The task of protecting shared spaces, such as offices and schools, has become increasingly complex, particularly with ever-rising political tensions and the difficulties of assessing threats for schools, workplaces and law enforcement. Given the randomness of when and where a violent person may strike, those who manage facilities need an emergency plan, as well as robust training, detection and awareness. To gain more insights into dealing with such threats, we interviewed John Torres, Presiden...
The jury is in: traditional security is out — and it’s being replaced with service-based solutions. The bottom line is: if you’re not embracing it, you’ll soon be left behind. XaaS — the collective term referring to the delivery of anything as a service — includes all services made possible through the use of the cloud. Security-as-a-Service (SaaS), which encompasses any type of system from access control to video surveillance, has paved the way for users to...
NSI has announced it will be exhibiting for the first time at CONSEC, taking place on 3rd October 2019 at the Radisson Edwardian Heathrow, where the NSI team will be spotlighting its Associate Consultancy Programme (ACP) – an independent referral listing. CONSEC is the Association of Security Consultant’s (ASC) annual event for security consultants and the broad spectrum of people responsible for organisational security and safety. The NSI Associate Consultancy Programme enables Con...
Many exhibitors at GSX 2019 saw the show as a success, despite slower booth traffic on the second and third days. According to show sponsor ASIS International, there were more than 20,000 registrants from 125 countries around the world, including those who attended the conference as well as the exhibition. Exhibitors definitely put their best feet forward, enthusiastically promoting their technology breakthroughs, but how convincing were they? The comments from at least one attendee – a l...
As part of Security Officer Appreciation Week, Corps Security is hosting an inaugural ‘Thank Your Security Officer Day’ on Thursday 19th September to thank their dedicated security guards. Working in partnership with a range of clients, the management team at Corps Security will thank their security officers in person as well as sharing stories across several social media platforms to acknowledge those who go above and beyond delivering an unprecedented level of service. Security Off...
Trackforce™, a security workforce management platform, announces its acquisition of Valiant Solutions Inc., a provider of Human Capital Management (HCM) software solutions. The new company, Trackforce Valiant, now delivers all-in-one security workforce management platform: the only comprehensive operations management solution available to the industry. Building on a pedigree and industry knowledge of physical security, Trackforce Valiant is a purpose-built solution that supports the growin...
ReconaSense, a provider of innovative physical security intelligence and next-gen access control, announced the debut of its ReconMobile command-and-control centre that lets users lock down facilities, tap into video surveillance systems, and/or report and respond to an emergency from a mobile device. Managing a large campus or facility means being in charge of a myriad of systems, dynamic populations, and countless points of entry. Lack of reliable data about any of those can lead to expensive, time-consuming problems, if not life-threatening situations. The ReconMobile app suite enables security teams to ‘see’ and take action across multiple facilities without having to be stationed at a security desk behind a monitor. This ensures better decision-making, shorter response times, and improved outcomes – whether in an active shooter situation, an urgent life safety matter, or another critical security condition. Empowering security teams to respond faster Situational awareness is a critical success factor in any large, complex security operation"ReconMobile works on iOS and Android tablets, smartphones, and smart watches, empowering teams on the ground to respond and react faster, and engage their community and the people they protect more easily. The solution also allows employees and students to notify staff and security when they need help or an emergency situation arises. “Situational awareness is a critical success factor in any large, complex security operation,” said Clayton Brown, executive vice president, ReconaSense. “That success depends on systems that speak a common language, and people to feed those systems with data that sensors can’t capture. The ReconMobile app suite offers command-and-control capabilities and crowdsourced inputs that are the force-multiplier and glue between security operators and data.” Features of ReconMobile WatchCommander: Use the wearable iWatch application to initiate lockdown or respond to a threat as quickly as it is observed. EmergenSEE: Share surveillance data with first responders to hasten and improve response times while protecting individual privacy during standard operations. See Something, Say Something: Empower staff to centrally manage incoming reports of suspicious activities or situations as well as initiate emergency responses, so no early warnings are ignored. MobileMuster: Send security response requests to employees, students, and staff so they can provide safe/not safe updates and GPS locations in real time during an incident. MobileSOS: Enable employees and students to report a safety issue or emergency to security teams or 911 with the touch of a button. Operational Response and Command Applications (ORCA): Provide teams on the ground with on-the-go situational awareness and control. Demos of ReconMobile app suite at GSX ReconaSense will feature demos of its ReconMobile app suite at the Global Security Exchange (GSX) conference in Chicago, Sept. 8-12, in Booth 2024. In addition, executive vice president Clayton Brown will participate in two panel discussions at the show: Tuesday, Sept. 10 at 12:30 pm: Is Intelligence a Human Function? Synthetic Intelligence at Scale, exploring the role of AI in security, and the challenges and opportunities created in synthesising intelligent operations into comprehensive security operations. Wednesday, Sept. 11 at 11:30 am: Change Driver: Artificial Intelligence (AI), examining how AI has the ability to look at thousands of data points simultaneously and process data in ways humans would never be able to.
Corps Security has won a five-year, £3.6m annual contract to provide security services to Tata Steel Europe across the UK. Tata is Europe's second largest steel producer with operations in 26 countries and a commercial presence in more than 50 countries. More than 100 security officers will be provided by Corps to secure all 14 of Tata’s UK sites including the flagship steelmaking plant in Port Talbot, Wales. Mike Bullock, CEO of Corps Security, said: “We are delighted to be working with such a like-minded organisation. The Tata Group was founded on the principle that its activities should always benefit society and is majority owned by philanthropic trusts. As a trust which was set up in 1859 to provide employment for ex-servicemen returning from the Crimea, we share their values and look forward to working closely together.”
PerpetuityARC Training, part of Linx International Group, is proud to announce its new interactive and virtual online learning platform - Linxville. Visually reminiscent of classic computer games such as The Sims and Sim City, Linxville’s first bitesize course to launch is Perimeter Security. It presents the student with a simulated environment containing a number of commercial buildings surrounded by roads, gates, fencing, lighting and security guards, which link back to the topic. Information to handle threat/vulnerability Linxville is a highly visual and interactive concept that pushes the frontiers of distance learning"The learner is taken on a guided interactive learning journey around the site and is presented with potential threat vulnerabilities, suitable risk assessments and information on how to handle that threat/vulnerability at each location. Bolstered by the feature of people and traffic movement, the simulation adds ‘real world’ realism to assist learners in the application of their knowledge. Linx International Group Director, Angus Darroch-Warren states: “Linxville is a highly visual and interactive concept that pushes the frontiers of distance learning. By presenting graphical mapped real-world security scenarios, Linxville delivers an immersive and educational experience that is ideal for those who are new to security or have it under their remit but have limited experience.” Linxville is designed to grow and be fully inclusive and accessible, as Angus adds: “We will be expanding the simulation sites to include retail, universities and airports all within the Linxville platform. We are also excited by the potential scope for Linxville to be personalised in order to deliver specific security training for organisations.”
