The Security Industry Association (SIA) has named Sen. Amy Klobuchar (D-Minn.), Sen. Deb Fischer (R-Neb.) and Rep. Donald Payne, Jr. (D-N.J.) as the 2019 recipients of the SIA Legislator of the Year Award. The awardees will be honoured at the upcoming SIA GovSummit, taking place June 26-27 in Washington, D.C. The SIA Legislator of the Year Award is presented annually to members of Congress and other elected officials who have demonstrated extraordinary leadership in advancing legislation and policies that encourage the effective use of technology solutions to enhance public safety and security and protect critical infrastructure. Recognition for promoting workforce development Sen. Fischer recently recognised SIA, along with SIA member companies Intel and VMware, as supporters of the DIGIT ActWith this award, Sen. Klobuchar will be recognised for her leadership on workforce development and life safety issues important to the security industry and its mission. In 2019, Klobuchar authored S.379, a bill that would allow workers to use “529” education savings accounts for training and credentialing programs, and S. 481 – the Nicholas and Zachary Burt Memorial Carbon Monoxide Poisoning Prevention Act – which would provide grant assistance for the purchase and installation of carbon monoxide detectors in dwelling units of low-income families and elderly persons, child care facilities, public schools and student housing owned by public universities. Sen. Fischer authored bipartisan legislation that would convene a working group of federal entities and private-sector stakeholders tasked with providing recommendations to Congress on how to facilitate the growth of connected Internet of Things (IoT) technologies. S. 1611, also known as the Developing and Growing the Internet of Things (DIGIT) Act, calls for the United States to craft a national strategy to position the United States as the global leader in IoT technologies. Sen. Fischer recently recognised SIA, along with SIA member companies Intel and VMware, as supporters of the DIGIT Act. Installing vehicular barriers to mitigate attacks Rep. Payne, who serves as chairman of the House Homeland Security Subcommittee on Emergency Preparedness, Response and Recovery, recently introduced H.R. 2160 – the Shielding Public Spaces From Vehicular Terrorism Act – which would help communities leverage homeland security grants to install vehicular barriers and implement other protective measures and direct research and development efforts on the emerging threats from vehicular attacks. Rep. Payne recently introduced H.R. 2160 – the Shielding Public Spaces From Vehicular Terrorism Act Payne also crafted H.R. 6920, the School Security Is Homeland Security Grant Act, which clarified allowable uses, requires a percentage of homeland security grants to be used for enhanced school security measures and increases overall authorisation for the grants. Enhancing perimeter and school security “SIA’s policy priorities include notable measures that help increase safety and security across many sectors, including the critical areas of perimeter security and school security, while helping the industry to stay ahead of megatrends such as the proliferation of IoT and the recruitment and retention of qualified workers,” said SIA CEO Don Erickson. “SIA applauds Sen. Klobuchar’s work to promote the 21st-century technology workforce essential to our industry, Sen. Fischer’s leadership in recognising the security industry’s role in fostering IoT growth, and Rep. Payne’s contributions to mitigating the threat of vehicular attacks and protecting students, staff, faculty and visitors in our nation’s schools.” Session on physical access control systems SIA GovSummit – the annual government security conference hosted by SIA – brings together government security leaders and private industry technologists for top-quality information sharing and education on security topics affecting federal, state and even local agencies. Attendees will find specialised sessions on topics such as modernising federal physical access control systems Attendees will find specialised sessions on topics such as modernising federal physical access control systems, the U.S. Department of Defense’s unified facilities criteria for security systems, facial recognition technology use for public safety and homeland security missions and helping communities protect religious institutions, crowded spaces and other soft targets. SIA GovSummit is free for all government employees, including federal, state, county and municipal-level staff (both domestic and international), plus all military, law enforcement and public safety representatives. Sponsors of the event This event is made possible thanks to the following sponsors and partners: Premier Sponsors LenelS2, HID Global, Tyco Security Products and Allegion; Event Sponsors AMAG Technology, American Fuel & Petrochemical Manufacturers, Axis Communications, B&B Roadway Security Solutions, Calpipe Security Bollards, the U.S. Department of Homeland Security Science and Technology Directorate, dormakaba, Gallagher, Genetec, Gibraltar, GSA Schedules, Inc., Hanwha Techwin America, HySecurity, IDEMIA, Identiv, ISC Security Events, Louroe Electronics, Marshalls, Milestone Systems, the National Initiative for Cybersecurity Careers and Studies, NetApp, Panasonic, the Secure Worker Access Consortium and TCP Security Solutions.
With the rising number of active shooter events in the United States, Johnson Controls has released the new Detect360 Active Shooter Response (ASR) system. The system combines reliable gunshot detection with industry-leading notification technology to provide immediate warning when a gunshot is fired within a building. By providing early notification and precise location of the shooter, the ASR system gives occupants time to find safety and allows police and security personnel to mitigate the threat up to 60 percent faster. Detect360 ASR system “During active shooter incidents, witness communication with law enforcement is often confusing and erratic, leading to longer incident duration,” said Thomas Connell, senior manager, Life Safety, Johnson Controls. “With the ever-increasing threat of active shooter events, having a system that provides early and accurate gunshot detection combined with clear, precise communication is now a necessary part of a life safety strategy for any building.” Detect360 Active Shooter Response uses acoustic sensors with multiple microphones to detect the sound of gunfire Detect360 ASR gives first responders information as it develops at the scene, including shot location, number of shots, location of the shooter in near real-time and the ability to remotely monitor the situation through integrated security systems. It also collects forensic information that can later be used by law enforcement. The system supports multiple integration options, including video feeds from existing CCTV and intrusion systems, mass notification systems, access control systems and panic button/manual initiation systems. Acoustic sensors with multiple microphones Detect360 Active Shooter Response uses acoustic sensors with multiple microphones to detect the sound of gunfire. Advanced algorithms then analyse the acoustic signature to confirm the sound was produced by a gun. Using information from the sensor closest to the gunshot, the system displays the location of the shooter on a map-based graphical user interface (GUI), which can also display audio and video of the incident. Detect360 ASR provides building occupants with safety and evacuation instructions while automatically communicating with emergency services and mass notification systems, prompting a quick response by law enforcement. While no technology or planning can eliminate the possibility of active shooter events, Detect360 Active Shooter Response can help shorten the duration and lessen the impact of the event.
