As International Security Week (ISWeek), 30 November – 3 December 2020, draws closer, experienced names in the industry are preparing to join together to dissect recent incidents of terrorism and how to combat extremism while protecting national assets. International Security Week The International Security Week marks five years since the shocking series of coordinated terrorist attacks across Paris, France which tragically killed 130 people. Recent incidents in Nice, France and Vienna,...
Utility, Inc., (Utility Associates, Inc.) announced the United States Patent and Trademark Office issuance of patent 10,812,755 for additional BodyWorn camera technology. Patent for BodyWorn cameras The patent covers mounting a BodyWorn camera in a holster that is embedded inside a body armour vest, duty shirt, winter coat or other garment with the camera lens fastened and aligned to provide a clear field of view through an opening in the garment. Embedding the camera within an article of clo...
Briefcam, the industry’s renowned provider of Video Content Analytics and Video Synopsis solutions, has announced that its advanced video analytics software platform will serve as the analytics engine for Verizon’s Intelligent Video solution. Intelligent Video solution The comprehensive monitoring service from Verizon helps law enforcement and security teams keep public and private facilities secure with near real-time, actionable data from video content. The combined solution enh...
Johnson Controls will showcase solutions and thought leadership critical to safe building reopening during the virtual Global Security Exchange Plus (GSX+) conference. From Sept. 21 to Sept. 25, 2020, Johnson Controls experts will demonstrate and discuss the latest security innovations that have become integral to intelligent security during the COVID-19 crisis and beyond. Attendees can interact with Johnson Controls leaders during keynote event sessions, technology demos and a thought leader i...
Cyan Forensics is announcing a new partnership with Susteen. This partnership joins together Cyan Forensics scanning technology software with Susteen’s DataPilot DP10 platform, creating a triage capability for smartphones, meaning that police forces will be able to scan portable devices for illicit materials, such as child sexual abuse, swiftly and accurately. Evidence collection Partnership will allow investigators to use Cyan Forensics’ scanning technology with Datapilot DP10 t...
General Dynamics Mission Systems and Dedrone, the globally renowned company in airspace security and defence, has announced their strategic counter-drone partnership, providing General Dynamics' global network with access to Dedrone's complete drone detection and defeat technology. Counter-unmanned aerial systems As part of this strategic agreement, General Dynamics Mission Systems becomes a value-added reseller for Dedrone's counter-unmanned aerial system (C-UAS) capabilities and has made a s...
SMART SHOOTER, a designer, developer, and manufacturer of innovative fire control systems that significantly increase the accuracy and lethality of small arms, announces that it has successfully completed another step in testing the SMASH Hopper in different configurations. SMASH Hopper, SMART SHOOTER's Light Remote-Controlled Weapon Station (LRCWS), was mounted on Plasan Re’em’s Armoured Toyota Hilux and successfully shot and hit several moving ground and air targets from more than 300 metres. Mounting on vehicles Weighing approximately 15 Kg, SMASH Hopper is a modular and rapidly deployable LRCWS that provides “One Shot – One Hit” capability while controlled by an operator from a safe distance or from inside a protected vehicle. SMASH Hopper is ideal for deployment on various lightweight manned and unmanned vehicles & platforms, with a wide range of applications. Offering day and night capability with automatic scanning and target detection, SMASH Hopper is ideal for multiple mission scenarios including force protection, border security, anti-drone, remote ambush, as well as low profile operations at complex urban environments. Increased accuracy Michal Mor, Smart Shooter CEO: "We were happy to collaborate with Plasan Re’em for the development of capabilities in this market segment, and appreciate the professional work they did in the integration and installation of the SMASH Hopper on their modified armoured 4x4 vehicle. This is another step in a series of trials for different configurations and applications of the SMASH Hopper, and once again, we were thrilled to see how every bullet finds its target.” Yaakov Ben-Ari, Plasan Re’em CEO: "Integrating SMART SHOOTER's SMASH Hopper lightweight RCWS that provides “One Shot – One Hit” capability on Plasan Re’em modified armoured 4X4 vehicle creates a tiebreaker solution that dramatically increases accuracy, lethality, and survivability of small arms. Ideal for special forces, law enforcement units, and border security, this integrated solution brings essential added value to its users, especially in scenarios where weight, time, and precision play an indispensable role."
The Security Industry Association (SIA) has announced the 2020 winners of the SIA New Product Showcase Awards, the flagship awards program in partnership with ISC West recognising innovative security products, services and solutions. Top among the winners – who were recognised on July 9 during a virtual awards show – was Leica Geosystems, part of Hexagon, receiving the 2020 Best New Product Award. Since its inception in 1979, the SIA New Product Showcase has been the security industry’s premier product awards program. New products are reviewed by a panel of judges with extensive industry experience, and in 2020, following significant deliberations, the 30 judges presented awards for technologies covering 23 product and service categories. Leica Geosystems, part of Hexagon, received the Best New Product honour for its 3D Surveillance with Leica BLK247, submitted in the Emerging Technologies category. Building security The 3D Surveillance with Leica BLK247 is “a first-of-its-kind reality capture sensor for building security and operations,” said Leica Geosystems. “It is the latest product in the company’s BLK product line, a collection of reality capture, scanning and photogrammetry hardware and software. The BLK247 offers continuous, 24/7 LiDAR-based 3D monitoring and change detection within spaces. It does this using LiDAR, 3D digital fencing and continuous scanning to monitor buildings and spaces 24 hours a day, 7 days a week.” The prestigious Judges’ Choice Award was presented to Suprema Inc. for the Airfob Patch product, submitted in the Access Control Devices & Peripherals Hardware – Wireless category. “Airfob Patch is the world’s first mobile-to-RF-card signal translator, enabling mobile phones to communicate with the existing RF card readers,” said Suprema Inc. “Wire, batteries nor construction is required for installation. Airfob Patch charges itself by using the existing RF field signals transmitted from the RF reader. It transforms the RF fields into its own power source.” New Product Showcase Merit Award SIA is proud to present John Spooner with the 2020 SIA New Product Showcase Merit Award" Additionally, John Spooner – executive vice president at Alarm Detection Systems and an active volunteer judge in the SIA New Product Showcase program. Spooner received the New Product Showcase Merit Award, which recognises an individual or company who, through their support of the New Product Showcase, demonstrates a commitment to the vision and mission of the program, contributes to its success and promotes the advancement of SIA and the security industry overall. “SIA is proud to present John Spooner with the 2020 SIA New Product Showcase Merit Award; John has not missed a single SIA New Product Showcase event since he began as an active volunteer judge in the program 17 years ago,” said Chris Grniet, chair of the SIA New Product Showcase Committee. “He has always been a fair and honest participant and has never hesitated to jump in and help whenever we need him. He has been exemplary in his commitment, participation and ability to help the group reach consensus.” Services and contributions “Following hours of panel-driven judging and technology demonstrations, SIA is thrilled to recognize the 2020 winners of the SIA New Product Showcase Awards for their innovative products, services and contributions representing the best new offerings in the market,” said SIA CEO Don Erickson. “SIA applauds all the honourees who received awards in 2020 and particularly Leica Geosystems and Suprema Inc. for standing out in this highly competitive field of entrants to earn the Best New Product and Judges’ Choice distinctions. Additionally, we congratulate John Spooner on receiving the 2020 New Product Showcase Merit Award in recognition of his many valuable contributions to this premier program.” Award winners The 2020 SIA New Product Showcase winners are: Best New Product Award Winner – Leica Geosystems, Part of Hexagon: 3D Surveillance with Leica BLK247 Judges’ Choice Award Winner – Suprema Inc.: Airfob Patch New Product Showcase Merit Award Winner – John Spooner, executive vice president, Alarm Detection Systems Category Awards Access Control Devices & Peripherals Hardware – Wireless Winner – dormakaba: BEST Switch™ Tech Access Control Software, Hardware, Devices & Peripherals – Wired Winner – Swiftlane: Swiftlane Access Control Honourable Mention – Altronix Corporation: Tango Anti-Terrorism/Force Protection and Biometrics Winner – Gibraltar Perimeter Security: G-1441 Ultra-Shallow Bollard Winner – IDEMIA: VisionPass Commercial Monitoring Solutions Winner – IronYun Inc.: AI NVR Edge Analytics Communications and Networking Solutions Winner – Axis Communications, Inc.: AXIS C8210 Network Audio Amplifier Convergence and Integration Solutions Winner – Blue Light: Blue Fusion Design, Diagnostic and Installation Tools Winner – Alarm.com: On-Site Wrap Up Emergency Communication Systems Winner – Verint: NowForce Emerging Technologies Winner – BioConnect: BioConnect’s Unified Mobile Access Solution Winner – IPVideo Corporation: HALO IOT Smart Sensor 2.0 Fire/Life Safety Winner – Kidde: Kidde Optica Smoke Detectors Hosted Solutions/Managed Services Winner – SiteOwl: SiteOwl Intrusion Detection and Prevention Solutions (Physical) – Wireless Winner – Alula: Slimline Touchpad Honourable Mention – Cartell: CW-SYS Wireless Driveway System Lock and Key Solutions Winner –Medeco: All Weather Padlock Honourable Mention – Abloy Oy: ABLOY® BEAT Mobile Solutions (Connected) Winner – CloudScann: Visual Intelligence Control Centre (VICC) With VisualC3 Mobile Honourable Mention: Rapid Response Monitoring: rapidSMS Smart Home Solutions Winner – Alarm.com/Building36: Smart Water Valve+Meter Threat/Risk Management Software Applications Winner – Splan Inc.: SIVI™ – Splan Intelligent Visitor Insights Video Surveillance Advanced Imaging Technologies Winner – Axis Communications, Inc.: AXIS Live Privacy Shield Video Surveillance Cameras (HD/Megapixel) Winner – Bosch Security and Safety Systems: MIC IP Ultra 7100i Honourable Mention – Hanwha Techwin: PNM-9085RQZ Video Surveillance Data Storage Winner – Dragonfruit AI: Dragonfruit LiveArchive Video Surveillance Hardware and Accessories Winner – EIZO Inc.: FDF2711W-IP Video Surveillance Management Systems Winner – Airship Industries, Inc.: Airship EMS v5.4.5 During the 2020 SIA New Product Showcase virtual awards ceremony, in addition to the presentation of the overall and category-specific awards, attendees enjoyed hearing insights from New Product Showcase judges into innovations driving product advancements in the security industry.
