Informa Markets, in consultation with its exhibitors and event partners, has made the difficult decision to reschedule IFSEC International and its co-located shows. This postponement and rescheduling cover the following events: IFSEC International Counter Terror Expo, Forensics Europe Expo and World Counter Terror Congress (Organised by Clarion Events) FIREX International Safety & Health Expo Facilities Show Intelligent Building Europe Workplace Wellbeing Show Communities come together We know how important our events are as a forum where our communities come together to learn and network" Originally set to take place on 8–10 September 2020, the events are now scheduled for 18–20 May 2021 at ExCeL London. Chris Edwards, Group Director for IFSEC International said: “We know how important our events are as a forum where our communities come together to learn, network and meet suppliers." "We have a proud track record of hosting the largest gatherings of any event in our industry in the UK, and often beyond, and no one is more disappointed in this decision than us, but after much deliberation we are sure that this is absolutely the right thing to do in the circumstances.” Safe and secure environment “Our focus over the last three months has been on ensuring that we can provide a safe and secure environment for our visitors, exhibitors and staff, and whilst we felt confident of achieving this we also have a duty to our customers to provide an event that matches the standards they expect of us. Additionally, these events have strong international participation and this would be severely compromised given the current restrictions. “After carefully considering the options and following discussions with exhibitors and event partners it became clear that postponement is the most sensible option. We welcomed many thousands of industry colleagues during our Digital Week in May and we continue to develop our online platforms to offer additional ways of connecting with the wider industry." Connect with audiences online We will be working closely with our exhibitors and industry partners to shape a reunion to remember" "We will continue to work with our customers to help them connect with audiences online using both our existing platforms and several new initiatives due to launch later this year.” David Townsend, Event Director, CTX, Clarion Defence and Security, also commented: “CTX is an important milestone for security professionals from industry, infrastructure, government and policing to network and do business. So, while we are of course disappointed not to be holding the event this year, the decision is in the best interests of our customers, attendees, and suppliers." Counter-terror event "In addition, as a strategic counter-terror event with a global audience, a significant proportion of this audience typically travel from overseas. Given that governments around the world are continuing to advise against international travel at this time, we believe the most prudent course of action is to focus on bringing the community back together at CTX in May 2021. We will be working closely with our exhibitors and industry partners to shape a reunion to remember.” Chris Edwards added: “As each of our communities look to rebuild and recover in 2021 our team will also be working hard to ensure we return next year with an event that brings people back together for the reunion everyone will be crying out for. Details on how our events will continue to evolve and develop for next year will be forthcoming over the summer.”
Sonitrol, globally renowned provider of verified electronic security solutions, has announced the launch of TotalGuard Smart Hub and additional wireless devices that together offer a more robust security solution to the small and medium business markets. This new offering includes a variety of wireless sensors that connect to the new TotalGuard Smart Hub, expanding reach and alarm capabilities. TotalGuard solution Sonitrol’s TotalGuard solution, launched in 2018, targets the small to medium business market by offering affordable, professional security. TotalGuard is an all-in-one, edge-based device that acts as a standalone IoT panel. Each TotalGuard device includes Sonitrol impact activated audio detection, glass break analytics, video verification and surveillance, motion and wireless connectivity, all professionally monitored by a Sonitrol Central Station. TotalGuard Smart Hub and Wireless Devices The TotalGuard Smart Hub and Wireless Devices are simple, scalable and secure In addition to its many powerful features, the solution was needed for the ability to easily connect with other alarm points as each business has different security needs. The TotalGuard Smart Hub & Wireless Devices are simple, scalable and secure. They consist of a motion sensor, door/window sensor, water sensor, temperature sensor, universal transmitter, and a panic button. Easy deployment, smart infrastructure These devices are easy to deploy and have a streamlined infrastructure, which reduces wire pulls and terminations and can easily be set up with a Mobile App by the installer. With the TotalGuard Smart Hub, users can enroll up to 32 wireless devices. These Zigbee devices operate over AES 128-bit encryption, are supervised and tamper protected. Integration with Sonitrol Cloud Access Control TotalGuard can also be paired with exterior thermal imagers for added outside protection, as well as exterior cameras and Sonitrol Cloud Access Control. Working to meet a wide range of customer needs, Sonitrol offers integrated security solutions and is a one stop shop for small to medium businesses. In addition to now offering security solutions to the small to medium business market, Sonitrol is the also a recognised security solutions company in verified electronic security, offering Impact Activated Audio Detection, Video Verification, Managed and Cloud Access Control, Video Surveillance, and Fire. Law enforcement applications Sonitrol’s ability to verify intrusion, through patented technologies in real-time, offers unrivaled credibility with law enforcement. Sonitrol provides for fast police response times, low false alarm rates and the best apprehension record - over 181,000 across the security industry.
