On Monday, July 22, Acting Secretary of Homeland Security Kevin K. McAleenan hosted the Director of the Israeli Security Agency (ISA), Nadav Argaman, for a bilateral engagement to discuss the threats that the U.S. and Israel both face and the shared mission of their respective departments. Addressing key priorities for agencies During their meetings, Acting Secretary McAleenan and ISA Director Argaman signed cooperation agreements spanning across a multitude of fronts that will address key pri...
Arteco Global starts a new chapter. The company – producer of Video Management Software and universally renown for its highly customisable offer – is now opening its first Latin American branch in Mexico and moves its borders to a constantly expanding market. After the exceptional growth in North America, with operation all over the US territory, Arteco is now aiming at strengthening its position in the second security market of the American continent – the first in Latin Amer...
Iris ID, a global provider of iris recognition technology, announced its award-winning multimode iCAM M300 handheld biometric platform now offers gateless access control, time and attendance and employee mustering for both commercial and government markets. The new functions are possible with embedded XPressEntry software from Telaeris, a provider of real-time personnel tracking solutions. Also using Iris ID’s Iris Access EAC software, the iCAM M300 continues to provide an ideal portable...
Unmanned aerial vehicles (UAVs), or drones, present a range of threats, from the careless and clueless to the criminal. While many incidents may seem harmless, the threat to any location at any time depends on a range of factors. Drones are inexpensive for criminals to buy or make, and there are continuously improving battery, airspeed, and payload capabilities. UAVs can also fly without an RF signal to jam or hack. Fortunately, sensor technologies including radar are available for security ag...
Dahua Technology, a video-centric smart IoT solution provider, has announced the addition of targeted vertical market solutions in the North American market. Vehicle inspection is one area where contemporary technology is rising to address a critical need. Preventing restricted items from entering high-security environments has traditionally been limited to the use of mirrors and police dogs, where blind spots and human error put detection at risk. In order to combat this problem, Dahua Technol...
emaratech, a technology and management consulting company which is part of the Investment Corporation Dubai (ICD), is capitalising on its strong participation in the 2019 edition of Airport Show to showcase its collection of cutting-edge technology products, with the key highlight being the Smart Corridor, a first of its kind in the world product that is helping authorities in effective border control and ensuring seamless passenger experience at airports. As the pressure to effectively handle...
The 3rd edition of Intersec Saudi Arabia got underway with 111 exhibitors from 20 countries zooming in on the Middle East’s largest commercial security and fire safety market. Running for three days at the Jeddah Centre for Forum and Events, Saudi’s foremost security, safety, and fire protection trade show targets the Kingdom’s vast market which is estimated to grow at an annual compound growth rate of 7.7 percent over the next seven years. It was opened yesterday in a pre-show ceremony by Lt. Gen. Sulaiman Al-Amr, the director-general of Saudi Arabia’s General Directorate of Civil Defense. Economic diversification plans According to 6WResearch, homeland security and policing currently holds the lion’s share of Saudi’s market spend A report released on the side-lines of the show by consultancy firm 6WResearch said the total spend on Saudi’s commercial security, information security, homeland security and policing, physical and perimeter protection, and fire safety markets was worth US$8.5 billion in 2018, a five percent increase over the previous year. By 2025, the market will be worth US$14.4 billion, driven by a combination of increased investments in infrastructure in line with the Saudi Vision 2030, the stabilisation of oil prices, and the government’s ongoing economic diversification plans. According to 6WResearch, homeland security and policing currently holds the lion’s share of Saudi’s market spend, at US$4.6 billion in 2018. This is followed by information security (US$2.6 billion), commercial security (US$838 million), fire protection (US$273 million), and physical and perimeter protection (US$198 million). Integrated platform The impressive opportunities are underlined by a long list of manufacturers and suppliers this week in the Red Sea port city, spearheaded by the show’s launch partners eager to boost business opportunities. Hikvision, the world’s largest video surveillance provider, is among these, and is putting the spotlight on its latest suite of technologies, much of which is powered by Artificial Intelligence and machine learning. Others include Al Alameya, Axis Communications, Bristol, Drager, Genetec, NAFFCO, Nedap, and ZMR. With 69 per cent international participation, more than 500 brands, and an enlightening three-day conference programme, Intersec Saudi Arabia caters to growing demand for an integrated platform providing crucial access to one of the world’s most promising markets. Intersec Saudi Arabia is licenced by Messe Frankfurt Middle East, the organiser of Intersec in Dubai, the world’s largest trade fair for security, safety, and fire protection. Safety and security industries Intersec Saudi Arabia is a vital platform bringing together key stakeholders in the Kingdom’s security, safety, and fire protection industries" “Safety and Security is high on the agenda of Vision 2030 of the Kingdom of Saudi Arabia and there is a perennial requirement of safety and security products, fire protection and the accompanying innovations that are displayed at this event,” commented Zahoor Siddique, Vice President of Intersec Saudi Arabia’s organiser ACE Exhibitions. “Intersec Saudi Arabia, apart from targeting the five million population of the Western Region inclusive of the annual pilgrimage, round-the-year Umrah pilgrims, oil and gas installations, airports and seaports, the multitude of events taking place Kingdom wide, is the ideal meeting and networking showcase for safety and security industries.” Andreas Rex, Show Director of Intersec, added: “Intersec Saudi Arabia is a vital platform bringing together key stakeholders in the Kingdom’s security, safety, and fire protection industries. In its 3rd edition in 2019, it will once again be at the forefront of the latest technologies and solutions dedicated to meet the demand of the Middle East’s largest market.” Smart patrol solutions GET Group Holdings was among those launching new products in the Saudi market, including its latest Smart Patrol solution that assists law enforcement agencies by providing full 360 degrees surveillance, body-worn cameras, speed detection and violation as well as identification of wanted people and vehicles. GET also launched its AI-Powered process automation solutions to manage and optimise enterprise and government operations. Mrs. Maysoon Jamal, CEO of GET Group Holdings, said: “The Saudi security market is crucial to our business and our products especially for government and law enforcement agencies. We’re looking for great growth in three main categories: Secure card printing especially through our Heidi and GET/Toppan ID Card Printers, Smart Patrol Solutions, and Robotic Process Automation.” Promising markets Intersec Saudi Arabia is held under the patronage of the Saudi Ministry of Interior, and supported by the Saudi Civil Defense Other exhibitors this week include Optex Europe Limited and Fiber Sensys, both of which recently joined forces to better serve Saudi Arabia and the regional market in deploying perimeter protection and intrusion detection systems. Intersec Saudi Arabia is held under the patronage of the Saudi Ministry of Interior, and supported by the Saudi Civil Defense. It features a three-day security and fire safety conference programme operating under the wider theme of ‘Safety, Civil Security and Technology: Future Integrated Solutions’. Intersec Saudi Arabia 2019 covers the key product groups of Commercial Security, Information Security, Perimeter & Physical Security, Homeland Security & Policing, Fire & Rescue, and Safety & Health. The dedicated showcase caters to growing demand for an integrated platform providing crucial access to one of the world’s most promising markets.
