Campus environments experience many challenges when it comes to securing their students and faculty. As traditional CCTV solutions were no longer able to meet the needs for long hour storage with high quality images, authorities started looking for an advanced surveillance solution. Surveon provides campus solutions with complete product lines, enabling a campus to provide students and faculty a safe learning environment. To provide evidence for investigation of crime, the data retention of rec...
Dahua Technology, a solution provider in the global video surveillance industry, has launched a new apartment outdoor station VTO9341D, providing new access control solutions to fence and lobby entrance with the cutting-edge face recognition technology. The apartment outdoor station elevates the safety and convenience of resident security system to a new level with the fashionable non-touch face-recognition entry, while conventional unlocking ways are preserved in case of emergency. The product...
Allied Universal is proud to recognise security officers during the fourth annual National Security Officer Appreciation Week, September 16 – 22, 2018. “National Security Officer Appreciation Week honours the incredible efforts of our nation’s security officers to create safer and more secure environments,” says Steve Jones, CEO, Allied Universal. “The appreciation week is also an opportunity to profile the many roles security officers fill; debunk misconceptions a...
AMAG Technology announces the release of Symmetry Control Room. Control Room provides a single operational window for situational awareness and managing video, alarms and events. It will integrate with AMAG’s entire Symmetry portfolio, which includes video, visitor, identity, incident management, intrusion and access control, as well as best-of-breed manufacturers that are part of the Symmetry Preferred Partner Program. Monitoring Symmetry’s platforms through Control Room delivers r...
There’s a lot of excitement around artificial intelligence (AI) today – and rightly so. AI is shifting the modern landscape of security and surveillance and dramatically changing the way users interact with their security systems. But with all the talk of AI’s potential, you might be wondering: what problems does AI help solve today? The need for AI The fact is, today there are too many cameras and too much recorded video for security operators to keep pace with. On top of th...
There are many aspects to consider when developing a retail security strategy, including loss prevention, physical security, asset protection, risk management, and IT. All these areas could be the responsibility of just a few people working to secure a handful of stores or each of these areas could be entirely separate departments, as is often the case for major retailers with locations throughout the country. Regardless of the size of the retailer, there are many different technologies that ca...
CheckPoint Tours is the latest service from the Connect ONE by Connected Technologies cloud-hosted integrated security management platform that bundles Intrusion, Access Control, Video Surveillance, Energy Management and Critical Environmental Monitoring in one single user interface. ScanPass Mobile Credential CheckPoint Tours tracks and documents activities and tasks required at the protected premises. It works with conventional access control readers or ScanPass Mobile Credential to track activities by guards or other personnel required to perform tasks at specific times and locations. As the user scans/swipes each checkpoint their access is logged and can be reviewed. Multiple checkpoints can be added economically by using only ScanPass barcode stickers in place of card readers and additional hardware. CheckPoint Tours is another valuable service that provides real-time recordkeeping that security guards have completed their rounds or employees have performed required routines.
It had been a particularly slow night. The plant security guard had just made his rounds on this Sunday evening shift. As soon as he passed the weighing scales, he could enter the guard shack and get off his feet. Challenging a curious incident However, on this night, he noticed the waste vendor’s truck sitting half on and half off the scale. He stopped dead in his tracks to see if the truck would back up and completely sit on the scale. It never did. The observant guard walked up to the truck and challenged the driver who seemed surprised. “Hey, you’re not weighing your truck properly.” The driver fumbled for a response before replying, “Sorry, I was on the phone with a friend. I didn’t notice it.” But this security guard had the presence of mind to demand the driver’s phone. The driver was caught off guard and surrendered the phone. The guard then pulled up the most recent incoming/outgoing calls and saw no calls during the last 30 minutes. “I don’t think so.” “You don’t think so what?” The security guard was frank, “You haven’t used this phone in over half an hour.” The truck driver sheepishly acknowledged the fact. It was decided to install CCTV covering the weighing area and scales – no easy feat due to poor lighting Preventing crime as it happens Knowing the driver was lying, the security guard ordered the truck back on the scale for a correct weighing and advised the driver that he would report the incident. The security guard wrote up his report and handed it off to his supervisor who, in turn, contacted the local corporate investigator. This investigator was soon on the phone with his boss at corporate headquarters on the other side of the world. Together with Security, they decided to install CCTV covering the weighing area and scales – no easy feat due to poor lighting. However, once completed, they waited. They would not have to wait long. For the next two months, the waste vendor trucks, filled to the brim with production waste, black-and-white paper and other waste products from the plant, would stop on the scale only for a moment and then drive the front half of the truck off the scale for weighing. It was obvious that the vendor was cheating the company by only paying for half the waste. After two months, it was decided to catch the next cheating driver “en flagrante.” Sure enough, the next truck went half on and half off the scale and was weighed. Security then asked the unsuspecting driver to park his truck and invited him inside the building to talk to a supervisor. The driver signed an incriminating statement about the scheme and his role therein. They sent him on his way asking him to keep it quiet Waiting for the driver in a large office was the local investigator and his close friend, the Head of Security. After a difficult interview, the driver admitted to cheating on the scales over a two-year period—he claimed that some of the scale cheating was done at the direction of the vendor’s management, while some of it he did himself by “ripping off” the vendor—which he acknowledged was dangerous. Working with authorities The driver signed an incriminating statement about the scheme and his role therein. They sent him on his way asking him to keep it quiet—they would see what they could do for him later on. In the meantime, Corporate Investigations had received a due diligence report on the vendor company which contained disturbing news—the company and its managers