Airport access control
German manufacturer Dallmeier announces a development partnership with AnyVision, a pioneer in AI-based facial, body, and object recognition. The aim of the cooperation is to integrate AnyVision’s facial recognition technology into the Dallmeier ‘HEMISPHERE’. The HEMISPHERE software platform offers customers from various industries a wide variety of modular solutions for security applications and business process optimisation. From the optimisation of marketing activities to f...
emaratech, a technology and management consulting company which is part of the Investment Corporation Dubai (ICD), is capitalising on its strong participation in the 2019 edition of Airport Show to showcase its collection of cutting-edge technology products, with the key highlight being the Smart Corridor, a first of its kind in the world product that is helping authorities in effective border control and ensuring seamless passenger experience at airports. As the pressure to effectively handle...
RealNetworks, Inc., global provider of digital media software and services, has announced SAFR for Security, a new solution that integrates SAFR, the world’s premier facial recognition platform for live video, with leading video management systems (VMS) to provide enhanced visibility and situational awareness for security professionals. Announced at ISC West in Las Vegas, SAFR for Security is immediately available for worldwide deployment. SAFR for Security Heads of security at hospitals...
People and vehicle access control specialist, Nortech is now offering long-range vehicle and driver identification tags to grant seamless access to approaching vehicles. Nedap TRANSIT reader range Designed to accompany the popular TRANSIT reader range from Nedap, the tags are ideal for use in staff car parks, for priority vehicle control, industrial site access control, fleet and parking management. Key features include simultaneous driver and vehicle identification, a reading distance of up...
Vorpal Ltd., developer of advanced, highly accurate geolocation solutions, releases a whitepaper in response to the growing global crisis facing airport operations and aviation security from commercial drones flying within controlled airspace. In order to guide effective and timely response efforts to such incursions, this document presents thoughtful analysis of the best technological solutions available for delivering complete drone situational awareness. Operational deployment Vorpal&rsquo...
Professionals visiting Airport IT & Security 2018 are invited to attend a seminar on how to optimise data from disparate systems in order to boost efficiency, improve passenger experience, and maximise investment in technology. In line with airport digitisation and unified operational centre trends, the session (14:10, Wednesday 5th December, Hilton Amsterdam Airport Schiphol) will look at how command and control software can be used to integrate and contextualise data from a wide range of...
Aiphone has announced significant improvements to its full IP IX intercom and security solution. The new and upgraded features built into the new IX2 series include improved audio and camera functionality, large touch screen monitors and communication with up to 9,999 door stations. IX2 IP intercom and security solution “With no server or licence fees, the IX2 system offers highly affordable P2P full IP video entry security, internal communication and multicast paging,” said Wyatt Taylor, Managing Director of Aiphone UK Ltd. “Utilising its ability to connect directly to a network, all these functions can be implemented between remote locations over large areas.” “However, what elevates IX2 above other traditional and IP intercom systems currently available for large scale installations, is the ease at which it can be integrated with third-party systems. As a result, we are able to provide a totally integrated intercom and security solution, including access control, IP network cameras and video management software (VMS), such as Avigilon, ExacqVision and Milestone, as well as Lenel Onguard access control management software out of the box and without the need to buy any licenses.” Scalable solution offering video entry security IX2 has the capacity to provide communication with a practically infinite number of intercom stations IX2 has the capacity to provide communication with a practically infinite number of intercom stations. Video entry security, internal communication, emergency stations and multicast paging are all able to be implemented between remote locations over large areas and distances, making the IX2 system an ideal solution for education campuses, as well as any other type of application involving multiple locations such as airports, railway stations and parking facilities. Key features of IX2 include: No wiring-distance limitations: LAN and VPN connections enable implementation over extensive areas and between remote locations. Peer-to-peer configuration results in space savings, reduced installation time and lower cost. Simply connect the units to Power over Ethernet (PoE) switches. No need for a dedicated server, with the additional benefit of eliminating the risk of system downtime due to server malfunction. 7-inch handset with a touchscreen which can be used in domestic and commercial environments. Hands free touch screen monitors. Picture in picture video can show the door station camera and an overhead camera simultaneously. Video intercom between master monitors. Newly designed IX panels which comply with DDA regulations, e.g. offer clear visual guidance and a blue halo button. Audio and video SIP Integration with Cisco IP phone systems. ONVIF compatibility provides the option for images captured by call panel cameras to be integrated with a video surveillance system. SD card slots on panels and monitors enable video and audio data to be recorded and backed-up. Call log facility on each handset provides data trails. IX2 is also equipped with some advanced functionality rarely found in other IP Intercom POE systems. These include: Call queuing Up to 20 calls can be queued and prioritised on an IX-MV7 master station When multiple calls are made to the same monitor station, the IX2 system places the calls in a queue which is displayed on the LCD screen. On the calling end, users are given notification that their calls are in the queue. Up to 20 calls can be queued and prioritised on an IX-MV7 master station. The importance of each call, e.g. normal, priority or urgent, can be indicated by the display of respective red, amber or green colours on the master station. Higher priority calls are moved automatically to the top of the list. Call transfers Calls and conversations within the IX2 system can be transferred to up to 10 other IX-MV7 monitor stations. The transfers can be done manually or through a variety of system settings. With Delay Transfer, for example, the system automatically transfers calls which are not answered within a pre-set time. An Absent Transfer feature immediately calls another IX-MV7 master station when someone is away from their desk, whilst Scheduled Transfer automatically transfers calls to another IX-MV7 master station during pre-determined times, e.g. out of hours.
Axis Communications has continued to listen to industry needs and announces two new camera models for corner-mount usage, with specific design features to meet particular use cases. The AXIS P9106-V Network Camera Brushed Steel model has a design that is perfect for blending into the aesthetic in elevators, whereas the AXIS P9106-V Network Camera White model is ligature-resistant (also known as anti-ligature), ideal for, among others, the healthcare sector. The 3 MP cameras are specially designed for out-of-the-box optimised corner-to-corner coverage. They can cover up to 130 degrees horizontally and 95 degrees vertically, without blind spots. Overcoming challenges “For niche applications such as surveillance in elevators, interview rooms, and psychiatric wards, our clients face very specific challenges and seek to achieve specific benefits that are not commonly addressed by standard products available in the market” said Michael Chen, Global Product Manager at Axis Communications. Network audio can be added by pairing AXIS P9106-V with AXIS T6112 Audio and I/O Interface and its portcast technology, so it can also record dialogue “But thanks to our strong partnership network globally, we are able to work alongside system integrators and end-users to ensure our new cameras’ designs serve their needs and exceed their expectations in aesthetics, usability and durability. In our dedication to innovating and creating cameras for long-term use, we are proud to present these two new cameras that will help our clients utilise our technology in even more industries.” Recording dialogue with portcast technology The white ligature-resistant model eliminates the chances for vulnerable people, such as those in mental health care or police custody, to use the device for self-harm. Network audio can be added by pairing AXIS P9106-V with AXIS T6112 Audio and I/O Interface and its portcast technology, so it can also record dialogue, which is very useful in applications such as police interview rooms. Additionally, the camera can be re-painted to match any environment, decreasing the chances of it standing out and upsetting or irritating vulnerable persons. If the camera is defaced, its abrasion- and chemical-resistant front window is easy to clean with the help of detergents or simple graffiti remover. The brushed steel model is designed to blend in with elegant elevator environments, such as in high-class establishments in commercial environments. The camera benefits from no visible screws, adding to its elegant design feature. If the camera has been affected or targeted by vandalism, the durable front window is easy to clean or replace, as per the white model. IK10 and IP66 rated corner cameras Both models are IK10- and IP66-rated for protection against impact, dirt and water ingress Michael adds, “Specifically in the elevator application, customers expressed the cumbersome procedures involved if any camera maintenance would require access inside the elevator shaft. To address this, we have designed the camera to be fully accessible from inside the elevator, reducing maintenance time and costs, while keeping the camera compact and discreet, to blend into elegant spaces.” These new corner cameras are easy to install alone, thanks to innovative screw gaskets. They also come pre-focused, helping installers complete the set-up quickly and correctly, which decreases installation costs. Both models are IK10- and IP66-rated for protection against impact, dirt and water ingress. The hardened cameras are compatible with multiple connectivity options to allow installation in environments where infrastructure requirements are unique. Choose between: PoE, PoE over Coax, and PoE over 2-wire connections (separate connectivity devices required). The latter of these is common, e.g. in travelling cables along elevator shafts. The cameras will be available in Q4 2018 through Axis distribution channels.