The Security Industry Association (SIA), the globally renowned trade association representing security solutions providers, has released its new policy principles guiding the development and deployment of facial recognition technology. Facial recognition technology SIA believes all technology products, including facial recognition, must only be used for purposes that are lawful, ethical and non-discriminatory. “SIA recognises that some community leaders have expressed deeply-held views calling for the end of facial recognition technology use by law enforcement and the private sector. We respectfully but firmly disagree. Facial recognition technology offers tremendous benefits to society when used effectively and responsibly and with appropriate safeguards,” said SIA Chief Executive Officer (CEO) Don Erickson. He adds, “We invite all stakeholders to review these well-thought-out principles and engage with us in meaningful discussions leading to common-sense approaches to how this technology is used.” Policy principles in facial recognition tech use SIA believes that the principles should apply to deployment of facial recognition tools across safety and security applications SIA has committed to the following principles to be used in the development and deployment of facial recognition technology. SIA believes that that these principles should apply to implementation of facial recognition tools across safety and security applications, in both public- and private-sector settings, and that they should be reflected in development of any organisational or public policies addressing these uses of the technology. SIA’s core principles include: Ensuring transparency surrounding the use of facial recognition Establishing a clear and defined purpose for the use of facial recognition by organisations Using high-performing and accurate technology Incorporating human oversight and review Protecting data security Ensuring privacy by design Training and educating users of technology Improving or eliminating biased or discriminatory software Maintaining ethical acquisition of facial recognition technology Lawful, ethical use of facial recognition technology These core policy principles were developed by and with input from many SIA members, including members of the SIA Facial Recognition Working Group, the SIA Data Privacy Advisory Board and the SIA Executive Committee. In addition to these core principles, the new document includes guidelines around the use of facial recognition technology by law enforcement and the public and private sectors. SIA looks forward to continuing to lead industry around the lawful, ethical and non-discriminatory use of facial recognition technology.
BlackBerry Ltd. has announced that it has partnered with Dedrone, a globally renowned market and technology solutions company in airspace security, to deliver advanced counter-drone technology to secure the world’s most critical sites. Advanced counter-drone technology As part of this embedded technology partnership, Dedrone, is integrating BlackBerry AtHoc software into its products, to enable real-time secure alerts, when a malicious or unauthorised drone is detected in airspace. “When an unauthorised drone enters restricted airspace, time is of the essence. The more effectively the on-site personnel can respond, the better their chances of countering whatever the drone is there to do. BlackBerry AtHoc’s advanced alerting capabilities combined with Dedrone’s drone detection technology, enable our customers to react precisely and in time to control the situation,” said Aaditya Devarakonda, President and Chief Business Officer, Dedrone. Dedrone technology The Dedrone technology portfolio combines machine-learning software with state-of-the-art hardware sensors The Dedrone technology portfolio combines machine-learning software with state-of-the-art hardware sensors, electronic attack methods like smart jamming, and defeat weapons to provide early warning, classification of, and mitigation against drone threats. Dedrone’s capabilities are used by hundreds of customers globally, including the U.S. military, allied and coalition forces, correctional facilities, airports, utilities, as well as other public and private organisations. Integration with BlackBerry AtHoc software Working with the BlackBerry AtHoc API, Dedrone has integrated directly to BlackBerry AtHoc’s extensive and granular alerting functionality. This allows the creation of automated, highly targeted alerts based on a range of criteria, including flight zones, drone behaviour, and user groups – for a more efficient, focused response to the presence of an unauthorised drone. “New advanced technologies have the potential to solve some of today’s most pressing challenges, however, they also introduce new security risks,” said Christoph Erdmann, Senior Vice President of Secure Communications, BlackBerry. Countering rising threat of unauthorised drones He adds, “Drones are one of the many IoT endpoints that add to the growing chaos that security experts must navigate. We’re excited to partner with Dedrone to offer a critical solution that organisations around the world can use to keep citizens and the public safe.” BlackBerry is a globally renowned company in secure communications and the BlackBerry AtHoc software is used by key organisations around the world, including 70% of the US Federal Government.
3DX-Ray has announced a contract for the supply of ThreatScan-LS1 flat screen scanner to a European Counter-Terrorist Unit. ThreatScan-LS1 flat screen scanner The flexibility of ThreatScan-LS1 flat screen scanner allows counter terror officers to rapidly examine and assess threats and suspect items on site, such as bags, laptops, furniture and more. The ThreatScan-LS1 scanner also enables them to locate and identify hidden cameras and surveillance equipment. Each system consists of a portable X-ray generator, a detection panel and an operator’s workstation running 3DX-Rays market-renowned image processing software, together with a customer-specific range of ancillary equipment. Highly efficient scanning device ThreatScan scanner can be used to inspect suspect bags and packages in mass transit areas ThreatScan-LS1 flat screen scanner is lightweight, incredibly thin, and has a large imaging area of 600 x 460mm, that facilitates bags and objects to be scanned in one scan. This scanning system can penetrate up to 34mm steel at 120kV while producing high quality, sub-millimetre resolution images. ThreatScan scanner can be used to inspect suspect bags and packages in mass transit areas, such as rail and bus stations, shopping malls, airports, stadia and sports arenas. It is also best suited for general security inspection by first responders such as Police, Military and Private and Government Security agencies. Versatile and flexible security system 3DX-RAY LTD, Sales and Marketing Director, Vincent Deery stated, “We are very pleased with this contract because it demonstrates how versatile and flexible the systems are in protecting and enabling police officers in the pursuit of their duties.”
