Iris ID, a global provider of iris recognition technology, announced its award-winning multimode iCAM M300 handheld biometric platform now offers gateless access control, time and attendance and employee mustering for both commercial and government markets. The new functions are possible with embedded XPressEntry software from Telaeris, a provider of real-time personnel tracking solutions. Also using Iris ID’s Iris Access EAC software, the iCAM M300 continues to provide an ideal portable...
Unmanned aerial vehicles (UAVs), or drones, present a range of threats, from the careless and clueless to the criminal. While many incidents may seem harmless, the threat to any location at any time depends on a range of factors. Drones are inexpensive for criminals to buy or make, and there are continuously improving battery, airspeed, and payload capabilities. UAVs can also fly without an RF signal to jam or hack. Fortunately, sensor technologies including radar are available for security ag...
Dahua Technology, a video-centric smart IoT solution provider, has announced the addition of targeted vertical market solutions in the North American market. Vehicle inspection is one area where contemporary technology is rising to address a critical need. Preventing restricted items from entering high-security environments has traditionally been limited to the use of mirrors and police dogs, where blind spots and human error put detection at risk. In order to combat this problem, Dahua Technol...
emaratech, a technology and management consulting company which is part of the Investment Corporation Dubai (ICD), is capitalising on its strong participation in the 2019 edition of Airport Show to showcase its collection of cutting-edge technology products, with the key highlight being the Smart Corridor, a first of its kind in the world product that is helping authorities in effective border control and ensuring seamless passenger experience at airports. As the pressure to effectively handle...
The 3rd edition of Intersec Saudi Arabia got underway with 111 exhibitors from 20 countries zooming in on the Middle East’s largest commercial security and fire safety market. Running for three days at the Jeddah Centre for Forum and Events, Saudi’s foremost security, safety, and fire protection trade show targets the Kingdom’s vast market which is estimated to grow at an annual compound growth rate of 7.7 percent over the next seven years. It was opened yesterday in a pre-sho...
RS2 Technologies, globally renowned security and access control systems provider firm, has been named as a new Strategic Alliance Partner in the United States by Zenitel Group, the global provider of Intelligent Communication solutions. Integrated systems “Zenitel’s continued innovative approach to simple but powerful integrated systems provides a complete unified solution to customers of all sizes”, said Dave Barnard, Director of Dealer Development for RS2. “Zenitel ha...
PPSS Group launched SlashPRO Cut Resistant Neck Guards in order to help further improve the personal safety of homeland security professionals worldwide. The latest addition to this widely respected brand of slash resistant clothing certainly makes sense, understanding that the side of the neck and throat contains both the Carotid Artery and Jugular Vein. If either is cut by an attacker one will most likely suffer from rapid blood loss, subsequent shock and most likely death. Demand from homeland security agencies PPSS Group have identified a noticeable increase in the demand for such products, especially from several homeland security agencies, such as prison, police, immigration, customs, border forces and other government agencies. Many of these agencies have reported incidents, which saw their officers being brutally attacked. Many attacks had targeted the officers’ throats and necks. PPSS Group have identified an increase in the demand for such products, especially from several homeland security agenciesRobert Kaiser, CEO of PPSS Group said: “Many government employees or security professionals have been attacked from behind. This may well be the case because they, for whatever reasons, either trusted the attacker to a reasonable level, or because the attackers put themselves intentionally into such position in order to cause max injury or even death.” “No matter how hard we try, we simply cannot eliminate their operational risks. However, what we can do is continue our research and development and relentlessly explore all possible options to further improve the personal safety of those who serve our countries and protect us.” High levels of certified cut protection SlashPRO Neck Guards can be worn ‘turned up’ to cover the entire neck area, or ‘turned down’ for covert operations or a more natural look. They are available in black as standard colour. The new neck protectors offer thoroughly field tested and exceptionally high levels of certified cut protection. Verified test reports highlight European Cut Level 5 (EN 388:2016), International Cut Level 5 (ISO 13997:1999) and American Cut Level A5 (ANSI/ISEA 2016).
A new conference will examine fundamental issues of trust as society transitions from paper-based to digital security and ID documents. Digital Document Security The first Digital Document Security Conference in Berlin (May 13 – 15, 2019) comes as the illicit production of counterfeit and fake ID documents continues to be big business. The security of banknotes is also a huge concern for governments and law enforcement agencies Around the world, the use of fraudulent passports, driver’s licences and pass cards aids criminal activity and illegal cross-border movement. Meanwhile, the cost of paying for anti-counterfeiting measures and teams tasked with bringing the criminals to justice can run into the millions of dollars. The security of banknotes is also a huge concern for governments and law enforcement agencies. Growth of contactless payments The conference will consider the growth in contactless payments and smartphones used to pay for products and services, while several countries or states are adopting digital driving licences or ID cards, whereby a person’s identity is confirmed by their phone, not by a piece of paper or plastic. The questions raised by all this will be examined by experts: how secure are these systems, and how much can we trust them when we can no longer use our human senses to assess them? Are they as well protected as the physical documents we’re so familiar with, or are they more vulnerable to criminal fraud? And what are the implications of the answers? Digital ID identification The conference will consider the interaction of the physical and digital domains in financial transactions and identity confirmation The only global event dedicated to addressing these pivotal questions, the conference will consider the interaction of the physical and digital domains in financial transactions and identity confirmation, as well as providing a stage for both communities - physical and digital - to showcase how their documents or systems are secured, and to exchange ideas for ensuring that future digital documents of value are as secure as present physical documents. Four sessions (The Physical/Digital Interface; Print in a Digital World; Smartphone Applications and Digital ID) will reflect the move towards digital, demonstrating how the different domains interact as well as how digital systems - particularly smartphones - can be used on their own. Physical and digital security domains Ian Lancaster, associate at Reconnaissance International and co-chairman of the new conference, said: “We are living through a watershed period in how we manage what must be secure documents and secure information. So, this first conference of its type comes as a timely opportunity to engage in the debate and examine the most pressing issues as the transition from the physical to the digital gathers pace.” The Digital Document Security Conference will be preceded by a half-day course, which will cover the physical and digital document security domains ahead of addressing if physical and digital approaches can work together to create an even more secure environment.
