As a provider of facial recognition and other biometric, as well as information and communications technologies, NEC Corporation welcomes greater industry collaboration and effective discussion for the future of facial recognition technology and business. As a point of background, NEC produces face, iris, fingerprint, palm print, finger vein, voice and ear acoustic recognition technologies, and has over 700 biometric recognition installations in over 70 countries around the world. In recent wee...
Pelco is pleased to announce four new combination IR/white light illuminator models to the award-winning Esprit Enhanced PTZ camera product line. These new models provide IR-only and white light/deterrent modes of operation to give you the ability to overtly capture clear full colour images when using white light direct illumination or covertly with clear black and white images when in IR-only mode. The new models are ideal for performance-oriented 24 by 7 operations as well as extreme tempera...
Terrorism by unmanned aircraft is a growing threat. Using drones to smuggle contraband into prisons is a current trend. While many countries are deploying UAVs in combat, the UAS technology is getting easier and easier to acquire by the general public and ill-intentioned groups. Most of current security systems set up in critical infrastructures are not sufficient to guarantee an appropriate level of protection. Over the past several months, more and more drones have been flying over Florida's p...
ClanTect, the UK-based provider of Motion Detection Systems for the security sector, is proud to announce the launch of its powerful new ‘ClanConnect’ communications software module. ‘ClanConnect’ provides a high-speed and secure communications gateway, connecting a wide dispersed network of remote terminals, with the head office host system. This provides for the rapid and tamper-free 2-way transmission of data and programs. The benefits for security operations within l...
PureTech Systems announced delivery of several mobile versions of its PureActiv wide area video surveillance software suite, including its patented geospatial video analytics, to the Department of Homeland Security’s Customs and Border Protection (CBP) as part of the Mobile Video Surveillance Systems (MVSS) program. The MVSS program, won by Tactical Micro of Fredericksburg VA, a division of Benchmark Electronics, consists of a complete mobile surveillance platform to aid the U.S. Border Pa...
ThinkReps LLC, a security manufacturers’ rep firm in the New York Metropolitan area, announces that the company has expanded and added a new team member, Kenneth C. Kraemer to its roster. ThinkReps is a manufacturer's representation firm based in New York and focused on enhancing the sales and market awareness of the best physical security solutions in the industry. The company is committed to providing top notch sales and support to its customer base and continues to raise the bar on sal...
HID Global, global provider of trusted identity solutions, has announced that the government of Argentina has selected HID Global to upgrade its ICAO electronic passport to a newer generation that will reduce costs, improve security and enhance the reliability of data reading at border control points. Enhanced data security and vetting The Argentine government is transitioning its electronic booklet from a printed antenna to a new copper wire antenna, which is more reliable, having a stronger bond with the chip holding the traveler’s data, and therefore reducing the failure rate. A vast majority of the ePassports around the world use copper wire antennas. Supporting stronger security elements, the booklet also features an electronic cover built with a radio-frequency shield. A thin layer of special material disturbs radio communication with the passport antenna, only when the booklet is closed, impeding it from being read or stolen by people with harmful intentions. It strongly decreases the risk of unauthorised access to chip data when passports are not inspected. In the current state of ICAO standards, the micro-controller chip constitutes the critical place where sensitive citizen biometric and biographical data is stored. HID Global continues to help countries such as Argentina gain the benefits of higher security, efficiency and flexibility from the newest generation of ePassports" Greater passport detail security “HID Global continues to help countries such as Argentina gain the benefits of higher security, efficiency and flexibility from the newest generation of ePassports,” said Rob Haslam, Vice President of Worldwide Sales, Citizen Identity Solutions business with HID Global. “Our eCover is one piece of a broader portfolio of HID solutions, systems, software and services that we offer to help governments issue and manage citizen IDs for millions of people.” The process to upgrade the Argentine passport started in June 2017 when the government opened a public bid. The delivery of the new eCovers started in March 2018, and the Argentine government began issuing the enhanced ePassports to citizens in April. Using the new eCover solution from HID’s Citizen Identity Solutions business unit, the Argentine government is expected to save $2.3 million USD (60 million pesos) annually. HID’s TLam eCover “The Argentine government was looking for a high-quality solution for its latest ePassport and wanted to align with the global market trends” said Eduardo Lerner President at the Institute of Publications and Statistics (IPESA), HID’s partner that assisted with the implementation of the new technology in Argentina. “We were able to combine HID’s state-of-the-art TLam eCover with our trusted delivery and advice to support Argentina’s goal to provide its citizens with one of the most secure passports in the world.”
Iris ID, a premier provider of iris recognition technology, announced its iCAM R100 face and iris cameras will be integrated into Mentalix, Inc.’s Fed Submit suite of live scan solutions. Fed Submit is employed by civilian and law enforcement agencies across the county, provides users with intuitive, multi-modal booking and background check systems. Mentalix, headquartered in Dallas, is an industry leader in FBI-certified identification software. Iris ID’s IrisAccess iCAM R100 cameras will now be made available with Mentalix Fed Submit live scan stations, operating alongside standard fingerprint scanners so iris information may be shared with the FBI as part of its NGI (Next Generation Identification) program. With Fed Submit it’s possible for agencies to access the FBI’s iris database, as well as create and grow their own local iris archive. Accurately capture iris data Dale Remmers, the chief technology officer of Mentalix, said the Iris ID technology was selected for its speed and accuracy in capturing iris data. He reported that jail officials can often acquire, submit and receive an FBI response to an iris query before a suspect’s booking procedure is completed. “They can know within a few minutes if the suspect arrested for public intoxication has any felony warrants in other states,” Remmers said. “We’re excited to be able to offer our law enforcement customers the Iris ID technology as an additional modality within our Fed Submit product.” The iris solution is contactless, unlike fingerprint pads which need to be wiped clean after each use R100 iris recognition technology The R100 iris recognition technology can obtain a valid identity scan from virtually any suspect. While fingerprints can be altered intentionally or worn down by jobs in industries such as agriculture, construction and manufacturing, iris patterns remain unchanged through a person’s life. The iris solution is also contactless, unlike fingerprint pads which need to be wiped clean after each use. Remmers said law enforcement clients may also use the iris scan feature of the Mentalix Fed Submit system to authenticate the identity of suspects being released from jail. Iris ID authentication Mohammed Murad, vice president global sales and business development, Iris ID, said the Mentalix partnership is another example of how Iris ID’s technology is being used to assist law enforcement officials. “Our iCAM R100 cameras add a valuable dimension to the Fed Submit kiosks” he said. “The Mentalix solution will make it easier – and faster – for local officials to know who is being booked and released from their facilities.” Iris ID technology is also being used by governments around the world for authentication at border crossings, national ID and voter registration efforts and by corporations large and small for access control and time and attendance applications.
The NATO Communications and Information (NCI) Agency has awarded Airbus a € 40 million contract for the delivery of the first phase of the new NATO Communications Infrastructure Project. The contract also includes options for future phases of the project, worth up to € 50 million. WAN IP Communications The NATO Communications Infrastructure project will replace a major part of the NATO General Communications System (NGCS), involving 72 NATO sites. It will provide a major upgrade of wide area network protected IP communications across the NATO command structure, NATO headquarters and NATO points of presence in NATO member nations. he project covers the delivery of upgraded IP access and transport services across different security classifications with significantly increased capacity, quality of service and traffic engineering capabilities. It also covers NATO unclassified voice services through the replacement of old telephony switches by voice over IP telephony at 25 sites. The design review is estimated to be completed in December 2018 while the first phase of implementation should be completed by the end of 2019. IT Modernisation The NATO Communications Infrastructure Project, together with the IT Modernisation Project and the Enterprise NATO Public Key Infrastructure Project, is part of the wider IT Modernisation Programme which aims to transform NATO's static IT infrastructure into a homogeneous enterprise. It will include customer-funded service delivery systems, with a common service management and control layer, increased levels of virtualisation, modern cloud technology, and appropriate resilience mechanisms.