NEC Corporation (TSE: 6701) announced an investment in Tascent, Inc., a U.S.-based biometric system company, with the aim of accelerating the global expansion of its safety business. The amount of the investment is not disclosed. Recently, the demand for multimodal biometric identification to further bolster security is rapidly growing. Within this environment, the iris identification market is expected to experience significant growth. NEC has been developing biometric identification technologies for more than 40 years, and systems using NEC's Bio-Idiom biometrics have been introduced through more than 700 systems in 70 countries and regions around the world. Moreover, earlier this year, NEC's iris recognition was named the world's most accurate by the U.S. National Institute of Standards and Technology, which has also recently named NEC's face recognition and fingerprint recognition technologies as the most accurate. Next generation iris authentication Established in 2015, Tascent provides multimodal biometric identification systems, with particular emphasis on the iris modality. The company's technologies include optical control technology to remotely capture an accurate, high-quality iris image at high speed, and a user interface (UI) technology that smoothly guides users in support of capturing accurate biometric information. Tascent's technologies are embedded in security systems widely used at airports, government agencies and enterprises around the world. This investment and partnership will enable the two companies to jointly enhance the capacity of iris recognition This investment and partnership will enable the two companies to jointly enhance the capacity of iris recognition, using Tascent's optical control and UI technologies and NEC's advanced biometric engines and create a next generation iris authentication offering for the public safety market. Accelerating multimodal biometrics applications "In NEC's 'Mid-term Management Plan 2020', the company positions its safety business as an engine for global growth and focuses on the development of this business," said Masakazu Yamashina, executive vice president, NEC Corporation. "Moving forward, NEC aims to expand its social solution business and further boost profitability by acquiring new customers, delivery resources, core technologies and business models through collaborations and M&A, while developing its own core technologies and solutions." "Tascent is excited to partner with NEC to develop world-class identity solutions and to accelerate the adoption of multimodal biometrics in government and commercial applications. The unique combination of NEC and Tascent technologies has great potential to address today's identity challenges, making life easier and safer for people around the world," said Alastair Partington, Founder and Co-CEO of Tascent, Inc.
EUSAS and Euralarm, hosted by Airbus, recently organised their second joint conference, which was this year on the topic of aviation safety and security. It showed once again the importance of technological development for an industry endeavoured to protect lives with a particular relevance to the aeronautics and air transport sectors. Aviation safety & security The US Federal Aviation Administration reports yearly over 100 false fire alarms on airplanes, resulting in unplanned landings and turn-backs. The consequences for passengers, airlines’ reputations and managing flight routes make the issue of false alarms a priority for the companies providing fire detection devices for airplanes – and this is just one example of the challenges of safety and security on airplanes. Several organisations and companies gathered for two days on July 11th and 12th in Bremen, the second-largest Airbus site in Germany, where airplanes’ wings and fuselages are manufactured. Airbus, the biggest aeronautics and space company in Europe and a worldwide leader in the sector, was the host of a series of lectures and presentations on fire detection, fire suppression, evacuation and security in the aviation sector. This event was jointly organised by the European Society for Automatic Alarm Systems (EUSAS), a group connecting academia and industry, and Euralarm, which represents the European fire safety and security industry. Fire detection technologies The event addressed the special challenges of fire detection and extinguishing in airplanes, airports and in the aviation industry. From the depleting extinguishing agent reserves worldwide, to the large number and sheer size of airport buildings and hangars, which require specific solutions on top of traditional fire detection technologies. Furthermore, are the financial and time constraints for compliance testing in an industry where efficiency and safety are a must. Detection systems must provide an indication to the flight crew within one minute after the start of a fire The criteria used for fire detection testing on airplanes are stringent. Detection systems must provide an indication to the flight crew within one minute after the start of a fire, but also be highly resistant to false-alarms. This has led the aviation industry to ask for the most advanced technologies to be used on aircrafts: such as multi-wavelength, multi-scattering angle photoelectric detection, a field at the edge of applied physics, and which was presented by Kenneth Bell, from UTC Aerospace Systems. Green fire suppression system Another issue for the industry is the replacement of Halon, a gas that has a high global-warming factor and attacks the ozone layer in our atmosphere. This fire suppression agent is used in cargo compartments, as well as for turbine fire due to its favourable characteristics. The production of Halon has now been discontinued and stocks of recuperated gas are rapidly declining. While Terry Simpson and Edda Liu from UTC Aerospace Systems presented the overall current progress on the replacement of Halon for fire extinguishing and suppression, Dr. Jan Boris Philipp, from Diehl Aviation, in Germany, presented an alternative green fire suppression system manufactured by his company. Computer-simulated airport evacuation Many solutions presented at the conference were based on computer simulations. Real life fire extinguishing tests on airplanes are part of the certification process of new airplanes. To avoid environmental consequences, a newly developed simulation technique presented by Airbus’ Dr. Konstantin Kallergis, can now predict the fire suppressant’s behaviour inside the cargo compartment. Project ORPHEUS allows the computer-simulated modelling of an airport’s evacuation, as well as smoke spread prediction in case of fire Another illustration was the research project ORPHEUS, financed by the German federal government, which was presented by Dr. Lukas Arnold, from the Institute of Advanced Simulation in Jülich, near Cologne. It allows the computer-simulated modelling of an airport’s evacuation, as well as smoke spread prediction in case of fire. The evacuation test concept of an A380 aircraft was impressively shown by Wolfgang Moeller from Airbus: all 850 passengers and crew members could escape the aircraft in significantly less than 90 seconds. Video-based detection technologies On the topic of airports and hangars, the width and height of the buildings is generally the main problem, as was explained by Securiton’s Stefan Brügger. Automation and integration of electronic safety and security solutions presented by Maarten Wings from Bosch, while Roland Voraberger from g+m elektronik, a company in Switzerland, provided a concrete example for the connection of voice alarm systems to fire alarm systems, which is not as straightforward in airports as it would be in smaller buildings. The challenges of fire detection in buildings with high-ceilings, which is a case for most modern terminals, or half open hangars could be overcome in the future with video-based detection technologies or thermal radiation-based fire detectors, presented respectively by Soeren Wittmann from Bosch and Dr. Simon Trippler together with Dr. Jörg Kelleter from GTE Industrieelektronik. Video is, of course, also useful when it comes to security with video analysis against intrusion in security zones being presented by Securiton’s Thomas Hermes and Michael Seidl, from the Frankfurt Airport, the busiest in Europe by cargo traffic. Adaptive Escape Routing Systems Finally, in a demonstration that stood-out by its focus on a non-technology related topic, Dr. Sebastian Festag, representing Germany’s electronic industry association ZVEI, explained the concept of Adaptive Escape Routing Systems and shows why human behaviour is of major significance in an optimised evacuation and guidance strategy. The solution to fire and security challenges in aviation clearly lies in cutting edge technologies and research on fire safety and security, as well as in the standards, which sometimes lag behind the technology. Dr. André Freiling, from Airbus, a speaker at the event, noted that some standards used to testing smoke detection in aircrafts for example can date as far back as 1994.
