3xLOGIC, PAC/GDX and PACOM, providers of security and access control solutions, have announced they will be exhibiting on stand IF2930 at IFSEC International 2019, which takes place on 18th-20th June at ExCeL, London. For over 15 years as one of the USA’s most respected innovators in server, cloud and artificial intelligence-based solutions, 3xLOGIC has an enviable track record in redefining what’s possible with security technology. After successfully launching into the European mar...
Percepto announced that it has launched its all-in-one aerial solution for autonomous security, safety and inspection missions in Australia, following the completion of a series of successful live mission demonstrations in Canberra. The tests were observed in the capital by a delegation representing government, defence and industry organisations from across the country. During the demonstration, Percepto conducted missions to highlight how its autonomous ‘Sparrow’ drones can deliver...
The excitement of ISC West 2019 continued until the very end – almost. Exhilarated by the first two busy days of the show, attendees and exhibitors seemed to welcome a slower third day. There were no complaints about booth traffic, and still plenty of thoughtful conversations taking place, everyone determined to maximise the value of face time with customers until the last second. Building an IoT ecosystem in SAST At a show lacking in high-profile new technology announcements, the bigges...
RS2 Technologies, globally renowned security and access control systems provider firm, has been named as a new Strategic Alliance Partner in the United States by Zenitel Group, the global provider of Intelligent Communication solutions. Integrated systems “Zenitel’s continued innovative approach to simple but powerful integrated systems provides a complete unified solution to customers of all sizes”, said Dave Barnard, Director of Dealer Development for RS2. “Zenitel ha...
As the industry looks for effective, integrated solutions that improve security and enhance business, Axis Communications, a provider in network video, plans to announce the debut of new products and solutions at ISC West 2019. These products include new developments in network audio, multidirectional and infrared (IR) camera capabilities, and access control technology, highlighting Axis’ commitment to taking a leading role in the security industry. “It is always a privilege to atte...
Matrix Comsec, a manufacturer and provider of security and telecom solutions, is participating in ISC WEST 2019, Las Vegas, USA on 10th April 2019. Matrix will be showcasing its comprehensive range of IP video surveillance, people mobility management - an innovative range of access control and time-attendance solutions at the event. Both these solutions are specifically designed for large and multi-location enterprises, SME and SMB organisations. Matrix is known for offering technology driven,...
People and vehicle access control specialist, Nortech is now offering long-range vehicle and driver identification tags to grant seamless access to approaching vehicles. Nedap TRANSIT reader range Designed to accompany the popular TRANSIT reader range from Nedap, the tags are ideal for use in staff car parks, for priority vehicle control, industrial site access control, fleet and parking management. Key features include simultaneous driver and vehicle identification, a reading distance of up to 10m, easy windshield mounting with suction pads and maximum perimeter security. Driver-based ID systems The TRANSIT Prox Booster (120-125 KHz), SMARTCARD Booster (13.56MHz) and SMARTCARD Booster Ultimate (2.45GHz and 433MHz) enable long range driver-based identification The TRANSIT Prox Booster (120-125 KHz), SMARTCARD Booster (13.56MHz) and SMARTCARD Booster Ultimate (2.45GHz and 433MHz) enable long range driver-based identification. Driver-based ID systems, a building access card and in-vehicle booster ensure that a vehicle can never gain access to a secured area unless occupied by an authorised driver. The booster is used in combination with a personal access credential and is an easy to integrate solution for vehicle access, eliminating the need to issue new cards. The booster is placed on the windshield on the inside of a vehicle. When an authorised building access card is inserted into the booster, it is read and then boosted to the external Nedap TRANSIT reader. The TRANSIT reader then transmits the credential ID to any standard back end security panel. If the credential is authorised and access is granted the gate will open automatically. Removal of the driver ID then allows the access card to be used for building access. TRANSIT Prox Booster 2G Users also have the facility to match up vehicles and drivers, as a separate ID (vehicle ID) can be programmed into the booster on certain models. This ensures the right driver is with the right vehicle. The TRANSIT Prox Booster 2G supports proximity access control cards operating on 120-125 kHz such as HID prox, EM and Nedap. The SMARTCARD Booster 2G supports ISO 14443 or 15693 compliant smartcards (eg. MIFARE, MIFARE DESFIRE, LEGIC, Calypso and HID iClass) operating on 13.56 MHz. SMARTCARD Booster Ultimate The SMARTCARD Booster Ultimate is also available for almost all card technologies The SMARTCARD Booster Ultimate is also available for almost all card technologies. It supports ISO 14443 or 15693 compliant smartcards (eg. MIFARE, MIFARE DESFIRE, LEGIC, Calypso and HID iClass) operating on 13.56 MHz. The advanced tag authentication of the SMARTCARD Booster Ultimate is only functional when the Security Key Pack has been installed in the TRANSIT Ultimate. The SMARTCARD Booster Ultimate operates with two frequencies, and uses the 2.45 GHz for robust vehicle identification and the 433 MHz frequency for advanced tag authentication using AES standards. A bi-directional communication feature in combination with the SMARTCARD Booster Ultimate has also made it possible to write information on the drivers’ access control card when the vehicle enters or leaves a perimeter. Credits, offline access rights or other information can be changed dynamically upon perimeter access. Booster applications in secured areas Typical booster applications are high secured areas like airports, seaports, military bases, utility companies, corporate and educational campuses, police, fire and other installations where vehicles must be assigned to a specific driver. Nortech has supplied products and solutions to the security industry for over 25 years as an independent British company. The company uses extensive experience and expertise to create new security products to fit their clients’ needs and designs everything with the customer in mind.
Qognify - the trusted advisor and technology solution provider for physical security and enterprise incident management - announced that it has completed the acquisition of the IP video management software (VMS) company - On-Net Surveillance Systems (OnSSI), including the pioneer of IP video technology - SeeTec GmbH. Backed by the global investment firm Battery Ventures, Qognify announced the agreement on December 22, 2018 and the deal closed on December 28, 2018. Expanding geographic reach With Qognify, OnSSI and SeeTec operating under one umbrella, the company is today one of the largest VMS, Video Analytics, PSIM and Critical Incident Management companies in the world, serving mid-market and enterprise organisations. We look forward to focussing on 2019, supporting all Qognify, OnSSI and SeeTec partners and customers"Steve Shine, CEO and President of Qognify states: “Following the swift closing of the deal, we look forward to focussing on 2019, supporting all Qognify, OnSSI and SeeTec partners and customers, whilst substantially expanding our geographic reach and market penetration.” Combined technologies portfolio Qognify’s VisionHub, NiceVision, FAST and Situator solutions are trusted by financial services companies, mass-transit infrastructure, large international airports and seaports, as well as smart and safe city projects around the world. The OnSSI Ocularis and Cayuga VMS solutions are deployed across education, gaming, government, healthcare, logistics, manufacturing, retail, public safety, transportation and utilities organisations, in more than 100 countries. Shine adds: “Today, through our combined portfolio of award-winning and market-leading technologies, infrastructure and expertise, we expand our global presence, creating an entity capable of meeting the exacting requirements of mid-market and enterprise organisations anywhere in the world.”