Security personnel responsible for the safety of visitors at airports, sports stadiums and other wide open environments where there is a high risk of terrorist activity, can now rely on a new high-performance Wisenet video surveillance camera manufactured by Hanwha Techwin, to help them detect and forensically analyse any suspicious activity. “The super high resolution capabilities of the Wisenet TNB-9000 means that large areas can be covered with sufficient pixel density to enable operators to digitally zoom in to see a sharp image of just a small part of the scene,” said Uri Guterman, Head of Product & Marketing for Hanwha Techwin Europe. Installing multiple cameras “This ability to closely zoom in without losing any detail, makes the Wisenet TNB-9000 ideal for applications where installing multiple cameras may be impractical or cost prohibitive.” The H.265 Wisenet TNB-9000, which utilises a full size 43.3mm CMOS sensor to capture true 8K images at 15 frames per second, is equipped with deep learning based video analytics. This simultaneously detects and classifies various object types, including people, vehicles, faces and license plates. The Wisenet TNB-9000 has a wide range of built-in Intelligent Video Analytics (IVA) The deep learning based video analytics is also able to ignore video noise, waving trees, moving clouds and animals, all of which might normally be the cause of false alarms. In addition to its deep learning capabilities, the Wisenet TNB-9000 has a wide range of built-in Intelligent Video Analytics (IVA), including Tampering, Loitering, Directional Detection, Defocus Detection, Virtual Line, Enter/Exit, Appear/Disappear, Audio Detection and Motion Detection. Deep learning based video analytics It also has an audio analytics feature which recognises critical sounds such as raised voices, screams, broken glass, gunshots and explosions, and generates an alert to enable security personnel to quickly react to any incidents. Additional features: Digital Wide Dynamic Range (DWDR), helps to accurately produce images in scenes that simultaneously contain very bright and very dark areas. A micro SD/SDHC/SDXC memory slot which allows up to 256GB video or data to be stored at the edge should there be disruption to the network. Video evidence, which might have been potentially lost, can be retrieved when the network connection has been restored. A choice of H.265, H.264 or MJPEG compression, with the cameras’ bandwidth friendly credentials enhanced by WiseStream II, a complementary compression technology which dynamically controls encoding, balancing quality and compression, according to movement in the image. Bandwidth efficiency is improved by up to 99% compared to current H.264 technology when WiseStream II is combined with H.265 compression. As such, WiseStream II reduces the total cost of ownership of a video surveillance system by minimising the storage and bandwidth requirements of high definition cameras. Gigabit Ethernet and SFP fibre optics allow the transfer of up to 1,000 Mbps for high speed connectivity. 12VDC or HPoE which negates the need to install separate power supplies. Support for Canon EF (Electro Focus) mount lenses provides a wide variety of options for focal length and aperture settings. Accurately detect suspicious activity “The superb quality of the images captured by our highest resolution camera to date, together with its deep learning based video analytics and other innovative features, provides security personnel with an extremely powerful tool to accurately detect any suspicious activity,” said Uri Guterman. “As such, the introduction of the Wisenet TNB-9000 presents system integrators with an excellent opportunity to help their end-user clients cost-effectively take their security to a higher level.”
Knightscope, Inc., a renowned developer of advanced physical security technologies utilising fully autonomous robots focused on enhancing U.S. security operations, has announced that it has created and deployed numerous COVID-19 Public Safety Announcements across its fleet of Autonomous Security Robots (ASRs). Knightscope’s clients are effectively all considered ‘essential services’ (law enforcement agencies, hospitals, security teams, etc.), so the company has been hard at work keeping all of its machines-in-network operating across the country, even during the pandemic. The robots have been working tirelessly 24/7 without interruption since they are immune and not subject to any shelter-in-place orders. COVID-19 Public Safety Broadcast Announcements “We are pleased to announce that our COVID-19 Public Safety Broadcast Announcements feature is now live and deployed in production,” said William Santana Li, Chairman and CEO at Knightscope. “We offered this as a free upgrade to all Knightscope clients as part of our Machine-as-a-Service (MaaS) subscription offering. The majority of our clients were excited to activate the feature, with many even asking for their own custom messages tailored to their respective facilities.” Broadcast messages The over-the-air free upgrade includes the following broadcast messages that can be announced by Knightscope’s K1 Stationary, K3 Indoor, or K5 Outdoor Autonomous Security Robots (ASRs): “Please maintain a safe distance between you and other people - I recommend at least 6 feet.” “Thanks for joining me for a breath of fresh air. We don't have to remain indoors, but let's avoid being in close contact with other humans.” “Be sure to wipe down any surfaces you come into contact with. Please disinfect your hands with an alcohol-based sanitiser and avoid touching your face.” “Washing our hands is fun! Oh, wait.... I don't have any hands.” “If you are feeling ill, please refrain from entering this facility. Instead, please push the button on my head to speak with a human.” “Please refrain from physical contact, including shaking hands.” “Social distancing is in practice and required here.” Knightscope Security Operations Centre The COVID-19 Public Safety Broadcast Announcements can be made when a person is detected, randomly, by time, by location or issued manually by a law enforcement officer or security professional utilising the state-of-the-art user interface, the Knightscope Security Operations Centre (KSOC).
Safety and security have always been primary concerns for those running large events and gatherings, such as at concert venues or football stadiums. However, the Manchester Arena attack of 2017 highlighted that more should be done to protect those visiting these locations. This is the standpoint taken by Figen Murray, the mother of Martyn Hett – one of the 22 victims of the devastating attack. She has been campaigning for the introduction of stronger counter-terror security measures at public venues and has succeeded in gaining government backing for ‘Martyn’s Law’. According to the Home Office, the law would require venues to consider the risk of an attack and take “proportionate and reasonable measures” to protect those in attendance. Murray’s proposal would see increased physical security, such as airport-style metal detectors and scanners, become mandatory for major venues that draw large crowds, as well as training, incident response plans and exercises for staff. The law would seek to tackle the inconsistent nature of security practices currently seen at venues, and bring holistic counter-terror practices to the fore. Introducing airport-style security measures at concert venues isn’t a fix-all solution However, introducing airport-style security measures at concert venues isn’t a fix-all solution. The ecosystem of these locations must be considered and responded to accordingly. Adding extra checkpoints in areas with a high flow of people will not only result in additional queues and disgruntled visitors, but may have more disastrous consequences as large crowds are typically the target of terror attacks. Disruptive security measures may move the mass of people from inside the venue, where people will have had to pass through some form of security – if only just a bag check – to outside the venue, where there are typically no security measures in place. Disrupting threats with enhanced security So, what can be done to enhance the protection of those attending these locations? Investment into technology that can provide an additional layer of security without being intrusive is key, and facial recognition is one such tool. Security teams can use this innovative technology to scan crowds or queues for a sighting of a person of interest, whose biometric data is included on a watch list of known individuals. As well as providing an additional layer of protection, this tool can provide peace of mind for security teams who can monitor those who have not yet entered the venue or are waiting outside. When the facial recognition system identifies a potential match, staff must be prepared to act – as the system will never make the final decision over a person’s fate. They can analyse the picture from the watch list with the video of the individual identified, decide whether the detection was accurate and then interact directly with the person of interest. The level of contact may be as simple as asking for proof of identity and if adequately able to verify who the person is, no further action is needed and any biometric data is removed. Alternatively, it could lead to the acquisition of a known criminal, providing valuable intelligence of any immediate threat. When the facial recognition system identifies a potential match, staff must be prepared to act The real benefit of facial recognition is that response can be proactive as well as reactive, whether it be from fixed surveillance cameras or mobile devices such as body worn cameras. Devices capable of live streaming coupled with analytics such as facial recognition, offer an invaluable surveillance tool, allowing security teams and first responders to react quickly and more effectively to an unfolding situation, all in real-time. Control centre staff are still vital in this circumstance, but are able to work with heightened situational awareness thanks to the live streaming aspect. It allows them to more accurately assess a situation and therefore make decisions based on all of the information at hand, with outcomes that will be far more effective. For example, the information relayed to the emergency services will be more exact in terms of what happened, where and who was involved – rather than being based on fragmented eyewitness accounts. Planning ahead Even though it isn’t yet official, Martyn’s Law is already making waves in the industry – with Manchester City Council pledging to adopt the law early and the security minister, home secretary and prime minister all “100% behind” the proposal. Despite its early stages, operators of concert venues and stadia must start forward planning and enhancing security measures ahead of the government beginning to consult on the law in the spring. Only time will tell what the full legislation will entail, but we can all agree that action is necessary. In order to be as effective as possible, the law should not only mandate metal detectors and bag searches, but technology such as facial recognition and body worn cameras that can work to enhance these other measures and elevate the human response.
