Vaxtor Technologies has acquired RoadPixel and is relocating its international headquarters from Spain to the UK. Together, the companies will become Vaxtor Recognition Technologies Ltd. The Vaxtor family of companies in the USA, Singapore, and Spain will continue to service their respective territories. Juan Vercher, CEO of Vaxtor Technologies stated: “I really feel honoured leading Vaxtor Recognition Technologies and bringing on board recognised experts in the ANPR industry including Fr...
Qognify will make its debut at Security Essen 2018, showcasing its multi-award-winning portfolio of technology solutions that are mitigating risks, maintaining business continuity and optimising operations for organisations and infrastructure throughout Europe and around the world. In Hall 7, Booth 7E33, Qognify will present its Situator PSIM solution alongside its Operational Intelligence Center (OIC) module and new Situator mobile app, the award-winning VisionHub VMS and real-time video analy...
ThinkReps LLC, a security manufacturers’ rep firm in the New York Metropolitan area, announces that the company has expanded and added a new team member, Kenneth C. Kraemer to its roster. ThinkReps is a manufacturer's representation firm based in New York and focused on enhancing the sales and market awareness of the best physical security solutions in the industry. The company is committed to providing top notch sales and support to its customer base and continues to raise the bar on sal...
Hospitality businesses work to provide a safe and pleasant customer experience for their guests. Hotels offer a “home away from home” for millions of guests every day around the world. These are businesses of many sizes and types, providing services ranging from luxury accommodations to simple lodging for business travelers to family vacation experiences. Hospitality businesses also include restaurants, bars, movie theaters and other venues. Security needs are varied and require tech...
Following overwhelming demand, the Linx International Group announced that it will be delivering security training courses at PD Ports, a shipping and logistics company who have a history of utilising the Linx International Group for their security and systems training. This move will not only benefit the shipping industry but will also provide an opportunity for those based within the North of the UK to attend a local training course, which are otherwise held in Oxford or Southampton. Director...
The Internet of Things (IoT) is having a significant and ever-changing impact on the way we view video security. Today, cameras are expected to be so much more than devices with which to simply capture images; they need to be far smarter than that. These future-facing cameras are becoming an integral part of the vast digital connectivity infrastructure, delivering a parallel performance as intelligent sensors with the ability to extract the kind of invaluable data that helps businesses make impr...
The term ‘marine’ comes from the Latin mare, meaning sea or ocean, and marine habitats can be divided into two categories: coastal and open ocean. Video surveillance (VS) applications can cover both types of marine environment with system for ships, maritime ports, onshore and offshore installations, etc. We should want to further analyse VS for ships and try to explain the types of ships on which it can be used, the ways in which VS can be used on ships, the typical certifications in use and what features a camera station must have to be installed on a ship. Starting with ships that have a minimum tonnage, around the world we have: liquefied natural gas (LNG) tankers, passengers ships, chemical tankers, crude oil tankers, container ships, general cargo ships and bulk carriers.As the LNG market grows rapidly, the fleet of LNG carriers continues to experience tremendous growth, offering more opportunities for VS Video surveillance for all marine vessels An LNG carrier is a tank ship designed for transporting liquefied natural gas. As the LNG market grows rapidly, the fleet of LNG carriers continues to experience tremendous growth. A passenger ship is a merchant ship whose primary function is to carry passengers by sea. This category does not include cargo vessels which have accommodation for a limited number of passengers, but rather includes the likes of ferries, yachts, ocean liners and cruise ships. A chemical tanker is a type of tank ship designed to transport chemicals in bulk. These ships can also carry other types of sensitive cargo which require a high standard of tank cleaning, such as palm oil, vegetable oils, tallow, caustic soda and methanol. An oil tanker, also known as a petroleum tanker, is a merchant ship designed for the bulk transport of oil. There are two basic types of oil tankers: crude tankers and product tankers. Crude tankers move large quantities of unrefined crude oil from its point of extraction to refineries. Product tankers, generally much smaller, are designed to move refined products from refineries to points near consuming markets. Container ships are cargo ships that carry their entire load in truck-size intermodal containers: a technique called containerisation. They are a common means of commercial intermodal freight transport and now carry most seagoing non-bulk cargo. Today, about 90% of non-bulk cargo worldwide is transported by container. A cargo ship or freighter ship is any sort of ship or vessel that carries cargo, goods and materials from one port to another. Cargo ships are specially designed for the task, often being equipped with cranes and other mechanisms to load and unload, and come in all sizes. Bulk carriers make up 15%–17% of the world's merchant ships and they are specially designed to transport unpackaged bulk cargo such as grains, coal, ore and cement in its cargo holds. For all these ships the protection of vessels, cargo and crew is a priority, that’s why the adoption of VS technology plays a key part in terms of security and safety. Human error is regularly named as a major factor in ship accidents, and one way to avoid it is to aid seafarers by providing them with technology and equipment that is reliable and easy to use in all weather and sea conditions. Marine VS encompasses liquefied natural gas (LNG) tankers, passengers ships, chemical tankers, crude oil tankers, container ships, general cargo ships and bulk carriers Emergency security solutions on ship One of the most important applications for camera stations is during “docking”. Mooring is the securing or confining of a vessel in a particular location with a fixed or a floating object (jetty, pier, ship, barge, buoy, etc.) as various cargo operations are carried out. Docking is the final stage of mooring operations when the ship docks to the jetty. This is a very delicate operation and cameras are very helpful in making sure docking is done without accidents.'Man overboard’ is an emergency in which a person has fallen off a boat or ship into the water, and can happen at any time during the day or night Another important application for camera stations is the Man Overboard detection system (MOB). ‘Man overboard’ is an emergency in which a person has fallen off a boat or ship into the water. Man overboard events can happen at any time during the day or night, in all types of weather and sea conditions, and from almost any location on the ship, ranging from a few tens of feet above the water, to over 180 feet. When