Airport access control
emaratech, a technology and management consulting company which is part of the Investment Corporation Dubai (ICD), is capitalising on its strong participation in the 2019 edition of Airport Show to showcase its collection of cutting-edge technology products, with the key highlight being the Smart Corridor, a first of its kind in the world product that is helping authorities in effective border control and ensuring seamless passenger experience at airports. As the pressure to effectively handle...
RealNetworks, Inc., global provider of digital media software and services, has announced SAFR for Security, a new solution that integrates SAFR, the world’s premier facial recognition platform for live video, with leading video management systems (VMS) to provide enhanced visibility and situational awareness for security professionals. Announced at ISC West in Las Vegas, SAFR for Security is immediately available for worldwide deployment. SAFR for Security Heads of security at hospitals...
People and vehicle access control specialist, Nortech is now offering long-range vehicle and driver identification tags to grant seamless access to approaching vehicles. Nedap TRANSIT reader range Designed to accompany the popular TRANSIT reader range from Nedap, the tags are ideal for use in staff car parks, for priority vehicle control, industrial site access control, fleet and parking management. Key features include simultaneous driver and vehicle identification, a reading distance of up...
Vorpal Ltd., developer of advanced, highly accurate geolocation solutions, releases a whitepaper in response to the growing global crisis facing airport operations and aviation security from commercial drones flying within controlled airspace. In order to guide effective and timely response efforts to such incursions, this document presents thoughtful analysis of the best technological solutions available for delivering complete drone situational awareness. Operational deployment Vorpal&rsquo...
Professionals visiting Airport IT & Security 2018 are invited to attend a seminar on how to optimise data from disparate systems in order to boost efficiency, improve passenger experience, and maximise investment in technology. In line with airport digitisation and unified operational centre trends, the session (14:10, Wednesday 5th December, Hilton Amsterdam Airport Schiphol) will look at how command and control software can be used to integrate and contextualise data from a wide range of...
Aiphone has announced significant improvements to its full IP IX intercom and security solution. The new and upgraded features built into the new IX2 series include improved audio and camera functionality, large touch screen monitors and communication with up to 9,999 door stations. IX2 IP intercom and security solution “With no server or licence fees, the IX2 system offers highly affordable P2P full IP video entry security, internal communication and multicast paging,” said Wyatt...
Axis Communications has continued to listen to industry needs and announces two new camera models for corner-mount usage, with specific design features to meet particular use cases. The AXIS P9106-V Network Camera Brushed Steel model has a design that is perfect for blending into the aesthetic in elevators, whereas the AXIS P9106-V Network Camera White model is ligature-resistant (also known as anti-ligature), ideal for, among others, the healthcare sector. The 3 MP cameras are specially designed for out-of-the-box optimised corner-to-corner coverage. They can cover up to 130 degrees horizontally and 95 degrees vertically, without blind spots. Overcoming challenges “For niche applications such as surveillance in elevators, interview rooms, and psychiatric wards, our clients face very specific challenges and seek to achieve specific benefits that are not commonly addressed by standard products available in the market” said Michael Chen, Global Product Manager at Axis Communications. Network audio can be added by pairing AXIS P9106-V with AXIS T6112 Audio and I/O Interface and its portcast technology, so it can also record dialogue “But thanks to our strong partnership network globally, we are able to work alongside system integrators and end-users to ensure our new cameras’ designs serve their needs and exceed their expectations in aesthetics, usability and durability. In our dedication to innovating and creating cameras for long-term use, we are proud to present these two new cameras that will help our clients utilise our technology in even more industries.” Recording dialogue with portcast technology The white ligature-resistant model eliminates the chances for vulnerable people, such as those in mental health care or police custody, to use the device for self-harm. Network audio can be added by pairing AXIS P9106-V with AXIS T6112 Audio and I/O Interface and its portcast technology, so it can also record dialogue, which is very useful in applications such as police interview rooms. Additionally, the camera can be re-painted to match any environment, decreasing the chances of it standing out and upsetting or irritating vulnerable persons. If the camera is defaced, its abrasion- and chemical-resistant front window is easy to clean with the help of detergents or simple graffiti remover. The brushed steel model is designed to blend in with elegant elevator environments, such as in high-class establishments in commercial environments. The camera benefits from no visible screws, adding to its elegant design feature. If the camera has been affected or targeted by vandalism, the durable front window is easy to clean or replace, as per the white model. IK10 and IP66 rated corner cameras Both models are IK10- and IP66-rated for protection against impact, dirt and water ingress Michael adds, “Specifically in the elevator application, customers expressed the cumbersome procedures involved if any camera maintenance would require access inside the elevator shaft. To address this, we have designed the camera to be fully accessible from inside the elevator, reducing maintenance time and costs, while keeping the camera compact and discreet, to blend into elegant spaces.” These new corner cameras are easy to install alone, thanks to innovative screw gaskets. They also come pre-focused, helping installers complete the set-up quickly and correctly, which decreases installation costs. Both models are IK10- and IP66-rated for protection against impact, dirt and water ingress. The hardened cameras are compatible with multiple connectivity options to allow installation in environments where infrastructure requirements are unique. Choose between: PoE, PoE over Coax, and PoE over 2-wire connections (separate connectivity devices required). The latter of these is common, e.g. in travelling cables along elevator shafts. The cameras will be available in Q4 2018 through Axis distribution channels.
NEC Corporation (TSE: 6701) announced an investment in Tascent, Inc., a U.S.-based biometric system company, with the aim of accelerating the global expansion of its safety business. The amount of the investment is not disclosed. Recently, the demand for multimodal biometric identification to further bolster security is rapidly growing. Within this environment, the iris identification market is expected to experience significant growth. NEC has been developing biometric identification technologies for more than 40 years, and systems using NEC's Bio-Idiom biometrics have been introduced through more than 700 systems in 70 countries and regions around the world. Moreover, earlier this year, NEC's iris recognition was named the world's most accurate by the U.S. National Institute of Standards and Technology, which has also recently named NEC's face recognition and fingerprint recognition technologies as the most accurate. Next generation iris authentication Established in 2015, Tascent provides multimodal biometric identification systems, with particular emphasis on the iris modality. The company's technologies include optical control technology to remotely capture an accurate, high-quality iris image at high speed, and a user interface (UI) technology that smoothly guides users in support of capturing accurate biometric information. Tascent's technologies are embedded in security systems widely used at airports, government agencies and enterprises around the world. This investment and partnership will enable the two companies to jointly enhance the capacity of iris recognition This investment and partnership will enable the two companies to jointly enhance the capacity of iris recognition, using Tascent's optical control and UI technologies and NEC's advanced biometric engines and create a next generation iris authentication offering for the public safety market. Accelerating multimodal biometrics applications "In NEC's 'Mid-term Management Plan 2020', the company positions its safety business as an engine for global growth and focuses on the development of this business," said Masakazu Yamashina, executive vice president, NEC Corporation. "Moving forward, NEC aims to expand its social solution business and further boost profitability by acquiring new customers, delivery resources, core technologies and business models through collaborations and M&A, while developing its own core technologies and solutions." "Tascent is excited to partner with NEC to develop world-class identity solutions and to accelerate the adoption of multimodal biometrics in government and commercial applications. The unique combination of NEC and Tascent technologies has great potential to address today's identity challenges, making life easier and safer for people around the world," said Alastair Partington, Founder and Co-CEO of Tascent, Inc.