Insider threat programmes started with counter-espionage cases in the government. Today, insider threat programmes have become a more common practice in all industries, as companies understand the risks associated with not having one. To build a programme, you must first understand what an insider threat is. An insider threat is an employee, contractor, visitor or other insider who have been granted physical or logical access to a company that can cause extensive damage. Damage ranges from emotional or physical injury, to personnel, financial and reputational loss to data loss/manipulation or destruction of assets. Financial and confidential information While malicious insiders only make up 22% of the threats, they have the most impact on an organisation Most threats are derived from the accidental insider. For example, it’s the person who is working on a competitive sales pitch on an airplane and is plugging in financial and confidential information. They are working hard, yet their company’s information is exposed to everyone around them. Another type of insider, the compromised insider, is the person who accidentally downloaded malware when clicking on a fake, urgent email, exposing their information. Malicious insiders cause the greatest concerns. These are the rogue employees who may feel threatened. They may turn violent or take action to damage the company. Or you have the criminal actor employees who are truly malicious and have been hired or bribed by another company to gather intel. Their goal is to gather data and assets to cause damage for a specific purpose. While malicious insiders only make up 22% of the threats, they have the most impact on an organisation. They can cause brand and financial damage, along with physical and mental damage. Insider threat programme Once you determine you need an insider threat programme, you need to build a business case and support it with requirements. Depending on your industry, you can start with regulatory requirements such as HIPAA, NERC CIP, PCI, etc. Talk to your regulator and get their input. Everyone needs to be onboard, understand the intricacies of enacting a programme Next, get a top to bottom risk assessment to learn your organisation’s risks. A risk assessment will help you prioritise your risks and provide recommendations about what you need to include in your programme. Begin by meeting with senior leadership, including your CEO to discuss expectations. Creating an insider threat programme will change the company culture, and the CEO must understand the gravity of his/her decision before moving forward. Everyone needs to be onboard, understand the intricacies of enacting a programme and support it before its implemented. Determining the level of monitoring The size and complexity of your company will determine the type of programme needed. One size does not fit all. It will determine what technologies are required and how much personnel is needed to execute the programme. The company must determine what level of monitoring is needed to meet their goals. After the leadership team decides, form a steering committee that includes someone from legal, HR and IT. Other departments can join as necessary. This team sets up the structure, lays out the plan, determines the budget and what type of technologies are needed. For small companies, the best value is education. Educate your employees about the programme, build the culture and promote awareness. Teach employees about the behaviours you are looking for and how to report them. Behavioural analysis software Every company is different and you need to determine what will gain employee support The steering committee will need to decide what is out of scope. Every company is different and you need to determine what will gain employee support. The tools put in place cannot monitor employee productivity (web surfing). That is out of scope and will disrupt the company culture. What technology does your organisation need to detect insider threats? Organisations need software solutions that monitor, aggregate and analyse data to identify potential threats. Behavioural analysis software looks at patterns of behaviour and identifies anomalies. Use business intelligence/data analytics solutions to solve this challenge. This solution learns the normal behaviour of people and notifies security staff when behaviour changes. This is done by setting a set risk score. Once the score crosses a determined threshold, an alert is triggered. Case and incident management tools Predictive analytics technology reviews behaviours and identifies sensitive areas of companies (pharmacies, server rooms) or files (HR, finance, development). If it sees anomalous behaviour, it can predict behaviours. It can determine if someone is going to take data. It helps companies take steps to get ahead of bad behaviour. If an employee sends hostile emails, they are picked up and an alert is triggered User sentiment detection software can work in real time. If an employee sends hostile emails, they are picked up and an alert is triggered. The SOC and HR are notified and security dispatched. Depending on how a company has this process set-up, it could potentially save lives. Now that your organisation has all this data, how do you pull it together? Case and incident management tools can pool data points and create threat dashboards. Cyber detection system with access control An integrated security system is recommended to be successful. It will eliminate bubbles and share data to see real-time patterns. If HR, security and compliance departments are doing investigations, they can consolidate systems into the same tool to have better data aggregation. Companies can link their IT/cyber detection system with access control. Deploying a true, integrated, open system provides a better insider threat programme. Big companies should invest in trained counterintelligence investigators to operate the programme. They can help identify the sensitive areas, identify who the people are that have the most access to them, or are in a position to do the greatest amount of harm to the company and who to put mitigation plans around to protect them. They also run the investigations. Potential risky behaviour Using the right technology along with thorough processes will result in a successful programme You need to detect which individuals are interacting with information systems that pose the greatest potential risk. You need to rapidly and thoroughly understand the user’s potential risky behaviour and the context around it. Context is important. You need to decide what to investigate and make it clear to employees. Otherwise you will create a negative culture at your company. Develop a security-aware culture. Involve the crowd. Get an app so if someone sees something they can say something. IT should not run the insider threat programme. IT is the most privileged department in an organisation. If something goes wrong with an IT person, they have the most ability to do harm and cover their tracks. They need to be an important partner, but don’t let them have ownership and don’t let their administrators have access. Educating your employees and creating a positive culture around an insider threat programme takes time and patience. Using the right technology along with thorough processes will result in a successful programme. It’s okay to start small and build.