This year from the 16th – 17th of April, the Landmark Centre in Lagos, Nigeria hosted the ninth edition of Securex West Africa. Over two bustling days of business, more than 2,300 professionals from across the Security, Fire and Safety industry crossed the threshold to witness key technology advancements, market trends and do business. Among the dignitaries to open the exhibition and conference this year was ACP Gbolahan Odugbemi, Assistant Commissioner of Police for Lagos State representing the Commissioner of Police, Major General J.I Unuigbe, Representing the Chief of Army Staff for the Nigerian Army and John Bray, Consulate General for the US Government in Nigeria. Each esteemed keynote speaker addressed the vital importance of sharing information and cutting-edge technology within the Security, Fire and Safety industry to further progress opportunities in the region, especially in transformative times globally. They praised Securex West Africa 2019 as an excellent opportunity to achieve these goals and bring together the West African security industry. Solutions from various sectors on display With over 761sqm of technology, equipment and services on display from more than 100 leading brands, attendees at this year’s Securex West Africa were privy to cutting-edge solutions across varying subsectors within commercial, cyber, perimeter and homeland security in addition to fire and safety. A truly international exhibition, this year the show attracted industry professionals from 21 countries including Benin, Ghana, Nigeria, South Africa and the United Arab Emirates. An overall increase in visitor numbers of 56% since 2016 demonstrates that Securex West Africa is growing from strength to strength. Attendees at Securex West Africa were privy to solutions across varying subsectors within commercial, cyber, perimeter and homeland security George Pearson, Regional Director at Afrocet Montgomery, the organisers behind Securex West Africa had this to say on this year’s edition: “In reality, we’re all living in relatively uncertain times from a security perspective, whether we’re discussing political turbulence, cyber-attacks or terror threats, our exhibition growth year on year, both in visitor figures and show size is indicative of why shows like Securex are so important to progress our understanding of how to protect against and prevent security and safety breaches.” One of the best events in West Africa 28% of visitors in 2019 were dedicated to Commercial Security, whilst 33% to Information SecurityThis year, visitors came in their thousands to the exhibition from varying sectors, the top five of which were Systems Installers, Information Telecommunications, Engineering, Safety & Security Consultancies and Oil and Gas. 28% of visitors in 2019 were dedicated to Commercial Security, whilst 33% to Information Security, which reflects the rapid growth taking place in the cyber market. A further 14% were dedicated to Fire & Safety, 11% to Homeland Security and 13% to Perimeter Security. Mr Adewale Muriziq Salisu, a Security and Safety Consultant from Fourthman Security Services gave the following testimonial about this year’s event: "Securex West Africa is one of the best security conferences and exhibitions in West Africa if not the best. It involves all aspects of security, safety, cyber and fire protection which all organisations and individuals can use. Securex brings the best in security and safety exhibition and conference and if you miss it, you miss a lot." Alongside the exhibition each year, organisers put together a compelling selection of daily Conference sessions for both exhibitors and visitors alike to attend. Hosted by esteemed industry experts, these carefully put together sessions are designed to inspire and inform industry members. This year, 70% of visitors attended at least one of these sessions. 21st century security solutions On the first day, the most popular session was a Panel Discussion centred around ‘21st Century Security Strategies and Solutions’ and included representatives from SBM Intelligence, Suncast Security, Airtel Networks, Beacon Consulting and Academy Halogen in addition to the Former Police Chief in Nigeria and Special Adviser to the Lagos State Governor on overseas affairs and investments. The most popular session was a Panel Discussion centred around ‘21st Century Security Strategies and Solutions’ Meanwhile, Day 2 of the Securex Conference shifted its focus onto Fire and Safety technical sessions. Delegates at these sessions had the opportunity to hear from expert representatives from key fire and safety brands including Bristol Fire Engineering, Mobiak S.A., Surveillant Fire, Afrisec, Afritech Solutions and Hancock Security Nigeria. Topics discussed included the importance in choice of firefighting equipment, product showcases, tall building fire and safety management, safe cities and OEM demonstrations. The second day of Securex West Africa also gave way to the co-located cyber-focussed security conference: WACSS (West African Cyber Security Conference). An invitation-only event organised in conjunction with KPMG and sponsored by the Nigerian Communications Commission, this year WACSS welcomed 129 esteemed cybersecurity delegates. Now in its third edition, WACSS has grown to be recognised in the region as the leading high-level cyber-focussed security conference and attracts a great deal of senior industry stakeholders. Achieving business objectives In a post-show survey for Securex West Africa, 98% of visitors achieved all or most of their business objectives in attending the eventFor the second year running, Securex West Africa hosted the OSPAs (Outstanding Security Performance Awards 2019). This year, the event took on a new format in the shape of a Gala evening of dinner, drinks, award-giving and valuable networking amongst the finest performing business and professionals in the Nigerian Security industry. In a post-show survey for Securex West Africa, 98% of visitors achieved all or most of their business objectives in attending Securex West Africa. Furthermore 84% of those visitors had purchasing power within their business, contributing to a collective visitor spending budget for security, fire and safety solutions totalling more than US$ 150 million. These results, coupled with overall exceptional feedback from exhibitors, further emphasises the quantity and quality of business opportunities available to both local and international businesses in West Africa. Exhibitors say on the event Speaking to a couple of exhibitors who took part this year, here’s what they had to say on Securex West Africa 2019: "It's been really good; with the sales we’ve made we can justify the business case to be here next year! Looking at everything, I've made personal connections with my competitors and the brand awareness has been great for us." Bukky Bademosi, Business Development Manager, Pilgrims Africa Ltd. "For my region, it is the most important show. We want to present our manufacturers with a platform where they can come and see that Nigeria is a place where we can make money. We've had many good leads and we'll be here next year!" Edward Van Trotsenburg, Managing Director, AFRISEC.
UK security fencing manufacturer Jacksons Fencing has expanded its hostile vehicle mitigation (HVM) range by adding the Impakt Defender temporary HVM barrier by Rosehill Security, renowned global provider of engineered rubber perimeter security products and ballistic solutions. Jacksons Fencing now has exclusive rights within the UK for both direct sales of the innovative barrier, as well as hire markets. Impakt Defender HVM barrier Impakt Defender is IWA-14 rated, capable of stopping a 7.2 tonne N2A lorry travelling at 30 mph Combining a large footprint and unique shape, Impakt Defender is IWA-14 rated, capable of stopping a 7.2 tonne N2A lorry travelling at 30 mph. The barrier is also accredited by Secured by Design. It’s the first HVM product in the Jacksons range that requires no foundations, enabling it to be quickly installed across all types of sites. Individual units weigh in at 430 kg and are manufactured from 100% recycled rubber bonded with polyurethane for strength. Steel security fence panels Additionally, Jacksons Fencing’s steel security fence panels can be mounted above the barriers to provide increased perimeter security. An ideal physical and visual deterrent, the combination can be rapidly deployed for temporary or permanent security installations, helping to protect people, buildings and infrastructure from hostile vehicle attacks. Cris Francis, Jacksons Fencing Security Consultant, says: “The UK and other parts of Europe are experiencing a worrying increase in vehicle-as-weapon attacks. Consequently, we’re seeing a growing demand for HVM measures as they become an integral part of physical security strategies. A high-quality and tested product, Impakt Defender is an excellent addition to our existing HVM range, offering our clients increased flexibility and versatility.” Securing public spaces Securing public spaces is a high priority for businesses and government organisations" Dalton Marshall, Sales Manager at Rosehill Security, comments: “Securing public spaces is a high priority for businesses and government organisations, with effective HVM solutions now more in-demand than ever. We are delighted to partner with Jacksons Fencing who are well known for their expertise in perimeter security. We’re confident that Impakt Defender will be a valuable addition to Jacksons’ extensive range of products, providing increased scope to protect people and places.” Impakt Defender joins a wide range of HVM products available through Jacksons Fencing, including bi-folding speed gates, static bollards and cable crash fences.
