BIRD Aerosystems, the developer of Airborne Missile Protection Systems (AMPS) and Airborne Surveillance, Information, and Observation (ASIO) solutions, Unveils the ASIO Holistic Solution: a complete end-to-end special mission task force solution tailored for maritime and ground surveillance missions. ASIO Holistic Solution is an advanced multi-layered solution that provides a multidimensional approach to combat diverse security threats within the maritime and ground domain. It is managed from a...
SMART SHOOTER, a designer, developer, and manufacturer of innovative fire control systems that significantly increase the accuracy and lethality of small arms, announces that it has successfully completed another step in testing the SMASH Hopper in different configurations. SMASH Hopper, SMART SHOOTER's Light Remote-Controlled Weapon Station (LRCWS), was mounted on Plasan Re’em’s Armoured Toyota Hilux and successfully shot and hit several moving ground and air targets from more than...
Tragically, in the world we now live, mass shootings and gun violence are epic concerns not only in schools, but Big Box retail, hospitals, municipal buildings, festivals, sporting events, concert venues, and just about anywhere crowds gather or work. The number of incidents is not acceptable and is truly startling. There are many societal and mental health issues that can cause these events and their importance in solving this issue is critical. However, this article will be focused on the tech...
The passive radar "TwInvis" of sensor solution provider HENSOLDT showed outstanding detection performance during a measurement campaign of the NATO Science and Technology Organisation under the leadership of the Polish armed forces. TwInvis passive radar sensor For this purpose, a passive radar sensor cluster with two sensors was installed on the Polish Baltic coast. During the measurement campaign, a system integrated in a container was used alongside a system variant integrated in a va...
Star Defense Logistics & Engineering (SDLE) is exhibitor, for the third consecutive time, at the International Defense Exhibition (IDEX) in Abu Dhabi. This week at the National Exhibition Center of the city, SDLE showcase its new unmanned aerial vehicle (UAV) for security indoor operations, in addition to its full range of unmanned aerial vehicles and its Anti-drone system for threats detection and inhibition. Indoor light drones in military use The indoor light drone is one of the latest S...
According to a recent report produced by IHS Markit, which specialises in providing insight on the areas that are shaping the business landscape, the number of video surveillance cameras equipped with advanced low-light functionality is set to soar over the next four years. Whilst it is estimated that in 2015 there were approximately 4.75 million of these types of cameras delivered to the market, in 2022 this number is projected to increase to about 51 million. Advanced low light functionality...
Soliton Systems K.K, a Japanese technology company specialising in IT security and mobile surveillance products, has successfully completed the certification of the Zao-S with Milestone’s XProtect video management platform. Mobile video transmission Utilised on a global stage with many law enforcement, first responder and emergency services, Soliton Systems manufactures the “Smart-telecaster Zao-S”, that allows instant encrypted video live streaming from remote mobile situations such as body worn actions cams, police surveillance vehicles, drones, helicopters and in some cases live streaming from dogs. This is achievable by the miniature device utilising multiple 4G connections simultaneously to live stream video reliably back to a command centre. The Zao-S, a lightweight yet powerful HEVC (H.265) mobile video transmission device, is used by many global law enforcement agencies The Zao-S, a lightweight yet powerful HEVC (H.265) mobile video transmission device, is used by many global law enforcement agencies and other public safety agencies to live stream for a variety of different applications such as public event surveillance, security, covert operations or live streaming from a body worn camera during police operations. In conjunction with Milestone’s XProtect VMS, it can be used to live stream high quality video that can then be displayed in real-time and recorded in the VMS environment with low latency and in full HD quality. XProtect VMS platform In addition to the Zao-S, Soliton have developed the “Zao Media Gateway” that is a receiving platform to recreate the H.265 stream from the multi-linked mobile networks and create IP video streams which for XProtect would be the H265/ONVIF over RTSP. The Zao Media Gateway can be operated in the cloud or in a customer’s own network (on-premises) and is used to stream to the VMS platform, or it can live stream to any destination in the world as required including laptops, tablets and smartphones. Regarding this partnership, Henrik Sydbo Hansen, Group Manager, Devices & Integrations commented as follows: “We are dedicated to working with partners in order to give our joint customers the perfect solution. At the same time, we are delighted to expand our mobile solutions portfolio with a partner like Soliton.” Surveillance cameras The Zao-S can be used with many off-the-shelf action cameras or surveillance cameras that supports HDMI or SDI The Zao-S can be used with many off-the-shelf action cameras or surveillance cameras that supports HDMI or SDI to live stream in full HD, with a latency typically of between 500ms to 1 second from the remote camera to the XProtect VMS back at a command centre. Henrik Sydbo Hansen continues: “We see a rapidly raising interest for highly mobile solutions, and the open platform approach in XProtect, means that we can present more and more partners meeting this demand.” Official support begun end of August 2018 when the Soliton solution was included in Milestones XProtect device pack version 9.9.
ISC East, sponsored by the Security Industry Association (SIA), the Northeast's premier security industry convention for new products, solutions and technologies, announced its co-locating with Infosecurity North America and Unmanned Security Expo (USE). This move provides security professionals with even more opportunities to yield the benefits of robust educational sessions, listen to high-level speakers, explore new products and services, network with fellow security industry members and more. ISC East, Infosecurity North America and Unmanned Security Expo will take place November 14-15, 2018 at the Javits Center in New York City. Cyber-physical crime prevention "New York is considered home to some of the most influential technology brands in the world. And given the city's burgeoning cybersecurity space, bringing Infosecurity North America and Unmanned Security Expo here is a natural fit, as well as an excellent way to facilitate face time with the best and brightest the city has to offer," said John Hyde, Exhibition Director, Infosecurity North America. "We're on track to drive over 4,000 security professionals to the show this year - many of who are executive-level decision makers. Co-locating with these two additional leading security shows opens the door of opportunity, helping attendees meet new companies and professionals who all have one common goal: bringing home tangible tactics to fight complex, evolving cyber threats." USE provides an area solely dedicated to Unmanned Aerial Vehicles (UAVs), Unmanned Ground Robotics & Vehicles (UGVs), counter-drone solutions Counter-drone security solutions The second year since its inception at ISC West in April 2017, USE provides an area solely dedicated to Unmanned Aerial Vehicles (UAVs), Unmanned Ground Robotics & Vehicles (UGVs), counter-drone solutions and the software and applications that support them. Attendees will have access to hands-on demos of the latest innovations in drone technologies, conversations with industry experts about changing FAA regulations, and more. Infosecurity North America & USE "With Infosecurity North America and Unmanned Security Expo co-locating with ISC East, attendees will have access to an abundance of resources and educational opportunities, arming them with the tools and skills needed to defend against today's emerging cyber-physical security threats," said Will Wise, Group Vice President of the ISC Security Portfolio at Reed Exhibitions. "We're looking forward to having these powerhouse conferences under the same roof for the first time and bringing the brightest minds in security together to knowledge-share." Listed on Trade Show Executive's Fastest 50 Lists, ISC East was named one of the "Fastest 50" growing shows in the country by Net Square Feet of Exhibit Space and is continuing to expand. Through its partnership with Infosecurity North America and USE, ISC East will attract more attendees than ever before, providing them with access to new companies, associations and industry peers, all in the same convention center.