Securitas UK was proud to attend the British Forces Resettlement Services (BFRS) careers fair in Aldershot, on Thursday 24th May. Over 60 companies were in attendance on the day, including Royal Mail, Fujitsu, XPO Logistics and DHL. BFRS is a Community Interest Company (CIC), a social enterprise created in 2009 to support the armed forces community. They host career fairs across the country, to ensure companies are aware of the benefits of employing from this community. In February 2018, Securitas signed The Armed Forces Covenant, as a show of support for service leavers looking for a new career pathway. Attendance at the BRFS careers fair was part of Securitas’ ongoing commitment to the Covenant. Valuing the services of military personnel Securitas employs a large number of service leavers in a variety of front line and management roles. Andy Hill, Area Director at Securitas, commented: “Securitas recognises the value of serving personnel, reservists, veterans and military families in business. I joined Securitas 8 years ago, after 19 years of service with the armed forces, and I am now the Area Director for Lancashire, Cheshire, Yorkshire & Humber. “Initially, after leaving, I found it difficult to engage with employers as they were not able to identify how my skills and experience could be of benefit in their workplace. Military training instils a number of key transferable skills in an individual, including resilience, vigilance, self-discipline and an appreciation of risk and threat, to name just a few. It’s important that potential employers, in all sectors, understand how these valuable skills can be of benefit.”
The Security Industry Association (SIA) has announced the agenda for its annual public policy and government security technology conference, SIA GovSummit. This event – held June 27 and 28 at the National Association of Home Builders in Washington, D.C. – will bring together government security leaders and private industry technologists for top-quality information sharing and education on security topics affecting federal, state and even local agencies. Day 1 of SIA GovSummit 2018 will highlight discussions on a variety of topics, including: OMB’s New Cybersecurity and Identity Policy: Impact on Federal Physical Access Control Systems Movement to the Cloud for Video and Other Security Applications Procurement Strategies for Effective Security Solutions The Role of Artificial Intelligence and Machine Learning in Video and Other Applications Biometrics in Border Security Speakers include Matthew Goodrich, FedRAMP director at the General Services Administration; Daryle J. Hernandez of the U.S. Department of Homeland Security’s (DHS’) Interagency Security Committee; Dr. Kathleen Kiernan, founder and CEO of Kiernan Group Holdings; David Sousa, division director at the Federal Protective Service; and consultant Tim Williams. SIA is expanding the popular Secure Schools Roundtable into a half-day event presented in cooperation with the Congressional School Safety Caucus Expanding Secure Schools Roundtable Following the day’s discussions, attendees will be invited to join a networking reception and the Policy Leadership Awards Dinner. Paul Begala, commentator at the Washington Speaker Bureau, will provide remarks at the dinner. The second day will kick off with a SIAThere! and Northern Capital Region Security Forum breakfast at the Capitol Hill Club, featuring remarks from Rep. Mike Rogers (R-Ala.). Following the breakfast – in addition to its member visits to Capitol Hill offices – SIA is expanding the popular Secure Schools Roundtable into a half-day event presented in cooperation with the Congressional School Safety Caucus. The gathering will highlight topics such as the need for school security guidelines and standards, the role of the federal and state governments in funding school security Highlighting school security related topics This gathering – held at the U.S. Capitol Visit Centre – will feature discussion with key stakeholders from government, industry, education and law enforcement and highlight topics such as the need for school security guidelines and standards, the role of the federal and state governments in funding school security and the need for coordination among educators, school facility personnel and first responders in protecting our schools. “SIA GovSummit gives government and industry the opportunity to come together, share information and collaborate on security, including assessment of security investment priorities,” said Jake Parker, SIA’s director of government relations. “In light of the recent tragedy in Parkland, Florida, SIA is also looking forward to hosting a half-day, expanded version of its Secure Schools Roundtable as part of the summit to address safety and security in our schools.” Free entry for government personnel SIA GovSummit is free for all government employees, including federal, state, county and municipal-level staff (both domestic and international), plus all military, law enforcement and public safety representatives. Early bird registration rates for non-government attendees are available through June 1. This event is made possible thanks to the following sponsors and partners: Washington Sponsors Lenel and Interlogix; Lincoln Sponsor HID Global; dinner and reception sponsor Allegion; event sponsors AMAG Technology, American Fuel & Petrochemical Manufacturers, Ameristar Security, ASIS International, Axis Communications, BCDVideo, Calpipe Industries, Gallagher, GSA Schedules Inc., DHS Science & Technology, Louroe Electronics, Marshalls, Milestone, Nasatka Security and Renova Technology; and industry partner ISC Expos and Conferences.
IDEMIA, the global leader in Augmented Identity, has announced the appointment of Donnie Scott as Senior Vice President of Public Security for its identity & security business in North America. Before joining IDEMIA, Mr. Scott served as Director of National Security Business Development for DXC Technology, global independent, comprehensive IT services company. He was responsible for DXC’s national security clients across the U.S. Public Sector, including the pursuit of new business as well as the development and execution of the company’s strategic growth vision. Mr. Scott brings over 16 years’ experience in business development for the U.S. Public Sector, working with a wide range of clients from local, state, civilian, healthcare and defense agencies. Donnie’s strong dedication to customer service and his passion for growth will have an immediate positive impact on our business" Strategic leadership “The Public Security business is a critical area of focus for IDEMIA in North America and I am excited to lead it into the future,” said Scott. “For decades IDEMIA has been committed to issues concerning public security and its valued partnerships with U.S. government agencies demonstrates the company’s long-standing and ongoing dedication to secure and simplify lives.” “I am pleased to welcome Donnie Scott to our team and am confident he will provide excellent strategic leadership,” said Ed Casey, Chief Executive Officer, Identity & Security, N.A. “Donnie’s strong dedication to customer service and his passion for growth will have an immediate positive impact on our business.” Automated identification solutions With over 40 years of experience partnering with federal, state and local law enforcement agencies, IDEMIA’s Public Security mission is to detect threats in public areas, securely grant access to premises and physical assets, strengthen border security and help police drastically improve efficiency. Through best-in-class biometric and facial recognition technologies and automated identification solutions, IDEMIA addresses the major security challenges that these agencies face while keeping America’s states, cities and towns secure.