ASIS International, the globally renowned association for security management professionals, has announced that General Stan McChrystal, US Army (RET), will present a Global Security Exchange Plus (GSX+) keynote address on Military & Law Enforcement Appreciation Day at GSX+. The presentation, titled Leading in a New World, will take place on Wednesday, 23 September. Global Security Exchange Plus “GSX+ offers a unique opportunity to share the insights and guidance from global thought leaders,” said Godfried Hendriks, CPP, 2020 President, ASIS International, adding “We are thrilled to have General McChrystal on our lineup to share his insights on leadership in an ever-changing global landscape on Military & Law Enforcement Appreciation Day at GSX+.” A retired four-star general, McChrystal is the former commander of US and International Security Assistance Forces (ISAF) Afghanistan and the former commander of the nation’s premier military counter-terrorism force, Joint Special Operations Command (JSOC). He is best known for developing and implementing a comprehensive counterinsurgency strategy in Afghanistan, and for creating a cohesive counter-terrorism organisation that revolutionised the interagency operating culture. Crisis management and strategic operations McChrystal will provide practical and actionable guidance on what it takes to lead in a rapidly shifting world landscape In his GSX+ presentation, highlighting lessons from his crisis management and strategic operations playbook, McChrystal will provide practical and actionable guidance on what it takes to lead successfully in a rapidly shifting world landscape. In this insightful keynote, he will address such key leadership principles as transparency and inclusion, leveraging the power of teams through relationships, leading by influence, relentless mission focus, and sharing a clear vision with everyone who must execute against it, all against the shifting backdrop of the ever-evolving remote workplace. Military services veteran Throughout his military career, he commanded a number of elite organisations, including the 75th Ranger Regiment. After 9/11 until his retirement in 2010, he spent more than 6 years deployed to combat in a variety of leadership positions. In June 2009, the President of the United States and the Secretary General of NATO appointed him to be the Commander of US Forces Afghanistan and NATO ISAF. His command included more than 150,000 troops from 45 allied countries. On 1 August 2010 he retired from the US Army. Military & Law Enforcement Appreciation Day He is the New York Times bestselling author of My Share of the Task, Team of Teams: New Rules of Engagement for a Complex World, and Leaders: Myth and Reality. A passionate advocate for national service and veterans’ issues, McChrystal is the Chair of the Board of Service Year Alliance. He is a graduate of the United States Military Academy at West Point and the Naval War College. GSX+ is a new online experience that delivers the industry-renowned education sessions, robust marketplace, and unique peer-to-peer networking opportunities that security professionals have come to expect from the live GSX event. During Military & Law Enforcement Appreciation Day, all military, law enforcement, and first responders receive free one-day admission to GSX+.
While there is much hype around drone technology today, initial successful drone usage for security can be dated back to the 1960s, when the US utilised the Lightning Bug 147, a camera-equipped unmanned aerial vehicle that could travel 600 miles for surveillance in Vietnam, China and Korea. Drones for effective surveillance Since this initial deployment, drones have been used for a variety of security and surveillance applications. However, as professional-grade commercial drones incorporate newer, more advanced features and technologies, their capabilities will allow for many new scenarios and applications within fully-integrated security systems. The security industry, in addition to first response and law enforcement, will be among the first to truly experience the benefits of the most current drone technologies. And, these industries have already started to utilise drones in new ways—the most recent example being the use of commercial drones to save lives during hurricanes Irma and Harvey. For these reasons, UAVs are becoming an integral tool in multiple industries and according to PwC, will have an expected total value of $127 billion by 2020, $10.5 billion of which will be in security applications of drones.There is room to improve on cost, efficiency and safety, so the opportunity for commercial drone technologies is large Drones in fire, border and perimeter security Current drone users in the security arena are comprised of law enforcement, fire departments, border security and first responders, who primarily use UAVs for border control, perimeter surveillance and monitoring, anti-terror operations and searching for missing persons. These tasks generally require manned teams and can even include helicopters, the results being costly, time-consuming and potentially dangerous. Alternatively, these teams use consumer-grade drones, which simply lack the capabilities and levels of security necessary to be used safely for such operations. This makes the opportunity for commercial drone technologies large, as there is room to significantly improve on cost, efficiency and safety. By adding autonomous drones to their arsenals, security forces are able to accomplish their objectives more easily and effectively by removing the need for a security team member to operate the drone—as it works on its own—and instead, focus on responding to the security situation at hand. Employing fully autonomous systems, especially in surveillance, is a critical feature most drone systems currently don't allow UAVs can also enter narrow spaces, produce minimal noise, and can be equipped with night vision cameras and thermal sensors, allowing them to see beyond what the human eye can detect. They can also quickly cover large expanses of ground and access hard to reach places. However, most drones today have not reached the pinnacle of what is possible for advanced commercial UAVs. Drawbacks of current drone solutions Despite how far drone technology has come, drones used in security settings are still riddled with shortcomings. This is apparent in the build quality of current drones, most of which are made from hardened plastic, which falters when faced with rough weather conditions or after experiencing tough falls and crashes. Closed-system integration is another key element current UAVs lack. Not being able to integrate drones into wider closed-security systems creates major gaps in the efficacy of security operations. The use of carbon fibre in the build of drone hulls will increase drones' weather durability - and ultimately make them more valuable Lastly, employing fully autonomous systems, especially in surveillance, is a critical feature most drone systems currently don't allow - both due to shortcomings in the technology and due to the need for regulations to catch up to the advancements and capabilities of drone technologies. The combination of these drawbacks can create lacklustre drone results, and when lives are on the line, these results simply aren't enough. Why commercial drones can make a difference That being said, 2018 is the year where the security sector will experience increased drone adoption. That’s because there are some drone technologies being developed today that overcome many of the shortcomings outlined above. These are the technologies we will see having the greatest impact within the security industry. Here are some of the drivers of change, both in the industry and technology that will allow drones to effectively integrate into the security market: Increased processing power: This will allow autonomous drones, powered by AI technology, to track objects in real time, and adjust their courses and actions as needed. This allows for greater drone operational efficiency while simultaneously drawing less power from the battery, thereby lengthening the drone’s flying time. These improved processors will also make way for increased broadcast range capabilities, allowing for longer distance drone operations. Regulations will catch up to the technology: This is a trend we began to see at the tail end of 2017. Governments in both the United States and Europe have realised that drone regulations must keep up to gain the most from UAV technologies, as well as to counter the use of drones for terror or other nefarious tasks. To that end, the US government began talks with drone developers to discuss the expansion of commercial drone operations, and the UK government introduced tougher regulations to crackdown on dangerous flying and criminal drone use. Drone regulation will move in favour of autonomous drone operation: As governments increase regulations in favour of the commercial drone industry, commercial players will increase pressure to allow for fully autonomous operation. Full autonomy means Beyond Visual Line Of Sight (BVLOS) drone functionality. This enables drone operators to fly a UAV with the drone out of their line of sight, maximising the capabilities of the UAV, and in the case of security missions, keeping the pilot out of harm’s way. New materials will increase drone hull durability: As drone makers will have learned from their drones’ lack of weather resistance following the tumultuous hurricanes the U.S. experienced this past year, the use of carbon fibre in the build of drone hulls will increase their weather durability. Better capabilities will encourage adoption among security: New commercial drones will have longer flight times, longer battery lives, will carry heavier payloads, and will integrate advanced computer vision technologies and real-time connectivity. This will enable drones on security missions in remote areas to send a live stream of their field of vision to drone operators at a central command station. Full integration of security systems: The interoperability of a variety of technologies will make drones another sensor in fully integrated and closed security systems that may include smart fences, security cameras and other infrastructure elements. Full integration also means that these elements will be controlled from the same central command centre, whether for securing a specific facility, or as part of surveillance system on a military base, or other closed location. This will allow security personnel to use drones more effectively, saving time, money, and increasing the safety of security professionals in the field. This year is going to be huge for the drone security market, as it is about to experience a significant improvement in drone performance, which will lead to a widespread escalation in drone adoption. The results will be prolific for both drone makers and security force users.