Kingdom is delighted to announce the recent acquisition of Dunedin Facilities Management Ltd. Established in 2012, Dunedin has gained an excellent reputation for delivering CCTV, Door Supervisors, Security Guards, Mobile Patrols, Key Holding and Event security solutions. With an extensive portfolio of loyal clients, Dunedin looks forward to using the Kingdom platform to develop further future growth in Scotland. The Dunedin acquisition continues the strategic expansion plans of Kingdom. Enhancing the Dunedin integration Kingdom will support and enhance the Dunedin integration with our expertise, technology and software solutions Terry Barton, BA Hons Law, Chief Executive of Kingdom said: “This is a fantastic opportunity for Kingdom to expand further in Scotland. Strategic acquisitions have always formed part of our growth strategy, but it is extremely important that when we acquire a business, there are values & culture fit to that of Kingdom. We are therefore keen that we continue to operate in the same way going forward with no planned changes to offices or points of contact. Kingdom will support and enhance the Dunedin integration with our expertise, technology and software solutions. “Iain Macintosh will undertake the role as Head of Security for Kingdom Scotland, and along with his retained management team and colleagues, will drive Kingdom Scotland forward. Throughout all our negotiations, we were incredibly impressed with Iain as a person and with what he has achieved. With his expertise and innovative cutting edge technologies in CCTV, Iain will maintain our position as a premier service provider so please give him a call.” Offering greater range of services Iain Macintosh, owner and Director of Dunedin said: “Joining the Kingdom family will enable my team and me to offer a greater range of services and strength in depth and for us to expand into new sectors. The Kingdom leadership team and I share the same aspirations and I’m excited about being a key part in the journey which is being created through this acquisition.” Kingdom has a trading longevity and a sound trading history within specialist areas in the UK and India Established in 1993, Kingdom is a well-established, highly regarded, privately-run, family owned company. The company successfully manages 6,000+ high-quality service personnel in highly complex public facing environments driven to explore new ways of working. Financially sound trading history Kingdom has a trading longevity and a financially sound trading history within their specialist areas in both the UK and, uniquely, India and through 25+ years of organic growth and strategic acquisition, Kingdom has developed into a business turnover today of £100m+. From 2016, Kingdom has operated from a purpose built, 3-floor National Support Centre and from a number of regional support offices that oversees their national infrastructure.
ATMs have become a cornerstone of day-to-day life for millions, but they can also be vulnerable to attack. The global ATM Industry Association reported an increase of ATM crime of 12% for 2017. And attacks, of course, often involve ATM users, potentially injuring them and causing trauma. But since, by definition, ATMs are often situated outside buildings and used at all times of the day and night, securing them is a challenge - and banks are turning to more intelligent solutions. According to ATM Industry Association (ATMIA), there are an estimated 3.5 million ATMs in the world serving those in need of cash 24/7, 365 days a year. And there’s where the difficulty in securing them lies. To be effective, most ATMs need to be in public areas and open all hours. This, coupled with the fact that they hold hard cash, makes them an attractive target. False card readers to steal card details Security precautions for ATMs are an important part of a financial institution’s overall security solutionCriminals target these machines – or more precisely – the people using them in numerous ways. Distracting customers at ATMs in an attempt to take their cards or cash from them, or to discover their PIN number for use at a later date, for example. They also try to install false card readers that steal customer’s card details for reuse. On the other side of the story, banks need to deal with customer disputes. A very small percentage of ATM transactions result in situations where the customer questions whether the transaction has been carried out as requested, or even disputes making the withdrawal at all. So, security precautions for ATMs are an important part of a financial institution’s overall security solution. Using Deep Learning technology Inside an ATM machine, two covert cameras are installed, one trained on the user, the other on the ATM panel. Deep Learning technology embedded in the ATM security system can detect any ‘abnormalities’ in the facial scene in front of it, referring to existing data patterns. So, if there is another face in the picture (for example someone looking over a user shoulder), or if the person wearing a mask, an alarm can be triggered in the security centre. Using the same technology, the security system can flag if the number pad is covered with a strip to steal PIN codes Using the same technology, the security system can also flag if the number pad is covered with a strip to steal PIN codes, or if a false card reader (or ‘skimmer’) is present to steal card details. All of these ‘smart’ alarms streamline the security monitoring process, meaning that security personnel can react to real-time scenarios and not waste time on false alarms. The footage can provide evidence for any investigation. Hikvision DeepinMind NVR The Deep Learning ‘engine’ here would be the Hikvision DeepinMind NVR, which takes the information from the camera and analyses it using Deep Learning algorithms. This can also ‘manage’ footage, in conjunction with other NVRs and a video management system, which brings this part of a total solution together with all the other elements, providing a powerful toolset for security and business intelligence. Securing assets at the extremities of security solution is a lot easier with Deep Learning technology. Even ATMs outside the building can be safer, avoiding fraud and protecting the customers every day.
FLIR Systems, Inc. announced the latest generation of the FLIR Brickstream 3D Gen 2 people counting sensor. This new version includes a unique employee filtering feature designed to provide retail and shopping businesses with more accurate customer traffic data and sales conversion metrics. The employee filtering feature uses a combination of Bluetooth Low Energy (BLE) technology and employee-worn tags to automatically identify and remove staff from customer counts, a process that can otherwise be manual or missing in retail environments today. Brickstream 3D Gen 2 with Employee Filtering Retail people counting devices are primarily located above store entrances, making the Brickstream 3D Gen 2 with Employee Filtering ideal for environments where staff, such as greeters and security guards, are located near doorways or where they frequently enter and exit. Employee filtering is also ideal for luxury retailers where foot traffic is lower and including even a few employee counts can easily skew conversion metrics. The employee filtering feature is enabled through a small, easily concealed BLE tag worn by employeesThe employee filtering feature is enabled through a small, easily concealed BLE tag worn by employees and registered to the sensor. The sensor automatically identifies staff when entering or leaving the store without any manual action required. With its patent-pending combination of BLE tag sensor technology, the Brickstream employee filtering feature identifies staff members more reliably. Retailers access the counts either directly using the FLIR Brickstream user interface, or through integration with their retail analytics software. Integration with retailer’s analytics software “The FLIR Brickstream 3D Gen 2 with Employee Filtering technology is designed to integrate with a retailer’s analytics software to improve data accuracy and provide true metrics to inform decisions impacting retail operational efficiency, such as staffing needs, sale conversion rates, and other customer behaviour insights that are key to their success,” said Serge Goldenberg, General Manager of the Integrated Imaging Solutions (IIS) Division at FLIR. “Equipping retailers with an automated and discrete employee filtering solution solves a problem for those working to collect data insights.” The Brickstream 3D Gen 2 with Employee Filtering is now available for purchase through established FLIR Brickstream distribution partners. Employee filtering is also available for Brickstream 3D+ customers. Brickstream 3D+ customers can contact their distribution partner for details on how to enable the feature.
Public spaces in cities and suburbs are important places for community development and promoting outdoor recreation. These areas may include main streets, parks, promenades, band shells and fields. Such locations are often utilised by public event planners for community activities, including summer festivals, wintertime ice skating rink installations, music concerts and art fairs. As the year drew to a close, holiday and Christmas markets as well as major New Year’s Eve events, presented cities with constant public event security needs. The public nature of these events increases risks of incidents with high-speed vehicles that put attendees in danger. Fortunately, there are three ways for public space managers to prevent casualty-causing collisions and further promote the use of local public areas. Developing an effective action plan When strategising how to react to an alert, think about what time of the year and time of day the event is occurring It is important to have a plan developed before an incident or accident occurs. Warning systems, utilising doppler radar and digital loop technologies, alert guards to abnormal vehicle velocity changes in the surrounding area. Managers of public areas should organise a meeting with public safety authorities and local agencies to discuss what must immediately occur when a high-speed vehicle is approaching a public event. When strategising how to react to an alert, think about what time of the year and time of day the event is occurring. Having such a reaction plan in place combines technology and strategic planning to ensure everyone is on the same page to effectively target a threat and promote overall event safety. Securing public areas Ideally, there will be no need to implement a well-conceived action plan. After all, taking preventive measures to secure public areas where events take place is important to keep people safe from accidental vehicle collisions and intentional attacks. Protect attendees by clearly separating pedestrian and vehicle locations using security devices such as – Barricades Portable barriers Bollards Install guard booths Avoid the risk of vandalism and theft, making sure people are safe when walking back to the cars at night by keeping parking areas illuminated with flood lights. Install guard booths with employees who monitor activity in the parking area and who are prepared to react if an alert is triggered. Furthermore, prevent accidental collisions by clearly marking the parking area with informative warning signs and using barricades to direct traffic. These three tips can be used by public area managers to promote security at the next community event. Additionally, the technologies used to secure an event can also be used as infrastructure for year-round security. Installing gates that shut when the public space is closed or using aesthetically pleasing bollards are steps any public area manager can take to promote community safety.