RS2 Technologies, globally renowned security and access control systems provider firm, has been named as a new Strategic Alliance Partner in the United States by Zenitel Group, the global provider of Intelligent Communication solutions. Integrated systems “Zenitel’s continued innovative approach to simple but powerful integrated systems provides a complete unified solution to customers of all sizes”, said Dave Barnard, Director of Dealer Development for RS2. “Zenitel has been established as the industry leader in integrated intelligent communications. Our companies have had a long-standing relationship where integration was valued, but we believe it is now time to go beyond simple integration to providing a full-service solution.” According to Barnard, RS2 Technologies has a reputation as a “one-stop” solution for the access management needs of customers in a wide variety of applications. RS2 delivers cost-effective access management solutions to customers in industries as diverse as ship-building, energy, hospitals, education, defense, banking, government (federal, state and municipal), museums, and a variety of diverse manufacturing companies. From small office buildings to large industrial facilities, RS2 has the products to meet the needs of business and industry. RS2 is known for having a rich feature set, continuous integrations, and the lowest total cost of ownership Intelligent Communication “The Intelligent Communication market is targeted to exceed $150 billion by 2021”, said Jim Hoffpauir, President, Zenitel Americas. “To continue to provide innovative solutions that exceed our customers’ expectations, we are creating new strategic partnerships with complimentary technology leaders in the security industry. With our recent release of the new IC-Edge system, partnering with RS2 provides Zenitel with sales channel alignment to emphasise smaller system sales, providing organisations of all sizes an easily accessible and cost-effective solution for highly intelligible audio.”
PPSS Group launched SlashPRO Cut Resistant Neck Guards in order to help further improve the personal safety of homeland security professionals worldwide. The latest addition to this widely respected brand of slash resistant clothing certainly makes sense, understanding that the side of the neck and throat contains both the Carotid Artery and Jugular Vein. If either is cut by an attacker one will most likely suffer from rapid blood loss, subsequent shock and most likely death. Demand from homeland security agencies PPSS Group have identified a noticeable increase in the demand for such products, especially from several homeland security agencies, such as prison, police, immigration, customs, border forces and other government agencies. Many of these agencies have reported incidents, which saw their officers being brutally attacked. Many attacks had targeted the officers’ throats and necks. PPSS Group have identified an increase in the demand for such products, especially from several homeland security agenciesRobert Kaiser, CEO of PPSS Group said: “Many government employees or security professionals have been attacked from behind. This may well be the case because they, for whatever reasons, either trusted the attacker to a reasonable level, or because the attackers put themselves intentionally into such position in order to cause max injury or even death.” “No matter how hard we try, we simply cannot eliminate their operational risks. However, what we can do is continue our research and development and relentlessly explore all possible options to further improve the personal safety of those who serve our countries and protect us.” High levels of certified cut protection SlashPRO Neck Guards can be worn ‘turned up’ to cover the entire neck area, or ‘turned down’ for covert operations or a more natural look. They are available in black as standard colour. The new neck protectors offer thoroughly field tested and exceptionally high levels of certified cut protection. Verified test reports highlight European Cut Level 5 (EN 388:2016), International Cut Level 5 (ISO 13997:1999) and American Cut Level A5 (ANSI/ISEA 2016).
A new conference will examine fundamental issues of trust as society transitions from paper-based to digital security and ID documents. Digital Document Security The first Digital Document Security Conference in Berlin (May 13 – 15, 2019) comes as the illicit production of counterfeit and fake ID documents continues to be big business. The security of banknotes is also a huge concern for governments and law enforcement agencies Around the world, the use of fraudulent passports, driver’s licences and pass cards aids criminal activity and illegal cross-border movement. Meanwhile, the cost of paying for anti-counterfeiting measures and teams tasked with bringing the criminals to justice can run into the millions of dollars. The security of banknotes is also a huge concern for governments and law enforcement agencies. Growth of contactless payments The conference will consider the growth in contactless payments and smartphones used to pay for products and services, while several countries or states are adopting digital driving licences or ID cards, whereby a person’s identity is confirmed by their phone, not by a piece of paper or plastic. The questions raised by all this will be examined by experts: how secure are these systems, and how much can we trust them when we can no longer use our human senses to assess them? Are they as well protected as the physical documents we’re so familiar with, or are they more vulnerable to criminal fraud? And what are the implications of the answers? Digital ID identification The conference will consider the interaction of the physical and digital domains in financial transactions and identity confirmation The only global event dedicated to addressing these pivotal questions, the conference will consider the interaction of the physical and digital domains in financial transactions and identity confirmation, as well as providing a stage for both communities - physical and digital - to showcase how their documents or systems are secured, and to exchange ideas for ensuring that future digital documents of value are as secure as present physical documents. Four sessions (The Physical/Digital Interface; Print in a Digital World; Smartphone Applications and Digital ID) will reflect the move towards digital, demonstrating how the different domains interact as well as how digital systems - particularly smartphones - can be used on their own. Physical and digital security domains Ian Lancaster, associate at Reconnaissance International and co-chairman of the new conference, said: “We are living through a watershed period in how we manage what must be secure documents and secure information. So, this first conference of its type comes as a timely opportunity to engage in the debate and examine the most pressing issues as the transition from the physical to the digital gathers pace.” The Digital Document Security Conference will be preceded by a half-day course, which will cover the physical and digital document security domains ahead of addressing if physical and digital approaches can work together to create an even more secure environment.
A security products firm based in West Yorkshire has secured a £500,000 loan from Mercia Fund Managers to step up production of its range of hostile vehicle mitigation (HVM) barriers made from recycled rubber. Rosehill Security, which is based in Sowerby Bridge, has received the funding from NPIF – Mercia Debt Finance, which is managed by Mercia Fund Managers and is part of the Northern Powerhouse Investment Fund and Mercia’s EV SME Loans Fund. Vehicle Security Barriers (VSBs) The barriers have been selected by security forces, event organisers and sports clubs across the globe The division of Rosehill Polymers has developed a range of innovative vehicle security barriers (VSBs) that can be rapidly deployed to protect people and buildings from vehicle as a weapon (VAW) attacks. The barriers have been selected by security forces, event organisers and sports clubs across the globe and have been used in locations ranging from the London Marathon to the Ministry of Finance in Paris. The investment will be used to scale up the manufacture of its current product portfolio to meet the growing demand for VSBs and to develop additional products. Rosehill Hostile Vehicle Mitigation (HVM) Rosehill Polymers Group was founded in 1988 and now employs 100 people across six operating divisions producing coatings, adhesives, railway crossings, coloured rubber granules for playgrounds and traffic calming products. Dr Alexander Celik, Group Managing Director of Rosehill Polymers Group, said: “The protection against VAW attacks has fast become a high priority across the world. As a result, we’re seeing growing demand for Rosehill Security’s range of HVM and perimeter security solutions products. This investment will allow us to move forward with our plans to increase production capacity, improve efficiency and continue to develop the product range.” Perimeter security solutions Rosehill Polymers Group’s bold approach has paid off, allowing the business to successfully diversify and develop new markets" Jonathan Craig, Investment Manager at Mercia, added: “Rosehill Polymers Group’s bold approach has paid off, allowing the business to successfully diversify and develop new markets. This funding will allow it to continue its expansion and step up production to meet growing worldwide demand.” Mark Wilcockson, Senior Manager at British Business Bank, said: “Since its launch in 2017, NPIF’s impact on businesses has been wide-ranging, providing funding to launch new products, employ new staff, enter new markets and acquire new facilities. We are pleased that NPIF is continuing to unlock the North’s growth potential by supporting small businesses with vital investment.” The NPIF project is supported financially by the European Union using funding from the European Regional Development Fund as part of the European Structural and Investment Funds Growth Programme 2014-2020 and the European Investment Bank.