A security products firm based in West Yorkshire has secured a £500,000 loan from Mercia Fund Managers to step up production of its range of hostile vehicle mitigation (HVM) barriers made from recycled rubber. Rosehill Security, which is based in Sowerby Bridge, has received the funding from NPIF – Mercia Debt Finance, which is managed by Mercia Fund Managers and is part of the Northern Powerhouse Investment Fund and Mercia’s EV SME Loans Fund. Vehicle Security Barriers (VSBs) The barriers have been selected by security forces, event organisers and sports clubs across the globe The division of Rosehill Polymers has developed a range of innovative vehicle security barriers (VSBs) that can be rapidly deployed to protect people and buildings from vehicle as a weapon (VAW) attacks. The barriers have been selected by security forces, event organisers and sports clubs across the globe and have been used in locations ranging from the London Marathon to the Ministry of Finance in Paris. The investment will be used to scale up the manufacture of its current product portfolio to meet the growing demand for VSBs and to develop additional products. Rosehill Hostile Vehicle Mitigation (HVM) Rosehill Polymers Group was founded in 1988 and now employs 100 people across six operating divisions producing coatings, adhesives, railway crossings, coloured rubber granules for playgrounds and traffic calming products. Dr Alexander Celik, Group Managing Director of Rosehill Polymers Group, said: “The protection against VAW attacks has fast become a high priority across the world. As a result, we’re seeing growing demand for Rosehill Security’s range of HVM and perimeter security solutions products. This investment will allow us to move forward with our plans to increase production capacity, improve efficiency and continue to develop the product range.” Perimeter security solutions Rosehill Polymers Group’s bold approach has paid off, allowing the business to successfully diversify and develop new markets" Jonathan Craig, Investment Manager at Mercia, added: “Rosehill Polymers Group’s bold approach has paid off, allowing the business to successfully diversify and develop new markets. This funding will allow it to continue its expansion and step up production to meet growing worldwide demand.” Mark Wilcockson, Senior Manager at British Business Bank, said: “Since its launch in 2017, NPIF’s impact on businesses has been wide-ranging, providing funding to launch new products, employ new staff, enter new markets and acquire new facilities. We are pleased that NPIF is continuing to unlock the North’s growth potential by supporting small businesses with vital investment.” The NPIF project is supported financially by the European Union using funding from the European Regional Development Fund as part of the European Structural and Investment Funds Growth Programme 2014-2020 and the European Investment Bank.
Echodyne, the manufacturer of innovative, high-performance radars for government and commercial markets, announces the immediate availability of the EchoGuard Rapid Deployment Kit for surveilling borders, securing critical infrastructure perimeters and temporary events, and enhancing situational awareness. Echodyne’s innovative MESA™ technology and powerful software deliver the leading performance of electronically scanning array (ESA) radar in a compact, lightweight, solid-state format for the very first time. Portable surveillance kit The Rapid Deployment Kit is built for field agents, law-enforcement, and security personnel charged with temporarily or intermittently securing ground and airspace perimeters. With essential components weighing under 20 lbs., the kit is extremely portable and enables surveillance in the most remote or hard to access locations. Securing events and borders “Echodyne is excited to announce the Rapid Deployment Kit, specifically designed for securing temporary and special events and critical infrastructure, remote surveillance, and border security” said Eben Frankenberg, CEO of Echodyne. “Being able to rapidly deploy a high-performance radar sensor is a field force multiplier, significantly enhancing agent safety, and dramatically improving situational awareness. This is another example of how our MESA technology can provide exceptional performance in a low cost, size, weight, and power package.” Features of the EchoGuard kit: Industry leading 3D radar performance in a super lightweight kit Intuitive radar UI software Ruggedised high-performance computer Wired and optional wireless connectivity Choice of tripod size Essential components weigh less than 20 lbs
Dahua Technology, a video-centric smart IoT solution and service provider, launches its AI NVR4000-I Series, including DHI-NVR4208-8P-I, DHI-NVR4216-16P-I, DHI-NVR4216-I, DHI-NVR4416-16P-I, DHI-NVR4432-I and DHI-NVR4832-I. Distinguished from mainstream NVR products with single AI function in the market, the Dahua AI NVR Series integrates perimeter protection and face recognition, providing customers cost-effective AI transformation and upgrading with high-precision safety guarantee while saving labour cost. With the outstanding perimeter protection function, the Dahua NVR4000-I Series can significantly reduce false alarm and bring higher accuracy performance to end-users. Face recognition technology The NVR4000-I series is capable of analysing targets based on deep learning algorithm to differentiate people and vehicles The ability of the new NVRs to filter out false alarms caused by animals, rustling leaves, bright lights, etc. enables secondary recognition of the targets, thus improving alarm accuracy. Besides, the NVR4000-I series is capable of analysing targets based on deep learning algorithm to differentiate people and vehicles, therefore making retrieval more efficient. The AI-powered face recognition technology behind these products enjoys a high reputation in the industry, winning several first prizes in international competitions. Being acknowledged on performance for both efficiency and accuracy, Dahua Face Recognition offers real-time facial analysis by identifying, capturing and recording faces with powerful metadata. Combined with configurable multiple face database, common and stranger mode could alarm for suspects on blacklist, allowing passing for authorised people on whitelist, also alert for approaching of strangers. Significantly enhances accuracy Powerful metadata is well-constituted with feature attribute information extracted from target faces, such as gender, age, glasses, masks, beard and expressions, making it possible for users to select the appropriate channel, feature and similarity to search for eligible targets. Otherwise, users can also upload the face pictures of targets to NVR and compare them with the face database in NVR, so as to retrieve the relevant video captured by camera and find out the targets. Quick and handy search for a person of interest can be achieved through multi-channels and which significantly enhances accuracy and efficiency. The NVR4000-I Series also supports ePoE & EoC to meet various needs of customers In addition to the above features, the NVR4000-I Series combined with Dahua cameras will bloom more powerful functions. For instance, working with Dahua ITC camera enables ANPR (Automatic Number Plate Recognition) for convenient entrance/exit management. IP video surveillance applications Besides, people counting and heat-map are also available when matching Dahua IP camera. Furthermore, the NVR4000-I Series also supports ePoE & EoC to meet various needs of customers. Incorporating superior perimeter protection, advanced face recognition and reliable AI search, the Dahua NVR4000-I Series delivers excellent performance and high recording quality for IP video surveillance applications such as companies, retail stores, borders, villas, museums, dangerous areas and other small- and medium-sized scenes. With a mission of ‘Enabling a Safer Society and Smarter Living’, Dahua will continue to focus on ‘Innovation, Quality, and Service’, to serve partners and customers around the world.
Airbus, an aerospace, defence and security manufacturers and systems providers, attends the World Border Security Congress for the third time. The event will be held at the Sheraton Hotel & Towers in Casablanca (Morocco) from 19 to 21 March 2019 and will be co-hosted by the Moroccan Ministry of Interior and the General Directorate for Migration and Border Protection. In the exhibition hall, the Airbus stand (number 9) will show visitors maritime and border security as well as coastal surveillance solutions. Improved operational products The booth will also display a demo of Styris, the Airbus’s product family focusing on maritime safety and security, which includes Vessel Traffic Services (VTS), Coastal Surveillance Systems (CSS) and Critical Infrastructure Protection (CIP). Olivier Yvon, Maritime Program Manager of Airbus Defence and Space, will give a lecture entitled ‘Integrated Coastal Surveillance System In addition, on Thursday, 21 March 2019, from 11.15 am (CET), Olivier Yvon, Maritime Program Manager of Airbus Defence and Space, will give a lecture entitled ‘Integrated Coastal Surveillance System’. Airbus is one of the contributors when it comes to providing improved operational products and services to fulfil the defence and security needs of nations, thanks to its strong position as a producer of satellites, aircraft, intelligence and security solutions, including cyber protection. Land border protection The company designs, develops and implements integrated, complex and holistic solutions, including platforms and services for the following business segments: land border protection, maritime monitoring and safety (coastal and Exclusive Economic Zone) and Critical National Infrastructure (CNI). The World Border Security Congress is the premier multi-jurisdictional global platform where border protection policy-makers, managers and practitioners meet annually with security industry professionals to discuss evolving international border security challenges.