these events occur, the immediate availability of important data is crucial. Accurate confirmation of the event including time of occurrence, location on the ship and location in the sea is critical. A proactive detection system must immediately and accurately detect man overboard events and provide prompt, actionable data to response personnel. A typical man overboard detection system can report a MOB event in under 1 second. VS on a vessel can also monitor the engine room at all times and provide a good view of people working on dock, machinery and stowed equipment. But what are the most important features that a camera station must have to work in one of the most aggressive environments in nature? Marine surveillance must operate in one of the most harsh environments in nature Ruggedised reliability in surveillance First of all, and perhaps it’s obvious, but it’s extremely important to have camera stations with amazing reliability. Housing units manufactured from AISI 316L stainless steel, passivated and electropolished, makes the cameras completely impervious to air, water, rusting and corrosion, therefore offering excellent weather protection and increased reliability. Housing units manufactured from AISI 316L stainless steel, passivated and electropolished, makes the cameras completely impervious to air, water, rusting and corrosion Sometimes ships also use cameras constructed entirely from technopolymer, which guarantees high impact resistance and superior protection from external weather agents. Keeping the camera glass clean at all times is another essential feature, and it can be done via a wiper/wash system that greatly reduces the need for maintenance. In the case of PTZ cameras, the best option would be a great pan and tilt speed (up to 100°/s). What is the operative temperature range for the cameras? Sea is everywhere and therefore ships go everywhere, from the Arctic Ocean to the Mediterranean, so we need cameras that have to be fully operational across a wide temperature range. -40°C to +65°C covers almost all areas. Analogue or IP Cameras? Actually, both options can be used, especially for applications like docking where it’s important to avoid image delay (as can happen with IP cameras due to the natural latency of data communication over a network). Marine certifications Last but not least, the certifications: Certifications guarantee the quality and reliability of camera stations. There is no compromise! One important certification is the Lloyd’s Register Type Approval which subjects cameras to rigorous testing for performance, vibration (critical on ships), humidity, etc. The application field of the LR Type Approval is VS in public places (e.g. passenger ships), open decks, enclosed spaces that are subjected to heat generated from other equipment, and technical premises. Often, VS cameras used in specific areas of ships, such as hazardous areas, are required to have ATEX and IECEX certifications.
MARSS has announced an important contract for its RADiRguard smart perimeter surveillance system. The contract, with an unspecified Middle Eastern Government, is for a critical national infrastructure installation and provides for the protection of a 12km high-security perimeter. RADiRguard is a smart perimeter surveillance system combining multiple sensors and complementary technologies inside a single intelligent unit. Behavioural analysis software It is the first, all-in-one perimeter surveillance solution which can reliably detect and classify objects in advance of reaching a perimeter, thanks to its combination of a built-in radar, video imaging and radio frequency detection. It is then able to intelligently classify the threats and issue notifications using its integral behavioural analysis software. RADiRguard is a cost-effective, easy to deploy and scalable solution which can be configured to a wide variety of surveillance scenarios such as fuel storage facilities, power stations, water treatment plants, nuclear facilities, airports, ports, bridges and high-value buildings. RADiRguard’s coverage shape and extension is highly adaptable by changing the number and configuration of sensors installed. In a typical configuration, a single RADiRguard unit provides 400m x 100m of coverage along a perimeter wall or fence. The system can detect and track multiple known and unknown objects including humans, animals and vehicles. AI-powered object recognition The initial detection and tracking is achieved by compact micro-radar. Behavioural algorithms provide the first level of classification. Camera footage is then analysed by artificial intelligence for object recognition to provide additional and more precise classification, and this classification is further augmented by analysing GSM/Wi-Fi/VHF signals emitted by object and other intelligence data bases. This provides a risk level for each tracked object and if the object is deemed a risk then the system automatically notifies security personnel with the exact location and a live video feed supporting interception. This layered decision hierarchy reduces the instances of false alarms. RADiRguard operates autonomously 24/7 and is a robust, standalone, modular and scalable system which is low maintenance and as such is extremely cost-effective. RADiRguard can be integrated into an existing security system or as part of the MARSS NiDAR advanced long-range surveillance system for protecting coastal and land-based critical infrastructure from air, surface and underwater threats.
Redvision, a UK manufacturer of high-performance rugged CCTV cameras, has made Architectural and Engineering (A and E) specifications available for its X-SERIES and VOLANT, rugged PTZ cameras. Aimed at consultants, specifiers and engineers, the A and E specs cover both IP and analogue camera versions, highlighting many of their unique features. Universally popular cameras Stephen Lightfoot, technical director at Redvision, explains, “All Redvision VOLANT and VEGA cameras are popular with architects, specifiers and end users. They are successfully used in many outdoor and public space applications, from town centres, utilities and universities, to ports, prisons, industrial buildings and MoD sites.” “All our rugged PTZs are made from durable, die-cast aluminium with a marine-grade plating and tough, powder coating. They are available in light grey or black, as standard, but can be supplied in any other RAL colour to order. They are IP67 weather-proof rated; IK10 shock and vandal-resistance rated, and pass IEC vibration, shock and salt spray requirements. They have super-efficient, LED illuminator options for night-time operation, and a flat, optically-correct, toughened glass, camera window with wiper for wet and adverse conditions.” Fast, quiet, accurate PTZ camera “The X-SERIES is modular, configurable as a fully functional PTZ camera or dome, and has low power consumption to keep running costs and total cost of ownership to a minimum. The VOLANT is the fastest, quietest and most accurate, rugged PTZ camera in the industry, using direct-drive motors. It has an offset camera design to allow viewing vertically downwards, when mounted on a tower, whereas the X-SERIES uses a cantilever leg design to achieve the same thing.” Redvision rugged, PTZs camera models include Full HD, IP with 30x optical zoom and SD analogue with 20 or 30x optical zoom. Pendant or pedestal mounting options and a wide range of brackets are available.