Governments and corporations face crisis events every day. An active shooter terrorises a campus. A cyber extortionist holds a city for ransom. A hurricane washes away a key manufacturing facility. Not all critical events rise to the level of these catastrophic emergencies, but a late or inadequate response to even a minor incident can put people, operations and reputations at risk. Effective response plan In 2015, for example, the City of Boston experienced several record-breaking snowstorms that forced the city to close the subway system for three days. The extreme decision cost the state $265 million per day and was largely attributed to a lack of preparation and an inadequate response plan by the transportation department. The reputation of the head of the transportation department was so damaged by the decision she was forced to resign. Being able to better predict how the storms would impact the subway system’s aging infrastructure – and having a more effective response plan in place – could have saved the state hundreds of millions of dollars (not to mention the transit chief’s job). A comprehensive critical event management strategy begins before the impact of an event is felt and continues after the immediate crisis has ended. This full lifecycle strategy can be broken into four distinct phases – Assess, Locate, Act and Analyse. Assessing threats for prevention Security teams might have complained about not having enough intelligence data to make accurate predictionsIdentifying a threat before it reaches critical mass and understanding how it might impact vital assets is the most difficult challenge facing security professionals. In the past, security teams might have complained about not having enough intelligence data to make accurate predictions. Today, the exact opposite might be true – there is too much data! With crime and incident data coming from law enforcement agencies, photos and videos coming from people on the front line, topics trending on social media and logistical information originating from internal systems it can be almost impossible to locate a real signal among all the noise and chatter. Being able to easily visualise all this intelligence data within the context of an organisation’s assets is vital to understand the relationship between threat data and the individuals or facilities in harm’s way. Social media monitoring Free tools like Google Maps or satellite imagery from organisations like AccuWeather, for example, can help understand how fast a storm is closing in on a manufacturing facility, or how close an active shooter is to a school. Their usefulness, however, is limited to a few event types and they provide only a very macro view of the crisis.Data from building access systems, wifi hotspots, corporate travel systems, among others, can be used to create a profile Critical event management (CEM) platforms, however, are designed specifically to manage critical events of all types and provide much greater visibility. Internal and external data sources (weather, local and national emergency management, social media monitoring software, security cameras, etc.) are integrated into these platforms and their data is visualised on a threat map. Security teams can quickly see if there are actual threats to the organisations or communities they are protecting and don’t lose time trying to make sense of intelligence reports. The more they can see on a ‘single pane of glass,’ the faster they can initiate the appropriate response. Locating a threat Once a threat has been deemed a critical event, the next step is to find the people who might be impacted – employees/residents in danger, first responders and key stakeholders (e.g., senior executives or elected officials who need status updates). Often, this requires someone on the security team to access an HR contact database and initiate a call tree to contact each person individually, in a specific hierarchical order. This can be a time-consuming and opaque process. There is no information on the proximity of that person to the critical event, or if a person has skills such as CPR that could aid in the response. Ensuring ahead of time that certifications, skill sets, or on-call availability is included with contact information can save valuable time in the middle of a crisis response. Going even further, data from building access systems, wifi hotspots, corporate travel systems, among others, can be used to create a profile of where a person just was and where he or she might be going in a CEM platform. This information can be visualised on the threat map and help determine who is actually in danger and who can respond the fastest. The emergency response then becomes targeted and more effective. Security teams can quickly see if there are actual threats to the organisations or communities they are protecting Acting and automating The third step is to act and automate processes. If there is a tornado closing in on a town, for example, residents should not have to wait for manual intervention before a siren is activated or a message sent out. Organisations can build and execute their standing operating procedures (SOPs) fully within a CEM platform. Sirens, alarms, digital signs and messages can all be automatically activated based on event type, severity and location. Using the tornado example, an integration with a weather forecasting service could trigger the command to issue a tornado warning for a specific community if it is in the path of the storm. Summon security guards Warning messages can be prepared in advance based on event type so there is no chance of issuing a misleading or unclear alert Warning messages can be prepared in advance based on event type so there is no chance of issuing a misleading or unclear alert. All communications with impacted individuals can be centralised within the platform and automated based on SOP protocols. This also includes inbound communications from first responders and impacted individuals. An employee confronted by an assailant in a parking garage could initiate an SOS alert from his or her mobile phone that would automatically summon security guards to the scene. Conference lines can also be instantly created to enable collaboration and speed response time. Additionally, escalation policies are automatically engaged if a protocol is broken. For example, during an IT outage, if the primary network engineer does not respond in two minutes, a designated backup is automatically summoned. Eliminating manual steps from SOPs reduces the chance for human error and increases the speed and effectiveness of critical event responses. Analysis of a threat Looking for ways to better prepare and respond to critical events will not only improve performance when similar events occur again It’s not uncommon for security and response teams to think that a critical event is over once the immediate crisis has ended. After all, they are often the ones pushing themselves to exhaustion and sometimes risking life and limb to protect their neighbours, colleagues, community reputations and company brands. They need and deserve a rest. In the aftermath of a critical event, however, it’s important to review the effectiveness of the response and look for ways to drive improvements. Which tasks took too long? What resources were missing? How many times did people respond quickly? With a CEM platform, team performance, operational response, benchmarking data and notification analysis are all captured within the system and are available in a configurable dashboard or in after-action reports for analysis. Continuously looking for ways to better prepare and respond to critical events will not only improve performance when similar events occur again, but it will also improve response effectiveness when unforeseen events strike. Coordinate emergency response Virtually every organisation has some form of response plan to triage a critical event and restore community order or business operations. While many of these plans are highly effective in providing a structure to command and coordinate emergency response, they are reactive in nature and don’t account for the full lifecycle of a critical event – Assess, Locate, Act and Analyse. Whether it’s a large-scale regional emergency or a daily operational issue such as an IT outage, a comprehensive critical event management strategy will minimise the impact by improving visibility, collaboration and response.
