Digital Barriers, a provider of edge-intelligent surveillance and security technologies, announces the release of a real-time remote fever scanning solution that adds remote monitoring to this capability. Fever scanning cameras help safeguard frontline workers against potential infection. The addition of Digital Barriers’ government-grade remote monitoring enables this to be carried out without the need for close human contact, thereby cutting the risk of transmission. Providing both a th...
Paravision, the pioneer in mission-critical face recognition, announces that with the latest release of the National Institute of Standards and Technology's (NIST) Face Recognition Vendor Test (FRVT) 1:N Identification report, it has delivered top-3 accuracy in multiple categories when ranked across the vendors in this rapidly developing space. Published recently, NIST's new report on the performance of face recognition algorithms in identification (1:N) scenarios evaluated over 200 algorithms...
Bodies within the Security and Fire sector, namely the British Security Industry Association (BSIA), Fire and Security Association (FSA), National Security Inspectorate (NSI), and the Security Systems and Alarms Inspection Board (SSAIB) are re-iterating calls for employees of all security and fire safety companies approved by UKAS-accredited specialist certification bodies to be designated as ‘Key Workers’, to ensure environments not currently designated as ‘critical’ con...
Hikvision, a globally renowned provider of innovative security products and solutions, announced its new access control and time attendance offerings, the MinMoe Face Recognition Terminals, promising a new era of face recognition access control is coming. To meet a multitude of real-world scenarios and customer needs, the MinMoe Face Recognition Terminals lineup features four total series: Value Series, Pro Series, Ultra Series, and Face Recognition Modules for Turnstile. With powerful function...
ESA is now offering select free CEU courses in recognition of the economic challenges for businesses affected by COVID-19. These six courses extend the opportunity to learn new topics and to work toward certification or licensing while many might have reduced workloads. Training gift certificate access The following courses are free in the month of March: Job Safety Reminders Troubleshooting Panels and Power Supplies Troubleshooting Intrusion Alarm Devices Codes and Standards Refresher...
Pulse Secure, the provider of software-defined secure access solutions, announces a new distribution partnership with Inforte to grow and better support its channel community across Turkey, and to meet accelerating demand for Zero Trust access security. Inforte is a value-added distributor specialising in the new generation of information security solutions. Inforte provides innovative services to support its community of over 100+ partners with pre-sales and post-sales services, logistics, mar...
Consortio Security has adopted employee scheduling and workforce management software SmartTask to streamline internal processes and improve operational performance. The solution will be used to better manage and monitor a team of 330 security officers that provide a range of services at 250 customer sites including manned guarding, key holding, mobile patrols and alarm response. This will enable the company to reduce its administrative burden, while enhancing the service it provides to customers. Workforce management system SmartTask represents a big step forward for us that will help transform our internal processes" “SmartTask represents a big step forward for us that will help transform our internal processes by gaining complete transparency of operational data,” commented Earl Knight, CEO of Consortio Security. “The software is already proving its worth and we expect to gain even greater efficiency savings and performance improvements as we embed it into our business further.” SmartTask replaces an existing workforce management system that was no longer meeting the demands of the business in terms of usability and reporting capabilities. Following a review of the marketplace, SmartTask was selected as it offered a simple, cloud-and app-based solution, with smartform functionality. The smartphone app provides security officers with a simple way to record proof of attendance, submit incident reports, access and confirm assigned shifts, and read assignment and risk assessment forms. Proactively managing security operation Consortio will use SmartTask across its operations function – both centrally and regionally – to create and communicate work schedules, validate contract delivery and support duty of care. The company’s national control room will have complete visibility of all booking on-and-off of shifts, hourly check calls, scanned patrol points and raised alerts via a live dashboard. Meanwhile, three regional operations managers will have controlled access, so they can manage their individual teams, measure performance and respond to issues in real-time. The added visibility and control provided by SmartTask is helping us proactively" According to Tom Dilley, National Control Room Manager at Consotio Security: “The added visibility and control provided by SmartTask is helping us proactively manage our security operation in the most efficient and effective way. By streamlining our internal processes and reducing incoming calls from security officers by as much as half, we are saving a considerable amount of time, so the operations team can focus on other priorities and ensure the highest levels of customer satisfaction are maintained.” Individual security operations The added reporting capabilities and access to highly accurate data via SmartTask will enable Consortio to enhance service delivery and contract compliance, quickly resolving any operational issues or reacting to customer queries. Moving forward, the company is also planning to introduce an online portal, which can be accessed by customers to view real-time and historical details of their individual security operations. Our longer-term aim is to integrate the software with our finance system" Reports will also be used by the payroll and finance teams to help calculate employee and customer billing. Accurate timesheets will be downloaded and exported to Consortio’s finance systems, along with holiday accrual, absence and pay rate data. “The added precision and adaptability of SmartTask means we can input different variables by employee and contract to create highly accurate reports. Our longer-term aim is to integrate the software with our finance systems to automate our payroll and billing processes,” explains Elliot Moss, Consortio Security’s Head of Finance. Accurate screening process Meanwhile, SmartTask’s vetting module will enable Consortio’s HR team to speed up and simplify its BS7858-compliant background checking and pre-employment screening processes for new employees. It will ensure the company is complying with legal regulations such as working history, DBS checks and right to work, as well as helping to effectively source appropriate references. SmartTask Vetting will allow certificates and identification documents to be uploaded, removing the need to store paper copies, while electronic reminders will allow the software to flag-up any upcoming expiry dates. According to Mick Stone, Head of Human Resources at Consortio Security: “SmartTask’s vetting module is already speeding up staff recruitment by having a fast and accurate screening process that is fully compliant with all legal regulations and our internal employment policies. We are, on average, reducing the time required screening a new starter by 40 per cent when compared to the previous system we had in place, which is freeing up valuable HR resource.”
The Security Industry Association (SIA) has selected Efrain Pardo as the spring 2020 recipient of the Denis R. Hebert Identity Management Scholarship, a program presented in partnership with the Center for Identity at the University of Texas at Austin offering $5,000 scholarships for SIA members to help further their education in the field of identity management. This scholarship program – named after Hebert, President of Feenics Inc. and a past member of SIA’s Board of Directors who served as Chair from 2016 to 2018 – is designed to support the professional development goals of individual SIA members and student members who specialise in identity management – a field involving the systematic control of access, authenticating users, securing assets and protecting privacy. Identity management encompasses many aspects of risk management, public policy, fraud prevention, privacy, data analysis, risk and governance, information technology and security. Identity management expertise Pardo – a SIA student member who has a proven track record of experience in network and information security – serves as a flight operations implementation specialist at Horizon Air. He is pursuing a Bachelor of Applied Science degree in networking and cybersecurity at Green River College and will use the scholarship funds to further his network and cyber security education. “SIA congratulates Efrain Pardo for being selected as the spring 2020 Denis R. Hebert Identity Management Scholarship winner and for his impressive accomplishments and dedication to helping to advance this foundational security space,” said SIA CEO Don Erickson. “SIA is proud to help cultivate members’ identity management education and career development through this unique scholarship program; it is critical that we continue to build on our identity management expertise to better address identity threats, protect privacy, secure assets and foster innovation.” Center for Identity Prior to his time at Horizon Air, Pardo held IT, research, sales, analyst and customer service roles with Prime Strategy, the Kline Group, Venues & Events – Global Travel, IDC and IBM. He holds a Master’s Degree in sales and IT from the United Kingdom’s University of Lincoln and a Bachelor’s Degree in Industrial Engineering and Information Systems from Monterrey Tech and is currently working toward certifications with the PM Institute and CompTIA. Applications are now open for the Fall 2020 Denis R. Hebert Identity Management ScholarshipThe Center for Identity at the University of Texas at Austin works closely with its public-private partners, including corporations, state and federal government agencies and law enforcement, to deliver innovations for consumers, businesses and government that help them to better protect people’s identities. Access and identity management As a critical component of its mission, the center conducts research to better understand how emerging technology such as biometrics affects consumers and organisations alike and how standards and expectations of privacy are evolving. Applications are now open for the Fall 2020 Denis R. Hebert Identity Management Scholarship. Each applicant must be either a SIA student member or a full-time employee of a SIA member company and have 1-5 years of professional experience in the security industry or a verified plan of study in the field of access and identity management. Scholarship funds must be used toward post-secondary education programs, including training courses, accredited college courses, certifications or other credentialing programs related to identity management.