were associated with a countrywide waste management mafia. The report suggested that the vendor had a reputation for thefts and involvement in numerous lawsuits regarding thefts and embezzlement. Shockingly, no prior due diligence had ever been conducted on the vendor. Fortunately, the plant’s finance and audit team had maintained good records over the past 5 years and were able to re-construct the amount of waste going out the plant door and the amounts being claimed and paid for by the vendor. The discrepancy and loss stood at a multi-million dollar figure. After consulting with the local police authorities and company lawyers, it was decided to pursue a civil case against the vendor. Pursuing legal action The regional lawyer, the Head of Investigations, the Head of Security and the CFO invited the vendor to discuss the problem. Some of the evidence was shown to the vendor’s CEO who became indignant and, in order to save face, promised to fire the truck drivers and to repay any losses for the last two months. Inter-dependent entities - security, investigations, finance/audit and legal - combined their resources and agendas to form a unified front That was not enough for the company and a protracted legal battle ensued which lasted several years and resulted in the vendor’s paying almost the entire amount in instalments. The vendor was dropped from the contract and internal controls strengthened—the only plant employee dealing with the waste issue left the company and was replaced by two individuals. The plant also began paying more attention to the waste process and less to the production side. Several “lessons learned” come to mind. First, the tripwire came in the person of an astute and well-trained security guard who exhibited some of the best characteristics you want to see from men and women in that profession. The Security Department was also adept at installing the CCTV and capturing the fraud live on videotape. But a far greater lesson was learned—of what can happen when inter-dependent entities (security, investigations, finance/audit and legal) within a company combine their resources and agendas to form a unified front. The results speak for themselves.
With the recent tragic events in Florida, it’s evident that schools require more tools to help ensure their students’ safety. With that, school and municipal officials all over the country are looking for more advanced ways to combat gun violence. While there is no perfect solution for the myriad of threats and emergencies with which our schools are confronted, many have looked to technology to help improve communications before, during and after incidents. For schools across the state of Arkansas; Nassau County, New York; Snohomish County, Washington; New Castel County, Delaware; Limestone County, Alabama and scores of others, the answer was the implementation of technologies that connect school personnel directly with local police, fire and EMS, and designated individuals at the school. Communication tools have proven invaluable when a potential active shooter situation was being discussed on social media Key to these schools’ choice in technology was the recognition that while the most traumatic of threats is the active assailant, any technology investment should be just as effective in handling the more frequent day-to-day incidents. Communication technologies for incident management How have technologies such as mobile panic buttons and anonymous texting helped impact school safety? Here are a few examples: In Limestone County, Alabama, 9-1-1 Director Brandon Wallace led an effort to implement technology tools across the county to help prevent and more quickly notify personnel of possible emergency situations. Communication tools have proven invaluable especially when a potential active shooter situation was being discussed on social media. Advanced technology integration The technology not only connected directly to emergency personnel, but also ensured that school faculty were able to communicate with one another during a potential emergency and account for students. Following the tragic shooting in Newtown, Connecticut, the school superintendent Dr. Joseph V. Erardi, Jr. chose to make communication technology a part of their new safety plan. The integration of advanced technology has given staff and teachers a greater sense of safety with not only active shooter events but also events like medical emergencies that require fast action and a quick response from public safety officials. Trainings ensure that staff and students are prepared for any type of situation and be on the same page in an emergency situation Implementing enhanced safety measures What are some lessons learned from these schools that can be applied to protect students in other areas? Here are some tips for implementing more safety measures into schools: Make sure your solution has a daily use. Unfortunately, many great technologies have sat unused when emergencies struck simply because those involved weren’t familiar with them or were under extreme duress and forgot about them. Training is an obvious necessity, but finding solutions with daily use cases (such as value in medical emergencies) can have a huge impact not only on ROI but also during an incident. Evaluate past incidents. Response during past incidents can always help future plans. Whether incidents have been handled well or have room for improvement, it’s important to continue to develop incident responses. For Limestone County, Alabama, the use of technology in their response plan was first tested during a medical emergency which helped to confirm the continued use within the school. Knowing the ease of use and responsiveness of emergency response tools, the county decided to build upon the technology already in place to help thwart future incidents. Train staff on the newest measures. Snohomish County, Washington holds trainings with teachers and staff, alongside local emergency personnel to prepare for active shooter incidents. Trainings ensure that staff and students can be prepared for any type of situation and be on the same page in the event of an emergency. Especially as new technology is introduced, integrating the tools with staff first will help ensure greater adoption throughout the process. Integrate practice drills. Fire drills are a common part of the school year; why not implement practicing other scenarios which may affect your school? Not only will this help with preparedness but will also highlight any measures that might need to be adjusted. New tools can then be tested to ensure that all staff and students are comfortable in the event they will need to utilise it in the future. Expand those involved in your drills to be those who will actually be involved in an incident. All too often, drills are siloed and don’t include outside agencies. Re-evaluating safety procedures Schools across the country can learn a lot from districts that have implemented and actually used new communications technologies addressing school safety, which are leading the way in how teachers and faculty are preparing to keep students safe. However, it will remain important to re-evaluate safety procedures and integrate technology to help ensure that these steps remain effective. As the tools continue to advance, the available safety measures will only continue to grow.