Security’s intersection with consumer electronics is on view at CES 2020, the world’s largest technology event, Jan. 7-10 in Las Vegas. The giant show features more than 170,000 attendees, 4,500 exhibitors and 1,100 industry thought-leaders featured on the CES stage. A range of technologies will be on display, from artificial intelligence (AI) to 5G, vehicle technology to AR/VR (augmented and virtual reality), robotics to home automation. Security plays a prominent role, too.The impact of this event for the smart home could be about delivering home analytics and enhancing privacy" Smart home market on the forefront The smart home market is a major focus. “For the smart home market at CES this year, we expect to see numerous announcements regarding home awareness,” says Blake Kozak, Senior Principal Analyst at IHS Markit. “This will include brands offering up additional analytics for consumer security cameras with a focus on edge-based solutions.” “The impact of this [event] for the smart home could be about delivering home analytics and enhancing privacy through cloudless architectures and new electronic door lock approaches,” he adds. An example of cloud analytics is the Resideo Home app, introduced in December, which will make whole-home monitoring possible for four critical networks of the home – water, air, energy and security. Resideo promises a “simplified and integrated smart home experience.” Video is also prominent at the show. “For cameras, we can expect to see more cameras focused on the outdoor space and possibly new form factors for video doorbells,” says Kozak. Familiar security industry brands exhibiting at CES 2020 include ADT, Ring, August Home and Yale (both part of ASSA ABLOY), Bosch and Alarm.com. Focus on Cybersecurity In 2020, companies will continue to focus on solutions for protecting consumer data" Cybersecurity is an aspect of many of the devices on display at CES. “Device security and data privacy play a key role in the adoption of connected devices,” says Elizabeth Parks, President, Parks Associates. “Consumer security concerns for smart home products will continue to be a barrier to adoption in the U.S. and Europe, and these concerns can actually intensify with device adoption-71% of U.S. smart home households are concerned about cybersecurity. In 2020, companies will continue to focus on solutions for protecting consumer data. One big area of interest is protection on the network router, providing whole home solutions, which are very appealing to consumers.” “At CES we will see the traditional players introducing new DIY (do-it-yourself) products, as well as new players announcing new product features, services, and partnerships,” Parks adds. Smart access control Smart locks will be among the security products at CES 2020. For example, PassiveBolt, a lock company, will show the Shepherd Lock, a touch-enabled smart lock with enhanced security through sensors and AI. The add-on lock converts existing locksets into touch-activated devices. Another lock manufacturer is Kwikset, whose door locks and door hardware include Wi-Fi-enabled smart locks, Bluetooth-enabled smart locks, keyless and keyway-less locks and connected home technology. Video doorbells, including industry-innovator Ring, have been a hit in the consumer market. At CES, Ring will expand the mission to make neighbourhoods safer by creating a “Ring of Security” around homes and communities with a suite of home security products and services. The “Neighbors by Ring” app enables affordable, complete, proactive home and neighbourhood security. Homeguard offers a range of affordable CCTV solutions for home and small business DIY CCTV demonstrations DIY security systems are another market. Homeguard is a leading DIY consumer brand offering a range of affordable CCTV solutions for home and small business, including wired and wireless CCTV kits, smart cameras, home alarm systems and wire-free HD CCTV kits. Swann Communications is also at the forefront of surveillance and monitoring with new products developments including wire-free HD cameras and doorbells, professional CCTV video surveillance systems, and 1080p full HD systems with “True Detect” heat and motion sensing. AVTECH, and subsidiary YesGo Tech, will demonstrate a compact Wi-Fi home security set, a series of special cameras with face recognition, thermal detection and license plate recognition, customised central management software and a university ID tag that is compatible with access control, OEM and ODM opportunities. Security and automation solutions D-Link’s home networking, security and automation solutions will help consumers connect, view, share, entertain, work and play. SECO-LARM, manufacturer of a Room Occupancy Monitor that shows whether a room is in use, has a line of keypads and proximity readers with built-in Bluetooth for convenient access. Another smart home security solutions provider, Climax Technology, integrates wireless security, home automation, energy management, home emergency monitoring and live visual monitoring. Personal safety mobile application Manufacturers are positioning outdoor cameras as deterrents to theft before a burglary happens" WaryMe designs and develops a personal safety mobile application to improve a user’s security in public places, schools, transports and companies by addressing major risks such as terrorism attacks, intrusion, fire and even industrial accidents. An all-in-one mobile application integrates alerting, crisis management and mass notification features. “Market players are looking to expand beyond established smart home devices like smart thermostats and networked cameras to products like smart water leak detectors, smart pet feeders, and smart air purifiers,” says Elizabeth Parks. “Manufacturers are positioning outdoor cameras as deterrents to theft before a burglary happens. This trend is part of a broader security marketing effort to extend the perimeter of home security beyond traditional home access points.” “Familiarity with smart home devices lags behind familiarity with smart entertainment products; it even lags that of smart speakers, which are quite new in the market,” adds Parks. “In 2020, we will see players working to advance the visibility and marketing around device integration, and specifically focus on use case scenarios around safety, security, and convenience, which have always been the primary drivers of adoption of these types of products.”
