Percepto announced that it has launched its all-in-one aerial solution for autonomous security, safety and inspection missions in Australia, following the completion of a series of successful live mission demonstrations in Canberra. The tests were observed in the capital by a delegation representing government, defence and industry organisations from across the country. During the demonstration, Percepto conducted missions to highlight how its autonomous ‘Sparrow’ drones can deliver...
The excitement of ISC West 2019 continued until the very end – almost. Exhilarated by the first two busy days of the show, attendees and exhibitors seemed to welcome a slower third day. There were no complaints about booth traffic, and still plenty of thoughtful conversations taking place, everyone determined to maximise the value of face time with customers until the last second. Building an IoT ecosystem in SAST At a show lacking in high-profile new technology announcements, the bigges...
Trackforce, the security workforce management platform, announces the appointment of Christophe Kloussing as Vice President of Sales for North America. Kloussing brings 20 years of experience in senior positions in the U. S. and Europe to his new leadership of all Trackforce North America sales initiatives. He intends to identify and develop new business opportunities, implement fresh strategies for customer retention and growth, and uphold the company’s current position as market leader....
ShotSpotter, Inc., the provider of gunshot detection solutions that help law enforcement officials identify, locate and deter gun violence, announces a new technology innovation unit – ShotSpotter Labs – to expand the company’s current efforts supporting innovative uses of its technology to help protect wildlife and the environment. ShotSpotter Labs is launching with an initial focus on helping combat rhino poaching in South Africa. Later this year, the unit intends to explore...
Attendance has been growing steadily year-over-year for ISC West, and the 2018 show exceeded 30,000 total industry visitors for the first time. So it’s safe to expect ISC West 2019, April 10-12 at the Sands Expo in Las Vegas, will be bigger than ever. Preregistration for the 2019 show is on track to bring even more visitors than last year. “This is a show for everyone, for converged security,” says Mary Beth Shaughnessy, Event Director for Reed Exhibitions. “We bring a l...
When security topics become a part of current events, it is usually in a negative light. Security generally only becomes news when it fails, sometimes in a dramatic, high profile and tragic way. However, security failures can also shed light on lessons learned and opportunities to improve. Working toward better security can translate into the purchase of more goods and equipment supplied by our market. For additional insights into the intersection of security and current events, we asked this we...
BCDVideo, the provider of enterprise-quality, purpose-built IP video storage solutions, and Scale Computing, a pioneer in edge computing and hyperconverged solutions, announced the certification of BCDVideo’s new Hyperconverged Infrastructure for Video Surveillance (HCI-VS). Developed over the last year and underpinned by Scale’s HC3 software, BCD218-HCI Series, built on a Dell OEM technology foundation, offers modularity and ease-of-use without sacrificing performance and quality. Initial tests of the solution, configured with Genetec’s Security Center software, ran at throughput of 1800Mbps with ten video archiver virtual machines (VMs). BCDVideo expects final testing in the 2200-2400Mbps range. “We acknowledge that recording video on virtual machines has been a challenge in this market for years. We decided to tackle this issue and finally through engineering and testing, b”uilt a viable solution,” said Tom Larson, Chief Technical Officer, BCDVideo. “We successfully adapted the technology for video.” The HCI-VS system installs at the project site within an hour and is a fully integrated cluster-wide resourceEliminating system downtime BCDVideo’s new Hyperconverged Infrastructure for Video Surveillance (HCI-VS) Series greatly simplifies the deployment, management, and maintenance of its infrastructure, saving the security integrator training costs, and most importantly, eliminating system downtime. The HCI-VS system installs at the project site within an hour and is a fully integrated cluster-wide resource. Deploying new Virtual Machines (VMs) can be achieved in minutes and everything is managed through a very easy-to-use web interface. The native high availability built into this all-in-one solution utilises automation and self-healing to eliminate the complexities around deployment and ongoing management. HC3 self-healing machine intelligence “It goes far beyond building an easy-to-deploy hyperconverged solution on the Dell OEM platform, although flexibility within that technology is an innovator’s dream,” reflected Jeff Burgess, Chief Executive Officer of BCDVideo. “It’s more about making a significant difference in a market that sincerely needs one. Customers need high-availability solutions that don’t cost an arm and a leg and perform as promised. BCDVideo has delivered on both counts.” The HC3 self-healing machine intelligence automatically identifies, mitigates, and corrects infrastructure problems in real-time" “The HC3 self-healing machine intelligence automatically identifies, mitigates, and corrects infrastructure problems in real-time, eliminating the need for infrastructure management componentry. This innovation makes HC3 simple for security integrators to manage and administer,” commented Jeff Ready, CEO and co-founder, Scale Computing. “The HCI-VS system, powered by Scale Computing, combines the HC3 self-healing automation with BCDVideo’s leading technology, giving customers a solution built to meet industry wide surveillance requirements while also simplifying the management and maintenance of their infrastructure.” HCI-VS solution at ISC West The HCI-VS is currently available to ship. The company will showcase the solution at ISC West April 10th and 11th. ISC West is the largest converged security trade show in the United States, covering video surveillance, access control, smart home, public security, drones, robotics, and more. Conference attendees showcase the newest security products and technologies, network with colleagues and security professionals, and gain valuable industry training.
ASIS International, the world’s largest association of security management professionals, has just concluded its largest ever European event. ASIS Europe 2019 - From Risk to Resilience took place in Rotterdam, the Netherlands on March 27-29, attracting over 900 registrants from more than 60 countries and 45 exhibitors. Attendees were senior security practitioners from multinational corporation, including Amazon, Microsoft, Facebook, Google, Volkswagen, BNP Paribas, Boehringer Ingelheim, Daimler, Johnson & Johnson, Heineken, Mastercard, Coca-Cola, Lufthansa, SABIC, Zurich Insurance, and The Walt Disney Company. Learning experience for security leaders That quality, diversity and expertise onsite is what really makes the knowledge exchange and the networking experience so valuable"Conference Chair Eduard Emde, CPP stated, "To be part of our largest event to date is very exciting. However, for me, the numbers only tell part of the story – we have attracted an exceptional audience of global CSOs, regional leaders, and specialists from key companies across a whole range of sectors. “That quality, diversity and expertise onsite is what really makes the knowledge exchange and the networking experience so valuable. We wanted to provide a learning experience for both established and aspiring security leaders, and I’m delighted to see the response from my peers both investing the time to attend, and participating actively onsite." Topics on AI, drones, mobile device security Almost 70 educational sessions were spread across six tracks. Keynotes from Amsterdam and Rotterdam municipalities set the scene by sharing their visions for smart and resilient cities. These were followed by many of the most relevant and most challenging topics in emerging technology such as artificial intelligence, drones, mobile device security and industrial control systems – looking at technology as both a friend and foe for the security practitioner. A dedicated Career Center track was free to attend and geared to helping professionals at all levels pick up tips and insights on how to advance their career pathConsiderable time was also devoted to management challenges such as identifying essential skills, how to build teams and structures equipped to face complex challenges, and how to create security cultures that support innovation, diversity and inclusion. Plus, a dedicated Career Center track was free to attend and geared to helping professionals at all levels pick up tips and insights on how to advance their career path. Better support and promote the Association "ASIS has been working very hard over the past several years on a number of fronts, including an inward look at operations, a review and improvement of member value, and taking a more future focussed look at products, services, certification, and research all in an effort to better support and promote the Association and the profession," said 2019 ASIS International President Christina Duffey, CPP. "To see our flagship European event grow and set the bar so high in terms of educational quality is a great endorsement of our investments in making ASIS more global, and in making ESRM (Enterprise Security Risk Management) approaches central to creating value to a wide range of security professionals." Innovations showcased at the event Showcased innovations ranged from the latest drone and counter-UAV systems, integrated access control and surveillance technologyAt ASIS Europe 2019, attendees were helped to address today’s complex risk landscape by the technology and solutions offered on the show floor and the education in the Innovation Track. Showcased innovations ranged from the latest drone and counter-UAV systems, integrated access control and surveillance technology, to smart crowdsourced cyber security testing, crisis, risk management and intelligence platforms and mass communications applications. The closing plenary used a novel, interactive format with live polling and facilitated discussion to address one of today’s hottest topics – digital transformation. It provided an opportunity for leaders to benchmark their experiences and outlined a number of key challenges facing security teams.