A business owner arrives at his office one morning to find a door open, windows broken, and property strewn about. After calling the police, he reviews the surveillance video: not much more than blurry images of indiscernible shapes here and there. A car’s headlights flicker across the scene. Then nothing. A night security officer hears an alarm, then sees a truck erratically driving away from a prohibited area. He calls in a report and requests law enforcement. After the area is secure, they review the security camera feed: black and white blurs; vaguely human silhouettes; darkness. The only witness says they heard something, but couldn’t see anyone. Night-time video surveillance Scenes like these are all too common. Of all known crimes, 70% happen at night, hidden under cover of darkness. To effectively reduce that crime statistic, video surveillance systems must extend and enhance surveillance capabilities into the dark, alerting security personnel before an event occurs. Today, Hikvision is equipping video surveillance hardware to shatter that statistic and take night time video surveillance deeper into the darkness, lifting the cover of night to capture the kind of information that will lead to the prosecution of criminals. Learning from the human eye In humans, two types of photoreceptive cells – rods and cones – sit on the rear inner surface of the eye, known as the retina. These two light-sensitive cell types independently perform different functions to capture the visible world around us. The rods respond to brightness while cones capture and identify colours. The brain fuses the information into a single image. Nature did it first, but emerging technology is going further. Hikvision’s DarkFighterX Series technology was developed from insight into the way human eyes see. Infrared sensors in the camera capture reflected Infrared light that is invisible to the human eye but very “bright” to the sensors – similar to the rods in our eyes. While these IR sensors only transmit in black and white, visible-light sensors in the camera are simultaneously detecting and decoding colours – like the cones mentioned above. Both sensors sit behind a single lens, just as the rods and cones in our eyes. Hikvision is equipping video surveillance hardware to shatter that statistic and take night time video surveillance deeper into the darkness The camera combines the two spectrums of light to create video and images – the brightness of the IR sensors imbued with the low-light colour. Hikvision refers to this as bi-spectral technology. The result? DarkFighterX renders higher brightness, better colour fidelity, sharper edges, and less noise and blur. Extension, expansion, and application Video surveillance systems must extend and enhance surveillance capabilities into the darkness in order to reduce the overwhelming amount of night time crime. This has been the pursuit of Hikvision’s R&D teams for many years now, and many amazing technologies have resulted. Applications for this camera and its advanced technology range widely. Systems integrators will likely find adaptations for the DarkFighterX that even go beyond what Hikvision foresees. At first glance, applications include crime-prone areas of cities after dark: sidewalks and streets, alleyways and retail centres, for example. Tourist areas and scenic destinations can be monitored by the DarkFighterX, such as rivers, lakes and beaches, forests, public squares, historical monuments, and more. Critical infrastructure locations are often prime targets for criminals. Ports, electrical and other power plants, railways, airports, and other transport hubs, and international borders are just a few of the examples for this area of application. Wherever there is a security vulnerability at night, that is where the DarkFighterX Series shines. Mimicking human sight The DarkFighterX Series cameras expand upon the human sense of sight by first mimicking the human eye – two distinct sensors capturing and combining brightness and colours – then extending that ability in extremely low-light environments. The technology results in colourful, bright, and accurate imaging on security monitors, making night time surveillance video appear nearly as clear as daytime video. With the DarkFighterX Series, Hikvision can – almost literally – place hundreds of eyes over a wide expanse of space, giving security personnel “sight” that’s quite beyond anything they have seen before – even in the dark. You just might not believe it … until you see it.
The 2017 decision of the British electorate to leave the EU was a shock to many within and beyond the UK. It is one of the most significant decisions in the UK’s history. It reflects a long-running uneasiness with the land mass across the Channel, not only because of geographical separation but also because of cultural disconnection. The UK is one of few European countries not to have been occupied or oppressed since the Norman invasion of 1066, and hence has an independence of spirit which continues to flourish over any practical concerns. It is worth bearing in mind, however, that the UK is leaving (politically) the EU, not Europe. Effect of Brexit on UK security The effect of departing the EU on 29 March 2019 – irrespective of any transitional period – will be long lasting and profound. In security terms, the UK will have still to contend with international terrorism, transnational crime and the global movement of people, all challenges which require widescale co-operation. The UK has traditionally been strong in meeting these risks, and has played a significant role in the development of EU policy on police co-operation and information sharing. The declaration of Article 50 of the Lisbon Treaty formally notified the EU of the UK’s departure. After some delay, the UK Government has begun discussions with the EU and published a series of papers that set out its preferences in those discussions. Maintaining a seamless and frictionless border with Ireland is an early requirement from both sides. However, exactly how this is to be achieved is yet to be agreed. In terms of maintaining effective security co-operation with the EU, the aspiration is also high. Reduced access to intelligence Yet when the UK reverts to a third-country relationship with the EU post-departure, access to an organisation like Europol and databases such as the Schengen Information System (SIS II) will be much more limited. If an operational agreement with Europol is already in place when the UK leaves the EU, its departure should not have much effect on the exchange of core intelligence on matters like terrorism: Europol already has operational agreements with 19 third-country states including the USA. The situation will be more problematic if the UK leaves the EU with ‘no deal’, although some reassurance might be drawn from Theresa May’s Florence speech when she said the UK was “unconditionally committed to maintaining Europe’s security”. New arrivals to Britain from the EU will need to be registered in preparation for a new immigration system It is in the area of border and immigration control that real problems look most likely to arise, largely because of the volume of traffic – both people and goods – to be managed. Migration was a key driving force in the EU referendum result, but without a register of EU citizens the UK is handicapped in achieving a declared target. Mrs May confirmed in her Florence speech that new arrivals to Britain from the EU will need to be registered in preparation for a new immigration system at the end of the two-year post-Brexit implementation period that she aims to negotiate. Pressure on immigration checks Significantly, pressures on the day-to-day operation of immigration checks at airports and ports will substantially increase if more passengers are required to have visas to enter the UK unless the system is fundamentally changed. The Border Force budget has already faced enormous pressure, having been reduced by 15% from £617 million in 2012/13 to £558 million in 2015/16 while the number of journeys has increased. Among its longer-term programmes to improve capacity are the Digital Services at the Border (DSaB) programme, the successor to the e-borders programme with the aim of further developing risk-based digital identity management, and the Immigration Platform Technologies programme, which aims to improve the efficiency and effectiveness of