AMAG Technology, a G4S company, expands its security offering with Symmetry Business Intelligence, a robust analytics engine designed to provide critical information via data analysis. Organisations can use the data from their access control system to determine if an employee or contractor is displaying abnormal behaviour. AMAG Technology is a pioneer in unified security solutions that helps organisations mitigate risk, ensure compliance, and lower the overall cost of a security program. Risk score methodology Symmetry Business Intelligence analyses how a person’s access activity is tracked and patterns established based on a risk score methodology. Anomalous behaviour may raise a person’s score, and high-risk identities are flagged in a dashboard. Scores are generated based on the reader location, time of day and a user’s access patterns Dashboards within Symmetry Business Intelligence provide the security team with an at-a-glance look at identities with the highest risk scores. Scores are generated based on the reader location, time of day and a user’s access patterns. Symmetry Business Intelligence helps to easily identify the employees, contractors and other identities that may pose the highest risk to a company. Cloud-based security systems “Symmetry Business Intelligence highlights anomalous behaviour, helping organisations discover unauthorised access patterns and possible threats worthy of further investigation,” said AMAG Technology, President, Howard Johnson. “It’s a natural extension of any security program.” Keeping in line with AMAG’s commitment to providing open solutions, Symmetry Business Intelligence has been designed from the ground up to easily integrate with other systems. Over the past five years, AMAG has released Symmetry CONNECT identity management, Symmetry GUEST visitor management and Symmetry incident management, all open, cloud-based security systems designed to provide more flexibility and options for the end-user.
Symmetry Business Intelligence analyses how a person’s access activity is tracked and patterns established based on a risk score methodology. Anomalous behaviour may raise a person’s score, and high-risk identities are flagged in a dashboard. Identify the employees Dashboards within Symmetry Business Intelligence provide the security team with an at-a-glance look at identities with the highest risk scores. Scores are generated based on the reader location, time of day and a user’s access patterns. Symmetry Business Intelligence helps to easily identify the employees, contractors and other identities that may pose the highest risk to a company. “Symmetry Business Intelligence highlights anomalous behaviour, helping organisations discover unauthorised access patterns and possible threats worthy of further investigation,” said AMAG Technology, COO, Howard Johnson. “It’s a natural extension of any security program.” Easily integrate with other systems Keeping in line with AMAG’s commitment to providing open solutions, Symmetry Business Intelligence has been designed from the ground up to easily integrate with other systems. Over the past five years, AMAG has released Symmetry CONNECT identity management, Symmetry GUEST visitor management and Symmetry incident management, all open, cloud-based security systems designed to provide more flexibility and options for the end-user.
RFID technology is nowadays considered to be almost pervasive. Thanks to this technology, objects or even living things can be identified and localised without contact. In order to meet the increasing demand for RFID hardware components, GERA-IDENT has now significantly renewed and expanded its production. Ramin Hassan, Managing Director of GERA-IDENT GmbH stated that "Demand for the construction of customer-specific ID points and their basic components such as RFID readers and antennas has increased significantly", clarifying the reason behind the expansion of the production area. Development of identification products and systems Electronics research and development have been pushed forward throughout the market; GERA-IDENT is currently reinforcing the development of identification products and systems for customers, as well as cooperating with universities and R&D institutions. In order to be able to meet the increasing requirements, design competence has been enhanced with new software, whereas the electronics area has been expanded to include new manufacturing and testing possibilities. Additionally, internal prototype production has also been expanded. The assembly area is now upgraded and equipped with more space and technology. Furthermore, new employees have joined the GERA-IDENT team and new regional partners have been acquired for mold construction / sheet metal processing, painting as well as for electronic components. "Apart from the fact that we can operate our production completely and permanently in Germany, we are laying the foundation for our future in the IoT."
Crossword Cybersecurity Plc, has announced that its Consulting division has signed several new agreements, including three with companies in the legal, insurance and financial services sectors, to help them improve their cyber security posture. A cyber transformation project has begun with a leading insurance company, the fourth client secured in the sector over the last twelve months. Crossword Cybersecurity will assist the company in improving its cybersecurity posture, building a more resilient organisation through improved risk management structures and introducing ongoing technical testing. Risk focussed governance structure The consulting team has also started work with a major UK law firm to implement new technical controls and a more risk focussed governance structure. This work follows a successful project carried out by Crossword to improve the organisation’s cybersecurity maturity and risk mitigation focus. Crossword’s vCISO product has also been rolled out by the consulting team within a global investment management firm Crossword’s Virtual Chief Information Security Officer (vCISO) product has also been rolled out by the consulting team within a global investment management firm – the third vCISO deal the team has secured. This new project follows the successful completion of a project to implement processes and controls to demonstrate the company’s compliance with the widely recognised IASME governance standard. vCISO – a virtual CISO service One of the key cyber security challenges organisations currently face is understanding and implementing the most appropriate levels of cyber maturity for their sector, and therefore allocating budget efficiently. In response to these challenges, Crossword launched vCISO – a virtual CISO service, managed by Crossword’s cybersecurity experts. The vCISO service provides clients with a virtual cybersecurity team and network protection at a fraction of the cost of building their own in-house team, at a time when building such teams can take many months and skills are in short supply. Protection from cyber security attacks Crossword Cybersecurity’s consulting division has made a strong start to the year" Crossword’s Consulting team offer a full range of services from cyber assurance and auditing to penetration testing, third party assurance and its vCISO offering. Whatever an organisation’s size or level of cyber maturity, Crossword Consulting is able to offer a service tailored to its needs. Regarding the recent deal announcements, Stuart Jubb, Managing Director of Crossword Consulting, commented: “We are delighted that Crossword Cybersecurity’s consulting division has made a strong start to the year and gained further traction in several sectors. This reflects the high regard with which our consultants are held, in what is an extremely competitive market. “It is a pleasure to announce our third vCISO client and the number of vCISO opportunities in our pipeline continues to grow. We believe that by using our vCISO service, clients are able to have peace of mind that they are taking the right measures to protect themselves from cyber security attacks whilst achieving excellent value for money.”
