According to a recent report produced by IHS Markit, which specialises in providing insight on the areas that are shaping the business landscape, the number of video surveillance cameras equipped with advanced low-light functionality is set to soar over the next four years. Whilst it is estimated that in 2015 there were approximately 4.75 million of these types of cameras delivered to the market, in 2022 this number is projected to increase to about 51 million. Advanced low light functionality...
Soliton Systems K.K, a Japanese technology company specialising in IT security and mobile surveillance products, has successfully completed the certification of the Zao-S with Milestone’s XProtect video management platform. Mobile video transmission Utilised on a global stage with many law enforcement, first responder and emergency services, Soliton Systems manufactures the “Smart-telecaster Zao-S”, that allows instant encrypted video live streaming from remote mobile situati...
ISC East, sponsored by the Security Industry Association (SIA), the Northeast's premier security industry convention for new products, solutions and technologies, announced its co-locating with Infosecurity North America and Unmanned Security Expo (USE). This move provides security professionals with even more opportunities to yield the benefits of robust educational sessions, listen to high-level speakers, explore new products and services, network with fellow security industry members and more...
The Security Industry Association (SIA) has opened registration for its annual public policy and government security technology conference, SIA GovSummit. At the 2018 SIA GovSummit, security industry leaders and government officials meet and examine technology requirements, review policy trends, and address evolving security challenges. Additionally, the Secure Schools Roundtable on day of the conference will address school security needs, funding, guidelines and standards. SIA will host SIA Go...
Sofradir Group shareholders, Thales and Safran announced the appointment of Jean-François Delepau as its new chairman, with immediate effect. Previously managing director of ULIS, a Sofradir Group company, Mr. Delepau will oversee all the defence, aerospace and commercial market operations of the three companies within the Group: Sofradir, ULIS and US-based Sofradir-EC. “Jean-François’ vision, dedication to excellence and the wealth of his experience and career-long ac...
Clarion Events’ Defence & Security division has appointed Grant Burgham as the new Event Director for Defence and Security Equipment International (DSEI). With 17 years of experience working on major global events for organisers such as Reed Exhibitions, the Dubai World Trade Centre and Centaur exhibitions, Grant joins Clarion with a wealth of experience from the high-tech British engineering sector, IT & communications and the international maritime industry.Grant's skilled leade...
International Procurement Services (IPS) will be exhibiting the full range of Research Electronics International (REIUSA) government-level electronic countermeasures equipment at the forthcoming ‘Closed’ Home Office event, Security & Policing 2018. Security & Policing will take place at the Farnborough International Exhibition and Conference Centre, Hampshire, UK from the 6th to the 8th March 2018. Information security solutions On Stand D19, International Procurement Services will be exhibiting all the latest REI electronic countermeasure equipment: The ANDRE locates nearby RF, infrared, visible light, carrier current, and other types of transmitters OSCOR Green Spectrum Analyser: It has been designed to detect illicit eavesdropping signals, perform site surveys for communication systems, conduct radio frequency (RF) emissions analysis, and investigate misuse of the RF spectrum. The OSCOR Green is a portable spectrum analyzer that sweeps 24 GHz in one second to quickly detect transmitting electronic surveillance devices and ensure that spectrum activity is captured. Talan Digital Telephone Analyser: The NEW TALAN 3.0 Telephone and Line Analyzer represents advanced capability to detect and locate illicit tampering and security vulnerabilities on digital, analogue, and VoIP telephone systems. New hardware provides the ability to test twisted pairs against modern telecommunication threats including shield and ground. ORION Non-Linear Junction Detector: All 3 versions of the ORION will be present. The hand-held ORION HX Deluxe Non-Linear Junction Detector (NLJD) has interchangeable 2.4 GHz and 900 MHz antenna heads. The ORION HX Deluxe NLJD is used to sweep areas for electronic semi-conductor components. The ORION 2.4 HX Non-Linear Junction Detector (NLJD) detects electronic semi-conductor components in walls, floors, ceilings, fixtures, furniture, containers, or other surfaces. The ORION 900 HX Non-Linear Junction Detector (NLJD) detects electronic semi-conductor components through dense materials such as bricks, concrete, and soil. ANDRE Advanced Detection Receiver: The ANDRE is a handheld broadband receiver that detects known, unknown, illegal, disruptive, or interfering transmissions. The ANDRE locates nearby RF, infrared, visible light, carrier current, and other types of transmitters. International distributors Employing over 70 people and providing electronic countermeasures equipment around the world for more than thirty years, REI is the name that governments around the world trust as manufacturers of the best overall countermeasures products available. As international distributors for REI, supplying more than 60 countries, IPS are proud to have been associated with Research Electronics for the past 25 years.
IFSEC Global has announced that Microsoft CSO Mike Howard, security consultant Don Randall MBE and Baroness Neville-Jones, chair of the British Joint Intelligence Committee (JIC), star on a 30-strong judging panel for its ‘Top influencers in Security and Fire 2018.’ Lead judge Grant Lecky, co-founder of the Security Partners Forum, drew on his extensive contacts network to appoint a diverse line-up of judges. He said: “Many of these judges were appointed based on strong recommendations and all are award winners themselves – often multiple times. They could hardly be better positioned to identify the next generation of influencers coming through.” Acknowleding security professionals “Several have even appeared among IFSEC’s influencers in previous years. Though being a judge bars them from appearing this time round, they’re all only too happy to ‘send the elevator back down’ to other professionals doing great things in the fire and security industries.”, he added. Lecky himself featured in IFSEC Global’s list of top influencers in 2014 and 2017. In the last year alone, he has won five prestigious accolades, including a spot on the Canadian Who’s Who and an Outstanding Achievement in Global Cybersecurity (OAGCS) Award from the Ontario College of Management and Technology. Judging panel for ‘Top influencers in Security and Fire 2018’: Ahmed Qurram Baig, co-founder, CISOCONNECT Baroness Neville-Jones, chair, British Joint Intelligence Committee (JIC) Carol Osler, Senior VP, head of financial crimes, fraud management, enterprise project management Cath Goulding, head of IT security, Nominet David Burrill, co-founder, Burrill Green Denis Lauretou, Head of Security & Safety, chez Banque de France Diana Burley, executive director & chair, Institute for Information Infrastructure Protection Don Randall MBE, senior adviser, Pilgrims Group Dr Robert Docherty, MD, Flame Risk Solutions Francisco Poley Herrera, security director, European Federation of Security Directors GB Singh, editor, Security Today & Security Update Ian Moore, CEO, FIA Izabela Albrycht, chair, Kosciuszko Institute & CYBERSEC Jason Brown, national security director, Thales Lynn Mattice, MD, Mattice & Associates Lynwen Connick, CISO, ANZ Banking Group Martin Harvey, Tyco International Mike Howard, CSO, Microsoft Mike Hurst, vice chairman, ASIS UK chapter Pauline Norstrum, MD, NetVu Ltd Peter Houlis, MD, 2020Vision Systems Rachaell Saunders, CEO, National Protective Services Steve Durbin, MD, ISF Steve Lasky, editorial director, Southcomm Security Media Group Tacito Leite, director of security, Indra Theresa Payton, CEO, Fortalice Una Riley, CEO, iAudit Consultants Ltd Victoria Ekhomu, MD, Trans-World Security Systems Ltd & School of Management & Security Wendy Bashnan, Deputy Assistant Secretary General for Security, NATO Yvan De Mesmaeker, Secretary general of the European Corporate Security Association The top influencers in Security and Fire 2018 will be announced in the IFSEC Security Briefing to be held in May 2018.
