Avigilon Corporation, a Motorola Solutions company, announced the newest version of its video management software, Avigilon Control Center (ACC) 7.4, which incorporates artificial intelligence-powered facial recognition technology. The new “appearance alerts” capability will help commercial organisations, such as educational institutions and hospitals, accelerate response times by identifying people of interest in enterprise settings.
For example, the technology can alert the security team at a local high school when a banned or flagged individual has entered the campus. People of interest are identified based on a secure, controlled watch list created and maintained by authorised users at the commercial organisation. For organisations that use the new ACC software and license their Avigilon cameras for facial recognition, cameras will seek to identify potential matches based on the watch list. If a potential match is found, the user is alerted within the ACC software, and security personnel can then determine whether further investigation or action is necessary.
Facial recognition technology
It’s important to note that we view facial recognition as an aid that can improve the decision-making of the user"
“Our latest ACC software delivers substantial benefits to our commercial customers by offering facial recognition technology in a secure and controlled manner,” said John Kedzierski, Senior Vice President, Video Security Solutions, Motorola Solutions. “The appearance alerts capability enables our customers to move from a reactive approach – staring at a wall of video feeds where critical information can be easily missed – to a proactive approach that brings important information directly to authorised users so they can make better-informed decisions.”
“It’s important to note that we view facial recognition as an aid that can improve the decision-making of the user – it does not make consequential decisions or initiate actions on its own. We refer to this approach as ‘human in the loop,’ and it is foundational to the way we apply AI,” added Kedzierski.
Responsible use of artificial intelligence
ACC’s new facial recognition capabilities reflect Motorola Solutions’ commitment to the responsible use of artificial intelligence as well as individual privacy rights. Data stewardship is integral to these new capabilities, and we build compliance controls into our products to support this.
For example, user authentication is required for these capabilities, audit logs of user actions are generated, data retention periods for the watch list can be specified within the application, and records can be expunged or deleted on demand as well as verified through auditing and reporting. Data is locally hosted, owned and controlled by the business or school. The data used to train the AI algorithms is also thoroughly evaluated, ensuring sufficient quantity, quality and diversity to ensure high accuracy and consistent performance.
AAEON Atlas helps increase safety, energy efficiency, and cut costs for Smart Cities thanks to the power of Intel Movidius Myriad X.
AAEON, globally renowned provider of Smart City solutions, announces AAEON Atlas, a rugged outdoor edge node built to provide cities with flexible solutions for AI and edge computing. Featuring the Intel Movidius Myriad X, AAEON Atlas offers real-time processing for a range of Smart City applications.
AAEON NanoCOM-APL board
AAEON Atlas is based on the compact AAEON NanoCOM-APL board, featuring the Intel Atom x7
AAEON Atlas is based on the compact AAEON NanoCOM-APL board, featuring the Intel Atom x7, providing efficient computing with low power consumption. Designed with an IP66 rated fanless chassis, it can be installed onto any streetlamp, making it easy to quickly setup and deploy. It also features connectivity with WIFI, Gigabit Ethernet, or even 4G/LTE for flexible communication within an edge network or with a central cloud server. The AAEON Atlas also features built-in cameras and sensors for data collection and analysis.
The key feature of AAEON Atlas is the embedded Intel Movidius Myriad X vision processing unit (VPU). The Intel Movidius Myriad X provides a low-power, high-performance solution for on-device AI inference. AAEON Atlas is compatible with the Intel Distribution of OpenVINO toolkit, which includes built-in features such as model optimisation, hardware acceleration and more designed to maximise the capabilities of the Intel Movidius Myriad X VPU.
License plate recognition AI inference
AAEON Atlas can be deployed in a wide range of edge computing applications. As an edge gateway, AAEON Atlas can connect with up to 200 smart street lights, providing intelligent control. With license plate recognition AI inference, AAEON Atlas can power applications such as Smart Street Parking or detecting traffic violations or accidents. With traffic and congestion monitoring, AAEON Atlas can optimise traffic signals in real time to help improve traffic flow. AAEON Atlas can also anonymously detect pedestrians in crowd control and flow monitoring applications.
AAEON Atlas also comes with the full end-to-end support offered by AAEON. From concept to customisation to setup and deployment, AAEON provides customers with full support to ensure their Smart City solution is ready to go from day one.
“With AAEON quality and expertise, AAEON Atlas is the solution built to carry the weight of Smart City applications,” said Kevin Ting, Senior Product Manager with AAEON’s New Business Development division. “Whether as an IoT/AIoT gateway or providing real time AI analytics, AAEON Atlas uses the latest in Intel Vision Products to provide invaluable edge computing processing for Smart Cities.”
Swedish smart home technology specialists, Minut, led by former senior executives at Apple and Google, today announces the availability of its easy to install, all-in-one wireless smart home alarm in the UK. The Minut alarm will be distributed in the UK by smart home specialists Thames Distribution and is available from Minut.com and Amazon UK for £129.
Minut believes that every home should feel safe and has executed on the vision to make home security smart, simple and accessible for every home. The Minut smart home alarm has no cameras, no data loopholes, no pricey long term commitments and no complicated and expensive installation. Never listening or watching, Minut will only react when required, ensuring users always know what’s said at home, stays at home.
Minut smart home alarm
Connecting to the home WiFi, the Minut smart home alarm is wireless and ready to work anywhere in the world
Designed to sit discreetly on the ceiling, it may be small but Minut is packed with 5 sensors and a siren, ensuring the home is safe when occupants are out and that it remains a comfortable environment when they are home.
Connecting to the home WiFi, the Minut smart home alarm is wireless and ready to work anywhere in the world. Anyone can install Minut themselves -- a mounting plate securely sticks on the ceiling and the sensor clicks right in and can be readily moved to another location as desired.
PIR motion sensor
The Minut smart home alarm contains a PIR (passive infrared) motion sensor underneath the lens, which detects the heat energy emitted by living things. The device monitors the environment it’s in and keeps track of the number of ‘motion events’ that occur. If the alarm is activated and a motion event occurs, an instant notification will be sent via the app. Even if the alarm is turned off, users can monitor the motion levels around the device.
Minut also monitors the sound level of the environment it’s in. The app allows users to set custom thresholds, so if the volume ever goes above a pre-set decibel level they will receive a notification on their phone.
Minut monitors the temperature in an environment and can alert users to any increases and drops. It is possible to set customised high and low temperature levels, and if the environment goes above or below them a notification is instantly sent. This feature can alert people to potentially dangerous situations such as leaving the oven on, the heating breaking or leaving a window open.
The device also monitors a home’s humidity levels. Humidity levels can negatively impact on sleep and overall health and some of the health risks from over exposure to high humidity include dehydration, fatigue and muscle cramps.