Pelco is pleased to announce four new combination IR/white light illuminator models to the award-winning Esprit Enhanced PTZ camera product line. These new models provide IR-only and white light/deterrent modes of operation to give you the ability to overtly capture clear full colour images when using white light direct illumination or covertly with clear black and white images when in IR-only mode. The new models are ideal for performance-oriented 24 by 7 operations as well as extreme temperature environments where fast PTZ responsiveness, wide dynamic range with variable overt and covert lighting options are key requirements. Enhancing surveillance experience The IR and white light illuminator modes enhance your surveillance experience with: The ability to switch between IR and white light as needed (manually, programmed, or via alarm). Optimised security detail with colour even in the dark, and where white light counter-acts colour distortion from light sources such as high-pressure sodium lamps. A visual white light deterrent (can be configured to come on when motion is detected, VMS is required). Applications include Public transit and cities where lighting pollution is prevalent (IR option) and the risk of vandalism is greater (white light option). Perimeter of a border. Airports, seaports, and refineries that cannot afford down time. Oil and gas operations. The four new models are offered with wiper, with wiper and pressurised unit, in both 48VDC and 100-240VAC power versions.
CeComunica, a Professional Mobile Radio (PMR) operator in Panama, is slated to launch in December a Digital Mobile Radio (DMR) Tier III trunking network supplied by Hytera, global provider of innovative PMR solutions. This new nationwide network will provide advanced and reliable mission and business critical communications services to a large number of users from sectors such as ports, airports, ground transportations, hospitality, retailing and security companies in Panama. DMR Tier III trunking network The DMR Tier III trunking network has been set up with 15 sites of Hytera DS-6210 base station and multiple models of industry-leading digital two-way radios from Hytera DMR portfolio, including PD6, PD7, PD9, X1, MD6, MD7 and its flagship Multi-mode Advanced Radio PDC760 which can provide high quality narrowband voice under DMR protocol and fast data transmission in LTE broadband. To realise the full capability and maximise the productivity, this network can interoperate with other communications systems of different technologies by adopting Hytera SmartOne solution. “We are excited to supply our DMR trunking system and facilitate CeComunica’s further penetration into the PMR operator business, and we have been looking forward to introducing more cutting-edge products and technologies for Panamanian users to increase productivity and security of their daily operation, as well as unexpected scenarios,” said Fernando Camelo, Regional Sales Director of Hytera.
Ava Group, a provider of risk management services and technologies, announces new enhancements to its FFT Aura Ai-2 advanced fibre optic detection controller, which offers superior intrusion detection location accuracy together with extended range performance. The system is perfect for monitoring pipelines, perimeters and communications networks. Mark Horton, Global Sales and Marketing Director at Ava Group comments, “The Aura Ai-2 is our next generation controller and was released to industry acclaim last year, being recognised for its ground-breaking performance. However, the system has had further performance upgrades and now offers monitoring of optical distances of 80km for perimeter fence detection or 110km for pipeline or covert buried detection.” Fence mounted application “Accuracy has also been enhanced, the system can now pinpoint an intrusion location down to within +/- 2m metres on a fence mounted application. The controller is also able to cover different applications simultaneously, for example, fence mounted and covert buried detection. This essentially offers two units in one, saving on both procurement and operational costs.” The Aura Ai-2 controller works by pulsing laser light along optical fibre cables connected to each of its two detection channels The Aura Ai-2 controller works by pulsing laser light along optical fibre cables connected to each of its two detection channels. Dependent on the application these cables are either: laid adjacent to a pipeline, attached to a perimeter fence or buried along a perimeter boundary. Minute disturbances cause changes in the scattered light and the Aura Ai-2 controller automatically analyses this reflected light to detect, locate and report disturbances. Reduces nuisance alarms Advanced optical signal processing algorithms, combined with artificial intelligence, accurately and reliably analyse the reflected light to discriminate between intrusions and other causes of disturbance. This significantly reduces nuisance alarms whilst maintaining full awareness of any situation. When wired in a redundant loop configuration the two-channel controller provides cut resilience and continues to provide detection in the event of a deliberate or accidental cable cut. Dr Jim Katsifolis, CTO at Ava Group Technology Division comments, “As is the case with any fibre optic system, the key to increasing performance over distance is to maximise its optical power budget, that is, the maximum allowable optical signal loss the system can tolerate while still maintaining proper operation. We have enhanced our Aura Ai-2 platform by designing new ultra low-noise detection electronics that significantly increase its dynamic range (and consequently its optical power budget).” Protection solution for critical infrastructures “When combined with other design improvements that minimise noise while increasing detected signal strength, the Aura Ai-2 now has an industry leading power budget of 13.5 dB. We’ve achieved higher signal-to-noise ratios across the whole sensor, maximising the signals detected from both the near and far ends of the sensing fibre.” Aura Ai-2 is the ideal protection solution for critical infrastructures such as high-risk oil & gas pipelines, chemical or water pipelines As it utilises the sensitivity of fibre optic technology, Aura Ai-2 is also perfect for monitoring fibre optic communications networks. The system can monitor for tapping and tampering by connecting spare (dark) fibres inside each network cable to Aura Ai-2. Network cable disturbances, including removal of protective layers, attempted tapping or cable movement, will be instantly detected and generate an alarm indicating the location. Aura Ai-2 is the ideal protection solution for critical infrastructures such as high-risk oil & gas pipelines, chemical or water pipelines as they traverse often remote and inhospitable locations. It is also perfect for protecting long boundary perimeters alongside railway lines, airports and ports. Perimeter fence project Mark Horton added, “In the key terms of distance and accuracy, Aura Ai-2 easily outperforms its competitors and has already proven to be highly popular in the market. The system has already been chosen for a large Middle East pipeline and perimeter fence project, with the protection of both assets conveniently controlled from just one controller. In another project, the system has also been employed to monitor and alert of any rockfalls or landslides near a rail line that could endanger people or rolling stock.” Since its launch, Aura Ai-2 has already won awards including at the Securex Poland International Security Fair Awards in relation to its perimeter protection capabilities. With a combination of performance, reliability and flexibility, Aura Ai-2 is finding new and innovative uses as Mark Horton concludes, “This powerful solution has many potential uses and is already being utilised to protect the security of vital government facilities, military installations, critical infrastructure and custodial facilities.”