Growing drone use in populated areas poses significant risks that, without additional safeguards, could result in attacks by malicious entities and exploited for use in cyberattacks, terrorism, crime and invasion of privacy, according to a new research report by Ben-Gurion University of the Negev (BGU) and Fujitsu System Integration Laboratories Ltd. researchers. Computer vision algorithms The first comprehensive study on “Security and Privacy Challenges in the Age of Drones” evaluates 200 academic and industry techniques designed to detect and disable drones flying in both unrestricted and restricted areas. Its findings coincide with the U.S. government proposal to allow civilian drone flights with new security rules that permit deliveries and other commercial uses in populated areas. The researchers demonstrated a new physical method to disable drone’s active tracking functionality To highlight the threat, the researchers demonstrated a new physical method to disable drone’s active tracking functionality, a new technology that was recently introduced by drone manufacturers that is based on computer vision algorithms. Rise in drone-related security incidents “The cutting-edge technology and decreasing drone prices made them accessible to individuals and organisations but has created new threats and recently caused an increase in drone-related incidents,” says Ben Nassi, a Ph.D. student in BGU's Department of Software and Information Systems Engineering (SISE) and a researcher at the BGU Cyber Security Research Center. “There are many difficulties that militaries, police departments, and governments are seeking to overcome, as it is a recognised threat to critical infrastructure, operations, and individuals.” The researchers examined different ways to detect drones in drone-restricted areas including radar, RF Scanners, thermal cameras, sound and hybrids of these methods. However, they believe the biggest challenge is determining the drone’s purpose in non-restricted areas. Drones challenge security and privacy “An open-skies policy that allow drones to fly over populated areas pose a significant challenge in terms of security and privacy within society” says Prof. Yuval Elovici, Ben Nassi’s Ph.D. advisor, who is director of the Deutsche Telekom Innovation Labs@BGU; director of the BGU Cyber Security Research Center, SISE faculty member and the Davide and Irene Sala Chair in Homeland Security Research. The researchers propose methods that enable flying drone identification as well as registration, which is now a U.S. regulationAttackers can also disguise a cyber-attack as legitimate drone pizza delivery by hiding the hardware they use inside the pizza box. “In an unrestricted area, we believe that there is a major scientific gap and definite risks that can be exploited by terrorists to launch a cyber-attack,” Nassi says. “It is inevitable that drones will become more widespread, but we need to recognise that open-skies policy pose multiple risks and that current solutions are unable to solve as a result of a major scientific gap in this area.” Flying drone identification The researchers propose methods that enable flying drone identification as well as registration, which is now a U.S. regulation. This includes dedicated techniques for authenticating drones and their operators. While in their previous study, the researchers demonstrated a new technique to detect a spying drone, new methods to determine the purpose of a nearby drone must be developed.
Percepto, the provider of on-site autonomous drone solutions, announced that it will attend ISC West, to share the surveillance and operational benefits of incorporating the industrial-grade Percepto Solution into security and safety operations. The all-weather drone-in-a-box system automatically runs scheduled aerial patrols, providing real-time detection and tracking of humans and vehicles and is capable also of detecting anomalies. Percepto will be at the Johnson Controls Booth (20005) at ISC West 2019, which takes place April 10-12 at Sands Expo, Las Vegas, NV. Each Sparrow is equipped with dual high-definition thermal cameras for 24/7 surveillance and monitoring The Percepto Solution is currently in use around the world including a number of Fortune 500 organisations. It is ideally suited to any large-scale enterprises looking to improve security, increase productivity and reduce safety risks and operational costs. HD thermal cameras for 24/7 surveillance The industrial-grade solution comprises state-of-the-art Sparrow drones that are securely housed in the Percepto Base when not in flight. Each Sparrow is equipped with dual high-definition thermal cameras for 24/7 surveillance and monitoring, and are capable of operating in extremely hostile weather conditions including heavy rain, snow and dust. PerceptoCore technology is used to manage a single unit or a fleet of drones simultaneously. CEO of Percepto, Dor Abuhasira states: “The Percepto Solution provides security teams with reliable, fully automated, round the clock aerial surveillance and because it is able to cover more ground faster, it is ideal for augmenting guarding patrols and perimeter intrusion detection systems.” Autonomous response to alerts The Sparrow can be used to responds autonomously to alerts when integrated with third party systems such as a smart fence or motion detectorsThe Sparrow can also be used to responds autonomously to alerts when integrated with third party systems such as a smart fence or motion detectors. “When a Sparrow responds to an alert, a control room operator is able to instantly view real-time camera footage from the drone,” adds Abuhasira. “Crucially, the Percepto Solution can be fully integrated with control room infrastructure already in place including VMS and PSIM systems, to further help the operator take the appropriate action.” When each mission is completed, drones return to the Percepto Base where automated post flight checks and fast battery charging is completed, ensuring the Sparrow is always primed for the next mission.
Percepto, the provider of on-site autonomous drone solutions, revealed that it has participated in an operational experimentation program with the Department of Homeland Security (DHS) and the Science and Technology Directorate in collaboration with the U.S. Army. Urban warfare test Percepto was invited to participate in the program to evaluate the ability of autonomous drones to perform intelligence, surveillance and reconnaissance operations and to confirm the presence of adversary assets. The event held at Quantico, VA, in March 2019, enabled more than 100 participants from the DHS, Department of Defense, Department of Energy, academia and the private sector to experience the Percepto Solution alongside 25 other technologies, in an urban warfare test scenario. Applications where drones can be used CEO of Percepto, Dor Abuhasira states: “Percepto was honoured to be invited to participate in this operational experimentation program. We embrace every opportunity to challenge our solution in the toughest environments anywhere in the world, and to showcase the wide range of applications where autonomous drones can be utilised.” The Percepto Solution is currently in use around the world including a number of Fortune 500 organisations. It is ideally suited to any large-scale enterprises looking to improve security, increase productivity and reduce safety risks and operational costs.
ISC West, the largest converged security event in the U.S., introduces the lineup for its 2019 education sessions, in collaboration with premier sponsor the Security Industry Association (SIA). In partnership with SIA, ISC West will be making educational sessions available during its 2019 ISC West show taking place April 9-12, 2019 at the Sands Expo in Las Vegas, Nevada, with SIA Education@ISC kicking off the day prior to the exhibition on April 9. The comprehensive program includes 85+ accredited sessions covering a range of industry topics aimed at providing the critical knowledge attendees need to protect and defend against developing threats in today's security landscape. Force-multiplying asset Keynote 1: Delivering Results: How DHS and Industry Partnerships Drive Security Innovation: In this session, keynote speaker William N. Bryan, acting under secretary for science and technology at the U.S. Department of Homeland Security (DHS), will discuss the advances in mobility, machine learning and autonomous technologies that provide new capabilities to build resilience capacity and reduce risks. Keynote 2: Stadium Security – As It Was, Where It Is and Where It Is Going…: Keynote speaker Russ Butler, vice president of security for the San Francisco 49ers and Levi's Stadium, explores the history and evolution of the ever-changing stadium security landscape. ISC West offers complimentary hands-on Vendor Solution Sessions and Unmanned Security educational sessionsThe Great Biometric Debate: After years of promise, biometrics are finally on the rise toward pervasive use. The audience will benefit from a detailed and spirited debate, tempered with a moderator that is an expert in cryptography, identity and applied authentication models across information and physical domains. Integrating Millennials Into Security Organisations: Today, one in three workers is a millennial, but millennials represent only a fraction of membership in security professional associations. This highly interactive session will feature a simulation in generational dynamics with a panel discussion from three generations of security practitioners: Baby Boomer, Gen Xer and Millennial. Meet the Jetsons: Understanding the Promise and Challenges of Smart Cities: Smart cities are now a reality, not just in the U.S., but across the globe. This session will address issues of technology governance to ensure that smart systems are protected and able to serve their human masters without impinging on privacy and civil liberties. How to Adapt to Address Drone Security: With the rapid deployment of small drones across the globe, security organisations are scrambling to become familiar with the threat they represent as well as with ways to use this new technology as a force-multiplying asset. Learn from drone industry professionals and a physical security design engineer about the realistic applications of drone systems and counter-drone solutions that can protect organisations and facilities. Smart Cities, Smart Buildings and the Evolution of the Converged Security Approach: This transformative session will discuss the future of security from the managing of traffic lights/traffic flow, power grids, ports and transportation systems. Included in this conversation will be the understanding of the use of cameras, access control, gunshot detection, open source intelligence social analysers (OSINT), Internet of Things devices, cyber information, video management, predictive maintenance for critical infrastructure and entry solutions. Vendor solution sessions In addition to programming with SIA, ISC West offers complimentary hands-on Vendor Solution Sessions and Unmanned Security educational sessions, including: Unmanned Theater: Drones 2.0 - The Next Generation of Flying Robots Unmanned Theater: Multi-Layer Security: Requirements of a Drone World Unmanned Theater: Cyber-Physical Security: How to Evaluate A Counter-Drone System Axis Communications: From Campuses to Communities: How Smart Technologies Are Driving Our Future Intel: Intel OpenVINO Toolkit Workshop Verkada: Modernising Enterprise Video Security Smart city technology In addition to the standard education sessions, ISC West and SIA will be holding the SIA Women in Security Forum Breakfast @ ISC West on Friday, April 12 "It's our ongoing mission to arm attendees with the knowledge, strategies and tactics they need to make the most informed decisions possible when dealing with today's cyber-physical and public safety security threats," said Will Wise, group vice president, security portfolio at Reed Exhibitions. "This year, we have many new speakers and are covering a gamut of topics – from drones to stadiums security to the developments with smart city technology – facilitating thought leadership between security industry peers looking to advance their knowledge on the most pressing issues." In addition to the standard education sessions, ISC West and SIA will be holding the SIA Women in Security Forum Breakfast @ ISC West on Friday, April 12. Attendees will enjoy featured remarks from Juliette Kayyem – Belfer lecturer in international security and faculty director of the Homeland Security Project at the Harvard Kennedy School, national security analyst for CNN and CEO of Zemcar, – in addition to networking and complimentary breakfast. Robust education program Kayyem previously served as President Obama's assistant secretary for intergovernmental affairs at the U.S. Department of Homeland Security and as Massachusetts Governor Deval Patrick's homeland security advisor. "Sharing new knowledge on emerging trends, technologies and best practices in security is the cornerstone of the SIA and ISC West partnership," said Elli Voorhees, Ph.D., director of education for SIA. "Our robust education program offerings cover a wide range of topics that appeal to all ISC West attendees – from product manufacturers and integrators to professionals supporting sales, marketing, IT and business operations efforts. Our goal is foster peer-to-peer learning on the most current technological and physical security solutions and business practices, providing attendees with essential information to help them improve organisational performance and gain a competitive advantage in the marketplace."