The Security Industry Association (SIA) has opened registration for its annual public policy and government security technology conference, SIA GovSummit. At the 2018 SIA GovSummit, security industry leaders and government officials meet and examine technology requirements, review policy trends, and address evolving security challenges. Additionally, the Secure Schools Roundtable on day of the conference will address school security needs, funding, guidelines and standards. SIA will host SIA GovSummit 2018 at the NAHB headquarters conference facility, located at 1201 15th St NW, Washington, DC 20005, on June 27-28. Registration is open at the SIA GovSummit website.The first day of the conference will feature a full day of sessions on key government security topics, as well as networking events and the SIA Policy Leadership Awards dinner IT modernisation in focus “Particularly with the emphasis on IT modernisation and many active legislative priorities, federal and state governments are reviewing where to invest sin security technologies,” said Jake Parker, SIA Director of Government Relations. “SIA GovSummit allows government leaders and security industry professionals to collaborate, share information and assess security investment priorities. Our 2018 SIA GovSummit agenda shares wide-ranging perspectives on government security initiatives and helps the private and public sectors work together on important issues.” The first day of the conference will feature a full day of sessions on key government security topics, as well as networking events and the SIA Policy Leadership Awards dinner. Session topics for day one of SIA GovSummit government security conference include the following: New policies impacting security IT modernisation initiatives: Implications for security and surveillance Interagency Security Committee (ISC) policies and best practices: New initiatives in 2018 New OMB Identity Policy guidelines: Impact on Federal PACS CBP’s Technology Infrastructure Strategy for securing the border Procurement strategies Federal Category Management, GSA contracts and other procurement initiatives Harnessing innovations through lifecycle management and tech refresh strategies Navigating buy American and other domestic content requirements Standards for security technology Movement to the Cloud – Using FEDRAMP for video and other security applications Understanding the RMF process for DOD Information Technology NIST Standards Development and Security Key legislation Congressional staff discuss legislative developments in impacting use of security technology in defense, homeland security and critical infrastructure protection. Emerging technologies The role of Artificial Intelligence (AI) and Machine Learning in video and other applications Counter-UAS technology: The path forward for government and private security The growing uses of IP audio for threat detection Facial recognition goes mainstream: From law enforcement to border security Secure Schools Roundtable On day two of the SIA GovSummit conference, in addition to its member visits to Capitol Hill offices, SIA is expanding the popular Secure Schools Roundtable into a half-day event presented in cooperation with the Congressional School Safety Caucus.Important topics for the Secure Schools Roundtable include need for school security guidelines and standards This timely gathering will be held at room HVC 201 of the U.S. Capitol Visitor Center and will feature discussion with key stakeholders from government, education, law enforcement, and industry. Important topics for the Secure Schools Roundtable include: The need for school security guidelines and standards The role of the federal and state governments in funding school security The need for coordination among educators, school facility personnel and first responders in protecting our schools
Sofradir Group shareholders, Thales and Safran announced the appointment of Jean-François Delepau as its new chairman, with immediate effect. Previously managing director of ULIS, a Sofradir Group company, Mr. Delepau will oversee all the defence, aerospace and commercial market operations of the three companies within the Group: Sofradir, ULIS and US-based Sofradir-EC. “Jean-François’ vision, dedication to excellence and the wealth of his experience and career-long achievements fully equip him to take over the reins of the Sofradir Group. He has the board’s complete confidence in continuing to create growth opportunities." "His objectives are to reinforce the high quality and price competitiveness of the Group’s products and improve their time-to-market, whilst accelerating innovation within each company,” said the board representative.Jean-François has worked in different companies specialised in electronics and components in various positions Technology and management expertise “I am honoured to serve as chairman of the Sofradir Group. I’m confident that I can bring immediate value based on my past experience, determination and drive,” said Mr. Delepau. “I will help build upon the Group’s outstanding technologies, staff expertise and commitment as it embarks upon a new era of development.” Mr. Delepau (53) joined ULIS as deputy director in 2007. Previously he worked in different companies specialised in electronics and components in various positions (marketing, production). He also has eight years of experience as a technology and management consultant. Mr. Delepau graduated from Ecole Polytechnique in 1986 and Telecom Paris in 1988. He earned an MBA from Insead in 1994.
Clarion Events’ Defence & Security division has appointed Grant Burgham as the new Event Director for Defence and Security Equipment International (DSEI). With 17 years of experience working on major global events for organisers such as Reed Exhibitions, the Dubai World Trade Centre and Centaur exhibitions, Grant joins Clarion with a wealth of experience from the high-tech British engineering sector, IT & communications and the international maritime industry.Grant's skilled leadership and experience managing large-scale international events is a beneficial addition Event expertise DSEI is a major international event that brings together the global defence and security sector to innovate and share knowledge. The event represents the entire supply chain on an unrivalled scale. DSEI 2019 will have five key sector-focused Zones: Air, Land, Naval, Security and Joint, all showcasing the latest equipment and systems. Grant said: “It is a pleasure and an honour to have the responsibility of delivering DSEI, at a time when defence and security continues to dominate the global agenda. DSEI is known across the events industry to be 'best in class', and I am dedicated to ensuring that DSEI continues to evolve to meet the expectations and requirements of the industry we serve.” Tim Porter, Managing Director of Clarion Events’ Defence & Security division, said: “We are delighted to welcome Grant to the DSEI team. His skilled leadership and experience managing large-scale international events is a highly beneficial addition to the Clarion Events defence and security portfolio and will enhance our success and global recognition.”