The industry faces numerous challenges in the coming year. Physical and cyber security threats continue to become more complex, and organisations are struggling to manage both physical and digital credentials as well as a rapidly growing number of connected endpoints in the Internet of Things (IoT). We are witnessing the collision of the enterprise with the IoT, and organisations now must establish trust and validate the identity of people as well as ‘things’ in an environment of increasingly stringent safety and data privacy regulations. Meanwhile, demand grows for smarter and more data-driven workplaces, a risk-based approach to threat protection, improved productivity and seamless, more convenient access to the enterprise and its physical and digital assets and services. Using smartphone apps to open doors Cloud technologies give people access through their mobile phones and other devices to many new, high-value experiencesEnterprise customers increasingly want to create trusted environments within which they can deliver valuable new user experiences. A major driver is growing demand for the ‘digital cohesion’ of being able to use smartphone apps to open doors, authenticate to enterprise data resources or access a building’s applications and services. Cloud technologies are a key piece of the solution. They give people access through their mobile phones and other devices to many new, high-value experiences. At the same time, they help fuel smarter, more data-driven workplace environments. With the arrival of today’s identity- and location-aware building systems that recognise people and use deep learning analytics to customise their office environment, the workplace is undergoing dramatic change. Improved fingerprint solutions Cloud-based platforms and application programming interfaces (APIs) will help bridge biometrics and access control in the enterprise, overcoming previous integration hurdles while providing a trusted platform that meets the concerns of accessibility and data protection in a connected environment. At the same time, the next generation of fingerprint solutions will deliver higher matching speed, better image capture quality and improved performance. The next generation of fingerprint solutions will deliver higher matching speed, better image capture quality and improved performance Liveness detection will ensure that captured data is from a living person. Biometrics authentication will also gain traction beyond access control in immigration and border control, law enforcement, military, defence and other public section use cases where higher security is needed. Flexible subscription models Access control solutions based on cloud platforms will also change how solutions are deployed. Siloed security and workplace optimisation solutions will be replaced with mobile apps that can be downloaded anywhere across a global ecosystem of millions of compatible and connected physical access control system endpoints. These connections will also facilitate new, more flexible subscription models for access control services. As an example, users will be able to more easily replenish mobile IDs if their smartphones are lost or must be replaced. Generating valuable insights with machine learning Machine learning analytics will be used to generate valuable insights from today’s access control solutionsEducation, finance, healthcare, enterprise, and other niche markets such as commercial real-estate and enterprises focussed on co-working spaces will benefit from a cloud-connected access control hardware foundation. There will be a faster path from design to deployment since developers will no longer have to create an entire vertically integrated solution. They will simply add an app experience to the existing access control infrastructure. New players will be drawn to the market resulting in a richer, more vibrant development community and accelerated innovation. Data analytics will be a rapidly growing area of interest. Machine learning analytics will be used to generate valuable insights from today’s access control solutions. Devices, access control systems, IoT applications, digital certificates and location services solutions, which are all connected to the cloud, will collectively deliver robust data with which to apply advanced analytics and risk-based intelligence. As organisations incorporate this type of analytics engine into their access control systems, they will improve security and personalise the user experience while driving better business decisions.
Global and domestic threats have highlighted the need for tighter security across all verticals. One of the technologies that has redefined situational awareness and intrusion detection is thermal imaging. Once a technology exclusively manufactured for the military operations, thermal cameras today are deployed across hundreds of security applications and continue to see strong demand in existing and emerging commercial markets. With thermal technology, security personnel can see in complete darkness as well as in light fog, smoke and rain Technology overview and early adoption What distinguishes thermal cameras from optical sensors is their ability to produce images based on infrared energy, or heat, rather than light. By measuring the heat signatures of all objects and capturing minute differences between them, thermal cameras produce clear, sharp video despite unfavorable environmental conditions. With thermal technology, security personnel can see in complete darkness as well as in light fog, smoke and rain. Originally a military developed, commercially qualified technology, the first thermal cameras for military and aircraft use appeared in the 1950s. By the 1960s, the technology had been declassified and the first thermal camera for commercial use was introduced. However, it wasn’t until the late 1990s - when FLIR Systems introduced a camera with an uncooled thermal detector - when the technology began to see substantial adoption beyond government defense deployments. Installations at critical infrastructure sites In the 2000s, industrial companies were some of the first adopters of thermal, using the technology for predictive maintenance to monitor overheating and machine malfunctions. In the years following the September 11 terrorist attacks in 2001, there was an increase in thermal camera installations across critical infrastructure sites. Stricter security requirements drove the deployment of thermal cameras for perimeter protection, especially in the nuclear power sector. Thermal cameras produce clear video in daylight, low light or no light scenarios and their sharp images result in higher performing analytics In 2010, the U.S. Nuclear Regulatory Committee released its 73.55 policy, which states nuclear facilities must “provide continuous surveillance, observation and monitoring” as a means to enhance threat detection and deterrence efforts onsite. Because thermal cameras produce clear video in daylight, low light or no light scenarios and because their sharp images result in higher performing analytics, thermal cameras quickly became the preferred option for nuclear facilities. Likewise, following the 2013 sniper attack on PG&E Corporation’s Metcalf transmission substation, the Federal Energy Regulation Commission introduced the Critical Infrastructure Protection Standard 014 (CIP-014). The policy requires utilities to identify threats to mission critical assets and implement a security system to mitigate those risks. This statute also led to more thermal installations in the utility sector as thermal cameras’ long-range capabilities are ideal for detection of approaching targets beyond the fence line. The demand from both industrial and critical infrastructure entities, as well as other factors, helped drive volume production and price reduction for thermal, making the technology more accessible to the commercial security marketplace. Commercial applications In recent years, the increasing affordability of thermal cameras along with the introduction of new thermal offerings has opened the door to new commercial applications for the technology. In the past, thermal cameras were designed for applications with enormous perimeters, where the camera needed to detect a human from 700 meters away. Locations like car dealerships, marinas and construction supply facilities can be protected by precise target detection, thermal analytic cameras providing an early warning to security personnel Today, there are thermal cameras specifically designed for short- to mid-range applications. Developed for small to medium enterprises, these thermal cameras ensure property size and security funds are no longer barriers to adoption. Lumber yards, recreation fields and sports arenas are some of the commercial applications now able to implement thermal cameras for 24-hour monitoring and intrusion detection. Affordable thermal cameras with onboard analytics have become attractive options for commercial businesses Innovation and advancements Innovation and advancements in the core technology have also spurred growth in thermal camera deployment, providing faster image processing, higher resolution, greater video analytic capabilities and better camera performance. In particular, affordable thermal cameras with onboard analytics have become attractive options for commercial businesses that need outdoor, wide area protection. Car dealerships, marinas and construction supply locations all store valuable merchandise and materials outside. Without protection, these assets are vulnerable to vandalism and theft. However, by providing precise target detection, thermal analytic cameras provide an early warning to security personnel so that they can intervene before a crime is committed. By helping to deter just one incident, the thermal solution delivers a clear ROI. New market opportunities Not only are there more thermal cameras in use today than ever before, but there are also more thermal sensors being integrated with other multi-sensor systems, driving the adoption of thermal in new markets. For large perimeter surveillance applications, thermal is repeatedly being integrated with radar and drones to expand situational awareness beyond the point of fixed cameras. Users get immediate, accurate alerts of approaching targets and evidentiary class video for target assessment In the commercial market, thermal imagers are combined with optical sensors, analytics and LED illuminators into one solution that integrates with central monitoring station platforms. By bringing these technologies together, users get immediate, accurate alerts of approaching targets and evidentiary class video for target assessment. The result is a lower number of false positives, reducing the total cost of ownership for the solution. These multi-sensor solutions also feature two-way audio capabilities, which enable remote security officers to act as “virtual guards” and speak to intruders in real-time to dissuade them from illegal activity. The introduction of solutions that integrate all these state-of-the-art technologies under one unit reduces the amount of capital and infrastructure needed for deployment. Consequently, more small businesses and alarm monitoring companies can implement advanced perimeter security technologies like thermal sensors, some for the very first time. Thermal cameras have gone from military defense devices to widespread commercial security cameras Multi-sensor thermal solutions Multi-sensor solutions featuring thermal are quickly gaining traction and opening the door to new business opportunities for the security channel. One of the primary reasons for the strong market interest in these systems is they enable integrators to increase their recurring monthly revenue (RMR). With intense price competition and eroding margins on CCTV equipment, integrators have to rely on RMR to grow their businesses. Offering remote video monitoring services and virtual guarding technologies is one of the best ways to do so. Additionally, there is a clear demand for it. Central stations are continually looking for new technologies to offer their customers and businesses are interested in economical alternatives to physical guards. In conclusion, thermal cameras have gone from military defense devices to widespread commercial security cameras that are a substantial segment of the outdoor security protection market. From nuclear power plants to construction locations, thermal technology is being implemented to secure sites around the globe.