Following the success of the first Hereford Defence and Security Expo in 2017, Harrison Clark Rickerbys, one of the UK’s Top 100 law firms, is organising a second major defence and security expo, the Three Counties Defence and Security Expo (3CDSE) 2018, which will be held at the Three Counties Showground, Malvern on 31st May 2018. The event, which will be of interest to those involved in private and public safety and security, crime prevention and those serving in the police forces as well as to those in the military and broader defence and security industry, is the inspiration of Richard Morgan, partner and head of the Defence, Security and the Forces team at Harrison Clark Rickerbys. Richard said; “The first event at The Courtyard Theatre, Hereford, was over-subscribed, reaching the venue capacity of 30 exhibitors (with an unfulfilled waiting list of interested businesses) and 400 delegates, who attended from across the UK. Building on this success, the event has been scaled up, and we’re delighted that the Three Counties Showground in Malvern will be this year’s venue, with capacity for up to 150 exhibitors and 2,000 delegates.”Local business groups and government bodies have partnered with Harrison Clark Rickerbys to support the event Business networking He continued; “The regional dynamic and still relatively intimate scale of the event offers business to business networking opportunities between contributors to the defence and security sector in the Three Counties area as well as with prime contractors and the military. This means that unlike larger expos, delegates have the opportunity to meet with decision makers.” 3CDSE will be run in partnership with The Manufacturers’ Organisation (EEF) and its dedicated defence sub-group, National Defence Industries (NDI). Local business groups and government bodies, including the Herefordshire & Worcestershire Chamber of Commerce, Worcestershire Local Enterprise Partnership, Worcestershire Business Central, Hereford Enterprise Zone/Skylon Park, Gloucestershire Local Enterprise Partnership have also partnered with Harrison Clark Rickerbys to support the event. Support and participation With a theme of innovation, commitments of support and participation have been received from many senior military speakers including Brigadier Robin Sergeant, Head of Future Force Development of the British Army; Danny Wootton, Head of Innovation, MoD and Colonel Jani Marok RMR, Head of the Royal Marine Reserves. Leading defence and security experts from prime industry contractors such as Vodafone, BAE Systems and Thales will also be presenting and exhibiting, alongside leading defence and security businesses and experts based in the Three Counties. The exhibition space will be zoned, to include cyber security, hardware and vehicles, IT and communications (C4ITS) and unmanned aerial vehicles.Given the introduction of DEFCON 658, GDPR and the NIS Directive, we see the value in our sector coming together Sharing security lessons Dr Alex Tarter, head of Cyber Consulting at Thales, has been working in the field of critical national infrastructure cyber security for over 10 years, and will be one of the presenters at the event. Dr. Tarter said; “Thales believes in the strength and diversity of the defence and security supply chain which is why we’re happy to support the Three Counties Defence and Security Expo." "Given the recent significant changes to our industry through the introduction of DEFCON 658, GDPR and the NIS Directive, we see the value in our sector coming together, sharing valuable lessons learned and contributing to the creation of a vibrant and secure environment for UK PLC to continue to blossom on the world-stage.” Workshops and presentations In addition to the presentation programme, there will be a networking breakfast with a keynote speaker, as well as a full day of workshops and presentations covering international trade, grants and finance and practical information about doing business with the MoD.3CDSE will appeal to those operating in the defence and security industry Outside the exhibition hall there will be a military display; inside, alongside the main defence and security exhibition, there will be a professional village presenting organisations such as banks and recruitment businesses who provide professional advice and specialist services to the defence industry. Members of the West Midlands Reserve Forces’ and Cadets’ Association will also be on hand to answer employer queries about the MoD’s Employer Covenant. Richard Morgan concluded; “3CDSE will appeal to those operating in the defence and security industry, those seeking products and services from the industry and those seeking to engage with the industry for joint ventures, employment, education or other initiatives.”
Leading security figures from across the globe, including representatives from the United Nations, Europol, NATO, European Commission and the National Police Chiefs Council, will travel to London this March to discuss counter terrorism strategy, operations and best practice at the annual World Counter Terror Congress. The two-day conference, taking place from 6-7 March at Olympia, London, will see speakers and delegates debate the terror threats facing nations today and discuss future policy for national security. With topics ranging from counter radicalisation tactics, the major challenges within modern European communities and the emerging threats on modern infrastructure, more than 20-plus high-ranking officials will lead the congress providing invaluable insights and best-practice examples to more than 1,000 attendees.Dr Jamie Shea will lead a discussion on the current threat landscape Effective and sustainable Security Union Among the speakers will be Sir Julian King, European Commissioner for the Security Union, European Commission, who will discuss the steps required to build an effective and sustainable Security Union, strengthening the fight against terrorism and organised crime, reinforcing the security response to radicalisation and tackling terrorist propaganda and hate speech online. Dr Jamie Shea, Deputy Assistant Secretary General for Emerging Security Challenges, NATO HQ will lead a discussion on the current threat landscape and requirements for domestic security. He will also share insights and feedback into the technologies used to combat terrorism.The World Counter Terror Congress will welcome security leaders from across the globe to discuss ways to detect and disrupt potential terror threats Improving national security Metropolitan Police’s Assistant Commissioner, Mark Rowley, will also feature on this year’s programme. He will discuss national security and share his vast experience with delegates attending the World Counter Terror Congress. As Britain’s most senior anti-terror policy officer, Rowley has served in the police for over three decades and is credited for working alongside intelligence services to foil 23 terror attacks in the UK since 2013, as well as doubling the number of arrests by counter terrorism officers in the last year. Mr. Richard Barrett, Coordinator of the Al-Qaeda/Taliban monitoring team of the United Nations Security Council and former MI6 will chair the two-day conference. Speaking about the World Counter Terror Congress, Richard said: “Security professionals are faced with a growing challenge to stay one step ahead of the evolving threats facing the UK and other nations. Collaborating to develop a multi-faceted intelligence-led approach is key to preventing future attacks." "The World Counter Terror Congress will welcome security leaders from across the globe to discuss and help delegates identify ways to detect, deter and disrupt potential terror threats.”The conference will facilitate discussion on best practice to defeat the ongoing terror threat to people, businesses and nations Countering radicalisation and extremism The World Counter Terror Congress will feature more than 20 sessions, covering counter terror initiatives; evolving strategies to counter radicalisation and violent extremism; enhancing interoperability; the role of technology and the EU ITCEN; and tracking the movements and intentions of extremists. Among those confirmed to speak, Christian Rousseau, Executive Director, Integrated Terrorism Assessment Centre, Government of Canada; Henrik Hansen, Director, Preventative Security, Danish Security and Intelligence Service; Detective Chief Superintendent Scott Wilson, National Counter Terrorism Protect and Prepare Coordinator, National Counter Terrorism HQ; and Detective Chief Superintendent Dermont Robinson, Head of Counter Terrorism, City of London will lead sessions on day one of the conference. The World Counter Terror Congress will take place from 6-7 March in London during the internationally renowned Security & Counter Terror Expo (SCTX) 2018. Run in close correspondence with the UK’s Home Office CONTEST Strategy, Cabinet Office, CT Police and Emergency Services, the conference will facilitate discussion on best practice to defeat the ongoing terror threat to people, businesses and nations.