The UK Government has been working to reduce the risks associated with illegal drone use since a high-profile incident at UK’s Gatwick Airport in December 2018, when a drone sighting triggered a three-day shutdown of the UK’s second busiest airport, disrupting the travel plans of 140,000 people and affecting 1,000 flights. To address growing security threats by drones, the UK Government has released its ‘Counter-Unmanned Aircraft Strategy’. ‘Counter-Unmanned Aircraft Strategy’ This strategy sets out our approach to countering the threat the malicious or negligent use of drones can bring" “This strategy sets out our approach to countering the threat the malicious or negligent use of drones can bring,” says Brandon Lewis, the U.K. Minister of State for Security. “It will provide the security the public and drone users require to continue to enjoy the benefits of leisure and commercial drone use and facilitate the growth of the drone industry.” “Given the challenge posed by rapid advances in drone technology and the potential threat, the strategy will provide overarching direction to our efforts,” says Lewis. The strategy focuses on ‘small drones’, those weighing less than 20 kg (44 pounds). Countering malicious use of aerial drones The UK Counter-Unmanned Aircraft Strategy centres on mitigating the highest-harm domestic risks resulting from malicious use of aerial drones. They are: Facilitating terrorist attacks, such as modifying commercially-available drones to conduct reconnaissance or attacks. Facilitating crime, especially in prisons, where drones are currently used to deliver contraband. Disrupting critical national infrastructure, such as airports, where a malicious incursion using a drone can have serious safety, security and economic consequences. Potential use by hostile state actors. Maximising benefits of drone technology The initiative will also look to build strong relationships with industry to ensure high security standards Over the next three years, the strategy will seek to reduce the risks posed by the highest-harm use of drones while maximising the benefits of drone technology. It will develop a comprehensive understanding of evolving risks and take a “full spectrum” approach to deter, detect and disrupt the misuse of drones. The initiative will also look to build strong relationships with industry to ensure high security standards. Further, promoting access to counter-drone capabilities and effective legislation, training and guidance will empower the police and other operational responders. Tactical response to drone-based threats Because technology is rapidly evolving, the response needs to keep pace, according to the strategy document. Lewis adds, “We will therefore work to understand how drone-based threats might evolve in the future, both at the tactical and strategic levels.” The strategy will be to build an end-to-end approach to tackling the highest-harm criminal use of drones. It will also work to make it easier to identify malicious drone use against a backdrop of increased legitimate use. Legal drone operators will be required to register with the Civil Aviation Authority (CAA) and to pass an online competency test before flying a drone. Retailers who follow a specific set of safety guidelines when selling drones will be designated ‘DroneSafe’. Unmanned traffic management system The government is working toward future implementation of an unmanned traffic management (UTM) system, which provides a means of preventing collisions between unmanned aircraft and other manned or unmanned aircraft. The current strategy includes early planning for the system. An Industry Action Group will ensure a continuing relationship with the drone industry and help to improve existing counter-drone measures and identify new opportunities, such as use of ‘Geo-Fencing’ to restrict drones from flying in certain areas. Regulating commercial and domestic drones The UK Department of Transport is responsible for safe and lawful use of drones within the UK airspace The strategy will seek to communicate the UK’s security requirements to the counter-drone industry and to encourage a thriving sector that is aware of, and responsive to, the needs of government. Regulating drones is the responsibility of two UK government departments. The UK Department of Transport is responsible for safe and lawful use of drones within the UK airspace, while the Home Office has overall responsibility for domestic counter-drone activity. Fast-evolving drone and counter-drone technology Also, the Center for the Protection of National Infrastructure (CPNI) has been involved in reducing the vulnerability of sensitive sites, including airports. New performance measures will track the strategy’s success. Due to the fast-evolving nature of drone and counter-drone technology, the intent is to review and, if necessary, refresh the strategy in three years.
As the deal/no deal prospects of Brexit are tossed in a whirlwind of UK and EU politics, the uncertainty of the back-and-forth has broadly impacted general economic trends, and by extension, the physical security market. The new deadline for a Brexit agreement is October 31, already postponed six months from the scheduled April 12 departure date. Numbers show that Britain’s GDP shrank in the second quarter, possibly reflecting fewer exports because of Brexit uncertainty. And beyond the current indecision lies the long-term impact of a possible change in trading status between the United Kingdom and continental Europe. Other issues include capital flow and labor mobility. Brexit uncertainty leading to security concerns Loss of shared information with the EU will make the UK less safe “Companies … are unclear about their future,” comments Martin Warren of the Institute of Chartered Accountants in England and Wales. “Companies are making decisions now about jobs, supply chains, headquarters and asset locations, incurring significant, and possibly unnecessary, cost and upheaval.” Warren fears the destructive effects of a ‘no deal’ outcome and hopes politicians will break the deadlock and restore business confidence. Security implications of Brexit extend beyond economics. Loss of shared information with the EU will make the UK less safe. Extradition across EU borders will be more difficult, and exchange of data such as fingerprints and vehicle registrations is at risk. The Irish border after Brexit is of particular concern to security professionals. Countering threat of international terrorism Robert Hall of London First and Alison Wakefield of Security Institute say the security impact of departing the EU will be long lasting and profound. “In security terms, the UK will still have to contend with international terrorism, transnational crime and the global movement of people, all challenges that require wide scale cooperation.” They add that leaving the EU will require “a significant investment in people, resources and databases to cope with the anticipated volumes of traffic through ports, airports and tunnels.” Analyst company IHS Markit earlier commented about the impact on the security industry of Brexit’s drag on the UK economy, “Access control, intruder and fire alarm markets typically track construction rates closely and are forecast to be affected most. However, a large cut to infrastructure spending would be just as damaging to the video surveillance market.” UK security companies prefer ‘soft exit’ from EU If a ‘soft exit’ trade deal is not negotiated, the UK would have to revert to WTO trade rules If a ‘soft exit’ trade deal is not negotiated, the UK would have to revert to World Trade Organisation (WTO) trade rules, which means tariffs on trade between the UK and the EU, says IHS Markit. There are five British-based access-control and intruder-alarm vendors supplying the European market in significant quantity – each with revenue exceeding $10 million. IHS Markit estimates these companies combined account for less than 10 percent of total European, Middle-Eastern and African (EMEA) market revenues for both industries. Uncertain future of UK security marketplace Asset protection specialist VPS Security Services has warned that the ongoing Brexit saga will likely lead to a rise in vacant commercial and residential properties as developers and investors are more reluctant to move forward with their UK real estate strategies. Seemingly endless machinations and shifting proposals are making the eventual outcome of Brexit very much a guessing game. Uncertainty translates into a volatile and changing outlook, and the eventual impact on the broader economy is an open question. As a reflection of that economy, the security marketplace will inevitably feel the economic impact, too, not to mention the new security challenges likely to ensue.