Global and domestic threats have highlighted the need for tighter security across all verticals. One of the technologies that has redefined situational awareness and intrusion detection is thermal imaging. Once a technology exclusively manufactured for the military operations, thermal cameras today are deployed across hundreds of security applications and continue to see strong demand in existing and emerging commercial markets. With thermal technology, security personnel can see in complete darkness as well as in light fog, smoke and rain Technology overview and early adoption What distinguishes thermal cameras from optical sensors is their ability to produce images based on infrared energy, or heat, rather than light. By measuring the heat signatures of all objects and capturing minute differences between them, thermal cameras produce clear, sharp video despite unfavorable environmental conditions. With thermal technology, security personnel can see in complete darkness as well as in light fog, smoke and rain. Originally a military developed, commercially qualified technology, the first thermal cameras for military and aircraft use appeared in the 1950s. By the 1960s, the technology had been declassified and the first thermal camera for commercial use was introduced. However, it wasn’t until the late 1990s - when FLIR Systems introduced a camera with an uncooled thermal detector - when the technology began to see substantial adoption beyond government defense deployments. Installations at critical infrastructure sites In the 2000s, industrial companies were some of the first adopters of thermal, using the technology for predictive maintenance to monitor overheating and machine malfunctions. In the years following the September 11 terrorist attacks in 2001, there was an increase in thermal camera installations across critical infrastructure sites. Stricter security requirements drove the deployment of thermal cameras for perimeter protection, especially in the nuclear power sector. Thermal cameras produce clear video in daylight, low light or no light scenarios and their sharp images result in higher performing analytics In 2010, the U.S. Nuclear Regulatory Committee released its 73.55 policy, which states nuclear facilities must “provide continuous surveillance, observation and monitoring” as a means to enhance threat detection and deterrence efforts onsite. Because thermal cameras produce clear video in daylight, low light or no light scenarios and because their sharp images result in higher performing analytics, thermal cameras quickly became the preferred option for nuclear facilities. Likewise, following the 2013 sniper attack on PG&E Corporation’s Metcalf transmission substation, the Federal Energy Regulation Commission introduced the Critical Infrastructure Protection Standard 014 (CIP-014). The policy requires utilities to identify threats to mission critical assets and implement a security system to mitigate those risks. This statute also led to more thermal installations in the utility sector as thermal cameras’ long-range capabilities are ideal for detection of approaching targets beyond the fence line. The demand from both industrial and critical infrastructure entities, as well as other factors, helped drive volume production and price reduction for thermal, making the technology more accessible to the commercial security marketplace. Commercial applications In recent years, the increasing affordability of thermal cameras along with the introduction of new thermal offerings has opened the door to new commercial applications for the technology. In the past, thermal cameras were designed for applications with enormous perimeters, where the camera needed to detect a human from 700 meters away. Locations like car dealerships, marinas and construction supply facilities can be protected by precise target detection, thermal analytic cameras providing an early warning to security personnel Today, there are thermal cameras specifically designed for short- to mid-range applications. Developed for small to medium enterprises, these thermal cameras ensure property size and security funds are no longer barriers to adoption. Lumber yards, recreation fields and sports arenas are some of the commercial applications now able to implement thermal cameras for 24-hour monitoring and intrusion detection. Affordable thermal cameras with onboard analytics have become attractive options for commercial businesses Innovation and advancements Innovation and advancements in the core technology have also spurred growth in thermal camera deployment, providing faster image processing, higher resolution, greater video analytic capabilities and better camera performance. In particular, affordable thermal cameras with onboard analytics have become attractive options for commercial businesses that need outdoor, wide area protection. Car dealerships, marinas and construction supply locations all store valuable merchandise and materials outside. Without protection, these assets are vulnerable to vandalism and theft. However, by providing precise target detection, thermal analytic cameras provide an early warning to security personnel so that they can intervene before a crime is committed. By helping to deter just one incident, the thermal solution delivers a clear ROI. New market opportunities Not only are there more thermal cameras in use today than ever before, but there are also more thermal sensors being integrated with other multi-sensor systems, driving the adoption of thermal in new markets. For large perimeter surveillance applications, thermal is repeatedly being integrated with radar and drones to expand situational awareness beyond the point of fixed cameras. Users get immediate, accurate alerts of approaching targets and evidentiary class video for target assessment In the commercial market, thermal imagers are combined with optical sensors, analytics and LED illuminators into one solution that integrates with central monitoring station platforms. By bringing these technologies together, users get immediate, accurate alerts of approaching targets and evidentiary class video for target assessment. The result is a lower number of false positives, reducing the total cost of ownership for the solution. These multi-sensor solutions also feature two-way audio capabilities, which enable remote security officers to act as “virtual guards” and speak to intruders in real-time to dissuade them from illegal activity. The introduction of solutions that integrate all these state-of-the-art technologies under one unit reduces the amount of capital and infrastructure needed for deployment. Consequently, more small businesses and alarm monitoring companies can implement advanced perimeter security technologies like thermal sensors, some for the very first time. Thermal cameras have gone from military defense devices to widespread commercial security cameras Multi-sensor thermal solutions Multi-sensor solutions featuring thermal are quickly gaining traction and opening the door to new business opportunities for the security channel. One of the primary reasons for the strong market interest in these systems is they enable integrators to increase their recurring monthly revenue (RMR). With intense price competition and eroding margins on CCTV equipment, integrators have to rely on RMR to grow their businesses. Offering remote video monitoring services and virtual guarding technologies is one of the best ways to do so. Additionally, there is a clear demand for it. Central stations are continually looking for new technologies to offer their customers and businesses are interested in economical alternatives to physical guards. In conclusion, thermal cameras have gone from military defense devices to widespread commercial security cameras that are a substantial segment of the outdoor security protection market. From nuclear power plants to construction locations, thermal technology is being implemented to secure sites around the globe.
The Internet of Things (IoT) is having a significant and ever-changing impact on the way we view video security. Today, cameras are expected to be so much more than devices with which to simply capture images; they need to be far smarter than that. These future-facing cameras are becoming an integral part of the vast digital connectivity infrastructure, delivering a parallel performance as intelligent sensors with the ability to extract the kind of invaluable data that helps businesses make improvements in the area of video security, and beyond. However, as the list of possibilities grows, so too does the risk of unauthorised access by cybercriminals. We should all be aware that a single weak link in a communications infrastructure can give hackers access to sensitive data. That’s the bad news. Safeguarding data and utilising deep learning The good news is cybercrime can be avoided by employing a data security system that’s completely effective from end-to-end. One technological advancement that the trend-spotters are predicting will become part of the video security vocabulary is ‘deep learning’ Once this level of safeguarding is in place you can begin to confidently explore the technologies and trends happening now, and those on the horizon. So, what will be having an influence on surveillance in 2018? Well, according to IHS Markit, one technological advancement that the trend-spotters are predicting will become part of the video security vocabulary is ‘deep learning’, which uses algorithms to produce multiple layers of information from the same piece of data, therefore emulating the way the human brain absorbs innumerable details every second. In Europe, GDPR compliance will also be a big talking point as new principles for video surveillance data collection, use limitation, security safeguards, individual participation and accountability are introduced. And, as the popularity – and misuse – of drones continues to rise, the recent developments in drone detection technology will be particularly welcomed by those whose primary concern relates to large areas, such as airport perimeter security. The future of 'smart' video analytics An important feature of today’s intelligent cameras is the ability to provide smart video analytics. The Bosch ‘i’ series, for example, offers a choice of formats – Essential Video Analytics and Intelligent Video Analytics. Essential Video Analytics is geared toward regular applications such as small and medium businesses looking to support business intelligence (e.g. inter-network data transfer), large retail stores and commercial buildings for advanced intrusion detection, enforcing health and safety regulations (no-parking zones or detecting blocked emergency exits) and analysing consumer behaviour. The camera-based, real-time processing can also be used to detect discarded objects, issue loitering alarms and detect people or objects entering a pre-defined field. Intelligent Video Analytics provides additional capabilities. It is designed for demanding environments and mission-critical applications, such as the perimeter protection of airports, critical infrastructures and government buildings, border patrol, ship-tracking and traffic-monitoring (e.g. wrong-way detection, traffic-counts and monitoring roadsides for parked cars: all vital video security solutions). An important feature of today’s intelligent cameras is the ability to provide smart video analytics Intelligent Video Analytics can also differentiate between genuine security events and known false triggers, such as challenging environments created by snow, wind (moving trees), rain, hail, and water reflections. For more expansive areas, like an airport perimeter fence, the system has the range and capability to provide analysis over large distances. And, if a moving camera is employed, it is also possible to capture data on objects in transit when used in conjunction with the Intelligent Tracking feature. For roadside use, Intelligent Video Analytics systems, such as the Bosch MIC IP range, are resistant to vibrations and can still operate in extreme weather conditions, continuing to detect objects in heavy rain or snow. Evolving cameras past surveillance It’s becoming ever clearer that the IoT is transforming the security camera from a device that simply captures images, into an intelligent sensor that plays an integral role in gathering the kind of vital business data that can be used to improve commercial operations in areas beyond security. For example, cities are transitioning into smart cities. The capabilities of an intelligent camera extend to the interaction and sharing of information with other devices (only those you have appointed) With intelligent video security cameras at the core of an urban infrastructure smart data can be collected to optimise energy consumption via smart city lighting that responds to crowd detection and movement. Cameras can also be used to improve public transport by monitoring punctuality and traffic flow based on queue lengths, with the ability to control traffic lights an option should a situation require it. As the urban sprawl continues and this infrastructure grows, the need for more knowledge of its use becomes more essential, necessitating the monitoring technology developed for use by human operators to evolve into smart sensing technology, that no longer just provides video feeds, but also uses intelligent analytics and sophisticated support systems. These systems filter out irrelevant sensor data and present only meaningful events, complete with all relevant contextual data to operators to aid their decision-making. Expanding the video security camera network Today, video analytics technology has tangible benefits for human operator surveillance, and delivers KPIs that are highly relevant to transport operators, planners and city authorities. As an existing infrastructure, a video security camera network can be improved and expanded by installing additional applications rather than replaced. From a business perspective, that means greater value from a limited investment. Thereafter, the capabilities of an intelligent camera extend to the interaction and sharing of information with other devices (only those you have appointed), image and data interpretation, and the ability to perform a variety of tasks independently to optimise both your safety and business requirements. The fact is, cameras see more than sensors. Sounds obvious, but a conventional sensor will only trigger an alarm when movement is detected, whereas a camera can also provide the associated image and information like object direction, size, colour, speed or type, and use time stamps to provide historical information regarding a specific location or event. Based on this evidence, the video security camera of today is more than ready for the challenges of tomorrow.