Governments and corporations face crisis events every day. An active shooter terrorises a campus. A cyber extortionist holds a city for ransom. A hurricane washes away a key manufacturing facility. Not all critical events rise to the level of these catastrophic emergencies, but a late or inadequate response to even a minor incident can put people, operations and reputations at risk. Effective response plan In 2015, for example, the City of Boston experienced several record-breaking snowstorms that forced the city to close the subway system for three days. The extreme decision cost the state $265 million per day and was largely attributed to a lack of preparation and an inadequate response plan by the transportation department. The reputation of the head of the transportation department was so damaged by the decision she was forced to resign. Being able to better predict how the storms would impact the subway system’s aging infrastructure – and having a more effective response plan in place – could have saved the state hundreds of millions of dollars (not to mention the transit chief’s job). A comprehensive critical event management strategy begins before the impact of an event is felt and continues after the immediate crisis has ended. This full lifecycle strategy can be broken into four distinct phases – Assess, Locate, Act and Analyse. Assessing threats for prevention Security teams might have complained about not having enough intelligence data to make accurate predictionsIdentifying a threat before it reaches critical mass and understanding how it might impact vital assets is the most difficult challenge facing security professionals. In the past, security teams might have complained about not having enough intelligence data to make accurate predictions. Today, the exact opposite might be true – there is too much data! With crime and incident data coming from law enforcement agencies, photos and videos coming from people on the front line, topics trending on social media and logistical information originating from internal systems it can be almost impossible to locate a real signal among all the noise and chatter. Being able to easily visualise all this intelligence data within the context of an organisation’s assets is vital to understand the relationship between threat data and the individuals or facilities in harm’s way. Social media monitoring Free tools like Google Maps or satellite imagery from organisations like AccuWeather, for example, can help understand how fast a storm is closing in on a manufacturing facility, or how close an active shooter is to a school. Their usefulness, however, is limited to a few event types and they provide only a very macro view of the crisis.Data from building access systems, wifi hotspots, corporate travel systems, among others, can be used to create a profile Critical event management (CEM) platforms, however, are designed specifically to manage critical events of all types and provide much greater visibility. Internal and external data sources (weather, local and national emergency management, social media monitoring software, security cameras, etc.) are integrated into these platforms and their data is visualised on a threat map. Security teams can quickly see if there are actual threats to the organisations or communities they are protecting and don’t lose time trying to make sense of intelligence reports. The more they can see on a ‘single pane of glass,’ the faster they can initiate the appropriate response. Locating a threat Once a threat has been deemed a critical event, the next step is to find the people who might be impacted – employees/residents in danger, first responders and key stakeholders (e.g., senior executives or elected officials who need status updates). Often, this requires someone on the security team to access an HR contact database and initiate a call tree to contact each person individually, in a specific hierarchical order. This can be a time-consuming and opaque process. There is no information on the proximity of that person to the critical event, or if a person has skills such as CPR that could aid in the response. Ensuring ahead of time that certifications, skill sets, or on-call availability is included with contact information can save valuable time in the middle of a crisis response. Going even further, data from building access systems, wifi hotspots, corporate travel systems, among others, can be used to create a profile of where a person just was and where he or she might be going in a CEM platform. This information can be visualised on the threat map and help determine who is actually in danger and who can respond the fastest. The emergency response then becomes targeted and more effective. Security teams can quickly see if there are actual threats to the organisations or communities they are protecting Acting and automating The third step is to act and automate processes. If there is a tornado closing in on a town, for example, residents should not have to wait for manual intervention before a siren is activated or a message sent out. Organisations can build and execute their standing operating procedures (SOPs) fully within a CEM platform. Sirens, alarms, digital signs and messages can all be automatically activated based on event type, severity and location. Using the tornado example, an integration with a weather forecasting service could trigger the command to issue a tornado warning for a specific community if it is in the path of the storm. Summon security guards Warning messages can be prepared in advance based on event type so there is no chance of issuing a misleading or unclear alert Warning messages can be prepared in advance based on event type so there is no chance of issuing a misleading or unclear alert. All communications with impacted individuals can be centralised within the platform and automated based on SOP protocols. This also includes inbound communications from first responders and impacted individuals. An employee confronted by an assailant in a parking garage could initiate an SOS alert from his or her mobile phone that would automatically summon security guards to the scene. Conference lines can also be instantly created to enable collaboration and speed response time. Additionally, escalation policies are automatically engaged if a protocol is broken. For example, during an IT outage, if the primary network engineer does not respond in two minutes, a designated backup is automatically summoned. Eliminating manual steps from SOPs reduces the chance for human error and increases the speed and effectiveness of critical event responses. Analysis of a threat Looking for ways to better prepare and respond to critical events will not only improve performance when similar events occur again It’s not uncommon for security and response teams to think that a critical event is over once the immediate crisis has ended. After all, they are often the ones pushing themselves to exhaustion and sometimes risking life and limb to protect their neighbours, colleagues, community reputations and company brands. They need and deserve a rest. In the aftermath of a critical event, however, it’s important to review the effectiveness of the response and look for ways to drive improvements. Which tasks took too long? What resources were missing? How many times did people respond quickly? With a CEM platform, team performance, operational response, benchmarking data and notification analysis are all captured within the system and are available in a configurable dashboard or in after-action reports for analysis. Continuously looking for ways to better prepare and respond to critical events will not only improve performance when similar events occur again, but it will also improve response effectiveness when unforeseen events strike. Coordinate emergency response Virtually every organisation has some form of response plan to triage a critical event and restore community order or business operations. While many of these plans are highly effective in providing a structure to command and coordinate emergency response, they are reactive in nature and don’t account for the full lifecycle of a critical event – Assess, Locate, Act and Analyse. Whether it’s a large-scale regional emergency or a daily operational issue such as an IT outage, a comprehensive critical event management strategy will minimise the impact by improving visibility, collaboration and response.