visa and other immigration transactions with the public. Illegal migration also needs to be tackled more effectively, as any increased restriction on legitimate travel from countries within Europe has the potential to increase the demand for forged and stolen documentation as well as risk new and more dangerous forms of illegal travel to the UK. Managing customs at UK borders There will also be considerable challenges in managing the flow of goods across UK borders after Brexit. HM Revenue and Customs has estimated that the number of customs declarations at UK sea ports and airports could rise from 60 million to 300 million a year after the UK leaves the EU. The number of customs declarations at UK sea ports and airports could rise from 60 million to 300 million a year An ongoing programme to upgrade the UK’s customs system began before the referendum – before the government committed to seeking a new customs arrangement from March 2019 – and will be inadequate to cope with the substantial increase in customs declarations that will result if the UK leaves the customs union. According to the Road Haulage Association, there is a real danger of ‘everything grinding to a halt’. This will focus minds as the March 2019 deadline approaches and every effort is made to avoid falling off a cliff-edge. Rethinking UK border operations In sum, it is clear that against the backdrop of global migration trends, conflict and economic uncertainty, the challenges faced by the UK in defending its border are significant, and the practical difficulties are likely to be magnified whatever the final nature of the post-Brexit arrangements. This will likely necessitate a major rethink of strategy, processes and, possibly, some substantive changes to existing structures. If only in practical terms, there will have to be a significant investment in people, resources and databases to cope with anticipated volumes of traffic through ports, airports and tunnels. Given budgetary constraints, this task will not be easy. Equally, Brexit does offer the opportunity to rethink operation of the border and further deploy technology in order to realise further efficiencies. However, as is often the case, it is events, as Harold Macmillan once said, that may prove to be the real determinants of the outcome. By Robert Hall, MBCI MSyl and Dr. Alison Wakefield, FSyl
Helping to establish the highest levels of site safety and security for end-users, Hikvision, a supplier of innovative video surveillance products and solutions, has launched a new range of fixed and portable Under-Vehicle Surveillance Systems (UVSS). Under vehicle surveillance Fully digitally based, the UVSS have been specifically designed to scrutinise the undercarriage of vehicles - offering a fast and effective means for security personnel to examine moving vehicles, and all with minimal disruption to traffic flow. To address differing application requirements, Hikvision has independently developed two types of UVSS, one fixed model and one portable. Both models can accurately capture an image of the underside of a moving vehicle, to provide highly detailed, critical security monitoring. Crime prevention Easy to install, the new Hikvision UVSS can be used to automatically screen every vehicle entering or leaving a site, with popular applications including prison ‘mantraps’, customs border checkpoints, secure car park entrances, and many more. At crowded airports, high-volume venues, large-scale events, public places, and high security facilities, it’s well known that criminals may attempt to use vehicles for a wide range of nefarious purposes – such as hiding or smuggling illegal items. In this scenario, UVSS can be deployed to quickly and accurately identify hidden threats, contraband, or the smuggling of persons. Fixed and portable models For fixed applications, the Hikvision MV-PD-030001-02 under-vehicle surveillance system can integrate with existing security system to provide automated display and video storage of the underneath of cars and heavy vehicles. Both UVSS model versions display a super-wide field of view and can be relied upon to effectively prevent the intrusion of hidden under-vehicle bombs Providing flexible location under-vehicle surveillance, the Hikvision MV-PD-030001-03 ‘all-in-one’ portable UVSS provides the same automatic collection of underside vehicle high-definition images, display and storage as the fixed model. Comprising ANPR camera, display equipment, and auxiliary control equipment, the portable UVSS model is the ideal choice to secure public venues, hotel entrances, and other temporary application under-vehicle chassis surveillance needs. Weapon and bomb detection Both UVSS model versions display a super-wide field of view and can be relied upon to effectively prevent the intrusion of hidden under-vehicle bombs, weapons, biochemical dangerous goods, and unauthorised people, entering or exiting restricted places. Multiple modules combine to form each UVSS, making the configuration of customised solutions simple. Providing a high-level of access security, the systems can be integrated with rising barriers, rising ramps, traffic lights and existing security control room equipment. Featuring Hikvision industrial-grade high-definition camera imaging, the new UVSS offer security personnel robust search functionality to easily identify vehicles by licence plate number or time of day. The system can be used as discrete vehicle chassis detection equipment to perform security and safety inspections on the underside of vehicles at entrances to airports, harbours, embassies, police stations, warehouses, petrochemical facilities, military facilities, arenas and many other security critical sites.
Milestone Systems, a provider of video management software (VMS), is the chosen solution for protecting the Port of Antwerp, the second largest seaport area in Europe, covering more than 12,000 hectares, the equivalent of 20,000 football fields. Large areas like ports are very difficult to secure in a traditional way. Reporting incidents using only radio communications can lack information at an optimal level of detail and accuracy. It takes time for responders to reach incidents. Analogue video solutions have issues with very long distances, meaning video amplifiers must be used which lead to fragile and inflexible infrastructure. Milestone XProtect Corporate and XProtect Smart Client have enabled the port authorities to establish a central control centre with a consolidated view of the harbour. This enables rapid and relevant response to incidents, reducing the impact of incidents on assets and persons. Milestone steps in to ensure that this business-critical system in the port receives a high level of supportOpen platform technology The open platform technology pioneered by Milestone combined with the solution power of the Milestone Partner Community enabled the Port of Antwerp to choose the perfect infrastructure components and cameras for their challenges. Lenovo, Dell and multiple camera partners are elements of the solution. Thanks to the usability of network video, the port can utilise Milestone open platform for solutions that augment the already rich functionality of XProtect VMS. In addition to the infrastructure, the Port of Antwerp is taking advantage of Milestone Care Premium. Milestone Care is a complete suite of operational maintenance and support services grouped into four different packages, enabling Milestone customers to choose the support coverage that fits their exact need, now and in the future. With the chosen level of support, Milestone steps in to ensure that this business-critical system in the port receives a high level of support. Advanced security installation Furthermore, Milestone Professional Services has also been in play for this advanced installation, to guide and counsel the port on the best capabilities of the open platform VMS. This consultancy service ensures the port can adapt and expand this system as needed for an ever-expanding, always relevant surveillance solution. “We are extremely pleased to have been chosen by Port of Antwerp for their video safety system,” says Michaël Fontaine, Country Manager Benelux, Milestone Systems. “This is a clear testimonial to the solution power of XProtect and our open platform partner community. This has already been proven in a number of other ports worldwide, and now in the modern Port of Antwerp.”