International Procurement Services (IPS) will be exhibiting the full range of Research Electronics International (REIUSA) government-level electronic countermeasures equipment at the forthcoming ‘Closed’ Home Office event, Security & Policing 2018. Security & Policing will take place at the Farnborough International Exhibition and Conference Centre, Hampshire, UK from the 6th to the 8th March 2018. Information security solutions On Stand D19, International Procurement Services will be exhibiting all the latest REI electronic countermeasure equipment: The ANDRE locates nearby RF, infrared, visible light, carrier current, and other types of transmitters OSCOR Green Spectrum Analyser: It has been designed to detect illicit eavesdropping signals, perform site surveys for communication systems, conduct radio frequency (RF) emissions analysis, and investigate misuse of the RF spectrum. The OSCOR Green is a portable spectrum analyzer that sweeps 24 GHz in one second to quickly detect transmitting electronic surveillance devices and ensure that spectrum activity is captured. Talan Digital Telephone Analyser: The NEW TALAN 3.0 Telephone and Line Analyzer represents advanced capability to detect and locate illicit tampering and security vulnerabilities on digital, analogue, and VoIP telephone systems. New hardware provides the ability to test twisted pairs against modern telecommunication threats including shield and ground. ORION Non-Linear Junction Detector: All 3 versions of the ORION will be present. The hand-held ORION HX Deluxe Non-Linear Junction Detector (NLJD) has interchangeable 2.4 GHz and 900 MHz antenna heads. The ORION HX Deluxe NLJD is used to sweep areas for electronic semi-conductor components. The ORION 2.4 HX Non-Linear Junction Detector (NLJD) detects electronic semi-conductor components in walls, floors, ceilings, fixtures, furniture, containers, or other surfaces. The ORION 900 HX Non-Linear Junction Detector (NLJD) detects electronic semi-conductor components through dense materials such as bricks, concrete, and soil. ANDRE Advanced Detection Receiver: The ANDRE is a handheld broadband receiver that detects known, unknown, illegal, disruptive, or interfering transmissions. The ANDRE locates nearby RF, infrared, visible light, carrier current, and other types of transmitters. International distributors Employing over 70 people and providing electronic countermeasures equipment around the world for more than thirty years, REI is the name that governments around the world trust as manufacturers of the best overall countermeasures products available. As international distributors for REI, supplying more than 60 countries, IPS are proud to have been associated with Research Electronics for the past 25 years.
Workplace violence (WPV) cannot be 100% prevented. However, we know from experience that well-placed preparedness and prevention measures can significantly diminish the probability and severity of potential workplace violence. A prime example comes as an outgrowth of the multiple “going Postal” shootings at the U.S. Postal Service (USPS) by employees or ex-employees (mostly in the 1990s). Out of necessity, USPS implemented a comprehensive workplace violence programme throughout their organisation. As a result, with approximately 750,000 employees at the time, USPS went over eight (8) years without an employee or ex-employee shooting by utilising a workplace violence programme like the programme outlined herein. This author contributed to the development and implementation of the USPS programme in the 1990s. Formal people management training One noteworthy component that was implemented appeared to be a major contributor to the success of the USPS programme. Previously, supervisors and managers were promoted from within the ranks with no formal training in “people management.” The culture was one of mostly autocratic, top down management. As a part of the WPV programme, supervisors and managers were trained not only in identifying and reporting WPV threatening situations, but also in how to lead with dignity and compassion. The latter component seemed to be a vital cultural component that led to the success of the WPV programme. How to design a Workplace Violence Programme The following components of a comprehensive Workplace Violence Programme can be used as a template to assess one’s present WPV programme. This exhaustive list includes all the main components, and may include more or fewer controls according to individual organisation’s culture. Workplace violence policy: Defines workplace violence and consequences for policy Contains verbiage that will support managers who must confront potentially violent individuals. Content is periodically updated to address new issues and State laws, e.g., concealed weapons, gun possession in vehicles at work, bullying, discrimination, etc. Some organisations omit the “zero tolerance” statement in belief that it inhibits reporting of violations by employees who erroneously believe it implies automatic firing of violators. Threat notification system: Clearly communicated availability and access for reporting threatening behaviour and situations. Confidentiality for those who report is addressed. Anonymous reporting is typically available. Disciplinary action is defined for those knowingly making false reports. Reporting can be provided through an internal vs. external provider. Ongoing reminders (posters, flyers, etc.) are provided to employees and supervisors. Social media intelligence monitoring: Ongoing monitoring of openly available social media posts that identify warnings, threatening discourse, mental health disorders associated with violent ideation, and other signs of violence against people and the workplace. Monitoring can be provided through internal or external resources. Protocol is established for reporting monitored threats to management and timely, appropriate response. Threat management team: Multidisciplinary management team trained and exercised in handling threatening situations. The team is responsive to threat notifications on a timely and thorough basis. At a minimum, representation from legal, HR and security are core members. Other disciplines are included, e.g., union reps and/or additional staff positions, as appropriate. External team members and specialists are included as core or ad hoc members. As a part of the WPV programme, supervisors and managers were trained in identifying and reporting WPV threatening situations External relationships established: Relationships are established with professionals and specialists to support the Threat Management Team, e.g., local law enforcement, threat assessment and defusing professionals, attorney(s), judges with jurisdiction over domestic violence and injunctive relief, guard services, surveillance, covert, investigations, executive protection, dispute resolution, hostility management, linguistic analysis, IT forensics, polygraph testing, outplacement services, etc. Threat management team manual and system: Clear and actionable guidelines for managing threatening situations are utilised for effective, efficient and defensible threat management. The same protocol is used, even though team members may change. Guidelines include immediate actions, assessment, investigations, defusing methods, follow-up, purposeful disengagement, and legally compliant documentation. Authority, communications and expectations are defined. Pre-employment reference checking / Criminal background checks: Reference-check questions to assess potentially violent job applicants that previous employers feel compelled to report, e.g., “So I can document my file, do we have any reason to be concerned about this applicant from a workplace violence standpoint?” Protocol for legally-compliant pre-employment and “for-cause” criminal background checks. Character-based pre-employment interview questions: Pre-employment interviews designed to identify individuals with violent history, character problems, entitlement issues, anger and sociopathic tendencies. Compliance with “ban the box” legislation related to hiring persons with criminal histories. Hostility management training: Take-and-use methods for managers, supervisors and employees regarding how to calm hostile situations in real time vs. Inadvertently provoking increased aggression or violence. Corporate security programme: Physical and IT Security Director(s) that integrate violence-related threat management (prevention, preparedness and response) with other appropriate corporate disciplines, e.g., HR, legal, facilities, site management, unions, etc. Methods established for investigating electronically-generated threats. Physical security audit: Periodic assessment of facilities, property, security systems and other methods for monitoring and preventing breaches and potential violence. It is best if this audit is conducted under attorney privilege. Tracking of threatening situations: Ongoing Management