Vaxtor Technologies has acquired RoadPixel and is relocating its international headquarters from Spain to the UK. Together, the companies will become Vaxtor Recognition Technologies Ltd. The Vaxtor family of companies in the USA, Singapore, and Spain will continue to service their respective territories. Juan Vercher, CEO of Vaxtor Technologies stated: “I really feel honoured leading Vaxtor Recognition Technologies and bringing on board recognised experts in the ANPR industry including Frank Thomson, Lawson Noble and their entire team. This will enhance and strengthen the relationship with our current technology partners and customers and will allow us to deliver next generation disruptive products thanks to our enhanced capabilities. The relationship and quality of service we provide to our customers and partners will remain the cornerstone of our values.” Joining forces with Vaxtor means that we will become a very significant player in the ANPR market" Camera and recognition technology Frank Thomson, CEO of RoadPixel added: “Joining forces with Vaxtor means that we will become a very significant player in the ANPR market with the combination of RoadPixel’s advanced camera technology and Vaxtor’s world class recognition software. We have been working closely with Juan Vercher and his very talented people for some time and we have great synergy and company cultures that are already very much aligned. In addition to our best of breed technologies, our combined personnel will be one of the most experienced and capable teams in the ANPR market.” Strategic markets for the combined operations are security, parking, traffic, safe cities, and critical infrastructure. These markets will enjoy a full family of video analytics products including license plate recognition (LPR/ANPR/ALPR), USDOT, railway vehicles, and container code recognition technology chosen by 3 of the Top-5 USA ports.
The Internet of Things (IoT) is having a significant and ever-changing impact on the way we view video security. Today, cameras are expected to be so much more than devices with which to simply capture images; they need to be far smarter than that. These future-facing cameras are becoming an integral part of the vast digital connectivity infrastructure, delivering a parallel performance as intelligent sensors with the ability to extract the kind of invaluable data that helps businesses make improvements in the area of video security, and beyond. However, as the list of possibilities grows, so too does the risk of unauthorised access by cybercriminals. We should all be aware that a single weak link in a communications infrastructure can give hackers access to sensitive data. That’s the bad news. Safeguarding data and utilising deep learning The good news is cybercrime can be avoided by employing a data security system that’s completely effective from end-to-end. One technological advancement that the trend-spotters are predicting will become part of the video security vocabulary is ‘deep learning’ Once this level of safeguarding is in place you can begin to confidently explore the technologies and trends happening now, and those on the horizon. So, what will be having an influence on surveillance in 2018? Well, according to IHS Markit, one technological advancement that the trend-spotters are predicting will become part of the video security vocabulary is ‘deep learning’, which uses algorithms to produce multiple layers of information from the same piece of data, therefore emulating the way the human brain absorbs innumerable details every second. In Europe, GDPR compliance will also be a big talking point as new principles for video surveillance data collection, use limitation, security safeguards, individual participation and accountability are introduced. And, as the popularity – and misuse – of drones continues to rise, the recent developments in drone detection technology will be particularly welcomed by those whose primary concern relates to large areas, such as airport perimeter security. The future of 'smart' video analytics An important feature of today’s intelligent cameras is the ability to provide smart video analytics. The Bosch ‘i’ series, for example, offers a choice of formats – Essential Video Analytics and Intelligent Video Analytics. Essential Video Analytics is geared toward regular applications such as small and medium businesses looking to support business intelligence (e.g. inter-network data transfer), large retail stores and commercial buildings for advanced intrusion detection, enforcing health and safety regulations (no-parking zones or detecting blocked emergency exits) and analysing consumer behaviour. The camera-based, real-time processing can also be used to detect discarded objects, issue loitering alarms and detect people or objects entering a pre-defined field. Intelligent Video Analytics provides additional capabilities. It is designed for demanding environments and mission-critical applications, such as the perimeter protection of airports, critical infrastructures and government buildings, border patrol, ship-tracking and traffic-monitoring (e.g. wrong-way detection, traffic-counts and monitoring roadsides for parked cars: all vital video security solutions). An important feature of today’s intelligent cameras is the ability to provide smart video analytics Intelligent Video Analytics can also differentiate between genuine security events and known false triggers, such as challenging environments created by snow, wind (moving trees), rain, hail, and water reflections. For more expansive areas, like an airport perimeter fence, the system has the range and capability to provide analysis over large distances. And, if a moving camera is employed, it is also possible to capture data on objects in transit when used in conjunction with the Intelligent Tracking feature. For roadside use, Intelligent Video Analytics systems, such as the Bosch MIC IP range, are resistant to vibrations and can still operate in extreme weather conditions, continuing to detect objects in heavy rain or snow. Evolving cameras past surveillance It’s becoming ever clearer that the IoT is transforming the security camera from a device that simply captures images, into an intelligent sensor that plays an integral role in gathering the kind of vital business data that can be used to improve commercial operations in areas beyond security. For example, cities are transitioning into smart cities. The capabilities of an intelligent camera extend to the interaction and sharing of information with other devices (only those you have appointed) With intelligent video security cameras at the core of an urban infrastructure smart data can be collected to optimise energy consumption via smart city lighting that responds to crowd detection and movement. Cameras can also be used to improve public transport by monitoring punctuality and traffic flow based on queue lengths, with the ability to control traffic lights an option should a situation require it. As the urban sprawl continues and this infrastructure grows, the need for more knowledge of its use becomes more essential, necessitating the monitoring technology developed for use by human operators to evolve into smart sensing technology, that no longer just provides video feeds, but also uses intelligent analytics and sophisticated support systems. These systems filter out irrelevant sensor data and present only meaningful events, complete with all relevant contextual data to operators to aid their decision-making. Expanding the video security camera network Today, video analytics technology has tangible benefits for human operator surveillance, and delivers KPIs that are highly relevant to transport operators, planners and city authorities. As an existing infrastructure, a video security camera network can be improved and expanded by installing additional applications rather than replaced. From a business perspective, that means greater value from a limited investment. Thereafter, the capabilities of an intelligent camera extend to the interaction and sharing of information with other devices (only those you have appointed), image and data interpretation, and the ability to perform a variety of tasks independently to optimise both your safety and business requirements. The fact is, cameras see more than sensors. Sounds obvious, but a conventional sensor will only trigger an alarm when movement is detected, whereas a camera can also provide the associated image and information like object direction, size, colour, speed or type, and use time stamps to provide historical information regarding a specific location or event. Based on this evidence, the video security camera of today is more than ready for the challenges of tomorrow.