EUSAS and Euralarm, hosted by Airbus, recently organised their second joint conference, which was this year on the topic of aviation safety and security. It showed once again the importance of technological development for an industry endeavoured to protect lives with a particular relevance to the aeronautics and air transport sectors. Aviation safety & security The US Federal Aviation Administration reports yearly over 100 false fire alarms on airplanes, resulting in unplanned landings and turn-backs. The consequences for passengers, airlines’ reputations and managing flight routes make the issue of false alarms a priority for the companies providing fire detection devices for airplanes – and this is just one example of the challenges of safety and security on airplanes. Several organisations and companies gathered for two days on July 11th and 12th in Bremen, the second-largest Airbus site in Germany, where airplanes’ wings and fuselages are manufactured. Airbus, the biggest aeronautics and space company in Europe and a worldwide leader in the sector, was the host of a series of lectures and presentations on fire detection, fire suppression, evacuation and security in the aviation sector. This event was jointly organised by the European Society for Automatic Alarm Systems (EUSAS), a group connecting academia and industry, and Euralarm, which represents the European fire safety and security industry. Fire detection technologies The event addressed the special challenges of fire detection and extinguishing in airplanes, airports and in the aviation industry. From the depleting extinguishing agent reserves worldwide, to the large number and sheer size of airport buildings and hangars, which require specific solutions on top of traditional fire detection technologies. Furthermore, are the financial and time constraints for compliance testing in an industry where efficiency and safety are a must. Detection systems must provide an indication to the flight crew within one minute after the start of a fire The criteria used for fire detection testing on airplanes are stringent. Detection systems must provide an indication to the flight crew within one minute after the start of a fire, but also be highly resistant to false-alarms. This has led the aviation industry to ask for the most advanced technologies to be used on aircrafts: such as multi-wavelength, multi-scattering angle photoelectric detection, a field at the edge of applied physics, and which was presented by Kenneth Bell, from UTC Aerospace Systems. Green fire suppression system Another issue for the industry is the replacement of Halon, a gas that has a high global-warming factor and attacks the ozone layer in our atmosphere. This fire suppression agent is used in cargo compartments, as well as for turbine fire due to its favourable characteristics. The production of Halon has now been discontinued and stocks of recuperated gas are rapidly declining. While Terry Simpson and Edda Liu from UTC Aerospace Systems presented the overall current progress on the replacement of Halon for fire extinguishing and suppression, Dr. Jan Boris Philipp, from Diehl Aviation, in Germany, presented an alternative green fire suppression system manufactured by his company. Computer-simulated airport evacuation Many solutions presented at the conference were based on computer simulations. Real life fire extinguishing tests on airplanes are part of the certification process of new airplanes. To avoid environmental consequences, a newly developed simulation technique presented by Airbus’ Dr. Konstantin Kallergis, can now predict the fire suppressant’s behaviour inside the cargo compartment. Project ORPHEUS allows the computer-simulated modelling of an airport’s evacuation, as well as smoke spread prediction in case of fire Another illustration was the research project ORPHEUS, financed by the German federal government, which was presented by Dr. Lukas Arnold, from the Institute of Advanced Simulation in Jülich, near Cologne. It allows the computer-simulated modelling of an airport’s evacuation, as well as smoke spread prediction in case of fire. The evacuation test concept of an A380 aircraft was impressively shown by Wolfgang Moeller from Airbus: all 850 passengers and crew members could escape the aircraft in significantly less than 90 seconds. Video-based detection technologies On the topic of airports and hangars, the width and height of the buildings is generally the main problem, as was explained by Securiton’s Stefan Brügger. Automation and integration of electronic safety and security solutions presented by Maarten Wings from Bosch, while Roland Voraberger from g+m elektronik, a company in Switzerland, provided a concrete example for the connection of voice alarm systems to fire alarm systems, which is not as straightforward in airports as it would be in smaller buildings. The challenges of fire detection in buildings with high-ceilings, which is a case for most modern terminals, or half open hangars could be overcome in the future with video-based detection technologies or thermal radiation-based fire detectors, presented respectively by Soeren Wittmann from Bosch and Dr. Simon Trippler together with Dr. Jörg Kelleter from GTE Industrieelektronik. Video is, of course, also useful when it comes to security with video analysis against intrusion in security zones being presented by Securiton’s Thomas Hermes and Michael Seidl, from the Frankfurt Airport, the busiest in Europe by cargo traffic. Adaptive Escape Routing Systems Finally, in a demonstration that stood-out by its focus on a non-technology related topic, Dr. Sebastian Festag, representing Germany’s electronic industry association ZVEI, explained the concept of Adaptive Escape Routing Systems and shows why human behaviour is of major significance in an optimised evacuation and guidance strategy. The solution to fire and security challenges in aviation clearly lies in cutting edge technologies and research on fire safety and security, as well as in the standards, which sometimes lag behind the technology. Dr. André Freiling, from Airbus, a speaker at the event, noted that some standards used to testing smoke detection in aircrafts for example can date as far back as 1994.
In real life people usually don’t want to get into the drama of being seen as someone other than themselves. The misrecognition problem is not only time consuming, dignity compromising but also, in lots of cases, life threatening, if certain dangerous people are not correctly identified in time. This mistake is no longer affordable in today’s context, whether for an individual, a group or society as a whole. Fortunately, the facial recognition technology has matured, and the security solution based on the said technology is being widely used across the world. Dahua Technology, a premier solution provider in the global surveillance industry, is especially good in this realm as has been proved by multiple championship and new records in major international challenges, including Multiple Object Tracking Challenge, the KITTI 2D Object Detection Evaluation 2012, KITTI Flow Benchmark, Task [Word Recognition] of Incidental Scene Text Challenge and Born-Digital Image Challenge. A Smart AI algorithm optimises the image captured in multiple angles or blurred in motion and translates the face feature into a digital model Dahua facial recognition It is necessary to explain some basic rules concerning how facial recognition works before the tour to see how Dahua Technology’s products & solutions are applied in various daily scenes. Simply put, big data is useless if the accuracy and efficiency of facial recognition has not been improved to a certain level. The face detection, whether from a snapshot or from a stream of video, requires not only a high-quality camera but more importantly, a smart AI algorithm that optimises the image captured in multiple angles or blurred in motion and translates the face feature into a digital model which can be crosschecked in the database. The whole process, from taking the picture to comparison, takes as short as 300ms. Suppose there's Tom, a middle level manager in his mid-30s. Let’s follow Tom for a day and see how Dahua Technology’s facial recognition solution plays its role in his perfectly ordinary life. Building security system Tom hurried to his company on the 30th floor of a class A office building, the kind with additional barriers in the lobby between the front gate and elevators. There were long lines in front of the access control machines. Tom reached into his pocket and found unfortunately his access card wasn't there. But Tom should worry no more because the building had just updated the security system with Dahua’s facial recognition solution, which overcame various shortcomings of traditional ways of card or fingerprint scanning, including low efficiency and inadequate security. Compared to a card, apparently it is much less likely for one to lose/replicate/borrow a face. And the access control was no longer a gamble if one's fingerprint works. The powerful cameras with deep learning AI, detect the faces and digitalise the features and compare them purely through numbers Deep learning AI detection Here’s exactly how Dahua’s facial recognition solution works in this scene. The powerful cameras blessed with deep learning AI, detect the faces and digitalise the features and compare them purely through numbers with the ones in the database which takes less than 1 second. The beauty of the solution goes both ways since the company no longer needs to make a card or import finger prints for the newly employed but simply upload their photos into the database that contains up to 10,000 faces. Besides offices, this solution can also be applied to any place that has a high standard for access control, like customs, schools, residential communities, etc. Smart access solution Tom stepped into a bank. On behalf of his company, Tom had some serious business to discuss with the bank, which, at this hour, was full of people. And before Tom started to worry about the time to be spent waiting and if he could make it to the next meeting on time, he heard his last name called and was led into the VIP room. Now how did the bank manage do that? Not by human efforts for sure. No clerk could remember each and every face and match it with a particular name and particular business without making any mistake. That’s why a facial recognition solution is essential to the business. The immediate detection of a VIP face could be easily matched with the white list in the database. No delay or misidentification and all VIP treatment. This goes not only for banks. Hotels, hospitals and casinos alike will also benefit from this solution that secures the proper respect those exceptional customers deserve. Preventing unauthorised access Tom went to the vault of the bank for the first time in his life. He was happy that now he was trusted by the company with such important mission. He walked fast and went in front of the escort. But before he could raise his hand to touch the door of the vault, a warning siren was triggered. The escort, with a reassuring smile, caught up and patted on Tom's shoulder and explained the whole situation to him. No unauthorised personnel could intrude the sensitive areas blessed with Dahua’s facial recognition solution No unauthorised personnel, be it Tom or Jerry, could intrude the sensitive areas blessed with Dahua’s facial recognition solution. The face captured and automatically optimised by the camera would be put into real time comparison with the authorised faces in the data base and the low percentage of similarity, from a pure mathematical point of view, would immediately trigger the alarm. Other limited access areas like labs and archives will also enjoy better protection with this facial recognition solution. Security identification management After a long day’s work, Tom went to see a football game with a friend. The show began even before they entered the stadium because they saw an infamous football hooligan got rejected and taken away outside the entrance gate. Tom, who had been through plenty of adventures during the day, kind of figured out what happened. And Tom’s friend, who happened to be an employee of Dahua Technology, took the chance to explain how Dahua’s facial recognition solution informed the security force to deal with any persona non grata on the black list as soon as they showed their faces. Of course, this solution could be widely applied to other areas like airports, train stations, or in other words, city management. So, this was a day in Tom’s life, which was endowed with some dramatic coincidence but totally realistic in every scene. These examples were far from exhaustion of all the possible applications of Dahua facial recognition solution that fully activates big data gathered and thus spawns a great many creative applications in terms of security and business, resulting indeed into a Safer Society and Smarter Living, as has always been envisioned by Dahua Technology.