Information System (MIS) that identifies, compiles, and tracks data re: the occurrences of threats (toward people, the organisation, reputation, and/or property) i.e., electronic, written, verbal, symbolic, etc. Risks may be related to location of workplace(s) in a community, industry incidents, local crime rates, employee population, previous incidents, near misses, etc. Tracking of motives could be related to supervisor/employee conflicts, employee-on-employee hostilities, domestic violence, drugs and alcohol, crime/robberies, toxic work environment, union/management conflicts, activist groups, terrorism, political, kidnap and ransom, etc. External provider screening: Investigation of methods used by external providers to screen out potentially violent contractors in your workplace, e.g., temporary placement agencies, catering services, consultants, contractors, security services, etc. The WPV programme should include reference-check questions to assess potentially violent job applicants that previous employers feel compelled to report Layoffs/Terminations protocol: Guidelines and protocol for preparation and implementation of disciplinary meetings, layoffs, and for-cause terminations when hostility and potential violence are a concern. Caring communications, crisis actions, staging of the meeting, law enforcement or guard services, threat assessment and defusing psychologist, outplacement services, severance payments, protection of dignity, etc. may be included in the preparedness planning. Supervisory training: Methods for disciplining and managing employees who are potentially violent or hostile. Skills training regarding the people-side of supervision, e.g., caring and compassionate handling of employee issues and human complexities that arise during supervision and working relationships. Employee workplace violence publicity: Ongoing information about the organisation’s WPV programme, recognising and reporting threatening situations, and hostility management methods. Orientation for employees at least annually and for new employees. Employee assistance programme: EAP provider that has access to skilled anger management specialists and an internal threat-related “duty-to-warn” protocol that involves more than solitary judgment of the clinician, i.e., collaborative/supervisory procedures when potential violence is a concern. EAP professionals that are trained in boundary issues regarding when it's appropriate to utilise outside resources into potentially violent situations, e.g., organisation’s management, law enforcement, threat specialists, etc. Avoidance of unethical “dual relationships” where the EAP is serving the threatening individual and the Threat Management Team simultaneously. EAP should have local domestic violence relationships, e.g., women’s shelters, men’s stopping violence groups, etc. Domestic violence programme: Guidelines and assistance for employees who are subjected to, or notice evidence of, domestic violence. Protocol for domestic threats that can come into the workplace, if additional employees are targeted, and when restraining orders are issued by employees, especially when the violator’s access to the workplace is prohibited. Employee survey: Inclusion of violence issues in employee surveys. Alternative dispute resolution programme: Methods to address situations that may include hostilities and potential violence, e.g., structured intervention by threat-experienced psychologist, coaching, facilitated communications, negotiation, mediation, collaborative law and arbitration. Emergency and post-crisis response system: Evacuation, shelter in place, active shooter plan, lock down, safe rooms, etc. with employee/supervisory training and exercises on a periodic basis. Floor warden system. Beyond emergency response, development of strategic crisis management preparations for senior management to protect core assets affected by violent incidents, e.g., employees, key relationships, reputation, finances, shareholder value, brand, operations and physical/intellectual property. These guidelines are listed as a generic template to help an organisation evaluate their present Workplace Violence Programme. A comprehensive programme may not include each of these components and it may include other elements that are not listed herein. This checklist is to be used with prudent management judgment in designing a comprehensive Workplace Violence Programme that best fits the organisation’s time, budget, culture, and risk tolerance.
The height strip camera blends into the storeenvironment, conducting covert surveillanceundetected by potential criminals Video security systems could see a spike in Taiwan’s store security market, as more manufacturers start to release covert “height strip” cameras. These cameras offer an inconspicuous surveillance solution for Taiwan’s huge number of convenience stores, who are easy targets for criminals. One of the first things that potential criminals check for at their target stores or banks is where the security cameras are mounted, so they can avoid their faces being captured as evidence. Since the majority of surveillance cameras are ceiling-mounted, baseball caps or hoods are often used to avoid being caught on camera in a recognisable way. Capturing reliable facial images for identification is crucial to the security of stores and banks or any other business that can fall prey to criminals. Covert camera benefits for store security Specialty covert cameras such as height strip cameras provide a simple, yet discreet and cost-effective way to augment store security in small systems. As its exterior is disguised as a height strip, the camera blends in with the environment and its existence is unnoticed. In addition, such cameras are often placed by the exit, where fleeing criminals are most concerned about avoiding security cameras. Capturing reliable facial imagesfor identification is crucial to thesecurity of stores and banks orany other business that can fallprey to criminals VIVOTEK enters the height strip camera market This summer, Taiwanese security manufacturer VIVOTEK joined other big names, such as Axis, Honeywell and Verint in adding a height strip camera to its product offering. While it is not the first in the market to launch such a product, it has the advantage of being offered geographically within a large potential vertical market – Taiwan has the largest density of convenience stores in the world. Convenience stores: a vertical market, but vulnerable to crime According to 2014 statistics cited by China Times, a local news source, Taiwan has 10,000 convenience stores, or one for every 2,000 residents. These stores live up to their claims of convenience – catering their product offerings to their niche community, in addition to providing a wide array of services. These include mailing domestic and international packages, ATM banking, laundry service, and the collection of bills, traffic violation, tax and credit card payments. For instance, one convenience store located in Taipei 101, a must-visit for tourists, stocks up on pineapple cakes that are popular amongst tourists who take them back as souvenirs. Another located next to a duty-free store takes payments in Chinese Yuan, while those in scenic areas offer seating for customers to enjoy the breathtaking view while sipping store-bought coffee and nibbling on store-bought snacks. Since convenience stores are “alwaysopen”, 24 hours a day, 7 days a week,even during the worst weather, theycan become easy targets for criminals.Moreover, convenience store productsare small and can be easily smuggledout of the shops without detection Statistics from 2005 ACNielsen Shopper Trends have shown that on average, out of a national population of 23 million, 80 percent of the Taiwanese urban household shoppers visit a convenience store at least once a week and 14 times a month. Since convenience stores are “always open”, 24 hours a day, 7 days a week, even during the worst weather, they can become easy targets for criminals. Moreover, convenience store products are small and can be easily smuggled out of the shops without detection. This makes height strip cameras ideal for optimising the video surveillance system within stores. Furthermore, all convenience stores currently have a height strip installed by the exit, so customers and would-be criminals may be so accustomed to its existence that they won’t suspect its true function. Height strip camera market potential Despite the large number of convenience stores in Taiwan, the market is not as fragmented as one might assume. Four major companies operate the convenience stores, with the exception of an isolated few. For instance, China Times reported that the convenience store industry leader owns approximately 5,000 stores, followed by 2,900 for the second largest, and 1,296 and 800 stores by the third and fourth largest, respectively. In other words, these are large projects not to be taken lightly!