While there is much hype around drone technology today, initial successful drone usage for security can be dated back to the 1960s, when the US utilised the Lightning Bug 147, a camera-equipped unmanned aerial vehicle that could travel 600 miles for surveillance in Vietnam, China and Korea. Drones for effective surveillance Since this initial deployment, drones have been used for a variety of security and surveillance applications. However, as professional-grade commercial drones incorporate newer, more advanced features and technologies, their capabilities will allow for many new scenarios and applications within fully-integrated security systems. The security industry, in addition to first response and law enforcement, will be among the first to truly experience the benefits of the most current drone technologies. And, these industries have already started to utilise drones in new ways—the most recent example being the use of commercial drones to save lives during hurricanes Irma and Harvey. For these reasons, UAVs are becoming an integral tool in multiple industries and according to PwC, will have an expected total value of $127 billion by 2020, $10.5 billion of which will be in security applications of drones.There is room to improve on cost, efficiency and safety, so the opportunity for commercial drone technologies is large Drones in fire, border and perimeter security Current drone users in the security arena are comprised of law enforcement, fire departments, border security and first responders, who primarily use UAVs for border control, perimeter surveillance and monitoring, anti-terror operations and searching for missing persons. These tasks generally require manned teams and can even include helicopters, the results being costly, time-consuming and potentially dangerous. Alternatively, these teams use consumer-grade drones, which simply lack the capabilities and levels of security necessary to be used safely for such operations. This makes the opportunity for commercial drone technologies large, as there is room to significantly improve on cost, efficiency and safety. By adding autonomous drones to their arsenals, security forces are able to accomplish their objectives more easily and effectively by removing the need for a security team member to operate the drone—as it works on its own—and instead, focus on responding to the security situation at hand. Employing fully autonomous systems, especially in surveillance, is a critical feature most drone systems currently don't allow UAVs can also enter narrow spaces, produce minimal noise, and can be equipped with night vision cameras and thermal sensors, allowing them to see beyond what the human eye can detect. They can also quickly cover large expanses of ground and access hard to reach places. However, most drones today have not reached the pinnacle of what is possible for advanced commercial UAVs. Drawbacks of current drone solutions Despite how far drone technology has come, drones used in security settings are still riddled with shortcomings. This is apparent in the build quality of current drones, most of which are made from hardened plastic, which falters when faced with rough weather conditions or after experiencing tough falls and crashes. Closed-system integration is another key element current UAVs lack. Not being able to integrate drones into wider closed-security systems creates major gaps in the efficacy of security operations. The use of carbon fibre in the build of drone hulls will increase drones' weather durability - and ultimately make them more valuable Lastly, employing fully autonomous systems, especially in surveillance, is a critical feature most drone systems currently don't allow - both due to shortcomings in the technology and due to the need for regulations to catch up to the advancements and capabilities of drone technologies. The combination of these drawbacks can create lacklustre drone results, and when lives are on the line, these results simply aren't enough. Why commercial drones can make a difference That being said, 2018 is the year where the security sector will experience increased drone adoption. That’s because there are some drone technologies being developed today that overcome many of the shortcomings outlined above. These are the technologies we will see having the greatest impact within the security industry. Here are some of the drivers of change, both in the industry and technology that will allow drones to effectively integrate into the security market: Increased processing power: This will allow autonomous drones, powered by AI technology, to track objects in real time, and adjust their courses and actions as needed. This allows for greater drone operational efficiency while simultaneously drawing less power from the battery, thereby lengthening the drone’s flying time. These improved processors will also make way for increased broadcast range capabilities, allowing for longer distance drone operations. Regulations will catch up to the technology: This is a trend we began to see at the tail end of 2017. Governments in both the United States and Europe have realised that drone regulations must keep up to gain the most from UAV technologies, as well as to counter the use of drones for terror or other nefarious tasks. To that end, the US government began talks with drone developers to discuss the expansion of commercial drone operations, and the UK government introduced tougher regulations to crackdown on dangerous flying and criminal drone use. Drone regulation will move in favour of autonomous drone operation: As governments increase regulations in favour of the commercial drone industry, commercial players will increase pressure to allow for fully autonomous operation. Full autonomy means Beyond Visual Line Of Sight (BVLOS) drone functionality. This enables drone operators to fly a UAV with the drone out of their line of sight, maximising the capabilities of the UAV, and in the case of security missions, keeping the pilot out of harm’s way. New materials will increase drone hull durability: As drone makers will have learned from their drones’ lack of weather resistance following the tumultuous hurricanes the U.S. experienced this past year, the use of carbon fibre in the build of drone hulls will increase their weather durability. Better capabilities will encourage adoption among security: New commercial drones will have longer flight times, longer battery lives, will carry heavier payloads, and will integrate advanced computer vision technologies and real-time connectivity. This will enable drones on security missions in remote areas to send a live stream of their field of vision to drone operators at a central command station. Full integration of security systems: The interoperability of a variety of technologies will make drones another sensor in fully integrated and closed security systems that may include smart fences, security cameras and other infrastructure elements. Full integration also means that these elements will be controlled from the same central command centre, whether for securing a specific facility, or as part of surveillance system on a military base, or other closed location. This will allow security personnel to use drones more effectively, saving time, money, and increasing the safety of security professionals in the field. This year is going to be huge for the drone security market, as it is about to experience a significant improvement in drone performance, which will lead to a widespread escalation in drone adoption. The results will be prolific for both drone makers and security force users.
Using an asymmetric approach to perimeter security is more efficient and cost-effective. The approach, advocated by Applied Research Associates (ARA), involves strategic deployment of the company’s Pathfinder seismic-acoustic sensors. Asymmetric placement of the sensors is in contrast to typical perimeter security systems, which are linear: Sensors are distributed at specific intervals along a perimeter and require infrastructure to communicate back to a control centre. Instead, asymmetric placement involves fewer sensors that are hidden strategically and tactically in areas to address known vulnerabilities and threats. At a border, small, covert sensors – about the size of two hockey pucks – might be positioned in a “dead space” that isn’t otherwise monitored, or along a specific route intruders are known to use. Intercepting intruders at long distances The sensors can then track and map an intruder’s movement, locations and intent. Knowing the location of intruders enables personnel to intercept them at a further distance, even before they reach a perimeter; meanwhile the sensors continue to operate covertly and unseen by future intruders. The more focused approach allows an end user to address a specific known or suspected vulnerability in an immediate area of concern, rather than taking a broader approach typical of perimeter security. Radio waves of data packets transmitted from the sensors are masked so that they remain below the ambient noise floor “It lets us intercept the threat on our terms instead of theirs,” says Rob Jones, Chief of Counter Threat Technology Operations, Security Products Group, Applied Research Associates. “Our technology is not dependent on a physical structure. We can see what the threat is doing and force changes in the behaviour.” Wireless transmission range A longer wireless transmission range, a key feature of the Pathfinder sensor, enables the asymmetric approach. A proprietary RF radio sends transmissions 10 to 12 kilometres (6 to 8 miles) with no gateways or receivers (up to 20 km [12 miles] if the receiver and antenna are elevated]). Pathfinder is the second generation of a sensor developed in a DARPA (Defense Advanced Research Projects Agency) initiative. The Expendable Unattended Ground Sensor (E-UGS) has been fielded by the military in combat situations since 2010; more than 48,000 sensors have been deployed in the last seven years, many during recent Middle East conflicts. The device senses seismic-acoustic sound waves traveling through the ground, and analyses their “signature” to provide location and confirm if it