Built-in alarms for sound recognition
The in-built sound recognition in Minut can detect other alarms going off in the home
The in-built sound recognition in Minut can detect other alarms going off in the home. If users have a smoke, CO2 or radon alarm installed and it starts to sound, Minut will pick up on this and instantly notify of the potential threat.
Through the combination of monitoring the temperature and humidity in the environment overtime, Minut can analyse the risk of mould growing. Users will be alerted in the app and offered suggestions as to how to reduce this risk.
The latest feature to Minut, the Nightlight, automatically lights the way when occupants walk under the device at night. The app allows users to choose which hours of the night they would like the feature to be on for, or turn it off entirely.
The Minut app allows users to set up and control their Minut Smart Home alarm, to wirelessly monitor and protect the home, anywhere, anytime. It takes just a few minutes to install and connect and the incredibly quick and easy to use app lets users control the alarm, set thresholds, add friends & family to their network and manage instant notifications.
Home security and monitoring
Using the free Basic plan, users can monitor and protect their home, receive instant notifications of any threats and get insights into their home environment. For just £6.99 per month, the optional Minut Plus plan allows customers to add multiple users, multiple homes and allows users to create a trusted network of friends and family to safeguard their home. If something happens in the home, and you’re not around, Minut will quickly seek assistance from the users network to make sure the property remains safe.
Minut has up to 6 month battery life, dependent on the environment it’s within and the number of alerts it needs to send. Users simply remove the device from its magnetic mounting plate and charge via the included USB-C cable. Fully charging the device takes around 5 hours, after which, users simply pop it back up on the ceiling.
Machine learning solution
Our aim is to make home security and monitoring accessible to everyone"
Minut CEO Nils Mattisson, commented, “Feeling safe shouldn't be a luxury, or come at the cost of privacy. Until recently the most affordable solution for home security and monitoring has been Wi-Fi connected cameras, but people don’t want or trust them in their homes. Our aim is to make home security and monitoring accessible to everyone, without having to compromise the feeling of home.”
Mattisson adds, “Through the use of machine-learning the sound recognition is continuously improved by the Minut community, making the system even better over time. To preserve privacy, the design is camera-free and the data processing runs on-device, so no sound ever has to be recorded.”
Data privacy and security
Minut’s founders reached the conclusion that the only way to truly guarantee the privacy of personal data was to avoid collecting it as much as possible. By combining the inputs of its environmental sensors with powerful machine learning, the alarm is able to process and analyse data on the device itself; ensuring no raw audio from the home is ever recorded or sent to the cloud for storage.
A founding premise of Minut is that no one should ever have to choose between security and privacy, hence why it puts privacy first. Everything revolves around protecting what happens in the home. Minut do not listen and don’t send any raw data to the backend. Only when the alarm senses a potentially critical event such as motion detection or a sudden sharp increase in temperature is a ‘fingerprint’ of the potential anomaly generated and sent to the cloud for a ‘second opinion’ of sorts, where it is analysed by even more powerful algorithms before being sent to the user.
MOBOTIX is exhibiting at the International Security Exposition (ISE) 2019, global show for the UK Government, in the London Olympia venue at Stand J30, from Dec 3 to 4 2019.
International Security Expo 2019
ISE is bringing Government, Industry, Academia and the entire end-user community in charge of regulation and procurement together under one roof to debate current challenges and to source the latest security technologies and services.
The demonstrations will show visitors the newly launched MOBOTIX 7 smart solution platform and M73 three-module IoT cameras, offering a whole new set of functions plus application solutions based on deep learning, opening up new possibilities far beyond traditional video security. Already at its launch, the M73 comes with more than 15 apps integrated into its camera software, which can be used to optimise business processes in practically any industry.
AI-based analytics and intelligent solutions
MOBOTIX partners and their customers can now even develop their own apps or have them configured and certified by MOBOTIX
MOBOTIX partners and their customers can now even develop their own apps or have them configured and certified by MOBOTIX. By combining image sensors and environmental sensors with AI-based analytics, any application can be addressed with increased efficiency and improved preventive measures.
ISE visitors will be from government sectors including utilities, prisons and other custodial facilities where perimeter protection is at a premium and false alarms must be minimised so that security managers can focus on credible threats so reaping cost benefits.
MOBOTIX 7 smart solution platform
MOBOTIX analytics filters out unnecessary alarms so that users can respond to situations with the vigilance that meets the MOBOTIX mission statement of going ‘Beyond Human Vision’.
Phillip Antoniou, MOBOTIX’s Vice President Sales Europe South/West & MEAPAC said “MOBOTIX is participating at ISE for the first time. We see this as a great launching stage in the UK for our new MOBOTIX 7 platform which brings Analytics on the edge to the forefront of our solutions. This new product as well as our existing offering, with our Cyber Security focus means we can provide optimum solutions for the public sector as well as private.”
M73 three-module IoT cameras
He continued, “MOBOTIX has always prioritised quality in our solutions, this is further highlighted with the newest member of our product family. The M73 is the world’s first decentralised and modular IOT video system based on deep learning modules.”
MOBOTIX’s technology partners Cathexis, Eizo and Nelysis will be providing their integrated solutions bringing additional offering’s with decoding, further video management software, hazardous area expertise and cyber security solutions.
The physical security industry is moving fast. Evolving risks, new technologies and business changes all converged and had a profound impact on the industry in 2019. Looking back at our top articles of the year – as measured by those that received the most “clicks” at our website – provides a decent summary of how the industry evolved this year. Timely and important issues in the security marketplace dominated our list of most-clicked-upon articles in 2019. In the world of digital publishing, it’s easy to know what content resonates with the security market: our readers tell us with their actions; i.e., where they click.
Let’s look back at the Top 10 articles we posted in 2019 that generated the most page views. They are listed in order here with a brief excerpt.
1. Schneider Electric to sell Pelco to private equity firm
Schneider entered exclusive negotiations with Transom Capital Group, a U.S.-based private equity firm, to sell the Pelco business unit. Pelco is a security industry stalwart and global specialist in the design, development, and delivery of end-to-end video surveillance solutions and services including cameras, recording and management systems software.
2. High-tech drones, robots and counter-drone solutions on display
From robots to drones to counter-drone solutions, a range of new technologies [was] displayed at ISC West 2019. The Unmanned Security Expo [included] a dedicated complimentary education theater for attendees offering sessions on a range of topics. Also included [were] demos of the best UAVs (unmanned aerial vehicles), UGVs (unmanned ground robotics and vehicles) and autonomous systems on the market.
3. Hikvision and Dahua banned from buying U.S. exports
In effect, inclusion on the “entities” list restricts the export of equipment to the two companies because of their alleged involvement in “human rights violations and abuses” related to a Chinese government campaign of repression, mass arbitrary detention, and high-technology surveillance against minority groups. Equipment from the two companies is used to provide video surveillance capabilities in the Xinjiang Uighur Autonomous Region (XUAR) of China.