The basic principles of access control are well established: only authorised people should have access to secure areas, only at times that can be defined in advance, and only within a system that can identify exactly who went where, and when. Traditional mechanical lock-and-key systems cannot accomplish this — at least, not without loading a huge admin burden onto security staff. But modern, electronic wireless access control has the flexibility to achieve it. What criteria determine the right sort of access control for your organisation? It makes sense to assess what is desirable against what is affordable or available in the electronic access control market today. Asking yourself these 5 questions will lead to a wise investment in the right technology: Wireless locks like Aperio work seamlessly with existing systems from over 100 different access control providersDo you want to extend your existing system, or begin from scratch? You are not stuck with locks chosen by a previous management team. Security needs change. Wireless locks like Aperio, for example, work seamlessly with existing systems from over 100 different access control providers, integrated online or offline. You will save time and money extending your current system with a technology like Aperio and users can continue with their existing credentials. Going forward, it makes sense to choose locks built using open architecture, for added flexibility and to future-proof your next investment. Who are the site users and what kind of credentials suit their needs? In many industries, access to premises is required by permanent staff and short-term contractors: your access system needs to be flexible. Different systems offer credentials stored on cards and fobs, or on programmable, battery-powered keys. For example, the new Openow app for SMARTair wireless locking converts a user’s smartphone into a virtual key. You issue and revoke user keys using the intuitive software, an efficient, flexible mobile management solution. What is the structure of the site (or sites) you protect? You will need different locks for high-traffic and low-traffic doors, indoor and outdoor use. Almost everywhere, wireless locks are much easier to install and to maintain than traditional wired magnetic locks — and more cost-effective to run. Certified wireless security locks provide extra protection for sensitive areas needing stringent standards. If you have a mobile workforce or manage dispersed sites, consider the credential management practicalities. For example, programmable keys that are easy to update with a Bluetooth-enabled smartphone app — like ASSA ABLOY’s CLIQ Connect solution — will save your staff time and money. For outdoor access points, you will need gate locks or padlocks certified for operation in extreme conditions Do you want to secure more than just doors? Some wireless systems have locks for cabinets, machines, windows and even server racks (handy if you want an extra layer of control over co-located servers). There will be workflow advantages in monitoring these ‘non-doors’ — medicine stores, for example, or car parks or lifts — from the same admin interface as your doors. Site users will appreciate the convenience of carrying one credential for every access need. For outdoor access points, you will need gate locks or padlocks certified for operation in extreme conditions. For example, CLIQ mechatronic padlocks are currently deployed outdoors at utility sites in Scandinavia and supermarkets in East Africa. Do you need real-time capabilities? Choose an Online system and you can manage and amend access control doors at any time and from anywhere, using the admin software. You can monitor sensitive areas like medicine stores remotely and in real time, and can revoke access rights if a user credential gets lost. In an emergency, remote locking or unlocking of an entrance could be critical. Aperio wireless locks, for example, are integrated with online electronic access and real-time monitoring systems in hospitals, manufacturing plants and student halls of residence. With some systems, including SMARTair, you can combine ‘Update on Card’ and Online updating for different doors within the same installation. The CLIQ Connect app and programmable keys make real-time control over remote sites or teams possible. Wireless access control offers a compelling mix of audit compliance, easy installation, cost efficiency, and seamless integration. It makes life easier for security managers, and is deployed in premises as diverse as power plants and co-working spaces; museums and care homes; banks, schools and skyscrapers.
From satellite imagery to street views to indoor mapping, technology has disrupted our past world. This has left us dependent upon new ways to visualise large spaces. This new world has brought many benefits and risks. But what does that mean for the security professional or facility manager today and what technologies can be used to secure buildings and improve facility operations? A brief history of 3D technology Starting May 5, 2007 (inception 2001), Google rolled out Google Street View to augment Google Maps and Google Earth; documenting some of the most remote places on earth using a mix of sensors (Lidar/GSP/Radar/Imagery). The mission to map the world moved indoors May 2011 with Google Business Photos mapping indoor spaces with low cost 360° cameras under the Trusted Photographer program. In the earlier days, 3D scanning required a high level of specialisation, expensive hardware and unavailable computing power With the growth of 3D laser scanning from 2007 onwards, the professional world embraced scanning as effective method to create digitised building information modelling (BIM), growing fast since 2007. BIM from scanning brought tremendous control, time and cost savings through the design and construction process, where As-Built documentation offered an incredible way to manage large existing facilities while reducing costly site visits. In the earlier days, 3D scanning required a high level of specialisation, expensive hardware, unavailable computing power and knowledge of architectural software. Innovation during the past 8 year, have driven ease of use and lower pricing to encourage market adoption. Major investments in UAVs in 2014 and the commercial emergence of 360° photography began a new wave of adoption. While 3D scanners still range from $20K – $100K USD, UAVs can be purchased for under $1K USD and 360° cameras for as low as $100. UAVs and 360° cameras also offer a way to document large spaces in a fraction of the time of terrestrial laser scanners with very little technical knowledge. Access to building plans, satellite imagery, Google Street View, indoor virtual tours and aerial drone reconnaissance prove effective tools to bad actors The result over the past 10+ years of technology advancement has been a faster, lower cost, more accessible way to create virtual spaces. However, the technology advances carry a major risk of misuse by bad actors at the same time. What was once reserved to military personal is now available publicly. Access to building plans, satellite imagery, Google Street View, indoor virtual tours and aerial drone reconnaissance prove effective tools to bad actors. Al Qaeda terror threats using Google Maps, 2007 UK troops hit by terrorists in Basra, 2008 Mumbai India attacks, 2016 Pakistan Pathankot airbase attacks, ISIS attacks in Syria using UAVs, well-planned US school shootings and high casualty attacks show evidence that bad actors frequently leverage these mapping technologies to plan their attacks. The weaponization of UAVs is of particular concern to the Department of Homeland Security: "We continue to face one of the most challenging threat environments since 9/11, as foreign terrorist organisations exploit the internet to inspire, enable or direct individuals already here in the homeland to commit terrorist acts." Example comparison of reality capture on the left of BIM on the right. A $250 USD 360° camera was used for the capture in VisualPlan.net software What does this mean for the security or facility manager today? An often overlooked, but critical vulnerability to security and facility managers is relying on inaccurate drawing. Most facilities managers today work with outdated 2D plan diagrams or old blueprints which are difficult to update and share.Critical vulnerability to security and facility managers is relying on inaccurate drawing Renovations, design changes and office layout changes leave facility managers with the wrong information, and even worse is that the wrong information is shared with outside consultants who plan major projects around outdated or wrong plans. This leads to costly mistakes and increased timelines on facility projects. Example benefits of BIM There could be evidence of a suspect water value leak which using BIM could be located and then identified in the model without physical inspection; listing a part number, model, size and manufacture. Identification of vulnerabilities can dramatically help during a building emergency. First Responders rely on facilities managers to keep them updated on building plans and they must have immediate access to important building information in the event of a critical incident. Exits and entrances, suppression equipment, access control, ventilation systems, gas and explosives, hazmat, water systems, survival equipment and many other details must be at their fingertips. In an emergency situation this can be a matter of life