is a human or an animal, for example, says Jones. Early warning detection with smart sensors Pathfinder, a new generation of the E-UGS technology developed for the commercial market, has better machine-learning algorithms, is therefore “smarter,” and provides higher detection probability and fewer false alarms. Battery life has been extended from 3 months to about 6 months for the smaller Pathfinder Mini sensor, which has the form, fit and function of the E-UGS sensor with improved probability of detection and lower false alarms. Battery life is up to two years for the larger Pathfinder XL model, which is about the size of a soda can. An Android app provides a map showing activity reported by the sensors, or the information can be integrated with a variety of physical security or command-and-control systems. “Our technology is not dependent on a physical structure. We can see what the threat is doing and force changes in the behaviour” The sensors are designed to monitor extended perimeters, remote areas and critical routes, providing early-warning detection of intruders where cameras and agents cannot detect them. The sensors are covert, buried in the ground and communicate wirelessly, so there is no infrastructure in the immediate area to tip off a sensor’s location. Radio waves of data packets transmitted from the sensors are masked so that they remain below the ambient noise floor – i.e., they are undetectable. Military and government applications E-UGS sensors are used ad hoc in the military battlefield to provide information on movement of intruders, locations and intent. The small sensors can be buried quickly by a soldier. They are also “expendable” – the E in E-UGSs – and considered almost disposable or consumable, typically used only once and not recovered (in military situations). In longer-term deployments, more typical in commercial applications, the length of service for the newer Pathfinder sensors depends on battery life (and changing batteries when needed). Enhanced and adapted for commercial usage, Pathfinder sensors can be used in a variety of vertical markets, especially critical infrastructure protection, as well as border protection. In the defence and Homeland security realm, they are used by international governments (Latin America, Africa). For critical infrastructure protection, they can be used to protect power grids, transmission lines, natural gas and oil pipelines. They are a fit for protecting any large areas, such as cattle ranching, preventing timber theft, and anti-poaching. ARA is promoting the sensors as “expendable, affordable, actionable and undetectable.” Specific to affordability, typically $11,000 buys a “starter kit” with communication architecture and hardware to launch the system. Applied Research Associates will be at ISC West in Booth 2125. “There is no other competitor in this space, with this price point, with these capabilities,” says Matt Fordham, Group Lead and Associate Division Manager, Unmanned Security Systems and Products, Applied Research Associates. Applied Research Associates is an international research and engineering company that provides government and industry solutions to problems to improve safety, security and way of life. For more information, please visit the Pathfinder website: https://www.ara.com/pathfinder
The largest global event of 2016 – and the year’s biggest security challenge – will no doubt be the Games of the XXXI Olympiad in Rio de Janeiro, Brazil. Around 15,000 athletes from 206 countries are expected to compete at the Olympic games, August 5-21, 2016, and about 7.5 million tickets will be issued. In our age of terrorism, organisers of any event on the scale of the Rio Olympics must consider the possibility of an attack or other security breach during the more than two weeks of the event. Ever since the 1972 Munich massacre, in which 11 Israeli Olympic team members were taken hostage and eventually killed (along with a German police officer), organisers of Olympic games have been keenly aware of the possibility of violence. The threat of terrorism raises the stakes even more. Recent events aggravate concerns about the safety of the Olympics, including the deadly Paris terrorism attacks in November of 2015 and the Brussels bombings earlier in 2016. The big stage of the Olympics would provide a temptingly high profile to any group wishing to foment terror by attacking the game venues, facilities nearby, or the 500,000 tourists expected to attend. Devoted to avoiding such a catastrophe will be a huge security effort at the Rio Olympics, including more than 85,000 forces – 47,000 Brazilian security professionals and 38,000 members of the armed services. An Anti-Terrorism Centre will promote sharing of information, training and knowledge among police, law enforcement and intelligence. Officials from more than 90 countries will work together on the effort. It will be the largest security operation in Brazilian history. In contrast, only 40,000 agents were used at the London Olympics in 2012. Several additional factors could impact security in Rio in August. They include: Devoted to avoiding a catastrophewill be a huge security effort at theRio Olympics, including more than85,000 forces – In contrast, only40,000 agents were used at theLondon Olympics in 2012 Need for awareness/ preparedness. Brazil has a history as a peaceful country, has no declared enemies, and has previously faced little threat of terrorism. It also has little intelligence expertise. Only recently did Brazil legislate to make terrorism a crime punishable by up to 24 years in prison. Might the South American country therefore be complacent to the possibility of an attack? Border security. Geographically, Brazil has more than 14,000 miles (23,000 kilometres) of borders that are difficult to control, much of them through Amazon jungles. The largest country in South America, Brazil shares borders with 10 other countries, and lack of controls in unpopulated regions is one factor in Brazil’s historic struggles to combat drug and arms trafficking. A 90-day visa waiver during the games, approved by Brazil’s congress, will help to attract more tourists, but at what cost to security? (Waivers are limited to visitors from nations seen as low-risk, including the United States, Canada, Australia and Japan.) Securing areas surrounding Olympic venues. Just steps from some of the largest Olympic venues are areas of Rio de Janeiro plagued by poverty and crime. Slums, or “favelas,” are within half a mile (less than 800 metres) of Maracana stadium, where opening ceremonies will kick off the games. Slums are also located near popular beaches and expensive hotels. Other problems of poverty – open sewage, destroyed houses and violence – are also concerns. Slums are controlled by drug traffickers and armed gangs, and police are few and inadequately armed. Many places are unsafe to walk at night. Violent crime. Protecting the Olympics includes keeping the entire city safe. Brazil has about 52,000 murders a year, and there are around three per day in Rio. Crowd violence is often a problem at Brazilian soccer matches. Budget cuts. In March, the government in Brazil decreased its security budget by 30 percent (about 550 million US dollars), with much of it targeting future investment. However, concern is that the cuts might undermine plans such as creation of an Urban Pacification Police in slum areas near the airport. Brazil’s political climate. Brazil's president is facing possible impeachment, and the nation's economy is in a recession freefall; might additional security risks result from the crisis? The Zika virus. Brazil has been hardest hit of any nation by the Zika virus, which is spread by mosquitoes and has particular risks for pregnant women and their unborn children. If the outbreak persists, might it cast a negative shadow over the Olympic games (or add another risk factor)? To prepare to meet the security challenges of the Olympics, Rio officials have undertaken several initiatives, including: Applying lessons they learned from hosting other big events. Large international events are not new to Brazil, which hosted the 2014 FIFA World Cup, the 2014 Va’a World Sprint Canoeing Championships, and the 2012 Rio+20 United Nations Conference on Sustainable Development. Brazil also has experience managing the large annual Carnival celebrations in Rio and elsewhere. Technology to secure the RioOlympics includes a largesecurity command and controlcenter in downtown Rio.Dozens of screens will displayviews from thousands ofcameras installed throughoutcity and in Olympic venues Surveying best practices by visiting other locales where large events were held. Brazilian officials will use past Olympics games as models. Officials have also visited other locations that sponsored big events, such as the Tour de France and the Boston Marathon, to see what they can learn. Hundreds of Brazilian police visited the Pan-Am Games in Toronto last summer to learn newer techniques. They are also implementing best practices from other international events such as the IAAF World Athletics Championships in Beijing and the Baku 2015 European games. The Rio Olympics’ head of security traveled to Washington to increase cooperation with the Department of Homeland Security and other US agencies. Creating a huge command and control centre. Technology to secure the Rio Olympics includes a large security command and control centre in downtown Rio, featuring walls covered with dozens of screens displaying views from thousands of cameras installed throughout city and in Olympic venues. Soldiers will control access to stadiums, X-ray machines and metal detectors. Screening visitors as they arrive. Officials will receive real-time data about airport passengers as they check in from their country of origin. As the days count down to the Rio Olympics, officials appear to be leaving very little to chance. However, with all attention focused on Rio during the Olympics, might the event be too tempting for a terrorist to resist? Given global threats and general security vulnerabilities, organisers of the Rio Olympics may need more than preparation to protect the games. They might need some luck, too.