STANLEY Security, global manufacturer and integrator of comprehensive security solutions for a wide range of industries, has announced a partnership with Shooter Detection Systems LLC (SDS), major gunshot detection solutions provider. As an authorised dealer, STANLEY Security is now certified to sell, install and service SDS products and services. SDS’s Guardian Indoor Active Shooter Detection System combines acoustic gunshot identification software with infrared gunfire flash detection for a fully automated gunshot detection and alerting solution. The Guardian System immediately detects gunshots and simultaneously alerts building occupants and first responders within one second and with zero false alerts. “We understand the importance of having a fully comprehensive security system, including gunshot detection, and we are committed to this technology and all the individuals, campuses and businesses it can help to keep safe,” said Brad McMullen, Vice President Marketing and Product Solutions, STANLEY Security. “Being able to activate an alert and notify emergency personnel in near real-time during a crisis is critical. Additionally, integrating this technology with video management and access control systems can provide our customers with more robust incident response plans.” STANLEY has been a leader in security for decades, and we are excited to partner with a global company so well-known and respected in the industry" Improved emergency response time The Guardian System processes all gunshot data within the sensor, removing the need for human interpretation or intervention and saving time when seconds matter most. When a shot is detected, the Guardian System instantly alerts users to the location of shots on a mapping interface and simultaneously sends this information by SMS text message, email and via other third-party alert systems. The Guardian System has been installed throughout schools, businesses, airports and other public and private buildings and has over 20 million hours of operational time with zero false alerts. With the Guardian System, critical information is immediately relayed to building occupants and emergency personnel so that proper steps can be taken to control the situation as quickly as possible. “STANLEY has been a leader in security for decades, and we are excited to partner with a global company so well-known and respected in the industry,” said Dan Michelinie, Sr. Director of Sales & Business Development, Shooter Detection Systems. “As the number of incidents continues to increase at an alarming rate, the joint presence of SDS and STANLEY will allow this advanced solution to reach more schools, businesses, hospitals and ultimately, improve emergency response time.”
Qognify, a big data solutions provider for physical security and operations, announced that it will introduce ACI, an Access Control Insights solution, during ISC West 2018. Using machine learning data analytics, Qognify ACI uses smart pattern recognition to transform data from access control systems into information that can be used to improve security and operations. Access control systems (ACS) are a central component in security management, holding a wealth of data with significant operational impact. Qognify ACI reveal the information within this data to answer and address daily security challenges. Is a certain unauthorised access a mistake, or an attempted fraud? Is a door-open-too-long an innocent overlook, or a threat from internal/external sources? Is a card holder access late at night a regular course of business or a suspicious action? Should this person be accessing this location so frequently? Being able to effectively differentiate one from the other can be sometimes impossible and certainly critical in a busy operations or security control center.With Qognify ACI, organisations will benefit from smart pattern recognition, a reduction in fines, improved safety and security Machine learning-powered analytics Qognify ACI utilises machine learning data analytics to extend the value of investment made by organisations in their access control systems: Card holders’ activity information is monitored and analysed continuously, yielding individual behavior patterns. Consequently, out-of-the-ordinary behaviors are reported via alerts. Business logic rules are utilised for improved response to critical alarms. With Qognify ACI, organisations will benefit from smart pattern recognition, a reduction in fines (where access breaches are regulated and penalised), improved safety and security through an insightful sensor inspection plan and adherence to compliance with organisational security plans. Door security for airports A strong example of the potential benefit is shared by an international airport in the United States which is deploying Qognify’s ACI. According to TSA’s regulations, in every door-forced-open case, airports have three minutes to arrive to the location, 12 minutes to report and 15 mins to close the incident. After that, TSA must be notified of a security breach. While it may sound very simple to use the mass notification system, in reality, out of dozens of door breaches per day, there are about 10% of where the case isn’t closed within these 15 minutes. We sometimes just get too busy and miss the mark.Qognify Packaged Solutions provide organisations with access to powerful capabilities with minimal installation and faster deployment Every time this happens, an investigation with the TSA is opened, and the airport might be fined. Having a solution that will enable us to address this specific issue, can save the airport hundreds of thousands of dollars in fines annually. Qognify Packaged Solutions Qognify’s ACI is the first among a range of packaged solutions to be launched. These are pre-designed and pre-configured bundles designed to address common and specific operational or security-related challenges, using the intelligent capabilities of the market-leading Qognify portfolio, including Situator, OIC (Operational Intelligence Center) VisionHub and video analytics. Qognify Packaged Solutions provide organisations with access to powerful capabilities, with minimal installation, faster deployment, and short time to value. This enables organisations to accelerate their adoption of targeted solutions addressed to solve a specific challenge while having the reassurance that the solution can scale at any time, as it demonstrates clear return-on-investment and value to the business.