Many industries are, to a greater or lesser extent, in the throes of digital transformation. As with any change programme, digital transformation efforts often under-perform against expectations. Yet, the number of digital transformation programmes continue to increase, as commercial pressures intensify. As security professionals we need to embrace our role in digital transformation, as security is everybody’s business. For all those people weary of hearing about digital transformation and believe it’s a business fad, consider your own behaviours. If you use a smartphone to search, find, order, buy, message, watch, learn, play, bank, pay, enter, exit, navigate, communicate and more then you are part of the reason that digital transformation is a commercial necessity. The way we live our lives has changed significantly over the past twenty years and this needs to be reflected into how we rethink the way we do business. Digital transformation is about more than technology, it allows people to solve their traditional problems in new and better ways than before. Better can mean faster, at lower cost, using fewer resources, easier to maintain, more compliant and/or easier to report insights. IoT, criminal activity and security The number of internet connected devices worldwide is increasing at an exponential rate; by the end of 2025 there are expected to be 75.44 billion. Internet of Things (IoT) means digital transformation converges physical and digital for security professionals. Criminals use smarter digital tools such as malware, drones, key cloners, signal readers and more, which impact both physical and cybersecurity. To counter this, digital transformation provides security professionals with access As security professionals we need to embrace our role in digital transformation, as security is everybody’s businessto valuable actionable insights to identify and deter threats to people and assets. All transformation starts with an idea generated by people and ends with people experiencing the output. Therefore, digital transformation starts and ends with people. To ensure a solid foundation to any digital transformation agenda, people need to have a clear purpose to engage. This is where security leaders can inspire their colleagues with a laudable purpose of embracing disruption at the same time as focusing on safeguarding people and assets. Non-security colleagues should understand that security risks are advancing at a faster pace than enterprises can adapt. As a security leader, you are advocating a movement where your colleagues adopt relevant enterprise security risk management practices in their daily thinking and working. The message is clear that digital transformation presents abundant opportunities and these need to be evaluated alongside the proliferating security threats that can become a business continuity failure. Security professionals and digital influence The number of internet connected devices worldwide is increasing at an exponential rate; by the end of 2025 there are expected to be 75.44 billionSecurity professionals can influence digital transformation success by translating an enterprise’s strategy into secure operational reality. The security narrative should emphasise the people side of digital transformation and how technology can act as an enabler of a safe and secure experience, both for employees and customers. Operationally, digital transformation is about agility, adaptability and navigating uncertainty. Old ways of thinking and working will be blockers to transformation, so security leaders ought to identify the rapid enablers of a ‘secure’ digital transformation. Better people, processes and overall technology People generally don’t want more in their lives, they want better. Better people. Better data. Better technology. Better processes. Digital transformation creates significant ‘better’ benefits for security: For example, connected (IoT) sensors, video analytics at the edge and machine learning identify threats faster; workflow technologies and automation detect, investigate and remediate routine responses; cloud provides many benefits such as agility, scale and mobility; and, smartphones/digital devices provide real-time communication and collaboration. Tackling all the ‘better’ needs within a security approach is necessary – focusing on the prioritised commercial needs first. Think about how to drive radical simplification into digital transformation agendas to ensure complexity doesn’t create too many unmanageable risks. Designing enterprise security risk management into the business operating model will facilitate colleagues to be empowered for safe and secure change. Communicating security successes and breaches with commercial impact insights in a timely and concise manner across the enterprise will prove the value of active security engagement throughout digital transformation programmes. Transforming the world Digital technology is transforming the world around us, in a way that impacts every area of security. Security professionals are now businesspeople and technologists, in addition to their traditional security remits. Embracing this impacts security recruitment, training and employee engagement, within the security team and with non-security colleagues. Without a doubt, security professionals are integral to digital transformation programmes.
ISC West, the world's largest security industry trade show, is just around the corner. This in-person show gathered more than 1,000 manufacturers and over 30,000 visitors from all over the world in 2019. On top of that, more than 200 brands exhibited at ISC West for the first time. This year's event promises to be just as exciting, if not more so. Let’s overview some leading security trends in video management systems development, and what's worth your time and attention at ISC West 2020. AI analytics Emerging two or three years ago, the AI-based video analytics market is experiencing a boom in growth. The prototypes and ideas displayed at ISC West 2019 could This year's event promises to be just as exciting, if not more soalready be part of a functioning system today. There's a lot of hype around this new trend. So, if you're looking for solutions for your needs, it is important to be able to tell the difference between technologies that work and marketing bluster. To do that, you have to understand what today's AI-based analytics (also often referred to as a neural network, deep learning, or machine learning) can and can't do. Let's start with what AI can't do in video surveillance. It can't analyse the sequence in which events occur or understand the 'logic' of what's happening in the scene. In other words, there's no such thing as a 'suspicious behavior detection tool'. Nevertheless, neural networks are really good at recognising and classifying objects. For instance, they can distinguish humans from vehicles, vehicles from other moving objects, and cyclists from pedestrians. Neural network trackers This technology is primarily used as a neural network tracker or object tracker that can identify and track objects of a specific type. Usually, it's applied to complex scenes with a large amount of non-relevant details where a classic tracker would drown in false alarms. The neural tracker can be used to detect people in dangerous areas at production facilities, cyclists riding on pedestrian lanes, or poachers trying to sneak into a nature preserve. Neural networks are really good at recognising and classifying objectsObject identification function can be used for other site-specific tasks, such as detecting people without a helmet or a high-visibility vest at facilities where those are required by safety regulations. It can also be used to detect fire and smoke in open spaces, or at big premises with high ceilings or active air circulation, where common fire alarm systems can't be used or may go off too late. Behaviour analytics Behavior analytics is another field of analytics based on artificial neural networks. Even if recognising suspicious or inappropriate behavior is nearly impossible, it can detect risky situations based on human postures, such as an active shooter pose, raised arms, crouching, or man down. In addition to that, AI has been successfully used to perform facial and number plate recognition for quite some time now. Although these systems aren't new, their recognition quality improves each year. Looking for solutions? You'll definitely find some interesting and new options from developers specialising in VMS and modular AI analytics at ISC West 2020. Even if recognising suspicious or inappropriate behavior is nearly impossible, AI can detect risky situations based on human postures Smart search The ability to perform a quick, flexible search in a video archive is one of the most important features of a video surveillance system. In many ways, it's even more AI has been successfully used to perform facial and number plate recognition for quite some time nowimportant than real-time monitoring itself. Constantly keeping an eye out for what's happening onsite is the security service's job. Medium- to large-sized companies usually have that kind of department. Meanwhile, lots of small businesses and households use video footage to investigate accidents, resolve conflicts, or analyse employee's work. They generally don't need real-time monitoring, but video search is a crucial element. The most basic search tools offer an interface that enables easy access to recorded video and event-based search (from video analytics, detectors, etc.). Smart systems with forensic search features that allow the user to set criteria enhance the system's search capabilities even more. How it works VMS analyses the video as it is recorded and saves the resulting metadata to a database. In the most basic case, the metadata contains information about motion in the scene as well as the moving object's coordinates. When searching, you can select an area of interest within the frame and take a quick look at all video segments containing motion in this area. More advanced systems save the parameters of moving objects, such as their size, color, motion speed and direction. TThe ability to perform a quick, flexible search in a video archive is one of the most important features of a video surveillance systemYou'll quickly find what you're looking for by setting more precise criteria. The first VMS with forensic search features appeared in the early 2010s. Since then, a growing number of users and VMS developers have recognised the importance of these tools. More and more manufacturers enrich their products with forensic search features, starting from basic search by motion detection. Integrating search functions with AI Recently, search technologies have gone even further by integrating search functions with AI analytics. Some systems are capable to recognise all faces and number plates captured by cameras and save them to the database. You can quickly find all videos containing an image of a person or a car just by searching a photo or a number plate across multiple camera archives at a time. One usage scenario for these systems can be seen in law enforcement deploying them to find suspects using CCTV cameras around the city. Another option for integrating smart search and AI is searching by criteria based on a neural network tracker. When you use it, you can set object's size, color, motion speed and direction in the scene, as well as object's type (such as a human or a vehicle). So, if you need to find out when a red car appeared in the surveillance area, the system will show you only red cars while ignoring other objects like people in red clothes. This technology lets you find what you're looking for even faster. If you or your clients use VMS primarily to record video, be sure to ask the manufacturers you'll talk to at the show what search capabilities they offer. More advanced systems save the parameters of moving objects, such as their size, color, motion speed and direction Hardware AI acceleration High CPU resource consumption is one of the hardest challenges that stem from implementing a neural network–based video analytics system. This significantly decreases the number of cameras that can be connected to a server that hosts AI analytics. It also makes the system much more expensive. AI technology lets you find what you're looking for even fasterThe solution is to use AI accelerators. GPUs and dedicated accelerator cards are used on servers to provide hardware acceleration for the neural networks' workload. These devices are mostly manufactured by Intel and NVIDIA. Intel also offers the OpenVINO™ toolkit, a software package for developers that helps distribute workload between CPU, GPU, and accelerators as effectively as possible using all available resources. New solutions Due to AI's growing popularity, lots of minor microchip manufacturers became interested in developing neural accelerator chips. The healthy competition will work in the market's favor, serving to stimulate tech development and cut prices. New solutions in the field were on display at ISC West 2019; they'll definitely be present at ISC West again in 2020. Developers specialising in VMS and modular AI video analytics should absolutely check these out. But users should understand that it's impossible to build a cost-effective video surveillance system with significant number (10–20 and more) of AI analytics channels without using neural accelerators. That said, various accelerator models may significantly differ in price and power consumption. So, when you talk to developers specialising in VMS and AI analytics modules, ask what accelerator makes and models they support. In conclusion Whether you're an integrator looking for interesting VMS offers for clients or an end-user searching for solutions to your own tasks, check out what AI analytics can do. This sector is developing very fast and is continuously introducing new features that may be just what you're looking for. Incorporating forensic search in recorded video footage is key to building an effective video surveillance system for users, and important to creating a unique product offering for integrators. Needless to say, you can't build a cost-effective video surveillance system without using CPU resources wisely. If a system's functionality completely aligns with what you're looking for, ask what neural accelerator hardware it supports to correctly estimate the cost of your video servers.