Facial recognition has a long history dating back to the 1800s. To track down criminals, such as infamous bandits Jesse Woodson James and Billy the Kid, law enforcement would place “Wanted Alive or Dead” posters advertising bounties and soliciting public cooperation to help locate and even apprehend the alleged criminals. In addition to the bounty, these posters would include a photo and brief description of the crime, which would then be circulated to law enforcement agencies around the country and displayed in every US Post Office to speed up apprehension. Facial recognition Advancements in artificial intelligence and biometric technology have led to the widespread use of computerised facial recognition Today, technology such as social media, television and other more specialised communication networks play a more influential role in the recognition process. Advancements in artificial intelligence and biometric technology, including the development of Machine Learning capabilities, have led to increased accuracy, accessibility and the widespread use of computerised facial recognition. The significance of this means that facial recognition can occur on an even larger scale and in more challenging environments. This article will explore key milestones and technological advances that have resulted in the modern incarnation of facial recognition, before discussing the capabilities of cutting-edge “one-to-many” technology which is increasingly being used by counter-terror defence, police and security forces around the world. Technology inception and developments The technology was able to match 40 faces an hour, which was considered very impressive at the time The 1960s marked the start of computerised facial recognition, when Woodrow Wilson (Woody) Bledsoe developed a way to classify faces using gridlines. Bledsoe’s facial recognition still required a large amount of human involvement because a person had to extract the co-ordinates of the face’s features from a photograph and enter this information into a computer. The technology was able to match 40 faces an hour (each face took approximately 90 seconds to be matched) which was considered very impressive at the time. By the end of the 1960s, facial recognition had seen further development at the Stanford Research Institute where the technology proved to outperform humans in terms of accuracy of recognition (humans are notoriously bad at recognising people they don’t know). By the end of the century, the leading player in the field was a solution that came out of the University of Bochum in Germany – and the accuracy of this technology was such that it was even sold on to bank and airport customers. From this stage on, the facial recognition market began to blossom, with error rates of automatic facial recognition systems decreasing by a factor of 272 from 1993 to 2010 according to US Government-sponsored evaluations. The aim for facial technology is to achieve successful and accurate recognition on commonly available hardware like live CCTV feeds and standard computing hardware Modern usage of facial recognition Fast-forward to the modern day and facial recognition has become a familiar technology when using applications such as the iPhone X’s Face ID capability or MasterCard Identity Check, passport e-gates at airports and other security and access control points. These solutions implement a consensual form of identity verification, as the user has a vested interest in being identified. This is a “one-to-one” facial recognition event, one person in front of the camera being compared to one identity either on a passport or the app. In these scenarios, the hardware is specifically developed for the application at hand, therefore technically much easier to accomplish. Facial recognition can now be used in a variety of governmental and commercial environments The safety and security world brings a much more complex problem to solve – how to pick out a face in a moving and changing environment and compare it to several faces of interest. “One-to-many” facial recognition is a much harder problem to solve. It’s even more challenging when the aim is to achieve successful and accurate recognition on commonly available hardware like live CCTV feeds and standard computing hardware. And unlike in the 1960’s where identifying a face every 90 seconds was acceptable; the safety and security market requires near instant feedback on who a person matched against a watchlist is. Security and safety applications The idea behind all facial recognition technologies is broadly the same: you start with an image of a person’s face (ideally a high quality one, although machine learning means that to a point we can now even use video without reducing accuracy). A fully front facing image is best, think a passport photo, but machine learning and new software has made this more flexible. An algorithm converts this image into a numeric template, which cannot be converted back to an image and so represents a secure one way system. Every numeric template is different, even if it started out as an image of the same person, although templates from the same person are more similar than templates from different people. The accuracy of facial recognition continues to increase alongside deployments in more challenging and complex environments What happens next sounds simple although the technology is extremely complex: templates of people’s faces are taken in real time and compared to those in the database. The technology identifies individuals by matching the numeric template of their face with all the templates saved in a database in a matter of seconds or milliseconds. To put this into perspective, imagine you are at the turnstiles of a busy train station looking for a person on the run. Today’s facial recognition technology would be able to identify that person should they pass in view of a CCTV camera, as well as notify the police of any additional persons of interest, whether they are a known terrorist or missing vulnerable person on an entirely separate watch list. Because of technical progression, facial recognition can now be used in a variety of governmental and commercial environments, from identifying barred hooligans attempting entry at a football stadium or helping self-excluded gamblers at casino to overcome addiction. Real-time assessments The latest evolution of facial recognition pits the technology against an even more challenging application – directly matching individuals from body worn cameras for real time recognition for police officers on the beat. This capability equips first responders with the ability to detect a person from a photo and verify their identity with assurance. The broader implication for this means that every interaction, such as stop and search or arrest, can be supported by real-time facial recognition which will see cases of mistaken identity driven down on the streets. First responders can now for the first time be deployed and furnished with the ability to identify wider groups of people of interest with a degree of accuracy that previously relied only on the fallible human memory. As the accuracy of the technology continues to increase alongside deployments in more challenging and complex environments, its ability to support government initiatives and law enforcement means the debate about the lawful and appropriate use of facial recognition must be addressed. Facial recognition should not be everywhere looking for everyone, but when used properly it has the potential to improve public safety and we should make the most of its potential.