The term ‘marine’ comes from the Latin mare, meaning sea or ocean, and marine habitats can be divided into two categories: coastal and open ocean. Video surveillance (VS) applications can cover both types of marine environment with system for ships, maritime ports, onshore and offshore installations, etc. We should want to further analyse VS for ships and try to explain the types of ships on which it can be used, the ways in which VS can be used on ships, the typical certifications in use and what features a camera station must have to be installed on a ship. Starting with ships that have a minimum tonnage, around the world we have: liquefied natural gas (LNG) tankers, passengers ships, chemical tankers, crude oil tankers, container ships, general cargo ships and bulk carriers.As the LNG market grows rapidly, the fleet of LNG carriers continues to experience tremendous growth, offering more opportunities for VS Video surveillance for all marine vessels An LNG carrier is a tank ship designed for transporting liquefied natural gas. As the LNG market grows rapidly, the fleet of LNG carriers continues to experience tremendous growth. A passenger ship is a merchant ship whose primary function is to carry passengers by sea. This category does not include cargo vessels which have accommodation for a limited number of passengers, but rather includes the likes of ferries, yachts, ocean liners and cruise ships. A chemical tanker is a type of tank ship designed to transport chemicals in bulk. These ships can also carry other types of sensitive cargo which require a high standard of tank cleaning, such as palm oil, vegetable oils, tallow, caustic soda and methanol. An oil tanker, also known as a petroleum tanker, is a merchant ship designed for the bulk transport of oil. There are two basic types of oil tankers: crude tankers and product tankers. Crude tankers move large quantities of unrefined crude oil from its point of extraction to refineries. Product tankers, generally much smaller, are designed to move refined products from refineries to points near consuming markets. Container ships are cargo ships that carry their entire load in truck-size intermodal containers: a technique called containerisation. They are a common means of commercial intermodal freight transport and now carry most seagoing non-bulk cargo. Today, about 90% of non-bulk cargo worldwide is transported by container. A cargo ship or freighter ship is any sort of ship or vessel that carries cargo, goods and materials from one port to another. Cargo ships are specially designed for the task, often being equipped with cranes and other mechanisms to load and unload, and come in all sizes. Bulk carriers make up 15%–17% of the world's merchant ships and they are specially designed to transport unpackaged bulk cargo such as grains, coal, ore and cement in its cargo holds. For all these ships the protection of vessels, cargo and crew is a priority, that’s why the adoption of VS technology plays a key part in terms of security and safety. Human error is regularly named as a major factor in ship accidents, and one way to avoid it is to aid seafarers by providing them with technology and equipment that is reliable and easy to use in all weather and sea conditions. Marine VS encompasses liquefied natural gas (LNG) tankers, passengers ships, chemical tankers, crude oil tankers, container ships, general cargo ships and bulk carriers Emergency security solutions on ship One of the most important applications for camera stations is during “docking”. Mooring is the securing or confining of a vessel in a particular location with a fixed or a floating object (jetty, pier, ship, barge, buoy, etc.) as various cargo operations are carried out. Docking is the final stage of mooring operations when the ship docks to the jetty. This is a very delicate operation and cameras are very helpful in making sure docking is done without accidents.'Man overboard’ is an emergency in which a person has fallen off a boat or ship into the water, and can happen at any time during the day or night Another important application for camera stations is the Man Overboard detection system (MOB). ‘Man overboard’ is an emergency in which a person has fallen off a boat or ship into the water. Man overboard events can happen at any time during the day or night, in all types of weather and sea conditions, and from almost any location on the ship, ranging from a few tens of feet above the water, to over 180 feet. When these events occur, the immediate availability of important data is crucial. Accurate confirmation of the event including time of occurrence, location on the ship and location in the sea is critical. A proactive detection system must immediately and accurately detect man overboard events and provide prompt, actionable data to response personnel. A typical man overboard detection system can report a MOB event in under 1 second. VS on a vessel can also monitor the engine room at all times and provide a good view of people working on dock, machinery and stowed equipment. But what are the most important features that a camera station must have to work in one of the most aggressive environments in nature? Marine surveillance must operate in one of the most harsh environments in nature Ruggedised reliability in surveillance First of all, and perhaps it’s obvious, but it’s extremely important to have camera stations with amazing reliability. Housing units manufactured from AISI 316L stainless steel, passivated and electropolished, makes the cameras completely impervious to air, water, rusting and corrosion, therefore offering excellent weather protection and increased reliability. Housing units manufactured from AISI 316L stainless steel, passivated and electropolished, makes the cameras completely impervious to air, water, rusting and corrosion Sometimes ships also use cameras constructed entirely from technopolymer, which guarantees high impact resistance and superior protection from external weather agents. Keeping the camera glass clean at all times is another essential feature, and it can be done via a wiper/wash system that greatly reduces the need for maintenance. In the case of PTZ cameras, the best option would be a great pan and tilt speed (up to 100°/s). What is the operative temperature range for the cameras? Sea is everywhere and therefore ships go everywhere, from the Arctic Ocean to the Mediterranean, so we need cameras that have to be fully operational across a wide temperature range. -40°C to +65°C covers almost all areas. Analogue or IP Cameras? Actually, both options can be used, especially for applications like docking where it’s important to avoid image delay (as can happen with IP cameras due to the natural latency of data communication over a network). Marine certifications Last but not least, the certifications: Certifications guarantee the quality and reliability of camera stations. There is no compromise! One important certification is the Lloyd’s Register Type Approval which subjects cameras to rigorous testing for performance, vibration (critical on ships), humidity, etc. The application field of the LR Type Approval is VS in public places (e.g. passenger ships), open decks, enclosed spaces that are subjected to heat generated from other equipment, and technical premises. Often, VS cameras used in specific areas of ships, such as hazardous areas, are required to have ATEX and IECEX certifications.
The 2017 decision of the British electorate to leave the EU was a shock to many within and beyond the UK. It is one of the most significant decisions in the UK’s history. It reflects a long-running uneasiness with the land mass across the Channel, not only because of geographical separation but also because of cultural disconnection. The UK is one of few European countries not to have been occupied or oppressed since the Norman invasion of 1066, and hence has an independence of spirit which continues to flourish over any practical concerns. It is worth bearing in mind, however, that the UK is leaving (politically) the EU, not Europe. Effect of Brexit on UK security The effect of departing the EU on 29 March 2019 – irrespective of any transitional period – will be long lasting and profound. In security terms, the UK will have still to contend with international terrorism, transnational crime and the global movement of people, all challenges which require widescale co-operation. The UK has traditionally been strong in meeting these risks, and has played a significant role in the development of EU policy on police co-operation and information sharing. The declaration of Article 50 of the Lisbon Treaty formally notified the EU of the UK’s departure. After some delay, the UK Government has begun discussions with the EU and published a series of papers that set out its preferences in those discussions. Maintaining a seamless and frictionless border with Ireland is an early requirement from both sides. However, exactly how this is to be achieved is yet to be agreed. In terms of maintaining effective security co-operation with the EU, the aspiration is also high. Reduced access to intelligence Yet when the UK reverts to a third-country relationship with the EU post-departure, access to an organisation like Europol and databases such as the Schengen Information System (SIS II) will be much more limited. If an operational agreement with Europol is already in place when the UK leaves the EU, its departure should not have much effect on the exchange of core intelligence on matters like terrorism: Europol already has operational agreements with 19 third-country states including the USA. The situation will be more problematic if the UK leaves the EU with ‘no deal’, although some reassurance might be drawn from Theresa May’s Florence speech when she said the UK was “unconditionally committed to maintaining Europe’s security”. New arrivals to Britain from the EU will need to be registered in preparation for a new immigration system It is in the area of border and immigration control that real problems look most likely to arise, largely because of the volume of traffic – both people and goods – to be managed. Migration was a key driving force in the EU referendum result, but without a register of EU citizens the UK is handicapped in achieving a declared target. Mrs May confirmed in her Florence speech that new arrivals to Britain from the EU will need to be registered in preparation for a new immigration system at the end of the two-year post-Brexit implementation period that she aims to negotiate. Pressure on immigration checks Significantly, pressures