In my coverage of China Tariffs impacting the security industry over four recent articles, products on the tariff schedules routinely integrated into security solutions included burglar and fire alarm control and transmission panels, video surveillance lenses, HDTV cameras used for broadcast use cases and fiber optic media converters. The general ‘callout’ of ADP (Automatic Data Processing) devices and peripherals technically includes servers, workstations and microcomputers, all of which are commonly used to support security solutions. The underperformance, from June 15 to August 24, of U.S. stocks with high revenue-exposure to China, and that of Chinese stocks with high revenue-exposure to the United States was significant and almost identical at 3.2%, significant losses to some investors already involved in security industry M&A activity. Significant public safety Facial Recognition (FR) vendors leveraging AI expanded their market focus to retail and public safety While it was not apparent that practitioners’ security program budgets kept pace with the growth of the more popular solution providers like video surveillance and cyber security, the ICT industries supporting the security economy continued to expand, especially in wireless and wired infrastructure, including preparations for 5G wireless rollouts. These omnipresent technologies drove significant public safety, smart city and public venue projects in 2018. Facial Recognition (FR) vendors leveraging AI expanded their market focus to retail and public safety. In 2018, virtually every public presentation, webinar and published Q&A on social media monitoring and facial recognition technologies I worked on, involved significant pushback from privacy advocates, almost to the point of alarmism. Massive risk reduction Several solution providers in these areas have made significant strides on data protection, accuracy, powered by AI and documented crime reduction cases; however, this real news is quickly shadowed by privacy advocates, seemingly ignoring massive risk reduction, especially in the case of active assailants and gang-related crime. Will FR become mainstream? The cautious security industry may take a cue from the maverick retail industry, sports venue and VIP verification solution providers that grew in 2018. 2019 trends: presupposition or repudiation; winners and losers. Chinese tariffs have had a huge impact on the security industry, which can be seen from changes to U.S and Chinese stocks Although technology adoption forecasting is inexact, there are definitive opportunities in the security industry born on necessity. With the widespread problem of false alarm transmission and inability for first responders to ‘be everywhere,’ developers of solutions that provide automated verification and alternative security incident detection are expected to become mainstream. Promising detection systems The use of AI, NLP, LiDAR, UAS (Unmanned Aerial Vehicles aka drones) with surveillance and thermal imaging will grow, mostly due to higher acceptance in other industries like autonomous vehicles, rail safety, terrain and post devastation mapping/rescue. However, legacy ‘listing’ or certification organisations will be forced to make an important decision for their own survival: work toward integrating these promising detection systems into acceptance by insurance, licensing and standards development organisations. 2019’s ‘true’ Industrial Philanthropists will be needed to fund early warning tech for firefighters and the presence of active assailants 2019’s ‘true’ industrial philanthropists will be needed to fund early warning tech for firefighters and the presence of active assailants. For these use cases, 5G infrastructure rollouts, FR acceptance, lower cost perimeter detection and long range object and fire recognition by LiDAR and Thermal imaging will all be watched closely by investors. Should public agencies and philanthropical solution providers in the security industry cross paths, we may just yet see a successful, lifesaving impact. Cyber risk profile The ‘Digital twin’ refers to a digital replica of physical assets (physical twin), processes, people, places, systems and devices that can be used for various purposes. Your ‘Security Digital Twin’ has a similar physical and cyber risk profile, either through common threats, similar assets or both. Good news: managing your risk, protecting assets and securing your facilities in 2019 will get easier as security digital twin profiles will grow in maturity, while keeping their data sources private. This will be accelerated by the maturity of AI-based, auto-generated visualisations and image recognition, that happens to also drive the FR solutions. The 5G wireless infrastructure market is emerging as far more of a quantum leap in connectivity, like ‘wireless fiber optics’ performance, than an upgrade to 4G LTE. The 5G infrastructure market will be worth $2.86 billion by 2020 and $33.72 billion by 2026, growing at a compound annual growth rate (CAGR) of 50.9%. Intelligent applications The explosion of ingested voice, video, and meta-data, the interconnectivity of devices, people and places, and the integration of intelligent applications into expanding ecosystems all require faster communications. To be more accurate, 5G rollouts will accelerate in 2019; however, current project funding will include and be impacted by future enterprise security connectivity: 5G and FWA (Fixed Wireless Access). 5G rollouts will accelerate in 2019; however, current project funding will include and be impacted by future enterprise security connectivity Quite simply put, larger solution providers are gently coaxing practitioners into seemingly ‘open systems;’ the negative discovery during an M&A process, audit or integration with a smart city’s public/private partnerships will continue to be revealed, and related industries will force reform. Autonomous things will be enabled by AI and image recognition. With few affordable rollouts of security robots and outdoor unmanned ground vehicles (UGV) that leveraged platforms popular with research and even NASA, the autonomous security robot was mostly MIA from a security practitioner’s program in 2018. Perimeter intrusion detection One platform was even accused of intimidating homeless people in a public place, at a major city. Industries mutually beneficial are often unaware of each other; this will change gradually: one major domestic airport is currently evaluating a UGV platform performing perimeter intrusion detection, runway weather conditions and potential aircraft taxiing dangers. The platform is being used largely in transportation research, yet offers significant opportunities to the security industry. Research firm Gartner estimates that 70% of today’s technology products and services can be enhanced with ‘multi-experience’-based VR/AR/MR The ‘immersive experience’ of virtually any security or threat detection is a twist on virtual/augmented/mixed reality (VR/AR/MR) with additional sensory features. Although VR/AR/MR is well underway in other industries, there are several companies with solutions like VR-based active assailant training that could provide a fighting chance for practitioners, employees, visitors, faculty and children. Research firm Gartner estimates that 70% of today’s technology products and services can be enhanced with ‘multi-experience’-based VR/AR/MR. Security ecosystem members Not necessarily MIA, but of special mention is the need of security and safety practitioners to prioritise communications systems over ‘nice to have’ expansive video surveillance systems for mass casualty threats. This will eventually improve with 5G for Enterprise solution rollouts. At the past GSX and upcoming CES Technology trade shows, a new roundup of technologies is discovered: a wider diversity of protection promise to save ASIS members on their technical security program is realised. With each of the ‘winners,’ (5G, AI, NLP, LiDAR, UAS [Unmanned Aerial Vehicles aka drones], thermal imaging, digital security twins and smart-city-friendly technologies) it is both exciting and challenging work for both security practitioners and solution providers. All things equal and with the necessary technology acceptance testing processes, this is a truly great time for security ecosystem members.