4. The many faces of today's facial recognition technology
Used proportionately and responsibly, facial recognition can and should be a force for good. It has the ability to do a lot more to increase security in the future. From street crime to airport security, all the way through to helping those battling addiction, the technology can take security and operations to new heights.
5. Security industry trends to be led by focus on cyber security In 2019
With a more open, connected environment come cyber-risk and data privacy concerns – which is why, in the Security Industry Association’s 2019 Security Megatrends, cybersecurity’s impact on the physical security industry ranks number one on the list. Cybersecurity is affecting all areas of the industry landscape, from security implementation to attracting top talent to the workforce.
6. Open Supervised Data Protocol (OSDP): the gold standard for access control installations
The Open Supervised Data Protocol (OSDP) is now the industry’s gold standard for physical access control installations. It was designed to offer a higher level of security with more flexible options than the aging, de facto Wiegand wiring standard. OSDP, first introduced in 2011 by the Security Industry Association (SIA), continues to evolve with significant manufacturer input.
7. Honeywell embracing AI, reinvesting in video portfolio
Although uses for artificial intelligence (AI) are still emerging in security, Honeywell sees an important role for AI in building a connected system to ensure the safety and security of a building, and more importantly, its occupants. AI allows end users to go beyond monitoring activity on a surface level to really understand the scene – from who exactly is in the area to what they might be doing.
8. A secured entrance is the first defense against an active shooter
What the majority of venues [of recent active shooter incidents] have in common is they all have a front entrance or chokepoint for anyone entering the facilities, which is why any active-shooter plan must include a strategy to secure that entry point.
9. Debunking the myths of the security of access control systems
One of the areas where we see continued confusion is around access control systems (ACS) that are deployed over networks, particularly in relation to mobile access, smart cards, and electronic locks. These technologies are often perceived as being less secure and therefore more vulnerable to attacks than older ACS systems or devices. In the interest of clearing up any confusion, it is important to provide good, reliable information.
10. At Chubb Fire and Security, ethics is a core concept with practical impact
Ethics discussions begin for employees at Chubb when they join the company; clear instructions about ethics are included as part of employee induction. There are nine modules of ethics training during employee orientation, and a discussion with an Ethics and Compliance Officer is part of the onboarding process.
Video surveillance is commonly associated with security. But in most cases, it's used to record incidents and assist in investigations after the fact rather than prevent undesirable events. Artificial intelligence–powered video analytics is a highly promising trend that fundamentally changes the way things work. Extracting manageable data from a video stream can help recognise risky situations early on, minimising damage and, ideally, completely avoid emergencies. At the same time, AI significantly expands the areas of application of video surveillance beyond security systems.
AI significantly expands the areas of application of video surveillance beyond security systems
However, the hype around this new, trendy technology prevents the potential user from choosing quality solutions in a wide variety of products. This often leads to over-expectation, followed by a complete let-down. Can AI-powered video analytics really be the key to a technological breakthrough in video surveillance? We'll take a look at what the technology can do, what it can't, and where it can go from here.
Technological breakthrough or just another bubble?
It's often said that the video management software (VMS) market is becoming increasingly commoditised and widely available. A lot of products with similar features (or, at least, similar promises from the manufacturer) make it hard to choose. As a result, vendor names and reputations are turning into one of their primary selling points. Manufacturers have two choices available: get wrapped up in a price war and rely on cutting expenses, or offer a product that's truly innovative and revolutionary.
Manufacturers have two choices available: get wrapped up in a price war, or offer a product that's truly innovative and revolutionary
VMS developers who choose the second route are gravitating towards creating products that use artificial intelligence based on neural networks and deep learning. Emerging two or three years ago, the AI video analytics market is experiencing a boom in growth. This new tech wave has stirred the still, stagnant backwaters of the VMS world and gave small, ambitious developers something to be optimistic about. It seems they now have a chance to emerge as market leaders in the next few years.
However, the hype around this popular trend is raising reasonable concerns among experienced security industry professionals. These concerns come from clients looking for a solution to their problems, and from suppliers building a long-term development strategy. This largely resembles another tech bubble, like the one built up around pre-AI video analytics and burst when it became clear that the sensational promises around it were pure marketing hype (and rather unscrupulously so). However, there are a lot of factors that indicate that AI-powered video surveillance systems aren't another bubble.
The three factors
The first — and the main one — comes from systems already in place on customers' sites. They fulfill the same promises made during the previous bubble by hotheads in a rush to teach the computer to analyse events in real time using a classical algorithmic approach.
The second is the fact that this new technology has seen investment from not only software and cloud startups, but also established VMS developers. Even giants like Intel, which has presented a full line of neural network accelerator hardware and a set of software tools that streamlines working with them, specifically in the field of computer vision.
This new technology has seen investment from not only software and cloud startups, but also established VMS developers
The third factor lies in artificial intelligence's abilities. AI plays chess, drives cars, and works wonders in many other fields. Why shouldn't it be applied to video monitoring and analysis?
What AI can do
Just what can artificial intelligence do in video surveillance systems at this stage of development? It can't quite analyse a sequence of events and understand the "logic" of what's happening in the cameras' field of view. At least not yet. But it's probable that AI will learn to do this in the next few years. But neural network analytics can already detect, classify, and track objects very well, providing high accuracy even in busy scenes.
Artificial intelligence can be used in the real world to:
Detect smoke and flames for early fire warning at open areas (forest, open warehouse, parking lot, etc.)
Distinguish people/vehicles from animals and other moving objects, e.g. to protect the perimeter of a nature park from poachers
Distinguish a person in a helmet and protective clothing from a person without them to prevent accidents at a dangerous production facility or construction site
Count objects of a specific type, e.g. cars in a parking lot, people in the sales floor, wares moving on a conveyor belt, etc. in non-security-related solutions
Those are just a few examples. After training a neural network, it can tackle other, similar tasks, too. Generally, a neural network trained in specific conditions isn't replicable. In other words, it won't work as well under different conditions. On the other hand, developers have learned how to quickly train AI for the needs of a specific project. The most important requirement is having enough video footage.
Somewhat apart from that is the use of neural networks in facial and automatic number-plate recognition. This is an example of reproducible neural networks (train once, deploy everywhere), which makes them more appealing commercially. If non-reproducible neural networks have only recently become economically feasible due to the rapid evolution of specialised hardware (aforementioned Intel's product, for example), then the use of AI in facial recognition and ANPR has been well established for a long time.
The use of AI in facial recognition and ANPR has been well established for a long time
Another kind of AI analytics that we'll explore is behaviour analytics. This function, probably more than any other, is bringing video surveillance systems closer to understanding what's happening on camera. Its potential is vast.