on the day-to-day operation of immigration checks at airports and ports will substantially increase if more passengers are required to have visas to enter the UK unless the system is fundamentally changed. The Border Force budget has already faced enormous pressure, having been reduced by 15% from £617 million in 2012/13 to £558 million in 2015/16 while the number of journeys has increased. Among its longer-term programmes to improve capacity are the Digital Services at the Border (DSaB) programme, the successor to the e-borders programme with the aim of further developing risk-based digital identity management, and the Immigration Platform Technologies programme, which aims to improve the efficiency and effectiveness of visa and other immigration transactions with the public. Illegal migration also needs to be tackled more effectively, as any increased restriction on legitimate travel from countries within Europe has the potential to increase the demand for forged and stolen documentation as well as risk new and more dangerous forms of illegal travel to the UK. Managing customs at UK borders There will also be considerable challenges in managing the flow of goods across UK borders after Brexit. HM Revenue and Customs has estimated that the number of customs declarations at UK sea ports and airports could rise from 60 million to 300 million a year after the UK leaves the EU. The number of customs declarations at UK sea ports and airports could rise from 60 million to 300 million a year An ongoing programme to upgrade the UK’s customs system began before the referendum – before the government committed to seeking a new customs arrangement from March 2019 – and will be inadequate to cope with the substantial increase in customs declarations that will result if the UK leaves the customs union. According to the Road Haulage Association, there is a real danger of ‘everything grinding to a halt’. This will focus minds as the March 2019 deadline approaches and every effort is made to avoid falling off a cliff-edge. Rethinking UK border operations In sum, it is clear that against the backdrop of global migration trends, conflict and economic uncertainty, the challenges faced by the UK in defending its border are significant, and the practical difficulties are likely to be magnified whatever the final nature of the post-Brexit arrangements. This will likely necessitate a major rethink of strategy, processes and, possibly, some substantive changes to existing structures. If only in practical terms, there will have to be a significant investment in people, resources and databases to cope with anticipated volumes of traffic through ports, airports and tunnels. Given budgetary constraints, this task will not be easy. Equally, Brexit does offer the opportunity to rethink operation of the border and further deploy technology in order to realise further efficiencies. However, as is often the case, it is events, as Harold Macmillan once said, that may prove to be the real determinants of the outcome. By Robert Hall, MBCI MSyl and Dr. Alison Wakefield, FSyl
The reason for long lines at U.S. airports is that the airlines now charge fees for checked bags. It’s as good an explanation as any of why airport passenger screening lines suddenly and mysteriously grew out of control during May (and then became manageable again in June). It’s not the only explanation floating about – there’s plenty about high travel volumes, Transportation Security Administration (TSA) personnel shortages, etc. etc. – but it’s the one that appeals to the disgruntled traveller in all of us. In the absence of definitive answers, why shouldn’t two of the biggest gripes we all have with air travel – luggage fees and long security wait times – be a case of cause and effect? I acknowledge the oversimplification. However, in addition to its obvious appeal, the explanation also has a germ of truth, and skipping past the details, it’s the government’s fault! US government negligence towards TSA officers Specifically, the U.S. government has levied a 7.5 percent excise tax on airplane ticket prices. However, the tax doesn’t apply to baggage fees. In effect, there is an incentive for airlines to lower ticket prices (subject to the tax) and implement or raise baggage fees (which are not) to offset the reductions. The approach gives travellers a specific incentive (say, $25) to carry their bags onto the plane rather than check them before going through the screening area. More bags clog up the operation, thus delaying airport screening. Absent the federal tax, it makes sense to “bundle” the charges into a higher ticket price rather than charging separately. Hence the argument: It’s the government’s fault! Experts say a roughly 10 percent reduction in screening personnel has coincided with a 15 percent increase in passenger volume, contributing to the recent crisis There are other possible explanations that are also the government’s fault, from not enough overtime pay for TSA-employed screening officers, to insufficient staffing of screening checkpoints. The leader of the union that represents TSA officers says Congress has “starved TSA of the resources it needs to meet growing demands at our nation’s airports.” Experts say a roughly 10 percent reduction in screening personnel has coincided with a 15 percent increase in passenger volume, contributing to the recent crisis. Nobody likes to wait two hours (or more!) in an airport screening queue, which was the unfortunate situation that flooded news reports during much of May. Attempted solutions add to airport security check delays And some of the proposed solutions seemed to contribute to the problem. For example, a new automated technology – so-called Innovation Lanes – provides expedited screening processes and promises to move passengers through the system more quickly. However, it was the installation of the new equipment at a security checkpoint in Atlanta (during which the checkpoint was closed) that contributed to some of the more extreme wait times in May. Another proposed solution is the TSA PreCheck lanes, where prescreened passengers get to speed through wearing their belts and shoes. But fewer than the projected number of passengers opted to pay the $85 fee for the programme, and some observers have suggested that resources devoted to screening PreCheck passengers could do more overall good if reassigned to screening the masses. “I got here two and a half hours before my flight, and security took two to three hours to get through,” one traveller recently told a TV station in Chicago. In March, TSA Administrator Peter Neffenger said wait times had nearly doubled over the previous year. Not to mention reports of data showing that TSA agents fail 95 percent of security tests involving passing weapons through security. For now, the problem seems to have abated, and airport and TSA officials were congratulating each other all around after average wait times improved drastically over the Memorial Day holiday weekend. A new TSA 10-point plan (more officers, overtime, canine teams, etc.) is being implemented. But what about the upcoming busy summer travel season? We may not have seen the end of those long security wait times…
Ports of Jersey operate the island’s busy harbours and airports, providing high-quality services and facilities to enrich the experiences and journeys of their customers, with Jersey Marinas offering 1,000 berths across three award-winning locations close to the vibrant waterfront at St Helier. At very busy times of the year, such as the annual Jersey Regatta, the sheer volume of visitor traffic arriving from both land and sea can present serious problems. With particular challenges arising from managing car parking, and the issuance of port entry digital keys for boats harbouring. Smart access control solution Ports of Jersey needed a smart access control solution capable of managing short-term parking at St Helier harbour Ports of Jersey needed a smart access control solution capable of managing short-term parking at St Helier harbour. The system needed to be intelligent enough to manage complex bookings for use by berth and mooring holders dropping off and loading gear onto boats, before parking elsewhere long-term. The existing solution was no longer cost effective, and was open to abuse by some users. In addition, Ports of Jersey also required an upgrade to the out of date Jersey Marinas security gate access control system. At peak times this system needed to be able to cope with rapid, high capacity issuance of smart cards to vessel owners and boat crews wishing to access the marina and marina hospitality faculties. Smart installation SALTO partner JMH Technology was asked to provide a new car park access control solution and resolve the looming problem of needing to issue 1,000 cards, at a cost of over £100,000. A replacement car park access control system was installed based on new technology smart cards and 2,000 cards issued. This project was highly cost-effective with installation and card issuance totalling less than just card issuance on the previous system. Future savings also assured thanks to a choice of more cost-effective cards. Abuse of short-term parking has been cut, and the experience for visitors is improved. JMH Technology is in the process of adding more reader-controlled doors To drive yet more efficiency and further reduce overheads the system has subsequently been updated at both St Helier and Albert Pier car park, with smart installation of the latest SALTO access control technology. The upgrade continues, and JMH Technology is in the process of adding more reader-controlled doors and smart handles across the facility. Security assessment A full security assessment was carried out at Jersey Marinas, and a decision taken to replace all of the expensive and temperamental mechanical code locks with a full online access control system. By engineering a bespoke solution that integrated a SALTO kiosk system with a touch screen unit interface, Jersey Marinas staff are now able to allocate more than 500 cards during the high-tide window. With extra capacity on tap when they need it to cope with high demand at peak times, and valuable cost savings made. The SALTO system provided is technically robust and cost-effective to expand. As a partitioned system Ports of Jersey now have a global overview, with each department able to see the section relevant to them. This enables micro management of cost savings across equipment and cards and allows staff to get permissioned access to all necessary parts of the Ports infrastructure without delay.