Echodyne, the manufacturer of innovative, high-performance radars for government and commercial markets, announces the immediate availability of the EchoGuard Rapid Deployment Kit for surveilling borders, securing critical infrastructure perimeters and temporary events, and enhancing situational awareness. Echodyne’s innovative MESA™ technology and powerful software deliver the leading performance of electronically scanning array (ESA) radar in a compact, lightweight, solid-state format for the very first time. Portable surveillance kit The Rapid Deployment Kit is built for field agents, law-enforcement, and security personnel charged with temporarily or intermittently securing ground and airspace perimeters. With essential components weighing under 20 lbs., the kit is extremely portable and enables surveillance in the most remote or hard to access locations. Securing events and borders “Echodyne is excited to announce the Rapid Deployment Kit, specifically designed for securing temporary and special events and critical infrastructure, remote surveillance, and border security” said Eben Frankenberg, CEO of Echodyne. “Being able to rapidly deploy a high-performance radar sensor is a field force multiplier, significantly enhancing agent safety, and dramatically improving situational awareness. This is another example of how our MESA technology can provide exceptional performance in a low cost, size, weight, and power package.” Features of the EchoGuard kit: Industry leading 3D radar performance in a super lightweight kit Intuitive radar UI software Ruggedised high-performance computer Wired and optional wireless connectivity Choice of tripod size Essential components weigh less than 20 lbs
The industry faces numerous challenges in the coming year. Physical and cyber security threats continue to become more complex, and organisations are struggling to manage both physical and digital credentials as well as a rapidly growing number of connected endpoints in the Internet of Things (IoT). We are witnessing the collision of the enterprise with the IoT, and organisations now must establish trust and validate the identity of people as well as ‘things’ in an environment of increasingly stringent safety and data privacy regulations. Meanwhile, demand grows for smarter and more data-driven workplaces, a risk-based approach to threat protection, improved productivity and seamless, more convenient access to the enterprise and its physical and digital assets and services. Using smartphone apps to open doors Cloud technologies give people access through their mobile phones and other devices to many new, high-value experiencesEnterprise customers increasingly want to create trusted environments within which they can deliver valuable new user experiences. A major driver is growing demand for the ‘digital cohesion’ of being able to use smartphone apps to open doors, authenticate to enterprise data resources or access a building’s applications and services. Cloud technologies are a key piece of the solution. They give people access through their mobile phones and other devices to many new, high-value experiences. At the same time, they help fuel smarter, more data-driven workplace environments. With the arrival of today’s identity- and location-aware building systems that recognise people and use deep learning analytics to customise their office environment, the workplace is undergoing dramatic change. Improved fingerprint solutions Cloud-based platforms and application programming interfaces (APIs) will help bridge biometrics and access control in the enterprise, overcoming previous integration hurdles while providing a trusted platform that meets the concerns of accessibility and data protection in a connected environment. At the same time, the next generation of fingerprint solutions will deliver higher matching speed, better image capture quality and improved performance. The next generation of fingerprint solutions will deliver higher matching speed, better image capture quality and improved performance Liveness detection will ensure that captured data is from a living person. Biometrics authentication will also gain traction beyond access control in immigration and border control, law enforcement, military, defence and other public section use cases where higher security is needed. Flexible subscription models Access control solutions based on cloud platforms will also change how solutions are deployed. Siloed security and workplace optimisation solutions will be replaced with mobile apps that can be downloaded anywhere across a global ecosystem of millions of compatible and connected physical access control system endpoints. These connections will also facilitate new, more flexible subscription models for access control services. As an example, users will be able to more easily replenish mobile IDs if their smartphones are lost or must be replaced. Generating valuable insights with machine learning Machine learning analytics will be used to generate valuable insights from today’s access control solutionsEducation, finance, healthcare, enterprise, and other niche markets such as commercial real-estate and enterprises focussed on co-working spaces will benefit from a cloud-connected access control hardware foundation. There will be a faster path from design to deployment since developers will no longer have to create an entire vertically integrated solution. They will simply add an app experience to the existing access control infrastructure. New players will be drawn to the market resulting in a richer, more vibrant development community and accelerated innovation. Data analytics will be a rapidly growing area of interest. Machine learning analytics will be used to generate valuable insights from today’s access control solutions. Devices, access control systems, IoT applications, digital certificates and location services solutions, which are all connected to the cloud, will collectively deliver robust data with which to apply advanced analytics and risk-based intelligence. As organisations incorporate this type of analytics engine into their access control systems, they will improve security and personalise the user experience while driving better business decisions.
The Internet of Things (IoT) is having a significant and ever-changing impact on the way we view video security. Today, cameras are expected to be so much more than devices with which to simply capture images; they need to be far smarter than that. These future-facing cameras are becoming an integral part of the vast digital connectivity infrastructure, delivering a parallel performance as intelligent sensors with the ability to extract the kind of invaluable data that helps businesses make improvements in the area of video security, and beyond. However, as the list of possibilities grows, so too does the risk of unauthorised access by cybercriminals. We should all be aware that a single weak link in a communications infrastructure can give hackers access to sensitive data. That’s the bad news. Safeguarding data and utilising deep learning The good news is cybercrime can be avoided by employing a data security system that’s completely effective from end-to-end. One technological advancement that the trend-spotters are predicting will become part of the video security vocabulary is ‘deep learning’ Once this level of safeguarding is in place you can begin to confidently explore the technologies and trends happening now, and those on the horizon. So, what will be having an influence on surveillance in 2018? Well, according to IHS Markit, one technological advancement that the trend-spotters are predicting will become part of the video security vocabulary is ‘deep learning’, which uses algorithms to produce multiple layers of information from the same piece of data, therefore emulating the way the human brain absorbs innumerable details every second. In Europe, GDPR compliance will also be a big talking point as new principles for video surveillance data collection, use limitation, security safeguards, individual participation and accountability are introduced. And, as the popularity – and misuse – of drones continues to rise, the recent developments in drone detection technology will be particularly welcomed by those whose primary concern relates to large areas, such as airport perimeter security. The future of 'smart' video analytics An important feature of today’s intelligent cameras is the ability to provide smart video analytics. The Bosch ‘i’ series, for example, offers a choice of formats – Essential Video Analytics and Intelligent Video Analytics. Essential Video Analytics is geared toward regular applications such as small and medium businesses looking to support business intelligence (e.g. inter-network data transfer), large retail stores and commercial buildings for advanced intrusion detection, enforcing health and safety regulations (no-parking zones or detecting blocked emergency exits) and analysing consumer behaviour. The camera-based, real-time processing can also be used to detect discarded objects, issue loitering alarms and detect people or objects entering a pre-defined field. Intelligent Video Analytics provides additional capabilities. It is designed for demanding environments and mission-critical applications, such as the perimeter protection of airports, critical infrastructures and government buildings, border patrol, ship-tracking and traffic-monitoring (e.g. wrong-way detection, traffic-counts and monitoring roadsides for parked cars: all vital video security solutions). An important feature of today’s intelligent cameras is the ability to provide smart video analytics Intelligent Video Analytics can also differentiate between genuine security events and known false triggers, such as challenging environments created by snow, wind (moving trees), rain, hail, and water reflections. For more expansive areas, like an airport perimeter fence, the system has the range and capability to provide analysis over large distances. And, if a moving camera is employed, it is also possible to capture data on objects in transit when used in conjunction with the Intelligent Tracking feature. For roadside use, Intelligent Video Analytics systems, such as the Bosch MIC IP range, are resistant to vibrations and can still operate in extreme weather conditions, continuing to detect objects in heavy rain or snow. Evolving cameras past surveillance It’s becoming ever clearer that the IoT is transforming the security camera from a device that simply captures images, into an intelligent sensor that plays an integral role in gathering the kind of vital business data that can be used to improve commercial operations in areas beyond security. For example, cities are transitioning into smart cities. The capabilities of an intelligent camera extend to the interaction and sharing of information with other devices (only those you have appointed) With intelligent video security cameras at the core of an urban infrastructure smart data can be collected to optimise energy consumption via smart city lighting that responds to crowd detection and movement. Cameras can also be used to improve public transport by monitoring punctuality and traffic flow based on queue lengths, with the ability to control traffic lights an option should a situation require it. As the urban sprawl continues and this infrastructure grows, the need for more knowledge of its use becomes more essential, necessitating the monitoring technology developed for use by human operators to evolve into smart sensing technology, that no longer just provides video feeds, but also uses intelligent analytics and sophisticated support systems. These systems filter out irrelevant sensor data and present only meaningful events, complete with all relevant contextual data to operators to aid their decision-making. Expanding the video security camera network Today, video analytics technology has tangible benefits for human operator surveillance, and delivers KPIs that are highly relevant to transport operators, planners and city authorities. As an existing infrastructure, a video security camera network can be improved and expanded by installing additional applications rather than replaced. From a business perspective, that means greater value from a limited investment. Thereafter, the capabilities of an intelligent camera extend to the interaction and sharing of information with other devices (only those you have appointed), image and data interpretation, and the ability to perform a variety of tasks independently to optimise both your safety and business requirements. The fact is, cameras see more than sensors. Sounds obvious, but a conventional sensor will only trigger an alarm when movement is detected, whereas a camera can also provide the associated image and information like object direction, size, colour, speed or type, and use time stamps to provide historical information regarding a specific location or event. Based on this evidence, the video security camera of today is more than ready for the challenges of tomorrow.