Global and domestic threats have highlighted the need for tighter security across all verticals. One of the technologies that has redefined situational awareness and intrusion detection is thermal imaging. Once a technology exclusively manufactured for the military operations, thermal cameras today are deployed across hundreds of security applications and continue to see strong demand in existing and emerging commercial markets. With thermal technology, security personnel can see in complete darkness as well as in light fog, smoke and rain Technology overview and early adoption What distinguishes thermal cameras from optical sensors is their ability to produce images based on infrared energy, or heat, rather than light. By measuring the heat signatures of all objects and capturing minute differences between them, thermal cameras produce clear, sharp video despite unfavorable environmental conditions. With thermal technology, security personnel can see in complete darkness as well as in light fog, smoke and rain. Originally a military developed, commercially qualified technology, the first thermal cameras for military and aircraft use appeared in the 1950s. By the 1960s, the technology had been declassified and the first thermal camera for commercial use was introduced. However, it wasn’t until the late 1990s - when FLIR Systems introduced a camera with an uncooled thermal detector - when the technology began to see substantial adoption beyond government defense deployments. Installations at critical infrastructure sites In the 2000s, industrial companies were some of the first adopters of thermal, using the technology for predictive maintenance to monitor overheating and machine malfunctions. In the years following the September 11 terrorist attacks in 2001, there was an increase in thermal camera installations across critical infrastructure sites. Stricter security requirements drove the deployment of thermal cameras for perimeter protection, especially in the nuclear power sector. Thermal cameras produce clear video in daylight, low light or no light scenarios and their sharp images result in higher performing analytics In 2010, the U.S. Nuclear Regulatory Committee released its 73.55 policy, which states nuclear facilities must “provide continuous surveillance, observation and monitoring” as a means to enhance threat detection and deterrence efforts onsite. Because thermal cameras produce clear video in daylight, low light or no light scenarios and because their sharp images result in higher performing analytics, thermal cameras quickly became the preferred option for nuclear facilities. Likewise, following the 2013 sniper attack on PG&E Corporation’s Metcalf transmission substation, the Federal Energy Regulation Commission introduced the Critical Infrastructure Protection Standard 014 (CIP-014). The policy requires utilities to identify threats to mission critical assets and implement a security system to mitigate those risks. This statute also led to more thermal installations in the utility sector as thermal cameras’ long-range capabilities are ideal for detection of approaching targets beyond the fence line. The demand from both industrial and critical infrastructure entities, as well as other factors, helped drive volume production and price reduction for thermal, making the technology more accessible to the commercial security marketplace. Commercial applications In recent years, the increasing affordability of thermal cameras along with the introduction of new thermal offerings has opened the door to new commercial applications for the technology. In the past, thermal cameras were designed for applications with enormous perimeters, where the camera needed to detect a human from 700 meters away. Locations like car dealerships, marinas and construction supply facilities can be protected by precise target detection, thermal analytic cameras providing an early warning to security personnel Today, there are thermal cameras specifically designed for short- to mid-range applications. Developed for small to medium enterprises, these thermal cameras ensure property size and security funds are no longer barriers to adoption. Lumber yards, recreation fields and sports arenas are some of the commercial applications now able to implement thermal cameras for 24-hour monitoring and intrusion detection. Affordable thermal cameras with onboard analytics have become attractive options for commercial businesses Innovation and advancements Innovation and advancements in the core technology have also spurred growth in thermal camera deployment, providing faster image processing, higher resolution, greater video analytic capabilities and better camera performance. In particular, affordable thermal cameras with onboard analytics have become attractive options for commercial businesses that need outdoor, wide area protection. Car dealerships, marinas and construction supply locations all store valuable merchandise and materials outside. Without protection, these assets are vulnerable to vandalism and theft. However, by providing precise target detection, thermal analytic cameras provide an early warning to security personnel so that they can intervene before a crime is committed. By helping to deter just one incident, the thermal solution delivers a clear ROI. New market opportunities Not only are there more thermal cameras in use today than ever before, but there are also more thermal sensors being integrated with other multi-sensor systems, driving the adoption of thermal in new markets. For large perimeter surveillance applications, thermal is repeatedly being integrated with radar and drones to expand situational awareness beyond the point of fixed cameras. Users get immediate, accurate alerts of approaching targets and evidentiary class video for target assessment In the commercial market, thermal imagers are combined with optical sensors, analytics and LED illuminators into one solution that integrates with central monitoring station platforms. By bringing these technologies together, users get immediate, accurate alerts of approaching targets and evidentiary class video for target assessment. The result is a lower number of false positives, reducing the total cost of ownership for the solution. These multi-sensor solutions also feature two-way audio capabilities, which enable remote security officers to act as “virtual guards” and speak to intruders in real-time to dissuade them from illegal activity. The introduction of solutions that integrate all these state-of-the-art technologies under one unit reduces the amount of capital and infrastructure needed for deployment. Consequently, more small businesses and alarm monitoring companies can implement advanced perimeter security technologies like thermal sensors, some for the very first time. Thermal cameras have gone from military defense devices to widespread commercial security cameras Multi-sensor thermal solutions Multi-sensor solutions featuring thermal are quickly gaining traction and opening the door to new business opportunities for the security channel. One of the primary reasons for the strong market interest in these systems is they enable integrators to increase their recurring monthly revenue (RMR). With intense price competition and eroding margins on CCTV equipment, integrators have to rely on RMR to grow their businesses. Offering remote video monitoring services and virtual guarding technologies is one of the best ways to do so. Additionally, there is a clear demand for it. Central stations are continually looking for new technologies to offer their customers and businesses are interested in economical alternatives to physical guards. In conclusion, thermal cameras have gone from military defense devices to widespread commercial security cameras that are a substantial segment of the outdoor security protection market. From nuclear power plants to construction locations, thermal technology is being implemented to secure sites around the globe.
The focus of the global security industry will shift to London this month for IFSEC International, Europe’s ‘integrated’ security event focusing on the latest technologies and the opportunity to learn from the industry’s top leaders and experts. IFSEC will be held from 18-20 June, 2019, at ExCel London, welcoming 27,000 security directors and managers, installers, integrators and distributors. The exhibition at IFSEC may not be as large as previous years, and several big players are conspicuously absent. Even so, there will be plenty of innovation on display, including big exhibitors such as Avigilon, Axis, Dahua, dormakaba, FLIR, Genetec, Hanwha Techwin, HID Global, Hikvision, IDIS, and Uniview. Exhibitions will likely reflect a continuing shift in emphasis away from individual products and toward integrated solutions, including some end-to-end solutions provided by single manufacturers. Also, likely to be abundantly evident at IFSEC will be a trend toward manufacturers who partner together to provide integrated solutions. For example, look for some manufacturers to host other manufacturers at kiosks within their stands. Texecom will explain the value of training and digital services and their impact on the future of the industryValue of security training Emphasis will continue to be on the practical aspects of using technology: Throughout the show floor, designated technicians wearing ‘Show Me How’ badges will provide demonstrations of products and solutions on display at the various stands. Texecom will explain the value of training and digital services and their impact on the future of the industry. The Loss Prevention Certification Board (LPCB) Attack Testing Zone features LPCB’s security experts conducting live attack tests on a range of perimeter and façade security products, as well as safes, security enclosures and padlocks. More than 35 hours of seminar sessions will cover timely topics such as ‘Future Proof your CCTV Networks’, ‘Social Media and Internet Security’ and ‘AI and Machine Learning for Security’. Security topics at the Keynote Arena This year, topics will include video analytics, AI, machine learning, GDPR, Brexit and security in smart citiesThe new programme will replicate last year’s successful changes. The Keynote Arena will again be placed at the heart of IFSEC, sponsored by Western Digital. The Keynote Arena will host influential speakers and real-life case studies to inspire attendees. Topical issues will take front and centre, from cybersecurity to ethical and legal challenges to extremism. This year, topics will also include video analytics, AI, machine learning, GDPR, Brexit and security in smart cities. The Future of Security Theatre will present CPD-accredited sessions and presentations that share a vision of the industry’s future and answer burning questions about critical topics, technologies and issues. Education partner Tavcom will present the programme of education dedicated to the ideas, products and innovations driving the industry’s development. The Converged Security Theatre will highlight new approaches that combine cyber and physical defences to tackle dangerous security threats. Included will be real-time technical solutions enhanced by artificial intelligence, powered by Vidsys and partners. Participation by government organisations The Government Pavilion will feature representatives from government bodies such as JSaRC, DIT, and DSOFor the third consecutive year, The Government Pavilion will feature representatives from government bodies such as JSaRC (Home Office & Counter Terror Unit), the Department of International Trade (DIT), and the Defence & Security Organization (DSO). New this year will be participation by the British Transport Police. IFSEC 2019 will again present a snapshot of how manufacturers from across video, access control and intrusion detection are continuing to innovate and collaborate to stay competitive in the challenging market. Innovations first unveiled in the spring at the ISC West 2019 show in the United States will be promoted anew for the European and global markets. IFSEC will be co-locating with FIREX International, a dedicated fire safety event that attracts 18,000 fire prevention and protection professionals; the FACILITIES Show highlighting building management and workplace technologies; and the Safety & Health Expo, dedicated to innovative health and safety products. IFSEC attendees can access the Smart Buildings Expo, the Workplace Wellbeing Show, and the Sprinkler & Suppression Presentation Area within the co-located events.
