CAGR) of 50.9%. Intelligent Applications The explosion of ingested voice, video, and meta-data, the interconnectivity of devices, people and places, and the integration of intelligent applications into expanding ecosystems all require faster communications. To be more accurate, 5G rollouts will accelerate in 2019; however, current project funding will include and be impacted by future enterprise security connectivity: 5G and FWA (Fixed Wireless Access). 5G rollouts will accelerate in 2019; however, current project funding will include and be impacted by future enterprise security connectivity Quite simply put, larger solution providers are gently coaxing practitioners into seemingly ‘open systems;’ the negative discovery during an M&A process, audit or integration with a smart city’s public/private partnerships will continue to be revealed, and related industries will force reform. Autonomous things will be enabled by AI and image recognition. With few affordable rollouts of security robots and outdoor unmanned ground vehicles (UGV) that leveraged platforms popular with research and even NASA, the autonomous security robot was mostly MIA from a security practitioner’s program in 2018. Perimeter Intrusion Detection One platform was even accused of intimidating homeless people in a public place, at a major city. Industries mutually beneficial are often unaware of each other; this will change gradually: one major domestic airport is currently evaluating a UGV platform performing perimeter intrusion detection, runway weather conditions and potential aircraft taxiing dangers. The platform is being used largely in transportation research, yet offers significant opportunities to the security industry. Research firm Gartner estimates that 70% of today’s technology products and services can be enhanced with ‘multi-experience’-based VR/AR/MR The ‘immersive experience’ of virtually any security or threat detection is a twist on virtual/augmented/mixed reality (VR/AR/MR) with additional sensory features. Although VR/AR/MR is well underway in other industries, there are several companies with solutions like VR-based active assailant training that could provide a fighting chance for practitioners, employees, visitors, faculty and children. Research firm Gartner estimates that 70% of today’s technology products and services can be enhanced with ‘multi-experience’-based VR/AR/MR. Security Ecosystem Members Not necessarily MIA, but of special mention is the need of security and safety practitioners to prioritize communications systems over ‘nice to have’ expansive video surveillance systems for mass casualty threats. This will eventually improve with 5G for Enterprise solution rollouts. At the past GSX and upcoming CES Technology trade shows, a new roundup of technologies is discovered: a wider diversity of protection promise to save ASIS members on their technical security program is realized. With each of the ‘winners,’ (5G, AI, NLP, LiDAR, UAS [Unmanned Aerial Vehicles aka drones], thermal imaging, digital security twins and smart-city-friendly technologies) it is both exciting and challenging work for both security practitioners and solution providers. All things equal and with the necessary technology acceptance testing processes, this is a truly great time for security ecosystem members.
An area of technology that is shifting how we interact with our cities is the Internet of Things (IoT). The IoT already accounts for swathes of technology and devices operating in the background. However, we’re increasingly seeing these come to the forefront of everyday life, as data becomes critical. The decisions that this critical data is attached to must be made quickly. A living, breathing city must constantly be monitoring, assessing and utilizing data in order to ensure it keeps people safe and mobile. Delivering exciting opportunities Much like the arrival of Uber and Airbnb, the Internet of Things will deliver exciting opportunitiesThe search for an answer to the challenges of growing human urbanization is believed to exist in the smarter application of new technologies. Where once, electricity and the arrival of the elevator gave us vertical cities, today, we have the promise of the Internet of Things, Artificial Intelligence (AI), Big Data, micro-controllers (MEMS) and new materials to help manage a very crowded future. Data capture form to appear here! We are confronted with a perfect storm of risk factors and potential vulnerabilities as each of these connection points is potentially a source for a security breach. Much like the arrival of Uber and Airbnb, the Internet of Things will deliver exciting opportunities and new kinds of services, many of which we have yet to imagine. Priority control solutions However, there will be equally unimagined and unintended consequences, if only because, in highly complex systems with many connected and tightly linked elements, accidents are inevitable. “The journey to a smart city is incremental—you can’t flip a switch or force it. It requires complex integration and relentless innovation,” says Global Traffic Technologies (GTT) product manager Chad Mack. GTT provides priority control solutions that use analytics GTT provides priority control solutions that use analytics, cloud-based computing to link connected devices to improve mobility, public safety and transportation in cities around the world. GTT’s Opticom Priority Control mobility solution allows transit and public safety vehicles to request a green light at intersections, dramatically reducing the potential for intersection crashes and improving travel times and reliability. Increased connectivity “These intelligent priority management systems allow users to oversee and control the movement of vehicles that operate on a city’s streets,” Mack explained. The rise of urban centers and ‘Smart City’ initiatives enabled by big data, network of sensors and the Internet of Things bring a new set of challenges to future policing. There is now a growing consensus that technology transformation must be part of the overall solution While digital technologies have helped compress the reaction time of police all over the world, the increased connectivity can similarly be leveraged by criminals to carry out increasingly sophisticated crimes. There is now a growing consensus that technology transformation must be part of the overall solution. To keep cities and citizens safe, law enforcement must be armed with the right technology, tools, and processes to solve – or even prevent – the toughest crimes at faster rates. Proven criminal theories Many law enforcement agencies such as LAPD, Seattle and Florida Police Departments are using cutting-edge cloud-based crime prediction software to predict drug crime, gang crime, anti-social behavior and gun violence. Such crime prediction software works by analyzing data through a sophisticated algorithm that applies proven criminal theories to predict the top 10 to 20 spots where crime is most likely to occur over the next few hours. To do so, it leverages on a variety of factors, such as historical and recent crime data, real-time activity, weather forecasts, locations and other information. Once these ‘hot spots’ are identified, police officers can adapt their patrol schedule and frequency at these locations, making their presence felt in the area and thereby prevent crime from taking place.