Broadstone, a new recruitment marketplace for the private security sector has entered into a strategic partnership with one of the UK’s leading security services providers, Brooknight. Broadstone will support Brooknight to identify and secure high quality, vetted and background checked security personnel. The new app-based service manages the whole recruitment process from job posting, background vetting, and candidate selection via an algorithm, to invoice administration, scheduling and rostering of permanent and temporary roles. Following a six-week national trial, Brooknight has rolled out Broadstone’s new technology to bring benefits to end clients, assuring them that they are working with a trustworthy, credible, fully pre-vetted workforce. Security expertise During the trial there were some challenging roles to fill in regions that can often have a smaller talent pool" Chris Fieldhouse, managing director at Brooknight, says: “We had encouraging results following the trial and feedback internally, and from candidates, was that the process was much more efficient and reliable, and connected quality security professionals with security roles to suit their specific experience.” He further said, “During the trial there were some challenging roles to fill in regions that can often have a smaller talent pool, but Broadstone succeeded in securing high-quality candidates that really matched the job requirements, so we took the decision to roll out the system nationally.” Direct communication The UK private security sector has experienced a rapid increase in jobs as security requirements change in the modern world. Recruitment and vetting is traditionally a slow and lengthy process, but Broadstone’s new service makes it easier and more effective for employers to hire temporary and permanent employees, and for job-seekers to access and apply for roles quickly. The service provides background checks carried out to BS7858 standard. It captures accurate data upfront to verify details, reducing lead times from 12 weeks to just 15 days. Checks are consistent and refreshed on a regular basis so that there is a full understanding of a job seeker’s work history, effectively creating a ‘job passport’ for recruits. Chris continues: “The security industry has a decreasing pool of quality personnel so Broadstone’s service allows us to tap into a fully vetted, compliant workforce to fill our roles and support our customers in the retail and corporate sectors. The service provides a direct communication interface between us, and our applicants and employees. It speeds up the recruitment process, and our customers are assured of a high caliber of security personnel within their operation.” Broadstone is really leading the way in the security recruitment sector and bringing a more effective and efficient process" Intelligent software “We are constantly reviewing and investing in technology and innovations to drive our business forward. Our partnership with Broadstone is part of our wider growth strategy as we recognise the benefits of new technology and how that fits in to the changing recruitment landscape. Using this intelligent software, we are guaranteed a high quality of candidates, connecting the right people with the right roles and opportunities, and we’re looking forward to working with Tom and the team.” He infers, “Broadstone is really leading the way in the security recruitment sector and bringing a more effective and efficient process, giving peace of mind to businesses and making life easier for job-seekers and candidates. The team acts as an extension of our own HR department and understands our business, the industry, the challenges and the opportunities to maintain a competitive edge.” Technology innovations and digital trends Tom Pickersgill, founder and director of Broadstone, says “We are delighted to be working with such a forward-thinking company, embracing new technology to build their business and deliver great results for their clients. Lifestyles are changing rapidly, which includes how people look for work, apply for jobs and how companies can identify and manage them. With security in the spotlight more than ever, it’s important for businesses to ensure they are taking steps to tackle industry challenges and Brooknight is a great example of an established organisation investing in technology to enhance their offering.” With this partnership, the two companies are changing the face of the private security sector. It will help bring new talent into the sector and drive growth in the industry overall. Broadstone is aiming to attract over 60,000 individual job seekers to the platform by 2020 Event security Tom concludes: “The private security sector is ripe for innovation so it’s important for organisations to keep up with technology and trends, forge useful partnerships, and embrace the technological innovations and digital trends to stay ahead in this competitive and increasingly important marketplace.” Broadstone is aiming to attract over 60,000 individual job seekers to the platform by 2020 to provide temporary and permanent security for venues, events, and individuals around the UK. It intends to work solely with ACS (Approved Contractor Scheme) registered companies.