It’s not just a new year, it’s a new decade. And somehow this makes it feel bigger. Almost like we’re moving faster or reaching farther. Technology is certainly advancing at an unprecedented pace. While there’s a lot to talk about, there are three big security trends that we think will continue to have a huge impact in the year to come. 1. What is artificial intelligence and is it going to take over? We’ve seen countless versions of artificial intelligence (AI) in pop culture—think of Sonny in the 2004 film I, Robot or Rachael in Blade Runner—so we feel we know the technology. And, based on this, we believe our anxieties around it are warranted. But, the truth is that the science to produce even far less sophisticated versions of these characters just doesn’t exist. AI today Computers use data to help improve performance without being explicitly programmed Today’s AI science is focused largely on machine learning. With machine learning, computers use data to help improve performance without being explicitly programmed. This means that, through the use of algorithms and training, a computer can be programmed to determine which features it should use in the identification process to efficiently produce the most accurate output. Over time and based on a trainer’s feedback, for example, a computer can determine that using color rather than shape to identify a flower is more efficient because the results are more accurate. Machine learning in the physical security industry In the security sector, we’re seeing good results with automatic license plate recognition (ALPR) systems that employ machine learning. Today’s ALPR cameras and systems are better at recognising license plates from different countries, states, or provinces because they’re more efficient at identifying an ever-expanding number of inputs. We don’t need to worry that AI will be running our lives So, we don’t need to worry that AI will be running our lives. And, in fact, we should be relieved that machine learning can be used to identify scofflaw plates as this will help keep our roads and spaces safer. 2. Can we move beyond the single, secured door? With increased globalisation and the rise of multinational companies, organisations everywhere are facing new challenges around visitor, and employee access management. Protecting your environment is no longer as easy as securing a single door. As the nature of work becomes more complex, organisations are going to have to take a different approach for managing the flow of people through their facilities. Organszations are going to have to take a different approach for managing the flow of people through their facilities The challenges of traditional access control We’ve seen that relying exclusively on a static access control system can increase workload and inefficiencies. With this approach, granting and revoking temporary access and provisioning employees is a labor-intensive process. It requires hands-on participation from security operators and front office staff. There is no guarantee that corporate or regulatory policies are being followed as well as little-to-no traceability. And, ultimately, the process is, by its very nature, prone to human error. Large conglomerates have been meeting these challenges by developing tailor-made solutions based on physical identity management. These systems are costly and require 3rd party support. Smaller organisations simply could not afford the time or resources necessary to implement them. Heading into 2020, we’re seeing an increase in out-of-the-box solutions that will allow organisations of all sizes to move to cloud-based identity management systems. How Physical Identity and Access Management (PIAM) systems can help More affordable Physical Identity and Access Management (PIAM) solutions will help organisations secure their systems and facilities by effectively managing access requests based on an individual’s identity and an organisation’s security policies. They can ensure that only those individuals who have the right to access a secured area can do so by managing and automating the process. In effect, by extending an access control system with a PIAM, organisations of any size will be able to reduce workloads, fully implement corporate policies, and better protect their spaces. 3. Should we be nervous about facial recognition? We shouldn’t be surprised by the public’s fear of facial recognition. The idea that private citizens can be identified and tracked in public is the stuff of political espionage and sci-fi thrillers. But, beyond the fictional examples, we’ve also seen cases where facial recognition gets it wrong. Incorrectly identifying an innocent man for a robbery twice or having difficulty distinguishing members of the same race are just some of the real-world reasons people don’t trust facial recognition. How facial recognition can increase security Facial recognition technology can play a huge role in helping keep people, assets, and spaces safe. It can monitor visitors to improve safety and efficiency, assist security personnel by helping to reduce response times, and aid in the investigation of incidents. Facial recognition technology can play a huge role in helping keep people, assets, and spaces safe In the coming year, we’re going to see a greater focus on developing solutions that use a privacy-by-design approach. For video surveillance applications, this will include the ability to automatically mask—through blurring or pixelation—persons in live and stored video feeds. The system itself will ensure that only authorised personnel can access un-pixelated or blurred images and only in cases that warrant it. Anonymisation Using this approach will help reduce concerns and increase protection, which will lead to greater accuracy and trust. In parallel, technology providers must continue to work with regulating bodies to ensure that the policies around implementing and using any surveillance technology, especially facial recognition, align with our values. With all these trends, we’re seeing the relationship between people and technology evolving. When we focus on improving the lives of people in our communities, we can harness the power in these advancements and make a real difference.
Facial recognition continues to be a political football and a target of privacy activists in the United States. For example, San Diego has suspended its use of facial recognition scanners by law enforcement after a campaign by civil rights groups. The San Diego Tactical Identification System (TACIDS) programme included a database of facial recognition scans shared by 30 local, state and federal agencies. A California law, passed in the fall, puts a three-year moratorium on law enforcement use of face recognition technology. A proposal in Congress would prohibit use of biometric recognition technology in most public and assisted housing units funded by the Department of Housing and Urban Development (HUD), thus protecting the more than two million public housing residents nationwide from being “over-surveilled.” The “No Biometric Barriers to Housing Act” is supported by the NAACP, the National Housing Law Project, National Low-Income Housing Coalition, National Action Network, Color of Change, and the Project on Government Oversight. The problems of Facial Recognition "Studies that show that facial recognition systems may misidentify many individuals including women and people of colour" A letter from seven members of Congress to HUD Secretary Ben Carson questioned the use of facial recognition in federally assisted housing because it “could be used to enable invasive, unnecessary and harmful government surveillance of…residents.” The letter cites studies that show that facial recognition systems may misidentify many individuals including women and people of colour, thus “exacerbating vulnerabilities that marginalized groups already face in life.” In June, Somerville, Mass., became the second U.S. city to ban the use of facial recognition technology in public spaces. The first was San Francisco. A coalition of organisations and trade associations has issued a letter to Congress outlining concerns with “blanket prohibitions” or moratoriums on facial recognition technology and listing beneficial uses for public safety, national security and fighting fraud. The Security Industry Association (SIA) is part of the coalition, the Information Technology and Innovation Foundation. A letter from seven members of Congress to HUD Secretary Ben Carson questioned the use of facial recognition in federally assisted housing Facial recognition technology has benefited Americans in many ways, such as helping to thwart identity thieves" The letter says: “While polls consistently show that Americans trust law enforcement to use facial recognition technology responsibly, some groups have called for lawmakers to enact bans on [the] technology. While we agree that it is important to have effective oversight and accountability of these tools to uphold and protect civil liberties, we disagree that a ban is the best option.” Development and guidance As alternatives to outright bans, the letter proposes expanded testing and performance standards, develop of best practices and guidance for law enforcement, and additional training for different uses of the technology. “Facial recognition technology has benefited Americans in many ways, such as helping to fight human trafficking, thwart identity thieves and improve passenger facilitation at airports and enhance aviation security,” says Don Erickson, CEO of SIA. “SIA believes this advanced technology should be used in a safe, accurate and effective way, and look forward to working with Congress to help the U.S. set the example on how to ethically and responsibly govern this technology.” SIA has produced a document called “Face Facts: Dispelling Common Myths Associated with Facial Recognition Technology.”