Simultaneous suicide bombings at several churches and hotels in Sri Lanka on April 21 were of a scale, sophistication and level of coordination that hasn’t been seen since 9/11. Nine suicide bombers targeted three churches and three hotels on Easter morning, and the resulting casualties numbered 359 dead, including 45 children, and about 500 injured. The complexity of the attacks suggests the bombers received help from an outside organisation, likely the Islamic State (IS). Sadly, security warnings from Indian intelligence officials, which might have helped to prevent or minimise the attacks, were ignored by Sri Lanka security weeks earlier. In the wake of the massacre, two of Sri Lanka’s top security officials were asked to resign, and Sri Lanka’s president promised to completely restructure state security. Contradiction to the terrorism report The twin calamities provide a dramatic counterpoint to an observed global decrease in terrorist attacksA motivation for the Sri Lanka tragedy is thought to be the March 15 shootings at two mosques in Christchurch, New Zealand, where 50 people were killed and 50 more were injured. A 28-year-old Australian white supremacist was arrested and charged with murder. Taken together, the twin calamities provide a dramatic counterpoint to an observed global decrease in terrorist attacks, as documented in a recent report. The suicide bombers in Sri Lanka were eight men and one woman, most of them well-educated and coming from the middle or upper class. One was the leader of National Thowheeth Jamaath, the homegrown militant Islamist group the government has blamed with carrying out the attacks. There is also evidence to corroborate a claim of responsibility by IS. Some 60 people have been arrested in the investigation. Even days later, police continued to find explosives and said there was still danger. Multiple attacks One explosion on Easter morning occurred at St. Sebastian’s Church in Negombo, 20 miles north of Colombo, where more than 100 were killed. Another bomb killed 28 people at the Zion Church in Batticaloa, and an unknown number died at St. Anthony’s Shrine, a Roman Catholic church in Colombo. The three hotels that were attacked were all in Colombo – the Shangri-La, the Cinnamon Grand and the Kingsbury The three hotels that were attacked were all in Colombo – the Shangri-La, the Cinnamon Grand and the Kingsbury. Two more explosions happened Sunday afternoon, one at a small guest house and another at the suspects’ safe house, where three officers were killed. Security at houses of worship has been a high-profile concern in the United States in recent years following incidents such as an attack at Emanuel African Methodist Episcopal (AME) Church in downtown Charleston in 2015 that killed nine people. Just last October, 11 people were killed and six others injured in a shooting at a synagogue in Pittsburgh. Hardening security at churches “It’s no longer enough to pray for a safe and secure environment,” commented Patrick Fiel of PVF Security Consulting in an Expert Panel Roundtable discussion. “Churches are soft targets. Clergy and parishioners will need to work closely with security consultants and local law enforcement to harden their facilities.” Access control, CCTV solutions and mass notification systems are all helpful and can be placed unobtrusively so as not to interfere with aesthetics of the church, Fiel adds. The scale and scope of the bombings in Sri Lanka provide a wakeup call to the global likelihood of terrorist attacksIt doesn’t appear technology would have made much difference in the case of the Sri Lanka attacks, although awareness and vigilance can have an impact. At Zion Church in Batticaloa, for example, a bomber was stopped by pastors from entering the congregation area where some 500 people gathered. Because of their suspicions, the bomb was instead detonated in a courtyard where children were eating breakfast; 28 people died. The scale and scope of the bombings in Sri Lanka provide a dramatic wakeup call to the continuing global likelihood of terrorist attacks. The last territory of the Islamic State in Syria fell in March, but IS and its ideology live on, and continue to be a global terrorism threat. And that’s just one among many possible sources of terrorism worldwide. Hopefully, the recent incidents do not foreshadow more attacks that are even more deadly.