As anyone who has ever flown on a commercial airline since 2001 knows, security measures at airports are well enforced and the emphasis on traveller safety is all around the airport and its grounds. Mass transportation, meanwhile, presents a special but not any less significant challenge when it comes to determining security issues. These facilities need to develop the means to protect a constantly changing and large population of passengers. And unlike airports these facilities often have hundreds of points of entry and exit on multiple modes—buses, subways, light rail, commuter trains, even ferries. About 2 million Americans will use the nation’s airways on a given work day, while 35 million people will board some form of public transportation. In fact, statistics have shown that nearly 11 billion trips are taken on public transportation every year. In some large metropolitan areas in North America where mass transit is well established, more than 20 percent of the area’s inhabitants get around via public transportation.About 2 million Americans will use the nation’s airways on a given work day, while 35 million people will board some form of public transportation Solving mass transit security For transportation officials and their security providers, solving the mass transit security issue begins with determining the key concerns and then creating the proper responses via security systems, policies and procedures to mitigate the risks. Although vandalism and graffiti are very visible signs of criminal behaviour in mass transit settings such as bus stops and subway stations, this is not where transportation officials typically focus their energy. Fences and gates can secure out-of-service buses and train cars, as can remote surveillance methods to keep such vandalism at a minimum. Instead, it is the day-to-day safety and security of transit riders and employees that should become the highest priority. This begins with creating the safest environment possible that is highlighted with appropriate signage and, when necessary, audible warnings, and supporting that with technology, such as surveillance cameras, that will document what has happened if an incident occurs.Analytics can also be useful in alerting security about other suspicious behaviours at a transit stop, such as an untended bag or package Crime prevention in transportation Analytics can also be useful in alerting security about other suspicious behaviours at a transit stop, such as an untended bag or package Incidents of concern within a transit setting can take several forms, ranging from legitimate accidents or crimes to false claims such as faked fall down the stairs to potential and actual suicides. Bus and subway stations also have become magnets for homeless people who may put themselves and others in harm’s way by trying to access less secure public areas within a station as temporary shelters. If someone is injured on a subway platform and the transit provider is held liable, it could be on the hook for hundreds of thousands, if not millions of dollars. Suicides are a major concern for operators, with personnel now being trained to look for individuals who seem distressed, are loitering in the area or are intentionally putting themselves in a dangerous situation, such as standing too close to the edge of a platform. The deployment of video analytics, which can be programmed to send alerts when certain pre-set actions occur, can help determine when such dangerous behaviours come into play. Analytics can also be useful in alerting security about other suspicious behaviours at a transit stop, such as an untended bag or package or a person going into a restricted area. Whether it is on the bus, train or ferry or at the stops themselves, cameras and intuitive video management systems are the key to both active and forensic transit security. Some cities use buses that are up to 60 feet long and those can be equipped with up to a dozen cameras Train security and safety By using the proper cameras and recording systems in a transit environment, quick-acting personnel can locate a person of interest who boarded a train at one station, follow him during his trip and produce a crisp, clear identifiable image at the end. Those setting up the system thus should keep in mind proper camera positioning, resolution and motion-based changes to framerates or other compression settings. A typical 30-foot bus often has six cameras—one each at the front and middle doors, two more within the bus and then one looking forward and another looking behind the bus. The latter two are important in the event of accidents to verify liability. Some cities use buses that are up to 60 feet long and those can be equipped with up to a dozen cameras.Train stations often deploy high-definition cameras to better support facial recognition software to get that actionable image Train cars are similarly equipped with two to four cameras to view activity down the centre aisle. Within the stations themselves, there can be from 15 to 30 or more cameras capturing wide-angle shots. Train stations, which have a restricted point of egress, often deploy high-definition cameras to better support facial recognition software to get that actionable image. Installing the right technology for the solution Although bandwidth and storage can be a concern, with motion-based recording, the resolution can be bumped up during event, resulting in a 1-megapixel stream jumping to 4 or even 8mbps when needed. By changing the resolution on demand, end users can cut their storage needs significantly. Transportation settings often rely on the same technology used in other security installations, primarily mini dome cameras, although there are some mini transit domes built specifically for the environment with the proper aesthetics. Because of vandalism threats, transit typically avoids pendant mounts, which can be more easily grabbed and damaged. Temperature ratings for cameras also come into play in cold climates with cameras often getting outdoor exposure.Today’s new buses and trains are constructed with the cameras onboard and newer stations also take security into consideration at the earliest design stage As trains and buses move along their routes, especially those that service outlying areas, Internet connectivity becomes an issue as well. Because it may be difficult for video to be sent in transit, security bus barns are equipped with Wi-Fi so video from onboard cameras can be downloaded at the end of the day. And the use of hardened recorders at the stations allows security personnel to retrieve recorded video. Transit security with modern technology Today’s new buses and trains are constructed with the cameras onboard and newer stations also take security into consideration at the earliest design stage. Older infrastructure from long-standing subway and bus terminals can prove to be a challenge when adding security, but these issues aren’t insurmountable. Often the solution is to add more cameras to cover the same square footage because of less-than-ideal sight lines and to place conduit wherever it works best, which may mean positioning it under platforms or in other out-of-the-way places within older stations. Looking ahead, transit security will continue to evolve, not only as new stations and modes of transportation are added to the system, but in terms of communicating with commuters. People can expect to get mass notification alerts on their mobile devices, and those same devices can provide vital data to transportation entities to better develop their overall systems.
Biometric identification technologies today are becoming pervasive. Many smartphones offer fingerprint unlock options, and most organisations have at least considered the technology as a solution for their identification and access needs. While biometrics have dramatically improved in the past several years to deliver faster, more efficient and more secure solutions, not everyone is ready for the change. New York MTA case study But does that mean that organisations need to hold off on implementing biometric solutions? Or do they need to ‘force’ it upon users? A historic case study provides an excellent example of how to implement a new technology with millions of people, under pressure, allowing users to adapt slowly and the organisation to reap the benefits. In 1953, New York Metro Transit Authority (MTA), one of the world’s largest mass transit systems, began using tokens as payment for subway rides – a solution to engineers’ problem of creating a machine that could accept different types of coins for the new 15-cent fare. This technological advancement that may seems almost archaic today, served the MTA well for 40 years before the introduction of the MetroCard - a lighter, more automated solution. Technology adaption works Yet, the MTA, despite positive results from its first implementation in 1993, had both the older tokens and the new MetroCards in place, simultaneously for a full decade until 2003. This allowed “early adopters”, who understood the advantages of the MetroCard, to switch over, while allowing those that preferred their ‘trusty’ tokens to continue using them. In 2003, when tokens were finally phased out for a MetroCard-only system, only a small percentage of commuters were still using tokens; most had realised the significant benefits to the card and had switched over of their own volition. The MTA example serves as a model for how technology adoption works. From tokens to MetroCards, fax to email, landlines to cellphones –there is a distinct process new technologies go through as they are introduced and ultimately adopted by the public. Biometric technologies are no different. Yet, organisations must find way to implement new biometric systems that simultaneously provide organisations with the significant advantages biometrics offer, while ensuring that users are given time to adapt to and adopt the new technology. Let’s look at a few practical strategies for biometric adoption: 1. Optional, with added value Many facilities, such as airports, stadiums and theme parks, already use biometric technology to create ‘express lanes’ to save time and improve efficiency. Frequent fliers, VIPs and season ticketholders can enjoy faster and more personalised service with biometric identification solutions. These users can still opt to be identified the old-fashioned way, with an ID card or ticket, but doing so means they will have to line up and wait their turn as the old methods are much less efficient than biometrics technologies. Airports, stadiums and theme parks already use biometric technology to create ‘express lanes’ to save time and improve efficiency Biometrics can also be used to improve the customer experiences, or create more tailored, personalised programs. For example, the ICER (Industry, Culture, Education and Recreation) Innovation Center in the Netherlands implemented biometric visual identification technology to create customised experiences for museum visitors that were fun and interactive. Visitors could choose not to take part in the biometrics-enhanced visit and experience the baseline version of the museum, but by utilising the biometric system, museum goers are offered a tailored experience where exhibits and information are presented based on what a visitor has already seen in the museum. 2. Start with biometrics in optional locations Not all services or locations in a corporate setting are mandatory for employees to visit. For example, employee centers or health and wellness facilities are social settings for individuals to relax and connect. Implementing biometrics-based identification solutions in these types of settings allow employees to interact with the new technology in a low-stress environment and only if they choose to. For example, companies can provide an option for employees to pay for meals at corporate cafeterias using biometric identification, saving break time for those who choose to adopt the technology and enabling them to skip longer payment lines. This has the added benefit of reducing fraud resulting from lost or stolen ID cards. 3. Educate users in advance To ensure smooth deployment and adoption of biometric technology – whether partial or full – it is important to ensure that new users are educated on the new technology in advance of its deployment. For example, employees may have privacy or data security concerns. It’s critical that organisations clarify that the data being collected is kept private and secure. This information can be imparted in several ways. Organisations should be as transparent as possible and provide employees with enough information to address concerns. A Town Hall meeting can be held to explain benefits of the technology and answer questions that new users might have. Providing educational materials to new users, such as letters or videos that explain the new technology can put employees at ease. Make sure to outline how data privacy will be ensured as well as the benefits that employees stand to gain. Have management lead by example and be the first to enroll in the biometrics system. This can help inspire confidence and trust in the system. Make implementation competitive and fun. This can help users who aren’t as excited about the technology take part and learn about it. Implementation of biometric technology can still allow individuals in an organisation a choice of whether or not to partake. Over time, most people tend to adopt new technology by choice if it saves time and makes life easier. When considering biometric systems, keep in mind that it doesn’t necessarily require full adoption now and can coexist with other systems until users feel comfortable with the system, and recognise the benefits it provides.