How behaviour analytics works
From a technical point of view, behaviour analytics combines artificial intelligence with a classic algorithmic approach. A neural network trained on a multitude of scenarios can determine the position of the bodies, heads, and limbs of humans in the camera's field of view. The algorithm outputs an array of data containing descriptions of their poses.
Conditions can be set for data to detect a specific pose, such as raised hands, prostrated or crouching persons. Developers can use this to quickly create new detection tools to identify potentially dangerous behavior specified by a government or business client. There's no need for additional training of the neural network.
How behaviour analytics can be deployed
Someone crouched down next to an ATM could be a technician, CIT guard, or burglar. Bank security should be notified in any of the cases.
A person in shooter position, together with a bank employee or cashier with their hands raised could indicate a robbery. The system can be configured to automatically send alerts with a surveillance snapshot to the police so they can assess the threat and take action if needed. It's vital that the police receive the alert, even if the employee is unable to activate the alarm.
In many cases, attention should be directed to a prostrate individual. This could be somebody who needs immediate help, or it could be someone sleeping in an inappropriate public place, for example, a 24/7 ATM space.
Behavioural analytics can also be used to ensure workplace safety. For example, tracking whether employees are holding the handrails when using the stairs at a manufacturing facility or a construction site.
Behaviour analytics can be deployed wherever your clients' imagination takes them. With this feature, practically any pose that indicates potentially dangerous behaviour can be detected. Timely response to an alarm helps avoid material damages or, in other situations, casualties.
Practically any pose that indicates potentially dangerous behaviour can be detected
An area of potential development for behaviour analytics is the ability to analyse a sequence of poses by the same person or a combination of poses and relative positions of several individuals. That will be the next level of evolution in AI's use in video surveillance: moving from "detecting" to "understanding" behaviour in real time.
In its most basic form, this type of analytics can be deployed to detect deviations from the search procedure in correctional facilities when a person being inspected must assume a pre-defined sequence of poses. A more advanced form allows it to detect any kind of abnormal behaviour, such as a brawl breaking out in a public space. Ideally, behaviour analytics can predict dangerous situations based on nearly imperceptible cues gleaned from collected statistics and a Big Data analysis.
At the moment, this sounds like pure fantasy, but what seemed like whimsy not too long ago is now a reality with AI. It's already beaten humans in chess and the game of Go (Weiqi). Will artificial intelligence be able to outplay humans at charades one day? It's entirely possible that we'll soon see for ourselves.
It’s hard to believe that we’re in the final quarter of 2019. It’s time to wrap up goals and make new ones that will guide us into another decade. As we look forward, we can’t help but look back at some of the key trends that emerged in the last couple of years, and their continued presence in the product road maps and plans that so many security industry leaders and manufacturers are creating.
Some of these trends have enhanced the efficacy of security systems, whereas others have the potential of having adverse impacts.
Cyber-attacks of all kinds have become, and will continue to be, a major threat, making this one of the most important initiatives that today’s businesses embrace. From a manufacturer’s perspective, building cybersecurity into the product from its inception is critical, with integrators beginning to demand this level of consideration from the products they sell. As a result of a rise in the convergence of IT applications alongside security investments, end users are now seeking out solutions designed with data security top-of-mind. All network connected devices such as DVRs/NVRs, servers, IP cameras, access controllers, intrusion alarms, smart sensors, are vulnerable, which is why this added step in developing cybersecurity protocols and applying them across the organisation is critical.
Building cybersecurity into the product from its inception is critical
More connected devices
The Internet of Things (IoT) has been a major trend for the past few years in many industries, and this will continue as we integrate sensors of all kinds into the network. The collection and analysis of the data collected by these sensors is giving rise to a plethora of applications such as industrial applications, intelligent building management, event management, and much more. The physical security industry benefits by having additional intelligence for situational awareness and emergency management, as well as opportunities to provide additional value-added services and business insights. Being deployed in an increasing number of scenarios and with continued improvements in computing capabilities, video has the opportunity to become the eye of IoT.
Software manufacturers are looking toward artificial intelligence to help propel advanced analytics in an effort to deliver more situational awareness to operators, and an increased ability to proactively assess threats or anomalies. While video and data analytic capabilities have been around for quite some time, some would argue they were rudimentary in comparison to software that uses AI to make existing applications such as facial recognition much more accurate, and to create new ways to detect anomalies. In addition, AI continues to be used to make sense of the large amounts of data that are being generated by intelligent sensors and by analysing the growing amount of video.
It’s safe to say that 5G will revolutionize the way people stay connected to the internet. Extra speed, extra bandwidth are going to make our mobile devices faster, more powerful and hyperconnected, with the same thing happening to IoT connected devices such as cameras. This is going completely change the way we think about smart cities: more powerful IP devices connected to one another, powered by AI, will have a massive impact on the way we move, shop and live in urban areas.
more powerful IP devices connected to one another, powered by AI, will have a massive impact on the way we move, shop and live in urban areas
In most advanced economies around the globe, citizens are increasingly concerned with privacy of their data, and many governments have put – or are in the process of doing so – stringent data protection laws in place. The EU has lead the way in using these concerns to develop privacy regulations that govern the development of data-driven applications. This trend is starting to impact the entire globe, as we shift toward more data autonomy and privacy. Since most physical security applications involve the collection of video and data about people and assets, privacy regulations will continue to have a significant impact on the industry well into the future.
Cloud and mobile capabilities
Mobility is critical for physical security and is emerging through the development and use of cloud-based services, as well as the ability to access security devices through a smart phone or Web-based browser. That’s why there’s been such an influx of mobile apps created to manage cameras, receive automatic alerts for the most diverse event, and giving users the ability to grant or restrict access to a facility. All of this demonstrates the world’s demand for mobility, connectivity and ease-of-use.
More video — everywhere
Video is the cornerstone of security, providing both real-time and forensic coverage for emerging threats and incidents, which is why it’s one of the fastest growing segments of the marketplace. The use of video for traditional applications in new markets, as well as for use in newer applications that are not necessary security related is poised to see the most movement. In some industries such as oil and gas, there is a trend towards extending video coverage into extremely harsh and hazardous environments, so manufacturers are challenged to develop appropriately certified equipment to meet a more stringent demand. Manufacturing facilities such as food processing plants are also increasing their use of video for training and compliance purposes to prevent incidents such as food recalls that can be extremely costly for the business.
It’s an exciting time to be a part of the security market, as we’re really just beginning to see that, when it comes to technology advancements, the sky is the limit. I would argue at the core of these innovations is the video data being collected, and as we work to build technologies that can harness the power of these applications, we will continue to be at the forefront of this movement toward greater intelligence and business insights.
Technology is expanding passenger screening functions and other capabilities at airport security checkpoints. For example, Smiths Detection is exploring the concept of a security checkpoint that integrates biometric identity management with screening solutions, says Richard Thompson, Global Market Director Aviation, Smiths Detection.