The use of drones has increased dramatically in the last few years. Indeed, by 2021, the FAA says the number of small hobbyist drones in the U.S. will triple to about 3.55 million. With that growth, drone capabilities have increased while costs have decreased. For example, the DJI Phantom 4 can deliver a 2-pound payload to a target with 1.5m accuracy from 20 miles away for the less than $1000.00. This is an unprecedented capability accessible to anyone. This new technology has created an entirely new security risk for businesses and governments. Drone security risks Already, rogue groups such as ISIS have used low cost drones to carry explosives in targeted attacks. Using this same method, targeting high profile locations within our borders to create terror and panic is very possible. Security professionals and technologists are working furiously to address the gaps in drone defence. Currently, the most common technologies in use for drone detection are video, acoustic sensors, radio, and air surveillance radar. Each of these has advantages, but they also have flaws that make it difficult to detect drones in all conditions. Both optical and thermal cameras, as well as acoustic sensors, do not operate in severe weather such as fog and snow. And while radio and air surveillance radar cover a wide area of detection, they suffer from high installation costs and limiting technical challenges, such as being unable to detect low flying drones on autopilot. Compact Surveillance Radar (CSR) Compact Surveillance Radar (CSR) is a security technology addressing the problems with other types of detection. CSR, like traditional radar, has the benefit of being able to detect and track foreign objects in all weather conditions, but at a fraction of the size and cost. The compact size allows the radar to be mounted on existing structures or even trees, providing extensive perimeter defence almost anywhere that you can imagine. CSR can also filter out clutter such as birds by using an advanced algorithm reducing the number of false alarms. While the use of CSR and the other detection technologies are legal in the US and in most locations throughout the world, the response mechanisms are generally not. Current regulations in the US prohibit the use of jamming or GPS spoofing in all cases except for a few federal agencies Regulations limiting drones Current regulations in the US prohibit the use of jamming or GPS spoofing in all cases except for a few federal agencies. This makes it difficult to stop the damage that drones can cause. The FAA has put into place new regulations that limit some uses of drones. However, in most cases it is still illegal for even state or local governments to stop or interfere with drones other than to locate the operator and have them land the drone. In 2016 the first law to neutralise a drone in the United States was passed in Utah to respond to drones in wildfire areas because of their interference with airborne firefighting. This law may very well provide a model for other states dealing with drones in situations where people’s lives are being put at risk by drones. At the federal level, much effort is being put into evaluating the regulations and technology surrounding the misuse of drones. In the 2016 reauthorisation bill for the FAA, Section 2135 included a pilot program for the investigation of methods to mitigate the threat of unmanned aircraft around airports and other critical infrastructure. There are many federal agencies that are evaluating the use of a variety of technologies to respond to this threat. Both optical and thermal cameras, as well as acoustic sensors, do not operate in severe weather such as fog and snow Effective countermeasure technologies The most effective countermeasure for drones is jamming, currently off-limits to the private sector. This includes stadiums, convention centres, and other large gathering areas. A number of companies are developing new response technologies that do not require the use of jammers or hacking. Several companies have developed net guns that shoot a net at an approaching drone. These are only effective at less than 100m and frequently miss the target, especially when the drone is approaching at high speed. Several other companies have taken this method a step further, with drones that capture other drones. Once a radar detects a drone, another defence drone is launched and flies to the point of detection. Then, using video analytics it homes in on the drone and fires a net to disable the drone and take it to a safe location. While this drone capturing technique is still in its infancy, it shows a great deal of promise and will not be restricted in the same fashion as jamming. However, even this solution is difficult under current regulations, as all commercial drones in the US must be under direct control of a human operator within their line of sight. This effectively means that a drone operator is required to be on-site at all times to protect a facility, event, or persons. One thing is for certain, technology will continue to adapt and security companies will continue to invent new methods to protect their facilities and the people they are sworn to protect.
The UK Government has been working to reduce the risks associated with illegal drone use since a high-profile incident at UK’s Gatwick Airport in December 2018, when a drone sighting triggered a three-day shutdown of the UK’s second busiest airport, disrupting the travel plans of 140,000 people and affecting 1,000 flights. To address growing security threats by drones, the UK Government has released its ‘Counter-Unmanned Aircraft Strategy’. ‘Counter-Unmanned Aircraft Strategy’ This strategy sets out our approach to countering the threat the malicious or negligent use of drones can bring" “This strategy sets out our approach to countering the threat the malicious or negligent use of drones can bring,” says Brandon Lewis, the U.K. Minister of State for Security. “It will provide the security the public and drone users require to continue to enjoy the benefits of leisure and commercial drone use and facilitate the growth of the drone industry.” “Given the challenge posed by rapid advances in drone technology and the potential threat, the strategy will provide overarching direction to our efforts,” says Lewis. The strategy focuses on ‘small drones’, those weighing less than 20 kg (44 pounds). Countering malicious use of aerial drones The UK Counter-Unmanned Aircraft Strategy centres on mitigating the highest-harm domestic risks resulting from malicious use of aerial drones. They are: Facilitating terrorist attacks, such as modifying commercially-available drones to conduct reconnaissance or attacks. Facilitating crime, especially in prisons, where drones are currently used to deliver contraband. Disrupting critical national infrastructure, such as airports, where a malicious incursion using a drone can have serious safety, security and economic consequences. Potential use by hostile state actors. Maximising benefits of drone technology The initiative will also look to build strong relationships with industry to ensure high security standards Over the next three years, the strategy will seek to reduce the risks posed by the highest-harm use of drones while maximising the benefits of drone technology. It will develop a comprehensive understanding of evolving risks and take a “full spectrum” approach to deter, detect and disrupt the misuse of drones. The initiative will also look to build strong relationships with industry to ensure high security standards. Further, promoting access to counter-drone capabilities and effective legislation, training and guidance will empower the police and other operational responders. Tactical response to drone-based threats Because technology is rapidly evolving, the response needs to keep pace, according to the strategy document. Lewis adds, “We will therefore work to understand how drone-based threats might evolve in the future, both at the tactical and strategic levels.” The strategy will be to build an end-to-end approach to tackling the highest-harm criminal use of drones. It will also work to make it easier to identify malicious drone use against a backdrop of increased legitimate use. Legal drone operators will be required to register with the Civil Aviation Authority (CAA) and to pass an online competency test before flying a drone. Retailers who follow a specific set of safety guidelines when selling drones will be designated ‘DroneSafe’. Unmanned traffic management system The government is working toward future implementation of an unmanned traffic management (UTM) system, which provides a means of preventing collisions between unmanned aircraft and other manned or unmanned aircraft. The current strategy includes early planning for the system. An Industry Action Group will ensure a continuing relationship with the drone industry and help to improve existing counter-drone measures and identify new opportunities, such as use of ‘Geo-Fencing’ to restrict drones from flying in certain areas. Regulating commercial and domestic drones The UK Department of Transport is responsible for safe and lawful use of drones within the UK airspace The strategy will seek to communicate the UK’s security requirements to the counter-drone industry and to encourage a thriving sector that is aware of, and responsive to, the needs of government. Regulating drones is the responsibility of two UK government departments. The UK Department of Transport is responsible for safe and lawful use of drones within the UK airspace, while the Home Office has overall responsibility for domestic counter-drone activity. Fast-evolving drone and counter-drone technology Also, the Center for the Protection of National Infrastructure (CPNI) has been involved in reducing the vulnerability of sensitive sites, including airports. New performance measures will track the strategy’s success. Due to the fast-evolving nature of drone and counter-drone technology, the intent is to review and, if necessary, refresh the strategy in three years.