Rasilient Systems, Inc., the pioneer in forensic-grade video surveillance systems, has completed Phase II of the video surveillance system upgrade at Fairbanks International Airport (FIA) in Alaska. Phase II at FIA continued the installation of modern video surveillance for the airport to meet the stringent demands needed to provide safety and security for the thousands of passengers FIA serves daily. FIA is a state-owned, public-use airport that averages more than 328 aircraft operations each day. The Phase II video surveillance deployment includes Rasilient server and storage technology that facilitates distributed IP megapixel camerasThe Phase II video surveillance deployment includes Rasilient server and storage technology that facilitates distributed IP megapixel cameras; recording transmission and storage of forensic-based, high-quality video signals; comprehensive live viewing and playback; utilisation of purpose-built/designed digital IP networks; and intelligent processing of archived video, said Rasilient Director of Strategic Sales Engineering Dr. Edward Wassall. Increased support for surveillance cameras “These are key components that have the major video surveillance system requirements of scalability, video quality and reliability that FIA sought to implement when they chose to upgrade their security system,” said Dr. Wassall. “This current upgrade increased the number of supported video surveillance cameras as well as the efficiency associated with the management related to storage.” Phase I, completed in the summer of 2018, included the initial deployment of Rasilient’s forensic-grade series video surveillance servers and storage. Rasilient’s purpose-built server and storage products provide a video surveillance system infrastructure designed to deliver reliable and continuous video surveillance with exclusive No Frame Drop (NFD) technology that eliminates recording gaps. Enhancing visibility and storage capabilities The Rasilient system has allowed FIA to meet the needs of today as well as to provide scalability for our future needs"FIA Building and Security Representative Dana Bowen said their primary decision to upgrade the multi-camera airside and landside video surveillance system was to enhance visibility and storage capabilities. The Rasilient system has allowed FIA to meet the needs of today as well as to “provide scalability for our future needs,” said Bowen. “We are really very happy with the new airport forensic enabled storage system,” said Bowen. Small, medium to large enterprise deployments are supported by Rasilient products and technologies, and they have been deployed worldwide to protect museums, government institutions, airports, seaports, military contractors, financial institutions, educational establishments, stadiums, and residential complexes.
Milestone Systems, a provider of video management software (VMS), is the chosen solution for protecting the Port of Antwerp, the second largest seaport area in Europe, covering more than 12,000 hectares, the equivalent of 20,000 football fields. Large areas like ports are very difficult to secure in a traditional way. Reporting incidents using only radio communications can lack information at an optimal level of detail and accuracy. It takes time for responders to reach incidents. Analogue video solutions have issues with very long distances, meaning video amplifiers must be used which lead to fragile and inflexible infrastructure. Milestone XProtect Corporate and XProtect Smart Client have enabled the port authorities to establish a central control centre with a consolidated view of the harbour. This enables rapid and relevant response to incidents, reducing the impact of incidents on assets and persons. Milestone steps in to ensure that this business-critical system in the port receives a high level of supportOpen platform technology The open platform technology pioneered by Milestone combined with the solution power of the Milestone Partner Community enabled the Port of Antwerp to choose the perfect infrastructure components and cameras for their challenges. Lenovo, Dell and multiple camera partners are elements of the solution. Thanks to the usability of network video, the port can utilise Milestone open platform for solutions that augment the already rich functionality of XProtect VMS. In addition to the infrastructure, the Port of Antwerp is taking advantage of Milestone Care Premium. Milestone Care is a complete suite of operational maintenance and support services grouped into four different packages, enabling Milestone customers to choose the support coverage that fits their exact need, now and in the future. With the chosen level of support, Milestone steps in to ensure that this business-critical system in the port receives a high level of support. Advanced security installation Furthermore, Milestone Professional Services has also been in play for this advanced installation, to guide and counsel the port on the best capabilities of the open platform VMS. This consultancy service ensures the port can adapt and expand this system as needed for an ever-expanding, always relevant surveillance solution. “We are extremely pleased to have been chosen by Port of Antwerp for their video safety system,” says Michaël Fontaine, Country Manager Benelux, Milestone Systems. “This is a clear testimonial to the solution power of XProtect and our open platform partner community. This has already been proven in a number of other ports worldwide, and now in the modern Port of Antwerp.”