While there is much hype around drone technology today, initial successful drone usage for security can be dated back to the 1960s, when the US utilised the Lightning Bug 147, a camera-equipped unmanned aerial vehicle that could travel 600 miles for surveillance in Vietnam, China and Korea. Drones for effective surveillance Since this initial deployment, drones have been used for a variety of security and surveillance applications. However, as professional-grade commercial drones incorporate newer, more advanced features and technologies, their capabilities will allow for many new scenarios and applications within fully-integrated security systems. The security industry, in addition to first response and law enforcement, will be among the first to truly experience the benefits of the most current drone technologies. And, these industries have already started to utilise drones in new ways—the most recent example being the use of commercial drones to save lives during hurricanes Irma and Harvey. For these reasons, UAVs are becoming an integral tool in multiple industries and according to PwC, will have an expected total value of $127 billion by 2020, $10.5 billion of which will be in security applications of drones.There is room to improve on cost, efficiency and safety, so the opportunity for commercial drone technologies is large Drones in fire, border and perimeter security Current drone users in the security arena are comprised of law enforcement, fire departments, border security and first responders, who primarily use UAVs for border control, perimeter surveillance and monitoring, anti-terror operations and searching for missing persons. These tasks generally require manned teams and can even include helicopters, the results being costly, time-consuming and potentially dangerous. Alternatively, these teams use consumer-grade drones, which simply lack the capabilities and levels of security necessary to be used safely for such operations. This makes the opportunity for commercial drone technologies large, as there is room to significantly improve on cost, efficiency and safety. By adding autonomous drones to their arsenals, security forces are able to accomplish their objectives more easily and effectively by removing the need for a security team member to operate the drone—as it works on its own—and instead, focus on responding to the security situation at hand. Employing fully autonomous systems, especially in surveillance, is a critical feature most drone systems currently don't allow UAVs can also enter narrow spaces, produce minimal noise, and can be equipped with night vision cameras and thermal sensors, allowing them to see beyond what the human eye can detect. They can also quickly cover large expanses of ground and access hard to reach places. However, most drones today have not reached the pinnacle of what is possible for advanced commercial UAVs. Drawbacks of current drone solutions Despite how far drone technology has come, drones used in security settings are still riddled with shortcomings. This is apparent in the build quality of current drones, most of which are made from hardened plastic, which falters when faced with rough weather conditions or after experiencing tough falls and crashes. Closed-system integration is another key element current UAVs lack. Not being able to integrate drones into wider closed-security systems creates major gaps in the efficacy of security operations. The use of carbon fibre in the build of drone hulls will increase drones' weather durability - and ultimately make them more valuable Lastly, employing fully autonomous systems, especially in surveillance, is a critical feature most drone systems currently don't allow - both due to shortcomings in the technology and due to the need for regulations to catch up to the advancements and capabilities of drone technologies. The combination of these drawbacks can create lacklustre drone results, and when lives are on the line, these results simply aren't enough. Why commercial drones can make a difference That being said, 2018 is the year where the security sector will experience increased drone adoption. That’s because there are some drone technologies being developed today that overcome many of the shortcomings outlined above. These are the technologies we will see having the greatest impact within the security industry. Here are some of the drivers of change, both in the industry and technology that will allow drones to effectively integrate into the security market: Increased processing power: This will allow autonomous drones, powered by AI technology, to track objects in real time, and adjust their courses and actions as needed. This allows for greater drone operational efficiency while simultaneously drawing less power from the battery, thereby lengthening the drone’s flying time. These improved processors will also make way for increased broadcast range capabilities, allowing for longer distance drone operations. Regulations will catch up to the technology: This is a trend we began to see at the tail end of 2017. Governments in both the United States and Europe have realised that drone regulations must keep up to gain the most from UAV technologies, as well as to counter the use of drones for terror or other nefarious tasks. To that end, the US government began talks with drone developers to discuss the expansion of commercial drone operations, and the UK government introduced tougher regulations to crackdown on dangerous flying and criminal drone use. Drone regulation will move in favour of autonomous drone operation: As governments increase regulations in favour of the commercial drone industry, commercial players will increase pressure to allow for fully autonomous operation. Full autonomy means Beyond Visual Line Of Sight (BVLOS) drone functionality. This enables drone operators to fly a UAV with the drone out of their line of sight, maximising the capabilities of the UAV, and in the case of security missions, keeping the pilot out of harm’s way. New materials will increase drone hull durability: As drone makers will have learned from their drones’ lack of weather resistance following the tumultuous hurricanes the U.S. experienced this past year, the use of carbon fibre in the build of drone hulls will increase their weather durability. Better capabilities will encourage adoption among security: New commercial drones will have longer flight times, longer battery lives, will carry heavier payloads, and will integrate advanced computer vision technologies and real-time connectivity. This will enable drones on security missions in remote areas to send a live stream of their field of vision to drone operators at a central command station. Full integration of security systems: The interoperability of a variety of technologies will make drones another sensor in fully integrated and closed security systems that may include smart fences, security cameras and other infrastructure elements. Full integration also means that these elements will be controlled from the same central command centre, whether for securing a specific facility, or as part of surveillance system on a military base, or other closed location. This will allow security personnel to use drones more effectively, saving time, money, and increasing the safety of security professionals in the field. This year is going to be huge for the drone security market, as it is about to experience a significant improvement in drone performance, which will lead to a widespread escalation in drone adoption. The results will be prolific for both drone makers and security force users.