From satellite imagery to street views to indoor mapping, technology has disrupted our past world. This has left us dependent upon new ways to visualise large spaces. This new world has brought many benefits and risks. But what does that mean for the security professional or facility manager today and what technologies can be used to secure buildings and improve facility operations? A brief history of 3D technology Starting May 5, 2007 (inception 2001), Google rolled out Google Street View to augment Google Maps and Google Earth; documenting some of the most remote places on earth using a mix of sensors (Lidar/GSP/Radar/Imagery). The mission to map the world moved indoors May 2011 with Google Business Photos mapping indoor spaces with low cost 360° cameras under the Trusted Photographer program. In the earlier days, 3D scanning required a high level of specialisation, expensive hardware and unavailable computing power With the growth of 3D laser scanning from 2007 onwards, the professional world embraced scanning as effective method to create digitised building information modelling (BIM), growing fast since 2007. BIM from scanning brought tremendous control, time and cost savings through the design and construction process, where As-Built documentation offered an incredible way to manage large existing facilities while reducing costly site visits. In the earlier days, 3D scanning required a high level of specialisation, expensive hardware, unavailable computing power and knowledge of architectural software. Innovation during the past 8 year, have driven ease of use and lower pricing to encourage market adoption. Major investments in UAVs in 2014 and the commercial emergence of 360° photography began a new wave of adoption. While 3D scanners still range from $20K – $100K USD, UAVs can be purchased for under $1K USD and 360° cameras for as low as $100. UAVs and 360° cameras also offer a way to document large spaces in a fraction of the time of terrestrial laser scanners with very little technical knowledge. Access to building plans, satellite imagery, Google Street View, indoor virtual tours and aerial drone reconnaissance prove effective tools to bad actors The result over the past 10+ years of technology advancement has been a faster, lower cost, more accessible way to create virtual spaces. However, the technology advances carry a major risk of misuse by bad actors at the same time. What was once reserved to military personal is now available publicly. Access to building plans, satellite imagery, Google Street View, indoor virtual tours and aerial drone reconnaissance prove effective tools to bad actors. Al Qaeda terror threats using Google Maps, 2007 UK troops hit by terrorists in Basra, 2008 Mumbai India attacks, 2016 Pakistan Pathankot airbase attacks, ISIS attacks in Syria using UAVs, well-planned US school shootings and high casualty attacks show evidence that bad actors frequently leverage these mapping technologies to plan their attacks. The weaponization of UAVs is of particular concern to the Department of Homeland Security: "We continue to face one of the most challenging threat environments since 9/11, as foreign terrorist organisations exploit the internet to inspire, enable or direct individuals already here in the homeland to commit terrorist acts." Example comparison of reality capture on the left of BIM on the right. A $250 USD 360° camera was used for the capture in VisualPlan.net software What does this mean for the security or facility manager today? An often overlooked, but critical vulnerability to security and facility managers is relying on inaccurate drawing. Most facilities managers today work with outdated 2D plan diagrams or old blueprints which are difficult to update and share.Critical vulnerability to security and facility managers is relying on inaccurate drawing Renovations, design changes and office layout changes leave facility managers with the wrong information, and even worse is that the wrong information is shared with outside consultants who plan major projects around outdated or wrong plans. This leads to costly mistakes and increased timelines on facility projects. Example benefits of BIM There could be evidence of a suspect water value leak which using BIM could be located and then identified in the model without physical inspection; listing a part number, model, size and manufacture. Identification of vulnerabilities can dramatically help during a building emergency. First Responders rely on facilities managers to keep them updated on building plans and they must have immediate access to important building information in the event of a critical incident. Exits and entrances, suppression equipment, access control, ventilation systems, gas and explosives, hazmat, water systems, survival equipment and many other details must be at their fingertips. In an emergency situation this can be a matter of life or death. Example benefit of reality capture First Responders rely on facilities managers to keep them updated on building plans A simple 360° walk-through can help first responders with incident preparedness if shared by the facility manager. Police, fire and EMS can visually walk the building, locating all critical features they will need knowledge of in an emergency without ever visiting the building. You don’t require construction accuracy for this type of visual sharing. This is a solution and service we offer as a company today. Reality capture is rapidly becoming the benchmark for facility documentation and the basis from which a security plan can be built. Given the appropriate software, plans can be easily updated and shared. They can be used for design and implementation of equipment, training of personnel and virtual audits of systems or security assessments by outside professionals. Our brains process visual information thousands of times faster than text. Not only that, we are much more likely to remember it once we do see it. Reality capture can help reduce the need for physical inspections, walk-throughs and vendor site-visits but more importantly, it provides a way to visually communicate far more effectively and accurately than before. But be careful with this information. You must prevent critical information falling into the hands of bad actors. You must watch out for bad actors attempting to use reality capture as a threat, especially photo/video/drones or digital information and plans that are posted publicly. Have a security protocol to prevent and confront individuals taking photos or video on property or flying suspect drones near your facility and report to the authorities. Require authorisation before capturing building information and understand what the information will be used for and by who.There are a number of technologies to combat nefarious use of UAVs today Nefarious use of UAVs There are a number of technologies to combat nefarious use of UAVs today, such as radio frequency blockers and jammers, drone guns to down UAVs, detection or monitoring systems. Other biometrics technologies like facial recognition are being employed to counter the risk from UAVs by targeting the potential operators. UAVs are being used to spy and monitor for corporate espionage and stealing intellectual property. They are also used for monitoring security patrols for the purpose of burglary. UAVs have been used for transport and delivery of dangerous goods, delivering weapons and contraband and have the ability to be weaponised to carry a payload.Investigating reality capture to help with accurate planning and visualisation of facilities is well worth the time The Federal Aviation Administration has prevented UAV flights over large event stadiums, prisons and coast guard bases based on the risks they could potentially pose, but waivers do exist. Be aware that it is illegal today to use most of these technologies and downing a UAV, if you are not Department of Justice or Homeland Security, could carry hefty penalties. Facility managers must have a way to survey and monitor their buildings for threats and report suspicious UAV behaviours immediately to authorities. At the same time, it’s critical to identify various potential risks to your wider team to ensure awareness and reporting is handled effectively. Having a procedure on how identify and report is important. Investigating reality capture to help with accurate planning and visualisation of facilities is well worth the time. It can help better secure your facilities while increasing efficiencies of building operations. Reality capture can also help collaboration with first responders and outside professionals without ever having to step a foot in the door. But secure your data and have a plan for bad actors who will try to use the same technologies for nefarious goals.
In 1901 New York state made a pioneering regulation move and became the first US state to require automobile owners to register their vehicles. This marked the beginning of regulation on modern traffic, which - following decades of development - resulted in a multi-layer concept of regulation relating to vehicles and driver’s licenses, traffic signs and insurance mechanisms that we are all familiar with nowadays. While certain parallels can be drawn between the early days of cars and our contemporary experience with quadcopters, we are facing a new challenging era that is far more complex to organise and regulate. Integrating drones in existing regulatory ecosystem Similar to other pioneering technologies in the past, drones need to integrate into a long existing and well-balanced ecosystem, the rules of which have first been drafted some one hundred years ago and have evolved without taking vehicles such as drones into account. Yet the safety risks related to aviation hinder the quick integration of drones into that ecosystem, broadening the gap between existing regulatory landscape and the exponentially growing popularity and ever-advancing technology of drones. The safety risks related to aviation hinder the quick integration of drones into the legislative ecosystem For the past several years, governments and legislators have been trying to tackle this problem by trying to answer two questions: how to properly integrate drones into the airspace without creating a hazardous impact on existing airborne operations, and how to enforce regulations in order to prevent the side-effects related to careless or malicious drone flights, taking into consideration public safety and physical security. Counter-UAS measures and regulations Up until 2018, legislators tried to tackle these two questions as a whole by introducing bundled legislation drafts covering the entire landscape of gaps they needed to address, which resulted in multi-parliamentary committee efforts both in the US and abroad to review and approve each bill - a process that is very slow by design. It was only in the beginning of this year that the issues were starting to be addressed separately: legislation related to limitations and counter-drone measures on the one hand, and legislation related to integration into airspace on the other. Let’s take a closer look at Counter-UAS (unmanned aerial systems) measures and what makes them challenging in terms of regulation. Over the past years, various counter-drone technologies have been introduced to enable control over rogue drones in order to either stop them from achieving their flight purpose or prevent them from creating safety hazards to people or property. These measures can be grouped into 3 types of technologies: Military grade solutions - including lasers and surface-air missiles Kinetic solutions - including net-guns and autonomous drones set out to catch the rogue drone and disable it airborne Non-kinetic RF-based solutions - aimed at either disabling, disrupting or accessing the drone’s communications channels in order to trigger a return-to-home function, or guide the drone into a safe landing route Aside from combat military operations, the legality of using the above technologies is questionable as they tamper with an airborne aircraft, might be considered as wiretapping and/or violate computer fraud laws. Therefore, one can conclude that unless changes to regulation are made, non-military facilities will continue to be defenceless from and vulnerable to rogue drones. One can conclude that unless changes to regulation are made, non-military facilities will continue to be defenceless from and vulnerable to rogue drones European c-UAS legislation Next, let’s look at the state of c-UAS legislation in both Europe and US to better understand different legislative ecosystems and how they affect the possibilities of using counter drone measures. In the European Union, there is currently no uniform legislation, and the member countries rely on their own existing legal infrastructures. Roughly speaking, most countries use a method of exemptions to the communications and aviation laws to allow the use of counter drone measures after a close examination by the relevant authorities. Such exemptions are approved under scrutiny to particular sites, which provide some relief, but they do not allow broad use of countermeasures. Further discussion regarding a broader regulation change, on a country level or EU-wide, is only preliminary. US c-UAS legislation Preventing Emerging Threats - provides an initial infrastructure for counter drone measures to be used by various DoJ and DHS agenciesUnlike the EU, in the US exemptions are not possible within the existing legal framework, and the possible violation of US code title 18 means that the hands of both the government or private entities are tied when attempting to protect mass public gatherings, sports venues, or critical infrastructure. Therefore, it was more urgent to introduce legislation that would allow countermeasures to some extent. In September, US Congress approved the FAA-reauthorisation act for the next 5 years (H.R. 302), which was shortly after signed by the President and came into effect. Division H of the act - Preventing Emerging Threats - provides an initial infrastructure for counter drone measures to be used by various DoJ (Department of Justice) and DHS (Department of Homeland Security) agencies under strict limitations. However, the act avoids determining which technology the agencies should use, yet it requires minimal impact on privacy and overall safety in order to strike the necessary balance. This is the first profound counter-drone legislation and is expected to be followed by additional measures both in the US and in other countries. Updating counter-drone legal infrastructure In summary, 2018 has been a pioneering year for counter-drone legislation, and while technology already allows taking action when necessary, legal infrastructure needs further updates in order to close the existing gaps: covering additional federal assets, state-level governments, and private facilities of high importance, such as critical infrastructure sites. Legislators in the US and around the world need to continue working in a rapid tempo to keep up with the growing threat of drones. As with cars a century ago, the number of accidents will rise with the increase in time taken to regulate.