Many companies are considering carefully the possible risks of business travel to the areas most impacted by the Zika virus, and others may have facilities located in affected areas. What is the Zika Scare? Transmitted by mosquito bite, the Zika virus can cause a fever that typically involves minor symptoms. There is an additional risk to pregnant women as Zika fever has been linked to incidences of microcephaly (a neurodevelopmental disorder) in newborn babies through mother-to-child transmission. Zika has also been linked to neurologic conditions in infected adults, including cases of Guillain-Barré syndrome. The virus can also be transmitted sexually, so men who travel to Zika-impacted countries could put their partners (and therefore their offspring) at risk. Informed employees benefit everyone When travelling to affected areas, precautions such as protective clothing and insect repellent can help. Travellers should sleep indoors with air conditioning and recirculated air, making sure any protective screens are intact. Travellers may confer with hotel management about what any facility is doing to minimise the risk, such as spraying measures or emptying standing water (where mosquitos breed). “Make sure any employees involved in international travel are aware of what Zika is and the implications, so they can understand their risk,” says Katherine Harmon, Director of Health Intelligence at iJET International, an integrated risk management company. “Inform employees of their risk before they get caught in a situation,” says Harmon. “We are advising that education is the most important thing.” Any employee contemplating travel to a Zika-impacted area should consult with his or her physician to assess their specific medical condition and whether it involves additional risk. Employees who choose to travel despite warnings could be asked to sign a liability waiver, although it would not provide full protection for an employer, especially in case of a jury trial, says Harmon. Recognising Zika transmission and impact on certain areas An important risk variable to consider is how much the virus may have impacted any certain area. Some countries have been especially hard-hit, while others may be listed on a travel advisory list but may have reported only a handful of cases. Brazil has reported more than a millions cases, for instance, while some islands in the Caribbean have only reported a few, says Harmon. Conditions in each locale contribute to spreading the virus through mosquito bites. Variables include how cities are laid out, the presence of mosquito breeding grounds, and availability of mosquito spray. The virus also spreads faster in areas that have not previously been exposed; there has been no opportunity to develop “herd immunity.” Currently, Brazil is at the peak of its epidemic curve. The disease is believed to have been introduced (from endemic areas of Asia or the Pacific Islands) when Brazil hosted international events such as a canoe race and the FIFA World Cup, both in 2014. See larger image Some countries have been especially hard-hit, while others may be listed on atravel advisory list but may have reported only a handful of cases Risk assessment of employees travelling to affected area Dealing with any impact from the Zika virus is another instance when a company should rely on its business continuity plan and call on its crisis team, says Harmon. What is the current risk exposure? Where might the disease spread? What is the possible reputational risk if an employee were to be impacted? What would the impact be on productivity if a key employee were sidelined to care for a disabled infant? Those are just a few of the possible risk of employees travelling to an impacted area, or of having a facility located in an impacted area. The crisis team should discuss in proactive terms how they can get ahead of the situation. In addition to depending on companies like iJET for information, enterprises can refer to Web sites from U.S. Health and Human Services and/or the Centers for Disease Control and Prevention (CDC). In Europe, the European Centre for Disease Prevention and Control is a good source. Zika’s impact on economy and security There are also concerns about the economic impact of the disease on affected areas (and on companies operating there). The Zika scare could negatively affect tourism; for example, the Olympic games are coming up this summer in Rio De Janeiro. Fear and uncertainty might also undermine security of infected areas, even if no one contracts the disease, says Harmon. Employees might become disgruntled because they perceive an employer as slow to act on the Zika situation, for example. It’s another reason companies should be proactive, both to allay fears and to promote best practices. “Fear is always a dangerous element when it comes to human behaviour,” says Harmon. “Zika is a mild disease aside from its associated complications. There are much more serious diseases that people should be aware of that are also transmitted [by mosquito bites].” Related viruses include dengue, yellow fever, Japanese encephalitis, and West Nile viruses. Communication and outreach are important so that fear is reduced through knowledge of sound best practices, she adds. How much worse could the situation get? It’s hard to tell, says Harmon. Previous forecasting models, such as those used in the Ebola outbreak, were not very accurate. Everything depends on each nation’s ability to combat the problem, which can vary widely. Contributing to an optimistic outlook are proactive response in some areas, and President Obama has requested $1.8 billion to combat the disease on the U.S. domestic front. However, security concerns can also be an obstacle to dealing with the virus. For instance, in El Salvador, Mara Salvatrucha (MS 13) gangs have reportedly attacked police and sought to thwart mosquito elimination practices, and fumigators have refused to return to insecure areas. iJET health intelligence department Harmon oversees iJET’s health intelligence department, where analysts comb the globe for reports of any diseases or other health impacts. iJET collects information, analyses it and presents the facts to its clients along with any measures they should take to reduce risk. Information helps to dispel fear and anxiety, says Harmon. iJET pushes out select alerts to travellers based on their specific travel plans. iJET also provides several public resources, including a training video and information sheets posted on its Web site.
Milestone Systems, the open platform company in IP video management software (VMS), was useful when Pope Francis visited the US/Mexico border town Ciudad Juarez, Mexico, in 2016. Large crowds of religious followers and the curious alike — estimated to be as many as 200,000 — made the pilgrimage to the region for a once-in-a-lifetime chance for many to see the leader of the Catholic Church in person. XProtect video surveillance systems in the neighbouring city of El Paso, Texas, were used to help manage the large crowds. In El Paso, city managers, local law enforcement and US immigration officials were concerned that population explosion would choke roadways, cause congestion, and present security risks as observers lined the roads and crossed the four bridges between the cities. The City of El Paso and the School District have their own 10 gigabit fibre WAN, which I'm sure was helpful in accessing the systems" Camera access from different locations "As can be imagined the Pope visit was huge; we've never seen anything like it. The crowds were crazy, and the focus for officials was all about security," said Marica Wever, President, Integrated Technology and Design (ITD), based in El Paso, Texas. "From the International Boundary and Water Commission, to Homeland Security, to other federal and local agencies, it seems everybody was here and they all wanted access to local video systems for their independent and joint efforts." Wever explained that because the Milestone XProtect Corporate video management software (VMS) is used across many of the local sub systems, officials were able to gain camera access through different users. "The City of El Paso and the School District are all Milestone-based, and they each have their own 10 gigabit fibre WAN, which I'm sure was helpful in accessing the systems," said Wever. "Across the two systems, there were about 100 cameras in use helping to monitor the situation." Maintaining safety and security While ITD was not directly involved with the security operations on the day of the event, Marcia Wever is very proud that the flexibility and reliability of the installed Milestone video surveillance systems they've deployed around the city of El Paso were able to be accessed to maintain safety and security in such a unique situation. "I've been told that all the players involved in the event were very happy with the video quality and accessibility of the systems," said Wever. "Events like this take on their own life as the various agencies come in, but there were no major incidents, and all feedback I have gained is that the system was quite effective."
HID Global, a provider of trusted identity solutions, has announced that the government of Tanzania has selected HID as its prime supplier for an end-to-end solution for issuing electronic passports as part of Tanzania’s transformative e-Immigration programme. The new ePassport was unveiled publicly as part of the inauguration of the end-to-end solution provided by HID Global. The solution incorporates advanced physical and electronic security features, automated passport verification capabilities and support for international standards. Marked by visually stunning landmark imagery, such as Mount Kilimanjaro and Zanzibar’s House of Wonders, the new Tanzania ePassport contains a contactless chip embedded in its polycarbonate datapage, which is proven as tamper-proof. HID Polycarbonate Electronic Datapage HID Global has partnered with DLRS Group for the manufacture of the passport booklets incorporating HID’s polycarbonate electronic datapage. This is the same partnership as for the current award-winning Irish electronic passport, with both the booklet and datapage manufactured at the two companies’ facilities in Ireland.The new ePassport will increase security and make travel easier for the country’s citizens The new ePassport will increase security while, at the same time, making travel easier for the country’s citizens, such as simply scanning their passports electronically at border control stations upon entry and exit. In addition, the new ePassport conforms to all international standards as set out by the International Civil Aviation Organization, ensuring seamless interactions by Tanzanians as they travel the world. “Tanzania is taking a leap forward in providing an electronic passport for our citizens,” said Dr. Anna Peter Makakala, Tanzania’s Commissioner General of Immigration. “Our people will be proud knowing they are carrying one of the most secure and modern passports in the world and can take advantage of some of the most advanced technology available.” New passports help enhance security Tanzania is not only modernising government services, but also raising security by enhancing the existing issuance process. Verifying the identities of travellers is a high priority for governments worldwide, as they crack down on counterfeit passports and upgrade border facilities. The e-Immigration solution includes an ePassport issuance system and personalisation facilities in Dar-Es-Salam and Zanzibar -- equipping the application centres and embassies – as well as biometric matching, border control, e-Visas, e-Permits and delivery of electronic passport books. Stefan Widing, President and CEO of HID Global, said, “We worked very closely with Tanzania’s government to conceptualise and bring into being this state-of the-art passport solution. Their government’s vision for faster, more secure electronic verification of identities matched our end-to-end solution capabilities for citizen identity. Working on a strict timeline, the Immigration team in Tanzania was a strong partner with us to deliver on this exemplary government project.”One of many benefits of the new e-passport solution from HID Global is that the holder can have an “emergency passport” on their smart phone Emergency passport on smartphone One of many benefits of the new e-passport solution from HID Global is that the holder can have an “emergency passport” on their smart phone, if their passport is stolen or lost in another country. The emergency passport, verifiable electronically by the embassy, allows the traveller to obtain the necessary document to return home or request a replacement passport without the need for further online checks, filling out forms or other time-consuming tasks. This mobile emergency passport is made possible using HID’s award-winning Seosâ technology for mobile citizen IDs, called HID goID. HID Global has shipped more than 150 million government-issued IDs in over 50 countries for major projects that include national ID, e-passport, foreign resident ID, driver’s licence and vehicle registration programmes. HID products and technology are present in sixty percent of all government issued electronic identity projects globally. Leveraging this experience, HID Global has formed a multi-year relationship with the government of Tanzania to ensure the highest levels of security for many years to come.