Whether it is video analytic platforms to monitor traffic patterns or cameras deployed to help law enforcement ensure public safety, many cities are looking at advancements in video technology. Upgrade costs and technology compatibility issues are often front-and-center when it comes to blending new technology with existing infrastructure. For example, if the city law enforcement officials want to improve video camera image quality, which can improve the evidentiary value of footage in prosecutions, they may look at newer HD or IP-based video systems. Upgrading to a hybrid DVR system Applications include perimeter monitoring, public parking, city transportation, square/town safetyTo stretch a tight budget, a migration plan to an IP-based camera system could be phased in over time by centering the upgrade on a new hybrid DVR system. This way, both existing analog and newer IP-based cameras can be hooked into the system. For example, Hikvision’s Smart City Solutions include systems for government services, transportation and traffic management, or any combinations of these. Applications include perimeter monitoring, public parking, city transportation, square/town safety and temporary surveillance. Data capture form to appear here! Heart of City strategy Dahua Technology, a video-centric smart IoT solution and service provider, has introduced its ‘Heart of City (HOC)’ strategy, which is in line with the top-level design experience from hundreds of city projects. The strategy is based on the maturity of five technologies – artificial intelligence (AI), big data, cloud computing, IoT and 5G. The combination will enable the evolution of smart city 3.0 and bring great changes to our life, according to Dahua. A 300-plus camera city center video surveillance scheme in the UK city of Lincoln has been installed and commissioned using Dahua's cameras, monitors and switching equipment A 300-plus camera city center video surveillance scheme in the UK city of Lincoln has been installed and commissioned using cameras, monitors and switching equipment from Dahua Technology. The design of the new all-wireless encrypted system was based around delivering flexible technology, reducing the total cost of ownership, ease of installation, lower maintenance requirements, smart edge analytics and remote connectivity. Future-proof radio network design Environmentally friendly aspects of the project included specifying lower-energy equipment, integrating remote support and recycling hardware wherever possible. The council employed independent consultants Lever Technology Group to help them ensure they had a robust and future-proof radio network design. The installation of the new IP full HD system and network is part of Lincoln’s smart city strategy – Vision 2020 – which seeks to drive innovation in the city and harness new technologies to improve the lives of citizens. One of the results is the provision of free Wi-Fi in the city, working alongside the Dahua cameras using the same IP wireless network. Wearables for city surveillance Wearables are another new aspect of city surveillance system. For example, FLIR Systems, Inc. has announced FLIR TruWITNESS, a wearable sensor platform designed for city-level security and public safety operations. TruWITNESS combines video, audio, location data, Internet of Things (IoT) capabilities, and cloud and management software in one solution, allowing organizations to reach a new level of situational awareness. TruWITNESS is worn on an individual’s body or mounted inside vehicles and is designed for any public safety organization that requires on-scene, real-time mobile surveillance TruWITNESS is designed for any public safety organization that requires on-scene, real-time mobile surveillance. Worn on an individual’s body or mounted inside vehicles, TruWITNESS includes visible-video, audio, global navigation satellite system (GNSS), gyroscope, accelerometer and magnetometer sensors. These sensors combine to send alerts and stream data to a central command center in real-time to ensure full situational awareness and global event handling. Featuring FLIR Neighbor Aware inter-device connectivity, TruWITNESS acts as an IoT device, triggering nearby TruWITNESS devices, fixed and motorized Pan-Tilt-Zoom (PTZ) security cameras, and other connected sensors to act upon an alarm event. TruWITNESS becomes a key component of FLIR Systems’ Video Management System, United VMS, which command centers use to manage video surveillance. United VMS combines video, audio, and other related data and makes it available for real-time situation management and forensic purposes. Video analytics for crowd monitoring Crowd monitoring video analytics solutions monitor vast areas instantly alerting police of any overcrowding areasCrowd monitoring video analytics solutions continuously monitor vast areas instantly alerting police of any overcrowding areas. Qognify’s crowd monitoring video analytics solution was successfully used during the Maratha Morcha in the city of Kolhapur, India, on October 15th, 2016. The system monitored approximately one million protestors through 165 cameras installed across city. Smart threshold alerts were streamed directly into the control room while the crowd was building up, so that action could be taken before the crowd density reached dangerous levels, alleviating crowd safety and stability. At the core of the solution is Situator, Qognify’s advanced PSIM/Situation Management solution, which manages a myriad of security systems and sensors, including Qognify’s video management solution, from a newly built state-of-the-art Command and Control Center. Security operators and officials have advanced situational awareness of what is happening in their city and where. Automated, pre-defined Standard Operating Procedures (SOPs) were designed, in the local language Marathi, for handling routine security incidents as well as disaster management, ensuring that the most effective response is initiated, and procedures are executed in a consistent manner. Maintaining law, order and safety Qognify also implemented its Safe City solution in Navi Mumbai, a planned township that was established to handle the population overflow from the overcrowded and ever-growing city of Mumbai, India. Together with CIDCO (City and Industrial Development Corporation, the agency established for managing the new city) and system integrator WIPRO, Qognify designed an integrated and holistic solution that helps Navi police to maintain law, order and safety. Qognify’s Video Management Solution controls hundreds of surveillance camerasAs a planned township, Navi Mumbai officials have the benefit of operating in a modern environment, allowing them to maximize Qognify’s Safe City solution. The Qognify Situator is an advanced Situation Management platform, and Qognify’s Video Management Solution controls the hundreds of surveillance cameras throughout the city. Role of standards in smart cities “Standards can assist in successfully deploying a comprehensive [safe cities] system with multiple technologies into a single, cohesive entity,” said Per Björkdahl, Chair of the ONVIF Steering Committee. “With the ability to integrate various sensors and data from many different devices synthesized through one interface, government officials and law enforcement are afforded a more complete picture of their city’s security.” Deployment of facial recognition technology Live video streaming within the smart and safe city’s infrastructure means video’s capabilities can go beyond simple evidence recording and evolve into a tool that allows operations teams to monitor and remediate against incidents as they are happening. Facial recognition technology can be added on to any video surveillance camera that is recording at a high quality This can be taken one step further with the deployment of facial recognition via live streaming video. Facial recognition technology can be added on to any video surveillance camera that is recording at a high enough quality to identify faces. The technology works by capturing video, streaming the live video back to a control center and matching faces against any watch lists that the control center owns. Importantly, the data of people who aren’t on watch lists is not stored by the technology. This technology can work to make the city safer in a number of ways. For example, facial recognition could spot a known drug dealer in a city center where they weren’t supposed to be, or facial recognition could identify if a group of known terror suspects were visiting the same location at the same time, and this would send an alert to the police.
