Manchester-Boston Regional Airport opened to serve the state of New Hampshire and the surrounding New England community in 1927, a little over two decades after the Wright brother’s first powered flight. Located three miles south of central Manchester, the Manchester-Boston Regional Airport is the fourth largest passenger and third largest cargo airport in New England. The airport is also the busiest in the state, qualifying under the Federal Aviation Administration (FAA) as a “small hub primary commercial service facility.”

Airport redevelopment project

The 1990’s brought a large redevelopment project to the airport, sparking more modern facilities, increased room for aircraft, and a range of new shops and restaurants. By 2012 it had become clear that the airport and its parking areas required enhanced surveillance. Increased foot traffic, manpower, and federal safety regulations resulted in the awarding of an FAA grant for a new surveillance system.Increased foot traffic, manpower, and federal safety regulations resulted in the awarding of an FAA grant for a new surveillance system

The Manchester-Boston Regional Airport faced a lengthy decision-making process when it came to security camera manufacturers, requiring products able to support the unique applications and varied environment of the airport. The security team monitored a range of spaces both in and outdoors, and required products that excelled under all of these varying situations and lighting conditions.

The selected cameras needed to provide full high-definition video across multiple open areas, while also delivering detailed, close-up images within busy, crowded spaces.

The airport’s FAA grant included stipulations regarding the types of products that could be purchased with the supplied funds, specifying that the selected system must qualify under the “Buy American” standard. This provision meant that all potential selections not only meet the technical requirements, but also be Made in USA.

Arecont Vision: Foundation for security system

After a year of exploring the market, the client determined that Arecont Vision was the only manufacturer that not only satisfied the “Buy American” stipulation, but did so without sacrificing the airport’s fundamental security requirements by providing a wide range of high resolution megapixel cameras.Arecont Vision was open in demonstrating its Made in USA product design, manufacturing, quality control, and support as part of the selection process

Arecont Vision was open in demonstrating its Made in USA product design, manufacturing, quality control, and support as part of the selection process.

Securadyne Systems was selected as the systems integrator. Extensive planning determined which Arecont Vision products to install, where to do so, and how the installation process would be accomplished.

Once Manchester-Boston Regional Airport chose Arecont Vision cameras as the foundation for their security system, they began to collaborate with On-Net Surveillance Systems, Inc. (OnSSI) to supply the video management system (VMS). OnSSI is an Arecont Vision Technology Partner Program member, with many joint customers around the world, demonstrating proven integration between the two company’s products and support services.

Arecont cameras chosen by airport security team

The Arecont Vision SurroundVideo® multi-sensor camera series piqued the security team’s interest for its 180° panoramic capabilities. Passengers, staff, and aircraft crew move frequently and often swiftly from one location to another in varied lighting, yet all proved trackable with the SurroundVideo cameras and the OnSSI software.

The placement of SurroundVideo cameras at the Manchester-Boston Regional Airport provides comprehensive coverage while reducing the number of cameras needed overall, a feat that was especially useful in large areas such as the airport’s apron.

Passengers, staff, and aircraft crew move frequently and often swiftly from one location to another in varied lighting, yet all proved trackable with the SurroundVideo cameras and the OnSSI software.
The security team chose cameras from the Arecont Vision MegaDome® series, which are equipped with a wide range of innovative features

For locations that required a single coverage view, the security team chose cameras from the Arecont Vision MegaDome® series, which are equipped with a wide range of innovative features. Features such as low light capabilities and remote focus and zoom all proved crucial to the airport’s requirements.

Casino Mode™ is available in the 1080p versions of the MegaDome series, a feature that proved to be as useful at the Manchester-Boston TSA checkpoints as it is in a Las Vegas casino. Casino Mode guarantees 30 frames per second to capture every detail on fast-action applications, an incredibly effective tool when investigating security situations involving many complex, small movements for both live and forensic viewing.Casino Mode guarantees 30 frames per second to capture every detail on fast-action applications for many complex, small movements in both live and forensic viewing

Investigating criminal or worker concerns

Manchester-Boston Regional Airport has installed over one hundred and fifty Arecont Vision cameras, and the video surveillance system is continuing to grow. The latest installation of Arecont Vision products included the lower level of a parking garage as well as a newly renovated passenger checkpoint area.

When asked if there are any specific incidents in which Arecont Vision cameras proved useful, Mr. Mueller responded, “Every other day we use the cameras to investigate criminal or worker concerns. We go back and monitor them for possible safety issues on the ramps, for passenger interaction, and for worker interactions. Anytime someone expresses a concern to me, they can come in and we can watch the footage together. I try to make sure that the option to view footage is fairly transparent, which has proved very useful to everyone.