A week of mass shootings this summer has again spotlighted the horror of gun violence in public spaces. A 19-year-old gunman opened fire at the Gilroy Garlic Festival in California on July 28, injuring 13 and killing four (including the gunman). In El Paso, Texas, less than a week later, a lone gunman killed 22 people and injured 24 others. In Dayton, Ohio, a day later, a gunman shot 26 people during a 30-second attack, killing 9 and injuring 17. Rising active shooting incidents Beyond the grim statistics are three distinct incidents, linked only by the compressed timeline of their occurrence. Still, there is a tendency to want to find a pattern: Why do these incidents happen? How can we prevent them? In total, 91 people were killed and 107 more were injured in locations such as workplaces, schools, and public areas One attempt to analyse trends and commonalities among mass shooting incidents is a research report published by the U.S. Secret Service National Threat Assessment Center (NTAC) titled “Mass Attacks in Public Spaces – 2018”. Looking at the totality of major mass attacks last year, the report seeks to find patterns that can shed light on the attacks and suggest strategies to prevent and mitigate future incidents. Mass shootouts Between January and December 2018, 27 incidents of mass attacks – in which three or more persons were harmed – were carried out in public spaces within the United States. In total, 91 people were killed and 107 more were injured in locations such as workplaces, schools, and other public areas. The National Threat Assessment Center report considered all the mass attack incidents in 2018 and analysed some trends and statistics: Over half (59%) took place between the hours of 7 a.m. and 3 p.m., and 63% of the attacks ended within 5 minutes of when they were initiated. Most of the attackers were male (93%); the youngest was a 15-year-old student and the oldest was 64. Nearly a fourth of the attackers (22%) had substance abuse problems, and half (48%) had a criminal history, whether violent or non-violent. About two-thirds (67%) experienced mental health symptoms, commonly depressant and psychotic symptoms such as paranoia, hallucinations or delusions. Almost half (44%) had been diagnosed with a mental illness prior to the attack. The main motives were domestic, personal or workplace grievances (52%); followed by mental health/psychosis (19%); 22% had unknown motives. Most (85%) of attackers had at least one significant stressor in their lives in the last five years; 75% had experienced stressors that occurred in the previous year before the attack. Personal stressors included the death of a loved one, a broken engagement of physical abuse. Work- or school-related stressors included losing a job, being denied a promotion, or being forced to withdraw from classes. More than half of attackers (56%) experienced stressors related to financial instability. Personal issues such as homelessness or losing a competition were also stressors. Nearly all the attackers (93%) engaged in prior threatening or concerning communications. Most of the attackers (78%) also exhibited behaviors that caused concerned in others. For the majority of the attackers (70%), that concern was so severe that others feared specifically for the safety of the individual, themselves, or others. The Secret Service report also analysed the overall impact of several factors: Mental health and mental wellness - Mental illness, alone, is not a risk factor for violence, and most violence is committed by individuals who are not mentally ill. Two-thirds of the attackers in this study, however, had previously displayed symptoms indicative of mental health issues, including depression, paranoia, and delusions. Other attackers displayed behaviors that do not indicate the presence of a mental illness but do show that the person was experiencing some sort of distress or an emotional struggle. The importance of reporting - Since three-quarters of the attackers had concerned the people around them, with most of them specifically eliciting concerns for safety, the public should be encouraged to share concerns they may have regarding coworkers, classmates, family members, or neighbors. Need for a multidisciplinary threat assessment approach - There is a need to standardise the process for identifying, assessing, and managing individuals who may pose a risk of violence. Law enforcement and others are taking steps to ensure that those individuals who have elicited concern do not “fall through the cracks.” Law enforcement personnel should continue developing close partnerships with the mental health community, local schools and school districts, houses of worship, social services, and other private and public community organisations. Threat assessment Threat assessment refers to a proactive approach to violence prevention, an investigative modelMany of the resources to support the threat assessment process are already in place at the community level, but require leadership, collaboration, and information sharing to facilitate their effectiveness at preventing violence, according to the report. ‘Threat assessment' refers to a proactive approach to violence prevention, an investigative model originally developed by the U.S. Secret Service to prevent assassinations. It has since been adapted to prevent all forms of targeted violence, regardless of motivation, including K-12 school shootings and acts of workplace violence. When implemented effectively, a threat assessment generally involves three key components: Identify, Assess and Manage. Identify, assess and manage Public safety entities rely on people who observe concerns to identify the individual to law enforcement or to someone else with a public safety responsibility. In educational settings or workplaces, concerns may be reported to a multidisciplinary threat assessment team that works in conjunction with law enforcement when needed. The responsible public safety entity is then tasked to assess the situation to determine how they can manage any risk of violence posed by the individual.
The mindset behind a new law to prohibit the use of facial recognition and other security-related technologies by San Francisco police and other city agencies is obvious in the name of the new ordinance: “Stop Secret Surveillance.” Ordinance to stop secret surveillance The San Francisco Board of Supervisors passed the ordinance 8-1 with two abstentions on May 14, and there will be another vote next week before it becomes law. We have an outsize responsibility to regulate the excesses of technology precisely because they are headquartered here" The irony of such a law emanating from northern California, where tech giants promote the use of numerous technologies that arguably infringe on privacy, is not lost on Aaron Peskin, the city supervisor who sponsored the bill. “We have an outsize responsibility to regulate the excesses of technology precisely because they are headquartered here,” he told the New York Times. Regulating facial recognition technology Although the facial recognition aspects of the ordinance have been the most publicised, it also targets a long list of other products and systems. According to the ordinance, "Surveillance Technology" means “any software, electronic device, system utilising an electronic device, or similar device used, designed, or primarily intended to collect, retain, process, or share audio, electronic, visual, location, thermal, biometric, olfactory or similar information specifically associated with, or capable of being associated with, any individual or group.” Broadly interpreted, that’s a lot of devices. Includes biometrics, RFID scanners The ordinance lists some examples such as automatic license plate readers, gunshot detection hardware and services, video and audio monitoring and/or recording equipment, mobile DNA capture technology, radio-frequency ID (RFID) scanners, and biometric software or technology including facial, voice, iris, and gait-recognition software and databases. Among the exceptions listed in the ordinance are physical access control systems, employee identification management systems, and other physical control systems; and police interview rooms, holding cells, and internal security audio/video recording systems. The ordinance ban applies to city departments and agencies, not to the general public and exceptions include physical access control systems, employee identification management systems, and internal security audio/video recording systems Airport security not part of ordinance The ban only applies to city departments and agencies, not to private businesses or the general public. Therefore, San Franciscans can continue to use facial recognition technology every day when they unlock their smart phones. And technologies such as facial recognition currently used at the San Francisco airport and ports are not impacted because they are under federal jurisdiction. Furthermore, the San Francisco police department does not currently use facial recognition anyway, although it has been deployed in places such as Las Vegas, Orlando, Boston and New York City. Safeguarding privacy of citizens The ordinance appears to have a goal of avoiding government uses of technologies that can invade individual privacy, seeking to avoid worst-case scenarios such as an existing system in China that uses millions of surveillance cameras to keep close tabs on the Uyghurs, a Muslim minority population. Any new plans to use surveillance technology must be approved by the city government, and any existing uses must be reported and justified by submitting a Surveillance Technology Policy ordinance for approval by the Board of Supervisors within 180 days. Surveillance technology policy Banning use of facial recognition just when its capability is being realised is counterproductive But might such a ban on technology uses undermine their potential value as crime-fighting tools just when they are poised to become more valuable than ever? Ed Davis, a former Boston police commissioner, told the New York Times it is “premature to be banning things.” He notes: “This technology is still developing, and as it improves, this could be the answer to a lot of problems we have about securing our communities.” Technology development doesn’t happen in a vacuum and banning uses of facial recognition and other technologies just when their capabilities are being realised is counterproductive. We should be thoughtful, deliberate and transparent in how we embrace new technologies. However, discarding them out-of-hand using emotionally charged words such as “secret surveillance” does not promote the best use of technology to the benefit of everyone.
ZeroEyes, the only AI-based platform focused solely on weapons detection, has been selected by the Kenosha Unified School District (KUSD) of Wisconsin to help improve security on its campuses. ZeroEyes proprietary solution ZeroEyes’ proprietary solution will identify visible guns if present and send alerts to school administrators and security personnel within three to five seconds, helping to stop violent threats before they occur. KUSD is the third-largest school district in Wisconsin, with over 21,000 students and 4,200 employees in 23 elementary schools, five middle schools, five high schools and five charter schools. Integration with IP security cameras ZeroEyes currently integrates with KUSD’s IP security cameras to help detect visible weapons and serve as a proactive measure to prevent any violent threats on campus. When ZeroEyes positively detects a weapon, the platform sends a notification to school administrators, school resource officers and local 911 dispatch, ensuring the school can enact security protocols and give first responders real-time information to help prevent active shooting tragedies and save lives. Enhancing staff and students’ security “It’s a grim reality that active shootings happen in schools across the country, and we’ve needed to understand and implement the solutions that can keep our students, staff and visitors safe,” said Kevin Christoun, Maintenance, Environmental and Safety Manager at KUSD. Kevin adds, “At KUSD, we have a multi-layered security approach that includes the most effective and innovative technologies and resources, and ZeroEyes’ platform clearly supports our strategy.” Weapons detection solution ZeroEyes proprietary and comprehensive datasets focus exclusively on weapons detection Founded by a group of former Navy SEALs and military veterans, ZeroEyes proprietary and comprehensive datasets focus exclusively on weapons detection, to actively monitor and detect for visible weapons. ZeroEyes also trains and collaborates with customers and local first responders to conduct extensive pilots before its solution is fully implemented. In the future, KUSD plans to roll out additional installations to remaining schools in the district. Effectively countering active shooting incidents “ZeroEyes was founded upon the realisation that a proactive solution was needed to help keep people safe, with real-time information to adequately address violent threats and prevent mass shooting tragedies,” said Dustin Brooks, Vice President of Education at ZeroEyes. Dustin adds, “KUSD focuses on providing a safe and productive learning environment to its students and faculty, and we’re honoured to provide a 24/7 solution that supports their goals.”