Security’s intersection with consumer electronics is on view at CES 2020, the world’s largest technology event, Jan. 7-10 in Las Vegas. The giant show features more than 170,000 attendees, 4,500 exhibitors and 1,100 industry thought-leaders featured on the CES stage. A range of technologies will be on display, from artificial intelligence (AI) to 5G, vehicle technology to AR/VR (augmented and virtual reality), robotics to home automation. Security plays a prominent role, too.The impact of this event for the smart home could be about delivering home analytics and enhancing privacy" Smart home market on the forefront The smart home market is a major focus. “For the smart home market at CES this year, we expect to see numerous announcements regarding home awareness,” says Blake Kozak, Senior Principal Analyst at IHS Markit. “This will include brands offering up additional analytics for consumer security cameras with a focus on edge-based solutions.” “The impact of this [event] for the smart home could be about delivering home analytics and enhancing privacy through cloudless architectures and new electronic door lock approaches,” he adds. An example of cloud analytics is the Resideo Home app, introduced in December, which will make whole-home monitoring possible for four critical networks of the home – water, air, energy and security. Resideo promises a “simplified and integrated smart home experience.” Video is also prominent at the show. “For cameras, we can expect to see more cameras focused on the outdoor space and possibly new form factors for video doorbells,” says Kozak. Familiar security industry brands exhibiting at CES 2020 include ADT, Ring, August Home and Yale (both part of ASSA ABLOY), Bosch and Alarm.com. Focus on Cybersecurity In 2020, companies will continue to focus on solutions for protecting consumer data" Cybersecurity is an aspect of many of the devices on display at CES. “Device security and data privacy play a key role in the adoption of connected devices,” says Elizabeth Parks, President, Parks Associates. “Consumer security concerns for smart home products will continue to be a barrier to adoption in the U.S. and Europe, and these concerns can actually intensify with device adoption-71% of U.S. smart home households are concerned about cybersecurity. In 2020, companies will continue to focus on solutions for protecting consumer data. One big area of interest is protection on the network router, providing whole home solutions, which are very appealing to consumers.” “At CES we will see the traditional players introducing new DIY (do-it-yourself) products, as well as new players announcing new product features, services, and partnerships,” Parks adds. Smart access control Smart locks will be among the security products at CES 2020. For example, PassiveBolt, a lock company, will show the Shepherd Lock, a touch-enabled smart lock with enhanced security through sensors and AI. The add-on lock converts existing locksets into touch-activated devices. Another lock manufacturer is Kwikset, whose door locks and door hardware include Wi-Fi-enabled smart locks, Bluetooth-enabled smart locks, keyless and keyway-less locks and connected home technology. Video doorbells, including industry-innovator Ring, have been a hit in the consumer market. At CES, Ring will expand the mission to make neighbourhoods safer by creating a “Ring of Security” around homes and communities with a suite of home security products and services. The “Neighbors by Ring” app enables affordable, complete, proactive home and neighbourhood security. Homeguard offers a range of affordable CCTV solutions for home and small business DIY CCTV demonstrations DIY security systems are another market. Homeguard is a leading DIY consumer brand offering a range of affordable CCTV solutions for home and small business, including wired and wireless CCTV kits, smart cameras, home alarm systems and wire-free HD CCTV kits. Swann Communications is also at the forefront of surveillance and monitoring with new products developments including wire-free HD cameras and doorbells, professional CCTV video surveillance systems, and 1080p full HD systems with “True Detect” heat and motion sensing. AVTECH, and subsidiary YesGo Tech, will demonstrate a compact Wi-Fi home security set, a series of special cameras with face recognition, thermal detection and license plate recognition, customised central management software and a university ID tag that is compatible with access control, OEM and ODM opportunities. Security and automation solutions D-Link’s home networking, security and automation solutions will help consumers connect, view, share, entertain, work and play. SECO-LARM, manufacturer of a Room Occupancy Monitor that shows whether a room is in use, has a line of keypads and proximity readers with built-in Bluetooth for convenient access. Another smart home security solutions provider, Climax Technology, integrates wireless security, home automation, energy management, home emergency monitoring and live visual monitoring. Personal safety mobile application Manufacturers are positioning outdoor cameras as deterrents to theft before a burglary happens" WaryMe designs and develops a personal safety mobile application to improve a user’s security in public places, schools, transports and companies by addressing major risks such as terrorism attacks, intrusion, fire and even industrial accidents. An all-in-one mobile application integrates alerting, crisis management and mass notification features. “Market players are looking to expand beyond established smart home devices like smart thermostats and networked cameras to products like smart water leak detectors, smart pet feeders, and smart air purifiers,” says Elizabeth Parks. “Manufacturers are positioning outdoor cameras as deterrents to theft before a burglary happens. This trend is part of a broader security marketing effort to extend the perimeter of home security beyond traditional home access points.” “Familiarity with smart home devices lags behind familiarity with smart entertainment products; it even lags that of smart speakers, which are quite new in the market,” adds Parks. “In 2020, we will see players working to advance the visibility and marketing around device integration, and specifically focus on use case scenarios around safety, security, and convenience, which have always been the primary drivers of adoption of these types of products.”
Technology is expanding passenger screening functions and other capabilities at airport security checkpoints. For example, Smiths Detection is exploring the concept of a security checkpoint that integrates biometric identity management with screening solutions, says Richard Thompson, Global Market Director Aviation, Smiths Detection. Biometrics is the “unique identifier’” for passengers, and through integration of biometrics directly into the checkpoint, passengers can be matched with their luggage trays to enable real-time risk-based screening (RBS). The system is now able to trigger differentiated workflows for each passenger and their bags. Risk-based screening Risk-based screening optimises security operator resources through enhanced screening of passengers who represent a higher risk, while passengers deemed to be low risk enjoy a more seamless journey.Passengers deemed to be low risk enjoy a more seamless journey Easily integrated with existing infrastructure, biometric checkpoints deliver operational efficiencies and a competitive advantage to airports through accelerating the screening process, thus enabling a more seamless free flow of passengers. Passenger and tray identification Through passenger and tray identification, new data insights can also be gathered to inform decision-making. Advanced data analysis based on flights, airlines or destinations could be utilised by airlines and security authorities. For example, airlines could monitor passenger flow through security for specific flights or track the number of trays per flight to predict overhead compartment capacity. Checkpoint data could also be combined with hold luggage screening results or shared with transit and arrival airports to better inform security assessments. Advanced data analysis based on flights, airlines or destinations could be utilised by airlines and security authorities Advanced screening of carry-on baggage Smiths Detection’s HI-SCAN 6040 CTiX offers advanced screening of carry-on baggage using Computed Tomography (CT), an advanced X-ray technology originally intended for medical applications, which allows for detailed, layered 3D images to be rotated and dissected. Electronic devices and liquids do not need to be removed from baggageThis enables detailed detection, meaning electronic devices and liquids do not need to be removed from baggage, thus expediting screening and further improving the passenger journey. Smith Detection’s iLane.evo is an automatic tray return system. By delivering a steady flow of trays, it plays a critical role in streamlining the screening process and delivering increased throughput; optimised operational costs; and an improved passenger experience. AI for object recognition In other trends, the use of artificial intelligence (AI) in aviation security is on the rise due to the exponential growth in computing power. It has the potential to significantly boost the performance of screening equipment – allowing for the deployment of new object recognition functions at the checkpoint, which could pave the way for a more automated, alarm-resolution-only passenger screening. Smiths Detection has developed a family of smart algorithms, called iCMORE, which use machine learning to reliably detect prohibited or dangerous goods in baggage, including weapons, to reduce the burden on image analysts and improve screening outcomes.