Surveillance manufacturer IDIS has unveiled its Covert Modular Cameras (DC-V3213XJ) at this year’s Intersec, at the Dubai World Trade Center. Available in options featuring a 4.3mm or 2.5mm fixed lens, the new covert cameras offer easy installation with new and existing DirectIP® network video recorders (NVRs) so that customers can simply add the cameras to their current systems, effectively protecting their existing investment. Adaptability in new features The new covert cameras also feature full-HD resolution, two-way audio, alarm in and out, PoE, a day and night infrared cut filter (ICR), true-wide dynamic range as well as supporting ONVIF. Customers have the option of using micro SD/SDHC/SDXC cards to benefit from IDIS Smart Failover, so that in the event of a lost connection between the camera and NVR, the camera’s card beings to temporarily recording, and once the connection is restored the card automatically transfers the data back to the NVR. Speaking at the show, Peter Kim, IDIS Senior Director, Global Technology Center, commented: “The new convert cameras really bolster our product and technology line-up, especially for the retail and banking sectors where we are seeing the most demand. The new convert cameras really bolster our product and technology line-up" Protection against failure “The new covert cameras are perfectly sized for ATMs, particularly when paired with the compact sized IDIS NVR (DR-1204P) that benefits from the protection IDIS Smart Failover. All sectors can also benefit from IDIS Critical Failover, which includes more than just Smart Failover. If any part of the surveillance infrastructure fails, the IDIS system recognises the failure and then switches to a redundant system, which is critical especially for banking and financial organisations. "Previously, this process has taken precious time and resources when done manually; plus, redundant equipment can be expensive. With IDIS Critical Failover we can offer multi-layered protection, with all the benefits of a redundant standby system, but at a significantly lower cost. “These cameras also make for a powerful IDIS retail solution that also includes a smart and cost-effective video analytics solution, VA in the Box; the company’s DD-1216 decoder (which enables 16ch real-time display), and the HE-1101 HDMI encoder, which allows for comprehensive PoS monitoring.”
At Intersec, IDIS featured its award-winning flagship DirectIP technology platform, enhancements to popular stalwarts (including the DirectCX analogue offering and highly lauded IDIS Solution Suite modular video management software), and debut new technology, including new efforts in the area of deep learning, poised to redefine video surveillance as we know it for years to come. Specifically, IDIS highlighted the following innovations and latest technologies at Intersec 2018: A powerful range of vertical surveillance solutions, including solutions for banking that feature the IDIS Covert Modular camera (DC-V3213XJ), sized perfectly for ATMs, and the multi-layered protection of IDIS Critical Failover. IDIS’ retail solution includes a smart and cost-effective video analytics solution, VA in the Box; the company’s DD-1216 decoder (which enables 16-inch real-time display), and the HE-1101 HDMI encoder, which allows for comprehensive PoS monitoring. IDIS have further unveiled a new, full range of 4K cameras, each featuring Intelligent Codec, which provides up to 90% savings in storage capability, an essential benefit for those seeking to leverage the full potential of high-resolution 4K technologies. Fast, accurate and scalable IDIS Deep Learning Analytics, powered by the IDIS Deep Learning Engine, which offers nimble monitoring of people, cars and bicycles; and alerts for object detection, loitering and intrusion — all adapted to fit a 16:9 ratio. Now with offerings spanning the IDIS 4-ch DR-1204P NVR (meeting the technological and affordability requirements of smaller operations) to the next-generation IDIS Deep Learning Analytics, IDIS are as committed as ever to meeting “any surveillance need, of any size.” A complete line-up of H.265 cameras and NVRs, including the newly-enhanced IDIS 12MP Super Fisheye Camera, which offers improved specifications and performance, and the powerful IDIS DR-8364 NVR, which features 900Mbps throughput, redundant power and IDIS Smart Failover technologies. Harry Kwon, General Manager of IDIS Middle East and North Africa, noted: "IDIS is looking forward to our upcoming appearance at Intersec 2018, and the opportunity it always provides to connect with industry players, including treasured partners and customers, both existing and potential.” “In 2017, we celebrated two decades of innovation as we recognised our 20th anniversary year. 2018 is a new year and a particularly exciting time for IDIS, as we look forward to shaping the next 20 years of video surveillance with continued technological advancement, the introduction of next-generation offerings, and our deep dive into deep learning and artificial intelligence and ensure it is applied in a practical and beneficial way to meet the industry’s most critical needs.” “As always, we’ll do it with applicability, affordability, and ease of use at the forefront. We look forward to sharing this and more on stand at Intersec, and we guarantee visitors to our booth this year will not be disappointed as we tell the story of why it’s not the same. It’s IDIS."