Recent technology advances – from the cloud to artificial intelligence, from mobile credentials to robotics – will have a high profile at the upcoming ISC West exhibition hall. Several of these technologies were recently designated by the Security Industry Association as the Top 8 Security Technologies for Security and Public Safety. Some of them will also be a focus at the ISC West conference program, SIA Education@ISC, April 9-11 at the Sands Expo Center. This article will highlight some of those conference sessions. Topic: Cloud Systems And Video Surveillance As A Service (VSaaS) Managed Video Services are saving TD Bank $500K annually, April 9, 2:45 to 3:45 p.m. Why TD Bank decided to roll out a managed services solution, what it took to deploy and how the bank is saving an astounding $500,000 annually. IT 4.0 and Video Surveillance: A Guide to the New Terminology and What It Means to You and Your Customers, April 11, 1:15 to 2:15 p.m. How IT 4.0 can enhance or change video surveillance, and consequently deliver additional value to customers, including explanations of terms such as cloud data centers, personal clouds, the edge, IoT sensors and data analytics. One of the sessions to cover how IT 4.0 can enhance or change video surveillance, and consequently deliver additional value to customers Topic: Artificial Intelligence (AI) In Video And Other Systems The Challenges and Opportunities of AI in Physical Security, April 10, 3:45 to 4:45 p.m. Looking toward what the future may hold for AI in physical security; the challenges and opportunities the technology has created; and how participants can leverage AI and machine learning with existing customers to grow their business. Deep Learning Demystified: Next-Generation AI Applied to Video, April 11, 9:45 to 10:45 a.m. Dispelling the myths of the terms “deep learning” and “artificial intelligence,” and what the technologies can do in practical terms. Modern cameras find and identify faces and vehicles, analyse behavior and organize and control assets Neural Processing and Smart Cameras, April 9, 8:30 to 10 a.m. Deep learning-capable hardware is evolving at a frantic pace, and GPU and NPU (neural processing unit) co-processors are commonly embedded in cameras and video management systems. Modern cameras find and identify faces and vehicles, analyse behavior and organize and control assets. Analytics in the Video Central Station: Proper Deployment, Programming and Configuration to optimize operational and cost efficiencies, April 11, 3:45 to 4:45 p.m. How analytics plays a critical role in reducing alarm traffic in a central station environment, allowing them to save money and realize other operational and performance efficiencies. Topic: Robotics And Autonomous Devices Robotic Aerial Security – Growth Trends and Best Practices, April 10, 11 a.m. to noon The lion’s share of growth in the robotic aerial security sector will come from autonomous systems and changing FAA regulations will soon allow companies to monitor and secure remote facilities with no human guards present. Racing drones are difficult to detect as they do not use GPS or radio frequency signals to identify the location of other devices How to Adapt to Address Drone Security, April 11, 1:15 to 2:15 p.m. Drone industry professionals and a physical security design engineer will cover the realistic applications of drone systems and counter-drone solutions that can protect organizations and facilities. Next Generation Threat: Racing Drones, April 11, 2:30 to 3:30 p.m. Racing drones are difficult to detect as they do not use GPS or radio frequency signals to identify the location of other devices. This session will identify the potential risks these drones can pose to facilities, special events, and critical infrastructure. Establishing a Corporate Drone Program, April 10, 9:45 to 10:45 p.m. Is a corporate drone program an appropriate addition to an existing security program? How to understand and navigate the regulatory challenges and processes associated with starting up a commercial-use drone program. The Rise of Intelligence in Physical Security, April 11, 9:45 to 10:45 a.m. “Intelligence” incorporates a variety of subdomains from artificial intelligence to machine learning and contextual analysis. It is rapidly becoming a focus in the realm of IT security – and increasingly in the realm of physical security, too. Changing FAA regulations will soon allow companies to monitor and secure remote facilities with no human guards present Topic: Mobile Credentials Finding Their Place In Access Control How Biometrics Are Enabling the Convergence of Physical and Information Security, April 10, 1:45 to 2:45 p.m. At the center of convergence is one crucial building block: strong irrefutable identity powered by biometrics. Driving the Future: How Interoperability Standards in Access Control Can Enable Smart Building Success, April 9, 1:30 to 2:30 p.m. Growing user demand is driving new open platform approaches and the adoption of interoperability standards Growing user demand for unfettered and unlimited third-party integrations is now driving new open platform approaches and the adoption of interoperability standards. They are changing the dynamic of access control and its role within the smart building environment. Topic: Facial Biometrics In Professional Solutions How Biometrics Are Enabling the Convergence of Physical and Information Security, April 10, 1:45 to 2:45 p.m. Securing workstations, virtual desktops, turnstiles, front doors, mobile devices and more, biometric authentication is helping enterprises and governments worldwide to realize a more secure future. Topic: Voice Control In The Smart Home Environment Delivering the Smart Home of the Future, April 11, 3:45 to 4:45 p.m. With the proliferation of connected smart devices, including voice control devices, consumers have a growing array of options for defining what their Smart Home experience could be.
