ThreatScan® allows bomb technicians to perform rapid and accurate threat assessment in a wide range of operational scenarios. Each system consists of a portable X-ray generator, a detection panel and an operator’s workstation running the Company’s market-leading image processing software, together with a customer-specific range of ancillary equipment. ThreatScan® is lightweight, incredibly thin, has a large imaging area of 600 x 460mm, enabling bags and packages to be scanned...
Delta Scientific, the manufacturer of counter-terrorist vehicle control systems used in the United States and internationally, announced that its new patented crash rated TB150 portable bollard system lets law enforcement and other security providers promptly block access to temporary venues where vehicles can be used as weapons against large numbers of pedestrians. Individual portable bollards provide vehicle barricades in applications such as heavily travelled walkways and roadways or any are...
Following a successful 2018/19 season, iLOQ, the pioneer in the digital locking industry, will continue its partnership with the Champions Hockey League (CHL) also for the 2019/20 season. Already in its 6th season, the CHL format is continuing to gain in popularity and visibility with almost half a million on-site spectators and almost 6000 hours of broadcast time across Europe. With 32 teams from 13 leagues competing for the coveted trophy, the action kicks off on 29 August. Standard brand pa...
A high majority of Americans (83%) are concerned about a criminal attack causing physical harm at large-scale events such as sporting events or concert festivals. More than one in five (22% of) Americans say they have cancelled plans or considered cancelling plans to attend large-scale public events due to concerns about physical attacks and the safety of their data. Across the pond, three in 10 Britons think twice about attending large-scale events due to data or physical security issues. Alt...
AxxonSoft, a developer of intelligent VMS and PSIM software, is proud to present Axxon Next VMS version 4.3.2. The new version introduces new capabilities in video analytics and smart forensic search, integration of multiple camera feeds into a single panoramic view, centralised server management for maintenance and updates, as well as many other enhancements and improvements. Added Queue Length and Visitor Counter detection tools. The Queue Length detection tool counts visitors within a design...
Dahua Technology, a video-centric smart IoT solution provider, announces the addition of the new StereoVision camera: a 3MP dual-sensor, people-counting camera that incorporates Artificial Intelligence (AI). The camera uses advanced image processing technology for improved depth perception to count people with up to 98% accuracy. The close, side-by-side positioning of the StereoVision camera’s dual lenses allows each sensor to capture images of the same area from slightly different angles...
The National Center for Spectator Sport Safety and Security (NCS4) and the Security Industry Association (SIA) have named Scott Dunn – senior director of business development, solutions and services for Axis Communications, Inc. – as the 2019 recipient of the Sports Security Innovator Award. SIA will present Dunn with the honour at the National Sports Safety and Security Conference and Exhibition, taking place July 9-11 at the New Orleans Downtown Marriott in New Orleans, Louisiana. Dunn serves on the National Advisory Board for the NCS4, the nation’s first academic centre dedicated to spectator sports safety and security research, professional development, training and outreach. He also helped the NCS4 start – and attract global companies to – the Sports and Entertainment Technology Alliance and has been instrumental in the 2025 Smart Stadiums project. Delivering smarter, safer stadiums I’m excited to continue collaborating on new concepts and innovative solutions to deliver on the promise of smarter, safer stadiums and venues"“It’s an honour to be recognised with the 2019 Sports Security Innovator Award from two renowned security organisations who play such a key role in our industry,” said Dunn. “I’m excited to continue collaborating on new concepts and innovative solutions to deliver on the promise of smarter, safer stadiums and venues of the future. Thank you, SIA and NCS4, for this meaningful recognition.” The NCS4 – established at the University of Southern Mississippi (USM) – works in close partnership with industry professionals, researchers, academics and government agencies to bolster the capacity of practitioners to effectively respond to safety and security challenges. “Scott is a passionate and innovative leader who sees academia as a catalyst for industry growth,” said Dr. Lou Marciani, director of the NCS4. “Scott has a deep understanding of what is necessary to advance the sports safety and security industry, and we are grateful to have his support of our National Center.” Recognition for contribution towards sport security At Axis, Dunn leads the company’s long-term strategy regarding in-house developed solutions, including access control, hosted video and future products. He is also responsible for the company’s segment focus, which includes industries such as smart cities, government, retail and health care, and serves on the SIA Board of Directors. Award winners are selected for having promoted scholarship, advanced best practices for ensuring the safety and security of participants “SIA is proud to join the NCS4 in presenting Scott Dunn with the Sports Security Innovator Award in recognition of the time, expertise and effort he has contributed toward advancing sport security,” said SIA CEO Don Erickson. “Scott has demonstrated expertise in cross-organisational collaboration, fostering best practices, promoting effective security technology use at large stadiums and entertainment venues and working toward the stadium of the future.” Developing solutions for sports safety challenges The Sports Security Innovator Award – co-presented each year by SIA and the NCS4 at the National Sports Safety and Security Conference and Exhibition – recognises individual SIA members who have demonstrated innovation by developing next-generation solutions for sports safety and security challenges. Award winners are selected for having promoted scholarship, advanced best practices for ensuring the safety and security of participants and attendees at sporting events and advocated for the highest levels of professionalism in the securing of spectator sports venues. The 10th annual National Sports Safety and Security Conference and Exhibition will gather top professionals in the field for a program dedicated to security and safety technologies, products, services and education for safeguarding assets and spectators.
A security products firm based in West Yorkshire has secured a £500,000 loan from Mercia Fund Managers to step up production of its range of hostile vehicle mitigation (HVM) barriers made from recycled rubber. Rosehill Security, which is based in Sowerby Bridge, has received the funding from NPIF – Mercia Debt Finance, which is managed by Mercia Fund Managers and is part of the Northern Powerhouse Investment Fund and Mercia’s EV SME Loans Fund. Vehicle Security Barriers (VSBs) The barriers have been selected by security forces, event organisers and sports clubs across the globe The division of Rosehill Polymers has developed a range of innovative vehicle security barriers (VSBs) that can be rapidly deployed to protect people and buildings from vehicle as a weapon (VAW) attacks. The barriers have been selected by security forces, event organisers and sports clubs across the globe and have been used in locations ranging from the London Marathon to the Ministry of Finance in Paris. The investment will be used to scale up the manufacture of its current product portfolio to meet the growing demand for VSBs and to develop additional products. Rosehill Hostile Vehicle Mitigation (HVM) Rosehill Polymers Group was founded in 1988 and now employs 100 people across six operating divisions producing coatings, adhesives, railway crossings, coloured rubber granules for playgrounds and traffic calming products. Dr Alexander Celik, Group Managing Director of Rosehill Polymers Group, said: “The protection against VAW attacks has fast become a high priority across the world. As a result, we’re seeing growing demand for Rosehill Security’s range of HVM and perimeter security solutions products. This investment will allow us to move forward with our plans to increase production capacity, improve efficiency and continue to develop the product range.” Perimeter security solutions Rosehill Polymers Group’s bold approach has paid off, allowing the business to successfully diversify and develop new markets" Jonathan Craig, Investment Manager at Mercia, added: “Rosehill Polymers Group’s bold approach has paid off, allowing the business to successfully diversify and develop new markets. This funding will allow it to continue its expansion and step up production to meet growing worldwide demand.” Mark Wilcockson, Senior Manager at British Business Bank, said: “Since its launch in 2017, NPIF’s impact on businesses has been wide-ranging, providing funding to launch new products, employ new staff, enter new markets and acquire new facilities. We are pleased that NPIF is continuing to unlock the North’s growth potential by supporting small businesses with vital investment.” The NPIF project is supported financially by the European Union using funding from the European Regional Development Fund as part of the European Structural and Investment Funds Growth Programme 2014-2020 and the European Investment Bank.