As the Internet of Things (IoT) and other trends drive the convergence of physical and information security, integrators and end users attending ISC West may be struggling to keep pace with new areas of responsibility and expanding roles in the larger security ecosystem. Help is here. The Connected Security Expo, co-locating with ISC West, focuses on building a holistic security strategy for the connected enterprise. Exhibitors will focus on how physical and information security can be used together to mitigate new and emerging cyber-threats in a hyper-connected world. Connected Security Expo provides attendees access to cutting-edge products and technology in both the physical and IT secure realms. It is clearly a growth factor in the market. Here’s a look at some of the companies on display in the 2019 Connected Security Expo: Integrated video cloud service The AI-powered video analysis software suite delivers high-speed object search and facial classification Arcules provides the Arcules integrated video cloud service, which combines untapped video and sensor data with the latest technologies in cloud, artificial intelligence, and machine learning to deliver actionable business and security intelligence for modern organisations. The cloud-based service is designed to ensure security, scalability, streamlined operations, and bandwidth management — all from a single, easy-to-use interface. Hardware-accelerated solutions BrainChip Inc. is a global developer of software and hardware-accelerated solutions for advanced artificial intelligence (AI) and machine learning applications. The AI-powered video analysis software suite delivers high-speed object search and facial classification for law enforcement, counter terrorism and intelligence agencies. PSIM software platform CNL Software Inc. is an open, adaptable, scalable and secure Physical Security Information Management (PSIM) solutions provider. The IPSecurity Center PSIM software platform helps law enforcement, government agencies, the military, public and private critical infrastructure, transportation networks, corporations and campuses to integrate, automate and manage systems, allowing better security intelligence and improved operational efficiency. Facial recognition software IOmniscient Corp. provides facial recognition software that can recognise multiple faces even in crowded and uncontrolled scenes IOmniscient Corp. provides facial recognition software that can recognise multiple faces even in crowded and uncontrolled scenes. Matching faces with an existing database, the system can detect an unauthorised person and track him or her across non-overlapping cameras. Enhance situational awareness Oncam offers 360 and 180-degree video technology. The company has the largest range of wide-angle cameras that are open platform and easy to integrate. Unique dewarping technology allows the creation of award-winning video solutions for stakeholders from the C-suite to the security officer in wide range of industry segments. Oncam’s products greatly enhance situational awareness. Enterprise-class security Pivot3 is a provider of intelligent solutions using hyperconverged infrastructure. Pivot3’s intelligent infrastructure is optimised to deliver performance, resilience, scalability and ease-of-use required for enterprise-class security, video surveillance and IoT deployments. Electronic physical security The UL 2900-1 standard offers general requirements for software cybersecurity for network-connectable productsUL LLC is working to increase the prominence of the Underwriter Laboratories brand in cybersecurity with the UL Cybersecurity Assurance Program (CAP). The UL 2900-1 standard, the standard that offers general requirements for software cybersecurity for network-connectable products, was published in 2016 and in July 2017 was published as an ANSI (American National Standards Institute) standard. The standard was developed with cooperation from end users such as the Department of Homeland Security (DHS), U.S. National Laboratories, and other industry stakeholders. UL 2900-2-3 – the standard that focuses on electronic physical security/life safety & security industry, was published in September 2017. Proactive automated system Viakoo is a provider of the security industry’s first proactive automated system and data verification solution. Create significant value Vidsys is innovating and accelerating a transition to Converged Security and Information Management or CSIM. The company is committed to educating and supporting customers with their evolving needs to provide a more holistic view of risk and throughout the overall business process re-engineering necessary to create significant value across the entire organisation.
Using an asymmetric approach to perimeter security is more efficient and cost-effective. The approach, advocated by Applied Research Associates (ARA), involves strategic deployment of the company’s Pathfinder seismic-acoustic sensors. Asymmetric placement of the sensors is in contrast to typical perimeter security systems, which are linear: Sensors are distributed at specific intervals along a perimeter and require infrastructure to communicate back to a control centre. Instead, asymmetric placement involves fewer sensors that are hidden strategically and tactically in areas to address known vulnerabilities and threats. At a border, small, covert sensors – about the size of two hockey pucks – might be positioned in a “dead space” that isn’t otherwise monitored, or along a specific route intruders are known to use. Intercepting intruders at long distances The sensors can then track and map an intruder’s movement, locations and intent. Knowing the location of intruders enables personnel to intercept them at a further distance, even before they reach a perimeter; meanwhile the sensors continue to operate covertly and unseen by future intruders. The more focused approach allows an end user to address a specific known or suspected vulnerability in an immediate area of concern, rather than taking a broader approach typical of perimeter security. Radio waves of data packets transmitted from the sensors are masked so that they remain below the ambient noise floor “It lets us intercept the threat on our terms instead of theirs,” says Rob Jones, Chief of Counter Threat Technology Operations, Security Products Group, Applied Research Associates. “Our technology is not dependent on a physical structure. We can see what the threat is doing and force changes in the behaviour.” Wireless transmission range A longer wireless transmission range, a key feature of the Pathfinder sensor, enables the asymmetric approach. A proprietary RF radio sends transmissions 10 to 12 kilometres (6 to 8 miles) with no gateways or receivers (up to 20 km [12 miles] if the receiver and antenna are elevated]). Pathfinder is the second generation of a sensor developed in a DARPA (Defense Advanced Research Projects Agency) initiative. The Expendable Unattended Ground Sensor (E-UGS) has been fielded by the military in combat situations since 2010; more than 48,000 sensors have been deployed in the last seven years, many during recent Middle East conflicts. The device senses seismic-acoustic sound waves traveling through the ground, and analyses their “signature” to provide location and confirm if it is a human or an animal, for example, says Jones. Early warning detection with smart sensors Pathfinder, a new generation of the E-UGS technology developed for the commercial market, has better machine-learning algorithms, is therefore “smarter,” and provides higher detection probability and fewer false alarms. Battery life has been extended from 3 months to about 6 months for the smaller Pathfinder Mini sensor, which has the form, fit and function of the E-UGS sensor with improved probability of detection and lower false alarms. Battery life is up to two years for the larger Pathfinder XL model, which is about the size of a soda can. An Android app provides a map showing activity reported by the sensors, or the information can be integrated with a variety of physical security or command-and-control systems. “Our technology is not dependent on a physical structure. We can see what the threat is doing and force changes in the behaviour” The sensors are designed to monitor extended perimeters, remote areas and critical routes, providing early-warning detection of intruders where cameras and agents cannot detect them. The sensors are covert, buried in the ground and communicate wirelessly, so there is no infrastructure in the immediate area to tip off a sensor’s location. Radio waves of data packets transmitted from the sensors are masked so that they remain below the ambient noise floor – i.e., they are undetectable. Military and