The Internet of Things (IoT) is having a significant and ever-changing impact on the way we view video security. Today, cameras are expected to be so much more than devices with which to simply capture images; they need to be far smarter than that. These future-facing cameras are becoming an integral part of the vast digital connectivity infrastructure, delivering a parallel performance as intelligent sensors with the ability to extract the kind of invaluable data that helps businesses make improvements in the area of video security, and beyond. However, as the list of possibilities grows, so too does the risk of unauthorised access by cybercriminals. We should all be aware that a single weak link in a communications infrastructure can give hackers access to sensitive data. That’s the bad news. Safeguarding data and utilising deep learning The good news is cybercrime can be avoided by employing a data security system that’s completely effective from end-to-end. One technological advancement that the trend-spotters are predicting will become part of the video security vocabulary is ‘deep learning’ Once this level of safeguarding is in place you can begin to confidently explore the technologies and trends happening now, and those on the horizon. So, what will be having an influence on surveillance in 2018? Well, according to IHS Markit, one technological advancement that the trend-spotters are predicting will become part of the video security vocabulary is ‘deep learning’, which uses algorithms to produce multiple layers of information from the same piece of data, therefore emulating the way the human brain absorbs innumerable details every second. In Europe, GDPR compliance will also be a big talking point as new principles for video surveillance data collection, use limitation, security safeguards, individual participation and accountability are introduced. And, as the popularity – and misuse – of drones continues to rise, the recent developments in drone detection technology will be particularly welcomed by those whose primary concern relates to large areas, such as airport perimeter security. The future of 'smart' video analytics An important feature of today’s intelligent cameras is the ability to provide smart video analytics. The Bosch ‘i’ series, for example, offers a choice of formats – Essential Video Analytics and Intelligent Video Analytics. Essential Video Analytics is geared toward regular applications such as small and medium businesses looking to support business intelligence (e.g. inter-network data transfer), large retail stores and commercial buildings for advanced intrusion detection, enforcing health and safety regulations (no-parking zones or detecting blocked emergency exits) and analysing consumer behaviour. The camera-based, real-time processing can also be used to detect discarded objects, issue loitering alarms and detect people or objects entering a pre-defined field. Intelligent Video Analytics provides additional capabilities. It is designed for demanding environments and mission-critical applications, such as the perimeter protection of airports, critical infrastructures and government buildings, border patrol, ship-tracking and traffic-monitoring (e.g. wrong-way detection, traffic-counts and monitoring roadsides for parked cars: all vital video security solutions). An important feature of today’s intelligent cameras is the ability to provide smart video analytics Intelligent Video Analytics can also differentiate between genuine security events and known false triggers, such as challenging environments created by snow, wind (moving trees), rain, hail, and water reflections. For more expansive areas, like an airport perimeter fence, the system has the range and capability to provide analysis over large distances. And, if a moving camera is employed, it is also possible to capture data on objects in transit when used in conjunction with the Intelligent Tracking feature. For roadside use, Intelligent Video Analytics systems, such as the Bosch MIC IP range, are resistant to vibrations and can still operate in extreme weather conditions, continuing to detect objects in heavy rain or snow. Evolving cameras past surveillance It’s becoming ever clearer that the IoT is transforming the security camera from a device that simply captures images, into an intelligent sensor that plays an integral role in gathering the kind of vital business data that can be used to improve commercial operations in areas beyond security. For example, cities are transitioning into smart cities. The capabilities of an intelligent camera extend to the interaction and sharing of information with other devices (only those you have appointed) With intelligent video security cameras at the core of an urban infrastructure smart data can be collected to optimise energy consumption via smart city lighting that responds to crowd detection and movement. Cameras can also be used to improve public transport by monitoring punctuality and traffic flow based on queue lengths, with the ability to control traffic lights an option should a situation require it. As the urban sprawl continues and this infrastructure grows, the need for more knowledge of its use becomes more essential, necessitating the monitoring technology developed for use by human operators to evolve into smart sensing technology, that no longer just provides video feeds, but also uses intelligent analytics and sophisticated support systems. These systems filter out irrelevant sensor data and present only meaningful events, complete with all relevant contextual data to operators to aid their decision-making. Expanding the video security camera network Today, video analytics technology has tangible benefits for human operator surveillance, and delivers KPIs that are highly relevant to transport operators, planners and city authorities. As an existing infrastructure, a video security camera network can be improved and expanded by installing additional applications rather than replaced. From a business perspective, that means greater value from a limited investment. Thereafter, the capabilities of an intelligent camera extend to the interaction and sharing of information with other devices (only those you have appointed), image and data interpretation, and the ability to perform a variety of tasks independently to optimise both your safety and business requirements. The fact is, cameras see more than sensors. Sounds obvious, but a conventional sensor will only trigger an alarm when movement is detected, whereas a camera can also provide the associated image and information like object direction, size, colour, speed or type, and use time stamps to provide historical information regarding a specific location or event. Based on this evidence, the video security camera of today is more than ready for the challenges of tomorrow.