If airport perimeter fencing is vulnerable then covert detection methods should be used Lack of airport perimeter security would be laughable, if it weren’t so serious. A recent farcical breach of security in London is drawing renewed attention to airport perimeter protection. I want to focus on airport perimeter security, but we’ll start with critical infrastructure in general: A nun, a housepainter and a gardener break into a nuclear facility. This sounds like the beginning of a joke except it was a disturbing reality when the trio (the nun proving to be exceptionally limber at the age of 82) defeated perimeter fencing at the Y-12 National Security Complex in Oak Ridge, Tennessee, a facility that houses the United States’ stocks of bomb-grade uranium and missiles confiscated from Libya’s Colonel Gaddafi. Perimeter breach at JFK airport This incident occurred in July 2012, and only a month later, a man on a jet ski clambered out of the water on the edge of John F. Kennedy International Airport, scaled a perimeter fence and walked along a runway apron. Reading a news item about this at the time, I missed a fundamental point. It should be noted that Daniel Casillo’s craft had broken down and he was neither an activist nor a deliberate trespasser. He had swum for three miles, was scared, tired and on the verge of hypothermia. His first action on nearing a terminal building was to make his presence known to a cargo worker. But it gets worse. JFK was exposed twice on consecutive days in June of this year when a would-be fisherman went over a fence, and an uncle and nephew duo deliberately tried to summon help by shaking another fence violently after the engine of their boat had failed. Consider what a group of determined jihadists equipped with bolt-cutters and weapons could do amid such lax perimeter protection. It’s enough to give me sleepless nights, and I don’t even work in airport security. Negligent security at Heathrow airport I thought I’d seen it all until I switched on the news earlier this month to see activists dressed as polar bears on the northern runway of London’s Heathrow International Airport after they had cut away a sizable section of chain link fence. Am I alone in thinking that terror groups might look at mainstream news sources and get ideas? The activists are from the environmental group Plane Stupid and were protesting plans for expansion at Heathrow. They assembled a tripod device themselves out of poles, and news channels chose to go with an extraordinary photograph of a polar bear (who has tactfully raised part of his headgear) being coaxed down by firemen on a cherry picker. Glasgow International’s breach incident It would be amusing if the security risks exposed were not so grave. Again, am I in a minority as I remember how Glasgow International, an airport I’ll fly into next month for my annual holiday, was attacked during 7/7 week in the UK when a radicalised British-born doctor drove a flaming Jeep Cherokee into its perimeter? Airport security options are comprehensive; there’s a robot that travels on a fence-mounted monorail checking for unusual situations Airport perimeter security solutions Airports are secured (or not) by techniques including conventional plain fencing (typically a minimum of 6 feet high and topped with razor wire), microphonic fencing, terrain-following volumetric sensors, fibre optic sensors, digital microwave, infrared sensors, ground radar (often used in a sterilized zone between two fences), conventional “white light” CCTV with motion detection and thermal imaging cameras. The options are comprehensive, and one manufacturer even has a robot that travels on a fence-mounted monorail checking for unusual situations that may indicate an intrusion. The robot uses laser detection to alert against possible fence damage and suspicious objects. My own hope is that tumbling prices of thermal cameras (as manufacturers who have recouped their initial R&D costs allow the products to be more commercially viable) will see the units become more widespread. By definition they excel in low light and are effective at large perimeters. The “thermograms” they produce are high-contrast and therefore well suited to video analytics. I also believe that if fencing is going to prove consistently vulnerable then the airport community should bolster it with more use of covert detection methods. On a visit to a testing field run by one of the world’s largest (and most technically agile) manufacturers, I observed buried volumetric sensors being calibrated to fine tolerances so that they could reliably distinguish between human intruders and wildlife based not just on weight but pattern of movement. Unaccounted intrusion incidents In the United States, the Transportation Security Administration (TSA) is responsible on a nation-wide basis for screening passengers and baggage, but individual airports are tasked with securing their perimeters, a distinction that suggests the government thinks threats are more likely to come from within. Concerns have been voiced over the fact that, frequently, manned guarding is not even performed by airport staff but by poorly motivated casual workers from third-party contracting companies. If a trespass incident does not result in a police log then contractors will be showing exceptional integrity if they report each and every event to the airport. In turn, it’s naïve to expect airports to behave with complete transparency towards the TSA. They certainly don’t co-operate with the media, and earlier this year, the Port Authority of New York & New Jersey (responsible for Kennedy, LaGuardia and Newark airports) refused to give full accounts of intrusion incidents to the Associated Press. Threat and risk assessment Airports need to work with specialist consultants who can conduct penetrative threat assessments, and equipment specifiers in the US may wish to consult the National Safe Skies Alliance. Tennessee-based Safe Skies not only assesses the functionality of airport security equipment but exploits field conditions that are so realistic they can make predictions about whole life cycles. I don’t subscribe to the passive acceptance that only a terrorist atrocity resulting from a perimeter breach will finally spur the aviation community to put its house in order. Israel is of course a special case but the sector as a whole might like to note that a spokesperson for Ben Gurion in Tel Aviv announced earlier this year that the airport spends $200 million annually on perimeter protection alone. Returning to the recent intrusion at Heathrow; now well into middle age, I’m plagued with the usual incredulity as to what is going on around me. It hits everybody at my time of life. Have 13 people in polar bear costumes really just penetrated Europe’s busiest airport with seemingly little more effort than would have been required to break into a chicken coop?