At ISC West this year, on booth 11099, Veracity will be demonstrating its expanded suite of COLDSTORE solutions, from the new COLDSTORE 2U delivering 112TB video storage in a compact rack-mounted space up to the COLDSTORE Colossus, the 4U, 45-bay, 630TB video storage solution. The COLDSTORE family offers unique benefits including a 10x increase in hard disk life and power savings of 90%+. In fact, Colossus, with 630TB and 45 disks, consumes less than 80W of power! This gives the COLDSTORE range not only enviable performance benefits but also a compelling total cost of ownership case not available with other video storage solutions, especially for longer retention periods. Eliminating storage systems’ operational issues COLDSTORE has patented technology designed specifically for sequential and continuous recording of video surveillance channelsCOLDSTORE is in use throughout the world at critical infrastructure sites, major sporting venues, in retail, in custodial and policing environments and in city centre command and control operations. COLDSTORE has patented technology designed specifically for sequential and continuous recording of video surveillance channels. As a result, many of the operational issues with standard storage systems, such as long disk rebuild times, high power consumption, excess heat and reduced disk life, are eliminated. Also, on display at ISC West will be the COLDSTORE Pro 3U, 210TB unit that uses only 0.3W per Terabyte. Visitors will learn about COLDSTORE’s new embedded NVR functions and the ability to record from camera direct to COLDSTORE through ONVIF compatibility or using embedded COLDSTREAM code in open platform cameras, such as Axis and Hanwha. Over 100 channels can be supported, at 4Mbps per channel. Integrated command and control solution Veracity will also be demonstrating VIEWSCAPE, the integrated and open command and control solution. VIEWSCAPE is a real success story in use in many city centre, retail, critical infrastructure and other sites. Anyone with an interest in C3, critical command solutions should get to know VIEWSCAPE. With over 100 integrations, this comprehensive command and control system can be seen at Veracity’s booth 11099. The full integration of COLDSTORE with Hanwha Techwin’s Wisenet WAVE will be on show on both the Veracity and Hanwha Techwin booth The full integration of COLDSTORE with Hanwha Techwin’s Wisenet WAVE will be on show on both the Veracity and Hanwha Techwin booth. Wisenet WAVE is an IP Video management platform that allows users to create IP video surveillance solutions tailored to any type of project, usable by anyone and on any device. It is simple to setup and use, and when integrated with COLDSTORE delivers an impressive suite of features with all the benefits of COLDSTORE’s long-term video retention capabilities. LONGSPAN Ethernet over Coax solution Veracity is most famous for its transmission solutions. In 2005, Veracity launched the world’s first Ethernet over coax solution. As a market leader, the full range of multi-channel Ethernet over Coax, extreme distance Ethernet and other transmission products will be on show. This includes LONGSPAN, which delivers IP video and POE (Power over Ethernet) over a distance of 820m (2,690ft) on standard Ethernet cable. Veracity will also have its informative IP transmission workshop running at the booth. Veracity operates in the USA from its office in Dallas, Texas and continues to experience rapid growth fuelled by the development of strong relationships with many customers and partners across the United States. Veracity experts will be available throughout ISC West at booth 11099 from the 10th to 12th April 2019 at the Sands Expo in Las Vegas. Make sure you visit us.
Alcatel-Lucent Enterprise and BCDVideo, a provider of innovative, purpose-built IP video storage solutions, announces they are working together to address the growing demand of businesses to enhance public security and safety via video surveillance and networking. Advances in video surveillance are helping cities, hospitals, hotels, sporting and entertainment venues focus on improving public safety, deterring crime and helping police solve crimes, and providing first responders with situational awareness during emergencies. These enterprises recognise accessing video surveillance systems, files, analytics and applications requires a stable network with reduced network downtime and increased network reliability. Massive data transfer ALE’s unique offering in the surveillance market delivers built-in, easy provisioning and integration of surveillance equipment for more flexibility The two companies are aligning to offer customers and integrators best in breed technology via a simplified infrastructure and an award-winning surveillance system. Leveraging Shortest Path Bridging (SPB) technology offered on the Alcatel-Lucent OmniSwitch family of products, the joint offer creates a highly available network that exceeds speed and management requirements to support the massive data transfer and file volume of a surveillance system. ALE’s unique offering in the surveillance market delivers built-in, easy provisioning and integration of surveillance equipment for more flexibility, while reducing the cost of implementing and maintaining the network. Video surveillance networks often suffer high latency issues from legacy switching solutions. SPB reduces the latency time to deliver data packets and enables high network availability for maximum use of all physical connections and routed services resulting in greater network stability. Resilient surveillance network ALE and BCDVideo worked closely to ensure each piece of the solution was tested for high availability leveraging SPB technology. Businesses and integrators gain a resilient surveillance network with a simplified infrastructure, which optimises the surveillance system performance and results. ALE switches provide high system resiliency with redundant hot-swappable power supplies and virtual chassis capability. With support for SPB-M, ALE switches offer a scalable network architecture, with fast convergence, resilient and easy to manage IP multicast network for video surveillance. Darren Giacomini, Director of Advanced Systems Architecture at BCDVideo commented, “Improper network configurations are the root of most technical issues with surveillance systems. As technology advances, BCDVideo recognises video content is only as good as the ability for the viewer to attain access to the files over the network.” Highly reliable system Surveillance solutions have changed immensely over the last decade and, in many ways, networking for these solutions has not changed with them" “It has become imperative for various government bodies and business owners to deploy video surveillance systems to effectively monitor and record activities within and around the premises. Aligning our systems to build a best of breed network with a switch vendor like Alcatel-Lucent Enterprise, enables us to jointly deliver a highly reliable system to customers in a range of specialised environments.” Matt Overstreet, Channel Lead at ALE, North America – “Surveillance solutions have changed immensely over the last decade and, in many ways, networking for these solutions has not changed with them. Many businesses are now recognising the need to upgrade their underlying network to achieve the performance needed to utilise their surveillance solution appropriately.” “This new joint offering from ALE and BCDVideo transcends what surveillance networks were capable of in the past by taking our companies’ two most reliable solutions and providing reliability and optimisation that neither can deliver alone. Our OmniSwitch core and edge switches are optimised to move traffic over SPB and provide critical connectivity between servers and network devices.”
Steelway Fensecure’s palisade fencing offers a strong visual deterrent to possible trespassers. Its sturdy construction creates a strong physical barrier that is tough to break down. The lack of footholds and with sharp edges they are hard to climb. This style of fencing also offers relatively low maintenance. An array of applications can benefit from palisade fencing including local authorities, education facilities, sports departments, theme parks and caravan parks. Steelway Fensecure’s Palisade fencing is available in General Purpose (GP) and Security Purpose (SP) specifications. Palisade fencing Palisade fencing offers a strong visual deterrent to possible trespassers Palisade fencing has long been the front-runner when it comes to securing property or land. Palisade fencing offers a strong visual deterrent to possible trespassers. Its sturdy construction creates a strong physical barrier that is tough to break down even with force. The lack of footholds and sharp edges increase the deterrence factor, as they are hard to climb. This style of fencing also offers relatively low maintenance due to its galvanized finish. If you opt for a powder coated finish, then the fences can come in a range of colours to suit the surrounding area. Steelway Fensecure’s palisade topping options One of the most recognisable elements of steel palisade fencing is the pale top. Steelway Fensecure offers 4 pale top options; triple pointed, single point, round top or round top with notches. Different properties with suit different pale tops, you can discuss your requirements with the Steelway team. Steelway Fensecure offers 4 pale top options; triple pointed, single point, round top or round top with notchesThere are two different profiles available: D and W. Both provide substantial security. The W profile is an effective visual deterrent with its sharper edges, as well as being more uncomfortable and difficult to scale. Palisade Fencing applications: There is an array of applications which palisade security fencing is an ideal solution these include: Industrial estates Schools, colleges and universities Local Authorities Airports (Airfield perimeter fencing) Oil & gas installations Railway boundaries Commercial premises Steelway Fensecure offer palisade fencing available in General Purpose (GP) and Security Purpose (SP) specifications.