In real life people usually don’t want to get into the drama of being seen as someone other than themselves. The misrecognition problem is not only time consuming, dignity compromising but also, in lots of cases, life threatening, if certain dangerous people are not correctly identified in time. This mistake is no longer affordable in today’s context, whether for an individual, a group or society as a whole. Fortunately, the facial recognition technology has matured, and the security solution based on the said technology is being widely used across the world. Dahua Technology, a premier solution provider in the global surveillance industry, is especially good in this realm as has been proved by multiple championship and new records in major international challenges, including Multiple Object Tracking Challenge, the KITTI 2D Object Detection Evaluation 2012, KITTI Flow Benchmark, Task [Word Recognition] of Incidental Scene Text Challenge and Born-Digital Image Challenge. A Smart AI algorithm optimises the image captured in multiple angles or blurred in motion and translates the face feature into a digital model Dahua facial recognition It is necessary to explain some basic rules concerning how facial recognition works before the tour to see how Dahua Technology’s products & solutions are applied in various daily scenes. Simply put, big data is useless if the accuracy and efficiency of facial recognition has not been improved to a certain level. The face detection, whether from a snapshot or from a stream of video, requires not only a high-quality camera but more importantly, a smart AI algorithm that optimises the image captured in multiple angles or blurred in motion and translates the face feature into a digital model which can be crosschecked in the database. The whole process, from taking the picture to comparison, takes as short as 300ms. Suppose there's Tom, a middle level manager in his mid-30s. Let’s follow Tom for a day and see how Dahua Technology’s facial recognition solution plays its role in his perfectly ordinary life. Building security system Tom hurried to his company on the 30th floor of a class A office building, the kind with additional barriers in the lobby between the front gate and elevators. There were long lines in front of the access control machines. Tom reached into his pocket and found unfortunately his access card wasn't there. But Tom should worry no more because the building had just updated the security system with Dahua’s facial recognition solution, which overcame various shortcomings of traditional ways of card or fingerprint scanning, including low efficiency and inadequate security. Compared to a card, apparently it is much less likely for one to lose/replicate/borrow a face. And the access control was no longer a gamble if one's fingerprint works. The powerful cameras with deep learning AI, detect the faces and digitalise the features and compare them purely through numbers Deep learning AI detection Here’s exactly how Dahua’s facial recognition solution works in this scene. The powerful cameras blessed with deep learning AI, detect the faces and digitalise the features and compare them purely through numbers with the ones in the database which takes less than 1 second. The beauty of the solution goes both ways since the company no longer needs to make a card or import finger prints for the newly employed but simply upload their photos into the database that contains up to 10,000 faces. Besides offices, this solution can also be applied to any place that has a high standard for access control, like customs, schools, residential communities, etc. Smart access solution Tom stepped into a bank. On behalf of his company, Tom had some serious business to discuss with the bank, which, at this hour, was full of people. And before Tom started to worry about the time to be spent waiting and if he could make it to the next meeting on time, he heard his last name called and was led into the VIP room. Now how did the bank manage do that? Not by human efforts for sure. No clerk could remember each and every face and match it with a particular name and particular business without making any mistake. That’s why a facial recognition solution is essential to the business. The immediate detection of a VIP face could be easily matched with the white list in the database. No delay or misidentification and all VIP treatment. This goes not only for banks. Hotels, hospitals and casinos alike will also benefit from this solution that secures the proper respect those exceptional customers deserve. Preventing unauthorised access Tom went to the vault of the bank for the first time in his life. He was happy that now he was trusted by the company with such important mission. He walked fast and went in front of the escort. But before he could raise his hand to touch the door of the vault, a warning siren was triggered. The escort, with a reassuring smile, caught up and patted on Tom's shoulder and explained the whole situation to him. No unauthorised personnel could intrude the sensitive areas blessed with Dahua’s facial recognition solution No unauthorised personnel, be it Tom or Jerry, could intrude the sensitive areas blessed with Dahua’s facial recognition solution. The face captured and automatically optimised by the camera would be put into real time comparison with the authorised faces in the data base and the low percentage of similarity, from a pure mathematical point of view, would immediately trigger the alarm. Other limited access areas like labs and archives will also enjoy better protection with this facial recognition solution. Security identification management After a long day’s work, Tom went to see a football game with a friend. The show began even before they entered the stadium because they saw an infamous football hooligan got rejected and taken away outside the entrance gate. Tom, who had been through plenty of adventures during the day, kind of figured out what happened. And Tom’s friend, who happened to be an employee of Dahua Technology, took the chance to explain how Dahua’s facial recognition solution informed the security force to deal with any persona non grata on the black list as soon as they showed their faces. Of course, this solution could be widely applied to other areas like airports, train stations, or in other words, city management. So, this was a day in Tom’s life, which was endowed with some dramatic coincidence but totally realistic in every scene. These examples were far from exhaustion of all the possible applications of Dahua facial recognition solution that fully activates big data gathered and thus spawns a great many creative applications in terms of security and business, resulting indeed into a Safer Society and Smarter Living, as has always been envisioned by Dahua Technology.
STANLEY Security, global manufacturer and integrator of comprehensive security solutions for a wide range of industries, has announced a partnership with Shooter Detection Systems LLC (SDS), major gunshot detection solutions provider. As an authorised dealer, STANLEY Security is now certified to sell, install and service SDS products and services. SDS’s Guardian Indoor Active Shooter Detection System combines acoustic gunshot identification software with infrared gunfire flash detection for a fully automated gunshot detection and alerting solution. The Guardian System immediately detects gunshots and simultaneously alerts building occupants and first responders within one second and with zero false alerts. “We understand the importance of having a fully comprehensive security system, including gunshot detection, and we are committed to this technology and all the individuals, campuses and businesses it can help to keep safe,” said Brad McMullen, Vice President Marketing and Product Solutions, STANLEY Security. “Being able to activate an alert and notify emergency personnel in near real-time during a crisis is critical. Additionally, integrating this technology with video management and access control systems can provide our customers with more robust incident response plans.” STANLEY has been a leader in security for decades, and we are excited to partner with a global company so well-known and respected in the industry" Improved emergency response time The Guardian System processes all gunshot data within the sensor, removing the need for human interpretation or intervention and saving time when seconds matter most. When a shot is detected, the Guardian System instantly alerts users to the location of shots on a mapping interface and simultaneously sends this information by SMS text message, email and via other third-party alert systems. The Guardian System has been installed throughout schools, businesses, airports and other public and private buildings and has over 20 million hours of operational time with zero false alerts. With the Guardian System, critical information is immediately relayed to building occupants and emergency personnel so that proper steps can be taken to control the situation as quickly as possible. “STANLEY has been a leader in security for decades, and we are excited to partner with a global company so well-known and respected in the industry,” said Dan Michelinie, Sr. Director of Sales & Business Development, Shooter Detection Systems. “As the number of incidents continues to increase at an alarming rate, the joint presence of SDS and STANLEY will allow this advanced solution to reach more schools, businesses, hospitals and ultimately, improve emergency response time.”