government applications E-UGS sensors are used ad hoc in the military battlefield to provide information on movement of intruders, locations and intent. The small sensors can be buried quickly by a soldier. They are also “expendable” – the E in E-UGSs – and considered almost disposable or consumable, typically used only once and not recovered (in military situations). In longer-term deployments, more typical in commercial applications, the length of service for the newer Pathfinder sensors depends on battery life (and changing batteries when needed). Enhanced and adapted for commercial usage, Pathfinder sensors can be used in a variety of vertical markets, especially critical infrastructure protection, as well as border protection. In the defence and Homeland security realm, they are used by international governments (Latin America, Africa). For critical infrastructure protection, they can be used to protect power grids, transmission lines, natural gas and oil pipelines. They are a fit for protecting any large areas, such as cattle ranching, preventing timber theft, and anti-poaching. ARA is promoting the sensors as “expendable, affordable, actionable and undetectable.” Specific to affordability, typically $11,000 buys a “starter kit” with communication architecture and hardware to launch the system. Applied Research Associates will be at ISC West in Booth 2125. “There is no other competitor in this space, with this price point, with these capabilities,” says Matt Fordham, Group Lead and Associate Division Manager, Unmanned Security Systems and Products, Applied Research Associates. Applied Research Associates is an international research and engineering company that provides government and industry solutions to problems to improve safety, security and way of life. For more information, please visit the Pathfinder website: https://www.ara.com/pathfinder
The largest global event of 2016 – and the year’s biggest security challenge – will no doubt be the Games of the XXXI Olympiad in Rio de Janeiro, Brazil. Around 15,000 athletes from 206 countries are expected to compete at the Olympic games, August 5-21, 2016, and about 7.5 million tickets will be issued. In our age of terrorism, organisers of any event on the scale of the Rio Olympics must consider the possibility of an attack or other security breach during the more than two weeks of the event. Ever since the 1972 Munich massacre, in which 11 Israeli Olympic team members were taken hostage and eventually killed (along with a German police officer), organisers of Olympic games have been keenly aware of the possibility of violence. The threat of terrorism raises the stakes even more. Recent events aggravate concerns about the safety of the Olympics, including the deadly Paris terrorism attacks in November of 2015 and the Brussels bombings earlier in 2016. The big stage of the Olympics would provide a temptingly high profile to any group wishing to foment terror by attacking the game venues, facilities nearby, or the 500,000 tourists expected to attend. Devoted to avoiding such a catastrophe will be a huge security effort at the Rio Olympics, including more than 85,000 forces – 47,000 Brazilian security professionals and 38,000 members of the armed services. An Anti-Terrorism Centre will promote sharing of information, training and knowledge among police, law enforcement and intelligence. Officials from more than 90 countries will work together on the effort. It will be the largest security operation in Brazilian history. In contrast, only 40,000 agents were used at the London Olympics in 2012. Several additional factors could impact security in Rio in August. They include: Devoted to avoiding a catastrophewill be a huge security effort at theRio Olympics, including more than85,000 forces – In contrast, only40,000 agents were used at theLondon Olympics in 2012 Need for awareness/ preparedness. Brazil has a history as a peaceful country, has no declared enemies, and has previously faced little threat of terrorism. It also has little intelligence expertise. Only recently did Brazil legislate to make terrorism a crime punishable by up to 24 years in prison. Might the South American country therefore be complacent to the possibility of an attack? Border security. Geographically, Brazil has more than 14,000 miles (23,000 kilometres) of borders that are difficult to control, much of them through Amazon jungles. The largest country in South America, Brazil shares borders with 10 other countries, and lack of controls in unpopulated regions is one factor in Brazil’s historic struggles to combat drug and arms trafficking. A 90-day visa waiver during the games, approved by Brazil’s congress, will help to attract more tourists, but at what cost to security? (Waivers are limited to visitors from nations seen as low-risk, including the United States, Canada, Australia and Japan.) Securing areas surrounding Olympic venues. Just steps from some of the largest Olympic venues are areas of Rio de Janeiro plagued by poverty and crime. Slums, or “favelas,” are within half a mile (less than 800 metres) of Maracana stadium, where opening ceremonies will kick off the games. Slums are also located near popular beaches and expensive hotels. Other problems of poverty – open sewage, destroyed houses and violence – are also concerns. Slums are controlled by drug traffickers and armed gangs, and police are few and inadequately armed. Many places are unsafe to walk at night. Violent crime. Protecting the Olympics includes keeping the entire city safe. Brazil has about 52,000 murders a year, and there are around three per day in Rio. Crowd violence is often a problem at Brazilian soccer matches. Budget cuts. In March, the government in Brazil decreased its security budget by 30 percent (about 550 million US dollars), with much of it targeting future investment. However, concern is that the cuts might undermine plans such as creation of an Urban Pacification Police in slum areas near the airport. Brazil’s political climate. Brazil's president is facing possible impeachment, and the nation's economy is in a recession freefall; might additional security risks result from the crisis? The Zika virus. Brazil has been hardest hit of any nation by the Zika virus, which is spread by mosquitoes and has particular risks for pregnant women and their unborn children. If the outbreak persists, might it cast a negative shadow over the Olympic games (or add another risk factor)? To prepare to meet the security challenges of the Olympics, Rio officials have undertaken several initiatives, including: Applying lessons they learned from hosting other big events. Large international events are not new to Brazil, which hosted the 2014 FIFA World Cup, the 2014 Va’a World Sprint Canoeing Championships, and the 2012 Rio+20 United Nations Conference on Sustainable Development. Brazil also has experience managing the large annual Carnival celebrations in Rio and elsewhere. Technology to secure the RioOlympics includes a largesecurity command and controlcenter in downtown Rio.Dozens of screens will displayviews from thousands ofcameras installed throughoutcity and in Olympic venues Surveying best practices by visiting other locales where large events were held. Brazilian officials will use past Olympics games as models. Officials have also visited other locations that sponsored big events, such as the Tour de France and the Boston Marathon, to see what they can learn. Hundreds of Brazilian police visited the Pan-Am Games in Toronto last summer to learn newer techniques. They are also implementing best practices from other international events such as the IAAF World Athletics Championships in Beijing and the Baku 2015 European games. The Rio Olympics’ head of security traveled to Washington to increase cooperation with the Department of Homeland Security and other US agencies. Creating a huge command and control centre. Technology to secure the Rio Olympics includes a large security command and control centre in downtown Rio, featuring walls covered with dozens of screens displaying views from thousands of cameras installed throughout city and in Olympic venues. Soldiers will control access to stadiums, X-ray machines and metal detectors. Screening visitors as they arrive. Officials will receive real-time data about airport passengers as they check in from their country of origin. As the days count down to the Rio Olympics, officials appear to be leaving very little to chance. However, with all attention focused on Rio during the Olympics, might the event be too tempting for a terrorist to resist? Given global threats and general security vulnerabilities, organisers of the Rio Olympics may need more than preparation to protect the games. They might need some luck, too.