Workplace violence (WPV) cannot be 100% prevented. However, we know from experience that well-placed preparedness and prevention measures can significantly diminish the probability and severity of potential workplace violence. A prime example comes as an outgrowth of the multiple “going Postal” shootings at the U.S. Postal Service (USPS) by employees or ex-employees (mostly in the 1990s). Out of necessity, USPS implemented a comprehensive workplace violence programme throughout their organisation. As a result, with approximately 750,000 employees at the time, USPS went over eight (8) years without an employee or ex-employee shooting by utilising a workplace violence programme like the programme outlined herein. This author contributed to the development and implementation of the USPS programme in the 1990s. Formal people management training One noteworthy component that was implemented appeared to be a major contributor to the success of the USPS programme. Previously, supervisors and managers were promoted from within the ranks with no formal training in “people management.” The culture was one of mostly autocratic, top down management. As a part of the WPV programme, supervisors and managers were trained not only in identifying and reporting WPV threatening situations, but also in how to lead with dignity and compassion. The latter component seemed to be a vital cultural component that led to the success of the WPV programme. How to design a Workplace Violence Programme The following components of a comprehensive Workplace Violence Programme can be used as a template to assess one’s present WPV programme. This exhaustive list includes all the main components, and may include more or fewer controls according to individual organisation’s culture. Workplace violence policy: Defines workplace violence and consequences for policy Contains verbiage that will support managers who must confront potentially violent individuals. Content is periodically updated to address new issues and State laws, e.g., concealed weapons, gun possession in vehicles at work, bullying, discrimination, etc. Some organisations omit the “zero tolerance” statement in belief that it inhibits reporting of violations by employees who erroneously believe it implies automatic firing of violators. Threat notification system: Clearly communicated availability and access for reporting threatening behaviour and situations. Confidentiality for those who report is addressed. Anonymous reporting is typically available. Disciplinary action is defined for those knowingly making false reports. Reporting can be provided through an internal vs. external provider. Ongoing reminders (posters, flyers, etc.) are provided to employees and supervisors. Social media intelligence monitoring: Ongoing monitoring of openly available social media posts that identify warnings, threatening discourse, mental health disorders associated with violent ideation, and other signs of violence against people and the workplace. Monitoring can be provided through internal or external resources. Protocol is established for reporting monitored threats to management and timely, appropriate response. Threat management team: Multidisciplinary management team trained and exercised in handling threatening situations. The team is responsive to threat notifications on a timely and thorough basis. At a minimum, representation from legal, HR and security are core members. Other disciplines are included, e.g., union reps and/or additional staff positions, as appropriate. External team members and specialists are included as core or ad hoc members. As a part of the WPV programme, supervisors and managers were trained in identifying and reporting WPV threatening situations External relationships established: Relationships are established with professionals and specialists to support the Threat Management Team, e.g., local law enforcement, threat assessment and defusing professionals, attorney(s), judges with jurisdiction over domestic violence and injunctive relief, guard services, surveillance, covert, investigations, executive protection, dispute resolution, hostility management, linguistic analysis, IT forensics, polygraph testing, outplacement services, etc. Threat management team manual and system: Clear and actionable guidelines for managing threatening situations are utilised for effective, efficient and defensible threat management. The same protocol is used, even though team members may change. Guidelines include immediate actions, assessment, investigations, defusing methods, follow-up, purposeful disengagement, and legally compliant documentation. Authority, communications and expectations are defined. Pre-employment reference checking / Criminal background checks: Reference-check questions to assess potentially violent job applicants that previous employers feel compelled to report, e.g., “So I can document my file, do we have any reason to be concerned about this applicant from a workplace violence standpoint?” Protocol for legally-compliant pre-employment and “for-cause” criminal background checks. Character-based pre-employment interview questions: Pre-employment interviews designed to identify individuals with violent history, character problems, entitlement issues, anger and sociopathic tendencies. Compliance with “ban the box” legislation related to hiring persons with criminal histories. Hostility management training: Take-and-use methods for managers, supervisors and employees regarding how to calm hostile situations in real time vs. Inadvertently provoking increased aggression or violence. Corporate security programme: Physical and IT Security Director(s) that integrate violence-related threat management (prevention, preparedness and response) with other appropriate corporate disciplines, e.g., HR, legal, facilities, site management, unions, etc. Methods established for investigating electronically-generated threats. Physical security audit: Periodic assessment of facilities, property, security systems and other methods for monitoring and preventing breaches and potential violence. It is best if this audit is conducted under attorney privilege. Tracking of threatening situations: Ongoing Management Information System (MIS) that identifies, compiles, and tracks data re: the occurrences of threats (toward people, the organisation, reputation, and/or property) i.e., electronic, written, verbal, symbolic, etc. Risks may be related to location of workplace(s) in a community, industry incidents, local crime rates, employee population, previous incidents, near misses, etc. Tracking of motives could be related to supervisor/employee conflicts, employee-on-employee hostilities, domestic violence, drugs and alcohol, crime/robberies, toxic work environment, union/management conflicts, activist groups, terrorism, political, kidnap and ransom, etc. External provider screening: Investigation of methods used by external providers to screen out potentially violent contractors in your workplace, e.g., temporary placement agencies, catering services, consultants, contractors, security services, etc. The WPV programme should include reference-check questions to assess potentially violent job applicants that previous employers feel compelled to report Layoffs/Terminations protocol: Guidelines and protocol for preparation and implementation of disciplinary meetings, layoffs, and for-cause terminations when hostility and potential violence are a concern. Caring communications, crisis actions, staging of the meeting, law enforcement or guard services, threat assessment and defusing psychologist, outplacement services, severance payments, protection of dignity, etc. may be included in the preparedness planning. Supervisory training: Methods for disciplining and managing employees who are potentially violent or hostile. Skills training regarding the people-side of supervision, e.g., caring and compassionate handling of employee issues and human complexities that arise during supervision and working relationships. Employee workplace violence publicity: Ongoing information about the organisation’s WPV programme, recognising and reporting threatening situations, and hostility management methods. Orientation for employees at least annually and for new employees. Employee assistance programme: EAP provider that has access to skilled anger management specialists and an internal threat-related “duty-to-warn” protocol that involves more than solitary judgment of the clinician, i.e., collaborative/supervisory procedures when potential violence is a concern. EAP professionals that are trained in boundary issues regarding when it's appropriate to utilise outside resources into potentially violent situations, e.g., organisation’s management, law enforcement, threat specialists, etc. Avoidance of unethical “dual relationships” where the EAP is serving the threatening individual and the Threat Management Team simultaneously. EAP should have local domestic violence relationships, e.g., women’s shelters, men’s stopping violence groups, etc. Domestic violence programme: Guidelines and assistance for employees who are subjected to, or notice evidence of, domestic violence. Protocol for domestic threats that can come into the workplace, if additional employees are targeted, and when restraining orders are issued by employees, especially when the violator’s access to the workplace is prohibited. Employee survey: Inclusion of violence issues in employee surveys. Alternative dispute resolution programme: Methods to address situations that may include hostilities and potential violence, e.g., structured intervention by threat-experienced psychologist, coaching, facilitated communications, negotiation, mediation, collaborative law and arbitration. Emergency and post-crisis response system: Evacuation, shelter in place, active shooter plan, lock down, safe rooms, etc. with employee/supervisory training and exercises on a periodic basis. Floor warden system. Beyond emergency response, development of strategic crisis management preparations for senior management to protect core assets affected by violent incidents, e.g., employees, key relationships, reputation, finances, shareholder value, brand, operations and physical/intellectual property. These guidelines are listed as a generic template to help an organisation evaluate their present Workplace Violence Programme. A comprehensive programme may not include each of these components and it may include other elements that are not listed herein. This checklist is to be used with prudent management judgment in designing a comprehensive Workplace Violence Programme that best fits the organisation’s time, budget, culture, and risk tolerance.