As anyone who has ever flown on a commercial airline since 2001 knows, security measures at airports are well enforced and the emphasis on traveller safety is all around the airport and its grounds. Mass transportation, meanwhile, presents a special but not any less significant challenge when it comes to determining security issues. These facilities need to develop the means to protect a constantly changing and large population of passengers. And unlike airports these facilities often have hundreds of points of entry and exit on multiple modes—buses, subways, light rail, commuter trains, even ferries. About 2 million Americans will use the nation’s airways on a given work day, while 35 million people will board some form of public transportation. In fact, statistics have shown that nearly 11 billion trips are taken on public transportation every year. In some large metropolitan areas in North America where mass transit is well established, more than 20 percent of the area’s inhabitants get around via public transportation.About 2 million Americans will use the nation’s airways on a given work day, while 35 million people will board some form of public transportation Solving mass transit security For transportation officials and their security providers, solving the mass transit security issue begins with determining the key concerns and then creating the proper responses via security systems, policies and procedures to mitigate the risks. Although vandalism and graffiti are very visible signs of criminal behaviour in mass transit settings such as bus stops and subway stations, this is not where transportation officials typically focus their energy. Fences and gates can secure out-of-service buses and train cars, as can remote surveillance methods to keep such vandalism at a minimum. Instead, it is the day-to-day safety and security of transit riders and employees that should become the highest priority. This begins with creating the safest environment possible that is highlighted with appropriate signage and, when necessary, audible warnings, and supporting that with technology, such as surveillance cameras, that will document what has happened if an incident occurs.Analytics can also be useful in alerting security about other suspicious behaviours at a transit stop, such as an untended bag or package Crime prevention in transportation Analytics can also be useful in alerting security about other suspicious behaviours at a transit stop, such as an untended bag or package Incidents of concern within a transit setting can take several forms, ranging from legitimate accidents or crimes to false claims such as faked fall down the stairs to potential and actual suicides. Bus and subway stations also have become magnets for homeless people who may put themselves and others in harm’s way by trying to access less secure public areas within a station as temporary shelters. If someone is injured on a subway platform and the transit provider is held liable, it could be on the hook for hundreds of thousands, if not millions of dollars. Suicides are a major concern for operators, with personnel now being trained to look for individuals who seem distressed, are loitering in the area or are intentionally putting themselves in a dangerous situation, such as standing too close to the edge of a platform. The deployment of video analytics, which can be programmed to send alerts when certain pre-set actions occur, can help determine when such dangerous behaviours come into play. Analytics can also be useful in alerting security about other suspicious behaviours at a transit stop, such as an untended bag or package or a person going into a restricted area. Whether it is on the bus, train or ferry or at the stops themselves, cameras and intuitive video management systems are the key to both active and forensic transit security. Some cities use buses that are up to 60 feet long and those can be equipped with up to a dozen cameras Train security and safety By using the proper cameras and recording systems in a transit environment, quick-acting personnel can locate a person of interest who boarded a train at one station, follow him during his trip and produce a crisp, clear identifiable image at the end. Those setting up the system thus should keep in mind proper camera positioning, resolution and motion-based changes to framerates or other compression settings. A typical 30-foot bus often has six cameras—one each at the front and middle doors, two more within the bus and then one looking forward and another looking behind the bus. The latter two are important in the event of accidents to verify liability. Some cities use buses that are up to 60 feet long and those can be equipped with up to a dozen cameras.Train stations often deploy high-definition cameras to better support facial recognition software to get that actionable image Train cars are similarly equipped with two to four cameras to view activity down the centre aisle. Within the stations themselves, there can be from 15 to 30 or more cameras capturing wide-angle shots. Train stations, which have a restricted point of egress, often deploy high-definition cameras to better support facial recognition software to get that actionable image. Installing the right technology for the solution Although bandwidth and storage can be a concern, with motion-based recording, the resolution can be bumped up during event, resulting in a 1-megapixel stream jumping to 4 or even 8mbps when needed. By changing the resolution on demand, end users can cut their storage needs significantly. Transportation settings often rely on the same technology used in other security installations, primarily mini dome cameras, although there are some mini transit domes built specifically for the environment with the proper aesthetics. Because of vandalism threats, transit typically avoids pendant mounts, which can be more easily grabbed and damaged. Temperature ratings for cameras also come into play in cold climates with cameras often getting outdoor exposure.Today’s new buses and trains are constructed with the cameras onboard and newer stations also take security into consideration at the earliest design stage As trains and buses move along their routes, especially those that service outlying areas, Internet connectivity becomes an issue as well. Because it may be difficult for video to be sent in transit, security bus barns are equipped with Wi-Fi so video from onboard cameras can be downloaded at the end of the day. And the use of hardened recorders at the stations allows security personnel to retrieve recorded video. Transit security with modern technology Today’s new buses and trains are constructed with the cameras onboard and newer stations also take security into consideration at the earliest design stage. Older infrastructure from long-standing subway and bus terminals can prove to be a challenge when adding security, but these issues aren’t insurmountable. Often the solution is to add more cameras to cover the same square footage because of less-than-ideal sight lines and to place conduit wherever it works best, which may mean positioning it under platforms or in other out-of-the-way places within older stations. Looking ahead, transit security will continue to evolve, not only as new stations and modes of transportation are added to the system, but in terms of communicating with commuters. People can expect to get mass notification alerts on their mobile devices, and those same devices can provide vital data to transportation entities to better develop their overall systems.