Terrorism is amongst the more unyielding security threats worldwide, but a report on global terrorism from the Institute for Economics & Peace, Sydney, Australia, provides reason for optimism, especially outside the world’s terrorism hot spots such as Iraq and Afghanistan. Europe is the region with the biggest improvement from the impact of terrorism and has recorded a marked fall in terrorist activity. The number of deaths in Western Europe fell from 168 in 2016 to 81 in 2017. Turkey, France, Belgium, and Germany recorded the most significant falls, with only the United Kingdom, Spain, Sweden, Finland, and Austria registering increases. As a whole, deaths from terrorism fell for a third consecutive year, after peaking in 2014. Bombings and armed assaults have been the most common form of terrorist attack every year for the past 20 years. Ranking countries based on impact of terrorism The Global Terrorism Index (GTI) was developed in consultation with the Global Peace Index Expert PanelThis article excerpts some of the insights from the Institute for Economics & Peace’s report Global Terrorism Index 2018: Measuring the Impact of Terrorism. The Institute for Economics & Peace (IEP) is an independent, non-partisan, non-profit think tank dedicated to shifting the world's focus to peace as a positive, achievable, and tangible measure of human well-being and progress. The report ranks individual countries based on their impact from terrorism. The Global Terrorism Index (GTI) was developed in consultation with the Global Peace Index Expert Panel. The GTI scores each country on a scale from 0 to 10; where 0 represents no impact from terrorism and 10 represents the highest measurable impact of terrorism. Countries are ranked in descending order with the worst scores listed higher in the index. The United Kingdom scored 5.610 on the GTI scale, up seven spots in the ranking to No. 28. By comparison, the United States scored 6.066 (up 12 spots to rank No. 20), France scored 5.475 (ranked at No. 30) and China scored 5.108 (ranked at No. 36). Fall in deaths but rise in terrorist incidents Twenty-one countries in Europe recorded improvements on their GTI score in 2017, with 11 registering deteriorations in their scores. The impact of terrorism fell for the region on average. Europe recorded the largest percentage decrease in deaths from terrorism of any region in the world in 2017, with total deaths falling by 75 per cent. In Western Europe, deaths from terrorism fell by 52 percent, from 168 in 2016 to 81 in 2017 In Western Europe, deaths from terrorism fell by 52 per cent, from 168 in 2016 to 81 in 2017. From January until October 2018, fewer than 10 deaths were recorded in the region. Despite the fall in deaths, the number of terrorist incidents increased to 282 in Europe in 2017, up from 253 in the prior year. Furthermore, eight countries in Western Europe recorded at least one death from terrorism in 2017, the highest number in the past 20 years. 27% decrease in total number of deaths At the top of the global ranking, No. 1 is Iraq (which scored 9.746 and accounted for 25 percent of the deaths from terrorism) and Afghanistan is No. 2 (with score of 9.391 and representing 23 percent of deaths). The rest of the Top 5 countries are Nigeria, Syria and Pakistan. Iraq recorded over 5,000 fewer deaths from terrorism in 2017, while Syria recorded over 1,000 fewer deaths The total number of deaths from terrorism fell by 27 per cent between 2016 and 2017, with the largest decreases occurring in Iraq and Syria. Iraq recorded over 5,000 fewer deaths from terrorism in 2017, while Syria recorded over 1,000 fewer deaths. The fall in deaths was reflected in scores on the GTI, with 94 countries improving, compared to 46 that deteriorated. Extremism linked to ex-criminals There is a growing body of evidence that indicates people in Western Europe with a criminal background may be especially susceptible to alignment with extremist beliefs, radicalisation, and possible recruitment by terrorist groups, according to the report. Extremists groups provide a ‘redemption narrative’ for alienated young people with a criminal background, while also allowing them to use their illicit skills and networks. Most of the studies conducted in Western Europe find that more than 40 per cent of foreign fighters and those arrested for terrorist activity have some form of criminal background. This pattern of recruitment is of particular concern for countries in Western Europe, with the number of returning foreign fighters expected to grow in the years ahead as ISIL continues to crumble in Iraq and Syria, say the researchers. Increase in far-right political terrorism Elsewhere, the threat of far-right political terrorism is on the rise. There were 66 deaths from terrorism caused by far-right groups and individuals from 113 attacks for the years from 2013 to 2017. Of those, 17 deaths and 47 attacks occurred in 2017 alone. The majority of attacks were carried out by lone actors with far-right, white nationalist, or anti-Muslim beliefs In Western Europe, there were 12 attacks in the United Kingdom, six in Sweden, and two each in Greece and France. In the United States, there were 30 attacks in 2017 which resulted in 16 deaths. The majority of attacks were carried out by lone actors with far-right, white nationalist, or anti-Muslim beliefs. The GTI is based on the National Consortium for the Study of Terrorism and Responses to Terrorism (START) Global Terrorism Database (GTD), the most authoritative data source on terrorism today. The GTI produces a composite score so as to provide a ranking of countries on the impact of terrorism. The GTD consists of systematically and comprehensively coded data for 170,000 terrorist incidents.
Everbridge, Inc., the global pioneer in critical event management, announced that it has been awarded a multi-year contract to support the deployment of Australia’s next-generation national early warning system. In combination with Australia’s major telecommunications companies, the Everbridge Public Warning solution will be used to power Emergency Alert in Australia, providing population-wide alerting to help reach the country’s over 25 million residents and approximately 9 million annual visitors. If residing within an area where a sudden, critical event occurs such as fire, extreme weather or a terror attack, residents and visitors to Australia will receive location-based SMS notifications on their mobile phones, in addition to smart phone mobile app notifications and fixed line voice alerts, among other modalities. Supports first responder communications Everbridge Public Warning leverages telecom infrastructure to reach everyone within a geographic area Everbridge Public Warning leverages existing telecom infrastructure, with no opt-in required, to reach everyone within a geographic area to reduce disaster risk, support first responder communications, and analyse disaster communication effectiveness for subsequent mitigation activities. “Our Public Warning solution enables government organisations and public safety agencies to immediately connect with every person in an affected area during a critical event regardless of nationality, residency or mobile telephone handset type,” said Jaime Ellertson, Chief Executive Officer and Chairman of Everbridge. “Australia has served as a model example for population-wide alerting and emergency preparedness over the past decade, and we are honoured to support them on the evolution of their national system.” The next-generation system is scheduled to become operational in 2020.
Police forces recognise biometrics as a potentially critical tool to improving the quality and efficiency of policing across the globe. As part of a diverse Digital Authentication strategy, automated facial recognition surveillance is becoming an integral part of our digital policing, with the UK Home Office planning to invest a huge £97 million into a broader biometric technology approach to safeguard our streets. Automated facial recognition surveillance Digital fingerprint-based authentication is still widely regarded as having a higher level of maturity However, the latest court case against the South Wales Police as well as the Amazon backlash over the sale of its technology to the US police has highlighted that acceptance of the use of biometric technology as much as the maturing of the technology is important to achieve the expected benefits for the police. Digital fingerprint-based authentication is still widely regarded as having a higher level of maturity, has an implicit acceptance linked to the identity of the individual and delivers a lower false positive result. Facial recognition, when used as a stand-alone biometric, suffers from the risk of challenge or refusal to accept as in the case of the challenge to the South Wales Police pilot program. In addition, gender and racial bias as well as scenarios such as poor lighting and individuals wearing accessories impacts on reliability. Advancements in biometrics There is clearly a need to focus on how biometrics, as technology matures, can support identity verification at scale and to gain widespread public acceptance as part of a wider digital policing initiative according to Jason Tooley, Chief Revenue Officer at Veridium. Jason comments: “Police forces around the world are looking to integrate the latest advancements in technology to enhance public security and cut costs, and biometric solutions are integral to this movement. With the maturing of biometrics techniques and many different scenarios to address, it’s imperative to use the right biometrics for the right requirements and to create a strategy that facilitates the use of multiple biometrics. We would advocate an approach that abstracts the identity verification and digital authentication processes from the services and creates a biometric platform to match the specific requirements of the police and the public.” Fingerprint recognition Fingerprint, being the most mature and widely used biometrics, has high levels of acceptance today" He adds, “There are current barriers to the acceptance of biometrics which will be overcome as trust in the technology becomes the norm. Fingerprint, being the most mature and widely used has high levels of acceptance today and is easily adopted by police and public. It requires public acceptance and doesn’t work for wider surveillance techniques but for individual verification, police moving to a digital fingerprint capture mechanism rather than physical has great benefits and the public are more likely to be accepting of enrolment. Facial recognition would be a surveillance at scale solution but the challenges of maturity and external factors as well as public acceptance are challenges to be overcome in the future.” Jason continues, “It is imperative for police forces to take a strategic approach as they trial biometric technologies, and not solely focus on a single biometric approach. With the rapid rate of innovation in the field, an open biometric strategy that delivers the ability for the police to use the right biometric techniques for the right requirements will accelerate the benefits associated with digital policing and achieve public acceptance by linking the strategy to ease of adoption.”