Qognify, a provider of big data solutions for physical security and operations, announced that it has recently expanded its security solution at Gardermoen Oslo Airport with Situator, the company’s market-leading situation management solution. Avinor, the group responsible for managing Norway’s airports, decided to not only expand and upgrade Oslo Airport, but unify its different systems to create a unified security platform. Extending to Situation Management A Qognify video management solution user since 2008, the Airport, with the support of Racom, Qognify’s partner, the airport now added Situator Situation Management solution. The comprehensive platform integrates all existing systems – Qognify and third-party, including thousands of surveillance cameras, access control and other sensors. Situator structures and correlates the information from these different systems for greater situational awareness, incident management and effective response. Flexigate override support Being a major European airport, Oslo serves many Schengen flights, meaning flights to the 26 European countries that have officially abolished passport and all other types of border control at their borders. Allowing the area to function as a single country for international travel purposes dictates special operational requirements using advanced Flexigate system. The Flexigate system avoids incidents where the wrong doors are opened to ensure that passengers who should go through the border control actually do so. Situator integrates with the advanced Flexigate access control system, and overrides switching of gates between Schengen and non-Schengen flights, as well as the domestic flights if the control systems are out of operations. Extended capabilities of existing technology Avinor Oslo Airport: “Situator allows us to leverage our existing technology, and extend the capabilities of those systems for increased value. Our long-term partnership with Racom and Qognify has given us the ability to smartly and cost-effectively upgrade our security without having to rip & replace previous, viable investments". "Adding Qognify Situator to the security and operations program at Oslo Airport has enabled us to confidently build true best-of-breed solution,” said Frode Igland, CEO, Racom AS. ”The new capabilities provide a common operating picture for all stakeholders, improving security and operations”. “Oslo Airport’s security program is one of the most advanced ones among the many airports we are involved in,” commented Moti Shabtai, Qognify’s CEO & President “Our partnership with Avinor and Racom is a testament to how deep, long-term collaboration can produce exceptional return on investment for the airport.”
The US Department of Homeland Security needed an ironclad ID solution to prevent widespread counterfeiting The U.S. Green Card has set a global, never-exceeded standard for uncompromised security. After more than 12 years and over 20 million cards featuring HID Global’s LaserCard® optical security media, the U.S. Department of Homeland Security turned to the same technology and expertise for its next-generation Green Card. In May 2010, the agency began issuing the new card, produced by HID Global and featuring a host of innovations in optical media for enhanced security as well as an award-winning multi-technology design that improves the efficiency of land border crossing. Counterfeiting problem By 1996, officials of the INS (now the U.S. Department of Homeland Security) were concerned that the Permanent Resident Card was too easily counterfeited. Officials estimated that counterfeiters had produced hundreds of thousands, possibly millions, of fraudulent documents, with some fakes selling for up to $15,000. Under pressure to control illegal immigration and meet legislative requirements for biometric based ID credentials, the agency needed an ironclad ID solution to prevent widespread counterfeiting and to uphold its international standing as a strong and effective immigration agency. HID Global LaserCard solution The overriding objective was to deploy the most counterfeit-resistant document possible with secure portable data storage. The combination was required to prevent fraudulent alteration, withstand ten years of use and support efficient issuance. A secondary objective was to assure reliable visual authentication where electronic readers are not available. By 2009, the agency faced the added requirement of complying with the new Western Hemisphere Travel Initiative (WHITI) to speed land border crossings. The U.S. Government has twice selected an ID credential, based on HID Global’s LaserCard® optical security media, as its permanent resident card. The card’s digital security has never been compromised. Forensic document specialists have testified before Congress that the card has “effectively put mass counterfeiters out of business.” Forensic document specialists have testified before Congress that the card has “effectively put mass counterfeiters out of business.” A major setback for mass counterfeiters For any ID card to be effective, it must be usable in a variety of situations, especially when inspected without the aid of electronic readers. HID Global’s LaserCard optical security-media provides the industry’s strongest visual security and counterfeit resistance characteristics: Rapid recognition of a genuine card and counterfeit resistance based on: Unique visual characteristics of optical security media Overt, covert and forensic micro-imaged security features resolved at 25,000 dots per inch High contrast, high resolution “photo-like” facial image of the legitimate cardholder irreversibly laser etched into the optical security media. This “Personalized Embedded Hologram” is unique among all card-based data storage media. The image cannot be altered and serves to confirm that other personalised images on the card’s surfaces have not been tampered with Security diffractive image: covert security feature that can be verified with a simple inspection tool Storage of tamper-proof digital information (facial image, demographics, biometrics) ISO standard data structure for interoperability Next generation Green Card Optical security media enables employers, authorities and inspection agents to make a confident judgment about card authenticity and visual identification of the cardholder, even when electronic readers are not available. Following extensive collaboration with the U.S. DHS, HID Global developed a much-enhanced, next generation Green Card whose design and features elevate the security and functionality of ID credentials to a new level.