Recent technology advances – from the cloud to artificial intelligence, from mobile credentials to robotics – will have a high profile at the upcoming ISC West exhibition hall. Several of these technologies were recently designated by the Security Industry Association as the Top 8 security technologies for security and public safety. Some of them will also be a focus at the ISC West conference program, SIA Education@ISC, April 9-11 at the Sands Expo Center. This article will highlight some of those conference sessions. Topic: Cloud Systems and Video Surveillance as a Service (VSaaS) Managed Video Services are saving TD Bank $500K annually, April 9, 2:45 to 3:45 p.m. Why TD Bank decided to roll out a managed services solution, what it took to deploy and how the bank is saving an astounding $500,000 annually. IT 4.0 and Video Surveillance: A Guide to the New Terminology and What It Means to You and Your Customers, April 11, 1:15 to 2:15 p.m. How IT 4.0 can enhance or change video surveillance, and consequently deliver additional value to customers, including explanations of terms such as cloud data centers, personal clouds, the edge, IoT sensors and data analytics. One of the sessions to cover how IT 4.0 can enhance or change video surveillance, and consequently deliver additional value to customers Topic: Artificial Intelligence (AI) In Video and Other Systems The Challenges and Opportunities of AI in Physical Security, April 10, 3:45 to 4:45 p.m. Looking toward what the future may hold for AI in physical security; the challenges and opportunities the technology has created; and how participants can leverage AI and machine learning with existing customers to grow their business. Deep Learning Demystified: Next-Generation AI Applied to Video, April 11, 9:45 to 10:45 a.m. Dispelling the myths of the terms “deep learning” and “artificial intelligence,” and what the technologies can do in practical terms. Modern cameras find and identify faces and vehicles, analyse behavior and organise and control assets Neural Processing and Smart Cameras, April 9, 8:30 to 10 a.m. Deep learning-capable hardware is evolving at a frantic pace, and GPU and NPU (neural processing unit) co-processors are commonly embedded in cameras and video management systems. Modern cameras find and identify faces and vehicles, analyse behavior and organise and control assets. Analytics in the Video Central Station: Proper Deployment, Programming and Configuration to optimise operational and cost efficiencies, April 11, 3:45 to 4:45 p.m. How analytics plays a critical role in reducing alarm traffic in a central station environment, allowing them to save money and realise other operational and performance efficiencies. Topic: Robotics and Autonomous Devices Robotic Aerial Security – Growth Trends and Best Practices, April 10, 11 a.m. to noon The lion’s share of growth in the robotic aerial security sector will come from autonomous systems and changing FAA regulations will soon allow companies to monitor and secure remote facilities with no human guards present. Racing drones are difficult to detect as they do not use GPS or radio frequency signals to identify the location of other devices How to Adapt to Address Drone Security, April 11, 1:15 to 2:15 p.m. Drone industry professionals and a physical security design engineer will cover the realistic applications of drone systems and counter-drone solutions that can protect organisations and facilities. Next Generation Threat: Racing Drones, April 11, 2:30 to 3:30 p.m. Racing drones are difficult to detect as they do not use GPS or radio frequency signals to identify the location of other devices. This session will identify the potential risks these drones can pose to facilities, special events, and critical infrastructure. Establishing a Corporate Drone Program, April 10, 9:45 to 10:45 p.m. Is a corporate drone program an appropriate addition to an existing security program? How to understand and navigate the regulatory challenges and processes associated with starting up a commercial-use drone program. The Rise of Intelligence in Physical Security, April 11, 9:45 to 10:45 a.m. “Intelligence” incorporates a variety of subdomains from artificial intelligence to machine learning and contextual analysis. It is rapidly becoming a focus in the realm of IT security – and increasingly in the realm of physical security, too. Changing FAA regulations will soon allow companies to monitor and secure remote facilities with no human guards present Topic: Mobile Credentials Finding Their Place in Access Control How Biometrics Are Enabling the Convergence of Physical and Information Security, April 10, 1:45 to 2:45 p.m. At the center of convergence is one crucial building block: strong irrefutable identity powered by biometrics. Driving the Future: How Interoperability Standards in Access Control Can Enable Smart Building Success, April 9, 1:30 to 2:30 p.m. Growing user demand is driving new open platform approaches and the adoption of interoperability standards Growing user demand for unfettered and unlimited third-party integrations is now driving new open platform approaches and the adoption of interoperability standards. They are changing the dynamic of access control and its role within the smart building environment. Topic: Facial Biometrics in Professional Solutions How Biometrics Are Enabling the Convergence of Physical and Information Security, April 10, 1:45 to 2:45 p.m. Securing workstations, virtual desktops, turnstiles, front doors, mobile devices and more, biometric authentication is helping enterprises and governments worldwide to realise a more secure future. Topic: Voice Control in the Smart Home Environment Delivering the Smart Home of the Future, April 11, 3:45 to 4:45 p.m. With the proliferation of connected smart devices, including voice control devices, consumers have a growing array of options for defining what their Smart Home experience could be.
ISC West in Las Vegas is the first of several major security trade shows planned for 2019 as part of the Reed Exhibitions ISC Security Events portfolio. Next up will be Expo Seguridad México in May in Mexico City, followed in June by ISC Brasil in Sao Paolo, and ISC East this fall in New York. Expo Seguridad México, May 7-9, will serve the important Mexican market for security goods and services. In Mexico City alone, a large population translates into plenty of buildings and facilities that need protection; security is a big concern and a large market. Concerns about information security, cybersecurity and convergence are also dominant topics. Benefitting from a revised trade agreement with the United States, Mexico offers a favourable business climate and low costs. In addition to video and other hardware products familiar at the U.S. show, Expo Seguridad also includes a large public safety/police component, a workplace, environmental and industrial safety sector, and fire products, offering a broad range of additional product categories. Developing knowledge of attendees The FISSE (Innovation and Solutions of Security) conference room will have cybersecurity and electronic security speakersOn the exhibition floor will be the VIII International Conference for the Administration of Security and Law Enforcement, which will bring together renowned specialists in the security and public safety sector. Free conference track rooms will be provided on the exhibition floor to develop knowledge of attendees in various business areas. The FISSE (Innovation and Solutions of Security) conference room will have cybersecurity and electronic security speakers. Manufacturers, distributors, integrators, and national and international end users have come together at Expo Seguridad since 2002 to interact and exchange knowledge during the three days dedicated to the security industry. Expo Securidad México provides access to more than 350 exhibitors and the opportunity to interact, connect and develop face-to-face relationships with more than 16,300 security and public safety decision-makers. This year, Daniel Linskey, former Boston police chief, will provide a welcome speech at the opening ceremony and will share his experience and thoughts about the 2013 Boston Marathon bombing. Exhibition of public safety equipment The exhibit encompasses a selection of public safety equipment and vehicles, body armour, and counter-terrorism solutionsISC Brasil, June 25-27, offers a combination of physical security and emerging information and cybersecurity elements. An Infosecurity pavilion on the show floor and related conference track sessions highlight growing concerns in the marketplace. A large meeting of Brasil’s law enforcement commanders is collocated with ISC Brasil, and the exhibit encompasses a selection of public safety equipment and vehicles, body armour, and counter-terrorism solutions. A strong VIP attendee program ensures attendance by high-level decision-makers with money to spend. The ISC Brasil Congress is an educational program for continuing professional education and technical training for corporate end users, police commanders, distributors, integrators, law enforcement officials, security consultants, IT and public safety managers. Of the expected 18,000 attendees, some 53% come from corporate end users in several vertical industries. Some 21% of attendees are commercial system integrators, with 9% central monitoring systems and 5% law enforcement and public authorities’ safety. Security for oil and gas companies Brasil’s economy has been improving steadily after a rough patch, and the ISC Brasil show has seen an uptick for the last two yearsBrasil’s economy has been improving steadily after a rough patch, and the ISC Brasil show has seen an uptick for the last two years. Brasil’s huge economy includes big industries that need lots of security – oil and gas companies, and automotive production are among the contributors to economic growth. Attendee and exhibitor satisfaction is strong for ISC Brasil, and the show is on a new growth path as the economic situation in Brasil continues to improve under a new president. Large exhibitors at ISC Brasil include Bosch, Genetec, Hikvision, Dahua, HID Global, Honda, Yamaha, and Microsoft. Large Reed Exhibition offices in Mexico City and São Paulo manage the Latin American events and work with local partners, marketing organisations and clients. Emerging Technology Zone ISC East in New York, Nov. 20-21, continues to build momentum in 2019 after a successful 2018 show that saw double-digit growth both in exhibition space and attendance. Reed Exhibitions’ Infosecurity/ISACA North America Expo and Conference will again be collocated with ISC East, expanding information security and cybersecurity horizons for attendees. (ISACA is an international professional association focussed on IT governance.) New at ISC East in 2019 will be an Emerging Technology Zone, providing a high profile for emerging technology companies at the show New at ISC East in 2019 will be an Emerging Technology Zone comparable to the one at ISC West, providing a high profile for emerging technology companies at the show. The Unmanned Security Expo, a big success last year, will be even bigger in 2019 with more exhibits than ever. There are good signs on the horizon for greater use of drones and robotics. Protection for enterprises ISC East has traditionally focussed on the ‘tri-state’ area around New York City – New York, New Jersey and Connecticut – an area rich in end user companies, especially in financial services, retail, entertainment and the media. In New York City alone, there are almost endless numbers of big enterprises that need protection, so a localised show is a natural, and doesn’t require the large pool of potential customers to travel away from their businesses. New York also has a large and active law enforcement community, and there are many large systems integrators that operate in and around the New York area. ISC East is a growing show that serves a large, unique audience. Growth of ISC East also suggests it is becoming more of a ‘super-regional’ event, drawing good attendance from the Southeast and Midwest in addition to the tri-state area.