Princeton Identity, provider of the fastest, simplest and most secure biometric security system on the market, announced three new patents related to innovations in iris recognition technology that the company was awarded by the U.S. Patent and Trademark Office (USPTO). The new patents include: Patent 10042994 for Validation of the Right to Access an Object. Patent 10025982 for Collecting and Targeting Marketing Data and Information Based upon Iris Identification. Patent 10038691 for Authorisation of a Financial Transaction. Ensuring accurate authentication of people The new patents represent the application of Princeton Identity’s unique approach to iris authentication in three very important market areas: access, marketing, and financial transactions. Using the techniques described in these patents, Princeton Identity advances the application of iris identification and personnel authentication much more broadly than physical security and represents the anticipated adoption of these technologies in the broader marketplace. “We’re extremely excited that the USPTO has recognised Princeton Identity’s latest inventions and team of biometrics experts,” stated Mark Clifton, CEO of Princeton Identity. “With over 11 patented technologies in our portfolio and many more pending, we continue to demonstrate our commitment to creating the most advanced and accurate iris recognition-based solutions to ensure accurate and convenient authentication of people and access to assets.” Implemented in airports, universities and stadiums Quickly gaining recognition as a leader in advanced biometric security, Princeton Identity’s technology is present in the busiest international airport in the world, prominent financial institutions, major universities, sports stadiums and the largest American manufacturing company. The company has deployments within the U.S. Department of Defense, and its identification software has been integrated into over 90 million mobile devices in over 120 countries.
In 1901 New York state made a pioneering regulation move and became the first US state to require automobile owners to register their vehicles. This marked the beginning of regulation on modern traffic, which - following decades of development - resulted in a multi-layer concept of regulation relating to vehicles and driver’s licenses, traffic signs and insurance mechanisms that we are all familiar with nowadays. While certain parallels can be drawn between the early days of cars and our contemporary experience with quadcopters, we are facing a new challenging era that is far more complex to organise and regulate. Integrating drones in existing regulatory ecosystem Similar to other pioneering technologies in the past, drones need to integrate into a long existing and well-balanced ecosystem, the rules of which have first been drafted some one hundred years ago and have evolved without taking vehicles such as drones into account. Yet the safety risks related to aviation hinder the quick integration of drones into that ecosystem, broadening the gap between existing regulatory landscape and the exponentially growing popularity and ever-advancing technology of drones. The safety risks related to aviation hinder the quick integration of drones into the legislative ecosystem For the past several years, governments and legislators have been trying to tackle this problem by trying to answer two questions: how to properly integrate drones into the airspace without creating a hazardous impact on existing airborne operations, and how to enforce regulations in order to prevent the side-effects related to careless or malicious drone flights, taking into consideration public safety and physical security. Counter-UAS measures and regulations Up until 2018, legislators tried to tackle these two questions as a whole by introducing bundled legislation drafts covering the entire landscape of gaps they needed to address, which resulted in multi-parliamentary committee efforts both in the US and abroad to review and approve each bill - a process that is very slow by design. It was only in the beginning of this year that the issues were starting to be addressed separately: legislation related to limitations and counter-drone measures on the one hand, and legislation related to integration into airspace on the other. Let’s take a closer look at Counter-UAS (unmanned aerial systems) measures and what makes them challenging in terms of regulation. Over the past years, various counter-drone technologies have been introduced to enable control over rogue drones in order to either stop them from achieving their flight purpose or prevent them from creating safety hazards to people or property. These measures can be grouped into 3 types of technologies: Military grade solutions - including lasers and surface-air missiles Kinetic solutions - including net-guns and autonomous drones set out to catch the rogue drone and disable it airborne Non-kinetic RF-based solutions - aimed at either disabling, disrupting or accessing the drone’s communications channels in order to trigger a return-to-home function, or guide the drone into a safe landing route Aside from combat military operations, the legality of using the above technologies is questionable as they tamper with an airborne aircraft, might be considered as wiretapping and/or violate computer fraud laws. Therefore, one can conclude that unless changes to regulation are made, non-military facilities will continue to be defenceless from and vulnerable to rogue drones. One can conclude that unless changes to regulation are made, non-military facilities will continue to be defenceless from and vulnerable to rogue drones European c-UAS legislation Next, let’s look at the state of c-UAS legislation in both Europe and US to better understand different legislative ecosystems and how they affect the possibilities of using counter drone measures. In the European Union, there is currently no uniform legislation, and the member countries rely on their own existing legal infrastructures. Roughly speaking, most countries use a method of exemptions to the communications and aviation laws to allow the use of counter drone measures after a close examination by the relevant authorities. Such exemptions are approved under scrutiny to particular sites, which provide some relief, but they do not allow broad use of countermeasures. Further discussion regarding a broader regulation change, on a country level or EU-wide, is only preliminary. US c-UAS legislation Preventing Emerging Threats - provides an initial infrastructure for counter drone measures to be used by various DoJ and DHS agenciesUnlike the EU, in the US exemptions are not possible within the existing legal framework, and the possible violation of US code title 18 means that the hands of both the government or private entities are tied when attempting to protect mass public gatherings, sports venues, or critical infrastructure. Therefore, it was more urgent to introduce legislation that would allow countermeasures to some extent. In September, US Congress approved the FAA-reauthorisation act for the next 5 years (H.R. 302), which was shortly after signed by the President and came into effect. Division H of the act - Preventing Emerging Threats - provides an initial infrastructure for counter drone measures to be used by various DoJ (Department of Justice) and DHS (Department of Homeland Security) agencies under strict limitations. However, the act avoids determining which technology the agencies should use, yet it requires minimal impact on privacy and overall safety in order to strike the necessary balance. This is the first profound counter-drone legislation and is expected to be followed by additional measures both in the US and in other countries. Updating counter-drone legal infrastructure In summary, 2018 has been a pioneering year for counter-drone legislation, and while technology already allows taking action when necessary, legal infrastructure needs further updates in order to close the existing gaps: covering additional federal assets, state-level governments, and private facilities of high importance, such as critical infrastructure sites. Legislators in the US and around the world need to continue working in a rapid tempo to keep up with the growing threat of drones. As with cars a century ago, the number of accidents will rise with the increase in time taken to regulate.