With the changing “lone wolf” style of terrorism, there will be a trend toward many more installations of vehicle access control systems and smaller numbers of units. Where a university, military base or airport might have 20-plus systems scattered among its grounds, there will be a growing number of smaller applications needing one, two or three systems. These will include customers such as primary and secondary education facilities; pedestrian locations such as shopping centres, concert grounds and fairs; hospitals and other venues where pedestrians come together both daily or temporarily. Defending against vehicle attack The Middle East is a particular hotbed for increased security measures for explosive-laden vehicles. Many soft targets in the Middle East have also been adding anti-terrorist, crash-resistant barriers, barricades and bollards. This has been also true in Europe while Southeast Asia is coming on strong. With so many more such systems being ordered, buyers will need to become more aware of their supplier's customer service and technical support. The market could be faced with an upcoming slew of cut-throat, unscrupulous operators providing shoddy equipment and dangerous installations that take advantage of buyers who don't understand what is truly needed to defend against vehicle attack. Importance of certified vehicle barriers This time last year, we projected that the use of vehicles as weapons to mow down pedestrians, such as occurred in Nice (France), would probably impact greater sales of Delta portable crash-rated barricades. Although it was announced by ISIS that their followers should undertake more of these attacks, we don't think anyone anticipated the numbers of such atrocities we would see, the latest (as of this writing) the assault on the bike path in New York City. The largest customers around the world have been law enforcement agencies and municipalities. Security specialists needto be aware of vehicle threats wherever people are gathered Last year, we also warned that many organisations, in order to save money, were purchasing non-certified (non-rated) vehicles access control systems with less structural safety than those provided by certified manufacturers. The reality is that somebody is going to have to be hurt or killed before some buyers understand that a barrier, barricade or bollard is not a commodity type of product. Security specialists must be aware With the economy being better, there has been a resulting increase in sales of products for general parking and similar applications. But, as terrorist attacks have gone from large planned scenarios to smaller lone-wolf assaults, such as the bike path incident in New York, there is an increasing need for more protection from vehicle harm in more places. Basically, security specialists need to be aware of vehicle threats wherever people are gathered, from a parade route to a fair, sporting event, shopping centre – anywhere scores of people are clustered. One of the interesting statistics we ran across this year was that, in the United States, six of the top 10 rated college football teams use Delta temporary barricades to protect fans at their stadiums on game days. During 2017, Delta has been developing new products to take on the increased protection of vehicle checkpoints between the United States and Mexico. Over the years, Delta has implemented vehicle crossing protection at many of the most secure sites including El Paso, San Ysidro, Calexico, Otay Mesa and Tornhill-Guadalupe.
Several recent terrorist and mass violence attacks have been directed at soft targets, or relatively unprotected locations where people gather such as outside a music venue or in the unscreened passenger areas at airports. Attacks in public areas have led to the development of new security technologies aimed at protecting soft targets. One company addressing the challenges is Evolv Technology and its Edge automated high-speed personnel screening solution. The system integrates walkthrough firearm and explosive detection for high-throughput protection of events and soft targets.The Edge system has multiple detection sensitivity settings to respond to various threat scenarios Enhanced visitor experience The system seeks to increase security without compromising the ‘customer experience’. People simply walk through single-file – between two 5-foot-tall stanchions. One lane can screen up to 800 people per hour, and the system detects explosives or metallic objects without the need for pat-downs or wands or other invasive procedures. Any personal belongings can remain in visitors’ pockets. A single security guard is needed for each lane to verify any detected threats. “The system combines an improved security posture with a better visitor experience,” says Mike Ellenbogen, CEO of Evolv Technology. “We need to fly and have been trained to be screened at the airport, but we don’t expect to be screened going to see a ball game or a Mozart concert. Evolv recognised a need for a new way to inspect people before they enter these types of facilities. It’s a seamless system that pulls various technologies together. We want to feel safe but without having to sacrifice the quality of the experience.”Screening analytics provide data on the numbers of people screened by time of day and by result The system combines millimetre wave and magnetic field sensors, along with artificial intelligence (AI)/ machine learning and can incorporate additional data such as biometrics. Known bad actors can be identified using facial recognition. The system has multiple detection sensitivity settings to respond to various threat scenarios. Expanding perimeter protection A security guard provides the human touch by verifying any threats detected by the system. The locations of concealed items are displayed on a photo of the individual using a color-coded box overlay. Screening analytics provide data on the numbers of people screened by time of day and by result. Ellenbogen says the company is working to have the system adopted at entertainment venues, performing arts centres, sports centres, for air and rail transportation, and to protect high-profile government buildings. The Edge system can expand the protected perimeter to a wider area that was previously unprotected. The Edge system can expand the protected perimeter to a wider area that was previously unprotected For example, concert-goers exited the arena of an Ariana Grande concert May 22, 2017, in Manchester, U.K., and entered the surrounding area that was unscreened and unsecured. Placing a user-friendly screening system around a wider perimeter outside the concert venue might have prevented the use of an improvised explosive device in the terrorist attack.Placing a user-friendly screening system around a wider perimeter outside the concert venue might have prevented the use of an improvised explosive device in the terrorist attack Threat mitigation with soft target approach Likewise, a 2016 bombing at the Brussels Airport occurred in the departure hall outside the passenger screening areas. Securing a wider perimeter – for example, screening customers discreetly as they enter the airport building from a parking area – could have provided additional security against such an attack. Ellenbogen confirms Evolv has sold a number of systems to major European airports to screen visitors and passengers as they enter the front door. “Addressing the threat to an airport or train system is different than screening passengers; we are looking for different types of objects and different types of materials. The idea is to be able to detect threats to a venue before they get into the venue.” The soft target approach can also be applied to public buildings, such as courthouses, and used in lieu of more invasive metal detectors and x-ray machines. The portability of the Edge system enables a ‘pop-up’ approach to security – i.e., to relocate the system to address specific or changing security threats easily. The self-contained system only requires a wall plug. Labour reduction (because of faster throughput) can help offset the system costs but it’s difficult to quantify the improvement in the visitor experienceImproving security posture at event venues “It’s surprising the level of importance [venue owners] put on the visitor experience,” says Ellenbogen. “They see that their brand starts at the front door. They are eager to find alternative security solutions that come across as more inviting, less imposing, less closed down, less invasive than the solutions they have been using,” he says. “They are driven by a desire to improve the visitor experience as they improve the security posture.” He says current events, including terrorist attacks and mass shootings, drive awareness among venue owners to improve the security of soft targets. “The level of interest is high, and it spikes somewhat when there is a big headline,” Ellenbogen says. He notes that the system is more expensive than a metal detector, but about a third the cost of familiar airport body scanners. Labour reduction (because of faster throughput) can help offset the system costs, but “it’s difficult to quantify the improvement in the visitor experience,” Ellenbogen says.