Biometric identification technologies today are becoming pervasive. Many smartphones offer fingerprint unlock options, and most organisations have at least considered the technology as a solution for their identification and access needs. While biometrics have dramatically improved in the past several years to deliver faster, more efficient and more secure solutions, not everyone is ready for the change. New York MTA case study But does that mean that organisations need to hold off on implementing biometric solutions? Or do they need to ‘force’ it upon users? A historic case study provides an excellent example of how to implement a new technology with millions of people, under pressure, allowing users to adapt slowly and the organisation to reap the benefits. In 1953, New York Metro Transit Authority (MTA), one of the world’s largest mass transit systems, began using tokens as payment for subway rides – a solution to engineers’ problem of creating a machine that could accept different types of coins for the new 15-cent fare. This technological advancement that may seems almost archaic today, served the MTA well for 40 years before the introduction of the MetroCard - a lighter, more automated solution. Technology adaption works Yet, the MTA, despite positive results from its first implementation in 1993, had both the older tokens and the new MetroCards in place, simultaneously for a full decade until 2003. This allowed “early adopters”, who understood the advantages of the MetroCard, to switch over, while allowing those that preferred their ‘trusty’ tokens to continue using them. In 2003, when tokens were finally phased out for a MetroCard-only system, only a small percentage of commuters were still using tokens; most had realised the significant benefits to the card and had switched over of their own volition. The MTA example serves as a model for how technology adoption works. From tokens to MetroCards, fax to email, landlines to cellphones –there is a distinct process new technologies go through as they are introduced and ultimately adopted by the public. Biometric technologies are no different. Yet, organisations must find way to implement new biometric systems that simultaneously provide organisations with the significant advantages biometrics offer, while ensuring that users are given time to adapt to and adopt the new technology. Let’s look at a few practical strategies for biometric adoption: 1. Optional, with added value Many facilities, such as airports, stadiums and theme parks, already use biometric technology to create ‘express lanes’ to save time and improve efficiency. Frequent fliers, VIPs and season ticketholders can enjoy faster and more personalised service with biometric identification solutions. These users can still opt to be identified the old-fashioned way, with an ID card or ticket, but doing so means they will have to line up and wait their turn as the old methods are much less efficient than biometrics technologies. Airports, stadiums and theme parks already use biometric technology to create ‘express lanes’ to save time and improve efficiency Biometrics can also be used to improve the customer experiences, or create more tailored, personalised programs. For example, the ICER (Industry, Culture, Education and Recreation) Innovation Center in the Netherlands implemented biometric visual identification technology to create customised experiences for museum visitors that were fun and interactive. Visitors could choose not to take part in the biometrics-enhanced visit and experience the baseline version of the museum, but by utilising the biometric system, museum goers are offered a tailored experience where exhibits and information are presented based on what a visitor has already seen in the museum. 2. Start with biometrics in optional locations Not all services or locations in a corporate setting are mandatory for employees to visit. For example, employee centers or health and wellness facilities are social settings for individuals to relax and connect. Implementing biometrics-based identification solutions in these types of settings allow employees to interact with the new technology in a low-stress environment and only if they choose to. For example, companies can provide an option for employees to pay for meals at corporate cafeterias using biometric identification, saving break time for those who choose to adopt the technology and enabling them to skip longer payment lines. This has the added benefit of reducing fraud resulting from lost or stolen ID cards. 3. Educate users in advance To ensure smooth deployment and adoption of biometric technology – whether partial or full – it is important to ensure that new users are educated on the new technology in advance of its deployment. For example, employees may have privacy or data security concerns. It’s critical that organisations clarify that the data being collected is kept private and secure. This information can be imparted in several ways. Organisations should be as transparent as possible and provide employees with enough information to address concerns. A Town Hall meeting can be held to explain benefits of the technology and answer questions that new users might have. Providing educational materials to new users, such as letters or videos that explain the new technology can put employees at ease. Make sure to outline how data privacy will be ensured as well as the benefits that employees stand to gain. Have management lead by example and be the first to enroll in the biometrics system. This can help inspire confidence and trust in the system. Make implementation competitive and fun. This can help users who aren’t as excited about the technology take part and learn about it. Implementation of biometric technology can still allow individuals in an organisation a choice of whether or not to partake. Over time, most people tend to adopt new technology by choice if it saves time and makes life easier. When considering biometric systems, keep in mind that it doesn’t necessarily require full adoption now and can coexist with other systems until users feel comfortable with the system, and recognise the benefits it provides.
With the changing “lone wolf” style of terrorism, there will be a trend toward many more installations of vehicle access control systems and smaller numbers of units. Where a university, military base or airport might have 20-plus systems scattered among its grounds, there will be a growing number of smaller applications needing one, two or three systems. These will include customers such as primary and secondary education facilities; pedestrian locations such as shopping centres, concert grounds and fairs; hospitals and other venues where pedestrians come together both daily or temporarily. Defending against vehicle attack The Middle East is a particular hotbed for increased security measures for explosive-laden vehicles. Many soft targets in the Middle East have also been adding anti-terrorist, crash-resistant barriers, barricades and bollards. This has been also true in Europe while Southeast Asia is coming on strong. With so many more such systems being ordered, buyers will need to become more aware of their supplier's customer service and technical support. The market could be faced with an upcoming slew of cut-throat, unscrupulous operators providing shoddy equipment and dangerous installations that take advantage of buyers who don't understand what is truly needed to defend against vehicle attack. Importance of certified vehicle barriers This time last year, we projected that the use of vehicles as weapons to mow down pedestrians, such as occurred in Nice (France), would probably impact greater sales of Delta portable crash-rated barricades. Although it was announced by ISIS that their followers should undertake more of these attacks, we don't think anyone anticipated the numbers of such atrocities we would see, the latest (as of this writing) the assault on the bike path in New York City. The largest customers around the world have been law enforcement agencies and municipalities. Security specialists needto be aware of vehicle threats wherever people are gathered Last year, we also warned that many organisations, in order to save money, were purchasing non-certified (non-rated) vehicles access control systems with less structural safety than those provided by certified manufacturers. The reality is that somebody is going to have to be hurt or killed before some buyers understand that a barrier, barricade or bollard is not a commodity type of product. Security specialists must be aware With the economy being better, there has been a resulting increase in sales of products for general parking and similar applications. But, as terrorist attacks have gone from large planned scenarios to smaller lone-wolf assaults, such as the bike path incident in New York, there is an increasing need for more protection from vehicle harm in more places. Basically, security specialists need to be aware of vehicle threats wherever people are gathered, from a parade route to a fair, sporting event, shopping centre – anywhere scores of people are clustered. One of the interesting statistics we ran across this year was that, in the United States, six of the top 10 rated college football teams use Delta temporary barricades to protect fans at their stadiums on game days. During 2017, Delta has been developing new products to take on the increased protection of vehicle checkpoints between the United States and Mexico. Over the years, Delta has implemented vehicle crossing protection at many of the most secure sites including El Paso, San Ysidro, Calexico, Otay Mesa and Tornhill-Guadalupe.