Delta Scientific, globally renowned manufacturer of counter-terrorist vehicle control systems used in the United States and internationally, has announced that its innovative DSC1000 portable barrier and TB100 portable bollard systems were rented from Australian-based Knight Brothers to help protect the 85,000 entrants in the world's largest run on 11 August. Both a fun run and a competitive contest, the City2Surf Run covers a 14 kilometers (8.7 miles) course that begins in Sydney's Central Business District (CBD) and culminates at scenic Bondi Beach. Vehicle access and control system This annual event needs a vehicle access and control system that can be deployed temporarily and quickly" "This annual event needs a vehicle access and control system that can be deployed temporarily and quickly to secure vehicle check points into the main event area for the mobilization, execution and demobilization phases," explains Matthew Knight, director of Knight Brothers Pty Ltd, Australian partner of Delta Scientific. Knight adds, "At the same time, they did not want to purchase units that would only be used once a year. For such applications, a lease plan has been created where organizations can simply lease the portable barriers and bollards, use them, pack them up and return them." DSC1000 portable barrier system "Pre-packed in a 20 foot container, the DSC1000 barrier and TB100 bollard array package was delivered to site and deployed within an hour to provide effective perimeter protection while maintaining the required pedestrian and vehicle thoroughfares into the event grounds." The DSC1000 is a self-contained unit that is stored and towed on its own trailer. Light enough to be pulled by a golf cart and set up in only 10 minutes, the DSC1000 portable barrier's crash test stopped a 2300 kg vehicle going 64 km/p, providing it with an ASTM rating of P40. With no foundation or electrical hook-up needed, two people can set up and take down the DSC1000 special event barrier. TB100 portable bollard system The patent pending crash rated TB100 portable bollard system lets security providers promptly block access to temporary venues. Individual portable bollards provide vehicle safety in applications such as heavily traveled narrow walkways and roadways or any area that a vehicle can get through. Certified testing demonstrates that a TB100 portable bollard system will stop and disable a 6,804 kg vehicle traveling at 48 kph, resulting in an ASTM M30, P3 rating. A single TB100 bollard absorbs 400,000 foot pounds of kinetic energy.
People and vehicle access control specialist, Nortech offers a number of products within the Nedap product range that use vehicle tagging to identify individual vehicles while they are moving through a monitoring point. uPASS Reach reader The uPASS Reach reader offers long-range vehicle identification for up to 5 meters using the latest UHF technology. With consistent reading up to 5 meters and adjustable onsite reading as just two of the benefits of the system, the uPASS Reach reader has an elegant slim design, LED and audible read indication and is encased in weatherproof housing. It also operates with passive UHF tags, self-adhesive widescreen tags and hand-held tags with dual-technology options. Long-range passive UHF tags The reader output allows the access control system to open the gate/barrier when an authorized vehicle arrives When the uPASS Reach reader is installed (maximum height two meters) next to an automatic gate or barrier, long-range passive UHF tags are identified at a distance of up to 5 meters as soon as they are visible in direct line of sight of the reader. The reader output allows the access control system to open the gate/barrier when an authorized vehicle arrives without the need for the driver to present a card or badge, and the built-in high intensity LED provides the user visual feedback that the tag has been read. UHF tags are also both battery and maintenance-free. UHF Windshield Tag To work alongside the uPASS Reach, Nedap has designed four different UHF tags to suit all environments. The UHF Windshield Tag is a passive UHF transponder and offers long range identification up to 5 meters when installed inside non metallized windscreens. This provides cost-effective long range vehicle identification for access control applications and is available as a standard peel off version or as a tamperproof version for additional security. Passive UHF Exterior Tag Where vehicle windscreens are fully metallized, Nedap offers a passive UHF Exterior Tag which can be easily fitted onto non-metallic / plastic parts of the vehicle such as the headlights. For added security, the UHF Exterior Tag is a tamper resistant, transparent, adhesive tag. It will show visual proof of removal and is extremely difficult to remove, intact and functional. The chip inside is also protected against harmful UV rays. UHF Heavy Duty Tag This tag features a rugged design for long term use in outdoor and industrial environmentsThe Nedap UHF Heavy Duty Tag is a passive UHF transponder which again offers long-range identification up to 5 meters with the uPASS Reach. However, this tag features a rugged design for long term use in outdoor and industrial environments. The UHF Heavy Duty Tag is a cost-effective solution for installations where the tag needs to be mounted onto the exterior of the vehicle and can also be cable tied or bolted onto bicycles, forklifts and many other industrial devices. Finally, the UHF ISO Combi Card is a card featured with long-range UHF tag and proximity or smartcard technology. Used for both people and vehicle access, it enables the use of one card for both vehicle and building access applications. Available with a range of formats such as Mifare, Legic and HID. Efficient vehicle identification reader The uPASS Reach reader complies with the ISO18000-6C and EPC global Gen 2 directive. This long-range vehicle identification reader is based on latest passive UHF technology. It is used in combination with battery free UHF (EPC Gen 2) tags, making this access control solution totally cost efficient. The uPASS Reach is ideal for convenient vehicle access to public car parks, private-run parking spaces and lots, gated communities and staff parking areas in corporate offices and government buildings.