As digital transformation accelerates and touches more aspects of business operations, ASIS International is working to provide educational opportunities that security practitioners need to stay on top of those rapid developments. It’s a mission that will drive the ASIS Europe 2019 meeting, ‘From Risk to Resilience,’ this month (March 27-29) in Rotterdam. “What makes the event special is how it covers the full spectrum of security risks that organisations face, and in particular, looks at the human factors and management challenges involved,” says Eduard Emde, CPP, ASIS Europe 2019 Conference Chair, Head of the Health, Safety and Security Section, ESA (European Space Agency), the Netherlands. Examining technology-driven risk When we look at technology-driven risk, only a part of that can be addressed by new technology" “When we look at technology-driven risk, only a part of that can be addressed by new technology. Much of the work is helping people adapt and find new ways of working and managing – that is where I think this event excels.” The opening keynote on ‘Amsterdam: From Smart City to Smart Society’ will be delivered by Theo Veltman, Innovation Rainmaker at the Municipality of Amsterdam. The keynote will set the tone for the three-day event by showing practically how cities are evolving and why – from the perspective of society, business and government. “This a great way to challenge us to understand what is driving change outside the ‘security bubble’ so that we can be better prepared for what is coming,” says Emde. The growing exhibition at ASIS Europe in Rotterdam will feature 45 exhibitors, including Johnson Controls, Nedap, Securitas and Stratfor Mobile device security In addition, the show will cover some of the most relevant and challenging topics in emerging technology such as artificial intelligence (AI), drones, mobile device security and industrial control systems. Given the seniority of the audience, a lot of time will be devoted to management and leadership topics such as soft skills and building teams with diversity and inclusion in mind. In addition, Nick Lovrien, CPP, Chief Global Security Officer at Facebook, will speak about securing an innovation culture. Scenario-based training sessions will provide a hands-on experience to work through challenges such as a chem-bio attack, a fake news crisis, travel risk planning, practical ways to effectively engage business executives and red teaming on cyber-physical risk. The growing exhibition at ASIS Europe in Rotterdam will feature 45 exhibitors, including Johnson Controls, Nedap, Securitas and Stratfor. Advanced learning experience We have a large number of global CSOs, regional leaders, and specialists from key companies across a whole range of sectors" Online registration will be open until March 26. There is a Free Show Pass that provides access to the exhibition and to the education in the Innovation Track and Career Centre, plus two networking drinks and refreshments throughout the day in the exhibition hall. For a more advanced learning experience, the Professional Pass and Leadership Pass offer more sessions, training and networking functions. There are plenty of options aimed at all budgets, learning needs and schedules, says Emde. Last year there were 775 registrants in total. “This year is looking good. We already surpassed last year’s total number of conference delegates, and registrations are coming in steadily,” says Emde. “For me, the numbers only tell a small part of the story,” he adds. “We have a large number of global CSOs, regional leaders, and specialists from key companies across a whole range of sectors. That quality, diversity and expertise onsite is what really makes the networking experience so valuable.”
Communication makes the world much, much smaller - but it also becomes critical to everyone. Once life-enriching communication technologies are embraced, not only do we like and enjoy the benefits, but we also become hooked on it day and night. "There is no doubt that the transportation industry is benefiting from always available communications, making sure drivers, mechanics, dispatchers are always connected and can exchange information when necessary," says Sagi Subocki, Vice President of Products and Marketing for MCC technology leader Softil. "However, for the most part until now, the transportation industry has had to rely on the traditional radio or simply standard mobile phones to perform all communications tasks. That's about to change with the advent of Mission Critical Communications over LTE and 5G as defined in the 3GPP Release 13-15 standard," adds Subocki. Mission critical communication over LTE MCC over LTE offers push to talk, push to video, text and multimedia chat, as well as location information for groups and point to point communications Mission critical communication (MCC) over LTE offers push to talk, push to video, text and multimedia chat, as well as location information for groups and point to point communications. Think about a driver who can push a button and instantly talk to all drivers within a 50-mile radius, for example, to inform them of road conditions, accidents, road works and other incidents. In the event of a breakdown, the truck driver can quickly obtain help from experts using video chat, which makes a driver's life a lot easier. Using the same MCC over LTE capabilities, the driver can see the location of all other drivers using the same radios, can engage in chat sessions with nearby garages and much, much more. And let's not forget that MCC over LTE communications can be prioritised over regular public mobile voice and data traffic, which can help in the case of accidents and natural disasters. Advanced communication solutions in Mining While different from the transportation industry, mining's reliance on advanced communication technologies might be even greater than the needs of the transportation market. Subocki explains: "Mission critical push to talk and push to video with guaranteed, prioritised delivery might well make the difference for mining workers. The ability to ask for urgent assistance simply at the push of a button is crucial in the day-to-day operations of an oil rig and a diamond mine." But the benefits of MCC over LTE don't stop there. As MCC over LTE communication is delivered over modern, very capable, rugged smartphones, these devices can be used to interface and collect data from all available sensors - air quality, temperature, radiation, presence of dangerous gases - all this information can be obtained automatically via MCC over LTE integration with IoT and can be used to increase safety. Drones in MCC over LTE In addition to engaging with all sensors, MCC over LTE communications can include drones which would provide video feeds whenever necessary In addition to engaging with all sensors, MCC over LTE communications can include drones which would provide video feeds whenever necessary - and the 3GPP MCPTT Release 16 standard will extend mission critical communication to include robots, which might be priceless. "Think about the implications of sending an MCC enabled robot to investigate a mine explosion and you'll see the future of MCC over LTE and 5G communications in the mining industry," adds Subocki. Market Value and Outlook A report from ABI Research found the total mission-critical communications market for base stations, repeaters, handsets and infrastructure in 2022 will be US$10 billion. The North American market continues to account for more than half of this world market with the rapidly growing Asia-Pacific region in second place with a 20 percent market share. Public-safety radio was the ancestor of critical communications providing mission-critical voice services and continues to represent over half of this market, followed by the industrial, transportation and utility segments. However, the need for mobile broadband data has also entered the equation driving critical communications systems to evolve to digital radio for data handling and spectrum efficiency. As a result, critical communications systems are slowly evolving from the current TETRA, Digital Mobile Radio (DMR) and Project 25 (P25) to coexist and interoperate with Long Term Evolution (LTE)-based systems. Softil's MCC over LTE Leadership Softil is a leader in Mission Critical Communication over LTE solutions for developers. Historically, Softil always focused on the full embrace of open communication standards - starting from close participation in the work of the appropriate SDOs, then developing best-of-breed APIs and implementation of the relevant standards, and most importantly, paying utmost attention to the interoperability of the offered solution by active participation and leading all relevant industry-wide interoperability testing events. Softil actively participates in development of the MCC over LTE standards in 3GPP, as well as interoperability testing at the ETSI Plugtest Events. Most importantly, Softil 3GPP Release 13-15 compliant client SDK implementation had been already commercially deployed on the market - in Korea, Softil powers latest and greatest implementation of the MCC over LTE-R communication devices installed on the newest high-speed train line, such as one connecting Incheon airport to PyongChang during the Olympic games.