Technology is a valuable tool for increasing security, but occasionally technology can create a threat. An example is the threat 3D printing technology poses to one of the most mature security technologies, mechanical locks and keys. The ability of 3D printing to duplicate keys presents new challenges for lock manufacturers, and new vulnerabilities to end users. Keys that could previously only be duplicated by skilled thieves can now easily be copied using off-the-shelf technologies and information widely available on the Internet. In this case, technology offers a solution, too. A new kind of key cannot be duplicated by 3D printing. Ironically, it is manufactured using 3D printing techniques. UrbanAlps Stealth Key A Swiss company called UrbanAlps has introduced the Stealth Key, a key that is designed and manufactured from the inside out. The mechanical elements that enable the key to uniquely open a matching lock are hidden away inside the key beneath a pair of narrow ledges, where they are not susceptible to being scanned and duplicated using 3D printing. UrbanAlps offers a range of cylinder locks and keys based on the Stealth Key concept. A high-tech padlock incorporates additional security features such as a shrouded shackle to avoid cutting, anti-drill capabilities, and resistance to lock picking. Stealth Keys are made using 3D printing and a laser to fuse together successive layers of metallic powder added in a manufacturing process called "successive layer melting." Manufactured from the inside out, complex internal features are "printed" and then covered over later with a solid layer that shields the complex inner workings from being duplicated. Unveiled at the Intersec show in Dubai earlier this year, the Stealth Key is aimed at retailers, hotels and other commercial entities. It is less expensive than other technologies designed to shore up the security vulnerabilities of 3D printing, such as keys that combine both mechanical and electronic components. The company’s website touts “simple and affordable key copy protection.” Unveiled at the Intersec show in Dubai earlier this year, the Stealth Key is aimed at retailers, hotels and other commercial entities 3D printing challenge Locks and keys are among the oldest security technologies, dating back to Egyptians and the Romans. Their value has been proven over the centuries and they continue to provide security in many applications, even in today's high-tech environment. However, 3D printing presents a challenge. 3D duplication became a high-profile problem in 2015 when 3D printable computer-aided design (CAD) files for Transportation Security Administration (TSA) master keys were published on the Internet. Those are the keys used by airport security staff to open private suitcases for inspection. The files allow the keys to be duplicated and used to successfully open TSA-approved locks. The hacking of security systems is nothing new—most electronic security systems have been hacked, or have the potential to be hacked in the future. Increasingly, security involves an ongoing one-upmanship between the good guys and the bad guys – the programmers and the hackers, the white hats and the black hats – whether the technology is computer systems or even the locks and keys that have been around for centuries.
The reason for long lines at U.S. airports is that the airlines now charge fees for checked bags. It’s as good an explanation as any of why airport passenger screening lines suddenly and mysteriously grew out of control during May (and then became manageable again in June). It’s not the only explanation floating about – there’s plenty about high travel volumes, Transportation Security Administration (TSA) personnel shortages, etc. etc. – but it’s the one that appeals to the disgruntled traveller in all of us. In the absence of definitive answers, why shouldn’t two of the biggest gripes we all have with air travel – luggage fees and long security wait times – be a case of cause and effect? I acknowledge the oversimplification. However, in addition to its obvious appeal, the explanation also has a germ of truth, and skipping past the details, it’s the government’s fault! US government negligence towards TSA officers Specifically, the U.S. government has levied a 7.5 percent excise tax on airplane ticket prices. However, the tax doesn’t apply to baggage fees. In effect, there is an incentive for airlines to lower ticket prices (subject to the tax) and implement or raise baggage fees (which are not) to offset the reductions. The approach gives travellers a specific incentive (say, $25) to carry their bags onto the plane rather than check them before going through the screening area. More bags clog up the operation, thus delaying airport screening. Absent the federal tax, it makes sense to “bundle” the charges into a higher ticket price rather than charging separately. Hence the argument: It’s the government’s fault! Experts say a roughly 10 percent reduction in screening personnel has coincided with a 15 percent increase in passenger volume, contributing to the recent crisis There are other possible explanations that are also the government’s fault, from not enough overtime pay for TSA-employed screening officers, to insufficient staffing of screening checkpoints. The leader of the union that represents TSA officers says Congress has “starved TSA of the resources it needs to meet growing demands at our nation’s airports.” Experts say a roughly 10 percent reduction in screening personnel has coincided with a 15 percent increase in passenger volume, contributing to the recent crisis. Nobody likes to wait two hours (or more!) in an airport screening queue, which was the unfortunate situation that flooded news reports during much of May. Attempted solutions add to airport security check delays And some of the proposed solutions seemed to contribute to the problem. For example, a new automated technology – so-called Innovation Lanes – provides expedited screening processes and promises to move passengers through the system more quickly. However, it was the installation of the new equipment at a security checkpoint in Atlanta (during which the checkpoint was closed) that contributed to some of the more extreme wait times in May. Another proposed solution is the TSA PreCheck lanes, where prescreened passengers get to speed through wearing their belts and shoes. But fewer than the projected number of passengers opted to pay the $85 fee for the programme, and some observers have suggested that resources devoted to screening PreCheck passengers could do more overall good if reassigned to screening the masses. “I got here two and a half hours before my flight, and security took two to three hours to get through,” one traveller recently told a TV station in Chicago. In March, TSA Administrator Peter Neffenger said wait times had nearly doubled over the previous year. Not to mention reports of data showing that TSA agents fail 95 percent of security tests involving passing weapons through security. For now, the problem seems to have abated, and airport and TSA officials were congratulating each other all around after average wait times improved drastically over the Memorial Day holiday weekend. A new TSA 10-point plan (more officers, overtime, canine teams, etc.) is being implemented. But what about the upcoming busy summer travel season? We may not have seen the end of those long security wait times…
Johnson Controls announce that the aviation specific CEM Systems AC2000 Airport access control solution has been selected to secure the new Bahrain International Airport. The powerful CEM Systems AC2000 Airport software and industry leading CEM Systems hardware is being installed at Bahrain International Airport to ensure the highest level of integrated security and assist in controlling passenger flow across the airport. The contract was awarded by Thales and will be delivered by regional partner Tyco Fire and Security Middle East. Bahrain International Airport is the international airport of Bahrain, located in Muharraq, an island about 7 km northeast of the capital Manama. The airport is currently undergoing a $1.1 billion expansion that will boost the airport's capacity to fourteen million passengers per year. Resilient solution for aviation security “This contract to secure Bahrain International Airport represents another significant win for CEM Systems AC2000 Airport solution in the growing aviation sector in the Middle East region,” said Philip Verner, regional sales director, Building Technologies & Solutions, Johnson Controls. “The powerful CEM Systems AC2000 Airport has a proven record as one of the most reliable and resilient access control and security management solutions available for aviation security. It not only provides Bahrain International Airport with advanced access control throughout terminal buildings and airside/landside boundaries, but it also provides a range of software applications to enhance the airport’s onsite operations and increase business efficiency.”