Over 1,600 Wisenet cameras manufactured by Hanwha Techwin have been installed at Asia’s largest mega hub terminal in order to help operators monitor the movement of parcels and vehicles, as well as keep employees and visitors safe. With its nine decades of endless innovation, Korea’s logistics service provider, CJ Logistics, is leaping forward to become a pioneer by expanding its global networks to over 94 locations and entering the Thailand, Malaysia, China and Philippines markets. Video surveillance solution In June 2018, CJ Logistics opened Asia’s largest mega hub terminal in Gonjiam, Gyeonggi-do, South Korea. The terminal, which comprises two buildings with four floors above ground and two underground, occupies approximately 300,000sq meters, almost the size of 40 football stadiums. The total length of the facility’s conveyor belts is almost 43km, long as a full-course marathon The total length of the facility’s conveyor belts is almost 43km, which is as long as a full-course marathon. The terminal also has a state-of-the-art automation system, the first of its kind in Korea, which has increased the company’s daily handling capacity to 1.72 million parcels, four times higher than its competitors. CJ Logistics looked for a top-notch video surveillance solution which could match the terminal’s grand scale and the technically advanced automated facilities. Providing periphery monitoring After testing cameras from different manufacturers in the market, CJ Logistics chose Hanwha Techwin as its supply partner and have subsequently installed around 1,660 Wisenet cameras throughout the terminal. Wisenet X series IR PTZ cameras have been installed along the building exteriors, providing periphery monitoring 24/7 and auto tracking that enables precise monitoring across long distances, while IR illumination provides visibility even at night. Inside the buildings, around 1,400 Hanwha Techwin’s Wisenet Q series cameras were installed on the terminal’s ceilings and walls. The cameras are able to help detect any problems occurring to the automated conveyor systems which have a constant flow of parcels on them. They also oversee the movement of over 1,500 vehicles in and around the terminal and help create a safe working environment. Highly accurate recognition Wisenet X series bullet cameras, running license plate recognition (ANPR) software onboard, have been installed at the main gate of the terminal to enhance security at the entrances and exits, providing highly accurate recognition of license plates. These cameras enable effective vehicle monitoring within the terminal where cargo moves in and out around the clock, and are particularly useful in monitoring the main entrance. Both camera types are equipped with 12x optical zoom and 150dB WDR Wisenet X series bullet and PTZ cameras have been installed at indoor staircases and corridors of the office building. Both camera types are equipped with 12x optical zoom and the World’s best 150dB Wide Dynamic Range (WDR) which ensures clear images are captured from scenes that contain a challenging mix of bright and dark areas, normally causing overexposed or underexposed images. Intelligent video analytics As part of the Wisenet X series, these cameras feature intelligent video analytics and offer movement, loitering and intrusion detection. They are also equipped with audio analysis functionality which recognizes critical sounds such as gunshots, explosions, screams and broken glass. “Thanks to the Hanwha Techwin’s Wisenet security solution, we were able to build a safe video surveillance system that can match the size and the cutting edge facilities of Asia’s largest logistics terminal,” said an official at CJ Logistics. “Now we can safeguard every corner of our terminal including vehicles, parcels, and personnel, not to mention indoor and outdoor spaces.”