Hoverfly Technologies Inc., global supplier of tether-powered aerial drone systems, is pleased to announce it has engaged retired Deputy Chief of Los Angeles Police Department Mike Hillmann to consult and provide expertise to Hoverfly and public safety officials of cities, counties and special law enforcement agencies who are considering the use of Small Unmanned Aerial Systems (sUAS) to assist in keeping their cities safe. Small Unmanned Aerial Systems (sUAS) When incidents and/or events happen, having ‘real-time, situational awareness’ from above the scene is critical to managing risk and upholding public safety “With 24-hour news cycles, a never-ending stream of social media posts, mid-term elections and potential threats to the public at large, getting fast, accurate situational awareness from the air during an incident has never been more important when it comes to keeping the public safe. We are thrilled to have Chief Hillmann advising on use cases and how best to implement and integrate this new technology,” says Hoverfly SVP of Systems, Lew Pincus. When incidents and/or events happen, having ‘real-time, situational awareness’ from above the scene is critical to managing risk and upholding public safety and the safety of those who serve our communities. Aerial/Drone surveillance He adds, “We typically have relied on manned aircraft to provide aerial coverage over a variety of incidents. On occasion, those assets have not always been available, deemed too disruptive or too expensive to deploy in certain situations where an aerial view clearly could have helped an incident commander better understand the situation. Deploying small tether-powered, highly portable, unobtrusive persistent cameras positioned high above the scene can now be used as either a standalone capability or integrated system with existing networks, security infrastructure and even manned aircraft.” Hoverfly tether-powered sUAV (Small Unmanned Aerial Vehicles) systems solve short battery-life problems associated with free-flying drones Today, Mr. Hillmann is helping chiefs of police, local city and county officials and other public safety personnel understand how Hoverfly’s tether-powered LiveSky systems can be deployed from police or EMS vehicles providing incident commanders with actionable intelligence from high above the scene within minutes of arrival. “Tactically, having the ability to stay in the air monitoring the situation from above for hours, days, even weeks at a time represents an amazing capability we never had before. During my career, I can think of hundreds of situations where having a drone in the air to provide real-time intelligence, surveillance and reconnaissance would have helped keep my officers and the community much safer. It’s a force multiplier that should be exploited by public safety,” says Hillmann. Hoverfly’s LiveSky systems Hoverfly tether-powered sUAV (Small Unmanned Aerial Vehicles) systems solve short battery-life problems associated with free-flying drones because they operate using a standard 120VAC power source or vehicle inverter. The power, command and control information and video are transmitted over the tether making the entire system completely secure from jamming, hacking or spoofing, ensuring the privacy of the data and improving safety. Perhaps the biggest benefit of Hoverfly systems is they are autonomous and require no piloting skills. The CEO of Hoverfly likes to say, “if you can operate an elevator, you can operate our LiveSky system.”
Major events require a major security operation, and the recent Royal Wedding was one of the biggest operations in recent times. Security was heightened due to the importance of the occasion due to the potential threat of terror to such a major event. There was a drone no-fly zone put in place, however this measure does not necessarily stop drones from entering the area. This kind of measure is put in place to ensure the safety of the attendees, and to limit the threat posed by drones, but it doesn’t prevent it. Drone license plate detection system How can you ensure that these measures are adhered to? Drone detection systems are becoming more prominent. DJI’s recently released Aeroscope is ground-breaking technology.Commercial drone experts COPTRZ supplied a number of units to law enforcements agencies involved in security at the Royal Wedding It’s a purpose-built drone detection system that allows the operator to track telemetry data from DJI aircraft in surrounding airspace within a radius of up to 20km. It’s in effect, a drone license plate detection system, as well as a data provider. Commercial drone experts COPTRZ recently supplied a number of units to law enforcements agencies and made the technology available to various agencies involved with the security at the Royal Wedding. Monitoring and intercepting drone intrusion The Aeroscope will be used by the law enforcement agencies to protect high profile events. Particularly following the recent Royal Wedding’s no-fly-zone, Aeroscope is a useful tool to ensure that drones in the air near the zone are monitored and if needed are intercepted to ensure the security of the wedding attendees and the royal family alike. Steve Coulson, Managing Director and Founder of COPTRZ has commented on the deal: “We are absolutely delighted to be able to supply drone detection systems to law enforcement agencies. Particularly with big events such as the Royal Wedding and the upcoming World Cup, it’s imperative agencies take advantage of the technology available to them. It’s only a matter of time until technology like the Aeroscope become a necessity for law enforcement agencies worldwide.”
Airbus has expanded the range of its application portfolio for the Tactilon Dabat and partnered with new professional application developers. The aim is to better serve the communications markets in the field of public safety, transportation and healthcare. At the CCW exhibition in Berlin from 15 to 17 May 2018, Airbus is showcasing selected applications for professionals that combine multimedia real-time functions with highest standards of security. “The apps that we showcase at the CCW work in various areas, whether it is industry, public safety or the health sector. They meet specific customer needs and requirements for different regions in the world,” explains Rahim Zaknoun, Head of Innovation & Developer Ecosystem at Secure Land Communications of Airbus. "We selected these apps for our customers and created them for the hybrid Tactilon Dabat.” For instance, the digitalised Triage application from Exomi helps first responders (paramedics) to send complex health data of patients from the ambulance on the scene to the hospital. The delivery of the constantly updated information is standardised and reliable. It can easily be shared not only via the Tactilon Dabat, the Android smartphone and Tetra radio in one device, but also on other platforms in control rooms or in the field. Thus, the application streamlines processes and accelerates a more accurate treatment for the patients. Commanders and group members (Tetra and smartphone users) can easily follow each other on the Dabat’s display based on a map configuration with GPS Live video sharing platform The application ES-Core features a live video sharing function that is secure and supports external video sources, such as from drones or vehicles. Even with little radio coverage the transmission is of high quality. Moreover, footing can be stored as evidence or for the purpose of analysis. “Clearly, this is a tool for police officers. However, paramedics work increasingly with this app on the scene and companies can also master situations by transmitting a live video stream,” says Rahim Zaknoun. Another application can fill frequently the gap of non-existing radio coverage in many public buildings: the ‘indoor positioning’ system for large sites creates a real-time situational awareness when communication groups move around in- and outdoors. Based on a map configuration with a GPS function, commanders and group members (Tetra and smartphone users) can easily follow each other on the Dabat’s display. The application serves especially security personnel in airports, train stations, or event sites: no configuration is needed, a seamless in- and outdoor positioning is put in place and the app works without broadband connection. Track Worker Protection In order to save lives of railway track workers and minimise the risk of collisions, the company Intelligence on Wheels invented the app ‘Track Worker Protection’. This application with a clear map display receives permanent train location updates. Our SmarTWISP application developer programme is the key reference point when it comes to creating secure apps" The signals will be sent from the train operator’s control room and the train itself, which is equipped with a Train Collision Avoidance System. Critical scenarios can now be easily managed with the Tactilon Dabat and the ‘track worker protection’. “Our SmarTWISP application developer programme is the key reference point when it comes to creating secure apps,” says Rahim Zaknoun. “It enables the innovation and professional application development on the top of Airbus’ existing communication technology. It boosts our strong developer ecosystem."
Hikvision, a global manufacturer and supplier of video surveillance equipment, is helping to ensure a safe and reliable electricity supply across South Africa, with the deployment of a massive remote surveillance monitoring solution, covering thousands of electricity substations and power transmission lines. Operated by the largest electricity power distributor in South Africa, Eskom, a network of more than 400,000 kilometers of overhead power lines and several thousand electricity substations, provides electricity to the country’s domestic and business customers. In recent years, this critical power infrastructure has become the target for cable theft, metal theft and other infrastructure related crimes, resulting in vastly expensive and disruptive damage and losses to service providers.Eskom enlisted the help of South Africa’s Combined Private Investigations (CPI) Mitigating equipment thefts Organised criminals have increasingly targeted the more remote sections of the supply network, stealing copper cabling, metal and industry grade batteries. Up to 15 incidents per day are currently being reported. If not seriously addressed, it could lead to the interruption of the supply to thousands of domestic customers; commercial operations, hospitals and railway systems. To combat this wide-scale problem, the national electricity provider (Eskom) enlisted the help of South Africa’s leading information driven investigation company, Combined Private Investigations (CPI). CPI was established by a number of experienced law enforcement agents, forensic investigators and corporate security officials, primarily to investigate a high-level cartel for one of the largest parastatals in South Africa. Currently, CPI is the sole supplier of investigations to several parastatals, with an acknowledged record of addressing copper cable and other infrastructure-related crimes successfully, achieving very high recovery levels. CPI arrests between 35 to 85 cable thieves per month and maintains a conviction rate on average of 90%.The impact of downtime for a substation hit by material theft can be significant Preventing power loss As a corporate investigations firm comprising over 900 staff members across 18 locations, CPI specialises in the prevention and investigation of non-ferrous metal theft. The company’s main objective is to support electricity supply companies and railway service providers in their fight against organised crime syndicates targeting electrical networks for illegal gain. “Copper and metal theft targeting the power transmission infrastructure has become a real problem for maintaining the reliable supply of electricity in South Africa,” says Roy Robertson, Principal Director of CPI. “The impact of downtime for a substation hit by material theft can be significant, with loss of power to homes, hospitals, schools, factories and public transport services." Intelligence-driven approach "These incidents can also have a massive detrimental effect on the provision of key support services, as well as to basic health and safety, so it was vital to our client that not only should the perpetrators of these crimes be investigated and brought to justice, but that the theft incident rate should be significantly reduced.” “To