The year 2017 saw some of the worst natural disasters in North America, with Hurricanes Harvey and Irma wreaking havoc on Houston, Texas, and the Caribbean with force of which we haven’t seen before. While many people chose to evacuate these areas, many were left to deal with the devastation and first responders had the difficult job of assessing the damage, rescuing trapped victims and delivering food and supplies. AI-enabled drones and robotics to assess damage In addition, more than 1,800 FEMA employees were deployed to support the hurricane relief efforts along with over 340 workers from the U.S. Department of Homeland Security.Robots could be vital in ensuring that security is maintained within a disaster zone - and they only cost a quarter of a police officer's salary That’s on top of the resources that were already actively working to save lives in the affected areas, including the Texas National Guard, the entirety of which was activated by Texas Gov. Greg Abbott shortly after Harvey came ashore. While these rescue workers work tirelessly to make a difference, many times there simply aren’t enough hands to truly help everyone in need. As a result, some companies look at this as a way to introduce technology to the equation that can be easily deployed in the event of disaster, including artificial intelligence-enabled drones and robotics to assess damage, provide initial triage for patients, and provide basic supplies to people in need. While still in the beginning stages, these initiatives are already being implemented in some emerging markets. Robots as mobile sentries Disaster situations tend to bring out the best in people as evidenced by those who turn out en masse, either on their own or by volunteering with service organisations, to try and help their fellow citizens following storms, earthquakes and other types of calamities.Utilising a robot instead of a human as a sentry means less law enforcement and/or security personnel Unfortunately, these types of incidents also bring out the worst in humankind in the form of looters and others who seek to take advantage of people who have lost everything. Although it should be noted that fears and reports of looting are often overstated during events like Harvey and other disasters, there’s no denying that keeping the peace and making sure that things do not descend into chaos and anarchy during what is a stressful time for all involved is paramount. Given that law enforcement and the National Guard must devote the majority of their attention to other recovery efforts, robots could be vital in ensuring that security is maintained within a disaster zone. In addition to not having to allocate manpower to security, which again involves bringing in people and placing further burdens on available resources, deploying robots to act as mobile sentries offers a number of benefits. Sustainable resources Obviously, there are cost advantages to using robots rather than people. For example, in a typical commercial environment, robots can be deployed for about half the cost of a traditional unarmed guard and they only cost about a quarter of what it takes to employ a police officer in a law enforcement-type application. Most robots are also outfitted with surveillance cameras, which provide authorities the ability to constantly monitor an area and record video for evidentiary purposes. Artificial intelligence-enabled drones and robotics aid to assess damage, provide initial triage for patients, and provide basic supplies to people in need during a natural disaster Perhaps the most appealing benefit that robots offer to emergency management officials in a security role during disaster recovery efforts is sustainability. Robots never get tired, nor do they have to use the bathroom, eat or take a break. With the abilities afforded by AI, robots can also navigate any designated area autonomously to keep an eye out for suspicious behavior or alert first responders to those who may need aid.Pattern recognition programs are essentially the building blocks that make the larger umbrella of general AI possible The SMP Robotics S5 Security Robot from Robotic Assistance Devices, for example, can run for as long as 20 hours without needing to be recharged and a single operator working from a central command post could manage up to 25 of them. Robotic sentries to address short-staffing Having robots patrol certain locations also reduces the likelihood of violent encounters between people and security forces. It’s not uncommon for tensions to boil over in situations where people feel hopeless and they can sometimes lash out at the very people sent to help them. Such a situation occurred following Hurricane Katrina, which devastated New Orleans and other areas of the Gulf Coast in 2005. Just days after the Superdome was converted into a makeshift shelter for evacuees, conditions inside the massive building began to deteriorate and a National Guardsman was assaulted one night inside a locker room. The attack resulted in troops putting up barbed wire fencing in various places around the building for protection from the increasingly agitated crowd. Last but certainly not least, utilising a robot instead of a human as a sentry in the aftermath of a disaster means that less law enforcement and/or security personnel will have be pulled from surrounding areas, many of which are already short-staffed as it is.Robots are outfitted with surveillance cameras, which provide authorities the ability to constantly monitor an area Law enforcement, firefighters and EMTs from adjacent communities and neighboring states almost immediately pour into the hardest hit areas following a disaster; however, this also leaves their respective agencies somewhat vulnerable themselves should they encounter a devastating event of their own. The use of just 50 robots, because they can work more hours, could mean that roughly 120 first responders could stay put in their own cities, towns and counties. New possibilities with artificial intelligence While drones still largely require a human operator to chart their flight paths and control their movements, the evolution of artificial intelligence (AI) is revolutionising the capabilities of machines to work autonomously. Though it may sound like something straight out of a science fiction novel or movie, there are already numerous robotic technologies that leverage some form of AI technology today. Of course, there is still a bit of confusion about what exactly AI is as well as some of the underlying terminology surrounding it. Generally speaking, AI is the ability of a computer to imitate the cognitive thinking and decision-making capabilities of humans. AI is the ability of a computer to imitate the cognitive thinking and decision-making capabilities of humans Some of the terms used in conjunction with AI, such as machine learning, deep learning and neural networks, refer to the ability of software programs to recognize patterns in large amounts of ingested data. Pattern recognition programs such as these, labeled by some as ‘narrow AI’, are essentially the building blocks that make the larger umbrella of general AI possible.Robots used in disaster scenarios could help maintain law and order, assist in search and rescue operations, and provide vital communications capabilities Remote physical security capabilities The physical security industry has recently been inundated with technologies that leverage different components of this narrow AI category. The manned guarding segment, in particular, has seen the introduction of a variety of robot guards over the past several years, which have been deployed in a range of different applications. Aside from serving as a force multiplier, robots with machine learning capabilities give security end users the ability to have an expanded presence in locations or situations characterised as too 'dull, dirty or dangerous' to place a human guard. For example, while it may not be feasible to have a human patrol the outskirts of a vital electric substation located hundreds of miles from the nearest town, having a robot that can easily traverse the harsh terrain and notify the proper authorities when something is amiss would be a viable alternative.Sometimes health and safety concerns make it dangerous to have a human watch the site, such as at toxic waste dumps - robots do not have this issue Technology as force multiplier in disaster management There are also situations where health and safety concerns simply preclude the ability of having a human watch the site, such as at toxic waste dumps, but this is not the case for a robot. Similar to these situations where having human guards is not desirable or even possible, robots could be used in disaster scenarios where they could help maintain law and order, assist in search and rescue operations, as well as provide vital communications capabilities. Robots and drones that are equipped with artificial intelligence capabilities can offer first responders a look into the aftermath of a natural disaster and serve as a force multiplier in these cases. We’re seeing the rise of the use of this kind of technology, and as the world faces more and more weather-related and man-made disasters in the future, they will become a part of the fabric of emergency response.