or death. Example benefit of reality capture First Responders rely on facilities managers to keep them updated on building plans A simple 360° walk-through can help first responders with incident preparedness if shared by the facility manager. Police, fire and EMS can visually walk the building, locating all critical features they will need knowledge of in an emergency without ever visiting the building. You don’t require construction accuracy for this type of visual sharing. This is a solution and service we offer as a company today. Reality capture is rapidly becoming the benchmark for facility documentation and the basis from which a security plan can be built. Given the appropriate software, plans can be easily updated and shared. They can be used for design and implementation of equipment, training of personnel and virtual audits of systems or security assessments by outside professionals. Our brains process visual information thousands of times faster than text. Not only that, we are much more likely to remember it once we do see it. Reality capture can help reduce the need for physical inspections, walk-throughs and vendor site-visits but more importantly, it provides a way to visually communicate far more effectively and accurately than before. But be careful with this information. You must prevent critical information falling into the hands of bad actors. You must watch out for bad actors attempting to use reality capture as a threat, especially photo/video/drones or digital information and plans that are posted publicly. Have a security protocol to prevent and confront individuals taking photos or video on property or flying suspect drones near your facility and report to the authorities. Require authorisation before capturing building information and understand what the information will be used for and by who.There are a number of technologies to combat nefarious use of UAVs today Nefarious use of UAVs There are a number of technologies to combat nefarious use of UAVs today, such as radio frequency blockers and jammers, drone guns to down UAVs, detection or monitoring systems. Other biometrics technologies like facial recognition are being employed to counter the risk from UAVs by targeting the potential operators. UAVs are being used to spy and monitor for corporate espionage and stealing intellectual property. They are also used for monitoring security patrols for the purpose of burglary. UAVs have been used for transport and delivery of dangerous goods, delivering weapons and contraband and have the ability to be weaponised to carry a payload.Investigating reality capture to help with accurate planning and visualisation of facilities is well worth the time The Federal Aviation Administration has prevented UAV flights over large event stadiums, prisons and coast guard bases based on the risks they could potentially pose, but waivers do exist. Be aware that it is illegal today to use most of these technologies and downing a UAV, if you are not Department of Justice or Homeland Security, could carry hefty penalties. Facility managers must have a way to survey and monitor their buildings for threats and report suspicious UAV behaviours immediately to authorities. At the same time, it’s critical to identify various potential risks to your wider team to ensure awareness and reporting is handled effectively. Having a procedure on how identify and report is important. Investigating reality capture to help with accurate planning and visualisation of facilities is well worth the time. It can help better secure your facilities while increasing efficiencies of building operations. Reality capture can also help collaboration with first responders and outside professionals without ever having to step a foot in the door. But secure your data and have a plan for bad actors who will try to use the same technologies for nefarious goals.
During the Parkland, Florida, school shooting in 2018, the shooter was caught on a security camera pulling his rifle out of a duffle bag in the staircase 15 seconds before discharging the first round. However, the School Resource Officer didn’t enter the building because he wasn’t confident about the situation, and the Coral Springs Police Department had no idea what the shooter even looked like until 7 minutes and 30 seconds after the first round was fired. If the video system had included technology to recognise the gun threat in real time, alerts could have been sent to the security team. An announcement could have been made right away for all students and faculty in Building 12 to barricade their doors, and law enforcement could have responded a lot faster to a real-time feed of timely and accurate information. Automatically recognising gun threats The technology is centred around a CNN that aims to replicate how a human brain would process informationAegis AI offers such a technology, which the company says enables existing security cameras to automatically recognise gun threats and notify security in real-time. The technology is centred around a convolutional neural network (CNN) that aims to replicate how a human brain would process information. This neural network is trained to recognise what hands holding a firearm look like from hundreds of thousands of images in a proprietary data set. Over time, the system is able to mathematically calculate what a gun threat in a security camera feed looks like with a high degree of accuracy (well over 99% detection accuracy within the first 5 seconds), according to Aegis AI. “Active shooter situations are often marred by chaos and confusion,” says Sonny Tai, Chief Executive Officer of Aegis AI. “People are in fight-or-flight response and prioritise immediate survival instead of reaching for their phones and calling 911. When the 911 calls are made, callers often provide delayed, conflicting, and inaccurate information, inhibiting law enforcement’s ability to respond.” Enhances law enforcement response Tai says Aegis AI helps to clear up that chaos and confusion. “It provides visual intelligence of the location of the shooter, what they look like, what direction they’re heading, and what they’re armed with,” he says. “This real-time information enhances law enforcement response and enables building occupants to make critical decisions that maximise survivability." AI methods including deep learning enable high levels of accuracy in detecting weapons in real-time camera footage Tai is a Marine Corps veteran and a social entrepreneur who co-founded Aegis AI with the mission of addressing America’s gun violence epidemic. The start of the company stems from Tai’s upbringing in South Africa, where gun violence rates are some of the highest in the world. Growing up, several of his family friends were personally impacted, resulting in a lifelong passion for the issue of gun violence. In early 2018, Tai interviewed dozens of law enforcement leaders across the country and found that their biggest challenge in gun violence response was the lack of timely and accurate information. Aegis mitigates that challenge and enables both first responders and security staff to respond more rapidly, he says. More than 99% accuracy in detecting weapons Aegis is a software-only solution that plugs into security camera hardware and software, including VMSAegis' solution is completely AI-based, says Ben Ziomek, Chief Product Officer. AI methods including deep learning enable high levels of accuracy in detecting weapons in real-time camera footage. “Legacy, non-AI based solutions generally rely on older methods like motion detection, which is not reliable in differentiating between objects such as phones and firearms,” says Ziomek. “Our AI solution lets us achieve more than 99% accuracy in detecting weapons with an exceptionally low false-positive rate.” Ziomek runs engineering, data science, and operations for Aegis. Before joining the firm, he led teams of AI engineers and data scientists at Microsoft, leveraging AI to identify high-potential startups globally. Aegis is a software-only solution that plugs into existing security camera hardware and software, including video management systems (VMS). Existing capabilities of a customer’s VMS does initial, basic analysis and then routes the remaining video to Aegis’s processing units for AI analysis. Alerts can then be sent back however a customer wants, including through a VMS. Aegis can also feed information into a PSIM or command-and-control system if requested by a customer. Equipping customers with AI tools Our current focus for the company is to get our technology into the hands of as many customers as possible"As an early-stage company, Aegis is pursuing customers through multiple routes, including directly to end-users and via security integrators, distributors, and dealers. They are currently deployed at diverse customer sites including schools, office buildings, industrial facilities, and public buildings, says Ziomek. “Our current focus for the company is to get our technology into the hands of as many customers as possible,” says Ziomek. “We are working closely with customers across segments and industries to equip them with the tools they need to make their spaces safer. We’re currently working on educating the market on our offerings, as this technology is very new to many security organisations.” There are no privacy or compliance concerns because Aegis stores no customer data until a weapon is detected, and even then the data is not cross-indexed with any sensitive information, says Ziomek.