Mirasys Video Management Solutions are being utilised in a number of transport projects which include ports, motorways, airports, trains and logistic centres. Each project needs a highly adaptive solution which adapts to changing requirements, technologies and regulations, and provides unlimited scalability and high reliability. Mirasys VMS increases efficiency The transportation sector provides a great example of how an intelligent video management system can increase the efficiency of activities, safety, and ensure smooth-running operations. Mirasys offers the possibility to increase productivity and savings with powerful connectivity to other systems. Mirasys VMS includes a number of intelligent features. Playback and powerful search tools identify incidents quickly and efficiently. The intuitive storyboard function helps in reporting events and incidents and high quality images can be used for evidence. Advanced motion detection and alarm event settings let you decide what you want to track; reducing operational costs and the number of false alarms. Mirasys Video Content Analytics Mirasys VCA (Video Content Analytics) provides full VCA functionality with object classification and enter / exit, direction, vehicle speed, stopping, dwell time, etc. filtering. The setup is versatile and supports, for example, different type of vehicle classification, zone definitions, entering directions and vehicle speed. You have plenty of different analytic alternatives available per camera. The object that is being analysed can have several different analysis rules active simultaneously. The ingenious use of cameras and analytics increases the flow of cargo, luggage and passenger traffic. You can, for example: Tighten platform security Improve crowd management Identify people and any unusual behaviour such as running Identify abandoned objects Manage queues and staffing level Control the number of vehicles in the area Vast integration possibilities With Mirasys and its endless integration possibilities, you can speed up the logistic centre’s functions, transport management efficiency, and ensure the undisturbed flow of cargo operations. The use of Mirasys integrations will increase the value of visual information captured by the system, and bring significant cost savings. The information from video images can be linked to the information received from other sensors, also enabling the utilisation of IoT (Internet of Things). Different organisations can use the same Mirasys system to manage their part of the surveillance and security, but each party has its own rights When integrating a bar code reader with the video management system in a warehouse, the movements of each package can be searched and visualised. The images from cameras can be found immediately, which helps to determine the condition of the package at the time of entering and leaving the warehouse, and on which vehicle it is located. For each and every event, the system provides the exact time, visual information from a number of different cameras, and delivers event reports to specified recipients. This results in a clear decrease in the time spent in resolving customer complaints. Automatic Number Plate Recognition With the Mirasys ANPR+ (Automatic Number Plate Recognition) application you can automate the management and guidance of the vehicles in a certain area. For example, based on the number plate information the system can advise: Which loading bridge the vehicle is assigned to, Which driving lane the vehicle is assigned to, Driving through automatic weight-in-motion (WIM) is needed, etc. The system can monitor the vehicle on its way in and out, film it from the side, top, front and back and is therefore a great solution for vehicle damage control. Using integration to the automatic weight-in-motion (WIM) function you can also ensure automatically that the amount and type of product loaded on the vehicle is correct. In harbours and airports different entities, such as Security, Police and Customs, need different information from the same system Automate operations with the ANPR+ A forwarding company can book a space for its truck from a shipping company’s ticket selling system. When the truck arrives at the shipping company’s area, for example in a harbour, it is automatically measured, and if the measurements match the ticket, the truck is guided to the green lane. If the measurements deviate from the ticket data then the truck is guided to the ticket window lane. The measurement information will be sent automatically to the system optimising the ship loading. If a vehicle exceeds its allowed time to stay in one place, or deviation from the planned route of the vehicle is detected, the system will report an event. In harbours and airports different entities, such as Security, Police and Customs, need different information from the same system. Different organisations can use the same Mirasys system to manage their part of the surveillance and security, but each party has its own rights; simultaneous users are no problem. Information from different sources flows automatically between organisations, resulting in faster response times on investigations, and increasing the performance level considerably in handling the joint security issues. Decreased total cost of ownership Mirasys is an industry-recognised Video Management System provider. Limitless integration possibilities of the Mirasys VMS offer the freedom to build the system that serves your needs. Mirasys also gives you the freedom and possibility to connect several sites into one logical entity. The centrally managed Mirasys system allows you to add or remove cameras and servers, set users’ rights, manage live and recorded video and export evidence with a few simple clicks. The system can have centralised, de-centralised or mixed topology configurations.