The rise to prominence of smart cities should not go unnoticed. To the untrained eye, you might not realise just how connected your city is and how it’s helping your everyday life. From crossing the road to monitoring water levels, technology is allowing cities to think quicker and act smarter. Data-driven decisions A recent whitepaper by ABI Research has revealed that the total global cost-saving potential offered by smart cities stands at more than $5 trillion. This shows how technological improvements to the places we live offer a significant opportunity to not only improve our personal lives and wellbeing, but to also ensure our cities are able to continue contributing to the wider economy. One of the major areas of technology that is going to shift how we interact with our cities is the Internet of Things (IoT). One benefit will be the ability to use video surveillance to analyse data on large crowds at sporting events The IoT already accounts for swathes of technology and devices operating in the background. However, we’re increasingly seeing these come to the forefront of everyday life, as data becomes increasingly critical. In an IDC study sponsored by Seagate, Data Age 2025 estimates that by 2025, nearly 20% of data will be critical to our daily lives and nearly 10% of that will be hypercritical. Data is no longer just going to provide simple insights and recommendations, it is going to be making decisions that impact the fabric and quality of everyday life. Analysis and application The decisions that this critical data is attached to must be made quickly. A living, breathing city must constantly be monitoring, assessing and utilising data in order to ensure it keeps people safe and mobile. A prime example of this is in the Dutch city of Almere, where the local police force and parking management teams are using surveillance technology to improve congestion and manage traffic flow. This is hugely important when 20% of city traffic is caused by drivers circling around trying to find a parking space, according to Stuart Higgins, Strategic Lead - Cisco Impact. While older cities such as London may not be as equipped with new technology like modern cities, such as Dubai, an appreciation of the different ways individual cities can adopt technology is vital. For those that have the right infrastructure, one key benefit will be the ability to use video surveillance to analyse data on road congestion, or even large crowds at sporting events or national ceremonies. Using this data to spot patterns of behaviour will enable city planners to develop long term solutions to ensure city life runs smoothly. Instant access to connected devices By 2025, an average connected person anywhere in the world will interact with connected devices nearly 4,800 times per day — that’s one interaction approximately every 18 seconds. As access to data becomes the central component to a functioning smart city, the way data is stored has become more important than ever It isn’t just new-paradigm services such as Uber that are causing this. Increasingly, the ability to instantly access data relevant to many aspects of our lives will drive our interactions with these devices, and industries around the world are undergoing a digital transformation motivated by these evolving requirements. The benefits of data access is best shown through Project Green Light in the US city of Detroit, where the police department has partnered with gas stations across the city and the community to improve the quality of life within the neighborhood. The result is a strengthened relationship between public services and private businesses operating in the area. As access to data becomes the central component to a functioning smart city, the way data is stored has become more important than ever. When it comes to surveillance in our cities, the need for not only the technology but the hardware to analyse this data is of imperative importance. Real time data storage availability The growth of real-time data will cause a shift in the type of storage needed in the future – with fast, uncompromised access to data being non-negotiable. Data Age 2025 predicts that by 2025 the global datasphere will grow to 163 zettabytes. The security of our data and how it is stored will be the foundation to any future smart city strategy That’s ten times the 16.1ZB of data generated in 2016. This increase in data will propel the need for data to be available in real-time to heighten the focus on low-latency responsiveness from enterprise edge storage, as well as from the endpoints themselves. The rise in edge computing exemplifies how this demand is already present. The stakes are rising and with them, the critical importance of our data’s veracity and timeliness. It is important to identify city-wide data partnerships, architecture, and standards for effective and safe data sharing when developing a data strategy. Securing stored data It’s important to note that the security of our data and how it is stored will be the foundation to any future smart city strategy, ensuring that safety, regulatory, speed and access requirements are all met. Securing the data that underpins life as we know it is circular, not linear. Every company that creates, uses or touches data has to have a role in keeping it secure and should be the backbone of any smart city. What’s evident however is that digital transformation is shaping the surveillance industry and in turn how our cities operate. As a result, data is the fuel that will ensure the impact is a positive one. People, government and businesses all contribute to the cities of today, so no one can afford to ignore the shift we are seeing. The cities that utilise surveillance data when considering any changes to their infrastructure will ultimately become the cities of tomorrow, not only future-proofing, but prospering in the data-driven age.
Live events at large venues like arenas, stadiums or convention halls – whether they involve wrestlers breaking chairs over each other’s heads, Axl and Slash letting bygones be bygones and reuniting Guns ‘n’ Roses, your favorite NFL team annihilating the opposition 62-3, or a convention involving anything from politics to food to Star Trek – are exciting affairs that channel the camaraderie of the crowd into a powerful collective energy. But they also are vulnerable to threats. Physical security solutions Terrorists and other malefactors have known for centuries that any large gathering of people has inherent vulnerabilities on which they can prey: Crowds make it hard for security to keep track of any single person or spot unusual behavior, and the number of people congregated in one space amplifies the impact of any attack. In recent years, organisers of large events have augmented the security methods they use to protect a venue, using both walk-through metal detectors and hand wands, and deploying K9 and police units to patrol the lines to enter security. But these current methods share a universal flaw: to be caught, evil-doers have to be on the verge of actually entering the venue with hundreds of other people, which means they can still cause a massive amount of destruction. In a survey conducted by Brivo, 50 percent of business security leaders felt they lack adequate budget and financial resources to invest in physical security solutions. Augmented security measures Organisers of large events have augmented the security methods they use to protect a venue, using both walk-through metal detectors and hand wands Security professionals and event organisers are constantly on the verge of finding new methods to implement in order to add an extra layer of security at venues and large facilities. For example, at this year’s Coachella Music Festival in Indio, California, which attracts over 100,000 attendees each year, organisers boosted their security initiatives by adding drones, armed guards, magnetometers and dog patrols. Unfortunately, large entertainment festivals have been a target for ill-intended individuals. Last year, the 91 Route Festival in Las Vegas, Nevada took the lives of more than 50 people and injured over 500. In the United Kingdom, 22 people lost their lives to a suicide bomber at an Arianna Grande concert in the Manchester Arena. Yet, concerts aren’t the only place new security initiatives and technology need to be implemented in, but also sports arena and large facilities. Metrasens partnered with Villa Park, the football grounds for Aston Villa Football Club in the UK, to conduct a trial using FMDS technology, Proscreen 900, to screen fans Current screening methods Conventional walk-through metal detectors are a compromise between effective screening and high throughput, as they successfully detect metal objects, but only can screen about five or six people each minute. They are generally placed 10 to 20 yards from a venue’s front façade, either just outside or just inside, to screen people as they enter the facility. Hand wands are used for anyone that sets off the walk-through detector as a secondary screening method for confirmation. Many facilities also use observational methods to screen, such as drones, CCTV, security officers or police walking the crowd and looking for suspicious behavior, or explosives-sniffing K9 units patrolling the area. Security personnel are aware of these pre-security-screening vulnerabilities around the perimeter of the venue Security method limitations Each of these methods has intrinsic limitations. Observational security methods are just that – observation-based, not detection-based. They rely much more heavily on human factors that introduce greater degrees of error and chance, and positive visual identification of a suspicious threat requires a relatively close proximity to observe the threat. They’re also slow and laborious. Walk-through detectors and wands will catch someone trying to enter a