Demand for covert cameras in the home has doubled in the last two years, according to one camera supplier. These additional “hidden” cameras are also increasingly being networked into home security systems, and installation of the newest covert IP cameras is do-it-yourself easy. Covert cameras appeal to consumers who don’t want the industrial look of video cameras disrupting their décor. They are also the latest variation on “nanny-cams” that keep watch while parents and/or homeowners are away. “The price has come down, and the products are becoming easier to use,” says Todd Morris, founder and CEO of BrickHouse Security, a direct-to-consumer and business-to-business supplier of security cameras. “Previously they were very hard to use and to install.” A covert camera catches what’s happening when someone in the home doesn’t know they’re being observed BrickHouse Security’s newest product, introduced at the ASIS 2014 show in Atlanta, is a remote-view hidden camera designed to be easily integrated with a complete home security system. Retailing at right under $200, the Observa camera sits unobtrusively on a bookshelf and looks like a Bluetooth-type audio speaker. The WiFi-enabled camera inside offers cloud-based video recording and storage and even infrared “night vision” technology to see in the dark. “There are two main reasons people choose a covert camera,” says Morris. “One is aesthetics -- they just don’t want a camera to stand out because it’s ugly.” (They also don’t want holes drilled in their walls, which isn’t necessary with WiFi connectivity.) Another reason is an extension of the “nanny-cam” concept. A covert camera in the home can provide additional peace-of-mind to working parents concerned about babysitters taking care of their children. The growing need for two-income households is driving demand. Video can also keep watch on the activities of maids, dog walkers, home healthcare workers or even someone who’s watering the plants. “It answers questions such as ‘Did they show up? Did they do what they said they would do? Did they do anything else?’” says Morris. A covert camera catches what’s happening when someone in the home doesn’t know they’re being observed. Other uses include monitoring vacation homes and keeping up with teenagers. Outside the home, video can provide an early warning of an intruder or prevent vandalism. Covert IP cameras are now pre-configured to be easy to install by a homeowner. Basically, installation involves plugging the camera in and pushing a WPS button that automatically links to a homeowner’s router, does a “handshake” and is connected to the cloud-based service. Customers are provided a secure user name and password in an email before the camera even ships. Everything is Web-based, and there are apps to access video via smart phones and tablets. Entry by Google (which now owns DropCam) into the home video camera market is good news because it helps to raise awareness, says Morris. “A rising tide lifts all boats.” He notes that companies from Google to local cable companies are advertising to promote the idea of video surveillance in the home. Covert IP cameras are now pre-configured to be easy to install by a homeowner Covert cameras are just part of a broadening range of video products available for the home market. Beyond the two models currently provided by DropCam, other manufacturers offer cameras for the home that have pan-tilt-zoom, can be installed outdoors, and are enclosed in domes. BrickHouse Security itself has more than 100 designs and does 60 percent of its business over the Internet. BrickHouse also sells to some dealers, and refers customers to dealers if they seek professional installation services. There are only two limitations on where a covert camera can be placed in the home. In the case of a live-in nanny or maid, the camera cannot be placed inside his or her bedroom (where they would expect privacy). Also, cameras cannot be placed inside bathrooms, although they can be placed outside a bathroom looking into the door. “Video inside the home is so much less expensive and easier to use,” says Morris. “There’s a massive influx of new people it is available to.”
Chester Zoo has grown rapidly since its foundation in 1930 so that today it is spread across more than 125 acres, and is home to more than 15,000 animals and 500 different species. It attracts more than 1.9 million visitors each year - making it the most popular UK visitor attraction outside London. With further growth planned, Chester Zoo began a site-wide vulnerability assessment, led by the zoo’s then head of security, Nigel Peers, out of which flowed a series of recommendations for modernisation of the zoo’s security. Zoo security requirements The Zoo needed a fully-integrated and networked camera system to enable the security team to spot and act on all threats faster; tighten perimeter security; improve visitor and staff health & safety monitoring; and support keepers in assuring the welfare of the animals in their charge. The new system needed to be centralised to support the fully-professionalised security patrolling team. However, video also needed to be distributed effectively to enable health & safety officers, keepers and researchers, to view specific sets of camera images when necessary. All this was only possible working in close partnership with IP video specialist systems integrator NW Systems Group. Improving image quality and coverage NW Systems, once on site, initially discovered that many of the legacy CCTV cameras were generating poor images. NW Systems replaced approximately 60 faulty CCTV cameras with new Axis network cameras. Meanwhile, all remaining CCTV cameras were networked using AXIS M7016 and M7014 Encoders, alongside all new network camera transmissions. A total of 160 new Axis cameras were installed and networked by NW Systems across the original or ‘core’ zoo, The Islands and elsewhere, together providing much more comprehensive coverage site-wide. AXIS P3225-LVE cameras were installed in numbers across The Islands, partly because of their versatility and robustness making it possible to site them both inside and outside animal enclosures. Special attention was paid to siting of cameras for total discretion. Where surroundings required, camera housings were camouflaged, thereby offering highly unobtrusive surveillance. In addition, the newly centralised control room was fitted with the very latest video management software (VMS) from Milestone Systems. The new IP video system also supports post-event follow-up - including supplying timely, high quality video footage to the Police when necessary Tightened security at main entrance and car park NW Systems also provided increased coverage across the recently renovated Jubilee Quarter, the Zoo’s main entrance and large car park serving it. It also installed several Axis Q6000-E PTZ Dome Network Cameras, alongside Axis C3003-E Outdoor Network Horn Speakers, clamped onto existing lighting masts throughout the car park. This enables the Zoo’s security team to monitor activity around the 1000-vehicle capacity car park, for the protection of visitors and their belongings. The loud speakers can be used to transmit live messages to arriving visitors to guide them towards the entrance and to deter any potential wrong-doing. Animal welfare and keeper safety needs NW Systems was also called in to help solve a specific concern of the Zoo’s Lead Elephant Keeper, associated with opening large gates to let the elephants out of the Elephant House into the wide-open habitat and back into the elephant house at night. The existing remote door control system was now supported by high quality live views provided by five-megapixel AXIS P1357-E network cameras covering the doors. These same cameras were also being used to capture the magical moments of elephants giving birth to their babies – three baby elephants have been captured on these cameras over the last 18 months. The video sequences were shown live via the Zoo’s website and recordings have been also been kept for marketing purposes. Rationalise, network and centralise security operation Over a three-year period, working in close partnership with the UK’s largest visitor attraction outside London and largest zoo in the UK, NW Systems has helped Chester Zoo to rationalise, network and centralise its security operation, underpinning the professionalisation of the Zoo’s security team. NW Systems has also provided the right platform for distribution of high quality video images to meet zoo keepers’ specific operational and research needs. The new system also now supports keepers’ animal