In tidying up after a year of Expert Panel Roundtable questions and answers, we came across some previously unpublished responses from our panel. These interesting responses address some of the hottest topics in the industry, from robots and deep learning to the “race to the bottom.” Taken together, the varied comments offer their own range of insights into the evolving physical security market. This week, we highlight some of these assorted Expert Panellist comments submitted over the last several months.
Unlike private sectors, the government-run offices or buildings are the places where people constantly visit for specific purposes, making these official institutions easily become a target for tempted malicious attack by people who might possess strong and negative emotions toward the governments. Despite the fact that these buildings are often guarded with more security staff with arms, it is even more than necessary to set up a solid surveillance system to proactively safeguard the public and its assets. Surveon provides government solutions with product lines including weatherproof cameras with excellent image quality, patent RAID NVRs with spare drive protection, and feature-rich VMS with post VA search. These powerful solutions enable the governments to protect people from most of the threats. Weatherproof cameras with smart WDR Surveon cameras secure the outer spaces of government building with IK10 vandal proof and IP66-rated weatherproof housingTo build a reliable security system for governments, SIs might encounter some challenges such as harsh outdoor conditions and data protection of recorded video. Under these circumstances, Surveon cameras secure the outer spaces of government building like parking lot with IK10 vandal proof and IP66-rated weatherproof housing, giving partners the most reliable outdoor-use option. Moreover, all of Surveon cameras provide excellent image quality with smart WDR, allowing the security guards to recognise crucial details such as license plates even under lighting contrast and prevent any suspicious vehicle from entering. Patent RAID NVR with data protection To avoid the loss of confidential data from surveillance system, the data protection of recorded video is particularly important in terms of planning for government security. Featuring patent RAID function with spare drive data protection, Surveon NVRs provide reliable performance with zero video loss. Featuring patent RAID function with spare drive data protection, Surveon NVRs provide reliable performance with zero video lossBesides, its client-server architecture can offer high I/O, large capacities, and overall system stability. To quickly identify useful information and relative footage from hundreds of hours of video recording, Surveon designs Post VA Search, an efficient management tool, reducing the time and efforts of management staff, making the surveillance system more efficient. Enhancing security system Surveon government solutions have been successfully safeguarded the customs building in Bolivia, the post offices in Cairo, and the border checkpoint in Turkey. “Surveon provides the best C/P value solutions for the customs and improves its whole security system with high-reliability products. We are satisfied with the result and I’m sure we will keep choosing Surveon’s solutions in the future projects,” said VisionLine, Surveon’s major partner in Bolivia. Surveon is dedicated to offering a variety of end-to-end video surveillance solutions catering to different vertical applications, giving partners reliable options for their projects.
Property is one of the biggest targets for crime in the UK, especially open land. There are thousands of acres worth of property across the UK which aren’t effectively secured, as a result of which they have become hot-beds for crime, anti-social behaviour, and not least fly-tipping. Security therefore must be a top priority for property owners, too many of whom tend to favour traditional methods such as fencing or hiring security guards. But, these methods come with a premium budget, with manned security running at a cost typically of some £300 per day. Nor is it possible to guarantee that every inch of a property is monitored. An increasingly adopted solution is Ad Hoc Property Management’s Smart Tower Security System and Smart Alarm System. Ad Hoc’s Smart Camera Security Tower sits six metres tall with a 36x optical zoom magnifying distances of up to 150 yards Ad Hoc Smart Camera Security Haringey Council contacted Ad Hoc Property Management after one of its industrial sites, Rosebery Industrial Estate in London, was repeatedly being targeted by fly-tippers over the course of many years. Every time the property was dumped with waste, it was costing the council hundreds of pounds to have their waste contractor called out to clean-up. By November 2017, they had expensed literally hundreds of thousands of pounds. By the end of the month the first Ad Hoc Smart Camera Security Tower was deployed, since then costs and incidents have plummeted. In fact, there have been no major incidents and local residents and tenants alike are delighted, welcoming the improved local environment. Ad Hoc’s Smart Camera Security Tower sits six metres tall with a 36x optical zoom magnifying distances of up to 150 yards, and a 12x digital zoom to enhance optical performance. Using state-of-the-art SMART technology (the same technology used in monitoring US Defence Centre, The Pentagon), the tower boasts a 360 degree camera which can be programmed to move zones at set intervals for 24/7 monitoring. Utilising wireless technology, the camera is able to filter large objects from those that are small, ensuring the alarm is only triggered when there is a clear threat. Ad Hoc’s Smart Cameras have been deployed successfully by numerous property owners around the UK" Ad Hoc's property security solutions “Open land is one of the biggest targets for waste dumping, but it doesn’t have to be. Ad Hoc’s Smart Cameras have been deployed successfully by numerous property owners around the UK, preventing anti-social behaviour and, more importantly, reducing opportunity for property-related crime,” said Darren Tubb, General Manager, Ad Hoc Security UK Limited. Land owners aren’t the only ones who can benefit from Ad Hoc’s security solutions; property owners of retail spaces, industrial buildings and homes who traditionally look at hiring in security guards, can benefit too, deterring fly-tipping and other anti-social crimes. As it stands, if a property is fly-tipped and no one is caught, it is the responsibility of the property owner to remove the waste legally at their own expense, which means hiring in a company licensed to remove these materials. However, as more property owners become aware of the technology available to them through Ad Hoc, not just in protecting the property but in helping police to identify the culprits, we could see property damage and fly-tipping become a thing of the past.