The Port of Wilmington, which opened in 1923 and handles nearly 400 vessels and 4 million tons of cargo each year is the busiest port on the Delaware River, and the leading North American importation site for fresh fruit, bananas and juice concentrate. It was also the first seaport to use the Transportation Worker Identification Credential (TWIC) card, beginning with the TWIC Technology Phase pilot program in October 2003. TWIC is designed to add a layer of security at ports by ensuring that workers in secure areas have received a background check and do not pose a national security threat. As the TWIC program expanded as part of the Maritime Security (MARSEC) criteria, so did the need for a software program that could read and record information from both the existing TWIC protype cards used with the port’s physical access control system and the latest TWIC cards. In addition, it was important to find a solution that would allow the port to access the Transportation Security Administration’s (TSA) ‘TWIC Cancelled Card List’, a real-time database of unauthorised TWIC users, so port security personnel can quickly identify those with revoked rights. Port officials chose HID Global’s pivCLASS Registration Engine software, which drives the Datastrip mobile readers and also resides on a desktop enrolment workstation in the port’s main office pivCLASS Registration Engine software Recognising this need, Port of Wilmington officials began exploring their options for software that could work with their existing Honeywell security management platform, Pro-Watch and work on mobile card readers to deploy the enrolment process throughout the facility. Port officials chose HID Global’s pivCLASS Registration Engine software, which drives the Datastrip mobile readers and also resides on a desktop enrolment workstation in the port’s main office. An additional license for certificate management allows the port to re-validate TWICs each day, once they are enrolled with the Honeywell system. Operational with Datastrip’s DSV2+Turbo mobile card readers Before the Port of Wilmington became a pilot site for the TWIC smart card program, it relied on 125kHz proximity cards and readers for worker identification. With the advent of TWIC compliance standards, port officials needed a way to register TWIC cards with their existing Honeywell Pro-Watch physical access control system and enter cardholder data into their database that would merge both TWIC and existing ID cards. With this merger, the port would need only one card for the access control system. It was also important to be able to enrol TWIC cardholders at the various access points to the port, which spans 307 acres of land. Therefore, the software needed to be functional with rugged mobile card readers, such as Datastrip’s DSV2+Turbo. TWIC credentials are required for entry to the port by anyone requiring frequent, unescorted access to the facility that is entirely designated as a secure and restricted area Finally, Port Security wanted the ability to access the TSA TWIC Cancelled Card List and match it against those being enrolled in the Port’s database as well as those using their TWIC cards. This would allow Security to take the appropriate steps when necessary, such as suspending a card, identifying people who were already enrolled in the Port’s database and not double enrolling them, or spotting a potential terrorist. TWIC Credentials for entry to the port By using pivCLASS Registration Engine, which was deployed on mobile Datastrip readers as well as a desktop computer, port officials are now able to register TWIC holders throughout the port and transmit that information to the Pro-Watch system. These cards can then be read at the fixed card readers located at various entrances and access points throughout the port. TWIC credentials are required for entry to the port by anyone requiring frequent, unescorted access to the facility that is entirely designated as a secure and restricted area. These include longshoremen, truck drivers, surveyors, agents, chandlers, port chaplains and labourers who access secure areas. Tenants who have their offices at the port, such as produce giants Chiquita and Dole, are also required to be enrolled in TWIC. Integrated with existing access control system Patrick Hemphill, retired Manager, Port Security and Facility Security Officer at the Port of Wilmington who lead this project said the mobile readers have been taken to local union halls to enrol longshoremen before they arrive at the port. “This saved us a lot of time,” explained Hemphill. “We met with union leaders and set aside two, two-hour periods on pay days. The members were made aware of the need to know their PIN and we were able to enrol the majority of (union) members during those two days without interrupting their work schedule.” After seeing a demo of the software, and its ability to read TWIC card information, Floyd-Kennard recognised it as a possible solution that could be integrated with the port’s existing access control system pivCLASS Registration Engine first came to the attention of Port of Wilmington’s Director of Human Resources, Sylvia Floyd-Kennard during an American Association of Port Authorities conference. After seeing a demo of the software, and its ability to read TWIC card information, Floyd-Kennard recognised it as a possible solution that could be integrated with the port’s existing access control system. Testing the software in-house Eric Schaeffer, President of Advantech Inc., the port’s systems integrator on the TWIC project, said one of the deciding factors in using this software was the ability to test the software in-house before making a commitment. He wanted to ensure that it would integrate with the existing Pro-Watch system. “Some companies have reservations about testing before buying,” Schaeffer noted, “but HID Global was confident in their product and were comfortable with us testing it.” Since this was one of the first implementations of pivCLASS Registration Engine software integrated with the Honeywell Pro-Watch system, Schaeffer said HID Global worked alongside Advantech to make sure everything worked as planned. Registering TWIC FASC-N number and expiration date For a major facility such as the Port of Wilmington, being able to enrol TWIC holders and verify their information anywhere using a mobile card reader results in a savings of security personnel, time and effort. Personnel can go where the enrolees are, rather than requiring everyone to come to a central location. The port is also able to continue to leverage its legacy physical access control system while adding in the important TWIC component. The pivCLASS Registration Engine software allows the port to register TWIC information, such as the TWIC FASC-N number and expiration date, into the existing PACS cardholder record" “The pivCLASS Registration Engine software allows the port to register TWIC information, such as the TWIC FASC-N number and expiration date, into the existing PACS cardholder record,” said Geri Castaldo, vice president of Business Development, Federal Identity with HID Global. “If a new person is added, Pro-Watch automatically creates a brand-new cardholder record using the information from the TWIC such as first name, last name, FASC-N, expiration date and photo.” pivCLASS Certificate Manager Checking against the TSA TWIC Cancelled Card List is a key benefit with the addition of HID Global’s pivCLASS Certificate Manager. The pivCLASS Certificate Manager goes out to the TSA list and re-validates the TWIC card status daily or on a user-defined schedule, so security personnel can see what has changed and react to the status of cardholders. In the case of an elevated threat level, HID Global’s software is able to provide the additional authentication piece that would be required. If the threat level at the port is raised under the three-level MARSEC system, it can the use required use of a fixed readers with a biometric component.