For most people, prison ranks high on the list of places to avoid. Yet, take no pride: U.S. prisons are filled to capacity with individuals who have committed some type of crime that warrants incarceration. Prison Policy Initiative In 2018, according to data from the Prison Policy Initiative, there were 1.3 million U.S. adults in prison and 615,000 incarcerated in jails for crimes ranging from murder, manslaughter, illegal drug possession, burglary, theft, driving under the influence, property crimes, and more. In addition to traditional security concerns such as perimeter surveillance, ID card management, visitor and vendor management, crime, and theft, prisons and correctional facilities have unique security challenges that other enterprises typically do not have. Prison security Correctional facilities face regular security audits that are conducted by the National Institute of Corrections The challenges include inmate escapes, hostage situations, gangs, contraband, riots, and overcrowding, in addition to increasing privacy and regulatory mandates. Even more, correctional facilities face regular security audits that are conducted by the National Institute of Corrections. Security teams must always be on guard and watching every individual and action of the inmate population – for an inmate’s physical safety – in addition to their own. It is not uncommon for security staff and correctional officers to receive physical injuries from prisoners, especially when trying to break up an inmate fight or transporting them to other locations. Use of drones in prison smuggling An emerging concern for prison officials is the use of drones by individuals who are looking to smuggle drugs, cellphones, weapons, and other contraband into prisons for use by inmates. Many states are working on anti-drone legislation around correctional institutions. For example, Missouri is one of the most recent US States to have introduced legislation to tackle the problem. Missouri HB 324 would make it illegal for drone pilots to fly an unmanned aircraft near any correctional centre, private jail, county jail, municipal jail or mental health hospital. Anyone caught violating the law would be charged with a Class A misdemeanor and possibly other felony charges, depending on the pilot’s illegal intentions. Importance of video surveillance Video surveillance is a necessary security technology for prison and correctional facility staff, as it allows personnel to mitigate those unique security challenges. “Video surveillance is prevalent throughout facilities; even if it’s a typical two-bed jail cell or a 2,000 bed prison,” says Brad Wareham, Director of Key Accounts at Salient Systems. He adds, “In cases where facilities face a shortage of staff members to watch over the inmate population, video surveillance supports the oversight of inmates and increases accountability. Inmates know that despite the lack of staff and officer presence, they are being observed by cameras that can catch even the smallest details. Video surveillance can follow inmates anywhere. There are very few blind spots.” Upgrading to hybrid video surveillance systems They are upgrading to hybrid and/or fully digital solutions, all while maintaining the HMI model Increasingly, prisons and correctional facilities are upgrading their older analog video systems, due to age degradation and lack of adequate support resources. “They are upgrading to hybrid and/or fully digital solutions, all while maintaining the Human Machine Interfaces (HMI) model,” Wareham notes. “They continue to face security challenges typical of the corrections space, such as PLC controllers, RTSP capture, intercoms, lock controls, and more, which are atypical of larger facilities. In addition, many older analog solutions will eventually be cost prohibitive,” Wareham said, adding “and will no longer operate, due to an increasing inability to find replacement parts and to the proliferation of IP-based video surveillance solutions.” IP-based video surveillance systems For many correctional facilities, upgrading a video surveillance system to an IP-based solution, in addition to a video management system (VMS), makes sense and benefits a prison or correctional facility in multiple ways. Solutions exist that allow prison facilities to keep pre-existing hardware in place during an upgrade, while allowing for replacements and component upgrades as funding permits. Specific benefits that advanced video surveillance and VMS solutions can provide a correctional institution include: Increased Coverage – Many prisons and correctional facilities are large, and have multiple areas that need to be under surveillance, such as hallways, throughout cellblocks, healthcare facilities, dining areas, exercise yards, and more. Outdated systems may have a difficult time monitoring all areas, while an IP video system can provide continuous coverage of an entire facility Clarity of Video – Older analogue cameras struggle with the ability to provide clear images. New IP cameras, coupled with an advanced VMS, will produce crisp and clear images that are necessary to mitigate security risks. Inmate Tracking – One of the biggest benefit of a VMS solutions is video analytic software, which is capable of tracking a moving target and searching for specific objects. Video analytics can count human beings, monitor queues, and even identify a geographical location. VMS solutions allow security to search video archives quickly and find archived video that matches custom criteria within minutes, which is helpful in investigations. Alerts – Video analytics within a VMS solution can be programmed to detect specific activity and activate an alarm or alert system when the activity occurs. Facial Recognition – The ability to recognise a face is another key benefit of a VMS solution used in a crowded correctional institution, in particular when inmates may be wearing the same type and colour of clothing. Perimeters – Video surveillance placement on the exterior perimeter of a facility can document suspicious activity occurring in outside recreational yards where contraband can enter. Many VMS solutions allow for detecting movement throughout specific areas for an established duration of time. Mobility – The ability for correctional officers to view video on a mobile device is critical, given the large landscape of facilities. For example, Salient’s TouchView Mobile solution, combined with its CompleteView 20/20 VMS, allows users to instantly access, monitor and review live and recorded video from any camera connected to any CompleteView 20/20 recording server. Cameras from multiple servers can be accessed simultaneously with PTZ control. The solution’s DRS (dynamic resolution scaling) automatically sizes the video for live viewing, which significantly reduces network usage and provides higher frame rates over mobile connections. Securing prisons and correctional facilities You can’t have a correctional facility without video surveillance and an audit trail for forensic evidence" Overall, Wareham notes, video surveillance and VMS solutions are a necessary and critical solution for securing prisons and correctional facilities. “You can’t have a correctional facility without video surveillance and an audit trail for forensic evidence,” Wareham stated, adding “Facilities with challenging budget constraints are still required to have a functional Video Management System, regardless of the technology or age of their infrastructure.” Salient VMS solution For security integrators, Salient’s VMS solutions provide a steady ROI. “Salient plays a critical role in providing a viable cost per channel ROI that is superior in the VMS industry,” Wareham said. He adds, “As the requirements for third-party encoding hardware is negated, and coupled with our customer support for virtually all aspects of the detention and corrections space, Salient’s VMS solution addresses budget constraints”. For prisons and correctional facilities, an advanced video surveillance and VMS is not just a product, it is a necessity that enables correctional facilities to stay safe and secure. “In the corrections industry, surveillance goes hand in hand with the employee, inmate, and visitor safety, while coupled with procedural compliance and enforcement,” Wareham concluded.