Biometrics is the “unique identifier’” for passengers, and through integration of biometrics directly into the checkpoint, passengers can be matched with their luggage trays to enable real-time risk-based screening (RBS). The system is now able to trigger differentiated workflows for each passenger and their bags.
Risk-based screening optimises security operator resources through enhanced screening of passengers who represent a higher risk, while passengers deemed to be low risk enjoy a more seamless journey.Passengers deemed to be low risk enjoy a more seamless journey
Easily integrated with existing infrastructure, biometric checkpoints deliver operational efficiencies and a competitive advantage to airports through accelerating the screening process, thus enabling a more seamless free flow of passengers.
Passenger and tray identification
Through passenger and tray identification, new data insights can also be gathered to inform decision-making. Advanced data analysis based on flights, airlines or destinations could be utilised by airlines and security authorities.
For example, airlines could monitor passenger flow through security for specific flights or track the number of trays per flight to predict overhead compartment capacity. Checkpoint data could also be combined with hold luggage screening results or shared with transit and arrival airports to better inform security assessments.
Advanced data analysis based on flights, airlines or destinations could be utilised by airlines and security authorities
Advanced screening of carry-on baggage
Smiths Detection’s HI-SCAN 6040 CTiX offers advanced screening of carry-on baggage using Computed Tomography (CT), an advanced X-ray technology originally intended for medical applications, which allows for detailed, layered 3D images to be rotated and dissected. Electronic devices and liquids do not need to be removed from baggageThis enables detailed detection, meaning electronic devices and liquids do not need to be removed from baggage, thus expediting screening and further improving the passenger journey.
Smith Detection’s iLane.evo is an automatic tray return system. By delivering a steady flow of trays, it plays a critical role in streamlining the screening process and delivering increased throughput; optimised operational costs; and an improved passenger experience.
AI for object recognition
In other trends, the use of artificial intelligence (AI) in aviation security is on the rise due to the exponential growth in computing power. It has the potential to significantly boost the performance of screening equipment – allowing for the deployment of new object recognition functions at the checkpoint, which could pave the way for a more automated, alarm-resolution-only passenger screening.
Smiths Detection has developed a family of smart algorithms, called iCMORE, which use machine learning to reliably detect prohibited or dangerous goods in baggage, including weapons, to reduce the burden on image analysts and improve screening outcomes.
As security embraces IT-centric solutions, it can provide business value over and above security. Now in charge of managing a variety of data – e.g., from video platforms – a company’s security function has access to a range of new metrics.
While security may use video to analyse a security event, machine learning can analyse the same data for other business capabilities, such as quality control or when a policy has been breached. “It’s the same camera, but with dual purpose,” says Matt Kushner, President of STANLEY Security.
STANLEY Security, one of the largest integrators with a global footprint, has positioned itself at the centre of the industry’s transformation by information technology (IT) and the Internet of Things. “Security will become an expanded business partner with corporations,” Kushner comments. In response to the trend, STANLEY is hiring more IT-oriented technicians and salespeople within the IT community and who can “speak at the C-level”, Kushner comments.
Sonitrol is the most recognised brand by law enforcement for verified response
Data centres, higher education and logistics
STANLEY manages very large, multi-national clients. As a consequence, the STANLEY security organisation has some of the best and brightest minds for enterprise-class security. To maintain that level of talent, STANLEY is committed to education. “We bring them into the family and focus on education, such as IT and IoT training. That’s critical in a world where unemployment is less than 3%. Finding good people, growing good people, and retaining good people – we do that exceptionally well at STANLEY,” says Kushner.
STANLEY’s strong vertical markets including data centres, higher education, and logistics. They are also strong in multi-location installations (such as banking.) STANLEY has a big footprint throughout North America and Europe.
PACOM access control and 3xLOGIC cloud-based solutions
In addition to STANLEY’s core integrator business, the company also manages several manufacturing brands such as PACOM access control and 3xLOGIC cloud-based solutions.Mergers and acquisitions have been commonplace in the integrator space Beyond its company-owned integrator locations under the STANLEY brand, the company also owns Sonitrol, the strongest brand in the market for verified response with 65 franchises in North America. Sonitrol is the most recognised brand by law enforcement for verified response.
Mergers and acquisitions have been commonplace in the integrator space, and Kushner says that STANLEY is “open and actively looking for properties that fit our commercial growth strategy”. He notes that STANLEY focuses on the commercial side of the market, where there are good margins and continuing growth. They pay less attention to the residential side which is “being heavily disrupted”.
Strong partnerships with manufacturers
STANLEY has strong partnerships with several manufacturer partners, through which they bring new breakout technologies to market from emerging companies. An example is Evolv Technology, a manufacturer of gun and bomb detection technology. “We see them as a leading provider of the technology, and they are, in my mind, a very disruptive provider,” says Kushner. STANLEY is also collaborating with a company – to be announced – that provides a unique gunshot detection technology, he says.
STANLEY is also cooperating with dormakaba to implement Switch Tech, a Bluetooth wireless core that can replace any standard mechanical lock core. Existing locks can be transformed into electromechanical locks in minutes. STANLEY is also developing a tight integration with Lenel’s mobile credentialing system.
STANLEY is also cooperating with dormakaba to implement Switch Tech
GSX 2019 and ISC West 2020
At the recent GSX 2019 show in Chicago, Kushner says STANLEY heard a lot about cybersecurity, especially customers wanting to make sure they are investing in cyber-hygiene and who are looking to expand into providing cyber protection. “In concert with cyber-hygiene, they are looking for health monitoring or assurance that network devices are operating properly,” he says. “They want to ensure their security platforms are cyber-secure and up to date with the latest software versions.”
STANLEY is also a big proponent of cloud offerings, and Kushner hints at a big announcement at the upcoming ISC West show in Las Vegas of additional cloud offerings and/or partnerships. “There will be a variety of new solutions to be introduced, including hosted solutions and applications that benefit both security and that add new value to businesses overall.”
Securing New Ground, the security industry’s annual executive conference this week in New York, offered food for thought about current and future trends in the security marketplace. Highlights from SNG 2019 included keynote remarks from security leaders at SAP, Johnson Controls and the Consumer Technology Association, discussions on how CSOs mitigate security risks, topic-focused thought leadership roundtables and a lively networking reception.
Top trends observed at the event include cybersecurity, data privacy, facial recognition and artificial intelligence. A "View from the Top" session covered the need for companies to consider responsible use and ethics around technology; responsibility should extend throughout the organisation.
A panel of security leaders emphasised the need to understand the diversity of risks that end users face. As the Internet of Things (IoT) expands connectivity, the inputs, outputs and "attack surface" also expand. It's critical to have security "baked" into products themselves, and also to undertand the mission of the organisation being protected, the context and correlation.