It is one of Moscow’s most ambitious building projects: the VTB Arena Park was built on the site of the old Dynamo Stadium and revitalizes the entire surrounding area with a multi-purpose concept. At an estimated cost of US$ 1.5 billion, the modern VTB Arena Park combines sports, entertainment, commercial and residential facilities. A first challenge arises from the sheer size of the project: The football stadium, known as Dynamo Central Stadium and home to FC Dynamo Moscow football club, hosts league matches with a capacity of over 26,000 spectators. The park’s indoor arena holds more than 12,000 guests during ice hockey matches, basketball games and rock concerts, while the 300,000 square-meter park area also offers retail facilities, a five-star hotel and 1,600-car parking garage. Protecting residential areas Considering the wide range of very different purposes served by these various buildings, it was clear from the project’s inception that a multitude of vendors and providers would be needed to cover all security needs. VTB Arena Park was looking for a partner able to tackle that key challenge From the security manager’s perspective, the main challenge was to ensure that these disparate systems would function together and allowed for central management of a wide array of functions such as: access control for tens of thousands of football fans entering the stadium on match days, monitoring the vast perimeter with its park zones, and protecting residential areas against intrusion. VTB Arena Park was looking for a partner able to tackle that key challenge – integration of all parts into one platform – and chose Bosch as its provider of end-to-end video security and access control. Intelligent video analytics Aside from the project’s complex technical ramifications, there was a particular system design challenge: Residents of the Arena Park should feel at home enjoying the highest quality of living, while the area also needs to accommodate for the influx of thousands of visitors within short periods. As the Bosch experts learned, the multi-purpose character of VTB Park leads to an equally wide range of different security needs among its users. Catering to the video security needs, Bosch installed a total of more than 2,000 video cameras, fixed as well as moving cameras, both indoors and outdoors, to safeguard the vast perimeter of the Arena Park premises and secure the homes and offices. One of the camera types installed for perimeter protection is the AUTODOME IP starlight 7000 HD. This high-definition camera offers excellent low-light performance thanks to starlight technology and also features built-in Intelligent video analytics. Access control systems The video analytics function automatically detects deviations from standard moving patterns The video analytics function automatically detects deviations from standard moving patterns, like a person entering a restricted area, and triggers an alarm that is sent to the control rooms where security staff can then zoom into a scene for closer investigation. As required by VTB Arena, all 2,000 cameras and connected video storage on Bosch recording units are managed centrally via the Bosch Video Management System (BVMS). Another particular challenge consisted of aligning the three different access control systems of the stadium running at the same time. The ticketing system is the first layer of access control, managing the turnstiles that permit entry of thousands of visitors during events with paper tickets. This access control system needed to integrate with the employee access control system that relies on proximity cards (the Access Engine provided by Bosch), as well as a third, offline access control system used at specific stadium facilities. Integrated security system As the Bosch experts in Moscow found out, such an integration was without historic precedent. Because no standard solution existed, the team devised a highly customized set-up managed centrally on the Building Integration System (BIS) from Bosch. “We were fully aware that the multifunctional character of the VTB Arena Park would lead to complexity that could hardly be topped. We needed integration power, a partner who knew how to bind all loose ends into one solution that had never existed before. Creating this one integrated security system catering to all the various purposes has made Bosch our main security partner,” said Alexander Kravchenkov, Deputy Head of Security Systems Maintenance Group IT Department at VTB Arena.
Wintec (The Waikato Institute of Technology), established in 1924 is a major New Zealand Government-funded tertiary institution, which has three Hamilton campuses; a city site overlooking the central business district, Avalon campus on the northern outskirts of the city, and a horticultural campus at Hamilton Gardens. In addition, it has regional operations at Te Kuiti and Thames and also an office in Beijing. The Avalon campus, a ten-minute drive from the city, is home to specialist trades training facilities, a state-of the-art sport and exercise complex and custom designed facilities for the School of International Tourism, Hospitality and Events. The third Hamilton campus, the Horticultural Education Centre, is situated amidst the 58 hectares of Hamilton Gardens. On-Line distance education Wintec’s programs and qualifications are nationally and internationally recognized Wintec is one of the largest institutes of technology in New Zealand, and has more than 35,000 full-time and part-time students, more than 500 full and part time staff and eleven schools within its academic faculty. International enrolments exceed 1000 from 47 countries. A range of student services provide its domestic and international students with a high level of support so they enjoy a positive, safe and secure study experience. Wintec’s programs and qualifications are nationally and internationally recognized and its degrees have equal status to those from universities. The degree programs include Media Arts, Midwifery, Nursing, Occupational Therapy, Early Childhood Education, Business Studies, Engineering, Technology, Information Technology, and Sport and Exercise Science and a wide range of full and part time courses for those already in the workforce. Wintec is also recognized nationally in the delivery of on-line distance education for those unable to attend regular classes for reasons of geographical access or other constraints. Electronically controlled doors Wintec strives for a balance of unobtrusive yet robust control of site activity, essential for maintaining an open campus environment. Shane Goodall, Security Manager at Wintec, describes the approach to security as highly proactive and collaborative: “by focusing on preventing issues arising, we now have a minimal policing role and the crime resolution rate is high”. This environment is underpinned by Gallagher’s security system, a core access control, intruder alarms and integration platform. Wintec first installed the Gallagher system (formerly Cardax FT) in 1999 and has since migrated this legacy system to Gallagher’s latest