welfare and behaviour research requirements - helping them to spot and discourage inappropriate visitor interaction with animals. It provides vital evidence in case of any incidents which might result in insurance claims. The new system also now supports keepers’ animal welfare and behaviour research requirements Potential threat identification From a security perspective, helping the Zoo’s security team to identify potential threats more rapidly – using video images to brief patrolling officers on where to go and what to anticipate on arrival. The system enables the security team to assess and prevent escalation of any threat by moving rapidly and effectively to the scene and then, once there, acting in a way that is proportionate with a pre-identified threat. The new IP video system also supports post-event follow-up - including supplying timely, high quality video footage to the Police when necessary. The result is a state-of-the-art IP camera system which transmits video from nearly 300 Axis cameras to a modern, IP-based centralised control room. It also offers the potential to deliver live and recorded video to patrolling officers’ mobile devices on the ground when the time is right. Vanderbilt networked intruder alarms have also been installed by NW Systems to further protect key buildings around the site. "Chester Zoo now has a video security platformwhich is highly reliable, expandable and future-proof" Beyond standard security surveillance Nigel Peers, Security Manager, Chester Zoo, summarised: “Chester Zoo now has a video security platform which is highly reliable, expandable and future-proof. We know that whatever our requirement in terms of intelligence, video analytics and integration with other physical security systems such as intruder alarms or access control systems; it’s possible to bring it all together with our new IP video system displayed in the Zoo’s new security control room. Speed and appropriateness of response to threats is now assured.” Frank Crouwel, Managing Director of NW Systems, added: “I’m very proud that we’ve been able to work with Chester Zoo every step of their three-year journey to upgrade and harden their physical security provision; while also creating a camera system which supports many other operational requirements from visitor and staff health and safety, to animal welfare and behaviour research, as well as retail management and loss prevention.” Gareth Simpson, Head of Site Operations at the Zoo said: “I’m very pleased that we selected NW Systems to help transform our security provision, working alongside our Security Manager Nigel Peers and the rest of my team. They’ve been highly responsive and sensitive to our unique, multi-dimensional needs which go way beyond standard security surveillance: using cameras for everything from visitor and staff safety, animal welfare monitoring and behaviour research studies, right through to meeting and exceeding tightening Crowded Places terrorist-threat mitigation requirements and supporting the Police with any enquiries. NW Systems is a great long-term partner for us.”
Customs and Border Protection needed a faster way to correlate information about the location and status of arms The Australian Customs and Border Protection Service is responsible for the protection of the Australian community, while supporting legitimate trade and travel. At a time of unprecedented threat levels – illicit drug trafficking, terrorism, people smuggling – Customs and Border Protection manages the security and integrity of Australia’s borders, working closely with other government and international agencies, to detect and deter unlawful movement of goods and people across the border. Rapid commerce and travel growth Concurrently, Customs and Border Protection is responsible for protecting Australian economic interests during an era of rapid growth in international commerce and travel. By enforcing trade regulations and collecting tariffs, Customs and Border Protection helps Australia compete in a global economy. “Customs and Border Protection plays a vital role in national security, derived from its broader responsibilities at the border and the extensive powers, expertise and technology it brings to bear,” said Michael Carmody, Chief Executive Officer, of Australian Customs and Border Protection Service. “Modernisation of customs organisations will remain imperative, with the Australian Customs and Border Protection Service motivated by continuing pressure for more sophisticated and integrated processes.” Border protection responsibility Border protection responsibility lies in the capable hands of over 5500 Customs and Border Protection employees in over 50 locations around Australia and overseas, and is managed from the Central Office in Canberra. The Customs and Border Protection Strategic Outlook (2007) projects that by 2015, these employees will assume responsibility for the annual oversight and management of: 1 million international passengers 7 million import sea containers 7 million export sea containers 5 million air cargo consignments 220 million postal articles 22,865 arriving ships Protecting the Australian community demands sophisticated intelligence, targeting high-risk aircraft, vessels, cargo, postal items and travellers. It also requires sophisticated tools, including thousands of items of weaponry, protective gear, specialised equipment and vehicles. Furthermore, effective deployment and management of these tools is vital to assure the safety and security of Customs and Border Protection’s officers, and the 22.6 million Australian citizens they serve and protect. Search for a solution Prior to 2011, Customs and Border Protection maintained a system of separate spreadsheets to track and manage this considerable arsenal. More importantly, the view from Central Office in Canberra lacked immediacy. Lags in reporting times could lead to delays in repairing or replacing critical equipment, or in identifying a missing or stolen weapon. What Customs and Border Protection sought was a fast and easy way to correlate information about the location and status of arms and bulletproof vests with the officers to which they had been assigned. As staff across different locations kept their own spreadsheets, Customs and Border Protection needed a solution that could easily deliver accurate and up to date views to Central Office. Under Michael Carmody’s imperative for more efficient, integrated processes, the Australian Customs and Border Protection Service issued a global tender for an asset tracking system. They discovered a partnership between Relegen and HID Global best fit their needs. Customs and Border Protection opted to use the Relegen asset solution, with assetDNA software The Relegen solution Relegen specialises in the development and delivery of asset intelligence solutions. The Australian Defence Force [ADF] has employed Relegen’s technology – assetDNA™ – to manage critical assets for over a decade. The similarities between the ADF’s and Customs and Border Protection’s asset management needs, combined with the flexibility of the assetDNA solution, made Relegen the clear choice around which to build Customs and Border Protection’s new system. The Relegen solution is enhanced by their assetDNA software technology, which enables users to assign a globally unique identity to each asset. In this case, Customs and Border Protection have opted to use the assets’ serial number. This identifier is then carried by Relegen’s proprietary assetDNA tagging solution. A third layer of security is added through DataTraceDNA®, a covert security technology from DataDot Technology Ltd. This means that even in the event that the assetDNA tag is removed or destroyed, Customs and Border Protection can still identify the asset as one of their own. “Our ten plus years’ experience at a mission-critical level with the Australian Defence Force prepared us well to deliver the comprehensive asset tracking solution Customs and Border Protection requires,” reports Paul Bennett, Managing Director, Relegen. “The combination of our assetDNA software and multi-layer, intelligent tagging solution enables Customs and Border Protection to track each asset uniquely. Even if a tag is separated from a weapon, Customs and Border Protection can still identify the asset through DataTraceDNA.” HID Global RFID The ability of assetDNA to track each asset uniquely, and in real-time, is made possible by radio frequency identification technology from HID Global. A world leader in the development and production of innovative identification tags and readers, HID provides innovative asset tags and