Several recent terrorist and mass violence attacks have been directed at soft targets, or relatively unprotected locations where people gather such as outside a music venue or in the unscreened passenger areas at airports. Attacks in public areas have led to the development of new security technologies aimed at protecting soft targets. One company addressing the challenges is Evolv Technology and its Edge automated high-speed personnel screening solution. The system integrates walkthrough firearm and explosive detection for high-throughput protection of events and soft targets.The Edge system has multiple detection sensitivity settings to respond to various threat scenarios Enhanced visitor experience The system seeks to increase security without compromising the ‘customer experience’. People simply walk through single-file – between two 5-foot-tall stanchions. One lane can screen up to 800 people per hour, and the system detects explosives or metallic objects without the need for pat-downs or wands or other invasive procedures. Any personal belongings can remain in visitors’ pockets. A single security guard is needed for each lane to verify any detected threats. “The system combines an improved security posture with a better visitor experience,” says Mike Ellenbogen, CEO of Evolv Technology. “We need to fly and have been trained to be screened at the airport, but we don’t expect to be screened going to see a ball game or a Mozart concert. Evolv recognised a need for a new way to inspect people before they enter these types of facilities. It’s a seamless system that pulls various technologies together. We want to feel safe but without having to sacrifice the quality of the experience.”Screening analytics provide data on the numbers of people screened by time of day and by result The system combines millimetre wave and magnetic field sensors, along with artificial intelligence (AI)/ machine learning and can incorporate additional data such as biometrics. Known bad actors can be identified using facial recognition. The system has multiple detection sensitivity settings to respond to various threat scenarios. Expanding perimeter protection A security guard provides the human touch by verifying any threats detected by the system. The locations of concealed items are displayed on a photo of the individual using a color-coded box overlay. Screening analytics provide data on the numbers of people screened by time of day and by result. Ellenbogen says the company is working to have the system adopted at entertainment venues, performing arts centres, sports centres, for air and rail transportation, and to protect high-profile government buildings. The Edge system can expand the protected perimeter to a wider area that was previously unprotected. The Edge system can expand the protected perimeter to a wider area that was previously unprotected For example, concert-goers exited the arena of an Ariana Grande concert May 22, 2017, in Manchester, U.K., and entered the surrounding area that was unscreened and unsecured. Placing a user-friendly screening system around a wider perimeter outside the concert venue might have prevented the use of an improvised explosive device in the terrorist attack.Placing a user-friendly screening system around a wider perimeter outside the concert venue might have prevented the use of an improvised explosive device in the terrorist attack Threat mitigation with soft target approach Likewise, a 2016 bombing at the Brussels Airport occurred in the departure hall outside the passenger screening areas. Securing a wider perimeter – for example, screening customers discreetly as they enter the airport building from a parking area – could have provided additional security against such an attack. Ellenbogen confirms Evolv has sold a number of systems to major European airports to screen visitors and passengers as they enter the front door. “Addressing the threat to an airport or train system is different than screening passengers; we are looking for different types of objects and different types of materials. The idea is to be able to detect threats to a venue before they get into the venue.” The soft target approach can also be applied to public buildings, such as courthouses, and used in lieu of more invasive metal detectors and x-ray machines. The portability of the Edge system enables a ‘pop-up’ approach to security – i.e., to relocate the system to address specific or changing security threats easily. The self-contained system only requires a wall plug. Labour reduction (because of faster throughput) can help offset the system costs but it’s difficult to quantify the improvement in the visitor experienceImproving security posture at event venues “It’s surprising the level of importance [venue owners] put on the visitor experience,” says Ellenbogen. “They see that their brand starts at the front door. They are eager to find alternative security solutions that come across as more inviting, less imposing, less closed down, less invasive than the solutions they have been using,” he says. “They are driven by a desire to improve the visitor experience as they improve the security posture.” He says current events, including terrorist attacks and mass shootings, drive awareness among venue owners to improve the security of soft targets. “The level of interest is high, and it spikes somewhat when there is a big headline,” Ellenbogen says. He notes that the system is more expensive than a metal detector, but about a third the cost of familiar airport body scanners. Labour reduction (because of faster throughput) can help offset the system costs, but “it’s difficult to quantify the improvement in the visitor experience,” Ellenbogen says.
Technology is a valuable tool for increasing security, but occasionally technology can create a threat. An example is the threat 3D printing technology poses to one of the most mature security technologies, mechanical locks and keys. The ability of 3D printing to duplicate keys presents new challenges for lock manufacturers, and new vulnerabilities to end users. Keys that could previously only be duplicated by skilled thieves can now easily be copied using off-the-shelf technologies and information widely available on the Internet. In this case, technology offers a solution, too. A new kind of key cannot be duplicated by 3D printing. Ironically, it is manufactured using 3D printing techniques. UrbanAlps Stealth Key A Swiss company called UrbanAlps has introduced the Stealth Key, a key that is designed and manufactured from the inside out. The mechanical elements that enable the key to uniquely open a matching lock are hidden away inside the key beneath a pair of narrow ledges, where they are not susceptible to being scanned and duplicated using 3D printing. UrbanAlps offers a range of cylinder locks and keys based on the Stealth Key concept. A high-tech padlock incorporates additional security features such as a shrouded shackle to avoid cutting, anti-drill capabilities, and resistance to lock picking. Stealth Keys are made using 3D printing and a laser to fuse together successive layers of metallic powder added in a manufacturing process called "successive layer melting." Manufactured from the inside out, complex internal features are "printed" and then covered over later with a solid layer that shields the complex inner workings from being duplicated. Unveiled at the Intersec show in Dubai earlier this year, the Stealth Key is aimed at retailers, hotels and other commercial entities. It is less expensive than other technologies designed to shore up the security vulnerabilities of 3D printing, such as keys that combine both mechanical and electronic components. The company’s website touts “simple and affordable key copy protection.” Unveiled at the Intersec show in Dubai earlier this year, the Stealth Key is aimed at retailers, hotels and other commercial entities 3D printing challenge Locks and keys are among the oldest security technologies, dating back to Egyptians and the Romans. Their value has been proven over the centuries and they continue to provide security in many applications, even in today's high-tech environment. However, 3D printing presents a challenge. 3D duplication became a high-profile problem in 2015 when 3D printable computer-aided design (CAD) files for Transportation Security Administration (TSA) master keys were published on the Internet. Those are the keys used by airport security staff to open private suitcases for inspection. The files allow the keys to be duplicated and used to successfully open TSA-approved locks. The hacking of security systems is nothing new—most electronic security systems have been hacked, or have the potential to be hacked in the future. Increasingly, security involves an ongoing one-upmanship between the good guys and the bad guys – the programmers and the hackers, the white hats and the black hats – whether the technology is computer systems or even the locks and keys that have been around for centuries.
The reason for long lines at U.S. airports is that the airlines now charge fees for checked bags. It’s as good an explanation as any of why airport passenger screening lines suddenly and mysteriously grew out of control during May (and then became manageable again in June). It’s not the only explanation floating about – there’s plenty about high travel volumes, Transportation Security Administration (TSA) personnel shortages, etc. etc. – but it’s the one that appeals to the disgruntled traveller in all of us. In the absence of definitive answers, why shouldn’t two of the biggest gripes we all have with air travel – luggage fees and long security wait times – be a case of cause and effect? I acknowledge the oversimplification. However, in addition to its obvious appeal, the explanation also has a germ of truth, and skipping past the details, it’s the government’s fault! US government negligence towards TSA officers Specifically, the U.S. government has levied a 7.5 percent excise tax on airplane ticket prices. However, the tax doesn’t apply to baggage fees. In effect, there is an incentive for airlines to lower ticket prices (subject to the tax) and implement or raise baggage fees (which are not) to offset the reductions. The approach gives travellers a specific incentive (say, $25) to carry their bags onto the plane rather than check them before going through the screening area. More bags clog up the operation, thus delaying airport screening. Absent the federal tax, it makes sense to “bundle” the charges into a higher ticket price rather than charging separately. Hence the argument: It’s the government’s fault! Experts say a roughly 10 percent reduction in screening personnel has coincided with a 15 percent increase in passenger volume, contributing to the recent crisis There are other possible explanations that are also the government’s fault, from not enough overtime pay for TSA-employed screening officers, to insufficient staffing of screening checkpoints. The leader of the union that represents TSA officers says Congress has “starved TSA of the resources it needs to meet growing demands at our nation’s airports.” Experts say a roughly 10 percent reduction in screening personnel has coincided with a 15 percent increase in passenger volume, contributing to the recent crisis. Nobody likes to wait two hours (or more!) in an airport screening queue, which was the unfortunate situation that flooded news reports during much of May. Attempted solutions add to airport security check delays And some of the proposed solutions seemed to contribute to the problem. For example, a new automated technology – so-called Innovation Lanes – provides expedited screening processes and promises to move passengers through the system more quickly. However, it was the installation of the new equipment at a security checkpoint in Atlanta (during which the checkpoint was closed) that contributed to some of the more extreme wait times in May. Another proposed solution is the TSA PreCheck lanes, where prescreened passengers get to speed through wearing their belts and shoes. But fewer than the projected number of passengers opted to pay the $85 fee for the programme, and some observers have suggested that resources devoted to screening PreCheck passengers could do more overall good if reassigned to screening the masses. “I got here two and a half hours before my flight, and security took two to three hours to get through,” one traveller recently told a TV station in Chicago. In March, TSA Administrator Peter Neffenger said wait times had nearly doubled over the previous year. Not to mention reports of data showing that TSA agents fail 95 percent of security tests involving passing weapons through security. For now, the problem seems to have abated, and airport and TSA officials were congratulating each other all around after average wait times improved drastically over the Memorial Day holiday weekend. A new TSA 10-point plan (more officers, overtime, canine teams, etc.) is being implemented. But what about the upcoming busy summer travel season? We may not have seen the end of those long security wait times…