Oman Airports manages and operates all civil airports in the Sultanate of Oman. As a result of the growing aviation sector in the Middle East, Salalah, Duqm and Muscat International airports were all recently redeveloped with new state-of-the-art terminal facilities and technologies. Access control solution To protect Oman Airport’s growing number of passengers and new hi-tech terminal buildings, Oman Airports required an advanced access control solution that not only incorporated the latest advances in technology but also had proven resilience within the aviation industry. With 30 years’ experience of securing airports around the world, the CEM Systems’ AC2000 Airport security management system was the ideal match. As the largest airport in Oman, Muscat International’s upgrade was a landmark $1.8 billion expansion project. Phase one involved the construction of a new state-of-the-art 580,000 sqm Terminal 1 building, which was officially inaugurated for operations in March 2018. CEM intelligent card readers additionally feature a large internal database for offline card validation" Airport edition access control system “Oman Airports required a proven, fully integrated security solution to secure Muscat Airport’s new hi-tech Terminal 1 building, as well as a number of its external peripheral buildings. At the same time we were also awarded the contract to secure the new Salalah and Duqm Airports in Oman. “This allowed all three airports to use the CEM Systems’ AC2000 Airport Edition access control system and share a commonality of security infrastructure for operational excellence. We congratulate Oman Airports in their achievement and are delighted to be part of such an important leading infrastructure project for the development of Oman.” said Philip Verner Regional Sales Director, Security Products, Johnson Controls. Intelligent IP card readers CEM Systems’ range of intelligent IP card readers with integrated controllers (S610e, S700 readers) were installed throughout Oman Airports to provide the highest possible level of on-board smart card technology. CEM intelligent card readers additionally feature a large internal database for offline card validation and can store up to 200,000 cardholder records and 50,000 transactions offline. This ensures zero system downtime, prevents any loss of transaction data and delivers the highest possible level of system reliability within airports. Over 3,000 CEM IP card readers were installed throughout Muscat Airport’s new Terminal 1 to protect airside and landside locations, including 45 arrival and departure gates, 29 jet-bridges and 82 immigration counters. Emerald touchscreen terminals CEM Systems’ emerald touchscreen terminals have also recently been chosen by Duqm airport A large number of outlying annex buildings (spread out over 30,000 m2) were also secured with CEM intelligent card readers. These included a new 97m high Air Traffic Control (ATC) tower, aircraft hangars, cargo and crew facility buildings and the new pivotal headquarters building for the Public Authority for Civil Aviation (PACA). CEM Systems’ emerald touchscreen terminals have also recently been chosen by Duqm airport for heightened security. Emerald is a combined access control card reader and controller featuring fully integrated Voice over IP (VoIP) intercom, onboard Power over Ethernet technology and a range of smart airport applications and operational modes, all in one single, powerful terminal. Integrated biometric and access control solution For areas of heightened security, over 1,300 CEM fingerprint card readers (S610f & emerald fingerprint terminals) have also been installed throughout all three Oman airports. As an all-in-one advanced IP card reader, controller and integrated biometric solution combined, CEM fingerprint readers uniquely provides three layers of security (card, PIN and biometric verification) via one hardware device and one integrated software enrolment process. This eradicates the need for a separate biometric enrolment solution, provides a quick and accurate biometric read time and ultimately creates less biometric verification errors at the door/gate. Intelligent IP readers critically provide Oman Airports with aviation specific door modes Gate room management CEM Systems’ intelligent IP readers also go beyond security by helping airport operations. Intelligent readers are used to enable air-bridge monitoring, provide check-in-desk enabling, control baggage belts and assist with airport passenger flow and gate room management. Intelligent IP readers critically provide Oman Airports with aviation specific door modes such as ‘Passenger mode’ which enables the efficient management of gate rooms for departing and arriving passengers. Passenger mode controls the open times of single or interlocking doors, ensuring Gate Room doors are opened or closed depending on the configuration set for a specific flight. The user-friendly LCD screen on CEM card readers effectively acts as a smart information point for ID staff and flight agents and allows staff to easily manage the Gate Arrivals process on the ground. S3040 portable hand-held readers Oman Airports now utilise portable card readers to enable random ID checks on personnelCEM Systems’ S3040 portable hand-held readers uniquely protected Muscat International Airport during its initial construction phase in December 2014. Portable readers enabled ID card validation at temporary airport site entrances and gates, which at the time of construction had no power or comms. Oman Airports now utilise portable card readers to enable random ID checks on personnel throughout all three airports. Designed specifically for airports, CEM Systems’ AC2000 Airport security management system provides powerful aviation-specific access control throughout airside and landside areas. Using a range of powerful AC2000 Airport software applications, Oman Airports benefit from sophisticated ID badging, airport visitor management and high levels of airport systems integration. Open architecture integration tools CEM Systems’ open architecture integration tools successfully enabled the AC2000 access control system to be seamlessly linked with other airport security systems including video, perimeter detection and Oman Airport’s central ‘Airport Operating System’ for the resolution of maintenance faults. This ensures that system maintenance faults and alarms are dealt with promptly, efficiently and with full accountability. Oman Airports use the CEM Systems’ AC2000 VIPPS application to manage airport pass applications and biometrics To provide the highest possible level of smart card security to over 30,000 authorised card holders, all three Oman Airports utilise highly secure CEM DESFire smart card technology with multiple layers of encryption. Oman Airports use the CEM Systems’ AC2000 VIPPS (Visual Imaging Pass Production) application to successfully manage airport pass applications and biometrics. AC2000 Visitors application The AC2000 Visitors application also provides a powerful tool for Oman Airports to monitor and control ID card access for visitors and temporary airport staff. Information such as ‘name of airport sponsor’ can be recorded and once visits have been completed, cards can then be recycled, creating efficiency savings within the airport ID centre. Moving forward, CEM Systems will continue to work together in partnership with Oman Airports and their chosen system integrators as all three airports move into their next development phases. It is understood that airport security needs and legislation requirements change over time and thus CEM Systems will remain flexible to help meet their evolving project needs.