Three more UK police forces have jointly upgraded to Sepura SC20 TETRA radios, significantly improving their front line officers’ ability to communicate with colleagues. Bedfordshire Police, Cambridgeshire Constabulary and Hertfordshire Constabulary made use of their joint purchasing power to equip officers from across all three forces with the new SC20 TETRA radios. In all over 1,900 radios were purchased across the three forces, to work alongside their existing fleet of Sepura radios. SC20 TETRA radios By using the SC20 TETRA radios, officers will benefit from powerful, robust radios with loud, clear audio By using the SC20 TETRA radios, officers will benefit from powerful, robust radios with loud, clear audio, ensuring that critical voice communications can be clearly heard and understood, even in noisy environments. In addition the radios are applications ready, meaning that each force can in time develop bespoke applications to enable quick, secure access to critical data. A key advantage of the Sepura solution is that their radio programming solution Radio Manager can work across different Sepura products, meaning that the transition to new devices is as smooth as possible. Intuitive user interface Andy Gregory, Business Development Director at Sepura said, “After conducting trials, the response from the forces was that the SC20 benefitted from robust design, an intuitive user interface and loud audio, making it ideally suited to the users’ operational needs. The sale is significant to Sepura of course, as Cambridgeshire are Sepura’s ‘home’ force, and many of our staff live in Bedfordshire and Hertfordshire where the new radios are now being deployed.” Gary Maughan, Regional Sales Director for the UK and Ireland at Sepura added, “Sepura radios continue to be chosen by police organisations in the UK and across Europe as the leading TETRA device available on the market today. We are proud to work with our local forces as we do with all UK police forces, ensuring that they are equipped with the best communication solution possible.”
Videalert, one of the UK’s renowned suppliers of intelligent traffic enforcement and management solutions, has supplied Wiltshire Council with a new mobile enforcement vehicle (MEV) which is initially being used to enforce residential permit parking in Salisbury. The vehicle is equipped with a complete suite of Videalert software giving it the ability to be used in future for a wide range of safety-related parking applications including bus stops and the enforcement of keep clears outside schools. The council is also deploying Videalert cameras to enforce two bus gates in Devizes. According to Joanne Pattison, Parking Manager at Wiltshire Council, “Videalert has provided the council with a flexible, hosted solution that will help us to significantly increase the productivity of the whole parking team. It will also enable us to cost effectively extend enforcement to other safety-related applications as required and provide a more efficient service.” Peugeot 108 equipped with ANPR cameras Videalert supplied a Peugeot 108 equipped with two roof-mounted ANPR cameras and two colour cameras Videalert supplied a Peugeot 108 equipped with two roof-mounted ANPR cameras and two colour cameras to capture contextual video evidence. The ONVIF-compliant cameras accurately capture reflective number plates at distances of up to 40 metres with capture rates of up to 98%. Importantly, this can be achieved with just a single pass at normal road speeds. Used in conjunction with the latest video analytics, the system delivers the highest productivity at the lowest operating cost in any traffic environment. Wiltshire Council is also installing Videalert cameras to enforce bus gates located at two housing developments in Devizes. These locations, situated next to main arterial routes into the market town, have previously been controlled using rising bollards, which have proved to be increasingly unreliable due to water damage. The first cameras have been installed at the Newman Road bus gate and will provide uninterrupted enforcement around the clock whilst delivering cost savings by eliminating the ongoing maintenance liability of the rising bollards. Hosted digital video platform Images of contraventions are transmitted to Videalert’s hosted digital video platform where evidence packs can be viewed and validated prior to sending to the council’s back office system for the issuance of penalty charge notices (PCN). Videalert’s flexible hosted platform makes it a quick and cost effective process to deploy enforcement as it does not require the installation of any IT at the council’s offices. To reduce the number of appeals, PCN recipients can view still photographs and video footage of the alleged offence over the internet. Tim Daniels, Sales and Marketing Director at Videalert added, “Videalert MEVs have proved to deliver industry-leading capture rates whilst consistently outperforming vehicles from other suppliers. These multi-purpose MEVs give councils greater flexibility to enforce a wide range of moving traffic and parking contraventions.”
Patriot One, developer of the PATSCAN Multi-Sensor Covert Threat Detection platform, is pleased to announce a collaboration partnership with Los Angeles Football Club (LAFC), part of Major League Soccer (MLS), to pilot its PATSCAN platform at Banc of California Stadium. Threat and intrusion detection “We are excited to announce this PATSCAN pilot deployment project with another U.S. major sport franchise,” said Martin Cronin, Patriot One CEO and president, adding “In the New Year, our installation team will begin work with the Los Angeles Football Club and Banc of California Stadium on this important game safety initiative. MLS fans will enjoy an added layer of security while attending their favorite team’s home games in Southern California”. Martin further said, “Our vision is to not only to create a world safe from acts of violence, but also to help save a way of life people have come to expect in their normal everyday lives, and that includes participating in professional sports and entertainment activities with their fellow fans.” PATSCAN Multi-Sensor covert threat detection The PATSCAN Multi-Sensor Covert Threat Detection platform will ship in January 2020 to the security team at LAFC The PATSCAN Multi-Sensor Covert Threat Detection platform will ship in January 2020 to the security team at Los Angeles Football Club, where they will be joined by Banc of California Stadium security and Patriot One implementation engineers to begin the integration and pilot deployment project. Specific location of the Platform’s deployment will not be disclosed. “Customer safety is our number one priority at Banc of California Stadium,” said LAFC Vice President of Information Technology Christian Lau. “We are excited to work with Patriot One to give customers an extra layer of security while attending events at our world-class venue in the heart of Los Angeles.” Stadium security Following the initial pilot deployment of the PATSCAN platform with LAFC at an undisclosed location within Banc of California Stadium, Patriot One will work with the team and stadium management to broaden deployment throughout the complex.
Round table discussion
The new year is several weeks old, so it is safe to say that many of our New Year resolutions have fallen by the wayside. Despite the limited success of our personal resolutions, the new year is a great time to take stock, look ahead, and plan to make 2020 the best year yet. Thinking about our industry as a whole, we asked this week’s Expert Panel Roundtable: What should be the security industry’s “New Year’s resolution?”
Public spaces provide soft targets and are often the sites of terrorist or active shooter attacks. Public spaces, by definition, require easy accessibility and unrestricted movement. Given that openness, what security technologies can provide real results? We asked this week’s Expert Panel Roundtable: How is technology innovation impacting the security of public spaces?
Statistically speaking, incidents of terrorism are unlikely to impact most businesses and institutions. However, the mere possibility of worst-case-scenario attacks is enough to keep security professionals awake at night. Compounding the collective anxiety is the minute-by-minute media coverage when an attack does occur. The immediacy of the shared experience of global tragedy impacts us all – including security system decision-makers. We asked this week’s Expert Panel Roundtable: How is the rise in terrorism impacting the physical security market?