As a major transportation hub in Northeastern China, Changchun Longjia International Airport processes a huge amount of passengers every year. In response to massive economic growth in the region, the airport – with a total volume of almost 13 million passengers in 2018 – needed an additional terminal. Built over the course of three years, the state-of-the-art Terminal 2 building covers a total area of 55,600 square meters. Since its opening in October 2018, the expansive Terminal 2 building has been serving all domestic flights from 22 airlines including Air China, Shenzhen Airlines and Shandong Airlines while international flights are now concentrated in Terminal 1. Meeting airport security guidelines Bosch received the contract based on a proven track record of large-scale airport security installationsLooking to safeguard this vital new infrastructure, the airport security managers wanted to integrate video security, intrusion detection, public address and access control for staff within one platform while meeting current government security guidelines for airports. Since 2017, these laws include mandatory storage of all video data for a 90-day period, which puts a premium on adequate data storage in a space covered by over 1,000 cameras around the clock. Given the project’s massive scale, managers wanted to work with a one-stop provider to ensure seamless integration of all solutions and delivery according to stringent timelines with end-to-end security intact on opening day. After diligent market research, Bosch received the contract based on a proven track record of large-scale airport security installations and the ability to connect all components – video security, intrusion alarms, access control and public address systems – on the Building Integration System (BIS). Installation of IP dome cameras Outdoor cameras are able to withstand temperatures down to -40 °C during Changchun’s harsh wintersFor video security, Bosch experts installed nearly 1,500 cameras inside and outside Terminal 2, including moving cameras such as the AUTODOME IP 4000i and IP 5000i and FLEXIDOME IP 6000 VR series. All IP-based cameras are centrally managed on the Bosch Video Management System (BVMS) and support security personnel by detecting threats and triggering automated alerts via built-in Essential Video Analytics. Outdoor cameras are able to withstand temperatures down to -40 °C during Changchun’s harsh winters. And to maintain a small data footprint while meeting the legal obligation for 90-day data storage, the cameras use efficient H.265 compression technology, thereby reducing bandwidth to a low 2 Mbps and storage space by up to 50 percent compared to other cameras. As a direct result, security managers in Changchun have been able to achieve savings in the number of networked storage units as well as energy consumption and cooling cost for the server room. Unified management of access control “The reduced bandwidth leading to a fewer number of storage cabinets in the server room was a major reason why our client opted for the Bosch solution,” said Mustaine Hu, Technical Support Manager at Bosch Building Technologies. The Building Integration System supports unified management of access control for airport personnel at 350 doorsMeeting another key customer requirement, the Building Integration System (BIS) from Bosch supports unified management of access control for airport personnel at nearly 350 doors. A combination of card reader and video security eliminates the risk of non-employees accessing critical areas with a stolen card and creates a seamless passage for authorised staff without additional screening. Bringing security full circle, the installed public address system allows security personnel to broadcast real-time announcements via more than 1,200 ceiling loudspeakers. The system ensures controlled evacuation in emergency situations and also sounds alarms triggered by connected intrusion sensors to alert personnel. Security for travellers and personnel Fully operative since the grand opening of Terminal 2, the Bosch system now provides end-to-end security for travellers, personnel and property at Changchun Longjia International Airport. As a scalable and IP-based system, it is future-proof to accommodate further expansions and has delivered cost savings on video storage and power consumption since day one. In face of China’s rapid economic growth, about 200 of the country’s 497 airports will require similar expansions over the coming years, making Changchun an important reference for Bosch Building Technologies in the region.
Johnson Controls announce that the aviation specific CEM Systems AC2000 Airport access control solution has been selected to secure the new Bahrain International Airport. The powerful CEM Systems AC2000 Airport software and industry leading CEM Systems hardware is being installed at Bahrain International Airport to ensure the highest level of integrated security and assist in controlling passenger flow across the airport. The contract was awarded by Thales and will be delivered by regional partner Tyco Fire and Security Middle East. Bahrain International Airport is the international airport of Bahrain, located in Muharraq, an island about 7 km northeast of the capital Manama. The airport is currently undergoing a $1.1 billion expansion that will boost the airport's capacity to fourteen million passengers per year. Resilient solution for aviation security “This contract to secure Bahrain International Airport represents another significant win for CEM Systems AC2000 Airport solution in the growing aviation sector in the Middle East region,” said Philip Verner, regional sales director, Building Technologies & Solutions, Johnson Controls. “The powerful CEM Systems AC2000 Airport has a proven record as one of the most reliable and resilient access control and security management solutions available for aviation security. It not only provides Bahrain International Airport with advanced access control throughout terminal buildings and airside/landside boundaries, but it also provides a range of software applications to enhance the airport’s onsite operations and increase business efficiency.”
Vega Systems Inc. has announced that their Redundancy Management Framework (RMF) software has begun operations at a prominent airport in the Middle East. The airport surveillance software plugin for Milestone XProtect enhances video security. Typically, without the software system, video surveillance down-times at critical infrastructure locations have the potential to create security loopholes. Vega Systems' RMF reduces live video disruption to milliseconds during server failure episodes while simultaneously providing uninterrupted access to all archived footage. This, along with other beneficial features, mitigates the impact of server failures on security. Vega Systems' RMF RMF is a novel, few-to-all approach towards enhancing XProtect Recording Server Redundancy through dual recording. A few redundant servers can handle concurrent failures of all primary servers. Offering a live view recovery almost instantaneously following the recording server failure, the system works two orders of magnitude faster than fail-over recording. RMF is a result of collaboration between Vega Systems Inc in San Jose, California, Sunjin Infotech based in Seoul, South Korea, and Milestone Systems' Middle East offices. The product is a plug-in framework for the Canon subsidiary Milestone Systems' XProtect software.
Traka has been specified at a main UK international Airport to deliver bespoke solutions for the safe management of replica improvised explosive devices (IEDs), alongside intelligent key management systems. The UK airport, which cannot be named for security reasons, uses replica IEDs for training purposes across its security network, to ensure correct procedures are being followed in the unfortunate event of a real threat. Security management using replica IEDs The importance of secure management of replica IEDs is integral, with recent well-publicised events having shown the major disruption caused by any unaccounted items, including an abandonment of the last game of the season for Manchester United in 2016. Traka, which already provides the airport with essential intelligent key management units, created a bespoke management locker solution for the safe storage of replica IEDs on site, to ensure they could only be operated by authorised personnel. The units present audit control capability and reporting on an instant basis with any units that do not get returned being instantly accountable. To have any replica IED device unaccounted for would have serious security implications for the Airport as a whole" Intelligent key management Says a Security Manager at the Airport, “To have any replica IED device unaccounted for would have serious security implications for the Airport as a whole, with a real possibility of closure and consequential mass disruption.” “With increasing numbers of passengers and noted global security threats, we cannot afford to take the risk and knew Traka could be called upon as the experts to provide a solution. The lockers not only provide an extra security dimension, but also ensure the smooth running of the Airport security. They enhance our training objectives as the audit control capability allows replica IEDs to be used across terminal staff, safe in the knowledge they will always be accounted for and returned.” The lockers support the Airport’s use of Traka solutions for intelligent key management Asset and vehicle tracking The lockers support the Airport’s use of Traka solutions for intelligent key management for security and engineering keys, alongside asset and vehicle control. Ben Farrar, Traka Market Development Manager added, “It is the focus of every Airport to deliver the best possible experience for passengers, while ensuring their absolute safety and security at all times. And in doing so, ensure staff can present all processes in a smooth and stress-free environment.” “Traka’s provision of bespoke locker solutions for the safekeeping of replica IEDs, alongside our intelligent key management systems as used by this Airport may only seem like smaller details in a complex security matrix. But they work together for the benefit of security teams to ensure effective management and automation, decreasing the likelihood of causing delays and disrupting the airport flow unnecessarily.”