Government regulations continue to step up security demands at federal agencies, requiring identity cards to support multiple identity assurance factors and be validated at entries into a building or location. Because of the cost and infrastructure that goes along with many security upgrades, federal agencies must wait months or, in many cases, years to implement changes. The Federal Aviation Administration—an operating mode of the U.S. Department of Transportation—is no different. The FAA is tasked with the colossal mission of regulating and overseeing all aspects of civil aviation in the United States. With offices around the world, including its headquarters in Washington, D.C., the FAA has a large number of employees and buildings to oversee. With so many people coming into and out of the buildings each day, it is particularly important that security personnel have reliable tools to validate employee credentials Need of tools for validating employee credentials As part of its security requirements, the FAA must validate Personal Identity Verification (PIV) cards at checkpoints within its facilities. With so many people coming into and out of the buildings each day, it is particularly important that security personnel have reliable tools to validate employee credentials. As recently as a year ago, FAA security personnel were conducting visual inspection of PIV cards at the gates into facilities that did not have PIV card readers. They had no way of telling if the card was authentic, revoked, or if the employee had access rights to a checkpoint at a particular time. At the FAA headquarters, which employs just under 6,000 permanent employees, and another FAA facility, the Minneapolis Air Route Traffic Control Center, which is the organisation’s 11th busiest airport traffic control tower, visual verification just wasn’t enough. Automating the verification process In order to comply with HSPD-12 and the Office of Management and Budget (OMB) Memorandum 11-11, the FAA needed a process beyond visual verification that allowed security personnel to quickly check the authenticity and revocation status of a card, as well as access rights to a particular area of the facility. With as many as 5,000 people coming into the FAA headquarters facility daily, the organisation’s primary goal was to automate the verification process. “The project needed to provide guards the ability to validate PIV cards at FAA facilities where the gates did not have PIV card readers,” said Craig Auguston, HSPD-12 Program Manager at the Federal Aviation Administration. “We also wanted a mobile solution for backup and for roaming guards to be able to validate secure areas, such as parking garages.” Codebench’s OMNICheck Plus software OMNICheck Plus was ultimately decided upon because it is integrated with many physical access control systems including the P2000 The FAA began looking at products that could not only meet its requirements for mobile validation, but also integrate seamlessly with its P2000 security management database from Johnson Controls (JCI), according to Auguston. “This upgrade was important to meet the FAA’s requirement to validate PIV cards at all check points,” Auguston said. The FAA’s former process of visual verification was not allowing security guards to check the status of a PIV card, such as revocation status and specific access rights, both of which the organisation needed to meet its security goals. After testing a couple of mobile software validation programs, the organisation chose OMNICheck Plus software from Codebench, a HID Global Company. OMNICheck Plus was ultimately decided upon because it is integrated with many physical access control systems including the P2000, and it is listed on the GSA’s FIPS 201 Approved Products List as a CAK authentication system when running on an ARM-based mobile device such as the DAP CE3240B, which both FAA facilities use. Giving mobile access to the security guards “They really needed something that was going to allow their security guards to be mobile in certain parts of a facility,” said Botio Mandov of Johnson Controls. Johnson Controls, the integrator for the project, helped the FAA implement a larger security upgrade, which included the security management database and mobile validation software. Together, the FAA’s mobile DAP devices and OMNICheck Plus software enabled roaming security guards to use the mobile handheld devices in FAA parking garages and other entry points that needed to be secured, but do not have stationary PIV card readers. One of the most important aspects of authentication software for the FAA was the ability to check an employee’s access rights directly on the mobile card readers Checking access rights on mobile card readers In addition to mobility, one of the most important aspects of authentication software for the FAA was the ability to check an employee’s access rights directly on the mobile card readers—something only their organisation’s P2000 physical access control system could do previously. With an OMNICheck module called Data Import, certain cardholder information housed in the FAA’s P2000 database, such as access rights, was pushed down into the DAP mobile devices used by security personnel. “Access rights allow FAA security guards to make sure employees’ cards are not only valid, but that they are allowed to be in a certain area at a certain time,” Mandov said. In addition, FAA security administrators can run audit reports that show which cards were checked and when. The implementation took about five months, including testing the interface with the access control system and coming up with a training guide for the security guards, according to Auguston. The FAA is currently using 31 DAP CE3240B mobile readers with OMNICheck Plus. Saving money by eliminating physical parking passes Prior to the OMNICheck Plus installation, FAA security personnel had an unreliable way of authenticating PIV cards and access rights. Now, security personnel are able to verify digital certificates, revocation status and access rights, all while having an audit trail of the cards checked in the system. An additional, unexpected benefit for the FAA has been the cost savings of eliminating physical parking passes at its two facilities. “We are able to positively identify cardholders’ status when they try to enter the facility. We were able to save money by eliminating the physical parking pass by using OMNICheck to validate cardholder’s status for parking in FAA-controlled facilities,” Auguston explained.