As a multi-faceted community with several buildings, public safety services, healthcare facilities, schools, childcare, barracks, a commissary and a visitor’s centre, a typical U.S. Military base is a city in itself. Beyond the protection of armed forces personnel, the base is responsible for the safety of many civilians and civil servants. With such high standards and complex needs, U.S Military bases recognise the need for intelligent security systems that enable proactive monitoring, provide fast and smart forensics and comply with NDAA Section 889. Challenges faced by the US Military Base Inadequate situational awareness - The size and diversity of the military base pose a challenge. Past security measures led to gaps in coverage, leaving the base vulnerable to both internal and external threats. In addition, the COVID-19 pandemic created the need for increased situational awareness. Without a real-time and dynamic understanding of the environment, it became increasingly difficult to enforce preventative measures to control and mitigate the risk of transmission. Slow incident response time - Speed is critical. Within the confines of the military base, the consequences of slow incident response time can be devastating and even sometimes deadly. The longer it takes for the Security Operation Centre (SOC) to gather, understand, and analyse the details of the incident, the greater the threat becomes. It became clear that responding to an Active Shooter, vehicle breach, or an assault, required immediate action that wasn’t available through their existing technology. Limited real-time analytic capabilities - The base wanted to prevent incidents from occurring rather than reacting after an incident has occurred. The traditional method of receiving an emergency call and responding after the fact was too costly. The US Base needed a platform that would provide the security team with automation notifications and alerts based on anomalies and rule-violations that were captured on video. NDAA-889 compliance - All military bases must meet the NDAA-889 compliance which states that the U.S. Government has banned specific telecommunications and video surveillance equipment utilising chips manufactured in China. Government contractors must help agencies remove/ replace banned equipment by Aug 12, 2021. Why Ava? One U.S. Military Base recently turned to Ava for an end-to-end intelligent security solution that would meet its full range of needs. Their requirements were a platform that was: Proactive - When there is a need to respond to a threat, the response needed to be immediate. Precise - On a base of this size, it was critical to pinpoint the exact location and nature of a security event in seconds - not hours or days. Simple - The system needed be straightforward to implement, manage and use within the existing infrastructure and cameras. Ease of use saves time and lives. Scalable - The system needed to be able to scale to thousands of cameras. Protecting military personnel and staff at the base Using Ava, operators can add maps of all the US Military Bases’ locations to gain situational awareness and insights Ava understood that the ability to protect military personnel and civilians that run the US Military Base is of utmost importance with even seconds being critical. Ava’s wicked-fast and smart forensic searches and powerful analytics transform the manually intensive examination of massive surveillance footage into accurate and useful results within mere minutes. Security operators are using powerful appearance, event, or image search functions to narrow down and track people or objects of interest. Using Ava, security operators can add maps of all the US Military Bases’ locations to gain situational awareness and insights. Each map can be configured and includes camera views, alarm views, as well as the ability to track people and objects as they move around the campus. Only Ava could meet their challenges by providing: Advanced Situational Awareness: Powered by Ava’s Smart Presence, the company’s use of AI and machine learning allows security personnel and operators to detect anything unusual at any time. Ava Aware VMS understands perimeters and behaviours, identifies, classifies, and tracks people of interest, vehicles, or other objects to send alerts before threats escalate. Operators now receive immediate alerts on unidentified loud noises including the exact source of the sound through microphones. The US Military Base’s security teams are now able to stop threatening actions, before there is damage to property or people. Rapid Incident Response: Powered by Ava’s Spotlight, video streams change dynamically to bring only the relevant feeds to the attention of the operator. Real-time alerts and notifications show up on the video wall to describe the incident, the time, and place it occurred. Using Ava’s Smart Search, the base is able to search by event and similarity to perform appearance and image detection powered by machine learning capabilities to comb through countless hours of video within seconds. Real-time Analytics: Ava provided the US Military Base with threat detection and notifications in real-time and uses intelligent algorithms and self-learning to detect abnormal behaviour. The platform will alert the base’s security operators in real-time. It will intelligently highlight what’s relevant from all of the US Base’s cameras, in real-time, all the time. NDAA Compliant - Ava’s video hardware is TAA (Trade Agreement Act) Compliant, enabling any base to be fully NDAA 889 compliant. Ava’s solution provided operational efficiencies, such as: Seamless integration with existing cameras - Whether a military base is replacing all or some of their cameras, Ava Aware VMS easily integrates into and enhances existing cameras with the same AI capabilities. Now, existing ONVIF cameras are enhanced with analytics such as object detection, people and vehicle count, similarity based searching and more. By linking all existing cameras into a larger, AI-based video analytic platform, the base can leverage these powerful analytics across ‘all the cameras, all the time’. Access Control Integration - Ava’s solution easily integrates into access control, remote monitoring, and existing infrastructure. Monitoring the entire military base can be done as part of a single video management system. Scalable - The platform can easily be clustered to meet the growing needs of a base, from hundreds to thousands of cameras. Deployment simplicity - Ava’s system is designed for overall simplicity and readiness for deployment. With security cameras that were ready to go, fully loaded with out-of-the-box Ava Aware software, the base could easily replace cameras in a phased implementation, minimising installation time and eliminating downtime. Ava’s simplified licencing/pricing model further simplified deployment. Plug and play configuration Plug and play configuration removes the need for user names and passwords The same simplicity extends to maintaining scalable management within a base’s group configuration policies. Plug and play configuration removes the need for user names and passwords, pre-configuration steps, and default settings. And finally, the base chose the Ava system for its general ease of use. Security operators now have access to detailed camera information, activity logs, and advanced video adjustments in a single, user-friendly screen view. Set up for success with intelligent video security The US Military Base is now set up for success with an end-to-end intelligent video security system that will scale with their needs. Highlights include: Camera installation, which will put the base into full compliance with NDAA-889. The US Military Base now has the highest level of security, to protect against the vulnerabilities of the connected world. The equipment has end-to-end encryption, factory-installed certificates, and records detailed audit trails of both operators and administrators to assist with any other compliance requirements. Security operators have gone from having ‘data overload’ to easily and quickly accessing ‘actionable insights’ to drive more confident and proactive security decisions. By leveraging powerful analytics, the base’s operators are able to respond in real-time and investigate incidents faster and with fewer resources. Operators are able to act on the system’s identification of objects, events, anomalies, and similarities that detect issues as they unfold. Furthermore, operators also have full occupancy insight to manage the flow of people and traffic across the base, in support of COVID-19 rules and regulations. Ava Smart Presence includes a people and vehicle counter to track objects in real-time, allowing for historical analysis and reporting. Configurable maps of all locations provide instant situational awareness and insights. The US Military Base seamlessly integrated the new system with existing access controls and non-banned cameras to cost-effectively meet the mandate and fully leverage analytics across the entire security system. Security teams at the base can trust in a powerful security solution that doesn’t inadvertently contain technology that poses a new threat. Whether enhancing existing cameras with advanced video analytics, replacing the entire video security system to meet the NDAA mandate, or creating a solution from scratch, the U.S. Military and supporting agencies can benefit from Ava’s secure cameras and leverage Ava’s powerful analytics for the highest levels of proactive security.
Genetec Inc., a globally renowned technology provider of unified security, public safety, operations, and business intelligence solutions, has announced that City Council District E in New Orleans has taken an innovative approach to address illegal dumping using Security Centre, the unified security platform from Genetec. Countering illegal dumping menace Illegal dumping is a problem in most cities around the world, but enforcing laws to prevent it can be quite difficult and resource-intensive. To catch culprits in the act, law enforcement and other city staff have to physically watch known sites and wait to spot illegal dumping activity. Most city officials know that's an impossible task, as officers can't be everywhere all the time, and offenders take full advantage of that reality. New Orleans’ RTCC and Sanitation Department has begun installing a network of cameras at known dumping sites In response, New Orleans City Council District E Councilwoman, Cyndi Nguyen, has taken a hands-on approach tackling illegal dumping head-on as a part of a larger push toward revitalising the community she serves. Nguyen’s team, working in partnership with New Orleans’ Real Time Crime Centre (RTCC) and Sanitation Department has begun installing a network of cameras at known dumping sites. All cameras are portable so they can be moved to new dumping hotspots as needed. Genetec security technology platform deployed “This security technology from Genetec certainly helps re-enforce the message I’m putting out there, that we can and will enforce illegal dumping offenses in District E. We also have this great partnership with the Sanitation Department, our local Police Department, and the RTCC, and that’s extending out into our community as well,” said New Orleans City Councilwoman, Cyndi Nguyen. She adds, “I am working hard to get more residents and businesses involved in supporting these initiatives, because keeping our city safe and clean is a shared responsibility.” Real Time Crime Centre (RTCC) The Real Time Crime Centre (RTCC) already uses Security Centre to manage its citywide public safety improvement initiatives. To help monitor illegal dumping activities, the Crime Centre’s IT department also set up an event-to-action rule in the Security Centre platform to processes motion detection in a defined zone of the camera’s field of view. As soon as motion is detected, the security system bookmarks it and notifies IT staff As soon as motion is detected, the security system bookmarks it and notifies IT staff so that they can evaluate the situation and determine if collection of the debris is warranted. The system also takes a snapshot of the video and emails it to designated personnel on the team, so as to enable them to identify and investigate any potential dumping perpetrators, and take appropriate action. Crime detection with video evidence In an example of a recent case, this event-to-action led to the arrest of a repeat offender who had previously been convicted and sentenced for dumping 14,000 tires. All snapshots and video evidence were securely shared with the New Orleans Police Department so as to enable them to quickly identify the perpetrator, apprehend him and complete their investigation. “Without this technology, finding these offenders comes down to chance or it could take a police officer hours and hours of investigative work. Instead, it took us minutes to set up the event-to-action in Security Centre, and just about two days from the time we were notified about this offender to the time we were able to apprehend him,” said Bill Wood, IT Supervisor at New Orleans’ Real Time Crime Centre (RTCC). Bill adds, “We love working with the Genetec Security Centre security platform. It’s very user friendly and helps us cut down that investigation time exponentially.”