do this, and as a priority, we needed to protect the most vulnerable and remote electricity substations, as these sites were being targeted and experiencing the highest percentage of theft and associated service disruption. At CPI we strive to capitalise on the latest technologies to support our intelligence-driven approach. As such, we approached global surveillance leader Hikvision, to provide the latest electronic security solutions to effectively combat the thefts.”Hikvision Smart Video Content Analytics (VCA) technology embedded into the cameras was set-up for intruder detection Smart video analytics Providing a technical team to assess at remote sites, CPI collaborated with Hikvision to assess the most effective technical specification of products to detect and deter thefts. This specification then formed a blueprint to be rolled-out across all of the most vulnerable electricity substations across South Africa. Using their own engineering teams, CPI installed Hikvision DS-2CD2T42WD-I8 and DS-2DE5120W-AE cameras covering the internal and perimeter areas of each remote site. Equipped with 4MP resolution, 120dB Wide Dynamic Range, 3D DNR, EXIR high performance LEDs and 80 metres IR range, the DS-2CD2T42WD-I8 4MP EXIR Network Bullet Camera was the perfect choice to monitor the remote substations, utilising its advanced performance to provide crystal clear images day and night. Additionally, the Hikvision DS-2DE5120W-AE 1.3MP 20X Network PTZ Cameras were used to provide 3D intelligent positioning and 20X Optical Zoom, to deliver instant visual confirmation on any on-site intruder detection – and all in crystal clear 1.3MP resolution. In conjunction with PIR devices covering the sites’ perimeters, Hikvision Smart Video Content Analytics (VCA) technology embedded into the specified cameras was set-up to perform intruder detection utilising line detection, to confirm alarm activations and eliminate false alarms.Hikvision’s advanced iVMS 5200 professional software with video wall driver was used to monitor thousands of remote sites Central monitoring Recorded locally to Hikvision IDS-9632 NXI-1816S Embedded Plug & Play NVRs, specified due to their superior performance and system stability, the NVR’s simple installation reduce engineering installation and set-up time on site, whilst up to 6 megapixel recording resolution and a capacity of up to 4 SATA interfaces ensured the high-quality of local recording needed. Both live and recorded images are transmitted over a wireless LAN, back to CPI’s own control room located at their National Operations Centre in Johannesburg. At the control room, Hikvision’s advanced iVMS 5200 professional software with optional video wall driver was deployed to enable CPI operators to monitor the thousands of remote sites on 24/7 basis, via a ‘monitoring by exception’ basis. Intrusion detection Monitoring the massive Hikvision integrated surveillance system, in the event of an automated intruder alert being activated to indicate unauthorised movement on-site, surveillance operators are able to quickly visually verify the activity in seconds, examining the high-performance camera network’s high-resolution images. During the process, all evidential video is tagged and automatically archived for future identification and prosecution usage. In the event of unauthorised intruders being detected, the CPI control room operators can instigate a host of anti-intrusion measures, including the dispatch of rapid response teams to a specific locationWe no longer need to deploy response personnel to a site when it may be the subject of a false alarm Integrated surveillance "These teams comprise highly trained operatives ready to tackle any situation,” continues Roy. “The Hikvision surveillance system ensures we can respond very rapidly to any intrusion detected at the sites, and our manned guard response teams are equipped to get to sites as quickly as is possible, to catch the perpetrators in the act. "We can even call on our Robinson helicopter R44 Police equipped with infra-red camera that can rapidly deploy personnel to reach the most remote locations in just a matter of minutes.” “We work closely with the police and various local authorities, using the evidential video footage produced by the Hikvision systems to very good effect in prosecution cases. The high-definition quality of the Hikvision camera images have proved critical in detecting and prosecuting offenders of metal theft." "Not only is it reducing these incidents, but it enables us to visually confirm the precise cause of an alarm at any remote site at the touch of a button. This means we no longer need to deploy response personnel to a site when it may be the subject of a false alarm – negating the waste of valuable man hours and costs, and vastly improving the effectiveness of our security operation.”We plan to harness more Hikvision technology to fortify power transmission security in South Africa Drone-assisted surveillance “We have been so impressed with the Hikvision surveillance technology and the support we have received that we are continuing to roll out this Hikvision based security blueprint to many other power substation sites across South Africa,” Roy continues. “To date, over 1,000 electrical substations are protected by Hikvision systems - making a real difference to the provision of a reliable power service to all sections of industry and society across South Africa.” “In future, we plan to harness more Hikvision technology to fortify power transmission security in South Africa. From additional electronic surveillance systems, to the use of camera-equipped Hikvision Quad-rotor Unmanned Aerial Vehicles (drones) to protect remote sites and respond to incidents – we’re looking forward to completing more successful projects with the assistance of Hikvision’s highly capable technology solutions.”
Prison drone pioneers introduce Government to perimeter savings. The integrated security team behind a British prison’s pioneering war against drones is to share its innovative and cost-saving approach with the UK Government. Les Nicolles Prison on Guernsey became the first in the world to use a new system designed to stop drones smuggling drugs, weapons and other contraband over perimeter walls. A group of four collaborating British companies styling itself as The Perimeter Security Centre of Excellence (PSCoE) installed the comprehensive perimeter protection package, including the new ‘Sky Fence’ technology. Now PSCoE (stand Z35) is exhibiting at the official UK Government global security event, Security & Policing 2018, which takes place from 6 to 8 March at Farnborough International Exhibition and Conference Centre. A group of four collaborating British companies styling itself as The Perimeter Security Centre of Excellence (PSCoE) installed the comprehensive perimeter protection Latest equipment, training and support The unique three-day event, established over 30 years ago, is the premier platform for UK suppliers to showcase the very latest equipment, training and support, to police services, Government departments, organisations and agencies from the UK and overseas. Binns Fencing, the leading fencing contractor for the Ministry of Justice, led the Guernsey project for the conglomerate, which offers the simplicity and efficiencies of a single line of communication and management from cradle to grave of high-security perimeters. Eclipse Digital Solutions is the second of the collaborators. It created Sky Fence with fellow British company Drone Defence and offers full turnkey security design through to installation. Eclipse’s Joe Vasso said: “Our proposition is all about seamless integration to offer the most cost-effective high-end security for perimeters – whether that be along a border, around a prison, airport or the Olympic Games, or even airborne above ground, on roofs and the like. The beauty of our conglomerate is that our relationships have been formed over years and we’re all friends, so the trust is absolute and we care about each other.” Our proposition is all about seamless integration to offer the most cost-effective high-end security for perimeters" Significant cost savings The other two members are Harper Chalice, an intrusion detection company providing PIDs, electric fencing and RADAR detection, and ISM, which offers integrated security systems, PSIM software and intercom security systems. Together, they believe the UK Government could make significant savings by adopting its proposed model for delivering perimeter security and PIDs procurement and delivery. Their single point of contact for the complete perimeter security package provides greater opportunity for innovation, reduced complexity and no need to manage multiple contractors. PSCoE believes this could offer significant cost savings on PIDs cable installation and contract and project management costs – as with Les Nicolles, where the State of Guernsey that runs the prison saved £1.3 million. The other two members are Harper Chalice, an intrusion detection company providing PIDs, electric fencing and RADAR detection, and ISM, which offers integrated security systems Trusted advice and design State Deputy Mary Lowe said: “The committee decided, following discussions with key staff, that it was possible to continue housing Category B prisoners at Les Nicolles without the installation, at significant expense, of a second fence. While the second fence is advised under UK guidelines for Category B prisons, the committee is comfortable that the current technological upgrade offers security that enables Guernsey to continue housing Category B prisoners. Sending such prisoners off island to serve their sentence comes at a significant cost of approximately £50,000 per year each. The committee decided that these upgrades, which will cost £1.3m less than a second fence, offered a Guernsey-appropriate solution.” Binns MD Adam Binns said: “We have devised this model in consultation with the Government, main contractors and suppliers, to deliver best value and a greater potential to innovate with a single point of contact throughout procurement, delivery and installation. The model will give them trusted advice on design, manufacturing and installation from exclusively British companies with British products from electronic systems of CCTV, detection, video management and access control to physical security fencing, gates and hostile vehicle mitigation.” We have devised this model in consultation with the Government, main contractors and suppliers, to deliver best value and a greater potential" Security & Policing Security & Policing provides a platform for professionals from the UK and across the world to engage with the very highest level of security expertise and the latest technology. It provides the level of industry engagement needed to enable UK Government to procure and deliver its national security priorities. Major specifiers and Government specified users can obtain reference to its products from the Home Office. Normal commercial users can obtain reference to its specialist electronic perimeter security systems on the police ‘Secured by Design’ website. Harper Chalice Group’s products and systems are sold, installed and maintained worldwide via a network of specialist accredited dealers. ISM (Intergrated Security Manufacturing) ISM (Intergrated Security Manufacturing) has been at the forefront of innovation, design and manufacturing excellence in integrated security systems for almost 30 years. ISM operates from an extensive manufacturing and design facility in the United Kingdom, close to Gatwick Airport. It is the UK’s leading developer of integrated security management, intercom and cell call systems.
Round table discussion
The reviews are in, and ISC West was another hit. Brisk attendance and a comprehensive lineup of the industry’s top companies and products contributed to another successful show for Reed Exhibitions. Our Expert Panel Roundtable, who have attended many such events, added their own reflections to the industry’s post-ISC glow. We asked this week’s Expert Panel Roundtable: How successful was ISC West 2018 for security industry exhibitors and visitors?
A big trade show, such as the upcoming ISC West, has a lot to offer for attendees. How, can attendees maximise the value they get out of ISC West? For advice, we go to our Expert Panel Roundtable, all seasoned veterans of many big trade shows. Specifically, we asked the panel: How can attendees get the most out of a big trade show like ISC West?