Vega Systems Inc. has announced that their Redundancy Management Framework (RMF) software has begun operations at a prominent airport in the Middle East. The airport surveillance software plugin for Milestone XProtect enhances video security. Typically, without the software system, video surveillance down-times at critical infrastructure locations have the potential to create security loopholes. Vega Systems' RMF reduces live video disruption to milliseconds during server failure episodes while simultaneously providing uninterrupted access to all archived footage. This, along with other beneficial features, mitigates the impact of server failures on security. Vega Systems' RMF RMF is a novel, few-to-all approach towards enhancing XProtect Recording Server Redundancy through dual recording. A few redundant servers can handle concurrent failures of all primary servers. Offering a live view recovery almost instantaneously following the recording server failure, the system works two orders of magnitude faster than fail-over recording. RMF is a result of collaboration between Vega Systems Inc in San Jose, California, Sunjin Infotech based in Seoul, South Korea, and Milestone Systems' Middle East offices. The product is a plug-in framework for the Canon subsidiary Milestone Systems' XProtect software.
Traka has been specified at a main UK international Airport to deliver bespoke solutions for the safe management of replica improvised explosive devices (IEDs), alongside intelligent key management systems. The UK airport, which cannot be named for security reasons, uses replica IEDs for training purposes across its security network, to ensure correct procedures are being followed in the unfortunate event of a real threat. Security management using replica IEDs The importance of secure management of replica IEDs is integral, with recent well-publicised events having shown the major disruption caused by any unaccounted items, including an abandonment of the last game of the season for Manchester United in 2016. Traka, which already provides the airport with essential intelligent key management units, created a bespoke management locker solution for the safe storage of replica IEDs on site, to ensure they could only be operated by authorised personnel. The units present audit control capability and reporting on an instant basis with any units that do not get returned being instantly accountable. To have any replica IED device unaccounted for would have serious security implications for the Airport as a whole" Intelligent key management Says a Security Manager at the Airport, “To have any replica IED device unaccounted for would have serious security implications for the Airport as a whole, with a real possibility of closure and consequential mass disruption.” “With increasing numbers of passengers and noted global security threats, we cannot afford to take the risk and knew Traka could be called upon as the experts to provide a solution. The lockers not only provide an extra security dimension, but also ensure the smooth running of the Airport security. They enhance our training objectives as the audit control capability allows replica IEDs to be used across terminal staff, safe in the knowledge they will always be accounted for and returned.” The lockers support the Airport’s use of Traka solutions for intelligent key management Asset and vehicle tracking The lockers support the Airport’s use of Traka solutions for intelligent key management for security and engineering keys, alongside asset and vehicle control. Ben Farrar, Traka Market Development Manager added, “It is the focus of every Airport to deliver the best possible experience for passengers, while ensuring their absolute safety and security at all times. And in doing so, ensure staff can present all processes in a smooth and stress-free environment.” “Traka’s provision of bespoke locker solutions for the safekeeping of replica IEDs, alongside our intelligent key management systems as used by this Airport may only seem like smaller details in a complex security matrix. But they work together for the benefit of security teams to ensure effective management and automation, decreasing the likelihood of causing delays and disrupting the airport flow unnecessarily.”
As an innovator in airport security, Oakland International Airport (OAK) announced that it has installed the Evolv Edge, a physical threat detection and prevention system powered by artificial intelligence, to streamline its employee screening program. This installation enhances OAK’s security posture by protecting against metallic and non-metallic threats while simultaneously improving operational efficiency. Physical threat detection system OAK is committed to applying advanced, innovative solutions to complex security operations OAK is committed to applying advanced, innovative solutions to complex security operations. The TSA acknowledged this commitment by selecting OAK as a TSA Innovation Site, a prestigious distinction that promotes improved efficiency and allows the airport to try technologies to benefit its growing passenger and employee base. As the second busiest airport in northern California, passenger travel at OAK is on pace to surpass the 13.2 million travelers that passed through the airport last year. To accommodate this growth, more and more employees are being hired to work at OAK. Therefore, OAK began researching innovative solutions related to employee inspection methods and equipment. Evolv Edge provides OAK with the ability to screen employees for metallic and non-metallic threats with a fast, non-invasive process. Designed with built-in wheels for portability, OAK can easily move the system throughout the airport allowing maximum efficiency for its employee inspection program. Non-invasive employee screening With Edge, organisations, such as OAK, can adapt a risk-based security approach while balancing security with positive experience With this installation, OAK continues to be at the forefront of security through its use of modern technologies to combat today’s evolving threat landscape. By replacing traditional physical screenings with Evolv Edge’s precision, mobility and multi-threat detection capabilities, OAK can control access and respond to different threat scenarios quickly and efficiently. With Edge, organisations, such as OAK, can adapt a risk-based security approach while balancing security with positive experience. “With today’s threat landscape, the security perimeter has expanded beyond traditional checkpoints,” said Mike Ellenbogen, CEO of Evolv Technology and a 20-year veteran in aviation security. “Evolv Edge’s flexibility and portability provides Oakland International Airport with an added layer of security when it comes to employee screening. Oakland International Airport is always at the forefront of innovation, and we will continue working closely with their team to ensure success and safety.”
Though it has been statistically proven that taking a plane is no riskier than taking a bus, people do have reasons to put extra caution on air travel safety, especially in a time replete with terrorist threats. A major line of defence must be the various sections of the airports, which, as a gateway to the outside world and transportation hub of the city, has always been on the top of the safety list of the government and all related authorities. Dahua’s Airport Solution is an intelligent security system to help ensure the safety of the airports. Elements of an effective solution First of all, an effective solution requires a complicated collaboration of multiple (sub)systems such as monitoring system, alarm system, access control system, network transmission system and management platform. As is known to all, the more steps and players it takes, the higher likelihood for a mistake to occur. Secondly, airports include a variety of places such as terminal areas, parking lots, office areas, freight areas, front desk areas (including the square in front of the terminal building), the flight areas, hangars, the perimeter area and so on, each of which operate on vertical management system. Yet due to the diversity of places and the complexity of personnel & cargoes coming in and going out in huge flow, there are too many risky elements to control. Thirdly, it’s not only about accuracy but also about swiftness when it comes to airport security. Safety should bring efficiency and not the other way around. For example, in April 2017, a drone flew into Chengdu Airport, resulting in the runway closing down for 80 minutes, the loss of which was estimated as at least 10 million dollars, not to mention collateral damages in the broad sense. Dahua’s Airport Solution is a unified security system combining multifunctional HD surveillance cameras with deep-learning AI Unifying a security system Designed to solve all the difficulties mentioned above, Dahua’s Airport Solution is a unified security system combining multifunctional HD surveillance cameras with deep-learning AI that can analyse the big data to get the target, be it a car, a face or a series of numbers. In terms of vehicle management: you can adopt all-in-one cameras to capture and recognise license plates of vehicles accessing the airport. This will trigger the alarm when detecting illegal, stolen, blacklisted, hit-and-run, crime-related and other suspects’ vehicles. Covering the whole route of a vehicle, from entrance highway, to parking lots and then to exit, the surveillance system can effectively assist security guards and police to keep a smooth service, and respond quickly when things go wrong, even if it’s just something from the car that was left behind due to carelessness. In terms of passenger management, the same full coverage of the security system also applies to this, from someone stepping off the car to one’s entering terminal building and checking-in area and all the way to the last step to the boarding gate. The HD surveillance cameras endowed with deep-learning AI have world-leading accuracy in face recognition and e-passport verification. Any suspect, should they show up in the airport area, will at once trigger the alarm. Guarding the airport perimeter Dahua’s Airport Solution also takes care of another crucial part of airport that is the perimeter area. One must resort to special equipment like thermal imaging cameras to keep the safety of the said area. An example of this is Dahua’s solution for one specific airport, which covers a perimeter of 30 km and boasts an annual throughput of 30,000,000 people and 8,000,00 tons of cargo. According to the thermal imaging calculation form below: Dahua chose to use a 100mm lens with a resolution of 640 x 512 and set the installation height at 5M, which detects 1.8m x 0.5m, showing people from within 3000m. The perimeter will be well covered for intruder detection purpose with 10 cameras. The intelligent analysis of IVS (intelligent video system) requires 10 x 10 pixels, under which condition, each thermal imaging camera can detect and analyse objects from within 400m. There is in total 12km of perimeter length in need of such cameras, so Dahua chose to place 30 there, totalling 40 thermal imaging cameras to solve the problem. Advantages of using Dahua tech It should be noted that Dahua’s thermal imaging technology has the following advantages: PTZ function, long distance surveillance (which can detect a vehicle 8.8 km away), long distance zoom, binocular lens (optical and thermal imaging lens), and strong intelligence (which can detect intrusion). Compared to alternate perimeter protection equipment on the market today, such as vibration fibre sensor and IR beam sensor, thermal imaging camera has higher accuracy and less false alarm while directly providing video to verify. Dahua has established stable cooperation with world-renowned platforms like Genetec, Milestone, Avigilon, AXXON, ISS, infusing Dahua’s Airport Solution with more possibilities. Supported by strong R&D resources and good working relationships earned in multiple previous collaborations with partners, Dahua can ensure seamless integration whether it’s front-end IPC or back-end NVR, fulfilling different demands of clients and building a sound security system for the airport. In future, Dahua will keep investing in R&D of cutting-edge technologies into the realm of civil aviation video surveillance solutions. With a mission of “Safer Society, Smarter Living”, Dahua will continue to focus on “Innovation, Quality, and Service” to serve partners and customers around the world.