The height strip camera blends into the storeenvironment, conducting covert surveillanceundetected by potential criminals Video security systems could see a spike in Taiwan’s store security market, as more manufacturers start to release covert “height strip” cameras. These cameras offer an inconspicuous surveillance solution for Taiwan’s huge number of convenience stores, who are easy targets for criminals. One of the first things that potential criminals check for at their target stores or banks is where the security cameras are mounted, so they can avoid their faces being captured as evidence. Since the majority of surveillance cameras are ceiling-mounted, baseball caps or hoods are often used to avoid being caught on camera in a recognisable way. Capturing reliable facial images for identification is crucial to the security of stores and banks or any other business that can fall prey to criminals. Covert camera benefits for store security Specialty covert cameras such as height strip cameras provide a simple, yet discreet and cost-effective way to augment store security in small systems. As its exterior is disguised as a height strip, the camera blends in with the environment and its existence is unnoticed. In addition, such cameras are often placed by the exit, where fleeing criminals are most concerned about avoiding security cameras. Capturing reliable facial imagesfor identification is crucial to thesecurity of stores and banks orany other business that can fallprey to criminals VIVOTEK enters the height strip camera market This summer, Taiwanese security manufacturer VIVOTEK joined other big names, such as Axis, Honeywell and Verint in adding a height strip camera to its product offering. While it is not the first in the market to launch such a product, it has the advantage of being offered geographically within a large potential vertical market – Taiwan has the largest density of convenience stores in the world. Convenience stores: a vertical market, but vulnerable to crime According to 2014 statistics cited by China Times, a local news source, Taiwan has 10,000 convenience stores, or one for every 2,000 residents. These stores live up to their claims of convenience – catering their product offerings to their niche community, in addition to providing a wide array of services. These include mailing domestic and international packages, ATM banking, laundry service, and the collection of bills, traffic violation, tax and credit card payments. For instance, one convenience store located in Taipei 101, a must-visit for tourists, stocks up on pineapple cakes that are popular amongst tourists who take them back as souvenirs. Another located next to a duty-free store takes payments in Chinese Yuan, while those in scenic areas offer seating for customers to enjoy the breathtaking view while sipping store-bought coffee and nibbling on store-bought snacks. Since convenience stores are “alwaysopen”, 24 hours a day, 7 days a week,even during the worst weather, theycan become easy targets for criminals.Moreover, convenience store productsare small and can be easily smuggledout of the shops without detection Statistics from 2005 ACNielsen Shopper Trends have shown that on average, out of a national population of 23 million, 80 percent of the Taiwanese urban household shoppers visit a convenience store at least once a week and 14 times a month. Since convenience stores are “always open”, 24 hours a day, 7 days a week, even during the worst weather, they can become easy targets for criminals. Moreover, convenience store products are small and can be easily smuggled out of the shops without detection. This makes height strip cameras ideal for optimising the video surveillance system within stores. Furthermore, all convenience stores currently have a height strip installed by the exit, so customers and would-be criminals may be so accustomed to its existence that they won’t suspect its true function. Height strip camera market potential Despite the large number of convenience stores in Taiwan, the market is not as fragmented as one might assume. Four major companies operate the convenience stores, with the exception of an isolated few. For instance, China Times reported that the convenience store industry leader owns approximately 5,000 stores, followed by 2,900 for the second largest, and 1,296 and 800 stores by the third and fourth largest, respectively. In other words, these are large projects not to be taken lightly!
If airport perimeter fencing is vulnerable then covert detection methods should be used Lack of airport perimeter security would be laughable, if it weren’t so serious. A recent farcical breach of security in London is drawing renewed attention to airport perimeter protection. I want to focus on airport perimeter security, but we’ll start with critical infrastructure in general: A nun, a housepainter and a gardener break into a nuclear facility. This sounds like the beginning of a joke except it was a disturbing reality when the trio (the nun proving to be exceptionally limber at the age of 82) defeated perimeter fencing at the Y-12 National Security Complex in Oak Ridge, Tennessee, a facility that houses the United States’ stocks of bomb-grade uranium and missiles confiscated from Libya’s Colonel Gaddafi. Perimeter breach at JFK airport This incident occurred in July 2012, and only a month later, a man on a jet ski clambered out of the water on the edge of John F. Kennedy International Airport, scaled a perimeter fence and walked along a runway apron. Reading a news item about this at the time, I missed a fundamental point. It should be noted that Daniel Casillo’s craft had broken down and he was neither an activist nor a deliberate trespasser. He had swum for three miles, was scared, tired and on the verge of hypothermia. His first action on nearing a terminal building was to make his presence known to a cargo worker. But it gets worse. JFK was exposed twice on consecutive days in June of this year when a would-be fisherman went over a fence, and an uncle and nephew duo deliberately tried to summon help by shaking another fence violently after the engine of their boat had failed. Consider what a group of determined jihadists equipped with bolt-cutters and weapons could do amid such lax perimeter protection. It’s enough to give me sleepless nights, and I don’t even work in airport security. Negligent security at Heathrow airport I thought I’d seen it all until I switched on the news earlier this month to see activists dressed as polar bears on the northern runway of London’s Heathrow International Airport after they had cut away a sizable section of chain link fence. Am I alone in thinking that terror groups might look at mainstream news sources and get ideas? The activists are from the environmental group Plane Stupid and were protesting plans for expansion at Heathrow. They assembled a tripod device themselves out of poles, and news channels chose to go with an extraordinary photograph of a polar bear (who has tactfully raised part of his headgear) being coaxed down by firemen on a cherry picker. Glasgow International’s breach incident It would be amusing if the security risks exposed were not so grave. Again, am I in a minority as I remember how Glasgow International, an airport I’ll fly into next month for my annual holiday, was attacked during 7/7 week in the UK when a radicalised British-born doctor drove a flaming Jeep Cherokee into its perimeter? Airport security options are comprehensive; there’s a robot that travels on a fence-mounted monorail checking for unusual situations Airport perimeter security solutions Airports are secured (or not) by techniques including conventional plain fencing (typically a minimum of 6 feet high and topped with razor wire), microphonic fencing, terrain-following volumetric sensors, fibre optic sensors, digital microwave, infrared sensors, ground radar (often used in a sterilized zone between two fences), conventional “white light” CCTV with motion detection and thermal imaging cameras. The options are comprehensive, and one manufacturer even has a robot that travels on a fence-mounted monorail checking for unusual situations that may indicate an intrusion. The robot uses laser detection to alert against possible fence damage and suspicious objects. My own hope is that tumbling prices of thermal cameras (as manufacturers who have recouped their initial R&D costs allow the products to be more commercially viable) will see the units become more widespread. By definition they excel in low light and are effective at large perimeters. The “thermograms” they produce are high-contrast and therefore well suited to video analytics. I also believe that if fencing is going to prove consistently vulnerable then the airport community should bolster it with more use of covert detection methods. On a visit to a testing field run by one of the world’s largest (and most technically agile) manufacturers, I observed buried volumetric sensors being calibrated to fine tolerances so that they could reliably distinguish between human intruders and wildlife based not just on weight but pattern of movement. Unaccounted intrusion incidents In the United States, the Transportation Security Administration (TSA) is responsible on a nation-wide basis for screening passengers and baggage, but individual airports are tasked with securing their perimeters, a distinction that suggests the government thinks threats are more likely to come from within. Concerns have been voiced over the fact that, frequently, manned guarding is not even performed by airport staff but by poorly motivated casual workers from third-party contracting companies. If a trespass incident does not result in a police log then contractors will be showing exceptional integrity if they report each and every event to the airport. In turn, it’s naïve to expect airports to behave with complete transparency towards the TSA. They certainly don’t co-operate with the media, and earlier this year, the Port Authority of New York & New Jersey (responsible for Kennedy, LaGuardia and Newark airports) refused to give full accounts of intrusion incidents to the Associated Press. Threat and risk assessment Airports need to work with specialist consultants who can conduct penetrative threat assessments, and equipment specifiers in the US may wish to consult the National Safe Skies Alliance. Tennessee-based Safe Skies not only assesses the functionality of airport security equipment but exploits field conditions that are so realistic they can make predictions about whole life cycles. I don’t subscribe to the passive acceptance that only a terrorist atrocity resulting from a perimeter breach will finally spur the aviation community to put its house in order. Israel is of course a special case but the sector as a whole might like to note that a spokesperson for Ben Gurion in Tel Aviv announced earlier this year that the airport spends $200 million annually on perimeter protection alone. Returning to the recent intrusion at Heathrow; now well into middle age, I’m plagued with the usual incredulity as to what is going on around me. It hits everybody at my time of life. Have 13 people in polar bear costumes really just penetrated Europe’s busiest airport with seemingly little more effort than would have been required to break into a chicken coop?