Mirasys Video Management Solutions are being utilised in a number of transport projects which include ports, motorways, airports, trains and logistic centres. Each project needs a highly adaptive solution which adapts to changing requirements, technologies and regulations, and provides unlimited scalability and high reliability. Mirasys VMS increases efficiency The transportation sector provides a great example of how an intelligent video management system can increase the efficiency of activities, safety, and ensure smooth-running operations. Mirasys offers the possibility to increase productivity and savings with powerful connectivity to other systems. Mirasys VMS includes a number of intelligent features. Playback and powerful search tools identify incidents quickly and efficiently. The intuitive storyboard function helps in reporting events and incidents and high quality images can be used for evidence. Advanced motion detection and alarm event settings let you decide what you want to track; reducing operational costs and the number of false alarms. The ingenious use of cameras and analytics increases the flow of cargo, luggage and passenger traffic Mirasys Video Content Analytics Mirasys VCA (Video Content Analytics) provides full VCA functionality with object classification and enter / exit, direction, vehicle speed, stopping, dwell time, etc. filtering. The setup is versatile and supports, for example, different type of vehicle classification, zone definitions, entering directions and vehicle speed. You have plenty of different analytic alternatives available per camera. The object that is being analysed can have several different analysis rules active simultaneously. The ingenious use of cameras and analytics increases the flow of cargo, luggage and passenger traffic. You can, for example: Tighten platform security Improve crowd management Identify people and any unusual behaviour such as running Identify abandoned objects Manage queues and staffing level Control the number of vehicles in the area Vast integration possibilities With Mirasys and its endless integration possibilities, you can speed up the logistic centre’s functions, transport management efficiency, and ensure the undisturbed flow of cargo operations. The use of Mirasys integrations will increase the value of visual information captured by the system, and bring significant cost savings. The information from video images can be linked to the information received from other sensors, also enabling the utilisation of IoT (Internet of Things). Different organisations can use the same Mirasys system to manage their part of the surveillance and security, but each party has its own rights With Mirasys and its endless integration possibilities, you can speed up the logistic centre’s functionsWhen integrating a bar code reader with the video management system in a warehouse, the movements of each package can be searched and visualised. The images from cameras can be found immediately, which helps to determine the condition of the package at the time of entering and leaving the warehouse, and on which vehicle it is located. For each and every event, the system provides the exact time, visual information from a number of different cameras, and delivers event reports to specified recipients. This results in a clear decrease in the time spent in resolving customer complaints. Automatic number plate recognition With the Mirasys ANPR+ (Automatic Number Plate Recognition) application you can automate the management and guidance of the vehicles in a certain area. For example, based on the number plate information the system can advise: Which loading bridge the vehicle is assigned to, Which driving lane the vehicle is assigned to, Driving through automatic weight-in-motion (WIM) is needed, etc. The system can monitor the vehicle on its way in and out, film it from the side, top, front and back and is therefore a great solution for vehicle damage control. Using integration to the automatic weight-in-motion (WIM) function you can also ensure automatically that the amount and type of product loaded on the vehicle is correct. Automate operations with the ANPR+ Different organisations can use the same Mirasys system to manage their part of the surveillance and securityA forwarding company can book a space for its truck from a shipping company’s ticket selling system. When the truck arrives at the shipping company’s area, for example in a harbour, it is automatically measured, and if the measurements match the ticket, the truck is guided to the green lane. If the measurements deviate from the ticket data then the truck is guided to the ticket window lane. The measurement information will be sent automatically to the system optimising the ship loading. If a vehicle exceeds its allowed time to stay in one place, or deviation from the planned route of the vehicle is detected, the system will report an event. In harbours and airports different entities, such as Security, Police and Customs, need different information from the same system. Different organisations can use the same Mirasys system to manage their part of the surveillance and security, but each party has its own rights; simultaneous users are no problem. Information from different sources flows automatically between organisations, resulting in faster response times on investigations, and increasing the performance level considerably in handling the joint security issues. Decreased total cost of ownership Mirasys is an industry-recognised Video Management System provider. Limitless integration possibilities of the Mirasys VMS offer the freedom to build the system that serves your needs. Mirasys also gives you the freedom and possibility to connect several sites into one logical entity. The centrally managed Mirasys system allows you to add or remove cameras and servers, set users’ rights, manage live and recorded video and export evidence with a few simple clicks. The system can have centralised, de-centralised or mixed topology configurations.
The Port of Wilmington, which opened in 1923 and handles nearly 400 vessels and 4 million tons of cargo each year is the busiest port on the Delaware River, and the leading North American importation site for fresh fruit, bananas and juice concentrate. It was also the first seaport to use the Transportation Worker Identification Credential (TWIC) card, beginning with the TWIC Technology Phase pilot program in October 2003. TWIC is designed to add a layer of security at ports by ensuring that workers in secure areas have received a background check and do not pose a national security threat. As the TWIC program expanded as part of the Maritime Security (MARSEC) criteria, so did the need for a software program that could read and record information from both the existing TWIC protype cards used with the port’s physical access control system and the latest TWIC cards. In addition, it was important to find a solution that would allow the port to access the Transportation Security Administration’s (TSA) ‘TWIC Cancelled Card List’, a real-time database of unauthorised TWIC users, so port security personnel can quickly identify those with revoked rights. Port officials chose HID Global’s pivCLASS Registration Engine software, which drives the Datastrip mobile readers and also resides on a desktop enrolment workstation in the port’s main office pivCLASS Registration Engine software Recognising this need, Port of Wilmington officials began exploring their options for software that could work with their existing Honeywell security management platform, Pro-Watch and work on mobile card readers to deploy the enrolment process throughout the facility. Port officials chose HID Global’s pivCLASS Registration Engine software, which drives the Datastrip mobile readers and also resides on a desktop enrolment workstation in the port’s main office. An additional license for certificate management allows the port to re-validate TWICs each day, once they are enrolled with the Honeywell system. Operational with Datastrip’s DSV2+Turbo mobile card readers Before the Port of Wilmington became a pilot site for the TWIC smart card program, it relied on 125kHz proximity cards and readers for worker identification. With the advent of TWIC compliance standards, port officials needed a way to register TWIC cards with their existing Honeywell Pro-Watch physical access control system and enter cardholder data into their database that would merge both TWIC and existing ID cards. With this merger, the port would need only one card for the access control system. It was also important to be able to enrol TWIC cardholders at the various access points to the port, which spans 307 acres of land. Therefore, the software needed to be functional with rugged mobile card readers, such as Datastrip’s DSV2+Turbo. TWIC credentials are required for entry to the port by anyone requiring frequent, unescorted access to the facility that is entirely designated as a secure and restricted area Finally, Port Security wanted the ability to access the TSA TWIC Cancelled Card List and match it against those being enrolled in the Port’s database as well as those using their TWIC cards. This would allow Security to take the appropriate steps when necessary, such as suspending a card, identifying people who were already enrolled in the Port’s database and not double enrolling them, or spotting a potential terrorist. TWIC Credentials for entry to the port By using pivCLASS Registration Engine, which was deployed on mobile Datastrip readers as well as a desktop computer, port officials are now able to register TWIC holders throughout the port and transmit that information to the Pro-Watch system. These cards can then be read at the fixed card readers located at various entrances and access points throughout the port. TWIC credentials are required for entry to the port by anyone requiring frequent, unescorted access to the facility that is entirely designated as a secure and restricted area. These include longshoremen, truck drivers, surveyors, agents, chandlers, port chaplains and labourers who access secure areas. Tenants who have their offices at the port, such as produce giants Chiquita and Dole, are also required to be enrolled in TWIC. Integrated with existing access control system Patrick Hemphill, retired Manager, Port Security and Facility Security Officer at the Port of Wilmington who lead this project said the mobile readers have been taken to local union halls to enrol longshoremen before they arrive at the port. “This saved us a lot of time,” explained Hemphill. “We met with union leaders and set aside two, two-hour periods on pay days. The members were made aware of the need to know their PIN and we were able to enrol the majority of (union) members during those two days without interrupting their work schedule.” After seeing a demo of the software, and its ability to read TWIC card information, Floyd-Kennard recognised it as a possible solution that could be integrated with the port’s existing access control system pivCLASS Registration Engine first came to the attention of Port of Wilmington’s Director of Human Resources, Sylvia Floyd-Kennard during an American Association of Port Authorities conference. After seeing a demo of the software, and its ability to read TWIC card information, Floyd-Kennard recognised it as a possible solution that could be integrated with the port’s existing access control system. Testing the software in-house Eric Schaeffer, President of Advantech Inc., the port’s systems integrator on the TWIC project, said one of the deciding factors in using this software was the ability to test the software in-house before making a commitment. He wanted to ensure that it would integrate with the existing Pro-Watch system. “Some companies have reservations about testing before buying,” Schaeffer noted, “but HID Global was confident in their product and were comfortable with us testing it.” Since this was one of the first implementations of pivCLASS Registration Engine software integrated with the Honeywell Pro-Watch system, Schaeffer said HID Global worked alongside Advantech to make sure everything worked as planned. Registering TWIC FASC-N number and expiration date For a major facility such as the Port of Wilmington, being able to enrol TWIC holders and verify their information anywhere using a mobile card reader results in a savings of security personnel, time and effort. Personnel can go where the enrolees are, rather than requiring everyone to come to a central location. The port is also able to continue to leverage its legacy physical access control system while adding in the important TWIC component. The pivCLASS Registration Engine software allows the port to register TWIC information, such as the TWIC FASC-N number and expiration date, into the existing PACS cardholder record" “The pivCLASS Registration Engine software allows the port to register TWIC information, such as the TWIC FASC-N number and expiration date, into the existing PACS cardholder record,” said Geri Castaldo, vice president of Business Development, Federal Identity with HID Global. “If a new person is added, Pro-Watch automatically creates a brand-new cardholder record using the information from the TWIC such as first name, last name, FASC-N, expiration date and photo.” pivCLASS Certificate Manager Checking against the TSA TWIC Cancelled Card List is a key benefit with the addition of HID Global’s pivCLASS Certificate Manager. The pivCLASS Certificate Manager goes out to the TSA list and re-validates the TWIC card status daily or on a user-defined schedule, so security personnel can see what has changed and react to the status of cardholders. In the case of an elevated threat level, HID Global’s software is able to provide the additional authentication piece that would be required. If the threat level at the port is raised under the three-level MARSEC system, it can the use required use of a fixed readers with a biometric component.