HID's ID credential delivers both the highest levels of document security and secure access to Government services In the early 2000s, the growing level of counterfeiting and fraud against the paper-based ID booklet used by Saudi Arabian citizens was diminishing confidence in the authenticity of the document. The use of false documents and ID theft subjected the nation to increased security concerns at a time when the population was becoming increasingly mobile, global insecurity was on the rise, and the workload of police, immigration and customs was mounting. Need for totally counterfeit-resistant document The need for one legal identity per person and reliable identification extended beyond border control to government agencies and third party service providers such as banks. Saudi Arabia’s commitment to e-government services also required reliable authentication of individuals’ identities online. The new ID system had to enhance security for citizens, residents and visitors, match individuals to their biometrics, safeguard personal data, and be predisposed for interoperability with countries in the region. That meant deploying the most counterfeit-resistant document possible, with secure portable data storage and transactional capabilities. The combination was required to prevent fraudulent alteration, withstand ten years of use and be compatible with an all-in-one infrastructure for the provision of e-government services. Multi-purpose credentials and card issuance support The Kingdom of Saudi Arabia selected HID Global’s ID credential, based on the company’s LaserCard® optical media, whose digital security has never been compromised in any programme in the world. The card delivers both the highest levels of document security and secure access to Government services. In 2004, HID Global was also selected to manage the implementation of a new distributed card issuance system in 20 cities for the first phase of the programme. HID Global authored the card management and personalisation software, designed, integrated and installed approximately 60 personalisation systems, trained the operators and provided ongoing operational support. The system was installed on time and met all the client’s certification requirements. Meeting today’s security imperatives The Kingdom of Saudi Arabia’s national ID card contains state-of-the-art high resolution and multi-colour security offset printing, including covert features and special links. In addition, the card features two machine-readable technologies: optical security media and an IC chip. The Kingdom of Saudi Arabia’s national ID card contains state-of-the-art high resolution and multi-colour security offset printing Optical Media: The optical media stores a high-resolution colour portrait of the cardholder, his/her demographics, and a fingerprint template for automatic identity verification. The stored data is completely tamper-proof. The optical media incorporates layered eye-visible authentication and security features to support reliable visual document examination. Contact Chip: The IC chip uses Multos to manage a PIN application, Public Key Infrastructure transactions, and stored demographic data. Features for today’s reality Counterfeit Resistance: The optical media data recording process is physically irreversible. Additional safeguards are created by the tamperproof “Personalized Embedded Hologram.” In combination, these features eliminate any realistic counterfeiting attempts. High Data Capacity: The 2.86 megabyte optical stripe has more than adequate capacity to hold all required demographic and biometric information, and can be updated as needed. Durability: The laminated construction meets stringent durability requirements, as certified by an independent laboratory, supporting a ten-year lifetime for the card. Low Cost Solution: The combination of advanced technology, durability of construction, data capacity, and application flexibility deliver maximum return on investment. Speed of Use: In just a few seconds, all card information can be read. This includes demographic data, colour photograph, and fingerprint files. Updateable: New biometrics or personal data can securely be added by authorised personnel to help prevent obsolescence and fraud. The realities of inspection For any ID card to be effective, it must be usable in a variety of situations, including those where electronic readers are not available. Optical security media enables authorities and inspection agents in Saudi Arabia to make a confident judgment about card authenticity and visual identification of the cardholder when ID documents are inspected by the human eye, which still occurs the majority of the time. Reliable visual document examination Optical media incorporates features to support examiner authentication Unique optical characteristics Tier I, II, III micro imaged security features resolved at 12,000 dpi Personalised optical variable device A tamper-proof high definition, high-contrast, high resolution facial image of the legitimate cardholder irreversibly laser-etched into the optical media
Customs and Border Protection needed a faster way to correlate information about the location and status of arms The Australian Customs and Border Protection Service is responsible for the protection of the Australian community, while supporting legitimate trade and travel. At a time of unprecedented threat levels – illicit drug trafficking, terrorism, people smuggling – Customs and Border Protection manages the security and integrity of Australia’s borders, working closely with other government and international agencies, to detect and deter unlawful movement of goods and people across the border. Rapid commerce and travel growth Concurrently, Customs and Border Protection is responsible for protecting Australian economic interests during an era of rapid growth in international commerce and travel. By enforcing trade regulations and collecting tariffs, Customs and Border Protection helps Australia compete in a global economy. “Customs and Border Protection plays a vital role in national security, derived from its broader responsibilities at the border and the extensive powers, expertise and technology it brings to bear,” said Michael Carmody, Chief Executive Officer, of Australian Customs and Border Protection Service. “Modernisation of customs organisations will remain imperative, with the Australian Customs and Border Protection Service motivated by continuing pressure for more sophisticated and integrated processes.” Border protection responsibility Border protection responsibility lies in the capable hands of over 5500 Customs and Border Protection employees in over 50 locations around Australia and overseas, and is managed from the Central Office in Canberra. The Customs and Border Protection Strategic Outlook (2007) projects that by 2015, these employees will assume responsibility for the annual oversight and management of: 1 million international passengers 7 million import sea containers 7 million export sea containers 5 million air cargo consignments 220 million postal articles 22,865 arriving ships Protecting the Australian community demands sophisticated intelligence, targeting high-risk aircraft, vessels, cargo, postal items and travellers. It also requires sophisticated tools, including thousands of items of weaponry, protective gear, specialised equipment and vehicles. Furthermore, effective deployment and management of these tools is vital to assure the safety and security of Customs and Border Protection’s officers, and the 22.6 million Australian citizens they serve and protect. Search for a solution Prior to 2011, Customs and Border Protection maintained a system of separate spreadsheets to track and manage this considerable arsenal. More importantly, the view from Central Office in Canberra lacked immediacy. Lags in reporting times could lead to delays in repairing or replacing critical equipment, or in identifying a missing or stolen weapon. What Customs and Border Protection sought was a fast and easy way to correlate information about the location and status of arms and bulletproof vests with the officers to which they had been assigned. As staff across different locations kept their own spreadsheets, Customs and Border Protection needed a solution that could easily deliver accurate and up to date views to Central Office. Under Michael Carmody’s imperative for more efficient, integrated processes, the Australian Customs and Border Protection Service issued a global tender for an asset tracking system. They discovered a partnership between Relegen and HID Global best fit their needs. Customs and Border Protection opted to use the Relegen asset solution, with assetDNA software The Relegen solution Relegen specialises in the development and delivery of asset intelligence solutions. The Australian Defence Force [ADF] has employed Relegen’s technology – assetDNA™ – to manage critical assets for over a decade. The similarities between the ADF’s and Customs and Border Protection’s asset management needs, combined with the flexibility of the assetDNA solution, made Relegen the clear choice around which to build Customs and Border Protection’s new system. The Relegen solution is enhanced by their assetDNA software technology, which enables users to assign a globally unique identity to each asset. In this case, Customs and Border Protection have opted to use the assets’ serial number. This identifier is then carried by Relegen’s proprietary assetDNA tagging solution. A third layer of security is added through DataTraceDNA®, a covert security technology from DataDot Technology Ltd. This means that even in the event that the assetDNA tag is removed or destroyed, Customs and Border Protection can still identify the asset as one of their own. “Our ten plus years’ experience at a mission-critical level with the Australian Defence Force prepared us well to deliver the comprehensive asset tracking solution Customs and Border Protection requires,” reports Paul Bennett, Managing Director, Relegen. “The combination of our assetDNA software and multi-layer, intelligent tagging solution enables Customs and Border Protection to track each asset uniquely. Even if a tag is separated from a weapon, Customs and Border Protection can still identify the asset through DataTraceDNA.” HID Global RFID The ability of assetDNA to track each asset uniquely, and in real-time, is made possible by radio frequency identification technology from HID Global. A world leader in the development and production of innovative identification tags and readers, HID provides innovative asset tags and technical support vital to the Customs and Border Protection solution. Before HID could recommend tagging solutions, a thorough assessment of each asset was required: How is the asset used, by whom is it used, and under what conditions? For Customs and Border Protection, each tag must withstand the rigors of daily use under potentially hazardous conditions. HID manufactures asset tags that adhere and function under extreme conditions, resisting impact and vibration, and exposure to saltwater and chemicals. HID was able to provide Customs and Border Protection with a customised compilation of RFID tagging solutions According to Paul Bennett, “assetDNA is a powerful asset intelligence system. However, our ability to collect data is enormously dependent on reliable tags that can withstand the rigors of daily use in extreme conditions. That’s why we rely on HID. Their tags perform.” “All Customs and Border Protection assets were analysed in terms of materials of construction and conditions of use,” says Tony Hilder, Sales Director, Industry and Logistics for Asia Pacific HID Global. “Then, we were able to match a HID tag to deliver the necessary level of reliable performance over the life of each asset.” Customised RFID tagging solutions HID was able to provide Customs and Border Protection with a customised compilation of RFID tagging solutions that will: Withstand impact and vibration – on an assault rifle, or in a physical confrontation Resist exposure to harmful elements – including saltwater, or chemical agents Install covertly and inconspicuously – to prevent detection or tampering Maintain data integrity and performance – assuring systemic veracity The HID Logi Tag® Family is being applied where mechanical, chemical and temperature resistance is imperative, with the HID IN Tag Family providing ruggedised tag solutions for severe environs. Greater security for officers Relegen and HID are working together to help implement the sophisticated asset tracking system across all Customs and Border Protection locations. This includes the tagging of each of the armaments and critical assets in each agency, as well as training for all Customs and Border Protection personnel. The result will be a comprehensive system that gives Customs and Border Protection a real-time view of all assets deployed and in inventory, empowering the Central Office to make critical decisions based on the latest information at-hand. It will also mean greater safety and security for Customs and Border Protection officers. Officers can perform their duties, confident they have been issued the correct equipment, and assured that it is in proper working order. In addition, the new system further minimises the risk that weapons may be stolen or remanufactured. Significant productivity enhancements The new system will also enable optimisation of asset use. Customs and Border Protection can now identify each asset’s progress through its lifecycle, and identify specific assets in need of immediate repair or replacement. Customs and Border Protection will recognise significant productivity enhancements in staff time spent mustering their formidable arsenal. Going forward, the Customs and Border Protection asset-tracking system provides a model for any organisation managing operation-critical assets, in routine or emergency response situations. Worldwide, police forces, fire departments, emergency medical teams, hospitals, and other organisations are employing solutions from Relegen and HID Global to respond quickly and comprehensively in emergencies, provide better safety for their employees, and drive the performance of their mission critical assets more effectively.