Many organisations use hundreds and even thousands of surveillance cameras on their premises. They are used for crime or loss prevention, to have supporting evidence after the fact, to reduce liability, and to protect their reputation. The public generally expects that surveillance footage will be available after an incident and therefore it is almost a must to have a camera system. The US alone has over 200 million security cameras already installed with substantial growth anticipated over coming years. Most expensive camera A simple answer to this problem would just be to check every camera at least once a day, every day At any time and without warning, it is possible for problems to arise that affect the view of a camera. Examples include a branch of a tree growing in front of a camera’s view, bugs creating a nest inside a camera dome, condensation accumulating on and around the lens, wind knocking a camera off its axis, malicious tampering with the camera, dirt or mud sticking to the camera, among many others. When that happens, even the highest quality and most expensive camera will not capture the desired field of view and crucial evidence will be missing. Our survey effort of over 100,000 cameras indicates that at least 50% of cameras in a camera system will have a view problem each year. Theoretically at least, a simple answer to this problem would just be to check every camera at least once a day, every day. Artificial intelligence software But for an institution with hundreds or even thousands of cameras, this task is laborious and subject to human error. That’s where Ai-RGUS comes in. Named after the all-seeing giant from Greek mythology, Argus, Ai-RGUS is artificial intelligence software that monitors security cameras and makes sure that they are all working according to a reference image. The ‘i’ in Ai-RGUS is silent, and it indicates that the technology uses AI. Because the CIO of Duke couldn’t find any software on the market that would solve the problem It was designed by CEO Daniël Reichman, PhD, and is the continuation of a project that Duke University requested to be developed from Daniël’s lab at Duke while he was completing his Ph.D. in electrical and computer engineering at Duke, in order to help the university keep its then-1,100 cameras in working order. They requested it from their own lab, because the CIO of Duke couldn’t find any software on the market that would solve the problem of verifying the camera views. Consistent level of verification Although Duke was conducting regular manual inspections of their cameras, this process was onerous, costly and time-consuming for the team members. Furthermore, it was very burdensome to verify and audit manual inspections to ensure that both a consistent level of verification and to be sure it was regularly done. The goal was to avoid the situation of finding out a camera was not aimed right or was not recording until they went to access the video for evidentiary purposes… exactly the time you don’t want to find that out! “It’s a huge investment to put up 1,100 cameras,” Daniël Reichman, Ph.D., said, “so they want to make sure that once they have them, they can actually count on having the images from the cameras.” Camera inspection results Thanks in part to Ai-RGUS, Duke was able to nearly double its camera system in 2 years Since 2017, the software is operating successfully at Duke University. Thanks in part to Ai-RGUS, Duke was able to nearly double its camera system in 2 years. Duke’s Office of Information Technology reports that “We spend on average 5 minutes a day to inspect 2,000+ cameras thanks to Ai-RGUS.” A company spun out of this effort, called Ai-RGUS, with the University as a stakeholder. Ai-RGUS comes with a web dashboard that will allow you to see camera inspection results as well as historical analytics about your cameras system. It has an easy and automated install process and is agnostic to camera system size. It also comes with an API to integrate with your ticketing system. Ai-RGUS keeps security cameras in check by first requiring users to take a reference image that the software will use as the basis for comparison to the current image it sees. Identifying faulty cameras Potential problems that Ai-RGUS could identify in an image are blur, tilt, tamper, obstruction, glare, low light and a blank/black screen or feed down. If Ai-RGUS identifies a problem in a camera it will mark it as ‘unwell,’ so its owner can fix it. Ai-RGUS also keeps track of when cameras are habitually ‘unwell’ to help owners to identify faulty cameras for potential replacement. For security camera owners, it was such a headache to install the cameras" “It’s the kind of thing where you can set it and forget it,” Daniël said. “Ai-RGUS sends you emails when it needs to, it also has an API that can connect to an already existing ticketing system. Otherwise, don’t bother looking at the camera views. The surveillance camera hardware and software space is so complicated and fractured, we’re trying to make it as simple as possible. For security camera owners, it was such a headache to install the cameras. Now we want to make sure the system works as intended.” Video management software Ai-RGUS started its commercial efforts in May 2019 and have gained much traction since. The headquarters are still located in Durham, NC, and commercialisation efforts are done from Las Vegas, NV. Among the many partners who signed up and utilise Ai-RGUS are Duke University, the City of Las Vegas, Thomas and Mack, Green Valley Grocery, Temple Beth Sholom, among others; to show that Ai-RGUS is suitable for deployment in many vertical markets. Now, Ai-RGUS is focusing more on further discussing partnerships with system integrators, distributors, and camera installation services, along with Video Management Software companies, which can include Ai-RGUS at the time of installation or for legacy systems to existing clients as a bonus service.
HID Global, globally renowned company in trusted identity solutions, has announced that the traffic branch of the Singapore Police Force has deployed an electronic Know Your Customer (eKYC) system that uses HID Lumidigmâ V-series Fingerprint Sensors to verify the identities of driver’s license applicants. Lumidigmâ V-series Sensors The HID Lumidigm sensor’s patented multispectral imaging technology has helped improve identity-verification speed and efficiency as compared to their previous paper-based process, and its proven liveness-detection capabilities significantly diminish the risk of fraudsters compromising the eKYC system. The new eKYC system improves security by using fingerprints to verify the “true identity” of driver’s license applicants Deployed by HID partner Secur Solutions Group at Singapore’s three driving schools, the new eKYC system improves security by using fingerprints to verify the “true identity” of driver’s license applicants. The speed and reliability of the Lumidigm sensors has enabled the entire enrollment process to be performed at kiosks in seconds, from fingerprint capture through matching against the actual identity documents (NRIC/Work Permit). Fingerprint sensors The Singapore Police Force is now enrolling 500 to 700 individuals a day at the kiosks since deployment and has cut almost 1,500 man-hours of labor per month since eliminating its staffed counters and manual workflow. “The HID Lumidigm sensors have outperformed all alternatives with respect to speed, accuracy and consistency of image acquisition regardless of finger or environmental conditions,” said Tseng Wun Hsiung, CEO of Secur Solutions Group. “New opportunities are being considered for service enhancement and parts of the eKYC system are being evaluated for integration.” Integrated with multispectral imaging technology HID’s V-Series Lumidigm sensors were the first fingerprint products certified to the ISO standard HID Global’s patented multispectral fingerprint imaging technology captures unique characteristics from the finger’s surface and subsurface, which is particularly important for the Singapore Police Force’s eKYC system because it serves a large population spanning many ages, ethnicities and skin types. The Tseng Wun Hsiung technology works reliably with normal, wet, dirty, dry or damaged fingers, and in sunlight or wet or cold conditions. Field-updatable liveness detection is employed to distinguish between the captured biometric data from a real living person versus a plastic, fake or other artificial fingerprint copies. HID’s V-Series Lumidigm sensors were the first fingerprint products certified to the International Standards Organisation (ISO) standard focused on anti-spoofing and liveness detection. Fingerprint recognition “HID Global is delighted that our Lumidigm V-series sensors are delivering unparalleled accuracy in fingerprint data capture for the Singapore Traffic Police’s new eKYC system,” said Sujan Parthasaradhi, Director, APAC, Extended Access Technologies Business Area, HID Global. “We have no doubt our solutions will continue to give the Singapore Traffic Police the confidence of standards-validated spoof protection at their driving schools while helping them sustain the highest levels of efficiency and customer service.”
After seeing a continued rise in anti-social behaviour, littering and dog fouling, North Tyneside Council decided to invest in a mobile CCTV van, which along with extra wardens has been used to tackle environmental offences in public places as well as in communities and schools. The service was launched last winter by Mayor Norma Redfearn CBE, and a new team was introduced to work throughout the day, including weekends, to help catch offenders in the act. Staff are able to enforce anti-social behaviour legislation, which includes issuing those who break the law with community protection notices, issue fixed penalty notices, eviction orders, and injunctions to those who are going against what the community is trying to achieve. Travelling CCTV cameras Six businesses have also been challenged about the way they dispose of their waste The travelling CCTV cameras, as supplied by vehicle safety specialists Sentinel Systems, have led to a number of successes including identifying a suspected repeat fly-tipper and uncovering 14 areas being regularly used to fly-tip. By installing a PTZ camera (pan–tilt–zoom camera), the team has been able to use the remote directional and zoom control to stop and advise 120 people about keeping their dogs on leads in designated areas and issued several fixed penalty notices to people littering or not picking up after their dogs. Six businesses have also been challenged about the way they dispose of their waste, with two of them being subsequently fined £400 each. Tackling crime hotspots Richie Mitchell, Community and Public Spaces Protection Manager at North Tyneside Council, commented, “North Tyneside is a great place to live and we have seen noticeable results since introducing the CCTV van and environmental team to the borough. The council takes issues in the community extremely seriously and is always looking to do more to tackle any crime hotspots.” Installing the cameras has benefited the community in many ways and we are very pleased" He continued, “Residents had lots of concerns around littering and dog fouling, so the new service providing on-the-spot fines and CCTV footage that can be used to help with prosecutions has really made a difference. Installing the cameras has benefited the community in many ways and we are very pleased with what we have achieved for our residents so far.” Safety camera package Sentinel’s 360-degree camera system offers drivers an enhanced view around the outside of a vehicle and can be combined with Sentinel’s four or eight-channel DVRs, allowing for up to 30 days of footage to be recorded. Inside the vehicle, a seven inch in-cab monitor is installed with high image clarity so that anything around the vehicle is always visible to the drivers. Sentinel Systems’ safety camera package can be customised to meet the individual requirements of each fleet, depending on the size and operations of each vehicle. The camera system can be created using any number of Sentinel’s systems, including forward, rear and side facing cameras for a 360° view of the vehicle’s surroundings.