USS Iowa: A naval treasure Affectionately known as the “Battleship of Presidents” for having played host to more U.S. presidents than any other battleship, the USS Iowa is one of the most storied vessels in the history of the Navy. Originally commissioned in 1943, the Iowa saw significant action during both World War II and the Korean War. One of the battleship’s first missions was to escort President Franklin Delano Roosevelt across the Atlantic in November of that year for a critical meeting between the allies at the Tehran Conference, which was also attended by Soviet leader Josef Stalin and British Prime Minister Winston Churchill. In early 1944, the Iowa was sent to the Pacific Ocean theatre where it would play a pivotal role in some of the key battles of the war. When the Empire of Japan officially surrendered aboard the USS Missouri in September 1945, the Iowa was also in Tokyo Bay broadcasting the ceremony to the world. The Iowa and her crew would continue to serve the nation for another four decades before being decommissioned for the last time in 1990. Given the ship’s rich legacy, it was eventually relocated to a permanent berth at the Port of Los Angeles in 2012 and converted into a museum. Visitors can now stroll along the decks of this American icon from a bygone age and get a first-hand look at the 16”/50 calibre guns that earned the Iowa its nickname of the “The Big Stick” as well as other historical artefacts on board the battleship. Of course, turning a vessel that stretches over 880-feet long and contains numerous rooms and compartments into a tourist attraction comes with its own set of unique security challenges. Security challenges The job of securing the Battleship USS Iowa museum is the responsibility of Security Manager Michael Dahl, a former law enforcement officer who was asked to take over the full-time security operations for the museum following his stint as a volunteer aboard the ship. While the museum has yet to experience a major security event during its brief existence, the threat posed by trespassers after-hours or a visitor wandering off the beaten path is not lost on Dahl and the rest of the management team at the museum. However, aside from having a small number of consumer-grade, off-the-shelf security cameras placed in strategic areas, there was not any real video surveillance infrastructure to speak of on board the ship. That changed approximately one year ago when David Canfield, the museum’s vice president and CIO, who also happens to be a veteran of the high-tech industry, decided they needed to significantly upgrade the surveillance system and install a solution that would more adequately address the facility’s needs. Arteco and Arecont Vision donated the respective technology solutions for the USS Iowa project “We wanted to install cameras to monitor the exterior of the ship, particularly when we’re not open to the public, so we can monitor our gangways to see if anybody does try to access the area,” said Dahl. “Also on the inside of the ship, we wanted to make sure we didn’t have our visitors, as well as our crew members who are volunteers, getting off the designated routes and into areas where we didn’t want them. There are some sensitive areas where, if you don’t know what you’re doing, they could be hazardous.” Arteco’s VEMS solutions After speaking with CV Reps, a local manufacturer’s representation firm, Dahl and the museum’s leadership team decided to install a system with the Arteco Next video event management software (VEMS) and a network of Arecont Vision cameras. Because the battleship museum is a non-profit organisation, both Arteco and Arecont Vision donated the respective technology solutions for the project. A total of 11 high-definition IP cameras have been installed on the Iowa since the project got underway in mid-2015. At the beginning of 2016, Dahl was able to bring the Arteco software online and he has been extremely impressed with its performance. Leveraging the video analytics suite provided by Arteco Next, Dahl has been able to set up an alert within the VEMS client that notifies him when certain physical boundaries are crossed by people on board the Iowa. “With the Next software I’m able to configure alert areas after hours — so if anybody were to try to come on the ship it would alert me,” added Dahl. “We also have an alert for our cash-handling room just outside our vault that is set up so that anytime anybody goes through that door, it lets me know.” User-intuitive video software Because Dahl, who has sole responsibility for running the surveillance system, is a relative novice when it comes to operating today’s surveillance technology, it was also important that the video software the museum deployed be user-intuitive so that he could bring himself up to speed quickly. After only a few hours of training on the Logic Next platform, Dahl was able to learn the basics of the software and familiarise himself with its more advanced settings. Arteco NEXT VEMS allows users to take full control of a video surveillance system from anywhere, quickly and easily. With NEXT’s specifically designed graphical interfaces, video retrieval, direct management of alarms, video analytics or access control events are made easy from the start. This enables users to focus on taking hold of the benefits delivered by the system immediately, rather than waiting for training. In the future, Dahl plans to deploy more cameras to keep the USS Iowa and its rich history secure. “I have several locations where I still want to deploy cameras; it’s just a matter of being able to procure them and deploy them as resources allow,” said Dahl.
Round table discussion
Hospitality businesses work to provide a safe and pleasant customer experience for their guests. Hotels offer a “home away from home” for millions of guests every day around the world. These are businesses of many sizes and types, providing services ranging from luxury accommodations to simple lodging for business travelers to family vacation experiences. Hospitality businesses also include restaurants, bars, movie theaters and other venues. Security needs are varied and require technologies that span a wide spectrum. We asked this week’s Expert Panel Roundtable: What are the security challenges of the hospitality market?