Technologies transforming security market
Keynote speaker Gary Shapiro, President and CEO of the Consumer Technology Association, listed the many technologies that will impact the consumer electronics market – and the security market – in the near future: artificial intelligence (AI), voice recognition, the transition to 5G and self-driving cars.As the Internet of Things expands connectivity, the inputs, outputs and "attack surface" also expand
“What we're seeing today is a huge turning point in where the world is going,” said Shapiro, whose organisation presents the giant CES trade show each year in Las Vegas. “It’s not just about jobs and technology, but who we are and how we address fundamental human rights.” Privacy is a component of human rights, but “in the world of AI, there is a tradeoff between innovation and privacy”.
Balance between security standards
Shapiro sees Europe as representing one extreme of privacy, epitomised by General Data Protection Regulation (GDPR), which he sees as stifling innovation. Meanwhile, China is pushing innovation using massive amounts of data with no regard to privacy. The United States, therefore, should look for a balance that acknowledges the inevitability of innovation while respecting privacy and realising it is “always situational.”With new technologies, biometric ID and cybersecurity issues, your business is in a strong and growing place"
Too much concern for privacy comes at a cost, Shapiro said. “Privacy zealots are killing facial recognition, step by step by step,” he said. “Regulators should not throw away the baby with the bathwater. Every technology in history has been used to cause evil and to do good. Throughout history any new technology could have been banned and made illegal.”
Shapiro offered encouraging words to the security marketplace, even in the wake of large tech firms such as Amazon entering the market. “With new technologies, biometric ID and cybersecurity issues, your business is in a strong and growing place,” he said. “There is opportunity. There will be increasing new things people want, and always new threats. People will want what you're providing, which is physical and technology security in their facility.”
Scott Schafer, Chairman of the Board of the Security Industry Association (R), interviewed Steve Jones, CEO, Allied Universal, on stage about the importance of merging technology with security officers
Allied Universal CEO Steve Jones discussed holistic approach
Steve Jones, CEO, Allied Universal, was interviewed on stage about the importance of merging technology with security officers for a holistic approach to securing a facility.
“Today, customers are asking us to look at their facility holistically and asking: What is my best approach?” said Jones. A holistic approach includes protecting people, the facility, intellectual property (IP), and how to handle visitors.
Manguarding perspective on security
Allied Universal looks at security from a manguarding perspective and also from a technology perspective, based on their daily experience managing security for 40,000 customer sites across the United States and Canada.Allied Universal has a new handheld technology platform that uses AI
“We are in a unique position in the channel,” said Jones. “We know the stats at any customer site. We know the last time there were repairs on cameras, which card reader is malfunctioning, how long the systems company takes to respond to a call. We are at these locations 24/7 and have an intimate relationship with customer. We are a significant influencer in the decision-making process. We have an opportunity to have a voice, and to build a business around it.”
“We are looking for technology that will enhance the security of the customer,” said Jones, including situational awareness and analysis of data to predict patterns. Allied Universal has a new handheld technology platform that uses artificial intelligence (AI) to analyse data, predict outcomes, and prescribe optimum responses.
Workforce development – hiring and training new employees – is a big issue for Allied Universal, which last year interviewed more than a million applicants to find around 100,000 employees. They are targeting every demographic, and last year hired 33,000 veterans. The company is using technology to help with the massive recruiting effort, including AI to analyse applicant qualifications and a computer-generated avatar to conduct the first online interview.
Future security challenges
Jones sees the rapid increase in the homeless population in the United States as one of the biggest security challenges of coming years. The rapid increase in the US homeless population is one of the biggest security challengesMany businesses face the prospect of homeless individuals living in front of their buildings, possibly using drugs or approaching customers.
“It has become a real threat,” he said. “When they are living in front of your buildings, in many cases, there are ordinances that allow them to be there so the police will not get involved. It falls on the facility owner and private security to address the problem. Given the large homeless population we have now during good economic times, I don’t know what it will look like in an economic downturn.”
Human side of security
An SNG session on the human side of security observed that people are the biggest source of vulnerability. Companies should foster a "safety climate" in which security is integral to operations and viewed as something that helps employees rather than create hassles. Human resources is now a technology field and should work together with security to achieve shared goals.
At the consumer and small business level, cybersecurity must also be top-of-mind and built into a security companies' DNA. SNG attendees heard about opportunities to move beyond providing products and devices to providing experiences, by partnering with customers to protect what matters most to them. While a bit of inconvenience comes along with security, products should be built in a way that is easy to use, with security baked in. The results are systems people are comfortable engaging with every day.
Securing New Ground is presented by the Security Industry Association (SIA).
With the opening of the new Thomson Nature Park, Singapore, the National Parks Board (NParks) recently unveiled a new system to help detect wildlife crossing the roads between forests and provide real-time warning messages for approaching vehicles, so that the vehicles can slow down and let the animals safely walk onto the other side (The Strait Times).
IronYun AI NVR Animal Detection solution
IronYun AI NVR Animal Detection is the solution that NParks has selected to realise the system
IronYun AI NVR Animal Detection is the solution that NParks has selected to realise the system. On one hand, AI NVR uses deep learning AI models to accurately recognise animals versus vehicles and people via camera feeds on the roadside. On the other hand, AI NVR integrates with signage systems to trigger the appropriate alerts when such animals are detected.
Wildlife protection program:
“Thomson Nature Park (TNP) is a 50-hectar (124-acre) green space to buffer between the eastern forests of the Central Catchment Nature Reserve and the new infrastructure developments. TNP is separated from the Nature Reserve by a 3-km-long Old Upper Thomson Road, on which visitor cars frequently travel. Animals, however, do not recognise manmade geographical boundaries”, said NParks Director for Conservation, Sharon Chan, and thus often walk across the road from the forest into TNP and vice versa to forage for foods and find mates.
Animal-vehicle collisions have occurred because the cars and motorcycles cannot see the animals and stop in time. Meanwhile, biodiversity surveys have indicated that many native animals, including critically endangered species such as the Raffles' banded langur and the Sunda pangolin often cross this road.
Several measures have been implemented to protect the animals, including:
Aerial crossing: a rope ladder and a single rope crossing along the Old Upper Thomson Road to help canopy-dwelling animals crossing overhead
Culverts: five culverts to help ground-dwelling mammals crossing underground
Reducing traffic: turning Old Upper Thomson Road from a dual-lane road to a single-lane road in June 2018; plans to close the road to vehicles between 7:30 pm – 6 am daily in the future
Roadway animal detection system: a combination of IronYun AI NVR, cameras, and signage to alert vehicles to slow down from afar when an animal crosses the road
In particular, the roadway animal detection system is co-funded by NParks and the Land Transport Authority (LTA) to reduce animal-vehicle accidents. At the heart of the system is IronYun AI NVR.