technical support vital to the Customs and Border Protection solution. Before HID could recommend tagging solutions, a thorough assessment of each asset was required: How is the asset used, by whom is it used, and under what conditions? For Customs and Border Protection, each tag must withstand the rigors of daily use under potentially hazardous conditions. HID manufactures asset tags that adhere and function under extreme conditions, resisting impact and vibration, and exposure to saltwater and chemicals. HID was able to provide Customs and Border Protection with a customised compilation of RFID tagging solutions According to Paul Bennett, “assetDNA is a powerful asset intelligence system. However, our ability to collect data is enormously dependent on reliable tags that can withstand the rigors of daily use in extreme conditions. That’s why we rely on HID. Their tags perform.” “All Customs and Border Protection assets were analysed in terms of materials of construction and conditions of use,” says Tony Hilder, Sales Director, Industry and Logistics for Asia Pacific HID Global. “Then, we were able to match a HID tag to deliver the necessary level of reliable performance over the life of each asset.” Customised RFID tagging solutions HID was able to provide Customs and Border Protection with a customised compilation of RFID tagging solutions that will: Withstand impact and vibration – on an assault rifle, or in a physical confrontation Resist exposure to harmful elements – including saltwater, or chemical agents Install covertly and inconspicuously – to prevent detection or tampering Maintain data integrity and performance – assuring systemic veracity The HID Logi Tag® Family is being applied where mechanical, chemical and temperature resistance is imperative, with the HID IN Tag Family providing ruggedised tag solutions for severe environs. Greater security for officers Relegen and HID are working together to help implement the sophisticated asset tracking system across all Customs and Border Protection locations. This includes the tagging of each of the armaments and critical assets in each agency, as well as training for all Customs and Border Protection personnel. The result will be a comprehensive system that gives Customs and Border Protection a real-time view of all assets deployed and in inventory, empowering the Central Office to make critical decisions based on the latest information at-hand. It will also mean greater safety and security for Customs and Border Protection officers. Officers can perform their duties, confident they have been issued the correct equipment, and assured that it is in proper working order. In addition, the new system further minimises the risk that weapons may be stolen or remanufactured. Significant productivity enhancements The new system will also enable optimisation of asset use. Customs and Border Protection can now identify each asset’s progress through its lifecycle, and identify specific assets in need of immediate repair or replacement. Customs and Border Protection will recognise significant productivity enhancements in staff time spent mustering their formidable arsenal. Going forward, the Customs and Border Protection asset-tracking system provides a model for any organisation managing operation-critical assets, in routine or emergency response situations. Worldwide, police forces, fire departments, emergency medical teams, hospitals, and other organisations are employing solutions from Relegen and HID Global to respond quickly and comprehensively in emergencies, provide better safety for their employees, and drive the performance of their mission critical assets more effectively.
Using Predator Hybrid cameras, The Oracle security team can view all aspects of the shopping centre Looking to move to a totally IP surveillance camera network in the future but wanting to upgrade their current analogue cameras now, The Oracle shopping centre, Reading, is fulfilling both criteria—by installing the innovative Predator Hybrid camera from CCTV design and manufacturing company, 360 Vision Technology. Network cameras Opened in September 1999, the first phase of The Oracle was followed in November of that year by The Riverside, a stylish choice of restaurants, pubs, and cinema. The final phase completed the development in May 2000, which was officially opened by the Princess Royal. Along with The Riverside’s 22 restaurants, cafés, and bars, The Oracle’s 90 stores and shops increases Reading's retail outlet footage by thirty-three percent. Visitors to the centre can utilise its two large car parks, which provide 2,300 vehicle spaces. Securing such a vast retail space presents a challenge for the on-site security team at The Oracle. The team consists of a mixture of guards in public areas of the centre, and highly skilled operators working in the CCTV control room, from where they can view a network of over 300 static, covert, PTZ, and dome cameras.Visitor safety “As our security consultant of choice for many years, we have enjoyed a successful relationship with Zada Technology Ltd, in which time we have built a working relationship that has seen the installation of further cameras to our system,” explains Andy Salmon, Security Manager at The Oracle. “For the latest upgrade, we had some concerns about investing in analogue cameras, only to be faced with them becoming obsolete and having to replace them in the future when we upgrade our control to IP, which will happen in the next round of planned rolling upgrade programme.” Predator Hybrid camera “High-definition images from the Predator Hybrid cameras mean we don’t have to deploy our guards to every situation” “We specified the 360 Vision Technology Predator Hybrid to provide both analogue and HD functionality in a single PTZ camera,” explains Adam Parsonson-Smith, Technical Director at shopping centre security specialist Zada Technology Ltd. “It’s the perfect choice for use at The Oracle. This patent-pending technology means that when their installation moves to HD infrastructure, the Hybrid camera’s standard analogue 4:3 images can be replaced with a full HD 1080p output—at the flick of a camera switch and with no additional equipment required.”Predator Hybrid also features ONVIF compliant or 360SDK protocols for fast set-up and IP68 certification to ensure continued performance in the harshest of environments—all backed by 360 Vision Technology’s comprehensive 3-year warranty, and their design and manufacturing base in the UK.Identifying suspicious behaviour Using the new Predator Hybrid cameras, the Oracle security team can view all aspects of the shopping centre’s malls and its vast car parks, in HD quality. These high-definition images are a great improvement on the original images and assist the control room team to easily identify suspicious and anti-social behaviour. Better quality images also ensure that known offenders can be identified as soon as they enter the centre, and their behaviour monitored and recorded whilst they are on-site. This new, unparalleled HD overview of the entire centre allows security, management, and health & safety decisions to be made swiftly—based on a comprehensive visual summary of monitored situations. If a situation or incident requires one of the security team to attend, effective resources can be directed to the location via radio link from the control room. “High-definition images from the Predator Hybrid cameras mean we don’t have to deploy our guards to every situation,” explains Andy. “Using the new cameras we can monitor the situation and only deploy our manned guarding team if necessary—this frees them to perform other tasks and helps me as manager use the resources at my disposal for best effect and in the most economical way.” “The Hybrid camera’s standard analogue 4:3 images can be replaced with a full HD 1080p output” Cost-effective solution “Predator Hybrid’s designed-in seamless integration and simple set-up meant minimal installation time and therefore minimal disruption to The Oracle’s business trading during camera installation,” adds Adam. “This provided The Oracle management with the assurance and satisfaction derived from a quick camera changeover procedure and minimal downtime while the work was carried out.”The Oracle management team is now enjoying a future-proofed and cost-effective surveillance solution that is set to provide many years of continual service. The new 360 Vision Technology Predator Hybrid cameras are providing a highly-effective security and management tool—affording peace of mind to the millions of customers who visit The Oracle shopping centre each year.