Demand for covert cameras in the home has doubled in the last two years, according to one camera supplier. These additional “hidden” cameras are also increasingly being networked into home security systems, and installation of the newest covert IP cameras is do-it-yourself easy. Covert cameras appeal to consumers who don’t want the industrial look of video cameras disrupting their décor. They are also the latest variation on “nanny-cams” that keep watch while parents and/or homeowners are away. “The price has come down, and the products are becoming easier to use,” says Todd Morris, founder and CEO of BrickHouse Security, a direct-to-consumer and business-to-business supplier of security cameras. “Previously they were very hard to use and to install.” A covert camera catches what’s happening when someone in the home doesn’t know they’re being observed BrickHouse Security’s newest product, introduced at the ASIS 2014 show in Atlanta, is a remote-view hidden camera designed to be easily integrated with a complete home security system. Retailing at right under $200, the Observa camera sits unobtrusively on a bookshelf and looks like a Bluetooth-type audio speaker. The WiFi-enabled camera inside offers cloud-based video recording and storage and even infrared “night vision” technology to see in the dark. “There are two main reasons people choose a covert camera,” says Morris. “One is aesthetics -- they just don’t want a camera to stand out because it’s ugly.” (They also don’t want holes drilled in their walls, which isn’t necessary with WiFi connectivity.) Another reason is an extension of the “nanny-cam” concept. A covert camera in the home can provide additional peace-of-mind to working parents concerned about babysitters taking care of their children. The growing need for two-income households is driving demand. Video can also keep watch on the activities of maids, dog walkers, home healthcare workers or even someone who’s watering the plants. “It answers questions such as ‘Did they show up? Did they do what they said they would do? Did they do anything else?’” says Morris. A covert camera catches what’s happening when someone in the home doesn’t know they’re being observed. Other uses include monitoring vacation homes and keeping up with teenagers. Outside the home, video can provide an early warning of an intruder or prevent vandalism. Covert IP cameras are now pre-configured to be easy to install by a homeowner. Basically, installation involves plugging the camera in and pushing a WPS button that automatically links to a homeowner’s router, does a “handshake” and is connected to the cloud-based service. Customers are provided a secure user name and password in an email before the camera even ships. Everything is Web-based, and there are apps to access video via smart phones and tablets. Entry by Google (which now owns DropCam) into the home video camera market is good news because it helps to raise awareness, says Morris. “A rising tide lifts all boats.” He notes that companies from Google to local cable companies are advertising to promote the idea of video surveillance in the home. Covert IP cameras are now pre-configured to be easy to install by a homeowner Covert cameras are just part of a broadening range of video products available for the home market. Beyond the two models currently provided by DropCam, other manufacturers offer cameras for the home that have pan-tilt-zoom, can be installed outdoors, and are enclosed in domes. BrickHouse Security itself has more than 100 designs and does 60 percent of its business over the Internet. BrickHouse also sells to some dealers, and refers customers to dealers if they seek professional installation services. There are only two limitations on where a covert camera can be placed in the home. In the case of a live-in nanny or maid, the camera cannot be placed inside his or her bedroom (where they would expect privacy). Also, cameras cannot be placed inside bathrooms, although they can be placed outside a bathroom looking into the door. “Video inside the home is so much less expensive and easier to use,” says Morris. “There’s a massive influx of new people it is available to.”
Chester Zoo has grown rapidly since its foundation in 1930 so that today it is spread across more than 125 acres, and is home to more than 15,000 animals and 500 different species. It attracts more than 1.9 million visitors each year - making it the most popular UK visitor attraction outside London. With further growth planned, Chester Zoo began a site-wide vulnerability assessment, led by the zoo’s then head of security, Nigel Peers, out of which flowed a series of recommendations for modernisation of the zoo’s security. Zoo security requirements The Zoo needed a fully-integrated and networked camera system to enable the security team to spot and act on all threats faster; tighten perimeter security; improve visitor and staff health & safety monitoring; and support keepers in assuring the welfare of the animals in their charge. The new system needed to be centralised to support the fully-professionalised security patrolling team. However, video also needed to be distributed effectively to enable health & safety officers, keepers and researchers, to view specific sets of camera images when necessary. All this was only possible working in close partnership with IP video specialist systems integrator NW Systems Group. Improving image quality and coverage NW Systems, once on site, initially discovered that many of the legacy CCTV cameras were generating poor images. NW Systems replaced approximately 60 faulty CCTV cameras with new Axis network cameras. Meanwhile, all remaining CCTV cameras were networked using AXIS M7016 and M7014 Encoders, alongside all new network camera transmissions. A total of 160 new Axis cameras were installed and networked by NW Systems across the original or ‘core’ zoo, The Islands and elsewhere, together providing much more comprehensive coverage site-wide. AXIS P3225-LVE cameras were installed in numbers across The Islands, partly because of their versatility and robustness making it possible to site them both inside and outside animal enclosures. Special attention was paid to siting of cameras for total discretion. Where surroundings required, camera housings were camouflaged, thereby offering highly unobtrusive surveillance. In addition, the newly centralised control room was fitted with the very latest video management software (VMS) from Milestone Systems. The new IP video system also supports post-event follow-up - including supplying timely, high quality video footage to the Police when necessary Tightened security at main entrance and car park NW Systems also provided increased coverage across the recently renovated Jubilee Quarter, the Zoo’s main entrance and large car park serving it. It also installed several Axis Q6000-E PTZ Dome Network Cameras, alongside Axis C3003-E Outdoor Network Horn Speakers, clamped onto existing lighting masts throughout the car park. This enables the Zoo’s security team to monitor activity around the 1000-vehicle capacity car park, for the protection of visitors and their belongings. The loud speakers can be used to transmit live messages to arriving visitors to guide them towards the entrance and to deter any potential wrong-doing. Animal welfare and keeper safety needs NW Systems was also called in to help solve a specific concern of the Zoo’s Lead Elephant Keeper, associated with opening large gates to let the elephants out of the Elephant House into the wide-open habitat and back into the elephant house at night. The existing remote door control system was now supported by high quality live views provided by five-megapixel AXIS P1357-E network cameras covering the doors. These same cameras were also being used to capture the magical moments of elephants giving birth to their babies – three baby elephants have been captured on these cameras over the last 18 months. The video sequences were shown live via the Zoo’s website and recordings have been also been kept for marketing purposes. Rationalise, network and centralise security operation Over a three-year period, working in close partnership with the UK’s largest visitor attraction outside London and largest zoo in the UK, NW Systems has helped Chester Zoo to rationalise, network and centralise its security operation, underpinning the professionalisation of the Zoo’s security team. NW Systems has also provided the right platform for distribution of high quality video images to meet zoo keepers’ specific operational and research needs. The new system also now supports keepers’ animal