AI technology for wildlife protection
The system is guaranteed to recognize a human versus an animal versus a vehicle
AI NVR is a deep learning video analytics solution, which can distinguish several types of objects, including vehicles (car, bus, motorcycle, etc.), people, manmade objects (backpack, suitcase, etc.), and animals. IronYun engineering teams train the AI models using thousands of hours of video data to ensure high accuracy, so the benefits are two-fold:
No false alarms: the system is guaranteed to recognise a human versus an animal versus a vehicle. As an improvement compared to legacy sensor-based systems, motions caused by tree branches swaying, people walking/biking, cars driving by, etc. do not trigger any alarm. In this case, only an animal crossing the road would trigger an alarm.
Easy to use: no calibration to the environment is required. The model is pre-trained and ready to use from day 1.
AI Network Video Recorders (NVRs)
The LTA and NParks users set the alert rule so that when an animal appears, AI NVR recognises, records the metadata and triggers lights to flash under a sign that reads ‘Animals Ahead’, all within 3 seconds. The car sees the flashing light and slows down, allowing the animals to reach safety.
The unintrusive monitoring and alert system AI NVR has proven useful
The current system supports 5 cameras along Old Upper Thomson Road. The system was announced on October 11, 2019, and is a year-long pilot project in the joint effort of LTA and NParks to protect wildlife in Singapore national parks.
Unobtrusive and alert video system
While the rope crossing and culverts help providing the animals safe alternative travel routes, Dr. Andie Ang, a primate scientist and chair of the Raffles’ Banded Langur Working Group, has commented that it would take time for animals like the Langurs to get used to artificial structures, so long-term monitoring is necessary.
Therefore, the unintrusive monitoring and alert system AI NVR has proven useful. According to LTA Chief Executive, Ngien Hoon Ping, “Joint efforts, such as the one on the roadway animal detection system, help us understand how technology could be deployed to achieve our aims.”
Located in Eastern China, Hangzhou is the capital and most populous city of Zhejiang Province. It has registered population of 9,800,000, with total area of 16,596 km². Jianggan District is one of the five main urban areas of Hangzhou.
With a floating population of about 1.06 million, Jianggan District ranks first among Hangzhou's main urban areas. As the new administrative center of Hangzhou, it boasts the most important CBD and the largest train station and car hub in Hangzhou, bringing together various traffic elements such as highway junctions and bridges across the river.
The entire Jianggan District is promoting vital transformation in urban areas
Intelligent surveillance system
Covering 8 streets, 141 communities and 4 villages, the entire Jianggan District is promoting vital transformation in urban areas. Nevertheless, the non-registered population, accounted for about 40% of the total population, makes it hard for the local government to improve urban management in the district.
Every policeman needs to manage 1,700 citizens on average. The shortage of police force affected their work precision and led to difficulties in providing timely police response. In addition, insufficient surveillance coverage and limited intelligence system in the area resulted in inactive security measures, making it difficult for the police to achieve their goals
Integrating DoT, IoT and the internet
Based on the Dahua Heart of City (HOC) architecture supported by "Full Sensing, Full Intelligence, Full Computing and Full Ecosystem (4 Full) capabilities, Dahua Technology firmly focused on the construction needs of the area and built the overall plan of establishing an ‘online police’.
Integrating the Internet, DoT and IoT, Dahua Technology has successfully assisted the Hangzhou Jianggan Public Security in building a multi-dimensional network that targets customer value, and combines AI, big data, and cloud computing in order to obtain accurate real-time data and strengthen the current technology of “online police” operations.
Sensors and monitoring products
Dahua Technology deployed 19 sensors, hundreds of monitoring products and a sophisticated network
Moreover, Dahua Technology deployed 19 sensors, hundreds of monitoring products and a sophisticated network. It also set up 46 actual police investigation models to provide accurate instructions for Jianggan police, including property crimes analysis, situation analysis, vehicle management, people management, psychiatric control, online apprehension of violators, as well as missing person search, etc.
Compared with traditional police operation, Dahua HOC Safe City Solution has built an “Online Police” mechanism to obtain the most authentic real-time data through information technology, and carry out accurate computer applications for a more scientific service deployment, efficient police force and powerful security control.
Dahua HOC Safe City Solution
It ensures that the Jianggan police can perform properly at a given time. It also promotes the transformation of police affairs from passive to active, from extensive to subtle, from imprecise to accurate, and from offline to online, gradually carrying out the prediction, early-warning, and prevention measures of police operations.
Since 2016, the Dahua HOC Safe City Solution has helped Jianggan Public Security achieve outstanding results including enhanced police intelligence, reduced crime cases, increase in case closure rate and efficiency, improvement in public service, and speedy recovery of missing individuals, opening a new chapter for intelligent police operations.
The first China International Import Expo was held on November 5, 2018 in Shanghai. As the world's first import-themed national exhibition, it attracted more than 3,600 exhibitors from 172 countries, regions and international organisations, making security a top priority during the event.
As an essential force in the global security industry, Dahua Technology has performed outstandingly in assuring the security of many international events such as the Rio Olympic Games, G20 Hangzhou Summit and the 9th BRICS Summit. This time, Dahua Technology has shouldered the security responsibility again with its state-of-the-art products and solutions.
Dahua Technology provided more than 3,000 sets of cutting-edge intelligent equipment
The Expo expected a total number of 800,000 visitors, as well as tens of thousands of displayed goods, coming from more than 3,000 companies in more than 130 countries, demanding safety as the top priority in the venue. Integrating data from various departments as well as monitoring the venue and command dispatching became a huge challenge for the security and police personnel.
Dahua Technology provided more than 3,000 sets of cutting-edge intelligent equipment in the core locations of the Shanghai National Convention and Exhibition Center and its surrounding areas, using video AR, face recognition, ANPR, video structuring, intelligent analysis and other technologies to improve the venue’s level of security.
Artificial Intelligence solutions
In order to further enlarge the area security coverage, Dahua Technology set up video surveillance points in key areas of Shanghai National Convention and Exhibition Center including entrance and exit points of the outer ring, interior area, office buildings, as well the surrounding major passages, plazas, commanding points, subway entrances and exits, pedestrian bridges, etc.
In addition to the already pre-installed surveillance equipment, new monitoring devices were also added to make sure that there will be no blind spots and interruptions of the video transmission in the whole area.
Dahua panoramic cameras installed at the commanding point of the Shanghai National Convention and Exhibition Center employs AR technology in order to achieve omni-directional and no blind spot surveillance.
Additionally, the panoramic cameras deployed inside the exhibition center monitor the situation inside the exhibition hall and obtain real-time dynamic information that builds a three-dimensional platform that are visual, controllable and schedulable to facilitate an efficient security operation.