As the Internet of Things (IoT) and other trends drive the convergence of physical and information security, integrators and end users attending ISC West may be struggling to keep pace with new areas of responsibility and expanding roles in the larger security ecosystem. Help is here. The Connected Security Expo, co-locating with ISC West, focuses on building a holistic security strategy for the connected enterprise. Exhibitors will focus on how physical and information security can be used together to mitigate new and emerging cyber-threats in a hyper-connected world. Connected Security Expo provides attendees access to cutting-edge products and technology in both the physical and IT secure realms. It is clearly a growth factor in the market. Here’s a look at some of the companies on display in the 2019 Connected Security Expo: Integrated video cloud service The AI-powered video analysis software suite delivers high-speed object search and facial classification Arcules provides the Arcules integrated video cloud service, which combines untapped video and sensor data with the latest technologies in cloud, artificial intelligence, and machine learning to deliver actionable business and security intelligence for modern organisations. The cloud-based service is designed to ensure security, scalability, streamlined operations, and bandwidth management — all from a single, easy-to-use interface. Hardware-accelerated solutions BrainChip Inc. is a global developer of software and hardware-accelerated solutions for advanced artificial intelligence (AI) and machine learning applications. The AI-powered video analysis software suite delivers high-speed object search and facial classification for law enforcement, counter terrorism and intelligence agencies. PSIM software platform CNL Software Inc. is an open, adaptable, scalable and secure Physical Security Information Management (PSIM) solutions provider. The IPSecurity Center PSIM software platform helps law enforcement, government agencies, the military, public and private critical infrastructure, transportation networks, corporations and campuses to integrate, automate and manage systems, allowing better security intelligence and improved operational efficiency. Facial recognition software IOmniscient Corp. provides facial recognition software that can recognise multiple faces even in crowded and uncontrolled scenes IOmniscient Corp. provides facial recognition software that can recognise multiple faces even in crowded and uncontrolled scenes. Matching faces with an existing database, the system can detect an unauthorised person and track him or her across non-overlapping cameras. Enhance situational awareness Oncam offers 360 and 180-degree video technology. The company has the largest range of wide-angle cameras that are open platform and easy to integrate. Unique dewarping technology allows the creation of award-winning video solutions for stakeholders from the C-suite to the security officer in wide range of industry segments. Oncam’s products greatly enhance situational awareness. Enterprise-class security Pivot3 is a provider of intelligent solutions using hyperconverged infrastructure. Pivot3’s intelligent infrastructure is optimised to deliver performance, resilience, scalability and ease-of-use required for enterprise-class security, video surveillance and IoT deployments. Electronic physical security The UL 2900-1 standard offers general requirements for software cybersecurity for network-connectable productsUL LLC is working to increase the prominence of the Underwriter Laboratories brand in cybersecurity with the UL Cybersecurity Assurance Program (CAP). The UL 2900-1 standard, the standard that offers general requirements for software cybersecurity for network-connectable products, was published in 2016 and in July 2017 was published as an ANSI (American National Standards Institute) standard. The standard was developed with cooperation from end users such as the Department of Homeland Security (DHS), U.S. National Laboratories, and other industry stakeholders. UL 2900-2-3 – the standard that focuses on electronic physical security/life safety & security industry, was published in September 2017. Proactive automated system Viakoo is a provider of the security industry’s first proactive automated system and data verification solution. Create significant value Vidsys is innovating and accelerating a transition to Converged Security and Information Management or CSIM. The company is committed to educating and supporting customers with their evolving needs to provide a more holistic view of risk and throughout the overall business process re-engineering necessary to create significant value across the entire organisation.
Using an asymmetric approach to perimeter security is more efficient and cost-effective. The approach, advocated by Applied Research Associates (ARA), involves strategic deployment of the company’s Pathfinder seismic-acoustic sensors. Asymmetric placement of the sensors is in contrast to typical perimeter security systems, which are linear: Sensors are distributed at specific intervals along a perimeter and require infrastructure to communicate back to a control centre. Instead, asymmetric placement involves fewer sensors that are hidden strategically and tactically in areas to address known vulnerabilities and threats. At a border, small, covert sensors – about the size of two hockey pucks – might be positioned in a “dead space” that isn’t otherwise monitored, or along a specific route intruders are known to use. Intercepting intruders at long distances The sensors can then track and map an intruder’s movement, locations and intent. Knowing the location of intruders enables personnel to intercept them at a further distance, even before they reach a perimeter; meanwhile the sensors continue to operate covertly and unseen by future intruders. The more focused approach allows an end user to address a specific known or suspected vulnerability in an immediate area of concern, rather than taking a broader approach typical of perimeter security. Radio waves of data packets transmitted from the sensors are masked so that they remain below the ambient noise floor “It lets us intercept the threat on our terms instead of theirs,” says Rob Jones, Chief of Counter Threat Technology Operations, Security Products Group, Applied Research Associates. “Our technology is not dependent on a physical structure. We can see what the threat is doing and force changes in the behaviour.” Wireless transmission range A longer wireless transmission range, a key feature of the Pathfinder sensor, enables the asymmetric approach. A proprietary RF radio sends transmissions 10 to 12 kilometres (6 to 8 miles) with no gateways or receivers (up to 20 km [12 miles] if the receiver and antenna are elevated]). Pathfinder is the second generation of a sensor developed in a DARPA (Defense Advanced Research Projects Agency) initiative. The Expendable Unattended Ground Sensor (E-UGS) has been fielded by the military in combat situations since 2010; more than 48,000 sensors have been deployed in the last seven years, many during recent Middle East conflicts. The device senses seismic-acoustic sound waves traveling through the ground, and analyses their “signature” to provide location and confirm if it is a human or an animal, for example, says Jones. Early warning detection with smart sensors Pathfinder, a new generation of the E-UGS technology developed for the commercial market, has better machine-learning algorithms, is therefore “smarter,” and provides higher detection probability and fewer false alarms. Battery life has been extended from 3 months to about 6 months for the smaller Pathfinder Mini sensor, which has the form, fit and function of the E-UGS sensor with improved probability of detection and lower false alarms. Battery life is up to two years for the larger Pathfinder XL model, which is about the size of a soda can. An Android app provides a map showing activity reported by the sensors, or the information can be integrated with a variety of physical security or command-and-control systems. “Our technology is not dependent on a physical structure. We can see what the threat is doing and force changes in the behaviour” The sensors are designed to monitor extended perimeters, remote areas and critical routes, providing early-warning detection of intruders where cameras and agents cannot detect them. The sensors are covert, buried in the ground and communicate wirelessly, so there is no infrastructure in the immediate area to tip off a sensor’s location. Radio waves of data packets transmitted from the sensors are masked so that they remain below the ambient noise floor – i.e., they are undetectable. Military and