USS Iowa: A naval treasure Affectionately known as the “Battleship of Presidents” for having played host to more U.S. presidents than any other battleship, the USS Iowa is one of the most storied vessels in the history of the Navy. Originally commissioned in 1943, the Iowa saw significant action during both World War II and the Korean War. One of the battleship’s first missions was to escort President Franklin Delano Roosevelt across the Atlantic in November of that year for a critical meeting between the allies at the Tehran Conference, which was also attended by Soviet leader Josef Stalin and British Prime Minister Winston Churchill. In early 1944, the Iowa was sent to the Pacific Ocean theatre where it would play a pivotal role in some of the key battles of the war. When the Empire of Japan officially surrendered aboard the USS Missouri in September 1945, the Iowa was also in Tokyo Bay broadcasting the ceremony to the world. The Iowa and her crew would continue to serve the nation for another four decades before being decommissioned for the last time in 1990. Given the ship’s rich legacy, it was eventually relocated to a permanent berth at the Port of Los Angeles in 2012 and converted into a museum. Visitors can now stroll along the decks of this American icon from a bygone age and get a first-hand look at the 16”/50 calibre guns that earned the Iowa its nickname of the “The Big Stick” as well as other historical artefacts on board the battleship. Of course, turning a vessel that stretches over 880-feet long and contains numerous rooms and compartments into a tourist attraction comes with its own set of unique security challenges. Security challenges The job of securing the Battleship USS Iowa museum is the responsibility of Security Manager Michael Dahl, a former law enforcement officer who was asked to take over the full-time security operations for the museum following his stint as a volunteer aboard the ship. While the museum has yet to experience a major security event during its brief existence, the threat posed by trespassers after-hours or a visitor wandering off the beaten path is not lost on Dahl and the rest of the management team at the museum. However, aside from having a small number of consumer-grade, off-the-shelf security cameras placed in strategic areas, there was not any real video surveillance infrastructure to speak of on board the ship. That changed approximately one year ago when David Canfield, the museum’s vice president and CIO, who also happens to be a veteran of the high-tech industry, decided they needed to significantly upgrade the surveillance system and install a solution that would more adequately address the facility’s needs. Arteco and Arecont Vision donated the respective technology solutions for the USS Iowa project “We wanted to install cameras to monitor the exterior of the ship, particularly when we’re not open to the public, so we can monitor our gangways to see if anybody does try to access the area,” said Dahl. “Also on the inside of the ship, we wanted to make sure we didn’t have our visitors, as well as our crew members who are volunteers, getting off the designated routes and into areas where we didn’t want them. There are some sensitive areas where, if you don’t know what you’re doing, they could be hazardous.” Arteco’s VEMS solutions After speaking with CV Reps, a local manufacturer’s representation firm, Dahl and the museum’s leadership team decided to install a system with the Arteco Next video event management software (VEMS) and a network of Arecont Vision cameras. Because the battleship museum is a non-profit organisation, both Arteco and Arecont Vision donated the respective technology solutions for the project. A total of 11 high-definition IP cameras have been installed on the Iowa since the project got underway in mid-2015. At the beginning of 2016, Dahl was able to bring the Arteco software online and he has been extremely impressed with its performance. Leveraging the video analytics suite provided by Arteco Next, Dahl has been able to set up an alert within the VEMS client that notifies him when certain physical boundaries are crossed by people on board the Iowa. “With the Next software I’m able to configure alert areas after hours — so if anybody were to try to come on the ship it would alert me,” added Dahl. “We also have an alert for our cash-handling room just outside our vault that is set up so that anytime anybody goes through that door, it lets me know.” User-intuitive video software Because Dahl, who has sole responsibility for running the surveillance system, is a relative novice when it comes to operating today’s surveillance technology, it was also important that the video software the museum deployed be user-intuitive so that he could bring himself up to speed quickly. After only a few hours of training on the Logic Next platform, Dahl was able to learn the basics of the software and familiarise himself with its more advanced settings. Arteco NEXT VEMS allows users to take full control of a video surveillance system from anywhere, quickly and easily. With NEXT’s specifically designed graphical interfaces, video retrieval, direct management of alarms, video analytics or access control events are made easy from the start. This enables users to focus on taking hold of the benefits delivered by the system immediately, rather than waiting for training. In the future, Dahl plans to deploy more cameras to keep the USS Iowa and its rich history secure. “I have several locations where I still want to deploy cameras; it’s just a matter of being able to procure them and deploy them as resources allow,” said Dahl.
Airports and ports are subject to a tough balancing act when it comes to security measures. On the one hand, these locations must maximise the movement of passengers and cargo to ensure a happy customer experience, while at the same time exercising security measures that will ensure their safety. Access points in transport hubs Airports and ports are large areas with many access points, a necessity to facilitate the efficiency needed to handle the large volumes of traffic they generate. This accessibility is also their Achilles heel in the eyes of would-be terrorists, smugglers, and thieves. Herein lays the conundrum. People want to travel without fear of falling victim to attack, but security cannot be so invasive that it makes travel unpleasant. Vanderbilt’s solutions respond to the agility, adaptability, and dependability that this sector requires and facilitate free movement while allowing for effective safeguarding measures. Vanderbilt’s ACTpro is a PC-based access control system that eliminates the need for traditional keys, instead utilising cards and tokens to gain access Access control scenarios for ACTpro For instance, Vanderbilt’s ACTpro is a PC-based access control system that eliminates the need for traditional keys. Instead, it enables authorised individuals to use a card or a token to gain access to protected areas. Staff appreciate that the cards mean they need to carry fewer conventional keys and can gain prompt access to vital areas. If a tag or card is lost, it can easily be disabled by the system, ensuring a high-security level. So, what are some access control scenarios that ACTpro can provide against at airports and ports? To name a few, tailgating, hierarchy rights, and allowing for holding areas between doors. Coupled with ACTEnterprise software, ACTpro provides a vast array of integrations. Specifically, this can be used to provide unrivalled protection against ‘tailgating’ through interaction between badge systems and video surveillance cameras like Eventys. Vanderbilt’s Eventys provides quality images should a suspicious event arise that needs to be investigated. Hierarchy of access privileges The access status at airports and ports can vary greatly depending. For example, flight crew require different access rights compared to terminal retail staff, maintenance staff, or emergency staff. ACTpro, coupled with ACTEnterprise, can provide this strict hierarchy of access privileges based on seniority and job function. The ACTpro system also includes the ability to execute ‘airlock’ or holding areas between pairs of doors. This means the doors cannot be opened simultaneously except in emergencies when a supervisor activates an override. This function helps defeat concerted intrusion attempts. In addition, the software provides invaluable health and safety abilities for fire mustering.