"SurroundVideo 180° cameras were again utilised in the latter situation due to the client’s satisfaction with stitching together images from multiple 180°s." Paul Mueller, Manchester-Boston Regional Airport’s security manager, stated, “We were sure to go back to Arecont Vision during this process. We have had a good working relationship with them for the past five years, and they enable us to use less cameras while still maintaining full view of inspection areas.”Primary camera views are displayed and monitored all the time, while others can be pulled up and played back as issues arise

Passport and ticket inspection made easy

Arecont Vision cameras are monitored 24/7 in the airport’s communications centre. Primary views are displayed and monitored all the time, while others can be pulled up and played back as issues arise. The system also allows for particular divisions within the Manchester-Boston Regional Airport to monitor cameras that are applicable to their work, such as in the parking garage.

In terms of responsiveness, Arecont Vision makes it a top priority. “We had an issue recently with the lack of detail in some of the views for when people were having their passports and tickets inspected by TSA employees,” Paul stated, “An Arecont Vision rep came out and agreed that we could improve images, so he pulled the cameras and re-installed a newer firmware version which allowed for finer adjustments, completely and efficiently solving our problem.”

Arecont Vision prides itself in its relationship with clients such as Manchester-Boston Regional Airport and to its continued design and manufacturing of quality, innovative, and industry-leading cameras within the United States for customers to use worldwide.

Download PDF version

In case you missed it

Where is it inappropriate to install video cameras?
Where is it inappropriate to install video cameras?

Video cameras are everywhere, and hundreds more are installed every day. Our society appears to be reaching a point of perpetual surveillance. It certainly feels as if we are always being watched even though it is not yet the case. But as cameras are becoming more common than ever, we are also entering a new era of privacy concerns and sensitivities, as evidenced by GDPR and other such initiatives. We presented this quandary to this week’s Expert Panel Roundtable: Surveillance cameras can go anywhere, right? Where is it “not OK?”

How SecuriThings boosts cybersecurity across multiple IoT devices
How SecuriThings boosts cybersecurity across multiple IoT devices

As Internet of Things (IoT) devices go, networked video cameras are particularly significant. Connected to the internet and using on-board processing, cameras are subject to infection by malware and can be targeted by Distributed Denial of Service (DDoS) attacks. Hacking of cameras also threatens privacy by allowing unauthorised access to video footage. The performance of hacked cameras can be degraded, and they may become unable to communicate properly when needed. Ensuring cybersecurity is a challenge, and the fragmented structure of the video surveillance market contributes to that challenge. A variety of companies are involved in manufacturing, integrating, installing and operating video systems, and cybersecurity threats can enter the picture at any stage. “It’s not always clear who is responsible,” says Yotam Gutman, vice president of marketing for SecuriThings, a cybersecurity company. “However, the only entities who can ensure cybersecurity are the security integrator and the service provider. They will bear the financial pain and are willing to pay for cybersecurity. An extra $1 or $2 per camera per month is not expensive.” SecuriThings’ “lightweight software agent” runs in the background of video cameras, sending information to an analytics system in the cloud IoT device security management At the recent IFSEC trade show in London, SecuriThings unveiled its IoT Device Security Management (IDSM) approach to enable integrators to ensure cybersecurity. Founded in 2015, the company has around 20 employees in Tel Aviv, Israel, and operates a sales office in New York City. SecuriThings’ “lightweight software agent” runs in the background of video cameras, collecting metadata on camera processes and connections and sending information back to an analytics system in the cloud. Drag-and-drop deployment enables a camera to begin generating data within seconds and requiring only two mouse clicks. The cloud system analyses data, pinpoints abnormalities, identifies new users, detects multiple entry attempts and tracks other camera processes to identify any cyberattacks. It monitors all devices, gateways, users and APIs to detect threats in real-time and mitigate the threats based on a pre-determined security policy. Machine learning tools also analyse more subtle activities that can indicate insider abuse. For example, a user support center can identify if cameras are being accessed improperly by employees, thus preventing insider abuse. Certified vendor agnostic software SecuriThings is working with camera manufacturers and video management system (VMS) manufacturers to certify operation of its software agents with various camera models and systems. Working through integrators, such as Johnson Controls, is the fastest route to market, SecuriThings has determined. The system can be added after the fact to existing installations for immediate monitoring and remediation, or it can easily be incorporated into new systems as they are launched. “We have a strong sales team in the United States focusing on bringing the technology to more local and national integrators,” says Gutman. Certification ensures SecuriThings’ software agent can be installed in most modern camera models without negatively impacting operation; the software is vendor agnostic. Another eventual route to market is to work with camera manufacturers to install the SecuriThings software agent in cameras at the factory. In this scenario, the system can easily be “clicked on” when cameras are installed. The SecuriThings cloud system generates a dashboard that tracks system activities to identify any cybersecurity threats IoT Security Operations Center SecuriThings operation is transparent to the VMS, and the company works with VMS manufacturers to ensure the code operates seamlessly with their systems. Cloud analytics generate a dashboard that tracks system activities, and/or a managed service monitors the system and notifies customers if there is a problem. “We monitor it from our IoT Security Operations Center, a fully managed service that ensures the real-time detection and mitigation of IoT cyber-threats,” says Gutman. “We found that end-customers don’t have the manpower to monitor the system, so our experts can guide them.”Access control and cloud-based access control will be the next systems under cyberattack, and they are almost as vulnerable" A benefit for camera manufacturers is the ability of a system like SecuriThings to “level the playing field” on issues of cybersecurity, says Gutman. The approach provides a higher level of cybersecurity confidence for integrators and users, including those using cameras that have previously had cybersecurity problems such as “back door” access. SecuriThings has certified its software for use with Hikvision cameras and is in the process of certifying with Dahua, says Gutman. “Western manufacturers say their products are more secure, but we can help all camera manufacturers prove that they are just as secure,” says Gutman. “Integrators and users can log into a device and see all the activity.” Securing connected devices from cyber threats Beyond video, SecuriThings’ products target the full range of connected devices in the Internet of Things (IoT). The SecuriThings security solution enables real-time visibility and control of IoT devices deployed in massive numbers in smart cities, physical security, building automation, home entertainment and more. Video surveillance is an early focus because of market need, an opportunity to gain traction, and the critical nature of security applications. But the challenges are much broader than video surveillance. “We are seeing similar risks to other devices,” says Gutman. “Access control and cloud-based access control will be the next systems under cyberattack, and they are almost as vulnerable. If you can disable the access control system, you can cause a lot of problems.” Other connected devices that could be at risk include building automation and heating and cooling (HVAC) systems.