Bird Aerosystems, the developer of Airborne Missile Protection Systems (AMPS) and Airborne Surveillance, Information, and Observation (ASIO) solutions, has won a new contract in Central Europe. Under the contract, Bird Aerosystems will upgrade and improve the AMPS systems which were previously provided to the Czech Air Force. Bird’s AMPS are installed on the Czech Air Force Mi-17 helicopters and successfully and operationally deployed in different dangerous and complicated conflict zones, including Afghanistan. The overall program includes an upgrade to the MILDS UV detection sensors and the MCDU Mission computers provided by Bird Aerosystems as well as provision for future installation of Bird’s MACS (Missile Approach Confirmation Sensor). Air Force protection “We see this as a sign of proof for the operational value that Bird’s AMPS bring to the customer and are honoured that the Czech Air Force chose to conduct an upgrade to the systems it is using for several years, in order to align with the latest developments and ensure optimal protection for its soldiers and personnel. Bird’s AMPS were deployed in various missions, including missions in Afghanistan – where the Czech Air Force was operating as part of the NATO forces,” said Ronen Factor, Co-Chief Executive Officer and Founder at Bird Aerosystems. He added: “We believe that this overall improvement will allow the Czech Air force to keep focusing on important operational missions while knowing that their force is protected.” Protection for military and civilian aircraft Bird Aerosystems’ Airborne Missile Protection System (AMPS) provides enhanced protection for military and civilian aircraft against all known Surface to Air Missiles (SAM), including MANPADS, Laser Beam Rider threats, and radar-guided missiles. AMPS automatically detect, verify, and foil SAM attacks through the effective use of countermeasure decoys (Flares and Chaff) or DIRCM that jam the missile’s IR seeker and protects the aircraft. AMPS is provided as a turn-key solution that includes installation design, installation, integration, certification, and support, and is certified by aircraft manufacturers.
Generally, the Less Than Load (LTL) industry is always looking to increase the amount of product shipped per truck. A lesser amount of product on a truck equates to a lower amount of billable product per trip. Raw Load Average (RLA) Raw Load Average (RLA) is the percentage of product on a truck – 100% is a completely full trailer. As the name implies, LTL averages less than 100%. In the fast- paced world of logistics, delivering millions of packages per day, than how do companies maximise the RLA? Most shipping managers are responsible for inspecting each trailer, before it leaves for several additional items. They make sure that the packages are secure and then evaluate whether the truck can handle any more inventory. There might be 200+ dock doors in a 400,000 sq. ft. facility and dozens of trucks waiting to leave and get on with their trips. At peak times, inspections will require several individuals running all over the facility. Less Than Load (LTL) Industry experts estimate that only about 80% of trucks are actually inspected Industry experts estimate that only about 80% of trucks are actually inspected. The missed trucks are now at risk for unsecured packages arriving damaged. More importantly, they are leaving 74% full. If the truck had waited another 30 minutes for inspection, they could have added another one skid of products to increase the load to 75%. That 1% difference does not sound like much. However, considering the volume of shipments that the top 10 LTL companies deliver, the 1% will amount to somewhere between US$ 6 million and US$ 12 million per year, which goes directly to the bottom line. Role of video security systems So, what is the role of security video systems here? Well most people say that security video does not have a real Return on Investment (ROI) in its traditional role. It’s hard to disagree. One exception might be when security companies have used video systems to reduce the number of guards. Using video, one guard can see as much as 3 or 4 guards could see in the past, without ever having to leave their post. This certainly reduces cost, but at the end of the day, guarding is still an overall cost to the bottom line. This case study will highlight how a couple of Salient’s very resourceful customers have transformed video into cash generating systems. Operational efficiency with video In the guarding scenario, video can put one person in several places at once. This operational efficiency can also be applied to how many people are needed to inspect trailers. But the ROI doesn’t come from removing a couple of salaries from the payroll. The real money comes into play because now inspecting 100% of the trailers leaving the dock are possible versus 80% and get that RLA up by 2 or 3%. Then, it’s about the big bucks. And that’s just the tip of the iceberg, when looking at the overall operational efficiencies available by utilising video. Using video for misclassified products or shipment validation In logistics, there is a huge revenue miss every year when it comes to products being ‘accidentally’ misclassified In logistics, there is a huge revenue miss every year when it comes to products being ‘accidentally’ misclassified when shipped. All products being shipped have a classification, and each classification has a specific associated cost. These per-pound costs fluctuate based on the value of the product, required insurance, risk and other factors. An example would be a sporting goods manufacturer shipping ammunition and firearms, under the code for clothing. In this example, a 200-pound load would be billed at about US$ 100, when it should be billed at closer to US$ 300. Multiply this by hundreds of packages a day and the total of the missed revenue is astronomical. So how would a video surveillance system correct this problem? Certainly, security cameras cannot see though a box, but one would expect a box with 200 pounds of clothes to be a fairly large box. But if the box were full of firearms or ammunition, the video would reveal a much smaller box. This anomaly when noticed would prompt an operator to investigate the contents of the box and contact the manufacturer to rectify the billed amount. This process might seem a bit hypothetical, but already a current customer of Salient Systems is capturing over US$ 40 million a year with the right system components. Using video to reduce OSHA violations and false claims The logistics industry requires a tremendous amount of labour in order to operate. The more labour hours, the greater the propensity for on-the-job injuries, OSHA violations, insurance payouts, lawsuits and business interruption. False claims are also a consideration. Let’s look at some real-world examples of using video to reduce or eliminate these issues: OSHA reports that 5,250 workers died on the job in 2018 (3.5 per 100,000 full-time equivalent workers), on average, more than 100 a week or more than 14 deaths every day. The loss of an employee is one of the most emotionally devastating situations a business can encounter. There are several benefits of video that can increase safety. One result of a fatality is typically an OSHA investigation. An action item that could result from this investigation would be to increase security guards. This is a perpetual cost that could continue for several months to years. Video systems enhance guards’ efficiency Video systems have been shown to improve the efficiency of guards, allowing them to have eyes on multiple areas Video systems have been shown to improve the efficiency of guards, allowing them to have eyes on multiple areas at the same time. The systems can be coupled with the use of video analytics to alert guards to specific situations such as motion in areas that should be unoccupied or traffic proceeding in an unauthorised direction. In these ways, video systems can reduce the quantity of physical guards, thereby reducing the cost. One of Salient’s customers is saving almost US$ 20,000 per month with the reduction of two guards and it has OSHA’s approval. The end result is that the safety of the employees has been increased and operational cost is lowered by implementing technology. Inadvertently, this same type deployment at another facility helped mitigate a US$ 900,000 slip-and-fall lawsuit, which could have also been a possible cause for an OSHA investigation. Validation of safety policy Validation of safety policy can also be a drain on resources. Auditing seatbelt use for forklift drivers, pedestrians using appropriate marked walking paths, and proper social distancing in work spaces are a few examples among many. Assigning an individual to monitor this activity is costly and people typically obey the rules only when that individual is present. However, video can capture this information all the time without huge labour cost. This information can then be audited and used for education processes. OSHA statistics indicate that there are roughly 85 forklift fatalities and 34,900 serious injuries each year, with 42 percent of the forklift fatalities from the operator's being crushed by a tipping vehicle. The safest place for the driver to be is strapped. A facility that used video to audit seatbelt usage showed a 65% compliance rate. After the information was presented to the manager and employees, the next audit resulted in a jump to 87% compliance rate. In the event of an injury, this type of verifiable data can go a long way to prove that the employer is serious about employee safety and investing in ways to improve the safety culture within the company. Using video to increase sales LTL is a very competitive business and it is viewed primarily as a commodity type operation LTL is a very competitive business and it is viewed primarily as a commodity type operation. A few pennies per pound can typically sway a decision-maker. Already some great operational efficiencies and benefits from video to lower cost and to making LTL more competitive has been discussed. But these ideas still don’t move LTL out of the ‘dog-eat-dog race to the bottom on price’ world. Now, let’s look at how to use the implementation of these same video systems to provide value propositions and competitive advantages for customers. Many LTL customers have sensitive merchandise for which the safety and security of its delivery might outweigh cost differences. An example is freight regulated by government agencies, such as Drug Enforcement Agency (DEA), Alcohol, Tobacco and Firearms Agency (ATF), and Dept. of Energy (DOE). For example, the DEA reported ‘The overall trend of incidents of Controlled Prescription Drugs lost in transit increased in 2018 with the highest number since 2010.’ Extra layer of security And the ATF’s Interstate Theft Program states that ‘Under the program, hundreds of reports of thefts and losses from interstate shipments are received each year’. With statistics like these, customers in these categories have a heightened sense of vulnerability. Offering systems such as surveillance video can add that extra layer of security and added confidence. This is a marketable differentiator to help LTL companies set themselves apart from the traditional companies that only offer a lower cost. This, bundled with some of the other cost-saving measures outlined above, could be the icing on the cake needed for security departments to convince C-Level executives in their organisation to invest in video.