Delta Scientific, global manufacturer of counter-terrorist vehicle control systems used in the United States and internationally, announced that, on February 14, a Delta MP5000 portable barrier stopped a stolen Ford Edge crossover SUV at the North Gate of the Naval Air Station - Corpus Christi. The trespasser had driven across the base to escape but crashed into the Delta unit and erupted into flames. The driver was shot and killed. Delta MP5000 portable barrier Delta's totally self-contained MP5000 mobile deployable vehicle crash barriers carry a K8 rating "The charred SUV was seen in Navy photographs on top of the MP5000," related Greg Hamm, Delta vice president of sales and marketing. "One photo shows the front of the SUV suspended in the air. Parts of the vehicle are on the ground." Delta's totally self-contained MP5000 mobile deployable vehicle crash barriers carry a K8 rating (M40 ASTM rating), stopping 7.5-ton (6400 Kg) vehicles traveling 40 mph (64 kph). They tow into position to control vehicle access within 15 minutes. No excavation or sub-surface preparation is required. Once positioned, the mobile barricades will unpack themselves by using hydraulics to raise and lower the barriers off their wheels. DC-powered pumps will then raise or lower the barriers. Once the event is over, procedures are reversed, and the barriers are towed away. Temporary, portable barriers Last year, six of the Associated Press (AP) top-10 football schools stayed one step ahead of terrorists and errant drivers on their campuses by identifying vulnerable areas and securing them within minutes with Delta MP5000 temporary, portable barriers. In many situations, such as at the air base, the temporary barriers provide more flexibilities than a permanent solution. Delta always keeps an inventory of the MP5000s for purchase and quick delivery at their manufacturing facility in Palmdale, Calif. In many cases, they are needed for events that come up quickly, such as politician or celebrity visits and other unexpected incidents.
The school gate is more than just a physical barrier. The moment a child passes through, the school assumes their duty of care. That’s why regulations in France stipulate schools must verify the identity of everyone who enters. And the gate is where SMARTair now begins its work at Lycée Kreisker, in Brittany. This large, mixed-age school had high standards for a prospective new access control system. The security of the site and safety of students and staff who use it every day was a must. The school also wanted to get rid of keys. Their previous, stressful solution involved managing two separate key systems. However, managers assumed any user-friendly electronic system would break the budget. They also assumed an electronic access system would be too complicated to manage and take too long to deliver and install. Wireless access control system SMARTair readers control access through the main school gate — a critical first line of defence against intrusionThe cost-effective answer was an access control system with battery-powered locks. The first phase of SMARTair system installation is now complete. SMARTair readers control access through the main school gate — a critical first line of defence against intrusion. Classrooms and the intern room are protected with SMARTair wireless escutcheons. Around 2,000 credentials have been issued to staff and students. Basic administration is carried out in-house by non-technical staff, with the easy-to-use SMARTair software. System configuration and maintenance was easily and affordably outsourced. So, for example, selected doors can be pre-programmed to remain open between 9am and 5pm but require a credential for out-of-hours access. Affordability was another issue, and common to many public sector institutions. At Lycée Kreisker, there was insufficient budget for an elaborate, expensive access control system, as wired systems can be. With SMARTair there’s no wiring around the door, so installation is fast and unobtrusive. There are multiple SMARTair devices to protect different types of opening, so minimal alterations to existing doors are required. Protecting staff, students during emergency SMARTair plays a key role in the Lycée’s regulatory duty to protect staff and students during an emergencySMARTair plays a key role in the Lycée’s regulatory duty to protect staff and students during an emergency, including terrorism or natural disaster: the “plan for implementing security” (or PPMS). SMARTair ensures only authorised people enter the building. Under the PPMS, real-time control enabled by SMARTair also allows staff and children to be safely confined within locked classrooms, should they need to await emergency services. With the myth that powerful access control must be expensive now shattered, Lycée Kresiker plans to extend the SMARTair installation to all doors. The process of becoming keyless — and stress-free — is under way.
Round table discussion
Statistically speaking, incidents of terrorism are unlikely to impact most businesses and institutions. However, the mere possibility of worst-case-scenario attacks is enough to keep security professionals awake at night. Compounding the collective anxiety is the minute-by-minute media coverage when an attack does occur. The immediacy of the shared experience of global tragedy impacts us all – including security system decision-makers. We asked this week’s Expert Panel Roundtable: How is the rise in terrorism impacting the physical security market?
When security topics become a part of current events, it is usually in a negative light. Security generally only becomes news when it fails, sometimes in a dramatic, high profile and tragic way. However, security failures can also shed light on lessons learned and opportunities to improve. Working toward better security can translate into the purchase of more goods and equipment supplied by our market. For additional insights into the intersection of security and current events, we asked this week’s Expert Panel Roundtable: Good news or bad news? How do news reports and/or current events influence the general public’s opinion of physical security?
Hospitality businesses work to provide a safe and pleasant customer experience for their guests. Hotels offer a “home away from home” for millions of guests every day around the world. These are businesses of many sizes and types, providing services ranging from luxury accommodations to simple lodging for business travelers to family vacation experiences. Hospitality businesses also include restaurants, bars, movie theaters and other venues. Security needs are varied and require technologies that span a wide spectrum. We asked this week’s Expert Panel Roundtable: What are the security challenges of the hospitality market?