facility with a weapon, but by the time they do, it may be too late – a terrorist will already be well within proximity to do a lot of damage. Bad guys don’t need to actually enter the venue; they just need to get close enough to injure or kill a large number of people. That can happen – and has happened, such as with Manchester Arena bombing in 2017 – right at the security point, where a terrorist will be surrounded by dozens or hundreds of people and 10 to 20 yards away from the critical asset: the interior of the venue. Security personnel are aware of these pre-security-screening vulnerabilities around the perimeter of the venue. What they haven’t had until recently is a way to screen mass amounts of people for weapons of mass casualty as far away from the critical asset as they can, and as far away from densely populated areas as they can, all while not impeding throughput resulting from the requirement for patrons to divest their possessions. Expanding security reach with FMDS The far perimeter of a venue is an ideal place to screen for weapons of mass casualty. Most of the time, a terrorist is trying to get closer to the immediate perimeter of the venue, to inflict the most damage to large groups of people waiting to get in; farther away, event attendees are walking toward the entrance and thus are more dispersed, not standing in clusters or lines. This advance screening is possible using ferromagnetic detection systems (FMDS). The FMDS systems in the trial, Proscreen 900, were placed outside, where individuals were screened for large weapons before they even entered the football stadium Metrasens recently partnered with a football stadium in Birmingham, UK to conduct a trial using FMDS technology to screen fans. The trial took place in March at Villa Park, the football grounds for Aston Villa Football Club. The stadium can hold over 42,000 people. The FMDS systems in the trial, Proscreen 900, were placed outside, where individuals were screened for large weapons before they even entered the football stadium, adding an extra layer of security. FMDS is highly accurate – there is no false alarm rate, because it is programmed to find only what security personnel need to find In the most basic terms, FMDS uses passive sensors that evaluate disturbances in the earth’s magnetic field made by something magnetic moving through its detection zone. Everything else is invisible to it; it doesn’t see people, clothing, backpacks, purses, etc. Nothing can be used to shield the threat, because FMDS doesn’t detect metallic mass; it detects a magnetic signature, down to a millionth of the earth’s magnetic field. It is also highly accurate – there is no false alarm rate, because it is programmed to find only what security personnel need to find (e.g., a weapon). Although it is a passive technology, it is more effective and reliable than using observational security methods to screen a perimeter, because the technology will never miss something the way a human would. Recognising moving magnetic signatures An important point is that the system only works on moving objects. This makes it immune to environmental conflicts such as rebar that would trip up conventional metal detectors and allowing people to be screened quickly and unobtrusively without stopping to divest their possessions as they walk toward a venue – up to 50 or 60 people a minute. FMDS does not need people to be organised into lines or groups; it simply detects a magnetic signature on anything that passes. It runs on batteries – there is no need for an electricity source, as with a walk-through detector – and can be placed on just about any form factor (a pole, a stand, etc.). This gives security personnel flexibility when deploying FMDS, allowing them to create a wide perimeter around a venue without worrying about portability or a power source. Screening can be as obvious or as concealed as personnel prefer for a particular situation, based on the form factor they select. FMDS simply gives the opportunity to add a layer of security where there currently is not an effective solution All of these combine into a solution that creates a way to close a gap in mass screenings at large events, by expanding the secure perimeter and creating a highly accurate way to detect weapons of mass casualty farther away from a critical asset and large crowds. It does not replace screening for smaller items necessarily, and all large venues should use a layered security solution that also deploys tactics like roving security guards, walk-through metal detectors and hand wands. FMDS simply gives the opportunity to add a layer of security where there currently is not an effective solution. Effective mass screening solution Pessimists sometimes muse the world is getting more dangerous with each passing year, and that technology is at least partially responsible for both the breadth and depth of the increasingly creative ways bad guys harm people. But some technologies also are responsible for helping to fight against those threats and make the world safer, and FMDS is one of those. By providing a foolproof method of detecting weapons of mass casualty before terrorists get too close to an event venue, FMDS gives event security personnel a way to better protect large events, making them less dangerous and keeping people safe. Images source: Metrasens
Coming off a successful ISC West show, Honeywell is sharply focussed on product development, with an emphasis on advanced software. “We have a strong new product pipeline this year – more than two times the number of products than we’ve released in the past several years,” says Luis Rodriguez, Director of Product Marketing, Honeywell Commercial Security. “At ISC West, we received a lot of interest in how AI and new security systems are changing the market.” Although uses for AI are still emerging in security, Honeywell sees an important role for AI in building a connected system to ensure the safety and security of a building, and more importantly, its occupants. AI allows end users to go beyond monitoring activity on a surface level to really understand the scene – from who exactly is in the area to what they might be doing. As more data is processed over time, AI will continue to build on its learnings to help deliver a more accurate assessment of potential threats each time. Machine learning-based analytics End users should explore the use of machine learning-based analytics as machine learning is more advanced than AI-based systems, says Rodriguez. “When speaking to dealers and integrators, end users should also inquire about the detection accuracy of systems that use AI or machine learning technology, particularly around false positives and negatives.” Honeywell seeks to develop integrated security systems that provide the earliest detection “Additionally, end users should always ask to conduct site testing so to understand how well-suited the machine learning-based system is to the particular user’s native environment,” adds Rodriguez. “The testing will help identify the exact needs of their site.” Honeywell is reinvesting in its video portfolio, both in hardware and software innovation, as well as partnering with the top experts in the IT and education industries to stay ahead of customer demand. Honeywell seeks to develop integrated security systems that provide the earliest detection, enable the fastest response, centralise decision making, and allow customers to manage it all from anywhere. Solutions for vertical markets Honeywell Commercial Security is focussed on supporting vertical markets that have specific security needs such as education, banking and finance, and pharma. Each has unique nuances that call for tailored security approaches. “As Honeywell continues to develop its suite of security solutions for the future and identify personalised systems for each vertical, AI such as analytics, deep learning and facial recognition will play an integral role during research and testing,” says Rodriguez. Honeywell is developing video and audio analytics technology capable of studying crowd behaviour as well as detecting guns, gunshots An example is the education market, where eliminating human delay in reporting potential threats to law enforcement and creating faster systems that help omit single-point failures are key to protecting schools and ensuring students’ safety. To address those challenges, Honeywell is developing video and audio analytics technology capable of studying crowd behaviour as well as detecting guns, gunshots and fights, says Bruce Montgomery, Business Development Manager, Honeywell Commercial Security. Testing technology for sports security The software is able to visualise, automate planning, design and efficiency analysis of a video surveillance system"A partnership with University of Southern Mississippi’s National Center for Spectator Sports Safety and Security (NCS4) is testing technology such as MaxPro Video, Pro-Watch Access Control and UNP Mass Notification in the National Sport Security Laboratory and in connected real-world environments. “The analytics data gathered from these environments will help inform future security innovations,” says Montgomery. Another Honeywell partnership is with JVSG, whose CCTV Design Software offers a new way to design more affordable and higher quality video surveillance systems. Integrators and distributors are now able to add a range of models from Honeywell’s portfolio of Performance Series IP Cameras into their system design from the software’s database. “The software is able to visualise, automate planning, design and efficiency analysis of a video surveillance system,” says Jeremy Kimber, Director of Enterprise Global Product Management, Honeywell Security and Fire. The program is used by more than 7,000 CCTV designers in more than 130 countries around the world and is downloaded more than 60,000 times every year.