government applications E-UGS sensors are used ad hoc in the military battlefield to provide information on movement of intruders, locations and intent. The small sensors can be buried quickly by a soldier. They are also “expendable” – the E in E-UGSs – and considered almost disposable or consumable, typically used only once and not recovered (in military situations). In longer-term deployments, more typical in commercial applications, the length of service for the newer Pathfinder sensors depends on battery life (and changing batteries when needed). Enhanced and adapted for commercial usage, Pathfinder sensors can be used in a variety of vertical markets, especially critical infrastructure protection, as well as border protection. In the defence and Homeland security realm, they are used by international governments (Latin America, Africa). For critical infrastructure protection, they can be used to protect power grids, transmission lines, natural gas and oil pipelines. They are a fit for protecting any large areas, such as cattle ranching, preventing timber theft, and anti-poaching. ARA is promoting the sensors as “expendable, affordable, actionable and undetectable.” Specific to affordability, typically $11,000 buys a “starter kit” with communication architecture and hardware to launch the system. Applied Research Associates will be at ISC West in Booth 2125. “There is no other competitor in this space, with this price point, with these capabilities,” says Matt Fordham, Group Lead and Associate Division Manager, Unmanned Security Systems and Products, Applied Research Associates. Applied Research Associates is an international research and engineering company that provides government and industry solutions to problems to improve safety, security and way of life. For more information, please visit the Pathfinder website: https://www.ara.com/pathfinder
The largest global event of 2016 – and the year’s biggest security challenge – will no doubt be the Games of the XXXI Olympiad in Rio de Janeiro, Brazil. Around 15,000 athletes from 206 countries are expected to compete at the Olympic games, August 5-21, 2016, and about 7.5 million tickets will be issued. In our age of terrorism, organisers of any event on the scale of the Rio Olympics must consider the possibility of an attack or other security breach during the more than two weeks of the event. Ever since the 1972 Munich massacre, in which 11 Israeli Olympic team members were taken hostage and eventually killed (along with a German police officer), organisers of Olympic games have been keenly aware of the possibility of violence. The threat of terrorism raises the stakes even more. Recent events aggravate concerns about the safety of the Olympics, including the deadly Paris terrorism attacks in November of 2015 and the Brussels bombings earlier in 2016. The big stage of the Olympics would provide a temptingly high profile to any group wishing to foment terror by attacking the game venues, facilities nearby, or the 500,000 tourists expected to attend. Devoted to avoiding such a catastrophe will be a huge security effort at the Rio Olympics, including more than 85,000 forces – 47,000 Brazilian security professionals and 38,000 members of the armed services. An Anti-Terrorism Centre will promote sharing of information, training and knowledge among police, law enforcement and intelligence. Officials from more than 90 countries will work together on the effort. It will be the largest security operation in Brazilian history. In contrast, only 40,000 agents were used at the London Olympics in 2012. Several additional factors could impact security in Rio in August. They include: Devoted to avoiding a catastrophewill be a huge security effort at theRio Olympics, including more than85,000 forces – In contrast, only40,000 agents were used at theLondon Olympics in 2012 Need for awareness/ preparedness. Brazil has a history as a peaceful country, has no declared enemies, and has previously faced little threat of terrorism. It also has little intelligence expertise. Only recently did Brazil legislate to make terrorism a crime punishable by up to 24 years in prison. Might the South American country therefore be complacent to the possibility of an attack? Border security. Geographically, Brazil has more than 14,000 miles (23,000 kilometres) of borders that are difficult to control, much of them through Amazon jungles. The largest country in South America, Brazil shares borders with 10 other countries, and lack of controls in unpopulated regions is one factor in Brazil’s historic struggles to combat drug and arms trafficking. A 90-day visa waiver during the games, approved by Brazil’s congress, will help to attract more tourists, but at what cost to security? (Waivers are limited to visitors from nations seen as low-risk, including the United States, Canada, Australia and Japan.) Securing areas surrounding Olympic venues. Just steps from some of the largest Olympic venues are areas of Rio de Janeiro plagued by poverty and crime. Slums, or “favelas,” are within half a mile (less than 800 metres) of Maracana stadium, where opening ceremonies will kick off the games. Slums are also located near popular beaches and expensive hotels. Other problems of poverty – open sewage, destroyed houses and violence – are also concerns. Slums are controlled by drug traffickers and armed gangs, and police are few and inadequately armed. Many places are unsafe to walk at night. Violent crime. Protecting the Olympics includes keeping the entire city safe. Brazil has about 52,000 murders a year, and there are around three per day in Rio. Crowd violence is often a problem at Brazilian soccer matches. Budget cuts. In March, the government in Brazil decreased its security budget by 30 percent (about 550 million US dollars), with much of it targeting future investment. However, concern is that the cuts might undermine plans such as creation of an Urban Pacification Police in slum areas near the airport. Brazil’s political climate. Brazil's president is facing possible impeachment, and the nation's economy is in a recession freefall; might additional security risks result from the crisis? The Zika virus. Brazil has been hardest hit of any nation by the Zika virus, which is spread by mosquitoes and has particular risks for pregnant women and their unborn children. If the outbreak persists, might it cast a negative shadow over the Olympic games (or add another risk factor)? To prepare to meet the security challenges of the Olympics, Rio officials have undertaken several initiatives, including: Applying lessons they learned from hosting other big events. Large international events are not new to Brazil, which hosted the 2014 FIFA World Cup, the 2014 Va’a World Sprint Canoeing Championships, and the 2012 Rio+20 United Nations Conference on Sustainable Development. Brazil also has experience managing the large annual Carnival celebrations in Rio and elsewhere. Technology to secure the RioOlympics includes a largesecurity command and controlcenter in downtown Rio.Dozens of screens will displayviews from thousands ofcameras installed throughoutcity and in Olympic venues Surveying best practices by visiting other locales where large events were held. Brazilian officials will use past Olympics games as models. Officials have also visited other locations that sponsored big events, such as the Tour de France and the Boston Marathon, to see what they can learn. Hundreds of Brazilian police visited the Pan-Am Games in Toronto last summer to learn newer techniques. They are also implementing best practices from other international events such as the IAAF World Athletics Championships in Beijing and the Baku 2015 European games. The Rio Olympics’ head of security traveled to Washington to increase cooperation with the Department of Homeland Security and other US agencies. Creating a huge command and control centre. Technology to secure the Rio Olympics includes a large security command and control centre in downtown Rio, featuring walls covered with dozens of screens displaying views from thousands of cameras installed throughout city and in Olympic venues. Soldiers will control access to stadiums, X-ray machines and metal detectors. Screening visitors as they arrive. Officials will receive real-time data about airport passengers as they check in from their country of origin. As the days count down to the Rio Olympics, officials appear to be leaving very little to chance. However, with all attention focused on Rio during the Olympics, might the event be too tempting for a terrorist to resist? Given global threats and general security vulnerabilities, organisers of the Rio Olympics may need more than preparation to protect the games. They might need some luck, too.