According to the reports of not-for-profit organisation Gun Violence Archive, the year 2018 saw 323 mass shooting incidents as of November. This number is 346 for the year 2017 and 382 for 2016, with ‘mass shooting’ defined as cases where four or more people are shot or killed in the same time period and location. A variety of gunfire detection solutions and other technology approaches seek to address the problem. ShotSpotter SiteSecure and ShotSpotter SecureCampus provide critical outdoor infrastructure protection against active shooter attacks. SiteSecure delivers critical information such as the number of shots fired, a detailed map of the airport or transportation facility, with the shooting location clearly identified. SiteSecure also provides law enforcement and transportation facility management with real-time information that can be useful to identify and address false alarms and reduce mass panic. Gunfire detection and precise shooter location Designed for college campuses and K-12 schools, ShotSpotter SecureCampus provides gunfire detectionShotSpotter SecureCampus is a gunfire detection system designed to provide outdoor coverage at university and school campuses. Designed for college campuses and K-12 schools, SST SecureCampus provides gunfire detection, precise location, and number of shooters to first responders and school personnel, enabling faster response to an incident. Data capture form to appear here! Gunshot detection can offer tremendous benefits in mitigating active shooting incidents occurring in a public facility or commercial environment. Data shows that active shooter attacks often begin outside a building and then progress indoors. Thus, the first line of defence for security professionals lies outside a facility, in a zone of protection surrounding it or comprising the entire outdoor area of a larger facility of many buildings. Audio solutions for perimeter security Video cameras are effective surveillance tools in the event of a shooting incident, but they are not able to capture everything. Deploying audio solutions can automatically flag incidents not caught on camera, as well as alert central station guards of what surveillance zones need to be closely monitored. Audio analytics solutions for aggression and gunshot detection are some of the best security tools in the security market when it comes to detection, intervention and deterrence. They are the next generation of monitoring; equipping security teams with critical information and enhancing perimeter security. End users can identify high-risk situations in real-time and prevent acts of physical aggression before they happen Aggression detectors are capable of accurately recognising duress in a person’s voice. The software automatically and objectively detects the presence of rising human aggression, anger or fear, and subsequently warns staff by a visual alert or alarm trigger. As a result, end users can identify high-risk situations in real-time and prevent acts of physical aggression before they happen. Artificial intelligence to detect weapons A gunshot detector recognises firearm discharge from various firearms in different settings. Within seconds of a gunshot, the software accurately classifies and triggers an immediate notification through a designated VMS. Security staff can then verify the alert, effectively reducing the reaction time of first responders. With the development of artificial intelligence (AI) in object recognition, AI weapons detection offers an efficient alternative to gunshot detection to prevent active shooting: AI can visually detect guns based on their shapes before they are fired. The AI is trained to recognise firearms in different shapes, sizes, colours, and at different angles in videos, so that the AI weapon detector can be deployed with existing camera systems, analyse the video feeds, and instantly notify security staff when a gun is spotted. Audio analytics, processed inside a video camera, are another approach that can quickly pinpoint zones that security staff should focus on, which can dramatically shorten response times to incidents. Audio-derived data also provides a secondary layer of verification that an event is taking place which can help prioritise responses from police and emergency personnel. Detecting audio levels and alerting operators Operators can be notified of abnormal situations via event signals allowing the operator to take suitable measuresThe first job of a well-configured camera or camera/mic pair is to detect sounds of interest while rejecting ancillary sounds and noise below a preset threshold. Each camera must be custom-configured for its particular environment to detect audio levels which exceed a user-defined level. Since audio levels are typically greater in abnormal situations, any audio levels exceeding the baseline set levels are detected as being a potential security event. Operators can be notified of any abnormal situations via event signals allowing the operator to take suitable measures. Finding a baseline of background noise and setting an appropriate threshold level is the first step. Well configured audio analytics can deliver critical information about a security event, accelerating response times and providing timely details beyond video-only surveillance. Analytics take privacy concerns out of the equation and allow installers and end users to use camera audio responsibly. Hanwha Techwin's audio source classification technology, available in its X Series cameras, features three customisable settings for category, noise cancellation and detection level for optimum performance in a variety of installation environments.
Gunshot detectors use digital microphones installed on (or in) buildings or along streets that listen for evidence of gunshots, provide near instantaneous notification, triangulate the location of shooters and direction of a shot, detect the type of gun and ultimately aid in catching fleeing suspects and solving crimes. Gunshot detection is just one technology playing a role in the larger trend by city agencies to improve core city services. Cities are turning to what are referred to as ‘smart city’ solutions – new, innovative technologies that improve and maintain a high quality of life and ‘liveability’ for citizens. Several cities in the United States have implemented gunshot detection systems. Identifying and deterring gun violence Gunshot detection systems can shorten the response time in an active shooter situationShotSpotter, a provider of gunshot detection solutions that help law enforcement officials and security personnel identify, locate and deter gun violence, announced that seven new cities have deployed ShotSpotter technology in their communities. The new cities include Cincinnati, OH; Jacksonville, FL; Louisville, KY; Newburgh, NY; Pittsfield, MA; Syracuse, NY and St. Louis County, MO – joining the more than 90 jurisdictions that rely on ShotSpotter to ensure a fast, accurate response to gunfire incidents. Three existing ShotSpotter cities, New York City, Chicago and Birmingham have also recently expanded their coverage areas. Data capture form to appear here! Gunshot detection systems can shorten the response time in an active shooter situation. Early detection should be a primary aim, second only to prevention. Security professionals must be part of both of these areas, working in partnership with relevant administrators, local government, law enforcement, first responders and the community to help prevent and better respond to gun violence. Gunshot localisation solution In addition, active shooter events – large or small – are almost always sudden and unexpected, which places a burden on security personnel to manage these risks without creating a prison-like environment. A gunshot localisation solution can turn a video camera system into a real-time safety system in the event of an active shooter A gunshot localisation solution can turn a video camera system into a real-time safety system in the event of an active shooter. Called ShotPoint, the system is completely automated. Working with a video management system (VMS), it can enable a video image of an active shooter to be provided in seconds based on the location of a gunshot. ShotPoint is a network of sensors which can be mounted on walls, ceilings, streetlight poles or other indoor or outdoor locations. Using a ‘sensor mesh approach’, ShotPoint reliably detects and localises the source of gunfire; ranging from small handguns to high caliber rifles. The system can cover large indoor or outdoor areas such as schools, office buildings, retail centres, campuses, and parks. Accurately provides gunshot location Each sensor has an array of four acoustic channels (microphones) that can locate the source of a gunshot sound, the time of arrival and the time distance of arrival. ‘Hearing’ shots from several vantage points (using multiple sensors) enables the system to take into account the angle and time of the sound, which vary in different environments, thus accurately providing the location of the gunshot. A ‘fusion processor’ box (at the edge) listens to the various sensor nodes and computes the location of the gunshot, relative to a floorplan and/or based on global positioning system (GPS) location. In an outdoor location, additional information may also be inferred, such as the trajectory of the gunshot and/or the caliber of the firearm.
He is man’s best friend, but the bad guys’ worst enemy. That is why technology-based security specialist Safer Scotland backed up its state-of-the-art crime prevention precautions at a troublesome site in West Lothian recently with a canine capability which has sent the local predators packing. The Paisley-based company brought in what Safer Scotland Director Ryan Clark said is the ‘last line of defence’ – a trained dog handler and his German Shepherd companion – to police the challenging housebuilding site. And since the guard dog took up station on site, it has enjoyed its first weekend without incursions in two months. Audio warnings to deter intruders Ryan said: “Normally, on an extensive construction site such as this, we would secure everything with closely-monitored CCTV cameras backed up by voice warnings to deter intruders. However, this was a particularly challenging arena. The site was within the bounds of a difficult area which had been widely troubled by anti-social behaviour. It was also adjacent to a ‘hang-out’ area for local teenagers. Audio warnings were deployed, with a satisfactory deterrent effect and a significant minimising of damage" “In the space of one month, we had to call the police out to no fewer than 20 incursions. Audio warnings were deployed, with a satisfactory deterrent effect and a significant minimising of damage.” However, Safer Scotland, in consultation with its client and the Scottish Police, took the view that, with lighter nights, hotter weather and the school holidays, the number of incursions might well escalate. It took the decision increase the level of presence at the site with a licensed, professional dog handler whose Alsatian dog used to work with the police. Securing high value assets in remote locations Ryan said: “He took up station at 5pm on the Friday and, about 9.45pm, a large group of late teens came on site. The handler escorted them off the site and detailed to them the risks that they were at trespassing onsite. Since then, there has been no trouble.” Safer Scotland has created a niche in a competitive business environment by its emphasis on reliable technology which allows corporate clients to secure high value assets in remote or temporary locations. It is expanding this year into the North of England under the trading name Safer England.