The 9th BRICS Summit was successfully held in Xiamen, China from September 3rd-5th, 2017, where leaders of the five member-countries were in attendance. Building on its success in providing a comprehensive security solution for the G20 Hangzhou Summit in 2016, the 9th BRICS Summit was yet another accomplishment for Dahua. The 2017 BRICS Xiamen Summit demanded high-level protection for national leaders from Brazil, Russia, India, China, and South Africa. As Xiamen’s city centre is located on an island, the security system required comprehensive surveillance of all roads leading into the area, also known as the “Four Bridges and One Tunnel” network.Dahua provided 1723 bullet cameras, 379 PTZ cameras, 226 vehicle checkpoint cameras, 116 Face Recognition cameras, 10 mobile 4G PTZ cameras Protection through Dahua technology In addition to roads leading into the city, routes to and from the airport, hotels, and the Xiamen International Conference & Exhibition Center needed to be protected as well. A solution of this proportion would also require an advanced, automated, and centralised system to ensure efficient, coordinated responses. With its cutting-edge IP camera, video cloud, network storage, and transmission technologies, Dahua was up to the task of securing Xiamen and the BRICS venues. In total, Dahua provided 1723 bullet cameras, 379 PTZ cameras, 226 vehicle checkpoint cameras, 116 Face Recognition cameras, 10 mobile 4G PTZ cameras, and many other advanced Dahua products and services used in various areas of the city. The BRICS security command centre, administered by the Public Security Department of the Xiamen, was fitted with a Dahua visual emergency dispatch and command system. The centre’s large display wall was stitched together with Dahua edgeless HD LED panels, enabling a complete picture of all units under command center control during the meeting, greatly simplifying control and responses. The security system surrounding the Xiamen International Conference & Exhibition Center as well as the visual emergency dispatch and command system in the security command center both adopted a full range of Dahua video surveillance and display solutions. Dahua employed advanced technologies such as intelligent analysis and big data, to increase the efficiency of emergency command and management capabilities Live video security on the road A customised Dahua Mobile Solution with GPS positioning and in-vehicle wireless image transmission system was installed on 228 patrol cars and 72 special cars from the Xiamen Public Security Bureau, which was used to clear the way for Summit leaders. This provided the command centre with a continuous live overview of all areas while providing support for the handling of various emergencies. Dahua contributed to the security of other key areas including the Xiamen Airport, train station, ferry piers, and police checkpoints In order to secure “Four Bridges and One Tunnel” access points, Dahua employed advanced technologies such as intelligent analysis, big data, and video analytics to significantly increase the efficiency of emergency command and information technology management capabilities, providing uninterrupted HD video surveillance and smart road event monitoring on bridges and tunnels. In addition, Dahua also contributed to the security of other key areas including the Xiamen Airport, train station, ferry piers, and police checkpoints. In surrounding Haicang and Jimei districts, Dahua constructed video surveillance on routes and sites which held key activities in the city, achieving full coverage of places such as guarded routes, main roads, key sites, as well as surrounding areas and regions of elevated risk. Dahua securing public safety Dahua also played a role in safeguarding conference-related affairs such as catering, accommodation, and travel. The hotels in which leaders stayed in and surrounding areas were upgraded to HD systems in a short amount of time, making sure the leaders were secure while they rested during the Summit. The mobile law enforcement surveillance system assisted the Xiamen Market Supervision Commission in guaranteeing the provision of safe food during the Summit. The three day BRICS Summit concluded without a hitch. National leaders and their delegations were able to smoothly move about the city and attend the conference while Dahua products prevented threats through a vast network of smart video technologies. In addition, the large-scale project significantly upgraded Xiamen’s city surveillance system and provided a long-term foundation for not only public security-related operations, but also broader public projects such as the Xiamen Wireless Image Transmission System.
Ward Security has been appointed as the security provider for British Arab Commercial Bank following a competitive tender process. The appointment will see the team manage the security at BACB’s Mansion House premises in London, supplying both concierge and security guarding personnel. The British Arab Commercial Bank is a UK regulated bank that has operated for more than 40 years with an expertise in international finance and a focus on helping companies to develop and grow trade in new markets with confidence. Kevin Ward, Managing Director of Ward Security said, “We are delighted to have been awarded such a prestigious contract by the bank. We believe our philosophy of providing people who are both professional and dedicated to delivering high quality standards closely matches the principles of the bank. All our clients need bespoke solutions that consider the key security needs both today and, in the future, and our tender clearly communicated that to the bank. We look forward to working with them.”A key speciality of Wards Security is the provision of search and guard dogs Dog guarding projects Steve Cook, Director of Facilities at British Arab Commercial Bank said, “We have been impressed with the high standards and accreditations that Ward Security work to and maintain but mostly this company is clearly very passionate about what they do." "Not only have they identified efficiencies and new ways to work they have delivered a proposal to us with fresh enthusiasm. The team at Ward Security are already integrating well into our team and we are pleased with the appointment of them as our new security provider.” From its headquarters in London Ward Security provides a full range of security services to high profile companies nationwide and it has regional offices covering Kent, The Midlands and South East England regions employing a team of over 900 security personnel. A key speciality of the company is the provision of search and guard dogs. It works closely with the City of London Police and both Bromley and Bexley Borough Councils on a number of specialist dog guarding projects.