HENSOLDT, the independent sensor solutions house, will deliver its IFF interrogator (IFF = Identification-friend-or-foe) for very short range and short range air defence applications to the French Ministry for the Armed Forces. The contract awarded to Hensoldt France SAS covers the delivery of 134 MSR1000I (monopulse secondary radar) destined for integration on the French Army’s MISTRAL missile launchers and MARTHA air defence command and control stations. The MSR1000I IFF interrogator has been successfully qualified by the French Defence Procurement Agency DGA in December 2018 and will perform NATO IFF interrogation together with the mini crypto-computer QRTK6NG, also manufactured by Hensoldt France. Following this, the first tranche has been notified and 41 MSR1000I compliant with the STANAG 4193 Edition 3 will be delivered in 2020. Precise identification of ships and aircraft IFF systems precisely identify ships and aircraft by automatically sending interrogation signalsThe French very short range and short range air defence platforms wiIl then be able to perform mode 4 and mode 5 interrogations. IFF systems precisely identify ships and aircraft by automatically sending interrogation signals which are answered by so-called transponders on-board friendly aircraft or ships. Thus, IFF enables field commanders to quickly distinguish friendly from hostile forces. Unlike Mode 4 used hitherto, Mode 5 employs sophisticated encryption techniques to avoid hostile signal manipulation, thus ensuring that the identification process is absolutely reliable and secure. With the decommissioning of 'Mode 4', ‘Mode 5’ needs to be introduced in all western armies, then being a precondition of joint operations of NATO and allied forces. IFF systems for ground and naval platforms HENSOLDT supplies customers all over the world with IFF equipment. Based on the experience of predecessor companies like Matra, Airbus and Siemens, the company is under contract to upgrade German, French, UK, US and other armed forces’ platforms with IFF systems using the latest ‘Mode 5’ standard. It has already delivered IFF systems – including crypto devices - to ground and naval platforms of 42 NATO and NATO-allied nations. HENSOLDT has already delivered IFF systems to ground and naval platforms of 42 NATO and NATO-allied nations In France, the company’s equipment is deployed on the ‘Charles de Gaulle’ aircraft carrier, the Rafale and Mirage 2000 combat aircraft, the NH90 helicopters and several air defence platforms. In Germany, the company has established the air traffic control/IFF network of the German Air Force and delivers interrogators and transponders to a number of airborne and naval platforms. In total, HENSOLDT has about 450 IFF systems under contract for more than 80 platform types.
HID Global®, a worldwide provider in trusted identity solutions, announced that the government of Tanzania has selected HID’s citizen ID solutions to add e-Visa and e-Permit capabilities to its e-Passport, which HID helped deploy last year as part of the Tanzania e-Immigration program. The new web-based visa and residence permit services allow visitors and residents to apply for and receive validated credentials for traveling or living in the country. Integrated e-immigration solution “This is an important milestone as we continue to work with HID Global to enhance and broaden the capabilities of our e-Immigration ecosystem,” said Dr Anna Peter Makakala, Tanzania’s Commissioner General of Immigration. “We plan to continue expanding this solution to our country’s border crossings and across the broader global community as we become a showcase for efficient, comprehensive and integrated e-Immigration solutions.” Convenient and efficient toolset We are pleased to be entering this second deployment phase with the government of Tanzania" “We are pleased to be entering this second deployment phase with the government of Tanzania, building on the success of the country’s e-Passport roll-out last year,” said Rob Haslam, Vice President of Sales, Citizen ID business with HID Global. “Immigration officers in Tanzania now have a convenient and efficient toolset for completing their vital mission of vetting and granting electronic visa and residence permit credentials to applicants.” Since early 2018, HID Global has been Tanzania’s primary supplier of an end-to-end solution for issuing e-Passports with advanced physical and electronic security features, automated verification capabilities and a tamper-proof contactless chip embedded in a polycarbonate datapage. The country now has a single citizen identification system that spans the entire identity journey from data capture to issuance and can be used to support e-Passports, e-Visas, e-Permits and other physical electronic documents. HID a solutions provider HID’s solutions can be found in sixty percent of all government-issued electronic identity projects around the world. As a solutions provider, HID is delivering complete, end-to-end system solutions that meet governmental requirements for national ID, e-Passport, foreign resident ID, driver license, vehicle registration and other programs.
Milestone Systems, the open platform company in IP video management software (VMS), was useful when Pope Francis visited the US/Mexico border town Ciudad Juarez, Mexico, in 2016. Large crowds of religious followers and the curious alike — estimated to be as many as 200,000 — made the pilgrimage to the region for a once-in-a-lifetime chance for many to see the leader of the Catholic Church in person. XProtect video surveillance systems in the neighbouring city of El Paso, Texas, were used to help manage the large crowds. In El Paso, city managers, local law enforcement and US immigration officials were concerned that population explosion would choke roadways, cause congestion, and present security risks as observers lined the roads and crossed the four bridges between the cities. The City of El Paso and the School District have their own 10 gigabit fibre WAN, which I'm sure was helpful in accessing the systems" Camera access from different locations "As can be imagined the Pope visit was huge; we've never seen anything like it. The crowds were crazy, and the focus for officials was all about security," said Marica Wever, President, Integrated Technology and Design (ITD), based in El Paso, Texas. "From the International Boundary and Water Commission, to Homeland Security, to other federal and local agencies, it seems everybody was here and they all wanted access to local video systems for their independent and joint efforts." Wever explained that because the Milestone XProtect Corporate video management software (VMS) is used across many of the local sub systems, officials were able to gain camera access through different users. "The City of El Paso and the School District are all Milestone-based, and they each have their own 10 gigabit fibre WAN, which I'm sure was helpful in accessing the systems," said Wever. "Across the two systems, there were about 100 cameras in use helping to monitor the situation." Maintaining safety and security While ITD was not directly involved with the security operations on the day of the event, Marcia Wever is very proud that the flexibility and reliability of the installed Milestone video surveillance systems they've deployed around the city of El Paso were able to be accessed to maintain safety and security in such a unique situation. "I've been told that all the players involved in the event were very happy with the video quality and accessibility of the systems," said Wever. "Events like this take on their own life as the various agencies come in, but there were no major incidents, and all feedback I have gained is that the system was quite effective."
HID Global, a provider of trusted identity solutions, has announced that the government of Tanzania has selected HID as its prime supplier for an end-to-end solution for issuing electronic passports as part of Tanzania’s transformative e-Immigration programme. The new ePassport was unveiled publicly as part of the inauguration of the end-to-end solution provided by HID Global. The solution incorporates advanced physical and electronic security features, automated passport verification capabilities and support for international standards. Marked by visually stunning landmark imagery, such as Mount Kilimanjaro and Zanzibar’s House of Wonders, the new Tanzania ePassport contains a contactless chip embedded in its polycarbonate datapage, which is proven as tamper-proof. HID Polycarbonate Electronic Datapage HID Global has partnered with DLRS Group for the manufacture of the passport booklets incorporating HID’s polycarbonate electronic datapage. This is the same partnership as for the current award-winning Irish electronic passport, with both the booklet and datapage manufactured at the two companies’ facilities in Ireland.The new ePassport will increase security and make travel easier for the country’s citizens The new ePassport will increase security while, at the same time, making travel easier for the country’s citizens, such as simply scanning their passports electronically at border control stations upon entry and exit. In addition, the new ePassport conforms to all international standards as set out by the International Civil Aviation Organization, ensuring seamless interactions by Tanzanians as they travel the world. “Tanzania is taking a leap forward in providing an electronic passport for our citizens,” said Dr. Anna Peter Makakala, Tanzania’s Commissioner General of Immigration. “Our people will be proud knowing they are carrying one of the most secure and modern passports in the world and can take advantage of some of the most advanced technology available.” New passports help enhance security Tanzania is not only modernising government services, but also raising security by enhancing the existing issuance process. Verifying the identities of travellers is a high priority for governments worldwide, as they crack down on counterfeit passports and upgrade border facilities. The e-Immigration solution includes an ePassport issuance system and personalisation facilities in Dar-Es-Salam and Zanzibar -- equipping the application centres and embassies – as well as biometric matching, border control, e-Visas, e-Permits and delivery of electronic passport books. Stefan Widing, President and CEO of HID Global, said, “We worked very closely with Tanzania’s government to conceptualise and bring into being this state-of the-art passport solution. Their government’s vision for faster, more secure electronic verification of identities matched our end-to-end solution capabilities for citizen identity. Working on a strict timeline, the Immigration team in Tanzania was a strong partner with us to deliver on this exemplary government project.”One of many benefits of the new e-passport solution from HID Global is that the holder can have an “emergency passport” on their smart phone Emergency passport on smartphone One of many benefits of the new e-passport solution from HID Global is that the holder can have an “emergency passport” on their smart phone, if their passport is stolen or lost in another country. The emergency passport, verifiable electronically by the embassy, allows the traveller to obtain the necessary document to return home or request a replacement passport without the need for further online checks, filling out forms or other time-consuming tasks. This mobile emergency passport is made possible using HID’s award-winning Seosâ technology for mobile citizen IDs, called HID goID. HID Global has shipped more than 150 million government-issued IDs in over 50 countries for major projects that include national ID, e-passport, foreign resident ID, driver’s licence and vehicle registration programmes. HID products and technology are present in sixty percent of all government issued electronic identity projects globally. Leveraging this experience, HID Global has formed a multi-year relationship with the government of Tanzania to ensure the highest levels of security for many years to come.