Social media data provides security professionals with real-time situational awareness
Social media data provides security professionals with real-time situational awareness

Twitter has around 350 million active users a month, all eagerly posting 280-character “tweets” about the world around them. It’s a vast amount of data from all over the globe. Security professionals have begun to appreciate the value of mining all that data for insights to help them protect people, assets and operations. One company leveraging the Twitterverse to provide real-time situational awareness to corporate security end users is Dataminr.Dataminr assembles this information flow into a useful timeline that summarises the ongoing sequence of events Algorithms for actionable security signals The New York-based technology company has developed algorithms that comb through the full Twitter dataset to provide actionable signals to security professionals around the world about security-related events as they unfold. For corporate security, early information about an unfolding event enables them to take action faster in order to secure their people, locations and business operations. “OMG! Just heard a loud bang on the quad,” a tweet might declare. Combined with location information gleaned from a mobile phone, such a tweet could be the first indicator of an unfolding security incident. As an event unfolds, hundreds of such tweets are likely to be posted from the surrounding areas, collectively offering a running narrative of developing events. Dataminr assembles this information flow into a useful timeline that summarises the ongoing sequence of events. Many times, tweets are the first information available from an incident even before the arrival of first responders.Dataminr’s information is provided in a variety of platforms, from a web-based dashboard to a mobile app or notification via email “Early notification allows security professionals to be more proactive,” says Dillon Twombly, SVP, Corporate Sales at Dataminr. “We have a broad range of users across Fortune 1000 companies, and also including country security managers, security operations centers, and executive protection. "In retail, we provide information for security operations or loss prevention. Events sometimes have a potential to spin out of control, and we allow security professionals to react faster and get ahead of an event proactively.” Various security platforms Dataminr’s information is provided in a variety of platforms, from a web-based dashboard to a mobile app or notification via email. The system can be integrated with a company’s workflow, and the software interfaces with various security platforms, such as physical security information management (PSIM) systems. Another corporate use for Dataminr is in public relations, where social media could be a source of misinformation or rumors about an issue or event Dataminr addresses all regulatory and legal concerns, and it is GDPR-compliant. However, privacy is generally not a big concern because Twitter data is posted publicly, and Dataminr gleans information related to a specific event, not a specific Twitter user’s individual data. “Over the past couple of years, we have grown the security vertical,” says Twombly. “The market is receptive to the value of social media as a tool for users tasked with responding in a comprehensive way to a range of issues.”The company’s services are useful across the full range of vertical markets in the security industry Public safety and security In addition to security and public safety applications, Dataminr also provides services to financial companies and even media outlets. In fact, the 9-year-old company started in finance, where stock or currency traders were able to leverage breaking news notifications to make decisions faster. In the media vertical, Dataminr provides information to 500 newsrooms globally. Public safety and security uses have evolved, and Twombly currently spearheads the company’s work in corporate security, calling on his experience in the security world. Another corporate use for Dataminr is in public relations, where social media could be a source of misinformation or rumors about an issue or event.Customers can customise the kind of information they want to receive, and Dataminr algorithms use the full publicly available data set of Twitter Tracking Twitter posts enables a company to get ahead of an evolving story and help to shape the narrative. Twombly says Dataminr has “deep and broad relationships” with corporate customers and delivers information that can possibly be used by multiple departments in an organisation. The company’s services are useful across the full range of vertical markets in the security industry, from transportation to major industrials to financial services to energy. In the education vertical, major universities are customers, as are local school districts. Customers can customise the kind of information they want to receive, and Dataminr algorithms use the full publicly available data set of Twitter. Twombly says the company’s software is constantly evolving and being fine-tuned in response to changing needs. Dataminr is a “strategic partner” of the social media giant and works closely with them on product development, he adds.