The Vienna University of Economics and Business (WU) was founded in 1898 by the k. k. Ministerium für Cultus und Unterricht as the "k. k. Exportakademie". At that time, tuition was being given in the following relatively modern fields: Foreign languages, economics, business affairs, economic geography, public law, private law and consumer affairs. Relocation to Vienna Due to steadily increasing numbers of students, the WU had to relocate to various sites in Vienna several times in its history. The previous location in Althanstraße – originally designed for around 9,000 students – was already fully occupied when the university moved there in 1982. In the 1990s, the number of students grew further and eventually settled at over 20,000. As a result, in 2009 work began on a new campus in Vienna's second district to the east of the Prater park. Six renowned architects from around the world were involved in the planning of the WU campus, with the stated goal of constructing world-class architecture. What was ultimately created was an open site with clear spaces and green areas, with a total of nine standalone and very differently designed building complexes distributed across it. The heart of the WU campus is the Library & Learning Centre designed by the Zaha Hadid design office, which houses central service facilities, banqueting halls and a library, among other areas. Campus WU was opened in a ceremony on 4th October 2013 and provides space for 24,000 students and 2,300 employees. SeeTec software offers encrypted communication between the server and the client, and also supports secure connections to the cameras Viable concept for campus security Even during the planning stage of the WU campus, the topic of security played an important role. A viable concept had to be developed, in particular for the large outdoor areas that are accessible day and night, to protect students, staff and visitors on the campus against attacks and thefts, whilst still respecting their personal rights. A further key task of the security technology is visual support for the emergency services in the event of an alarm as well as the securing of escape routes. Design aspects also needed to be taken into account; this means that the cameras should be placed as inconspicuously as possible, and should not in any way affect the overall architectural impression, a tricky task for the installation engineers in particular. SeeTec VMS An invitation to tender was launched for the security technology on the WU campus, with Siemens AG Austria ultimately winning out with a comprehensive overall concept which also takes the architectural features into account. Since its launch in 2013, a networked video system with several hundred IP cameras has been guaranteeing security on the WU campus. The image data is recorded, managed and supplied using SeeTec video management software. The SeeTec software was chosen for the video management system; and thanks to its flexible and modular design the SeeTec solution is expandable and can be easily connected to third-party systems. For the WU campus, this was important because all security systems were to be linked and managed via a centralised building management system. Securing public spaces As the public spaces on the WU campus also needed to be secured, observing the highest possible standards on data. To minimise the system load, the video images are recorded and supplied via multiple servers that are also protected against failure via a made-to-measure redundancy concept. The live images can be displayed as required on a large-screen system in the WU campus control centre. Protection and maintaining the personal rights of students, staff and visitors was of paramount importance. In this respect, the SeeTec software offers encrypted communication between the server and the client, and also supports secure connections to the cameras. In addition, sensitive areas can be masked out in the camera image or persons can be made unrecognisable by pixilation; access to the recorded original data is then only possible with the works council being present, for example. Inconspicuous CCTV To permit interaction of the total of 16 different systems (such as fire, access control, video technology), they are linked to one another via the Winguard SiControl building management solution from Siemens. If, for example, a fire alarm is triggered, action plans can be automatically displayed in the control room or in the deployment centre, and live images from cameras in the vicinity can be displayed. This means that the emergency services personnel can quickly gain an overview of the situation and ensure that escape and access routes are clear. The challenge faced by the WU campus was to reconcile the requirements of security and fire protection with protecting personal rights and video data The cameras distributed across the terrain and in the buildings focus primarily on the outer shell, the escape routes and the critical infrastructure. Thanks to specially developed mounting concepts from Siemens, it was possible in many cases to incorporate them inconspicuously into the façade and ceiling structures, thus preserving the overall architectural impression. SOS telephones on premises To offer additional security to students, staff and visitors on the site, SOS telephones have been erected at multiple points on the premises. If an emergency call is sent from there, this triggers an alarm on the Winguard SiControl. In addition, the nearest PTZ camera focuses the column and turns on the live image in the control room. This means the security personnel can immediately gain a picture of the situation on the ground. Johann-Wolfgang Hörtl, responsible for the security department at WU Vienna, and therefore also for the video system, summarises the special features of the video system at WU Vienna: “The challenge faced by the WU campus was to reconcile the requirements of security and fire protection with protecting personal rights and video data - after all, we operate in the public space here as well as in areas where lots of people are working. The SeeTec software does both – it seamlessly integrates with building and hazard management systems and at the same time offers numerous features to protect data and personal rights." Expandable system Another important aspect when selecting a suitable video solution was the simple expandability of the system to keep pace with potential further rises in employee and student numbers in future as well. Thanks to the modular design of the SeeTec video management software, new camera channels can be integrated quickly and easily into the system. In addition, new functionalities can be added at any time in the form of expansion modules – examples of this include intelligent video analysis or licence plate recognition for managing parking areas.