HENSOLDT, the independent sensor solutions house, will deliver its IFF interrogator (IFF = Identification-friend-or-foe) for very short range and short range air defence applications to the French Ministry for the Armed Forces. The contract awarded to Hensoldt France SAS covers the delivery of 134 MSR1000I (monopulse secondary radar) destined for integration on the French Army’s MISTRAL missile launchers and MARTHA air defence command and control stations. The MSR1000I IFF interrogator has been successfully qualified by the French Defence Procurement Agency DGA in December 2018 and will perform NATO IFF interrogation together with the mini crypto-computer QRTK6NG, also manufactured by Hensoldt France. Following this, the first tranche has been notified and 41 MSR1000I compliant with the STANAG 4193 Edition 3 will be delivered in 2020. Precise identification of ships and aircraft IFF systems precisely identify ships and aircraft by automatically sending interrogation signalsThe French very short range and short range air defence platforms wiIl then be able to perform mode 4 and mode 5 interrogations. IFF systems precisely identify ships and aircraft by automatically sending interrogation signals which are answered by so-called transponders on-board friendly aircraft or ships. Thus, IFF enables field commanders to quickly distinguish friendly from hostile forces. Unlike Mode 4 used hitherto, Mode 5 employs sophisticated encryption techniques to avoid hostile signal manipulation, thus ensuring that the identification process is absolutely reliable and secure. With the decommissioning of 'Mode 4', ‘Mode 5’ needs to be introduced in all western armies, then being a precondition of joint operations of NATO and allied forces. IFF systems for ground and naval platforms HENSOLDT supplies customers all over the world with IFF equipment. Based on the experience of predecessor companies like Matra, Airbus and Siemens, the company is under contract to upgrade German, French, UK, US and other armed forces’ platforms with IFF systems using the latest ‘Mode 5’ standard. It has already delivered IFF systems – including crypto devices - to ground and naval platforms of 42 NATO and NATO-allied nations. HENSOLDT has already delivered IFF systems to ground and naval platforms of 42 NATO and NATO-allied nations In France, the company’s equipment is deployed on the ‘Charles de Gaulle’ aircraft carrier, the Rafale and Mirage 2000 combat aircraft, the NH90 helicopters and several air defence platforms. In Germany, the company has established the air traffic control/IFF network of the German Air Force and delivers interrogators and transponders to a number of airborne and naval platforms. In total, HENSOLDT has about 450 IFF systems under contract for more than 80 platform types.
HID Global®, a worldwide provider in trusted identity solutions, announced that the government of Tanzania has selected HID’s citizen ID solutions to add e-Visa and e-Permit capabilities to its e-Passport, which HID helped deploy last year as part of the Tanzania e-Immigration program. The new web-based visa and residence permit services allow visitors and residents to apply for and receive validated credentials for traveling or living in the country. Integrated e-immigration solution “This is an important milestone as we continue to work with HID Global to enhance and broaden the capabilities of our e-Immigration ecosystem,” said Dr Anna Peter Makakala, Tanzania’s Commissioner General of Immigration. “We plan to continue expanding this solution to our country’s border crossings and across the broader global community as we become a showcase for efficient, comprehensive and integrated e-Immigration solutions.” Convenient and efficient toolset We are pleased to be entering this second deployment phase with the government of Tanzania" “We are pleased to be entering this second deployment phase with the government of Tanzania, building on the success of the country’s e-Passport roll-out last year,” said Rob Haslam, Vice President of Sales, Citizen ID business with HID Global. “Immigration officers in Tanzania now have a convenient and efficient toolset for completing their vital mission of vetting and granting electronic visa and residence permit credentials to applicants.” Since early 2018, HID Global has been Tanzania’s primary supplier of an end-to-end solution for issuing e-Passports with advanced physical and electronic security features, automated verification capabilities and a tamper-proof contactless chip embedded in a polycarbonate datapage. The country now has a single citizen identification system that spans the entire identity journey from data capture to issuance and can be used to support e-Passports, e-Visas, e-Permits and other physical electronic documents. HID a solutions provider HID’s solutions can be found in sixty percent of all government-issued electronic identity projects around the world. As a solutions provider, HID is delivering complete, end-to-end system solutions that meet governmental requirements for national ID, e-Passport, foreign resident ID, driver license, vehicle registration and other programs.
Milestone Systems, the open platform company in IP video management software (VMS), was useful when Pope Francis visited the US/Mexico border town Ciudad Juarez, Mexico, in 2016. Large crowds of religious followers and the curious alike — estimated to be as many as 200,000 — made the pilgrimage to the region for a once-in-a-lifetime chance for many to see the leader of the Catholic Church in person. XProtect video surveillance systems in the neighbouring city of El Paso, Texas, were used to help manage the large crowds. In El Paso, city managers, local law enforcement and US immigration officials were concerned that population explosion would choke roadways, cause congestion, and present security risks as observers lined the roads and crossed the four bridges between the cities. The City of El Paso and the School District have their own 10 gigabit fibre WAN, which I'm sure was helpful in accessing the systems" Camera access from different locations "As can be imagined the Pope visit was huge; we've never seen anything like it. The crowds were crazy, and the focus for officials was all about security," said Marica Wever, President, Integrated Technology and Design (ITD), based in El Paso, Texas. "From the International Boundary and Water Commission, to Homeland Security, to other federal and local agencies, it seems everybody was here and they all wanted access to local video systems for their independent and joint efforts." Wever explained that because the Milestone XProtect Corporate video management software (VMS) is used across many of the local sub systems, officials were able to gain camera access through different users. "The City of El Paso and the School District are all Milestone-based, and they each have their own 10 gigabit fibre WAN, which I'm sure was helpful in accessing the systems," said Wever. "Across the two systems, there were about 100 cameras in use helping to monitor the situation." Maintaining safety and security While ITD was not directly involved with the security operations on the day of the event, Marcia Wever is very proud that the flexibility and reliability of the installed Milestone video surveillance systems they've deployed around the city of El Paso were able to be accessed to maintain safety and security in such a unique situation. "I've been told that all the players involved in the event were very happy with the video quality and accessibility of the systems," said Wever. "Events like this take on their own life as the various agencies come in, but there were no major incidents, and all feedback I have gained is that the system was quite effective."
HID Global, a provider of trusted identity solutions, has announced that the government of Tanzania has selected HID as its prime supplier for an end-to-end solution for issuing electronic passports as part of Tanzania’s transformative e-Immigration programme. The new ePassport was unveiled publicly as part of the inauguration of the end-to-end solution provided by HID Global. The solution incorporates advanced physical and electronic security features, automated passport verification capabilities and support for international standards. Marked by visually stunning landmark imagery, such as Mount Kilimanjaro and Zanzibar’s House of Wonders, the new Tanzania ePassport contains a contactless chip embedded in its polycarbonate datapage, which is proven as tamper-proof. HID Polycarbonate Electronic Datapage HID Global has partnered with DLRS Group for the manufacture of the passport booklets incorporating HID’s polycarbonate electronic datapage. This is the same partnership as for the current award-winning Irish electronic passport, with both the booklet and datapage manufactured at the two companies’ facilities in Ireland.The new ePassport will increase security and make travel easier for the country’s citizens The new ePassport will increase security while, at the same time, making travel easier for the country’s citizens, such as simply scanning their passports electronically at border control stations upon entry and exit. In addition, the new ePassport conforms to all international standards as set out by the International Civil Aviation Organization, ensuring seamless interactions by Tanzanians as they travel the world. “Tanzania is taking a leap forward in providing an electronic passport for our citizens,” said Dr. Anna Peter Makakala, Tanzania’s Commissioner General of Immigration. “Our people will be proud knowing they are carrying one of the most secure and modern passports in the world and can take advantage of some of the most advanced technology available.” New passports help enhance security Tanzania is not only modernising government services, but also raising security by enhancing the existing issuance process. Verifying the identities of travellers is a high priority for governments worldwide, as they crack down on counterfeit passports and upgrade border facilities. The e-Immigration solution includes an ePassport issuance system and personalisation facilities in Dar-Es-Salam and Zanzibar -- equipping the application centres and embassies – as well as biometric matching, border control, e-Visas, e-Permits and delivery of electronic passport books. Stefan Widing, President and CEO of HID Global, said, “We worked very closely with Tanzania’s government to conceptualise and bring into being this state-of the-art passport solution. Their government’s vision for faster, more secure electronic verification of identities matched our end-to-end solution capabilities for citizen identity. Working on a strict timeline, the Immigration team in Tanzania was a strong partner with us to deliver on this exemplary government project.”One of many benefits of the new e-passport solution from HID Global is that the holder can have an “emergency passport” on their smart phone Emergency passport on smartphone One of many benefits of the new e-passport solution from HID Global is that the holder can have an “emergency passport” on their smart phone, if their passport is stolen or lost in another country. The emergency passport, verifiable electronically by the embassy, allows the traveller to obtain the necessary document to return home or request a replacement passport without the need for further online checks, filling out forms or other time-consuming tasks. This mobile emergency passport is made possible using HID’s award-winning Seosâ technology for mobile citizen IDs, called HID goID. HID Global has shipped more than 150 million government-issued IDs in over 50 countries for major projects that include national ID, e-passport, foreign resident ID, driver’s licence and vehicle registration programmes. HID products and technology are present in sixty percent of all government issued electronic identity projects globally. Leveraging this experience, HID Global has formed a multi-year relationship with the government of Tanzania to ensure the highest levels of security for many years to come.