Upon hearing Pablo Picasso’s famous praise of art’s ability to clear ‘the dust of everyday life’, one’s thoughts could easily turn to one of Arizona’s newest landmarks, the Mesa Arts Center. Set proudly amidst the dust of the Sonoran Desert, the Mesa Arts Center is a striking complex of buildings, art installations, and public throughways, offering a rich blend of visual impressions in glass, water, stone, and metal, with splashes of vibrant colour and metallic reflection. At more than 21,000 sq. feet, the award-winning $95 million campus is the largest and most comprehensive performing, visual and educational arts complex in Arizona, serving as a gathering point for the citizens of Mesa and region alike, seeking to enjoy the indoor and outdoor spaces, public events, classes, and art exhibitions. Ensuring safe, family friendly environment Ensuring a safe, family friendly environment is essential to fulfilling the role the Center plays as a gathering pointThe presence of an adjacent light rail station and hosting of multiple festivals throughout the year further increase traffic to, from, and through the open planned site at various hours of the day, and on weekends and even holidays. The heart of the Mesa Arts Center complex is a grand promenade that knits together all of its pieces, while providing places for group gatherings, performances, and quiet reflection, comfort and relaxation. Ensuring a safe, family friendly environment is essential to fulfilling the role the Center plays as a gathering point for all walks of life. In addition to welcoming visitors to the Center, the open configuration of the complex invites commuters coming off the nearby light rail line to stroll through on their way to and from the station, and draw loiterers, would-be vandals, and itinerant populations (attracted to the semi-secluded spaces created by outdoor art installations and the complex’s fountains and water elements). Surveillance system for crime prevention Particularly outside of traditional hours of operation, such factors can increase the risk of nuisance crimes, vandalism, and petty theft, and potentially more serious crimes against visitors and staff, without a vigilant and comprehensive security and surveillance operation. Additionally, complex spaces, varied materials, and water elements increase risk for incident and accident without proper prevention and/or prompt response. A technical solution with proven power, performance, and reliability was paramount to ensure protection of property While customary approaches to similar venues have typically relied heavily on a combination of CCTV and human security guards, the size and complexity of the Mesa Arts Center campus makes a traditional manned guarding solution, even when supported by a typical surveillance technology, both cost prohibitive and potentially inadequate. Protection of property and campus safety The Mesa Arts Center is an architectural showpiece and regional destination, requiring comprehensive surveillance at all hours, every day of the year, under highly variable conditions. A comprehensive technical solution with proven power, performance, and reliability was paramount to ensure protection of property and the safety of everyone on campus. The City of Mesa, who operates the Center, in partnership with Scottsdale’s Surveillance Acquisition Response Center (SARC) and IDIS technology, provided a mix of surveillance cameras and network video recorders (NVRs) able to meet the varied requirements of a campus housing multiple art galleries, studios, performance spaces, walkways and cut-throughs, and outdoor gathering spaces; and support SARC’s innovative approach to virtual guarding, which incorporates military, police, and intelligence best practices and personnel to enhance traditional remote monitoring models and outcomes. Using Direct IP NVRs and cameras SARC monitors use IDIS’s powerful, modular, and feature-rich VMS, IDIS Solution SuiteThe City of Mesa’s previous successes implementing SARC and IDIS technology at the Mesa Grande Cultural Park made the integration of technology and monitoring selected for the Mesa Arts Center a natural fit. Featuring multiple IDIS DirectIP [model number] network video recorders (NVRs), and IDIS Direct IP [model number] cameras, with [feature set], at the heart of a comprehensive security posture, SARC monitors use IDIS’s powerful, modular, and feature-rich VMS, IDIS Solution Suite, and their unique military, law enforcement, and intelligence-derived protocols and best practices to support on-site personnel and cover the campus comprehensively at night and during other off-hours. Additionally, the IDIS solution also seamlessly integrates with, recording and managing footage from other camera installations, demonstrating the IDIS dedication to eliminating the common frustrations and complexities of security systems. SARC’s virtual guard protection The implementation of SARC’s virtual guard protection and protocols to support on-site personnel, and the highly visible, but seamlessly integrated, presence of IDIS surveillance cameras, as part of a total IDIS solution, have contributed to the Mesa Arts Center’s reputation as one of the region’s most welcoming and inviting community spaces among the area’s art lovers, families, and neighbourhood’s workers (who regularly use the space without fear or discomfort as a gathering place for lunch or pathway to and from the local light rail station). The integrated on-site and virtual guarding professionals identify, deter, and document threats to the campus 24/7, the integrated on-site and virtual guarding professionals identify, deter, and document threats to the campus and those within it, using innovative surveillance application bringing together IDIS’s highest quality remote viewing and VMS offerings and SARC’s remote ‘voice down’ virtual guarding protocol, which informs those under surveillance, in real time, that they are being watched and should leave the property immediately or face consequences. Keeping people and property safe The successful implementation of this solution has placed the City of Mesa and Mesa Arts Center management at the forefront of innovation in keeping the people, places, and property under their protection safe and secure, and marked them as leaders in responsible stewardship of taxpayer, grant, and donor dollars, through the implementation of a system that provides more comprehensive coverage, measurably better outcomes, and enhanced visitor experiences 24/7, year-round for a fraction of the cost of previous manned guarding solutions.
With its capacity of 32 million tons per year and water frontage of 6 kilometres, Chernomorsk sea port is one of the largest transport terminals in Ukraine, providing trade links with more than 100 countries all over the world. This port is a part of Eurasian transport corridor connecting the Western European countries, Ukraine, Georgia and the Asian countries. Its territory embodies the unique multimodal terminal that serves railway-ferry and auto-ferry lines as well as roll-on/roll-off vessels. The mission was to implement round-the-clock monitoring of the port territory and port waters in order to detect violations and prevent them. Monitoring in challenging light conditions PTZ cameras with integrated Axis Lightfinder technology are used for monitoring Experts from Inlimited suggested fitting the port with thermal technology platforms using 11 Axis network thermal cameras aboard (including models with two sensors: optic and thermal). PTZ cameras with integrated Axis Lightfinder technology are used, among others, for monitoring in challenging light conditions with low object contrast or difficult light sources. Thermal network cameras support guard tour function that can be used for continuous monitoring of a particular area according to the preset guard tour. In the context of modernisation, the existing port security system was extended with the following video surveillance solutions: computer-aided continuous visual monitoring of the water frontage, the adjacent port area and the port waters of Sukhyi Estuary, the area along the port perimeter as well as monitoring of vehicles (license plate recognition) and approaches to the mounting locations of the main cameras. Integrated video surveillance Centralised security service control centre offer video analysis capabilities. Video surveillance solutions integrated into a single software and hardware platform provide high-quality digital video real time record and store the archive for a minimum of 30 days. The integrator considered all the challenging conditions that cameras may encounter at sea and in the maritime area Integrated video surveillance and alarm system modernisation project developed by Inlimited Ltd. for Chernomorsk sea port is of strategic importance for the customer since it is aimed at increasing the reliability of the guard tours and critical infrastructure of the port and its entire water area. When developing the architectural concept, the integrator considered all the challenging conditions that cameras may encounter at sea and in the maritime area, such as hurricane hazards, lightning strikes, salt air impact, as well as restricted visibility due to fog, heavy rain, snowfall and direct sunlight. Installation of PTZ network cameras Thermal platforms with Axis PTZ network cameras installed on the top became the ultimate solution for the port. Optical and thermal sensors combined into one system is the specific feature of bispectral modules. With this capability, such a device can substitute a significant number of conventional optical cameras and partially the security alarm system. Hence, the extensive territory of the port was covered by turntables with a total of 11 Axis network cameras: bispectral, optical and outdoor. Due to the intelligent capabilities of Axis network cameras, a real-time detection signal is automatically transferred to operator screen, immediately providing a very clear image of an object and ensuring reliable detection under any visibility and weather conditions. Moreover, the system can also detect suspicious objects even before an intrusion attempt. Recognising person, car or watercraft We chose to go with Axis cameras because they are flexible and yet can be customised to solve particular problems"Automatic systems facilitate the work of security service operators displaying only actual violations, which helps to minimise the percentage of false responses. With this intelligent system, it is possible to immediately recognise a person, car or small-sized watercraft as well as detect possible smoke spread and other abnormal situations. Thus, the security staff has extra time to provide quick response. The video surveillance and alarm system of Chernomorsk sea port is integrated with IP-video control system Milestone Xprotect and vehicle license plate recognition system VIT AutoCode. “We chose to go with Axis cameras because they are flexible and yet can be customised to solve particular problems. Axis network cameras gained an excellent reputation as a part of the video surveillance system currently operating at the port and for this reason, we selected them again for additional security platforms,” noted the Chernomorsk sea port security service.