C-TEC’s powerful new Quantec Surveyor2 Cloud-based data management software has been installed at Croft House Care Home in Yorkshire. With its capacity to generate reports on busiest shifts, call response times, most frequently visited rooms and more, the owners and managers of the facility, Victoria and Giles Bateman say that Surveyor2 has revolutionised operations at their family-run residential care home, recently rated outstanding in care by the Care Quality Commission (CQC). Covering different time periods Said Victoria Bateman: “Providing outstanding care is fundamental to our core values and we are constantly asking for feedback from our residents. One area we identified as being vital to our residents feeling safe in their environment is their use of our Quantec addressable call system. The ability to make a call to a carer for help and be responded to in a timely fashion is very important to them and therefore very important to us too.” We’ve been able to monitor and analyse the use of our call system on a daily, weekly and monthly basis" “Since Surveyor2 was installed, we’ve been able to monitor and analyse the use of our call system on a daily, weekly and monthly basis. We can print a variety of reports, covering different time periods, so we can see which of our 29 residents are calling, at what times of the day and, most importantly, our response times to those calls. We can also see, via the user dashboard, all live call system activity so we are aware of any potential issues before they become a problem.” Secure cloud-based system “Minimum and maximum response times have been set for each type of call, via the KPI (Key Performance Indicator) settings facility, to allow us to pinpoint where we need extra staff at busy times or identify areas where further training is required. We can also see which residents require more time, again allowing us to plan and allocate staff in the most effective way.” “Reports highlighting how often individual residents call has helped us identify times when they feel more anxious and we have been able to address those concerns.” A secure Cloud-based system, Surveyor2 also allows email notifications to be sent to Croft House’s management team so they can monitor response times when not on site. Recognising areas of improvement As the system has remote access capabilities and displays ‘real-time’, call, reset and room occupancy information, the senior member of staff on shift can view the status of all current calls and respond accordingly if a call is taking too long to be answered. Our staff are all aware that we monitor response times and that they are accountable for their actions" Says Giles Bateman: “Our staff are all aware that we monitor response times and that they are accountable for their actions. Teams and different shifts are rewarded for excellent response times and areas of improvement recognised. Overall the system allows us to feel confident that our residents are receiving timely help when they ask for it.” Easy-to-use addressable call system Says Kelly Flaherty, Deputy Manager at the home: “Surveyor2 has proved invaluable to us in reassuring patients, their relatives and regulatory authorities that we are delivering the highest standards of care and, during future inspections, will provide vital evidence that we are responsive, effective and caring, that all our residents are safe and that our facility is extremely well led and organised.” Surveyor2 is designed to work with Quantec, C-TEC’s powerful yet easy-to-use addressable call system. With its flexible call routing, multiple call levels and laptop programmable systems controller, the system can be tailored to suit the exact operational needs of any building.
Like many national football leagues, the teams of the English Premier League also suffer from unacceptable incidents such as lighting of pyrotechnics and throwing projectiles, hate crime and vandalism. This is why as early as 2013 the managers at Everton F.C. opted for a patented video security solution from the German video technology company Dallmeier. 14 of 20 clubs of the 2019–20 Premier League season have implemented Dallmeier "Panomera" multifocal sensor systems – including Arsenal, Chelsea, Liverpool and Manchester United. International safety standards Dallmeier solutions enable high-resolution capture of expansive areas with a minimum number of camera systems Many teams in the top flight of English football are also involved in the Champions League and Europa League, so it is also extremely important for them to satisfy the safety regulations imposed internationally by UEFA and similar bodies. For this purpose, Dallmeier solutions enable high-resolution capture of expansive areas, such as the stands, with a minimum number of camera systems. With Panomera cameras, multiple operators have the capability to zoom in on suspicious activities independently of each other, while the system continues recording the entire scene. This combination of the advantages of PTZ and megapixel cameras, an optimum overview of the situation is obtained, which can also be searched in the required minimum resolution at any time afterwards. This enables the clubs to achieve continuity of video evidence, get instant ID of people and events, and so reduce potential penalty payments. Smart content analysis Besides the court usability of video recordings, the "minimum resolution density" is also important for video analysis applications. As stated so succinctly by the rule "quality in, quality out", of course the quality of the results of analysis – for example in "crowd analyses" for people counting on stands, for "hostile vehicle mitigation" or to detect intrusion in sterile areas – can only ever be as good as the quality of the image, and accordingly the quality of the input data. With Dallmeier solutions, as early as the planning stage customers can precisely specify the pixel density values defined according to DIN EN 62676-4 for each region of the area captured – depending on whether for example at least 62.5 px/m is required for AI-based object classification, or 125 or even 250 px/m is required to guarantee that recordings of persons will be usable in court. 3D planning approach Panomera cameras from Dallmeier were able to deliver images of the highest quality time after time" "Throughout our selection procedure, the Panomera cameras from Dallmeier were able to deliver images of the highest quality time after time, not only in normal daylight conditions, but also under weaker floodlighting, that is to say not only live but also in the recording with the highest resolution quality in all regions of the images." "Moreover, with the Panomera cameras we can capture large expanses, the entire area of the stands, for example, with just a small number of systems. Ultimately, these considerations were the critical factor in our decision to award Dallmeier the contract for video security at Goodison Park", says David Lewis, Head of Security and Stadium Safety for Everton F.C. Highest precision The innovative 3D planning approach by Dallmeier provides stadium operators with the ability to place each individual camera with the highest precision in advance through the use of a "digital twin". Thus, even the planning contributes to a reduction of total costs. At the same time, the in-house planning team uses it to manage any difficulties such as visual obstacles (e.g. a video cube) or subsequent structural changes. This ensures that there are no "cost traps" for the customers, and that compliance with all requirements is guaranteed without exception when the system is implemented.
Round table discussion
Video analytics are undergoing a fundamental change in the market as machine learning enhances their accuracy while expanding their capabilities. But what are those expanded capabilities and how are they impacting the operation of security and video systems? We asked this week’s Expert Panel Roundtable: What new video analytics are having an impact in the market and how?
The new school year is a good time to reflect on the role of security in protecting our schools. From video to access control to some newer technologies, our Expert Panel Roundtable found plenty to talk about when we asked this week’s question: How does security technology make our schools safer?
Artificial intelligence is on the verge of changing the face of multiple industries – from healthcare to entertainment to finance, from data security to manufacturing to the cars we drive (or that will drive themselves!) In the physical security market, AI has garnered a lot of attention as a buzzword and as a harbinger of things to come. We asked this week's Expert Panel Roundtable: What security markets are most likely to embrace artificial intelligence (AI)?
RFID and smartphone readers in physical access controlDownload
Access control & intelligent vehicle screeningDownload
How plate reader technology increases your perimeter securityDownload
Genetec to host its first virtual tradeshow Connect’DX 2020 to connect with physical security professionals