welfare and behaviour research requirements - helping them to spot and discourage inappropriate visitor interaction with animals. It provides vital evidence in case of any incidents which might result in insurance claims. The new system also now supports keepers’ animal welfare and behaviour research requirements Potential threat identification From a security perspective, helping the Zoo’s security team to identify potential threats more rapidly – using video images to brief patrolling officers on where to go and what to anticipate on arrival. The system enables the security team to assess and prevent escalation of any threat by moving rapidly and effectively to the scene and then, once there, acting in a way that is proportionate with a pre-identified threat. The new IP video system also supports post-event follow-up - including supplying timely, high quality video footage to the Police when necessary. The result is a state-of-the-art IP camera system which transmits video from nearly 300 Axis cameras to a modern, IP-based centralised control room. It also offers the potential to deliver live and recorded video to patrolling officers’ mobile devices on the ground when the time is right. Vanderbilt networked intruder alarms have also been installed by NW Systems to further protect key buildings around the site. "Chester Zoo now has a video security platformwhich is highly reliable, expandable and future-proof" Beyond standard security surveillance Nigel Peers, Security Manager, Chester Zoo, summarised: “Chester Zoo now has a video security platform which is highly reliable, expandable and future-proof. We know that whatever our requirement in terms of intelligence, video analytics and integration with other physical security systems such as intruder alarms or access control systems; it’s possible to bring it all together with our new IP video system displayed in the Zoo’s new security control room. Speed and appropriateness of response to threats is now assured.” Frank Crouwel, Managing Director of NW Systems, added: “I’m very proud that we’ve been able to work with Chester Zoo every step of their three-year journey to upgrade and harden their physical security provision; while also creating a camera system which supports many other operational requirements from visitor and staff health and safety, to animal welfare and behaviour research, as well as retail management and loss prevention.” Gareth Simpson, Head of Site Operations at the Zoo said: “I’m very pleased that we selected NW Systems to help transform our security provision, working alongside our Security Manager Nigel Peers and the rest of my team. They’ve been highly responsive and sensitive to our unique, multi-dimensional needs which go way beyond standard security surveillance: using cameras for everything from visitor and staff safety, animal welfare monitoring and behaviour research studies, right through to meeting and exceeding tightening Crowded Places terrorist-threat mitigation requirements and supporting the Police with any enquiries. NW Systems is a great long-term partner for us.”
Customs and Border Protection needed a faster way to correlate information about the location and status of arms The Australian Customs and Border Protection Service is responsible for the protection of the Australian community, while supporting legitimate trade and travel. At a time of unprecedented threat levels – illicit drug trafficking, terrorism, people smuggling – Customs and Border Protection manages the security and integrity of Australia’s borders, working closely with other government and international agencies, to detect and deter unlawful movement of goods and people across the border. Rapid commerce and travel growth Concurrently, Customs and Border Protection is responsible for protecting Australian economic interests during an era of rapid growth in international commerce and travel. By enforcing trade regulations and collecting tariffs, Customs and Border Protection helps Australia compete in a global economy. “Customs and Border Protection plays a vital role in national security, derived from its broader responsibilities at the border and the extensive powers, expertise and technology it brings to bear,” said Michael Carmody, Chief Executive Officer, of Australian Customs and Border Protection Service. “Modernisation of customs organisations will remain imperative, with the Australian Customs and Border Protection Service motivated by continuing pressure for more sophisticated and integrated processes.” Border protection responsibility Border protection responsibility lies in the capable hands of over 5500 Customs and Border Protection employees in over 50 locations around Australia and overseas, and is managed from the Central Office in Canberra. The Customs and Border Protection Strategic Outlook (2007) projects that by 2015, these employees will assume responsibility for the annual oversight and management of: 1 million international passengers 7 million import sea containers 7 million export sea containers 5 million air cargo consignments 220 million postal articles 22,865 arriving ships Protecting the Australian community demands sophisticated intelligence, targeting high-risk aircraft, vessels, cargo, postal items and travellers. It also requires sophisticated tools, including thousands of items of weaponry, protective gear, specialised equipment and vehicles. Furthermore, effective deployment and management of these tools is vital to assure the safety and security of Customs and Border Protection’s officers, and the 22.6 million Australian citizens they serve and protect. Search for a solution Prior to 2011, Customs and Border Protection maintained a system of separate spreadsheets to track and manage this considerable arsenal. More importantly, the view from Central Office in Canberra lacked immediacy. Lags in reporting times could lead to delays in repairing or replacing critical equipment, or in identifying a missing or stolen weapon. What Customs and Border Protection sought was a fast and easy way to correlate information about the location and status of arms and bulletproof vests with the officers to which they had been assigned. As staff across different locations kept their own spreadsheets, Customs and Border Protection needed a solution that could easily deliver accurate and up to date views to Central Office. Under Michael Carmody’s imperative for more efficient, integrated processes, the Australian Customs and Border Protection Service issued a global tender for an asset tracking system. They discovered a partnership between Relegen and HID Global best fit their needs. Customs and Border Protection opted to use the Relegen asset solution, with assetDNA software The Relegen solution Relegen specialises in the development and delivery of asset intelligence solutions. The Australian Defence Force [ADF] has employed Relegen’s technology – assetDNA™ – to manage critical assets for over a decade. The similarities between the ADF’s and Customs and Border Protection’s asset management needs, combined with the flexibility of the assetDNA solution, made Relegen the clear choice around which to build Customs and Border Protection’s new system. The Relegen solution is enhanced by their assetDNA software technology, which enables users to assign a globally unique identity to each asset. In this case, Customs and Border Protection have opted to use the assets’ serial number. This identifier is then carried by Relegen’s proprietary assetDNA tagging solution. A third layer of security is added through DataTraceDNA®, a covert security technology from DataDot Technology Ltd. This means that even in the event that the assetDNA tag is removed or destroyed, Customs and Border Protection can still identify the asset as one of their own. “Our ten plus years’ experience at a mission-critical level with the Australian Defence Force prepared us well to deliver the comprehensive asset tracking solution Customs and Border Protection requires,” reports Paul Bennett, Managing Director, Relegen. “The combination of our assetDNA software and multi-layer, intelligent tagging solution enables Customs and Border Protection to track each asset uniquely. Even if a tag is separated from a weapon, Customs and Border Protection can still identify the asset through DataTraceDNA.” HID Global RFID The ability of assetDNA to track each asset uniquely, and in real-time, is made possible by radio frequency identification technology from HID Global. A world leader in the development and production of innovative identification tags and readers, HID provides innovative asset tags and