A hyperconverged infrastructure is a software-defined environment in which various elements of a physical security system – computing, storage and networking – are combined together and run more efficiently on fewer hardware devices. Rather than each element of a system being represented by a physical hardware device, those elements are combined on a cluster of hardware devices. Hypervisor software separates a computer's operating system and applications from the underlying physical hardware. The elements continue to function as before, and software keeps them separated virtually, while also enabling the system to run more economically on less hardware. Virtualisation within hyperconverged systems Hypervisor software separates a computer's operating system and applications from the underlying physical hardware Software companies such as VMWare, Microsoft Hyper-V and Nutanix provide virtualisation software that enables hyperconverged systems in the IT world. However, bringing hyperconverged systems to the world of video surveillance requires special handling, and security integrators may not be aware that hyperconverged software from the IT market does not work seamlessly with video data. Specifically, these hypervisor software systems have latency problems that are not compatible with video. Therefore, hyperconverged software systems must be adapted to meet video’s needs. Companies working to bring hyperconverged systems to the video market are taking proper measures to ensure that those systems deliver on expectations of security integrators and end users while also providing economic and operational advantages of hyperconverged systems. Why a virtual machine can aid your server solution A hyperconverged system can transition a stack of 10 or more application servers down to three servers, with all the applications still virtually separated on fewer machines. Each server is used to 100 percent of its capacity, which is more efficient. Companies working to bring hyperconverged systems to the video market are taking proper measures to ensure that those systems deliver on expectations Both operating and maintenance expenses are lower, and if more computing resources are needed for a virtual machine, the software interface enables an end user to allow more processing power, RAM or disk space to that application. Less servers equate to less equipment costs, and also less costs for rack space, cooling and other related expenses. When a video system is working on a hyperconverged cluster, what happens if there is a hardware failure? The virtual system gets moved to a cluster that is working, but there might be a 30-second gap in video, which would not be acceptable for a critical application. All video must therefore be saved in two places. Virtualised server stacks from BCDVideo BCDVideo has entered into an engineering partnership with Scale Computing to develop an optimised hypervisor based on Scale Computing’s HC3 software that is also efficient for writing video.Less servers equate to less equipment costs, and also less costs for rack space, cooling and other related expenses Virtualisation in the physical security market can create traffic patterns that are unlike traditional IT, and changes need to be implemented to accommodate for that. To avoid a “bottleneck” that can occur during the virtualisation process, the virtual machine and the underlying physical hardware must be optimised to account for the virtualisation process. “Performance and high-availability are critical in the video surveillance market and not all HCI solutions will adapt to video data,” said Dan Pierce, VP of Strategic Sales at Scale Computing. “With Scale Computing’s HC3 platform and BCDVideo’s ‘purpose built’ approach, customers will benefit from a solution that’s adapted to meet industry wide requirements while simplifying the management and maintenance of their infrastructure.” Hyperconverged infrastructure will become more and more prevalent in the video market, especially for large systems that have high camera counts and longer video retention times. Hyperconverged systems offer a more efficient use of resources and save costs because hardware is more fully utilised. Previous problems of using hyperconverged systems for video have been solved, which paves the way for much more widespread deployment. Over time, we should expect hyperconverged system to become more common for larger video installations, such as gaming, sports arenas, large cities, universities, corporate campuses and airports. The key to success is applying knowledge both of the needs of video systems and of how hyperconverged systems can be adapted to meet those needs.
The 2018 FIFA World Cup tournament is bringing 32 national teams and more than 400,000 foreign football fans from all over the world to 12 venues in 11 cities in Russia. Fans are crowding into cities including Moscow, St. Petersburg and Kazan. Given continuing global concerns about terrorism, security is top-of-mind. Protection of the World Cup games in Russia is focusing on an “integrated safety, security and service approach,” according to officials. Combining the term “security” with the terms “safety” and “service” is not an accident. An aggressive security stance is necessary, but at the end of the day, fan safety is paramount, and a service-oriented approach ensures a positive fan experience. Medical responders will be working side-by-side with police and antiterrorism personnel. Risk management best practices We asked Sean T. Horner and Ben Joelson, directors of the Chertoff Group, a global advisory firm focused on best practices in security and risk management, to comment on security at FIFA World Cup 2018. Although not involved in securing the 2018 World Cup, the Chertoff Group is experienced at securing large events and enterprises using risk management, business practices and security. Integration is another important aspect of protecting the games, says Horner. The use of multiple resources, including Russian military, intelligence and law enforcement, will be closely integrated to provide the best security for the large-scale event in each of the host cities, he says. The approach will be centralised and flexible, with resource deployment guided by effective situational awareness. Primary security and emergency operations centres will be dispersed throughout each host city “There is a unified command structure at the Russian Federation level, and they will keep resources in reserve and shift them as needed to various events and venues based on any specific intelligence, in effect deploying resources where threats are greatest,” says Joelson. “There will also be some regional commands, and resources will incorporate a spectrum of police and military personnel ranging from the ‘cop on the beat’ to the Spetsnaz, the Russian ‘special forces'.” Primary security and emergency operations centres will be dispersed throughout each host city, and additional forces can be shifted as necessary, he notes. Role of law enforcement In Russia, the lines of separation between law enforcement and the military are not as stark as in the United States, for example, where military forces are restricted from deployment for domestic law enforcement by the Posse Comitatus Act. In Russia, there is no such restriction. A broad range of technology will play a role at the World Cup, Horner and Joelson agree. Technology will be used primarily as a force multiplier and a decision-support tool for security personnel. There are robust CCTV systems in many Russian cities, and mobile CCTV systems, such as camera towers or mobile security centres on wheels, will also be deployed. Technologies will include infrared cameras, flood lights, and ferromagnetic screening systems to scan hundreds of individuals as they walk by. In some locations, facial recognition systems will be used, tied into various intelligence, military and law enforcement databases of known bad actors. Behaviour analytics will be used as a decision-support tool. In addition to security in public areas, private CCTV systems in hotels, at transportation hubs, and inside the venues themselves will be leveraged. Video analytics and detection will help personnel review live view of people who may be acting suspiciously or who leave a bag unattended. In some locations, facial recognition systems will be used, tied into various intelligence, military and law enforcement databases of known bad actors Rigorous anti-terrorism measures A Fan ID card is required to enter the 2018 World Cup Tournament, even for Russian residents. The Russians have an aggressive stance against domestic terrorism, which will also help ensure the safety of the World Cup games, say Horner and Joelson. Terrorist group ISIS has promised “unprecedented violence” at the games, but they make similar threats at every major global event. Russia has been an active force disrupting ISIS in Syria, and experts suggest that losing ground geographically could lead to addition “asymmetric” terrorist attacks. However, Russia is leveraging all their intelligence resources to identify any plots and deploying their security apparatus to disrupt any planned attacks, experts say. Russia’s rigorous anti-terrorism measures include a total ban on planes and other flying devices (such as drones) around the stadiums hosting the World Cup. Private security In addition to military, intelligence and law enforcement personnel, private security will play a have a high profile during the 2018 World Cup in Russia. Private security personnel will be on the front lines in hotels and in “fan zones.” They will operate magnetometers at entrances, perform bag checks, enforce restrictions on hand-carried items, etc. Private security will be especially important to the “guest experience” aspects of protecting the games. Private security will be especially important to the “guest experience” aspects of protecting the games Another private security function at the World Cup is executive protection of dignitaries and high-net-worth individuals who will be attending. Executive protection professionals will arrive early, conduct advanced security assessments before VIPs arrive, and secure trusted and vetted transportation (including armoured cars in some cases.) VIPs will include both Russian citizens and foreign (including U.S.) dignitaries attending the games. Private security details will be out in force. Aggressive security approach Overeager and outspoken fans are a part of the football culture, but Russia will deploy a near-zero tolerance policy against hooliganism and riots. An overwhelming force presence will take an aggressive approach to curbing any civil disturbances, and offenders will be removed quickly by Russian security forces. Strict restrictions on the sale and consumption of alcohol will be enforced in the venue cities before and after the matches. Officials will also be cognisant of the possibility of a riot or other event being used as a distraction to draw attention from another area where a terrorist event is planned. It will be a delicate balance between deploying an aggressive security approach and preserving the fan experience. Joelson notes that freedom of speech is not as valued in Russia as in other parts of the world, so the scales will be even more tipped toward security. “The last thing they want is for things to get out of control,” says Horner. “The event is putting Russia on the world stage, and they want visitors to walk away safely after having a great time and wanting to go back in the future.” Attendees should also have good situational awareness, and keep their heads up, scanning crowds and identifying unsafe situations" Precautions for World Cup attendees Attendees to the World Cup in Russia should take some basic precautions, Horner and Joelson agree. For example, Russia requires a translated, notarised letter explaining any prescription drugs. The country has a more aggressive foreign intelligence environment, so visitors cannot depend on their data being private. Joelson recommends the usual “social media hygiene” and privacy settings. Visitors should not post information about their travel plans or locations, and it’s best to travel with a disposable mobile phone that does not contain personal information. Location tracking should be deactivated. Travellers should also beware of talking and sharing information with others, or of saying anything derogatory. “They should also have good situational awareness, and keep their heads up, scanning crowds and identifying unsafe situations,” says Joelson. “If you bring a personal electronic device, you should expect that it has been compromised,” says Horner. Text messages and email will not be private, and he suggests creating an email address used only for travel. Don’t leave drinks unattended. Travellers from the U.S. should register at the Smart Traveler Enrollment Program (STEP) operated by the U.S. State Department. “Plan before you travel and before you get to the airport,” says Horner.