Qognify, a provider of big data solutions for physical security and operations, announced that it has recently expanded its security solution at Gardermoen Oslo Airport with Situator, the company’s market-leading situation management solution. Avinor, the group responsible for managing Norway’s airports, decided to not only expand and upgrade Oslo Airport, but unify its different systems to create a unified security platform. Extending to Situation Management A Qognify video management solution user since 2008, the Airport, with the support of Racom, Qognify’s partner, the airport now added Situator Situation Management solution. The comprehensive platform integrates all existing systems – Qognify and third-party, including thousands of surveillance cameras, access control and other sensors. Situator structures and correlates the information from these different systems for greater situational awareness, incident management and effective response. Flexigate override support Being a major European airport, Oslo serves many Schengen flights, meaning flights to the 26 European countries that have officially abolished passport and all other types of border control at their borders. Allowing the area to function as a single country for international travel purposes dictates special operational requirements using advanced Flexigate system. The Flexigate system avoids incidents where the wrong doors are opened to ensure that passengers who should go through the border control actually do so. Situator integrates with the advanced Flexigate access control system, and overrides switching of gates between Schengen and non-Schengen flights, as well as the domestic flights if the control systems are out of operations. Extended capabilities of existing technology Avinor Oslo Airport: “Situator allows us to leverage our existing technology, and extend the capabilities of those systems for increased value. Our long-term partnership with Racom and Qognify has given us the ability to smartly and cost-effectively upgrade our security without having to rip & replace previous, viable investments". "Adding Qognify Situator to the security and operations program at Oslo Airport has enabled us to confidently build true best-of-breed solution,” said Frode Igland, CEO, Racom AS. ”The new capabilities provide a common operating picture for all stakeholders, improving security and operations”. “Oslo Airport’s security program is one of the most advanced ones among the many airports we are involved in,” commented Moti Shabtai, Qognify’s CEO & President “Our partnership with Avinor and Racom is a testament to how deep, long-term collaboration can produce exceptional return on investment for the airport.”
The US Department of Homeland Security needed an ironclad ID solution to prevent widespread counterfeiting The U.S. Green Card has set a global, never-exceeded standard for uncompromised security. After more than 12 years and over 20 million cards featuring HID Global’s LaserCard® optical security media, the U.S. Department of Homeland Security turned to the same technology and expertise for its next-generation Green Card. In May 2010, the agency began issuing the new card, produced by HID Global and featuring a host of innovations in optical media for enhanced security as well as an award-winning multi-technology design that improves the efficiency of land border crossing. Counterfeiting problem By 1996, officials of the INS (now the U.S. Department of Homeland Security) were concerned that the Permanent Resident Card was too easily counterfeited. Officials estimated that counterfeiters had produced hundreds of thousands, possibly millions, of fraudulent documents, with some fakes selling for up to $15,000. Under pressure to control illegal immigration and meet legislative requirements for biometric based ID credentials, the agency needed an ironclad ID solution to prevent widespread counterfeiting and to uphold its international standing as a strong and effective immigration agency. HID Global LaserCard solution The overriding objective was to deploy the most counterfeit-resistant document possible with secure portable data storage. The combination was required to prevent fraudulent alteration, withstand ten years of use and support efficient issuance. A secondary objective was to assure reliable visual authentication where electronic readers are not available. By 2009, the agency faced the added requirement of complying with the new Western Hemisphere Travel Initiative (WHITI) to speed land border crossings. The U.S. Government has twice selected an ID credential, based on HID Global’s LaserCard® optical security media, as its permanent resident card. The card’s digital security has never been compromised. Forensic document specialists have testified before Congress that the card has “effectively put mass counterfeiters out of business.” Forensic document specialists have testified before Congress that the card has “effectively put mass counterfeiters out of business.” A major setback for mass counterfeiters For any ID card to be effective, it must be usable in a variety of situations, especially when inspected without the aid of electronic readers. HID Global’s LaserCard optical security-media provides the industry’s strongest visual security and counterfeit resistance characteristics: Rapid recognition of a genuine card and counterfeit resistance based on: Unique visual characteristics of optical security media Overt, covert and forensic micro-imaged security features resolved at 25,000 dots per inch High contrast, high resolution “photo-like” facial image of the legitimate cardholder irreversibly laser etched into the optical security media. This “Personalized Embedded Hologram” is unique among all card-based data storage media. The image cannot be altered and serves to confirm that other personalised images on the card’s surfaces have not been tampered with Security diffractive image: covert security feature that can be verified with a simple inspection tool Storage of tamper-proof digital information (facial image, demographics, biometrics) ISO standard data structure for interoperability Next generation Green Card Optical security media enables employers, authorities and inspection agents to make a confident judgment about card authenticity and visual identification of the cardholder, even when electronic readers are not available. Following extensive collaboration with the U.S. DHS, HID Global developed a much-enhanced, next generation Green Card whose design and features elevate the security and functionality of ID credentials to a new level.
Round table discussion
The world of politics, like the world of security, is an environment of constant change. But do changes in one have an impact on the other? Governments around the world are involved in buying a wide variety of physical security systems, so how those governments operate certainly affects how they spend money on security. But in a broader sense, governments (and the associated political forces at work) also impact how their citizens and those in the private sector view threats and, as a logical extension, the security systems they need to address those threats. We asked this week’s Expert Panel Roundtable: How does the political climate affect spending on security systems?
Terrorism is in the headlines all over the world. After any such incident, many of us in the physical security market find ourselves asking: What could we have done to prevent it? Assessing risk and preventing catastrophes before the fact are part of our market’s DNA; and yet, too often the random nature of terrorist attacks and their targeting of public places leave us unsure of anything anyone could have done. How can we translate the benefits of our industry’s products into real-world solutions that can prevent terrorist attacks? We presented the question to this week’s Expert Panel Roundtable, and received a variety of interesting responses. Specifically, we asked: How is the recent rise in terrorism impacting the physical security market (e.g., higher demand, different mix of products, etc.)? How should the physical security market respond? What solutions are needed?