technical support vital to the Customs and Border Protection solution. Before HID could recommend tagging solutions, a thorough assessment of each asset was required: How is the asset used, by whom is it used, and under what conditions? For Customs and Border Protection, each tag must withstand the rigors of daily use under potentially hazardous conditions. HID manufactures asset tags that adhere and function under extreme conditions, resisting impact and vibration, and exposure to saltwater and chemicals. HID was able to provide Customs and Border Protection with a customised compilation of RFID tagging solutions According to Paul Bennett, “assetDNA is a powerful asset intelligence system. However, our ability to collect data is enormously dependent on reliable tags that can withstand the rigors of daily use in extreme conditions. That’s why we rely on HID. Their tags perform.” “All Customs and Border Protection assets were analysed in terms of materials of construction and conditions of use,” says Tony Hilder, Sales Director, Industry and Logistics for Asia Pacific HID Global. “Then, we were able to match a HID tag to deliver the necessary level of reliable performance over the life of each asset.” Customised RFID tagging solutions HID was able to provide Customs and Border Protection with a customised compilation of RFID tagging solutions that will: Withstand impact and vibration – on an assault rifle, or in a physical confrontation Resist exposure to harmful elements – including saltwater, or chemical agents Install covertly and inconspicuously – to prevent detection or tampering Maintain data integrity and performance – assuring systemic veracity The HID Logi Tag® Family is being applied where mechanical, chemical and temperature resistance is imperative, with the HID IN Tag Family providing ruggedised tag solutions for severe environs. Greater security for officers Relegen and HID are working together to help implement the sophisticated asset tracking system across all Customs and Border Protection locations. This includes the tagging of each of the armaments and critical assets in each agency, as well as training for all Customs and Border Protection personnel. The result will be a comprehensive system that gives Customs and Border Protection a real-time view of all assets deployed and in inventory, empowering the Central Office to make critical decisions based on the latest information at-hand. It will also mean greater safety and security for Customs and Border Protection officers. Officers can perform their duties, confident they have been issued the correct equipment, and assured that it is in proper working order. In addition, the new system further minimises the risk that weapons may be stolen or remanufactured. Significant productivity enhancements The new system will also enable optimisation of asset use. Customs and Border Protection can now identify each asset’s progress through its lifecycle, and identify specific assets in need of immediate repair or replacement. Customs and Border Protection will recognise significant productivity enhancements in staff time spent mustering their formidable arsenal. Going forward, the Customs and Border Protection asset-tracking system provides a model for any organisation managing operation-critical assets, in routine or emergency response situations. Worldwide, police forces, fire departments, emergency medical teams, hospitals, and other organisations are employing solutions from Relegen and HID Global to respond quickly and comprehensively in emergencies, provide better safety for their employees, and drive the performance of their mission critical assets more effectively.
Using Predator Hybrid cameras, The Oracle security team can view all aspects of the shopping centre Looking to move to a totally IP surveillance camera network in the future but wanting to upgrade their current analogue cameras now, The Oracle shopping centre, Reading, is fulfilling both criteria—by installing the innovative Predator Hybrid camera from CCTV design and manufacturing company, 360 Vision Technology. Network cameras Opened in September 1999, the first phase of The Oracle was followed in November of that year by The Riverside, a stylish choice of restaurants, pubs, and cinema. The final phase completed the development in May 2000, which was officially opened by the Princess Royal. Along with The Riverside’s 22 restaurants, cafés, and bars, The Oracle’s 90 stores and shops increases Reading's retail outlet footage by thirty-three percent. Visitors to the centre can utilise its two large car parks, which provide 2,300 vehicle spaces. Securing such a vast retail space presents a challenge for the on-site security team at The Oracle. The team consists of a mixture of guards in public areas of the centre, and highly skilled operators working in the CCTV control room, from where they can view a network of over 300 static, covert, PTZ, and dome cameras.Visitor safety “As our security consultant of choice for many years, we have enjoyed a successful relationship with Zada Technology Ltd, in which time we have built a working relationship that has seen the installation of further cameras to our system,” explains Andy Salmon, Security Manager at The Oracle. “For the latest upgrade, we had some concerns about investing in analogue cameras, only to be faced with them becoming obsolete and having to replace them in the future when we upgrade our control to IP, which will happen in the next round of planned rolling upgrade programme.” Predator Hybrid camera “High-definition images from the Predator Hybrid cameras mean we don’t have to deploy our guards to every situation” “We specified the 360 Vision Technology Predator Hybrid to provide both analogue and HD functionality in a single PTZ camera,” explains Adam Parsonson-Smith, Technical Director at shopping centre security specialist Zada Technology Ltd. “It’s the perfect choice for use at The Oracle. This patent-pending technology means that when their installation moves to HD infrastructure, the Hybrid camera’s standard analogue 4:3 images can be replaced with a full HD 1080p output—at the flick of a camera switch and with no additional equipment required.”Predator Hybrid also features ONVIF compliant or 360SDK protocols for fast set-up and IP68 certification to ensure continued performance in the harshest of environments—all backed by 360 Vision Technology’s comprehensive 3-year warranty, and their design and manufacturing base in the UK.Identifying suspicious behaviour Using the new Predator Hybrid cameras, the Oracle security team can view all aspects of the shopping centre’s malls and its vast car parks, in HD quality. These high-definition images are a great improvement on the original images and assist the control room team to easily identify suspicious and anti-social behaviour. Better quality images also ensure that known offenders can be identified as soon as they enter the centre, and their behaviour monitored and recorded whilst they are on-site. This new, unparalleled HD overview of the entire centre allows security, management, and health & safety decisions to be made swiftly—based on a comprehensive visual summary of monitored situations. If a situation or incident requires one of the security team to attend, effective resources can be directed to the location via radio link from the control room. “High-definition images from the Predator Hybrid cameras mean we don’t have to deploy our guards to every situation,” explains Andy. “Using the new cameras we can monitor the situation and only deploy our manned guarding team if necessary—this frees them to perform other tasks and helps me as manager use the resources at my disposal for best effect and in the most economical way.” “The Hybrid camera’s standard analogue 4:3 images can be replaced with a full HD 1080p output” Cost-effective solution “Predator Hybrid’s designed-in seamless integration and simple set-up meant minimal installation time and therefore minimal disruption to The Oracle’s business trading during camera installation,” adds Adam. “This provided The Oracle management with the assurance and satisfaction derived from a quick camera changeover procedure and minimal downtime while the work was carried out.”The Oracle management team is now enjoying a future-proofed and cost-effective surveillance solution that is set to provide many years of continual service. The new 360 Vision Technology Predator Hybrid cameras are providing a highly-effective security and management tool—affording peace of mind to the millions of customers who visit The Oracle shopping centre each year.