For most people, prison ranks high on the list of places to avoid. Yet, take no pride: U.S. prisons are filled to capacity with individuals who have committed some type of crime that warrants incarceration. Prison Policy Initiative In 2018, according to data from the Prison Policy Initiative, there were 1.3 million U.S. adults in prison and 615,000 incarcerated in jails for crimes ranging from murder, manslaughter, illegal drug possession, burglary, theft, driving under the influence, property crimes, and more. In addition to traditional security concerns such as perimeter surveillance, ID card management, visitor and vendor management, crime, and theft, prisons and correctional facilities have unique security challenges that other enterprises typically do not have. Prison security Correctional facilities face regular security audits that are conducted by the National Institute of Corrections The challenges include inmate escapes, hostage situations, gangs, contraband, riots, and overcrowding, in addition to increasing privacy and regulatory mandates. Even more, correctional facilities face regular security audits that are conducted by the National Institute of Corrections. Security teams must always be on guard and watching every individual and action of the inmate population – for an inmate’s physical safety – in addition to their own. It is not uncommon for security staff and correctional officers to receive physical injuries from prisoners, especially when trying to break up an inmate fight or transporting them to other locations. Use of drones in prison smuggling An emerging concern for prison officials is the use of drones by individuals who are looking to smuggle drugs, cellphones, weapons, and other contraband into prisons for use by inmates. Many states are working on anti-drone legislation around correctional institutions. For example, Missouri is one of the most recent US States to have introduced legislation to tackle the problem. Missouri HB 324 would make it illegal for drone pilots to fly an unmanned aircraft near any correctional centre, private jail, county jail, municipal jail or mental health hospital. Anyone caught violating the law would be charged with a Class A misdemeanor and possibly other felony charges, depending on the pilot’s illegal intentions. Importance of video surveillance Video surveillance is a necessary security technology for prison and correctional facility staff, as it allows personnel to mitigate those unique security challenges. “Video surveillance is prevalent throughout facilities; even if it’s a typical two-bed jail cell or a 2,000 bed prison,” says Brad Wareham, Director of Key Accounts at Salient Systems. He adds, “In cases where facilities face a shortage of staff members to watch over the inmate population, video surveillance supports the oversight of inmates and increases accountability. Inmates know that despite the lack of staff and officer presence, they are being observed by cameras that can catch even the smallest details. Video surveillance can follow inmates anywhere. There are very few blind spots.” Upgrading to hybrid video surveillance systems They are upgrading to hybrid and/or fully digital solutions, all while maintaining the HMI model Increasingly, prisons and correctional facilities are upgrading their older analog video systems, due to age degradation and lack of adequate support resources. “They are upgrading to hybrid and/or fully digital solutions, all while maintaining the Human Machine Interfaces (HMI) model,” Wareham notes. “They continue to face security challenges typical of the corrections space, such as PLC controllers, RTSP capture, intercoms, lock controls, and more, which are atypical of larger facilities. In addition, many older analog solutions will eventually be cost prohibitive,” Wareham said, adding “and will no longer operate, due to an increasing inability to find replacement parts and to the proliferation of IP-based video surveillance solutions.” IP-based video surveillance systems For many correctional facilities, upgrading a video surveillance system to an IP-based solution, in addition to a video management system (VMS), makes sense and benefits a prison or correctional facility in multiple ways. Solutions exist that allow prison facilities to keep pre-existing hardware in place during an upgrade, while allowing for replacements and component upgrades as funding permits. Specific benefits that advanced video surveillance and VMS solutions can provide a correctional institution include: Increased Coverage – Many prisons and correctional facilities are large, and have multiple areas that need to be under surveillance, such as hallways, throughout cellblocks, healthcare facilities, dining areas, exercise yards, and more. Outdated systems may have a difficult time monitoring all areas, while an IP video system can provide continuous coverage of an entire facility Clarity of Video – Older analogue cameras struggle with the ability to provide clear images. New IP cameras, coupled with an advanced VMS, will produce crisp and clear images that are necessary to mitigate security risks. Inmate Tracking – One of the biggest benefit of a VMS solutions is video analytic software, which is capable of tracking a moving target and searching for specific objects. Video analytics can count human beings, monitor queues, and even identify a geographical location. VMS solutions allow security to search video archives quickly and find archived video that matches custom criteria within minutes, which is helpful in investigations. Alerts – Video analytics within a VMS solution can be programmed to detect specific activity and activate an alarm or alert system when the activity occurs. Facial Recognition – The ability to recognise a face is another key benefit of a VMS solution used in a crowded correctional institution, in particular when inmates may be wearing the same type and colour of clothing. Perimeters – Video surveillance placement on the exterior perimeter of a facility can document suspicious activity occurring in outside recreational yards where contraband can enter. Many VMS solutions allow for detecting movement throughout specific areas for an established duration of time. Mobility – The ability for correctional officers to view video on a mobile device is critical, given the large landscape of facilities. For example, Salient’s TouchView Mobile solution, combined with its CompleteView 20/20 VMS, allows users to instantly access, monitor and review live and recorded video from any camera connected to any CompleteView 20/20 recording server. Cameras from multiple servers can be accessed simultaneously with PTZ control. The solution’s DRS (dynamic resolution scaling) automatically sizes the video for live viewing, which significantly reduces network usage and provides higher frame rates over mobile connections. Securing prisons and correctional facilities You can’t have a correctional facility without video surveillance and an audit trail for forensic evidence" Overall, Wareham notes, video surveillance and VMS solutions are a necessary and critical solution for securing prisons and correctional facilities. “You can’t have a correctional facility without video surveillance and an audit trail for forensic evidence,” Wareham stated, adding “Facilities with challenging budget constraints are still required to have a functional Video Management System, regardless of the technology or age of their infrastructure.” Salient VMS solution For security integrators, Salient’s VMS solutions provide a steady ROI. “Salient plays a critical role in providing a viable cost per channel ROI that is superior in the VMS industry,” Wareham said. He adds, “As the requirements for third-party encoding hardware is negated, and coupled with our customer support for virtually all aspects of the detention and corrections space, Salient’s VMS solution addresses budget constraints”. For prisons and correctional facilities, an advanced video surveillance and VMS is not just a product, it is a necessity that enables correctional facilities to stay safe and secure. “In the corrections industry, surveillance goes hand in hand with the employee, inmate, and visitor safety, while coupled with procedural compliance and enforcement,” Wareham concluded.