St Peter’s School, Cambridge, is an independent, co-educational secondary school in New Zealand. With over 1,000 students, 450 students living on site, and approximately 350 staff, St Peter’s is one of the largest boarding schools in the country. Around the clock site security and facilities management is imperative to ensure safety and deliver optimum operational efficiency. St Peter’s originally contacted Gallagher more than ten years ago for main gate security and access control for their gymnasium to assist with facility hire. “We needed a system that was modular, discreet, scalable, SQL based, and that allowed us to add and retrieve information via OPC,” said Gareth Pryce, ICT Manager at St Peter’s School. Since installation, the scale of the Gallagher system has grown considerably. St Peter’s has now integrated the Gallagher Security solution as their building management system on an impressive scale and the return on this investment has been significant. Central management software solution In buildings where we have purely installed the Gallagher system and nothing else, we are achieving a 30% energy saving"Gallagher’s central management software solution Command Centre is utilised to control all aspects of facilities management at St Peter’s School. The Gallagher solution monitors and controls heating, lighting, air conditioning, PIR’s, windows, read status and doors open/closed within all St Peter’s rooms. The installation of smart electricity meters, which can identify and quantify savings, is being utilised to measure and report energy savings across the site. “In buildings where we have purely installed the Gallagher system and nothing else, we are achieving a 30% energy saving,” said Gareth. “Return on investment is being seen within 6 to 24 months of a complete solution being installed, dependent upon the type of heating system and the staff within the building.” As a direct result of the Gallagher installation, an additional saving for the school on plant investment has been identified. Specifically, this can be seen in an increase in the life span of air conditioning units due to their reduced usage and the removal of time clocks on site due to the system’s ability to control all individual systems. Monitoring swimming pool temperature Command Centre helps to automatically facilitate health and safety protocols within the swimming pool complexSt Peter’s School’s continued commitment to fully utilising the capabilities of the Gallagher system is evident in their most recent additions of an indoor swimming pool facility and Junior School building. The Gallagher system for the indoor pool has been configured to monitor the pool temperature, humidity, chlorine and wind direction. Business rules have been added to deliver appropriate responses, including the determination of whether to engage extractor fans, increase water filtration, or open the windows for passive ventilation. With complete control over all systems, Command Centre helps to automatically facilitate health and safety protocols within the swimming pool complex. An example of this can be seen in the way in which chlorination is monitored. Should the system detect a high level of chlorine in the water or atmosphere, windows are automatically opened for ventilation, the pump speed is increased to help restore chlorine levels in the water, and the access control system denies entry to the pool area until the monitors identify that the chlorine level has reduced. Integrating database with Command Centre St Peter’s has integrated their student database with Gallagher’s Command Centre software management platformSt Peter’s has integrated their student database – Synergetic – with Gallagher’s Command Centre software management platform, providing a single source of data and one central point of reference. This interface allows St Peter’s to create, update and remove individuals and their access groups within Synergetic and this information automatically updates the access control system. This ensures that any updates made in Synergetic are reflected in real-time in the Gallagher system, proving invaluable in terms of time efficiency, administration and reducing the margin for error. St Peter’s has an impeccable reputation for safety and security. Through the Command Centre platform, the school has managed to implement a highly efficient one-touch system to deliver enhanced site security for Assistance, Critical Incidents, and Full Site Lockdown. Contacting campus security team Utilising any computer on site, both staff and students are able to quickly and easily contact the campus security team for assistance including an escort to their car after hours. Controlled by Command Centre, an Assistance request sends an SMS and email to security personnel identifying through the access control system the name and exact location of the staff member or student. Selected personnel on site have system permissions to initiate a full site lockdown across the campus Again, utilising any computer on the campus, a Critical Incident can be registered in a single, simple, action. The system then alerts the Critical Incident team (including registered nurses, and staff trained in Critical Incident Stress Management) via SMS and email, providing information on the location where the incident has occurred. Initiating full site lockdown Selected personnel on site have system permissions to initiate a full site lockdown across the campus. This action can be achieved via any computer on site. Command Centre also sends an immediate notification to local police that the school is in lockdown. Simultaneously, all buildings across the site automatically respond to the lockdown by closing windows, locking doors, and initiating air conditioning to maintain the temperature. St Peter’s is committed to further reducing their carbon footprint through reducing energy use. During 2015, the school will invest even further control in their Gallagher system by installing heat recovery units which will eliminate the need for air conditioning at certain times of the year. “It’s about seamless system management,” said Gareth, “because of that control, we’ve experienced very real energy and cost savings.”