As an innovator in airport security, Oakland International Airport (OAK) announced that it has installed the Evolv Edge, a physical threat detection and prevention system powered by artificial intelligence, to streamline its employee screening program. This installation enhances OAK’s security posture by protecting against metallic and non-metallic threats while simultaneously improving operational efficiency. Physical threat detection system OAK is committed to applying advanced, innovative solutions to complex security operations OAK is committed to applying advanced, innovative solutions to complex security operations. The TSA acknowledged this commitment by selecting OAK as a TSA Innovation Site, a prestigious distinction that promotes improved efficiency and allows the airport to try technologies to benefit its growing passenger and employee base. As the second busiest airport in northern California, passenger travel at OAK is on pace to surpass the 13.2 million travelers that passed through the airport last year. To accommodate this growth, more and more employees are being hired to work at OAK. Therefore, OAK began researching innovative solutions related to employee inspection methods and equipment. Evolv Edge provides OAK with the ability to screen employees for metallic and non-metallic threats with a fast, non-invasive process. Designed with built-in wheels for portability, OAK can easily move the system throughout the airport allowing maximum efficiency for its employee inspection program. Non-invasive employee screening With Edge, organisations, such as OAK, can adapt a risk-based security approach while balancing security with positive experience With this installation, OAK continues to be at the forefront of security through its use of modern technologies to combat today’s evolving threat landscape. By replacing traditional physical screenings with Evolv Edge’s precision, mobility and multi-threat detection capabilities, OAK can control access and respond to different threat scenarios quickly and efficiently. With Edge, organisations, such as OAK, can adapt a risk-based security approach while balancing security with positive experience. “With today’s threat landscape, the security perimeter has expanded beyond traditional checkpoints,” said Mike Ellenbogen, CEO of Evolv Technology and a 20-year veteran in aviation security. “Evolv Edge’s flexibility and portability provides Oakland International Airport with an added layer of security when it comes to employee screening. Oakland International Airport is always at the forefront of innovation, and we will continue working closely with their team to ensure success and safety.”
Though it has been statistically proven that taking a plane is no riskier than taking a bus, people do have reasons to put extra caution on air travel safety, especially in a time replete with terrorist threats. A major line of defence must be the various sections of the airports, which, as a gateway to the outside world and transportation hub of the city, has always been on the top of the safety list of the government and all related authorities. Dahua’s Airport Solution is an intelligent security system to help ensure the safety of the airports. Elements of an effective solution First of all, an effective solution requires a complicated collaboration of multiple (sub)systems such as monitoring system, alarm system, access control system, network transmission system and management platform. As is known to all, the more steps and players it takes, the higher likelihood for a mistake to occur. Secondly, airports include a variety of places such as terminal areas, parking lots, office areas, freight areas, front desk areas (including the square in front of the terminal building), the flight areas, hangars, the perimeter area and so on, each of which operate on vertical management system. Yet due to the diversity of places and the complexity of personnel & cargoes coming in and going out in huge flow, there are too many risky elements to control. Thirdly, it’s not only about accuracy but also about swiftness when it comes to airport security. Safety should bring efficiency and not the other way around. For example, in April 2017, a drone flew into Chengdu Airport, resulting in the runway closing down for 80 minutes, the loss of which was estimated as at least 10 million dollars, not to mention collateral damages in the broad sense. Dahua’s Airport Solution is a unified security system combining multifunctional HD surveillance cameras with deep-learning AI Unifying a security system Designed to solve all the difficulties mentioned above, Dahua’s Airport Solution is a unified security system combining multifunctional HD surveillance cameras with deep-learning AI that can analyse the big data to get the target, be it a car, a face or a series of numbers. In terms of vehicle management: you can adopt all-in-one cameras to capture and recognise license plates of vehicles accessing the airport. This will trigger the alarm when detecting illegal, stolen, blacklisted, hit-and-run, crime-related and other suspects’ vehicles. Covering the whole route of a vehicle, from entrance highway, to parking lots and then to exit, the surveillance system can effectively assist security guards and police to keep a smooth service, and respond quickly when things go wrong, even if it’s just something from the car that was left behind due to carelessness. In terms of passenger management, the same full coverage of the security system also applies to this, from someone stepping off the car to one’s entering terminal building and checking-in area and all the way to the last step to the boarding gate. The HD surveillance cameras endowed with deep-learning AI have world-leading accuracy in face recognition and e-passport verification. Any suspect, should they show up in the airport area, will at once trigger the alarm. Guarding the airport perimeter Dahua’s Airport Solution also takes care of another crucial part of airport that is the perimeter area. One must resort to special equipment like thermal imaging cameras to keep the safety of the said area. An example of this is Dahua’s solution for one specific airport, which covers a perimeter of 30 km and boasts an annual throughput of 30,000,000 people and 8,000,00 tons of cargo. According to the thermal imaging calculation form below: Dahua chose to use a 100mm lens with a resolution of 640 x 512 and set the installation height at 5M, which detects 1.8m x 0.5m, showing people from within 3000m. The perimeter will be well covered for intruder detection purpose with 10 cameras. The intelligent analysis of IVS (intelligent video system) requires 10 x 10 pixels, under which condition, each thermal imaging camera can detect and analyse objects from within 400m. There is in total 12km of perimeter length in need of such cameras, so Dahua chose to place 30 there, totalling 40 thermal imaging cameras to solve the problem. Advantages of using Dahua tech It should be noted that Dahua’s thermal imaging technology has the following advantages: PTZ function, long distance surveillance (which can detect a vehicle 8.8 km away), long distance zoom, binocular lens (optical and thermal imaging lens), and strong intelligence (which can detect intrusion). Compared to alternate perimeter protection equipment on the market today, such as vibration fibre sensor and IR beam sensor, thermal imaging camera has higher accuracy and less false alarm while directly providing video to verify. Dahua has established stable cooperation with world-renowned platforms like Genetec, Milestone, Avigilon, AXXON, ISS, infusing Dahua’s Airport Solution with more possibilities. Supported by strong R&D resources and good working relationships earned in multiple previous collaborations with partners, Dahua can ensure seamless integration whether it’s front-end IPC or back-end NVR, fulfilling different demands of clients and building a sound security system for the airport. In future, Dahua will keep investing in R&D of cutting-edge technologies into the realm of civil aviation video surveillance solutions. With a mission of “Safer Society, Smarter Living”, Dahua will continue to focus on “Innovation, Quality, and Service” to serve partners and customers around the world.