An upgrade of surveillance, using the latest video technology from IDIS, has put Circuit Zandvoort in poll position as host venue for the 2020 Formula 1 Grand Prix in the Netherlands. As well as wider improvements to the track, a top priority at the circuit was a complete overhaul of the video monitoring capability to meet the requirements of Formula 1. Security and safety surveillance For Track Manager Niek Oude Luttikhuis a key objective was to rapidly implement a solution that would be much easier than the previous system to use, maintain and adapt in the future. To achieve this, he brought together a team including IDIS – Korea’s surveillance manufacturer. Significantly improving security and safety surveillance of the track, their solution will also let the Formula 1 organisers temporarily receive functional authorised access of video data for the duration of the competition. Video management software Circuit Zandvoort will be able to take advantage of IDIS Critical Failover technology as a service module within the IDIS VMS At the heart of Circuit Zandvoort’s new system is IDIS’s server-crunching, 64 channel DS-IR300 NVR technology, pre-loaded with IDIS Solution Suite video management software (VMS). This allows all the track’s existing cameras to be easily integrated and operated alongside the latest IDIS 5MP speed dome PTZs and 12MP bullet cameras. It also delivers impressive new functionality, including ultra-high-definition monitoring capability using IDIS Smart UX Controls. The system now provides real-time image capture of the highest quality, with no lag, ghost-shadowing or stuttering of images, even when cars travelling at high speed are displayed. Critical Failover technology Images on the racing control room video wall are now crisp and clear. And looking ahead, the IDIS Solution Suite VMS will make it easier to sustain this high standard by allowing cost-efficient, remote firmware updates and system maintenance. Circuit Zandvoort will also now be able to take advantage of IDIS Critical Failover technology as a service module within the IDIS VMS. This protects against video data loss due to a wide range of potential fault conditions, such as network instability or power failure. It ensures that recordings are automatically updated without the need for engineer callouts and with no risk of gaps in recordings while the fault is resolved. No interruption to surveillance IDIS demonstrated a deep understanding of the security and operational requirements of our circuit"The entire upgrade was completed while the original system continued to run in parallel, confirms Track Manager Niek Oude Luttikhuis. This meant there was no interruption to surveillance during implementation, which was vitally important as the track is in almost continuous use. “There is fantastic mutual communication between IDIS and the different suppliers – they think ahead and complement each other,” says Mr Luttikhuis. “And from the start IDIS demonstrated a deep understanding of the security and operational requirements of our circuit and a passion for motor racing.” PTZ cameras for tracking With the new system operational as promised, in the control room a rotating team of 10 people work with the IDIS Solution Suite VMS, with minimal training required to use all its features and functions – including easy search and retrieval, and silky-smooth control of the ultra-high-definition (UHD) PTZ cameras for tracking in real-time. Authorisation levels can be set, giving each individual specific user rights, and during the Grand Prix itself the Formula 1 organisers will also be given access to the system. If necessary, this will also include the ability to view and retrieve footage on mobile devices via the IDIS Mobile app – helping the 2020 Formula 1 Grand Prix to run smoothly behind the scenes.
The Danish Superliga football club Brøndby IF were aware that family attendance had fallen at some of the more high-profile games, such as the local derby with F.C. Copenhagen, due to concerns over hooliganism and safety. With an average attendance of 14,000 people per game, and up to 100 registered persons on the stadium blacklist for causing trouble, the football club wanted to find a way to make genuine fans feel safer by preventing problems before they could occur. Improving security With the use of cameras and facial recognition, blacklisted offenders can now be automatically identified in the crowd before they attempt to enter the stadium. This system identifies any individuals registered on the offenders list and alerts security staff to prevent them from entering. The automated procedure at the stadium entrance also decreases congestion at the gates, so genuine fans can get into the stadium faster. As well as improving security outside, the system allows staff more time to focus their attention on creating a safe and entertaining environment for those inside the stadium. The technology can identify faces that are difficult to recognise with conventional techniques Facial recognition server The Panasonic facial recognition software ensures high levels of accuracy. The technology can identify faces that are difficult to recognise with conventional techniques, such as those taken from an acute angle and even when part of the face is concealed or hidden by sunglasses or scarves. In fact, the National Institute of Standards of Technology (NIST) in independent testing identified the system as the most accurate facial recognition server on the market. And the system is already working. One blacklisted offender was prevented from entering the stadium at the very first home game of the season in mid-July and he will receive a fine and extended ban. Protection of personal data However, some fans were initially sceptical about the scheme. They were worried about the Big Brother concerns of privacy and personal data protection. These fears quickly faded once the club explained the sensitive way that the scheme had been implemented. Security personnel remain in control of the process at every stage. The technology flags potential blacklisted offenders and the security advisers then take over and investigate further before taking action. People-led and technology supported The solution is people-led and technology supported. Personal data privacy is also protected because the facial recognition technology does not store the images or data of any supporters, other than those registered on the blacklist. In addition, all personal data is stored on an internal server, not connected to the internet or to any other system, significantly reducing any cyber risk of data breach. After seeing the results of the technology and receiving reassurances about data protection, both Brøndby management and fans alike have welcomed the new technology. Moving forward there is also the potential to utilise a national hooligan register with the system to help spot travelling troublemakers within Denmark.