Qognify, a provider of big data solutions for physical security and operations, announced that it has recently expanded its security solution at Gardermoen Oslo Airport with Situator, the company’s market-leading situation management solution. Avinor, the group responsible for managing Norway’s airports, decided to not only expand and upgrade Oslo Airport, but unify its different systems to create a unified security platform. Extending to Situation Management A Qognify video management solution user since 2008, the Airport, with the support of Racom, Qognify’s partner, the airport now added Situator Situation Management solution. The comprehensive platform integrates all existing systems – Qognify and third-party, including thousands of surveillance cameras, access control and other sensors. Situator structures and correlates the information from these different systems for greater situational awareness, incident management and effective response. Flexigate override support Being a major European airport, Oslo serves many Schengen flights, meaning flights to the 26 European countries that have officially abolished passport and all other types of border control at their borders. Allowing the area to function as a single country for international travel purposes dictates special operational requirements using advanced Flexigate system. The Flexigate system avoids incidents where the wrong doors are opened to ensure that passengers who should go through the border control actually do so. Situator integrates with the advanced Flexigate access control system, and overrides switching of gates between Schengen and non-Schengen flights, as well as the domestic flights if the control systems are out of operations. Extended capabilities of existing technology Avinor Oslo Airport: “Situator allows us to leverage our existing technology, and extend the capabilities of those systems for increased value. Our long-term partnership with Racom and Qognify has given us the ability to smartly and cost-effectively upgrade our security without having to rip & replace previous, viable investments". "Adding Qognify Situator to the security and operations program at Oslo Airport has enabled us to confidently build true best-of-breed solution,” said Frode Igland, CEO, Racom AS. ”The new capabilities provide a common operating picture for all stakeholders, improving security and operations”. “Oslo Airport’s security program is one of the most advanced ones among the many airports we are involved in,” commented Moti Shabtai, Qognify’s CEO & President “Our partnership with Avinor and Racom is a testament to how deep, long-term collaboration can produce exceptional return on investment for the airport.”
The US Department of Homeland Security needed an ironclad ID solution to prevent widespread counterfeiting The U.S. Green Card has set a global, never-exceeded standard for uncompromised security. After more than 12 years and over 20 million cards featuring HID Global’s LaserCard® optical security media, the U.S. Department of Homeland Security turned to the same technology and expertise for its next-generation Green Card. In May 2010, the agency began issuing the new card, produced by HID Global and featuring a host of innovations in optical media for enhanced security as well as an award-winning multi-technology design that improves the efficiency of land border crossing. Counterfeiting problem By 1996, officials of the INS (now the U.S. Department of Homeland Security) were concerned that the Permanent Resident Card was too easily counterfeited. Officials estimated that counterfeiters had produced hundreds of thousands, possibly millions, of fraudulent documents, with some fakes selling for up to $15,000. Under pressure to control illegal immigration and meet legislative requirements for biometric based ID credentials, the agency needed an ironclad ID solution to prevent widespread counterfeiting and to uphold its international standing as a strong and effective immigration agency. HID Global LaserCard solution The overriding objective was to deploy the most counterfeit-resistant document possible with secure portable data storage. The combination was required to prevent fraudulent alteration, withstand ten years of use and support efficient issuance. A secondary objective was to assure reliable visual authentication where electronic readers are not available. By 2009, the agency faced the added requirement of complying with the new Western Hemisphere Travel Initiative (WHITI) to speed land border crossings. The U.S. Government has twice selected an ID credential, based on HID Global’s LaserCard® optical security media, as its permanent resident card. The card’s digital security has never been compromised. Forensic document specialists have testified before Congress that the card has “effectively put mass counterfeiters out of business.” Forensic document specialists have testified before Congress that the card has “effectively put mass counterfeiters out of business.” A major setback for mass counterfeiters For any ID card to be effective, it must be usable in a variety of situations, especially when inspected without the aid of electronic readers. HID Global’s LaserCard optical security-media provides the industry’s strongest visual security and counterfeit resistance characteristics: Rapid recognition of a genuine card and counterfeit resistance based on: Unique visual characteristics of optical security media Overt, covert and forensic micro-imaged security features resolved at 25,000 dots per inch High contrast, high resolution “photo-like” facial image of the legitimate cardholder irreversibly laser etched into the optical security media. This “Personalized Embedded Hologram” is unique among all card-based data storage media. The image cannot be altered and serves to confirm that other personalised images on the card’s surfaces have not been tampered with Security diffractive image: covert security feature that can be verified with a simple inspection tool Storage of tamper-proof digital information (facial image, demographics, biometrics) ISO standard data structure for interoperability Next generation Green Card Optical security media enables employers, authorities and inspection agents to make a confident judgment about card authenticity and visual identification of the cardholder, even when electronic readers are not available. Following extensive collaboration with the U.S. DHS, HID Global developed a much-enhanced, next generation Green Card whose design and features elevate the security and functionality of ID credentials to a new level.
Round table discussion
The world of politics, like the world of security, is an environment of constant change. But do changes in one have an impact on the other? Governments around the world are involved in buying a wide variety of physical security systems, so how those governments operate certainly affects how they spend money on security. But in a broader sense, governments (and the associated political forces at work) also impact how their citizens and those in the private sector view threats and, as a logical extension, the security systems they need to address those threats. We asked this week’s Expert Panel Roundtable: How does the political climate affect spending on security systems?
Terrorism is in the headlines all over the world. After any such incident, many of us in the physical security market find ourselves asking: What could we have done to prevent it? Assessing risk and preventing catastrophes before the fact are part of our market’s DNA; and yet, too often the random nature of terrorist attacks and their targeting of public places leave us unsure of anything anyone could have done. How can we translate the benefits of our industry’s products into real-world solutions that can prevent terrorist attacks? We presented the question to this week’s Expert Panel Roundtable, and received a variety of interesting responses. Specifically, we asked: How is the recent rise in terrorism impacting the physical security market (e.g., higher demand, different mix of products, etc.)? How should the physical security market respond? What solutions are needed?