Intelligent video analysis system
Intelligent video analysis system was built in the exhibition area to classify the acquired data
Moreover, intelligent video analysis system was built in the exhibition area to classify the acquired data according to the preset rules and application requirements, such as crowd detection, behavior analysis, map search, etc. This system expands and deepens the application of video information in the efficiency of public security.
Furthermore, through the Dahua Deep Learning Series video alert camera, people who would illegally climb over the perimeter fence built within the 4-kilometer area of the exhibition hall would be identified and captured.
Dahua face recognition system
The Dahua face recognition system deployed at the entrance and exit of the exhibition center could recognise the identity of all visitors in real time by comparing their ID card’s recorded information with the face photo captured by the front-end smart camera.
This system did not just improve the traffic efficiency of the entrance and exit points, but also guaranteed the safety and accuracy of the identification of people walking in and out of the venue.
High-definition smart cameras
Dahua high-definition smart cameras were also set up at the entrance and exit around the transportation hub of the Shanghai National Convention and Exhibition Center to monitor and track high-risk vehicles and people in real-time. This effectively improved the road management and traffic control in the area.
Fully structured cameras capturing real-time videos of motor vehicles, pedestrians and non-motor vehicles were deployed in the surrounding area, which also support face and body recognition for a more comprehensive security.
Video network platform
Video network platform automatically connects the video and image data captured within the area
Additionally, a video network platform automatically connects the video and image data captured within the area to the public security command center, creating a resource sharing integration of valuable information.
China International Import Expo has facilitated countries and regions all over the world in strengthening economic cooperation and trade, and promoting global trade and world economic growth. Dahua AI solutions has greatly enhanced the prevention and control measures within the key areas around the venue, assuring security during the Expo.
Cutting-edge security solutions
After the event, Dahua Technology received letters from the Shanghai Public Security Bureau, Qingpu Public Security Bureau, Changning Public Security Bureau, Shanghai Hongqiao Integrated Transportation Hub Emergency Response Center, and other offices, thanking Dahua Technology for its strong support and contributions to the success of the security management during the event.
From the Rio Olympic Games to the G20 Hangzhou Summit, from the 9th BRICS Summit to the first China International Import Expo, Dahua Technology always accomplishes various security tasks with high quality and efficiency. With its cutting-edge products and solutions, quality operation services and professional technical team, Dahua Technology will continue to assist more major international events in the future.
Delfina Chain, Sr Associate Customer Engagement & Development at Flashpoint, discusses what resources defenders must access to in order to keep a finger on the pulse of the cybercriminal underground.
Artificial intelligence (AI) is already being applied to diverse use cases, from consumer-oriented devices - such as voice-controlled personal assistants and self-directed vacuum cleaners - to ground-breaking business applications that optimise everything from drug discovery to financial portfolio management. So naturally, there is growing interest within the information security community around how we can leverage AI - which encompasses the concepts of machine learning (ML) and deep learning (DL) - to combat cyber threats.
AI-enhanced cyber security
The effectiveness and scalability of cybersecurity-related tasks has already been enhanced by AI
The effectiveness and scalability of cybersecurity-related tasks, such as malware and spam detection, has already been enhanced by AI, and many expect ongoing AI innovations to have a transformative impact on cyber defence capabilities. However, security practitioners must also recognise that the rise of AI presents a potent opportunity for cybercriminals to optimise their malicious activities.
Much like the rise of cybercrime-as-a-service offerings in the underground economy, threat-actor adoption of AI technology is expected to lower barriers to entry for lower-skilled actors seeking to conduct advanced malicious operations. A report from the Future of Humanity Institute emphasises the potential for AI to be used toward beneficial and harmful ends within the cyber realm, which is amplified by its efficiency, scalability, diffusibility, and potential to exceed human capabilities.
Encrypted chat services
Potential uses of AI among cybercriminals could include the development of highly evasive malware, the ability for automated systems to exhibit human-like behaviour during denial-of-service attacks, and the optimisation of activities such as vulnerability discovery and target prioritisation. Fortunately, defenders have a leg up over adversaries in this arms race to harness the power of AI technology, largely due to the time- and resource-intensive nature of deploying AI at its current stage in development.
The purpose of intelligence is to inform a course of action. For defenders, this course of action should be guided by the level of risk (likelihood x potential impact) posed by a threat. The best way to evaluate how likely a threat is to manifest is by monitoring threat-actor activity on the deep-and-dark-web (DDW) forums, underground marketplaces, and encrypted chat services on which they exchange resources and discuss their tactics, techniques, and procedures (TTPs).
Cobalt Strike threat-emulation software
Flashpoint analysts often observe cybercriminals abusing legitimate technologies in a number of way
Cybercriminal abuse of technology is nothing new, and by gaining visibility into adversaries’ ongoing efforts to develop more advanced TTPs, defenders can better anticipate and defend against evolving attack methods.
Flashpoint analysts often observe cybercriminals abusing legitimate technologies in a number of ways, ranging from the use of pirated versions of the Cobalt Strike threat-emulation software to elude server fingerprinting to the use of tools designed to aid visually impaired or dyslexic individuals to bypass CAPTCHA in order to deliver automated spam.
Flashpoint analysts also observe adversaries adapting their TTPs in response to evolving security technologies, such as the rise of ATM shimmers in response to EMV-chip technology. In all of these instances, Flashpoint analysts provided customers with the technical and contextual details needed take proactive action in defending their networks against these TTPs.
When adversaries’ abuse of AI technology begins to escalate, their activity within DDW and encrypted channels will be one of the earliest and most telling indicators. So by establishing access to the resources needed to keep a finger on the pulse of the cybercriminal underground, defenders can rest easy knowing they’re laying the groundwork needed to be among the first to know when threat actors develop new ways of abusing AI and other emerging technologies.
Public spaces provide soft targets and are often the sites of terrorist or active shooter attacks. Public spaces, by definition, require easy accessibility and unrestricted movement. Given that openness, what security technologies can provide real results? We asked this week’s Expert Panel Roundtable: How is technology innovation impacting the security of public spaces?
Video storage is an important – and expensive – aspect of almost any surveillance system. Higher camera counts equate to a need for more storage. New analytics systems make it easier for operators to manage video, but that video must be dependably stored and easy to access if and when it is needed. To keep up to date on the latest developments, we asked this week’s Expert Panel Roundtable: What’s new in video storage solutions?
Along with the integration of security and other systems in an enterprise environment comes a need to centralise monitoring and control of the unified network. A control room is at the center of managing integrated systems, providing the focal point to collect information from a variety of sensors, analyse the data, and then respond appropriately. The technologies that drive these functions are changing and evolving, thus increasing the efficiency and efficacy of systems. We asked this week’s Expert Panel Roundtable: What’s new in command-and-control systems, and what is the impact?