security technology platform. Security for the entire organization, including satellite sites, is managed and monitored centrally from Wintec’s single Gallagher security system. Since initial installation, Wintec’s Gallagher access control system has grown from 7 to 240 electronically controlled doors in 2009, with another 40 planned - testimony to the scalability and flexibility of the system. Network friendly system communications The organization first installed 6 cameras in 2004 which has increased to 7 DVRs and 85 cameras Wintec has integrated its imaging system to the Gallagher system delivering a visual record which can be matched to the audit trail of events in Gallagher Command Centre software. The organization first installed 6 cameras in 2004 which has increased to 7 DVRs and 85 cameras (both analog and IP). Another compelling aspect of the system for Wintec is the scalability and TCP/IP network friendly system communications. As well as monitoring and controlling staff and student access, equipment including computers, TVs, printers, audio visual resources at Wintec are also monitored through the Gallagher system. The ‘Gallagher Hub’, a new computer laboratory offering comprehensive IT resources is open 24 hours. The Hub contains 125 workstations, and there are plans to extend that number. Active monitoring of equipment though the Gallagher system has significantly reduced theft. Students and staff have scheduled access to shared IT resources, classrooms and lecture theatres. Manage cardholder data ‘Cardholder Import’, an XML Interface, supports the importation of cardholder data including course enrolments from their student record system to Gallagher Command Centre. Shane comments, “Student card issuing is an automated process which is enrollment-driven – a student’s access privileges are assigned according to their enrolled courses.” “To implement this, we defined a rules-based allocation of access groups in the Gallagher system using the XML interface. The interface is ‘live’ so that changes in the student enrolments database are immediately reflected in the Gallagher system. The student’s updated access privileges come into effect without delay.” Staff that interact directly with students are now empowered to manage cardholder data enabling the security team to focus on security. Students and staff utilize Mifare SmartCard functionality extensively, embracing them as an integral multiapplication tool in their modern educational environment – SmartCards are used to issue resources from the library and as pre-stored value cards enabling prepaid printing and photocopying. In the near future they will also be used in Wintec’s Pay and Display car-park and potentially as passes onto city council buses. Electronic access control At Wintec, security is not viewed as a discrete functional activity relegated to security staff only Stewart Brougham, Director of Internationalisation at Wintec, says students have given very positive feedback about their ID cards. In particular, the ability to verify the identity of staff members from their ID access cards provides peace of mind for students. The end result is a people-friendly campus. Future enhancements of Wintec’s security may include the utilization of the CommCard solution from Gallagher to manage and monitor access to student accommodation. CommCard is a unique high level integration between the Gallagher Command Centre software and Salto off-line readers, delivering offline, non-monitored electronic access control for lower security doors. An overriding philosophy of collaboration has seen Wintec take a lateral approach to security, the value of which many organizations have yet to realize. At Wintec, security is not viewed as a discrete functional activity relegated to security staff only. The ongoing management of security is a joint effort between the security services team and the information services team. Increasing operational security The security services team manages the Gallagher system while IT looks after back end functions such as installation on the network and backup. Wintec has leveraged the convergence of security (access control) and other operational business functions recognizing the tremendous potential for reducing risk and increasing operational security, safety, performance and efficiency. Looking beyond simply controlling and monitoring who goes where and when on site, Wintec is harnessing the reporting capabilities of Gallagher Command Centre to meet regulatory requirements. The Gallagher system enables the institution to report on actual space utilization (not just space booking). Decisions are made for best use, and also to substantiate funding, based on these reports. “The key to space utilization reporting are the frequency of reporting and the integrity and reliability of information,” states Stewart Brougham. It’s a national issue for educational institutes in New Zealand. Extending external partnerships “For Wintec, reporting is about ensuring compliance with regulatory requirements and is also a staff time management issue – reducing the administration load on lecturers, who would otherwise have to track student attendance manually.” Brian Fleming, Director of Gallagher Channel Partner, Concord Technologies, sites this lateral application of a security system as key to maximizing the value of Gallagher to Wintec. Wintec has a strong relationship with Gallagher in the ongoing development of its technologies This collaborative philosophy extends to proactive external partnerships with their Gallagher Channel Partner, Concord Technologies, for the installation and maintenance of the Gallagher system, and with system designer and manufacturer, Gallagher. Having signed an agreement to continue in the capacity of a Gallagher field test site, Wintec has a strong relationship with Gallagher in the ongoing development of its technologies. Wintec’s success, in the last 5 years, as a test site reflects the competence of both its IT and security staff and the institute’s commitment to edge student services. Minimal training has been required. Software maintenance agreement There is open communication and information sharing between all internal and external parties involved, which means any issues that arise can be quickly addressed. Wintec has committed to a site maintenance plan with their security partner, Concord Technologies. The plan incorporates both software and hardware maintenance to ensure the system is maintained on the latest operating platforms within a known cost structure. A Software Maintenance Agreement also ensures enhanced ongoing system performance and reliability of the Gallagher system. Acknowledgements Gallagher would like to acknowledge the support of Wintec and security partner, Concord, with the development of this in-site study. Gallagher would also like to particularly acknowledge and thank Shane Goodall for the pivotal role he plays in championing the collaboration of these parties and for his outstanding support of the Northern Region Cardax User Group (NZ) in the capacity of Chairman of the group.