Village Roadshow Theme Parks (VRTP), Australia’s largest theme park operator, provides some of the most thrilling entertainment rides and slides available anywhere in the world. With its headquarters located on the Gold Coast, Australia’s holiday playground, it operates: Warner Bros. Movie World Wet ‘n’ Wild Water World Australian Outback Spectacular Sea World Paradise Country Sea World Resort and Water Park Over 5 million visitors per year, from families to thrill seekers, flock to this world of fun with action-packed shows and rides, marine and animal attractions, and adventure across seven large scale properties. Monitoring from Command Centre This enables monitoring from the Command Centre in the Gold Coast over all seven sites streamlining operationsWhen it comes to security, VRTP have always chosen access control and perimeter solutions supplier Gallagher as their long-term partner. A relationship that began in the mid-1980s, has grown to meet the expanding demands of each park. VRTP recently opened a new Wet ‘n’ Wild in Sydney, New South Wales, in December 2013. Two new parks based on Sea World and Wet ‘n’ Wild are currently under construction in Hainan, China. Wet ‘n’ Wild Sydney, opened to the public in December 2013, demonstrates Gallagher’s ability to extend security coverage across States, with its scalable and flexible solution. This enables monitoring from the main Command Centre in the Gold Coast over all seven sites streamlining operations. In the event of power loss from the main controller in the Gold Coast, Sydney sites have their own server backups to continue operations as normal. RFID wrists bands for staff access The model that VRTP and Gallagher have designed enables various operator levels to have separate divisions for creating cardholders. Different operator levels have authorised access to develop card holders for their sections. There are approximately 3,000 cardholders at all parks and growing. Wet ‘n’ Wild Sydney is the first Village Roadshow park to deploy staff RFID wrists bands that give them access to areas restricted by the public. Command Centre technology has given VRTP total site security across all parks VRTP’s guard workforce has been complimented by the Gallagher system working seamlessly together. Command Centre technology has also given VRTP total site security across all parks; within a year saving park operations approximately 20 hours a day in labour costs. Better visibility of services Gallagher delivers building automation and control through a high-level interface that provides strong communication between Gallagher Command Centre and the theme parks’ building systems. This has enabled integration to seven main panels and sub panels across the group giving security staff better visibility of all services, at all times. Efficiencies in alarm generation have improved with automatic escalation to the necessary staff member in a timely manner. Key industry challenges Health, safety, risk mitigation, and public relations Preserving assets and ambience Using integration to save costs and improve security efficiencies Gallagher technology used Gallagher Command Centre Gallagher T-Series Access Control Readers Gallagher high level video integration – more than 250 cameras Protection of marine animals Gallagher’s integrated security solution provides continuous surveillance across the parkAnimal safety and care is critical. Sea World is Australia’s premier marine park, with over 25 hectares (55 acres) of land. With a range of dolphins, seals, sharks, polar bears, and other marine life – their safety, and the reputation of Sea World, must be preserved. This also includes protecting Australian Outback Spectacular and Paradise Country animals and wildlife. Alongside video and alarm integration, Gallagher manages all primary entry points into parks. Once inside the parks, it manages restricted zones which include secured enclosures, particularly important for Sea World. Gallagher’s integrated security solution provides continuous surveillance across the parks, capturing any incidents which may occur on site. This is particularly important for Wet ‘n’ Wild water park which faces increased risk due to the nature of the environment. Wet ‘n’ Wild has been one of the group’s most successful theme parks with a growing attendance of approximately 1 million visitors every year. Investing in robust integrated system The VRTP security team has the ability to monitor and control from one locationVRTP are continually looking for ways to improve park operations, infrastructure, and processes to meet the needs of visitors and staff. With security taking a precedence in the last five years, VRTP made the decision to invest in a robust integrated system that to the public eye would go unseen. Gallagher’s strong history of service and the scope of their integrated security solutions gave VRTP confidence in selecting Gallagher for their upcoming internal infrastructure developments. With 250 cameras located discretely around all seven of VRTP’s properties, integrated back to the central control platform Gallagher Command Centre, the VRTP security team has the ability to monitor and control from one location. Intruder alarm management solution The integrated system plays an important role in securing the site overnight from would-be intrudersIn the Village Roadshow Studios, much importance is placed on securing assets, and protecting the privacy of high-profile guests. The Studios have attracted projects with a combined budget of around 2.5 billion dollars. There are eight large sound stages covering 10,844m2 (116,727 sq. ft), confirming it as one of the largest studios in the Southern Hemisphere. With intellectual property and assets that must be protected, the Gallagher 24-hour camera integration and intruder alarm management solution play a key role in protecting staff, visitors, and monitoring employee cash handling and service. The integrated system also plays an important role in securing the site overnight from would-be intruders. Duress alarm monitoring is a central integration used by security staff with 70 alarm zones across all parks. In the event of an emergency, a wireless help-call system can identify back to the Command Centre the name, description, and location via a detailed site plan for each park. This is a vital security element for protecting captive mammals and animals, and IT infrastructure.
South Africa’s Athlone Campus is home to the Western Cape College of Nursing, a sprawling complex of lecture halls, administration blocks and four hostels that house around 2000 nursing students. Gallagher Command Centre was chosen as the most effective system to manage access to the hostels and keep the students safe. The nursing college had no method of limiting access to its hostels. People came and went as they liked, there was no record of who was on site and it was difficult to enforce visitor hours. Theft was a problem and reported cases of sexual assault had become a major concern. Access needed to be more secure. Access control system for authorised entry Biometric fingerprint readers were mounted on turnstiles at each of the hostel entrances and exits to manage general accessSafety and security are essential to providing a healthy living and learning environment for students. Athlone Campus partnered with local security solutions provider, FS Systems, to install access control and video surveillance in its hostels. Gallagher Command Centre was chosen to manage the access control system, monitoring access points and allowing only authorised students, staff and visitors to enter the hostel buildings. Biometric fingerprint readers were mounted on full-height turnstiles at each of the hostel entrances and exits to manage general access. Fingerprint readers prevent unauthorised entry from people using lost or loaned cards, and the anti-passback measures built into Command Centre means students can’t ‘pass in’ a visitor or bypass the system, as it recognises and records that someone has tried to enter twice. Integrated visitor management system Gallagher’s integrated visitor management system now monitors visitors and allows the college to control visiting hours. Visitors to the college hostels must register at reception and have their fingerprint captured by the visitor management system. They are then granted access to only the hostel they are visiting. In the evening, the system generates an alarm and reports on visitors still on site – allowing security to ask people to leave and prevent further visitors from entering. The general feeling from students and staff is that they are more secure" Jason Adams, Cost and Estimating Manager for FS Systems says, “The general feeling from students and staff is that they are more secure knowing that everyone entering the facility has gone through some sort of screening or registration process at the security office. The presence of physical security barriers (full-height turnstiles) is reassuring, in that not just any person can gain entry without the necessary authorisation.” Installation of video surveillance solution Alongside access control, the college installed a comprehensive video surveillance solution to reduce incidents of violence, vandalism and crime. The entire video management system is seamlessly integrated with Command Centre, creating one easily managed security solution to track student, staff and visitor movements and ensure that when an incident does occur, security staff are quickly informed and able to respond effectively. “It’s essential for the system to be user-friendly and easy to operate and manage,” says Jason. “The detailed maps that appear onscreen with Gallagher Command Centre clearly indicate the location of alarms and give security staff the ability to respond more quickly to emergencies.” Using Gallagher Command Centre, the nursing college now has a powerful and versatile security system that meets the unique needs of its site. Reduction in criminal activity The college has achieved significant cost savings through the prevention of vandalismThe system provides a reliable way to clearly capture data to monitor students, staff and visitors, lower criminal activity and improve onsite safety. In particular, security personnel can easily find the right information for quick incident resolution, which has led to improved processes, procedures and convictions when necessary. The college has also achieved significant cost savings through the prevention of vandalism and a significant reduction in reported cases of theft. The combination of the new access control system and an increase in physical security barriers means they have also been able to decrease the number of security guards patrolling the facility, reducing overhead costs. Customising and generating reports for college management is also a straightforward task, saving time and money. Most importantly, Gallagher’s security solution has given Western Cape College of Nursing control of who is on site and when – allowing its students to be safe, secure and focussed on learning.
Round table discussion
In tidying up after a year of Expert Panel Roundtable questions and answers, we came across some previously unpublished responses from our panel. These interesting responses address some of the hottest topics in the industry, from robots and deep learning to the “race to the bottom.” Taken together, the varied comments offer their own range of insights into the evolving physical security market. This week, we highlight some of these assorted Expert Panellist comments submitted over the last several months.
The new year presents new opportunities for the physical security marketplace. In many ways, 2018 will undoubtedly see further development of trends we saw in 2017. In fact, some of the trends determining the future of the physical security industry have been in place for many years. However, not every event in 2018 can be foreseen or easily predicted. To be sure, it is sometimes the surprises that keep life interesting! We asked this week Expert Panel Roundtable: What will be the security market’s biggest surprise in 2018?
Body-worn cameras are becoming more common every day, driven both by needs of the marketplace and technology developments. However, questions remain about the usefulness of the devices, and their future role in promoting safety and security. We asked this week’s Expert Panel Roundtable: What are the challenges of body-worn cameras for the security industry?