Zayed University is the newest of three government sponsored higher education institutes in the United Arab Emirates. The campus is located on the mainland of the Emirate of Abu Dhabi, near the Abu Dhabi International Airport and Masdar. The 229,000m campus houses six colleges across 28 separate buildings, including faculty and administration buildings, a childcare facility, residence halls, classrooms, science and computer labs, cafeterias and a sports complex, all equipped with the latest technology. Future development plans will see the student population increase to 7,500 and the campus grow to cover a net area of 269,000m. Access to and from the campus is an important concern for Zayed University and is carefully managed around the clock to keep the 6,000 strong student body safe. Managing gate barriers and doors Banner sends a command directly to the Gallagher Door Controller to open that specific gate if entry or exit is allowedThe university employs Serco to implement and manage their security requirements. Serco partnered with Gallagher, selecting the Command Centre security platform to manage gate barriers and access controlled doors with just under 650 MIFARE readers and 130 controllers across the site. Zayed University implements a policy to provide students with a secure campus environment. This includes managing the entry and exit of the students based on their scheduled classes. To achieve this, Zayed University runs an interface between Command Centre and its Banner system. Banner is a comprehensive computer information system that contains information on courses, students, faculty, staff and alumni, including financial aid, finance and human resource components. Entry and exit requests for students to pass through the campus gates are sent from Command Centre to the Banner system for approval, using the Command Centre OPC Alarms and Events interface. Based on the time of the entry or exit and the student’s schedule, the Banner system decides whether the request is accepted or denied. Banner then sends a command directly to the Gallagher Door Controller to open that specific gate if entry or exit is allowed. Safe and secure environment for students Its intuitive user interface provides flexibility and easy management of operations"Gallagher security solutions provide the assurance and the knowledge that movement throughout campus is managed simply and efficiently to ensure a safe, secure environment. “Keeping students safe is of utmost importance to us,” says Mukesh Karsan, Serco IT Manager at Zayed University. “The Gallagher system helps us honour this commitment. Its intuitive user interface provides flexibility and easy management of operations.” He adds that he’s been “impressed with the reliability and robustness the system offers; it’s powerful, versatile and allows security personnel to carry out their day-to-day responsibilities with efficiency.” Gallagher solutions are trusted by education providers worldwide to: issue student and faculty access cards manage individual access rights control campus and dormitory access secure computer labs, science labs and other high-value assets integrate with scheduling and resource booking systems evacuate or lock down sites in case of an emergency Time and money saving solutions From intelligent integration with building management systems, to people and time efficiencies gained through automation and smart use of resources, Gallagher designs solutions that save time and money. Whether it’s across multiple zones within a single campus, or over multiple campuses, Gallagher solutions offer an intelligent, powerful way to ensure business continuity, protection of assets and keeping people safe.
Beijing Daxing Airport, due to open in September, will soon be the second in Beijing to secure daily operations with state-of-the-art technology by Airbus. Airbus will provide one Tetra DXTA server, and nine TB3 base stations with eight TTRX 32-channel receivers per base station for Bejing’s second international Airport communication structure. The system will be mutually backed up by the Beijing Capital International Airport to enhance the communication and management of the two airports. The whole network will be put in use before the 30th of September, the official opening date of the airport. This new airport will possess eight runways and serve around 100 million passengers annually, all of which will be secured with Airbus technology. Seamless communications Airbus Tetra system has played a vital role in securing tasks relating to passenger transportation Tests carried out in April proved the interconnectivity between the digital trunk communication systems of both airports to be reliable, as stable and clear communications were recorded. The two Tetra systems provided by Airbus are fully interconnected; this will allow for Airport related entities such as Airlines and ground service companies to benefit from seamless communications between both airports. Beijing International Airport is also equipped with an Airbus Tetra system, which has provided highly stable, reliable, and flexible communication security for daily operations since its deployment in 2008. Over the past ten years, it has played a vital role in securing tasks relating to passenger transportation, as well as the logistics of high-scale world sports events. The current system serves over 10,000 subscribers. In 2018, the Beijing Capital International Airport saw over 100 million passengers for the first time, making it the second busiest airport in the world.
AxxonSoft technology speaks to product simplicity, ease-of-use and advanced functionality during the FIFA World Cup in Russia. Within the framework of preparation for the 2018 FIFA World Cup in Russia, AxxonSoft's tech support customised settings on more than 1,350 video channels at 3 stadiums and at a central monitoring station to meet the Ministry of Internal Affairs' needs through a centralised monitoring system. AxxonSoft, in collaboration with this global high calibre event, launched this state-of-the-art technology system within just 1 month, utilising team members to rollout. Videos were streamed from stadiums and surrounding territories, fan zones, and other locations deemed critical from the point of security Situational video analytics AxxonSoft's Intellect software managed a total of 960 video surveillance channels at Samara Arena, Mordovia Arena, and RZD Arena — the latter of which was used as a training base for referees. 250 of those channels employed AxxonSoft's situational video analytics to monitor the stadiums, 41 license plate recognition channels to monitor vehicle traffic, and 9 facial recognition channels to monitor for individuals prohibited from accessing the stadiums. Video monitoring was also integrated with access control, fire and security alarm systems. The Ministry of Internal Affairs' central monitoring station, powered by AxxonSoft's Intellect PSIM platform, pooled over 390 video channels from all 11 World Cup host cities with video feeds displayed on an interactive map. Videos were streamed from stadiums and surrounding territories, fan zones, and other locations deemed critical from the point of security for participants and guests of the World Cup. Integrated access control software The World Cup stadium security project included requests to integrate access control software, as well as develop a screen manager to adaptably manage camera layout and the video wall. These functions were successfully implemented at the World Cup stadiums and will be incorporated in Intellect 4.11.0. Over 9,000 Intellect-powered video surveillance cameras were used to monitor the security of over 2 million spectators The Intellect PSIM platform was employed in various areas of 10 out of the 12 stadiums where 49 World Cup matches were played. Over 9,000 Intellect-powered video surveillance cameras were used to monitor the security of over 2 million spectators who attended the games. AxxonSoft software was also widely used at training camps, fan zones, transportation infrastructure, and other sites where teams and fans arrived and moved around the country. Advanced stadium security technology “The team at AxxonSoft were really excited to be part of a project of this calibre. We were able to demonstrate product simplicity, ease-of-use and advanced functionality through our stadium security technology. The FIFA World Cup was a great success in Russia and just proves how we can work together with top agencies and companies to provide a safe environment for all,” says Global Marketing Director for AxxonSoft, Colleen Glaeser. FIFA president Gianni Infantino called the 2018 World Cup the best in its history. In addition to commenting on match attendance and television viewership numbers, Infantino gave high praise to the quality of infrastructure and security.
Hytera, a global provider of innovative Professional Mobile Radio (PMR) communications solutions, announces that it has signed contracts with Secretariat of Public Security of the State of Alagoas, Brazil to provide TETRA communications infrastructure as the expansion of the statewide mission critical communications network and four-year maintenance service. The total contracts value is around 6.5 million US dollars with the infrastructure contract around 1.3 million and the service contract around 5.2 million. “We are excited being chosen as the equipment and service provider of Alagoas’s statewide TETRA system. The state authority shows confidence in Hytera’s ability to deliver advanced and reliable public safety communications networks. For the expansion, we presented the latest development of TETRA technologies,” said John Zhou, the General Manager of Hytera Brazil. “The new contracts as a milestone for Hytera Brazil recognise us not only as a leading TETRA solution provider, but also a trusted service provider, and it is the embodiment of Hytera transformation globally.” In early 2014 Hytera delivered TETRA infrastructure, terminals and dispatcher to the public safety users of State of Alagoas TETRA communications network In early 2014 Hytera delivered TETRA infrastructure, terminals and dispatcher to the public safety users of State of Alagoas, who were modernising its communications systems to better serve the communities and prepare for the global soccer fiesta, the World Cup 2014. The newly signed equipment contract includes 31 sites with Hytera’s latest TETRA innovation, DIB R5 base station. It adopts a maintenance-free, space-saving design and can be installed on walls, antenna masts or in tunnels. Thanks to its low power consumption and passive cooling, it is ideal for use in areas where power supply is critical or where there is a need for battery-based, portable base station solutions. With the expansion of the TETRA network, different public safety forces such as police, firefighters and emergency response in the State of Alagoas will share the network to facilitate optimal cooperation when the situation requires, which is another big step forward by the local authorities to improve the security of the state.
Round table discussion
A major benefit of technology innovation is more application opportunities. As video cameras become better and more versatile, new uses are emerging that extend the benefits of video surveillance, often outside tried-and-true parameters. Sometimes security camera manufacturers are on the front lines to see new ways video is contributing value to integrators and end user customers. We asked this week’s Expert Panel Roundtable participants: What is the most unusual application of surveillance cameras you have seen recently?