There is a saying that ‘Everything is Bigger in Texas’, and the Dallas, Texas police department is no exception. The city of Dallas is ranked in the top 10 cities in the U.S. in terms of population, at 1.2 million people. The Dallas Police Department is the ninth largest municipal police force in the U.S., based on 3,012 sworn officers. It is led by Chief of Police, U. Reneé Hall. The department is located in the Jack Evans Police Headquarters building, which was built in 2003. It is 358,000 square feet, has six floors, is spread over a three-acre site, has a separate 1,200 car parking garage and a two-acre, open parking lot for additional visitor parking. Prior to 2003, the department was housed in the circa 1914 former City Hall Building. Preventing terrorist attack and hazards Police officials worked with a Police Design Consultant to help design the building to resist terrorist attacksThe Jack Evans Police Headquarters building was under construction when 9/11 terrorists flew airplanes into the World Trade Buildings in New York. That event was preceded by the Oklahoma City Murrah Federal Building bombing in April 1995. Therefore, security was a concern in its design. Police officials worked with a Police Design Consultant – McClaren, Wilson, and Lawrie Architects of Phoenix – to help design the building to resist a terrorist attack and isolate potential hazards. The building also needed to control visitor traffic and access. On an average month, there are 5,000 public visitors to the Jack Evans building. In addition, shots fired at police buildings nationally are not uncommon, says Paul M. Schuster, Senior Corporal/Facilities Management for the Dallas Police Department. Ready to anticipate dangerous crimes “For the most part they are random, single shot drive-by shootings. Often, the officers are unaware that the building has been shot at, until they find a bullet hole in the brick or glass. Increasingly, police tend to be a symbol of government and some citizens see that as a visible target to lash out at. Police officers are trained to expect the routine types of calls, such as domestic violence, traffic accidents, and other crimes. Yet they must be flexible to anticipate the non-routine that can be dangerous and change in a heartbeat.” On June 13, 2015, after midnight, a 35-year-old male placed a duffle bag with a remote-controlled bomb to detonate later between cars in the parking lot of the headquarters building. The suspect then began shooting continuously at the lobby windows. Officers responded to the scene, a vehicle chase began, and the incident ended outside the city. Luckily officers in the lobby took cover and were not injured. Conducting building security assessment The assessment included testing various construction materials for bullet resistance to various types of weaponsFollowing that incident, the Dallas Police Department conducted a security assessment of the building and also at seven patrol stations throughout the city. The assessment included testing various construction materials for bullet resistance to various types of weapons. Gensler Architects and Guidepost Solutions, LLC developed the solutions and plans. “Yesterday we were concerned about handguns, today we are worried about rifles, and the idea of terrorism is always present with outright attack or bombs,” Schuster notes. “The police officers and police staff only want a place that is safe and where they can do their good work.” Funding of $1.3 million was approved to upgrade the lobbies of the seven patrol stations to withstand rifle rounds, and $1.9 million to improve headquarters lobby security, and to upgrade an aging security system. Turner Construction Company and Convergint Technologies, LLC conducted the renovations and security technology integration. Challenges in upgrading lobby security Visitors were allowed free entry into the lobby and were only screened in an open area to the side if going to other floorsThe headquarters’ lobby was initially designed as a two-story glass-walled structure, with an information desk and public records service windows. Visitors were allowed free entry into the lobby and were only screened in an open area to the side if going to other floors. “The challenge in upgrading lobby security was the two-story lobby entrance glass. The glass was not bullet rated, due to budget constraints. Changing the front of the building to support ballistic rifle-rated glass would have caused extensive time, exposed the inside of the lobby to weather, and would not have solved all of the security issues,” Schuster says. “In addition, there were concerns about keeping an ‘open’ and friendly service concept in mind and ensuring that the lobby would not resemble a ‘fortress’,” Schuster notes. Bullet-rated glass and bullet resistant wall The solution was to keep the existing exterior unchanged and focus on adding a layer of security once a person enters the lobby. Visitors now enter the headquarters and immediately proceed to a side room where security screening is conducted. Once inside the screening room, the visitor has belongings x-rayed, and they walk through a metal detector A new secondary wall with bullet-rated glass and solid bullet resistant wall materials was constructed inside the lobby to channel visitors to the room. Once inside the screening room, which also has bullet resistant walls, the visitor has belongings x-rayed, and they walk through a metal detector. In the event that anyone was to produce a gun and begin shooting, the incident could be contained inside that room. Tourlock 180+90 security revolving door Once a visitor has been cleared, they proceed into the main lobby via a Boon Edam Tourlock 180+90 security revolving door. This automatic, four-wing door is the most advanced, security revolving door in the Boon Edam product range that offers maximum throughput, allowing users to enter and leave the building simultaneously. In the event that a large number of persons try to force their way into the facility, the Tourlock 180+90 will determine that more than one person is trying to enter and will reject the person and lock out any others from entering. Once a visitor is ready to leave the lobby and exit the building, they pass through another Boon Edam Tourlock 180+90 that leads to a vestibule with exterior swinging doors. In the event that someone tries to go back into the lobby from the front vestibule area, without going through the security screening room, the Tourlock security revolving door will reject their entry. Preventing tailgating and piggybacking The Boon Edam security revolving doors accurately prevent both tailgating and piggybackingThe Jack Evans Headquarters security upgrades for the lobby improved security and still kept the best aspects of the lobby design, including the antique police car, and the overhead police helicopter. The Boon Edam security revolving doors accurately prevent both tailgating and piggybacking, and provide the department with maximum security while controlling traffic flow. “While it would be great to have a building totally open to the public and then add security as needed, such is not the world we live in anymore,” Schuster adds. Future security plans include exterior site security upgrades to the patrol stations and the headquarters to include security fencing with card access controls for fleet and employee vehicles at each of the sites.
Round table discussion
The ability to treat patients in a secure environment is a base requirement of hospitals and other healthcare facilities. Whether facilities are large or small, security challenges abound, including perimeter security, access control of sensitive areas, video surveillance, and even a long list of cyber-risks. We asked this week’s Expert Panel Roundtable: What are the security challenges of hospitals and the healthcare industry?
ISC West 2019 is in the industry’s rear-view mirror, and what a show it was! The busy three days in April offered a preview of exciting technologies and industry trends for the coming year. We asked this week’s Expert Panel Roundtable: What was the big news at ISC West 2019?
When a big security breach occurs, the phones start ringing at security companies, or so the expectation goes. The nature of security is that it takes a security breach, or even a high-profile tragedy, to convince managers of the need for security technology. When a school shooting occurs, schools take note. When terrorism strikes a soft target, other vulnerable institutions notice. Same for hospitals and airports and even nightclubs. When an event occurs, it gets attention that could translate into business for security companies of various types. But should security companies seek to capitalize on these opportunities? We asked this week’s Expert Panel Roundtable: Is it fair game for manufacturers or marketers to leverage recent violent incidents or terrorist attacks to promote sales of security systems or products?