Senegal’s Blaise Diagne International Airport has chosen to minimise its parking lot headaches and secure its massive freight zone with intelligent Smart Surveillance solution from the globally renowned supplier of innovative video surveillance products and solutions, Hikvision. Officially opened by Senegalese president Macky Sall in December 2017, Blaise Diagne International Airportl Airport (AIBD) covers 4,500 hectares of land located near the town of Diass, 47km from the capital of Dakar. Built at a cost of $575 million, the new airport is one of the largest travel hubs in West Africa, with a main runway designed to accommodate long-haul aircraft such as the A380 and B787. Approximately 3 million passengers are expected to travel through AIBD annually, increasing to 10 million by 2035. Hikvision intelligent surveillance system The airport’s car parking and freight zone are being secured and managed with the help of a Hikvision intelligent surveillance system Served by leading airlines including Air Algerie, Air Cote d'Ivoire, Ethiopian Airlines, Air France, Kenya Airways, Tunisair, Iberia and South African Airways, catering for passengers with state-of-the-art infrastructure, the airport’s car parking and freight zone are being secured and managed with the help of a Hikvision intelligent surveillance system. With a two level 42,000m² main passenger terminal and 12,800m² cargo terminal building designed to handle 50,000 tons of cargo and 80,000 aircraft movements annually, the new airport offers a long-term solution to intra-African economic activity, providing excellent levels of aviation connectivity. Parking and site management To address the security, efficient management and profitability objectives of the airport’s 17 car park entrances and exits, operator Senecar enlisted the help of Hikvision Authorised Distributor, CST Securite. As a Hikvision Authorised Distributor, CST Securite capitalised on the support of the Hikvision Technical team, and all parties worked to confirm the final specification to meet the needs of the airport’s car parking and freight zone security surveillance, and site management requirements. Smart parking management system CST Securite installed 17 x DS-TCG225 2MP HD resolution ANPR cameras Drawing on specialist products from Hikvision’s Smart Parking Management Solution, for the airport’s car park areas, CST Securite installed 17 x DS-TCG225 2MP HD resolution ANPR cameras, featuring built-in whitelist, LPR identification support, barrier/gate control and audio output. The Hikvision Smart Parking Management System employed at AIBD uses the latest barrier technology combined with Hikvision industry-standard ANPR (Automatic Number Plate Recognition), to ensure seamless, managed vehicular entrance and exit from parking lots. Fast vehicle identification and integrated barrier control software means queues are kept to a minimum - which means greater vehicle flow can be handled to increase the productivity and efficiency of the car parks. Hikvision Darkfighter cameras The industry-leading Hikvision Darkfighter and True WDR imaging technologies employed in the airport’s ANPR system were specified to deliver crisp and clear recognition, alongside a recording of every vehicle using the car parks day and night. A development beyond traditional technology, the airport’s car park barrier activation is not driven by traditional sensor coils in the floor (that detect a vehicle waiting to enter or exit), but by highly accurate ‘radar’ sensors. This technology enables far simpler installation and maintenance, as no ground works are required to dig across roadways or pedestrian pavements to install the traditional sensing coils and their cables. Additionally, the Hikvision radar solution is not affected by local environmental influences such as light, dust or rain, that can inhibit the performance of traditional sensing coil-based solutions. Radar is also a much more reliable technology, as pedestrians as well as vehicles, can be detected far more accurately - ensuring a much safer operation within the airport’s busy vehicular and pedestrian traffic environment. Hikvision’s radar solution The Hikvision Smart Parking Management System provides a range of configurable alarms that help the ANPR system operators to manage daily activity Helping Senecar to maximise their operation, the system provides invaluable statistical and analytical parking lot information, supplying status history, parking usage rate and parking vehicle flow, to name but a few. Underlining the advanced performance capability of the Hikvision Smart Parking Management System, a range of configurable alarms helps the ANPR system operators to manage daily activity, such as unauthorised parking, over-time parking and illegal access, which all helps to support highly-effective vehicle and security management. High-level freight security Designed to handle 50,000 tons of cargo and 80,000 aircraft movements annually, AIBD’s 12,800m² cargo terminal building located to the south-west of the runway accommodates the airport’s freight handling, and incorporates a number of storage areas, freezers, office facilities and electromechanical service areas. To integrate with the airport’s mix of security measures and site management, CST Securite liaised with the airport security team to identify the most advantageous locations to install the freight zone cameras. Designed to capture a comprehensive view of all key internal and external areas, a mix of Hikvision DS-2CD2T42WD 4MP / DS-2CD2T22WD 2MP full HD EXIR Bullet Network Cameras with built-in IR to 50m, and DS-2CD2142FWD 4MP / DS-2CD2122FWD 2MP full HD Vandal-resistant Network Dome Cameras with built-in IR to 30m and edge storage - all with IP67 protection were installed. Hikvision IP cameras and NVRs Hikvision NVR-7332NI-E4/16P Embedded Plug & Play NVR’s and a DS-7716NI-I4 NVR were installed to provide up to 6MP resolution recording Supporting the Hikvision cameras’ high-performance imaging, their on-board VCA alarm activation parameters was set-up for individual camera scenes, to provide automated alarm activations and situation awareness of any predetermined set of events within each cameras’ view. To provide the airport’s security and management teams with effective real-time and playback monitoring, at the control room, Hikvision NVR-7332NI-E4/16P Embedded Plug & Play NVR’s and a DS-7716NI-I4 NVR were installed to provide up to 6MP resolution recording. Simple and intuitive systems control is provided by Hikvision’s iVMS-5200E Control Software, enabling all aspects of the surveillance system to be managed effectively. Commenting on the AIBD installation, Kevin Zhu, General Manager of CST Securite said: “Having used their products many times before on other high-profile projects, we had no doubt that the choice of Hikvision surveillance products would provide the customer with an efficient, and reliable intelligent surveillance solution. We can confirm the good reputation of Hikvision products’ quality is backed by an equally good experience of their after-sales service.”