Customs and Border Protection needed a faster way to correlate information about the location and status of arms The Australian Customs and Border Protection Service is responsible for the protection of the Australian community, while supporting legitimate trade and travel. At a time of unprecedented threat levels – illicit drug trafficking, terrorism, people smuggling – Customs and Border Protection manages the security and integrity of Australia’s borders, working closely with other government and international agencies, to detect and deter unlawful movement of goods and people across the border. Rapid commerce and travel growth Concurrently, Customs and Border Protection is responsible for protecting Australian economic interests during an era of rapid growth in international commerce and travel. By enforcing trade regulations and collecting tariffs, Customs and Border Protection helps Australia compete in a global economy. “Customs and Border Protection plays a vital role in national security, derived from its broader responsibilities at the border and the extensive powers, expertise and technology it brings to bear,” said Michael Carmody, Chief Executive Officer, of Australian Customs and Border Protection Service. “Modernisation of customs organisations will remain imperative, with the Australian Customs and Border Protection Service motivated by continuing pressure for more sophisticated and integrated processes.” Border protection responsibility Border protection responsibility lies in the capable hands of over 5500 Customs and Border Protection employees in over 50 locations around Australia and overseas, and is managed from the Central Office in Canberra. The Customs and Border Protection Strategic Outlook (2007) projects that by 2015, these employees will assume responsibility for the annual oversight and management of: 1 million international passengers 7 million import sea containers 7 million export sea containers 5 million air cargo consignments 220 million postal articles 22,865 arriving ships Protecting the Australian community demands sophisticated intelligence, targeting high-risk aircraft, vessels, cargo, postal items and travellers. It also requires sophisticated tools, including thousands of items of weaponry, protective gear, specialised equipment and vehicles. Furthermore, effective deployment and management of these tools is vital to assure the safety and security of Customs and Border Protection’s officers, and the 22.6 million Australian citizens they serve and protect. Search for a solution Prior to 2011, Customs and Border Protection maintained a system of separate spreadsheets to track and manage this considerable arsenal. More importantly, the view from Central Office in Canberra lacked immediacy. Lags in reporting times could lead to delays in repairing or replacing critical equipment, or in identifying a missing or stolen weapon. What Customs and Border Protection sought was a fast and easy way to correlate information about the location and status of arms and bulletproof vests with the officers to which they had been assigned. As staff across different locations kept their own spreadsheets, Customs and Border Protection needed a solution that could easily deliver accurate and up to date views to Central Office. Under Michael Carmody’s imperative for more efficient, integrated processes, the Australian Customs and Border Protection Service issued a global tender for an asset tracking system. They discovered a partnership between Relegen and HID Global best fit their needs. Customs and Border Protection opted to use the Relegen asset solution, with assetDNA software The Relegen solution Relegen specialises in the development and delivery of asset intelligence solutions. The Australian Defence Force [ADF] has employed Relegen’s technology – assetDNA™ – to manage critical assets for over a decade. The similarities between the ADF’s and Customs and Border Protection’s asset management needs, combined with the flexibility of the assetDNA solution, made Relegen the clear choice around which to build Customs and Border Protection’s new system. The Relegen solution is enhanced by their assetDNA software technology, which enables users to assign a globally unique identity to each asset. In this case, Customs and Border Protection have opted to use the assets’ serial number. This identifier is then carried by Relegen’s proprietary assetDNA tagging solution. A third layer of security is added through DataTraceDNA®, a covert security technology from DataDot Technology Ltd. This means that even in the event that the assetDNA tag is removed or destroyed, Customs and Border Protection can still identify the asset as one of their own. “Our ten plus years’ experience at a mission-critical level with the Australian Defence Force prepared us well to deliver the comprehensive asset tracking solution Customs and Border Protection requires,” reports Paul Bennett, Managing Director, Relegen. “The combination of our assetDNA software and multi-layer, intelligent tagging solution enables Customs and Border Protection to track each asset uniquely. Even if a tag is separated from a weapon, Customs and Border Protection can still identify the asset through DataTraceDNA.” HID Global RFID The ability of assetDNA to track each asset uniquely, and in real-time, is made possible by radio frequency identification technology from HID Global. A world leader in the development and production of innovative identification tags and readers, HID provides innovative asset tags and technical support vital to the Customs and Border Protection solution. Before HID could recommend tagging solutions, a thorough assessment of each asset was required: How is the asset used, by whom is it used, and under what conditions? For Customs and Border Protection, each tag must withstand the rigors of daily use under potentially hazardous conditions. HID manufactures asset tags that adhere and function under extreme conditions, resisting impact and vibration, and exposure to saltwater and chemicals. HID was able to provide Customs and Border Protection with a customised compilation of RFID tagging solutions According to Paul Bennett, “assetDNA is a powerful asset intelligence system. However, our ability to collect data is enormously dependent on reliable tags that can withstand the rigors of daily use in extreme conditions. That’s why we rely on HID. Their tags perform.” “All Customs and Border Protection assets were analysed in terms of materials of construction and conditions of use,” says Tony Hilder, Sales Director, Industry and Logistics for Asia Pacific HID Global. “Then, we were able to match a HID tag to deliver the necessary level of reliable performance over the life of each asset.” Customised RFID tagging solutions HID was able to provide Customs and Border Protection with a customised compilation of RFID tagging solutions that will: Withstand impact and vibration – on an assault rifle, or in a physical confrontation Resist exposure to harmful elements – including saltwater, or chemical agents Install covertly and inconspicuously – to prevent detection or tampering Maintain data integrity and performance – assuring systemic veracity The HID Logi Tag® Family is being applied where mechanical, chemical and temperature resistance is imperative, with the HID IN Tag Family providing ruggedised tag solutions for severe environs. Greater security for officers Relegen and HID are working together to help implement the sophisticated asset tracking system across all Customs and Border Protection locations. This includes the tagging of each of the armaments and critical assets in each agency, as well as training for all Customs and Border Protection personnel. The result will be a comprehensive system that gives Customs and Border Protection a real-time view of all assets deployed and in inventory, empowering the Central Office to make critical decisions based on the latest information at-hand. It will also mean greater safety and security for Customs and Border Protection officers. Officers can perform their duties, confident they have been issued the correct equipment, and assured that it is in proper working order. In addition, the new system further minimises the risk that weapons may be stolen or remanufactured. Significant productivity enhancements The new system will also enable optimisation of asset use. Customs and Border Protection can now identify each asset’s progress through its lifecycle, and identify specific assets in need of immediate repair or replacement. Customs and Border Protection will recognise significant productivity enhancements in staff time spent mustering their formidable arsenal. Going forward, the Customs and Border Protection asset-tracking system provides a model for any organisation managing operation-critical assets, in routine or emergency response situations. Worldwide, police forces, fire departments, emergency medical teams, hospitals, and other organisations are employing solutions from Relegen and HID Global to respond quickly and comprehensively in emergencies, provide better safety for their employees, and drive the performance of their mission critical assets more effectively.